Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 25, 2024 Thu

Time: 4:31 pm

international

Results for international

12592 total results found

2694 non-duplicate results found.

Author: United Nations Office on Drugs and Crime

Title: Combating Trafficking in Persons in Accordance with the Principles of Islamic Law

Summary: Trafficking in persons or human trafficking,1 a recognized human rights violation prohibited by international law, affects all countries and regions of the world. As a national and international, often organized crime, it knows no boundaries-geographical, cultural, political or religious. Its victims and perpetrators hail from all around the world. The flow of trafficked persons reaches some of the most far-flung areas of the globe. Trafficking in persons manifests itself as exploitation in different forms in different countries, but no region is immune to it. Muslim countries, most of which are members of the Organization of the Islamic Conference,2 are not exempt-all are affected by this crime. Trafficking in persons for the purposes of sexual exploitation and for labour exploitation in the domestic service industry and in agriculture and construction affects Muslim countries in the Middle East and North Africa. Trafficking in children and women for sexual or labour exploitation occurs in African countries both within and across national borders. In South and South-East Asia, trafficking in men, women and children for the purpose of sexual labour exploitation, which may also include trafficking for the purpose of begging or child sex tourism, is prevalent.3 While international law provides States with the central guiding framework for combating trafficking in persons, for this effort to be most effective, national legislatures should design legal provisions that, while consistent with international law, are also responsive to national specifics and are tailored to the legal structures and the phenomenon of trafficking manifested in each State.4 Given that the legal traditions and legal systems in many Muslim countries rely primarily on Islamic law, a study of Islamic legal provisions and traditions relating to trafficking in persons becomes important. An understanding of Islam's position on trafficking in persons and related acts and elements can provide important avenues for the development of a comprehensive approach to combating trafficking in persons in Muslim countries, one which draws on and is grounded in the Islamic tradition, as well as in compliance with international law. The purpose of the present publication is thus to analyse the Islamic legal tradition from the perspective of those sources, principles and provisions that may best be utilized in understanding, addressing and combating trafficking in persons. More specifically, this entails the elaboration of a comprehensive theory of Islamic legal principles for the prohibition of the crime of trafficking in persons and associated acts and means, on the one hand, and the protection of victims of such trafficking, on the other. It involves understanding the nature of the crime of trafficking in persons under Islamic law and what protections and safeguards are provided by Islamic law to the accused in the prosecution of trafficking. It also involves analysing how Islam relates to a victim-centred approach to the problem and what the obligations of the ordinary citizen may be in providing victims with assistance. It is also necessary that any checklist of issues addressing trafficking in persons under Islamic law also include prevention, education and public awareness-all core principles of a comprehensive strategy of combating trafficking as enshrined in international law.5

Details: Vienna: United Nations Office on Drugs and Crime, 2010. 72p.

Source: https://www.unodc.org/documents/human-trafficking/Islamic_Law_TIP_E_ebook_18_March_2010_V0985841.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 116312


Author: United Nations Office on Drugs and Crime

Title: United Nations Criminal Justice Standards for United Nations Police

Summary: This handbook summarizes the international human rights and criminal justice principles that United Nations police personnel must know, abide by and promote when deployed in peacekeeping operations and special political missions.

Details: New York: United Nations, 2009. 105p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: International Police, Handbooks, manuals

Shelf Number: 116525


Author: United Nations Office on Drugs and Crime

Title: Crime and Instability: Case Studies of Transnational Threats

Summary: This report looks at the relationship between organized crime and instability: how illicit commodities usually originate in trouble spots, are then trafficked through vulnerable regions, to affluent markets. It focuses in particular on the impact of drug flows (cocaine and heroin), as well as piracy around the Horn of Africa, and the impact of minerals smuggling on Central Africa.

Details: Vienna: United Nations Office on Drugs and Crime, 2010. 59p.

Source:

Year: 2010

Country: International

Keywords: Drug Trafficking

Shelf Number: 117626


Author: Buchanan, Cate

Title: No Relief: Surveyng the Effects of Gun Violence on Humanitarian and Development Personnel

Summary: This report documents the victimization of development and humanitarian personnel. Based on over 2,000 questionnaires, the survey involved staff from 17 United Nations and non-governmental organizations in 90 countries. One of the key findings is that the biggest threat facing relief and development agencies appears to be criminal violence from civilians armed with handguns, rather than armed groups.

Details: Geneva: Centre for Humanitarian Dialogue and the Small Arms Survey, 2009(?). 33p.

Source:

Year: 2009

Country: International

Keywords: Gun Violence

Shelf Number: 117661


Author: Robinson, Barbara

Title: Education in Chains: Gaps in Education Provision to Children in Detention

Summary: This report examines the right to education of children in detention in thirteen countries where Defense for Children International (DCI) has a presence and represents an ongoing collaboration between DCI's national sections and its International Secretariat. The report stems from DCI's participation in a special paper produced by the UN Special Rapporteur on the Right to Education on the theme of education for persons in detention. In preparation for his report, the Special Rapporteur consulted with governments, prisoners and non-governmental organisations (including DCI). The Special Rapporteur presented his findings to the Human Rights Council in June 2009, alongside a set of recommendations stressing the need to guarantee the right to education in detention, in legislation and in practice. The right to education of children deprived of their liberty Against a backdrop of poverty, social exclusion and exploitation, children in conflict with the law represent a particularly vulnerable group. However, instead of receiving care and protection, these children often face discrimination and denial of their social, cultural, economic and political rights. The evidence presented in this report highlights that many governments are failing to guarantee the right to education of children held in detention around the world. Key findings are as follows: - There were a number of examples where national legislation fails to establish provisions for the education of children in detention and where education is treated as an opportunity rather than a right; - In a number of countries, the State fails to provide any education whatsoever to children in detention; - Non-governmental organisations (NGOs) are the sole providers of education to children in detention in many situations, or play a key role in enhancing existing provision; - The situation of children is often worse when they are held in pre-trial detention, where limited, lower quality or indeed no education is often provided; - It was evident that few efforts are being made to monitor and evaluate the quality and frequency of education in detention, and in particular participation rates among detained children. To help address these problems and protect the rights of vulnerable children, DCI endorses the recommendations of the Special Rapporteur on the Right to Education (2009) and recommends a focus on the following goals: - States should use deprivation of liberty as a measure of last resort and for the shortest possible period of time. - Ensure education is framed as an inalienable right integrated in the national legislation, policies and strategies. - Systematically collect and publish data about the provision of education in detention. - Monitor and review the quality and quantity of education in detention and initiate plans to transfer responsibilities from non-governmental organisations to the state. - Avoid the use of pre-trial detention, regularly review its use and ensure conditions meet the same standards as other forms of detention. - Facilitate the participation of children in the development of educational programmes in detention.

Details: Geneva: Defence for Children International, 2009. 53p.

Source: Internet Resource: Accessed April 25, 2018 at: http://www.right-to-education.org/sites/right-to-education.org/files/resource-attachments/DCI_Education_in_Detention_2009.pdf

Year: 2009

Country: International

Keywords: Correctional Education

Shelf Number: 117098


Author: Volz, Anna

Title: Ending Violence Against Children in Justice Systems: Strategies for Civil Society Engagement in the Follow-up Study to the UN Study.

Summary: This report explores the specific role of civil society organizations in following-up the recommendations of the World Report on Violence Against Children on ending violence in justice systems. Eight case examples from civil society organizations illustrate different strategies or activities for follow-up intervention in practice, to provide guidance to non-governmental organizations wishing to undertake similar follow-up actions.

Details: Geneva: Defence for Children International, 2009. 79p.

Source:

Year: 2009

Country: International

Keywords: Child Abuse

Shelf Number: 117869


Author: Lindelauf, Roy

Title: Understanding Terrorist Network Topologies and Their Resilience Against Disruption

Summary: This article investigates the structural position of covert (terrorist or criminal) networks.

Details: Tilburg, Netherlands: Tilburg University, 2009. 13p.

Source:

Year: 2009

Country: International

Keywords: Counter-Terrorism

Shelf Number: 117867


Author: International Drug Policy Consortium

Title: Drug Policy Guide

Summary: This drug policy guide aims to provide regional and national partners of the International Drug Policy Consortium with a resource that they can use to conduct reviews of the national drug policies and programs in their areas, and engage with policy-makers to work towards policy and program improvements. The guide will be updated annually to reflect changes in global evidence and experience.

Details: London: International Drug Policy Consortium, 2010. 116p.

Source:

Year: 2010

Country: International

Keywords: Drug Control

Shelf Number: 118081


Author: Shaw, Margaret

Title: Crime Prevention Assessment Tool: Criminal Justice Assessment Toolkit

Summary: The purpose of this toolkit is to aid in the assessment of country needs in the areas of criminal justice and crime prevention so that appropriate and effective technical assistance can be provided. This toolkit is meant to be used in conjunction with the main toolkit, which discusses four main justice sectors: policing, access to justice, custodial and non-custodial measures, and cross-cuttint issues (criminal justice information, juvenile justice, victims and witnesses, and international cooperation).

Details: New York: United Nations, 2009. 57p.

Source: Cross-Cutting Issues

Year: 2009

Country: International

Keywords: Crime Prevention

Shelf Number: 117397


Author: Andrees, Beate

Title: Forced Labour and Human Trafficking: A Handbook for Labour Inspectors

Summary: This handbook is designed for use in training seminars and as a reference book for policy development. It provides background information with the latest statistics on forced labour and trafficking, national and regional responses, methods of victim identification and investigation of forced labor cases.

Details: Geneva: International Labour Office, 2008. 61p.

Source:

Year: 2008

Country: International

Keywords: Forced Labor (Handbooks)

Shelf Number: 118232


Author: Dottridge, Mike

Title: Kids Abroad: Ignore Them, Abuse Them or Protect Them? Lessons on How to Protect Children on the Move from Being Exploited

Summary: This study focuses on the experience of young people who leave home or travel abroad to seek work or a better life and also on children who are sent away from home by their parents. It explores initiatives which have had the effect of reducing the likelihood that such children will be subjected to economic or sexual exploitation. It sets out to go beyond identifying the vulnerable situations faced by such children, by examining what techniques have proved helpful to children who move away from their families.

Details: Geneva: Terre des Hommes International Federation, 2008. 88p.

Source:

Year: 2008

Country: International

Keywords: Child Labor

Shelf Number: 113296


Author: Dandurand, Yvon

Title: Conditional Release Violations, Suspensions and Revocations: A Comparative Analysis

Summary: Managing the social reentry of sentenced offenders is a potentially cost-effective way of preventing crime. Different types of conditional release programs can be used to support the social reintegration of offenders and improve public safety. This study is a preliminary comparative attempt to examine the decision-making process involved in selected jurisdictions in cases of alleged breach of conditions by offenders released on conditional release.

Details: Vancouver, BC: International Centre for Criminal Law Reform and Criminal Justice Policy, 2008. 50p.

Source:

Year: 2008

Country: International

Keywords: Parole

Shelf Number: 114604


Author: Save the Children Denmark

Title: Sex Offenders Without Borders: An Investigation Into the Sexual Abuse and Exploitation of Children in Thailand, Cambodia and Burma in Relation to Travel and Tourism

Summary: This investigation was carried out to gain more insight into the modus operandi of travelling sex offenders who sexually exploit children in Thailand, Cambodia and Burma; with particular emphasis being placed on the activities of Danish travelling sex offenders.

Details: Copenhagen: Save the Children Denmark, 2009. 98p.

Source:

Year: 2009

Country: International

Keywords: Human Trafficking

Shelf Number: 118228


Author: Reuter, Peter

Title: The Unintended Consequences of Drug Policies. Report 5

Summary: This document is the fifth of five reports that assesses changes in global drug problem from 1998 to 2007. It looks specifically into the issues surrounding the unintended consequences of drug policies in consuming nations.

Details: Santa Monica, CA: RAND, 2009. 36p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Drug Control

Shelf Number: 117657


Author: Woodiwiss, Michael

Title: The Global Fix: The Construction of a Global Enforcement Regime

Summary: This briefing tracks the history of the concept of organized crime and its metamorphosis into a transnational phenomenon allegedly posing a serious threat to global world order. It shows how the United States has dominated the construction of a global enforcement regime by interlinking concepts of drugs prohibition and combating organized crime. It states that the limited and blame-shifting approach to organized crime pioneered by the United States has steered attention away from corporate criminal activities towards conspiracies of criminal organizations.

Details: Amsterdam: Transnational Institute, 2005. 31p.

Source: TNI Briefing Series; no. 2005/3; Crime and Globalisation Programme

Year: 2005

Country: International

Keywords: Criminal Organizations

Shelf Number: 114636


Author: Hoff, Karla Ruth

Title: Caste and Punishment: The Legacy of Caste Culture in a Norm Enforcement

Summary: Well-functioning groups enforce social norms that restrain opportunism, but the social structure of a society may encourage or inhibit norm enforcement. This study shows how the exogenous assignment to different positions in an extreme social hierarchy - the caste system - affects individuals' willingness to punishment violations of a cooperation norm. Although the study controls for individual wealth, education, and political participation, low caste individuals exhibit a much lower willingness to punish norm violations that hurt members of their own caste, suggesting a cultural difference across caste status in the concern for members of one's own community. The lower willingness to punishment may inhibit the low caste's ability to sustain collective action and so may contribute to its economic vulnerability.

Details: Bonn: Institute for the Study of Labor (IZA), 2009. 45p.

Source: Discussion Paper Series/IZA; No. 4343; Internet Resource

Year: 2009

Country: International

Keywords: Caste

Shelf Number: 116385


Author: International Tribunal for Children's Rights

Title: International Dimensions of the Sexual Exploitation of Children: Global Report

Summary: The sexual abuse and exploitation committed on children by adults surpass all national boundaries. These abuses thus become the responsibility of more than one state, they become, in effect, an international problem. Some of the most common examples of these international dimensions of sexual exploitation of children include child sex tourism, cross-border trafficking of children for sexual purposes, child pornography and most recently the use of the Internet as a new channel for the proliferation of these forms of abuse and exploitation. This report presents an analysis and compilation of the recommendations produced by the first cycle of interventions of the International Tribunal for Children's Rights in France, Brazil and Sri Lanka. The recommendations cover a wide array of measures aimed at better protecting children from sexual exploitation and ensuring that their abusers are properly prosecuted and convicted, all over the world.

Details: Montreal: International Bureau for Children's Rights, 1999. 116p.

Source:

Year: 1999

Country: International

Keywords: Child Maltreatment

Shelf Number: 102426


Author: Kangaspunta, Kristiina

Title: Human Trafficking: An Overview

Summary: This report provides background on human trafficking, explains what has been achieved in the first year of the United Nations' Global Initiative to Fight Human Trafficking, and identifies challenges that lie ahead.

Details: New York: United Nations, 2008. 48p.

Source:

Year: 2008

Country: International

Keywords: Forced Labor

Shelf Number: 114870


Author: Brack, Duncan

Title: Illegal Logging and Related Trade: 2008 Assessment of the Global Response (Pilot Study)

Summary: Illegal logging and its related trade has for some years been recognized by international decision-makers as one of the world's most pressing environmental problems. In many timber-producing countries the majority of trees are illegally cut, resulting in significant losses of assets and revenues and devastating damage to the forests upon which hundreds of millions of the world's poorest people depend. More than ten years have now passed since the G8 leaders recognized the problem, in 1988, and committed to act. During that time, large amounts of time and money have been spent trying to tackle the problem. This paper attempts to measure what difference this effort has made.

Details: London: Chatham House, Energy, Environment and Development Programme, 2009. 97p.

Source:

Year: 2009

Country: International

Keywords: Illegal Logging

Shelf Number: 117829


Author: O'Briain, Muireann

Title: Sexual Exploitation of Children and Adolescents in Tourism

Summary: Efforts to combat the sexual exploitation of children in travel and tourism have been ongoing for almost 30 years. Since the early awareness-raising campaigns, work has developed into multi-stakeholder, multi-sectoral programs including training, developing and implementing codes of conduct, and building an ethic of personal responsibility. However, the demand for children and young people as sexual partners remains, fed by poverty and social exclusion.

Details: Bangkok, Thailand: ECPAT International, 2008. 62p.

Source:

Year: 2008

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 114866


Author: Pramod, Ganapathiraju

Title: Sources of Information Supporting Estimates of Unreported Fishery Catches (IUU) for 59 Countries and the High Seas

Summary: Estimating the level of illegal fishing is, by its very nature, extremely difficult and has not previously been attempted on a global scale. This report documents source materials used in assembling quantitative estimates of illegal fishery catches, unreported catches and discards used in a series of spreadsheet analyses as part of a global estimate of IUU fishing.

Details: Vancouver, BC: Fisheries Centre, University of British Columbia, 2008. 242p.

Source: Fisheries Centre Research Reports, Volume 16, no. 4, 2008

Year: 2008

Country: International

Keywords: Illegal Fishing

Shelf Number: 117325


Author: Livingston, James D.

Title: Mental Health and Substance Use Services in Correctional Settings: A Review of Minimum Standards and Best Practices

Summary: Research consistently demonstrates that custodial and community corrections populations have substantially higher prevalence rates of mental health and substance use problems compared with the general population. This report presents a review of minimum standards and best practices in relation to the provision of mental health and substance use services in correctional settings. The report has been created to serve as a background document for the Centre as it prepares to undertake further work in relation to mental health practices in the criminal justice system.

Details: Vancouver, BC: International Centre for Criminal Law Reform and Criminal Justice Policy, 2009. 115p.

Source:

Year: 2009

Country: International

Keywords: Mental Health Services

Shelf Number: 116382


Author: United Nations Office on Drugs and Crime

Title: Model Law Against Trafficking in Persons

Summary: The UNODC Model Law against Traffficking in Persons was developed in response to the request of the General Assembly to the Secretary-General to promote and assist the efforts of Member States to become party to and implement the United Nations Convention against Transnational Organized Crime and the Protocols thereto. It was developed in particular to assist States in implementing the provisions contained in the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, supplementing that Convention.

Details: Vienna: UNODC, 2009. 73p

Source:

Year: 2009

Country: International

Keywords: Human Trafficking

Shelf Number: 116185


Author: Sykiotou, Athanassia P.

Title: Trafficking in Human Beings: Internet Recruitment

Summary: This report presents the current methods used by human traffickers to recruit their victims via the Internet, and identifies legal, administrative and technical means used to combat this misuse.

Details: Strasbourg: Council of Europe, 2007. 145p.

Source:

Year: 2007

Country: International

Keywords: Human Trafficking

Shelf Number: 119797


Author: Bencomo, Clarissa

Title: The Last Holdouts: Ending the Juvenile Death Penalty in Iran, Saudi Arabia, Sudan, Pakistan, and Yemen

Summary: This reports documents how flawed laws and policies, weak juvenile justice systems, and low levels of birth registration in these five states are an obstacle to universal implementation of the absolute prohibition on the juvenile death penalty. The report calls on all states to prohibit the death penalty for all persons under 18 at the time of the crime.

Details: New York: Human Rights Watch, 2008. 20p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Capital Punishment (Middle East)

Shelf Number: 117399


Author: Dammert, Lucia

Title: Prisons: Problems and Challenges for the Americas

Summary: This report unveils the present-day conditions of imprisonment centers in Latin America, concluding with policy recommendations regarding common problems and challenges, although the realities and magnitudes of crime vary in each case.

Details: Santiago, Chile: FLACSO, 2008. 172p.

Source:

Year: 2008

Country: International

Keywords: Prisoners (Latin America)

Shelf Number: 113914


Author: Mossman, Elaine

Title: International Approaches to Decriminalising or Legalising Prostitution

Summary: This report examines international legalized and decriminalized models of prostitution law reform. The study found that there has been a significant shift away from prohibition, towards legalization and decriminalization. However, confusion exists over the main legislative approaches to prostitution in different jurisdictions.

Details: Wellington, NZ: Ministry of Justice, 2007. 42p.

Source: Crime and Justice Research Centre, Victoria University of Wellington

Year: 2007

Country: International

Keywords: Prostitution

Shelf Number: 116388


Author: Pye-Smith, Charlie

Title: Crime and Persuasion: Tackling Illegal Logging, Improving Forest Governance

Summary: This report looks at the role governments play in the practice of illegal logging.

Details: London: Department for International Development, 2010(?). 51p.

Source:

Year: 2010

Country: International

Keywords: Illegal Logging

Shelf Number: 118110


Author: High Seas Task Force

Title: Closing the Net: Stopping Illegal Fishing on the High Seas

Summary: This is the final report of the Ministerially-led Task Force on IUU Fishing on the High Seas. It takes a look at the illegal, unreported and unregulated (IUU) fishing on a global scale. To address this problem, it devised a set of practical proposals intended to tackle the root causes of IUU fishing. Each of the major proposals is intended to have one or both of the following effects: (1) it will enhace enforcement, sharply increasing the risk of exposure of IUU operations and the potential for successful prohibition, and (2) it will make IUU operations less profitable, increasing the capital and operating costs and reducing the revenues from IUU fishing. Each measure is thus designed in some way to expose IUU fishing activities, deter them and improve enforcement against those responsible.

Details: London: IUU Fishing Coordination Unit, 2006. 116p.

Source: Internet Resource

Year: 2006

Country: International

Keywords: Illegal Fishing; International Law Enforcement Coo

Shelf Number: 117320


Author: Abbott, Brant

Title: The Economics of Endangered Species Poaching

Summary: The poaching of endangered species is a global problem. In Africa elephants are poached for their ivory and rhinoceroses are poached to produce medicinal products from their horns (Fischer 2004). In North America grizzly bears are poached because their body parts are valuable, particularly gall bladders (Unknown 2004). In southwestern British Columbia there have been increasing occurrences of bald eagle poaching for the value of their feathers, but one poacher was only fined $1450 (Keating 2007). In a letter to the editor an outraged citizen called for greater penalties for those caught poaching as a means of deterrence (Foss 2007). This brings up an important point that has not received enough attention in the economics literature: poaching is a criminal activity and poachers make the same economic decisions as other criminals. The focus of this paper, therefore, is to examine the interaction between the economic decision making of poachers and the dynamics of endangered species. The literature regarding endangered species poaching has evolved largely in the context of the African elephant. One of the general goals of this literature has been to understand the impacts of an international trade moratorium on the survival of an endangered species. A common method by which researchers have contributed to the understanding of this subject is to examine the static impact on quantity poached that results from a policy change. For example, Fischer (2004) and Bergstrom (1990) develop static models to analyze policy changes. While such analyses provide valuable insights, a more complete approach would be to assess how policy changes would effect the population dynamics of the species. Under certain circumstances, policies will have ambiguous effects on the quantity of the resource that is poached, but this does not necessarily imply that the impact on the species population will also be ambiguous. It may still be possible to determine how the potential steady states of the species population will change. Two notable examples of work that examines changes in both the amount of poaching that occurs and the steady state resource population are Bulte and Damania (2001) and Kremer and Morcom (2000). Bulte and Damania examine the role of captive breeding in endangered species conservation in the context of imperfect competition. Kremer and Morcom investigate the possible impacts of storage on endangered species equilibria. Both studies use dynamic frameworks and provide results regarding steady state populations to give a complete account of the impact of policy on the vitality of the endangered species.

Details: Victoria, BC: Resource Economics & Policy Analysis Research Group, Department of Economics, University of Victoria, 2008. 29p.

Source: Internet Resource: Accessed April 25, 2018 at: https://web.uvic.ca/~repa/publications/REPA%20working%20papers/WorkingPaper2008-08.pdf

Year: 2008

Country: International

Keywords: Animal Poaching (Econometric Models)

Shelf Number: 117146


Author: Blanchet-Cohen, Natasha

Title: Children, Agency and Violence: In and Beyond the United Nations Study on Violence Against Children

Summary: This paper examines the role of child agency as it relates to child protection. The focus arises from recognition that child protection approaches can be ineffective, and even counterproductive, when local context is not given sufficient attention.

Details: Florence, Italy: UNICEF Innocenti Research Centre, 2009. 54p.

Source: Innocenti Working Paper No. IDP 2009-10

Year: 2009

Country: International

Keywords: Child Protection

Shelf Number: 118321


Author: United Nations Office on Drugs and Crime

Title: Cross-Cutting Issues: Juvenile Justice

Summary: This publication is intended to provide benchmarks to assess compliance of juvenile justice systems with international child-specific instruments.

Details: New York: United Nations, 2006. 42p.

Source: Criminal Justice Assessment Toolkit

Year: 2006

Country: International

Keywords: Juvenile Justice Systems

Shelf Number: 116198


Author: Bliss, Katherine E.

Title: Trafficking in the Mesoamerican Corridor: A Threat to Regional and Human Security

Summary: This report presents a summary of a one-day meeting intended to (1) raise awareness of the relationships among arms trafficking, drug trafficking, human trafficking, and wildlife trafficking in the Mesoamerican region; (2) identify similarities and differences in approaches to the organized movement of diverse illegal products in the region; (3) discuss the challenge and opportunities for promoting cooperation not just among law enforcement agencies but also among advocacy groups, technical agencies, and research entities; and (4) to articulate recommendations for enhanced cooperation in the future.

Details: Washington, DC: Center for Strategic and International Studies, 2009. 20p.

Source: A Report of the CSIS Americas Program

Year: 2009

Country: International

Keywords: Arms Trafficking

Shelf Number: 117625


Author: O'Donnell, Daniel

Title: The Development of Juvenile Justice Systems in Eastern Europe and Central Asia: Lessons from Albania, Azerbaijan, Kazakhstan, Turkey and Ukraine

Summary: This report looks at the experiences in juvenile justice of five countries in Eastern Europe and Central Asia in order to identify "what works" and to draw some lessons learned. The study covers the process of juvenile justice reform, the juvenile justice system, and UNICEF's support to juvenile justice reform and data collection and analysis.

Details: Geneva: UNICEF Regional Office for Central and Eastern Europe/Commonwealth of Independent States, 2009. 56p.

Source:

Year: 2009

Country: International

Keywords: Juvenile Justice Reform

Shelf Number: 117593


Author: International Centre for Migration Policy Development

Title: Guidelines for the Development of a Transnational Referral Mechanism for Trafficked Persons: South-Eastern Europe

Summary: These guidelines aim to be a practical tool for practitioners, in the form of five Standard Operating Procedures, a set of recommendations and practical measures for transnational referral of trafficked persons.

Details: Vienna: ICMPD, 2009. 133p.

Source:

Year: 2009

Country: International

Keywords: 129687

Shelf Number: 117567


Author: Delap, Emily

Title: Begging for Change: Research Findings and Recommendations on Forced Child Begging in Albania/Greece, India and Senegal

Summary: This report explores the issue of forced child begging both in its local specifics and global commonalities. Forced child begging involves forcing boys and girls to beg through physical or psychological coercion. Forced child begging offers an important focus for the struggle for children's rights in that it represents one of the most extreme forms of exploitation of children in the world today. The research shows that children may be forced to beg by their parents or guardians. Others are exploited in this way by third parties, including cases of children trafficked into begging by informal networks or organized criminal gangs.

Details: London: Anti-Slavery International, 2009. 33p.

Source:

Year: 2009

Country: International

Keywords: Begging

Shelf Number: 114862


Author: Coquilhat, Jenny

Title: Community Policing: An International Literature Review

Summary: This literature review discusses international research from the United States, the United Kingdom, Australia and New Zealand in order to identify key elements of, benefits of, and barriers to community policing against which New Zealand projects can be compared.

Details: Wellington, NZ: New Zealand Police, 2008. 52p.

Source:

Year: 2008

Country: International

Keywords: Community Policing

Shelf Number: 117815


Author: Lines, Rick

Title: The Death Penalty for Drug Offences: A Violation of International Human Rights Law

Summary: This report examines the use of capital punishment for drug offences, and considers whether drug crimes meet the threshold of most serious crimes as interpreted under the International Covenant on Civil and Political Rights. It reviews the legislation and practice in retentionist states, and discusses the approach of various human rights bodies to the issue. Finally, it argues that drug-related offences do not constitute most serious crimes, and consequently finds that the execution of drug offenders violates international human rights law.

Details: London: International Harm Reduction Association, 2007. 31p.

Source:

Year: 2007

Country: International

Keywords: Capital Punishment

Shelf Number: 116313


Author: Financial Action Task Force

Title: Vulnerabilities of Casinos and Gaming Sector

Summary: This report considers casinos with a physical presence and discusses related money laundering and terrorist financing methods, vulnerabilities, indicators to aid detection and deterrence, and international information exchange. The report considers vulnerabilities from gaps in domestic implementation of anti-money laundering to combating the financing of terrorism measures.

Details: Paris: FATF, 2009. 77p.

Source:

Year: 2009

Country: International

Keywords: Casinos

Shelf Number: 118343


Author: Werb, Dan

Title: Effect of Drug Law Enforcement on Drug-Related Violence: Evidence from a Scientific Review

Summary: This systematic review evaluated all available English language peer-reviewed research on the impact of law enforcement on drug market violence. The available scientific evidence suggests that increasing the intensity of law enforcement interventions to disrupt drug markets is unlikely to reduce drug gang violence. Instead, the evidence suggests that drug-related violence and high homicide rates are likely a natural consequence of drug prohibition and that increasingly sophisticated and well-resourced methods of disrupting drug distribution networks may unintentionally increase violence. From an evidence-based public policy perspective, gun violence and the enrichment of organized crime networks appear to be natural consequences of drug prohibition. In this context, and since drug prohibition has not achieved its stated goal of reducing drug supply, alternative models for drug control may need to be considered if drug supply and drug-related violence are to be meaningfully reduced.

Details: Vancouver, BC: International Centre for Science in Drug Policy, 2010. 26p.

Source:

Year: 2010

Country: International

Keywords: Drug Enforcement

Shelf Number: 118299


Author: Skaperdas, Stergios

Title: The Costs of Violence

Summary: The cost of violence on development is very high, but measuring this cost has received little attention. More effective measurements of these costs will help ensure that adequate attention is paid by government and civil society to the design and implementation of violence prevention policies and programs. The reviews presented in this publication are designed to contribute to a better understanding of where the international community stands on the debate over how best to measure the costs of violence on economics and societies.

Details: Washington, DC: Social Development Department, World Bank, 2009. 102p.

Source:

Year: 2009

Country: International

Keywords: Costs of Crime

Shelf Number: 118334


Author: Degenhardt, Louisa

Title: Comparing the Drug Situation Across Countries: Problem, Pitfalls and Possibilities

Summary: This briefing compares the drug situation in a number of developed countries presenting data to provide information for analysts and policy makers for more effective drug control.

Details: London: Beckley Foundation, Drug Policy Programme, 2009. 26p.

Source: Briefing Paper Nineteen

Year: 2009

Country: International

Keywords: Drug Abuse and Addition

Shelf Number: 116393


Author: Kangaspunta, Kristiina

Title: Eco-Crime and Justice: Essays on Environmental Crime

Summary: The aim of this publication is to provide a bridge between, on the one hand, eco-crime, pollution, climate change and the deriving social conflicts, and, on the other, the areas of criminal justice, human rights and environmental rights. The authors hope to contribute to the articulation of a global research agenda on environmental crime; a research agenda based on commitment to the following three principles: (1) Recognition of the value of evidence-based policy making; (2) Willingness to appreciate the importance of theoretical insights drawn from different disciplines to guide policy, and (3) Concern with balancing human and ecological rights.

Details: Turin, Italy: UNICRI, 2009. 121p.

Source:

Year: 2009

Country: International

Keywords: Environmental Crime

Shelf Number: 118320


Author: Financial Action Task Force

Title: Money Laundering and Terrorist Financing Vulnerabilities of Commercial Websites and Internet Payment Systems

Summary: Criminals have shown adaptability and opportunism in finding new channels to launder the proceeds of their illegal activities and to finance terrorism. As the Internet becomes more and more a worldwide phenomenon, commercial websites and Internet payment systems are potentially subject to a wide range of risks and vulnerabilities that can be exploited by criminal organizations and terrorist groups. This study analyses money laundering and terrorist financing (ML/TF) risks with commercial websites and Internet payment systems with the focus on mediated customer-to-customer websites as the most vulnerable to abuse because of their popularity, accessibility to the public, and high volume of cross border transactions. The analysis also provides a number of case studies that illustrate how mediated customer-to-customer websites can be exploited for ML/TF purposes.

Details: Paris: FATF, 2008. 39p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Internet Crimes

Shelf Number: 118344


Author: Financial Action Task Force

Title: Money Laundering and Terrorist Financing Through the Real Estate Sector

Summary: The objective of this report is to develop more information on the issue of using the real-estate secotor to launder money and to present a clearer picture of the way that real estate activity can be used for money laundering or terrorist financing. First, it explores the means by which illicit money is channelled through the real-estate sector to be integrated into the legal economy. Second, it identifies some of the control points that could assist in combating this phenomenon.

Details: Brussels, Belgium: FATF, 2007. 41p.

Source: Internet Resource

Year: 2007

Country: International

Keywords: Money Laundering

Shelf Number: 118345


Author: Fox, Sean

Title: The Political Economy of Social Violence: Theory and Evidence from a Cross-Country Study

Summary: Why are some countries more prone to social violence than others? Drawing on theoretical and empirical insights from the fields of political economy, sociology and criminology, the authors develop and empirically test a holistic theory of social violence that accounts for political-institutional, socio-economic and socio-demographic factors. The study finds that hybrid political regimes, political-institutional volatility, poverty, inequality and ethnic diversity are associated with higher rates of social violence. Unexpectedly, higher rates of economic growth are also found to be robustly correlated with higher rates of social violence.

Details: London: Crisis States Research Center, 2010. 24p.

Source: Crisis States Working Papers Series No.2; Working Paper No. 72

Year: 2010

Country: International

Keywords: Economic Development

Shelf Number: 118431


Author: Piquero, Alex R.

Title: Effectiveness of Programs Designed to Improve Self-Control

Summary: Gottfredson and Hirschi's general theory of crime has generated significant controversy and research, such that there now exists a large knowledge base regarding the importance of self-control in regulating antisocial behavior over the life course. Reviews of this literature indicate that self-control is an important correlate of antisocial activity. There has been some research examining programmatic efforts designed to examine the extent to which self-control is malleable, but little empirical research on this issue has been carried out within criminology, largely because the theorists have not paid much attention to policy proscriptions. This study evaluates the extant research on the effectiveness of programs designed to improve self-control up to age 10 among children and adolescents, and assesses the effects of these programs on self-control and delinquency/crime. Meta-analytic results indicate that: (1) self-control programs improve a child/adolescent's self control; (2) these interventions also reduce delinquency; and (3) the positive effects generally hold across a number of different moderator variables and groupings as well as by outcome source (parent-, teacher-, direct observer-, self-, and clinical report). Theoretical and policy implications are also discussed.

Details: Stockholm: Swedish National Council for Crime Prevention, 2009. 44p.

Source:

Year: 2009

Country: International

Keywords: Anti-Social Behavior

Shelf Number: 116628


Author: United Nations Population Fund

Title: Programming to Address Violence Against Women: 8 Case Studies: Volume 2

Summary: This is the second volume in a series that documents best practices in preventing and responding to violence against women. The eight case studies include initiatives from Algeria, Guatemala, Honduras, India, Indonesia, Nepal, Sri Lanka and Zimbabwe.

Details: New York: United Nations Population Fund, 2009. 57p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Abused Women

Shelf Number: 117662


Author: Denning, Rebecca

Title: Serious Violent Crime Investigations: A Systematic Literature Search and Technical Report

Summary: The National Policing and Improvement Agency (NPIA) sought to understand the evidence base in relation to the effective investigation of serious crime to support its knowledge management strategy and National Improvement Strategy for Policing. This report which was prepared for NPIA presents a systematic search of the literature related to this topic, and designs and populates an associated evidence database on a range of topics relating to issue.

Details: Brisbane: ARC Centre of Excellence in Policing and Security, Griffith University, 2009. 165p.

Source: Prepared for the National Policing Improvement Agency

Year: 2009

Country: International

Keywords: Police Investigations

Shelf Number: 117298


Author: Gallahue, Patrick

Title: The Death Penalty for Drug Offences: Global Overview 2010

Summary: This report provides an updated review of the status of the death penalty for drug offenses worldwide, with a particular focus on national legislation and state practice.

Details: London: International Harm Reduction Association, 2010. 51p.

Source:

Year: 2010

Country: International

Keywords: Death Penalty

Shelf Number: 118528


Author: McNeill, Fergus

Title: Culture, Change and Community Justice

Summary: This report reviews the international research on the management of change within community justice organizations. It specifically explores: (1) The nature and character of occupational, professional and organizational cultures in community justice; (2) How such cultures respond to, accommodate and resist change processes; (3) How and why processes of change succeed and fail in criminal justice organizations; and (4) Effective approaches to the management of change in criminal justice. The review of change management is located within a wider analysis of what is known about occupational, professional and organizational cultures within criminal justice and within public sector organizations more generally, and of how practitioners respond to policy changes.

Details: Edinburgh: Scottish Centre for Crime and Justice Research, 2010. 46p.

Source: Report No. 02/2010

Year: 2010

Country: International

Keywords: Change Management

Shelf Number: 118534


Author: Borchgrave, Arnaud de

Title: Conflict, Community, and Criminality in Southeast Asia and Australia: Assessments from the Field

Summary: These essays on Indonesia, Malaysia, Thailand, the Philippines, Singapore, Cambodia, Burma, and Australian have a common thread: terrorism, like politics, is local. Yes, there is a superficial frame, which is shared by local terrorists, but the vicissitudes of violence vary according to local events. Except for training provided a decade earlier to some aspiring terrorists, al Qaeda is notably absent from the various accounts in the present collection. Indeed, the weak links to al Qaeda central, trumpeted in the West more than in Southeast Asia, obscure the local dynamics, showing an upsurge in the threat earlier in this decade and a general decline as time goes on. While the ideology is similar, local social conditions change, and law enforcement agencies learn to deal with their foes. As the essays show, the situation is improving in Indonesia, Malaysia, Singapore, and Australia. The situation is deteriorating in Thailand because violent Islamists wrapped themselves with separatist grievances, while the situation in the Philippines is so embedded in local politics that it is difficult to even analyze it in terms of terrorism.

Details: Washington, DC: Center for Strategic and International Studies, 2009. 87p.

Source: A Report of the CSIS Transnational Threats Project

Year: 2009

Country: International

Keywords: Extremist Groups

Shelf Number: 116190


Author: Harrendorf, Stefan

Title: International Statistics on Crime and Justice

Summary: This objective of this report is to show users of international crime data what they could learn from these, and provide guidance as to restrictions, pitfalls and strengths of the unique set of data that is now available. The report consists of the following eight chapters: homicide; trends in police-recorded crime; drug crime; complex crimes; responses of the criminal justice system; attributes of criminal justice systems - resources, performance and punitivity; trends in world prison population; and crime and criminal justice statistics challenges.

Details: Helsinki: European Institute for Crime Prevention and Control (HEUNI); Vienna: United Nations Office on Drugs and Crime, 2010. 176p.

Source:

Year: 2010

Country: International

Keywords: Criminal Justice Statistics

Shelf Number: 118290


Author: Organisation for Economic Co-operation and Development. Committee on Fiscal Affairs

Title: Report on Abuse of Charities for Money-Laundering and Tax Evasion

Summary: Tax evasion and tax fraud through the abuse of charities is a serious and increasing risk in many countries although its impact is variable. Some countries estimate that the abuse of charities costs their treasury many hundreds of millions of dollars and is becoming more prevalent. This report summarizes the status attached to charities in the countries surveyed and compiles the common methods of the abuse of charities, the sectors at risk and the few attempts so far to quantify those risks.

Details: Paris: Organisation for Economic Co-operation and Development, Centre for Tax Policy and Administration. 2008. 65p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Charities

Shelf Number: 114341


Author: Chambers, Matthew

Title: International Piracy and Armed Robbery at Sea: Hindering Maritime Trade and Water Transportation Around the World

Summary: Acts of piracy and armed robbery at sea have incensed the international community and brought about a sense of cooperation among nations, international law enforcement, and treaty organizations. In turn, this has led to information sharing and joint naval patrols. This report uses statistical data to demonstrate where and in what numbers pirate attacks take place globally.

Details: Washington, DC: U.S. Department of Transportation, Research and Innovative Technology Administration, 2010. 4p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Armed Robbery

Shelf Number: 118409


Author: Travers, Kathryn

Title: Women's Safety: A Shared Global Concern -- Compendium of Practice and Policies

Summary: This report presents a global compendium of practices on a municipal, non-governmental, and national level in the field of women's safety. It includes 69 examples from 32 countries, and is divided into four sections: municipal strategies, non-governmental initiatives, national government strategies and policies, and tools and resources.

Details: Montreal: International Centre for the Prevention of Crime, 2008. 164p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Abused Women

Shelf Number: 113418


Author: Hindin, Michelle J.

Title: Intimate Partner Violence among Couples in 10 DHS Countries: Predictors and Health Outcomes

Summary: This report analyzes data from 10 recent Demographic and Health Surveys (DHS): Bangladesh (2004), Bolivia (2003/2004), the Dominican Republic (2002), Haiti (2005), Kenya (2003), Malawi (2004), Moldova (2005), Rwanda (2005), Zambia (2001/2002), and Zimbabwe (2005/2006). The first part of the report provides prevalence estimates of violence experienced by women within couples who were in marital or cohabiting partnerships at the time of the DHS survey. Next, the report uses characteristics of both women and their husbands/cohabiting partners and characteristics of their relationship, household, and community to evaluate which currently partnered women are most at risk. The final part of the report looks at health outcomes potentially related to women's experience of intimate partner violence. The report focuses on currently married or cohabiting women age 20-44. In addition, the correlates of violence analysis is restricted to couples in which both partners were interviewed; this restriction does not, however, apply to the section on the analysis of health outcomes.

Details: Calberton, MD: Macro International Inc., 2008. 78p.

Source: Internet Resource; DHS Analytical Studies No. 18

Year: 2008

Country: International

Keywords: Domestic Violence

Shelf Number: 113243


Author: Dottridge, Mike

Title: In Pursuit of Good Practice in Responses to Child Trafficking: Experiences from Latin America, Southeast Europe and Southeast Asia

Summary: Based on a set of seven criteria, this report assesses what constitutes 'good practice' in the context of a wide array of efforts to prevent child trafficking. These efforts range from the collection of evidence about patterns of human trafficking; the provision of information and advice to children, parents and communities; the development of local networks to protect children; activities to influence the media; activities to improve minimum standards to protect and assist child victims of trafficking; and the promotion of alliances to bring about change.

Details: Geneva: Terre des Hommes International Federation; The Hague: Stichting Terre des Hommes Netherlands, 2010. 52p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Child Protection

Shelf Number: 118586


Author: Leeson, Peter T.

Title: Pirational Choice: The Economics of Infamous Pirate Practices

Summary: This paper investigates the profit-maximizing strategies of violent criminal organizations by examining the economics of infamous pirate practices. The paper explores three practices pirates used to reduce tne costs and enhance the revenues of their criminal enterprise. First, the paper examines the priate flag, the Jolly Roger, which pirates used to signal their identity as unconstrained outlaws, enabling them to take prizes without costly conflict. Second, the article considers how pirates combine heinous torture, public displays of madness, and published advertisement of their fiendishness to establish a fearsome reputation and piratical brand name that prevented costly captive behaviors. Third, the article analyzes how pirates used artificial impressment to mitigate the increased risk of pirating in the 18th century as a result of English legal innovations. The unique context in which pirates sought profits, not a difference in pirate rationality, explains pirates' eccentric and often bizarre behavior. Pirates' infamous practices improved their efficiencey "on the account" enhancing their criminal enterprise's profitability.

Details: Fairfax, VA: Department of Economics, George Mason University, 2009(?). 40p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Criminal Behavior

Shelf Number: 113551


Author: Kego, Walter

Title: Counteracting Transnational Organized Crime: Challenges and Countermeasures

Summary: According to the United Nations Office on Drugs and Crime, transnational organized crime is one of the major threats to human security, impeding the social, economic, political and cultural development of societies worldwide, and involved in trafficking in human beings, drugs and firearms, money laundering, etc. This report outlines the origins of transnational organized crime, describes how it manifests itself and identifies possible threats against societies. Money laundering is dealt with in some detail since it facilitates transnational crime activities and their expansion into the legal economy. The challenges posed by financial crime are identified and guidelines for its prevention are outlined. The EU strategy against transnational organized crimes is an example of how the common European model of crime prevention can be implemented elsewhere.

Details: Stockholm, Sweden: Institute for Security and Development Policy, 2010. 30p.

Source: Internet Resource; Stockholm Paper Series

Year: 2010

Country: International

Keywords: Drug Trafficking

Shelf Number: 118591


Author: Cunningham, Wendy

Title: Supporting Youth at Risk: A Policy Toolkit for Middle Income Countries

Summary: Youth at risk can be defined as individuals between the ages of 12 and 24 who face environmental, social, and family conditions that hinder their personal development and their successful integration into society as productive citizens. This toolkit was developed in response to a growing demand from its government clients and partners for advice on how to create and implement effective policies for at-risk youth. Highlighted are 22 policies (six core policies, nine promising policies, and seven general policies) that have been effective in addressing the following five key risk areas for young people around the world: 1) youth unemployment, underemployment, and lack of formal sector employments; 2) early school leaving; 3) risky sexual behavior leading to early childbearing and HIV/AIDS; 4) crime and violence; and 5) substance abuse.

Details: Washington, DC: The International Bank for Reconstruction and Development - The World Bank, 2008. 134p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: At-risk Youth

Shelf Number: 118620


Author: Diprose, Rachael

Title: Safety and Security: A Proposal for Internationally Comparable Indicators of Violence

Summary: One of the challenges for academics, policy makers, and practitioners working broadly in programs aimed at poverty alleviation, including violence prevention, is the lack of reliable and comparable data on the incidence and nature of violence. This paper proposes a household survey module for a multi-dimensional poverty questionnaire which can be used to complement the available data on the incidence of violence against property and the person, as well as perceptions of security and safety. Violence and poverty are inextricably linked, although the direction of causality is contested if not circular. The module uses standardized definitions which are clear and can be translated cross-culturally and a clear disaggregation of different types of interpersonal violence (not including self-harm) which bridges the crime-conflict nexus.

Details: Oxford, UK: Centre for Research on Inequality, Human Security and Ethnicity (CRISE), University of Oxford, 2008. 61p.

Source: CRISE Working Paper No. 52; Internet Resource

Year: 2008

Country: International

Keywords: Criminal Statistics

Shelf Number: 118575


Author: Robinson, Neil

Title: Security, At What Cost? Quantifying People's Trade-Offs Across Liberty, Privacy and Security

Summary: To understand the real privacy, liberty, and security trade-offs individuals are willing to make, and so policy makers can be beter informed about citizen's true preferences in this domain, this study surveyed British citizens on the issues of privacy and security for three activities: applying for a passport, traveling on the national rail network, and attending a major public event such as the opening ceremony of the Olympics. Data from the survey was analysed and individuals were found to be willing to pay for advanced CCTV cameras with facial recognition technology, X-Ray machines and body scanners and various forms of security personnel.

Details: Santa Monica, CA: RAND, 2010. 99p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 118730


Author: Jacobson, Michael

Title: Terrorist Dropouts: Learning from Those Who Have Left

Summary: There is a growing recognition that capturing or killing every terrorist is not a realistic strategy and that we need to spend more time exploring the radicalization process - what motivates people to become extremists in the first place. Despite this, little study has been undertaken of the "flip side" - those who decide to leave terrorist and extremist organizations. This report is based on approximately twenty-five interviews with those who have left terrorist and extremist organizations. An analysis of the interviews reveals that individual dropout cases clearly show that no single overarching reason explains why individuals leave terrorist or extremist groups, just as no single reason leads to their radicalization in the first instance. Nonetheless, several patterns emerge that should give policymakers cause for optimism. First, it is clear that many of those who have left terrorist and extremist organizations have done so without being harmed or even threatened. And second, these organizations are often hid hard when leadership defections take place.

Details: Washington, DC: Washington Institute for Near East Policy, 2010. 34p.

Source: Internet Resource; Policy Focus #101

Year: 2010

Country: International

Keywords: Extremist Groups

Shelf Number: 117701


Author: United Nations Office on Drugs and Crime

Title: Manual on Victimization Surveys

Summary: This manual is the first attempt to develop methodological guidelines at the international level for the design of victimization surveys. The manual provides a comprehensive source of information for developing national victimization surveys and will be particularly useful for those countries who may be embarking on a survey of this type for the first time. The ultimate goal of the manual is to improve the comparability of victimization survey results. The manual provides a minimum dataset of suggested key topics for inclusion in national crime victimization surveys that will further facilitate international comparability of crime survey results.

Details: Geneva: United Nations, 2010. 219p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Crime Statistics

Shelf Number: 118688


Author: United Nations Office on Drugs and Crime

Title: Handbook on Effective Police Responses to Violence Against Women

Summary: Volence against women is a global issue of pandemic proportions, which has an impact on all societies. Violent practices against women take many different forms, which vary from country to country according to cultural, social and religious contexts and between different regions within countries. Equally, women do not form a homogenous group. Differences in ethnicity, social status, religion and age mean that women experience similar acts of violence differently. In particular, some groups of women are more vulnerable to violence and therefore require special treatment and support services. Police have long been under criticism for not doing enough to protect women from violence and for an often apathetic attitude towards the problem. This handbook is designed to assist police officers by familiarizing them with relevant international laws, norms and standards relating to violence against women and informing them about some promising practical approaches to effective police response to acts of violence against women.

Details: New York: United Nations, 2010. 97p.

Source: Internet Resource; Criminal Justice Handbook Series

Year: 2010

Country: International

Keywords: Abused Women

Shelf Number: 118808


Author: Bichou, Khalid

Title: Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis

Summary: The primary aim of maritime security assessment models is to assess the level of security within and across the maritime network. When managing risk through legislation, regulatory assessment models are used to assess risk levels and examine the impact of policy options, usually in terms of the costs and benefits of a regulatory proposal. This paper reviews the development, application and adequacy of existing risk assessment and management models to maritime and port security. In particular, it examines the problematical issues of security perception, value and impact, and discusses the limitations of the current regulatory framework in providing an integrated and effective approach to risk assessment and managment, including for supply chain security.

Details: Paris: Organisation for Economic Co-Operation and Development, International Transport Forum, 2008. 38p.

Source: Internet Resource; Discussion Paper No. 2008-20

Year: 2008

Country: International

Keywords: Harbors, Security Measures

Shelf Number: 118796


Author: European Conference of Ministers of Transport

Title: Container Transport Security Across Modes

Summary: Transport authorities face a number of crime and security challenges relating to the systems under their jurisdiction. These include theft of goods and vehicles, attacks on truck drivers, illegal immigration, transport of dangerous goods and drug and contraband smuggling. In addition to these crime-related challenges, authorities must remain vigilant to possible terrorist use or targeting of transport vehicles and infrastructure. Among these multiple threats, however, one in particular has consistently been cited as being extremely important and requiring a co-ordinated international response - this threat is the possible misuse by terrorists of the maritime shipping container transport system. This report aims to describe the complex, hybrid system through which containers pass - from the time the container is packed, via loading and unloading at intermodal terminals and on maritime vessels, to the time it is delivered to the consignee. It attempts to provide transport authorities and their constituencies with a comprehensive examination of container security, identifying the key actors involved in and issues related to mitigating the threat of terrorism using containerized cargo, and assessing where vulnerabilities lie along the supply chain.

Details: Paris: Organisation for Economic Co-operation and Development, 2005. 127p.

Source:

Year: 2005

Country: International

Keywords: Container Ships, Security Measures

Shelf Number: 118815


Author: Kelly, Liz

Title: Violence Against Women: A Briefing Document on International Issues and Responses

Summary: This briefing document is intended as an introduction to the topic of violence against women, an issue of increasing global concern. It summarizes: the international context; definitions and main concepts; what we know about the scale of violence against women internationally; the connections to development; the impact on women's lives; and four stages of response. Case studies from around the world are used as illustrations throughout.

Details: Manchester, UK: British Council, 2008. 43p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Battered Women

Shelf Number: 118666


Author: Beaulieu, Catherine

Title: Strengthening Laws Addressing Child Sexual Exploitation: A Practical Guide

Summary: This guide was developed for international and non-governmental organizations, government institutions, professionals and all those working to end the sexual exploitation of children. Its purpose is three-fold: 1) to serve as a practical tool in the assessment of national child protection frameworks; 2) to inform the process of harmonizing and strengthening legislation; and 30 to support advocacy for legal reform to better protect children.

Details: Bangkok, Thailand: ECPAT International, 2008. 145p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Child Maltreatment

Shelf Number: 118828


Author: Global Witness

Title: For a Few Dollars More: How al Qaeda Moved Into the Diamond Trade

Summary: This report examines whether the terrorist group, al Qaeda, has used, and is continuing to use, rough diamonds. The report presents evidence that confirms that al Qaeda have been involved in the rough diamond trade since the 1990s. First in Kenya and Tanzania and then in Sierra Leone and Liberia, where they began to show an interest in diamond trading in 1998, following the crackdown on their financial activities in the wake of the U.S. embassy bombings in Kenya and Tanzania. The report argues that there are several reasons why al Qaeda has used rough diamonds: 1) As a means of raising funds for al Qaeda cells; 2) To hide money targeted by financial sanctions; 3) To launder the profits of criminal activity; and 4) To convert cash into a commodity that holds its value and is easily transportable.

Details: London: Global Witness, 2003. 95p.

Source: Internet Resource

Year: 2003

Country: International

Keywords: al Qaeda

Shelf Number: 118825


Author: Jones, Adele D.

Title: Child Sexual Abuse in the Eastern Caribbean: The Report of a Study Carried Out Across the Eastern Caribbean During the Period October 2008 to June 2009.

Summary: Although there is extensive international research, few empirical studies of child sexual abuse have been carried out in the Caribbean and there are no reliable data on the prevalence of child sexual abuse, or indeed on attitudes and perceptions of abuse across the region. This study, which was commissioned by the UNICEF Office for Barbados and the Eastern Caribbean in a joint programming initiative with UNIFEM, aimed at investigating perceptions of child sexual abuse; exploring attitudes towards the perceptrators of child sexual exploitation; and garnering opinions on the forms of action that might make a difference.

Details: Huddersfield, UK: Centre for Applied Childhood Studies; London: Action for Children, 2010. 300p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Child Maltreatment

Shelf Number: 118755


Author: Robertson, Robyn D.

Title: Alcohol Interlocks: Planning for Success. Proceedings of the 9th International Alcohol Interlock Symposium

Summary: This report presents the findings from a symposium which addressed the issue of alcohol interlock systems. The symposium and the subsequents from it are designed to assist jurisdictions that have implemented, that are implementing or that are considering implementing alcohol interlocks to plan for success by sharing with them how to build and develop the essential ingredients of a successful interlock strategy. The information in this report summarizes what is currently known in the field, what issues or challenges still need to be addressed, and what current thinking is regarding potential ways these issues can be resolved.

Details: Ottawa: Traffic Injury Research Foundation, 2009. 64p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Alcohol Abuse

Shelf Number: 119110


Author: Milliken, T.

Title: The Elephant Trade Information System (ETIS) and the Illicit Trade in Ivory

Summary: The illicit trade in ivory, which has been increasing in volume since 2004, moved sharply upward in 2009, according to the latest analysis of seizure data in the Elephant Trade Information System. The analysis was based upon 14,364 elephant product seizure records from 85 countries or territories since 1989, nearly 2,000 more records than the previous analysis, in 2007. The remarkable surge in 2009 reflects a series of large-scale seizure events that suggest an increased involvement or organized crime syndicates in the trade, connecting African source countries with Asian end-use markets.

Details: Harare, Zimbabwe: TRAFFIC East and Southern Africa, 2009. 40p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Illegal Trade (Ivory)

Shelf Number: 117396


Author: Prenzler, Tim

Title: Preventing Burglary in Commercial and Institutional Settings: A Place Management and Partnerships Approach

Summary: This report examines how to assess, manage, and respond to burglaries that occur at commercial and industrial sites. It looks at the context in which burglaries occur, and includes a consideration of the burglar's approach. It also examines a range of solutions, which aim to make it more difficult for would be offenders particularly in the workplace, and shows where security managers can have an impact.

Details: Alexandria, VA: ASIS Foundation, 2009. 31p.

Source: Internet Resource; CRISP Report

Year: 2009

Country: International

Keywords: Burglary

Shelf Number: 118369


Author: Brynjar, Lia

Title: Causes of Terrorism: An Expanded and Updated Review of the Literature

Summary: This report presents a critical survey of the academic literature on the causes of terrorism. The study focuses primarily on theories that seek to explain why some societies are more exposed to terrorism than others, i.e. theories on a national or societal level of analysis. It also examines theoretical frameworks for explaining terrorism on an international or world system level of analysis. The report underscores the importance of understanding terrorism in its political and societal contexts. By identifying the socio-economic conditions, political regime factors and international system characteristics that are more likely to generate high levels of terrorism, the study also provides useful tools for trend analysis and forecasting.

Details: Kjeller, Normay: Norwegian Defence Research Establishment, 2005. 82p.

Source: Internet Resource; FFI/RAPPORT-2004/04307

Year: 2005

Country: International

Keywords: Terrorism

Shelf Number: 119182


Author: Youngers, Coletta A.

Title: Development First: A More Humane and Promising Approach to Reducing Cultivation of Crops for Illicit Markets

Summary: This report lays out a more promising approach to reducing the cultivation of coca and poppy crops used in the production of cocaine and heroin. It is based on improving the welfare of poor farmers via comprehensive development strategies that include improving local governance and citizen security, combined with voluntary reductions in cultivation of crops deviated to the illicit market. Implemented in tandem with effective demand reduction strategies to contain and eventually shrink the global cocaine and heroin markets, the "development first" approach has the potential to gradually achieve sustainable reductions in coca and opium poppy cultivation by reducing poor farmers' reliance on such crops.

Details: Washington, DC: Washington Office on Latin America, 2009. 39p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Cocaine

Shelf Number: 119214


Author: Gartenstein-Ross, Daveed

Title: Terrorism in the West 2008: A Guide to Terrorism Events and Landmark Cases

Summary: This report describes that state of terrorism in Western countries over the course of 2008. It includes the following: 1) a comprehensive look at terrorism events in the West, including attacks, failed plots, and arrests; 2) a discussion of landmark terrorism prosecutions; 3) an assessment of broad trends in terrorist activity over the course of the year; and 4) expert commentary from Jeff Breinholt, Douglas Farah, Rohan Gunaratna, Andrew C. McCarthy, and Reuven Paz.

Details: Washington, DC: Foundation for Defense of Democracies, 2009. 105p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Terrorism

Shelf Number: 119218


Author: Elleman, Bruce A.

Title: Piracy and Maritime Crime: Historical and Modern Case Studies

Summary: This monograph is an academic and comparative examination of twelve selected case studies from maritime history used to illuminate a range of concepts and uses of piracy suppression. The twelve case studies provide the basis for the conclusions, an approach that provides a more thorough understanding of the uses and limitations of naval antipiracy operations in the context of new maritime technologies and within a wider range of modern national policy goals than might otherwise be achievable. Above all, this collection provides a sound basis for comparative analysis of varying historical experiences that can stimulate new and original thinking about a basic but often overlooked naval duty.

Details: Newport, RI: Naval War College Press, 2010. 272p.

Source: Internet Resource; Naval War College, Newport Papers No.35

Year: 2010

Country: International

Keywords: Maritime Crime

Shelf Number: 119219


Author: McNeill, Fergus

Title: Changing Lives? Desistance Research and Offender Management

Summary: This report provides a literature review on desistance from crime which explores the purposes of offender management; understanding and supporting desistance; desistance and the process of offender management; desistance and compliance with offender management; and, desistance and the credibility of offender management.

Details: Edinburgh: Scottish Centre for Crime & Justice Research, 2010. 77p.

Source: Internet Resource; Report No.03/2010

Year: 2010

Country: International

Keywords: Desistance from Crime

Shelf Number: 118820


Author: United Nations Office on Drugs and Crime

Title: Combating Trafficking in Persons in Accordance with the Principles of Islamic Law

Summary: Given that the legal traditions and legal systems in many Muslim countries rely primarily on Islamic law, a study of Islamic legal provisions and traditions relating to trafficking in persons becomes important. An understanding of Islam's position on trafficking in persons and related acts and elements can provide important avenues for the development of a comprehensive approach to combating trafficking in persons in Muslim countries, one which draws on and is grounded in Islamic tradition, as well as in compliance with international law. The purpose of this publication is thus to analyse the Islamic legal tradition from the perspective of those sources, principles and provisions that may best be utilized in understanding, addressing and combating trafficking in persons.

Details: Vienna: UNODC, 2010. 62p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 119206


Author: United Nations Office on Drugs and Crime

Title: Migrant Smuggling by Air

Summary: This report presents the findings from an UNODC Expert Group Meeting in Vienna on 7 to 9 December 2009 aimed at increasing understanding of migrant smuggling by air, with the objective of better preventing and combating the phenomena. The Expert Group Meeting specifically aimed to gain a better understanding of: 1) the modus operandi of migrant smugglers who use air routes to commit their crimes; 2) good practice of law enforcement and other actors involved in responding to this problem; 3) what the gaps in knowledge of and response to this particular method of migrant smuggling are; and 4) how UNODC and other international actors can better assist states in strengthening capacities to prevent and combat the smuggling of migrants by air.

Details: Vienna: UNODC, 2010. 21p.

Source: Internet Resource; Issue Paper

Year: 2010

Country: International

Keywords: Human Smuggling

Shelf Number: 119248


Author: World Bank

Title: Stolen Asset Recovery (STAR) Initiative: Challenges, Opportunities, and Action Plan

Summary: The theft of public assets from developing countries is a huge and serious problem. While the traditional focus of the international development community has been on addressing corruption and weak governance within developing countries themselves, this approach ignores the other side of the equation: stolen assets are often hidden in the financial center of developed countries; bribes to public officials from developing countries often originate from multinational corporations; and the intermediary services provided by lawyers, accountants, and company formation agents, which could be used to launder or hide the proceeds of asset theft by developing country rulers, are often located in developed country financial centers. The STAR Initiative is an integral part of the World Bank Group's strategy which recognizes the need to help developing countries recover stolen assets. This action plan presented in this report responds to feedback received from consultations with developed and developing countries, as well as lessons from the experience of Nigeria, Peru, and the Philippines.

Details: Washington, DC: The World Bank; Vienna: United Nations Office on Drugs and Crime, 2007. 48p.

Source: Internet Resource

Year: 2007

Country: International

Keywords: Bribery

Shelf Number: 119268


Author: Europol

Title: OCTA 2009: EU Organised Crime Threat Assessment

Summary: The 2009 OCTA assesses the threat of organized crime in the EU through the analysis of the organized groups, of the criminal markets, and of their interaction within and without territorial entities denominated as criminal hubs. Through this approach it finds that the most significant criminal sectors are drug trafficking, trafficking in human beings, illegal immigration, fraud, counterfeiting and money laundering.

Details: The Hague: European Police Office, 2009. 64p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Counterfeiting

Shelf Number: 119244


Author: Reuter, Peter H.

Title: Assessing Changes in Global Drug Problems, 1998-2007: Main Report

Summary: This report provides key findings of the RAND Europe study which assesses how the global market for illicit drugs has developed from 1998 to 2007 and describes worldwide drug policies implemented during that period to address the problem. The study assesses the impact of policy measures, both at the national and sub-national levels, on the illicit drugs problem. To the extent data allows, the project assessed how much policy measures, at the national and sub-national levels, have influenced drug problems. The analysis is focused on policy relevant matters but it does not attempt to make recommendations to governments. The evidence suggests that illicit drugs presented as much of a problem in 2007 as in 1998. Broadly speaking, while the situation may have improved slightly in some of the world's richer countries, it has substantially worsened in others, which include a few large developing or transitional countries.

Details: Santa Monica, CA: RAND, 2009. 68p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Drug Control

Shelf Number: 117653


Author: Csaky, Corinna

Title: No One to Turn To: The Under-Reporting of Child Sexual Exploitation and Abuse by Aid Workers and Peacekeepers

Summary: This report focuses on ways to improve the international community's response to the sexual exploitation nd abuse of children by aid workers, peacekeepers and others acting on their behalf in emergencies. The report draws particular attention to the problem of the under-reporting of such abuse and addresses a range of related issues.

Details: London: Save the Children, 2008. 28p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Child Abuse

Shelf Number: 114313


Author: Lines, Rick

Title: Complicity or Abolition? The Death Penalty and International Support For Drug Enforcement

Summary: This report exposes the links between the carrying out of executions and the financial contributions from European governments, the European Commission and the UNODC to support drug enforcement operations in countries that use the death penalty such as China, Iran and Viet Nam. The report notes that such operations continue to be funded without appropriate safeguards despite the fact that the abolition of the death penalty is a requirement of entry into the Council of Europe and the European Union and that the United Nations advocates strongly against capital punishment.

Details: London: International Harm Reduction Association, 2010. 35p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Capital Punishment

Shelf Number: 119294


Author: Hastle, Jo

Title: Back in Business: Elephant Poaching and the Ivory Black Markets of Asia

Summary: This report presents a catalogue of ivory seizures during calendar year 2002. Sections of the report include: The Singapore Seizure; China's Emerging Ivory Market; The Impact on Elephant Populations; Illegal Ivory on the Move; and Conclusions and Recommendations.

Details: Washington, DC: Environmental Investigation Agency, 2002. 25p.

Source: Internet Resource

Year: 2002

Country: International

Keywords: Elephant Poaching

Shelf Number: 118754


Author: National Research Council

Title: Approaches to Reducing the Use of Forced or Child Labor

Summary: In response to provisions of the Trafficking Victims Protection and Reauthorization Act, the U.S. Department of Labor's Bureau of International Labor Affairs contracted with the National Research Council to organize a two-day workshop on a framework for assessing practices designed to reduce the use of child and forced labor in supply chains that produce goods imported into the United States. This report presents a summary of the workshop.

Details: Washington, DC: The National Academies Press, 2009. 131p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Child Labor

Shelf Number: 117600


Author: Jones, Nicola

Title: Painful Lessons: The Politics of Prevention Sexual Violence and Bullying at School

Summary: This paper seeks to identify policies, programmes and legal instruments that address school violence in the developing world and to draw implications for policy, practice and research.

Details: London; Overseas Development Institute; Woking, UK: Plan International, 2008. 81p.

Source: Internet Resource; Working Paper 295

Year: 2008

Country: International

Keywords: Bullying

Shelf Number: 114751


Author: Shaw, Margaret

Title: Strategies and Best Practices in Crime Prevention in Particular in Relation to Urban Areas and Youth at Risk. Proceedings of the Workshop held at the 11th UN Congress on Crime Prevention and Criminal Justice

Summary: This report presents the proceedings of a UN workshop that focused on strategies, practices, and lessons for urban areas, as well as strategies, practices, and lessons for youth at risk.

Details: Montreal: International Centre for the Prevention of Crime, 2007. 184p.

Source: Internet Resource

Year: 2007

Country: International

Keywords: Crime Prevention

Shelf Number: 113419


Author: Reuter, Peter H.

Title: Assessing the Operation of the Global Drug Market

Summary: Illicit drugs, predominantly cocaine and heroin, now generate a substantial international and domestic trade. For these two drugs, production is concentrated in poor nations and the bulk of revenues, though not of consumption, is generated by users in wealthy countries. Earnings have an odd shape; most of the money goes to a very large number of low level retailers in wealthy countries while the fortunes are made by a small number of entrepreneurs, many of whom come from the producing countries. Actual producers and refiners receive one or two percent of the total; almost all the rest is payment for distribution labour. The industry is in general competitive, though some sectors in some countries have small numbers of competing organizations. While it is not difficult to explain why cocaine and heroin production occurs primarily in poor countries and only a little harder to understand why the accounting profits are downstream, almost everything else about the trade presents a challenge, both descriptively and analytically. This report is an attempt to address these challenges and reviews what is known about the operation of these various markets. It offers a theoretical account for a number of the features.

Details: Santa Monica, CA: RAND, 2009. 31p.

Source: Internet Resource; Report 1

Year: 2009

Country: International

Keywords: Cocaine

Shelf Number: 117654


Author: Antarctic and Southern Ocean Coalition

Title: Illegal Toothfish Trade: Introducing Illegal Catches into the Markets

Summary: Toothfish poaching has rapidly risen to become one of the most lucrative, illegal fishing businesses globally. For example, the 85 ton toothfish catch of the Viarsa 1 alone was worth as much as US$ 1 million (US$ 1.7 million as a retail product). Due to the high price that toothfish can reach at the docks, this fish has been called “white gold†by illegal fishermen. Illegal operators have been successful in exploiting loopholes in the set of measures developed by the Commission for the Conservation of Antarctic Marine Living Resources (CCAMLR) to control illegal fishing and trade in toothfish. In some cases, poachers even launder their illegal catch through the use of the Catch Documentation Scheme (CDS), the certification system designed to track the trade in toothfish and to ensure that shipments of toothfish brought to market are legally caught. This paper summarizes the main results of a research study conducted by the National Environmental Trust (NET) in the United States aimed at evaluating the magnitude of illegal Patagonian and Antarctic toothfish currently being imported into that country. The detailed findings of this study have been published in the report “Black Market for White Gold: the Illegal trade in Chilean Sea Bassâ€. The report describes a number of tactics that are used by illegal operators to smuggle their fish into the market, which are summarized in this paper. Taking into account that the United States is one of the main import markets of toothfish and that its government has been in the forefront of developing trade measures to prevent illegal toothfish to access the market, ASOC believes that the loopholes identified here are relevant for all global trade in toothfish. Indeed, the authors of the NET report concluded that it is likely that the patterns of trade that allow “illegal, unreported, and unregulated†(IUU) toothfish into the United States are similar in all countries that import this fish.

Details: Washington, DC: ASOC, 2004. 16p.

Source: Internet Resource

Year: 2004

Country: International

Keywords: Illegal Fishing

Shelf Number: 119243


Author: Pacula, Rosalie Liccardo

Title: Issues in Estimating the Economic Cost of Drug Abuse in Consuming Nations

Summary: This report considers the current feasibility of constructing an estimate of the global cost of drug use. While national estimates exist for seven developed countries, most countries have yet to construct a comprehensive estimate. Furthermore, it is impossible to compare the existing national estimates because of differences in the construction, which may reflect varying political and social environments that influence the nature of use and its related harms. The report lays out a conceptual framework for initiating the construction of country-specific estimates in a fashion that would facilitate cross-national comparisons. It demonstrates the difficulty in trying to implement this framework using existing data, as current data available in the various countries suffer from inconsistencies in definitions, coverage, and measurement. The pitfalls and assumptions necessary to construct a comparable estimate using existing data, therefore, are quite significant. The report concludes that it is not possible at this time to develop a meaningful comparative estimate of the cost of drug use across countries. However, it points out that steps could be taken to improve the consistency of measurement in many of the indicators in future years through coordinated international efforts, not unlike that currently being undertaken by the EMCDDA for the European Community.

Details: Santa Monica, CA: RAND, 2009. 47p.

Source: Internet Resource; Report 3

Year: 2009

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 117656


Author: World Health Organization

Title: A Global Response to Elder Abuse and Neglect: Building Primary Health Care Capacity to Deal with the Problem Worldwide

Summary: Until very recently, elder abuse was a social problem hidden from public view and mostly regarded as a private matter. Evidence is accumulating, however, to indicate that elder abuse, which includes the pervasive issue of neglect, is an important public health and societal problem that manifests itself in both developing and developed countries. From a health and social perspective, unless the primary health care and social services sectors are well equipped to identify and deal with the problem, elder abuse will continue to be underdiagnosed and overlooked. This study was conducted in order to develop a strategy to prevent elder abuse within the primary health care context. The study consisted of a qualitative research project in eight participating countries focused on testing questions originally devised by researchers in Montreal. These questions were aimed at raising awareness among health professionals of the issue of elder abuse.

Details: Geneva: WHO, 2008. 134p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Elder Abuse and Neglect

Shelf Number: 114624


Author: United Nations Office on Drugs and Crime

Title: Digest of Terrorist Cases

Summary: The handbook is a compilation of legal experiences relating to actual terrorist cases gained by high-ranking experts from several countries who have gathered at meetings organized by UNODC in Austria, Colombia and Italy. The experts share their experiences in dealing with terrorism cases, reflect on their positive and negative judicial experiences, and explain specific investigative and prosecutorial techniques used in these cases.

Details: New York: UNODC, 2010. 129p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Terrorism

Shelf Number: 118731


Author: Kego, Walter

Title: Internationally Organized Crime: The Escalation of Crime within the Global Economy

Summary: International organized crime is growing in significance, not just in some countries, but on a worldwide scale with an increasing number of people affected. The trade in narcotics is the principal source of revenue for international criminal organizations. The countries for production, transit, and consumption are all integrated in complex networks, which are characterized by economic gain, violence, and corruption. Nation-states and boundaries are not much of an obstacle in thwarting these criminal networks. Moreover, the criminal organizations are apt at altering their structure to make themselves more flexible and consequently more difficult to penetrate by law enforcement agencies.

Details: Stockholm: Institute for Security and Development Policy, 2009. 17p.

Source: Internet Resource; Policy Paper

Year: 2009

Country: International

Keywords: Criminal Organizations

Shelf Number: 118775


Author: Duvvury, Nata

Title: Intimate Partner Violence: High Costs fo Households and Communities

Summary: This report presents the findings of a three-country study in Bangladesh, Morocco and Uganda to estimate the economic costs of intimate partner violence at the household and community levels, where its impact is most direct and immediate. The focus on intimate partner violence was motivated by the fact that this is the most common form of violence against women. A household and community level analysis helps to shed light on intimate partner violence's relationship to both household economic vulnerability and the extent to which scarce public resources for essential health, security and infrastructure services are diverted due to such violence.

Details: Washington, DC: International Center for Research on Women, 2009. 12p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Costs of Crime

Shelf Number: 119362


Author: Washington Office of Latin America

Title: The Captive State: Organized Crime and Human Rights in Latin America

Summary: Throughout Latin America, organized crime is a serious and growing problem. Clandestine power groups are in part responsible for the surge in crime rates and, in some countries, have accumulated vast influence over government institutions. This report proposes a new perspective on organized crime in Latin America. Instead of merely a law enforcement issue, organized crime has become in some countries a fundamental threat to democracy, the rule of law and human rights. Illicit structures can permeate the state so thoroughly that it ceases to represent the interests of citizens and instead represents the interests of criminal enterprises. Taking Guatemala, El Salvador, Colombia and Peru as case studies, the report offers a review of their experiences grappling with organized crime and ends with policy recommendations for governments, civil society groups and the international community.

Details: Washington, DC: WOLA, 2007. 27p.

Source: Internet Resource; WOLA Special Report

Year: 2007

Country: International

Keywords: Human Rights (Latin America)

Shelf Number: 119365


Author: International Drug Policy Consortium

Title: The Illicit Drug Market and Its Possible Regulation: Act Upon the Market to Fight the Illicit Drug Industry

Summary: Today the social costs associated with the consumption of drugs are mainly borne by the family of the user. The four-pillar policy (prevention, law enforcement, treatment and harm reduction) is not sufficient without a retraining and reintegration of the drug user into productive activity, this being effectively the fifth pillar on which a more proactive policy to contrast struggle against the illegal trade of drugs can be built. For a policy oriented towards rehabilitation, we need a small shift of funding from the justice system - made possible by a reduction in imprisonment for the drug user - to rehabilitation and employment programmes. The other components of this policy include: more aid to families; decriminalization of possession for personal consumption; alternatives to prison for problematic drug users, even if they commit petty crimes; establishing a revolving solidarity fund for social enterprises and the formulation of an anti-discriminatory law aimed towards the reintegration of problematic drug users, similar to those that which protects people with disabilities.

Details: London: IDPC, 2010. 97p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Alternative to Incarceration

Shelf Number: 119370


Author: Agnew, David

Title: The Global Extent of Illegal Fishing

Summary: Illegal, unreported and unregulated (IUU) fishing has now been recognised as a global problem, and many groups have developed proposals and plans for addressing IUU fishing. In order to clearly understand the impact of these initiatives we need to have a good understanding of current and historical levels of illegal fishing on a global and regional scale. Although a number of studies of illegal fishing have been undertaken previously, this report presents the first detailed quantitative analysis of the problem on a global scale. Estimates of illegal fishing from different Exclusive Economic Zones (EEZs) and unregulated and unreported fishing high seas regions were collected through an IUU monitoring network (commissioned directly by the project) and sourced from the available literature and through discussions with monitoring, control and surveillance (MCS) professionals. The combination of information was used to generate a series of in-depth studies detailing the level of illegal fishing for a number of different species in 60 countries (chosen as those with the highest catches in their EEZs) and 17 high seas FAO (Food and Agriculture Organisation) regions. Overall the estimates of illegal fishing are based on a number of species and areas that constitute 46% of global catches based on FAO catch statistics. The level of IUU catches was calculated on a regional and species group basis. The results demonstrated that there are significant differences in the level of IUU catch and the trends in those catches between regions, being highest in the Eastern Central Atlantic (Area 34) and lowest in the Southwest Pacific (Area 81). Over the last 10 years IUU has declined in 7 areas, increased in one and stayed the same in the remaining 7. We estimate that the overall loss from our studied fisheries is 11-19% of the reported catch in those fisheries, worth some $5-11bn in 2003. Taking the total estimated value of illegal catch losses within the analysed fisheries and areas and raising by the proportion of the total world catch, the lower and upper estimates of the total value of current IUU losses worldwide were between $10bn and $23bn annually, representing between 11.06 and 25.91 million tonnes. This estimate is roughly consistent with estimates made recently by MRAG (2005) ($9bn), the European Commission (2007) ($15bn) and the estimates from Pauly et al..(2002) ($25bn)."

Details: Vancouver, BC: Fisheries Ecosystems Restoration Research, Fisheries Centre, University of British Columbia, 2008. 33p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Illegal Fishing

Shelf Number: 119371


Author: Andvig, Jens Chr.

Title: Crime, Poverty and Police Corruption in Developing Countries

Summary: "Crime and the fear of being hit by crime and small-scale violence are key economic and social problems in most developing countries, not least felt strongly by the poor. Extensive corruption in the police, experienced or perceived, contributes seriously to the problem. A key question raised in the paper is: How is police corruption linked to the wider processes of development - including crime, violence and poverty? The paper examines (i) how and why corruption may arise in the daily routines of the police and whether it may have impacts on crime rates; (ii) empirical indications of whether the police may be more corrupt than other groups of public officials; (iii) how and why police corruption may vary across countries; and (iv) the wider impacts of police corruption on development."

Details: Bergen, Norway: CHR. Michelsen Institute, 2008. 32p.

Source: Internet Resource; CMI Working Paper 2008:7

Year: 2008

Country: International

Keywords: Corruption (Developing Countries)

Shelf Number: 119375


Author: Day, Tanis

Title: The Economic Costs of Violence Against Women: An Evaluation of the Literature

Summary: This brief provides an overview of the work that has been undertaken world-wide on the economic costs of gender-based violence. The focus of the analysis is to examine estimates of the costs of violence, to compare methodologies used, and to understand the scope of what has been accomplised to date. The paper analyzes existing studies, shows their geographic coverage, indicates the types of costs addressed, and discusses the strengths and weaknesses of the methodologies used.

Details: Vienna: United Nations, 2005. 66p.

Source: Internet Resource; Expert Brief

Year: 2005

Country: International

Keywords: Costs of Crime

Shelf Number: 119277


Author: Duvvury, Nata

Title: Costs of Intimate Partner Violence at the Household and Community Levels: An Operational Framework for Developing Countries

Summary: Violence in intimate partner relationships is the most common form of gender-based violence experienced by women across the globe. However, while domestic violence exacts an enormous toll on society, putting a dollar figure on the actual cost is difficult. This paper attempts to develop an operational framework for estimating economic costs of domestic violence in developing countries.

Details: Washington, DC: International Center for Research on Women, 2004. 42p.

Source: Internet Resource

Year: 2004

Country: International

Keywords: Costs of Crime

Shelf Number: 119278


Author: Jenkins, Brian Michael

Title: Terrorist Attacks on Public Bus Transportation: A Preliminary Empirical Analysis

Summary: "This report provides data on terrorist attacks against public bus transportation targets and serious crimes committed against such targets throughout the world. The data are drawn from the MTI database of attacks on public surface transportation, which is expanded and updated as information becomes available. This analysis is based on the database as of December 17, 2009. Data include the frequency and lethality with which buses, bus stations, and bus stops are attacked; the relationship between fatalities and attacks against bus targets and the relationship between injuries and attacks against those targets; how often, relative to other surface transportation targets, buses are attacked, first with all weapons and then with only explosive and incendiary devices; the relative lethality of attacks; and the distribution of attacks. It then presents some preliminary observations drawn from those data that can help stakeholders—governments, transit managers, and employees—to focus on the ways the most frequent and/or most lethal attacks are carried out as they consider measures to prevent or mitigate attacks that may be considered likely to happen in the United States."

Details: San Jose, CA: Mineta Transportation Institute, San Jose State University, 2010. 110p.

Source: Internet Resource; MTI Report SP 09-01

Year: 2010

Country: International

Keywords: Public Transportation

Shelf Number: 119381


Author: Joossens, Luk

Title: How Eliminating the Global Illicit Cigarette Trade Would Increase Tax Revenue and Save Lives

Summary: This report presents the following: 1) Updated country level estimates of the illicit cigarette market around the world, using 2007 data or as close to 2007 as available; 2) Evidence that higher income countries, where cigarettes are more expensive, have lower levels of cigarette smuggling than lower income countries, contrary to the tobacco industry claim that the overall level of smuggling is dependent on cigarette price; 3) Evidence that the burden of cigarette smuggling falls disproportionately on low and middle income countries, where the majority of the world's tobacco users live; and 4) Estimates of the number of lives saved and revenue gained globally in the future if smuggling were eliminated.

Details: Paris: International Union Against Tuberculosis and Lung Disease, 2009. 30p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Cigarette Smuggling

Shelf Number: 119395


Author: United Nations Office on Drugs and Crime

Title: The Globalization of Crime: A Transnational Organized Crime Threat Assessment

Summary: "In The Globalization of Crime: A Transnational Organized Crime Threat Assessment, UNODC analyses a range of key transnational crime threats, including human trafficking, migrant smuggling, the illicit heroin and cocaine trades, cybercrime, maritime piracy and trafficking in environmental resources, firearms and counterfeit goods. The report also examines a number of cases where transnational organized crime and instability amplify each other to create vicious circles in which countries or even subregions may become locked. Thus, the report offers a striking view of the global dimensions of organized crime today."

Details: Vienna: UNODC, 2010. 303p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Counterfeiting

Shelf Number: 119407


Author: Global Witness

Title: Broken Vows: Exposing the 'Loupe' Holes in the Dismond Industry's Efforts to Prevent the Trade in Conflict Diamonds

Summary: Major United States (US) and international retailers selling diamond jewellery are falling short on their promises to combat the trade in conflict diamonds. This report details the results of Global Witness' survey and investigations into the implementation of a system of self-regulation to support the Kimberley Process, an international governmental certification scheme aimed at preventing the trade in conflict diamonds.

Details: Washington, DC: Global Witness, 2004. 34p.

Source: Internet Resource

Year: 2004

Country: International

Keywords: Conflict Diamonds

Shelf Number: 119413


Author: Neumann, Peter R.

Title: Prisons and Terrorism: Radicalisation and De-radicalisation in 15 Countries

Summary: The report identifies trade-offs and dilemmas but also principles and best practices that will help governments and policymakers spot new ideas and avoid costly and counterproductive mistakes. Among the key findings and recommendations are: 1) The current emphasis on security and containment leads to missed opportunities to promote reform. Prison services should be more ambitious in promoting positive influences inside prison, and develop more innovative approaches to facilitate extremists’ transition back into mainstream society; 2) Over-crowding and under-staffing amplify the conditions that lend themselves to radicalisation. Badly run prisons make the detection of radicalisation difficult, and they also create the physical and ideological space in which extremist recruiters can operate at free will; 3) Religious conversion is not the same as radicalisation. Good counter-radicalisation policies – whether in or outside prison – never fail to distinguish between legitimate expression of faith and extremist ideologies. Prison services should invest more in staff training, and consider sharing specialised resources; 4) Individual de-radicalisation and disengagement programmes – such as the ones in Saudi-Arabia, Singapore, Indonesia, and other countries – can make a difference. Their positive and outward-looking approach should serve as an inspiration for governments and policymakers everywhere; 5) Even in the best circumstances, however, such programmes complement rather than replace other instruments in the fight against terrorism. They work best when the political momentum is no longer with the terrorists or insurgents.

Details: London: International Centre for the Study of Radicalisation and Political Violence; National Consortium for the Study of Terrorism and Responses to Terrorism, 2010. 64p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Prison Gangs

Shelf Number: 119428


Author: International Labour Office

Title: Combating Trafficking in Children for Labour Exploitation: A Resource Kit for Policy-Makers and Practitioners

Summary: This resource kit presents a series of booklets designed to enable policy-makers and practitioners to design, implement and improve policy and programming to fight child trafficking. The resource kit is composed of five independent, but interrelated books that each cover a particular set of themes: Book 1 is designed to help users to understand human trafficking, particularly trafficking that involves children (people under the age of 18 years); Book 2 is about acquiring knowledge prior to designing responses to child trafficking; Book 3 is about building a legal and policy framework within which to address trafficking, and also pays attention to mobilization and building of partnerships; Book 4 is about the actual remedial action to address child trafficking and provides insight into the initiatives that have been and can be taken to prevent such trafficking, protect children from becoming victims of trafficking, respond where trafficking exists and provide support and services to those who have been trafficked; Book 5 is about effective processes that may contribute to effective remedial action, and highlights amongst others the value of child participation, monitoring and documentation of learning.

Details: Geneva: ILO, 2008. 222p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Child Labor

Shelf Number: 117315


Author: United Nations Children's Fund

Title: Progress for Children: A Report Card on Child Protection

Summary: This report card is a compendium of data on the global and national efforts to protect the rights of children.

Details: New York: UNICEF, 2009. 46p.

Source: Internet Resource; Number 8

Year: 2009

Country: International

Keywords: Child Protection

Shelf Number: 119331


Author: Waddell, Glen R.

Title: Adolescent Drug Use and Deterrent Effect of School-Imposed Penalties

Summary: Simple OLS estimates of the effect of school-imposed penalties for drug use on a student's consumption of marijuana are biased if both are determined by unobservable school or individual attributes. The potential reverse causality is also a challenge to retrieving estimates of the causal relationship, as the severity of school sanctions may simply reflect the need for more-severe sanctions. This report offers an instrumental-variables approach to retrieving an estimate of the causal response of marijuana use to sanctions and thereby demonstrates the efficacy of school-imposed penalties as a deterrent to adolescent drug use. This is the first evidence of such efficacy and, given what is known about the consequences of drug use, suggests that school sanctions may have important long-run benefits.

Details: Bonn, Germany: IZA (Institute for the Study of Labor), 2010. 18p.

Source: Internet Resource; IZA Discussion Paper No. 5047

Year: 2010

Country: International

Keywords: Drug Abuse and Addiction, Adolescents

Shelf Number: 119440


Author: Ruggiero, Vincenzo

Title: Organized Crime: Between the Informal and Formal Economy

Summary: It has been noted that, when dealing with organized crime, social scientists often rely on government pronouncements which are typically state-serving, or work from exceptionally poor, undocumented, secondary sources. For this reason, the criminal justice system ends up playing a crucial role in the evaluation of organized crime, its impact and severity, and ultimately its very definition. This paper sets off with an overview of the definitions of organized crime, highlighting the controversies found in the literature. It then proposes a series of observations around the causation of this type of crime. Such observations will lead to the identification of ‘criminal enterprises’, to a tentative classification, and to the distinction between organizations mainly involved in conventional illegal activities, and organizations that gain access to the official political and economic world. The areas of contact between the formal and the informal spheres of the economy will be pointed out, while, in the second part of this paper, specific case studies will provide empirical evidence of how partnerships between organized crime and the official world might take shape.

Details: Santiago, Chile: Global Consortium on Security Transformation, 2010. 33p.

Source: Internet Resource; Working Paper Series no. 4

Year: 2010

Country: International

Keywords: Organized Crime

Shelf Number: 119447


Author: Idriss, Manar

Title: International Report 2010 Crime Prevention and Community Safety: Trends and Perspectives

Summary: This report examines the impact of migration, organized crime and substance abuse on community safety. It highlights the importance of good governance frameworks for prevention and safety, training and capacity building for different sectors of the community, and the evaluation of programmes and strategies. It also emphasizes social and education approaches to crime prevention among vulnerable populations. Providing a large panorama of prevention in the world, the Report 2010 examines in particular the impact of migration, organized crime and substance abuse on community safety. It highlights the importance of good governance frameworks for prevention and safety, training and capacity building for different sectors of the community, and the evaluation of programmes and strategies. It also emphasizes social and education approaches to crime prevention among vulnerable populations.

Details: Montreal: International Centre for the Prevention of Crime, 2010. 223p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Alcohol Abuse

Shelf Number: 119293


Author: Vignard, Kerstin

Title: Maritime Security

Summary: This issue focuses on maritime security — a multifaceted and complex topic that touches on some of the most critical security challenges of the moment. Armed non-state actors are exploiting busy shipping lanes for piracy and, some fear, for terrorist purposes. In this regard, there is rising concern about the security of sensitive materials in transit by sea. This issue of Disarmament Forum examines how these maritime security risks are being addressed. It explores efforts to minimize risks of WMD proliferation through regional and international cooperation at sea, for example, the Proliferation Security Initiative. It considers the extent of the threat posed by pirates and other non-state actors at sea—with a particular emphasis on the security of maritime shipping of sensitive materials.

Details: Geneva: United Nations Institute for Disarmament Research, 2010. 53p.

Source: Internet Resource; Disarmament Forum, No. 2

Year: 2010

Country: International

Keywords: Maritime Crime

Shelf Number: 119467


Author: Brack, Duncan

Title: Controlling Illegal Logging: Consumer-Country Measures

Summary: Consumer countries contribute to the problems of illegal logging by importing timber and wood products without ensuring that they are legally sourced. Over the last few years, however, consumer countries have taken a series of measures to try to ensure that they exclude illegal timber products from their markets. The bilateral voluntary partnership agreements negotiated between the EU and timber-producing countries, which will establish a licensing scheme for legal timber, offer one of the best ways of controlling the trade but will be slow to establish. Broader measures to exclude illegal timber lack some of the benefits of this approach but can be implemented more quickly and with greater coverage. The extension of the Lacey Act to timber in 2008 was a significant development, providing the US with an effective means of encouraging the timber industry to exercise 'due care' and preventing imports of illegal timber. Whether the EU's 'due diligence' regulation will prove as effective remains to be seen. Public procurement policies aimed at purchasing legal (and, usually, sustainable) timber can prove very effective in excluding illegal timber from segments of a consumer-country market. All these developments will encourage the spread of the voluntary certification and legality verification schemes, but at the same time are likely to expose them to increasing pressures, for example from fraud.

Details: London: Chatham House, 2010. 12p.

Source: Internet Resource; Briefing Paper

Year: 2010

Country: International

Keywords: Illegal Logging

Shelf Number: 118627


Author: International Advisory Commission of the Commonweath Human Rights Initiative

Title: Stamping Out Rights: The Impact of Anti-Terrorism Laws on Policing

Summary: This report looks at the impact of anti-terrorism legislation on policing in the Commonwealth. The report examines: new counter-terrorism legislation and measures that have been adopted in the Commonwealth; how these measures are impacting policing on the ground; the compatibility of legislation and policing practices at international law; how anti-terrorism policing measures are impacting on police oversight and accountability mechanisms; and offers recommendations to Commonwealth heads of government, member states, heads of police, civil society and donors.

Details: New Delhi: Commonwealth Human Rights Initiative, 2007. 82p.

Source: Internet Resource

Year: 2007

Country: International

Keywords: Counter-Terrorism Legislation

Shelf Number: 111693


Author: PATH (Inter-American alliance for the Prevention of Gender-based Violence)

Title: Strenthening Understanding of Femicide: Using Research to Galvanize Action and Accountability

Summary: This publication provides an overview of a conference on femicide convened jointly by PATH, the Inter-American Alliance for the Prevention of Gender-based Violence, the Medical Research Council of South Africa, and the World Health Organization in Washington, DC, April 14–16, 2008. The conference brought together activists, researchers, and forensic professionals from 13 countries, with the aim of identifying common ground for strengthening research and galvanizing global action to prevent femicide and end the impunity so often granted to perpetrators.

Details: Seattle, WA: PATH, 2009. 112p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Femicide

Shelf Number: 119510


Author: Keefer, Philip

Title: Innocent Bystanders: Developing Countries and the War on Drugs

Summary: Drug use and abuse is one of the most difficult challenges facing the contemporary world. If it is true that there has always been consumption of different types of drugs in different societies, although not in all of them, it is no less true that it generally took place in restricted, socially regulated realms, especially in ritualistic ceremonies. This is not the case today. Drug use has spread to all segments of society, with hedonistic motivations; although it is often not socially sanctioned, users are at times, depending on the drug, treated with leniency. It is well-established that all drugs are harmful to the health, even the legal ones, such as alcohol and tobacco, and that some drugs are more harmful, such as heroin and crack. The discussion of 'gateway drugs' is a medical issue on which there is no consensus. For the purposes of public policy design, the important thing to keep in mind is that drugs produce negative consequences for both users and societies in general, and that minimizing their consumption should be the main goal. The salient discussion, therefore, is about choosing among different strategies to achieve the same goal. Most of all, this report contributes to the debate by shedding light on the understanding of the economics and logistics of the drug market.

Details: Washington, DC: The World Bank, 2010. 362p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 119523


Author: Australia. Commonwealth Consumer Affairs Advisory Council

Title: Ticket Scalping: Ticket Onselling and Consumers

Summary: The Issues Paper examines current practices relating to ticket onselling and considers possible market responses, including both regulatory and non-regulatory options, and their cost and effectiveness.

Details: Barton, ACT, Australia: Commonwealth of Australia, 2010. 29p.

Source: Internet Resource; Issues Paper

Year: 2010

Country: International

Keywords: Consumer Fraud

Shelf Number: 119528


Author: International Centre for Missing & Exploited Children

Title: Child Pornography: Model Legislation & Global Review. Fifth Edition

Summary: Research into national child pornography legislation began in November 2004. Primary sources of information included: LexisNexis; a survey of Member Countries previously conducted by Interpol regarding national child sexual exploitation legislation; government submissions to the U.N. Special Rapporteur on the Sale of Children, Child Prostitution, and Child Pornography in conjunction with a U.N. report on child pornography on the Internet; and direct contact with in-country nongovernmental organizations (NGOs), law enforcement agencies and officers, and attorneys. Sadly, the end results continue to shock. Of the 187 Interpol Member Countries, only 29 have legislation sufficient to combat child pornography offenses (5 Member Countries meet all of the criteria set forth above and 24 Member Countries meet all but the last criteria, pertaining to ISP reporting); and 93 have no legislation at all that specifically addresses child pornography. Of the remaining Interpol Member Countries that do have legislation specifically addressing child pornography: 54 do not define child pornography in national legislation; 24 do not provide for computer-facilitated offenses; and 36 do not criminalize possession of child pornography, regardless of the intent to distribute. Fundamental topics addressed in the model legislation portion of this report include: Defining “child†for the purposes of child pornography as anyone under the age of 18, regardless of the age of sexual consent; Defining “child pornography,†and ensuring that the definition includes computer- and Internet-specific terminology; Creating offenses specific to child pornography in the national penal code, including criminalizing the possession of child pornography, regardless of one’s intent to distribute, and including provisions specific to downloading or viewing images on the Internet; Ensuring criminal penalties for parents or legal guardians who acquiesce to their child’s participation in child pornography; Penalizing those who make known to others where to find child pornography; Including grooming provisions; Punishing attempt crimes; Establishing mandatory reporting requirements for healthcare and social service professionals, teachers, law enforcement officers, photo developers, information technology (IT) professionals, ISPs, credit card companies, and banks; Addressing the criminal liability of children involved in pornography; and Enhancing penalties for repeat offenders, organized crime participants, and other aggravated factors considered upon sentencing.

Details: Alexandria, VA: International Centre for Missing & Exploited Children, 2008. 33p.

Source: Internet Resource

Year: 2008

Country: International

Keywords: Child Pornography, Model Legislation

Shelf Number: 119545


Author: Jelsma, Martin

Title: Legislative Innovation in Drug Policy

Summary: This briefing summarizes good practices in legislative reforms around the world, representing steps away from a repressive zero-tolerance model towards a more evidence-based and humane drug policy. The examples provide lessons learned in practice about less punitive approaches and their impact on levels of drug use and drug related harm to the individual and society. Evidence suggests that legislation lessening criminalization combined with shifting resources from law enforcement and incarceration to prevention, treatment and harm reduction is more effective in reducing drug-related problems. Fears that softening drug laws and their enforcement would lead to sharp increases in drug use, have proven untrue. The examples cited, in spite of their differences in scope and objectives, can be regarded as improvements on an ineffective overly repressive drug control model and they indicate a direction for more substantial reform and paradigm shifts in the future.

Details: Rio de Janeiro, Brazil: Latin American Initiative on Drugs and Democracy, 2009. 18p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 119553


Author: Burnet Institute

Title: Situational Analysis of Drug and Alcohol Issues and Responses in the Pacific 2008-09

Summary: This situational analysis focuses on the Pacific region, including both licit and illicit drug use. The assessment recognises the risks for drug-related crime as identified by international and regional law enforcement agencies for more than a decade. Information collected by enforcement organisations and networks suggests that illicit drugs are becoming an increasing concern in the region. More importantly, health and other community services have begun to highlight the social and economic costs of high levels of alcohol use as an area of increasing concern. The report provides considers recommendations for framing appropriate responses coordinated at the regional level, via regional and international coordinating mechanisms and donors.

Details: Canberra: Australian National Council on Drugs, 2010. 275p.

Source: Internet Resource

Year: 2010

Country: International

Keywords: Alcohol Abuse

Shelf Number: 119557


Author: West, Ronald A.

Title: Democratic Oversight of Police Forces: Mechanisms for Accountability and Community Policing

Summary: One of the most important features of the modern democratic state is the tacit agreement between the government and citizens: in exchange for surrendering some of their personal liberty to allow government to develop a binding legal framework for society, citizens are given protection by the government. This public protection is provided by police, who maintain order and enforce laws. Police in democratic countries are generally civilians, even if the organization of police institutions bears many similarities to military forces. Most developed democracies have limited the authority of their militaries to responsibility for protecting the state from foreign invasion and/or actions in a very limited range of internal crises — there is no role for the military in policing a democracy. This handbook is a guide for those concerned with what happens after democratization takes place and police realize that a new type of government is in power. To whom will police answer? What form will policing take? The handbook includes the following sections: 1) Ensuring Accountability - How Democracies Control Police; 2) Community or "Problem-Solving Policing"; and Sweden - A Case Study in Improving Performance.

Details: Washington, DC: RIGHTS Consortium; National Democratic Institute, 2005. 54p.

Source: Internet Resource; Rule of Law Series Paper

Year: 2005

Country: International

Keywords: Community Policing

Shelf Number: 119564


Author: Beckenkamp, Martin

Title: Beware of Broken Windows! First Impressions in Public-good Experiment

Summary: Broken Windows: the metaphor has changed New York and Los Angeles. Yet it is far from undisputed whether the broken windows policy was causal for reducing crime. In a series of lab experiments we show that first impressions are indeed causal for cooperativeness in three different institutional environments: absent targeted sanctions; with decentralised punishment; with decentralised punishment qualified by the risk of counterpunishment. In all environments, the effect of first impressions cannot be explained with, but adds to, participants’ initial level of benevolence. Mere impression management is not strong enough to stabilise cooperation though. It must be combined with some risk of sanctions.

Details: Bonn, Germany: Max Planck Institute for Research on Collective Goods, 2009. 32p.

Source: Internet Resource

Year: 2009

Country: International

Keywords: Broken Windows Theory

Shelf Number: 119567


Author: Bennett, Sarah

Title: Procedural Justice: A Systematic Literature Search and Technical Report to the National Policing Improvement Agency

Summary: This report presents the findings of a systematic literature search of procedural justice between April and June, 2009. Twenty-two keywords were identified and searched on six electronic databases and two library catalogues.

Details: Brisbane: ARC Centre of Excellence in Policing and Security, Griffith University, 2009. 151p.

Source: Internet Resource; Accessed August 10, 2010 at http://www.ceps.edu.au/files/NPIA%20Procedural%20Justice%20Technical%20Report.pdf

Year: 2009

Country: International

Keywords: Judicial Process

Shelf Number: 118759


Author: Zhang, Sheldon

Title: Get There Anyway You Can - Human Smuggling to the U.S. and the Policy Implications

Summary: Human smuggling, although often sensationalized in the news media, is mostly a rather mundane business arrangement in which one assists or facilitates, often for a fee, the unauthorized entry of a foreign national into another country. In recent years, illegal immigration and the associated human smuggling activities have gone through discernible changes, some of which are brought about by the intensified debate on securing the nation’s borders and probably more are caused by the economic conditions and fundamental shifts in U.S. labor market.

Details: Santiago, Chile: Global Consortium on Security Transformation, 2010. 19p.

Source: Internet Resource; Policy Brief Series, No. 8. Accessed August 10, 2010 at http://www.securitytransformation.org/gc_publications.php

Year: 2010

Country: International

Keywords: Border Security

Shelf Number: 119583


Author: ECPAT International

Title: Creating a United Front Against the Sexual Exploitation of Children in Travel and Tourism

Summary: "While much progress has been made in combating the sexual exploitation of children in travel and tourism (also known as child-sex tourism or CST) and other forms of sexual exploitation of children, there is a need to identify and develop measures to address new trends and further improve concerted, multi-stakeholder action to effectively combat this exploitation. It must also be noted that while CST involves child prostitution, it is not limited to it. Technological progress and the rapid spread of digital cameras and camcorders now often make the production of child pornography (or child abuse imagery) an ancillary activity of the former. Trafficking in children for sexual exploitation, in turn, is known to play a significant role in the supply of victims to a market demand that has not shown any sign of abatement over the past few years. The reports in this journal look at general trends in the development of child-sex tourism and identify the gaps in child protection against commercial sexual exploitation. They discuss key initiatives to address the issues and recommend specific actions by governments that are urgently needed to tackle the problem.

Details: Bangkok, Thailand: ECPAT Interntaional, 2009. 66p.

Source: Internet Resource; Accessed August 13, 2010 at http://www.ecpat.net/EI/Publications/Journals/ECPATJournalJune2009.pdf

Year: 2009

Country: International

Keywords: Child Prostitution

Shelf Number: 119592


Author: ECPAT International

Title: Child Abuse Images and Sexual Exploitation of Children Online

Summary: "In this publication, global experts working in various related fields - law enforcement, research, rehabilitation of victims, advocacy, technology, etc. - share their knowledge and highlight the issues that need to be urgently addressed to more effectively counter child abuse imagery and the sexual exploitation of children online. The papers presented here stemmed from The Preparatory Expert Meeting on Child Abuse Images and Sexual Exploitation of Children Online, which was held in Bangkok, Thailand on 14-15 August 2008."

Details: Bangkok, Thailand: ECPAT International, 2009. 82p.

Source: Internet Resource; Accessed August 13, 2010 at http://www.ecpat.net/EI/Publications/ICT/ICT.pdf

Year: 2009

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 119593


Author: World Health Organization, Europe

Title: Psychoactive Substance Use in Kosovo: Rapid Assessment and Response with Youth, Injecting Drug Users and Prisoners

Summary: "The report analyses the level of psychoactive substance use with youth, injecting drug users and prisoners in Kosovo. The aim of the report is to document the situation on psychoactive substance use in Kosovo and to provide recommendations which should be taken into consideration when designing evidence-based interventions and programmes at the institutional and community level."

Details: Pristina, Kosovo: UNICEF, 2010.

Source: Internet Resource; Accessed August 16, 2010 at:http://www.unicef.org/ceecis/RAR_psychoactive_substance_use_eng_09.pdf

Year: 2010

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 119608


Author: Chryssikos, Demosthenes

Title: The Evolving Challenge of Identity-Related Crime: Addressing Fraud and the Criminal Misuse and Falsification of Identity

Summary: The United Nations Office on Drugs and Crime commissioned a study on “fraud and the criminal misuse and falsification of identityâ€, which was released in early 2007. Further to highlighting the seriousness of the problems posed by economic fraud and the challenges encountered in the fight against it, the study also considered abuses of identity or identification information as distinct criminal offences. This Conference built upon the results and recommendations of the UNODC study and further advance its findings by utilizing, refining and, and expanding the evidentiary material gathered for the purposes of the study. This edited volume includes selected papers and contributions from the International Conference on “The evolving challenge of identity-related crime: addressing fraud and the criminal misuse and falsification of identity†held at Courmayeur Mont Blanc, Italy 30 November − 2 December 2007.

Details: Milan: International Scientific and Professional Advisory Council of the United Nations, 2008. 340p.

Source: Internet Resource; Accessed August 17, 2010 at: http://www.ispac-italy.org/pubs/ISPAC%20-%20Identity%20Theft.pdf

Year: 2008

Country: International

Keywords: Fraud Prevention

Shelf Number: 114879


Author: Reuter, Peter

Title: A Report on Global Illicit Drugs Markets, 1998-2007

Summary: "This document provides the key findings of a project assessing how the global market for drugs developed from 1998 to 2007 and describing drug policy around the globe during that period. To the extent data allows, the project assessed how much policy measures, at the national and sub-national levels, have influenced drug problems. The analysis is focused on policy relevant matters but it does not attempt to make recommendations to governments."

Details: Brussels: European Communities, 2009p. 74p.

Source: Internet Resource; Accessed August 17, 2010 at: http://ec.europa.eu/justice_home/doc_centre/drugs/studies/doc/report_short_10_03_09_en.pdf

Year: 2009

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 113912


Author: Johnson, Shane D.

Title: Theft of Customers' Personal Property in Cafes and Bars

Summary: This guide provides an overview of the problem of theft of customer's personal property from cafes and bars and reviews the associated risk factors. The guide also reviews responses to the problem and what is known about them from evaluative research and police practice.

Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2010. 68p.

Source: Internet Resource; Problem-Oriented Guides for Police; Problem-Specific Guides Series, No. 60; Accessed August 17, 2010 at: http://www.popcenter.org/problems/pdfs/cafe_bar_theft.pdf

Year: 2010

Country: International

Keywords: Personal Theft

Shelf Number: 119623


Author: Lennox, Patrick

Title: Contemporary Piracy Off the Horn of Africa

Summary: There were 115 reported pirate attacks off the coast of Somalia in 2008. Of those attacks, 46 were converted into the seizure of a commercial vessel by Somali pirates. The average ransom for the release of hijacked vessels increased from $1 million US dollars in July of 2008, to $1.5 million by December. At the time of writing 12 vessels are being held along with approximately 200 crew members in pirate towns along Somalia’s unlawful coasts. The Gulf of Aden (GOA), where most of the attacks have occurred, and through which 20,000 commercial vessels transit each year, is slowly being choked off as a viable shipping route. More and more shipping companies are opting to take the long route around the Cape of Good Hope rather than risk an attack or a hijacking, and insurance rates for vessels transiting the GOA have increased ten-fold in the last four months. Despite the increased presence of warships in the GOA in recent months, Somali piracy is escalating and will get worse before it gets better. As Somalia fails more and more spectacularly as a state, the size, value and number of the ships Somali pirates seize can be expected to grow along with the complexity of the pirate network, the sophistication of their weapons, crafts, and techniques, and the number of functional pirates. Essentially rational actors operating in pursuit of their own survival and self-interest and not in pursuit of a ideologically inspired fundamentalist aims, Somali pirates can be expected to adapt their tactics to international responses, and continue to ply their trade until the risks of doing so outweigh the rewards. The range of criminal activities involving the unruly maritime regions of the Somali peninsula can be expected to grow. The unfortunate and potentially unintentional future outcome of such a growing diversity of criminal activity is that it might not be long before the line between pirate attack and terrorist attack is crossed, resulting in significant human and ecological casualties. The coordinated international response to this issue is escalating in tandem with the escalation of Somali piracy. Currently, twenty warships from fourteen nations patrol off the Horn of Africa. However, as this paper will make clear, Somali piracy is directly tied to the failure of the Somali state. Accordingly, any comprehensive solution to the problem will have to involve ground operations to stabilize the country itself, as well as to unsettle pirate sanctuaries and destroy pirate infrastructure.

Details: Calgary, Alberta, Canada: Canadian Defence & Foreign Affairs Institute, 2008. 24p.

Source: Internet Resource: Accessed August 19, 2010 at: http://www.cdfai.org/PDF/Contemporary%20Piracy%20off%20the%20Horn%20of%20Africa.pdf

Year: 2008

Country: International

Keywords: Maritime Crime

Shelf Number: 118802


Author: Brackenridge, Celia

Title: Protecting Children From Violence in Sport: A Review With A Focus on Industrialized Countries

Summary: During recent years, however, it has become evident that sport is not always a safe space for children, and that the same types of violence and abuse sometimes found in families and communities can also occur in sport and play programmes. Child athletes are rarely consulted about their sporting experiences, and awareness of and education on child protection issues among sport teachers, coaches and other stakeholders is too often lacking. Overall, appropriate structures and policies need to be developed for preventing, reporting and responding appropriately to violence in children’s sport. In recognition of this, the UNICEF Innocenti Research Centre commissioned a review of the available empirical research and policy initiatives on this subject. The research resulted in a wealth of information. This report defines the many aspects of the issue, provides examples of both good and poor practice, and makes suggestions for sport organizations to assist them in their violence prevention work. In particular, the study recommends improvements in: 1) Data collection and knowledge generation about violence to children in sport; 2) Development of structures and systems for eliminating and preventing violence to children in sport; 3) Education, awareness-raising and training on this subject; and 4) Promotion of ethical guidelines and codes of conduct as part of the prevention system. It is anticipated that by addressing these gaps, significant improvements will be realized for the promotion and protection of the rights of children in sport.

Details: Florence, Italy: United Nations Children's Fund (UNICEF), Innocenti Research Centre, 2010. 54p.

Source: Internet Resource: Accessed August 19, 2010 at:

Year: 2010

Country: International

Keywords: Child Maltreatment

Shelf Number: 118805


Author: Lack, Mary

Title: Continuing CCAMLR's Fight Against IUU Fishing for Toothfish

Summary: The future of the Patagonian and Antarctic Toothfish and the highly valuable fishery based on them concentrated in the Southern Ocean, is under significant pressure from illegal, unreported and unregulated (IUU) fishing. This report documents the fact that IUU fishing is severely undermining protection of these valuable species.

Details: Sydney: World Wildlife Fund - Australia and TRAFFIC International, 2008. 60p.

Source: Internet Resource: Accessed August 21, 2010 at: http://www.traffic.org/species-reports/traffic_species_fish31.pdf

Year: 2008

Country: International

Keywords: Illegal Fishing

Shelf Number: 115683


Author: United Nations Office on Drugs and Crime

Title: An Introduction to Human Trafficking: Vulnerability, Impact and Action

Summary: This document presents three background papers presented to the Vienna Forum to Fight Human Trafficking, held in the Austrian capital from 13 to 15 February 2008. The aims of the Forum were to raise awareness of all forms of trafficking, to facilitate cooperation and partnerships among participants, to take stock of progress made and to set the directions for follow-up measures to prevent and counter human trafficking. The Vienna Forum was organized around three central themes, which reflect the key issues that need to be addressed in a comprehensive anti-trafficking strategy: Why does human trafficking occur? What are the consequences? What measures might be taken in response?

Details: New York: UNODC, 2008. 140p.

Source: Internet Resource: Accessed August 22, 2010 at: http://www.unodc.org/documents/human-trafficking/Marika-Misc/An%20Introduction%20to%20Human%20Trafficking%20-%20Vulnerablity,%20Impact%20and%20Action.pdf

Year: 2008

Country: International

Keywords: Human Trafficking

Shelf Number: 110896


Author: Dexel, Birga

Title: The Illegal Trade in Snow Leopards - A Global Perspective

Summary: The snow leopard was listed by the CITES Parties in 1975 on Appendix I. Since then cross-border trade has become an ever increasing threat to snow leopards, but no further measures have been taken in the framework of the convention to stop the on-going illegal trade in live specimen, parts and derivatives. Many range countries did not become a party to CITES till the late 1990s and some have not joined at all. The species is fully protected in every range country under the respective national laws and hunting as well as the trade in live specimen and parts is prohibited. All range countries with the exception of Bhutan have difficulties in enforcing these provisions. The national and international trade in live specimen, skins and bones is, according to the global network of snow leopard experts (SLN), the major threat to the survival of the species, particularly in Central Asia. This report is the first of its kind to assimilate the somewhat scarce information available, and to provide the Parties with evidence on the existence of this trade which, if no comprehensive measures are implemented as a matter of urgency, will lead to the extinction of this unique species. It also presents new trade data derived from investigations by the Kirghiz snow leopard enforcement group, Gruppa Bars, which is part of the joint Snow Leopard Conservation Programme of the Republic of Kyrgyzstan and the German Society for Nature Conservation (NABU). (Excerpts from the report)

Details: Berlin: German Society for Nature Conservation, 2002. 34p.

Source: Internet Resource: Accessed August 21, 2010 at: http://www.nabu.de/schneeleopard/report.pdf

Year: 2002

Country: International

Keywords: Illegal Trade

Shelf Number: 119209


Author: Andvig, Jens Chr.

Title: Crime, Police Corruption and Development: Evidence from Victimization Data

Summary: Recently economists have begun to investigate a number of institutional conditions for growth. One question raised is how the degree of security of persons and property may impact economic development and human welfare. Based on different indexes, the importance of the degree of security is confirmed for growth and for investment in human and physical capital. Other studies had showed that corruption has a negative impact on growth. The purpose of this paper is to explore whether some specific sets of criminal actions that have impact on the security of property and persons and the behaviourally related police corruption may have significant impact on the long run economic development.

Details: Oslo, Norway: Norwegian Institute of International Affairs, 2010. 53p.

Source: Internet Resource: NUPI Working Paper 772: Accessed August 22, 2010 at: http://english.nupi.no/Publications/Working-Papers/2010/Crime-Police-Corruption-and-Development

Year: 2010

Country: International

Keywords: Crime and Economic Development

Shelf Number: 119656


Author: Welsh, Brandon C.

Title: Effectiveness of Public Area Surveillance for Crime Prevention: Security Guards, Place Managers and Defensible Space

Summary: This report presents a systematic review of the effects of surveillance of public spaces by security guards, place mangers and measures to stimulate so called defensible space. Studies were included in these systematic reviews if the surveillance measure in question (i.e., security guards, place managers, and defensible space) was the main focus of the intervention; if there was an outcome measure of crime; if the evaluation design was of high methodological quality, with the minimum design involving before-and-after measures of crime in experimental and comparable control areas; and if the total number of crimes in each area before the intervention was at least 20. The reviews revealed generally encouraging results across the three different types of public area surveillance. There is fairly strong and consistent evidence that the defensible space technique of street closures or barricades is effective in preventing crime in inner-city neighborhoods. Less conclusive statements can be made about the effectiveness of security guards and place managers. This has everything to do with the small number of high quality evaluations that have been carried out on these measures. In the case of security guards, the weight of the evidence suggests that it is a promising technique of formal surveillance when implemented in car parks and targeted at vehicle crimes. The surveillance technique of place managers appears to be of unknown effectiveness in preventing crime in public places. Implications for policy and research are explored.

Details: Stockholm: Brottsforebyggande radet (Swedish National Council for Crime Prevention), 2010. 45p.

Source: Internet Resource: Accessed August 25, 2010 at: http://www.bra.se/extra/measurepoint/?module_instance=4&name=Effectiviness_of_Public_Area_Surveillance_for_Crime_Prevention.pdf&url=/dynamaster/file_archive/100309/0a3ceabb221375f51f9a82824942a662/Effectiviness%255fof%255fPublic%255fArea%255fSurveillance%255ffor%255fCrime%255fPrevention.pdf

Year: 2010

Country: International

Keywords: Aggression

Shelf Number: 119684


Author: Neild, Rachel

Title: USAID Program Brief: Anticorruption and Police Integrity

Summary: For those who work in the promotion of democracy and governance, the issue of fighting police corruption is essential. If basic human rights are to be protected and people are to live in safe and secure communities, the policing function must serve—and be seen as serving—the needs of the people. When those sworn to uphold the law engage in corruption themselves, it saps citizen confidence in democratic institutions—and could foster cynicism toward the notion of democracy itself. That said, police corruption is nearly always a function of larger systemic problems caused by the lack of overall transparency, the absence of checks and balances, weak rule of law and fragile institutions. This program brief is designed to “unpack†police corruption contextually, and to identify specific concerns that—in light of the societal role and special powers of the police—should be considered when developing programmatic responses. Seldom is the case where a stand-alone police corruption program is advisable. The most successful programs will be comprehensive and employ multiple strategies.

Details: Washington, DC: U.S. Agency for International Development, 2007. 34p.

Source: Internet Resource: Accessed August 28, 2010 at: http://www.usaid.gov/our_work/democracy_and_governance/publications/pdfs/AC_and_Police_Integrity.pdf

Year: 2007

Country: International

Keywords: Police Corruption

Shelf Number: 119694


Author: Piquero, Alex R.

Title: Self-Control Interventions for Children Under Age 10 for Improving Self-Control and Delinquency and Problem Behaviors

Summary: Self-control improvement programs are intended to serve many purposes, most notably improving self-control. Yet, interventions such as these often aim to reduce delinquency and problem behaviors. However, there is currently no summary statement available regarding whether or not these programs are effective in improving self-control and reducing delinquency and problem behaviors. The main objective of this review is to assess the available research evidence on the effect of self-control improvement programs on self-control and delinquency and problem behaviors. In addition to investigating the overall effect of early self-control improvement programs, this review examines, to the extent possible, the context in which these programs may be most successful. The studies included in this systematic review indicate that self-control improvement programs are an effective intervention for improving self-control and reducing delinquency and problem behaviors, and that the effect of these programs appears to be rather robust across various weighting procedures, and across context, outcome source, and based on both published and unpublished data.

Details: Oslo: Campbell Collaboration, 2010. 117p.

Source: Internet Resource: Campbell Systematic Review, 2010:2: Accessed August 28, 2010 at: http://campbellcollaboration.org/lib/download/792/

Year: 2010

Country: International

Keywords: Delinquency Prevention

Shelf Number: 119703


Author: O'Regan, Davin

Title: Cocaine and Instability in Africa: Lessons from Latin America and the Caribbean

Summary: Africa is facing an increasingly menacing threat of cocaine trafficking that risks undermining its security structures, nascent democratic institutions, and development progress. Latin America has long faced similar challenges and its experience provides important lessons that can be applied before this expanding threat becomes more deeply entrenched on the continent - and costly to reverse.

Details: Washington, DC: Africa Center for Strategic Studies, 2010. 8p.

Source: Internet Resource: Africa Security Brief, No. 5: Accessed August 30, 2010 at: http://africacenter.org/wp-content/uploads/2010/07/AfricaBriefFinal_5.pdf

Year: 2010

Country: International

Keywords: Cocaine

Shelf Number: 119704


Author: Financial Action Task Force

Title: Global Money Laundering and Terrorist Financing: Threat Assessment

Summary: The Global Money Laundering and Terrorist Financing Threat Assessment (GTA) report provides an assessment of the global systemic money laundering/terrorist financing threats. The document is aimed at raising the level of understanding of these threats and their negative impact, and help governments to take decisive action to minimize the harms they can cause.

Details: Paris: FATF, 2010. 76p.

Source: Internet Resource: Accessed September 1, 2010 at: http://www.fatf-gafi.org/dataoecd/48/10/45724350.pdf

Year: 2010

Country: International

Keywords: Money Laundering

Shelf Number: 119711


Author: Financial Action Task Force

Title: Money Laundering Vulnerabilities of Free Trade Zones

Summary: Free trade zones (FTZs) are designated areas within countries that offer a free trade environment with a minimum level of regulation. The number of FTZs have increased rapidly in recent years, today there are approximately 3,000 FTZs in 135 countries around the world. FTZs offer many incentives and benefits to the companies that operate within it, such as the exemption from duty and taxes and simplified administrative procedures. However, the absence of strict regulations and transparency of the FTZs which is beneficial for legitimate businesses, also make them highly attractive for illicit actors who take advantage of this relaxed oversight to launder the proceeds of crime and finance terrorism. Through a series of cases studies, this report aims to illustrate the ways in which FTZs can be misused for money laundering and terrorist financing purposes.

Details: Paris: FATF, 2010. 48p.

Source: Internet Resource: Accessed September 1, 2010 at: http://www.fatf-gafi.org/dataoecd/45/47/44888058.pdf

Year: 2010

Country: International

Keywords: Money Laundering

Shelf Number: 119712


Author: Morales, Luz Anyela

Title: Treatment Effectiveness in Secure Corrections of Serious (Violent or Chronic) Juvenile Offenders

Summary: This study examines the outcomes of the best available empirical research regarding the effectiveness of treatment programmes implemented in secure corrections to prevent the recidivism of serious (violent or chronic) juvenile offenders (from 12 to 21 years old). In this review 31 experimental and quasi-experimental studies are analyzed. The global effect size of these 31 studies assuming a random-effects model in terms of the odds ratio was or+ = 1.269, being positive in favour of the treatment groups and statistically significant (p = .005). Its translation into a correlation coefficient was r = 0.072, meaning that the subjects that received any intervention programme exhibited, on average, 7.2% less recidivism into crime than those of the control groups. With relation to serious recidivism, we obtained a significant mean odds-ratio that supported the effectiveness of the treatment (or+ = 1.488). Moderator variables did not show statistically significant results to explain the heterogeneity effectiveness of the treatment. However, we found evidence to suggest desirable effects of cognitive-behavioural treatments and of multi-focused programmes.

Details: Stockholm: Swedish National Council for Crime Prevention, 2010. 59p.

Source: Internet Resource: Accessed September 1, 2010 at: http://www.bra.se/extra/measurepoint/?module_instance=4&name=Treatment_effectiveness_in_secure_corrections_of_serious_juvenile_offenders_webb.pdf&url=/dynamaster/file_archive/100609/0b7d97fe2cb2d25c238e8f384376b694/Treatment%255feffectiveness%255fin%255fsecure%255fcorrections%255fof%255fserious%255fjuvenile%255foffenders%255fwebb.pdf

Year: 2010

Country: International

Keywords: Juvenile Corrections, Treatment Programs

Shelf Number: 119719


Author: ECPAT International

Title: Guide for National Planning: To Prevent, Stop and Redress Violations of Commercial Sexual Exploitation of Children

Summary: Commercial sexual exploitation of children – often referred to as CSEC – is prevalent throughout the world. It consists of criminal practices that demean and threaten the physical and psychological integrity of children. Commercial sexual exploitation of children is manifested primarily through child prostitution and child sex tourism, child pornography, and the trafficking of children for sexual purposes, as well as through such channels as child marriage, domestic servitude and bonded labour. With the increasing ease of travel, new information technologies and rising migration and displacement, a concerted global effort is necessary to ensure that all children are protected, regardless of their geographic or economic circumstance. Where they are comprehensive, National Plans of Action remain the best instrument to be used against Commercial Sexual Exploitation of Children. They provide a national vision for combating CSEC issues and ensure that the care and protection of children remains a national priority over a lasting period of time, constantly reviewed and improved through adequate monitoring and supported with appropriate resources. A National Plan enables civil society to identify what should be done, what is being done and what can be done for children; it challenges governments to tangibly live up to the international commitments they have made to protect the rights of children everywhere. This Methodological Guide is designed to work as a tool for countries that intend to develop National Plans of Action against Commercial Sexual Exploitation of Children. Specifically this guide provides: Information on setting up the stage to prepare for the drafting of an effective NPA through detailed background research and specific data collection; Description of the key partners to be involved in the National Plan of Action development to ensure its effective implementation; A methodology for the formulation of a National Plan of Action to combat the Commercial Sexual Exploitation of Children; Practical recommendations based on the experiences of countries that have developed National Plans of Action; and Examples of strategic national frameworks for eradicating the sexual exploitation of children around the world.

Details: Bangkok, Thailand: ECPAT International, 2009. 73p.

Source: Internet Resource: Accessed September 1, 2010 at: http://www.ecpat.net/EI/Publications/Global_Action/NPA_GUIDE_Layout.pdf

Year: 2009

Country: International

Keywords: Child Labor

Shelf Number: 119720


Author: Bouteillet-Paquet, Daphne

Title: Smuggling of Migrants: A Global Review and Annotated Bibliography of Recent Publications

Summary: The purpose of this thematic review is to survey existing sources and research papers on migrant smuggling and to provide a gap analysis of existing knowledge from a global perspective. Indeed, despite the fact that migrant smuggling has attracted great media and political attention over the last two decades, there has not been any comprehensive analysis of the state of expert knowledge. Great confusion still prevails about what is migrant smuggling within the global context of irregular migration. Smuggling of migrants is a crime defined under international law as “the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a State of which the person is not a national or a permanent residentâ€, according to the definition of Article 3 (1) of the Protocol against the Smuggling of Migrants by Land, Sea and Air – commonly referred to as the Migrant Smuggling Protocol – supplementing the United Nations Convention Against Transnational Organized Crime. In order to comply with the Migrant Smuggling Protocol, Article 6 also requires States to criminalize both smuggling of migrants and enabling of a person to remain in a country illegally in order to obtain, directly or indirectly, a financial or other material benefit as well as aggravating circumstances that endanger lives or safety, or entail inhuman or degrading treatment of migrants. By virtue of Article 5, migrants shall not become liable to criminal prosecution for the fact of having been smuggled under the Migrant Smuggling Protocol. It is therefore to be understood that the Migrant Smuggling Protocol aims to target migrant smugglers, not the people being smuggled. While most researchers refer to the Migrant Smuggling Protocol, some authors have developed a broader definition referring to the sociological characteristics of migrant smuggling. According to Van Liempt, a broader definition is necessary in order to properly reflect the changing character of intermediary structures in international migration processes and to shed a light on the possible criminal character of smuggling. From a sociological perspective, migrant smuggling may then include every act lying on a continuum between altruism and organized crime. Doomernik defines migrant smuggling as “every act whereby an immigrant is assisted in crossing international borders whereby this crossing is not endorsed by the government of the receiving state, neither implicitly nor explicitlyâ€. To the extent that the literature available making a distinction to be made, the issues of “irregular migration†and “trafficking in persons†are deliberately not covered per se by this thematic review, despite the fact that these phenomena are closely connected with migrant smuggling in practice. The overall objective of the report is to enhance the concrete understanding of this phenomenon by looking at the following issues: - Chapter 2 will look at legal definitions of closely connected issues and the conceptualization of migrant smuggling; - Chapter 3 will look at the methodology currently applied for researching migrant smuggling; - Chapter 4 will discuss the strengths and limitations of the methods used to quantify irregular migration and migrant smuggling. It will also consider the current state of knowledge – or lack thereof – regarding smuggling trends, geography and organization of travel in different regions; - Chapter 5 will include a discussion about the motivations (root causes) and profile of smuggled migrants; - Chapter 6 will discuss the profile of migrant smugglers and motivations; - Chapter 7 will analyse smuggler-migrant relationships; - Chapter 8 will discuss the organizational structures of smuggling networks in different regions of the world; - Concrete recruitment processes and fees are discussed in chapter 9. The different methods to smuggle (basic transfer services versus all-inclusive service with travel visa smuggling, forged documents) but also the role of corruption as a cause and consequence of migrant smuggling will be considered; - Chapter 10 will be devoted to the human and social costs of migrant smuggling. The research is based on literature available in English and French language, such as journalistic books, reports and academic articles. Research reports published by international organizations and NGOs were also considered. Neither the annotated bibliography, nor the thematic review pretends to be comprehensive. Rather, they are conceived as a summary of existing knowledge and identified gaps based on the most recent and relevant research available.

Details: Vienna: UNODC, 2010. 163p.

Source: Internet Resource: Accessed September 3, 2010 at: http://www.unodc.org/documents/human-trafficking/Marian/Smuggling_of_Migrants_A_Global_Review.pdf

Year: 2010

Country: International

Keywords: Human Smuggling

Shelf Number: 119735


Author: Association of Certified Fraud Examiners

Title: Report to the Nations on Occupational Fraud and Abuse

Summary: The ACFE's 2010 Report to the Nations on Occupational Fraud and Abuse is based on data compiled from a study of 1,843 cases of occupational fraud that occurred worldwide between January 2008 and December 2009. All information was provided by the Certified Fraud Examiners (CFEs) who investigated those cases. The fraud cases in our study came from 106 nations — with more than 40% of cases occurring in countries outside the United States — providing a truly global view into the plague of occupational fraud. In our 2010 Report, we have, for the first time ever, widened our study to include cases from countries outside the United States. This expansion allows us to more fully explore the truly global nature of occupational fraud and provides an enhanced view into the severity and impact of these crimes. Additionally, we are able to compare the anti-fraud measures taken by organizations worldwide in order to give fraud fighters everywhere the most applicable and useful information to help them in their fraud prevention and detection efforts.

Details: Austin, TX: ACFE, 2010. 83p.

Source: Internet Resource: Accessed September 3, 2010 at: http://www.acfe.com/rttn/rttn-2010.pdf

Year: 2010

Country: International

Keywords: Commercial Crimes

Shelf Number: 119736


Author: World Health Organization

Title: Preventing Intimate Partner and Sexual Violence Against Women: Taking action and Generating Evidence

Summary: Intimate partner and sexual violence affect a large proportion of the population – with the majority of those directly experiencing such violence being women and the majority perpetrating it being men. The harm they cause can last a lifetime and span generations, with serious adverse affects on health, education and employment. The primary prevention of these types of violence will therefore save lives and money – investments made now to stop intimate partner and sexual violence before they occur will protect the physical, mental and economic well-being and development of individuals, families, communities and whole societies. This document aims to provide sufficient information for policy-makers and planners to develop data-driven and evidence-based programmes for preventing intimate partner and sexual violence against women and is divided into the following chapters: Chapter 1 outlines the nature, magnitude and consequences of intimate partner and sexual violence within the broader typology of violence. Chapter 2 identifies the risk and protective factors for such violence and the importance of addressing both risk and protective factors in prevention efforts. Chapter 3 summarizes the scientific evidence base for primary prevention strategies, and describes programmes of known effectiveness, those supported by emerging evidence and those that could potentially be effective but have yet to be sufficiently evaluated for their impact. Chapter 4 presents a six-step framework for taking action, generating evidence and sharing results. In the closing section, several future research priorities are outlined and a number of key conclusions drawn.

Details: Geneva: World Health Organization, 2010. 94p.

Source: Internet Resource: Accessed September 3, 2010 at: http://whqlibdoc.who.int/publications/2010/9789241564007_eng.pdf

Year: 2010

Country: International

Keywords: Battered Women

Shelf Number: 119737


Author: Keller, Dennis E.

Title: U.S. Military Forces and Police Assistance in Stability Operations: The Least-Worst Option to Fill the U.S. Capacity Gap

Summary: Establishing an effective local police force is one of the most critical elements of successful counterinsurgency (COIN) and stability operations, but it is a task for which the U.S. Government is the least prepared and capable. The establishment of an effective police force is critical to security sector reform, justice sector reform, and the successful transition to the host nation’s security forces. But the United States lacks the institutional capacity to provide an immediate and coordinated civilian police training and advisory effort, particularly in a failed or fragile state. Because hesitation in addressing such problems causes delays in forming and training new police forces, and, even worse, emboldens corrupt and abusive locals who enable insurgents, terrorist groups, and organized criminal networks, the U.S. military must be prepared to support stability operations at regional level and below by assessing, advising, and even training police units until such time as civilian police trainers and mentors arrive on the ground. Army doctrine emphasizes the importance of community-focused civilian police forces during stability operations and suggests that clear separation of police and military roles is essential to successful rebuilding. Doctrine also recognizes that military forces may have to perform police functions during the initial response. But history is replete with examples of local police becoming targets of opportunity for insurgencies; having trained, operationally ready police is always important and no more so than in current operations in Afghanistan and Iraq. At one time, the U.S. Government had a better institutional response than it does now. From 1954 to 1974, first the International Cooperation Administration (ICA), and then its successor organization, the U.S. Agency for International Development (USAID), established in 1961, presented balanced programs providing technical advice, training, and equipment for civil and paramilitary police organizations. In 1963, USAID established the International Police Academy in Washington, DC, to train foreign police officers. At its peak, the USAID arm had 590 permanent employees, to include staff at the International Police Academy, and advisors in 52 countries at different times. This academy graduated over 5,000 students from 77 countries until it was closed because of congressional fears that the program approved, advocated, or taught torture techniques that had damaged the image of the United States. Thus, legislation was passed that prohibited foreign assistance funds for training and financial support of law enforcement forces within or outside the United States. The reluctance to be associated with local police continues to haunt U.S. Government efforts to train police of fragile and failed states to this day. As a result, the U.S. Government continues to lack the capacity for timely deployment of civilian police trainers in the early phases of stability operations. Using military personnel to train and advise civilian police is being justifiably criticized. Military personnel, even military police, are not prepared to train and advise civilian police in most tasks. Instead, their training is skewed toward the higher end stability policing tasks such as riot control, convoy security, motorized patrolling, establishing checkpoints, and weapons training. The emphasis on such tasks makes it more difficult to transition to community-based policing. A clear delineation needs to be established between stability policing and community-based policing, with phased transitions as appropriate. Focusing only on the technical skills must cease, while instruction in such normative principles as responsiveness to the community, accountability to the rule of law, defense of human rights, and transparency to scrutiny from the outside, must be institutionalized. Such an adjustment will result in an organizational culture that abjures abuse. Such success will require embedding of quality advisors for a significant period of time, though even then expectations must be kept realistic.

Details: Carlisle, PA: U.S. Army War College, Strategic Studies Institute, 2010. 57p.

Source: Internet Resource: PKSOI Paper: Accessed September 7, 2010: http://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=1013

Year: 2010

Country: International

Keywords: Corruption

Shelf Number: 119757


Author: Welsh, Brandon P.

Title: Effects of Improved Street Lighting on Crime

Summary: Improved street lighting serves many functions and is used in both public and private settings. The prevention of personal and property crime is one of its objectives in public space, which is the main focus of this review. There are two main theories of why improved street lighting may cause a reduction in crime. The first suggests that improved lighting leads to increased surveillance of potential offenders (both by improving visibility and by increasing the number of people on the street) and hence to increased deterrence of potential offenders. The second suggests that improved lighting signals community investment in the area and that the area is improving, leading to increased community pride, community cohesiveness, and informal social control. The first theory predicts decreases in crime especially during the hours of darkness, while the second theory predicts decreases in crime during both daytime and nighttime. Results of this review indicate that improved street lighting significantly reduces crime. This lends support for the continued use of improved street lighting to prevent crime in public space. The review also found that nighttime crimes did not decrease more than daytime crimes. This suggests that a theory of street lighting focusing on its role in increasing community pride and informal social control may be more plausible than a theory focusing on increased surveillance and increased deterrence. Future research should be designed to test the main theories of the effects of improved street lighting more explicitly, and future light.

Details: Oslo: Campbell Collaboration, 2008. 54p.

Source: Internet Resource: Campbell Systematic Review, 2008:13: Accessed September 8, 2010 at: http://campbellcollaboration.org/lib/download/233/

Year: 2008

Country: International

Keywords: Crime Prevention

Shelf Number: 119765


Author: Welsh, Brandon C.

Title: Effects of Closed Circuit Television Surveillance on Crime

Summary: Closed circuit television (CCTV) surveillance cameras serve many functions and are used in both public and private settings. The prevention of personal and property crime is among the primary objectives in public space, which is the main focus of this review. CCTV is viewed as a technique of “formal surveillance†and in this regard it is seen to enhance or take the place of security personnel. Results of this review indicate that CCTV has a modest but significant desirable effect on crime, is most effective in reducing crime in car parks, is most effective when targeted at vehicle crimes (largely a function of the successful car park schemes), and is more effective in reducing crime in the United Kingdom than in other countries. These results lend support for the continued use of CCTV to prevent crime in public space, but suggest that it be more narrowly targeted than its present use would indicate. Future CCTV schemes should employ high-quality evaluation designs with long follow-up periods.

Details: Oslo: Cambell Collaboration, 2008. 76p.

Source: Internet Resource: Campbell Systematic Reviews, 2008: 17: Accessed September 8, 2010 at: http://campbellcollaboration.org/lib/download/243/

Year: 2008

Country: International

Keywords: Closed-Circuit Television

Shelf Number: 119767


Author: Council of Europe

Title: The Protection of Historic Buildings and Their Artistic Contents Against Crime and Wilful Damage: Proceedings

Summary: The legal protection of historic buildings, including their artistic contents, creates a judicial framework aimed at preventing protected objects from being destroyed, damaged or stolen. This also implies practical measures and technical means to ensure the security of historic buildings. It is generally agreed that threats due to - rather exceptional - natural causes and the daily action of atmospheric factors are in fact less dangerous for cultural property than those caused by people themselves: inappropriate actions due to ignorance, insufficient maintenance due to neglect or worse, theft, vandalism. Movable art treasures in religious buildings are particularly at risk. This colloquy presented and discussed measures taken for the protection of the heritage against theft, vandalism and fire. It evaluated them in the general context of the protection and the conservation of historic buildings in Europe. The aim of this colloquy was also to begin, on this basis, to consider ways of fighting these scourges, bearing in mind, amongst others, the possibilities given by recent developments in advanced technology. This event addressed specialists in the protection and conservation of the heritage, representatives of firms producing systems (against fire, theft and vandalism), policemen and other categories of people specialising in the prevention and the fight against this type of crime.

Details: Strasbourg: Council of Europe Press, 1995. 168p.

Source: Internet Resource: Accessed September 10, 2010 at: http://www.coe.int/t/dg4/cultureheritage/heritage/resources/Publications/Pat_PC_33_en.pdf

Year: 1995

Country: International

Keywords: Arson

Shelf Number: 116661


Author: Planitzer, Julia

Title: Guiding Principles on Memoranda of Understanding Between Key Stakeholders and Law Enforcement Agencies on Counter-Trafficking Cooperation

Summary: One of the main objectives of the United Nations Global Initiative to Fight Human Trafficking (UN.GIFT) is to prosecute the perpetrators involved in trafficking in human beings while protecting the rights and well-being of trafficked persons. In order to achieve this goal, effective formalized cooperation between a broad range of stakeholders, such as law enforcement agencies and specialized service providers, is essential. Cooperation between similar agencies and intraagency cooperation is also essential. Fostering cooperation between law enforcement agencies and other stakeholders in fighting human trafficking has been a major component of the comprehensive approach taken by the International Organization for Migration (IOM) towards combating trafficking in human beings, particularly, the building of operational and institutional links between specialized service providers, labour inspectors and other law enforcement agencies. IOM’s experience has demonstrated that personal relationships based on trust often play the most important role in enabling effective and open cooperation between different institutions and law enforcement agencies. While informal cooperation has often brought success, it is hazardous in the absence of clear protocols for cooperation, and does not contribute to the longer term goal of establishing multi-stakeholder systems and structures. Formalized cooperation, such as Memoranda of Understanding (MoU), clearly identifies the driving principles of such cooperation, and contributes to the building of mutual trust and the development of a common understanding on the objectives and policies of the different parties.

Details: Vienna: International Organization for Migration, 2009. 127p.

Source: Internet Resource: Accessed September 10, 2010 at: http://www.ungift.org/docs/ungift/pdf/humantrafficking/Guiding_Principles_annexe.pdf

Year: 2009

Country: International

Keywords: Forced Labor

Shelf Number: 119782


Author: Willison, Robert

Title: Overcoming the Insider: Reducing Employee Computer Crime Through Situational Crime Prevention

Summary: Employee computer crime represents a substantial threat for organisations. Yet information security researchers and practitioners currently lack a clear understanding of how these crimes are perpetrated, which, as a consequence, hinders security efforts. We argue that recent developments in criminology can assist in addressing the insider threat. More specifically, we demonstrate how an approach, entitled Situational Crime Prevention, can not only enhance an understanding of employee computer crime, but also strengthen security practices which are designed to address this problem.

Details: Frederiksberg, Denmark: Copenhagen Business School, Department of Informatics, 2006. 18p.

Source: Internet Resource: Working Paper No. 11: Accessed September 13, 2010 at: http://openarchive.cbs.dk/bitstream/handle/10398/6456/11_2006.pdf?sequence=1

Year: 2006

Country: International

Keywords: Computer Crimes

Shelf Number: 119786


Author: Bartlett, Jamie

Title: The Power of Unreason: Conspiracy Theories, Extremism and Counter-Terrorism

Summary: Conspiracy theories have become a mainstream cultural phenomenon. This paper considers the role they play in extremist groups and counterterrorism work. It presents the first ever analysis of conspiracy theories in the ideology and propaganda of fifty extremist groups: religious, far-right and left, eco, anarchic and cult-based. It is argued that conspiracy theories are a ‘radicalising multiplier', which feed back into the ideologies, internal dynamics and psychological processes of extremist groups in three ways. Firstly, they create demonologies of ‘the enemy’ that the group defines itself against. Secondly, they delegitimise voices of dissent and moderation. And thirdly, they encourage a group or individuals to turn to violence, because it acts as rhetorical devices to portray violence as necessary to ‘awaken’ the people from their acquiescent slumber. More broadly, conspiracy theories drive a wedge of distrust between governments and particular communities which can hinder community-level efforts to fight violent extremism. It is, however, difficult for government to tackle conspiracies. The paper calls for government institutions to be more open, investment to enable young people to think critically and recognise propaganda, and for civil society to play a proactive role.

Details: London: Demos, 2010. 53p.

Source: Internet Resource: Accessed September 14, 2010 at: http://www.demos.co.uk/files/Conspiracy_theories_paper.pdf?1282913891

Year: 2010

Country: International

Keywords: Counter-Terrorism

Shelf Number: 119795


Author: Mejia, Daniel

Title: The War on Illegal Drugs in Producer and Consumer Countries: A Simple Analytical Framework

Summary: This paper develops a model of the war against illegal drugs in both producer and consumer countries. The paper studies the trade-off faced by the government of the drug consumer country between prevention policies (aimed at reducing the demand for drugs) and enforcement policies (aimed at reducing the production and trafficking of drugs), and shows how the optimal allocation of resources between these two alternatives depends on the key parameters of the model. We use available data for the war on drugs in Colombia, and against consumption in the U.S., to calibrate the unobservable parameters of the model, such as the price elasticity of demand for cocaine; the effectiveness of prevention and treatment policies; and the relative effectiveness of interdiction efforts.

Details: Munich: CESifo, 2008. 23p.

Source: Internet Resource: CESifo Working Paper, No. 2459: Accessed September 14, 2010 at: http://www.cesifo.de/DocCIDL/cesifo1_wp2459.pdf


Year: 2008

Country: International

Keywords: Drug Enforcement

Shelf Number: 119800


Author: King, Rawle O.

Title: Ocean Piracy and Its Impact on Insurance

Summary: Many Members of 111th Congress are concerned about the sharp rise in pirate attacks in the strategic waterways in the Gulf of Aden off the East coast of Africa. The hijacking of a Saudi Arabia-owned oil tanker, Sirius Star, off the coast of Kenya on November 15, 2008, by pirates, and its release after a $3 million ransom payment on January 8, 2009, was another in a series of seizures and releases that have focused worldwide attention on economic and humanitarian threats posed by pirates to the global seafaring community and the smooth flow of international trade. Given the sharp increase in the number of pirate attacks, the cost of transporting cargo in international waters could rise dramatically because of the sharp increase in ocean marine insurance rates for ships transiting the Gulf of Aden. Commercial insurers, for example, could require a special war risk insurance premium costing an additional ten of thousands of dollars a day. These additional costs could adversely impact international trade during the current global economic slowdown. In addition to proposals for military deterrence and diplomatic engagements, policymakers may elect to consider adjustments to the federal statute (Title XII of the Merchant Marine Act of 1936, as amended) that authorizes the federal government to underwrite marine war risk insurance in circumstances such as piracy. Title XII, administered by the U.S. Department of Transportations Maritime Administration, authorizes the federal government to act as an insurer or reinsurer of last resort to facilitate waterborne commerce should private ocean marine insurance markets not be able to ensure that financial losses due to war risks (and piracy) will be largely covered. Policymakers may also elect to maintain the status quo on this statutory authority. The property and casualty insurance industry policyholder surplus is calculated to be approximately $505 billion (as of June 2008). Vessel hull and war risk premiums in the U.S. market paid to insurers totaled approximately $350 million in 2007, and the total value of cargo insurance premiums paid in that year was approximately $833 million, according to industry data. Some may contend, as a result, that the insurance industry appears to be financially capable of handling U.S. exposure to the current piracy threat and that the existing policy backstop will be adequate. This report will be updated as events warrant.

Details: Washington, DC: Congressional Research Service, 2008. 10p.

Source: Internet Resource: Accessed September 15, 2010 at: http://assets.opencrs.com/rpts/R40081_20090206.pdf

Year: 2008

Country: International

Keywords: Costs of Crime

Shelf Number: 119809


Author: Lipsey, Mark W.

Title: Effects of Cognitive-Behavioral Programs for Criminal Offenders

Summary: Cognitive-behavioral therapy (CBT) is among the more promising rehabilitative treatments for criminal offenders. Reviews of the comparative effectiveness of different treatment approaches have generally ranked it in the top tier with regard to effects on recidivism (e.g., Andrews et al., 1990; Lipsey & Wilson, 1998). It has a well-developed theoretical basis that explicitly targets “criminal thinking†as a contributing factor to deviant behavior (Beck, 1999; Walters, 1990; Yochelson & Samenow, 1976). And, it can be adapted to a range of juvenile and adult offenders, delivered in institutional or community settings by mental health specialists or paraprofessionals, and administered as part of a multifaceted program or as a stand-alone intervention. Meta-analysis has consistently indicated that CBT, on average, has significant positive effects on recidivism. However, there is also significant variation across studies in the size of those treatment effects. Identification of the moderator variables that describe the study characteristics associated with larger and smaller effects can further develop our understanding of the effectiveness of CBT with offenders. Of particular importance is the role such moderator analysis can play in ascertaining which variants of CBT are most effective. The objective of this systematic review is to examine the relationships of selected moderator variables to the effects of CBT on the recidivism of general offender populations.

Details: Oslo: Campbell Collaboration, 2007. 27p.

Source: Internet Resource: Campbell Systematic Review, 2007:6: Accessed September 16, 2010 at: http://www.campbellcollaboration.org/lib/download/143/

Year: 2007

Country: International

Keywords: Offenders

Shelf Number: 119821


Author: Feder, Lynette

Title: Court-Mandated Interventions for Individuals Convicted of Domestic Violence

Summary: Survey research and analysis of police records, hospital emergency rooms and women’s shelters have clearly established the severity of the domestic violence problem and the need to find programs to address this issue. Today, court-mandated batterer intervention programs (BIPs) are being implemented throughout the United States as one of the leading methods to address this problem. These programs emerged from the women’s shelter movement and therefore contained a strong feminist orientation. They developed as group-based programs, typically using psychoeductional methods. Their aim was to get men to take responsibility for their sexist beliefs and stop abusing their partners by teaching them alternative responses for handling their anger. The aim of this systematic review is to assess the effects of post-arrest court-mandated interventions (including pre-trial diversion programs) for domestic violence offenders that target, in part or exclusively, batterers with the aim of reducing their future likelihood of re-assaulting above and beyond what would have been expected by routine legal procedures.

Details: Oslo: Cambell Collaboration, 2008. 49p.

Source: Internet Resource: Campbell Systematic Reviews, 2008:12: Acccessed September 16, 2010 at: http://www.campbellcollaboration.org/lib/download/218/

Year: 2008

Country: International

Keywords: Battered Women

Shelf Number: 119822


Author: Atabay, Tomris

Title: Handbook for Prison Managers and Policymakers on Women and Imprisonment

Summary: The present handbook forms part of a series of tools developed by The United Nations Office on Drugs and Crime to support countries in implementing the rule of law and the development of criminal justice reform. It is designed to be used by all actors involved in the criminal justice system, including policymakers, legislators, prison managers, prison staff, members of non-governmental organizations and other individuals interested or active in the field of criminal justice and prison reform. It can be used in a variety of contexts, both as a reference document and as a training tool. The main focus of the handbook is female prisoners and guidance on the components of a gender-sensitive approach to prison management, taking into account the typical background of female prisoners and their special needs as women in prison.

Details: New York: United Nations, 2008. 117p.

Source: Internet Resource: Criminal Justice Handbook Series: Accessed September 22, 2010 at: http://www.unodc.org/documents/justice-and-prison-reform/women-and-imprisonment.pdf

Year: 2008

Country: International

Keywords: Correctional Institutions

Shelf Number: 113390


Author: Kishor, Sunita

Title: Profiling Domestic Violence: A Multi-Country Study

Summary: This study uses household and individual-level data from the Demographic and Health Surveys (DHS) program to examine the prevalence and correlates of domestic violence and the health consequences of domestic violence for women and their children. Nationally representative data from nine countries—Cambodia (2000), Colombia (2000), the Dominican Republic (2002), Egypt (1995), Haiti (2000), India (1998-1999), Nicaragua (1998), Peru (2000), and Zambia (2001-2002)—are analyzed within a comparative framework to provide a multifaceted analysis of the phenomenon of domestic violence.

Details: Calverton, MD: ORC Macro, 2004. 120p.

Source: Internet Resource: Accessed September 22, 2010 at: http://www.measuredhs.com/pubs/pdf/OD31/OD31.pdf

Year: 2004

Country: International

Keywords: Battered Women

Shelf Number: 113399


Author: Jackson, Mervyn S.

Title: Development of a Tourist Personality Inventory to Evaluate Parameters Associated with Tourist Crime Victimization

Summary: An extensive literature review led to the conclusion that there has been minimal research into key psychological parameters associated with tourist crime victimization. Three series of four studies were completed that defined “touristsâ€; developed an inventory that assessed tourist personality; evaluated the psychometrics of this inventory; and, then determined the role of key psychological parameters in tourist crime victimization. The first series of studies (Chapter 2) focused on defining a “touristâ€. The series began with an archival study that found that tourists had (historically) been described along three dimensions: quest for novelty (versus familiarity); reliance on (or independent from) the tourist industry; and, a motivation to seek and interact with hosts (versus vacations for rest and relaxation). The second (qualitative) study determined that tourist academics described the “tourist†using four themes: who (psychographics and demographics); does what (travel behaviours); with and to whom (cotravellers and hosts); and, where (destination factors). This qualitative study was successfully triangulated with a third (quantitative) lexical study. The final study in this first series utilized the extremes of the historical dimensions and described them in terms of the four themes. The extremes of the personality dimension were labelled “Allocentricism†and “Psychocentricismâ€. The second series of studies (Chapter 3) described the development and evaluation of a tourist personality inventory that empirically measured “Allocentricism-Psychocentricismâ€. The first in this series of studies utilized empirical assessment guidelines to develop a reliable and (face, content) valid inventory. The second study determined criterion validity and found Allocentricism was not related to Extraversion, but was substantially measuring Openness (to new experiences). The third study found that while the Tourist Personality Inventory could predict tourist destination preferences, it failed to predict actual tourist destination choice. It was found that social environmental factors (money, opportunity, time) also influenced tourist decision-making. The final study in Chapter 3 confirmed that travel behaviours under the control of the tourist were predicted by the tourist personality inventory. The final series of four studies (Chapter 4) described four tourist personality types, determined that these tourist types were not culturally universal but had good predictive validity when evaluating Australian inbound and domestic tourists. The final study in this series found that the Allocentric Tourist Personality Inventory predicted tourist crime victimization, but failed to predict post crime reporting behaviour of tourist victims. It was concluded that a reliable and valid measure of tourist personality had been developed and that further research can now occur in the area of tourist crime victimization. The limitations of these studies and future directions for research were discussed.

Details: Unpublished dissertation, RMIT (Royal Melbourne Institute of Technology) University, 2006. 350p.

Source:

Year: 2006

Country: International

Keywords: Tourists and Crime

Shelf Number: 115227


Author: Perelygin, Alexander

Title: Metal Fingerprint: Countering Illicit Trade in Precious Metals and Gemstones

Summary: International efforts to disrupt terrorist and organized crime networks must pay special attention to how these networks are financed. Global trade in precious metals and gemstones has become a significant source of financing for both organized crime and terrorist groups. As the demand for materials bearing precious metals and stones continues to grow, criminal and terrorist networks will exploit weak national and international monitoring of the trade to finance activities that threaten us all. Public-private partnerships offer a real chance of increasing transparency and monitoring in the trade of precious metals and gemstones, thus undermining the financial foundation of global terrorist networks. Serious efforts have been undertaken by governments, international organizations, and the global business community to stem illegal trade in many commodities used in money laundering and terrorist financing—especially since the terrorist attacks of September 11, 2001, in the United States. Significant success has been seen in disrupting the trade of illegal rough diamonds through the Kimberly Process. But success has been elusive in the illegal trafficking of precious metals and gemstones. Efficient law enforcement in this area is hampered by the lack of internationally recognized procedures for certifying batches of primary precious metals-bearing raw materials and a lack of well-established methods of identifying the origin of both precious metals and gemstones. These shortcomings complicate the process of distinguishing between legal and criminal supplies and place a substantially greater burden on the due diligence efforts of precious metals refiners and stonecutters to ascertain the veracity of their customers. Russian research institutes and forensic laboratories, led by the mining and metallurgical company Norilsk Nickel, have devised advanced methods to identify the origin of semi-products bearing platinum-group metals (PGM). This methodology can be expanded to other metal groups and gemstones, taking the form of a Platinum Initiative to ensure efficient certification procedures in the international metal trade and strengthen existing certification schemes in the diamond and gemstones industries. In July 2007, an informal international working group, including experts from the private sector, government, and independent think tanks, was established under the auspices of the G8 in order to explore the potential of the Platinum Initiative. The conclusions and recommendations formulated in this policy paper are to a large extent based on the initial findings discussed at the first three meetings of this Working Group held in July and October 2007 and February 2008. Key Recommendations include the following: Develop the Platinum Initiative into a strong industry-focused program that includes: an international register of verified and legitimate traders in PGM; enhanced customs control procedures to identify PGM-bearing goods; internationally shared databases of PGM-bearing raw materials; enhanced control measures in mining and metallurgical companies; an international network of certified forensic and expert laboratories capable of tracing the origins of the goods and commodities in question. Coordinate the enforcement mechanisms of the Platinum Initiative with the relevant international organizations—in particular, the World Customs Organization (WCO), appropriate UN agencies, the Financial Action Task Force (FATF), and the G8 governments. Incorporate data on platinum-metals bearing goods and materials into the existing WCO framework using tracking systems such as the Harmonized Commodity Description and Coding System and the Customs Enforcement Network. Establish standardized procedures for information-sharing between national law enforcement agencies and PGM-producing companies to respond rapidly to the appearance of suspicious consignments of unfinished precious metals-bearing materials on the market. Strengthen the implementation and regulatory framework of the World Bank’s anti-money laundering (AML) program to reflect the significant role of illegal precious metals trading as an instrument of terrorist financing.

Details: New York: East West Institute, 2008. 11p.

Source: Internet Resource: Policy Paper 4/2008: Accessed October 9, 2010 at: http://www.ewi.info/metal-fingerprint-countering-illicit-trade-precious-metals-and-gemstones

Year: 2008

Country: International

Keywords: Illegal Trade

Shelf Number: 119899


Author: Roberts, Julian V.

Title: Public Opinion and the Jury: An International Literature Review

Summary: There is substantial literature on the legal institution of the jury and on the experiences of jurors. However less is known about public attitudes to juries. This report sought to help address this knowledge gap. It draws together findings from the small number of quantitative surveys that have asked the general public questions on this subject. It focuses on survey findings from England and Wales, but also considers international research. The report indicates high levels of confidence in the jury amongst the general public.

Details: London: Ministry of Justice, 2009. 50p.

Source: Internet Resource: Ministry of Justice Research Series 1/09: Accessed October 9, 2010 at: http://www.justice.gov.uk/publications/docs/public-opinion-and-the-jury-by-roberts-and-hough-web(1).pdf

Year: 2009

Country: International

Keywords: Juries

Shelf Number: 114353


Author: Hartelius, Jonas

Title: A Draft Convention on Illicit Trade in Precious Metals and Precious Gems

Summary: Unregulated or illegal production and trade in precious metals, such as platinum, and precious gems, such as diamonds, have become a source of funding for conflicts. Efforts to curb and control the illegal handling of such metals and gems have had only limited success to date. An over-arching legal framework has been lacking. Considering the need for an international framework, the EastWest Institute and the Swedish Carnegie Institute have commissioned Jonas Hartelius, Senior Fellow at EWI and Scientific Adviser to the SCI, to draft a proposed convention for the United Nations. Such a convention would provide a legal framework for efforts by all parties involved to create a transparent and responsible trade in such metals and gems. The publishers hope this draft for a convention will initiate further discussions.

Details: New York: EastWest Institute and Swedish Carnegie Institute, 2009. 46p.

Source: Internet Resource: Accessed October 9, 2010 at: http://www.ewi.info/draft-convention-illicit-trade-precious-metals-and-precious-gems

Year: 2009

Country: International

Keywords: Illicit Trade

Shelf Number: 119904


Author: International Organization for Migration

Title: Human Trafficking: New Directions for Research

Summary: As part of the UN Global Initiative to Fight Human Trafficking (UN.GIFT), a two-day meeting of research experts was organized by IOM, in collaboration with UNODC and ILO. The meeting took place in Cairo on the 11th and 12th of January 2008. The overall objective of the meeting was to contribute to the prevention and elimination of human trafficking by developing a set of recommendations to promote new ways of studying trafficking and to enhance the quality of research on the subject. The research initiative also responds directly to one of UN.GIFT’s three strategic goals: to broaden the knowledge base of data, facts and research on trafficking. The report includes 10 papers from the meeting: four address "conceptual and data issues," while the remaining six present overviews of the status of research on trafficking in specific regions (Asia, Europe, Middle East and North Africa, North America, and Latin America and the Caribbean).

Details: Geneva: IOM, 2008. 190p.

Source: Internet Resource: Accessed October 9, 2010 at: http://www.iom.int/jahia/webdav/shared/shared/mainsite/microsites/IDM/workshops/ensuring_protection_070909/human_trafficking_new_directions_for_research.pdf

Year: 2008

Country: International

Keywords: Human Trafficking

Shelf Number: 117677


Author: Lawson, Sam

Title: Illegal Logging and Related Trade: Indicators of the Global Response: Country Report Cards

Summary: This report card assesses the imports of illegally sourced wood, the government response, the private-sector response, media attention and areas for improvement for Brazil, Cameroon, Ghana, Indonesia, Malaysia, China, Vietnam, UK, United States, The Netherlands, France and Japan.

Details: London: Chatham House, 2010. 12p.

Source: Internet Resource: Accessed October 12, 2010 at: http://www.chathamhouse.org.uk/research/eedp/papers/view/-/id/913/

Year: 2010

Country: International

Keywords: Illegal Logging

Shelf Number: 119934


Author: Bajaj, Kamlesh

Title: The Cybersecurity Agenda: Mobilizing for International Action

Summary: Cyberspace comprises IT networks, computer resources, and all the fixed and mobile devices connected to the global Internet. A nation’s cyberspace is part of the global cyberspace; it cannot be isolated to define its boundaries since cyberspace is borderless. This is what makes cyberspace unique. Unlike the physical world that is limited by geographical boundaries in space—land, sea, river waters, and air—cyberspace can and is continuing to expand. Increased Internet penetration is leading to growth of cyberspace, since its size is proportional to the activities that are carried through it. Cyberspace merges seamlessly with the physical world. So do cyber crimes. Cyber attackers can disrupt critical infrastructures such as financial and air traffic control systems, producing effects that are similar to terrorist attacks in the physical space They can also carry out identity theft and financial fraud; steal corporate information such as intellectual property; conduct espionage to steal state and military secrets; and recruit criminals and others to carry out physical terrorist activities. Anyone can exploit vulnerabilities in any system connected to the Internet and attack it from anywhere in the world without being identified. As the Internet and new technologies grow, so do their vulnerabilities. Knowledge about these vulnerabilities and how to exploit them are widely available on the Internet. During the development of the global digital Internet and communications technology (ICT) infrastructure, the key considerations were interoperability and efficiency, not security. The explosion of mobile devices continues to be based on these insecure systems of Internet protocols. It is increasingly cheap to launch cyber attacks, but security systems are getting more and more expensive. This growing asymmetry is a game changer. It has another dimension, too—individuals, terrorists, criminal gangs, or smaller nations can take on much bigger powers in cyberspace, and through it, in the physical world, as well. The effects of attacks on critical infrastructure such as electricity and water supplies are similar to those that would be caused by weapons of mass destruction, without the need for any physical attacks. Proving attribution in cyberspace is a great challenge. In most cases, it is extremely difficult to attribute cyber attacks to nation-states, collecting irrefutable evidence. The very nature of botnets and zombies makes it difficult to do so, leading to the conclusion that “the Internet is the perfect platform for plausible deniability.†Nations are developing cyber attack capabilities with a view to dominating cyberspace. However, unilateral dominance in cyberspace is not achievable by any country. But uncontrolled growth of cyber attack capabilities—in effect, cyber attack proliferation — is an increasingly troubling phenomenon. Yet another disturbing reality is that cyber attacks can be launched ever more easily, and propagated faster using the same broadband that nations are building for global e-commerce. Finally, the consequences of a cyber attack are more likely to be indirect and more uncertain than most scenarios currently envision; we may not always recognize the damage inflicted by cyber attackers. Cybersecurity is a global problem that has to be addressed globally by all governments jointly. No government can fight cybercrime or secure its cyberspace in isolation. Cybersecurity is not a technology problem that can be ‘solved’; it is a risk to be managed by a combination of defensive technology, astute analysis and information warfare, and traditional diplomacy. Cyber attacks constitute an instrument of national policy at the nexus of technology, policy, law, ethics, and national security. Such attacks should spur debate and discussion, without any secrecy, both inside and outside governments at national and international levels. This is all the more so because of the growing number of significant actors not tied to, or even loosely affiliated with, nation-states. Over the last few months, events in cyberspace such as the GhostNet attacks on governments and large multinational corporations, whether to steal intellectual property or attack free speech, bear this out. They are not restricted by geographical borders or national laws. There is an added dimension to this problem: the infrastructures are owned and operated by the private sector, and cyberspace passes through various legal jurisdictions all over the world. Each government has to engage in supporting its private sector for cybersecurity through effective public-private partnership (PPP) models, with clearly-defined roles for government and industry. Because cyberspace is relatively new, legal concepts for ‘standards of care’ do not exist. Should governments create incentives to generate collective action? For example, they could reduce liability in exchange for improved security, or introduce tax incentives, new regulatory requirements, and compliance mechanisms. Nations have to take appropriate steps in their respective jurisdictions to create necessary laws, promote the implementation of reasonable security practices, incident management, and information sharing mechanisms, and continuously educate both corporate and home users about cybersecurity. International cooperation is essential to securing cyberspace. When it comes to tracking cyber criminals, it is not only the laws dealing with cyber crimes that must exist in various countries, but the collection of appropriate cyber forensics data in various jurisdictions and their presentation in courts of law, which are essential to bring criminals to justice in sovereign countries.

Details: Washington, DC: EastWest Institute, 2010. 24p.

Source: Internet Resource: Accessed October 13, 2010 at: http://www.ewi.info/system/files/Bajaj_Web.pdf

Year: 2010

Country: International

Keywords: Computer Crimes

Shelf Number: 119942


Author: ECPAT International: Constant, Sedrine

Title: Monitoring State Progress to Protect Children & Young People from Trafficking for Sexual Purposes. A Call for Accelerated Action from States: It's In Your Hands!

Summary: Despite the acknowledged obligation to afford special protection and care to children, which is set out in various international instruments, most countries largely fail to uphold children’s rights in a comprehensive way. Gaps in the framework required for the full protection of a child opens opportunities for exploiters to abuse children and allows the trafficking of children and young people to be perpetuated so that it now accounts as one of the three top most lucrative criminal activities. Ensuring a meticulous and regular monitoring of the measures implemented to protect children and their effectiveness is therefore essential to identifying challenges and priorities and adequately informing policies and programming. Monitoring the implementation of states’ actions to fulfil their commitments on child rights and in particular the right of the child to be protected from sexual exploitation, including trafficking, is the main mandate of ECPAT International. Based on its experiences and the work of its global network, ECPAT International has undertaken to examine progress accomplished by 41 states to secure a safer world for children in line with specific goals and indicators derived from previously agreed international commitments, and in particular the 2008 Rio de Janeiro Declaration and Call for Action to Prevent and Stop Sexual Exploitation of Children4 (a recent outcome of the deliberations of over 3,500 participants at the World Congress III against Sexual Exploitation of Children and Adolescents). To increase the accountability on commitments made to children, this monitoring initiative is a specific activity contributing to raising global awareness and advocacy through the three-year ‘Stop Sex Trafficking of Children and Young People’ campaign conducted in partnership between ECPAT International and The Body Shop. It aims at scrutinising states’ progress to turn binding and moral agreements into concrete positive outcomes for children around the world through specific and measurable actions contributing to the enhancement of global child protection from sex trafficking. Through the campaign, civil society initiatives will simultaneously be stepped up through the work of ECPAT groups and others at the national level and the public, to support governments in fulfilling their responsibilities.

Details: Bangkok, Thailand: ECPAT International; Littlehampton, UK: The Body Shop INternational PLC, 2010. 47p.

Source: Internet Resource: Accessed October 14, 2010 at: http://www.thebodyshop.com/_en/_ww/services/pdfs/Values/Global_Monitoring_ProgressCards.pdf

Year: 2010

Country: International

Keywords: Child Prostitution

Shelf Number: 119954


Author: Ogilvie, James M.

Title: Impact of Police Numbers on Crime

Summary: The purpose of this report is to provide a review of the literature exploring the impact of police resourcing levels (i.e.: staff numbers) and deployment/activities on crime, measured through recorded crime, cleared or resolved crime, apprehension or arrests and/or prosecutions. Research examining the relationship between police numbers and crime has produced conflicting findings. While most studies have found that there is no discernable relationship, several studies suggest that police contribute to reduced crime levels through deterrence, although reductions have been found to vary on the basis of crime type. The review draws no clear conclusions about how the deployment of police (i.e., how they spend their time) impacts on crime. Both police activity and criminal activity are mutually interactive, making any connection between police numbers and crime difficult to explain. The review of the literature supports six broad conclusions: 1. Police employment and crime rates are reciprocally related, meaning that changes in either variable may have flow-on effects to the other. 2. There is evidence to support the assumption that increased crime levels lead to increased police numbers. 3. Theoretical and methodological problems in the study of police strength and crime have contributed to the conflicting results across studies. 4. There is no consistent body of evidence to support the notion that increasing police numbers is an effective method of reducing violent crime. 5. While the most consistent finding across studies is that increasing police numbers has no effect on crime levels, recent studies suggest that increased police numbers are associated with reductions in crime rates for specific crimes. 6. The effects of increased police numbers has been found to vary across a number of factors, including crime types, police activities, organisational structures and environmental demands, and the social characteristics of places. The findings outlined in this report have several implications for modelling the effects of police numbers and activities on crime. Foremost, a broader range of explanatory variables should be considered to parameterise more sophisticated and ecologically valid simulation models of police processes. Additional empirical research is required to disentangle the complex relationships between police numbers, deployment, and activities on recorded crime rates and apprehensions. This research should form the basis of future simulation modelling efforts.

Details: Mt. Gravatt, Australia: Griffith University, Justice Modelling @ Griffith, 2008. 17p.

Source: Internet Resource: Accessed October 15, 2010 at: http://www.griffith.edu.au/__data/assets/pdf_file/0019/208027/Impact-of-Police-Numbers-on-Crime-2008-Report.pdf

Year: 2008

Country: International

Keywords: Police Officers

Shelf Number: 119977


Author: Townsend, Stephanie M.

Title: Sexual Violence Research Initiative: Report of Evaluation Findings

Summary: The Sexual Violence Research Initiative (SVRI) is a global project that promotes research on sexual violence in order to improve policy and service delivery. This report presents an external evaluation of the SVRI and details the methods and findings of that evaluation. Using archival review and key informant interviews, the evaluation assessed key progress indicators and six dimensions of the SVRI's performance: relevance, effectiveness, efficiency, institutional development, complementarity, and sustainability.

Details: Pretoria, South Africa: Sexual Violence Research Initiative, 2010. 84p.

Source: Internet Resource: Accessed October 18, 2010 at: http://www.svri.org/Evaluation2010Report.pdf

Year: 2010

Country: International

Keywords: Sexual Violence

Shelf Number: 119967


Author: Seniora, Jihan

Title: Managing Land Borders and the Trafficking of Small Arms and Light Weapons

Summary: Border controls are an important dimension of the international efforts to combat the uncontrolled proliferation of small arms and light weapons (SALW) and their ammunition. Indeed, even if their relevance sometimes seems to be challenged by some changes (such as new technologies and globalization), borders remain the most visible sign of the sovereignty of a State on its territory. Borders management are crucial to a State’s involvement in the protection of its population. The illicit trafficking of small arms and light weapons (SALW) across green borders is characterized by specific dynamics which must be taken into account in the actions to prevent it: a strong link between cross-border trafficking of SALW and other transnational crimes, the role of transborder communities and the fact that border areas can become a shelter for criminal groups, rebels or traffickers and finally the “ant tradeâ€. Because these aspects have an impact on the demand in arms, the intensity and the direction of the traffics between neighbouring countries, they deserve particular attention in the efforts to strengthen border monitoring and control at checkpoints. For an effective border management several challenges must be highlighted. First, the flow of illicit SALW must be considered a separate issue when conceiving and organising the management. Second, controls at checkpoints must be optimised by clarifying the role of the agencies involved in border management and their human and technical needs according to realities on the ground. Controls at checkpoints must be reinforced by a careful and coordinated monitoring along the border. Measures also need to be taken upstream: national legislations, identification of the actors involved in trafficking by intelligence services, etc. A fourth issue is corruption which affects the very existence of border management. A stronger cooperation between agencies at intra- and inter-level as well as between populations in border areas and the political and administrative authorities can also contribute to a more effective border management. Finally, technology transfers and training, tailored to the needs of each State also prove of great importance.

Details: Brussels: Groupe de recherche et d'information sur la paix et la securite (GRIP), 2010. 24p.

Source: Internet Resource: Accessed October 19, 2010 at: http://www.grip.org/en/siteweb/images/RAPPORTS/2010/2010-3_EN.pdf

Year: 2010

Country: International

Keywords: Border Patrol

Shelf Number: 120011


Author: Isikozlu, Elvan

Title: Towards a Typology of Wartime Rape

Summary: This brief presents the progress to date in developing a typology of wartime rape as a first step toward understanding the different consequences of this form of violence in war. This publication focuses solely on wartime rape perpetrated by armed groups against civilians, though this form of violence is perpetrated more widely by, and against, different actors during war. The wider perpetration of rape against other actors is not presented in this brief, but is nevertheless included in the The Typology is a product of two phases of research: a) an initial phase (November 2008–May 2009) where a preliminary typology was created based on an examination of two country cases of wartime rape: Bosnia and Herzegovina, and El Salvador; and b) a second phase (September 2009–May 2010) where the typology was refined according to data collected from a review of the literature on ten additional country cases of wartime rape (Cambodia, Colombia, Democratic Republic of the Congo, Liberia, Nepal, Papua New Guinea/ Bougainville, Peru, Rwanda, Sierra Leone, Timor Leste). The Typology was designed on the basis of a definition of wartime, which includes a myriad of war dynamics that surround and influence the perpetration of rape, and which can be organized into the following ‘themes’: type of conflict in which wartime rape occurs; characteristics of the armed group; motivations for the rape; characteristics of the rapist; characteristics of the raped person; and characteristics of the rape.

Details: Bonn, Germany: Bonn International Center for Conversion, 2010. 87p.

Source: Internet Resource: BICC Brief 43: Accessed October 19, 2010 at: http://www.bicc.de/uploads/pdf/publications/briefs/brief43/brief43.pdf

Year: 2010

Country: International

Keywords: Rape

Shelf Number: 120012


Author: Allard, Troy

Title: The Efficacy of Strategies to Reduce Juvenile Offending

Summary: The purpose of this report was to examine the national and international research literature relating to the efficacy of a range of strategies to reduce juvenile offending. These strategies were categorised according to Tonry and Farrington’s (1995) framework of four groupings of crime prevention strategies: (i) developmental and early interventions, (ii) law enforcement and criminal justice approaches, (iii) community crime prevention, and (iv) situational crime prevention (SCP). Specifically, the Tender Document (Appendix 1, p. 167) asked the consultants to: (i) Summarise the strategies that are available to reduce juvenile offending/recidivism as identified by Tonry and Farrington (1995). (ii) Examine the key features of programs that have been implemented within each strategy. (iii) Explore the evidence base of each strategy by examining the effectiveness of programs in terms of reducing juvenile offending/recidivism. (iv) Note the cost of programs and outcomes of any cost-benefit evaluations that have been undertaken (if available). (v) Comment on the feasibility of conducting meta-analyses on the various program options. (vi) Based on available evidence, provide a summary of the effectiveness of each strategy. (vii) Where possible, provide an assessment about the effectiveness of programs for Indigenous young people. Studies included in the review were based on the researchers’ knowledge about intervention programs that had been undertaken, recent reviews that had been conducted, and a search of websites that contained some Australian evidence. Research incorporated in the review was focused on preventing juvenile offending and was scientifically robust, usually having a treatment and control group. While focus was placed on interventions that reduced juvenile offending, many interventions discussed are also likely to result in reductions in adult offending. This is not surprising given the high proportion of young people who initiate offending during their teen years which continues into adulthood. It must be acknowledged that while this review focuses on preventing the initiation of offending and recidivism, there may be other positive outcomes to intervention programs. Examining these other outcomes was beyond the scope of this review. A consistent theme throughout this report is the lack of scientifically rigorous Australian research to determine the efficacy of the interventions examined. In Chapter 1, an overview of the methodologies that have been employed to evaluate programs is provided. While systematic reviews and meta-analyses have been conducted on developmental/early intervention and criminal justice approaches, there was little evidence of the evaluations in other areas reaching the standards required for meta-analyses. For our knowledge of ‘what works’ in preventing juvenile offending and re-offending to advance, it is imperative that programs are rigorously evaluated.

Details: Mt. Gravatt, Australia: Griffith University, Justice Modelling@Griffith, 2007. 169p.

Source: Internet Resource: Accessed October 23, 2010 at: http://www.griffith.edu.au/__data/assets/pdf_file/0013/208120/Efficacy-of-Strategies-to-Reduce-JJ-Offending-2007-Report.pdf

Year: 2007

Country: International

Keywords: Crime Prevention

Shelf Number: 120060


Author: U.S. Government Accountability Office

Title: Maritime Security: Actions Needed to Assess and Update Plan and Enhance Collaboration among Partners Involved in Countering Piracy off the Horn of Africa

Summary: Somali pirates operating off the Horn of Africa have attacked more than 450 ships and taken nearly 2,400 hostages since 2007. A small number of U.S.-flagged vessels and ships have been among those affected. As Somalia lacks a functioning government and is unable to repress piracy in its waters, the National Security Council (NSC) developed the interagency Countering Piracy off the Horn of Africa: Partnership and Action Plan (Action Plan) in December 2008 to prevent, disrupt, and prosecute piracy off the Horn of Africa in collaboration with international and industry partners. GAO was asked to evaluate the extent to which U.S. agencies (1) have implemented the plan, and any challenges they face in doing so, and (2) have collaborated with partners in counterpiracy efforts. GAO examined counterpiracy plans, activities, collaborative practices, and data, and interviewed industry and international partners and officials at U.S. agencies and the Combined Maritime Forces in Bahrain. The U.S. government has made progress in implementing its Action Plan, in collaboration with international and industry partners, but pirates have adapted their tactics and expanded their area of operations, almost doubling the number of reported attacks from 2008 to 2009, and the U.S. government has yet to evaluate the costs, benefits, or effectiveness of its efforts or update its plan accordingly. The United States has advised industry partners on self-protection measures, contributed leadership and assets to an international coalition patrolling pirate-infested waters, and concluded prosecution arrangements with Kenya and the Seychelles. Officials credit collaborative efforts with reducing the pirates' rate of success in boarding ships and hijacking vessels in 2009. However, from 2007 to 2009, the most recent year for which complete data were available, the total number of hijackings reported to the International Maritime Bureau increased, ransoms paid by the shipping industry increased sharply, and attacks spread from the heavily patrolled Gulf of Aden--the focus of the Action Plan--to the vast Indian Ocean. The Action Plan's objective is to repress piracy as effectively as possible, but the effectiveness of U.S. resources applied to counterpiracy is unclear because the interagency group responsible for monitoring the Action Plan's implementation has not tracked the cost of U.S. activities--such as operating ships and aircraft and prosecuting suspected pirates--nor systematically evaluated the relative benefits or effectiveness of the Action Plan's tasks. GAO's prior work has shown that federal agencies engaged in collaborative efforts need to evaluate their activities to identify areas for improvement. Moreover, as pirates have adapted their tactics, the Action Plan has not been revised. Without a plan that reflects new developments and assesses the costs, benefits, and effectiveness of U.S. efforts, decision makers will lack information that could be used to target limited resources to provide the greatest benefit, commensurate with U.S. interests in the region. The U.S. government has collaborated with international and industry partners to counter piracy, but it has not implemented some key practices for enhancing and sustaining collaboration among U.S. agencies. According to U.S. and international stakeholders, the U.S. government has shared information with partners for military coordination. However, agencies have made less progress on several key efforts that involve multiple agencies--such as those to address piracy through strategic communications, disrupt pirate finances, and hold pirates accountable--in part because the Action Plan does not designate which agencies should lead or carry out 13 of the 14 tasks. For instance, the Departments of Defense, Justice, State, and the Treasury all collect information on pirate finances, but none has lead responsibility for analyzing that information to build a case against pirate leaders or financiers. The NSC, the President's principal arm for coordinating national security policy among government agencies, could bolster interagency collaboration and the U.S. contribution to counterpiracy efforts by clarifying agency roles and responsibilities and encouraging the agencies to develop joint guidance to implement their efforts. GAO recommends that the NSC reassess and update its Action Plan; identify metrics; assess the costs, benefits, and effectiveness of U.S. counterpiracy activities; and clarify agency roles and responsibilities. The NSC did not comment. The Departments of Defense, Homeland Security, Justice, State, Transportation, and the Treasury provided comments to clarify facts in the report.

Details: Washington, DC: U.S. Government Accountability Office, 2010. 84p.

Source: Internet Resource: GAO-10-856: Accessed October 23, 2010 at: http://www.gao.gov/new.items/d10856.pdf

Year: 2010

Country: International

Keywords: Maritime Crime

Shelf Number: 120061


Author: Vanlaar, Ward

Title: Understanding Behavioural Patterns of Interlocked Offenders to Inform the Efficient and Effective Implementation of Interlock Programs: How Offenders on an Interlock Learn to Comply

Summary: In a growing number of jurisdictions around the world an increased demand for the use of alcohol interlocks is evident. In order to inform decision-making regarding the use of interlocks in programs it is crucial that program administrators and practitioners understand behavioural patterns of offenders on an interlock. Insight into compliance rates of interlocked offenders throughout their time on the interlock can guide administrators with regard to program development and implementation, particularly in relation to logistical aspects of programs and the requisite resources to support it. The objectives of this study are to shed light on the behavioural patterns of offenders on an interlock, specifically with respect to their compliance with device requirements and program rules and to illustrate how such knowledge can be used to inform the implementation and delivery of interlock programs. This study was conducted for the Dutch Ministry of Transport to provide empirical information needed to inform the implementation of the Dutch interlock program.

Details: Ottawa: Traffic Injury Research Foundation, 2010. 20p.

Source: Internet Resource: http://www.tirf.ca/publications/PDF_publications/How_Offenders_Learn_to_Comply_4.pdf

Year: 2010

Country: International

Keywords: Alcohol Ignition Interlock Devices

Shelf Number: 120076


Author: Environmental Justice Foundation

Title: All At Sea: The Abuse of Human Rights Aboard Illegal Fishing Vessels

Summary: Illegal, Unreported and Unregulated (IUU) or ‘pirate’ fishing is devastating marine environments, stealing from developing nations and unsustainable. It is driven by the enormous global demand for seafood and is symptomatic of the wider crises in world fisheries. This report exposes how in their drive to maximise catch and minimise cost, illegal ‘pirate’ fishing operators ruthlessly exploit the crews working aboard their boats. EJF’s new report ‘All at Sea – the abuse of human rights aboard illegal fishing vessels’ documents how individuals working on pirate fishing vessels can be subject to excessive working hours, incarceration, and physical abuse up to and including murder. Often forced to work at sea for months and even years, in many cases the working conditions suffered by these crews meet International Labour Organisation (ILO) definitions of forced labour. The report provides case studies from West Africa, Southeast Asia, the Indian and Pacific Oceans, all regions with high incidences of illegal fishing. Human rights abuses directly documented by EJF and other organisations, including the International Transport Workers Federation (ITF), include physical and emotional abuse, incarceration, forced labour without pay, abandonment, and reports of murder. The majority of workers on IUU fishing vessels are hired through recruitment agencies that target vulnerable, powerless individuals who are very often not experienced fishers and are hired from rural areas in developing countries where alternative work is in desperately short supply. Unfortunately for these crews, the international legal instruments needed to address the human rights abuses aboard illegal fishing vessels do not exist, are voluntary, or have not been ratified by the international community.

Details: London: Environmental Justice Foundation, 2010. 23p.

Source: Internet Resource: Accessed October 26, 2010 at:

Year: 2010

Country: International

Keywords: Forced Labor

Shelf Number: 120002


Author: Smith, Russell G.

Title: The Illegal Movement of Cash and Bearer Negotiable Instruments: Typologies and Regulatory Responses

Summary: As part of global regulatory measures designed to minimise risks of money laundering and financing of terrorism, financial institutions and other designated businesses in most countries are required to report certain financial transactions to government regulators. This has increased the probability that transactions involving the proceeds of crime will be detected and reported officially. In order to avoid such detection, serious criminals may simply retain the proceeds of their crimes in cash or use bearer negotiable instruments in connection with their money laundering activities. Although not a new concern, the illegal movement of cash and bearer negotiable instruments across borders is likely to continue and although such movements are now regulated, criminals will continue to devise new strategies to circumvent regulatory controls. This paper explores the ways in which covert movements of currency and bearer negotiable instruments currently take place and reviews the regulatory measures that exist to address such activities in Australia. Increased detection and enforcement action, coupled with intensive data collection and analysis, are likely to be the most effective ways in which to address this way of laundering the proceeds of crime.

Details: Canberra: Australian Institute of Criminology, 2010. 6p.

Source: Internet Resource: Trends & Issues in Crime and Criminal Justice, No. 402: Accessed October 26, 2010 at: http://www.aic.gov.au/documents/8/2/3/%7B8239E8CD-681A-401B-B094-414C872418BE%7Dtandi402.pdf

Year: 2010

Country: International

Keywords: Financial Crimes

Shelf Number: 120096


Author: Choo, Kim-Kwang Raymond

Title: Cloud Computing: Challenges and Future Directions

Summary: Cloud computing can be defined as a pool of virtualised computing resources that allows users to gain access to applications and data in a web-based environment on demand. This paper explains the various cloud architecture and usage models that exist and some of the benefits in using cloud services. It seeks to contribute to a better understanding of the emerging threat landscape created by cloud computing, with a view to identifying avenues for risk reduction. Three avenues for action are identified, in particular, the need for a culture of cyber security to be created through the development of effective public-private partnerships; the need for Australia’s privacy regime to be reformed to deal with the issues created by cloud computing and the need for cyber-security researchers to find ways in which to mitigate existing and new security risks in the cloud computing environment. Cloud computing is now firmly established in the information technology landscape and its security risks need to be mapped and addressed at this critical stage in its development.

Details: Canberra: Australian Institute of Criminology, 2010. 6p.

Source: Internet Resource: Trends & Issues in Crime and Criminal Justice, No. 400: Accessed October 26, 2010 at: http://www.aic.gov.au/documents/C/4/D/%7BC4D887F9-7D3B-4CFE-9D88-567C01AB8CA0%7Dtandi400.pdf

Year: 2010

Country: International

Keywords: Computer Crimes

Shelf Number: 120097


Author: Roy, Susmita

Title: The Impact of Natural Disasters on Crime

Summary: This study addresses the following questions in the context of a developing coun- try. Do crimes increase following natural disasters? Does an upcoming election or the presence of a strong local media, which potentially increases the incentive of the government to provide disaster relief, mitigate the effect of disasters on crime rates? The study found that crime rates tend to increase following moderate to big disasters. Furthermore, a higher pre-disaster growth of newspapers has a mitigating effect on the crime response to disasters. Elections also influence the crime response to disasters. Crimes are more likely to rise following disasters in the years that are close to an election year.

Details: Christchurch, NZ: Department of Economics and Finance, College of Business and Economics, University of Canterbury, 2010. 32p.

Source: Internet Resource: Working Paper No. 57/2010: Accessed October 26, 2010 at: http://www.econ.canterbury.ac.nz/RePEc/cbt/econwp/1057.pdf

Year: 2010

Country: International

Keywords: Crime Rates

Shelf Number: 120101


Author: Melis, Martina

Title: Drug Policy and Development: How Action Against Illicit Drugs Impacts on the Millennium Development Goals

Summary: It is now widely accepted that current drug control strategies have had limited success in reducing the overall scale of the illicit drug market, and have led to significant unintended consequences, that have impacted adversely on a range of areas of international cooperation. The tensions between drug control strategies and, for example, the prevention of HIV or the protection of human rights, are well documented. This briefing paper highlights similar tensions between the concerns and objectives of the development community, and the objectives and strategies implemented in the name of drug control. UN agencies and member states have made some progress in recent years in addressing these tensions, but there is a long way to go to find an integrated approach to drug control that maximises the protection of health and human rights, and the promotion of social and economic development. The UN Development Programme, and most development NGOs, have been largely absent from this debate, but could be making a significant contribution to the elaboration and implementation of more effective drug policies and strategies. Illicit drugs impact on development in a number of ways. Drug use contributes to diminished health, leading to higher healthcare costs and decreased earning at the population level. This is most noticeable in the area of HIV/AIDS where the sharing of needles not only spreads HIV infection among people who inject drugs but also serves to fuel the broader spread of the epidemic. Involvement in the illicit drugs market diverts people and resources from licit recorded economic activities. The huge profits associated with the drug market foster organised crime and corruption, which in turn inhibit the development of good governance. Environmental degradation resulting from the cultivation and refinement of naturally derived drugs is also being increasingly documented.

Details: London: International Drug Policy Consortium, 2010. 13p.

Source: Internet Resource: Accesssed October 28, 2010 at: http://www.idpc.net/sites/default/files/library/Drug%20policy%20and%20development%20briefing.pdf

Year: 2010

Country: International

Keywords: Drug Control

Shelf Number: 120118


Author: United Nations Development Fund for Women (UNIFEM): United Nations Department of Peacekeeping Operations

Title: Addressing Conflict-Related Sexual Violence: An Analytical Inventory of Peacekeeping Practice

Summary: Despite increased attention to the women, peace and security agenda since the UN Security Council unanimously adopted resolution 1325 in October 2000, major analytical and implementation gaps remain. One such gap is the effort to combat conflict-related sexual violence — the premise of subsequent Security Council resolutions 1820 and 1888 — and the potential of uniformed peacekeepers to help fight such violence. Addressing Conflict-Related Sexual Violence — An Analytical Inventory of Peacekeeping Practice captures best practices and emerging elements for a more effective response by peacekeepers to women’s security concerns. From initiating firewood patrols in Darfur to establishing market escorts, night patrols and early-warning systems in the Democratic Republic of Congo, the document catalogues direct and indirect efforts to combat sexual violence during and in the wake of war. While the focus of this publication is on the practical methods by which military, police and civilian peacekeepers can prevent sexual violence, it is also part of a broader agenda to improve the capacities of peacekeepers to protect civilians effectively.

Details: New York: United Nations, 2010. 44p.

Source: Internet Resource: Accessed October 29, 2010 at: http://www.unifem.org/attachments/products/Analytical_Inventory_of_Peacekeeping_Practice_online.pdf

Year: 2010

Country: International

Keywords: Female Victims of Crime

Shelf Number: 120126


Author: Horsfall, Briony

Title: Are Social Marketing Campaigns Effective in Preventing Child Abuse and Neglect?

Summary: Social marketing campaigns are a common strategy for raising awareness about social problems such as child abuse and neglect. However, questions have been raised about the role social marketing campaigns could play, and their potential efficacy in the prevention of child abuse and neglect and in supporting vulnerable children and families. In this NCPC Issues paper, evidence for the impact of media-based social marketing campaigns related to child protection, parenting and child abuse prevention are examined.

Details: Melbourne: Australian Institute of Family Studies, 2010. 28p.

Source: Internet Resource: NCPC Issues, No. 32: Accessed October 29, 2010 at: http://www.aifs.gov.au/nch/pubs/issues/issues32/issues32.pdf

Year: 2010

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 120134


Author: Gray, Sharon

Title: Community Safety Workers: An Exploratory Study of Some Emerging Crime Prevention Occupations

Summary: Fear of crime within communities, a perceived lack of social controls or community cohesion, and the limitations of reactive or repressive approaches to crime or of the capacity of the police alone to prevent it, have all contributed to the development of new forms of community safety practices. A number of new community safety ‘professions’ or positions have emerged in recent years. These often target neighbourhoods or housing areas seen as at–risk or disadvantaged, or are employed in selected public spaces. The aim of this report is to provide a brief overview of the emergence of such community safety roles, based on examples drawn from selected countries: England and Wales, France, Belgium, Australia, and South Africa. Within each country, examples of community safety positions are examined in terms of their public policy context, job description and structure, roles and responsibilities, recruitment and training, and their monitoring and evaluation. Some of the practical and political considerations in their implementation are also touched on.

Details: Montreal: Interntional Centre for the Prevention of Crime, 2006. 76p.

Source: Internet Resource: Accessed November 1, 2010 at: http://www.crime-prevention-intl.org/uploads/media/pub_183_2.pdf

Year: 2006

Country: International

Keywords: Careers

Shelf Number: 120137


Author: Stewart, James G.

Title: Corporate War Crimes: Prosecuting the Pillage of Natural Resources

Summary: Since the end of the Cold War, the illegal exploitation of natural resources has emerged as a primary means of financing armed violence. In countries as diverse as Afghanistan, Angola, the Democratic Republic of the Congo, East Timor, Liberia, and Sierra Leone, the sale of natural resources within conflict zones has not only created perverse incentives for war, it has also furnished warring parties with the finances necessary to sustain some of the most brutal hostilities in recent history. As a consequence of the illegal trade in minerals, metals, timber, and other natural resources, armed conflicts in which participants are able to draw upon easily accessible natural resource wealth are often more bloody, financially costly, and intractable than other forms of armed violence. Resource wars also contribute to the so-called resource curse, whereby the richest nations in terms of resource endowment are poorest in terms of social development and most prone to violent upheaval. While there is broad consensus that the correlation between resource wealth and armed violence must be addressed through a range of initiatives geared at fighting corruption, policing the resource sector domestically, and building judicial capacity in countries recovering from war, the liability of foreign businesses for trading in illicit conflict commodities is also vital. Resource wars, after all, are entirely dependent on commercial actors to purchase, transport, and market the resources that are illegally acquired in order to sustain violence. As part of this growing interest in resource wars, Corporate War Crimes: Prosecuting the Pillage of Natural Resources explores the elements of corporate liability for the war crime of pillage. Although the term pillage has a long pedigree in the laws of war, the offense also features as a contemporary war crime in the statutes of all modern international criminal courts and a large number of domestic criminal systems. In essence, pillage means theft during war, and is synonymous with other equally evocative terms such as looting, spoliation, and plunder. A substantial body of jurisprudence has applied the offense in practice. Modern courts such as the International Criminal Tribunal for the former Yugoslavia (ICTY) enforce the offense as a matter of course. At present, Liberia’s former president Charles Taylor and the former vice-president of Congo Jean- Pierre Bemba are facing trial before international courts for having allegedly perpetrated acts of pillage during war, but the most important precedents derive from World War Two. In the wake of that conflict, a significant number of business representatives were prosecuted for pillaging natural resources in circumstances that are often strikingly similar to corporate practices in modern resource wars. By exploring these cases and the law governing pillage in detail, Corporate War Crimes seeks to guide investigative bodies and war crimes prosecutors engaged with the technicalities of these issues. We also hope that this manual will be useful for advocates, political institutions, and companies interested in curbing resource wars. Our belief is that the deterrent effect created by even a single case is likely to transform conflict financing in a large number of ongoing conflicts. At the same time, we are conscious of the potential humanitarian consequences of depriving warring factions of access to resource wealth in some contexts, and of the serious dangers of tarnishing reputable companies that provide the legitimate investment essential to rehabilitating economies ravaged by war. With this balance in mind, this project seeks to act as a catalyst for reinvigorating prosecution of the war crime of pillage and to bring accountability to companies that illegally trade in conflict commodities.

Details: New York: Open Society Institute, 2010. 148p.

Source: Internet Resource: Accessed November 1, 2010 at: http://www.soros.org/initiatives/justice/focus/anticorruption/articles_publications/publications/pillage-manual-20101025/pillage-manual-20101025.pdf

Year: 2010

Country: International

Keywords: Illegal Trade

Shelf Number: 120138


Author: Pereznieto, Paola

Title: The Economic Impact of School Violence: A Report for Plan International

Summary: The research, carried out by the Overseas Development Institute (ODI), reveals the enormous economic and social cost of violence in schools across the world. Focused on three types of violence in schools – corporal punishment, bullying and sexual violence – it found the total cost of school violence in terms of social benefits lost in just 13 countries for which information is available ran to almost $60 billion. The research found that children who experience violence at school are likely to earn less, be in greater need of healthcare and other services, and long-term, contribute less to their countries’ economies. It says that the problem is a significant barrier to achieving the Millennium Development Goals - as it leads to truancy, under-performance and high drop-out rates. No country is immune from the blight of school violence and eradicating it takes commitment and resources. But failing to invest in it costs considerably more.

Details: London: Plan International and Overseas Development Institute, 2010. 91p.

Source: Internet Resource: Accessed November 2, 2010 at: http://plan-international.org/learnwithoutfear/economic-impact-of-school-violence-report

Year: 2010

Country: International

Keywords: Bullying

Shelf Number: 120166


Author: Meyer, Silke

Title: Responding to Intimate Partner Violence Victimisation: Effective Options for Help-Seeking

Summary: Approximately one in four women in most Western nations are at risk of becoming a victim of intimate partner violence (IPV). Interventions for IPV victims have shown to be significant in preventing negative outcomes. Using data from the International Violence Against Women Survey, this paper examines predictors of help-seeking by IPV victims and considers whether such responses are influenced by the severity of abuse experienced. Many IPV victims seek assistance informally from family and friends in the first instance and that experience may affect subsequent attempts to seek help from more formal sources. This study found that victims of IPV are more likely to explore formal avenues of support when married to the abusive partner, have children who have witnessed incidents of abuse, have used drugs or alcohol to cope with abuse and where the abusive partner has previously received counselling for his behaviour. It was found that in cases where the victim had experienced more severe types of abuse, and/or if they felt their life had been threatened during the most recent incident, there was a significantly increased likelihood of formal helpseeking. Collectively, these findings can inform the enhancement of current responses made by formal sources of support to better accommodate the needs of IPV victims and their children.

Details: Canberra: Australian Institute of Criminology, 2010. 6p.

Source: Internet Resource: Trends and Issues in Crime and Criminal Justice, No. 389: Accessed November 3, 2010 at: http://www.aic.gov.au/documents/6/2/C/%7B62CAE35B-C4C7-4231-8163-911079CE46FE%7Dtandi389.pdf

Year: 2010

Country: International

Keywords: Family Violence

Shelf Number: 120172


Author: Choo, Kim-Kwang Raymond

Title: Challenges in Dealing with Politically Exposed Persons

Summary: Politically exposed persons (PEPs) are individuals who are, or have been, entrusted with prominent public functions. PEPs are potential targets for bribes due to their prominent position in public life. They have a higher risk of corruption due to their access to state accounts and funds. A review of Financial Action Task Force (FATF) and FATF-style regional bodies' mutual evaluation reports reveals that a significant number of jurisdictions are found to be either non-compliant or partially-compliant with the FATF recommendation on PEPs. Corrupt PEPs may exploit the regulatory difference between jurisdictions to facilitate the laundering of corruption proceeds and/or illegally diverted government, supranational or aid funds. To combat money laundering risks posed by PEPs, there is a need for ongoing monitoring of risks by regulated entities. This paper also outlines three policy implications, namely: deciding whether to include domestic public office holders in existing PEP definitions; deciding when to terminate PEP status; and deciding whether to extend PEP monitoring to individuals holding important positions in the private sector, that is, financially exposed persons.

Details: Canberra: Australian Institute of Criminology, 2010. 6p.

Source: Internet Resource: Trends and Issues in Crime and Criminal Justice, No. 386: Accessed November 3, 2010 at: http://www.aic.gov.au/documents/D/3/6/%7BD36F2729-AFC4-48CC-8A3C-2C81FCDCE5A3%7Dtandi386.pdf

Year: 2010

Country: International

Keywords: Bribery

Shelf Number: 120173


Author: Warren, Ian

Title: Crime Risks of Three-Dimensional Virtual Environments

Summary: Three-dimensional virtual environments (3dves) are the new generation of digital multi-user social networking platforms. Their immersive character allows users to create a digital humanised representation or avatar, enabling a degree of virtual interaction not possible through conventional text-based internet technologies. As recent international experience demonstrates, in addition to the conventional range of cybercrimes (including economic fraud, the dissemination of child pornography and copyright violations), the 'virtual-reality' promoted by 3dves is the source of great speculation and concern over a range of specific and emerging forms of crime and harm to users. This paper provides some examples of the types of harm currently emerging in 3dves and suggests internal regulation by user groups, terms of service, or end-user licensing agreements, possibly linked to real-world criminological principles. This paper also provides some directions for future research aimed at understanding the role of Australian criminal law and the justice system more broadly in this emerging field.

Details: Canberra: Australian Institute of Criminology, 2010. 6p.

Source: Internet Resource: Trends and Issues in Crime and Criminal Justice, No. 388: Accessed November 3, 2010 at: http://www.aic.gov.au/documents/D/5/2/%7BD5233F02-F880-4EF1-BDC6-29B436DB1B19%7Dtandi388.pdf

Year: 2010

Country: International

Keywords: Computer Crimes

Shelf Number: 120174


Author: United Nations Office on Drugs and Crime

Title: Model Law Against the Smuggling of Migrants

Summary: The Model Law against the Smuggling of Migrants was developed by the United Nations Office on Drugs and Crime (UNODC) in response to a request by the General Assembly to the Secretary-General to promote and assist the efforts of Member States to become party to and implement the United Nations Convention against Transnational Organized Crime and the Protocols thereto. It was developed in particular to assist States in implementing the provisions contained in the Protocol against the Smuggling of Migrants by Land, Sea and Air, supplementing the Convention. The Model Law will both facilitate and help systematize the provision of legislative assistance by UNODC as well as facilitate the review and amendment of existing legislation and the adoption of new legislation by States. It is designed to be adapted to the needs of each State, whatever its legal tradition and social, economic, cultural and geographic conditions. The Model Law contains all the provisions that the Protocol requires or recommends that States introduce in their domestic legislation. The commentary to the Model Law indicates which provisions are mandatory and which are optional. That distinction is not made with regard to the general provisions (chapter I) and the definitions (article 3), as they are an integral part of the Model Law but are not mandated by the Protocol per se. Recommended provisions may also stem from other international instruments, including international human rights law, humanitarian law and refugee law. Whenever appropriate or necessary, options for the wording of the provision are suggested in order to reflect the differences between legal cultures. The commentary also indicates the source of the provision and, in some cases, supplies alternatives to the suggested text or examples of national legislation from various States (in an unofficial translation where necessary). Due regard is also given to the interpretative notes for the official records the implementation of the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, and the Protocol against the Smuggling of Migrants by Land, Sea and Air, both supplementing the United Nations Convention against Transnational Organized Crime. The Government of Canada contributed to the organization of one of the expert group meetings.

Details: Vienna: United Nations, 2010. 108p.

Source: Internet Resource: Accessed November 4, 2010 at: http://www.unodc.org/documents/human-trafficking/Model_Law_Smuggling_of_Migrants_10-52715_Ebook.pdf

Year: 2010

Country: International

Keywords: Human Smuggling

Shelf Number: 120189


Author: Robertson, Robyn D.

Title: The Implementation of Alcohol Interlocks for Offenders: A Roadmap

Summary: Alcohol ignition interlocks are a proven tool to effectively monitor impaired driving offenders and reduce recidivism. Today, almost all U.S. jurisdictions have implemented an alcohol interlock law targeting repeat and even high-BAC offenders. More recently, at least 12 jurisdictions have moved to also include some or all first offenders in alcohol interlock legislation and several others are considering such laws. The Roadmap was designed to help administrators and staff plan, develop and implement improvements to alcohol interlock strategies to ensure that the goals and objectives of legislation are achieved. It contains practical steps to guide the implementation of alcohol interlock devices as part of a strategy targeting either repeat, high blood alcohol concentration (BAC) or first offenders. Critical steps in the process ranging from the drafting of legislation and the development of an implementation, to the organization of staff education and public awareness through to the creation of an evaluation plan for the strategy are discussed. Important considerations and caveats that impact decision-making at each stage of the process are also highlighted. The Roadmap was created with input from seasoned professionals who have played a leadership role in these initiatives or who have been intimately involved in interlock delivery. Input was sought from representatives of driver licensing, criminal justice, and hybrid (licensing and justice combined) interlock initiatives to achieve a balanced and inclusive perspective on effective strategies to apply these tools to supervise drunk drivers.

Details: Ottawa: Traffic Injury Research Foundation, 2010. 32p.

Source: Internet Resource: Accessed November 5, 2010 at: http://www.tirf.ca/publications/publications_show.php?pub_id=254

Year: 2010

Country: International

Keywords: Alcohol Abuse

Shelf Number: 120192


Author: Cavallaro, James Louis

Title: Crime, Public Order and Human Rights

Summary: Crime and street violence cross borders, ideologies, classes, ages and gender. In many societies, ordinary crime and victimisation have come to be perceived not merely as a high priority problem requiring technical resources. A new discourse has developed, emphasising crime as a threat to individual personal security and a potential source of state instability. In addition, where crime is a problem, a pattern has emerged wherein as a result of rising crime, hardline law and order policies attract public support. Increasingly, punitive and authoritarian methods of control and punishment are suggested or implemented without much public opposition. This report examines the problems that surges in criminality pose for the provision of security and the safeguard of human rights. While the perspective and responses of authorities are considered, the report focuses on the role of civil society and the particular issues it faces in this environment. The varied responses of the state — from collaborative efforts with civil society to attacks on rights groups, tolerance of police abuse or vigilantism — provide the context in which rights groups must manoeuvre. The main aim is to analyse the challenges that human rights groups must address in the context of rising crime.

Details: Geneva, Switzerland: International Council on Human Rights Policy, 2003. 144p.

Source: Internet Resource: Accessed November 5, 2010 at: http://www.ichrp.org/files/reports/8/114_report_en.pdf

Year: 2003

Country: International

Keywords: Human Rights Workers

Shelf Number: 120198


Author: Gabelnick, Tamar

Title: A Guide to the US Small Arms Market, Industry and Exports, 1998-2004

Summary: This report will be of interest to scholars, policy analysts, diplomats, and activists concerned about the global gun economy and/or the impact of firearms on society in the United States or the world at large. It presents a snapshot of what, precisely, is knowable — and what is not — about the world’s leading small arms maker and market. The report tracks US firearms production, imports, and domestic sales during 1998–2004 and provides insight into fluctuations in the civilian, military, and (to a limited extent) law enforcement markets. It surveys US small arms manufacturers and the special constraints under which they were operating during this period, and it highlights the increasing market share gained by imported weapons and foreign-owned producers. It also describes US shipments of small arms to other countries, particularly as part of the ‘war on terrorism’ initiated by the US government following the 9/11 terror attacks. A brief overview of the relevant US laws and policies governing firearms imports and exports is provided. Finally, the report provides a guide to further research and a template for more meaningful transparency around US weapons production, imports, exports, and domestic sales.

Details: Geneva: Small Arms Survey, Graduate Institute of International Studies, 2006. 111p.

Source: Internet Resource: Small Arms Survey Occasional Paper no. 19: Accessed November 9, 2010 at: http://www.smallarmssurvey.org/fileadmin/docs/B-Occasional-papers/SAS-OP19-US.pdf

Year: 2006

Country: International

Keywords: Gun Violence

Shelf Number: 120267


Author: Haas, Nicole Eveline

Title: Public Support for Vigilantism

Summary: Public support for vigilantism is often seen as being indicative of a lack of confidence in the criminal justice system. After all, one of the main justifications for the existence of the justice system is the prevention of vigilantism. However, while some specific cases of vigilantism receive widespread public support, others do not, or are even strongly condemned by the larger public. Apparently public support for vigilantism is not automatically or exclusively indicative for a lack of legitimacy. A theoretical framework is presented which provides a first step toward a better understanding of this phenomenon. The theory makes predictions about support for vigilantism using insights from the fields of psychology, law and philosophy. Additionally, a distinction is made between different types of support for vigilantism in order to make it a more useful concept for empirical research. Results of a first test of this theory will be presented, and implications for the interpretation of support for vigilantism is discussed.

Details: Unpublished Dissertation, University of Leiden, 2010. 194p.

Source:

Year: 2010

Country: International

Keywords: Vigilantism

Shelf Number: 120268


Author: International Council on Human Rights Policy

Title: Integrating Human Rights in the Anti-Corruption Agenda: Challenges, Possibilities and Opportunities

Summary: A taboo subject until the early 1990s, corruption is now under the spotlight and recognised as one of the biggest obstacles to development. Anti-corruption laws have been enacted, treaties like the United Nations Convention against Corruption have been negotiated and ratified and new anti-corruption bodies are springing up. Citizens across the world publicly protest against corruption. Corrupt acts are sometimes brought out of the shadows and prosecuted, and on occasion, those responsible are punished. These are tangible achievements. Nevertheless, persistent corruption continues to flourish in many environments to the severe detriment of many millions of people. Against this background, many anti-corruption organisations are examining and revising their strategies in a search for more effective solutions. This report contributes to that quest, outlining how the use of a human rights framework can strengthen anti-corruption work at the national and local level. Which human rights principles and tools could most improve the impact of anti-corruption programmes? How can we harness the power of human rights to protect those most vulnerable to corruption? Where might human rights and anti-corruption programmes be in conflict? This report shows how human rights and anti-corruption practitioners can unite efforts and effectively collaborate in the struggle to root out entrenched corruption.

Details: Geneva: International Council on Human Rights Policy, 2010. 82p.

Source: Internet Resource: Accessed November 9, 2010 at: http://www.ichrp.org/files/reports/58/131b_report.pdf

Year: 2010

Country: International

Keywords: Corruption

Shelf Number: 120272


Author: Mason, R. Chuck

Title: Piracy: A Legal Definition

Summary: Pirate attacks in the waters off the Horn of Africa, including those on U.S.-flagged vessels, have brought continued U.S. and international attention to the long-standing problem of piracy in the region. The United States has been an active participant in piracy interdiction and prevention operations focusing on the Horn of Africa region. As part of piracy interdiction operations, the U.S. military has detained individuals accused of acts of piracy against U.S.-flagged vessels. In some instances these individuals have been released to return to land, while others have been brought to the United States for criminal prosecution in the federal courts. The U.S. Constitution gives Congress the power “To define and punish Piracies and Felonies committed on the high seas, and Offenses against the Law of Nations.†Since 1819, U.S. law has defined piracy not as a specific act, but rather “as defined by the law of nations.†Supreme Court decisions have upheld Congress’s power to define piracy in terms of the law of nations. Contemporary international agreements, including the Convention on the High Seas, the United Nations Convention on the Law of the Sea (UNCLOS), and the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation (SUA Convention) address piracy. The United States is party to two of the agreements, and the third (UNCLOS) is generally accepted as reflecting customary international law. A recent development in a piracy trial in federal court in Norfolk, VA, has highlighted a potential limitation in the definition of piracy under the United States Code. In ruling on the defendant’s motion to dismiss, the court stated that the act of piracy, as defined by the law of nations, requires a robbery on the high seas. Thus, it appears that absent an actual robbery at sea, individuals may not be found guilty of the act of piracy under 18 U.S.C. § 1651, but may be tried for other offenses, including the offenses of attack to plunder a vessel, or committing violence against a person on a vessel.

Details: Washington, DC: Congressional Research Service, 2010. 7p.

Source: Internet Resource: CRS Report for Congress, No. R41455: Accessed November 10, 2010 at: http://www.fas.org/sgp/crs/misc/R41455.pdf

Year: 2010

Country: International

Keywords: Armed Robbery Against Ships

Shelf Number: 120276


Author: Verheij, Pauline

Title: Reduced to Skin and Bones: An Analysis of Tiger Seizures from 11 Tiger Range Countries (2000-2010)

Summary: Parts of at least 1,069 Tigers have been seized in Tiger range countries over the past decade, according to new analysis of Tiger seizures carried out by TRAFFIC, the wildlife trade monitoring network. Reduced to Skin and Bones shows that from January 2000 to April 2010, parts of between 1,069 and 1,220 Tigers were seized in 11 of the 13 tiger range countries—or an average of 104 to 119 animals per year. Of the 11, India, China and Nepal ranked highest in the number of tiger part seizures, the report states, with India by far the highest number of Tiger part seizures at 276, representing between 469 and 533 Tigers. China, with 40, had the second highest number of seizures, or 116-124 Tigers, and Nepal reported 39 seizures, or 113-130 Tigers.

Details: Cambridge, UK: TRAFFIC International, 2010. 44p.

Source: Internet Resource: Accessed November 11, 2010 at: http://www.traffic.org/species-reports/traffic_species_mammals60.pdf

Year: 2010

Country: International

Keywords: Offenses Against the Environment

Shelf Number: 120278


Author: King, Michael G., Jr.

Title: Modern Piracy and Regional Security Cooperation in the Maritime Domain: The Middle East and Southeast Asia

Summary: This thesis examines the development of cooperative maritime security efforts in Southeast Asia and the Middle East. Recent regional efforts to combat maritime security threats in the Gulf of Aden have drawn comparisons to similar efforts undertaken in the Malacca Straits. However, such comparisons fail to address the unique nature of security cooperation in the Persian Gulf, specifically the necessity of external security support for states in the region. This thesis argues that despite similarities shared by the two regions, the states of the Persian Gulf must deal with issues of prioritization, regional animosities, and external dependence before they can attempt to develop cooperative maritime security arrangements akin to those existing in Southeast Asia. Success will require a concerted effort by these states as well as the realization, by the United States, that it is undermining effective security cooperation in the region.

Details: Monterey, CA: Naval Postgraduate School, 2010. 117p.

Source: Internet Resource: Thesis: Accessed November 27, 2010 at: http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar_King.pdf

Year: 2010

Country: International

Keywords: Maritime Crime

Shelf Number: 120284


Author: Crone, Manni

Title: Homegrown Terrorism in the West, 1989-2008

Summary: The London bombings in 2005 led to the perception that the terrorist threat had changed from external to internal. This became conceptualized shortly after as "homegrown terrorism." This article deals with the meaning and scope of this phenomenon. We begin by tracing an ambiguity in the term "homegrown," which is both about belonging in the West and autonomy from terrorist groups abroad. A quantitative study of Islamist terrorism in the West since 1989 reveals an increase in both internal and autonomous terrorism since 2003 and that most plots are now internal - but not autonomous. Finally, we suggest that an increase in autonomous terrorism is a transitory phenomenon.

Details: Copenhagen: Danish Institute for International Studies, 2010. 22p.

Source: Internet Resource: DIIS Working Paper 2010:30: Accessed November 29, 2010 at: http://www.diis.dk/graphics/Publications/WP2010/WP2010-30-homegrown-terrorism-web.pdf

Year: 2010

Country: International

Keywords: Terrorism

Shelf Number: 120304


Author: Volz, Anna

Title: Stop the Violence! The Overuse of Pre-Trial Detention, or the Need to Reform Juvenile Justice Systems: Review of Evidence

Summary: This report is dedicated to the issue of pre-trial detention of juveniles, whose routine- (or over-) use is considered by child rights and juvenile justice experts, including members of the Committee on the Rights of the Child3, as one of the most pressing issues in juvenile justice today. It is in pre-trial detention facilities, including police lock-ups and prisons, that child rights are violated the most and international standards regarding detention and treatment of children in conflict with the law are respected the least. This leaves room for all kind of abuses and violence (of a physical, psychological and sexual nature) by staff and other inmates. Strangely enough, pre-trial detention of juveniles is rarely the subject of a report or a document. Information on pre-trial detention is usually “spread out†in publications, reports and other documents dedicated to other juvenile justice issues, making it difficult to build evidence regarding conditions and realities in the pre-trial stage only. Given the seriousness of the problem and the urge to do something about it, Defence for Children International (DCI) decided to prepare this publication. It is a Review of Evidence to be used as a reference for future (evidence-based) awareness raising, lobbying and advocacy work around these issues by DCI and partners, at the national, regional and international levels.

Details: Geneva: Defence for Children International, 2010. 35p.

Source: Internet Resource: Accessed November 29, 2010 at: http://www.defenceforchildren.org/files/PretrialDetentionReport-dci.pdf

Year: 2010

Country: International

Keywords: Juvenile Detention

Shelf Number: 120311


Author: Neumann, Peter R.

Title: Prisons and Terrorism: Radicalisation and De-radicalisation in 15 Countries

Summary: This report offers a wide-ranging analysis of the role prisons can play in radicalising people – and in reforming them. In doing so, it examines the policies and approaches of 15 countries, identifying trade-offs and dilemmas but also principles and best practices that can help governments and policymakers spot new ideas and avoid costly and counterproductive mistakes. Prisons matter. They have played an enormous role in the narratives of every radical and militant movement in the modern period. They are ‘places of vulnerability’ in which radicalisation takes place. Yet they have also served as incubators for peaceful change and transformation. Much of the current discourse about prisons and radicalisation is negative. But prisons are not just a threat – they can play a positive role in tackling problems of radicalisation and terrorism in society as a whole. Many of the examples in this report demonstrate how prisons can become net contributors to the fight against terrorism.

Details: London: International Centre for the Study of Radicalisation and Political Violence, 2010. 64p.

Source: Internet Resource: Accessed December 1, 2010 at: http://www.icsr.info/publications/papers/1277699166PrisonsandTerrorismRadicalisationandDeradicalisationin15Countries.pdf

Year: 2010

Country: International

Keywords: Extremist Groups

Shelf Number: 120329


Author: Arky, Aaron S.

Title: Trading Nets for Guns: The Impact of Illegal Fishing on Piracy in Somalia

Summary: Somali piracy reached a record high level in 2008, with 111 of the 293 worldwide attacks occurring in the waters surrounding Somalia. The incidence of piracy in Somali waters almost doubled in 2009, and the Somali share of total piracy attacks worldwide increased from under 40% to over 50%. Often overlooked is the initial upsurge in piracy, following the Indian Ocean tsunami in December 2004, which contributed to a sharp increase in piracy in 2005 and again in 2008. This thesis addresses why this initial surge occurred when it did. This increase can be attributed to the transformation of the pirate business model from fishermen who started to defend themselves, to the organized crime that displaced them in 2004 due to the opportunistic behavior of warlords. A convergence of factors contributing to the conditions at the time of the tsunami had short-term effects in 2005 that were enough to provide a boost to the already increasing business model of piracy.

Details: Monterey, CA: Naval Postgraduate School, 2010. 41p.

Source: Internet Resource: Thesis: Accessed December 2, 2010 at: http://www.hsdl.org/?view&doc=131926&coll=limited

Year: 2010

Country: International

Keywords: Illegal Fishing

Shelf Number: 120362


Author: Campos, Nauro F.

Title: Whither Corruption? A Quantitative Survey of the Literature on Corruption and Growth

Summary: Does corruption grease or sand the wheels of economic growth? This paper uses metaanalysis techniques to systematically evaluate the evidence addressing this question. It uses a data set comprising 460 estimates of the effect of corruption on growth from 41 empirical studies. The main factors explaining the variation in these estimates are whether the model accounts for institutions and trade openness (both are found to deflate the negative effect of corruption), authors' affiliation (academics systematically report less negative impacts), and use of fixed-effects. We also find that publication bias, albeit somewhat acute, does not eliminate the genuine negative effect of corruption on economic growth.

Details: Bonn: Institute for the Study of Labor, 2010. 30p.

Source: Internet Resource: IZA Discussion Paper Series No. 5334: Accessed December 3, 2010 at: http://ftp.iza.org/dp5334.pdf

Year: 2010

Country: International

Keywords: Corruption

Shelf Number: 120368


Author: Fan, C. Simon

Title: Embezzlement Versus Bribery

Summary: Corrupt officials can use their positions to enrich themselves in two ways. They can steal from the state budget-embezzling or misspending funds-or they can demand extra payments from citizens in return for services-bribery. In many circumstances, embezzlement is less distortionary than bribery. We analyze the tradeoff for governments in deciding how strictly to monitor and punish these two kinds of bureaucratic misbehavior. When bribery is more costly to economic development, governments may tolerate some embezzlement in order to reduce the extent of bribery-even though embezzlement is generally easier to detect. Embezzlement serves as a parallel to the "efficiency wage." This logic appears to hold in China, where misappropriation of public funds by officials appears to be ubiquitous.

Details: Cambridge, MA: National Bureau of Economic Research, 2010. 38p.

Source: Internet Resource: NBER Working Paper Series; Working Paper 16542: Accessed December 3, 2010 at: http://www.nber.org/papers/w16542.pdf

Year: 2010

Country: International

Keywords: Bribery

Shelf Number: 120372


Author: Aptel, Cecile

Title: Children and Accountability for International Crimes: The Contribution of International Criminal Courts

Summary: This paper analyses the extent to which international and ‘mixed’ or ‘hybrid’ criminal courts, in particular the International Criminal Court (ICC), have focused on crimes against children and dealt with children as victims, witnesses and potential offenders. The paper underlines the major role played recently by international courts, notably the Special Court for Sierra Leone, followed by the ICC, in criminalizing as war crimes the conscription or enlistment of children and their use to participate actively in hostilities. The Special Court was the first to hand down convictions for these crimes. The first cases before the ICC also concern the unlawful recruitment of children or their use in hostilities, bringing these crimes to the fore.

Details: Florence, Italy: United Nations Children's Fund, Innocenti Research Centre, 2010. 50p.

Source: Internet Resource: Innocenter Working Paper, IWP 2010-20: Accessed December 7, 2010 at: http://www.unicef-irc.org/publications/pdf/iwp_2010_20.pdf

Year: 2010

Country: International

Keywords: International Criminal Courts

Shelf Number: 120396


Author: International Council on Human Rights Policy

Title: Irregular Migration, Migrant Smuggling and Human Rights: Towards Coherence

Summary: Migration policies across the world are driven by three core concerns: law and border enforcement, economic interest, and protection. This report argues that official policies are failing partly because one of these concerns, protection, has been marginalised. Intensified efforts to suppress migration have not deterred people from seeking security or opportunity abroad but drive many into clandestinity, while the promotion of open economic markets has attracted millions of people to centres of prosperity but tolerated widespread exploitation. As a political consequence, discussion of migration is widely polarised and distorted by xenophobia and racism. The report suggests that it is in governments’ interest to affirm their legal and moral responsibility to protect everyone, including migrants. Human rights law provides a baseline of essential protection for migrants, and also some key components of a more balanced and rational policy approach. A substantial appendix summarises the rights of irregular migrants in international law.

Details: Geneva: International Council on Human Rights Policy, 2010. 148p.

Source: Internet Resource: Accessed December 7, 2010 at: http://www.ichrp.org/files/reports/56/122_report_en.pdf

Year: 2010

Country: International

Keywords: Human Rights

Shelf Number: 120407


Author: Naif Arab University for Security Sciences

Title: Combating Trafficking in Persons in Accordance with the Principles of Islamic Law

Summary: Trafficking in persons or human trafficking, a recognized human rights violation prohibited by international law, affects all countries and regions of the world. As a national and international, often organized crime, it knows no boundaries" geographic, cultural, political, or religious. Its victims and perpetrators hail from all around the world, and its flows reach from and to some of the most far-flung corners of the planet. It manifests itself as exploitation in different forms and types across countries, but no region is immune. In this global phenomenon, Muslim countries are no exception" all are affected by this crime. Trafficking for the purpose of sexual exploitation, as well as for labor exploitation in the domestic service industry and in agriculture and construction, affect Muslim countries in the Middle East and North Africa. Trafficking of children and women for sexual and labor exploitation likewise occurs in African countries both within and across national borders. In South and Southeast Asia, trafficking in men, women and children for similar purposes, which may also include trafficking for the purpose of begging and child sex tourism, are prevalent. While international law provides the central guiding framework for States in combating human trafficking, for this effort to be most effective, national legislatures should design legal provisions which, while consistent with international law, are also responsive to national specifics and are tailored to the legal structures and the phenomenon of trafficking as manifested in each State. Given that the legal traditions and legal systems in many Muslim countries rely primarily on Islamic law, a study of Islamic legal provisions and traditions which relate to trafficking in persons becomes important. An understanding of Islam's position on trafficking in persons and its related acts and elements, can provide important avenues for the development of a comprehensive approach to combating trafficking in Muslim countries, one which draws on and is grounded in the Islamic tradition, as well as in compliance with international law. The purpose of this paper is thus to analyze the Islamic legal tradition from the perspective of those sources, principles and provisions that may best be utilized in understanding, addressing, and combating trafficking in persons. More specifically, this entails the elaboration of a comprehensive theory of Islamic legal principles for the prohibition of the crime of trafficking in persons, and associated acts and means on the one hand, and the protection of victims of trafficking on the other. It involves understanding what the nature of the crime of trafficking under the Islamic law of crime and punishment is and what protections and safeguards are provided by Islamic law to the accused in the prosecution of trafficking. It merits analyzing how Islam relates to a victim-centered approach to the problem, and what the obligations of the ordinary citizen in providing victims with assistance may be. It is also necessary that any checklist of issues addressing trafficking in persons under Islamic law also include prevention, education, and public awareness—all core principles of a comprehensive strategy of combating trafficking as enshrined in international law. Some of the important questions tacked as part of this paper will thus include, for example, how does Islamic law provide for the principle of compensation for victims of a crime? In regard to prevention, how does Islam deal with vulnerable victims such as children, orphans, refugees and internally displaced persons, and non-Muslims living in a Muslim country? How does, if at all, a religious approach differ from a non-religious approach when one designs a public awareness campaign or educational curricula? In answering these and similar questions, the paper will address how applicable principles of Islamic legal theory relate to various forms of trafficking in persons, especially those most pertinent to the context of Muslim countries. An exploration of the forms of trafficking which are most significant in the Muslim world will thus be explored accordingly. The international framework governing trafficking in persons, especially the United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, as the central guiding international instrument for combating trafficking in persons, will serve as a foundational and comparative frame of reference throughout the paper. Since the source of Islamic law is the religious text, as opposed to legislation or court decisions, issues of religion that are relevant to trafficking in persons may arise and it is among the aims of this paper to address these considerations.

Details: Vienna: UNODC, 2009. 138p.

Source: Internet Resource: Accessed December 8, 2010 at: http://www.unodc.org/documents/human-trafficking/UNODC_Trafficking_and_Islamic_Law_-_Amended.pdf

Year: 2009

Country: International

Keywords: Forced Labor

Shelf Number: 120420


Author: O'Donnell, Dan

Title: Child Victims of Torture and Cruel, Inhuman or Degrading Treatment

Summary: This paper addresses the legal framework and medical and psychological impacts of torture on children. Part One, Legal Framework, begins by showing the three characteristics that legally distinguish torture from child abuse, by definition: Torture is committed by an agent of the state or someone acting with the encouragement or acquiescence of the state. Torture is committed for the purpose of obtaining information or a confession; to intimidate, coerce or punish the immediate victim or a third person; or as part of discrimination. Torture must cause severe pain or suffering. Because of these differences, torture should be treated differently to child abuse, in particular with regard to law enforcement. The fact that torture is committed by a representative of the state justifies a stronger response. That it involves severe pain or suffering is another reason that the response must be proportionate. International law prohibits both torture and „cruel, inhuman or degrading treatment‟, although the distinction between them is not clearly defined. When the victim is a child, his or her greater vulnerability must be taken into account in determining whether the acts inflicted constitute torture or cruel, inhuman or degrading treatment, according to jurisprudence of international courts and other bodies. The obligations of states regarding torture are different from those regarding child abuse. Under international law suspected torturers must be prosecuted, and if they are convicted, the sentence must reflect the gravity of the crime. In contrast, prosecution is not always the most appropriate response to child abuse, especially when it takes place in the home. Most states have accepted an obligation to cooperate with one another in investigating and prosecuting torture, and to prosecute any torturer found in their territory, regardless of where the crime took place. No similar obligation exists with regard to child abuse. The torture of children occurs in different contexts, including police operations against children seen as a threat to public order or safety; children confined in prisons or detention facilities; and children seen as linked to subversive groups, including the children of militants States have special obligations under international humanitarian law when torture or inhuman treatment are committed during armed conflict or foreign occupation. They must search for and extradite or prosecute persons alleged to have committed such “grave breaches†of humanitarian law. Individuals also may be prosecuted before the International Criminal Court for torture or cruel or degrading treatment committed during armed conflict. The obligation to bring torturers to justice in order to prevent impunity must be reconciled with the right of child victims to psychological recovery and the principle that the best interests of the child must be a primary concern in all decisions and proceedings that affect children. The United Nations Guidelines on Justice in Matters involving Child Victims and Witnesses of Crimes can help reconcile these concerns. They provide that victims should be treated in a caring and sensitive manner that takes into account their personal situation and needs, and respects their physical, mental and moral integrity; that interviews and examinations should be conducted by trained professionals; and that all interactions should be conducted in a child-sensitive manner in a suitable environment. Part Two of the working paper addresses the medical and psychological impacts. States have an inescapable responsibility not only to prevent torture and punish torturers but also to assist the victims. These duties have special implications for health professionals. Yet the torture of children has low visibility and recognition among health workers.

Details: Florence, Italy: United Nation's Children Fund Innocenti Research Center, 2010. 34p.

Source: Internet Resource: Innocenti Working Paper No. 2010-11: Accessed December 9, 2010 at: http://www.unicef-irc.org/publications/pdf/iwp_2010_11.pdf

Year: 2010

Country: International

Keywords: Child Maltreatment

Shelf Number: 120433


Author: Aronowitz, Alexis

Title: Analysing the Business Model of Trafficking in Human Beings to Better Prevent the Crime

Summary: The purpose of this project is to assist the OSCE Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings to identify theoretical underpinnings which may explain the business and socio-economic factors contributing to human trafficking in a wide context. This will facilitate the implementation of a holistic preventive strategy and help identify knowledge gaps that will need to be addressed in the very near future. In keeping with the OSCE Action Plan to Combat Trafficking in Human Beings and the United Nations Global Initiative to Fight Human Trafficking, it is anticipated that this exploratory research will pave the ground for a well-informed debate and assist in the further development of a comprehensive counter-trafficking policy. A second major objective is to provide recommendations, next steps and guidelines for decision makers, civil society and other concerned actors on the effective prevention of human trafficking. This study was implemented as part of the UN.GIFT Expert Group Initiative, as it seeks to produce guidance toward both short- and long-term results that will contribute to more effective prevention of human trafficking.

Details: Vienna: Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings, 2010. 112p.

Source: Internet Resource: Accessed December 9, 2010 at: http://www.europarl.europa.eu/document/activities/cont/201006/20100608ATT75674/20100608ATT75674EN.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 120435


Author: TRAFFIC

Title: Traffic Bulletin Seizures and Prosecutions: March 1997 - March 2010

Summary: The cases reported here, extracted from the TRAFFIC Bulletin, represent a selection of seizures and prosecutions that have taken place around the world over the past 12 years. The sources of this information are cited at the end of each country section. The CITES Appendix-listing for each species is placed in parentheses, where appropriate.

Details: Cambridge, UK: TRAFFIC, 2010. 192p.

Source: Internet Resource: Accessed December 13, 2010 at: www.traffic.org/traffic-bulletin/traffic_bulletin_seizures_1997-2010.pdf

Year: 2010

Country: International

Keywords: Offenses Against the Environment

Shelf Number: 120491


Author: Wombwell, James A.

Title: The Long War Against Piracy: Historical Trends

Summary: This study surveys the experience of the United States, Great Britain, and other seafaring nations in addressing the problem of piracy at sea, then derives insights from that experience that may be relevant to the suppression of the current surge of piratical activity. Wombwell, a retired naval officer, traces the course of several outbreaks of piracy during the past 300 years in a variety of geographical areas. Although each case varies in its details, Wombwell concludes that enough similarities exist to permit several useful generalizations. Among these are the causes of piracy, the factors that permit the behavior to flourish, and the range of countermeasures that have been available to policymakers seeking to eradicate the problem. When conditions are favorable for piracy to develop, and no strong response is made by the forces of law and order, what began as low-level brigandage often grows to outrageous proportions, ultimately requiring significant military resources to suppress or eliminate the threat posed to legitimate commerce.

Details: Fort Leavenworth, KS: Combat Studies Institute Press, U.S. Army Combined Arms Center, 2010. 195p.

Source: Internet Resource: Occasional Paper 32: Accessed December 14, 2010 at: http://www.cgsc.edu/carl/download/csipubs/wombwell_32.pdf

Year: 2010

Country: International

Keywords: Historical Studies

Shelf Number: 120498


Author: Cox, Marcus

Title: Security and Justice: Measuring the Development Returns: A Review of Knowledge

Summary: This paper reviews the state of knowledge on the role of security and justice (S&J) in the development process. The purpose is to enable DFID and its partners to gain a better understanding of the returns available from investments in this area, in terms of economic growth, poverty reduction and achievement of the Millennium Development Goals (MDGs). As well as presenting the evidence available from the literature, we are asked to assess the state of knowledge, describing the methodological challenges and how they are being addressed, and proposing areas for further research. The literature proves to be full of theoretical disputes and methodological pitfalls. It is clear that there is a strong association between justice and development, in the sense that prosperous countries generally have more complex legal systems and deliver a higher quality of S&J services to citizens. However, association is not causation, and the causal chains are complex and difficult to disentangle. It may be that it is the economy that drives the development of the legal system. Historical studies of East Asian development suggest this is the direction of causation. Some authors have suggested that there is no general rule on causation but rather, as Messick puts it, a series of ― on and off connections -, with the two variables causally interdependent at some stages of the development process and autonomous at others. For the policy maker, the key question is therefore: to what extent and in what circumstances is the justice system an independent variable, offering a promising entry point for development assistance? The paper looks at theories on the links between S&J and development, and the evidence used to test them, across a number of areas. It begins with the two main branches of research in the field: econometric studies on the impact of law and justice on economic performance; and bottom-up analysis (variously called access to justice or legal empowerment) on how insecurity and injustice affect the lives of poor people. It then considers evidence of linkages across four specific areas identified by DFID in the TORs: property and housing; crime and violence; gender discrimination; and governance.

Details: London: Agulhas Development Consultants, 2008. 61p.

Source: Internet Resource: Accessed December 15, 2010 at: http://www.agulhas.co.uk/cms_files/14/Agulhas_S&J_Development_Returns_Aug_08.pdf

Year: 2008

Country: International

Keywords: Crime and Socioeconomic Conditions

Shelf Number: 120511


Author: VERIFOR

Title: Meeting the Challenge of Timber Legality Verification: A Policy Brief

Summary: Worldwide, interest in timber legality is growing. The handwringing that has sometimes characterised debate on illegal logging is giving way to practical measures designed to increase the proportion of timber that is harvested and traded according to the law. Proponents argue that the verification of timber legality can encourage good forest governance and ensure access to markets that might otherwise be restricted. This policy brief considers the merits of that argument. It draws on the collective knowledge of 100 forest governance practitioners and researchers who, in late 2008, attended an international workshop on the issue organised by the VERIFOR project (Box 1) and the Food and Agriculture Organization of the United Nations (FAO). It describes the process of effective timber legality verification, identifies the challenges, and presents eight key messages for policymakers.

Details: London: VERIFOR, 2009. 10p.

Source: Internet Resource: Accessed December 15, 2010 at: http://www.verifor.org/RESOURCES/workshop_summary.pdf

Year: 2009

Country: International

Keywords: Illegal Timber

Shelf Number: 119936


Author: Rabasa, Angel

Title: Deradicalizing Islamist Extremists

Summary: Considerable effort has been devoted to understanding the process of violent Islamist radicalization, but far less research has explored the equally important process of deradicalization, or how individuals or groups abandon extremist groups and ideologies. Proactive measures to prevent vulnerable individuals from radicalizing and to rehabilitate those who have already embraced extremism have been implemented, to varying degrees, in several Middle Eastern, Southeast Asian, and European countries. A key question is whether the objective of these programs should be disengagement (a change in behavior) or deradicalization (a change in beliefs) of militants. Furthermore, a unique challenge posed by militant Islamist groups is that their ideology is rooted in a major world religion. An examination of deradicalization and counter-radicalization programs in the Middle East, Southeast Asia, and Europe assessed the strengths and weaknesses of each program, finding that the best-designed programs leverage local cultural patterns to achieve their objectives. Such programs cannot simply be transplanted from one country to another. They need to develop organically in a specific country and culture.

Details: Santa Monica, CA: RAND, 2010. 214p.

Source: Internet Resource: Accessed December 20, 2010 at: http://www.rand.org/pubs/monographs/2010/RAND_MG1053.pdf

Year: 2010

Country: International

Keywords: Counter-Terrorism

Shelf Number: 120548


Author: Willoughby, Michelle

Title: Demand Deterrence Strategies: International Initiatives to Eliminate Demand for the Sex Trade

Summary: Today’s research on prostitution largely focuses on the women selling sex rather than on the men who buy sex. The rule of supply and demand highlights the significant role that the buyers play in maintaining prostitution. If there was not a demand for prostitution, then prostitution simply would not exist. In recent years, communities worldwide have started to acknowledge this perspective and have begun implementing demand deterrence strategies. This report highlights such strategies and may be used as a best practice guide for deterring the demand for prostitution around the world. CAASE does not necessarily endorse the strategies outlined in this report. Rather, CAASE has chosen to compile this listing as a resource for future demand deterrence initiatives. Some of the approaches enumerated here are insensitive to those in the sex trade and misrepresent their experiences. In order for any of these strategies to be effective, the culture can no longer view women in prostitution as perpetrators of a crime, nor can we blame them for the exploitation and violence perpetrated against them. The first section of the report offers a description of the most common and the most successful demand deterrence strategies utilized worldwide. The two appendixes that follow enumerate specific strategies in greater detail and are organized alphabetically, according to location. Some of the strategies listed are no longer in effect. In such cases, their activities are described in the past tense. They remain a part of the report, however, to preserve any potential usefulness that may arise from knowledge of such programs in the future. The report will be continually updated to reflect changes in community responses to the demand for prostitution.

Details: Chicago: Chicago Alliance Against Sexual Exploitation, 2008. 58p.

Source: Internet Resource: Accessed December 20, 2010 at: http://www.caase.org/pdf/resources/14-demand-deterrence-strategies.pdf

Year: 2008

Country: International

Keywords: Prostitutes

Shelf Number: 120549


Author: Moller, Bjorn

Title: Piracy, Maritime Terrorism and Naval Strategy

Summary: Piracy is an old problem which is now again attracting attention, mainly because of the surge of pirate attacks off the coasts of Somalia. Closer analysis shows the problem to be of quite modest proportions. The international naval protection of merchant shipping holds out some prospects of containing the problem, but it is most likely to solve itself. If international shipping opts for the route south of Africa, piracy will die out for a lack of targets. Maritime terrorism is, likewise, a problem of very limited proportions. It is often conflated with piracy, but there are significant differences between the two phenomena, the latter being undertaken for selfish reasons, the former for the sake of some higher cause. Whereas it is conceivable that maritime terrorists will gradually transform themselves into pirates, a transformation in the opposite direction is well nigh inconceivable. Besides the analysis of these two phenomena, the overlap between them and certain naval strategies are also briefly touched upon.

Details: Copenhagen: Danish Institute for International Studies, DIIS, 2009. 36p.

Source: Internet Resource: DIIS Report 2009:02: Accessed December 21, 2010 at: http://www.diis.dk/graphics/Publications/Reports2009/DIIS_Report_2009-02_%20Piracy_maritime_terrorism_and_naval_strategy.pdf

Year: 2009

Country: International

Keywords: Maritime Crime

Shelf Number: 120561


Author: Clift, Charles

Title: Combating Counterfeit, Falsified and Substandard Medicines: Defining the Way Forward?

Summary: Counterfeit, falsified and substandard medicines pose a serious threat to human health, particularly in poorer countries with weak regulatory mechanisms. But the relationship between combating counterfeit medicines, addressing safety, quality and efficacy issues and enforcing privately owned intellectual property rights has become controversial. There are concerns that a wider definition of "counterfeit" threatens the trade in generic medicines of assured quality on which many developing countries depend; and about the legitimacy of the International Medical Products Anti-Counterfeiting Taskforce (IMPACT), the detention of generic drugs in transit in the European Union, and the negotiation of the Anti-Counterfeiting Trade Agreement (ACTA). "Counterfeit" has a specific meaning in intellectual property, related to willful trademark violations. But in relation to medicines it is now sometimes used in a much broader sense to do with misrepresentation of identity or source, or even medicines that are simply "substandard". Some countries use the term "falsified" to describe medicines that misrepresent their identity or source, but do not necessarily violate intellectual property rights. "Substandard" medicines are those that do not meet quality standards specified for them, but may also be defined specifically to cover products from authorized manufacturers which fail to meet quality standards set for them. Failure to reach agreement on the definitions of counterfeit, falsified and substandard medicines hampers the constructive policy debate and collaboration at the international level that are necessary to take effective action against the producers and distributors of these medicines.

Details: London: Chatham House, 2010. 16p.

Source: Internet Resource: Briefing Paper: Accessed December 21, 2010 at: http://www.chathamhouse.org.uk/files/17868_1110bp_counterfeit.pdf

Year: 2010

Country: International

Keywords: Counterfeit Medicine

Shelf Number: 120564


Author: Parry-Jones, Rob

Title: The Feasibilitiy of Using Canines to Detect Wildlife Contraband

Summary: The use of detection dogs worldwide, cheifly for narcotics, bears testament to the recognised efficacy of canines in locating contraband items in trade. Despite the commitment of governments to prevent the illegal trade in wildlife, however, only a few detector dog programs currently exist around the world to detect wildlife in trade. These programs, located in the USA, South Africa, and Canada, have limited resources but, nonetheless, clearly illustrate that dogs can be used as an effective law enforcement tool to enhance the effectiveness of CITES and domestic wildlife trade controls.

Details: Hong Kong: TRAFFIC East Asia, 1997. 50p.

Source: Internet Resource: Accessed December 23, 2010 at: http://www.traffic.org/enforcement/

Year: 1997

Country: International

Keywords: Dogs

Shelf Number: 120591


Author: Schollum, Mary

Title: Investigative Interviewing: The Literature

Summary: This review provides an overview of investigative interviewing within policing. It may also be of interest to anyone who uses this type of interviewing on the job including insurance fraud investigators, lawyers, and government departments. The review outlines the efforts made by police and psychologists in recent decades to: convey the importance of investigative interviewing; understand what happens in an investigative interview; use psychological theories and research to find out what makes a successful interview; examine the effectiveness of various skills and techniques; find a basic framework and rationale to underlie investigative interviews; and produce guidelines on how to conduct interviews. The headings are designed so readers can easily look up topics they are interested in. Not all topics are mutually exclusive. For example, there are separate sections on body language and deception. Yet one of the ways thought to help in detecting whether someone is lying is through interpreting body language. Thus there is overlap between these two topics, and of course many others.

Details: Wellington, NZ: New Zealand Police, 2005. 109p.

Source: Internet Resource: accessed December 23, 2010 at: http://www.police.govt.nz/resources/2005/investigative-interviewing/investigative-interviewing.pdf

Year: 2005

Country: International

Keywords: Criminal Investigations

Shelf Number: 120626


Author: Stovel, Laura

Title: Restorative Justice After Mass Violence: Opportunities and Risks for Children and Youth

Summary: There is growing interest in the role that restorative justice can play in addressing mass atrocities. This paper describes the associated principles and practices within juvenile justice systems and in societies emerging from mass violence. It also examines the meaning, opportunities and limitations of restorative justice in transitional societies, particularly in relation to the needs of young victims and offenders. We argue that procedural forms of restorative justice, involving redress by offenders, face considerable challenges because communities and governments often lack the coercive capacity or will to hold offenders accountable. In contexts where accountability is lacking we argue that pressuring victims to meet with, and forgive, those who harmed them may be inappropriate. Such encounters should only occur where victims see them as necessary to their own healing. Despite the procedural limitations of restorative justice, this perspective (ontology) helps us analyse the route to reconciliation in different conflict contexts and reveals opportunities and challenges for justice and reconciliation in each case. This ontology reveals that intra-communal and inter-communal (ethnic/religious) conflicts have dramatically different justice and reconciliation challenges. In an intra-communal conflict, such as in Sierra Leone, offenders need to reintegrate into communities that they or their factions harmed. The desire to reintegrate into communities that condemn their crimes while accepting them provides opportunities for young offenders to address their crimes. In ethnically divided societies, offenders are often seen as heroes in their communities and may not have to address their crimes until the communities themselves condemn them. This makes restorative justice and reconciliation much more difficult, as communities do not take on the role of promoting accountability for their own members. In such cases, restorative justice efforts must promote social trust between groups. In both intra-communal and inter-communal conflicts, victims are often marginalized by their own communities and receive inadequate assistance. Restorative justice shows us that much can be done to help young victims, and this should become an explicit part of the justice picture. Finally, we argue that traditional justice is not synonymous with restorative justice. While traditional justice is community based and often meaningful to people, many of its forms are retributive; deny a voice to children, youth and other disadvantaged groups; or place community reconciliation above individual justice. Therefore, traditional justice practices should be assessed case by case if they are to be claimed as restorative justice equivalents.

Details: Florence, Italy: UNICEF Innocenti Research Centre, 2010. 44p.

Source: Internet Resource: Innocenti Working Paper 2010-15: Accessed December 23, 2010 at: http://www.unicef-irc.org/publications/pdf/iwp_2010_15.pdf

Year: 2010

Country: International

Keywords: Juvenile Offenders

Shelf Number: 120628


Author: Bowden, Anna

Title: The Economic Costs of Maritime Piracy

Summary: At the end of 2010, around 500 seafarers from more than 18 countries are being held hostage by pirates. Piracy clearly affects the world‘s largest trade transport industry, but how much is it costing the world? One Earth Future (OEF) Foundation has conducted a large-scale study to quantify the cost of piracy as part of its Oceans Beyond Piracy project. Based on our calculations, maritime piracy is costing the international economy between $7 to $12 billion, per year. This report details the major calculations and conclusions made in the study. The project focuses on direct (first) order costs, but also includes some estimates of secondary (macroeconomic costs), where data is available. It concentrates on the supply-side costs to both industry and governments. The study set out to analyze the cost of piracy to the Horn of Africa, Nigeria and the Gulf of Guinea, and the Malacca Straits. The focus is inevitably on the costs of Somali piracy because this is the region where contemporary piracy is most highly concentrated and is the greatest source of current data and information. This project is designed to be a collaborative effort, and we welcome feedback and suggestions from stakeholders concerned with the issue of maritime piracy. We hope that it will be a useful tool for analysts and policy makers working towards solutions to piracy.

Details: Louisville, CO: One Earth Future Foundation, 2010. 25p.

Source: Internet Resource: Working Paper: Accessed January 31, 2010 at: http://oneearthfuture.org/images/imagefiles/Cost%20of%20Piracy%20Final%20Report.pdf

Year: 2010

Country: International

Keywords: Costs of Crime

Shelf Number: 120641


Author: Warburton, William P.

Title: The Impact of Placing Adolescent Males into Foster Care on their Education, Income Assistance and Incarcerations

Summary: Understanding the causal impacts of taking youth on the margins of risk into foster care is an element of the evidence-base on which policy development for this crucial function of government relies. Yet, there is little research looking at these causal impacts; neither is there much empirical work looking at long-term outcomes. This paper focuses on estimating the impact of placing 16 to 18 year old male youth into care on their rates of high school graduation, and post-majority income assistance receipt and incarceration. Two distinct sources of exogenous variation are used to generate instrumental variables, the estimates from which are interpreted in a heterogeneous treatment effects framework as local average treatment effects (LATEs). And, indeed, each source of exogenous variation is observed to estimate different parameters. While both instruments are in accord in that placement in foster care reduces (or delays) high school graduation, the impact of taking youth into care on income assistance use has dramatically different magnitudes across the two margins explored, and, perhaps surprisingly, one source of exogenous variation causes an increase, and the other a decrease, in the likelihood of the youth being incarcerated by age 20. Our results suggest that it is not enough to ask whether more or fewer children should be taken into care; rather, which children are, and how they are, taken into care matter for long-term outcomes.

Details: Bonn, Germany: Institute for the Study of Labor, 2011. 38p.

Source: Internet Resource: IZA Discussion Paper No. 5429: Accessed February 1, 2011 at: http://ftp.iza.org/dp5429.pdf

Year: 2011

Country: International

Keywords: Adolescents

Shelf Number: 120643


Author: Ginsburg, Susan

Title: Countering Terrorist Mobility: Shaping an Operational Strategy

Summary: This report provides a blueprint for an integrated strategy to thwart terrorists by focusing on terrorist mobility. While all but the most recent government counterterrorism strategies since 9/11 omit mobility as a distinct element of terrorism requiring its own operational strategy, the report argues that terrorist mobility deserves comparable attention a nd resources to those devoted to terrorist finance and communications. She describes the elements of a terrorist mobility strategy that can use leads generated by terrorists' need to travel to counter their ability to enter, live in, or move within the United States and like-minded countries.

Details: Washington, DC: Migration Policy Institute, 2006. 140p.

Source: Internet Resource: Accessed February 1, 2011 at: http://www.migrationpolicy.org/pubs/MPI_TaskForce_Ginsburg.pdf

Year: 2006

Country: International

Keywords: Border Security

Shelf Number: 120652


Author: Faisandier, Sally

Title: Informing the Development of the Priority Offenders Initiative in New Zealand: A Synthesis of Relevant Literature

Summary: As a crime reduction strategy the Priority Offenders Initative in New Zealand aims to address the root causes of offending for an identified group of offenders (referred to as priority offenders) who are particularly persistent and/or prolific in the nature of their offending. The initiative is still at an early stage of development. This report presents a summary of the literature from England and Wales about crime reduction strategies with priority offenders. New Zealand literature is used to describe the co-ordinated case management approach that is proposed for the New Zealand Priority Offenders Initiative.

Details: Wellington, NZ: New Zealand Ministry of Justice, 2008. 52p.

Source: Internet Resource: Accessed February 1, 2011 at: http://www.justice.org.nz/policy/crime-prevention/documents/priority-offenders/POI%20lit%20synthesis.pdf

Year: 2008

Country: International

Keywords: Crime Prevention

Shelf Number: 120631


Author: Setiono, Bambang

Title: Fighting Forest Crime and Promoting Prudent Banking for Sustainable Forests Management: The Anti Money Laundering Approach

Summary: If illegal logging was a crime involving only poor forest-dependent people, truck drivers or underpaid forest rangers, it would not be difficult to stop. With involvement of financiers of illegal logging, known as cukong, legal timber industries, and government officers, illegal logging becomes a complex problem not only for Indonesia, but also for the international forestry community. The current forestry law enforcement approach fails to capture the masterminds of illegal logging. However, the money laundering law enforcement approach which ‘follows the money’ provides an important option to deal with the masterminds of illegal logging. This new approach requires banks and other financial service providers to be more active and prudent in dealing with financial transactions related to their customers. Bank customers could include financiers of illegal logging, timber industries, law enforcement and government officers. Overall, proper implementation of the anti money laundering regime should provide opportunities for promoting prudent banking practices and sustainable forest management, and for curtailing forestry crimes.

Details: Jakarta, Indonesia: Center for International Forestry Research, 2005. 25p.

Source: Internet Resource: CIFOR Occasional Paper No. 44: Accessed February 1, 2011 at: http://www.cifor.cgiar.org/publications/pdf_files/OccPapers/OP-44.pdf

Year: 2005

Country: International

Keywords: Illegal Logging

Shelf Number: 120653


Author: Tacconi, Luca

Title: National and International Policies to Control Illegal Forest Activities

Summary: The purpose of this study is to critically examine the range of national and international policy options available to reduce illegal forest activities. Illegal forest activities include a broad array of legal violations that range from violating ownership and use rights to engaging in corrupt relationships. They also may span activities at all stages of the forest production chain, from the acquisition of authorizations, to planning, to harvesting and transport of raw material and finished products, to financial management. Illegal forest activities pose a significant threat to the sustainability of forest ecosystems, result in losses of government revenues, foster a vicious cycle of bad governance, and may contribute to increased poverty and social conflict. As such, they have received considerable attention from the international community, particularly in recent years. Yet, significant gaps still exist both in the identification and evaluation of policy responses and in linking such responses to critical development priorities such as improved governance, improved livelihoods for the rural poor, environmental protection, sustainable forest management (SFM), and economic development. As such, the current debate on illegal forest activities has yet to recognize fully the broader implications of some options for such priorities. In this study we provide a framework for addressing these issues and to narrow these gaps. We present an overview of the symptomatic manifestations of illegal forest activities: Forest products generated in violation of government policies represent a very significant fraction of total production and may amount to 10-15 billion dollars in lost government revenues. We then provide a simple framework to understand the problem. In this framework we lay out that profit and income maximization are key aspects of the economic behavior of firms and individuals. Illegal behavior is more likely when the benefits derived from violating the law (e.g., timber mining, tax evasion, harvesting protected species or in unauthorized areas) exceed the costs of non-compliance. In large part, the policy options that are listed in the report consist of measures that reduce the economic rewards from illegal behavior, either by increasing the rewards of compliance, or by increasing the costs of non-compliance. Potential underlying market, governance and institutional causes of illegal forest activities, as well as capacity and technical factors are identified. We do so by first relying on the lessons learned from efforts to promote SFM over the past two decades. There are several reasons for doing so and particularly the fact that efforts to promote SFM and to reduce illegal forest activities are motivated by similar goals and challenges. These lessons learned from SFM experiences are then integrated with knowledge and insights gained from recent developments in our understanding of good forest governance to develop an array of possible policy responses by producer and consumer countries. An analysis of existing trade and environmental agreements, their lessons, and potential relevance to addressing illegal forest activities is presented. An analysis of trade data shows that Asian producer countries export mainly to other Asian countries, whereas African countries export mostly to Europe. Therefore, trade measures adopted by Asian consumer countries are most likely to have an impact on illegal trade and illegal logging in Asia (with the exception of China that imports from Africa as well). Trade measures implemented by European countries are most likely to be effective on illegal trade and illegal logging in Africa. The report concludes by presenting principles, criteria, and initial sequencing steps to aid the development of appropriate policy options to reduce illegal forest activities.

Details: Jakarta, Indonesia: Center for International Forestry Research, 2003. 63p.

Source: Internet Resource: Accessed February 1, 2011 at: http://www.cifor.cgiar.org/publications/pdf_files/events/Illegal-logging.pdf

Year: 2003

Country: International

Keywords: Illegal Logging

Shelf Number: 120568


Author: Marts, Charles

Title: Piracy Ransoms -- Conflicting Perspectives

Summary: This paper presents both sides of the debate over whether States should allow payment of ransoms to pirates. United States Executive Order 13536 and other recent national and international legislation have brought increased awareness to this issue. This paper does not attempt to settle the ransom debate, but instead highlights the key issues, which perhaps will inspire progress in the fight to curb piracy. In their simplest distillations the positions are the pro-ransom stance advocating use of all means available to limit immediate threats of violence and disaster; versus the anti-ransom stance advocating use of all means available to limit acts of piracy over a longer term. Maritime industry practitioners assert that paying ransoms are the only tool available once a ship has been hijacked. Paying ransoms, they claim, minimizes risks of escalated violence, revenue liability, and environmental disaster. Those individuals/States opposed to paying ransoms believe that each ransom payment fuels and perpetuates the menace of piracy and that the eventual outcome of this escalation would likely be military intervention. In the final section of this paper, we briefly examine recent legislation and a small sample of international views that illustrate the practical complexity of ransom policies. A reader unfamiliar with the laws and opinions concerning this issue may find it useful to read this section before jumping into the arguments.

Details: Louisville, CO: One Earth Future Foundation, 2010. 35p.

Source: Internet Resource: Working Paper: Accessed February 2, 2011 at: http://oneearthfuture.org/images/imagefiles/Ransom-%20Charlie%20Marts.pdf

Year: 2010

Country: International

Keywords: Hijacking of Ships

Shelf Number: 120657


Author: Dutton, Yvonne M.

Title: Bringing Pirates to Justice: A Case for Including Piracy Within the Jurisdiction of the International Criminal Court

Summary: The large and growing impunity gap for piracy can only be closed if the international community decides to act to bring pirates to justice. Piracy is a serious crime of international concern that is increasing in frequency and severity despite the unique ways in which the international community has been working together recently in an effort to repress and combat piracy. This Article suggests that pirates should be brought to justice using the extant International Criminal Court (ICC) by way of an optional protocol to include piracy within the ICC’s jurisdiction. Modern piracy is directed against victims from around the world, creates harms that are felt by the entire international community, and involves many of the same violent and cruel acts, such as murder, kidnapping, and hostage-taking, that are used to commit the crimes already within the ICC’s jurisdiction. Also, like the other crimes included within the court’s jurisdiction, piracy is a crime well-suited to the complementarity regime designed to help end impunity for serious crimes of concern to the international community. Nations are not prosecuting piracy suspects with any regularity, either because they do not have the laws, capacity, or resources to handle such prosecutions, or because they alone do not want to bear the various burdens associated with an expensive and difficult prosecution that affects numerous nations. The ICC could help end this culture of impunity regarding piracy offenses, and the burden of supporting the court’s adjudication of piracy cases could be shared by the international community more generally.

Details: Louisville, CO: One Earth Future Foundation, 2010. 34p.

Source: Internet Resource: Discussion Paper: Accessed February 2, 2011 at: http://www.oneearthfuture.org/siteadmin/images/files/file_52.pdf

Year: 2010

Country: International

Keywords: International Criminal Court

Shelf Number: 120658


Author: Andersen, Elizabeth

Title: Suppressing Maritime Piracy: Exploring the Options in International Law

Summary: Suppressing Maritime Piracy: Exploring the Options in International Law captures the discussions and recommendations of a distinguished group of international law and governance professors, legal experts, and judges who met in Washington D.C. for a workshop convened through the efforts of One Earth Future Foundati on, the Academic Council on the United Nations System, and the American Society of International Law. The workshop examined the legal framework currently employed to suppress piracy and explored potential alternatives or augmentations to the existing structures. More than anything else, the workshop revealed the immense complexity surrounding piracy. Two important aspects of the problem that emerged during the workshop are worth highlighting here: First, although there is a general tendency today to associate piracy with the failed state of Somalia, only about 40% of piracy events actually occur around the Horn of Africa. Maritime piracy is a persistent global criminal activity, and solving the Somali problem does not solve piracy in the rest of the world. It is important to keep in mind, while considering the findings of this workshop, that the legal framework applies globally. Second, piracy is a distinct crime in itself, but it often involves a complex nexus of other crimes, which are subject to different jurisdictional and legal rules than piracy. Pirate groups often commit, for example, assault, theft , kidnapping, torture, extortion, money laundering, and arms dealing — some of which may under certain circumstances constitute piracy while others may not. The legal responses to piracy should take into consideration this complexity. The report indicates that while the legal framework for dealing with piracy is well established, there are practical difficulties in implementation and outstanding questions that require further research. Our organizations welcome the opportunity to engage with others to develop appropriate avenues for this research.

Details: Louisville, CO: One Earth Future, 2010. 45p.

Source: Internet Resource: Accessed February 2, 2011 at: http://www.maritimeterrorism.com/wp-content/uploads/2010/03/Piracy-OneEarthFuture.pdf

Year: 2010

Country: International

Keywords: Maritime Crime

Shelf Number: 120659


Author: Jayamaha, Dilshika

Title: Lessons Learned from U.S. Government Law Enforcement in International Operations

Summary: Law enforcement (LE) aspects have been an increasingly prominent feature within the U.S. Government’s (USG’s) commitment to international operations. Beyond the deployment of police personnel to interim policing missions, LE agencies may also be involved in international operations to enforce U.S. domestic law; for capacity building; and/or in support of U.S. military forces. This analysis examines lessons from three operations: Panama (1989-99), Colombia (1989-Present), and Kosovo (1998-Present). This analysis was supported by an extensive range of interviews and in-country field research in Colombia and Kosovo. The lessons learned were developed and validated in a series of workshops with subject matter experts. The results show the pervasive and complex role that law enforcement and related issues have played in contemporary international operations. Despite the unique circumstances and history of each operation, there were key findings that are common to all operations considered and have implications for broader USG law enforcement efforts in support of current and future international operations.

Details: Carlisle, PA: Strategic Studies Institute, U.S. Army War College, 2010. 166p.

Source: Internet Resource: PKSOI Papers: Accessed February 2, 2011 at: http://pksoi.army.mil/PKM/publications/papers/paperreview.cfm?paperID=17

Year: 2010

Country: International

Keywords: International Policing

Shelf Number: 120673


Author: Monzini, Paola

Title: Smuggling of Migrants Into, Through and From North Africa: A Thematic Review and Annotated Bibliography of Recent Publications

Summary: “Smuggling of migrants†is defined in article 3 of the Protocol against the Smuggling of Migrants by Land, Sea and Air, supplementing the United Nations Convention against Transnational Organized Crime, as “the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a State Party of which the person is not a national or a permanent residentâ€. Article 6 of the Protocol requires the criminalization of such conduct and that of enabling a person who is not a national or a permanent resident to remain in the State concerned without complying with the necessary requirements for legally remaining in the State by producing a fraudulent travel or identity document, or procuring, providing or possessing such a document, or any other illegal means in order to obtain a financial or other material benefit. Based upon this definition, the purpose and scope of this publication is to survey existing sources and research papers on smuggling of migrants into, through and from North Africa reflecting the current state of academic knowledge, as well as knowledge gaps and discussions on the subject. This study has two main United Nations, Treaty Series, vol. 2241, No. 39574. objectives: to describe major findings on smuggling of migrants into, through and from North Africa, and to highlight the need for further research on specific issues that have not yet been studied and on areas where little analysis has yet been carried out. The publication reviews literature that has been published by academics, journalists, international organizations and non-governmental organizations. The reviewed literature was selected on the basis of its thematic relevance and date and the language of publication: only publications in English, French and Italian were reviewed. The research does not pretend to be comprehensive. As far as the geographical scope of the review is concerned, it is important to note that it actually goes beyond the North African countries, because irregular migration and smuggling flows are transnational in nature; they often originate and/or end in the North African region. For this reason, sub-Saharan African and European countries are also considered. The presence of smugglers is recorded mainly in relation to crossing of the Sahara Desert and the maritime passages to Europe. Thus, while the main focus of the review is on North African countries (Algeria, Egypt, the Libyan Arab Jamahiriya, Morocco and Tunisia), literature considering countries of origin and transit such as Mali, the Niger and the Sudan, and countries of destination and transit, such as Greece, Italy and Spain, has also been reviewed to some extent. As far as the routes to Europe are concerned, those ending in Spain have not been given the same attention in this review as have journeys ending on Italian shores. Some of the most important theoretical research papers published on the subject of migrant smuggling in general have also been considered. Where statistical data and other figures are quoted, reference is made to their source. The review is divided into thematic chapters that review research publications on the following topics: •• Quantifying irregular migration and smuggling of migrants into, through and from North Africa •• The geography of migrant smuggling routes •• Profiles and characteristics of smuggled migrants •• Smuggler-migrant relationships •• Organizational structures of migrant-smuggling networks •• Modus operandi of migrant smugglers •• Smuggling fees •• Human and social costs of smuggling Finally, the thematic review presents a summary of major findings, highlighting the challenges of carrying out research into the issue of migrant smuggling and the gaps in that research. The review is complemented by an annotated bibliography of the relevant literature.

Details: Vienna: United Nations Office on Drugs and Crime, 2010. 62p.

Source: Internet Resource: Accessed February 2, 2011 at: http://www.unodc.org/documents/human-trafficking/Migrant_smuggling_in_North_Africa_June_2010_ebook_E_09-87293.pdf

Year: 2010

Country: International

Keywords: Human Smuggling

Shelf Number: 120680


Author: Shaw, Margaret

Title: Handbook on the Crime Prevention Guidelines: Making Them Work

Summary: All countries experience crime, violence and victimization. This may lead to some of the following situations: countries with high proportions of young men who are killed before they become adults; societies with families who lose a parent or have members in prison, who are living in poverty and without access to support or legitimate sources of income; neighbourhoods experiencing gang wars or where there seems to be little public protection and security; women who are subjected to violence in their homes, or who are at risk of sexual assault in public spaces; neighbourhoods where levels of crime and insecurity have led businesses and families to cut themselves off from other citizens and public life behind gates and using private security; and migrants and minority groups living in dilapidated and isolated areas or informal settlements and subject to racial harassment and victimization. All countries strive to ensure safety and security for their citizens and to increase the quality of their lives. The guidelines on crime prevention developed by the United Nations incorporate and build on years of experience and experiments in responding to these problems. Such experience has shown that countries can build safer communities using practical, concrete approaches that are very different from, and less costly than repressive and deterrent reactions and responses. The present Handbook is one of a series of practical tools developed by the United Nations Office on Drugs and Crime (UNODC) to support countries in the implementation of the standards and norms in crime prevention and criminal justice. These standards and norms support the rule of law, human rights and a culture of lawfulness through the development of crime prevention and criminal justice reform. The Handbook can be used in a variety of contexts, including as part of UNODC technical assistance and capacity-building projects, whether as a reference document or a training tool. A number of companion projects already exist, including the Crime Prevention Assessment Tool, and the Handbook on Planning and Action for Crime Prevention in Southern Africa and the Caribbean Regions. The Handbook offers a concise overview of the main considerations to be taken into account in planning and implementing crime prevention strategies and interventions. It also recognizes that there are some major differences between regions and countries in terms of the challenges posed by crime and victimization and the importance of adapting programmes to local contexts. The main emphasis is on how crime prevention strategies based on the guidelines developed by the United Nations can be entrenched and sustained over time.

Details: Vienna: UNODC, 2010. 115p.

Source: Internet Resource: Accessed February 8, 2011 at: http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/10-52410_Guidelines_eBook.pdf

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 120712


Author: Haken, Jeremy

Title: Transnational Crime In The Developing World

Summary: This report analyzes the scale, flow, profit distribution, and impact of 12 different types of illicit trade: drugs, humans, wildlife, counterfeit goods and currency, human organs, small arms, diamonds and colored gemstones, oil, timber, fish, art and cultural property, and gold. Though the specific characteristics of each market vary, in general it can be said that these profitable and complex criminal operations originate primarily in developing countries, thrive in the space created by poverty, inequality, and state weakness, and contribute to forestalling economic prosperity for billions of people in countries across the world.

Details: Washington, DC: Global Financial Integrity, 2011. 68p.

Source: Internet Resource: Accessed February 8, 2011 at: http://www.gfip.org/storage/gfip/documents/reports/transcrime/gfi_transnational_crime_high-res.pdf

Year: 2011

Country: International

Keywords: Art Crime

Shelf Number: 120716


Author: Walton, Oliver

Title: Youth, Armed Violence and Job Creation Programmes: A Rapid Mapping Study

Summary: In response to growing evidence from the social science literature about the links between youth unemployment and armed conflict, donors have increasingly used youth job creation programmes as a tool with which to address armed violence. Many donors now identify addressing youth unemployment as an urgent priority, both in the field of peacebuilding and in efforts to foster economic development. The link between job creation and peacebuilding has been affirmed by the UN Secretary General’s approval of the ‘UN Policy For Post-Conflict Employment Creation, Income Generation And Reintegration’ in 2008 and more recently by the ILO’s 2010 Guidelines on Local Economic Recovery in Post-Conflict. A new sub-target for the first Millennium Development Goal which focused on youth unemployment was agreed in 2007. Donor armed violence reduction (AVR) strategies have begun to deploy a range of multi-sectoral interventions, including job creation, although AVR integration into donor strategies ‘remains relatively rare’. This rapid mapping study reviews donor approaches to addressing armed violence through youth job creation programmes. It covers a range of programmes including reintegration programmes, early recovery and cash for work programmes; as well as integrated AVR programmes that involve youth job creation components. Section two assesses the theoretical and empirical case for using job creation as a means of reducing armed violence. Section three provides an overview of key donor strategies for addressing armed violence and conflict through youth employment generation. Section four assesses the impact of these interventions; section five identifies some gaps in the current literature. Section six highlights some specific examples of successful programmes and section seven draws out some lessons and best practice based on donor experience. The study finds that both the theoretical and the empirical cases for using youth employment programmes as a stand-alone tool for reducing violent conflict are extremely weak. Donor interventions have been poorly evaluated and evidence of success is usually limited to demonstrating increases in employment levels, with little effort made to assess the impact on conflict. The evidence on using job creation as part of an integrated or comprehensive armed conflict or AVR strategy is stronger: some government-led initiatives in countries that experience high levels of armed violence (such as Brazil and South Africa) have shown clear positive results in reducing levels of armed violence. The study finds that donor approaches to reduce armed violence through job creation schemes have become more nuanced and sophisticated. There has been a growing emphasis on ‘holistic’, ‘comprehensive’ and ‘integrated’ approaches that go beyond simply addressing a lack of economic opportunities and seek to address the more complex array of factors that cause social exclusion for young people. These initiatives combine and integrate job-creation schemes with a range of other forms of intervention, such as capacity-building and training in conflict resolution. In a similar way AVR strategies have moved beyond a narrow focus on controlling arms and reducing the demand for weapons, towards more comprehensive strategies that address a range of risk factors associated with armed violence. Donors have also sought to make job creation schemes more effective by conducting more rigorous contextual analysis. They have also looked to improve the effectiveness and relevance of these schemes by working more closely with the private sector and tackling the demand-side of youth unemployment. Despite this progress, there is a still a significant gap between donor rhetoric and practice in this area.

Details: Oslo, Norway: Norwegian Peacebuilding Centre, 2010. 24p.

Source: Internet Resource: Accessed February 8, 2011 at: http://www.gsdrc.org/docs/open/EIRS11.pdf

Year: 2010

Country: International

Keywords: Armed Violence

Shelf Number: 120717


Author: United Nations. Office of the High Commissioner for Human Rights

Title: Recommended Principles and Guidelines on Human Rights and Human Trafficking

Summary: Over the past decade, human trafficking has moved from the margins to the mainstream of international concern. During this period we have witnessed the rapid development of a comprehensive legal framework that comprises international and regional treaties, as well as a broad range of soft-law instruments relating to trafficking. These changes confirm that a fundamental shift has taken place in how the international community thinks about human exploitation. It also confirms a change in our expectations of what Governments and others should be doing to deal with trafficking and to prevent it. On a very practical level, a human rights-based approach to trafficking requires an acknowledgement that trafficking is, first and foremost, a violation of human rights. Trafficking and the practices with which it is associated, including slavery, sexual exploitation, child labour, forced labour, debt bondage and forced marriage, are themselves violations of the basic human rights to which all persons are entitled. Trafficking disproportionately affects those whose rights may already be seriously compromised, including women, children, migrants, refugees and persons with disabilities. A human rights approach to trafficking also demands that we acknowledge the responsibility of Governments to protect and promote the rights of all persons within their jurisdiction, including non-citizens. This responsibility translates into a legal obligation on Governments to work towards eliminating trafficking and related exploitation. A human rights approach to trafficking means that all those involved in anti-trafficking efforts should integrate human rights into their analysis of the problem and into their responses. This approach requires us to consider, at each and every stage, the impact that a law, policy, practice or measure may have on persons who have been trafficked and persons who are vulnerable to being trafficked. It means rejecting responses that compromise rights and freedoms. This is the only way to retain a focus on the trafficked persons: to ensure that trafficking is not simply reduced to a problem of migration, a problem of public order or a problem of organized crime.

Details: New York and Geneva: United Nations, 2010. 255p.

Source: Internet Resource: Accessed February 8, 2011 at: http://www.ohchr.org/Documents/Publications/Commentary_Human_Trafficking_en.pdf

Year: 2010

Country: International

Keywords: Child Labor

Shelf Number: 120718


Author: European Commission

Title: Violence Against Women and the Role of Gender Equality, Social Inclusion and Health Strategies

Summary: The purpose of this study is to provide a systematic analysis and insight into the social aspects of violence against women, considering all types of violence (e.g. physical, psychological and sexual) and focusing primarily on analysis of gender equality, social inclusion and health strategies, as well as the action plans available to combat violence, and paying specific attention to the three angles of prevention, treatment, and reintegration of victims into society. The goal is to present a clear picture of what takes place in these domains within the 27 Member States, the three EEA/EFTA countries and the three candidate countries (Croatia, the former Yugoslav Republic of Macedonia and Turkey). The information in this report was mainly provided by the national experts of the EGGSI network of experts in gender equality, social inclusion, healthcare and long-term care. The report is organised in three chapters: the first summarises the main features of violence against women in Europe. The second chapter gives an overview of policies addressing violence against women from the perspective of prevention, support for the victim and social reintegration. The final chapter presents some general conclusions.

Details: Luxembourg: Publications Office of the European Union, 2010. 212p.

Source: Internet Resource: Accessed February 8, 2011 at: ec.europa.eu/social/BlobServlet?docId=6336&langId=en

Year: 2010

Country: International

Keywords: Battered Women

Shelf Number: 120721


Author: Scheyvens, Henry

Title: Enhancing Customs Collaboration To Combat The Trade In Illegal Timber

Summary: This report builds on the initiatives of the Asia Forest Partnership and East Asia and Pacific FLEG to promote cooperation among Customs, Forestry and other authorities to reduce the trade of illegal wood products. The goal of this review is to assist Customs and timber trade regulating agencies in their efforts to improve control over the international tropical timber trade, thereby preventing trade from being a driver of illegal logging and thus supporting the management, conservation and sustainable development of forests. This study is based on a wide-ranging analytical review of (i) Customs and illegal logging literature, (ii) international legal instruments, (iii) bilateral arrangements that assign or imply a role for Customs in combating the trade of illegal timber, (iv) model and existing agreements for Customs mutual administrative assistance, and (v) existing Customs networks. The review was augmented through consultations including Customs, Forestry and other officials, experts and key stakeholders. Further input was provided through the peer review workshop for this paper, which was held on 28-29 October 2009 in Bangkok.

Details: Kanagawa, Japan: Institute for Global Environmental Strategies, 2010. 69p.

Source: Internet Resource: Accessed February 8, 2011 at: http://enviroscope.iges.or.jp/modules/envirolib/upload/2784/attach/iges_trade_in_illegal_timber.pdf

Year: 2010

Country: International

Keywords: Customs Enforcement

Shelf Number: 120723


Author: Mejia, Daniel

Title: Cocaine Production and trafficking: What Do We Know?

Summary: The main purpose of this paper is to summarize the information currently available on cocaine production and trafficking. The paper starts by describing the available data on cocaine production and trade, the collection methodologies (if available) used by different sources, the main biases in the data, and the accuracy of different data sources. Next, it states some of the key empirical questions and hypotheses regarding cocaine production and trade and takes a first look at how well the data match these hypotheses. The paper states some of the main puzzles in the cocaine market and studies some of the possible explanations. These puzzles and empirical questions should guide future research on the key determinants of illicit drug production and trafficking. Finally, the paper studies the different policies that producer countries have adopted to fight against cocaine production and the role consumer countries play in the implementation of anti-drug policies.

Details: Washington, DC: The World Bank, Development Research Group, Macroeconomics and Growth Team, 2008. 62p.

Source: Internet Resource: Policy Research Working Paper 4618: Accessed February 9, 2011 at: http://www-wds.worldbank.org/servlet/WDSContentServer/WDSP/IB/2008/05/13/000158349_20080513084308/Rendered/PDF/wps4618.pdf

Year: 2008

Country: International

Keywords: Cocaine

Shelf Number: 120727


Author: Jakobsson, Niklas

Title: The Law and Economics of International Sex Slavery: Prostitution Laws and Trafficking for Sexual Exploitation

Summary: Trafficking in humans for sexual exploitation is an economic activity driven by profit motives. Laws regarding commercial sex influence the profitability of trafficking. Using cross country data we show that trafficking of persons for commercial sexual exploitation is least prevalent in countries where prostitution is illegal, most prevalent in countries where prostitution is legalized, and in between in those countries where prostitution is legal but procuring illegal. Case studies of countries that have changed legal framework support the claims on the direction of causality as well as the causal mechanisms. The results suggest that criminalizing buying and/or selling sex may reduce the amount of trafficking to a country.

Details: Goteborg, Sweden: School of Business, Economics and Law, University of Gothenburg, 2010. 28p.

Source: Internet Resource: Working Papers in Economics, No. 458: Accessed February 9, 2011 at: http://gupea.ub.gu.se/bitstream/2077/22825/1/gupea_2077_22825_1.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 120729


Author: Medina, Carlos

Title: An Assessment of How Urban Crime and Victimization Affects Life Satisfaction

Summary: We assess the effect of the homicide rate, individual‟s perception of security in their neighborhood of residence, and of the effect of their having been victimized, on life satisfaction. We find a negative effect of the homicide rate on life satisfaction for the subsample of individuals living in their current houses for at least 10 years or more, who had moved to that place at some point in the past. We also find a positive and robust effect of the perception of security in the households' neighborhood for the whole sample, and for different subsamples considered. Having been victim of an offense is also robustly negatively related to life satisfaction, in particular in the cases where the offense was robbery.

Details: Bogota, Colombia: Borradores de Economia, 2011. 36p.

Source: Internet Resource: Working Paper No. 640: Accessed February 9, 2011 at: http://www.banrep.gov.co/docum/ftp/borra640.pdf

Year: 2011

Country: International

Keywords: Homicide

Shelf Number: 120731


Author: Horne, Christine

Title: Using Laboratory Experiments to Study Law and Crime

Summary: The 19th and 20th centuries produced breakthroughs in physics, chemistry, and the biological sciences. Laboratory research played an important role in the rapid advances made in these fields. Laboratory research can also contribute progress in the social sciences and, in particular, to law and criminology. To make this argument, we begin by discussing what laboratory experiments can and cannot do. We then identify three issues in the criminological and legal literature: why violence is higher in the southern United States than in the North, the relation between the severity of punishment and crime, and the expressive effects of law. We describe the relevant data from laboratory experiments and discuss how these data complement those gained through other methods.

Details: Zurich, Switzerland: Swiss Federal Institute of Technology, 2010. 33p.

Source: Internet Resource: CCSS Working Paper Series 10-010: Accessed February 9, 2011 at: http://web.sg.ethz.ch/wps/pdf/CCSS-10-010.pdf

Year: 2010

Country: International

Keywords: Experimental Methods

Shelf Number: 120732


Author: Bandyopadhyay, Siddhartha

Title: Crime Reporting: Profiling and Neighbourhood Observation

Summary: We consider the effect of giving incentives to ordinary citizens to report potential criminal activity. Additionally we look at the effect of "profiling" and biased reporting. If police single out or profile a group for more investigation, then crime in the profiled group decreases. If a certain group is reported on more frequently through biased reporting by citizens, crime in the group reported on actually increases. In the second model, we consider a neighbourhood structure where individuals get information on possible criminal activity by neighbours on one side and decide whether to report or not based on the signal. When costs of reporting are low relative to the cost of being investigated, costs of investigation are increasing in the number of reports and there is at least one biased individual, we show there is a "contagion equilibrium" where everyone reports his or her neighbour.

Details: Working Paper

Source: Internet Resource: Accessed February 9, 2011 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1691844

Year: 2010

Country: International

Keywords: Bias

Shelf Number: 120736


Author: Dottridge, Mike

Title: Child Labour Today

Summary: This report, the third in the series, exposes the exploitation of children as workers. Tens of millions of children around the world today work long hours from very young ages. Some are even recruited as cannon fodder for political causes, or are treated as sex toys. Here we explain the nature and scale of the problem and the growing international concern to eradicate the worst abuses. The report describes cases from around the world of children who start work instead of attending school, of those whose lives are endangered by their work, and of children who are treated as if they were items to be bought or sold, rather than as human beings. It also brings the picture closer to home and looks at the exploitation of children at work in the United Kingdom. It reports on the experiences of professionals involved in the field, and the opinions of British children themselves, gathered in a unique survey. The report also reveals how foreign national children are brought into the UK specifically to be exploited as workers, in homes as well as restaurants, factories and farms. It looks at the serious inadequacies of the protection currently available, particularly for children brought to the UK especially to be exploited, and recommends action to be taken. This report also describes some of UNICEF’s current initiatives to advocate for the rights of the world’s 350 million child and youth workers and to protect them against abuse at work, as well as pinpointing the action needed to end the economic exploitation of children.

Details: New York: UNICEF, 2005. 65p.

Source: Internet Resource: Accessed February 10, 2011 at: http://www.unicef.es/contenidos/273/child_labour_today.pdf

Year: 2005

Country: International

Keywords: Child Labor

Shelf Number: 117367


Author: Blickman, Tom

Title: Countering Illicit and Unregulated Money Flows: Money Laundering, Tax Evasion and Financial Regulation

Summary: In July 1989, the leaders of the economic powers assembled at the G7 Paris summit decided to establish a Financial Action Task Force (FATF) to counter money laundering as an effective strategy against drug trafficking by criminal ‘cartels’. Here began an international anti-money laundering (AML) regime. Since then it has expanded its scope to fight transnational organized crime and counter the financing of terrorism. During that time other illicit or unregulated money flows have appeared on the international agenda as well. Today, tax evasion and avoidance, flight capital, transfer pricing and mispricing, and the proceeds of grand corruption are seen as perhaps more detrimental obstacles to good governance and the stability and integrity of the financial system. Other international bodies were tasked to tackle these ‘public bads’. Tackling tax evasion is still in its infancy, and there is a growing awareness that the AML regime is not working as well as intended. Experts still ponder how to implement one that works. Tax havens and offshore financial centres (OFCs) were identified as facilitating these unregulated and illicit money flows. The 2007-2008 credit crisis made only too clear the major systemic risk for all global finance posed by the secrecy provided by tax havens and OFCs. They were used to circumvent prudential regulatory requirements for banks and other financial institutions and hide substantial risks from onshore regulators. After twenty years of failed efforts, the G20 (having supplanted the G7) has again pledged to bring illicit and harmful unregulated money flows under control. This briefing looks at previous attempts to do so and the difficulties encountered along the way. Can the G20 succeed or is it merely following the same path that led to inadequate measures? What are the lessons to be learned and are bolder initiatives required? In brief, the paper concludes that current initiatives have reached their sale-by date and that a bolder initiative is required at the UN level, moving from recommendations to obligations, and fully engaging developing nations, at present left out in the current ‘club’-oriented process.

Details: Amsterdam: Transnational Institute, 2009. 39p.

Source: Internet Resource: Crime and Globalisation Debate Papers: Accessed February 10, 2011 at: http://www.idpc.net/sites/default/files/library/Countering%20illicit%20and%20unregulated%20money%20flows.pdf

Year: 2009

Country: International

Keywords: Cartels

Shelf Number: 118152


Author: Kar, Dev

Title: The Absorption of Illicit Financial Flows from Developing Countries: 2002-2006

Summary: A recent study by Kar and Cartwright-Smith (2008) found that over the period 2002 to 2006, illicit financial flows from developing countries increased from US$372 to US$859 billion. The purpose of this paper is to link these outflows with major points of absorption consisting of offshore financial centers and developed country banks. While offshore centers have recently attracted media attention regarding their lack of transparency, the paper finds that large data gaps exist for banks as well. These gaps make it difficult to analyze the absorption of illicit funds, defined as the change in private sector deposits of developing countries in banks and offshore centers. The paper argues that both need to greatly improve the transparency of their operations. Regular reporting of detailed deposit data by sector, maturity, and country of residence of deposit holder would close many of the data gaps identified in this paper and allow for a more robust analysis of the absorption of illicit flows from developing countries. Given data limitations, certain assumptions had to be made regarding the behavior of illicit flows and investments. These assumptions were formulated as control variables for a simple model of absorption. Several simulations of illicit outflows against absorption (defined as the non-bank private sector deposits of developing countries) were carried out using different settings of the control variables. The paper finds that while offshore centers have been absorbing an increasing share of illicit flows from developing countries over the five-year period of this study, international banks have played a pivotal role in facilitating that absorption. Depending upon whether one uses the narrower Bank for International Settlements or broader International Monetary Fund definition (a control variable), offshore centers hold an estimated 24 or 44 percent of total absorption respectively, while banks hold the balance. As total absorption consists of both licit and illicit funds, the paper presents a simple algebraic analysis to estimate the portion of such deposits in banks and offshore centers. Furthermore, the analysis shows that the polar extreme (all illicit or all licit) in such holdings by either group is not tenable given the overall volume of illicit flows and absorption.

Details: Washington, DC: Global Financial Integrity, 2010. 36p.

Source: Internet Resource: Accessed February 11, 2011 at: http://www.gfip.org/storage/gfip/documents/reports/absorption_of_illicit_flows_web.pdf

Year: 2010

Country: International

Keywords: Financial Crimes

Shelf Number: 120745


Author: Kar, Dev

Title: Illicit Financial Flows from Developing Countries: 2002-2006

Summary: This report shows that the developing world is losing an increasing amount of money through illicit capital flight each year. Moreover, the value of the illicit flows surpasses the amount of Official Development Assistance entering those countries by an order of magnitude. "Illicit financial flows siphon revenue out of poor countries, robbing them of much-needed assets and forestalling economic development,†said GFI director Raymond Baker. “These new figures reveal that illicit financial flows outpace Official Development Assistance by a ratio of nearly 10 to 1. This is critical to understanding global poverty and developing effective poverty alleviation and economic development strategies,†Baker said. Primary findings of the report include: Total capital flight exiting the developing world may be as much as $1 trillion dollars per year; Measured against the flow of Official Development Assistance in 2006 poor countries, in aggregate, are losing close to $10 dollars for every $1 dollar they receive in aid; The volume of capital flight from developing countries is increasing at an average of 18.5% a year. Over the five-year period of this study, illicit financial flows grew at the fastest pace in the Middle East and North Africa region (49.4 percent) followed by Europe (25.4 percent), Asia (15.7 percent), and the Western Hemisphere (2.8 percent). Illicit financial flows from Africa actually declined (-2.9 percent) but this decline is more the result of incomplete data than supportive economic or political factors. Illicit financial flows refer to money that is illegal in its origin, transfer or use and reflect the proceeds of corruption, crime and tax evasion. Corporate avoidance of customs duties, VAT and income taxes constitute an estimated 60% of the total outflow. The study utilized multiple economic models which were combined and “tested†to determine the most reliable estimates. The findings were based on macroeconomic trade and external debt data maintained by the International Monetary Fund and the World Bank.

Details: Washington, DC: Global Financial Integrity, 2008. 45p.

Source: Internet Resource: Accessed February 11, 2011 at: http://www.gfip.org/storage/gfip/executive%20-%20final%20version%201-5-09.pdf

Year: 2008

Country: International

Keywords: Corruption

Shelf Number: 120746


Author: Kar, Dev

Title: Illicit Financial Flows from Developing Countries: 2000-2009, Update with a Focus on Asia

Summary: The report, “Illicit Financial Flows from Developing Countries: 2000-2009,†finds that approximately $6.5 trillion was removed from the developing world from 2000 through 2008. The report also examines illicit flows from Asia, which produced the largest portion of total outflows and makes projections for 2009. The report ranks countries according to magnitude of outflows with China ranking 1 ($2.18 trillion), Russia 2 ($427 billion), Mexico 3 ($416 billion), Saudi Arabia 4 ($302 billion), and Malaysia 5 ($291 billion). The report also shows the annual outflows for each country and breaks outflows down into two categories of drivers: trade mispricing and “other,†which includes kickbacks, bribes, embezzlement, and other forms of official corruption. The report also looks at the impact of the global economic recession—on both magnitudes and trends in illicit outflows, it makes policy recommendations, and it projects outflows for 2009 (for which complete data is not yet available).

Details: Washington, DC: Global Financial Integrity, 2011. 64p.

Source: Internet Resource: Accessed February 11, 2011 at: http://www.gfip.org/storage/gfip/documents/reports/IFF2010/gfi_iff_update_report-web.pdf


Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 120748


Author: International Consortium of Investigative Journalists

Title: Tobacco, Terrorism, and Illicit Trade: China, Paraguay, Ukraine: Inside the World's Top Smuggling Hubs; Taliban, al-qaeda, Other Terrorists Funded by Cigarette Black Markets

Summary: The six-part series is part of Tobacco Underground, a year-long investigation by ICIJ into cigarette smuggling — featuring interactive maps, undercover video, online interviews with experts, and links to groups and documents worldwide. In addition to fueling corruption, organized crime, and terrorism, the illicit trafficking of tobacco robs governments of needed tax money and spurs addiction to a deadly product, the ICIJ series reports. “ICIJ shows again how the illicit trafficking of tobacco is out of control,†said Center Executive Director Bill Buzenberg. “Renegade factories, multinational companies, and weak enforcement all play a role in fueling this multi-billion dollar illegal trade, whose profits rival those of narcotics.†Experts believe that smuggled cigarettes — either untaxed legitimate brands or counterfeits — account for 12 percent of all cigarette sales, or about 657 billion “sticks†annually, making tobacco the world’s most widely smuggled legal substance. The cost to governments worldwide is massive: an estimated $40 billion to $50 billion in lost tax revenue each year. ICIJ first exposed the complicity of Big Tobacco in smuggling nine years ago, helping spark lawsuits and government crackdowns around the world. This report includes the following articles: (1) Terrorism and Tobacco: Extremists, Insurgents Turn to Cigarette Smuggling. Terrorists are increasingly turning to cigarette smuggling for funding. The move is part of a larger trend toward use of criminal rackets by terrorists, who find trafficking in cigarettes a high-profit, low-risk way to finance operations. Among the groups are Pakistan’s Taliban militias, for whom cigarettes are now second only to heroin as a funding source. (2)China’s Marlboro Country: A Massive Underground Industry Makes China the World Leader in Counterfeit Cigarettes. China now produces an unprecedented 400 billion counterfeit cigarettes annually. Cheap Chinese fakes are now sold in major cities worldwide, from New York delis to London storefronts. Officials believe China is the source of 99 percent of U.S. counterfeit cigarettes and up to 80 percent of those in the European Union. Lab tests reveal the Chinese counterfeits release 80 percent more nicotine and 130 percent more carbon monoxide than brand-name cigarettes, and have impurities that include insect eggs and human feces. (3) Smuggling Made Easy: Landlocked Paraguay Emerges as a Top Producer of Contraband Tobacco. Paraguay’s renegade factories produce more than 20 times what the country consumes, and are now responsible for 10 percent of the world’s contraband tobacco, experts estimate. The vast majority of the cigarettes — up to 90 percent of production, worth an estimated $1 billion— disappears into an often violent black market, law enforcement officials say. (4) Ukraine’s “Lost†Cigarettes Flood Europe: Big Tobacco’s Overproduction Feeds $2 Billion Black Market. Each year, the world’s four top multinational tobacco companies — Philip Morris International, Japan Tobacco International, Imperial Tobacco, and British American Tobacco — produce and import 30 billion cigarettes in Ukraine beyond what the country can consume, fueling a $2 billion black market that reaches across the European Union. Today, Ukraine is rivaled only by Russia as the top source of non-counterfeit cigarettes smuggled to Europe.

Details: Washington, DC: International Consortium of Investigative Journalists, 2009. 36p.

Source: Internet Resource: Accessed February 11, 2011 at: http://www.publicintegrity.org/news/entry/1534/

Year: 2009

Country: International

Keywords: Black Markets

Shelf Number: 119537


Author: Schreier, Fred

Title: Cyber Security: The Road Ahead

Summary: The open Internet has been a boon for humanity. It has not only allowed scientists, companies and entities of all sorts to become more effective and efficient. It has also enabled an unprecedented exchange of ideas, information, and culture amongst previously unconnected individuals and groups. It has completely revolutionized on a global scale how we do business, interact and communicate. Cyberspace is defined by its ubiquitous connectivity. However, that same connectivity opens cyberspace to the greatest risks. As networks increase in size, reach, and function, their growth equally empowers law-abiding citizens and hostile actors. An adversary need only attack the weakest link in a network to gain a foothold and an advantage against the whole. Seemingly localized disruptions can cascade and magnify rapidly, threaten other entities and create systemic risk. However, vulnerabilities in cyberspace are real, significant and growing rapidly. Critical national infrastructure; intelligence; communications, command and control; commerce and financial transactions; logistics; consequence management; and emergency preparedness are wholly dependent on networked IT systems. Cyber security breaches, data and intellectual property theft know no limits. They affect everything from personal information to national secrets. This paper looks at the way these problems are likely to develop, as well as at some of the ways they may best be tackled at the national and international level.

Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2011. 53p.

Source: Internet Resource: DCAF Horizon 2015 Working Paper No. 4: Accessed February 14, 2011 at: http://www.dcaf.ch/Publications/Publication-Detail?lng=en&id=126370

Year: 2011

Country: International

Keywords: Cyber Security

Shelf Number: 120755


Author: Lawson, Sam

Title: Illegal Logging and Related Trade: Indicators of the Global Response

Summary: Illegal logging and associated trade in illegally sourced wood products are important causes of deforestation and forest degradation in many developing countries. Forest destruction in turn contributes up to 20 per cent of global carbon dioxide emissions. Illegal logging also robs cash-strapped governments of vital revenues, has a devastating impact on the livelihoods of forest-dependent people, and fosters corruption and conflict. Over the last decade governments, the private sector and civil society have recognized these impacts and have made increasing efforts to tackle the problem. This study attempts to measure the scale and the effectiveness of the response to illegal logging. It examines the response in countries where illegal logging occurs and also in those countries which import, process and consume illegally sourced wood. In addition to measuring the extent to which illegal logging and associated trade has changed over time, the study examines how attention to the problem has changed and how governments and the private sector have responded. Various indicators and means of verification have been designed, tested and used by Chatham House to measure the response in five timber-producing countries, five consuming countries, and two countries whose timber trade is largely based on processing imported raw material for export. The study finds that while illegal logging remains a major problem, the impact of the response has been considerable. Illegal logging is estimated to have fallen during the last decade by 50 per cent in Cameroon, by between 50 and 75 per cent in the Brazilian Amazon, and by 75 per cent in Indonesia, while imports of illegally sourced wood to the seven consumer and processing countries studied are down 30 per cent from their peak.

Details: London: Chatham House, 2010. 132p.

Source: Accessed February 15, 2011 at: http://www.chathamhouse.org.uk/files/16950_0710pr_illegallogging.pdf

Year: 2010

Country: International

Keywords: Illegal Logging

Shelf Number: 120770


Author: Lopez-Casero, Federico

Title: Customs Collaboration to Combat the Interntional Trade in Illegal Timber

Summary: While it is widely understood that forests fulfil economic, social and environmental functions that are critical to human survival and wellbeing, their destruction continues at an alarming rate; the area of primary forest in Asia decreased at an average rate of 1.5 million hectares per annum from 1990-2005 (FAO 2006, 135). Not all of this deforestation is planned. In developing tropical countries, illegal logging is a significant cause of forest degradation that often leads to permanent land use conversion. Because timber markets mostly do not distinguish between legal and illegal timber, international trade can inadvertently act as a driver of illegal logging. Various initiatives are underway to reform the international timber trade to support legal and sustainable forest operations. This policy brief presents the findings of a study conducted by IGES and The Nature Conservancy (TNC) from June 2008 to January 2010 under the Responsible Asia Forestry and Trade (RAFT) programme for customs agencies to be involved in this endeavour. We mostly associate customs with collecting revenues and combating the trade in narcotics, weapons, etc. but the IGESTNC study found that customs could also play an important role in reducing the cross-border movement of illegal timber. The recommendations of the IGES-TNC study include: • Use existing bilateral agreements on illegal logging to build the capacity of customs and collaboration within and between countries for more effective enforcement of the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). • Use export declarations as a check on legality at the point of import. • Target regional processes and platforms for regular meetings between customs and forestry officials. • Make more effective use of existing World Customs Organisation (WCO) networks and tools.

Details: Kanagawa, Japan: Institute for Global Environmental Strategies, 2010. 8p.

Source: Internet Resource: Policy Brief No. 11: Accessed February 15, 2011 at: http://enviroscope.iges.or.jp/modules/envirolib/upload/2934/attach/pb11_e.pdf

Year: 2010

Country: International

Keywords: Customs/Borders

Shelf Number: 120772


Author: Friesendorf, Cornelius, ed.

Title: Strategies Against Human Trafficking: The Role of the Security Sector

Summary: Security sector personnel are well-placed to assist in the fight against human trafficking: by identifying victims; investigating networks; disrupting operations; and prosecuting traffickers. Moreover, trafficking, like many crimes, flourishes where the rule of law is weak, such as in post-conflict situations. Restoring security based on the rule of law can reduce vulnerability to human trafficking and other types of organised crime. Strategies Against Human Trafficking: The Role of the Security Sector provides practical guidance on how practitioners in the security sector can take measures against modern-day slavery.

Details: Vienna and Geneva: National Defence Academy and Australian Ministry of Defence and Sports, 2009. 514p.

Source: Internet Resource: Accessed February 16, 2011 at: http://www.acrath.org.au/multimedia/downld/var/Strategies_Against_Human_Trafficiking-The_Role_of_the_Security_Sector_Vienna&Geneva_Sep2009.pdf

Year: 2009

Country: International

Keywords: Border Security

Shelf Number: 120807


Author: Snyder, Neil N.

Title: Disrupting Illicit Small Arms Trafficking in the Middle East

Summary: "The illicit trade in small arms and light weapons delivers a global supply of weapons and ammunition to the demand of rogue state and non-state actors. While arms do not create conflict, they increase the intensity of violent conflict. The illicit trafficking of small arms contributes to irregular conflicts in the Middle East, a region of persistent conflict and instability. The international community has attempted to regulate the global supply of small arms through non-binding agreement and embargoes, but these efforts have been ineffective in achieving the goal of preventing the flow of weapons to criminal organizations, terrorists, and other de-stabilizing non-state actors. This thesis systematically examines the illicit small arms trade to identify points of vulnerability. This study identifies a strategy to disrupt the flow of arms to specific groups or states by countering arms brokers and the networks of actors that brokers coordinate."

Details: Monterey, CA: Naval Postgraduate School, 2008. 87p.

Source: Internet Resource: Thesis: Accessed February 17, 2011 at: https://www.hsdl.org/?view&doc=107048&coll=limited

Year: 2008

Country: International

Keywords: Arms Trafficking (Middle East)

Shelf Number: 120811


Author: Killicoat, Phillip

Title: Weaponomics: The Global Market for Assault Rifles

Summary: This paper introduces the first effort to quantitatively document the small arms market by collating field reports and journalist accounts to produce a cross-country time-series price index of Kalashnikov assault rifles. A model of the small arms market is developed and empirically estimated to identify the key determinants of assault rifle prices. Variables which proxy the effective height of trade barriers for illicit trade are consistently significant in determining weapon price variation. When controlling for other factors, the collapse of the Soviet Union does not have as large an impact on weapon prices as is generally believed.

Details: Washington, DC: The World Bank, 2007. 23p.

Source: Internet Resource: Policy Research Working Paper 4202; Accessed February 17, 2011 at: http://www-wds.worldbank.org/servlet/WDSContentServer/WDSP/IB/2007/04/13/000016406_20070413145045/Rendered/PDF/wps4202.pdf

Year: 2007

Country: International

Keywords: Arms Trafficking

Shelf Number: 120814


Author: McNeill, Fergus

Title: Research and Practice in Risk Assessment and Risk Management of Children and Young People Engaging in Offending Behaviours: A Literature Review

Summary: This study has been undertaken with the main aim of providing an evaluation of the literature on research and practice in relation to the risk assessment and risk management of children and young people engaging in offending behaviours, to be used to inform the RMA’s future work in these fields. The study incorporates two aspects: a) a review of national and international literature on the practices and processes of risk assessment and risk management of children and young people who engage in offending behaviour, with particular reference to violent offending and sexually harmful behaviour, and b) a review of current practice in the assessment and management of children and young people at risk of harm and re-offending in Scotland, carried out by means of telephone interviews with academic researchers and practitioners working in statutory and voluntary sectors across Scotland.

Details: Paisley, Scotland: Risk Management Authority Research, 2007. 107p.

Source: Internet Resource: Accessed February 17, 2011 at: http://rmascotland.org/ViewFile.aspx?id=327

Year: 2007

Country: International

Keywords: Juvenile Offenders

Shelf Number: 120815


Author: Farrington, David P.

Title: Assessing Violence Risk: A Framework for Practice

Summary: The main aim of this report is to assess the usefulness of risk assessment instruments for violence. We assess this in two ways, first by reviewing empirical evaluations of predictive accuracy and, second by surveying practitioner opinions about usefulness. The major instruments that we can compare are the OGRS and GSIR (static, statistical predictors for offender samples), the VRAG and PCL-R/PCL:SV (mainly static predictors focusing on personality disordered offenders), the HCR-20 and RAG-F (containing both static and dynamic items) and the LSI-R/LS/CMI (a mainly dynamic predictor focusing on criminogenic needs that have implications for treatment). In this report, we try to bridge the gap between the evaluation standards of the scientific research community and those of practitioners and users of risk assessment instruments. This report is in two parts. The first presents a systematic review of research on the accuracy of risk assessment instruments in predicting violence. We conclude that a simple static instrument such as the OGRS and an instrument that incorporates both static and dynamic risk factors such as the HCR-20 seem most useful on the basis of currently available evidence. We recommend more analyses of the predictive validity of individual items, more efforts to develop a dynamic risk assessment instrument, and more evaluation research in Scotland. The second part presents the results of a survey of practitioners to ascertain their opinions about different violence risk assessment instruments. They were asked to evaluate the instruments on standards such as the existence of a user manual, the need for user qualifications and competencies, accessible training, ease of use, administration time, ease of scoring, concordance of results with other information, and confidence in risk assessment. Most instruments met most standards, but the least satisfactory instruments were the RAG-F and PCL-R. No instruments were viewed as providing satisfactory coverage of protective factors. Based on quantitative and qualitative information from practitioners, the most satisfactory instrument seems to be the HCR-20. We conclude by making recommendations about a framework for assessing the risk of violence and what the RMA might do next to develop a screening instrument. Our main recommendations are as follows: 􀂾 The purpose and function of the instrument should be clearly stated. 􀂾 The instrument should have a user manual and a training programme. 􀂾 The instrument should include static and dynamic, risk and protective factors. 􀂾 The instrument should be used in an individualised way as part of a structured clinical judgement. The instrument should be designed to identify those who do or do not require a more intensive assessment. Finally, users should always bear in mind the difficulties involved in moving from predictions about individuals, and should be extremely cautious in drawing any conclusions about a person’s risk of future violence.

Details: Cambridge, UK: Institute of Criminology, Cambridge University, 2008. 101p.

Source: Internet Resource: Accessed February 18, 2011 at: http://www.cjsw.ac.uk/cjsw/files/Farrington%202008.pdf

Year: 2008

Country: International

Keywords: Risk Assessment

Shelf Number: 120820


Author: Grampian Police

Title: Missing Persons: Understanding, Planning, Responding

Summary: When presented with any missing person enquiry, it is important to first consider the various scenarios which may account for the person not being where the informant expects them to be. There may be clear evidence that explains the absence, or points the enquiry in a particular direction. Unfortunately, in many cases there are no clear indicators as to what the missing person might have done, or where they may have gone. There are various ‘Profiling Tools’ set out in this booklet to assist officers with focusing in on the most likely scenario, as well as formulating the most appropriate response. The purpose of this booklet is to provide officers with background information on the most common mental illnesses, and the associated behaviour traits a missing person suffering from one of these conditions is likely to display. The booklet contains chapters on the following mental conditions: Depression; Suicide; Dementia; Psychosis / Schizophrenia; Bipolar Disorder (Manic Depressives); Attention Deficiency Disorder (ADD) Chapters regarding ‘Missing Children’ and how to search for ‘People Missing in Water’ are also included. Once officers have established which, if any, mental condition a missing person is suffering from, they can consult the relevant chapter in the booklet. The missing person profile can then be further refined using the age and gender of the person as set out.

Details: Aberdeen, UK: Grampian Police, 2007. 52p.

Source: Internet Resource: Accessed February 18, 2011 at: http://www.missingpersons.gov.au/Assets/Files/169deac2-9629-45bb-9408-cabb9d9ded82.pdf

Year: 2007

Country: International

Keywords: Missing Children

Shelf Number: 120829


Author: Goulka, Jeremiah

Title: Toward a Comparison of DNA Profiling and Databases in the United States and England

Summary: Many senior U.S. law enforcement officials believe that the English criminal justice system has capitalized more fully on the crime-fighting potential of forensic DNA evidence than the U.S. criminal justice system. They contend that the English system is much faster at testing DNA samples and at uploading the test results into its forensic DNA database and that the English national DNA database provides more database hits that might help law enforcement solve and prevent crimes. Members of the RAND Center on Quality Policing (CQP) asked RAND researchers to explore the forensic DNA analysis systems in England and the United States to find out whether these perceptions are accurate. This report presents CQP's best efforts to undertake this comparative analysis, which was severely hampered by a lack of data on the U.S. and English forensic DNA systems and the unwillingness of some U.S. agencies to share their data. The authors make use of the limited available information to undertake comparisons of the two systems, highlighting the limitations of these comparisons. Additionally, they discuss broader issues that arose during the course of the analysis as to the appropriate metrics that should be used for comparison and the contextual factors that they think should be taken into account in any international comparison of DNA database systems.

Details: Santa Monica, CA: RAND, 2010. 32p.

Source: Internet Resource: Issues in Policing: Accessed February 22, 2011 at: http://www.rand.org/content/dam/rand/pubs/technical_reports/2010/RAND_TR918.pdf

Year: 2010

Country: International

Keywords: DNA Typing

Shelf Number: 120841


Author: World Health Organization

Title: Global Strategy to Reduce the Harmful Use of Alcohol

Summary: Harmful use of alcohol results in the death of 2.5 million people annually, causes illness and injury to many more, and increasingly affects younger generations and drinkers in developing countries. Alcohol use is the third leading risk factor for poor health globally. A wide variety of alcohol-related problems can have devastating impacts on individuals and their families and can seriously affect community life. The harmful use of alcohol is one of the four most common modifiable and preventable risk factors for major noncommunicable diseases (NCDs). There is also emerging evidence that the harmful use of alcohol contributes to the health burden caused by communicable diseases such as, for example, tuberculosis and HIV/AIDS. This report includes a number of policy options and interventions available for national action which can be grouped into 10 recommended target areas. These 10 areas are: (a) leadership, awareness and commitment (b) health services’ response (c) community action (d) drink-driving policies and countermeasures (e) availability of alcohol (f) marketing of alcoholic beverages (g) pricing policies (h) reducing the negative consequences of drinking and alcohol intoxication (i) reducing the public health impact of illicit alcohol and informally produced alcohol1 (j) monitoring and surveillance.

Details: Geneva: World Health Organization, 2010. 44p.

Source: Internet Resource: Accessed February 22, 2011 at: http://www.who.int/substance_abuse/msbalcstragegy.pdf

Year: 2010

Country: International

Keywords: Alcohol Abuse

Shelf Number: 120850


Author: Dal Bo, Ernesto

Title: Self-Esteem, Moral Capital, and Wrongdoing

Summary: We present an infinite-horizon model of moral standards where self-esteem and unconscious drives play key roles. In the model, an individual receives random temptations (such as bribe offers) and must decide which to resist. Individual actions depend both on conscious intent and a type reflecting unconscious drives. Temptations yield consumption value, but keeping a good self-image (a high belief of being the type of person that resists) yields self-esteem. We identify conditions for individuals to build an introspective reputation for goodness ("moral capital") and for good actions to lead to a stronger disposition to do good. Bad actions destroy moral capital and lock-in further wrongdoing. Economic shocks that result in higher temptations have persistent effects on wrongdoing that fade only as new generations replace the shocked cohorts. Small parametric differences across societies may lead to large wrongdoing differentials, and societies with the same moral fundamentals may display different wrongdoing rates depending on how much past luck has polarized the distribution of individual beliefs. The model illustrates how optimal deterrence may change under endogenous moral costs and how wrongdoing may be compounded as high temptation activities attract individuals with low moral capital.

Details: Cambridge, MA: National Bureau of Economic Research, 2008. 46p.

Source: Internet Resource: NBER Working Paper Series, Working Paper 13408: Accessed February 22, 2011 at: http://www.nber.org/papers/w14508.pdf

Year: 2008

Country: International

Keywords: Moral Capital

Shelf Number: 120851


Author: Newton, Andrew

Title: Building an Evidence Abuse on Alcohol Supply Points: A Pilot Project to Generate Intelligence for Managing Areas with Licensed Premises

Summary: This report presents the findings of a twelve month study conducted by the Applied Criminology Centre, University of Huddersfield. This pilot project sought to generate intelligence for managing areas with licensed premises by building an evidence base on alcohol supply points (ASPs). For the purposes of this project, ASPs are considered to be any licensed premises that can sell alcohol for consumption on and/or off the premise, for example public houses, bars, nightclubs, restaurants, corner shops, off licenses, hotels, cinemas, and social clubs. Despite substantial efforts towards multi-partnership working, data collection and intelligence sharing to tackle alcohol-related crime and disorder in areas with ASPs, the capture of data on ASPs is fragmented. Intelligence gathering often occurs in isolation except for sporadic multi-agency enforcement visits to premises. This impairs attempts to gain a strategic overview of the timing and location of the availability of alcohol, the proximity of the various outlets to each other, and their relationship to crime and disorder. This evidence base is a necessary foundation for making informed decisions about the management of areas with licensed premises, including: the granting and renewal of licensing applications; the development of local crime prevention and harm reduction strategies; and targeting policing and other enforcement activities. The aim of this project was to address this deficiency. The aim of this project was to address this deficiency by piloting the creation of an ASPs database in three case study areas, and to explore possible relationships between alcohol supply and crime and disorder in local contexts. There was an identified need for consistent and reliable data on ASPs that could be shared between relevant organisations, and for local areas to develop intelligence on alcohol supply tailored to their needs. Any system developed should be simple, user friendly, relevant, and add value to what currently exists.

Details: Huddersfield, UK: Applied Criminology Centre, University of Huddersfield, 2010. 116p.

Source: Internet Resource: Accessed February 22, 2011 at: http://www.aerc.org.uk/documents/pdfs/finalReports/AERC_FinalReport_0064.pdf

Year: 2010

Country: International

Keywords: Alcohol Related Crime, Disorder

Shelf Number: 120853


Author: Begum, Bilkis

Title: Anti-Social Behaviour: A Practitioners Guide

Summary: This guide begins by describing the problem of ASB and reviewing factors associated with the risk of its occurrence. In section 2, it then identifies a series of questions to help analysts investigate local Anti-Social Behaviour problems. Finally, in section 3, it reviews responses to the problem and what is known about these from evaluative research and police practice. In reviewing the research, it became evident that much of the literature concerned with ASB has taken a Sociological perspective (reflecting the mainstream in Criminology). This is reflected in the content of the review. However, where appropriate, additional research concerned with disorder (which overlaps considerably with ASB) is reviewed to illuminate what is known about this type of behaviour from other perspectives within criminology. Anti-Social Behaviour covers a general set of problems related to what are described as subcriminal level incivilities and disorder. This guide is limited to addressing ASB on a general level, without dealing with individual behaviour types in detail. Rather it aims to provide an overview with examples from the range of problems which would fall under this category.

Details: London: UCL Jill Dando Institute of Crime Science, University College London, 2009. 58p.

Source: Internet Resource: Accessed February 22, 2011 at: http://uel-iis-dev.uel.ac.uk/geo-information/SEDUC/documents/Reports/ASB_PractitionersGuide.pdf

Year: 2009

Country: International

Keywords: Antisocial Behavior

Shelf Number: 120858


Author: International Federation of Journalists

Title: Gunning for Media: Journalists and Media Staff Killed in 2010

Summary: In 2010, 94 journalists and media staff were killed, victims of targeted killings, bomb attacks and crossfire incidents. Three other journalists lost their lives in accidents at work. The details of the losses are spelled out in the enclosed reports from the IFJ regional centres. They show how Pakistan tops the list of the most dangerous zones for journalists in 2010, ahead of Mexico, Honduras and Iraq. Although the numbers are down from the 139 killings recorded a year earlier and are the lowest for eight years, they reveal that regional conflicts, drug wars and political unrest continue to create killing fields for journalists and people who work with them.

Details: Brussels: International Federation of Journalists, 2011. 36.

Source: Internet Resource: Accessed February 24, 2011 at: http://www.ifj.org/assets/docs/177/253/f8badb1-e23bbfd.pdf

Year: 2011

Country: International

Keywords: Homicides

Shelf Number: 120865


Author: Financial Action Task Force

Title: Money Laundering Using Trust and Company Service Providers

Summary: Trust and Company Service Providers (TCSPs) provide an important link between financial institutions and many of their customers. TCSPs have often been used, wittingly or unwittingly, in the conduct of money laundering activities. This comprehensive typologies report evaluates the effectiveness of the practical applications of the FATF 40+9 Recommendations as they relate to TCSPs. It also considers the role of TCSPs in the detection, prevention and prosecution of money laundering and terrorist financing. Finally, it evaluates the potential need for additional international requirements or sector-specific international standards for TCSPs. This typologies exercise has drawn from the research and conclusions that were made in previous work, such as the 2006 FATF Typologies study "The Misuse of Corporate Vehicles, including Trust and Company Service Providers" ; from analysis of jurisdictions' responses to a questionnaire developed for this project; as well as case studies obtained from various sources. This report presents issues for consideration that should help to reduce the use of TCSPs for money laundering purposes.

Details: Paris: FATF, 2010. 104p.

Source: Internet Resource: Accessed February 24, 2011 at: http://www.fatf-gafi.org/dataoecd/4/38/46706131.pdf

Year: 2010

Country: International

Keywords: Financial Crimes

Shelf Number: 120874


Author: Flynn, Michael

Title: Immigration Detention and Proportionality

Summary: Immigration detention is characterized by a tension between the prerogatives of sovereignty and the rights of non-citizens. While states have broad discretion over who is allowed to enter and reside within their borders, their decision to detain and deport is constrained by a number of widely accepted norms and principles. One of these is the principle of proportionality, which provides that any decision to deprive a person of his or her liberty must be proportionate to specific ends established in law. Typically, questions of proportionality are raised in the context of individual legal cases to assess the necessity or potential arbitrariness of detention measures. For instance, in a well known case concerning the long-term detention of a Cambodian asylum seeker in Australia, the UN Human Rights Committee1 ruled that Australia failed to provide justification for holding the person in detention for more than four years, arguing that “remand in custody could be considered arbitrary if it is not necessary in all the circumstances of the case, for example to prevent flight or interference with evidence: the element of proportionality becomes relevant in this context†(A v. Australia 1997: para 9.2). This Global Detention Project working paper argues that the proportionality principle, despite its close association to individual legal cases, can also be used as a lens through which to assess the operations of detention centres, as well as overall detention regimes. In particular, the paper focuses on the intimate association between immigration detention and criminal incarceration as well as the institutional framework of detention estates, both of which raise a number questions about whether detention practices are proportionate to the administrative aims of immigration policy. The opening sections of this paper describe its focus—the detention centre itself — and provide a detailed definition of the phenomenon of immigration-related detention. The paper then advances a model for constructing data on detention centres that can assist comparative study of detention estates. It concludes by proposing and carefully characterizing a discrete list of variables that can be used to assess these regimes according to various applications of the proportionality principle.

Details: Geneva: Global Detention Project, 2011. 32p.

Source: Internet Resource: Global detention Project Working Paper No. 4: Accessed February 24, 2011 at: http://www.globaldetentionproject.org/fileadmin/publications/GDP_detention_and_proportionality_workingpaper.pdf

Year: 2011

Country: International

Keywords: Immigrant Detention

Shelf Number: 120876


Author: Finlay, Brian D.

Title: Counterfeit Drugs and National Security

Summary: The deadly implications of counterfeit drugs are well understood to be a central challenge to the integrity of public health systems around the globe, as well as a direct threat to our individual health and welfare. What is less understood is that the profits from this sinister crime are increasingly being co-opted by an array of organized criminal groups and terrorist entities as a means by which to fund their nefarious operations around the world. As such, counterfeit pharmaceuticals pose a direct threat to national and international security. According to the World Health Organization (WHO), counterfeit drugs could make up as much as half of the global pharmaceutical market, with the largest share of fake products circulating in the developing world where regulation and enforcement capacity is comparatively weak. Though the basis of this estimate is unclear, the figure is especially alarming given the narrow definition of “counterfeit†used by the agency. However, it is clear that counterfeit pharmaceuticals remain one of the world’s fastest growing industries. Recent trends suggest a massive increase in counterfeit drug sales to over $70 billion globally in 2010. This is an increase of more than 90 percent from 2005. Although the counterfeiting of, and trafficking in, all manner of products is on the rise globally — including currency, documents, software, and electronics — no other bogus product has the capacity to harm or even kill its consumer as do illicit pharmaceuticals. Additionally, most other counterfeits are not quite as lucrative. According to a recent report on counterfeit drugs by the global pharmaceutical firm Pfizer, profits from counterfeiting today surpass gains made from heroin and cocaine. These alarming rates of growth are, in part, a result of the growing size and sophistication of drug counterfeiting rings, and the widening involvement of organized transnational criminals and even international terrorist groups looking to fund their illegal and unrelated activities worldwide. Indeed, not only have groups such as the Russian mafia, Colombian drug cartels, Chinese triads, and Mexican drug gangs all become heavily involved in producing and trafficking counterfeit drugs over the past decade, but mounting evidence also points to the direct involvement of Hezbollah and al Qaeda. With increased opportunity to make gains from the pharmaceutical counterfeit industry, nefarious actors are likely to pay even more attention to it in the future. As such, the problem is not only a public health hazard of highest magnitude; it is also a national and international security threat.

Details: Washington, DC: The Stimson Center, 2011. 16p.

Source: Internet Resource: Accessed February 28, 2011 at: http://www.stimson.org/images/uploads/research-pdfs/Full_-_Counterfeit_Drugs_and_National_Security.pdf

Year: 2011

Country: International

Keywords: Counterfeit Drugs

Shelf Number: 120881


Author: International Mass-Marketing Fraud Working Group

Title: Mass-Marketing Fraud: A Threat Assessment

Summary: Mass-marketing fraud is a term increasingly used around the world to refer to fraud schemes that use mass-communications media – including telephones, the Internet, mass mailings, television, radio, and even personal contact – to contact, solicit, and obtain money, funds, or other items of value from multiple victims in one or more jurisdictions. Although law enforcement and regulatory authorities often use a variety of names to refer to the phenomenon – including “advance-fee fraud,†“419 fraud,†“Internet fraud,†and “telemarketing fraud†– the growing profusion of labels for these fraud schemes tends to obscure the fact that such schemes often are conducted using multiple communications channels to identify and contact victims, as well as identical or highly similar methods of operation that are not dependent on a single communications medium. Today, mass-marketing fraud schemes operate from, and increasingly seek to target victims in, numerous countries on multiple continents. Moreover, such schemes are aware and take advantage of differences between countries in legislative authorities prohibiting such schemes. As a consequence, mass-marketing fraud has become a substantial concern for law enforcement in several regions of the world. The International Mass-Marketing Fraud Working Group (IMMFWG) prepared this threat assessment to provide governments and the public with a current assessment of the nature and scope of the threat that mass-marketing fraud poses around the world. The IMMFWG, which was established in September 2007, consists of law enforcement, regulatory, and consumer protection agencies from seven countries, including Australia, Belgium, Canada, the Netherlands, Nigeria, the United Kingdom, and the United States, as well as Europol. The IMMFWG seeks to facilitate the multinational exchange of information and intelligence, the coordination of cross-border operations to detect, disrupt, and apprehend mass-marketing fraud, and the enhancement of public-awareness and public-education measures concerning international mass-marketing fraud schemes. The information and analysis in this assessment is current through May 2010, and are derived principally from public and non-public law enforcement and non-law enforcement sources in Australia, Belgium, Canada, the Netherlands, Nigeria, the United Kingdom, and the United States.

Details: International Mass-Marketing Fraud Working Group, 2010. 34p.

Source: Internet Resource: Accessed March 8, 2011 at: http://www.ice.gov/doclib/cornerstone/pdf/immfta.pdf

Year: 2010

Country: International

Keywords: Fraud

Shelf Number: 120897


Author: Global Alliance Against Traffic in Women

Title: Beyond Borders: Exploring Links Between Trafficking and Labour; Exploring Links Between Trafficking and Gender; Exploring Links Between Trafficking, Globalisation, and Security; Exploring Links Between Trafficking and Migration

Summary: The Global Alliance Against Traffic in Women (GAATW) was launched in 1994 by a group of women’s rights activists looking for answers to simple questions: Why do women migrate? Why do some of them end up in exploitative situations? What types of jobs are they entering into? Which human rights are being violated before, during, and after their journey? How are they showing resistance to abuses and achieving their migratory goals? Answering these questions became a collaborative effort involving countless organisations and individuals over the years, and contributed to creating a more sophisticated anti-trafficking framework. This anti-trafficking framework has in many cases contributed to protecting the rights of trafficked persons. However, excessive focus on the issue of human trafficking over the last several years has also tended to ignore other related phenomena, such as people’s experiences in migration and work. Consequently, anti-trafficking has become somewhat isolated from its context and is now a highly specialised field. Such specialisation does occur in every field of knowledge and is to some extent necessary. Yet, there is a danger in trying to address the problem of human trafficking without understanding the changing context of labour and migration in a rapidly globalising world. By doing so we would be looking at trafficking exclusively as a crime and not as the end result of a number of interconnected social factors. Further, our understanding will lack the ability to create progressive political change unless we analyse the complex social reality from a gender and human rights perspective. At a practical level we have observed that this segregation of expertise is impairing our ability to assist people or effect change when rights violations are happening. As the research documented in Collateral Damage (GAATW, 2007) pointed out, anti-trafficking initiatives have in some instances harmed the very people whose rights they have claimed to protect. Exclusive focus on trafficking without a social analysis also contributes to sensationalism. It creates the false impression that trafficking is a problem that can be solved by merely taking a few legal measures and providing assistance to those identified as trafficked. Thus, the long term goal of advocating for systemic and structural changes in society gets overlooked. Regrettably, while many of us in civil society find ourselves in specialised niche areas, sometimes our advocacy efforts in one area may run counter to the advocacy efforts made by other social movements. For example, our loud condemnation of exploitation of women migrant workers may encourage the states to stop women from migrating altogether. Indeed, strict border controls have been touted as anti-trafficking measures. How do we then condemn rights violations, but also expose the agenda of states as protectionist towards women? How do we uphold rights of migrating people, but not let the state abdicate its responsibilities towards its citizens and their right to livelihood in their own countries? How do we expose workplace exploitation and advocate for standard wages for all, but not let our advocacy result in a large number of people losing their jobs and being replaced by another set of workers in some other place? Obviously, there are no easy solutions. As we see it, understanding the existing links among the issues, starting inter-movement dialogues, and collaborating with colleagues on concrete cases are essential steps. Over the last two years, GAATW has tried to address this specialisation through different means. One of them has been to work on this series of Working Papers, which explores links between trafficking and migration; trafficking and labour; trafficking and gender; and trafficking, globalisation, and security. These Working Papers look at which broader understandings are most relevant for anti-trafficking advocates, such as: Why do labour rights matter for trafficked persons? How do states’ security measures affect women’s movement through territories and borders? The rationale for these Working Papers is simple. We, like many others, are acknowledging the existing links between trafficking, migration and labour, in the broader contexts of gender and systems of globalisation and security. We are taking a further step by examining those intersections from a human rights perspective. These Working Papers outline where the anti-trafficking framework can strengthen other frameworks and vice versa, and where we as advocates can work together and establish joint strategies. The Papers also aim to identify tensions among the different frameworks, and recognise the spaces for separate work. The complexities in people’s lives cannot be captured by one story or approach alone, whether that approach is anti-trafficking, women’s rights, human rights, migrant rights, or labour rights. In other words, a person’s life cannot be summarised as being merely that of a “trafficked person†or “migrant workerâ€, as often happens. People’s lives are richer than their trafficking, migration and work experiences. People, in spite of hardship, show great amounts of courage, resourcefulness and resilience, and find ways to negotiate complicated situations to exercise their rights. Our Papers have focussed on the lives of women. As an alliance of primarily women’s rights organisations, much of our direct engagement is with women. While we decided to give centrality to women’s lived experiences, we are certainly not denying that experiences of exploitation and trafficking for men are any less horrendous. These four Working Papers depict numerous examples of migrant women exercising agency. The Papers also show that, because space for agency is determined by the systems a person must navigate, different frameworks (labour, migration, anti-trafficking, and so on) can be used at different moments to increase women’s power over their own situations. Although these four Working Papers have distinctive features, they all cover the following broad areas: • Basic concepts in the field • Examples of the links between trafficking and other issues in the work of civil society actors, governments, and other stakeholders • The beneficial and harmful effects of these simultaneous factors on working migrant women • The importance of using a human rights-based approach • How groups from different sectors can work together in new ways • Policy recommendations People who are interested in the interface between theory and practice, and between conceptual and pragmatic work, are the intended audience of these Working Papers.

Details: Bangkok: Global Alliance Against Traffic in Women, 2010. 4 pts.

Source: Internet Resource: GAATW Working Papers Series 2010: Accessed March 8, 2011 at: www.gaatw.org

Year: 2010

Country: International

Keywords: Border Control

Shelf Number: 120909


Author: Jobe, Alison

Title: The Causes and Consequences of Re-trafficking: Evidence from the IOM Human Trafficking Database

Summary: Although there is a consensus agreement among international organizations, governments and academics regarding the seriousness and significance of re-trafficking as a problem, there has been very little research conducted into its incidence, cause or consequence. The majority of information on and discussion about re-trafficking is anecdotal, and research findings, where they exist, are few in number. Where retrafficking is discussed in literature, it is often in relation to concerns over the links between re-trafficking and deportations and/or reintegration projects, although much empirical research regarding the exact nature of such relationships remains elusive. It is apparent from studies which have analysed rates of re-trafficking that the secondary trafficking of previously trafficked persons is a substantive issue – one that is not adequately reflected to date in the growing body of research on human trafficking. This research paper aims to address the gap through an exploratory analysis of known re-trafficking cases in the Human Trafficking Database of the International Organization for Migration (IOM).

Details: Geneva: International Organization for Migration, 2010. 80p.

Source: Internet Resource: Accessed March 8, 2011 at: http://www.iom.int/jahia/webdav/site/myjahiasite/shared/shared/mainsite/published_docs/studies_and_reports/causes_of_retrafficking.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 120905


Author: Jelsma, Martin

Title: The Development of International Drug Control: Lessons Learned and Strategic Challenges for the Future

Summary: The emergence of more pragmatic and less punitive approaches to the drugs issue may represent the beginning of change in the current global drug control regime. The spread of HIV/AIDS among injecting drug users, the overcrowding of prisons, the reluctance in South America to remain a theatre for military anti-drug operations, and the ineffectiveness of repressive anti-drug efforts to reduce the illicit market have all contributed to the global erosion of support for the United States-style war on drugs. Over the last decade rapidly widening cracks have begun to split global drug control consensus. The zero-tolerance ideology is increasingly challenged by calls for decriminalisation, harm reduction and embedding human rights principles in drug control. And in recent years the merits of a regulated legal market for cannabis has been accepted as part of the mainstream debate about a more effective control model. This paper describes how the foundations for the global control system were established, the radicalization of the system toward more repressive implementation, consequently leading to soft defections and de-escalation efforts becoming more widespread; and in the last section projects a future for the ongoing reform process toward a modernization and humanization of the control system’s international legal framework as laid down in the UN drug control conventions.

Details: Amsterdam: Transnational Institute, 2010. 16p.

Source: Internet Resource: Working Paper Prepared for the First Meeting of the Commission, Geneva, 24-25 January 2011: http://www.tni.org/paper/development-international-drug-control

Year: 2010

Country: International

Keywords: Drug Abuse Policy

Shelf Number: 120902


Author: Bronitt, Simon

Title: The Social Implications of Covert Policing

Summary: This volume is based on a selection of papers presented at a workshop held in April 2009 at the Australian National University in Canberra. The workshop canvassed a wide range of topics addressing the application of covert surveillance techniques in policing and their social implications. Participants were drawn from a range of professions and disciplines including policing and intelligence studies; criminology and criminal justice; Information and Communication Technologies (ICT); law, ethics, human rights and public policy. As a group, participants recognised the need to equip law enforcement with the right tools for the job, though the corollary was the consensus that new and emerging technologies need to be regulated effectively. The discussion also underscored the importance of not limiting debate about reform to technical or technological perspectives. Wide normative concerns (drawn from a legal, human rights, public policy or ethical perspectives) must also be addressed.

Details: Wollongong, Australia: University of Wollongong Press, Centre for Transnational Crime Prevention, Faculty of Law, 2010. 193p.

Source: Internet Resource: Accessed March 8, 2011 at: http://www.ceps.edu.au/files/The%20Social%20Implications%20of%20Covert%20Policing.pdf

Year: 2010

Country: International

Keywords: Covert Policing

Shelf Number: 120911


Author: Vollaard, Ben

Title: Preventing Crime Through Selective Incapacitation

Summary: Making the length of a prison sentence conditional on an individual’s offense history is shown to be a powerful way of preventing crime. Under a law adopted in the Netherlands in 2001, prolific offenders could be sentenced to a prison term that was some ten times longer than usual. We exploit quasi-experimental variation in the moment of introduction and the frequency of application across 12 urban areas to identify the effect. We find the sentence enhancements to have dramatically reduced theft rates. The size of the crime-reducing effect is found to be subject to sharply diminishing returns.

Details: Tilburg, The Netherlands: Tilburg Law and Economics Center, Tilburg University, 2010. 51p.

Source: Internet Resource: Tilec Discussion Paper, No. 2011-001; CentER Discussion Paper, No. 2010-141: Accessed March 9, 2011 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1738900

Year: 2010

Country: International

Keywords: Incarceration

Shelf Number: 120959


Author: Petrosino, Anthony

Title: 'Policing Schools' Strategies: A Systematic Search for Experimental and Quasi-Experimental Studies

Summary: WestEd researchers undertook a systematic search of the literature to identify experimental and quasi-experimental evaluations of policing schools strategies. Police have long implemented strategies at schools, and this study takes stock of the evidence that assesses the effectiveness of those strategies. Although police-taught prevention curricula like Drug Abuse Resistance Education (D.A.R.E.) have been the subject of many high-quality evaluations and at least two systematic reviews, the evidence concerning other police-led school strategies is less well-known. This study is an attempt to take stock of what is known.

Details: Woburn, MA: WestEd, 2011. 75p.

Source: Internet Resource: Accessed March 10, 2011 at: http://gunston.gmu.edu/cebcp/PetrosinoetalPolicingSchools.pdf

Year: 2011

Country: International

Keywords: Police in Schools

Shelf Number: 120965


Author: Maxwell, Gabrielle

Title: Effective Programmes for Youth at Risk of Continued and Serious Offending: Something to Do, Someone to Love, Something to Hope For.

Summary: Over the last 30 years an enormous amount of research on the problem of how best to respond to youth offenders has become available. This information provides the opportunity to replace folk wisdom with evidence on best practice. The report is based on that evidence, using information from New Zealand and around the world. Yet evidence alone is not enough. Fundamental values and principles drive choices about how to respond to young people. There is not always agreement around these. In this paper we present a set of values and principles which are consistent with international human rights standards. These emphasise the rights of all children to have the opportunity to learn and grow and be treated humanely, recognising that mistakes that can damage both themselves and others are often part of growing up. The first chapter of this report sets out values and principles that build around the need and right of all children and young people to have ‘someone to love, something to do and something to hope for’. New Zealand needs to be ‘a place to call home’ in all senses of that word – a place where they can belong, a place where they are tangata whenua and have a sense of whanaungatanga, connectedness with community. The second chapter of the report summarises core findings from research that compares the backgrounds of children who do and do not offend. It indicates that factors that increase the risk of offending can be clearly identified. Understanding risks is important if we are to provide children with support early in their lives. But the research also shows that if we are to successfully intervene in the lives of young people who are already offending, then the focus needs to shift to their individual needs. We need to identify new and more appropriate ways of providing good education. We need to build life skills and help young people cope better with their emotions. We need to respond to drug and alcohol dependency. We need to respond to physical and mental health needs. We need to keep these young people safe. Above all, we need to build a web of support, community and opportunity around them so they can take advantage of the skills that can set them on the pathway to adult life. Society has a responsibility to invest in the future of all children and young people. Too often governments and the general public have taken the view that the past behaviour of these young people means that they no longer deserve opportunities that will require the investment of the State. But not investing in these young people now creates an even greater risk to community safety. It also ignores the fact that these young people have almost always been severely disadvantaged throughout their childhood and unable to benefit from opportunities available to their peers. Chapter three focuses on how best to develop and assess programmes. It examines the relationship between outcomes and investment. It describes how best to evaluate the effectiveness of programmes and it identifies the key factors that need to be the concern of those developing and operating programmes. A checklist has been included to assist those concerned to assess and evaluate the effective programme. In an appendix to the report a number of different types of programmes are described and some information is given on how their effectiveness was determined.

Details: Wellington, NZ: Henwood Trust; Institute of Policy Studies, 2010. 58p.

Source: Internet Resource: Accessed March 11, 2011 at: http://www.henwoodtrust.org.nz/Effective-Programmes.pdf

Year: 2010

Country: International

Keywords: Juvenile Offenders

Shelf Number: 120976


Author: Amnesty International

Title: How an Arms Trade Treaty Can Help Prevent Armed Violence

Summary: Over the past decade, there has been growing international momentum to conceptualise, document and address the various manifestations of “armed violenceâ€. To date the discourse has focused largely on the causes and effects of armed violence and explored the range of available programming options to prevent and reduce it. Discussions on the Arms Trade Treaty (ATT) currently underway in the United Nations (UN) provide an important opportunity to examine armed violence in the context of decisions concerning international transfers and the export and import of conventional arms used in armed violence. One of the objectives of the ATT is to address the “absence of common international standards on the import, export and transfer of conventional arms.†As the UN General Assembly has noted, this absence contributes to “conflict, displacement of people, crime and terrorism†thereby undermining peace, reconciliation, safety, security, stability and sustainable development.†In other words, the absence of such common international standards contributes to armed violence. Common international standards in the ATT should require States to establish and maintain effective national regulatory mechanisms. The ATT should also require States to licence or otherwise authorise exports and other international transfers of conventional weaponry, munitions and related equipment (“conventional armsâ€) in conformity with an agreed list of clear criteria that take into account the potential risks stemming from such transfers. An ATT establishing such standards and rigorous procedures will help generate consistency in national arms control regulations. Importing States should be required to authorise imports of conventional arms into their jurisdiction. Such authorisations must be in conformity with each State’s primary responsibility to provide for the security of all persons under its jurisdiction and to promote respect for and observance of human rights as affirmed in the UN Charter and in other relevant international law. This report is divided into two parts, and includes three case studies drawn from recent examples of armed violence in Bangladesh, Guatemala and the Philippines. Part I examines how an ATT with a clearly elaborated risk assessment process can make a contribution to the prevention and reduction of armed violence. After a brief discussion of the definitions of armed violence and several forms of armed violence documented in recent years, the report examines the role an ATT can play in preventing and reducing those forms of armed violence in which conventional arms are used and which result in serious violations of international human rights and humanitarian law. Part II focuses on one form of armed violence: firearms-related homicide. Discussions of armed violence have repeatedly noted that the use of firearms in non-conflict settings is the most prevalent form of armed violence and the form that results in the most deaths and injuries. This fact underscores the importance of adopting an approach to addressing armed violence that will encompass violence outside of armed conflict settings. The ATT should be one component of this approach. It should specify and address the serious violations of international law and other harmful impacts caused by conventional arms. Further, if an ATT is to make a significant contribution to the reduction of armed violence, it should require, prior to the issuance of an import authorisation or export licence, an assessment of the risk that the transfer of conventional arms will entail, including the risk presented by a pattern of significantly high levels of firearms-related homicides within the importing State.

Details: London: Amnesty International and the International Action Network on Small Arms, 2011. 40p.

Source: Internet Resource: Accessed March 14, 2011 at: http://www.amnesty.org/en/library/asset/ACT30/030/2011/en/d68a9f66-dc78-4ed0-8792-16c1d83a44b8/act300302011en.pdf

Year: 2011

Country: International

Keywords: Arms Control

Shelf Number: 120930


Author: Carafano, James Jay

Title: Taking the Fight to the Pirates: Applying Counterterrorist Methods to the Threat of Priacy

Summary: Piracy is a growing threat to global commerce and is becoming a U.S. security issue. While anti-piracy efforts have successfully reduced piracy in the Malacca Strait, Somali pirates have expanded their operations further into the Indian Ocean. Ending the threat from Somali pirates will require shifting from a defensive posture of trying to protect ships passing through the high-risk zones—there are too many ships, too few military vessels, and too many pirates—to an offensive strategy of attacking the pirates at their weak points. The United States and other countries should use every means at their disposal to deny the pirates any safe haven—geographical, financial, or legal—and bring them to justice wherever it is most convenient.

Details: Washington, DC: The Heritage Foundation, 2011. 11p.

Source: Internet Resource: Backgrounder No. 2524: Accessed March 14, 2011 at: http://thf_media.s3.amazonaws.com/2011/pdf/bg2524.pdf

Year: 2011

Country: International

Keywords: Maritime Crime

Shelf Number: 120929


Author: Sloan, Britt

Title: Terrorism, Crime, and Conflict: Exploiting the Differences Among Transnational Threats?

Summary: Despite their diverging strategic objectives, terrorists, criminals, and insurgents appear increasingly to collaborate. The deep connections among terrorism, drug production, and insurgency in Afghanistan and Colombia are well known. In the Sahel, Al-Qaida in the Islamic Maghreb (AQIM) is funded at least in part through the paid protection of trafficking routes and through criminal kidnapping campaigns. In southern Nigeria, the Movement for the Emancipation of the Niger Delta (MEND) long has mixed oil bunkering, kidnapping, and ethnic rebellion, and it recently may have added terrorism to its repertoire. In Somalia, there is increasing concern about the possibility of Islamist militants taxing, controlling, or even investing in the piracy industry. In Sri Lanka, the Liberation Tigers of Tamil Eelam (LTTE) made millions of dollars from sophisticated cybercrime, including extensive credit card fraud, and for years used its resulting military might to exercise de facto control over a large territory. Fragile states, with their ready pools of unemployed labor and populations inured to and traumatized by violence, frequently represent sites of competitive advantage for terrorist organizations, criminal networks, and violent political leaders alike. Collaboration among them may benefit all three —financing terrorism, protecting crime, and securing political control. The UN Security Council has gone so far as to suggest that such conjoined transnational threats may represent a threat to international peace and security. Yet, policymakers appear unclear about how to handle the confluence of these threats. This policy brief offers eight targeted policy recommendations for combating the convergence of terrorism, crime, and politics. Rather than simply warning about the potential for interaction and synergy among terrorist, criminal, and political actors, this policy brief aims to explore possibilities for exploiting their divergences. In particular, it emphasizes the need to grapple with the economic, political, and combat power that some terrorist groups enjoy through their involvement in crime and conflict. This requires an approach to counterterrorism that incorporates policy proscriptions from the criminological, conflict transformation, peacebuilding, development, and sociological arenas, while developing a coordinated interagency strategy for deploying common tools, such as macroeconomic reform; disarmament, demobilization, and reintegration (DDR) efforts; security sector reform (SSR); improved border control; financial sector reform; and legal-institution capacity building. Above all, this approach requires taking the social power of violent organizations more seriously.

Details: Washington, DC: Center on Global Counterterrorism Cooperation, 2011. 11p.

Source: Internet Resource: Policy Brief: Accessed March 14, 2011 at: http://www.globalct.org/images/content/pdf/policybriefs/BS_policybrief_117.pdf

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 120928


Author: Heinonen, Justin A.

Title: Measuring How Much Criminologists Know About Crime: Using Environmental Criminology to Assess Our Knowledge of Crime Events

Summary: Understanding crime events is critical to theory and practice. Increasingly, some criminologists have pointed to the utility of understanding crime events for understanding both offenders and how crime can be prevented. Nevertheless, there remains today a strong bias toward studying offenders in criminological research even though research indicates that criminological knowledge of the causes of criminality is highly problematic (Weisburd and Piquero, 2008). So there is reason to suspect that criminologists may also know little about crime events. A handful of studies have tried to shed light on this suspicion, but these studies are limited. To directly address this concern, I developed an assessment process that is systematic, replicable and theory-driven to measure what we do and do not know about specific crime events. I used this process to review studies of residential burglary and personal robbery from nine journals over 30 years to answer three research questions: How much do criminologists know about these crime events? Are certain journals more useful for understanding them? And, to what extent do criminologists study specific burglary and robbery events? In response to the first question, my findings suggest that criminologists know very little about these crime events, as compared to what theory would expect them to know. In response to the second question, my findings suggest that environmental criminology journals, compared to traditional criminology journals, are more likely to publish crime event studies. And in response to the third question, my findings suggest that criminologists seldom study specific burglary and robbery events, and show few signs of changing. I discuss the limitations of my findings and their implications for research and policy.

Details: Cincinnati, OH: University of Cincinnati, School of Criminal Justice, 2010. 130p.

Source: Internet Resource: Dissertation: Accessed March 14, 2011 at: http://etd.ohiolink.edu/view.cgi?acc_num=ucin1288974887

Year: 2010

Country: International

Keywords: Crime Events

Shelf Number: 120830


Author: Flynn, Michael

Title: The Privatization of Immigration Detention: Towards a Global View

Summary: The phrase “private prison†has become a term of opprobrium, and for good reason. There are numerous cases of mistreatment and mismanagement at such institutions. However, in the context of immigration detention, this caricature hides a complex phenomenon that is driven by a number of different factors and involves a diverse array of actors who provide a range of services. This working paper employs research undertaken by the Global Detention Project (GDP) — an inter-disciplinary research project based at the Graduate Institute of International and Development Studies — to help situate the phenomenon of the privatization of immigration detention within a global perspective. Part of the difficulty in assessing this phenomenon is that our understanding of it is based largely on experiences in English-speaking countries. This working paper endeavors to extend analysis of this phenomenon by demonstrating the broad geographical spread of privatized detention practices across the globe, assessing the differing considerations that arise when states decide to privatize, and comparing the experiences of a sample of lesser known cases.

Details: Geneva: Global Detention Project, Programme for the Study of Global Migration, The Graduate Institute, 2009. 25p.

Source: Internet Resource: Working Paper: Accessed March 14, 2011 at: http://www.globaldetentionproject.org/fileadmin/docs/GDP_PrivatizationPaper_Final5.pdf

Year: 2009

Country: International

Keywords: Illegal Immigrants

Shelf Number: 120919


Author: International Peace Institute

Title: Transnational Organized Crime: Task Forces on Strengthening Multilateral Security Capacity

Summary: The paper highlights how states and international organizations so far have largely failed to anticipate the evolution of transnational organized crime (TOC) into a strategic threat to governments, societies, and economies. At the international level, a largely outdated understanding of TOC does not adequately contemplate the strategic impact of TOC, and commonly fails to ensure that international efforts are not working at cross-purposes. The Blue Paper lays out recommendations on how to 1) improve information sharing; 2) develop international investigative, policing, and prosecutorial tools; and 3) integrate strategic decision making into international peace efforts and international crime fighting.

Details: New York: International Peace Institute, 2009. 54p.

Source: Internet Resource: IPI Blue Papers, No. 2: Accessed March 16, 2011 at: http://www.ipacademy.org/publication/policy-papers/detail/83-transnational-organized-crime-ipi-blue-paper-no-2.html

Year: 2009

Country: International

Keywords: Organized Crime

Shelf Number: 121029


Author: Lambsdorff, Johann Graf

Title: Deterrence and Constrained Enforcement – Alternative Regimes to Deal with Bribery

Summary: This paper provides interesting insights into deterence of bribery by investigating how bribe transactions are enforced. It integrates insights from a Law and Economics perspective with transaction cost analysis. The author develops a game-theoretic approach to show that, irrespective of whether a rational choice or a behavioral approach is employed, increasing penalties and the risks of detection is not always advisable. Penalties can have a perverse effect by helping corrupt actors create the bonds that are needed for enforcing their deal. It argues that governments may deter bribery either by high penalties and risks of detection, potentially supported by leniency given to those who report their infraction. Another approach can be amplifying the risk of opportunism, aggravating the difficulties of enforcing a bribe transaction. This should involve a low probability of detection and allowing offenders to keep their ill-gotten gains.

Details: Passau, Germany: Universitat Passau, 2010. 39p.

Source: Internet Resource: Passauer Diskussionspapiere, no. v-60-10: Accessed March 16, 2011 at: http://www.wiwi.uni-passau.de/fileadmin/dokumente/lehrstuehle/wilhelm/Working_Papers_PDF/Disk_60_Deterrence_and_Constrained_Enforcement.pdf

Year: 2010

Country: International

Keywords: Bribery

Shelf Number: 121041


Author: Finckenauer, James O.

Title: Researching and Rethinking Sex Trafficking: The Movement of Chinese Women to Asia and the United States for Commercial Sex

Summary: Despite the concern and attention devoted to human trafficking in general and sex trafficking in particular over the past decade, there is still much about it that is unknown or subject to disagreement. And in general there has been little empirical research on the issue. Where there have been studies, the researchers have often drawn conclusions or generalized findings based on biased samples. Given this state of affairs, we have chosen in the study reported here to assume that prostitution is a multifaceted business with a proliferation of diverse women, and that therefore it is essential to study women in different sex venues and different destination countries in order to have a more nuanced and better balanced understanding of the transnational commercial sex business and its relation to sex trafficking. In contrast to the prevailing research approach in this area, of relying upon subjects defined by others, we instead decided to cast the broadest net possible, and to interview subjects under the broadest range of possible statuses. We also decided to conduct our subject interviews under circumstances that would maximize the probability that the subjects would be forthcoming and not constrained by other motives or agendas. In brief, we set out to conduct a study with the following specific aims: 1. To examine the underlying reasons for the illicit movement of women from China to destinations throughout Asia and to the U.S. for the purpose of prostitution. 2. To explore the structure or social organization of the movement of women from China to Asia and the U.S. 3. To understand the methods of recruiting, transporting, and managing Chinese women by various participants in the smuggling, trafficking, and sex businesses. 4. To investigate the economic aspects of smuggling, trafficking, and prostitution. 5. To examine the social adjustment and settlement patterns among Chinese women and the victimization and exploitation of these women by smugglers and traffickers and sex industry operators. 6. To analyze the individual and group characteristics of smugglers and traffickers and their relationships with gangs and organized crime. 7. To evaluate the problems and prospects of combating the movement of women from China to the rest of the world. Our goal was to shed light on one group of women who go overseas to engage in commercial sex – in this case women from the People’s Republic of China (PRC) – and to provide a more nuanced understanding of the movement of these women and its possible relation to sex trafficking. Our underlying assumption is that commercial sex, the transnational movement of women to overseas sex venues, and sex trafficking are linked. In this study, we sought to explore that linkage, and to consider whether that linkage is as characterized by the U.S. government and the United Nations in their respective codifications of human trafficking . A secondary goal was to inform the development of better strategies and responses to cope with these phenomena.

Details: Newark, NJ: School of Criminal Justice, Rutgers University, 2010. 204p.

Source: Internet Resource: Final Report to the U.S. Department of Justice: Accessed March 17, 2011 at: http://www.ncjrs.gov/pdffiles1/nij/grants/233583.pdf

Year: 2010

Country: International

Keywords: Human Smuggling

Shelf Number: 121045


Author: Braga, Anthony A.

Title: Moving the Work of Criminal Investigators Towards Crime Control

Summary: This paper points out the challenges to police executives in moving the work of criminal investigators towards a more active role in crime control. The paper provides research on the effectiveness of criminal investigators, the problem-oriented approach to crime control, and intelligence-led policing. The authors suggest ways to allocate proactive and problem-solving work between criminal investigators and patrol officers. The paper concludes with examples by the authors of moving the work of criminal investigators at the Milwaukee Police Department, the New York Police Department, the Victoria

Details: Washington, DC: U.S. National Institute of Justice; Cambridge, MA: Harvard Kennedy School Program in Criminal Justice Policy and Management, 2011. 38p.

Source: Internet Resource: New Perspectives in Policing: Accessed March 17, 2011 at: http://www.ojp.usdoj.gov/nij/pubs-sum/232994.htm

Year: 2011

Country: International

Keywords: Criminal Investigation

Shelf Number: 121046


Author: Bernard van Leer Foundation

Title: Young Children in Cities: Challenges and Opportunities

Summary: This edition of Early Childhood Matters looks at young children’s experiences of growing up in urban settings. A quarter of the world’s children live in poor urban settlements - a fact which presents opportunities to deliver accessible services cost-effectively, but also poses many challenges. The challenges explored in these articles include violence in Venezuela and Mexico, fear of "stranger danger" in Australia, domestic violence and space to play in Rotterdam, involving communities in Peru and Brazil, social structures of the European Roma, and emergency response in Nairobi. The articles feed into an understanding of one of the Bernard van Leer Foundation's programming goals, to improve young children's physical environments - in this case, the various root characteristics of urban environments that impact the physical and mental development of young children throughout their lives.

Details: The Hague: Bernard van Leer Foundation, 2010. 68p.

Source: Internet Resource: Early Childhood Matters, No. 115: Accessed March 17, 2011 at:

Year: 2010

Country: International

Keywords: Poverty

Shelf Number: 121057


Author: Edleson, Jeffrey L.

Title: Multiple Perspectives on Battered Mothers and their Children Fleeing to the United States for Safety: A Study of Hague Convention Cases

Summary: Mothers who flee with their children because of domestic violence may have few other options to ensure their safety and that of their children in the face of their partner’s violence. Yet when their flight takes them across international boundaries, they become vulnerable to being legally treated as an “abducting†parent by the courts. This report focuses on the situations of women who experienced abuse in another country and came to the United States in an effort to protect themselves and their children, but who then faced civil actions in U.S. state or federal courts for child abduction under international legal agreements. We interviewed battered mothers around the world, their attorneys, their husbands’ attorneys and examined published judicial decisions in cases involving the Hague Convention on the Civil Aspects of International Child Abduction where there were also allegations of domestic violence by one parent against the other. The research team interviewed 22 mothers who responded to Hague petitions in U.S. courts, 23 attorneys representing both mothers and fathers in these cases and five specialists, such as expert witnesses. The research team also analyzed 47 published U.S. Hague Convention court decisions involving allegations of domestic violence. Battered mothers who fled across borders to the U.S. to receive help from their families were often victims of life threatening violence, and their children were frequently directly or indirectly exposed to the father’s violence. The women sought but received little help from foreign authorities or social service agencies and received little help from U.S. authorities once they came to the U.S. In fact, these mothers – most of whom were U.S. citizens – often faced U.S. courts that were unsympathetic to their safety concerns and subsequently sent their children back to the custody of the abusive fathers in the other country, creating potential serious risks for the children and mothers.

Details: Final report to the U.S. National Institute of Justice, 2010. 404p.

Source: Internet Resource: Accessed March 17, 2011 at: http://www.haguedv.org/reports/finalreport.pdf

Year: 2010

Country: International

Keywords: Battered Women

Shelf Number: 121061


Author: Dossetor, Kym

Title: Cost-Benefit Analysis and Its Application to Crime Prevention and Criminal Justice Research

Summary: Cost-benefit analysis is one of a number of ways of measuring the impact and effectiveness of crime prevention programs and has been used by governments in Australia and elsewhere to determine the utility of a given program or intervention. In essence, cost-benefit analysis is an analytical tool that compares the total costs of an intervention or program against its total expected benefits; it assists in answering the question ‘has the money been well spent?’. Application of cost-benefit analysis within the criminal justice system and the crime prevention field is increasingly being embraced, although to date, most work has been undertaken in the United Kingdom and the United States. By comparison, relatively few cost-benefit analyses have been completed within Australia in these fields. In this report, a description is provided of when and how such analyses of crime prevention programs have been used and a number of cost-benefit analyses are reviewed, using a tool developed to assess the merit of cost-benefit analysis. It is noteworthy that a number of the programs that have shown a reduction in the risk of crime have not been developed by criminologists or law enforcement personnel, nor has crime prevention been the primary objective. Rather, a crime prevention effect has occurred as part of a suite of positive outcomes. For policymakers, cost-benefit analysis can be an important tool that informs policy decisions around program continuation, expansion or cessation. For practitioners, knowledge that programs are achieving their intended goals can assist program managers in future program development and may help to justify program expenditure. This report improves our understanding of the application of cost-benefit analysis and provides ways in which to make this important analytical tool more responsive and effective, which will help to ensure sustained investment in quality crime justice and crime prevention programs.

Details: Canberra: Australian Institute of Criminology, 2011. 57p.

Source: Internet Resource: Technical and Background Paper No. 42: Accessed March 18, 2011 at: http://www.aic.gov.au/documents/A/4/F/%7BA4FA76DE-535E-48C1-9E60-4CF3F878FD8D%7Dtbp042.pdf

Year: 2011

Country: International

Keywords: Cost-Benefit Analysis

Shelf Number: 121062


Author: Cho, Seo-Young

Title: Compliance for Big Brothers: An Empirical Analysis on the Impact of the Anti-trafficking Protocol

Summary: The Anti-trafficking Protocol reflects the interests of the major powers. Due to the high costs of compliance, countries will strategically select certain obligations to comply, which can satisfy the major powers with smaller costs. Among the three main obligations of the Protocol "prevention, protection and prosecution, we predict that ratification leads to compliance with the prevention policy first because prevention is less costly for member states to comply with. Therefore it is the most "efficient" form of compliance. We empirically test this hypothesis by employing panel data from 147 countries during the period of 2001-2009. As the theory predicts, the ratification of the Protocol has the strongest effect on the prevention policy of a member state compared to protection and prosecution. Our findings are robust to the method of estimation and the choice of variables.

Details: Gottingen: Center for European Governance and Economic Development Research, 2011. 47p.

Source: Internet Resource: CEGE Discussion Paper No. 18: Accessed March 18, 2011 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1757761

Year: 2011

Country: International

Keywords: Human Trafficking

Shelf Number: 121063


Author: Velzeboer, Marijke

Title: Violence Against Women: The Health Sector Responds

Summary: Gender-based violence (GBV) is one of the most widespread human rights abuses and public health problems in the world today, affecting as many as one out of every three women. It is also an extreme manifestation of gender inequity, targeting women and girls because of their subordinate social status in society. The consequences of GBV are often devastating and long-term, affecting women's and girls' physical health and mental well-being. At the same time, its ripple effects compromise the social development of other children in the household, the family as a unit, the communities where the individuals live, and society as a whole. Violence against Women: The Health Sector Responds provides a strategy for addressing this complex problem and concrete approaches for carrying it out, not only for those on the front lines attending to the women who live with violence, but also for decision-makers who may incorporate the lessons in the development of policies and resources. For those communities where support for women does not yet exist, the authors hope that this book will motivate health providers and leaders to more directly confront the issue of genderrelated violence and ensure support to affected women in resolving their situation.

Details: Washington, DC: Pan American Health Organization, 2003. 147p.

Source: Internet Resource: Occasional Publication No. 12: Accessed March 18, 2011 at: http://www.paho.org/english/ad/ge/VAW-HealthSectorResponds.pdf

Year: 2003

Country: International

Keywords: Battered Women

Shelf Number: 121064


Author: Turner, Shelley

Title: Growing Old in Prison? A Review of National and International Research on Ageing Offenders

Summary: This review examines the Australian and international research and other relevant literature that deals with issues surrounding the effective management and care of old and ageing offenders in prison and in the community. It summarises the key themes emerging from the literature, noting a need for greater international and local research, and identifies why this is a significant issue. The review also examines innovative approaches to policy and the management of older offenders and identifies best practice in relation to older prisoner detention, rehabilitation and postrelease support.

Details: Melbourne: Victoria Department of Justice, 2010. 32p.

Source: Internet Resource: Corrections Research Paper Series, Paper No. 03: Accessed March 18, 2011 at: http://www.justice.vic.gov.au/wps/wcm/connect/f963c3004389a48aa7abff34222e6833/Corrections_Research_Paper3_WEB2010.pdf?MOD=AJPERES

Year: 2010

Country: International

Keywords: Ageing Offenders

Shelf Number: 121069


Author: Seelke, Clare Ribando

Title: Trafficking in Persons in Latin America and the Caribbean

Summary: Trafficking in persons (TIP) is a growing problem in Latin America and the Caribbean, a region that contains major source, transit, and destination countries for trafficking victims. Major forms of TIP in the region now include commercial sexual exploitation of women and girls, labor trafficking within national borders (including child labor), and the trafficking of illegal immigrants in Mexico and Central America. Latin America is a primary source region for people that are trafficked to the United States, as well as for victims trafficked to Western Europe and Japan. As many as 17,500 are trafficked into the United States each year, according to State Department estimates. Latin America is also a transit region for Asian victims destined for the United States, Canada, and Europe. Some of the wealthier countries in the region (such as Brazil, Costa Rica, Chile, Argentina, Panama, and Mexico) also serve as TIP destinations. This report describes the nature and scope of the problem of trafficking in persons in Latin America and the Caribbean. It then describes U.S. efforts to deal with trafficking in persons in the region, as well as discusses the successes and failures of some recent country and regional anti-trafficking efforts. The report concludes by raising issues that may be helpful for Congress to consider as it continues to address human trafficking as part of its authorization, appropriations, and oversight activities.

Details: Washington, DC: Congressional Research Service, 2010. 22p.

Source: Internet Resource: RL33200: Accessed March 18, 2011 at: http://www.fas.org/sgp/crs/row/RL33200.pdf

Year: 2010

Country: International

Keywords: Child Labour

Shelf Number: 121070


Author: Cockayne, James

Title: Peace Operations and Organised Crime

Summary: This report presents the four main themes that emerged from a seminar organized by the International Peace Academy (now the International Peace Institute) and the Geneva Centre for Security Policy in Geneva on 29/30 November 2007. First, it addresses the question of the conceptual relationship between organised crime and peace operations, outlining a framework for functional analysis focusing on the complex environments in which international interventions take place and the functions that organised crime and peace operations play in those environments. Second, it looks at the causal relationship between peace operations and organised crime. Third, it turns to the strategic conclusions flowing from this analysis, investigating a number of trade-offs involved when peace operations confront organised crime. Last, it presents some of the most salient operational considerations and lessons learnt from the Seminar and the discussion papers prepared for it.

Details: Geneva: Geneva Centre for Security Policy and International Peace Institute, 2008. 55p.

Source: Internet Resource: Geneva Papers No. 2: Accessed March 18, 2011 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1127871

Year: 2008

Country: International

Keywords: Human Trafficking

Shelf Number: 121071


Author: Shetret, Liat

Title: Use of the Internet for Counter-Terrorist Purposes

Summary: On 1 May 2010, Faisal Shahzad, a naturalized U.S. citizen, tried to detonate a car bomb in the heart of New York’s Times Square. Thanks to the vigilance of local witnesses and to technical shortcomings, the bomb was detected and failed to explode. The investigation surrounding Shahzad’s case, like other, more recent cases, shows that the Internet played an important role in his violent radicalization and the planning and execution of the attempted attack. For example, he drew spiritual inspiration from lectures and videos circulated online by Anwar al-Awlaki, a U.S.-Yemeni cleric, who helped to convince Shahzad to take up the cause of al-Qaida. Shahzad accessed Web sites for operational and planning purposes. He viewed “real-time video feeds of different areas of Times Square†to help determine which areas attract a large crowd and would result in a high casualty rate if attacked. Shahzad also used the Internet to discuss his plans with militants based in Pakistan. Terrorist operatives such as Shahzad often draw inspiration, reinforcement, support, and guidance from a variety of on- and off-line sources. Some clerics; experts; scholars, such as al-Awlaki; and virtual communities use the Internet to promote violent extremism on their blogs, social network pages, discussion forums, or through the streaming of videos on multimedia platforms such as YouTube. This brief provides an overview of challenges posed to stakeholders by the use of the Internet for terrorist purposes. It argues that the Internet is not the problem and that the online platform can be employed to counter terrorism efforts. Specifically, models of violent radicalization processes off-line offer an important and useful framework for the development and implementation of policies to counter online use of the Internet for terrorist purposes. The brief concludes by offering multilateral institutions, states, civil society organizations, the media, and the private sector examples of how they can use the Internet more effectively as a counterterrorism tool to prevent and counter the use of the Internet for violent radicalization. Four intervention points are suggested: (1) weaken cult personalities, (2) challenge the extremist doctrine, (3) dispel the glory of the “terrorist lifestyle,†and (4) offer a street-smart and locally developed and communicated counternarrative.

Details: Washington, DC: Center on Global Counterterrorism Cooperation, 2011. 10p.

Source: Internet Resource: Policy Brief: Accessed March 18, 2011 at: http://www.globalct.org/images/content/pdf/policybriefs/LS_policybrief_119.pdf

Year: 2011

Country: International

Keywords: Computer Crimes

Shelf Number: 121073


Author: U.S. Department of Homeland Security. Office of Inspector General

Title: Customs and Border Protection's Implementation of the Western Hemisphere Travel Initiative at Land Ports of Entry

Summary: The Western Hemisphere Travel Initiative requires citizens of the United States, Canada, Bermuda, and Mexico arriving at land ports of entry to present passports or other approved documents to enter the United States. Although the Western Hemisphere Travel Initiative became effective at land ports on June 1, 2009, Customs and Border Protection is not fully enforcing the new document requirement. Customs and Border Protection is using informed compliance procedures to educate noncompliant travelers about the new document requirement. Customs and Border Protection is reporting an average compliance rate of 96% at its land border crossings. Our objective was to determine whether Customs and Border Protection is prepared to fully enforce the Western Hemisphere Travel Initiative’s new document requirement at land ports of entry. Customs and Border Protection is not prepared to fully enforce the new document requirement at land ports of entry. Although Customs and Border Protection has acquired and deployed substantial technological tools to aid in inspecting travelers, Customs and Border Protection has not analyzed the impact that a substantial increase in secondary inspection workload will have on secondary inspection staffing and infrastructure during full enforcement. The reported Western Hemisphere Travel Initiative compliance rates during the initial eight-month informed compliance period indicate noncompliant travelers arriving at the agency’s 39 busiest land ports may increase the secondary inspection workloads at these ports by an average of 73% if all noncompliant travelers required secondary inspections. The agency has not finalized the operating procedures its officers will use to verify the identity and citizenship of noncompliant travelers. Customs and Border Protection officials told us other priorities have precluded them from completing the operating procedures. Until the new travel document requirement is fully enforced, the agency continues to incur risk that persons falsely claiming to be citizens of the United States, Canada, and Bermuda may be admitted to the United States. We are making four recommendations to better prepare the agency to fully implement the new requirement at land ports of entry. CBP agreed with our proposed corrective actions and is in the process of implementation.

Details: Washington, DC: U.S. Department of Homeland Security, 2010. 26p.

Source: Internet Resource: OIG-11-16: Accessed March 21, 2011 at: http://www.dhs.gov/xoig/assets/mgmtrpts/OIG_11-16_Nov10.pdf

Year: 2010

Country: International

Keywords: Border Patrol

Shelf Number: 121081


Author: Gerra, Gilberto

Title: From Coercion to Cohesion: Treating Drug Dependence Through Health Care, Not Punishment. Discussion Paper

Summary: The aim of this draft discussion paper, “From coercion to cohesion: Treating drug dependence through health care, not punishmentâ€, is to promote a health-oriented approach to drug dependence. The International Drug Control Conventions give Member States the flexibility to adopt such an approach. Treatment offered as alternative to criminal justice sanctions has to be evidence-based and in line with ethical standards. This paper outlines a model of referral from the criminal justice system to the treatment system that is more effective than compulsory treatment, which results in less restriction of liberty, is less stigmatising and offers better prospects for the future of the individual and the society. Drug dependence treatment without the consent of the patient should only be considered a short-term option of last resort in some acute emergency situations and needs to follow the same ethical and scientific standards as voluntary-based treatment. Human rights violations carried out in the name of “treatment†are not compliant with this approach.

Details: Geneva: United Nations Office on Drugs and Crime, 2010. 22p.

Source: Internet Resource: Accessed March 21, 2011 at: http://www.unodc.org/docs/treatment/Coercion_Ebook.pdf

Year: 2010

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 121088


Author: Cho, Seo-Young

Title: The Spread of Anti-Trafficking Policies: Evidence from a New Index

Summary: We analyze the spread of policies dealing with international trafficking in human beings. Arguing that countries are unlikely to make independent choices, we identify pressure, externalities and learning or emulation as plausible diffusion mechanisms for spatial dependence in anti-trafficking policies. We develop a new index measuring governments’overall anti-trafficking policies for 177 countries over the 2000-2009 period. We also assess a country’s level of compliance in the three main constituent dimensions of anti-trafficking policies – prosecution, protection and prevention. Employing a spatial autoregressive model, we find that, with the exception of victim protection measures, anti-trafficking policies diffuse across contiguous countries and main trading partners due to externality effects. We find evidence for learning or emulation effects in all policy domains, with countries looking toward peers with similar political views or cultural values. Surprisingly, major destination countries do not seem to exert pressure on relevant main countries of origin or transit to ratchet up their policies.

Details: Bonn, Germany: Institute for the Study of Labor, 2011. 48p.

Source: Internet Resource: IZA Discussion Paper No. 5559: Accessed March 23, 2011 at: http://www.iza.org/index_html?lang=en&mainframe=http%3A//www.iza.org/en/webcontent/publications/papers/papers%3Fyear%3D2011%26scroll%3Ddown%26first_shown%3D0&topSelect=publications&subSelect=papers

Year: 2011

Country: International

Keywords: Human Trafficking

Shelf Number: 121100


Author: Amnesty International

Title: Death Sentences and Executions 2010

Summary: In the last decade, more than 30 countries have abolished the death penalty in law or practice. Fifty-eight countries worldwide now retain the death penalty for ordinary crimes, and less than half of these carried out executions in 2010. across all regions of the world, the last 10 years have seen important progress made on the global journey towards abolition. in 2010, the global trend towards abolition was again confirmed. The President of Mongolia announced an official moratorium on executions in January, and a bill that would abolish the death penalty has been put before the Mongolian Parliament. Gabon abolished the death penalty in February. More states than ever before voted at the un in favour of a worldwide moratorium on executions. even in states where support for the death penalty remains strong, positive steps towards restricting its use were recorded. But in the face of this clear progress, many of the states that carried out executions in 2010 did so in clear violation of international law and standards, despite their claims to the contrary in front of international human rights bodies. This report analyzes some of the key developments in the worldwide application of the death penalty in 2010, citing figures gathered by Amnesty International on the number of death sentences handed down and executions carried out during the year. Amnesty International opposes the death penalty in all cases without exception, regardless of the nature of the crime, the characteristics of the offender, or the method used by the state to carry out the execution.

Details: London: Amnesty International, 2010. 60p.

Source: Internet Resource: Accessed March 28, 2011 at: http://www.amnesty.org/en/library/asset/ACT50/001/2011/en/ea1b6b25-a62a-4074-927d-ba51e88df2e9/act500012011en.pdf

Year: 2010

Country: International

Keywords: Capital Punishment

Shelf Number: 121122


Author: Jones, Lisa

Title: Reducing Harm in Drinking Environments: A Systematic Review of Effective Approaches

Summary: Techniques used to reduce harm in drinking environments range from rigorous police enforcement of licensing and other legislation to co-operative approaches that seek to train staff in licensed premises and engage nightlife industries in socially responsible operating. With authorities often stretched to manage intoxication and related problems in busy drinking environments, understanding which interventions can have most effects on reducing alcohol-related harm is critical. This report provides the findings from a systematic literature review that aimed to explore the effects of interventions implemented in drinking environments on a range of harms, including alcohol consumption, under-age alcohol sales, violence and road traffic crashes. The review was based on a literature search of 10 databases including Medline, PsycINFO, ASSIA and other sources. Two reviewers independently assessed studies for inclusion against the following criteria: published since 1990, and examined an intervention with the aim of reducing harm associated with alcohol consumption, which was delivered in a drinking environment and targeted individuals, licensed alcohol serving outlets, or the sale and supply of alcohol via the off trade. Intervention studies of any design were eligible for inclusion. The literature search identified 47 studies that examined interventions designed to reduce harm in drinking environments. Seven studies examined the effectiveness of training programmes for servers and managers, five examined specific interventions delivered in pubs and bars, eight examined the enforcement of laws related to alcohol consumption, seven examined interventions aimed at reducing underage sales and 20 examined multi-component community-based programmes. Nine of the included studies were conducted in European countries including five in Sweden and four in the UK. The remaining studies were conducted in the USA, Canada, Australia and New Zealand. The methodological quality of the included studies was variable according to the study design used, and in general the methodological quality of the included studies was weak. The clearest indication of effectiveness resulted from multi-component programmes. In particular, across three well-designed and implemented programmes, which combined community mobilisation, RBS training, house policies and stricter enforcement of licensing laws, there was evidence that these programmes were effective in reducing assaults, traffic crashes, and underage sales. In particular, the Swedish STAD project, a multi-agency partnership between the police, licensing authorities, health services, the council and representatives of licensed premises, demonstrated success was based on a rigorous evaluation of effectiveness and cost-effectiveness. The effectiveness of other intervention approaches was limited. Studies of server and bar management training programmes highlighted an overall low frequency of intervention and their effects on patrons’ alcohol consumption appeared to be minimal, except where training was mandated. A training and risk management programme had a modest effect on aggression. Patron targeted interventions, which included brief intervention and promotion of responsible drinking, had a limited impact on patron behaviours. Police campaigns and other approaches to the enforcement of alcohol sales laws were shown to be largely ineffective or short lived. The effectiveness of police intervention or increased enforcement of licensing laws in reducing alcohol-related incidents was not clear, but overall, targeted police intervention in high-risk premises appeared to be a more effective strategy than ‘low level’ policing. There is growing evidence that effective delivery of multi-component programmes in drinking environments can reduce alcohol-related harm, however, further research is required to assess the transferability of evidence about multi-component programmes in drinking environments to other settings.

Details: Liverpool: Centre for Public Health, Liverpool John Moores University, 2010. 88p.

Source: Internet Resource: Accessed March 28, 2011 at: http://www.stap.nl/content/bestanden/literature-study-drinking-environments_1.pdf

Year: 2010

Country: International

Keywords: Alcohol Abuse

Shelf Number: 121140


Author: United Nations Office on Drugs and Crime. Caribbean Regional Office

Title: The Value of Illegal Drug Exports Transiting the Caribbean - 1981-2000

Summary: What is the contribution of the trade in illegal drugs to the Caribbean economy? Given the inflation of data and figures presented in the mass media, it may seem that it is not difficult to estimate this contribution. A partial review of the mass media and scientific articles produces several dozen estimates for different concepts and countries. The variations between these estimates are so large that they cannot be explained solely in terms of the concepts employed or of methodological variations. In order to overcome the methodological weaknesses found in most estimates, this study will attempt to carry out a methodologically more refined experiment to calculate the value of the illicit drug exports from the Caribbean region. This quantification will be limited to the main export substances - cocaine and marijuana - ignoring the value of other illicit drugs that are reexported from the Caribbean, such as heroin or the various forms of amphetamine-type substances (ATS) for which the calculation is much more difficult and the significance in economic terms much lower for the time being. This academic experiment will use a demand-based methodology. In other words, starting with the value of demand in the countries that are importing drugs from the Caribbean, the model will try to infer the amount of drugs leaving the Caribbean. While the weakness of this focus and the limited reliability of the data on which the calculation is based cannot be ignored - and this shortcoming will be borne in mind throughout the paper - a demand-based methodology is preferred to other models based on capital or merchandise flows. Moreover, the annual corrections to these figures have tended to be quite significant. This trend in revising figures, apart from adding further doubts about the reliability of the data, prevents the use of historical data. Finally, the overstatement of these figures, perhaps with the intention of externalising the drug problem from the consumer to producing countries, has been conspicuous. Present estimates of illegal drug exports from the Caribbean will take into account only the amount of a drug that passes through a jurisdiction in the region and will ignore the quantities of drugs that merely transit the Caribbean Sea on the way from the producing to the consuming countries. The assumption in this choice is that drugs that go through the Caribbean Sea without stopping in a Caribbean jurisdiction have no substantive influence on the local economies. In addition, the analysis will be divided between substances, cocaine and marijuana, and exporting markets - the North American market, including both the United States and Canada, and the European market.

Details: Bridgetown, Barbados: UNODC, Caribbean Regional Office, 2004. 46p.

Source: Internet Resource: Accessed April 4, 2011 at: www.kfda.go.kr

Year: 2004

Country: International

Keywords: Drug Trafficking

Shelf Number: 121230


Author: World Bank. Social Development Department. Conflict, Crime

Title: Violence in the City: Understanding and Supporting Community Responses to Urban Violence

Summary: For millions of people around the world, violence, or the fear of violence, is a daily reality. Much of this violence concentrates in urban centers in the developing world. These cities are home to half of the world’s population and are expected to absorb almost all new population growth over the next 25 years. In many cases, the scale of urban violence can eclipse that of open warfare. Some of the world’s highest homicide rates occur in countries that have not undergone wars but have violence epidemics in their urban areas. As one example, between 1978 and 2000, more people (49,913) were killed by violence in the slums of Rio de Janeiro than in all of Colombia (39,000), a country experiencing civil conflict. Concern over these experiences has made urban violence a central preoccupation of policymakers, planners, and development practitioners. This study emerged from a growing recognition that urban communities themselves are an integral part of understanding the causes and impacts of urban violence and for generating sustainable violence prevention initiatives. Participatory appraisals in Latin America and the Caribbean have produced important insights into the manifestations of violence in different contexts. Nevertheless, much still is to be learned in understanding the myriad strategies that communities employ to manage high levels of violence. Coping mechanisms may range broadly from individual strategies, such as changing one’s work or study routine to avoid victimization, to collective strategies that involve formal institutions such as community-based policing, to reliance on traditional or alternative dispute fora. Some coping mechanisms—such as forming extralegal security groups — can be negative and undermine the bases for long-term violence prevention. This study aims to understand how urban residents cope with violence, or the threat of it, in their everyday lives, to inform the design of policies and programs for violence prevention. The study is the first global study on urban violence undertaken by the World Bank and covers three regions. It emerged from the growing demand within the Bank and client governments for a more comprehensive understanding of the social dimensions of urban violence. The study is not an exhaustive review of the topic, but rather is an exploration of the social drivers of violence, and its impact on social relations. The work has been guided by five objectives: Introduce the social dimensions of urban violence and review existing lessons for supporting community capacities to prevent violence. 2. Analyze from the community perspective the experience of violence in five urban areas, including the different forms of violence found there, their prevalence, impacts on different groups, and communities’ perceptions of the driving factors behind the violence. 3. Provide insights into community responses to high levels of violence, including individual and collective help-seeking behavior, and reliance on different informal and formal institutions to deal with and prevent violence. 4. Drawing on these insights, provide orientations to policymakers, especially mayors and municipal authorities, to inform successful violence-prevention interventions. 5. Suggest ways that the World Bank could be more involved in addressing the social dimensions of violence.

Details: Washington, DC: The World Bank, 2010. 346p.

Source: Internet Resource: Accessed April 6, 2011 at: http://siteresources.worldbank.org/EXTSOCIALDEVELOPMENT/Resources/244362-1164107274725/Violence_in_the_City.pdf

Year: 2010

Country: International

Keywords: Homicides

Shelf Number: 121251


Author: Greenberg, Theodore S.

Title: Stolen Asset Recovery: A Good Practices Guide for Non-Conviction Based Asset Forfeiture

Summary: Non-Conviction Based (NCB) asset forfeiture is a powerful tool for recovering the proceeds of corruption, particularly in cases where the proceeds have been transferred abroad. Because it provides for the restraint, seizure, and forfeiture of tainted assets without the need for a criminal conviction, it can be the best option when the wrongdoer is dead, has fled the jurisdiction, is immune from prosecution, or is too powerful to prosecute — all common in cases of grand corruption. A growing number of jurisdictions have established a system to allow NCB forfeiture, and it has been recommended as a tool for asset recovery at regional and multilateral levels. The United Nations Convention Against Corruption (UNCAC) urges countries to consider taking such measures as may be necessary to allow NCB asset forfeiture in cases in which “the offender cannot be prosecuted by reason of death, flight or absence or in other appropriate cases.†With this increased focus on the issue, there is a corresponding need for a practical tool that jurisdictions contemplating NCB forfeiture legislation can use. Stolen Asset Recovery: A Good Practices Guide for Non-Conviction Based Asset Forfeiture is that practical tool. It is the first book of its kind on the subject and the first knowledge publication under the Stolen Asset Recovery (StAR) Initiative. A collaborative effort of practitioners of forfeiture and NCB forfeiture, Stolen Asset Recovery identifies the key concepts—legal, operational, and practical —that an NCB asset forfeiture system should encompass to be eff ective in recovering stolen assets. Thirty-six key concepts are explored through practical experiences, examples from cases, and excerpts from NCB asset forfeiture legislation.

Details: Washington, DC: World Bank, 2009. 284p.

Source: Internet Resource: Accessed April 6, 2011 at: http://www.coe.int/t/dghl/monitoring/moneyval/web_ressources/IBRDWB_Guidassetrecovery.pdf

Year: 2009

Country: International

Keywords: Asset Forfeiture

Shelf Number: 121252


Author: World Bank

Title: Human Trafficking: A Brief Overview

Summary: Millions of men, women and children are victims of human trafficking for sexual, forced labor and other forms of exploitation worldwide. The human and economic costs of this take an immense toll on individuals and communities. By conservative estimates, the cost of trafficking in terms of underpayment of wages and recruiting fees is over $20 billion. The costs to human capital are probably impossible to quantify. The problem of trafficking cuts across a range of development issues, from poverty to social inclusion, to justice and rule of law issues, and thus has relevance for practitioners throughout the development community. This note provides a brief overview on the issues of human trafficking, which can be used as a quick reference for the task team leaders, sector managers, directors, and their clients at the World Bank Group. This note will first provide a definition of human trafficking and the scope of the problem, then summarize the regional trends of trafficking patterns. This is followed by a discussion of the key actors in the anti-trafficking movement and the role played by development partners in preventing human trafficking. The final section offers some potential orientations for the World Bank Group to further engage this issue in its operations.

Details: Washington, DC: World Bank, 2009. 16p.

Source: Internet Resource: Social Development Notes, No. 122: Accessed April 6, 2011 at: http://siteresources.worldbank.org/EXTSOCIALDEVELOPMENT/Resources/244362-1239390842422/6012763-1239905793229/Human_Trafficking.pdf

Year: 2009

Country: International

Keywords: Forced Labor

Shelf Number: 121254


Author: Amin, Mohammad

Title: Crime and Security in the Eastern Europe and Central Asia Region

Summary: About 20 percent of firms in the Eastern Europe and Central Asia region are victims of crime during a year. While losses to firms from crime incidents average 0.5 percent of a firm’s annual sales, expenses by firms for security average 1.4 percent of their annual sales. These two costs, equaling 1.9 percent of a firm’s annual sales, are about eight times what firms spend on research and development (R&D) and 1.8 times the reported amount paid in bribes. Surprisingly, higher-income countries do not have more crime related problems compared to lower-income countries. Although large firms are more likely to be victims of crime than small firms, losses from crime as a percentage of firms’ annual sales are much larger for the smaller firms. With the exception of the firm’s business activity and whether or not a firm innovates, other firm characteristics have little relation to the incidence of crime and losses due to crime faced by a firm.

Details: Washington, DC: World Bank, 2010. 4p.

Source: Internet Resource: Enterprise Note Series, no. 15: Accessed April 6, 2011 at: http://www.enterprisesurveys.org/Documents/EnterpriseNotes/Note15.pdf

Year: 2010

Country: International

Keywords: Commercial Crimes

Shelf Number: 121255


Author: Killebrew, Bob

Title: Security Through Partnership: Fighting Transnational Cartels in the Western Hemisphere

Summary: The most dangerous threat to the United States and its allies in the Western Hemisphere is the growth of powerful transnational criminal organizations that threaten law, order and governance in Mexico and the seven states of Central America. Over 35,000 Mexicans have died in drug-related violence since 2006 when Mexican President Felipe Calderón began to crack down on the cartels; in 2010 more than 3,100 have died in Ciudad Juarez alone. In neighboring Guatemala, the government declared an official “state of siege†along its northern border with Mexico to permit its military to fight the los Zetas cartel. Unfortunately, efforts to counter cartels and drug trafficking have largely failed thus far. Worsening violence and instability in the region threaten U.S. national security interests and demand a stronger response. To address this threat, the United States and its partners in the region should look to Colombia for guidance and assistance. Colombia has fought similar threats with some success and is emerging from three decades of crisis fueled by drug trafficking organizations and violent cartels. While Colombia will face many challenges for some time to come, it is increasingly secure, democratic and able to help its neighbors. The United States and its partners throughout the Western Hemisphere stand the best chance of securing the region against the most dangerous cartels by attacking them together. A regional security framework such as the “Mesoamerican Security Corridor,†proposed by the U.S. Department of State, offers a new opportunity to link U.S. and Colombian assistance and counternarcotics programs in Mexico to address challenges in the Central American states to Mexico’s south. Such a regional security framework will be necessary to defeat the cartels and reinstitute the rule of law and justice. A key element of the framework should be greater synergies between major U.S. security assistance programs including the Mérida Initiative, Plan Colombia and nascent bilateral Colombian-Mexican cooperation.

Details: Washington, DC: Center for a New American Security, 2011. 6p.

Source: Internet Resource: Policy Brief: Accessed April 7, 2011 at: http://www.cnas.org/files/documents/publications/CNAS_Partnership_KillebrewIrvine.pdf

Year: 2011

Country: International

Keywords: Cartels

Shelf Number: 121268


Author: Karaganis, Joe, ed.

Title: Music Piracy in Emerging Economies

Summary: Media Piracy in Emerging Economies is the first independent, large-scale study of music, film and software piracy in emerging economies, with a focus on Brazil, India, Russia, South Africa, Mexico and Bolivia. Based on three years of work by some thirty-five researchers, Media Piracy in Emerging Economies tells two overarching stories: one tracing the explosive growth of piracy as digital technologies became cheap and ubiquitous around the world, and another following the growth of industry lobbies that have reshaped laws and law enforcement around copyright protection. The report argues that these efforts have largely failed, and that the problem of piracy is better conceived as a failure of affordable access to media in legal markets. Major Findings ■Prices are too high. High prices for media goods, low incomes, and cheap digital technologies are the main ingredients of global media piracy. Relative to local incomes in Brazil, Russia, or South Africa, the retail price of a CD, DVD, or copy of MS Office is five to ten times higher than in the US or Europe. Legal media markets are correspondingly tiny and underdeveloped. ■ Competition is good. The chief predictor of low prices in legal media markets is the presence of strong domestic companies that compete for local audiences and consumers. In the developing world, where global film, music, and software companies dominate the market, such conditions are largely absent. ■ Antipiracy education has failed. The authors find no significant stigma attached to piracy in any of the countries examined. Rather, piracy is part of the daily media practices of large and growing portions of the population. ■ Changing the law is easy. Changing the practice is hard. Industry lobbies have been very successful at changing laws to criminalize these practices, but largely unsuccessful at getting governments to apply them. There is, the authors argue, no realistic way to reconcile mass enforcement and due process, especially in countries with severely overburdened legal systems. ■ Criminals can’t compete with free. The study finds no systematic links between media piracy and organized crime or terrorism in any of the countries examined. Today, commercial pirates and transnational smugglers face the same dilemma as the legal industry: how to compete with free. ■ Enforcement hasn’t worked. After a decade of ramped up enforcement, the authors can find no impact on the overall supply of pirated goods.

Details: Washington, DC: Social Science Research Council, 2011. 425p.

Source: Internet Resource: Accessed April 7, 2011 at: http://piracy.ssrc.org/the-report/

Year: 2011

Country: International

Keywords: Computer Crimes

Shelf Number: 121274


Author: Bewley-Taylor, David: Jelsma, Martin

Title: Fifty Years of the 1961 Single Convention on Narcotic Drugs: A Reinterpretation

Summary: This year marks the 50th anniversary of the United Nations Single Convention on Narcotic Drugs, signed on 30 March 1961. 73 countries were represented at the conference that took place in New York from 24 January to 25 March 1961, which sought to lay a new solid foundation for drug control in the post-war United Nations era. The aim was to replace the multiple existing multilateral treaties in the field with a single instrument as well as to reduce the number of international treaty organs concerned with the control of narcotic drugs, and to make provisions for the control of the production of raw materials of narcotic drugs. The Single Convention entered into force on 13 December 1964, having met the requirement of forty state ratifications. Couched with the lofty aim of concern for “the health and welfare of mankind,†the guiding principle of the treaty was to limit the use of drugs exclusively to medical and scientific purposes, because, as the preamble continues, “addiction to narcotic drugs constitutes a serious evil for the individual and is fraught with social and economic danger to mankind.†At the same time, the Convention recognized “that the medical use of narcotic drugs continues to be indispensable for the relief of pain and suffering and that adequate provision must be made to ensure the availability of narcotic drugs for such purposesâ€. Fifty years on, it is time for a critical reflection on the validity of the Single Convention today: a reinterpretation of its historical significance and an assessment of its aims, its strengths and its weaknesses. Indeed, while there is often a tendency to interpret the treaty as part of an unbroken continuum dating back to the first decade of the last century, the Single Convention must rather be seen as a significant change in way the international community approached drug control. Furthermore, it should not be forgotten that the original ambition for the ‘Single’ Convention to become the ‘convention to end all conventions’ failed when the control regime developed further with conventions in 1971 and 1988 giving rise to new inconsistencies within the current global drug control treaty system. This policy briefing analyses the origins and negotiations of the Single Convention, examines the way it broke with the previous drug control system by introducing a more prohibitive ethos, penal obligations, controls on plants and abolition of traditional uses of plants like coca, and concludes that a revision of its outdated provisions is required.

Details: Amsterdam: Transnational Institute, 2011. 20p.

Source: Internet Resource: Series on Legislative Reform of Drug Policies No. 12: Accessed April 8, 2011 at: http://www.druglawreform.info/images/stories/documents/dlr12.pdf

Year: 2011

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 121285


Author: Mair, Stefan, ed.

Title: Piracy and Maritime Security: Regional Characteristics and Political, Military, Legal and Economic Implications

Summary: Maritime security has deteriorated over the past 15 years, with a sharp increase in pirate attacks on vessels and installations. The worst affected region is no longer Southeast Asia (in particular the Straits of Malacca) but the Gulf of Aden and the Somali Basin. Although the issue attracts enormous public attention in Europe, the direct economic costs are actually relatively limited. Piracy and maritime insecurity become a matter for action by the international community principally when the direct economic impact becomes conflated with a complex situation of regional insecurity. In that case military action is central to containing the problem. But a purely military operation cannot eliminate the causes of piracy in the Gulf of Aden, in the Somali Basin or anywhere else. As the example of the Straits of Malacca demonstrates, multilateral international efforts to resolve political conflicts and establish effective statehood are crucial.

Details: Berlin:Stiftung Wissenschaft und Politik (German Institute for International and Security Affairs), 2011. 94p.

Source: Internet Resource: Accessed April 11, 2011 at: http://www.swp-berlin.org/fileadmin/contents/products/research_papers/2011_RP03_mrs_ks.pdf

Year: 2011

Country: International

Keywords: Maritime Crime

Shelf Number: 121306


Author: Association of Certified Fraud Examiners

Title: 2010 Report to the Nations on Occupational Fraud and Abuse

Summary: "The ACFE's 2010 Report to the Nations on Occupational Fraud and Abuse is based on data compiled from a study of 1,843 cases of occupational fraud that occurred worldwide between January 2008 and December 2009. All information was provided by the Certified Fraud Examiners (CFEs) who investigated those cases. The fraud cases in our study came from 106 nations — with more than 40% of cases occurring in countries outside the United States — providing a truly global view into the plague of occupational fraud. In our 2010 Report, we have, for the first time ever, widened our study to include cases from countries outside the United States. This expansion allows us to more fully explore the truly global nature of occupational fraud and provides an enhanced view into the severity and impact of these crimes. Additionally, we are able to compare the anti-fraud measures taken by organizations worldwide in order to give fraud fighters everywhere the most applicable and useful information to help them in their fraud prevention and detection efforts."

Details: Austin, TX: ACFE, 2011. 83p.

Source: Internet Resource: Accessed April 13, 2011 at:

Year: 2011

Country: International

Keywords: Commercial Crimes

Shelf Number: 121325


Author: Merriman, David

Title: Understand, Measure, and Combat Tobacco Smuggling

Summary: The intended purpose of this tool is to let readers gain the necessary knowledge about tobacco smuggling. With this knowledge, policy responses can be developed and further monitored in order to establish their effectiveness, appropriateness, and impact on other policy goals. For example, if enhanced tax revenue is one goal of a tobacco taxation policy, smuggling can be an important consideration, since smuggled tobacco avoids taxation. Likewise, tobacco smuggling can have an impact on health policies, as it can be difficult to regulate health warnings and conditions of sale on smuggled tobacco. More specifically, by using the methods presented in this tool, a more accurate and objective understanding of tobacco smuggling can be gained. Tobacco manufacturers, distributors and sellers, and others with a narrow self-interest in the design of tobacco control policy often misrepresent the degree of tobacco smuggling. Well-documented, methodologically sound, quantitative estimates of tobacco smuggling are a useful tool for educating policymakers about the costs and benefits of various policies. Moreover, unbiased estimates of smuggling, and the change in smuggling over time, are essential tools to evaluate the success of many tobacco control policies. Why use this tool? Because of its illegal nature, smuggling can be more difficult to estimate than many other variables relevant to tobacco control. Analysts can demonstrate the reliability of these estimates by using several different methods and data sets, five of which are presented here. And while the precise quantitative estimates can vary with the method used, all estimates should yield compatible results if appropriate data and techniques are employed. Thus, presenting results from multiple studies increases the validity of one’s conclusions.

Details: Washington, DC: World Bank, 2003. 62p.

Source: Internet Resource: Accessed April 15, 2011 at: http://siteresources.worldbank.org/INTPH/Resources/7Smuggling.pdf

Year: 2003

Country: International

Keywords: Tobacco Smuggling

Shelf Number: 110501


Author: Willman, Alys

Title: Interpersonal Violence Prevention: A Review of the Evidence and Emerging Lessons

Summary: This background paper provides a review of the literature on the stresses that increase the tendency for violent behavior, and the capabilities that seem to protect against this tendency. It also addresses the relationships between different forms of interpersonal violence, and then reviews the evidence base for interventions.

Details: Washington, DC: The World Bank, 2010. 68p.

Source: Internet Reousrce; World Development Report 2011 Background Paper: Accessed April 18, 2011 at: http://siteresources.worldbank.org/EXTWDR2011/Resources/6406082-1283882418764/WDR_Background_Paper_Willman.pdf

Year: 2010

Country: International

Keywords: Family Violence

Shelf Number: 121380


Author: Reporters Without Borders

Title: Organized Crime Muscling in on the Media

Summary: A total of 141 journalists and media workers were killed during the decade of the 2000s in attacks and reprisals blamed on criminal groups. Mafias and cartels today pose the biggest threat to media freedom worldwide. A transnational phenomenon, organized crime is more than the occasional bloody shoot-out or colourful crime story in the local paper. It is a powerful parallel economy with enormous influence over the legal economy, one the media have a great deal of difficulty in covering. Its elusiveness and inaccessibility to the media make it an even greater threat, both to the safety of journalists and to the fourth estate’s investigative ability.

Details: Paris: Reporters Without Borders, 2011. 10p.

Source: Internet Resource: Accessed April 19, 2011 at: http://en.rsf.org/IMG/pdf/organized_crime.pdf

Year: 2011

Country: International

Keywords: Journalists

Shelf Number: 121395


Author: United Nations. Secretary General

Title: Capital Punishment and Implementation of the Safeguards Guaranteeing Protection of the Rights of Those Facing the Death Penalty

Summary: The Economic and Social Council, by its resolution 1745 (LIV) of 16 May 1973, invited the Secretary-General to submit to it, at five-year intervals starting from 1975, periodic updated and analytical reports on capital punishment. The Council, by its resolution 1995/57 of 28 July 1995, recommended that the quinquennial reports of the Secretary-General should continue to cover also the implementation of the safeguards guaranteeing protection of the rights of those facing the death penalty. By the same resolution, the Council requested the Secretary-General, in preparing the quinquennial report, to draw on all available data, including current criminological research. The present eighth quinquennial report reviews the use of and trends in capital punishment, including the implementation of the safeguards during the period 2004-2008. In accordance with Economic and Social Council resolutions 1745 (LIV) and 1990/51 of 24 July 1990 and Council decision 2005/247 of 22 July 2005, this report is submitted to the Council at its substantive session of 2010, and will also be before the Commission on Crime Prevention and Criminal Justice at its nineteenth session, and the Human Rights Council, in accordance with its decision 2/102. The report confirms a very marked trend towards abolition and restriction of the use of capital punishment in most countries. The rate at which States that retained the death penalty at the start of the quinquennium have abolished its use either in law or in practice is comparable with that of previous reporting periods, and may even be accelerating slightly. Moreover, countries that retain the death penalty are, with rare exceptions, significantly reducing its use in terms of numbers of persons executed and the crimes for which it may be imposed. Nevertheless, where capital punishment remains in force, there are serious problems with regard to the respect of international norms and standards, notably in the limitation of the death penalty to the most serious crimes, the exclusion of juvenile offenders from its scope, and guarantees of a fair trial.

Details: New York: United Nations Economic and Social Council, 2009. 65p.

Source: Internet Resource: E/2010/10: Accessed April 19, 2011 at: http://www.crin.org/docs/UN_CP.pdf

Year: 2009

Country: International

Keywords: Capital Punishment

Shelf Number: 121406


Author: Open Society Institute. Public Health Program

Title: At What Cost? HIV and Human Rights Consequences of the Global "War on Drugs"

Summary: A decade after governments worldwide pledged to achieve a "drug-free world," there is little evidence that the supply or demand of illicit drugs has been reduced. Instead, aggressive drug control policies have led to increased incarceration for minor offenses, human rights violations, and disease. This book examines the descent of the global war on drugs into a war on people who use drugs. From Puerto Rico to Phnom Penh, Manipur to Moscow, the scars of this war are carried on the bodies and minds of drug users, their families, and the health and service providers who work with them. The following topics are included in this volume: •Police Abuse of Injection Drug Users in Indonesia •Arbitrary Detention and Police Abuse of Drug Users in Cambodia •Forced Drug Testing in China •Drug Control Policies and HIV Prevention and Care Among Injection Drug Users in Imphal, India •Effects of UN and Russian Influence on Drug Policy in Central Asia •The Impacts of the Drug War in Latin America and the Caribbean •Civil Society Reflections on 10 Years of Drug Control in Myanmar, Thailand, and Vietnam •Twin Epidemics–Drug Use and HIV/AIDS in Pakistan.

Details: New York: Open Society Institute, 2009. 196p.

Source: Internet Resource: Accessed April 20, 2011 at: http://www.soros.org/initiatives/health/focus/ihrd/articles_publications/publications/atwhatcost_20090302

Year: 2009

Country: International

Keywords: AIDS (Disease)

Shelf Number: 121408


Author: Brannon, Stephen

Title: Global Challenge, Regional Responses: Forging a Common Approach to Maritime Piracy

Summary: Once thought to be the scourge of a bygone age, maritime piracy has re-emerged in recent years as a serious threat to both crews and property on the high seas. Globally, attacks have risen from 239 in 2006 to 445 in 2010, with 1181 seafarers taken hostage taken last year alone. The total annual economic cost is estimated at $7-12 billion. Despite growing awareness of the threat, and a variety of national, regional and international initiatives, the tide of piracy continues to rise. It is in this context that the UAE Ministry of Foreign Affairs and DP World convened the conference entitled “Global Challenge, Regional Responses: Forging a Common Approach to Maritime Piracy,†held in Dubai on April 18-19, 2011. The gathering brought leaders from government, the shipping industry and non-governmental organizations together with renowned experts in the field of counter-piracy to discuss ways in which the international response to the global challenge of maritime piracy might be supported and enhanced, and to identify specific, tangible opportunities for collaborative action. In order to stimulate innovative thinking on the subject, the conference organizers engaged the Dubai School of Government to commission a series of short briefing papers reflecting the cutting edge of academic and expert thought on piracy and related issues. These papers correspond to the four conference content categories: General Background and Regional Overviews; Addressing Root Causes; Opportunities for Information Sharing and Civil-Military Cooperation; and, Relevant Issues in International Law. The selected papers cover a wide range of topics and broach a number of key themes, ranging from the hidden economy of piracy to the plight of captive seafarers. Collectively, however, the papers share a common perspective: In spite of substantial investments in a number of areas, the current international response falls short of what is required to end this phenomenon. Furthermore, an effective and enduring solution to the global challenge of maritime piracy must entail a long-term, comprehensive effort, both onshore and offshore, which involves all relevant public and private sector stakeholders.

Details: Dubai: Dubai School of Government, 2011. 124p.

Source: Internet Resource: Accessed April 20, 2011 at: http://www.dsg.ae/PUBLICATIONS/PublicationDetail.aspx?udt_826_param_detail=3099

Year: 2011

Country: International

Keywords: Maritime Crime

Shelf Number: 121456


Author: Kim, Jane

Title: Prosecuting Human Trafficking as a Crime Against Humanity Under the Rome Statute

Summary: Bought and sold, consumed and exploited: human bodies, labor, personhood, and dignity have become the most valuable, reusable, and profitable products in the 2011 world market. In the early twenty-first century, increased awareness and international concern mobilized several legal mechanisms to combat the 32 billion dollar human trafficking industry. In 2002, the Rome Statute of the International Criminal Court entered into force, with specific reference to “trafficking in persons†as a crime against humanity. Despite the developments in human trafficking law, awareness, and policy over the past decade, the International Criminal Court’s (ICC) potential treatment of trafficking as a crime against humanity remains a question mark. This paper examines the potential of the ICC in prosecuting human trafficking as a crime against humanity, identifying the complex contexts of trafficking, the opposition that ICC prosecution will likel! y face, and approaches that the ICC could take in investigating and prosecuting human trafficking. Highlighting the challenges of defining trafficking, the shadow of armed conflict in the ICC’s developing jurisprudence, and the risk of overlooking the gravity of human trafficking, this paper concludes by urging the ICC to look beyond the situations to which international law has traditionally applied. To realize the promise of the Rome Statute, this paper urges the ICC to incorporate the Palermo Protocol, common purpose, and the exceptional and global effects of the trafficking market in approaching human trafficking as a crime against humanity.

Details: New York: Columbia Law School, Center for Gender & Sexuality Law, 2011. 35p.

Source: Internet Resource: Accessed April 21, 2011 at: http://blogs.law.columbia.edu/gslonline/files/2011/02/Jane-Kim_GSL_Prosecuting-Human-Trafficking-as-a-Crime-Against-Humanity-Under-the-Rome-Statute-2011.pdf

Year: 2011

Country: International

Keywords: Human Trafficking

Shelf Number: 121469


Author: Aromaa, Kauko

Title: Survey of United Nations and other Best Practices in the Treatment of Prisoners in the Criminal Justice System Proceedings of the workshop held at the Twelfth United Nations Congress on Crime Prevention and Criminal Justice Salvador, Brazil, 12-19 A

Summary: There is enormous variation in the way the world’s ten million prisoners are treated. Some young men do drill in military style boot camps while others are counselled in therapeutic communities. Prisoners deemed dangerous may be held in almost total isolation in the highest “supermax†conditions of security; low risk prisoners approaching their date of release go out to work during the day from open establishments. Some convicted prisoners can spend years in remote labour colonies, pre trial detainees a few weeks in city centre lock ups. In consequence of this almost infinite variety, any attempt to survey best practices in the treatment of prisoners within the criminal justice system in the course of a one day meeting is destined to be partial at best. Yet the presentations and discussions in this workshop make an important contribution to identifying priorities for UN member states and the international community in the field of penal reform. The substantive themes addressed in the workshop fall into three broad categories. The first concerns the best framework of international law and regulation which governs the treatment of prisoners and the practice of detention. The second concerns the way these international norms are implemented in reality, particularly in respect of the way prisons seek to rehabilitate offenders, promote their good health and meet the needs of the most vulnerable prisoners. The third theme is the contribution that wider society makes to the treatment of prisoners and the ways in which both prison systems and individual prisons relate to the broader community which they serve.

Details: Helsinki: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI), 2010. 150p.

Source: Internet Resource: Publications Series No. 65: Accessed April 27, 2011 at: http://www.heuni.fi/Satellite?blobtable=MungoBlobs&blobcol=urldata&SSURIapptype=BlobServer&SSURIcontainer=Default&SSURIsession=false&blobkey=id&blobheadervalue1=inline;%20filename=Taitto_65_Final_Painoon_Lis%C3%A4ys_030111.pdf&SSURIsscontext=Satellite%20Server&blobwhere=1295264950807&blobheadername1=Content-Disposition&ssbinary=true&blobheader=application/pdf

Year: 2010

Country: International

Keywords: Correctional Programs

Shelf Number: 121507


Author: Craggs, Sarah,

Title: Rights, Residence, Rehabilitation: A Comparative Study Assessing Residence Options for Trafficked Persons

Summary: Increased attention has been given to the issue of “reflection periods†and temporary residence permits as a means to both ensure the protection of trafficked persons and strengthen the investigation and prosecution of traffickers. This study aims to assess how legal norms pertaining to the right to residence are being translated into practice. It provides a comparative legal and practice-based assessment of the application of the right to residence in four countries, namely Austria, Belgium, Italy and the United States of America. Field work was undertaken in all four countries in July and August 2009. The findings are drawn from 46 interviews held with a diverse range of participants. The research was conducted at the request of the donor, the Swiss Federal Department of Foreign Affairs, Directorate of Political Affairs, Political Affairs Division IV. The research process was guided by a number of key research questions with the aim to: assess the legal frameworks in each respective country; examine how the given regulations are applied in practice; assess whether there are any discrepancies with the literal text of the law; and document the experiences and developments that have been made in the four countries in terms of the pertinent frameworks. The research findings reflect this focus; however, the authors acknowledge that the issues of residence and rehabilitation for trafficked persons – whether in the country of exploitation and/or identification, the home country, or a country of resettlement – demand continued attention. The report demonstrates that one of the key barriers to the efficiency of the residence permit procedure remains the manner in which legislation is being translated into practice. There are gaps in existing laws and, in addition, these laws are not always fully implemented. On the other hand, practice by law-enforcement authorities and other actors often goes further than the provisions in the law. In short, there is little consistency and the treatment of victims can vary greatly, depending on the city where they are identified or which agency or individual conducts their interview.

Details: Geneva: International Organization for Migration, 2010. 141p.

Source: Internet Resource: International Migration Law, No. 24: Accessed April 28, 2011 at: http://publications.iom.int/bookstore/free/IML24.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 121563


Author: Papademetriou, Demetrios G.

Title: A New Architecture for Border Management

Summary: This report commissioned to inform the work of MPI’s Transatlantic Council on Migration for its meeting on “Restoring Trust in the Management of Migration and Borders†examines the emergence of a new border architecture resulting from the explosion in global travel and the dawning of the age of risk. This new border architecture must respond effectively to the seemingly competing demands of facilitating mobility while better managing the risks associated with cross-border travel (e.g. terrorism, the entry of unwanted migrants, and organized crime). The report examines the information-sharing agreements, technology innovations, and multilateral partnerships that have emerged as key components of the new architecture for border management, and discusses challenges and considerations for the future.

Details: Washington, DC: Migration Policy Institute, 2011. 29p.

Source: Internet Resource: Accessed April 28, 2011 at: http://www.migrationpolicy.org/pubs/borderarchitecture.pdf

Year: 2011

Country: International

Keywords: Border Security

Shelf Number: 121571


Author: Chonaill, Siobhan Ni

Title: Assessing the Illegal Trade in Cultural Property from a Public Policy Perspective

Summary: The aim of this research is to explore new ways of curtailing the illegal trade in cultural property. Despite a range of legislative and policy interventions, the trade in illicit art and antiquities continues to flourish, resulting in damage to the arts, scholarship and heritage. Through an exploration of existing intervention tools, two case studies and a set of key informant interviews, this study demonstrates the existing difficulties in curtailing the market in cultural property and explores the potential for new policy interventions. More specifically, we map the supply chain for the illegal trade in cultural property and explore the failures of current policy interventions through two case studies, the Medici trading cartel and the Beit collection robberies. We conclude with a number of research and policy conclusions.

Details: Santa Monica, CA: RAND, 2011. 36p.

Source: Internet Resource: Accessed April 28, 2011 at: http://www.rand.org/pubs/documented_briefings/DB602.html

Year: 2011

Country: International

Keywords: Cultural Property

Shelf Number: 121572


Author: Fink, Naureen Chowdhury

Title: Transforming Terrorists: Examining International Efforts to Address Violent Extremism

Summary: Efforts to promote “deradicalization,†or to rehabilitate detainees charged with terrorism-related offenses, have taken multiple forms in a wide range of countries, often as part of broader counter-radicalization strategies that seek to prevent the adoption of violent extremist ideologies or behaviors in the first place. This paper draws on recent insights from case studies of deradicalization initiatives in eight Muslim-majority countries and a variety of approaches adopted by countries in Europe and Asia. The paper makes recommendations concerning what role the United Nations might play in furthering such initiatives by states and facilitating broader international efforts to combat terrorism and violent extremism.

Details: New York: International Peace Institute, 2011. 36p.

Source: Internet Resource: Accessed May 4, 2011 at: http://www.ipacademy.org/publication/policy-papers/detail/316-transforming-terrorists-examining-international-efforts-to-address-violent-extremism.html

Year: 2011

Country: International

Keywords: Extremist Groups

Shelf Number: 121610


Author: Bandyopadhyay, Subhayu

Title: Immigration Policy and Counterterrorism

Summary: A terrorist group, based in a developing (host) country, draws unskilled and skilled labor from the productive sector to conduct attacks at home and abroad. The host nation chooses proactive countermeasures, while accounting for the terrorist campaign. Moreover, a targeted developed nation decides its optimal mix of immigration quotas and defensive counterterrorism actions. Even though proactive measures in the host country may not curb terrorism at home, it may still be advantageous in terms of national income. Increases in the unskilled immigration quota augment terrorism against the developed country; increases in the skilled immigration quota may or may not raise terrorism against the developed country. When the developed country assumes a leadership role, it strategically augments its terrorism defenses and reduces its unskilled immigration quota to induce more proactive measures in the host country. The influence of leadership on the skilled immigration quota is more nuanced.

Details: St. Louis, MO: Federal Reserve Bank of St. Louis, Research Division, 2011. 44p.

Source: Internet Resource: Working Paper Series; Working Paper 2011-012A: Accessed May 4, 2011 at: http://research.stlouisfed.org/wp/2011/2011-012.pdf

Year: 2011

Country: International

Keywords: Counterterrorism

Shelf Number: 121613


Author: Groot, Olaf J. de

Title: Gov-arrrgh-nance: Jolly Rogers and Dodgy Rulers

Summary: In this paper, we argue that the effect of governance on the emergence of crimes of different levels of sophistication is highly non-linear. State failure, anarchy and a lack of infrastructure are not conducive to establishing any business, including illicit enterprises. At the bottom of the spectrum, therefore, both legal business and criminal gangs benefit from improved governance. With further improvements in governance criminal activities decline. We find strong and consistent support for this hypothesis using the International Maritime Bureau's dataset on piracy. Piracy is reported by ship-owners, giving a unique insight into crime in badly governed countries which were systematically excluded from previous analyses. We show that profitable forms of piracy flourish where on the one hand there is stability and infrastructure, but on the other hand the state does not have the capacity to intervene and/or bureaucrats can be bribed to turn a blind eye. For minor acts of theft from ships the pattern is quadratic: piracy first rises and then falls as governance improves.

Details: Berlin: DIW Berlin German Institute for Economic Research, 2010. 45p.

Source: Internet Resource: DIW Berlin Discussion Papers 1063: Accessed May 5, 2011 at: http://www.diw.de/documents/publikationen/73/diw_01.c.361831.de/dp1063.pdf

Year: 2010

Country: International

Keywords: Illegal Behavior

Shelf Number: 121650


Author: de Coning, Eve

Title: Transnational Organized Crime in the Fishing Industry. Focus on: Trafficking in Persons; Smuggling of Migrants; Illicit Drugs Trafficking

Summary: The study posed the questions whether there is transnational organized crime and other criminal activity in the fishing industry and, if so, what the vulnerabilities of the fishing industry are to transnational organized crime or other criminal activity. The research took the form of a six-month desk review of available literature, supplemented by ad hoc consultations and a two-day expert consultation held in Vienna, Austria. Importantly the study did not set out to tarnish the fishing industry. Rather, the study sought to determine whether criminal activities take place within the fishing industry to the detriment of law-abiding fishers, the legitimate fishing industry, local fishing communities and the general public alike. The study considered the involvement of the fishing industry or the use of fishing vessels in trafficking in persons (Chapter 2); smuggling of migrants (Chapter 3); illicit traffic in drugs (Chapter 4); and other forms of crime such as marine living resource crime, corruption, and piracy and other security related crimes (Chapter 5).

Details: Vienna: United Nations, 2011. 146p.

Source: Internet Resource: accessed May 9, 2011 at: http://www.unodc.org/documents/human-trafficking/Issue_Paper_-_TOC_in_the_Fishing_Industry.pdf

Year: 2011

Country: International

Keywords: Child Trafficking

Shelf Number: 121659


Author: Warnath, Stephen

Title: Best Practices in Trafficking Prevention in Europe and Eurasia

Summary: This report was commissioned by USAID’s Europe & Eurasia (E&E) Bureau to examine best practices in activities designed to prevent trafficking in persons (TIP) in the countries of the E&E region. The purpose of this report is to assist the E&E Bureau to improve anti-trafficking in persons programs in terms of effectiveness and impact, thereby reducing the incidence of TIP. USAID seeks to determine the strengths and weaknesses of program approaches to date and discover where anti-TIP efforts can be integrated into other relevant USAID programming. To achieve this goal, this report highlights TIP best practices and lessons learned that were extracted from the available project-specific literature, primarily documents produced in conjunction with USAID-supported projects and supplemented by a larger review of the literature relevant to anti-trafficking prevention strategies and methods. This report builds upon the work of a 2004 assessment entitled “Best Practices to Prevent Trafficking in Persons in Europe and Eurasia†by Ruth Rosenberg. A companion report (“Best Practices for Programming to Protect and Assist Victims of Trafficking in Europe and Eurasiaâ€) reviews protection and assistance programs for TIP victims in the E&E region. This report covers the following countries: Albania, Armenia, Azerbaijan, Belarus, Bosnia and Herzegovina (BiH), Bulgaria, Croatia, Cyprus, Georgia, Kazakhstan, Kosovo, Kyrgyzstan, the Republic of Macedonia, Moldova, Montenegro, Romania, Russia, Serbia, Tajikistan, Turkmenistan, Ukraine, and Uzbekistan.

Details: Washington, DC: United States Agency for International Development, 2009. 57p.

Source: Internet Resource: Accessed May 10, 2011 at: http://www.usaid.gov/locations/europe_eurasia/dem_gov/docs/prevention_final_012909.pdf

Year: 2009

Country: International

Keywords: Human Trafficking (Europe and Eurasia)

Shelf Number: 121695


Author: Surtees, Rebecca

Title: Beneath the Surface. Methodological Issues in Research and Data Collection with Assisted Trafficking Victims

Summary: In the late 1990’s and early 2000’s, during deliberations of the seminal United Nations Anti-Trafficking Protocol and the early drafting of national laws that followed, only a handful of reports addressing contemporary forms of slavery had been written. This has changed. Today hundreds of studies on human trafficking are available with more published each month. The expansive growth in the body of literature on this subject within this relatively short timeframe is a positive development and is welcomed by all who have dedicated themselves to ending modern slavery. Government leaders, donors, service providers and other professionals, faced with the myriad of complexities and variations of human trafficking, continue to stress the importance of research to their work and their desire for more data collection and research. However, even though policymakers and practitioners want and need research they can use, many conclude, with some dismay, that only a small percentage of the numerous reports available provide sufficient empirical rigour and quality of analytical insights needed to help guide more informed decisions capable of producing more effective anti-trafficking results. It is clear that despite a substantial investment of time and resources to produce more and more studies around the world, few end up being useful to government officials and antitrafficking professionals in their work. Implementation of more effective practices to end modern slavery will require better underlying research, analysis and evaluation. Achieving this, however, will not be possible in the absence of a foundation of sound data systematically collected to serve specific practice-based research objectives. This report focuses on approaches to collecting data about human trafficking that underlie a large segment of research produced since the UN Protocol and, in doing so, reveals some of the key reasons that research generally has not provided a clearer path to more effective action for policymakers and practitioners. It examines how current approaches to the collection and use of data about human trafficking, while helpful for certain purposes, fall short of what will be needed to achieve a new generation of higher quality research and analysis capable of helping to produce transformative results in addressing human trafficking.

Details: Geneva: International Organization for Migration; Washington, DC: NEXUS Institute, 2010. 96p.

Source: Internet Resource: Accessed May 10, 2011 at: http://publications.iom.int/bookstore/free/beneath_the_surface.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 121696


Author: Abrahamsen, Rita

Title: The Ethical Challenges of Security Privatization

Summary: While in the study of international relations the majority of attention toward the privatization of security has been devoted to the privatized military, commercial security companies have quietly become significant actors across the globe. In almost every country in the world, private security plays a significant and growing role in security provision. The private security industry is estimated to have a world-wide market value of over $165 billion, and growth rates of over 8%. In many countries, private security employees now outnumber their public counterparts, often by considerable amounts. This growth has been accompanied by the evolution of commercial security companies with extensive resources and geographic reach. Intriguingly, the largest of these firms are based in Europe. The world’s largest private security company, Group4Securicor (G4S), is one of the UK’s 100 largest corporations by capitalization, and the largest employer listed on the London Stock Exchange. With operations in 115 countries, it employs over half a million people. Following a similar pattern of expansion, the Swedish-based Securitas has also become a significant provider of security services across Europe and beyond. The world’s second-largest PSC, Securitas has implemented more than 60 acquisitions over the past two decades, employs more than 240,000 people in thirty-seven countries, and now has 12% of the global outsourced security market. The company’s total sales in 2007 amounted to approximately $6.9 billion, with an organic sales growth of 5%. The third largest PSC in the world, the Spanish company Prosegur, also mirrors the trend. Founded in 1976, the firm employs more than 75,000 people, and has extensive operations in Europe and Central and South America. The increasing role of private security challenges some of modern society’s most fundamental political assumptions. The idea that security is a quintessentially public good is at the heart of modern conceptions of sovereignty, so much so that an increasing monopoly of public force was long seen as a mark of movement toward modernity. The stunning growth of private security over the past three decades thus challenges deeply held political beliefs, including the assumption that modernity and development are marked (or even defined) by the increasing monopolization of security in the hands of the state, and that this process provides the stable benchmark for ethical evaluation. This Working Paper seeks to explore some of the ethical and political implications of the ‘rebirth’ of private security, focusing particularly on its transnational dimensions. We do so in a different manner from many treatments of security privatization in International Relations. First, we do not concentrate on the private military. Developments in this arena have received a great deal of attention, ranging from debates about whether it is a legitimate form of activity, or a simply a form of modern mercenarism, to questions about its relationship to military ethics and the just war tradition. While these are important debates, we focus here on the less analyzed but more pervasive forms of security transformation at work in the realm of commercial security. It is in this domain that private security is having some of its most extensive effects – effects that require empirical scrutiny and that raise ethical issues often quite different from those posed by military privatization. Second, our analytic standpoint differs from many existing treatments in that in the bulk of this paper we propose to treat the ethical less as a category of purely moral assessment or abstract philosophic reflection, and more as a domain of social power. The ethical implications of security privatization cannot be considered in isolation from the social conditions that have given rise to its rebirth. These social structures condition the terms of ethical debate. By locating ethical questions in context of social shifts and transformations in state structures, we will be in a better position to provide ethical appraisal and political judgement.

Details: Oslo: International Peace Research Institute, 2009. 33p.

Source: Internet Resource: INEX Project, INEX D.3.2.; Accessed May 10, 2011 at:

Year: 2009

Country: International

Keywords: Ethics

Shelf Number: 121703


Author: van Buuren, Jelle

Title: A Report on the Ethical Issues Raised by the Increasing Role of Private Security Professionals in Security Analysis and Provision

Summary: Private security is on the rise. Although difficulties emerge in exactly estimating the precise amount of private security in the total range of security, the available figures all point into the same direction. Private security has moved lately to a more central stage in science, after years of academic neglect. Traditionally, private security was symbolized by the Private Eye as reflected in American movies: a cynical, though male, breaking laws and norms while holding a bottle of whisky in one hand and a blonde femme fatale in the other hand. However, this Hollywood image of private investigators seems to be outdated. Private security nowadays covers a conglomerate of companies active in all possible fields of security. In this literature review, we will look into the dimension, size and functions of private security as reflected in the academic forum. Further, we will look into scientific discussions concerning explanations for the rise in private security, the functions of private security, the relationship with the state, the relationship between public and private security and the possible societal and political ramifications of private security. After examining the scientific knowledge on the organizational and personal values dominant in the private security sector, we will look at the possible ethical dilemmas embedded in the rise in private security. We will end with some conclusions regarding the current scientific knowledge on private security and possible avenues for further exploration of the ethical challenges to private security. Throughout this literature review we will understand private security companies as ‘commercial enterprises using public or private funds to engage in tasks where the principal component is a security of regulatory function'.

Details: Oslo: International Peace Research Institute, 2009. 72p.

Source: Internet Resource: INEX Project; Report D.3.3.: Accessed May 10, 2011 at: www.inexproject.eu

Year: 2009

Country: International

Keywords: Ethics

Shelf Number: 121704


Author: Sommer, Peter

Title: Reducing Systemic Cybersecurity Risk

Summary: This report is part of a broader OECD study into ―Future Global Shocks, examples of which could include a further failure of the global financial system, large-scale pandemics, escape of toxic substances resulting in wide-spread long-term pollution, and long-term weather or volcanic conditions inhibiting transport links across key intercontinental routes. The authors have concluded that very few single cyber-related events have the capacity to cause a global shock. Governments nevertheless need to make detailed preparations to withstand and recover from a wide range of unwanted cyber events, both accidental and deliberate. There are significant and growing risks of localised misery and loss as a result of compromise of computer and telecommunications services. In addition, reliable Internet and other computer facilities are essential in recovering from most other large-scale disasters.

Details: Paris: Organisation for Economic Co-operation and Development, 2011. 119p.

Source: Internet Resource: Accessed May 11, 2011 at: http://www.oecd.org/dataoecd/57/44/46889922.pdf

Year: 2011

Country: International

Keywords: Computer Crimes

Shelf Number: 121708


Author: Bagchi, Aniruddha

Title: Workplace Deviance and the Business Cycle

Summary: We examine the relationship between the incidence of workplace deviance (on-the-job crime) and the business cycle. A worker’s probability of future employment depends on whether she has been deviant as well as on the availability of jobs. Using a two period model we show that the net impact on deviant behaviour to changes in unemployment is ambiguous and depends on the strength of two effects. If the probability of being employed for a nondeviant improves as expected market conditions improve, then that lowers deviant behaviour, while if the deviant’s probability of being employed improves as market conditions improve, that increases deviance as market conditions improve. In either case, there is a setup cost to deviant behaviour and the attractiveness of incurring that increases with an increase in expected probability of future employment. This second effect therefore increases the incentive to be deviant and thus can reinforce the first effect or weaken it. Finally, we show that an increase in optimism i.e. the probability of facing a recession going down unambiguously increases deviant behaviour.

Details: Birmingham, UK: University of Birmingham, Department of Economics, 2011. 28p.

Source: Internet Resource: Department of Economics Discussion Paper 11-06: Accessed May 11, 2011 at: ftp://ftp.bham.ac.uk/pub/RePEc/pdf/11-06.pdf

Year: 2011

Country: International

Keywords: Economics and Crime

Shelf Number: 121709


Author: Chen, Clara Xiaoling

Title: Relative Wages and Employee Theft: Evidence from Retail Chains

Summary: In this paper we examine whether, for a sample of retail chains, high levels of employee compensation can deter employee theft, an increasingly common type of fraudulent behavior. Specifically, we examine the extent to which relative wages (i.e., employee wages relative to the wages paid to employees in competing stores) affect employee theft as measured by inventory shrinkage and cash shortage. Using two storelevel datasets from the convenience store industry, we find that: (1) relative wages are negatively associated with employee theft, after we control for each store’s employee characteristics, monitoring environment, and socio-economic environment; (2) employee theft decreases in the magnitude of employees’ overpayment but does not increase in the magnitude of underpayment; and (3) coworker presence is more likely to lead to reductions in the amount of employee theft when relative wages are higher.

Details: Unpublished paper, 2010. 42p.

Source: Internet Resource: Accessed May 11, 2011 at: http://www.comiteretailfinanciero.cl/wp/wp-content/site_files/2010/08/Relative_Wages_and_Employee_Theft.pdf

Year: 2010

Country: International

Keywords: Economics and Crime

Shelf Number: 121710


Author: Allen, Elizabeth

Title: The Illicit Trade in Tobacco Products and How to Tackle It

Summary: This publication aims to raise awareness of the growing and evolving illicit trade in tobacco products. It is a compilation of facts and views from a wide range of sources including respected academics, private sector consultants, journalists, international enforcement organizations, government revenue authorities and industry. It defines the different aspects of illicit trade and provides information on ways of measuring its size. It analyzes the nature of the problem, its causes and consequences, and offers authorities best practice guidance on implementing anti-illicit trade strategies. Case studies are used to provide evidence of good practice and global efforts to tackle this serious problem.

Details: Brussels: International Tax and Investment Center, 2011. 36p.

Source: Internet Resource: Accessed May 11, 2011 at: http://www.iticnet.org/Public/PublicDocLanding.aspx?id=41&type=Brussels

Year: 2011

Country: International

Keywords: Illegal Cigarettes

Shelf Number: 121692


Author: International Road Transport Union

Title: Attacks on Drivers of International Heavy Goods Vehicles; Survey Results

Summary: Since the tragic events in the United States on 11th September 2001, it has been increasingly recognised that all transport modes are at risk from terrorism and crime. Those involved in road freight transport also face a number of specific challenges, which include theft of goods and vehicles, attacks on truck drivers, illegal immigration, special risks related to the movement of dangerous goods by road, as well as smuggling. In addition to these often crime-related challenges, authorities and operators must remain vigilant to possible terrorist use or targeting of vehicles and infrastructure. These challenges – and their responses – pose serious daily problems for all actors involved in this sector: the drivers, transport companies, police / law enforcement agencies, authorities, politicians, trade associations, unions, insurers, truckstop operators and other players. Road freight transport, a vital element of international production schemes, trade and economic relations across frontiers in Europe and elsewhere, faces this challenge of enhanced security requirements against the background of a highly competitive road freight market. The number of vehicle thefts and freight robbery incidents appear to be increasing in many countries. The need to protect drivers, their vehicles and the freight carried is now becoming an issue of increasing concern. It can however be noted with satisfaction that measures of protection and prevention have already proved efficient in a few countries. Indeed, much work has already been done to address many of the multiple threats faced by the European transport sector. One type of threat in particular, attacks on international HGV drivers, has consistently been cited as a significant problem. To date, however, information needed to better understand the nature and scale of the problem and its consequences on transport drivers, companies and the sector as a whole has been lacking and only anecdotal evidence of attacks on drivers has been available. The apparent reasons for this are varied: drivers frequently do not inform the police of the attacks for multiple reasons such as language difficulty and lack of trust in authorities and insufficient information about where and to whom the attacks should be reported. When they are reported, these incidents are very often not centrally recorded or properly responded to. Indeed in many countries a comprehensive policy and decision-making framework at local and national level is not yet in place to countervail spreading crime on the roads. The most effective measures to fight crime, such as for example, a wider use of protective devices on board vehicles, providing sufficient secure truck parking areas, setting up efficient and accessible incident reporting and recording structures, implementing intra-company preventive and protective security measures, raising awareness, improving training and so on, are, in most countries, not or hardly implemented.

Details: Geneva: IRU, 2008. 11p.

Source: Internet Resource: Accessed May 11, 2011 at: http://www.internationaltransportforum.org/IntOrg/ecmt/crime/pdf/08AttackSurvey.pdf

Year: 2008

Country: International

Keywords: Assaults

Shelf Number: 121712


Author: Ekwall, Daniel

Title: Managing the Risk for Antagonistic Threats against the Transport Network

Summary: The World Trade Centre terror attack in 2001 changed the world and with it the conditions for logistics worldwide. The aftermath of the attack brought needed attention to the vulnerability of modern supply chains. This thesis addresses the antagonistic threats that exploit the vulnerability in a supply chain. Antagonistic threats are a limited array of risks and uncertainties and can be addressed with risk management tools and strategies. There are three key demarcations between antagonistic threats and other risks and uncertainties: deliberate (caused), illegal (defined by law), and hostile (negative impact, in this thesis, for transport network activities). This thesis makes a theoretical contribution to the usage of theories from criminology in supply chain risk management to handle antagonistic threats against the transport network. The recognition that antagonistic threats toward the transport network are a problem leads to verification of the research questions from the background and the theoretical framework. This is done to place or relate the research questions closer to the context. Furthermore, it leads to the conclusion that the answers may or may not contain competing and/or incompatible parts which differ depending on the perspective or viewpoint at the moment. One of the most important things to understand is that antagonistic threats toward freight always have been a feature in both business and politics. The different functions and goals for all stakeholders mean that all stakeholders and actors may use similar methods to manage antagonistic threats but the effects and consequences will change according to the circumstances. The system approach in this thesis is a soft-system thinking where reality is described in subjective terms and the whole system has the distinctive trait of vague or undefined boundaries between system components and the surrounding environment. Therefore, this thesis uses a complex system approach in which paradoxes and bounded rationality describes the system’s behaviour. This thesis defines the legal descriptions and criminal threats against and within supply chain management activities that entail both the systems context and boundaries. Managing of the antagonistic threats through the risk management perspective is separated into two sides, pre-event and post-event measures, which means the system needs to be robust and resilient, using logistics terms. It should be robust to automatically handle small risks (normally with high likelihood and low impact). The system also needs resilience in order to adapt, improvise, and overcome any disturbance greater than the system’s robustness can handle. Both robustness and its resilience can constitute of the full range of prevention, mitigation, and transferring tools and methods. Regardless of which perspective or viewpoint is chosen for analysing the problem, the same basic set of tools and methods are valid, but in practical use they need to be adapted to the actors’ needs and wants for managing their exposure to antagonistic threats.

Details: Göteborg : Chalmers University of Technology, 2009. 286p.

Source: Internet Resource: Doctoral Thesis: Accessed May 11, 2011 at: http://bada.hb.se/handle/2320/5033

Year: 2009

Country: International

Keywords: Cargo Theft

Shelf Number: 121713


Author: International Tax

Title: The Relationship Between Taxation, Consumption and Smuggling of Tobacco

Summary: In this paper, we review analysis published recently by the World Bank and others looking at the impact of cigarette taxation on tobacco consumption and smuggling, focusing on four key issues: • The effect of increases in taxation on overall tobacco consumption, smuggling and government revenues — The World Bank (1999) argues that higher taxation will lead to a significant reduction in cigarette consumption, especially in middleand low-income economies, while at the same time increasing government tax revenues. But our analysis demonstrates that, although higher taxes may have a significant impact on legitimate (ie tax-paid) tobacco sales, its impact on overall consumption is likely to be mitigated by a marked rise in purchases of smuggled cigarettes. As well as limiting the impact of higher taxation on overall tobacco consumption, smuggling also undermines the tax base, reducing government revenues. Moreover, high taxes — particularly under an ad valorem regime — encourage consumers to trade down to cheaper cigarettes, which also reduces government revenues. • Tobacco smuggling: the role of tax differentials and its wider impact on society — Merriman et al (2000) argue that it is the ease of tax evasion rather than price differentials that are most important in determining the level of tobacco smuggling in a country. But while we would accept that there is sometimes a relationship between the general level of corruption in a country and the extent of cigarette smuggling, we would challenge the claim that corruption is more important in influencing smuggling than cigarette taxes and prices. Experience in the UK and US, for example, demonstrates that high excise taxes can generate a serious problem with smuggling even in countries with very effective law enforcement and administration. Moreover, it is important to recognise the other costs associated with measures that encourage tobacco smuggling, such as increased criminality and the creation of infrastructures that allow smuggling of other products as well. • The role of governments: law enforcement and administration — The World Bank (1999) claims that increasing the certainty and severity of law enforcement and prosecution is the most straightforward and sometimes the most effective way of discouraging smuggling. But while sensible regulatory and administrative policies have an important part to play in countering smuggling, experience in the UK, for example, shows that Customs enforcement measures have only a limited impact while large tax differentials persist, and are also very expensive to implement. • The effect of benchmark tax rates for cigarettes and their relationship with purchasing power — The World Bank (1999) suggests that cigarette taxation should be set at two-thirds to four-fifths of the total retail price of cigarettes. This is far too simplistic a prescription. It makes no allowance for local conditions, such as the level of income, efficiency of Customs enforcement, tax rates in neighbouring economies, etc. Measured relative to purchasing power, cigarette taxes in many developing economies are already significantly higher than in developed countries. Raising excise taxes in such circumstances would encourage increased smuggling and criminality, and undermine the government tax base.

Details: Washington, DC: ITIC, 2003. 12p.

Source: Internet Resource: Accessed May 11, 2011 at: http://www.iticnet.org/Public/other_publications.aspx#divYear2003

Year: 2003

Country: International

Keywords: Illicit Trade

Shelf Number: 121716


Author: Bayer, Michael D.

Title: The Blue Planet: Informal International Police Networks and National Intelligence

Summary: A fundamental doctrine of the United States is the system of checks and balances, a system wherein political power is dispersed among various governmental elements so that no particular interests or segments can dominate the government — or the people. One of the most strident criticisms of the former Bush-Cheney administration has been that in the time of crisis and immediately after, and in the years following the 9/11 terror attacks, executive (presidential) authority had been greatly expanded during the strategic response to those attacks and was, according to some, abused — thereby skewing our revered system of checks and balances. Certain segments of governments are acknowledged to be tools of political power — particularly subject to political influences. In the United States the military is exceptionally susceptible to the political designs of the President and the administration because he is their direct-line Commander in Chief. It is also widely acknowledged that intelligence services are part of the political epicenter of governments, because they too are a vitally important direct-line tool of national leadership. As it happened, these are the two segments of our government that benefited most, in terms of power, mission, and funding, from the prosecution of the United States’ Global War on Terrorism. In fact, it had been asserted by former Vice President Cheney on U.S. national television (FOX) that the war on terrorism was an effort to be waged by the U.S. military and the U.S. intelligence services and not law enforcement. This book maps out how bureaucratic maneuvering in the aftermath of 9/11 led to the U.S. military/intelligence apparatus assuming primacy and garnering near exclusivity in the international aspect of U.S. counterterrorism policy. This ultimately resulted in the fundamental exclusion of some of the most powerful components of the vast international resources at the fingertips of U.S. law enforcement. The book argues that allowing this to happen was a big mistake — and an unnecessary one at that. The existing networks of international law enforcement are powerful in their own right, but globalization and concomitant worldwide reconfiguration of national sovereignty have greatly empowered inter-governmental networks (such as those of international law enforcement). This book asserts that law enforcement is especially conducive to the advantages aff orded to international networks because the “culture of the badge†provides an immediate basis of trust and commonality to build upon — a commonality that can transcend borders, politics, religion, ethnicity, and other categories of segregation. Furthermore, some international policing scholarship asserts that law enforcement entities seek their own autonomy away from centers of political power by striving to find better, more effi cient ways to serve the state and the public (corruption influences notwithstanding) and in so doing are given the leeway to do so. One way they do this is by engaging in informal means of doing business — seeking one-on-one interaction with foreign counterparts rather than going through multiple layers of bureaucracy and government. Those who work in international law enforcement understand implicitly and explicitly that using informal networks is how most international police business is accomplished — especially in this day and age of e-mail and cell phones. But it is not the power of the network alone that brings value added to transnational policing. It is the sheer volume of numbers of police that are dispersed throughout nearly every nation in the world — and who live and work at all levels of societies, from the back alleys and villages from where terrorism breeds to the wealthiest levels, from where political/religious terrorism is financed. It is the numbers of police combined with their mandates to gather and acquire information — whether for investigative or public security purposes. Police have always had a vested interest in gathering and tracking information about local troublemakers and criminal activity in order to maintain public order and, as such, are a natural resource of acquiring terrorism information — particularly in regard to cells which might be financing or otherwise supporting operations through criminal activity. It is the ability to conduct their business among multiple levels of societies and within populations at large which makes international law enforcement very likely the largest and most potent counterterrorism network on the face of the earth. Hence, the title of this work — The Blue Planet. The worldwide network of police is a formidable asset — made even more formidable by the investigative and arrest authorities bestowed upon U.S. law enforcement and its foreign counterparts. This book will demonstrate that the willful disregard of such a spectacularly valuable asset was not only foolhardy, but also served to deny the American public the measure of national security they would have been entitled had the process been honestly brokered and strategically considered. Instead, in spite of the best of intentions, the parochial interests of the most powerful agencies prevailed at the expense of our own citizens. Police can and do cooperate with one another internationally to combat transnational crime. Organizations such as Interpol and Europol exist for this purpose — but those organizations, while valuable, bring with them the burdens and inefficiencies of their own diplomatic formalities, rules, regulations, and procedures along with the accompanying bureaucracies of participating member governments. Informal policing has been around for even longer than formal arrangements, and evolved as an efficient means to deal with the internationalization of crime. Transnational terrorism is an extreme form of international crime, but it is very often supported by other types of organized criminal activity such as drug trafficking, weapons trading, and document fraud. One of the main objections from abroad of the U.S.’s conduct of the war on terrorism has been the perceived disregard for the “rule of law,†particularly among our European allies. While some critics might find the worldwide unification of law enforcement cause for concern, this work will argue that the potential for human rights abuses are far more likely under war conditions and intelligence operations than by globally enabled police. While the potential for human rights abuses certainly exists, national law enforcement elements respecting their own “rule of law†and the laws of counterpart nations will find the means to cooperate within existing legal frameworks. Th is work will also argue that international police cooperation is one way that weak nations can serve to build their own governmental infrastructures and contribute in a positive way to international relations. There will be those who will assert that the current manner in which the United States deals with gathering terrorism information from our present intelligence posture provides adequate worldwide coverage of the problem. But even a cursory analysis of the numbers of sources available to worldwide police networks versus rational estimates of intelligence assets will show those assertions to be implausible. There are also those who might argue that international police interaction is problematic because police are an instrument of force and are endowed with powers that can be abused. This concern is valid in that abuse of police powers can readily impact human rights. The idea of informal international police relationships that are unregulated and therefore lack accountability can seem a slippery slope. However, the trend since 9/11 has been to attempt to integrate law enforcement with functions of intelligence services — as what occurred in the United States with the FBI. This linkage is gaining acceptance and is being implemented throughout Europe but it is implicitly far more slippery. The intelligence service/law enforcement dichotomy is primarily one of legal versus extra-legal constructs. Intelligence services are extra-legal forces unconstrained by legality and matters of sovereignty — and they too can be, and often are, instruments of force. When the two are integrated, the idea of rule of law becomes moot because of the extra-legal prerogatives of intelligence services — “poisoning†the law enforcement function and therefore the rule of law. It is no coincidence that one of the hallmarks of a police state is the convergence of the legal policing and extra-legal intelligence functions. Law enforcement, on the other hand, is legally sanctioned and generally permitted to exercise its authorities for the benefit of the greater good. This work advocates solely for the legal and legitimate exercise of the rule of law through international police cooperation, whether through formal channels or through the much more powerful and effective informal networking. If a nation’s laws forbid informal police cooperation, so be it. But national governments should recognize the positive role that international police cooperation can serve — not the least of which is serving the right of the people (or the people of other nations) not to be exploited, molested, or harmed by external criminal forces. Eight years later we are still experiencing the after-eff ects of the 9/11 attacks. When the consequences can be nuclear, biological, or chemical, especially in these precarious times, can we afford to deny our public the benefits of such a powerful instrument of counterterrorism—the informal networks made available to U.S. law enforcement?

Details: Washington, DC: National Defense Intelligence College, Center for Strategic Intelligence Research, 2010. 205p.

Source: Internet Resource: Accessed May 16, 2011 at: http://www.ndic.edu/press/pdf/18507.pdf

Year: 2010

Country: International

Keywords: Intelligence Gathering

Shelf Number: 121720


Author: Skinner, Robyn

Title: Child Trafficking and Organized Crime. Where Have All the Young Girls Gone?

Summary: This study investigates the role of organized crime in human trafficking, the third largest illicit industry in the world, and looks at how many trafficked girls and women are subjected to sexual exploitation.

Details: Washington, DC: Youth Advocate Program International, 2004. 6p.

Source: Internet Resource: Accessed May 19, 2011 at: http://www.yapi.org/rpchildtrafficking.pdf

Year: 2004

Country: International

Keywords: Child Trafficking

Shelf Number: 121753


Author: Song, Susan

Title: Global Child Sex Tourism: Children as Tourist Attractions

Summary: This study outlines the growing use of child prostitution as an inducement to travelers. Child sex tourism is a highly pervasive industry, though steps are being taken worldwide to eradicate it.

Details: Washington, DC: Youth Advocate Program International, 2004. 5p.

Source: Internet Resourcea; Accessed May 19, 2011 at: http://www.yapi.org/rpchildsextourism.pdf

Year: 2004

Country: International

Keywords: Child Prostitution

Shelf Number: 121755


Author: Berezina, Evgenia

Title: Street Children: Victimization and Abuse of Street Children Worldwide

Summary: This report examines the lives of nearly 150 million children worldwide who are living on the streets. These children are among the most vulnerable to neglect, abuse, exploitation, torture, and death... often at the hands of the very individuals and institutions that are supposed to protect them. The purpose of this paper is to highlight the worldwide problem of abuse and violence of children living on the streets. These children are exceptionally vulnerable and are often exploited and made outcasts of society.

Details: Washington, DC: Youth Advocate Program International, 2004. 4 p.

Source: Internet Resource: Accessed May 19, 2011 at: http://www.yapi.org/rpstreetchildren.pdf

Year: 2004

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 121756


Author: Bjelajac, Zeljko Dj.

Title: Contemporary Tendencies in Money Laundering Methods: Review of the Methods and Measures for its Suppression

Summary: Money laundering is not an isolated case, present in a single state or a series of states, but a worldwide phenomenon. Banking represents a useful field for different types of offenses related to money laundering. The utilization of corresponding accounts for the purposes of money laundering has also been perceived as a serious problem. The exploitation of the electronic money transfer for money laundering appears to be the most convenient and frequent method of concealing illegally acquired assets, and this method is today one of the most common and suitable methods of the capital transfer worldwide. Money laundering represents important organized crime activity, that is, its’ typical and characteristic behavior. Traditional financial instruments are increasingly repressed by the use of the new technological systems and replaced by new electronic payment systems. However, the utilization of the new electronic payment systems introduces a variety of risks associated to numerous opportunities of abuse due to money laundering. In order to prevent money laundering and the wrongful consequences it causes in different spheres of society, competent authorities engage in a number of preventive processes and actions, applying specific methods and measures developed for combating this phenomenon.

Details: Athens, Greece: Research Institute for European and American Studies (RIEAS), 2011. 22p.

Source: Internet Resource: RIEAS: Research Paper, No. 151: Accessed May 29, 2011 at: http://www.rieas.gr/images/rieas151.pdf

Year: 2011

Country: International

Keywords: Financial Crimes

Shelf Number: 121763


Author: Piolatto, Amedeo

Title: A Model of Music Piracy with Popularity-Dependent Copying Costs

Summary: Anecdotal evidence and recent empirical work suggest that music piracy has differential effects on artists depending on their popularity. Existing theoretical literature cannot explain such differential effects since it is exclusively concerned with single-firm models. We present a model with two types of artists who differ in their popularity. We assume that the costs of illegal downloads increase with the scarcity of a recording, and that scarcity is negatively related to the artist's popularity. Moreover, we allow for a second source of revenues for artists apart from CD sales. These alternative revenues depend on an artist's recognition as measured by the number of consumers who obtain his recording either by purchasing the original or downloading a copy. Our findings for the more popular artist generalize a result found by Gayer and Shy (2006) who show that piracy is beneficial to the artist when alternative revenues are important. In our model, however, this does not carry over to the less popular artist, who is often harmed by piracy even when alternative revenues are important. We conclude that piracy tends to reduce musical variety.

Details: Barcelona, Spain: Institut d'Economia de Barcelona, Universitat de Barcelona, 2011. 30p.

Source: Internet Resource: Documents de treball IEB, Nº. 5, 2011: Accessed May 19, 2011 at: http://dialnet.unirioja.es/servlet/articulo?codigo=3419043


Year: 2011

Country: International

Keywords: File Sharing

Shelf Number: 121764


Author: Kar, Dev

Title: Illicit Financial Flows from the Least Developed Countries: 1990–2008

Summary: This paper explores the scale and composition of illicit financial flows from the 48 Least Developed Countries (LDCs). Illicit financial flows involve the cross-border transfer of the proceeds of corruption, trade in contraband goods, criminal activities and tax evasion. In recent years, considerable interest has arisen over the extent to which such flows may have a detrimental impact on development and governance in both developed and developing countries alike. This issue has been recognised by the UN as important for development and achievement of the Millennium Development Goals (MDGs). Illicit capital flight, where it occurs, is a major hindrance to the mobilisation of domestic resources for development. In many cases, it significantly reduces the volume of resources available for investment in the MDGs and productive capacities. Through the United Nations, the international community has committed to strengthen national and multilateral efforts to address it. As the deadline for achievement of the MDGs draws closer, it is vital understand more about the nature of this problem and to explore possible policy solutions, especially for those countries furthest off-track towards the MDGs. The study’s indicative results find that illicit financial flows from the LDCs have increased from US$9.7 billion in 1990 to US$26.3 billion in 2008 implying an inflation-adjusted rate of increase of 6.2 percent per annum. Conservative (lower-bound) estimates indicate that illicit flows have increased from US$7.9 billion in 1990 to US$20.2 billion in 2008. The top ten exporters of illicit capital account for 63 percent of total outflows from the LDCs while the top 20 account for nearly 83 percent. Trade mispricing accounts for the bulk (65-70 percent) of illicit outflows from the LDCs, and the propensity for mispricing has increased along with increasing external trade. Empirical research on illicit flows indicates that there are three types of factors driving illicit flows—macroeconomic, structural, and governance-related. The ratio of illicit outflows to Gross Domestic Product (GDP) averages about 4.8 percent but there is wide variation among LDCs. Of the top 10 countries with the highest illicit flows to GDP ratio, four are small island countries, two are landlocked, and four are neither. In some LDCs, losses through illicit capital flows outpace monies received in official development assistance (ODA). Estimating illicit flows from some LDCs is problematic because the underlying macroeconomic or partner-country trade data are either non-existent or spotty due to widespread on-going or recent conflict and/or weak statistical capacity. Complete macroeconomic and partner-country trade data were available for 34 LDCs, while 11 report partial data to the IMF and 3 are nonreporters. The report thus presents an estimate of illicit flows from some of the non-reporting and partially reporting countries based on the assumption that illicit flows from these countries are in the same proportion to GDP as are outflows from other reporting LDCs with complete data. The results of this study are indicative but demonstrate a clear need for further research in this area given the scale of the development challenges which currently face the Least Developed Countries and the need to ‘think outside the box’ and find innovative development solutions. The paper presents a number of useful measures LDCs may wish to consider to curtail the generation and transmission of illicit financial flows. The international community must also play its part. However, even where policy measures are well designed and targeted, lasting improvements in this area can only be achieved when there is the sufficient political will and leadership to tackle corruption and some of the root causes of illicit financial flows. For the Least Developed Countries, policy recommendations include measures to address trade mispricing through for instance systematic customs reform and the adoption of transfer pricing regulations with commensurate increase in enforcement capacity. The implementation of specialised software which helps governments to identify possible incidences of transfer pricing may also be useful to some governments. Measures to reform the tax base through the progressive strengthening and widening of the tax base in order to reduce dependence on indirect taxes which are more difficult to manage and have built-in incentives for tax evasion may also be beneficial. Ultimately tax is the most sustainable source of finance for development and the long-term goal of poor countries must be to replace foreign aid dependency with tax self-sufficiency. However taxation reform must be seen as equitable and fair and must not unduly burden the poorest. The international community must also support LDCs’ efforts to curtail the illicit outflow of capital. This includes specific measures to support LDCs to improve the systematic exchange of tax information between governments on non-resident individuals and corporations while the adoption of globally consistent regulations for transfer pricing could encourage multinational companies to modify their behaviour towards more transparency and accountability. The UN’s Model Income Tax Treaty refers to the importance of automatic exchange of information between national tax authorities in different jurisdictions. In order to stem tax avoidance by multinational corporations, the international community could support the development of an international accounting standard requiring that all multi-national corporations report sales, profits, and taxes paid in all jurisdictions in their audited annual reports and tax returns.

Details: New York: United Nations Development Programme, 2011. 68p.

Source: Internet Resource: Accessed May 19, 2011 at: http://www.gfip.org/

Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 121767


Author: Organisation for Economic Co-operation and Development

Title: Drugs and Driving: Detection and Deterrence

Summary: Driving while impaired by drugs – whether licit or illicit – has emerged as an important road safety issue. This report provides a state-of-the-art review of the role and impact of drugs in road accident risk. It reviews the legislation, deterrence and roadside detection practices in member countries as well as preventative measures to combat drug use while driving. The report first discusses the scientific evidence that provides the basis for understanding drug effects on driving performance, provides an assessment of the pharmacological effects in relation to driving skills and documents the relationship between blood toxicology findings and impairment. It then presents the evidence from studies that have examined the frequency of driving after drug use and the incidence of drugs among drivers involved in crashes and assesses the risks associated with driving after using drugs. It provides a review and discussion of legislative and enforcement policies and practices in OECD/ITF countries and of the prevention initiatives. Finally it draws conclusions about the role of drugs in traffic and identifies leading practices for controlling/preventing the behaviour based on the evidence presented.

Details: Paris: OECD Publishing, 2010. 115p.

Source: Internet Resource: Accessed May 24, 2011 at: http://www.oecd-ilibrary.org/docserver/download/fulltext/7710011e.pdf?expires=1306236897&id=id&accname=oid006203&checksum=71EE1FD0E45A16DCE930B61E1BF2F086

Year: 2010

Country: International

Keywords: Driving Under the Influence of Drugs

Shelf Number: 121788


Author: Traffic Injury Research Foundation

Title: Drugs and Driving: A Compendium of Research Studies

Summary: It is clear that drug-impaired driving is a serious, wide-spread problem that requires effective responses. There is a broad spectrum of options, from strictly preventative to strictly punitive approaches. As seen in relation to alcohol-impaired driving, it is likely that a combination of both preventative and punitive responses provides the best results. Nevertheless, this annotated bibliography focuses on studies pertaining to identification and to prosecution of drug-impaired driving. Moreover it concentrates on studies about drug-impaired, rather than alcohol-impaired, driving. As described in the section that follows, there have been a substantial number of studies relating to drug-impaired driving worldwide. However, there has been a paucity of research that brings together data from these various sources. Assessment of the merits of proposed legislative changes in the future and identification of alternative options will require up-to-date knowledge of current literature pertaining to drug-impaired driving. This annotated bibliography attempts to meet these needs. Its objective is to provide a listing of drug-impaired driving research published in English, since 1999. Qualitative and quantitative research, relevant surveys and other materials pertaining to drug-impaired driving are included among its listings.

Details: Ottawa: Department of Justice Canada, 2007. 89p.

Source: Internet Resource: Accessed May 24, 2011 at: http://dsp-psd.pwgsc.gc.ca/collection_2009/justice/J3-2-2006-8E.pdf

Year: 2007

Country: International

Keywords: Driving Under the Influence of Drugs

Shelf Number: 121790


Author: Chalk, Peter

Title: The Latin American Drug Trade: Scope, Dimensions, Impact, and Response

Summary: Colombia currently accounts for the vast bulk of cocaine produced in Latin America. In 2009, the country produced 270 metric tons (MT) of cocaine, making it the principal supplier for both the United States and the worldwide market. Besides Colombia, Peru and Bolivia constitute two additional important sources of cocaine in Latin America. In 2009, these two countries generated enough base material to respectively yield 225 and 195 MT of refined product. Between 60 and 65 percent of all Latin American cocaine is trafficked to the United States, the bulk of which is smuggled via the eastern Pacific/Central American corridor. The remainder is sent through the Caribbean island chain, with the Dominican Republic, Puerto Rico, and Haiti acting as the main transshipment hubs. In both cases, Mexico serves as the main point of entry to mainland America, presently accounting for the vast majority of all illicit drug imports to the United States. Increasing amounts of Latin American cocaine are now also being sent to Europe, reflecting higher street prices than those in the United States and shifting consumer demand patterns toward this particular narcotic (and derivates, such as crack). The majority of the Colombian cocaine that is trafficked to Europe, either directly or via West Africa, is exported from Venezuela. In addition to cocaine, Colombia also represents a relatively important source for North America opiates, historically accounting for around half of the white heroin consumed east of the Mississippi. Although there has been a marked decline in opium-production levels in the past several years —largely due to successful poppy-eradication efforts — shipments still take place, with the main trafficking route running up the eastern Pacific to Mexico.

Details: Santa Monica, CA: RAND, 2011. 113p.

Source: Internet Resource: Accessed June 27, 2011 at: http://www.rand.org/pubs/monographs/2011/RAND_MG1076.pdf

Year: 2011

Country: International

Keywords: Cocaine

Shelf Number: 121868


Author: Open Society Foundations, International Harm Reduction Development Program

Title: Treated With Cruelty: Abuses in the Name of Drug Rehabilitation

Summary: More and more people who use drugs each year are locked away in the name of drug rehabilitation without any real access to medical care or legal recourse. Drug users rarely enter such detention centers voluntarily, and even if they do, they nearly never are allowed to leave at their will. Detention centers rely on physical abuse, shackles, solitary confinement, and other indignities to “treat†drug addiction and extract labor from the detainees. Moreover, they are often overseen by government authorities, with private business exploiting the forced labor inside. Not surprisingly, the vast majority of people quickly return to drug use once they are released from these centers. Treated with Cruelty: Abuses in the Name of Rehabilitation provides first-person testimonies of drug users who have been detained in such centers located in China, Cambodia, Mexico, and Russia. Tied to these harrowing stories are human rights commentaries, which offer an in-depth review of the international standards in health and human rights that are being denied to the men and women who are locked away.

Details: New York: Soros Society Foundations, 2011. 44p.

Source: Internet Resource: Accessed June 28, 2011 at: http://www.soros.org/initiatives/health/focus/ihrd/articles_publications/publications/treated-with-cruelty-20110624

Year: 2011

Country: International

Keywords: Detention

Shelf Number: 121870


Author: Elliott, Richard

Title: Treatment or Torture? Applying International Human Rights Standards to Drug Detention Centers

Summary: More and more people who use drugs each year are locked away in the name of drug rehabilitation without any real access to medical care or legal recourse. Drug users rarely enter such detention centers voluntarily, and even if they do, they nearly never are allowed to leave at their will. Detention centers rely on physical abuse, shackles, solitary confinement, and other indignities to “treat†drug addiction and extract labor from the detainees. Moreover, they are often overseen by government authorities, with private business exploiting the forced labor inside. Not surprisingly, the vast majority of people quickly return to drug use once they are released from these centers. Treatment or Torture? Applying International Human Rights Standards to Drug Detention Centers makes the case that abuses in these facilities constitute torture or cruel, degrading, and inhuman treatment. This comprehensive analysis relies on frameworks to suggest governments must take action to close these facilities or risk not meeting their international obligations. It will prove invaluable to anyone bringing cases of torture in drug detention to international, regional, or domestic bodies charged with preventing or prosecuting torture.

Details: New York: Open Society Foundations, 2011. 72p.

Source: Internet Resource: Accessed June 28, 2011 at: http://www.soros.org/initiatives/health/focus/ihrd/articles_publications/publications/treatment-or-torture-20110624/treatment-or-torture-20110624.pdf

Year: 2011

Country: International

Keywords: Detention

Shelf Number: 121871


Author: Organization for Economic Co-operation and Development (OECD)

Title: Preventing and Reducing Armed Violence in Urban Areas: Programming Note

Summary: Approximately 740 000 people die as a result of armed violence each year. Armed violence erodes governance and peace whilst slowing down achievement of the Millennium Development Goals (MDG ’s). It can have as significant an effect on security and development in settings of chronic violent crime and inter-personal violence as it can in societies affected by war or civil conflict. An armed violence agenda therefore includes a wide range of countries, cities and citizens whose development and security are under threat. It refers to the use or threatened use of weapons to inflict injury, death or psychosocial harm. To help desk officers and conflict/fragility experts who are working to tackle the problem of armed violence, OECD Development Assistance Committee (DAC ) members have requested three Armed Violence Reduction (AVR) Programming Notes to build on the OECD DAC policy paper on Armed Violence Reduction: Enabling Development (OECD , 2009). The three notes cover: • Armed violence in urban areas: The majority of the world’s population now lives in urban centres. As economic transformations accelerate rural-urban migration, the rural poor are being converted into an urban poor who populate mega-slums on the periphery of major urban centres. More and more of these areas are afflicted by high levels of armed violence. • Youth and armed violence: The largest-ever generation of young people is now entering adulthood. Almost half of the world’s population is under the age of 24 and the vast majority of 10-24 year olds live in less developed countries. Youth are particularly at risk of being exposed to and engaging in, armed violence and crime. • AVR and Security System Reform (SSR ): AVR and SSR have similar objectives and are mutually reinforcing. But they also have their distinct methods, entry points and comparative advantages. It is important to understand the linkages between the two approaches in order to maximise the impact of public safety and security interventions. To ensure an effective response to armed violence, the programming notes use an armed violence “lensâ€, which was developed in Armed Violence Reduction: Enabling Development. The lens helps practitioners consider the key elements shaping armed violence patterns. These include the people affected by armed violence, the perpetrators and their motivations, the availability of instruments (arms) and the wider institutional/cultural environment that enables and/or protects against armed violence. The lens highlights risk factors associated with armed violence and their vertical linkages from the local to the global level. It encourages practitioners to think outside specific sector mandates and provides practical entry points for AVR programming. Armed violence prevention and reduction are feasible but require significant leadership by affected states and investment of financial resources by donors. They also require the ability to engage with non-state and subnational actors. Finally, evidence suggests that effective interventions need a good evidence base, participatory assessments and the simultaneous engagement in multiple sectors (reflecting the broad range of interrelated issues and actors involved), at multiple levels (local, national, regional and global) and over a longer time horizon.

Details: Paris: OECD Publishing, 2011. 61p.

Source: Internet Resource: Conflict and Fragility Series: Accessed June 28, 2011 at: http://www.oecd.org/dataoecd/18/11/47942084.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 121873


Author: Mannava, Priya

Title: Dependent on Development: The Interrelationships Between Illicit Drugs and Socioeconomic Development

Summary: In spite of the complex interrelationships between illicit drug production, trade and use and socioeconomic development (SED), drug control and development policies tend to occur in isolation of each other, as exemplified by the lack of inclusion of illicit drugs in the Millennium Development Goals. A failure to acknowledge the interconnections between these two areas hinders the effectiveness of both drug and development policies and also undermines a human rights based approach to both illicit drug policy and development policies and programs. 1.1 Aims of the report This report highlights the multifaceted relationships between illicit drug production, trade and use, and SED, and then demonstrates the ways in which the implementation of illicit drug control policies often hinders development sector gains; and furthermore, the ways in which many development sector policies actually increase vulnerability to illicit drug production, trade and use. By raising awareness on the links between drugs, drug policy, and SED, this paper aims to facilitate future research as well as initiate dialogue and collaboration between development and drug control agencies. 1.2 Approach & Terminology The report is based on the hypothesis that ‘Equitable SED is necessary for successful control of illicit drugs, while effective and human rights based illicit drug control is required to foster sustainable SED’. To test this hypothesis, we begin by examining the impact of SED on illicit drug production, trade, and consumption, and then conversely the affect of the three processes on SED. In so doing, we consider ‘illicit drug production/trade/consumption’ and ‘SED’ as independent variables, and expect that outcomes will hold true for diverse settings at various times and for different drugs. We also note that we are exploring associations rather than causality, expecting that there will be limited, and largely anecdotal, evidence available – at least these early formative research stages. Here, we define ‘socioeconomic development’ as the processes of social and economic development in a society, whereby the ‘socio-’ in socioeconomic development consists of “social change designed to promote the well-being of a population as a whole†(Midgley 2005) while the ‘economic’ refers to “qualitative change and restructuring in a country’s economy in connection with technological and social progress†(World Bank definition). ‘Control’ is referred to here as the processes undertaken in order to minimize the harms associated with the availability and use of drugs in a community at a given point of time. In line with the United Nations Office for Drugs and Crime, ‘illicit drugs’ are defined as drugs produced, traded, and consumed for purposes prohibited by law, as outlined by the international drug control conventions. 1.3 Methods We conducted a review of formal and non-formal English language literature published between 1990 and 2010 on the relationships between illicit drug production, trade, and consumption, illicit drug policies, SED, and human rights. 2. Sizing the problem: illicit drugs – an overview 2.1 The need to control Policies and programs that aim to control or eradicate illicit drugs have been justified by the real and potential harms associated with illicit drugs: health problems, crime, decreased productivity, unemployment, and poverty. An international drug control system, based on three international conventions, specifies the types of illicit drugs and how these should be regulated. Despite control efforts, supply and demand of illicit drugs continue to be widespread. 2.2 The extent of illicit drug use, production, and trading. Noting the difficulties in measuring indicators related to illicit drugs, it is estimated that around 3.5% to 5.7% of the world’s populations aged between 15 to 64 years (155 to 250 million) consumes illicit drugs. Consumption continues to be higher in the wealthier regions of North America, Western Europe, and Oceania, though sharp rises in use are being witnessed in East and West Africa, the Middle East, and South America. Production of opium, which increased by 80% between 1998 and 2009, is highest in Afghanistan, which accounted for 60% of the world’s supply during the same period. Supply of cocaine, largely produced in Bolivia, Colombia, and Peru, was reported to have increased during the period of 2004 to 2007 as compared to earlier years, though the increase was not as dramatic as that of opium. Production of cannabis, the most widely produced illicit drug globally, and amphetamine-type stimulants (ATS) is prevalent in countries world-over. The illicit drug trade is also widespread, though data on seizures suggest the problem is more acute in those surrounding nations where illicit drug production or consumption is high. 2.3 Understanding demand and supply Demand and supply of illicit drugs are influenced by many interrelated and complex factors. Various intrapersonal, micro-environmental, and macro-environmental elements create vulnerabilities to the use of illicit drugs, while the employment opportunities and profits arising from illicit drug production and trading act as incentives to supply. There are thus broader socioeconomic issues which impact on engagement with illicit drug economies. 3. The interrelationships between socioeconomic development and illicit drugs 3.1 Impact of socioeconomic development on illicit drugs Both poor SED and enhanced SED can fuel illicit drug production, trade and consumption. Rural underdevelopment, conflict and economic crises are all factors that contribute to farming of illicit drug crops. Characteristics of plant-based illicit drugs mean that these crops are often a more viable option than licit ones in settings of poor SED. In countries ranging from Afghanistan to Colombia, to Morocco and Myanmar, evidence suggests that regions cultivating illicit drug crops are geographically and/or socially isolated, underdeveloped with few economic opportunities, and may also be plagued by violent conflict. Conflict, and the resultant instability, not only helps to facilitate and proliferate illicit drug economies, but in turn, often sustains the conflict – creating a mutually reinforcing cycle. In countries such as Afghanistan, Colombia, and Myanmar, rebel and pro-government forces have used illicit drug economies to finance their activities. Conditions which contribute to weak SED such as unemployment, poverty, and marginalization may also create vulnerable environments for illicit drug use in both wealthy and less developed countries. For example, in the United States and United Kingdom, illicit drug use has been linked to socially and economically deprived urban settings. Similarly, studies in various countries of South America found that drug users were generally poorer, unemployed, and less educated. On the flip side, processes such as trade liberalization may in fact facilitate the flow of illicit drugs across borders. Though the type of association that exists between free trade and illicit drugs is yet to be understood, a modeling study suggests that in consuming countries, efforts to control trading may be hindered by free-trade policies. Modernization and the resultant change in values or norms that often accompanies SED may also lead to increased consumption of illicit drugs. In Indonesia and Pakistan, for instance, illicit drug use increased with newfound wealth and youth identifying themselves with images of Western popular culture. Within the socially marginalized Akha tribe in Laos, consumption of heroin and ATS increased following participation in the country’s market economy and in parallel with the country’s opium eradication program. 3.2. Impact of illicit drugs on socioeconomic development Simultaneously, illicit drug production, trade and consumption also affect SED. In the short-term, farmers and other members of impoverished communities benefit from illicit drug production and trade due to increased disposable income. At the national level, there may be a boost in the Gross Domestic Product (GDP), reduced unemployment, and multiplier effects in other sectors, either due to increased expenditure in local markets or increased demand for production inputs of illicit drugs. For instance, a study dating back to the early 1990s found that a 10% increase in cocaine production in Bolivia resulted in a 2% increase in GDP and 6% decrease in unemployment. In Colombia, multiplier effects arising from the illicit drug economy helped to fuel growth in the property market. However, most of these short-term benefits are offset by the myriad of long-term adverse affects triggered by illicit drug economies. Firstly, the sheer volumes of money flowing from illicit drug economies help to encourage corruption. In several settings, there are reports of government and law enforcement officials turning a blind eye to illicit drugs in exchange for bribes. Secondly, social structures are disrupted as carers, such as single mothers or the income earner of the family, engage in risky trading of illicit drugs. As members of communities who participate in drug economies become richer, tensions in traditional power dynamics are created, thereby disrupting social harmony. Macroeconomic instability may also occur as a result of decreased investment in licit sectors, strengthening of the real exchange rate, and weakened effectiveness of monetary and fiscal policies. The evidence to support these findings, however, is more limited. Violence and conflict between drug gangs, as well as between gangs and members of law enforcement, causes substantial mortality and morbidity while also isolating communities. In Mexico for example, drug-related killings have reached 28,000 over the past four years. In the United States, homicide rates have fluctuated in tandem with crack cocaine markets in cities where consumption is high and market sizes are substantial. There are considerable health costs associated with illicit drug use; for example, injecting drug use accounts for 10% of all HIV infections worldwide, and 30% outside sub-Saharan Africa. Drug users are also likely to be less productive; a study by the International Labor Organization (ILO) in 5 different countries found that occupational injuries were 2-4 times higher and absenteeism 2-3 times greater amongst drug users as compared to non-drug users. The relationships between illicit drug economies and SED are thus two-way and simultaneous. Causality is more difficult to determine given that illicit drug economies and factors that contribute to SED can interact in a mutually reinforcing cycle. Corruption, violence and conflict can for example facilitate illicit drug production, trade and consumption, which in turn can sustain corruption, violence and conflict. 4. Paradox on paradox: effects of illicit drug control policy on socioeconomic development International and national illicit drug control policies have traditionally focused on reducing demand and supply of illicit drugs. Policies that focus on minimizing the harms associated with drug use are increasingly being adopted by many nation states. Supply side policies comprise traditional law enforcement approaches, including attempts to eradicate illicit drug cultivation and production; this latter approach sometimes accompanied by ‘alternative development’ programs that focus on providing other economic opportunities to communities that farm illicit drugs. To date, evidence suggests that these policies have been largely ineffective in deterring cultivation of illicit drug crops, as supply of various drugs has either been maintained or increased. In response to eradication programs in Colombia and Mexico, for instance, farmers simply shifted to farming opium on smaller and more dispersed fields. These policies have largely been unsuccessful in part because of the weak acknowledgement of the fact that illicit drugs and associated harms are often a result of a broader range of political, cultural and socioeconomic factors. By adopting approaches that are guided by narrowly defined goals and are not based on the political, social or cultural realties of a particular development context, law enforcement and eradication attempts actually cause further, multiple, harms and thereby weaken SED in communities. Examples from coca-producing Andean countries, as well as from Afghanistan and Myanmar where opium poppy cultivation is widespread, show how law enforcement and eradication programs actually wipe out the livelihoods of poor farmers social and economically disadvantaged communities. With few viable economic opportunities available, these households often resort again to farming of illicit drugs, simply from survival necessity. Successful alternative development programs are rare, although in Thailand a long-term (highly subsidized) approach has met with some success. Interdiction – programs aimed at reducing or stopping trading – has contributed to a diversification of smuggling routes, often to countries where law enforcement is weak. For example, the low-income country of Guinea Bissau has become a new trading corridor for drugs being smuggled to Europe. Ironically, a systematic review that found a positive correlation existed between increased law enforcement and increases in violence and crime. This is explained in part by the fact that law enforcement activities can create a riskier environment in which illicit drug trading and dealing occurs, making the situation more volatile and prone to drug gang power dynamics when members or leaders are arrested. There is even less evidence available on the impacts of demand side policies, which include primary prevention of drug use (mass media campaigns, community based programs, and education), treatment (secondary prevention), and law enforcement. While studies on the effectiveness of treatment for drug users have found that it helps reduce crime and risky injecting behavior, stringent law enforcement practices directed against drug users have only served to increase risky behavior, shift patterns in drug use, and deter health seeking. Studies examining the impact of law enforcement on drug use in Vancouver and Sydney found that drug use did not decrease, but riskier forms of use did. Following a ‘war on drugs’ campaign in Thailand, drug users reported increased reluctance to seek healthcare. Thus, social and economic costs to society are only sustained or even intensified, and are therefore likely to negatively impact SED. Harm reduction (policies and programs aimed at reducing harms associated with drug use) encompasses many components in immediate impact, harm reduction as currently defined is cost effective and has positive impacts on social development. There is a need for harm reduction approaches to be further developed and integrated, and be more broadly defined so they can have more impact across the range of drug issues. Studies suggest that benefits include: reduced risky drug use behavior, decreased transmission of HIV, safer disposal of injecting equipment, and less public nuisance. These findings indicate that social and health costs to societies may thus be reduced, thereby helping to enhance SED. 5. The forgotten victim: human rights Not only do some illicit drug policies have potential negative impacts on SED, but they also lead to violation of human rights. Eliminating families’ main source of income without creating viable alternatives robs them of their livelihood and dignity. Harsh law enforcement and militaristic approaches to controlling supply and demand of illicit drugs have had serious human rights implications, with physical abuse, sexual assault, public humiliation, denial of legal representation, and mortality being reported in the name of law enforcement. Moreover, in many countries, drug users are forced to undergo ‘treatment’ which is not evidenced-based. Stringent drug laws have often been used as an excuse to discriminate against poor and marginalized groups of society, especially ethnic minorities. Worldwide, drug users continue to be discriminated against, and are denied treatment and other social rights on the basis of their consumption of drugs. 6. Conclusions The interrelationships between illicit drug economies and SED are real and complex. Factors linked to SED may lead to or deter engagement with illicit drugs, while illicit drug economies negatively impact on SED in the long-term, despite possible shortterm benefits. By not acknowledging these linkages, illicit drug policies which focus solely on reducing demand and supply through law enforcement or forceful measures have often had consequences that adversely impact on SED, and also violate human rights – causing more harm than the drugs themselves. Thus, our original hypothesis that illicit drug policies are development policies are interdependent holds true based on the evidence available. The limitations of our review must be recognized. Our findings are based on limited evidence, which includes very few quantitative and detailed studies on the interrelationships, as well as a lack of rigorous evaluations of drug control programs. Our expectation of limited data availability was therefore also validated. In addition, there are inherent issues with determining impact of and on SED, and in this study we have assumed impact based on anecdotal and qualitative information rather than modeling or quantitative analyses. Having said this, our review substantiates the need for greater collaboration between illicit drug control and development agencies. It is imperative for development agencies and governments of developing and transitional countries to investigate and account for the impact of development on vulnerabilities to drug production, trade, and use. All aspects of development, ranging from infrastructure projects to education programs, especially if donor funded, must consider implications for illicit drug production, trade, and use, as is currently done with respect to poverty, the environment or gender dynamics. At the same time, current illicit drug policies need review in light of their inequitable and damaging effects in relation to social development. While acknowledgement of the link between both fields has been increasing, further research in the area will help to provide a stronger base for advocacy to ensure that theory is translated into practice.

Details:

Source: Internet Resource: Accessed June 28, 2011 at: http://www.countthecosts.org/sites/default/files/Dependent-on-Development.pdf

Year: 0

Country: International

Keywords: Drug Control Policies

Shelf Number: 121880


Author: Global Commission on Drug Policy

Title: War On Drugs: Report of the Global Commission on Drug Policy

Summary: The global war on drugs has failed. When the United Nations Single Convention on Narcotic Drugs came into being 50 years ago, and when President Nixon launched the US government’s war on drugs 40 years ago, policymakers believed that harsh law enforcement action against those involved in drug production, distribution and use would lead to an ever-diminishing market in controlled drugs such as heroin, cocaine and cannabis, and the eventual achievement of a ‘drug free world’. In practice, the global scale of illegal drug markets – largely controlled by organized crime – has grown dramatically over this period. While accurate estimates of global consumption across the entire 50-year period are not available, an analysis of the last 10 years alone shows a large and growing market. In spite of the increasing evidence that current policies are not achieving their objectives, most policymaking bodies at the national and international level have tended to avoid open scrutiny or debate on alternatives. This lack of leadership on drug policy has prompted the establishment of our Commission, and leads us to our view that the time is now right for a serious, comprehensive and wide-ranging review of strategies to respond to the drug phenomenon. The starting point for this review is the recognition of the global drug problem as a set of interlinked health and social challenges to be managed, rather than a war to be won. Commission members have agreed on four core principles that should guide national and international drug policies and strategies, and have made eleven recommendations for action. The Commission’s recommendations include: ◠End the criminalization, marginalization and stigmatization of people who use drugs but who do no harm to others. ◠Encourage experimentation by governments with models of legal regulation of drugs (especially cannabis) to undermine the power of organized crime and safeguard the health and security of their citizens. ◠Ensure that a variety of treatment modalities are available – including not just methadone and buprenorphine treatment but also the heroin-assisted treatment programs that have proven successful in many European countries and Canada. ◠Apply human rights and harm reduction principles and policies both to people who use drugs as well as those involved in the lower ends of illegal drug markets such as farmers, couriers and petty sellers.

Details: Rio de Janeiro: Global Commission on Drug Policy, 2011. 20p.

Source: Internet Resource: Accessed June 28, 2011 at: http://www.globalcommissionondrugs.org/Report

Year: 2011

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 121881


Author: Decker, Klaus

Title: Improving the Performance of Justice Institutions: Recent Experiences from Selected OECD Countries Relevant for Latin America

Summary: Justice sector institutions across the world face the challenge of delivering better services to those seeking justice. The courts in a number of member countries of the Organization for Economic Cooperation and Development (OECD) have undergone large scale reform programs incorporating both performance-based approaches of New Public Management (NPM), as well as private sector practices. Terms such as client satisfaction, cost-benefit analysis, total quality management and performance evaluation, which originated in the private sector, are now increasingly applied to justice institutions in more advanced OECD countries-- and other countries beginning to follow suit. For almost two decades, justice authorities in OECD countries have been trying to improve the performance of their courts. Some have had more success than others. The wealth of experience that has been generated about how (and how not) to approach court performance can be shared with others for cross-country learning. In recent years, the focus of reforms has increasingly shifted from approaches focusing on narrow quantitative efficiency to those focusing on managing quality. Radical changes have also taken place in the organizational cultures of justice institutions in order to steer them towards providing better services for the citizens and society as a whole. Justice reformers in Latin America should not be surprised to find that some OECD countries are still struggling to respond to the same issues they face. Justice institutions generally have a complex setup in which the dysfunctions of a single agency can generate externalities that quickly impact the performance of other agencies, with the latter having little or no ability to correct those externalities. However, in designing their own solutions, Latin American reformers may find the experience of OECD countries which are facing similar challenges to be a useful reference. In the same way that legal reforms cannot simply be transplanted from one country into another, any lessons learned from OECD countries should be carefully adapted to the particularities of Latin American justice institutions which have a different history and reflect different social and economic contexts. Perhaps the most important lessons to be learned from OECD countries are those that may help avoid generating unmanageable expectations or raising the bar too high. This paper presents a selection of experiences from OECD countries in managing justice institutions which are the most relevant for performance improvement of their counterparts in Latin America. The scope of the paper is mostly limited to the courts, but comprises all types of courts: specialized courts as well as courts of general jurisdiction, civil as well as criminal and administrative courts, first instance as well as appellate and supreme courts. Issues of legal reform, judicial training, alternative dispute resolution or access for the poor are not considered in this paper.

Details: Washington, DC: The World Bank, 2011. 146p.

Source: Internet Resource: Accessed June 29, 2011 at: http://siteresources.worldbank.org/INTECA/Resources/librojusticiaING-cian.pdf

Year: 2011

Country: International

Keywords: Court Reform (Europe and Latin America)

Shelf Number: 121950


Author: Birk, Moritz

Title: Pretrial Detention and Torture: Why Pretrial Detainees Face the Greatest Risk

Summary: Torture and other ill-treatment are not aberrations; they are common — even routine in many detention facilities around the world. And while it is often assumed that torture victims are likely to be political prisoners or suspected terrorists, most victims are ordinary people accused of ordinary crimes. In fact, it is pretrial detainees — people who have not been tried or found guilty — who are most at risk of torture. Pretrial Detention and Torture: Why Pretrial Detainees Are Most at Risk looks at the practice of torture in pretrial detention, the systemic factors that leave pretrial detainees so vulnerable, and the safeguards that are needed to prevent this abhorrent practice. By combining policy analysis, first-hand accounts, and recommendations for reform, the report shows why pretrial detainees are so at risk of torture and what can be done to stop it. It argues that torture can be deterred by steps including: holding perpetrators accountable; by refusing to admit evidence gained through torture; by allowing prisoners early access to legal counsel; and providing for independent oversight of detention facilities.

Details: New York: Open Society Foundations, 2011. 64p.

Source: Internet Resource: Accessed June 30, 2011 at: http://www.soros.org/initiatives/justice/focus/criminal_justice/articles_publications/publications/pretrial-detention-and-torture-20110624/pretrial-detention-and-torture-06222011.pdf

Year: 2011

Country: International

Keywords: Pretrial Detention

Shelf Number: 121927


Author: United Nations Office on Drugs and Crime

Title: Criteria for the Design and Evaluation of Juvenile Justice Reform Programmes

Summary: Evidence-based programming requires that programme outcomes be monitored and evaluated in order to determine whether the programme’s objectives have been achieved. It also requires that evaluation findings be reviewed and integrated into future programming and that good practices and lessons learned through the conduct of previous programmes be identified and taken into account in designing future interventions. In order to carry out all those steps, sound measuring techniques and processes and clear criteria for measuring programme outcomes are required. The main objective of the present publication is to provide a conceptual framework for the design of juvenile justice reform programmes and a general approach for evaluating the impact of those programmes on children and their rights and on crime and public safety. This involves, initially, identifying the general criteria upon which to base such evaluations. The evaluations should make it possible to identify good practices that can be replicated at the national, regional or international level. The criteria must reflect the dual roles of juvenile justice reforms: to protect children and their rights and to protect society by preventing crime and repeat offending. The present publication is based on a review of evaluations conducted by member organizations of the Interagency Panel on Juvenile Justice and consultations with staff and representatives of Panel member agencies about their programme evaluation objectives and their past experience in attempting to evaluate juvenile justice programmes and identify good practices. Programming should be based on the good practices identified thus far and on lessons learned from past programming initiatives undertaken in various contexts. In identifying good practices, one must rely greatly on the findings of past evaluations. The object of the present exercise, of course, is also forward-looking, as it attempts to specify how Panel members can ensure that evaluations are more rigorous and that more useful information is collected in order to guide programming practices in the area of juvenile justice reform.

Details: Vienna: UNODC, 2011. 50p.

Source: Internet Resource: Accessed July 1, 2011 at: http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Criteria_E_book.pdf

Year: 2011

Country: International

Keywords: Evidence-Based Practices

Shelf Number: 121933


Author: Muhlhausen, David B.

Title: Terror Trends: 40 Years' Data on International and Domestic Terrorism

Summary: A decade after the 9/11 terrorist attacks, looking back is as important as looking forward in order to learn from the past and to examine the current and future threats facing the U.S. This survey aggregates international data on global and domestic terrorism from the past 40 years. Combined with new intelligence, this data can better inform U.S. counterterrorism decisions and continue the process of delineating enhanced homeland security policies for the future. From 1969 to 2009, almost 5,600 people lost their lives and more than 16,300 people suffered injuries due to international terrorism directed at the United States. The onus is now on the President and Congress to ensure that the U.S. continues to hone and sharpen its counterterrorism capabilities and adapt them to evolving 21st-century threats.

Details: Washington, DC: Heritage Foundation, 2011. 16p.

Source: Internet Resource: Accessed July 1, 2011 at: http://thf_media.s3.amazonaws.com/2011/pdf/sr0093.pdf

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 121937


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: The Protection of Children Online: Risks Faced by Children Online and Policies to Protect Them

Summary: An increasing number of children are now using the Internet. They are starting at a younger age, using a variety of devices and spending more time online. The Internet can be a major channel for their education, creativity and self-expression. However, it also carries a spectrum of risks to which children are more vulnerable than adults. Addressing risks faced by children online is becoming a policy priority for an increasing number of governments. This means facing many complex policy challenges: How to mitigate risks without reducing the opportunities and benefits for children online? How to prevent risks while preserving fundamental values for all Internet users, including the children themselves? How to ensure that policies are proportionate to the problem and do not unsettle the framework conditions that have enabled the Internet economy to flourish? Governments are not alone in their efforts to protect children online. Parents, caregivers, educators, business and civil society can also help children to benefit from the Internet. They too have a responsibility to protect them against risks online. Although some of these issues emerged in the early days of the World Wide Web, they have recently gained policy attention. At the Seoul Ministerial Meeting on the Future of the Internet Economy in June 2008, Ministers called for a collaborative effort by governments, the private sector, civil society and the Internet technical community to build a common understanding of the impact of the Internet on minors and to enhance their protection and support when using the Internet. They also called for increased cross-border co-operation by governments and enforcement authorities with respect to the protection of minors. This report focuses on online risks for children and policies to protect them as Internet users. It examines direct and indirect policy measures available to OECD member and non-member countries to help mitigate risks for children online in order to: • Present and compare existing and planned policy approaches for the protection of children online; • Explore how international co-operation can enhance the protection of minors on the Internet. Three broad categories of online risks for children are considered in this report: i) content and contact risks, including exposure to pornography, cybergrooming and cyberbullying; ii) consumer risks related, for example, to online marketing and fraudulent transactions; and iii) privacy and security risks, including the use of social networks without sufficient understanding of potential long-term consequences. Statistical data about children’s use of the Internet and the prevalence of risks are limited. The data are often fragmented and non-representative and offer few possibilities for comparing studies and countries. In particular, definitions of risks often differ, and survey methodologies vary significantly, making it difficult to compare risk prevalence rates. While the same spectrum of risks is present in all countries, the available data suggest that prevalence rates vary. Moreover, because children’s activities, skills and resilience differ, their interactions with the online environment and the consequences differ as well. While children’s capabilities are likely to increase with age, so can their own risky behavior. Online risks faced by children are many and evolving. Addressing them requires a blend of approaches that include legislative, self- and co-regulatory, technical, awareness and educational measures, as well as positive content provision and child safety zones. In practice, each country operates its own policy mix of characteristics and priorities, which reflects its perception of priorities as well as its culture and style of government. Moreover, policy measures that address different risks and initiatives from various stakeholders at different levels co-exist. This creates policy complexity at national level and policy heterogeneity across countries. Government policies to protect children online are in their infancy. To enhance their efficiency and catch up with the rapid adoption of the Internet by children, governments face three main challenges: • Managing policy complexity through enhanced policy co-ordination, consistency and coherence; • Adopting an evidence-based policy-making approach; • Taking advantage of international co-operation to improve the efficiency of national policy frameworks and foster capacity-building. For policy to protect children online to operate effectively as the sum of its parts, governments should enhance the coherence of their policy measures and tools in collaboration with all stakeholders. Public-private partnerships, for instance, have been a successful way to encourage self- and co-regulation. Policies to protect children online would benefit from efforts to ensure consistency with other important policy objectives, such as the preservation of fundamental rights and maintenance of the framework conditions which have enabled the Internet to become a global open platform for innovation, economic growth and social progress. With some notable exceptions, the impact of national policy frameworks and individual policy measures for the protection of children online is not regularly assessed and performance evaluations are only exceptionally built into policy. A systematic approach to evidence-based policy making is essential to determine policy priorities and maximise the protection afforded by national policy. The policy-making process would benefit from official statistics on children’s use of the Internet and the prevalence of risk. This would require a more consistent approach to definitions, methodologies and indicators. Impact assessments would help address conflicting policy objectives and place greater emphasis on the quantification of benefits and costs. International and regional co-operation is another area for improvement. While international and regional intergovernmental organisations (including, in addition to the OECD, the Asia-Pacific Economic Co-operation, the Council of Europe, the International Telecommunication Union, the Internet Governance Forum and the European Commission) are already involved, co-ordinated international work by governments and other stakeholders to protect children online would also support efforts by governments at national level. Successful international co-operation relies on the involvement of all relevant international stakeholders. The report provides examples of international co-operation at the policy and operational levels. These include international strategic partnerships, capacity building and joint events (e.g. Safer Internet Day) as well as the sharing of successful educational and awareness raising campaigns. However, the organisation of a regular joint international event on child protection online, with the participation of national and international players, would be an effective way to co-ordinate efforts and take advantage of potential synergies. It would offer a way to share best practices among governments, business and civil society, including the research community, with a view to making the lessons learned from field experience available to policy makers. It would also help bridge communities such as policy makers and practitioners in the area of Internet policy, education, development and capacity building, law enforcement, and statistics. Another avenue for international co-operation is the development of more comparable statistics to enable comparisons across countries and to help governments better assess the efficiency of their frameworks. OECD model surveys could, for example, include a module on children’s access to and use of the Internet and on risk prevalence. Significant work would be needed to harmonise age ranges and define risks to determine data collection methodologies (e.g. survey of parents and educators versus survey of children).

Details: Paris: OECD Publishing, 2011. 105p.

Source: Internet Resource: OECD Economy Papers, No. 179: Accessed July 5, 2011 at: http://www.oecd-ilibrary.org/docserver/download/fulltext/5kgcjf71pl28.pdf?expires=1309871644&id=id&accname=guest&checksum=2F467BD4A26D25F5DA1D104555EDFDC4

Year: 2011

Country: International

Keywords: Computer Crimes

Shelf Number: 121968


Author: Robertson, Oliver

Title: Children Imprisoned by Circumstance

Summary: Around the world children who have committed no crime live in prison. There with mothers accused or convicted of an offence, these children are too often ignored by prison systems and officials, with their needs and best interests unmet. The decision whether to allow a child to live in prison with her/his mother involves two unpalatable options: do you separate a child from her/his mother or have the child live in prison? But the issue is much broader than a single decision and the impact on the child is felt before, during and after the period of imprisonment. At all stages of the criminal justice process, from the point of arrest to the time of release and reintegration into the community, a woman may have children living with her. At all of these stages the needs and best interests of the children should be considered. The issue of children living in prison has many features, but in this paper the focus is primarily on the times before and after imprisonment: the situations in which children enter prison and the effect it has on them after they leave. Different children are affected differently. As well as living with a mother serving a custodial sentence, children may also stay with her while she is in police custody during the investigation or during a period of pre-trial detention. Some children move into prison from a home in the community, others are born during the mother’s imprisonment. When they leave, children either do so with their mother or before her. Some have spent time in the community before or during their time in prison; others have lived in prison their entire lives. Some children are detained with their mother prior to her trial, either when she is arrested and questioned or during a period of pre-trial detention. Conditions in pre-trial detention centres and police stations may be even more inappropriate than those in prison and they are less likely to include specialist child-friendly facilities. This is particularly significant in jurisdictions where people are held in pre-trial detention for months or even years and underlines the importance of ensuring that pre-trial detention is used only as a last resort. Caring responsibilities may mean that a suspect is less likely to abscond and should be taken into account when deciding whether pre-trial detention is needed. When a case comes to trial and a woman is found guilty, some courts take into account the impact of a sentence on any children. Women with children may be given a fixed sentence (in Kyrgyzstan first-time women offenders with children under 14 generally have their sentences suspended) or the sentence may vary depending on the best interests of the child (this is now required in South Africa, following a Constitutional Court judgement in 2007). However, if a mother is imprisoned, children may live in prison with her only in certain circumstances. If they are too old or have reached certain developmental stages (for example, have stopped breastfeeding) or if the prison does not have appropriate facilities to house them, children may be denied entry. In some countries children born during a mother’s imprisonment are allowed to stay with her, but children born before the imprisonment are not. This issue, of the restrictions on entry, is one where there is little consensus among States: some countries ban children of any age from living in prison; in others children can stay until they are four, five or six years old or even older. It is also an area with no acknowledged best practice – the conditions in which children live, the opportunities they have for development and the contact they have with the outside world all vary widely – and there has been very little long-term or comparative research which assesses the effects that different policies have on children’s future prospects. The entry of children into prison should be recorded in the same way as happens to prisoners, to prevent their becoming ‘lost’ or forgotten by the authorities. While they remain in prison, children, who have committed no crime, should not be subject to the same restrictions as prisoners. Their physical, emotional, social and/or intellectual development should not be damaged by living in prison. Support for children may include provision of nurseries or schools, visits outside the prison and/or contact with relatives living in the community. Acclimatising them to the world outside is important not only to promote their development, but also to prepare them for living in the community once they leave prison. There are reports of children being scared of aeroplanes, cars, trees or men when they are released because they have not encountered them before. When children do leave prison, they may do so with or without their mother. There is often a preference for mothers and children to leave together so as to avoid separating then reuniting them months or possibly weeks later. For this reason, rules about when children must leave prison frequently include some flexibility to allow them to stay longer than the official maximum if the mother herself is shortly to be released. When children leave before their mothers, they will be looked after by alternative carers. These are often other family members, but may include other members of the community or foster carers or being placed in institutional care. Meetings between the children, the mother and/or the new carers sometimes take place before and after the children’s release from prison to help them adjust to their new living situation. Many children, particularly those with no experience of life outside prison, may have difficulty integrating into the community. Many women in prison were poor to begin with and come out of prison poorer than they went in. They may have difficulty finding stable work and accommodation, which will obviously impact on any children with her. Ongoing post-release support should be provided to both mother and child, both for humanitarian reasons and to prevent future criminal behaviour on the part of either the mother or (in the future) the children. Moreso than many other issues, this is one where prevention really is better than cure. Due to the problems that occur by having children living in prison, officials should consider alternatives at every stage of the criminal justice process. Crime prevention strategies to support women in avoiding criminal behaviour altogether, diverting women away from formal judicial procedures by using measures such as restorative justice processes, avoiding pre-trial detention and imposing non-custodial sentences on woman with caring responsibilities: all of these should utilised to avoid the negative effects of parental imprisonment on children. Whether they live in prison or remain outside, the children of prisoners have committed no crime and should suffer for none. It is the responsibility of all involved in the criminal justice process to ensure that this is so.

Details: Geneva: Quaker United Nations Office, 2008. 54p.

Source: Internet Resource: Accessed July 5, 2011 at: http://www.quno.org/geneva/pdf/humanrights/women-in-prison/200804childrenImprisonedByCircumstance-English.pdf

Year: 2008

Country: International

Keywords: Children of Prisoners

Shelf Number: 110516


Author: United Nations. Department of Peacekeeping Operations and the Office of the High Commissioner for Human Rights

Title: United Nations Rule of Law Indicators - Implementation Guide and Project Tools

Summary: Building and strengthening the “rule of law†in developing nations, particularly countries in transition or emerging from a period of armed conflict, has become a central focus of the work of the United Nations. As a result, there is growing demand throughout the United Nations system to better understand the delivery of justice in conflict and post-conflict situations and the impact of developments in this area. The United Nations Department of Peacekeeping Operations (DPKO) and the Office of the United Nations High Commissioner for Human Rights (OHCHR), in cooperation with other United Nations departments, agencies, funds and programmes, have developed an instrument to monitor changes in the performance and fundamental characteristics of criminal justice institutions in conflict and post-conflict situations. The instrument consists of a set of indicators, the United Nations Rule of Law Indicators. This Guide describes how to implement this instrument and measure these indicators. The United Nations Rule of Law Indicators and this Guide are part of an emerging body of empirically based approaches to measuring the strengths and effectiveness of law enforcement, judicial and correctional institutions. The instrument, in contrast to some other measurement tools, is designed to highlight apparent successes and shortcomings within institutions and to monitor changes over time within countries. It is not meant to support direct comparisons between countries or rank them. The instrument refers, as it should, to all relevant international human rights and criminal justice norms and standards, but is not designed to assess compliance with such norms and standards. Nor is the instrument a substitute for a detailed assessment of the capacity or performance of criminal justice institutions, including for programmatic purposes. The instrument is to be implemented in collaboration with national Governments and potentially adopted by them as an ongoing monitoring mechanism. Participating countries will find this instrument very useful for monitoring their own progress in developing their criminal justice institutions and strengthening the rule of law. The instrument will also provide and summarize accurate information which the United Nations, donors and development partners will be able to use to plan and monitor the impact of their efforts to build the capacity of criminal justice institutions and, more generally, strengthen the rule of law. Additionally, the process of implementing the indicators will strengthen relationships between the United Nations and participating national Governments, relationships that are crucial to the Organization’s objectives of promoting peace and security in conflict and post-conflict situations and building sustainable criminal justice institutions that provide equal access to justice for all individuals. The Guide provides step-by-step instructions on how to implement the instrument, with United Nations support, in a conflict or post-conflict setting. It is meant for first-time users of the instrument who have a general knowledge of the United Nations system, previous experience working in such situations, a good knowledge of criminal justice institutions and a familiarity with social sciences research methods.

Details: New York: United Nations, 2011. 137p.

Source: Internet Resource: Accessed July 7, 2011 at: http://www.unrol.org/files/United%20Nations%20Rule%20of%20Law%20Indicators%20FINAL.pdf

Year: 2011

Country: International

Keywords: Criminal Justice Administration

Shelf Number: 121995


Author: Macklin, Anna

Title: Working With Indigenous Offenders To End Violence

Summary: Violence continues to be a significant challenge for Indigenous people in Australia and New Zealand. Treatment programs for violent adult offenders have the potential to contribute significantly to reducing violent reoffending. This research brief examines literature from Australia, New Zealand, Canada, the United States and the United Kingdom and reports on the effectiveness of programs aimed at reducing violent reoffending. It specifically reports on the evidence concerning the development of culturally specific violent offender programs. The brief is intended to contribute to Objective 2.4 of the Australian National Indigenous Law and Justice Framework, reducing Indigenous recidivism rates.

Details: Sydney: Indigenous Justice Clearinghouse, 2011. 8p.

Source: Internet Resoruce: Brief 11: Accessed July 7, 2011 at: http://www.indigenousjustice.gov.au/briefs/brief011.pdf

Year: 2011

Country: International

Keywords: Indigenous Peoples (Australia)

Shelf Number: 122001


Author: Eisenbach-Stangl, Irmgard

Title: The Vienna Drug Policy 1970 to 2005: External and Internal Views

Summary: In the 60s of the last century, the international drug policy changed substantially: its focus shifted from supply control to demand control. Demand control was conceived as addiction control, and addiction was understood in psychological terms to be a problem of the individual. Accordingly, the drug policy instruments were altered and expanded. On the one hand, the “repressive, socially excluding penal measures now also aimed at individual drug users; on the other hand, new measures were introduced: “Early diagnosis, treatment, information, after-treatment, and social re-integration†are, for the first time, mentioned as drug policy measures in the Single Convention of 1961. By introducing measures of “integration†or “assimilationâ€, drug matters became the responsibility of not only national policy authorities but also – and this was the novelty – of regional authorities that had so far been in charge of health, social welfare, and education in Austria like in most European countries. Whether the local policy became active in drug issues and in what ways it became active and how it cooperated with the policy at national level, varied regionally.

Details: Vienna: European Centre for Social Welfare Policy and Research, 2008. 9p.

Source: Internet Resource: Policy Brief: Accessed July 8, 2011 at: http://www.euro.centre.org/data/1219825741_32957.pdf

Year: 2008

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 122015


Author: Harris, Genevieve

Title: Conviction by Numbers: Threshold Quantities for Drug Policy

Summary: Threshold quantities (TQs) for drug law and policy are being experimented with across many jurisdictions. States seem attracted to their apparent simplicity and use them to determine, for example, whether: a possession or supply offence is made out (e.g. Greece); a matter should be diverted away from the criminal justice system (e.g. Portugal); or a case should fall within a certain sentencing range (e.g. UK). Looking at examples from the EU and beyond, however, it is becoming clear that there are no ‘magic numbers’ in drug policy and that this tool brings its own complications and pit-falls. This briefing will therefore seek to provide an overview of the current discussion around TQs and will explore the mechanism of TQs including their benefits and drawbacks as a policy and legal tool.

Details: Amsterdam: Transnational Institute, 2011. 12p.

Source: Internet Resource: Series on Legislative Reform of Drug Policies Nr. 14: Accessed July 11, 2011 at: http://www.druglawreform.info/images/stories/documents/dlr14.pdf

Year: 2011

Country: International

Keywords: Drug Abuse Policy

Shelf Number: 122022


Author: Northern Ireland Assembly. Research and Information Service

Title: Comparative Research into Sentencing Guidelines Mechanisms

Summary: The Hillsborough Agreement in 2010 contained a commitment to establish a sentencing guidelines council. Recently the Department of Justice (DOJ) published a consultation document “Consultation on a Sentencing Guidelines Mechanismâ€, which sets out three options for a sentencing guidelines body: an independent sentencing guidelines council with a statutory remit for producing guidelines; an independent sentencing advisory panel with a statutory remit to draft guidelines for approval of the Court of Appeal; and a judicial oversight committee known as a Sentencing Group to be established by the Lord Chief Justice. This paper provides information on comparative sentencing guidelines mechanisms in a number of jurisdictions including England and Wales, Scotland, Republic of Ireland, Australia, Canada, Minnesota, US (federal level), New Zealand (legislated for but not established), South Africa (proposed but not legislated for), Germany, France and the Netherlands. The paper examines a number of issues to be considered in establishing a guidelines body: the objectives of sentencing guidelines bodies, their functions, format of guidelines, membership and structure and relationships with other institutions and alternatives to sentencing guidelines bodies. Sentencing guidelines bodies in England and Wales and as legislated for in Scotland have similar objectives to those proposed for Northern Ireland. In some jurisdictions concerns have been raised about increases in prison population, including in England and Wales, New Zealand, South Africa and Minnesota. Therefore some bodies have objectives in relation to the management of prison resources. In England and Wales, the Sentencing Council must conduct must publish a resource assessment in respect of the guidelines to include information on the likely impact of the guidelines on prison places and contain information in its annual report on sentencing factors including an assessment by the Council on changes in sentencing practice likely to have an effect on prison resources. Sentencing bodies carry out a range of functions including: drafting guidelines, public education, information dissemination and resources functions. In England and Wales other functions include publishing resources assessment in respect of guidelines and monitoring the operation and effect of guidelines. Some bodies have functions beyond sentencing matters; for example bodies in Australia and New Zealand have functions relating to parole matters. Other bodies have functions in relation to the development of legislation and crime policy such as bodies in the United States. This paper outlines how the format of guidelines may differ. Guidelines in England and Wales are described as narrative in nature; legislation sets out how guidelines should be structured including: different categories of offence illustrating degrees of seriousness, factors including the offenders culpability and harm caused, the range of offences and starting points in the offence range. In contrast, the mechanism used in some of the United States models has been described as numerical. Minnesota operates a grid system includes two axes; one axis takes into account the seriousness of the offence and the other takes into account the offender‟s criminal record. The point where the seriousness of the offence and criminal history intersect determines the range of the offender‟s sentence. The numerical models have been criticised for impacting on judicial discretion. Sentencing guidelines bodies examined in this paper vary in membership, for example in size and in the composition of judicial and non judicial members. Some models such as the Sentencing Council in England and Wales have a greater number of judicial members. Scotland has legislated for a balance of judicial/non-judicial membership. Some sentencing bodies in Australia have no judicial representation. Furthermore some sentencing bodies in Australia and as proposed in New Zealand sentencing body have representatives with experience of working with particular groups, for example indigenous or ethnic minority groups. The DOJ proposes that members will be appointed for a fixed non renewable term. This is the same as the position in Scotland, however some models allow for a renewal of membership for example in the New Zealand and South Africa models. In its consultation document, the DOJ has proposed a secretariat to support a Northern Ireland body carry out its functions. Most of the bodies examined in this paper are supported by a secretariat with various support functions including legal expertise, research and analysis, community engagement and administration functions. The Scottish Government in its policy consultation paper outlined a relationship between the Scottish Sentencing Council and the Scottish Court Service in the provision of IT support. Consideration may need to be given to staff such as IT support services in a Northern Ireland model. The paper considers relationships between a sentencing guidelines mechanism and other institutions such as courts. The consultation document does not make reference to a relationship with the Northern Ireland Assembly but does set out a proposed relationship between the council and the Justice Minister. Some of models examined have relationships with their respective legislatures in approving or vetoing guidelines, for example in New Zealand and in Minnesota. Interestingly, the House of Commons Justice Select Committee has a role in the scrutiny of guidelines. An example of the scrutiny role is the holding of inquiries into draft sentencing guidelines. Some of the bodies have direct relationships with the courts. For example guidelines may have to be approved by courts or the courts may propose the drafting of guidelines. In Victoria the Court has to notify the sentencing advisory body when issuing a guidelines judgment. In the consultation document, the DOJ has highlighted that courts will be under a duty „to have regard to‟ sentencing guidelines and state reasons if a sentence differs from a guideline this was the previous position in England and Wales and is the current position in Scotland. Some models appear to have more robust “departure tests†such as in England and Wales where the courts must follow guidelines unless satisfied it is contrary to the interests of justice to do so. There are some jurisdictions that do not have sentencing guidelines. For example in some jurisdictions such as Germany, France, Netherlands and Canada, sentencing matters are set out in Penal or Criminal Codes or in Ireland where some offences in criminal law set out minimum sentences. It should be noted that in the Netherlands, the Penal Code does not impose limits on the type or severity of sanctions that can be imposed enabling judges to exercise discretion in sentencing matters. In Canada, the Criminal Code makes provision for principles and purposes of sentencing and establishes mandatory minimum sentences of imprisonment in a range of offences. It has been suggested that the Youth Criminal Justice Act (2002) in Canada goes some way to introducing sentencing guidelines into legislation as it contains a range of sentences that can be imposed on juveniles. In the Republic of Ireland, judges largely have discretion in sentencing matters, except for some offences which carry maximum and in some cases minimum penalties. Another approach is the use of sentencing information systems. The judiciary in the Republic of Ireland have developed a pilot project, the Irish Sentencing Information System (ISIS) is a website which provides information to judges on sentencing practices in criminal proceedings. The value of such systems has been noted with benefits including judicial sentencing authority, discretion and transparency. However in response to a recent discussion paper in the Republic of Ireland on the White Paper on crime, some concerns have been raised regarding the re-enforcement of questionable practices if used long term. The future of this mechanism is uncertain as the development of the website has resource implications and it has been acknowledged this will need to be considered in the current financial climate. The issue of sentencing guidelines has been the subject to consultation in recent white paper in which submissions favoured sentencing guidelines as a means to addressing perceived inconsistencies in sentencing practices. It remains to be seen whether a formal system of sentencing guidelines will be introduced.

Details: Belfast: Northern Ireland Assembly, 2011. 43p.

Source: Internet Resource: Accessed July 12, 2011 at: http://www.niassembly.gov.uk/researchandlibrary/2011/6611.pdf

Year: 2011

Country: International

Keywords: Judges

Shelf Number: 122031


Author: de Ville, Geraud

Title: Good Deal, Bad Deal. Report of the conference "Illegal Trade in Natural Resources - What Can Brussels Do?"

Summary: Natural resources are the backbone of the global economy. Many emerging economies are based on exporting natural resources to industrialised countries fuelling global markets in much needed raw materials. In accountable States, the income generated should be used to serve development needs, for example to finance the construction of infrastructures or programmes for poverty alleviation. However, governments sometimes lack the capacity or the legitimacy to regulate the exploitation of these assets. In these cases, natural resources can become a cause for corruption, social disputes and even violent conflicts. The problem is well known. In countries plagued by weak governance and in conflictâ€ridden countries, the governments are incapable of controlling domestic resources that are being exploited criminally. These illegally extracted resources are exported owing to illegal doings of corrupt businessmen, rebels and also state and military officials. Importing countries are a key link in this dark picture as they unintentionally provide the finances that reinforce bad elements in the system. Therefore greater attention should be dedicated to their role and responsibili:es. A central element in the Institute for Environmental Security’s “Pathfinder Programme†on new legal mechanisms to combat trade in illegally extracted natural resources was the organization of a stateâ€ofâ€theâ€art conference in Brussels. The idea was not to focus on one specific resource such as timber or minerals or on a specific region or country such as the DRC or Indonesia but to build bridges between practitioners and policy makers and try to understand what a regional power such as the European Union could do to help combat trade in illegally extracted natural resources.

Details: The Hague: Institute for Environmental Security, 2010. 54p.

Source: Internet Resource: Accessed July 12, 2011 at: http://www.envirosecurity.org/pathfinder/conference/Report_Final_med.pdf

Year: 2010

Country: International

Keywords: Illegal Trade

Shelf Number: 122038


Author: Collett, Elizabeth

Title: Emerging Transatlantic Security Dilemmas in Border Management

Summary: The sheer volume of global travel, which has risen exponentially since the 1960s, puts border management systems under constant pressure. Beyond that growth, border management systems have had to contend with additional risks associated with these movements. Mass-casualty terrorist attacks, rising illegal immigration, and human trafficking have exposed weaknesses in states’ ability to manage their borders effectively. This policy memo examines the infrastructure and policy developments – and challenges – that have occurred in recent years on both sides of the Atlantic, discussing the differing nature and prioritization of those policy challenges.

Details: Washington, DC: Migration Policy Institute, 2011. 11p.

Source: Internet Resource: Accessed July 12, 2011 at: http://www.migrationpolicy.org/pubs/securitydilemmas-2011.pdf

Year: 2011

Country: International

Keywords: Border Patrol

Shelf Number: 122040


Author: Bernard van Leer Foundation

Title: Hidden Violence: Protecting Young Children at Home

Summary: Violence against young children is often hidden from view when it takes place in the home and the family. Articles in this issue of ECM explore the need for good data on how many children are affected, and for better evidence about what works to tackle violence in the home; among the strategies discussed in this issue are programmes to strengthen families, engage fathers in the early years and challenge social norms. Contributions include an interview with Maud de Boer-Buquicchio on the Council of Europe's action plan; Professors Jack Shonkoff and Nathan Fox on the neuroscience of children's exposure to violence in the home; Marta Santos Pais, UN Special Representative on violence against children, discussing what legislation can do; Chris Mikton on the WHO's quest for evidence and UNICEF on their approach to violence in the home; and contributions from the Netherlands, Sweden, Brazil, Uganda and Peru among others.

Details: The Hague: Bernard van Leer Foundation, 2011. 80p.

Source: Internet Resource: Early Childhood Matters: Accessed July 14, 2011 at: http://www.bernardvanleer.org/Hidden-violence-Protecting-young-children-at-home

Year: 2011

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 122053


Author: Gagel, Andrew C.

Title: Patterns in Terrorism in North Africa, the Middle East, Central Asia and South Asia: 2007-2010

Summary: There are many definitions of terrorism and many ways to count it. The key, from a US policy viewpoint, is how the US government makes that count and what data it uses for measuring the threat and shaping its counterterrorism policies. With this in mind, the Burke Chair has compiled a set of tables showing terrorist attacks in North Africa, the Middle East, Central Asia, and South Asia from 2007-2010. All of these data come from the National Counter Terrorism Center’s (NCTC) World Wide Incidents Tracking System (WITS). While the NCTC tracks attacks by a number of different factors, the tables created below show the number of attacks, dead, wounded, and hostages broken down by country and then by terrorist groups acting within each country. Every group that the NCTC had as at least conducting a single, known attack in the time period has been included (even if the attack resulted in not a single death, wounded, or hostage taken). Attacks that were not claimed by or attributed to any particular group fall under the category “Unknown/Unclaimed.†It should be noted that such counts do not include low-level acts of terrorism like intimidation and extortion, which are often a critical part of the threat; nor do they attempt to measure the influence and control that terrorist and extremist groups have in given areas. The goal of such actors is not terrorism, per se, but the use of terrorism to achieve political and ideological control or influence. There also is no way to measure the error rate or uncertainty in such data. Many countries deliberately conceal the success of terrorist and extremist movements, and others count what the US sees as legitimate political protest as terrorism.

Details: Washington, DC: Center for Strategic and International Studies, 2011. 49p.

Source: Internet Resource: Accessed July 14, 2011 at: http://csis.org/files/publication/110629_MENA_Central_Asia_China_Terrorism_2007_2010.pdf

Year: 2011

Country: International

Keywords: Terrorism (Africa, Asia, Middle East)

Shelf Number: 122051


Author: Stiles, Margot L.

Title: Bait and Switch: How Seafood Fraud Hurts Our Oceans, Our Wallets and Our Health

Summary: Seafood is one of the most popular foods in the United States. Yet, consumers are routinely given little or no information about where and when seafood is harvested. Moreover, the information that is provided on seafood labels is frequently misleading or fraudulent. The government actively promotes the health benefits of dining on fish twice a week (USDA 2011) and global consumption is on the rise (FAO 2010). At the same time, overfishing continues to plague the world’s oceans, with more than three-quarters of fish stocks worldwide fully or overexploited. Partly in response to a decline in U.S. fisheries, most seafood eaten in the U.S. (84 percent) is imported, following an increasingly complex path from a fishing boat to our plates. Despite growing concern about where our food comes from, consumers are frequently served the wrong fish — a completely different species than the one they paid for. Recent studies have found that seafood may be mislabeled as often as 25 to 70 percent of the time for fish like red snapper, wild salmon, and Atlantic cod, disguising species that are less desirable, cheaper or more readily available. With about 1,700 different species of seafood from all over the world now available for sale in the U.S. (FDA 2009), it is unrealistic to expect the American consumer to be able to independently and accurately determine what fish is really being served. In the U.S., the consumer price index for seafood has risen more than 27 percent over the past ten years, remaining steadily higher than other foods and creating significant economic incentives for fraud and illegal fishing. Most seafood consumed in the U.S. is imported, yet only two percent is currently inspected. In addition to tracking systems, the U.S. needs to increase the frequency and scope of inspections to verify seafood’s safety and origin at each step along the way. Traceability requires recording comprehensive information about each fish as it moves through processing, packing and distribution. In order to prevent fraud, consumers need to know where seafood comes from and be able to trace it all the way back to the sea.

Details: Washington, DC: Oceana, 2011. 40p.

Source: Internet Resource: Accessed July 14, 2011 at: http://na.oceana.org/sites/default/files/reports/SeafoodFraudReport_2011.pdf

Year: 2011

Country: International

Keywords: Consumer Fraud (U.S.)

Shelf Number: 122055


Author: Van de Rakt, M.G.A.

Title: Two Generations of Crime: The Intergenerational Transmission of Criminal Convictions over the Life Course

Summary: Does criminal behavior of fathers lead to criminal behavior of their children? Do the children of offenders commit more crimes in the years after their fathers were convicted of a criminal act? What happens to the criminality of children when fathers are imprisoned? This study investigates one of the most important plausible causes of criminal behavior: the criminal behavior of the father. Previous research has shown the importance of fathers in predicting the criminal behavior of children. However, studies of the influence of fathers on children’s criminal behavior tend to focus on the parents as a preventative factor, mostly using the perspective of social control theory. This theory expects individuals to refrain from committing crimes so as not to jeopardize their relationship with their parents. Children’s strong attachment with their parents combined with the supervision parents provide explains the lack of delinquent behavior among children. In some cases, however, having a strong bond with one’s father could in fact lead to a higher chance of committing a criminal act. Research shows that the children of criminal fathers are much more likely to commit a crime themselves. Empirically the relationship between a father’s criminal behavior and criminal behavior of his children is well established. The larger part of this research, however, remains descriptive and focuses on cross-sectional relations between the criminal acts of fathers and those of their children. Rowe & Farrington (1997), for instance, reveal a correlation of 0.43 between the criminal convictions of children and their fathers. According to Thornberry et al. (2003), delinquent behavior of parents directly influences the delinquent behavior of children. Other studies show similar results. Nonetheless, the empirical studies done so far face substantial shortcomings. First, most studies use small samples and retrospective designs. Second, the studies do not analyze the influence of paternal criminal behavior after adolescence. Third, most studies focus on sons and neglect the influence of paternal criminality on daughters. Fourth, most studies lack a comparable control group. Finally, although explanations for the transmission of criminal behavior are suggested, the studies neglect to consistently test criminological theories. In this study, we investigate the intergenerational transmission of convictions. We improve on the drawbacks of previous studies in five ways. First, we use a large and prospective sample. Second, we investigate the influence of paternal offending on complete criminal life courses, from childhood until adulthood. This allows us to establish the intergenerational transmission of convictions well into maturity. Third, we investigate daughters as well as sons. Fourth, we analyze both criminal fathers and non-criminal fathers, as well as criminal children and non-criminal children. Finally, we explicitly deduce and test hypotheses from criminological theories. We first analyze the extent of the intergenerational transmission of criminal behavior by focusing on the relationship between the criminal convictions of fathers and the criminal convictions of their sons and daughters. Using a longitudinal, life-course perspective, we investigate development of the complete criminal careers of both parents and children. In doing so, we adopt a broad interpretation of intergenerational transmission, focusing on various aspects of paternal criminality. Specifically, we explore four aspects of intergenerational transmission: (1) the influence of the timing of criminal convictions of fathers, (2) the influence of parental divorce, (3) the influence of paternal imprisonment and (4) the influence of criminal convictions of mothers and siblings. Our data contains information on all recorded offences committed from age 12 onwards. We use only those cases that were followed by a conviction. Crime debates dominate public and political agendas, and societies are demanding better understanding of the causes and correlates of crime. Yet in order to make crime prevention programs more effective, knowledge is needed about the influences of paternal criminal behavior. The study presented in this thesis contributes to knowledge about the influences of the nuclear family on the development of criminal behavior. Our focus on the development of criminal careers over time provides insights into the causal order and the timing of influences of paternal criminal behavior. These insights could be helpful for policymakers in designing crime prevention programs.

Details: Nijmegen, The Netherlands: Radboud University, 2011. 207p.

Source: Internet Resource: Dissertation Radboud University Nijmegen, the Netherlands: Accessed July 14, 2011 at: http://repository.ubn.ru.nl/bitstream/2066/83192/1/dissertatie_marieke_14nov%20(2).pdf

Year: 2011

Country: International

Keywords: Criminal Behavior, Longitudinal Studies

Shelf Number: 122059


Author: Hamilton, Carolyn

Title: Administration Detention of Children: A Global Report

Summary: In 2009, the United Nations Children‘s Fund estimated that there were around 1.1 million children deprived of their liberty by criminal courts worldwide. While judicial detention of children by courts is relatively well documented, little is known about the practice of administrative detention of children. Few publications address the issue and States do not regularly collect or collate statistical data on administrative detention. As a result, information on the extent to which children are exposed to different forms of administrative detention is sparse and discussions of the impact that such detention has on children rare. Administrative detention occurs when, as a result of a decision of an executive or administrative body, a child is placed in any public or private setting from which he or she cannot leave at will. Administrative detention occurs in some form in all States, although the bodies that have power to order such detention vary from State to State. Bodies and individuals that have the power to administratively detain may include police officers, military panels, immigration officials, health officials, doctors or local government child welfare bodies. While decisions taken to administratively detain a child may vary in terms of context, rationale and legal framework, the common element is that the decision to detain is taken not by a judge or a court, but by a body or a professional, who is not independent from the executive branch of government. The purpose of this study is to examine:  What is meant by administrative detention.  The extent to which administrative detention is used worldwide.  The contexts and circumstances in which children are placed in administrative detention, and the profile of children held in administrative detention.  The legal frameworks and procedures used by States to place children in administrative detention.  The key provisions in international human rights law, including Article 3 of the Universal Declaration of Human Rights (UDHR), Article 9 of the International Covenant on Civil and Political Rights (ICCPR) and Article 37 of the United Nations Convention on the Rights of the Child (CRC), which limit the use of administrative detention.  The impact of administrative detention on children, including the conditions of detention and child rights implications.

Details: New York: United Nations Children's Fund, Child Protection Section, 2011. 343p.

Source: Internet Resource: Accessed July 15, 2011 at: http://www.unicef.org/protection/files/Administrative_detention_discussion_paper_April2011.pdf

Year: 2011

Country: International

Keywords: Administrative Detention, Juveniles

Shelf Number: 122068


Author: United Nations Office on Drugs and Crime, Studies and Threat Analysis Section

Title: The Transatlantic Cocaine Market

Summary: Key Findings of this report include: Global demand for cocaine has shifted. Demand in the United States was more than four times as high as in Europe in 1998, but just over a decade later, the volume and value of the West and Central European cocaine market (US$33 billion) is approaching parity with that of the US (US$37 billion). Two thirds of European cocaine users live in just three countries: the United Kingdom, Spain and Italy. With Germany and France, these countries represent 80% of European cocaine consumption.  European cocaine seizures increased rapidly between 1998 and 2006, peaking at some 121 tons. They have dropped off sharply since then, to some 53 tons in 2009, while at most, European demand has stabilized. There have been increases in seizures in South America, but the price of pure cocaine has not increased greatly in Europe, suggesting that traffickers have found new ways of evading law enforcement.  In the last decade, most (about 60%) of the cocaine seized was taken at sea or in ports. The Bolivarian Republic of Venezuela was the most prominent country of origin for direct cocaine shipments to Europe, with the cocaine coming mainly from Colombia.  It appears that most of Europe’s cocaine enters by sea, primarily via Spain. Nearly half the cocaine seized in Europe was taken by Spanish authorities, two-thirds of which was detected in international waters and 11% in containers.  Excluding what is imported for local consumption, it is estimated that about 21 tons of cocaine were trafficked from West Africa to Europe in 2009. This is down sharply from two years before, when the total could have been as high as 47 tons.  Much of the trafficking to West Africa used to be carried out by large ‘mother ships’ that unloaded the drugs on to smaller, local vessels off the West African coasts. Today, large maritime shipments have virtually disappeared, suggesting that traffickers have changed their tactics. There is evidence of shipments in large commercial aircraft purchased second-hand by traffickers for this purpose. There are also indications that containerized shipping is being utilized, but very few of these shipments have been detected.  Most of the recently reported seizures of cocaine from container consignments from South America to West Africa had Nigeria or Ghana as their destination. Most of these containers originated in Peru or the Plurinational State of Bolivia.  Commercial air flights used to be the most common vector for trafficking cocaine from West Africa to West and Central Europe (97% of seizure cases over the last decade, or 58% of all cocaine seized). But the number of detections have declined drastically in recent years, suggesting again that traffickers have changed their tactics.  There appears to be some trafficking of cocaine from West Africa to Europe across the Sahara to countries in northern Africa, although very few seizures have been made. There is some evidence of use of the traditional cannabis resin trafficking routes from Morocco to Spain.  Although it appears that Colombian organized crime groups still dominate trafficking of cocaine to Europe, domestic markets are often in the hands of traffickers of other nationalities.  In addition to the health consequences of cocaine use, the impact of cocaine trafficking includes drug-funded violence, political instability and corruption in many areas.  In line with the principle of shared responsibility and a balanced approach to the drug problem, the expansion of the cocaine market across the Atlantic and, more recently, in South America, highlights the importance of developing strategies on the scale of the cocaine threat. Efforts must be increasingly coordinated and integrated into an international approach that adapts to new developments as quickly as the traffickers. There are many reasons to be optimistic about the capacity of the international community to achieve a significant reduction of the global cocaine market during the present decade.

Details: Vienna: UNODC, 2011. 66p.

Source: Internet Resource: Accessed July 15, 2011 at: http://www.unodc.org/documents/data-and-analysis/Studies/Transatlantic_cocaine_market.pdf

Year: 2011

Country: International

Keywords: Cocaine

Shelf Number: 122077


Author: Ruckstuhl, Sandra

Title: Renewable Natural Resources: Practical Lessons for Conflict-Sensitive Development

Summary: This paper explores how a “conflict and violenceâ€sensitive†framework in project assessment, design and implementation facilitates early identification and mitigation of negative consequences of competition and dispute, and promotes sustainable development over the longer term. It discusses the role of renewable resources in perpetuating conflict and violence, and distills lessons from selected development programming experiences in managing conflict risks associated with these dynamics. The study emphasizes that building capacity to productively address conflict and to improve community resilience to ecological change decreases vulnerability to violence, and improves livelihoods — particularly for the world’s poorest communities. The study draws on a range of development experience and specifically examines six case studies: three from the World Bank portfolio and three external to the Bank. Of the World Bank projects, the paper considers Andhra Pradesh Community Forest Management Project (India), Land Conflict and Vulnerability Pilot Project (Afghanistan), and Second Fadama Development Project (Nigeria). The paper also studies three external cases: Conservation of Managed Indigenous Areas (Ecuador) and Building the Capacity of ICCN to Resolve and Manage Environmental Conflicts in Virunga National Park (DRC), both financed by USAID; and the Community Development Component of GTZ’s Palestinian Water Program (West Bank). The concluding chapter outlines good practice and lessons learned from experience, emphasizing principals for building institutional and organizational capacity that support constructive conflict management.

Details: Washington, DC: The World Bank, Social Development Department, 2009. 77p.

Source: Internet Resource: Conflict, Crime & Violence Issue Note: Accessed July 19, 2011 at: http://siteresources.worldbank.org/EXTSOCIALDEVELOPMENT/Resources/244362-1164107274725/RNR_PRS.pdf

Year: 2009

Country: International

Keywords: Conflict and Violence

Shelf Number: 122100


Author: Baker, Bruce

Title: Supporting Local Forms of Policing and Justice: Lessons from Africa and The Pacific

Summary: The trend towards the pluralisation of policing concedes that state police no longer (nor should have) the monopoly in law enforcement, and that local institutions legitimately have a frontline role in the provision of security and policing services for citizens. In developed countries like Australia debate about plural policing is linked to outsourcing of policing responsibilities to the private security and corporate sectors. In Africa and the Pacific, as Baker points out, plural policing is not always a strategic policy decision to outsource policing and security, but rather is simply a reflection of local community initiative, borne of the limited capabilities of a poor and weak state. Localism, as the paper points out, brings many advantages including its complementarity with customary forms of justice and peace-building. It also has vulnerabilities (in common with public policing) to abuses of power and human rights violations. The paper applies a ‘lessons to be learnt’ format, through liberal use of boxed case-studies, with explicit articulation of the implications for international policing missions, as well as the priorities for AUSAID support for justice and law enforcement in the Pacific region.

Details: Nathan, Qld: ARC Centre of Excellence in Policing and Security, 2010. 10p.

Source: Internet Resource: Briefing Paper: Accessed July 20, 2011 at: http://www.ceps.edu.au/files/file/Bruce%20Baker%20FINAL1_.pdf

Year: 2010

Country: International

Keywords: Local Policing

Shelf Number: 122120


Author: Tyler, Tom R.

Title: Procedural Justice, Police Legitimacy and Cooperation With the Police: A New Paradigm for Policing

Summary: Policing involves potentially one of the most coercive interactions between the State and its citizens. Consequently, understanding the role of legitimacy is a vital issue for modern policing. But what does ‘legitimacy’ mean for policing and from where does it derive? This briefing paper examines these questions, providing an incisive and accessible summary of the key international research findings.

Details: Nathan, Qld: ARC Centre of Excellence in Policing and Security, 2011. 8p.

Source: Internet Resource: Briefing Paper: Accessed July 20, 2011 at: http://www.ceps.edu.au/files/file/Tina%20Murphy%20Briefing%20Paper.pdf

Year: 2011

Country: International

Keywords: Police Legitimacy

Shelf Number: 122121


Author: Pearce, Jenny

Title: Violence, Security and Democracy: Perverse Interfaces and their Implications for States and Citizens in the Global South

Summary: How does violence affect the everyday lives of citizens in the global South? Researching this theme under the aegis of the Violence, Participation and Citizenship group of the Citizenship DRC coordinated by IDS, we generated some answers, but also more questions, which this paper starts to explore. Why have democratisation processes failed to fulfil expectations of violence reduction in the global South? How does violence affect democracy and vice versa? Why does security practice in much of the global South not build secure environments? When examined empirically from the perspectives of poor Southern citizens, the interfaces between violence, security and democracy – assumed in conventional state and democratisation theory to be positive or benign – are often, in fact, perverse. Empirically-based reflection on these questions leads us to two propositions, which the paper then explores through the use of secondary literature. In essence: Proposition 1: Violence interacts perversely with democratic institutions, eroding their legitimacy and effectiveness. Democracy fails to deliver its promise of replacing the violence with accommodation and compromise, and democratic process is compromised, with citizens reacting by withdrawing from public spaces, accepting the authority of non-state actors, or supporting hard-line responses. Proposition 2: Security provision is not making people feel more secure. State responses to rising violence can strengthen state and non-state security actors committed to reproducing violence, disproportionately affecting the poorest communities. These ‘perverse interfaces’, we argue, warrant research in themselves, rather than minimal or tangential consideration in research on democracy, as tends to be the case. Further research needs to adopt fresh epistemological, methodological and analytical perspectives and seek to re-think and re-frame categories and concepts, rather than working within the received wisdoms of state and democratisation theory.

Details: Brighton, UK: Institute of Development Studies at the University of Sussex, 2011. 37p.

Source: Internet Resource: Working Paper, Volume 2011, No. 357: Accessed July 20, 2011 at: http://www.drc-citizenship.org/system/assets/1052734710/original/1052734710-pearce_etal.2011-perverse.pdf

Year: 2011

Country: International

Keywords: Homicide

Shelf Number: 122124


Author: McLean-Hilker, Lyndsay

Title: Broadening Spaces for Citizens in Violent Contexts

Summary: Violence and everyday insecurity are amongst the root causes of poverty: a simple and true statement that has at last been acknowledged in several international agreements, including the Geneva Declaration on Armed Violence (2008) and Dili Declaration (2010). Several new funding mechanisms have even been established to support efforts to reduce violence, including those that address the special security needs of excluded groups, women, youth and children. What recent policies have failed to adequately consider, however, is that poor and dispossessed people often perceive the state as a perpetrator or accomplice - whether by active complicity or passive omission – in the violence visited upon them. For policymakers and practitioners eager to move beyond top-down approaches to reducing insecurity and violence, this policy briefing offers insights into how local residents can be directly involved in finding solutions for their security and livelihood needs. Research from a range of contexts characterised by violence and everyday insecurity suggests that external actors can help to broaden spaces where citizens can take action in non-violent, socially legitimate ways, but that success depends on gaining a locally nuanced understanding of the complex relationship between violent and non-violent actors, and between forms of everyday violence and political violence.

Details: Brighton, UK: Development Research Centre on Citizenship, Participation and Accountability, 2011. 4p.

Source: Internet Resource: Citizenship DRC Policy Briefing: Accessed July 20, 2011 at: http://www.drc-citizenship.org/system/assets/1052734708/original/1052734708-hilker_etal.2010-broadening.pdf?1299616068

Year: 2011

Country: International

Keywords: Poverty

Shelf Number: 122126


Author: United Nations Office on Drugs and Crime

Title: Organized Crime and its Threat to Security: Tackling a Disturbing Consequence of Drug Control

Summary: Over time, international controls have limited the number of people who take illicit drugs to a small fraction of the world’s adult population, much smaller than those who use other addictive substances, like tobacco and alcohol. This undeniable success has also had a dramatic unintended consequence: a criminal market of staggering proportions. If unattended, this criminal market will offset the many benefits of drug control. In fact, the crime and corruption associated with the drug trade are providing strong evidence to a vocal minority of pro-drug lobbyists to argue that the cure is worse than the disease, and that drug legalization is the solution. This would be an historical mistake, one which United Nations Member States are not willing to make. The reason is straightforward: there is no need to choose between health (drug control) and security (crime prevention). They are complementary, and not contradictory commitments. Yet, because drug trafficking enriches criminals, destroys communities and even threatens nations, it has to be dealt with urgently and forcefully. Policy change is required against crime, not in favour of drugs. This paper focuses on three requirements, as a way to map the road ahead. The need for an integrated strategy. Crime control measures must integrate all elements of the drug chain: supply, trade and demand. So far governments have mostly pursued disjointed interventions that have displaced the problem (from one country to another and/or from one substance to another); have addressed only some aspects (fighting illicit crops, instead of mass poverty); or have used a sledge-hammer instead of a more appropriate chisel (criminalizing addiction, instead of treating addicts). Also measures have been incoherently applied over time (with uneven political commitment), and over space (without the coordination promoted by international agreements). For example, the UN legal instrument against Organized Crime and its protocol on Fire Arms provide platforms for joint, rapid-impact action: yet, they not been implemented in a way robust enough to impact the drug trade. As a result, a number of countries now face a crime situation largely caused by their own choice. This is bad enough. Worse is the fact that, quite often their vulnerable neighbours pay an even greater price. The need for community resistance. Drugs infect especially certain segments of society. Ghettos, even entire regions controlled by crime cartels, are breeding grounds of both drug supply (trafficking) and demand (addiction). Exploitation, instability, even terrorism are their direct cause and consequence. Yet, like addiction, violence can be cured: it is indeed possible to regain control of places that today are hospitable only to anti-social behaviours. The challenge is to re-integrate marginalized segments of society and draw them into, rather than push them out of the law. From the Andes to South East Asia, this has been done with farmers who have been assisted to switch from illicit to licit crops – despite the war conditions surrounding them. From Europe to Australia this has been done with addicts who have been helped to abandon their drug dependence – despite largely adverse social settings. The world over, drug farmers and drug addicts have benefited from targeted assistance: why not duplicate this winning model in the heart of ghettos and in areas out-of-control? Why do states abandon masses of unemployed, illiterate youth that face no other option than a day of money, notoriety and death as foot-soldiers in rag-tag armies of mafias and rebels? The need for a shared commitment. The drug trade not only infects people in so many lands. It also corrupts governments, together with business and finance. Nations need to strengthen integrity in governance (public and private) and resistance to drug cartels, armed with war chests worth billions of dollars. This is not happening. Money laundering is rampant and practically unopposed: honest citizens, seeing the expensive cars, yachts and mansions of untouchable mafias and their cronies, wonder why proceeds of crime are not seized. The internet supplies drugs, arms, even people and their organs, on-line. One of humanity’s biggest capital assets, the web, when perversely used is turned into a weapon by criminals and terrorists. Surprisingly, calls for international agreements against cyber-crime and cyber-terrorism remain unanswered. Even existing international legal instruments are not adequately applied, their rules of engagement not yet agreed upon years after their entry into force. In fact, the Conferences of the Parties for the implementation of the UN Conventions against Corruption and against Organized Crime have repetitively failed to deliver – focussed on processes rather than on the substance of fighting organized crime. The drug control conventions – so effective in reducing the health impact of illicit substances – are under attack for a collateral damage the founding fathers could not anticipate: the emergence of drug cartels powerful enough to affect politics and business. This may be an unintended consequence of the drug conventions: above all, it is the inescapable result of inadequate implementation of existing crime control agreements and unwillingness to develop new ones, despite the sacrifice – often the ultimate sacrifice – of law enforcement officers. The overall context has weakened further the respect for human rights. Although drugs and crime kill, societies should not kill because of them. There cannot be disagreement on this. Yet, under the (no doubt emotional) pressure of a concerned public opinion, efforts to preserve public health (by controlling drugs) and to maintain public order (by preventing crime) are not always conducted with respect for the rights of other human beings. Still worse, when the law is not observed, when drug mafias challenge the state, when vast income inequalities are the result of crime rather than honest work, the call is inevitable: an eye for an eye. Governments must oppose this frightening cycle.

Details: Vienna: UNODC, 2009. 22p.

Source: Internet Resource: Accessed July 21, 2011 at: http://www.unodc.org/documents/drug-treatment/CND_09ED_final%20paper.pdf

Year: 2009

Country: International

Keywords: Corruption

Shelf Number: 122134


Author: Beck, Adrian

Title: The Impact and Control of Shrinkage at Self-Scan Checkouts: An ECR Europe White Paper

Summary: This study aimed to contribute to the debate concerning the potential impact self-scan checkouts may have on retail shrinkage. It adopted a multi-method approach: retailer case studies, a survey of self-scan supervisors, and interviews with self-scan technology companies, loss prevention practitioners and product protection providers. Key findings are: • Limited evidence from the retail case studies suggested that the introduction of self-scan technologies had little or no impact on levels of shrinkage. One retailer found that manned checkouts operators are three times more likely to not scan an item than a customer using self scan. • A survey of 955 self-scan supervisors did not identify widespread concerns about customers abusing this system, with the majority not having caught anybody stealing through this method nor suggesting that the non-scanning of items was widespread. • The research identified the need for retailers to create ‘zones of control’ within which self-scan checkouts operate to ensure that potential thieves perceive it to be both difficult to steal and that it was highly likely that if they did offend, they would be caught. • These zones of control should be created through careful design (where possible creating a separate self-scan space, controlling the movement of customers and limiting means of entrance and exit) and generating overt forms of surveillance (supervisors and other staff constantly being highly visible and near to customers; the use of CCTV and public view monitors and technological monitoring through till-based alerts and alarms). • Where possible one supervisor should be responsible for a maximum of four self-scan checkouts – this maximises their ability to be vigilant and to effectively respond to customer queries and system alarms and alerts. • Certain elements of self-scan systems should be reviewed, including: o the number of alerts generated compared with the ability of staff to act as ‘guardians of control’; identification of products that persistently create scanning problems for customers (barcode not reading) and ameliorative action taken (either by the retailer or through negotiation with the product manufacturer); review of location of the receipt function; improved customer notification of change, including location of scoop; review of loose item description interface; and how discount vouchers are handled and verified. • Training of self-scan supervisors is critical – they need to be aware of the importance of maintaining vigilance and keeping in close proximity to customers. They also need to be aware of all the well-known self-scan scams. • The providers of product protection equipment need to work much more closely with the manufacturers of self-scan technologies to ensure that the current problems being experienced with devices such as EAS tags (false alarms because customers are not deactivating tags consistently) can be addressed. • There is a need for further research to understand the level of losses being experienced through traditional checkouts to better understand whether the levels of loss are similar or indeed higher than those occurring through self-scan checkouts. • The emerging nature of self-scan technology and the growing public acceptance of, and familiarity with, suggests that this subject should be reviewed in years to come to see if levels of abuse are the same level.

Details: Brussels: ECR Europe Shrinkage Group, 2011. 64p.

Source: Internet Resource: accessed July 26, 2011 at: www.gs1ie.org/attachment/1015

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 122153


Author: Milleken, Jennifer: Gilgen, Elisabeth

Title: Tackling Violence Against Women: From Knowledge to Practical Initiatives

Summary: Although the number of women who are violently injured and killed each year worldwide is not known with any precision, available evidence, while unsystematic and incomplete, already indicates that violence against women (VAW) is ‘a universal problem of epidemic proportions’ (UNIFEM, 2007). VAW occurs in both conflict and non-conflict situations. It is often less evident in its occurrence and effects than the deaths and injuries of men as combatants in armed conflicts or as gang members in violence related to drug wars. Yet women and girls are often victimized or adversely affected in other ways in these and all other armed violence settings. Women and girls are also common targets of sexual violence in armed conflict and fragmented societies, and they suffer disproportionately from its indirect consequences. In non-conflict situations, women are the victims of intimate-partner (or ‘domestic’) and sexual violence, honour killings, and dowry-related violence (GD Secretariat, 2008b). The economic costs associated with armed violence are tremendous. It is estimated that the annual economic cost of armed violence in terms of lost productivity due to violent homicides is between USD 95 billion and USD 163 billion alone (GD Secretariat, 2008). Additional costs include medical costs associated with treating the injured or indirect costs such as loss of income from the victim’s inability to work. However, a focus on costs ignores the wider relationship among armed violence, livelihood perspectives, development, and the (indirect) impact on women and men. The gendered dynamic of these relationships is complex. As the Organisation for Economic Co-operation and Development (OECD) states: When husbands are killed, women frequently lose their access to farmlands and the right to live in their marital homes. The resulting survival choice for many affected women and children is prostitution, commercial labour or domestic servitude. This has consequences for ongoing exposure to violence and ill health from communicable diseases and poor working conditions, as well as future community exclusion (OECD, 2009). The Geneva Declaration on Armed Violence and Development (GD) is a diplomatic initiative built around the recognition that armed violence and development are closely linked. From its inception, the GD initiative has recognized the importance of the gendered aspect of armed violence. It promotes a comprehensive approach to armed violence reduction issues, recognizing the different situations, needs and resources of men and women, boys and girls, as reflected in the provisions of UN Security Council Resolutions 1325 and 1612 (GD Secretariat, 2006). However, (armed) violence against women and its impact on development, while acknowledged since the inception of the GD, has so far been only partially addressed by the GD Secretariat. This Working Paper represents one of the actions by the GD Secretariat to support work on the elimination of (armed) VAW with a view to enhancing development. It is divided into two sections. The first section illustrates the context of the GD, (armed) VAW, and development. The second section sets out five possible initiatives to fill research gaps on VAW: 1. support international initiatives to track VAW globally; 2. promote field-based research on mapping VAW; 3. develop improved costing tools for estimating the effects of VAW on development; 4. extend the work on a contextual appraisal toolkit for implementing VAW interventions; and 5. support a comprehensive evaluation toolkit for VAW prevention and reduction programmes. The first three initiatives focus on filling gaps in mapping VAW; the last two present ways to support VAW reduction and prevention programming. The Working Paper concludes with the observation that further innovative research is needed to understand the scope and scale of VAW, such as its negative impact on development. Research initiatives need to acknowledge the complexity, and the sometimes - apparent paradox, of the phenomenon of VAW, as well as support the development and evaluation of programming efforts to prevent and reduce VAW.

Details: Geneva: Geneva Declaration Secretariat, 2011. 49p.

Source: Internet Resource: Working Paper: Accessed July 26, 2011 at: http://www.genevadeclaration.org/fileadmin/docs/WP-TVAW/GD-WP-Tackling-VAW.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 122157


Author: Connolly, Chris

Title: An Overview of International Cyber-Security Awareness Raising and Educational Initiatives

Summary: This study presents a comparative study of international Cyber-Security awareness training and educational initiatives. The report examined 68 international initiatives. This project has consisted of two research components: Component 1 – Comparative analysis of international initiatives: The first component was a comparative analysis of the approaches taken internationally to provide awareness raising and educational activities designed to empower the general and small business community with respect to Cyber-Security risks. This study examined a selection (68 in total) of initiatives in 11 jurisdictions. This study is not intended to represent an exhaustive study of every initiative in every jurisdiction. There has been a focus on English language initiatives – although 13 French and German initiatives were included in the study. Australian initiatives and resources were not included in this study. Component 2 – Campaign evaluations: The second component was an analysis of the literature used to support the implementation of these strategies as well as literature that evaluates the effectiveness of Cyber-Security education and awareness raising programs. This involved the examination of the only 2 initiatives (out of 68) where an evaluation had been conducted – plus 5 evaluations of similar campaigns in other fields (such as cyber-safety). This study is reporting on evaluations that are available and not evaluating campaigns per se.

Details: Canberra: Australian Communications and Media Authority, 2011. 100p.

Source: Internet Resource: Accessed July 28, 2011 at: http://www.acma.gov.au/webwr/_assets/main/lib310665/galexia_report-overview_intnl_cybersecurity_awareness.pdf

Year: 2011

Country: International

Keywords: Computer Crimes

Shelf Number: 122191


Author: Silva-de-Alwis, Rangita de

Title: Child Marriage and the Law: Legislative Reform Initiative Paper Series

Summary: Child marriage violates the rights of the girl child to be free from all forms of discrimination, inhuman and degrading treatment, and slavery. This paper analyses the different legal frameworks and human rights dimensions of child marriage within a feminist perspective. The value of a rights-based approach as a powerful advocacy tool to monitor child marriage is at the heart of this paper. Further, the paper highlights the interconnectivity between international human rights law, constitutional guarantees of gender equality, and other gender friendly laws in combating child marriage. The main thrust of this paper is that early marriage is a violation of fundamental human rights and that both state and non- state actors must be held accountable under international treaty obligations to combat early child marriage. What is unique about this paper is that it looks at the legal system as a whole and proposes a set of holistic legal and policy reform. By reviewing the landscape of laws that impact on women and children, we are able to come up with a broader range of policy alternatives and a more sophisticated understanding of how the multiple strands of law and innovative legal strategies can converge to prevent child marriage. Laws have been traditionally created in the male image. In re-envisioning law and legal strategies it is important to capture the lived experiences of women that are so often excluded in the law. The human rights discourse provides the language and the framework to conceive new laws and revise old laws. Child marriage violates a panoply of interconnected rights, including, the right to equality on grounds of sex and age, the right to marry and found a family, the right to life, the right to the highest attainable standard of health, the right to education and development and the right to be free from slavery that are guaranteed in the International Covenant on Civil and Political Rights, the International Covenant on Economic, Social and Cultural Rights, the Convention on the Elimination of All Forms of Discrimination against Women, the Convention on the Rights of the Child, the Convention on the Consent to Marriage, Minimum Age for Marriage and Registration of Marriages and the Supplementary Convention on the Abolition of Slavery, the Slave Trade, and Institutions and Practices Similar to Slavery. The human rights guarantees legitimize strong penalties for violations of laws and policies preventing child marriage. Locating child marriage as a human rights violation also helps to raise it as a grave public concern rather than a private matter between families. The human rights agenda helps to view child marriage through the lenses of both civil and political rights and economic, social and cultural rights covenants. Most of all, the human rights perspective helps to frame child marriage as a crime against women and the girl child. Child marriage disproportionately affects girls because of their sex and despite facially neutral laws, women and girls are often de facto unequal before the law. That is why apart from specific child marriage laws, laws relating to prohibitions against discrimination on the ground of sex and age must be strengthened in an effort to strike out the root causes of child marriage.

Details: New York: United Nations Children's Fund (UNICEF), 2008. 76p.

Source: Internet Resource: Accessed July 28, 2011 at: http://www.unrol.org/files/Child_Marriage_and_the_Law[1].pdf

Year: 2008

Country: International

Keywords: Child Marriage

Shelf Number: 122224


Author: Malhotra, Anju

Title: Solutions to End Child Marriage: What the Evidence Shows

Summary: National and international communities are increasingly recognizing child marriage as a serious problem, both as a violation of girls’ human rights and as a hindrance to key development outcomes. As more program, policy, donor and advocacy constituencies pledge commitment, resources and action to address this problem, it becomes important to examine past efforts and how well they have worked. Finding model solutions to address child marriage has been a challenge because, while there has been increasing investment in programs during the last decade, many are not well-documented, and even fewer are well-evaluated. In this brief, we summarize a systematic review of child marriage prevention programs that have documented evaluations. Based on this synthesis of evaluated programs, we offer an analysis of the broader implications for viable solutions to child marriage. Our findings show that child marriage prevention programs have indeed expanded in number and scope during the last decade; almost two dozen have documented some type of an evaluation. The largest number of evaluated programs is in South Asia, especially in Bangladesh and India. Programs in a broader range of African and Middle Eastern countries, including Ethiopia and Egypt, are also adding to the evidence base. On balance, the results from this composite of evaluations lean toward positive findings, indicating that a set of strategies focusing on girls’ empowerment, community mobilization, enhanced schooling, economic incentives and policy changes have improved knowledge, attitudes, and behavior related to child marriage prevention. The strongest, most consistent results are shown in a subset of programs fostering information, skills, and networks for girls in combination with community mobilization. While many child marriage prevention programs are only beginning to explore possibilities of going to scale, there are encouraging signs that large-scale structural efforts aimed at other goals, such as education, health, and poverty reduction, are beginning to make a connection with child marriage prevention. A smaller, but growing set of such programs is providing tentative but promising evaluation results, laying the foundation for building new partnerships and leveraging scarce resources.

Details: Washington, DC: International Center for Research on Women (ICRW): 2011. 36p.

Source: Internet Resource: Accessed July 29, 2011 at: http://www.icrw.org/files/publications/Solutions-to-End-Child-Marriage.pdf

Year: 2011

Country: International

Keywords: Child Marriage

Shelf Number: 122233


Author: Consortium for Street Children

Title: STREET CHILDREN: A Mapping & Gapping Review of the Literature 2000 to 2010 Consortium for Street Children

Summary: This paper presents a unique Literature Review of international research studies about street children published during the decade from 2000 to 2010. Studies have been collected and mapped into 12 thematic sections, drawing on more than 400 papers, chapters and books published around the world in the English language. Studies consulted were primarily academic, supplemented with key texts from the development literature on street children. Gaps between and within thematic sections have been identified and analyzed. The paper‘s dual purpose is:  To improve understanding of street children by identifying recent advances in an academic scholarship which began in the 1970s  To identify priority areas for academic research on street children, in order to build a stronger strategic base for the development of advocacy, policy and programme design initiatives. This Review divides into 4 Parts and a total of 12 sections, which reflect the most interesting advances in the academic research over the last 10 years as follows: 1. Street Children - Old Myths and New Realities: exploring their Numbers, Definitions, Characteristics and Voices from the Streets 2. Street Children – The Wider ‘Everyday’ Picture: exploring their Relationships, Migration and Mobility, Experiences on the Streets and Ageing into Youth 3. Policies and Interventions – as designed for or experienced by street children 4. The Policy Context – exploring Laws & Enforcement, plus Economics, Budgets & Funding.

Details: London: Consortium for Street Children, 2011. 75p.

Source: Internet Resource: Accessed July 29, 2011 at: http://www.streetchildren.org.uk/_uploads/publications/Street_Children_Mapping__Gapping_Literature_Review_-_FINAL_VERSION_-_February_2011.pdf

Year: 2011

Country: International

Keywords: Homeless Children

Shelf Number: 122231


Author: Wolfe, Lauren

Title: The Silencing Crime: Sexual Violence and Journalists

Summary: Few cases of sexual assault against journalists have ever been documented, a product of powerful cultural and professional stigmas. But now dozens of journalists are coming forward to say they have been sexually abused in the course of their work.

Details: New York: Committee to Protect Journalists, 2011. 13p.

Source: Internet Resource: accessed August 3, 2011 at: http://www.cpj.org/reports/CPJ.Sexual.Assault.Journalists.pdf

Year: 2011

Country: International

Keywords: Journalists

Shelf Number: 122288


Author: Palmer, Catherine

Title: Violence Against Women and Sport: A Literature Review

Summary: 2010 World Cup in South Africa drew attention to the connections between major sporting events and violence against women. The ‘Show Domestic Violence the Red Card’ campaign, supported by football clubs, police and local authorities sought to raise public awareness with regard to intimate partner violence fuelled by increased alcohol consumption, while the World Health Organisation underscored the importance of condom use with women who sell sex in a country where rates of HIV/AIDS are of pandemic proportions. The 2010 Commonwealth Games in New Delhi placed issues of sex trafficking and the sale of sex on the international agenda, with the connections between the economic vulnerability of women and sexual exploitation made apparent. Elsewhere, allegations of sexual assault by players across various codes of football (rugby league, Australian Rules, American gridiron and soccer) paint a picture which suggests that sport facilitates, if not encourages, particular forms of violence against women. Although these examples provide a compelling backdrop to the argument that sport offers a context in which violence against women may be perpetrated, there remains a need for a systematic review of the literature so as to build an evidence base that can help inform policy and practice. This is particularly timely as the United Kingdom prepares to hold two sporting events of global significance in the next four years - the Olympic Games and Paralympics in 2012 and the Commonwealth Games in 2014. In December 2010, the Trust for London funded Dr Catherine Palmer from the School of Applied Social Sciences, Durham University to conduct a review of literature that could provide an evidence base for the connections between violence against women and sport. The objectives were to: · review national and international evidence into the connections between sport and violence against women that can inform policy development and debate, including literature that explores contemporary moves to initiate cultural change within sporting (and other) organisations; · review and evaluate the success of relevant initiatives adopted by sporting (and other) bodies that have aimed to change or establish environments that promote safety for women and girls in relation to sport and VAW. These broad objectives distinguish this review from others that have focussed specifically on issues of either human trafficking or prostitution in relation to sporting events.

Details: London: End Violence Against Women, 2011. 30p.

Source: Internet Resource: Accessed August 3, 2011 at: http://www.endviolenceagainstwomen.org.uk/data/files/evaw_violence_against_women_and_sport_dr_c_palmer_july_2011.pdf

Year: 2011

Country: International

Keywords: Sports and Violence

Shelf Number: 122295


Author: Beckert, Jens

Title: In the Shadow: Illegal Markets and Economic Sociology

Summary: Illegal markets differ from legal markets in many respects. Although illegal markets have economic significance and are of theoretical importance, they have been largely ignored by economic sociology. In this article we propose a categorization for illegal markets and highlight reasons why certain markets are outlawed. We perform a comprehensive review of the literature to characterize illegal markets along the three coordination problems of value creation, competition, and cooperation. The article concludes by appealing to economic sociology to strengthen research on illegal markets and by suggesting areas for future empirical research.

Details: Cologne, Germany: Max Planck Institute for the Study of Societies, 2011. 29p.

Source: Internet Resource: MPIfG Discussion Paper 11/9: Accessed August 5, 2011 at: http://www.mpifg.de/pu/mpifg_dp/dp11-9.pdf

Year: 2011

Country: International

Keywords: Economics and Crime

Shelf Number: 122306


Author: Financial Action Task Force

Title: Laundering the Proceeds of Corruption

Summary: This typology originates from a practitioners‘ understanding that the fight against corruption is inextricably intertwined with that against money laundering; that the stolen assets of a corrupt public official are useless unless they are placed, layered, and integrated into the global financial network in a manner that does not raise suspicion. In some ways, a public official (known as a politically exposed person, or ―PEP) who gathers vast sums of money through corrupt means is far more vulnerable than some other criminals. A narcotics trafficker may reliably depend on being able to remain anonymous with his vast amount of money; a public official begins to draw unwanted attention as soon as he is associated with significant sums from unknown sources. Thus, the corrupt PEP‘s vulnerability presents an opportunity for those authorities engaged in both anti-money laundering/combating the financing of terrorism (AML/CFT) and anti-corruption (AC) enforcement. This typology differs from other such typologies previously produced by the Financial Action Task Force (FATF) because it draws from publicly available work undertaken by experts. The body of work the project team analyzed represents deep AML expertise possessed by individuals and organisations around the globe. Indeed, the objective was to understand these works to draw conclusions from them. Broadly stated, the goal was to stand on the shoulders of others in order to better understand corruption, its mechanisms and vulnerabilities, through an AML/CFT lens. Part of the mandate of the Working Group on Typologies (WGTYP) is to identify new threats and vulnerabilities and conduct research on money laundering and terrorist financing methods and techniques. FATF typology reports typically reveal, describe, and explain the nature of ML/TF methods and threats, thus increasing global awareness and opportunities for earlier detection. In light of its mandate, the project team focused only on the methods used to launder the proceeds of corruption. It does not attempt to describe the methods by which bribery and other corruption are effectuated, concealed, or discovered; such a discussion would be outside of the scope of this paper. While there may be no internationally recognised legal definition of corruption, it is most commonly functionally defined as the use of public office for private gain. The United Nations, the Organisation for Economic Co-Operation and Development (OECD), and the Council of Europe Conventions establish the offences for a range of corrupt behaviour. The conventions define international standards on the criminalisation of corruption by prescribing specific offences rather than through a generic definition or offense of corruption. The offenses can range from petty or systemic corruption, in which public officials or employees receive money to perform (or refrain from performing) official acts, to ―grand corruption, in which those at the political, decision-making levels of government use their office to enrich themselves, their families, and their associates. Because of time and resource limitations involved in this project, the project team restricted itself to an analysis of grand corruption. While there is no precise threshold -- by official rank or otherwise -- to distinguish grand from systemic corruption, the positions of the PEPs involved in the cases in our report ranged from senior legislators to governors to prime ministers and presidents. All of the cases examined involved behaviour that would constitute offenses falling under any of the relevant international AC conventions, as well as the generic definition described above. Where possible, the case studies identified the type of corrupt act from which the proceeds had been derived. The types of corruption involved bribe taking and kickbacks, of both foreign and domestic officials, but also embezzlement (in which money rightly belonging to the State was siphoned for personal use through a variety of means), extortion (in which the public official uses the threat of official power to receive money) and self dealing (in which the corrupt PEP has a personal financial interest in acts and decisions he makes in his official capacity).

Details: Paris: FATF, 2011. 54p.

Source: Internet Resource: accessed August 5, 2011 at: http://www.fatf-gafi.org/dataoecd/31/13/48472713.pdf

Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 122313


Author: IKV Pax Christi

Title: Kidnapping is Booming Business: A Lucrative Political Instrument for Armed Goups Operating in Conflict Zones

Summary: In 2001, Pax Christi Netherlands published a report about the kidnapping industry in Colombia. The report had two objectives. The first was to demonstrate that, in countries such as Colombia, the kidnapping practices of the illegal armed groups provided the financial fuel for the conflict. Secondly, the report was intended as an indictment. Kidnapping was presented as a violation of human rights and, within the context of a war or internal armed conflict, in many cases as a violation of international humanitarian law. Seven years on, and the number of kidnappings worldwide has risen even more. The crime has lost nothing of its potency as a cause of human tragedy. Kidnapping is a serious violation of the most elementary right of mankind: the right to a dignified existence. We set out in this report to provide a brief summary of the kidnapping issue on a global level, in particular of kidnapping in conflict regions and fragile states. The questions to be answered are concerned with the financial and political requirements that the kidnappers set, and with the impacts of these practices on the conflict and its perpetuation, and on the performance of the state. Following on from the previous report, the emphasis of this investigation is on kidnapping and extortion in Colombia, Ecuador and Venezuela. Firstly, we wished to ascertain how the kidnapping issue has developed in these countries in the past ten years. This raised the question of whether there was any relationship between the kidnapping practices in Colombia, and trends in this crime in the neighbouring countries. Another primary question regarding Colombia was concerned with the role of the kidnapping theme in peace talks and other dialogue between illegal armed groups and the Colombian government, and with the possible role of the theme in any future peace talks. The final chapter investigates the kidnapping-related policies of the EU member states, and as far as possible we compare their policies with their actions in practice in recent years. The main question is whether there is any European consensus on how to deal with kidnapping, and how to suppress the phenomenon. What obstacles are there to a joint approach to the kidnapping issue?

Details: Utrecht, The Netherlands: IKV Pax Christi, 2008. 66p.

Source: Internet Resource: Accessed August 9, 2011 at: http://www.ikvpaxchristi.nl/files/Documenten/LA%20Colombia/English%20Colombia/Eng%20brochure_Opmaak%201.pdf

Year: 2008

Country: International

Keywords: Extortion

Shelf Number: 122328


Author: Cohen, Dara Kay

Title: Causes of Sexual Violence During Civil War: Cross-National Evidence (1980-2009)

Summary: Why do some armed groups commit wartime rape on a large scale, while others never turn to sexual violence? Although scholars and policymakers have made many claims about the rates, severity and locations of wartime sexual violence, there have been few systematic efforts to gather data on sexual violence during conflict. Using an original dataset, I examine the incidence of sexual violence by both insurgent groups and state actors during civil wars between 1980-2009. I first establish that there is substantial variation in the severity of wartime sexual violence, both across and within conflicts. I then use the data in a statistical analysis to test a series of competing hypotheses about the causes of wartime sexual violence. I find strong evidence that the choice of recruitment mechanism—namely, whether the armed group abducted or press-ganged its members—predicts the use of sexual violence. I maintain that this finding supports an argument about the use of rape as a method of combatant socialization, in which members of armed groups who are recruited by force use rape to create and to maintain unit cohesion. I also find that contraband funding and genocide predict sexual violence by insurgents. Notably, there is no support for several common explanations for wartime sexual violence, including ethnic war and gender inequality. Drawing on data from the Sierra Leone civil war, I examine the observable implications of the proposed mechanism on the micro level in a brief case study. The results undermine conventional wisdom on the causes of sexual violence and suggest that multiple mechanisms may be at work in understanding wartime sexual violence.

Details: Minneapolis: Humphrey School of Public Affairs, University of Minnesota, 2011. 45p.

Source: Internet Resource: Accessed August 9, 2011 at: http://blog.lib.umn.edu/gpa/globalnotes/Cohen%20MIRC%203-28-11.pdf

Year: 2011

Country: International

Keywords: Civil War

Shelf Number: 122329


Author: Logan, TK

Title: Research on Partner Stalking: Putting the Pieces Together

Summary: The information for this paper was drawn primarily from peer reviewed published articles and published reports from the National Institute of Justice or other agencies such as the Stalking Resource Center and the National Network to End Domestic Violence. Stalking definitions vary greatly in the literature and some are hard to decipher. This paper attempted to restrict publications to those that defined stalking as: (1) repeated (2 or more) acts and (2) including some element of fear or concern about safety; or to those that defined stalking as a significant stressor or intrusion. General research trends are described within each section. Some of the trends that were noted are preliminary as they are from only one or two studies. Time and space limitations made it impossible to include every relevant research trend or citation. The literature often uses the term victim and survivor interchangeably, with some disciplines favoring one over the other. The use of the term victim in this paper is not meant to imply that women who have experienced partner violence and stalking are not survivors. Rather, the use of the word victim was simply chosen to provide a consistent terminology throughout the paper and should be thought of as interchangeable with survivor. Research indicates that most stalkers are male, and most stalking victims, especially partner stalking victims, are female (especially when definitions include the fear element). Because of the gendered nature of partner stalking, many studies focus on female partner stalking victims.

Details: Lexington, KY: University of Kentucky, Department of Behavioral Science & Center on Drug and Alcohol Research, 2010. 27p.

Source: Internet Resource: Accessed August 9, 2011 at: http://www.cdar.uky.edu/CoerciveControl/docs/Research%20on%20Partner%20Stalking%20Report.pdf

Year: 2010

Country: International

Keywords: Domestic Violence

Shelf Number: 122331


Author: UN Women

Title: Progress of the World's Women 2011-2012: In Pursuit of Justice

Summary: Progress of the World’s Women 2011–2012: In Pursuit of Justice shows that where laws and justice systems work well, they can provide an essential mechanism for women to realize their human rights. However, it also underscores the fact that, despite widespread guarantees of equality, the reality for many millions of women is that justice remains out of reach. The report highlights the practical barriers that women – particularly the poorest and most excluded – face in negotiating justice systems and the innovative approaches that governments and civil society are pioneering to overcome them. It explores the ways in which women are reconciling guarantees of their rights with the realities of living within plural legal systems. And it highlights the severe challenges that women face in accessing justice in the aftermath of conflict, as well as the enormous opportunities for change that can emerge in these most difficult times. This volume of Progress of the World’s Women starts with a paradox: the past century has seen a transformation in women’s legal rights, with countries in every region expanding the scope of women’s legal entitlements. Nevertheless, for most of the world’s women the laws that exist on paper do not always translate into equality and justice. In many contexts, in rich and poor countries alike, the infrastructure of justice – the police, the courts and the judiciary – is failing women, which manifests itself in poor services and hostile attitudes from the very people whose duty it is to fulfil women’s rights. As a result, although equality between women and men is guaranteed in the constitutions of 139 countries and territories, inadequate laws and loopholes in legislative frameworks, poor enforcement and vast implementation gaps make these guarantees hollow promises, having little impact on the day-to-day lives of women. Well-functioning legal and justice systems can provide a vital mechanism for women to achieve their rights. Laws and justice systems shape society, by providing accountability, by stopping the abuse of power and by creating new norms about what is acceptable. The courts have been a critical site of accountability for individual women to claim rights, and in rare cases, to affect wider change for all women through strategic litigation. Laws and justice systems have been the focus of women’s activism because women have recognized both their potential and their current failings. Where laws are missing or discriminatory and the infrastructure of justice is broken, access to justice must mean more than simply helping women to access existing justice systems. This edition of Progress of the World’s Women underscores that laws and justice systems that are biased against women’s interests and reinforce unequal power relations between women and men, must themselves be transformed in order to fulfil the potential they hold for accelerating progress towards gender equality.

Details: New York: UN Women, 2011. 168p.

Source: Internet Resource: Accessed August 9, 2011 at: http://progress.unwomen.org/pdfs/EN-Report-Progress.pdf

Year: 2011

Country: International

Keywords: Gender

Shelf Number: 122339


Author: Robertson, Robyn D.

Title: Effective Strategies to Reduce Drunk Driving

Summary: Much has been learned about effective strategies, programs, and interventions to deal with drunk drivers in the past decade. However, available information has primarily focused on research demonstrating the effectiveness of tools. >> Less attention has been given to the implementation of these tools, the barriers that may be encountered, or the ways that these challenges can be overcome. >> When such information is available, it is often agency-specific or fragmented across disciplines, making it difficult to locate and access to inform the development of legislation and policy. This has made it difficult for decision-makers and the public to understand the diverse logistical and operational issues associated with using these strategies. >> Knowledge about the level of staffing to support the use of these tools, needed training and education for professionals, critical data and communication linkages across agencies, operational practices and procedures, required resources, common barriers, and how they can be overcome are less well understood. >> As a result, the implementation of these strategies has been inconsistent, resulted in low participation or use, or has not achieved the desired benefits. It is critical that legislative and policy initiatives are informed by knowledge of operational practices and broader systems (e.g., justice, licensing, treatment) to ensure that intended objectives are ultimately achieved. The public must also learn more about why initiatives are applied and how they work so that they can offer informed support and better gauge the feasibility, strengths, and limitations of different policy options. This report from the Working Group on DWI System Improvements is designed to inform decision-makers and the public about proven strategies to reduce drunk driving and ways to maximize their effectiveness to reduce drunk driving deaths on American roadways. The Working Group is a coalition of frontline influential organizations representing professionals in all phases of the criminal DWI system.

Details: Ottawa: Traffic Injury Research Foundation, 2011. 68p.

Source: Internet Resource: Accessed August 10, 2011 at: http://tirf.ca/publications/PDF_publications/2011_DWI_WG_Full_Report_11.pdf

Year: 2011

Country: International

Keywords: Driving Under the Influence

Shelf Number: 122345


Author: Fric, Pavol

Title: Crossing the Thin Llue Line: An international annual review of anti-corruption strategies in the police. 2001 edition.

Summary: No matter what form it takes, corruption inside the police force poses one of the gravest dangers to the democratic functioning of society. The police should be an institution that protects citizens and society from those who snub law and order. However, due to the nature of the work performed by police officers (24/7 direct contact with both the public and the criminal underworld), they are prime targets for those who want to break the law and avoid prosecution. And when, instead of following the rule of law, police officers themselves break the law or lure other citizens into doing so, their actions create many problems, eroding the public’s faith in the rule of law, justice, and democratic institutions. Unfortunately, the amount of empirical information available on the corruption of police officers and the measures undertaken in order to fight this threat is rather limited. We are uncertain whether to blame this on a lack of interest among independent researchers in the field, or on the proverbial "blue wall of silence" from police officers. Nevertheless, this lacuna has led us to the idea of launching an annual review to re-evaluate the anti-corruption strategies within police forces world-wide. We believe that, by making such information publicly available, "crossing the thin blue line" will become more difficult. This year's review consists of the results of experts' investigations and case studies opinionated by distinguished experts. The first part of this study discusses in general outlines the anti-corruption strategies employed by selected countries, the possible factors influencing the choice of the strategies undertaken and the effectiveness of the specific measures used in the fight against police corruption. Countries' profiles, including detailed information about anti-corruption strategies applied in 25 countries and information about specific examples of corrupt behaviour by police officers, are presented in the second part of the study. The third part is conceptualised as an expansion of the survey's results. We have asked a distinguished international circle of experts in the field to offer their opinion on the case studies written by a investigative journalist familiar with police corruption. These experts' task was to map out an effective strategy or elements of a strategy that would help to diminish or minimise the occurrence of corrupt behaviour.

Details: Prague: Transparency International, 2001. 105p.

Source: Internet Resource: Accessed August 10, 2011 at: http://old.transparency.cz/pdf/crossing.pdf

Year: 2001

Country: International

Keywords: Blue Wall of Silence

Shelf Number: 122355


Author: Birch, Paul R.

Title: Old Glory and the Jolly Roger: The Cultural Constraints and Strategic Imperatives of Modern Piracy

Summary: This thesis discusses piracy on the open seas. It describes acts of piracy, puts the practice into historical perspective, and shows how a recent surge in maritime piracy incidents differs from other maritime piracy afflicting the world’s oceans at the turn of the twentyfirst century. This is half of the reason for writing. The second purpose for is to examine the US military response to the dramatic increase in piracy near Somalia that occurred in 2008. The thesis examines the US response through the theoretical lenses of strategic culture and structural realism. These theories seldom appear alongside each other in security studies literature; their juxtaposition explains the US behavior toward the contemporary African piracy epidemic and provides a framework for examining other national security issues. This thesis concludes that although certain national security elites push US strategic culture toward interventionist or isolationist extremes, some world events elicit foregone responses best described by the ideas of structural realism. Tacit realization by national security actors that these events exist in spite of what elite groups profess or desire in turn defines strategic culture in a fundamentally different way. Given its place in the existing world order, the United States had little choice but to respond to piracy, even though its strategic preference was to ignore the problem. The valuable lesson from piracy represents in microcosm many problems of national strategy. If US cultural preference is again at odds with a strategic imperative to use force, and elites indulge the former, the nation may forfeit its structural role as the world’s existing hegemon. This is historically significant, as ceding the role of hegemon at this time would be a voluntary act, not forced by a stronger nation or an altered balance of power. The United States would become the first superpower to lay down that mantle voluntarily. Although US foreign policy appears now to have reconciled strategic cultural preferences with structural imperatives in the case of piracy, strategists must recognize the potential for the same kind of tension in all international relations problems. If the tension between preference and imperatives goes unresolved, the outcome can diminish national power. The United States should not proceed down that path unawares.

Details: Maxwell AFB, AL: School Of Advanced Air And Space Studies Air University Maxwell Air Force Base, Alabama, 2009. 112p.

Source: Internet Resource: Thesis: Accessed August 10, 2011 at: http://www.dtic.mil/cgi-bin/GetTRDoc?Location=U2&doc=GetTRDoc.pdf&AD=ADA540653

Year: 2009

Country: International

Keywords: Maritime Crime

Shelf Number: 122365


Author: Magrath, William

Title: CHAINSAW Project: An INTERPOL Perspective on Law Enforcement in Illegal Logging

Summary: INTERPOL’s Project CHAINSAW was initiated in July 2008 in consultation with the World Bank. The World Bank raised concern that the illegal logging issue has, to date, principally been considered from an environmental perspective and requested INTERPOL, the only International Criminal Police Organisation, to examine the problem from the perspective of international criminal justice. When it comes to breaching national and international laws, undertaking and developing illegal activities at transnational level, and jeopardizing public safety; illegal logging becomes a criminal issue and the individuals responsible for illegal logging become criminals subject to sanctions. The World Bank also underlined the limited knowledge of the criminal justice system and need for better understanding of international law enforcement mechanisms among forestry policy makers. The CHAINSAW report is developed from a perspective of timber as a commodity, and illegal logging (more precisely illegal timber trafficking) as a succession of criminal activities undertaken at an international level by a network of organized criminals. The report provides a better appreciation of law enforcement systems and a better understanding of the way police agencies cooperate, or in some cases fail to cooperate, at an international level. It discusses the role and functions of INTERPOL to a non law enforcement audience This report is not exhaustive but aims to give a better idea of how legal texts, law enforcement agencies, and police cooperation all form a criminal justice system that could be more relevant and applicable to forest governance. The CHAINSAW report is not an operational report; it does not contain nominal data such as the names of illegal timber traffickers, names of companies engaging in illegal activities, or the locations of those activities. It will define the structure of the phenomenon and its different components, and also identify the law enforcement mechanisms and tools available to counter illegal logging. The CHAINSAW report includes information obtained from a variety of sources including police information from INTERPOL National Central Bureaus (NCB’s), data collected by national customs offices, research papers by environmental organisations, articles from criminology journals, and reports written by Non-governmental Organisations (NGO’s). One of the difficulties met while drafting the report was locating accurate statistics. The authors found that when used to support a point of view, numerical data is often biased, if not conflicting. This has resulted, for this report, in available statistics being employed only for illustrative purposes, not demonstrative. Nonetheless it is hoped that the contents of this report will provide a useful additional framework for policy makers and those responsible for forest governance and will help galvanize interest and support for stronger efforts among traditional law enforcement authorities to address illegal logging and illegal timber trade.

Details: Lyon, France: INTERPOL; Washington, DC: The World Bank, 2010? 57p.

Source: Internet Resource: Accessed August 12, 2011 at: http://www.interpol.int/Public/EnvironmentalCrime/Manual/WorldBankChainsawIllegalLoggingReport.pdf

Year: 2010

Country: International

Keywords: Illegal Logging

Shelf Number: 122377


Author: Schneider, Friedrich

Title: The (Hidden) Financial Flows of Terrorist and Organized Crime Organizations: A Literature Review and Some Preliminary Empirical Results

Summary: The financial means of international terror and organized crime organizations are analysed. First, some short remarks about the organization of international terror organizations are made. Second and in a much more detailed way a literature review is provided about the financing of terrorist and organized crime organizations, their sources and the various methods they use. Third, an attempt is made to estimate the financial means of terror organizations with the help of a latent estimation approach (MIMIC procedure). The figures show that Al Qaeda and other terror organizations have sufficient financial means. Fourth, some remarks are made about the negative effects of terror on the economy in highly developed countries and some strategies are presented to combat (the financing) of terrorism.

Details: Bonn, Germany: IZA, 2010. 44p.

Source: Internet Resource: IZA Discussion Paper No. 4860: Accessed August 12, 2011 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1584191




Year: 2010

Country: International

Keywords: Money Laundering

Shelf Number: 122381


Author: Dhami, Sanjit

Title: The Behavioral Economics of Crime and Punishment

Summary: The celebrated Becker proposition (BP) states that it is optimal to impose the severest possible punishment (to maintain effective deterrence) at the lowest possible probability of detection (to economize on enforcement costs). However, the BP is not consistent with the evidence. This inconsistency is known as the Becker paradox. In fact, the BP is a general result that applies to all low-probability events that lead to 'unbounded loss' of utility. Hence, it is applicable to a wide class of problems in economics. We clarify the BP and its welfare implications under expected utility, which remains the favoured framework. We argue that none of the proposed explanations of the Becker paradox is satisfactory. We show that the BP also holds under rank dependent expected utility and cumulative prospect theory, the two main alternatives to expected utility. We show that composite prospect theory (CCP), of al-Nowaihi and Dhami (2010a), can resolve the Becker paradox. Our paper opens the way for incorporating non-expected utility theories into the economic analysis of criminal activity.

Details: Leicester, UK: University of Leicester, Department of Economics, 2010. 44p.

Source: Internet Resource: Working Paper No. 10/14: Accessed August 15, 2011 at: http://www.le.ac.uk/ec/research/RePEc/lec/leecon/dp10-14.pdf

Year: 2010

Country: International

Keywords: Deterrence

Shelf Number: 122387


Author: Dhami, Sanjit

Title: The Hyperbolic Punishment Function

Summary: All models in Law and Economics use punishment functions (PF) that incorpo- rate a trade-o¤ between probability of detection, p, and punishment, F. Suppose society wishes to minimize the total costs of enforcement and damages from crime, T (p; F). For a given p, an optimal punishment function (OPF) determines an F that minimizes T(p; F). A popular and tractable PF is the hyperbolic punishment function (HPF). We show that the HPF is an OPF for a very large class of total cost functions. Furthermore, the HPF is an upper bound for an even larger class of pun- ishment functions. If the HPF cannot deter crime then none of the PF’s for which the HPF is an upper bound can deter it either. Thus, if one can demonstrate that a particular policy is ine¤ective under the HPF, there is no need to even compute the OPF. Our results should underpin an even greater use of the HPF.

Details: Leicester, UK: University of Leicester, Department of Economics, 2010. 16p.

Source: Internet Resource: Accessed August 16, 2011 at: http://www.le.ac.uk/ec/sd106/HPF.pdf

Year: 2010

Country: International

Keywords: Deterrence

Shelf Number: 122406


Author: Schneider, Friedrich , Bruck, Tilman, Meierrieks, Daniel

Title: The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)

Summary: This survey provides an in-depth analysis of existing research on the economic analysis of terrorism and counter-terrorist measures. First the existing evidence on the causes of terrorism is analyzed, then we consider the evidence of the consequences of terrorism and we demonstrate why it is important to regarding of the issue of counter-terrorism policy. Moreover the survey presents the existing knowledge on the interrelation between the economy and the issue of security and it incorporates analysis the level of knowledge about the causal chains between security and the economy. Also it focuses on perspective and methodologies from the discipline of economics but also refers to research from related disciplines (sociology, political science). It also assembles the knowledge on the impact of terrorism on the economy as reflected in macro-economic variables and its impact on specific sectors. Furthermore it assesses how potential an actual terrorist event determine consumer and producer behaviour, public policy, as well as terrorist responses to these policies. Finally a European perspective on the terrorism security annexes is discussed and here we analyze the causes of terrorism in Europe.

Details: Berlin: Economics of Security, 2011. 64p.

Source: Internet Resource: Economics of Security Working Paper Series no. 45: Accessed August 16, 2011 at: http://www.diw.de/documents/publikationen/73/diw_01.c.372925.de/diw_econsec0045.pdf

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 122411


Author: Mansfield, Charles T.

Title: Modern Piracy: The Impact on Maritime Security

Summary: Although acts of piracy are generally criminal as opposed to terrorist in nature, their unpredictable time and location of occurrence, the wide variety of vessels targeted, and their increasing frequency creates an opportunity for terrorists to use pirates' methods as a means to achieve their goals. This paper will provide a brief historical perspective on piracy, examine its modern dimensions, and analyze the impact of modern piracy on U.S. maritime security. The thesis examines the efforts that U.S. and foreign governments, military, business, and civilian organizations expend to combat the problem, and piracy's tangible costs in capital resources to combat. The sea, a largely unregulated space, is a safe haven for criminals and terrorists to act unopposed by military or law enforcement efforts. Although piracy is generally not politically motivated, it is invariably linked to prevailing political conditions and the proximity of weak or failed states. Since the terrorist attacks in the United States in 2001, the international community has been forced to assess the vulnerabilities of maritime security. In the post- 9/11 and USS Cole era, there has been a resurgence in worldwide piracy incidents. The increase in attacks has demanded the serious attention of global maritime trading partners. The possible use of a maritime vessel as a weapon is a real and credible threat. The United States and her maritime partners are constantly working to achieve a secure global maritime environment. The focus is on assisting failed and failing states to create functional governments that will develop their law enforcement and coast guard capabilities. Until these weak and lawless lands can maintain control of their territorial waters, the global maritime partners will be required to use their naval and law enforcement assets to patrol piracy hot spots to prevent a further escalation of robberies, violence, and potentially terrorist acts.

Details: Quantico, VA: United States Marine Corps, Command and State College, 2008. 29p.

Source: Internet Resource: Accessed August 22, 2011 at: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA490682&Location=U2&doc=GetTRDoc.pdf

Year: 2008

Country: International

Keywords: Maritime Crime

Shelf Number: 122431


Author: Barrett, Damon, ed.

Title: Children of the Drug War: Perspectives on the Impact of Drug Policies on Young People

Summary: Children of the Drug War is a unique collection of original essays that investigates the impacts of the war on drugs on children, young people, and their families. With contributions from around the world, providing different perspectives and using a wide range of styles and approaches, including ethnographic studies, personal accounts, and interviews, the book asks fundamental questions of national and international drug control systems: • What have been the costs to children and young people of the war on drugs? • Is the protection of children from drugs a solid justification for current policies? • What kinds of public fears and preconceptions exist in relation to drugs and the drug trade? • How can children and young people be placed at the forefront of drug policies? Four thematic sections address: • Production and trade • Race, class, and law enforcement • Families and drug policy • Children, drug use, and dependence.

Details: New York: International Debate Education Association, 2011. 241p.

Source: Internet Resource: Accessed August 23, 2011 at: http://www.childrenofthedrugwar.org/

Year: 2011

Country: International

Keywords: Children, Drug Use

Shelf Number: 122471


Author: Ledbury Research

Title: Counterfeiting Luxury: Exposing the Myths. 2nd ed.

Summary: Building on the findings of the 2006 Edition of Counterfeiting Luxury: Exposing the Myths Report, our 2007 edition probes further into the impact that counterfeit and look-alike products has on luxury brands in the UK. Based on the results of an extensive survey of over 2,000 consumers and a number of focus groups, this report reviews what changes have taken place over the last 12 months in terms of purchasing drivers and attitudes of consumers of counterfeit and look-alike goods and provides guidance to brand owners as to how to change consumer behaviour.

Details: London: Davenport Lyons, 2007. 30p.

Source: Internet Resource: Accessed August 23, 2011 at: http://www.a-cg.org/guest/pdf/Counterfeiting_Luxury_2007_Report.pdf

Year: 2007

Country: International

Keywords: Consumer Fraud

Shelf Number: 122472


Author: Arias, Enrique Desmond

Title: Introductory Handbook on Policing Urban Space

Summary: Over the past 20 years, Governments and civic actors have focused substantially on the question of crime and urban law enforcement efforts. It has come to be recognized that crime is unevenly distributed throughout the world. In certain countries, such as Guatemala, the homicide rate is higher than 30 homicides per 100,000 inhabitants, whereas in many other countries, including in Western Europe or South- East Asia, it is more than 10 times lower. Important disparities are also observed between and within regions: in Africa, Egypt, Mauritius and Morocco have homicide rates that are lower than 3 homicides per 100,000 inhabitants, far lower than those in South Africa. Discrepancies can also be significant within the same country. In Colombia, for example, the city of Tunja (population 150,000) has a rate of 7 homicides per 100,000 inhabitants, compared with 128 per 100,000 inhabitants in the city of San José del Guaviare (population 50,000). Finally, within the same city, homicide rates can vary significantly from one neighbourhood to another. In Rio de Janeiro, for example, rates vary from 2 to 12 homicides per 100,000 inhabitants, depending on the neighbourhood. A recent statistical report of the United Nations Office on Drugs and Crime (UNODC) shows stable or decreasing global homicide trends over the period 2003-2008 for the majority of countries for which data is available in the Americas, Asia, Europe and Oceania. Exceptions to the trend include a number of Caribbean and Central and South American countries, including Belize, Guatemala, Honduras, Jamaica and Venezuela (Bolivarian Republic of), which show significant increases in homicide rates. Research suggests that this may be due, in part, to increases in transnational organized crime, illicit drug trafficking and gang activity. In addition, a slight increase was seen between 2007 and 2008 in a few countries in Europe, demonstrating a need for continued vigilance and effective crime prevention action. Unfortunately, data for a number of countries in Africa and in parts of Asia are not robust enough to provide a clear picture for a useful analysis. Intentional homicide (the intentional killing of one person by another) is one of the most serious forms of crime and a key indicator of violent crime levels in a given country or region. intelligence-led policing, situational crime prevention, the “broken windows†theory and the strategy on crime prevention through environmental design. It also addresses broader principles of managing urban space to control crime and strategies for evaluating crime control programmes. The Handbook includes references to efforts to control crime in an array of countries, including Brazil, Canada, Chile, Colombia, El Salvador, India, Jamaica, Kenya, Mexico, South Africa, the United Kingdom of Great Britain and Northern Ireland and the United States of America. The overall objective of the Handbook is therefore to outline the new, innovative techniques and to explain how they have been applied to address crime problems in low- and middle-income countries. The various programmes, policies and approaches described here can provide law enforcement policymakers, front-line officers, urban planners and other city authorities as well as civil society organizations with basic information about an array of strategies and good governance practices to control crime in rapidly growing cities in low- and middle-income countries.

Details: New York: United Nations Office on Drugs and Crime, 2011. 118p.

Source: Internet Resource: Criminal Justice Handbook Series: Accessed August 24, 2011 at: http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/11-80387_ebook.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 122479


Author: Blanchfield, Luisa

Title: International Violence Against Women: U.S. Response and Policy Issues

Summary: In recent years, the international community has increasingly recognized international violence against women (VAW) as a significant human rights and global health issue. VAW, which can include both random acts of violence as well as sustained abuse over time, can be physical, psychological, or sexual in nature. Studies have found that VAW occurs in all geographic regions, countries, cultures, and economic classes, with some research showing that women in developing countries experience higher rates of violence than those in developed countries. Many experts view VAW as a symptom of the historically unequal power relationship between men and women, and argue that over time this imbalance has led to pervasive cultural stereotypes and attitudes that perpetuate a cycle of violence. U.S. policymakers have generally focused on specific types or circumstances of VAW rather than view it as a stand-alone issue. Congress has authorized and appropriated funds for international programs that address VAW, including human trafficking and female genital cutting. In addition, past and current Administrations have supported efforts to reduce international levels of VAW— though many of these activities are implemented as components of broader foreign aid initiatives. There is no U.S. government-wide coordination of anti-VAW efforts. Most agencies and departments do not track the cost or number of programs with VAW components. Therefore, it is unclear how much money the U.S. government, or individual agencies, spend annually on VAWrelated programs. Some experts have suggested that the U.S. government should re-examine, and perhaps enhance, current U.S. anti-VAW activities. They argue that VAW should not only be treated as a stand-alone human rights issue, but also be integrated into U.S. assistance and foreign policy mechanisms. Other observers are concerned with a perceived lack of coordination among U.S. government agencies and departments that address international violence against women. This report addresses causes, prevalence, and consequences of violence against women. It provides examples of completed and ongoing U.S. activities that address VAW directly or include anti-VAW components. It outlines possible policy issues for the 112th Congress, including • the scope and effectiveness of U.S. programs in addressing international VAW; • further integrating anti-VAW programs into U.S. assistance and foreign policy mechanisms; • U.S. funding for anti-VAW activities worldwide, particularly in light of the global financial crisis, economic recession, and subsequent calls to reduce the U.S. budget deficit; and • strengthening U.S. government coordination of anti-VAW activities.

Details: Washington, DC: Congressional Research Service, 2011. 33p.

Source: Internet Resource: RL34438: Accessed August 26, 2011 at: http://assets.opencrs.com/rpts/RL34438_20110414.pdf

Year: 2011

Country: International

Keywords: Female Victims

Shelf Number: 122489


Author: Shachtman, Noah

Title: Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs

Summary: At the beginning of the 19th century, piracy was an ongoing threat and an accepted military tactic. By the end of the century, it was taboo, occurring solely off the shores of failed states and minor powers. The practice of hijacking did not vanish entirely, of course; it is flourishing now on the world’s computer networks, costing companies and consumers countless billions of dollars. Cybercrime today seems like a nearly insoluble problem, much like piracy was centuries ago. There are steps, however, that can be taken to curb cybercrime’s growth—and perhaps begin to marginalize the people behind it. Some of the methods used to sideline piracy provide a useful, if incomplete, template for how to get it done. Shutting down the markets for stolen treasure cut off the pirates’ financial lifeblood; similar pushes could be made against the companies that support online criminals. Piracy was eventually brought to heel when nations took responsibility for what went on within its borders. Based on this precedent, cybercrime will only begin to be curbed when greater authority — and accountability — is exercised over the networks that form the sea on which these modern pirates sail. In this new campaign, however, private companies, not governments, will have to play the central role, as Harvard’s Tyler Moore and others have suggested. After all, the Internet is not a network of governments; it is mostly an amalgam of businesses that rely almost exclusively on handshake agreements to carry data from one side of the planet to another. The vast majority of the Internet’s infrastructure is in the hands of these 5,000 or so Internet Service Providers (ISPs) and carrier networks, as is the ability to keep crooks off that infrastructure. If this relatively small group can be persuaded to move against online criminals, it will represent an enormous step towards turning these crooks into global pariahs. The most productive thing ISPs can do to curb crime is put pressure on the companies that support and abet these underground enterprises. Currently, registration companies sell criminals their domain names, like “thief.com.†Hosting firms provide the server space and Internet Protocol addresses needed to make malicious content online accessible. But without ISPs, no business, straight or crooked, gets online. A simple statistic underscores the ISPs’ role as a critical intermediary: just 10 ISPs account for around 30 percent of all the spam-spewing machines on the planet. ISPs are well aware of which hosting companies, for example, are the most friendly to criminals; lists of these firms are published constantly. But,currently, ISPs have little motivation to cut these criminal havens off from the rest of the Internet. There is no penalty for allowing illicit traffic to transit over their networks. If anything, there is a strong incentive for maintaining business-as-usual: the hosting company that caters to crooks also has legitimate customers, and both pay for Internet access. So ISPs often turn a blind eye, even though the worst criminal havens are well-known. That is where government could help. It could introduce new mechanisms to hold hosting companies liable for the damage done by their criminal clientele. It could allow ISPs to be held liable for their criminal hosts. It could encourage and regulate ISPs to share more information on the threats they find. Government could also encourage more private businesses to come clean when they are victimized. Today, just three in ten organizations surveyed by the security firm McAfee report all of their data breaches. That not only obscures the true scope of cybercrime; it prevents criminals and criminal trends from being caught earlier. Government can alter that equation by expanding the requirements to report data breaches. It could require its contractors to purchase network security insurance, forcing companies to take these breaches more seriously. And it can pour new resources into and craft new strategies for disrupting criminals’ support networks. These steps will serve as important signals that America will no longer tolerate thieves and con artists operating on its networks. After all, 20 of the 50 most crime-friendly hosts in the world are American, according to the security researchers at HostExploit. As the United States gets serious in curbing these criminals, it can ask more from — and work more closely with — other countries. China, for instance, sees itself as the world’s biggest victim of cybercrime, even as it remains a hotbed for illicit activity. Not coincidentally, China is also only partially connected to the global community of ISPs. Dialogues to bring the Chinese closer into the fold will not only make it easier to marginalize cybercriminals; it will build momentum for broader negotiations on all sorts of Internet security issues.

Details: Washington, DC: John L. Thornton China Center at Brookings, 2011. 44p.

Source: Internet Resource: Cyber Security #1: Accessed August 26, 2011 at: http://www.brookings.edu/~/media/Files/rc/papers/2011/0725_cybersecurity_shachtman/0725_cybersecurity_shachtman.pdf

Year: 2011

Country: International

Keywords: Computer Crime

Shelf Number: 122561


Author: Naranjo R., Alberto J.

Title: Drugonomics : Industrial Organization of Illegal Drug Markets

Summary: Insurgents, drug lords and anti-drug supply policies in the Andes. The United States has spent enormous resources on supply policies to decrease illegal drug production in the Andes and availability in the U.S. market. However, evidence suggests increased drug production and availability over time. Moreover, insurgent activities in the region have also increased. We present an explanation for these unexpected trends by analyzing an illicit drug market where drug lords and insurgents interact. The analysis suggests that supply policies increase drug production and insurgent activity while having no effect on drug availability and prices. Counter-intuitive effects of domestic law enforcement policies in the United States. In spite of the increase in domestic law enforcement policies in the U.S., illegal drug distribution activities have followed a non-monotonic trend and cocaine and heroin prices have been dropping or have remained stable over time. This paper provides an explanation for these counter-intuitive effects. We model how drug lords respond to this type of policy and predict distribution activities, prices and drug consumption in the United States. Spillover effects of domestic law enforcement policies. Independent efforts by local and state governments in the United States to combat illegal drug markets are in contrast with a global market where drugs are sold and distributed simultaneously in different locations. We study the effect that domestic law enforcement policies may have on this global context. The external effects of these policies induce overspending by governments, but a low level of global drug consumption. Competition effects are also studied. Drive-by competition? Violence in the drug market. Today, the retail distribution of most illegal drugs is mainly in the hands of street gangs that also account for most of the drug related violence in many states and cities in the United States. Interestingly, the level of violence in drug markets appears to vary with the type of drug. Based on the notion that gangs use violence strategically to compete for customers we find that both the effectiveness of violence in shifting demand and the cost of switching supplier by users affect the level of violence in the market. Indirect effects of anti-drug policies are discussed.

Details: Stockholm: Stockholm University, 2007. 118p.

Source: Internet Resource: Dissertation: Accessed September 2, 1011 at: http://www.avhandlingar.se/avhandling/c2a2c5909c/

Year: 2007

Country: International

Keywords: Drug Enforcement

Shelf Number: 122609


Author: Faure, Michael G.

Title: Law and Economics of Environmental Crime: a Survey

Summary: In the economic analysis of law, much attention has been paid to the instruments to be used for the control of environmental pollution. However, lawyers seem to focus mainly on environmental standards (emission standards and quality standards) and on the question of how these standards should be set, whereas economists (mostly interested in environmental economics) focus mainly on 'economic instruments' (emission trading and taxes). Environmental law is often categorised as administrative law. However, in practice the whole body of environmental law is, to a large extent, also criminal law. The usual way in which environmental law is structured consists of the imposition on industry of specific administrative requirements, specifying the permissible amounts and quality of polluting emissions, and the punishment, as environmental crimes, of violations of these requirements. In legal literature, much attention has been paid to the way in which the law should use penal sanctions to deter environmental pollution, but environmental criminal law has not, so far, been very often subjected to an economic analysis. The goal of this paper is to provide an overview of the way in which traditional theories on the economics of crime have been applied to environmental criminal law. We will therefore begin by addressing the question of why, according to the economist literature criminal law should at all be used to deter environmental pollution. An inevitable question in that respect, obviously, is whether other instruments, such as civil liability, would not suffice for the deterrence of environmental pollution (§ 2). In addition, we will address the manner in which the literature on the economics of crime relates to environmental pollution (§ 3). The paper also looks at what the optimal penalties for environmental pollution would be (§ 4). Moreover, in practice it can be observed that there is an increasing interest in administrative penal law. Hence, the question arises as to why, in some cases, administrative law might provide better results than criminal law (§ 5). In addition, given that environmental crimes are committed mostly within the corporate sphere, it is necessary to ask whether criminal law should be applied to companies and/or to individual actors. (§ 6). Thus, our paper attempts to provide a survey of the literature concerning the way in which criminal law has been, and can be, used in the fight against environmental pollution.

Details: Zurich: Swiss Institute of Technology, 2003. 33p.

Source: Internet Resource: Accessed September 2, 2011 at: http://www.hertig.ethz.ch/LE_2004_files/Papers/Faure_Environmental_Crime.pdf

Year: 2003

Country: International

Keywords: Economics of Crime

Shelf Number: 122588


Author: Villasenor, John

Title: Shadowy Figures: Tracking Illicit Financial Transactions in the Murky World of Digital Currencies, Peer-to-Peer Networks, and Mobile Device Payments

Summary: The history of the movement of money is as complex and varied as the history of money itself, and includes ships laden with gold bullion, desert caravans carrying salt or cowry shells, armored trucks filled with banknotes, paper checks, and today, a large and quickly growing list of digital transfer methods. Secrecy and anonymity have always played roles in the movement of money, most commonly because they offer a strong measure of privacy and protection against being targeted by thieves, but also because the parties in financial transactions can have other reasons — some legitimate, some not — for keeping a low profile. The combination of the enormous growth in social networks, the complexity of peer-to-peer systems and software, and the number of Internet and wirelessly connected devices is altering the landscape of financial transactions at a rate and to a degree that is unprecedented. Today, such transactions can be conducted not only using traditional, state-backed currencies, but also through purely digital currencies, virtual currencies, and virtual goods. In addition, mobile phone-based money transfer systems enabling traditional currencies to be moved in novel ways are experiencing rapid adoption, particularly in developing nations. Almost no one would argue that governments do not have a right to track and trace digital financial transactions associated with activities such as terrorism and human trafficking. It is less clear, however, how governments can surmount the formidable technical and organizational challenges associated with detecting and monitoring these transactions. The solution will require a combination of self-regulation, government-industry collaboration, and change in both technology and culture within government agencies.

Details: Houston, TX: James A. Baker III Institute for Public Policy, Rice University, 2011. 24p.

Source: Internet Resource: Accessed September 2, 2011 at: http://www.bakerinstitute.org/publications/ITP-pub-FinancialTransactions-082911.pdf

Year: 2011

Country: International

Keywords: Financial Crimes

Shelf Number: 122619


Author: Kego, Walter

Title: Organized Crime and the Financial Crisis: Recent Trends in the Baltic Sea Region

Summary: The financial crisis has affected not only the economies of countries in the Baltic Sea Region. It also provided a golden opportunity for organized crime groups to expand their activities. This book presents analyses by leading criminologists on how these groups have been able to take advantage of the crisis. Using a wide range of information and statistical data, the six case studies reveal the extent to which organized crime groups have infiltrated societies and pose a severe threat not only to individuals but also the state. Countries profiled include: Estonia, Latvia, Lithuania, Poland, Russia and Sweden.

Details: Stockholm: Institute for Security and Development Policy, 2011. 153p.

Source: Internet Resource: Accessed September 3, 2011 at: http://www.isdp.eu/images/stories/isdp-main-pdf/2011_kego-leijonmarck-molcean_organized-crime-and-the-financial-crisis.pdf

Year: 2011

Country: International

Keywords: Economic Crimes

Shelf Number: 122625


Author: Nilsson, Robert

Title: The Impact of Drugs Trafficking, Corruption and Organized Crime: How to Strengthen Regional Cooperation around the Baltic Sea

Summary: The need for expanded and improved regional cooperation among the states around the Baltic Sea in countering the illicit drugs trade and organized crime is something which has been emphasized by papers previously published by ISDP within this research project. However, this is the first major attempt to put the acute need for regional cooperation among the wider spectrum of law enforcement offices and research communities at the very forefront of the policy debate. The reasons are manifold and ever more pressing in the rapidly changing context of closer European integration both within the Union itself and with the countries just east of the common border. The by far most profitable and, at the same time, most serious business for organized criminal networks operating in the Baltic Sea region is that of narcotics, through the entire chain from production to distribution. Even though the drug problem has been described by UNODC as contained in the sense that the demand has been stabilized, recent figures show that this containment is under threat. On the supply side the situation looks very different with increases both in production and trafficking. Similar to any legal market, the balance between supply and demand is the main determinant for pricing as well as the development of new business strategies for the drug lords within organized criminal networks. Together with these basic underlying factors of the narcotics trade, there are a number of recently emerged and decisive variables which have to be accounted for in the analysis of the future impact on cooperation among the states in the Baltic Sea region and its immediate neighbors. One such important factor is last year’s decision to enlarge the Schengen area, raising a number of pertinent questions and challenges of how to adapt to the radically changing environment where the borders of the EU have now been brought “closer to regions and territories which are unstable, uncontrolled and hence should be a source of concern due to the crime trends visible in geographical areas such as the Northern Caucasus and Central Asia.†Another such factor of which we still know very little about is the impact of the financial crisis. Most likely, this crisis will have effects on the narcotics trade as on any other legal or illegal trade. These effects are difficult to predict at the moment, but just as a strong and well-monitored banking system carries the necessary preconditions for controlling and securing financial transfers, the weakened state of the banks in the region could provide increased opportunities for organized criminal networks in their continuous search for expanded business opportunities. But apart from these two politico-economic changes of great import, what are the more imminent challenges to be met in the common fight against the proliferation of narcotics and growth of organized crime in the Baltic Sea region?

Details: Stockholm: Institute for Security and Development Policy, 2009. 48p.

Source: Internet Resource: Accessed September 3, 2011 at: http://www.isdp.eu/images/stories/isdp-main-pdf/2009_nilsson-kego_the-impact-of-drugs-trafficking.pdf

Year: 2009

Country: International

Keywords: Drug Enforcement

Shelf Number: 122626


Author: Shaffer, Gregory C.

Title: Criminalizing Cartels: A Global Trend?

Summary: Countries in virtually every region of the world are criminalizing cartel offenses. Many have initiated prosecutions, several have secured convictions, and a few have imposed jail time. Yet outside the United States the enforcement record is hardly uniform, and the debate about cartel criminalization is far from resolved. This situation raises a host of questions. What spurred the trend toward cartel criminalization? Have the changes been driven primarily by criminalization evangelists such as the United States Department of Justice, whether working bilaterally or through transnational networks? Are organic, bottom-up, national processes also at work, suggesting changing moral sensibilities regarding cartel conduct? To what extent have formal legal changes been accompanied by enhanced enforcement? This Essay tackles these questions through a review of criminalization and enforcement developments in the United States, Europe, and around the world. While the emerging legal landscape of anti-cartel activity is complex and varies significantly by jurisdiction, the clear trend is toward increased criminalization, as well as more robust enforcement, including collaboration among national antitrust authorities through informal transgovernmental networks. The trends, however, are not uniform, and the implementation of formal legal changes is an open question in light of divergent institutional contexts and social attitudes regarding cartels.

Details: Minneapolis, MN: University of Minnesota School of Law, 2011. 34p.

Source: Internet Resource: Minnesota Legal Studies Research Paper No. 11-26: Accessed September 3, 2011 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1865971




Year: 2011

Country: International

Keywords: Criminal Cartels

Shelf Number: 122639


Author: Pease, Ken

Title: The Carbon Cost of Crime and Its Implications

Summary: The report documents the failure to assess the carbon footprint of crime and responses to crime, both nationally and globally and speculates on reasons for this omission. It reviews relevant literatures and notes the absence of recognition of the nexus between crime and carbon-profligate lifestyles. The writers contend that such recognition would profoundly influence social and criminal justice policy. The precise quantification of the carbon costs of crime is beyond the scope of this report, to say nothing of the competence of its writers. While precision is not a realistic aim given the previous apparent neglect of the topic, and revision of the preliminary estimates contained herein inevitable and welcome, nonetheless it seems clear that the direct carbon costs of crime are substantial and the consequential costs more so, to the point where it is difficult to envisage a high crime society being a low carbon society. Recognition of this would lead to a major shift in policy favouring primary crime prevention through the design, implementation and maintenance of products and services less prone to crime. The report tentatively and conservatively estimates the carbon cost of crime in England and Wales at an annual minimum of 6000000 tonnes of CO2 equivalent. Estimates up to six times that amount could be justified if the carbon cost of moving home were factored in, given that crime is cited as the primary reason for moving home. The costs of crime, both fiscal and carbon, would be a matter for regret rather than action were it not for the demonstrable success of schemes to design out crime, for example from residential environments. At current domestic burglary rates (expected to rise in response to economic recession) the marginal carbon cost of building a home to Secured By Design standards would be recovered within four years, given the observed reduction in a mix of offences associated with the implementation of such standards, and recent evidence about the long duration and increased magnitude of the crime reduction gains afforded by SBD. General implementation of such standards alongside other developments in predictive patrolling could serve to reduce carbon costs further, through a variety of routes from the greater longevity of police vehicles by diminished instant response demands through to reduced court and criminal justice costs. The scope for further improvement in designing out crime from environments seems considerable, and an intensive programme of research to explore avenues for advance is advocated. This is not merely justified in itself, but is important for crime reduction to take its place in the greening of social policy generally. Ecological economics seeks to maximise the use of raw materials, and crime prevention through environmental design provides one means of giving effect to that principle whose promise has already been identified and partially realised.

Details: London: Secured by Design, 2009. 25p.

Source: Internet Resource: Accessed September 3, 2011 at: http://www.securedbydesign.com/professionals/pdfs/The-Carbon-Cost-of-Crime.pdf

Year: 2009

Country: International

Keywords: Costs of Crime

Shelf Number: 122647


Author: New Zealand. Ministry of Justice

Title: NZCASS in an International Context: Comparing the New Zealand Crime and Safety Survey with other international victim surveys

Summary: Since the inception of the first large-scale victimisation survey in the United States in the 1960s, countries across the world have implemented national-level surveys of crime victims. In addition, the International Crime Victims Survey has been operating since 1989 and by its fifth sweep in 2004/05 had been conducted in 78 countries. The proliferation of national-level and international victimisation survey results, together with the growing tendency to export and import criminal justice policies on a global scale, has made the international comparison of crime and victimisation levels both expected and inevitable. It is therefore appropriate to reflect on how the results from the 2009 New Zealand Crime and Safety Survey (NZCASS) compare with those from other countries. The purpose of this paper is two-fold: first, to highlight some common high-level findings across the different surveys and reflect on the implications of these findings for crime prevention in New Zealand; second, to broadly compare the method and design of the NZCASS with other international surveys, highlighting key differences and the impact these have for comparing precise results across different countries. In addition to the NZCASS, this paper has considered the following national-level surveys: the British Crime Survey in England and Wales (Walker et al 2009); the Scottish Crime and Justice Survey (Page et al 2010a,b; MacLeod et al 2009); the Northern Ireland Crime Survey (Toner and Freel, 2009); the National Crime Victims Survey (NCVS) in the United States (Rand, 2009), the General Social Survey in Canada (Gannon and Mihorean, 2005); the Crime Victimisation Survey in Australia (ABS, 2010). The International Crime Victims Survey has also been taken into account (van Dijk, van Kesteren and Smit, 2007).

Details: Wellington, NZ: Ministry of Justice, 2010. 10p.

Source: Internet Resource: Accessed September 6, 2011 at: http://www.justice.govt.nz/publications/global-publications/c/NZCASS-2009/publications/global-publications/c/NZCASS-2009/documents/The%20NZCASS%20in%20an%20international%20context.pdf

Year: 2010

Country: International

Keywords: Crime Surveys

Shelf Number: 122659


Author: Milliken, Jennifer

Title: Tackling Violence Against Women: From Knowledge to Practical Initiatives

Summary: Although the number of women who are violently injured and killed each year worldwide is not known with any precision, available evidence, while unsystematic and incomplete, already indicates that violence against women (VAW) is ‘a universal problem of epidemic proportions’ (UNIFEM, 2007). VAW occurs in both conflict and non-conflict situations. It is often less evident in its occurrence and effects than the deaths and injuries of men as combatants in armed conflicts or as gang members in violence related to drug wars. Yet women and girls are often victimized or adversely affected in other ways in these and all other armed violence settings. Women and girls are also common targets of sexual violence in armed conflict and fragmented societies, and they suffer disproportionately from its indirect consequences. In non-conflict situations, women are the victims of intimate-partner (or ‘domestic’) and sexual violence, honour killings, and dowry-related violence (GD Secretariat, 2008b). The economic costs associated with armed violence are tremendous. It is estimated that the annual economic cost of armed violence in terms of lost productivity due to violent homicides is between USD 95 billion and USD 163 billion alone (GD Secretariat, 2008b, p. 89). Additional costs include medical costs associated with treating the injured or indirect costs such as loss of income from the victim’s inability to work. However, a focus on costs ignores the wider relationship among armed violence, livelihood perspectives, development, and the (indirect) impact on women and men. The gendered dynamic of these relationships is complex. As the Organisation for Economic Co-operation and Development (OECD) states: When husbands are killed, women frequently lose their access to farmlands and the right to live in their marital homes. The resulting survival choice for many affected women and children is prostitution, commercial labour or domestic servitude. This has consequences for ongoing exposure to violence and ill health from communicable diseases and poor working conditions, as well as future community exclusion (OECD, 2009, p. 32). The Geneva Declaration on Armed Violence and Development (GD) is a diplomatic initiative built around the recognition that armed violence and development are closely linked. From its inception, the GD initiative has recognized the importance of the gendered aspect of armed violence. It promotes a comprehensive approach to armed violence reduction issues, recognizing the different situations, needs and resources of men and women, boys and girls, as reflected in the provisions of UN Security Council Resolutions 1325 and 1612 (GD Secretariat, 2006). However, (armed) violence against women and its impact on development, while acknowledged since the inception of the GD, has so far been only partially addressed by the GD Secretariat. This Working Paper represents one of the actions by the GD Secretariat to support work on the elimination of (armed) VAW with a view to enhancing development. It is divided into two sections. The first section illustrates the context of the GD, (armed) VAW, and development. The second section sets out five possible initiatives to fill research gaps on VAW: 1. support international initiatives to track VAW globally; 2. promote field-based research on mapping VAW; 3. develop improved costing tools for estimating the effects of VAW on development; 4. extend the work on a contextual appraisal toolkit for implementing VAW interventions; and 5. support a comprehensive evaluation toolkit for VAW prevention and reduction programmes. The first three initiatives focus on filling gaps in mapping VAW; the last two present ways to support VAW reduction and prevention programming. The Working Paper concludes with the observation that further innovative research is needed to understand the scope and scale of VAW, such as its negative impact on development. Research initiatives need to acknowledge the complexity, and the sometimes-apparent paradox, of the phenomenon of VAW, as well as support the development and evaluation of programming efforts to prevent and reduce VAW.

Details: Geneva, Switzerland: Geneva Declaration Secretariat, 2011. 49p.

Source: Internet Resource: Accessed September 10, 2011 at: http://www.genevadeclaration.org/fileadmin/docs/WP-TVAW/GD-WP-Tackling-VAW.pdf

Year: 2011

Country: International

Keywords: Domestic Violence

Shelf Number: 122683


Author: Aptel, Cecile

Title: Through a New Lens: A Child-Sensitive Approach to Transitional Justice

Summary: This report examines how and to what extent transitional justice approaches have engaged children and considered their needs and perspectives, analyzing the experience of truth-seeking mechanisms, criminal justice, reparations, and institutional reform. It is based on the distilled results of assessments in Colombia, the Ituri District of the Democratic Republic of the Congo (DRC), Liberia, and Nepal. Children are among the most affected in countries suffering from conflict or massive human rights violations. Children have the right to express their views and be considered in processes concerning them, including transitional justice. Yet, children and youth have not been systematically included as focus of transitional justice mechanisms. As part of a victim-centered approach, an assessment of the role and impact of violations on children and youth should be one of the key lenses used to understand the context, identify the needs, and inform the nature and function of a transitional justice measure. A child-sensitive approach should be included early in the process of developing transitional justice measures, and addressing violations against children should be made an explicit part of their mandates. This involves allocating resources for expertise and administrative support and ensuring that children’s issues are considered appropriately where relevant. Even in cases where children are not among those most directly or severely affected by the violations, children are important stakeholders—especially in countries where they constitute a considerable part of the overall population or even the majority — and must therefore be adequately informed and consulted. The best interests of the child, concerns for their physical protection and psychosocial well-being and for confidentiality and anonymity must be considered when engaging children in transitional justice.

Details: International Center for Transitional Justice, 2011. 52p.

Source: Internet Resource: Accessed September 10, 2011 at: http://ictj.org/sites/default/files/ICTJ-Children-Through-New-Lens-Aptel-Ladisch-2011-English.pdf

Year: 2011

Country: International

Keywords: Human Rights

Shelf Number: 122684


Author: Gilgen, Elisabeth

Title: Contributing Evidence to Programming: Armed Violence Monitoring Systems

Summary: Governments, development practitioners, and United Nations agencies are increasingly looking for ways to ensure that resources for development programmes and humanitarian interventions are used effectively and to support interventions with a proven record of success. Such evidence-based policy-making has also gained popularity in relation to the prevention and reduction of armed violence. To support this trend, practitioners and other stakeholders are establishing new mechanisms and research tools, including armed violence monitoring systems (AVMS). In the past few decades, AVMS have become an important tool to better understand the scale and distribution of armed violence. The United Nations Development Programme (UNDP) currently supports AVMS in Bosnia and Herzegovina, the Caribbean, Colombia, Croatia, El Salvador, Guatemala, Haiti, Honduras, Jamaica, Kenya, Somalia, South-eastern and Eastern Europe, and Sudan. UNDP has observed that national governments are increasingly requesting support for AVMS. This Working Paper — commissioned by the UNDP — aims to clarify the concept of AVMS and to deepen understanding of their work. It is designed to inform policy-makers and practitioners who are working on violence reduction and prevention and who are interested in supporting or establishing an AVMS. The report will also allow experts who are already engaged in AVMS to compare their experiences with those of others. Last but not least, the paper aims to inform researchers and academics who work on developing indicators that capture the scale and scope of armed violence at a local, national, or global level.

Details: Geneva, Switzerland: Geneva Declaration, 2011. 74p.

Source: Internet Resource: Working Paper: Accessed September 12, 2011 at: http://www.genevadeclaration.org/fileadmin/docs/general/GD-WP-2011-Contributing-Evidence-to-Programming.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 122720


Author: United Nations Office on Drugs and Crime. Laboratory and Scientific Section

Title: Amphetamines and Ecstasy: 2011 Global ATS Assessment

Summary: Amphetamine-type stimulants (ATS) are firmly established on global illicit drug markets and their use continues to exceed that of opiates or cocaine. While the number of people who have used ATS at least once in the last 12 months has stabilized at the global level, increases have occurred in parts of the world that previously had only very small ATS-related problems. The widespread use of ATS is a result of their attractiveness to users: they seem to appeal to the needs of today’s societies and have become part of what is perceived to be a modern and dynamic lifestyle; in some segments of society, they continue to be used frequently for occupational purposes. It is also a result of a market potential with continuously high profits and low risks that maintain their attractiveness to criminal groups around the world. Since the last global ATS assessment was published in 2008,1 there have been several new developments. The report provides evidence for these developments since 2008, with a special focus on subregional patterns and trends, and highlights the challenges ahead.

Details: Vienna: United Nations Office on Drugs and Crime, 2011. 124p.

Source: Internet Resource: Global SMART Programme: Accessed September 11, 2011 at: http://www.unodc.org/documents/ATS/ATS_Global_Assessment_2011.pdf

Year: 2011

Country: International

Keywords: Amphetamines

Shelf Number: 122738


Author: Karp, Aaron

Title: Estimating Civilian Owned Firearms

Summary: Most of the world’s firearms are privately owned. They include improvised craft guns as well as handguns, rifles, shotguns, and machine guns. The legal definition of a civilian firearm varies; some states allow civilian ownership of certain firearms that are restricted to military use in other states. The word civilian is used here to refer to actual possession, not legality. In 2007, the Small Arms Survey estimated the number of civilian firearm ownership worldwide at approximately 650 million weapons out of some 875 then in existence. National ownership rates range from a high of 90 firearms per every 100 people in the United States, to one firearm or less for every 100 residents in countries like South Korea and Ghana. With the world’s factories delivering millions of newly manufactured firearms annually, and with far fewer being destroyed, civilian ownership is growing. Poor record-keeping and the near absence of reporting requirements for detailed information complicate assessments of global stockpiles of small arms and light weapons. When it comes to estimating civilian firearm ownership, differences in national gun culture - each country’s unique combination of historic and current sources of supply, laws and attitudes toward firearms ownership — often have distinct effects on the classification, ownership and perception of firearms. In addition, categories of firearm holders may overlap, as some individuals may use their private firearms at work as security guards, in armed groups, or in gangs.

Details: Geneva: Small Arms Survey. Graduate Institute of International and Development Studies, 2011. 4p.

Source: Internet Resource: Research Note No. 9: Accessed September 15, 2011 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-9.pdf

Year: 2011

Country: International

Keywords: Firearms and Crime

Shelf Number: 122739


Author: Rosenberg, Ruth

Title: Tackling the Demand that Fosters Human Trafficking: Final Report

Summary: Without demand for commercial sex and for products produced with forced labor the ability of persons to make vast amounts of money by enslaving others would be decreased. Despite the importance of reducing demand to combat trafficking in persons, there is a dearth of information about good practices in demand reduction. The USAID Europe and Eurasia Bureau’s Social Transition Team’s new publication, Tackling the Demand that Fosters Human Trafficking aims to begin to fill those gaps in knowledge. This new report analyzes information on demand for prostitution and inexpensive labor from the Europe and Eurasia region as well as countries around the world, and includes a variety of good practices in addressing the issue. Concrete ideas and tools detailed in the report will help policymakers and practitioners alike to integrate demand reduction activities into anti-trafficking and other relevant programming. Resources and tools discussed in the report include: analysis of legislation and its impact; education programs and curriculum for youth; guiding principles, handbooks, and other resources for businesses; product standards, certification, voluntary cooperation and codes of conduct; and information on trade unions and NGO activities and resources.

Details: Washington, DC: United STates Agency for International Development, 2011. 82p.

Source: Internet Resource: Accessed September 16, 2011 at: http://socialtransitions.kdid.org/sites/socialtransitions/files/resource/files/Tackling_the_Demand-_Final_8-29-11.pdf

Year: 2011

Country: International

Keywords: Human Trafficking

Shelf Number: 122650


Author: Long, Siân

Title: Protecting Children Affected by HIV Against Abuse, Exploitation, Violence, and Neglect.

Summary: This document is intended to explore strategies to protect orphans and vulnerable children (OVC) who were made so by HIV from abuse, exploitation, violence, and neglect. It draws from lessons learned by OVC program managers, designers, and policy developers — particularly those associated with the President’s Emergency Plan for AIDS Relief (PEFPAR). OVC are defined by the Joint U.N. Programme on HIV/AIDS, and the Hyde-Lantos Act that reauthorized PEPFAR, as “Children who have lost a parent to HIV, who are otherwise directly affected by the disease, or who live in areas of high HIV prevalence and may be vulnerable to the disease or its socioeconomic effects†(Lantos and Hyde 2008, 2-3). The international community defines children as individuals from birth up to 18 years of age. Current PEPFAR OVC programming guidance describes strategies to protect OVC as those that “confront the reality of stigma and social neglect faced by OVC as well as abuse and exploitation, including trafficking, the taking of inherited property, and land tenure, and helping children obtain birth certificates to legalize their status†(PEPFAR and the Office of the U.S. Global AIDS Coordinator 2006, 8). For the purposes of this document, discussion will focus on programs that aim to prevent and respond to abuse, neglect, exploitation, and violence. This document identifies gaps in current child protection strategies employed within PEPFAR OVC programs; introduces a range of emerging best practices or promising strategies for preventing and responding to child abuse, exploitation, and neglect; suggests contexts in which each strategy might be useful; outlines ways to measure the success of specific strategies; and provides a list of tools and resources available to program implementers and designers to support implementation of strategies.

Details: Arlington, VA: USAID’s AIDS Support and Technical Assistance Resources, AIDSTAR-One, Task Order 1, 2011. 62p.

Source: Internet Resource: Accessed September 16, 2011 at: http://www.aidstar-one.com/sites/default/files/ovc/reports/childprotection/AIDSTAR-One_Report_OVC_Child%20Protection.pdf

Year: 2011

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 122761


Author: Rodgers, Dennis

Title: Urban Violence Is not (Necessarily) a Way of Life: Towards a Political Economy of Conflict in Cities

Summary: As the world moves towards its so-called urban ‘tipping point’, urbanization in the global South has increasingly come to be portrayed as the portent of a dystopian future characterized by ever-mounting levels of anarchy and brutality. The association between cities, violence, and disorder is not new, however. In a classic article on… ‘Urbanism as a way of life’, Louis Wirth (1938: 23) famously links cities to ‘personal disorganization, mental breakdown, suicide, delinquency, crime, corruption, and disorder’. He does so on the grounds that the urban context constituted a space that naturally generated particular forms of social organization and collective action as a result of three key attributes: population size, density, and heterogeneity. Large numbers lead to a segmentation of human relations, the pre-eminence of secondary over primary social contact, and a utilitarianization of interpersonal relationships. Density produces increased competition, accelerates specialization, and engenders glaring contrasts that accentuate social friction. Heterogeneity induces more ramified and differentiated forms of social stratification, heightened individual mobility, and increased social fluidity. While large numbers, density, and heterogeneity can plausibly be considered universal features of cities, it is much less obvious that they necessarily lead to urban violence. This is a standpoint that is further reinforced by the fact that not all cities around the world – whether rapidly urbanizing or not – are violent, and taking off from Wirth’s characterization of the city, this paper therefore seeks to understand how and why under certain circumstances compact settlements of large numbers of heterogeneous individuals give rise to violence, while in others they don’t, focusing in particular on wider structural factors as seen through the specific lens of urban gang violence.

Details: Helsinki: United Nations University, World Institute for Development Economics Research, 2010. 14p.

Source: Internet Resource: Working Paper No. 2010/20: Accessed September 21, 2011 at: http://www.urbantippingpoint.org/documents/rodgers_wp2010_20.pdf

Year: 2010

Country: International

Keywords: Gangs

Shelf Number: 122801


Author: ECR Europe

Title: Packaging Design for Shrinkage Prevention

Summary: The purpose of this report is to provide guidance on how retailers and their suppliers can work together to identify and minimise the risk of shrinkage through the better design of product packaging. The fundamental role of packaging is to deliver every product to the consumer in perfect condition at minimum cost and environmental impact. However, in order to achieve this goal, retailers and manufacturers often face competing challenges and tensions concerning the way in which products should be packaged, not least relating to the growing needs for sustainability, the differing and frequently competing demands of various parts of the supply chain as well as the need to apply product protection devices. It is estimated that shrinkage costs the industry globally as much as €174 billion1, with a further €34.8 billion being spent on trying to respond to it. In addition, the knock-on effect on out of stocks and defensive merchandising could be costing another €17 billion a year. Taken together, if the average retailer could reduce their shrinkage by just 25 per cent they could see their profits grow through reduced costs and increased sales by as much as 18 per cent.

Details: Brussels: ECR Europe, 2010. 50p.

Source: Internet Resource: Accessed September 23, 2011 at: http://ecr-all.org

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 122883


Author: ECR Europe Shrinkage Group

Title: The Impact and Control of Shrinkage at Self-Scan Checkouts

Summary: This study aimed to contribute to the debate concerning the potential impact self-scan checkouts may have on retail shrinkage. It adopted a multi-method approach: retailer case studies, a survey of self-scan supervisors, and interviews with self-scan technology companies, loss prevention practitioners and product protection providers. Key findings are: • Limited evidence from the retail case studies suggested that the introduction of self-scan technologies had little or no impact on levels of shrinkage. One retailer found that manned checkouts operators are three times more likely to not scan an item than a customer using self scan. • A survey of 955 self-scan supervisors did not identify widespread concerns about customers abusing this system, with the majority not having caught anybody stealing through this method nor suggesting that the non-scanning of items was widespread. • The research identified the need for retailers to create ‘zones of control’ within which self-scan checkouts operate to ensure that potential thieves perceive it to be both difficult to steal and that it was highly likely that if they did offend, they would be caught. • These zones of control should be created through careful design (where possible creating a separate self-scan space, controlling the movement of customers and limiting means of entrance and exit) and generating overt forms of surveillance (supervisors and other staff constantly being highly visible and near to customers; the use of CCTV and public view monitors and technological monitoring through till-based alerts and alarms). • Where possible one supervisor should be responsible for a maximum of four self-scan checkouts – this maximises their ability to be vigilant and to effectively respond to customer queries and system alarms and alerts. • Certain elements of self-scan systems should be reviewed, including: o the number of alerts generated compared with the ability of staff to act as ‘guardians of control’; identification of products that persistently create scanning problems for customers (barcode not reading) and ameliorative action taken (either by the retailer or through negotiation with the product manufacturer); review of location of the receipt function; improved customer notification of change, including location of scoop; review of loose item description interface; and how discount vouchers are handled and verified. • Training of self-scan supervisors is critical – they need to be aware of the importance of maintaining vigilance and keeping in close proximity to customers. They also need to be aware of all the well-known self-scan scams. • The providers of product protection equipment need to work much more closely with the manufacturers of self-scan technologies to ensure that the current problems being experienced with devices such as EAS tags (false alarms because customers are not deactivating tags consistently) can be addressed. • There is a need for further research to understand the level of losses being experienced through traditional checkouts to better understand whether the levels of loss are similar or indeed higher than those occurring through self-scan checkouts. • The emerging nature of self-scan technology and the growing public acceptance of, and familiarity with, suggests that this subject should be reviewed in years to come to see if levels of abuse are the same level.

Details: Brussels: ECR Europe, 2011. 64p.

Source: Internet Resource: Accessed September 23, 2011 at: http://ecr-all.org

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 122884


Author: Clarke, L., Gilbertson, A., eds.

Title: Addressing Crime and Disorder in Public Places Through Planning and Design

Summary: Dealing with crime (including terrorism) and disorder in public places is high on the public’s agenda. However, consideration of the complex issues involved may only start when construction is complete and operation starts. At that point many issues will be considered by operators and facility managers/maintainers. If these issues are considered in the early design stage they can be incorporated into the design. This guide considers how the issues may be considered at the planning and design stages to assist a successful outcome in operation. The guide also provides easily accessed information about parties to be consulted and notes the complexity and interplay of the issues. Detailed information is provided about the issues and case study examples are included to demonstrate decision making in action.

Details: London: CIRIA, 2011. 82p.

Source: Internet Resource: CIRIA C710: Accessed September 23, 2011 at: http://www.ciria.org/service/Web_Site/AM/ContentManagerNet/ContentDisplay.aspx?Section=Web_Site&ContentID=20843 (summary only): full report: http://www.bcsc.org.uk/media/downloads/CIRIAC710-AddressingCrimeAndDisorder.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 122885


Author: Wei, Weixiao

Title: Online Child Sexual Abuse Content: The Development of a Comprehensive, Transferable International Internet Notice and Takedown System

Summary: This report establishes the value of an international ‘notice and takedown’ system, through the examination of the legislative and regulatory approaches in eight countries. The report found that there is compelling evidence that the ‘notice and takedown’ system already used in some countries is effective in removing child sexual abuse content at source, while still allowing law enforcement authorities to capture evidence for investigations aimed at prosecuting offenders and where possible, the rescue of child victims. The report makes recommendations on how these methods could be implemented internationally.

Details: Cambridge, UK: Internet Watch Foundation, 2011. 131p.

Source: Internet Resource: Accessed September 23, 2011 at:

Year: 2011

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 122886


Author: International Harm Reduction Association

Title: The Death Penalty for Drug Offences: Global Overview 2011 - Shared Responsibility & Shared Consequences

Summary: ‘Global Overview 2011 – Shared Responsibility and Shared Consequences’ is the fourth report on the death penalty for drug-related offences produced by Harm Reduction International. In addition to providing a survey of international developments related to capital drug laws around the world, it focuses on foreign nationals sentenced to death and/or executed for drug-related offences. The report demonstrates that every country in the world – whether it retains capital punishment or not – has a stake in the abolition of the death penalty. There are hundreds, if not thousands, of non-nationals who are facing or have faced the death penalty for drugs in recent years including citizens of Australia, France, Israel, Liberia, Mexico, Mongolia, The Netherlands, Nepal, Nigeria, Peru, The Philippines, Sweden, Turkey, United Kingdom, United States, Zambia and many more.

Details: London: Harm Reduction International, 2011. 42p.

Source: Internet Resource: Accessed September 26, 2011 at: http://www.ihra.net/contents/1080

Year: 2011

Country: International

Keywords: Capital Punishment

Shelf Number: 122905


Author: Pearson, Elaine

Title: Coercion in the Kidney Trade? A Backgrund Study on Trafficking in Human Organs Worldwide

Summary: Trafficking for the purpose of 'removal of organs' is identified as trafficking under the UN Trafficking Protocol definition. Despite the recent attention being paid to human trafficking, by donors, governments and non-governmental organisations, detailed and accurate information related to removal of organs is lacking, as are any programmes to combat organ trafficking. Is it because it is simply a sensational media story with little substance in fact? If we considered trafficking in a narrow way of only those cases of transporting someone with complete deception or forcing them to have an organ removed, then such cases occur but in a very small number. There is certainly a much more significant pattern of organ trafficking in terms of people being deceived and coerced into selling organs. Most consent to sell a kidney, but there is deception as to amount of payment for the kidney, and in some cases no payment at all. Consent may be obtained under varying degrees of coercion. Victims of kidney trafficking face not only the economic crises that caused them to consider selling their kidney in the first place but also ill health due to lack of information and lack of adequate health care. Kidney sellers are not supported to take legal action against traffickers; many are precluded from filing a criminal complaint as they unwittingly signed false affidavits saying they gave their kidney away. There are no statistics on the extent of kidney trafficking per se. Experts state, at a minimum, several thousand illegal kidney transplants from live unrelated donors take place every year. Some of this number, though not all, is trafficked. Regulation of commercial kidney sales is increasingly a topic of discussion as a means to deal with illegal organ sales and the resulting negative impact on donor-sellers, especially those who are trafficked in developing countries. This study looks at both arguments for and against regulation and the author concludes that effective regulation would require a system of free long-term health care for kidney sellers, thus placing an incredible financial burden on the State that developing countries could not bear. Secondly, it seems unlikely that a regulated trade could prevent organ trafficking, unless and until, issues of corruption are successfully dealt with. The link between human trafficking and organ trafficking has not been clearly established. Yet when one compares organ trafficking in terms of coerced sale of organs to trafficking in women for sex work, one can see there are some similarities. Both sets of 'survivors' frequently face stigmatisation and discrimination in home communities because of what they 'have done'. Moral arguments condemn outright the use of the body in that way, i.e. sale of sex or body part. Root causes of both types of trafficking is poverty and discrimination though gender discrimination may be less significant in relation to organ trafficking in some countries. Despite these similarities, arguments for and against legalisation of the sex or organ trade to combat trafficking cannot be equated. From available research in countries where organ trafficking is a problem, it seems that selling an organ does not improve one's economic position and for those living in poverty without access to medical care, does pose health concerns. These health concerns must be comprehensively addressed in any regulated system of organ 'sale'. If we accept that kidney trafficking in a small but significant problem, then measures should be taken against it in countries where such trafficking is known to exist. Such measures should focus on providing more information to potential kidney sellers so they are better informed regarding the risks and impacts of the procedure and of trafficking. Such sellers should know how to minimise negative impacts. Criminal laws should be amended so that brokers and medical staff involved in transplantation procedures are criminally responsible whilst donor-sellers are specifically free from criminal responsibility unless directly involved in trafficking others.3 Those who have sold kidneys should have access to information, legal, medical and social assistance including counselling. Organ trafficking remains an invisible 'trafficking' sector for existing anti-trafficking initiatives. It should not be so difficult to extend successful intervention activities for human trafficking to this new area and new target group, in countries where organ trafficking is a significant problem. The leading organisation specifically working to this issue, Organs Watch has conducted research on organ trade in twelve countries (Argentina, Brazil, Cuba, India, Iran, Israel/West Bank, Moldova/Romania, Philippines, Russia, Turkey, USA and South Africa). Based on that research, at least all of these countries can be seen to have a significant trafficking problem.

Details: Eschborn, Germany: Deutsche Gesellschaft für Technische Zusammenarbeit (GTZ) GmbH, 2004. 40p.

Source: Internet Resource: Accessed September 29, 2011 at: http://www.gtz.de/de/dokumente/en-organ-trafficking-2004.pdf

Year: 2004

Country: International

Keywords: Human Trafficking

Shelf Number: 122940


Author: ETH Zurick

Title: Problem-Analysis Report on Counterfeiting and Illicit Trade

Summary: Counterfeiting and product piracy constitute a serious and ever growing problem against legally run businesses and owners of intellectual property rights. Counterfeiting is not specific to any industry but it affects a large number of sectors such as the music, software, and luxury goods industries, and also pharmaceutical industry, automobile industry, fast moving consumer goods industry, and toys. According to the International Chamber of Commerce, “[c]ounterfeiting and piracy are growing exponentially in terms of volume, sophistication, range of goods, and countries affected - this has significant negative economic and social impact for governments, consumers and businesses [...].†Product counterfeiting has many victims: Different kinds of counterfeit products threaten the health and safety of end-users and consumers, sometimes with the most serious consequences. Legally run businesses and governments are affected by a number of direct and indirect economic losses which decreases the welfare of affected societies. By understanding and continuously surveying the problem and available countermeasures, however, companies can protect their products and mitigate the negative impacts and ensure the safety of consumers. In addition, alongside with the development of technologies that enable counterfeiting on an industry scale, technology also allows for novel countermeasures. Most importantly, mass-serialization is changing the way product information is managed by giving unique identities to individual items. One implication of this higher level of information granularity is that the physical security of products can be improved in terms of novel anti-counterfeiting techniques, as well as with the detection of illicit trade activities. The potential of RFID and the EPCnetwork in enabling these novel anti-counterfeiting and anti-fraud techniques is well recognized. Even though it seems that there will never be one silver bullet solution against illicit trade, industries and academia see mass-serialization among the most promising single countermeasures. There are two major reasons for using EPCnetwork technology in anti-counterfeiting: First, RFID allows for new, automated and secure ways to efficiently authenticate physical items. Secondly, as many companies invest in networked RFID technology for varying supply chain applications, the item-level data will be gathered in any case – so why not using it to find counterfeit products? This report will provide a problem analysis of product counterfeiting and illicit trade as a first step towards making use of the potential of networked RFID technology to counter the problem of illicit trade.

Details: Paris(?): BRIDGE (Building Radio Frequency IDentification for the Global Environment), 2007. 55p.

Source: Internet Resource: Accessed October 3, 2011 at: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20%20Anti-Counterfeiting%20Problem%20Analysis.pdf

Year: 2007

Country: International

Keywords: Consumer Fraud

Shelf Number: 122969


Author: ETH Zurich

Title: Anti-counterfeiting Requirements Report

Summary: This deliverable presents the requirements analysis for the anti-counterfeiting system that is under development in this work package. The envisaged system will authenticate products and it can be used to prevent counterfeit products from entering the distribution channel of genuine products. We define authentication of products as the verification of a product’s claimed identity. Because WP5 of the BRIDGE project is a business work package without a specific intended end-user company for the investigated anti-counterfeiting solution, this deliverable focuses on analyzing how potential technical solutions fit the requirements of anti-counterfeiting rather than on describing a list of requirements of a specific system. Interviews with different industries revealed that the end-users of the product authentication system, that is companies affected by product counterfeiting, need a fast and reliable online check that could be used by all business partners and for different kinds of products. Companies would also like to have the RFID-based product authentication system to be closely linked to other services, for instance to support supply chain management activities. Different industries have different requirements regarding the specific use of the RFID-based product authentication system. These requirements mostly relate to how the RFID tags are integrated into the products, what kind of RFID tags should be used, and how the tags are read. The level of security in RFID-based product authentication systems is an important cost factor because a higher level of security is achieved by cryptographic RFID tags that are more expensive than the common RFID tags. Overall, companies desire a secure and inexpensive system but find it hard to precisely specify the required level of security. Interviews with customs revealed that having a standard solution that can be used to authenticate different products is of primary importance for them. According to the interviews, customs officers would most benefit from a system that could be used to authenticate suspicious products with mobile devices. Analysis of functional security requirements of product authentication in general shows that there are three distinct approaches to authenticate products, depending on how the tag cloning attack is mitigated. Tag cloning attack refers to copying a genuine product’s ID number onto another tag that is attached to a counterfeit product. These approaches are: tag authentication (i.e. use of cryptographic tags), location-based authentication (i.e. track and trace based plausibility check), and authentication based on object-specific security features (i.e. product’s physical fingerprint). We have identified several solution concepts to to authenticate RFID-tagged products in the EPC network. Analysis of the current EPC network’s conformance to the identified requirements revealed that the network’s support for the detection of cloned tags is far from optimal and should be improved by an automated analysis of the track and trace data of the product’s locations. Completely automated product authentication check (instead of such that relies on users of the system analyzing the traces of products by themselves) is furthermore required by the industries as well as customs. Therefore in the future steps of this work package we will opt for the development of a track and trace based product authentication system that automatically detects the cloned tags. The goal of this work package is to study how the existing RFID and EPC technologies can be applied to anti-counterfeiting. Hence, the development of completely new technical solutions such as novel cryptographic tag authentication protocols is out of the scope of work package. The technical contribution of this work package will focus on application areas of the existing techniques, such as how to use the RFID track and trace data to detect cloned tags.

Details: Paris(?): BRIDGE (Building Radio frequency IDentification for the Global Environment), 2007. 85p.

Source: Internet Resource: Accessed October 3, 2011 at: http://www.bridge-project.eu/data/File/BRIDGE%20WP05%20Anti-Counterfeiting%20Requirements%20Report.pdf

Year: 2007

Country: International

Keywords: Consumer Fraud

Shelf Number: 122978


Author: KPMG

Title: Global Anti-Money Laundering Survey 2011

Summary: This latest Anti-Money Laundering (AML) survey explores where AML fits into the changing risk and regulatory landscape facing the financial sector. It reports the views of the survey participants on their areas of focus and challenge, and also contains commentary from KPMG on what our client work in this space tells us. The highlights of the survey include the following: AML is still on the radar of many banks’ leadership, but is being squeezed by other priorities. AML continues to be a significant and rising expense for banks, but many under-estimate how much it costs. PEPs and sanctions are a major focus for banks and governments alike, however both are far from straightforward to get to grips with. Transaction monitoring policies and systems are generally seen as satisfactory, but with plenty of room for improvement. KYC data is generally collected and updated both robustly and regularly, but there is great variation in the approach used.

Details: London: KPMG, 2011. 76 p.

Source: Internet Resource: Accessed October 4, 2011 at: http://www.kpmg.com/RU/ru/IssuesAndInsights/ArticlesPublications/Documents/AML%20Survey%202011.pdf

Year: 2011

Country: International

Keywords: Financial Crimes

Shelf Number: 122982


Author: Wood, Jennifer: Swanson, Jeffrey

Title: Police Interventions with Persons Affected by Mental Illnesses: A Critical Review of Global Thinking and Practice

Summary: Mental illness and substance abuse disorders constitute a global public health problem of enormous proportions. International epidemiological studies estimate that nearly 25% of the world’s population suffers from a diagnosable psychiatric or addiction disorder at some time in their lives, and mental illnesses are the leading cause of disability in the United States (US), Canada, and Europe (World Health Organization [WHO], 2001). In the US, approximately 6% of adults at any given time meet criteria for a serious mental illness that interferes with at least one important activity of daily living (Kessler et al., 1996). Moreover, mental health and substance abuse problems often overlap, as nearly 30% of people with a mental illness also have an addiction disorder (Regier et al., 1990). Until recent decades, large numbers of people who suffered from chronic, severe, and disabling mental illnesses such as schizophrenia and bipolar disorder were interned in public psychiatric hospitals for lengthy periods—often against their will and sometimes for life. In the US, by the middle of the 20th century approximately 500,000 people were confined to public mental hospitals and receiving mainly custodial care (Appelbaum, 1994). Beginning in the 1960s, however, a massive process of ‘deinstitutionalization’ unfolded and today there are fewer than 50,000 people in these institutions (Manderscheid, Atay, & Crider, 2009). Shortly after the ‘deinstitutionalization period,’ the US embarked on a quite different project of social control through incarceration. Between 1982 and 2007, the population of prisons and jails rose from 612,000 to 2.3 million (Pew Charitable Trusts, 2009). The increase in people held in correctional institutions has been accompanied by a similar rise in the number of people living in the community on probation and parole, now more than 5.1 million (Pew Charitable Trusts, 2009). To an unfortunate extent, ‘deinstitutionalization’ from the mental health system led to ‘reinstitutionalization’ through criminal justice. Indeed, there are now more people with serious mental disorders to be found in the largest US city jails than in any psychiatric hospital (Frank & McGuire, in press; Torrey, 1995). The historic demise of ‘the asylum’ was driven by a combination of legal and fiscal reforms, advances in pharmacotherapy, and a shift in therapeutic ideology in favor of community-based care and recovery for people with psychiatric disabilities. However, the closing of large public mental hospitals proved far easier than replacing them with an effective system of care and support in the community. The promise of definitive treatment or cure with better medications ‘just around the corner’ remains elusive. Persons with ongoing, disabling psychiatric conditions now reside in every community. A small, but visible, proportion of persons with serious mental illnesses revolve in and out of acute psychiatric hospitals, are chronically unemployed, are sometimes homeless, and are frequently involved with the police and the criminal justice system. Developing and implementing cost-effective interventions to improve the lives of people with serious mental illnesses in the community remains a challenge for multiple, interfacing service systems, from public health to social welfare to law enforcement, the courts, and corrections. This monograph aims to shed light on one key component of these systems — policing — and specifically the role of police officers in the community as front-line workers who often come into contact with persons with mental illnesses and must respond to their needs with whatever tools lie at hand. We focus on the contexts of the US, Canada, Australia and the United Kingdom (UK), all of which are experiencing similar core challenges facing policing in the 21st century, especially in relation to providing effective responses to persons with mental illnesses. There are numerous questions that face the field: How do police manage their multiple, and sometimes conflicting roles in their encounters with persons with mental illnesses? To what extent are police organizations ‘accepting’ and trying to manage this unsought role? What are the current and forward-looking models of training and support for police officers in this work? How effective are these approaches —particularly in times of severe fiscal constraint in public systems—and what evidence is lacking in order to develop better and more cost-effective interventions in the future? We address these questions in this monograph and argue that there is a considerable convergence in thinking around the importance of police in more effectively managing encounters with persons in crisis. Police-led and co-response (police and mental health) crisis intervention models are especially dominant, and have diffused across the globe with great speed.

Details: New Brunswick, NJ: Center for Behavioral Health Services & Criminal Justice Research, Rutgers University, 2011. 58p.

Source: Internet Resource: Accessed October 4, 2011 at: http://www.temple.edu/cj/people/documents/Monograph_March_2011.pdf

Year: 2011

Country: International

Keywords: Mental Health

Shelf Number: 122986


Author: Loots, Lizle

Title: Global Review of National Prevention Policies

Summary: This review involves an analysis of literature on risk factors and social dynamics underpinning rape and critique of best practice in rape prevention policy internationally. Over 140 National policies and action plans from 110 different countries are currently being reviewed to identify gaps in government prevention efforts. This review is being undertaken internally by the SVRI secretariat. This review will be used to identify and address the critical areas that need to be a focus of attention in developing evidence-based strategies and national policies. On completion of this review, a workshop will be convened with multi-sectoral invitees from Government, as well as researchers and representatives from non-governmental organisations. The review will be presented at the workshop and at least two other stakeholders in the field will be asked to present, including responding to the review and to discuss its policy implications. This review will ultimately contribute towards shifting the policy arena in the area and honing of the research agenda on preventing rape.

Details: Pretoria, South Africa: Sexual Violence Research Initiative; South African Medical Research Council, 2011. 28p.

Source: Internet Resource: Accessed Ocboer 6, 2011 at: http://www.svri.org/GlobalReview.pdf

Year: 2011

Country: International

Keywords: Rape

Shelf Number: 122997


Author: McCloskey, Laura A.

Title: A Systematic Review of Parenting Interventions To Prevent Child Abuse Tested with RCT Designs in High Income Countries

Summary: This review aims to answer the following question: Are parenting interventions in low- and middle-income countries effective at reducing harsh and abusive parenting, increasing positive parenting behaviours, improving parent–child relationships or reducing child conduct problems? It will provide an overview of the broad issue of child abuse and neglect and the types of parent- or primary carer-focused interventions which either explicitly or implicitly aim to prevent them. It will include conclusions from high-quality systematic reviews of reviews of interventions from high-income countries; information about interventions with a strong evidence base in high-income countries, which have been implemented but not rigorously trialed in low- or middle-income countries; and discussion about the ‘active ingredients’ of evidence-based parenting interventions that have been shown to prevent or reduce abuse and neglect. In addition the review will analyse and discuss issues related to effective cultural adaptation of parenting interventions from one setting or population to another, and will also include a brief case study of an intervention from a middle- or low-income country, or an intervention with a strong evidence base from a high-income country which has been implemented but not trialed in a low- or middle-income country.

Details: Pretoria, South Africa: Sexual Violence Research Initiative, 2011. 56p.

Source: Internet Resource: Accessed October 6, 2011 at: http://www.svri.org/systematicreviewParent.pdf

Year: 2011

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 122998


Author: Ricardo, Christine

Title: Men, Masculinities, Sexual Exploitation and Sexual Violence: A Literature Review and Call for Action

Summary: This paper explores possible linkages between masculinities and different forms of sexual exploitation and sexual violence. Specifically, it seeks to answer the question: How do prevailing norms and views of manhood, or masculinities, contribute to some men’s use of sexual violence, and the “demand-side†of sexual exploitation? We critically review existing literature on the topic, with a particular focus on recommendations for action. From what we know about how prevailing gender norms contribute to some men’s use of sexual violence and sexually exploitative practices, what can we propose to reduce sexual exploitation by working with men and boys to question salient gender norms that drive the demand? In terms of programs to reach men and boys on this issue there are a few examples – some which address sexual exploitation specifically, others which address questions of masculinities and gender equality more broadly. However, most of these projects have been small-scale, and with little impact evaluation to date. There are also examples of policies that have incorporated an understanding of the demand side of sexual exploitation and the need to move beyond a mostly punitive model toward a more comprehensive one that includes sanctions as well as preventive approaches, such as engaging men and boys with messages that question sexual exploitation and the “commodification†of women and girls (and boys and men). Overall, we affirm the need to increase attention and action to engage men and boys in questioning and overcoming gender norms that contribute to sexual violence and exploitation.

Details: Rio de Janeiro, Brazil: Promunda and MenEngage, 2008. 55p.

Source: Internet Resource: Accessed October 6, 2011 at: http://www.promundo.org.br/wp-content/uploads/2010/03/Homens-Masculinidades-Explora%C3%A7%C3%A3o-Sexual-e-Viol%C3%AAncia-Sexual-ING.pdf

Year: 2008

Country: International

Keywords: Gender

Shelf Number: 122999


Author: United Nations Office on Drugs and Crime

Title: Global Study on Homicide: Trends, Contexts, Data

Summary: The UNODC 2011 Global Study on Homicide brings together global, regional, national and subnational homicide data in one publication. It is hoped that the data and analysis of the most violent crime against the person will assist global efforts to design evidence-based policies to prevent and reduce crime in those areas and population groups where violence is most acute. This study was made possible because of increased efforts by countries to produce and share good quality homicide data. However, homicide data remain far from perfect—indeed, the study draws attention to the large geographic and thematic data gaps in many regions of the world—and comparisons should always be made with caution. This is also true because legal systems and practices, as well as capacities in reporting intentional homicide, can vary significantly between countries and regions. Nevertheless, there are a number of key messages that may be derived from the wealth of data in this study. First, there is a clear link between violent crime and development: crime hampers poor human and economic development; this, in turn, fosters crime. Improvements to social and economic conditions go hand in hand with the reduction of violent crime. The development agenda must also include crime prevention policies and the enhancement of the rule of law at both national and international level. Reducing violent crime should also be a priority for achieving the Millennium Development Goals, particularly in those countries where crime is disproportionally high. The study also represents an important advance in our understanding of the trends and patterns of homicide. One of the most important considerations is the recognition that different factors drive violent crime rates and trends. In some regions, organized crime, drug trafficking and the violent cultures of youth gangs are predominantly responsible for the high levels of homicide; while in others, killings connected to intimate partner and family-related violence account for an important share of homicides. Although it is important to understand that the sharp increase in homicides in some countries, particularly in Central America, are making the activities of organized crime and drug trafficking more visible, it should not be assumed that organized crime is not active in other regions as well. Another aspect is the role played by firearms in violent crime. It is crucial that measures to prevent crime should include policies towards the ratification and implementation of the UN Firearm protocol. Domestic policies in furtherance of the Protocol’s provision can help avoid the diversion of firearms to fuel violence and increase homicides. Knowledge of the patterns and causes of violent crime are crucial to forming preventive strategies. Young males are the group most affected by violent crime in all regions, particularly in the Americas. Yet women of all ages are the victims of intimate partner and family-related violence in all regions and countries. Indeed, in many of them, it is within the home where a woman is most likely to be killed.

Details: Vienna: UNODC, 2011. 128p.

Source: Internet Resource: Accessed october 7, 2011 at: http://www.unodc.org/documents/data-and-analysis/statistics/Homicide/Globa_study_on_homicide_2011_web.pdf

Year: 2011

Country: International

Keywords: Crime Statistics

Shelf Number: 123002


Author: Covell, Katherine

Title: Five Years On: A Global Update on Violence Against Children

Summary: In 2001, the UN General Assembly, acting on the recommendation of the Committee on the Rights of the Child, requested the UN Secretary-General to undertake an in-depth study on violence against children. The Study provided the first global report on the extent, causes, and effects of violence against children — in the home, the school, institutions, the workplace, and the community. It was also the first United Nations report to be based on widespread collaboration among the OHCHR, UNICEF, the WHO, non-governmental organizations, national human rights institutions, and direct consultation with children themselves. The report found that millions of children across the world were victims of sexual, physical and/or, emotional violence, many on a daily basis. Societal acceptance of violence against children appeared to be the norm and to be a key obstacle to its elimination. The UN Study put forward 12 overarching recommendations for action. It urged states and other stakeholders to strengthen international, national, and local commitments to end violence against children; to prohibit all violence against children in national law; to promote non-violent values and awareness raising; to enhance the capacity of those who work with or for children; to ensure accountability and end impunity; and to take a range of other actions to prevent violence against children and to respond to it effectively if it occurs. The ultimate goal of the recommendations was to establish conditions that would end all forms of violence against all children. The UN Study concluded, “No violence against children is justifiable; all violence against children is preventable.†When the report of the UN Secretary-General’s Study on Violence against Children (UN Study) was presented in 2006, it revealed that despite extensive international human rights obligations, children globally experience staggering levels of violence. The magnitude of violence against children documented by the UN Study represented an urgent call to action, and the Study presented clear and concrete recommendations on how states should respond. Five years later, we find that violence, including severe violence, continues against millions of children globally. There has been some progress on some of the Study’s recommendations – but concerted action to prohibit and eliminate violence against children is as urgently needed today as when the report was submitted to the General Assembly (GA) in 2006.

Details: NGO Advisory Council, 2011. 58p.

Source: Internet Resource: Accessed October 18, 2011 at: http://www.crin.org/docs/Five_Years_On.pdf

Year: 2011

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 123050


Author: Stewart, James G.

Title: Corporate War Crimes: Prosecuting Pillage of Natural Resources

Summary: Pillage means theft during war. Although the prohibition against pillage dates to the Roman Empire, pillaging is a modern war crime that can be enforced before international and domestic criminal courts. Following World War II, several businessmen were convicted for commercial pillage of natural resources. And although pillage has been prosecuted in recent years, commercial actors are seldom held accountable for their role in fuelling conflict. Reviving corporate liability for pillaging natural resources is not simply about protecting property rights during conflict — it can also play a significant role in preventing atrocity. Since the end of the Cold War, the illegal exploitation of natural resources has become a prevalent means of financing conflict. In countries including Angola, the Democratic Republic of the Congo, East Timor, Iraq, Liberia, Myanmar, and Sierra Leone, the illicit trade in natural resources has not only created incentives for violence, but has also furnished warring parties with the finances necessary to sustain some of the most brutal hostilities in recent history. In Corporate War Crimes, available below in its second edition, law professor James G. Stewart offers a roadmap of the law governing pillage as applied to the illegal exploitation of natural resources by corporations and their officers. The text traces the evolution of the prohibition against pillage from its earliest forms through the Nuremburg trials to today’s national laws and international treaties. In doing so, Stewart provides a long-awaited blueprint for prosecuting corporate plunder during war. Corporate War Crimes seeks to guide investigative bodies, war crimes prosecutors, and judges engaged with the technicalities of pillage. It should also be useful for advocates, political institutions, and companies interested in curbing resource wars.

Details: New York: Open Society Institute, 2011. 162p.

Source: Internet Resource: Accessed October 20, 2011 at: http://www.soros.org/initiatives/justice/articles_publications/publications/pillage-manual-20101025/pillage-manual-2nd-edition-2011.pdf

Year: 2011

Country: International

Keywords: Archaeological Thefts

Shelf Number: 123066


Author: Szelp, Attila

Title: Cargo Security Initiatives in the EU and the USA, their Impact on Business Operations and Mutual Recognition with Focus on AEO and C-TPAT

Summary: The terrorist attacks of September 11, 2001 had a tremendous impact on international trade policy. The USA was the first country to introduce cargo security and facilitation measures as a counteraction. The EU and international organizations also established new security programs in order to better secure cargo movements across borders. This thesis gives an overview of security initiatives introduced by international organizations, the EU and the USA, with an emphasis on the trade facilitation programs Authorised Economic Operator (AEO) and Customs-Trade Partnership against Terrorism (C-TPAT) and a comparison of them. The process towards mutual recognition of these programs is then described. Three case studies put the topic under the microscope: The perception as well as actual benefits and disadvantages from economic actors' points of view are presented and implementation and operational processes in companies are demonstrated. The case studies include port authorities, carriers and logistics providers. Finally, the author reflects on his findings.

Details: Vienna: WU Vienna University of Economics and Business, Institut für Transportwirtschaft und Logistik, 2010. 132p.

Source: Internet Resource: Thesis: Accessed October 21, 2011 at: http://epub.wu.ac.at/3013/1/Szelp.pdf

Year: 2010

Country: International

Keywords: Cargo Security

Shelf Number: 123074


Author: Jolliffe, Darrick

Title: A Systematic Review of the National and International Evidence on the Effectiveness of Interventions with Violent Offenders

Summary: A systematic review is a scientifically rigorous form of literature review which uses robust and replicable methods for locating, appraising and synthesising evidence from prior studies. This systematic review identified and obtained available evidence from previous evaluations which assessed the effectiveness of interventions with violent offenders. The review was commissioned to provide a comprehensive overview of the available evidence to inform policy on the commissioning of prison and probation services and was not designed specifically to evaluate National Offender Management Service (NOMS) or Her Majesty’s Prison Service (HMPS) programmes. It therefore captured evaluations of a broad range of interventions and programmes run in a number of different countries. When combining results from the obtained studies the review indicated that, overall, interventions with violent offenders were successful at reducing general and violent re-offending. The review identified elements of programmes and interventions (such as the content of the intervention and the delivery of the intervention) which were associated with a reduction in re-offending. As NOMS and HMPS currently provide interventions for violent offenders which incorporate elements identified as effective, this research indicates that the programmes and policies used by NOMS and HMPS are in line with the current evidence base. A relatively small number of high quality studies were identified. This limits the generalisability of the findings and suggests that more high quality evaluations (such as randomised control trials) of interventions for violent offenders need to be conducted to establish what works best and for whom.

Details: London: Ministry of Justice, Research, Development and Statistics, 2007. 38p.

Source: Internet Resource: Ministry of Justice Research Series 16/07: Accessed October 21, 2011 at: http://www.justice.gov.uk/publications/docs/review-evidence-violent.pdf

Year: 2007

Country: International

Keywords: Offender Rehabilitation

Shelf Number: 123077


Author: di Martino, Vittorio

Title: Workplace Violence in the Health Sector: Country Case Studies: Brazil, Bulgaria, Lebanon, Portugal, South Africa, Thailand, and an Additional Australian Study

Summary: Violence at work has become an alarming phenomenon worldwide. The real size of the problem is largely unknown and recent information shows that the current knowledge is only the tip of the iceberg. The enormous cost of violence at work for the individual, the workplace and the community at large is becoming more and more apparent. Although incidents of violence are known to occur in all work environments, some employment sectors are particularly exposed to it. Violence includes both physical and non-physical violence. Violence is defined as being destructive towards another person. It finds its expression in physical assault, homicide, verbal abuse, bullying, sexual harassment and threat. Violence at work is often considered to be just a reflection of the more general and increasing phenomenon of violence in many areas of social life which has to be dealt with at the level of the whole society. Its prevalence has, however, increased at the workplace, traditionally viewed as a violence-free environment. Employers and workers are equally interested in the prevention of violence at the workplace. Society at large has a stake in preventing violence spreading to working life and recognizing the potential of the workplace by removing such obstacles to productivity, development and peace. Violence is common to such an extent among workers who have direct contact with people in distress, that it may be considered an inevitable part of the job. This is often the case in the health sector (violence in this sector may constitute almost a quarter of all violence at work). 1 While ambulance staff are reported to be at greatest risk, nurses are three times more likely on average to experience violence in the workplace than other occupational groups. Since the large majority of the health workforce is female, the gender dimension of the problem is very evident. Besides concern about the human right of health workers to have a decent work environment, there is concern about the consequences of violence at work. These have a significant impact on the effectiveness of health systems, particularly in developing countries. The equal access of people to primary health care is endangered if a scarce human resource, the health workers, feel under threat in certain geographical and social environments, in situations of general conflict, in work situations where transport to work, shift work and other health sector specific conditions make them particularly vulnerable to violence. In such situations the best educational system, labour market policies and workforce planning may have little or no impact. The International Labour Office (ILO), the International Council of Nurses (ICN), the World Health Organization (WHO) and Public Services International (PSI) launched in 2000 a joint programme in order to develop sound policies and practical approaches for the prevention and elimination of violence in the health sector. When the programme was first established and information gaps were identified, it was decided to launch a number of country studies as well as cross-cutting theme studies and to conclude by drafting guidelines to address workplace violence in the health sector. This working paper presents the Synthesis Report of the commissioned country reports to stimulate further discussion in the area of workplace violence, encourage fact-finding research in other countries and support sound policy-making. Country reports are available for the following countries: Brazil, Bulgaria, Lebanon, Portugal, South Africa, Thailand and Australia

Details: Geneva: International Labour Organization, 2003. v.p.

Source: Internet Resource: Accessed October 26, 2011 at: http://www.hrhresourcecenter.org/node/29

Year: 2003

Country: International

Keywords: Violence in the Workplace

Shelf Number: 117334


Author: de Willebois, Emile van der Does

Title: The Puppet Masters: How the Corrupt Use Legal Structures to Hide Stolen Assets and What to Do About It

Summary: Corruption is estimated to be at least a $40 billion dollar a year business. Every day, funds destined for schools, healthcare, and infrastructure in the world’s most fragile economies are siphoned off and stashed away in the world’s financial centers and tax havens. Corruption, like a disease, is eating away at the foundation of people’s faith in government. It undermines the stability and security of nations. So it is a development challenge in more ways than one: it directly affects development assistance, but it also undermines the preconditions for growth and equity. This report, The Puppet Masters, deals with the corporate and financial structures that form the building blocks of hidden money trails. In particular, it focuses on the ease with which corrupt actors hide their interests behind a corporate veil and the difficulties investigators face in trying to lift that veil. It serves as a powerful reminder that recovering the proceeds of corruption is a collective responsibility that involves both the public and private sector. Law enforcement and prosecution cannot go after stolen assets, confiscate and then return them if they are hidden behind the corporate veil. All financial centers and developed countries have committed, through the UN Convention against Corruption and international anti-money laundering and countering the financing of terrorism standards, to improving the transparency of legal entities and other arrangements. This StAR report provides evidence of how far we still have to go to make these commitments a reality. Narrowing the gap between stated commitments and practice on the ground has a direct impact on actual recovery of assets.

Details: Washington, DC: The International Bank for Reconstruction and Development / The World Bank, 2011. 284p.

Source: Internet Resource: Accessed October 26, 2011 at: http://www1.worldbank.org/finance/star_site/documents/Puppet%20Masters%20Report.pdf

Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 123150


Author: United Nations Office on Drugs and Crime

Title: Estimating Illicit Financial Flows Resulting from Drug Trafficking and other Transnational Organized Crimes: Research Report

Summary: “Always follow the money†has been sound advice in law enforcement and political circles for decades. Nevertheless, tracking the flows of illicit funds generated by drug trafficking and organized crime and analysing the magnitude and the extent to which these are laundered through the world’s financial systems remain daunting tasks. UNODC’s research report, Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes, attempts to shed light on the total amounts likely to be laundered across the globe, as well as the potential attractiveness of various locations to those who launder money. As with all such reports, however, the final monetary estimates are to be treated with caution. Further research and more systematic collection of data on this topic are clearly required. Prior to this report, perhaps the most widely quoted figure for the extent of money-laundering was the IMF’s ‘consensus range’ of between 2-5 per cent of global GDP, made public in 1998. A study-of-studies, or metaanalysis, conducted for this report, suggests that all criminal proceeds are likely to have amounted to some 3.6 per cent of GDP (2.3 - 5.5 per cent) or around US$2.1 trillion in 2009. The resulting best estimate of the amounts available for money-laundering would be within the IMF’s original ‘consensus range’, equivalent to some 2.7 per cent of global GDP (2.1 – 4 per cent) or US$1.6 trillion in 2009. From this figure, money flows related to transnational organized crime activities represent the equivalent of some 1.5 per cent of global GDP, 70 per cent of which would have been available for laundering through the financial system. The largest income for transnational organized crime seems to come from illicit drugs, accounting for a fifth of all crime proceeds. Research in the area of illicit financial flows generated by one key transnational organized crime sector, the global market for cocaine, was also conducted for this report. The gross profits out of cocaine sales (totaling US$85 billion) were estimated at US$84 billion for the year 2009, compared with about US$1 billion earned by the farmers in the Andean region. Most of the gross profits (retail and wholesale) were generated in North America (US$35 billion) and in West and Central Europe (US$26 billion). The report also reminds us that, contrary to the common misperception that money is neither good nor bad, investments of ‘dirty money’ into licit economies can create problems ranging from distortions of resource allocation to the “crowding out†of licit sectors. In some cases, the influx of tainted money undermines the reputations of local institutions. Significantly, these investments can hamper investment and economic growth. While the situation is less clear for financial centers receiving illicit funds, the long-term consequences may be negative if they fail to actively fight money-laundering. Research also indicates that the socio-economic costs related to drug abuse are twice as high as the illicit income generated by drug trafficking. Indeed, in some countries (for example, the United States and the United Kingdom) the ratio is 3:1. This report argues that the severest consequence of criminal funding is that they perpetuate and promote criminal activities, creating a cycle of organized criminal activity and drug trafficking that leeches off societies. Less than 1 per cent of global illicit financial flows are currently seized and frozen. UNODC’s challenge is to work within the UN system and with Member States to help build the capacity to track and prevent money laundering, strengthen the rule of law and prevent these funds from creating further suffering.

Details: Vienna: UNODC, 2011. 140p.

Source: Internet Resource: Accessed October 29, 2011 at: http://www.unodc.org/documents/data-and-analysis/Studies/Illicit_financial_flows_2011_web.pdf

Year: 2011

Country: International

Keywords: Drug Trafficking

Shelf Number: 123169


Author: University of California, San Francisco. Center for Tobacco Control Research and Education

Title: The Cigarette "Transit" Road to the Islamic Republic of Iran and Iraq: Illicit Tobacco Trade in the Middle East

Summary: • The issue of cigarette smuggling is now high on the agenda of governments and international organizations. It has been estimated that a third of internationally exported cigarettes are lost to smuggling. Total revenue lost by governments due to cigarette smuggling is estimated at US$ 25–30 000 million annually. • Studies of the impact of smuggling show that when smuggled cigarettes account for a high percentage of the total sold, the average price for all cigarettes, taxed and untaxed, will fall, increasing sales of cigarettes overall. • The cigarette companies often blame organized crime for the massive amount of cigarette smuggling worldwide, but much of the organized criminal smuggling that accounts for the vast majority of cigarette smuggling worldwide has occurred with the knowledge of the major cigarette companies themselves, and would not occur without the cigarette companies’ compliance. • In the Middle East, the two main target markets for international tobacco companies are the Islamic Republic of Iran and Iraq. Both the Islamic Republic of Iran and Iraq represent huge possibilities for international cigarette companies. Indeed, tobacco trade journals, internal tobacco industry documents and documents filed in legal actions make the importance placed on both countries by the entire tobacco industry very clear. • According to trade journals, Cyprus is an important distribution point for American cigarettes going to the Islamic Republic of Iran through traders in Oman. At the same time, some of these cigarettes are sold to traders in Turkey who take them into Iraq. Beirut’s imported cigarettes are distributed to traders and merchants in various countries in the Middle East and North Africa. It appears that the major customers for cigarettes distributed from Lebanon are the Islamic Republic of Iran and Iraq. From Beirut to Dubai or Oman and then on to the Islamic Republic of Iran is the path of some of the American cigarettes destined for Lebanon. Trucks now carry cargo through the Syrian Arab Republic to reach the open-air markets in Iraq. • In their legal action against several international tobacco companies, the European Union (EU) filed in January 2002 documents on cigarette smuggling into Iraq showing that since the early 1990s, American tobacco companies have distributed their products from the United States into Iraq. For example, cigarettes produced in the United States have been shipped to and through ports in the EU to companies in Cyprus for years. Indeed, since 1996, approximately 50 billion cigarettes have been sent by RJ Reynolds Tobacco Company (RJR) (and its successor, Japan Tobacco) to Cyprus. Approximately half of these shipments were exported from Cyprus to Turkey in transit. Many of these shipments were destined for Iraq. • On 30 October 2002, the EU and ten Member States launched another lawsuit against RJR. The new EU lawsuit goes far beyond any previous allegations, accusing RJR of direct complicity in facilitating not only money laundering schemes but also other criminal enterprises. Allegations on cigarette smuggling into Iraq were even more detailed. • The EU allegations on smuggling in Iraq are in line with the well known methods of the cigarette smuggling scheme: – Exports of billion of cigarettes from major tobacco manufacturers. – Complex transport routes in order to complicate investigations. – Off-loading and re-loading of containers and removing marks and numbers from products to prevent their being traced. – Frequently switched bank accounts to cover up actions. – Operations led from Switzerland, a country protected by bank secrecy and business privacy laws. – Offshore companies located in Liechtenstein. – Use of tax-free harbours such as Mersin in Turkey. • Internal tobacco industry documents describe in great detail the monitoring of smuggling operations and the illegal character of the transit (smuggling) trade in Lebanon and the Syrian Arab Republic. Several documents stipulate that it is unwise for the tobacco companies to have direct links with the transit trade. • The objective of each company is to sell more products and make higher profits. Penetrating new markets and increasing the market share of its products is part of the strategy to achieve this objective. An obstacle for multinational tobacco companies are trade restrictions and/or embargoes. Some markets are closed to foreign companies or allow imported cigarettes only under certain strict conditions. Where there are high tariffs or a state monopoly, international cigarettes will be smuggled into the country, weakening the position of the state monopoly and delivering the market into the hands of the multinationals. • While illegal imports may be an option in order to penetrate a market, the ultimate goal in the long term is to obtain official imports or production. The strategy of the international tobacco companies in the Islamic Republic of Iran became a success story in 2002, when the state tobacco authority signed an import and production deal with four cigarette companies in a bid to cut down cigarette smuggling. It is a clear example of how successful this strategy of international tobacco companies can be. The stages of the strategy are: 1. Penetrate the market through illegal imports. 2. Weaken the state monopoly by reducing the market share of domestic brands and legal sales. 3. Convince the authorities to privatize or to open the market. 4. Authorize the legal import and/or production of foreign brands. 5. Stop fuelling the illegal market and take over the market in a legal way. • If tobacco smuggling is to be tackled successfully it will require international collaboration. The likeliest mechanism for achieving this is the WHO Framework Convention on Tobacco Control (FCTC). In the text of the FCTC, article 15 deals with illicit trade of tobacco products, including markings, monitoring, data collection, cooperation, penalties, confiscation and licensing. • Manufacturers should be required to have covert and overt markings on all packages of tobacco products that would identify manufacturer, date and location of manufacture, and another identifier that would show the chain of custody—wholesaler, exporter, distributor and end market. The onus should be placed on the manufacturer (through record keeping, and tracing and tracking systems) to prove that the cigarettes that leave the factory arrive in their intended end market. • The way to combat smuggling is not to reduce taxes, but rather to control the supply of illegal cigarettes.

Details: Cairo: World Health Organization, Regional Office for the Eastern Mediterranean Cairo, 2003. 32p.

Source: Internet Resource: WHO Tobacco Control Papers: Accessed October 29, 2011 at: http://www.emro.who.int/tfi/TFIiraniraq.pdf

Year: 2003

Country: International

Keywords: Illegal Cigarettes

Shelf Number: 123177


Author: van Vliet, Nathalie

Title: Livelihood Alternatives for the Unsustainable Use of Bushmeat

Summary: The scale of current hunting is a serious threat to many forest species and ecosystems across the world. This threatens both people and the biodiversity they rely upon. The meat of wild animals has long been a part of the staple diet of forest dwelling peoples and remains a primary source of animal protein for the majority of forest families. Increasingly it can also constitute a significant source of revenue particularly where the trade is driven by increased bushmeat consumption in urban areas. In some areas bushmeat also plays a role in the cultural and spiritual identity of indigenous peoples. Acquisition of animal parts as cultural artefacts, for personal adornment or for hunting trophies is still a widespread practice throughout tropical forest regions and the rest of the world. The Convention on Biological Diversity (CBD) has identified unsustainable hunting of ‘bushmeat’, and its effect on non-target species, as a priority for action, with the development of small-scale alternatives to the unsustainable bushmeat harvest and trade of paramount importance. In June 2011, CBD and CITES (the Convention on International Trade in Endangered Species of Wild Fauna and Flora) held a joint workshop to recommend national and international actions to address the most pressing needs surrounding the ‘bushmeat’ crisis. CMS also attended this meeting. The publication lists possible options for small-scale alternatives to the unsustainable use of bushmeat, describes examples of success stories and lessons learned in Africa, Latin America and Asia/Pacific, and provides recommendations relevant at regional and global level.

Details: Montreal: Secretariat of the Convention on Biological Diversity; London: TRAFFIC, 2011. 47p.

Source: Internet Resource: CBD Technical Series No. 60: Accessed October 31, 2011 at: http://www.cbd.int/doc/publications/cbd-ts-60-en.pdf

Year: 2011

Country: International

Keywords: Bushmeat

Shelf Number: 123188


Author: Save the Children Sweden

Title: Violence Against Children in Schools: A Regional Analysis of Lebanon, Morocco and Yemen

Summary: The project “Manara Network: A Civil Society for Child Rights†is a three-year project funded by the Swedish International Development Agency and implemented by Save the Children Sweden (SCS) in collaboration with the International Bureau for Children’s Rights (IBCR). The project aims at establishing a Regional Child Rights Network of Civil Society Organisations (CSOs) in the Middle East and North Africa (MENA) region with the objectives of supporting and strengthening the capacity of local CSOs in four main components: analysis and reporting, coordination and networking, advocacy and child rights programming mainstreaming. After an inception phase between September 2008 and March 2009, four partners were identified to implement the first phase of the project: the Lebanese Association for Education and Training (ALEF) and Developmental Action without Borders (Naba’a) (both based in Lebanon); the Moroccan non-governmental organisation (NGO) Bayti, and SOUL for Development in Yemen. The network aims to expand to 17 countries in the MENA region. To date, members of Manara come from Lebanon, Yemen, Morocco, Jordan, the occupied Palestinian territory (oPt) and Iraq. The first phase of the component on analysis and reporting included the creation of Country Profiles on the status of the implementation of the United Nations Convention on the Rights of the Child (CRC) by local organisations in their respective country. This component has two objectives: strengthening the capacity of organisations in conducting research on children’s rights, and producing a report that provides an overview of the status of child rights in each given country. The report aims to identify gaps and challenges on the status of implementation of the CRC, highlight the recommendations of the Committee on the Rights of the Child on specific matters and identify commendable practices adopted by the State, civil society and the international community to address those issues. For the second phase of the component on analysis and reporting, the four partners (Alef, Naba’a, Soul and Bayti) chose to focus their attention on a common problem they identified in their respective country profiles: violence against children in schools. They conducted an in-depth analysis of the topic, including a literature review and interviews with relevant stakeholders. The first stage of the research on violence against children in schools started in July 2010. Each organisation produced a national study that reviewed the prevalence of violence against children in schools and the recommendations of the Committee on the Rights of the Child, and identified the commendable practices implemented in its country by the State, civil society and international organisations in preventing and addressing this issue. The research examined violent acts that are committed by teachers and administrative staff towards students. The study covered physical, psychological and sexual violence. The study also aimed at analysing violence between peers within the school setting; however, very little data on this subject was available and, therefore, this aspect of violence against children could not be included in this analysis. Furthermore, the few studies available addressed the problem of violence in general rather than specifically within the school setting. Each partner conducted a literature review to identify existing research on the topic, followed by field research involving a series of interviews with identified stakeholders. These interviews contributed to filling the gaps identified through the desk research. These two phases of research allowed partners to paint a clearer picture of school-based violence in their respective countries, the legislative and institutional framework regulating education and ensuring protection and responses to this phenomenon by governmental and non-governmental actors. In December 2010, the second stage of the research process began. National sections were compiled and the four partners along with IBCR came together in a workshop to analyse the information. The data was then divided into four main areas of responses or practices identified by local partners: initiatives toward prevention, legislation and initiatives to end impunity; - initiatives in monitoring, reporting, and research; and services provided to victims. By the end of January 2011, partners had finalised the report and produced an analysis of results in each realm of intervention, as well as making recommendations for various stakeholders. The study includes initiatives implemented from the latest Concluding Observations of the Committee on the Rights of the Child until December 2010.

Details: Beirut: Save the Children Sweden, Regional Office for the Middle East and North Africa, 2011. 122p.

Source: Internet Resource: Accessed November 1, 2011 at: http://65.39.174.116/editor/assets/Violence%20against%20Children%20in%20Schools.pdf

Year: 2011

Country: International

Keywords: Children, Crimes Against

Shelf Number: 123200


Author: Franses, Philip Hans

Title: Diffusion of Original and Counterfeit Products in a Developing Country

Summary: We study the diffusion of original and counterfeit products in three distinct categories in a developing country. The focus is on when their diffusion processes peak, how sales of original and counterfeit products are related and how marketing efforts can influence this process. Using a unique data set for Suriname (South America) on televisions, mobile phones and DVDs, we can support various predictions from theory and give recommendations for marketing management.

Details: Rotterdam: Erasmus University, Econometric Institute, 2010. 41p.

Source: Internet Resource: Economic Institute Report 2010-08: Accessed November 3, 2011 at: http://econpapers.repec.org/paper/dgreureir/1765018260.htm

Year: 2010

Country: International

Keywords: Consumer Fraud

Shelf Number: 123222


Author: John, Shoba

Title: Enforcement of Tobacco Control Policies: Global Best Practices

Summary: The tobacco epidemic is one of the major public health threats facing India today, with one million deaths predicted from tobacco-related illnesses by 2010. Comprehensive tobacco control policies and programme are required to rein in this epidemic. The Government of India has already taken several steps to address the challenges caused by tobacco use. The Cigarettes and Other Tobacco Products Act, 2003 is a landmark policy effort in this direction. However, the enforcement and compliance with the law at the national and sub-national levels need to be undertaken in a concerted manner to achieve effective implementation. This report presents international best practices in the implementation of evidence-based tobacco control measures and seeks to identify elements for effective policy enforcement that are applicable to India. The report focuses on global enforcement practices for four tobacco control measures that are significant to the implementation of the Indian tobacco control law: bans on tobacco advertising, promotion and sponsorship; bans on smoking in public and workplaces; packaging and labeling policies; and regulation of youth access to tobacco.

Details: Munbai, India: Ministry of Health and Family Welfare, 2008. 105p.

Source: Internet Resource: Accessed November 5, 2011 at: http://www.healthbridge.ca/Enforfement%20PDF.pdf

Year: 2008

Country: International

Keywords: Cigarettes

Shelf Number: 123232


Author: Veiter, Daniela

Title: Cargo Security Initiatives in the United States, Canada and Mexico and their Effect on Trade in the NAFTA Region

Summary: Cross-border trade today is an essential driver of nations’ prosperity. A prolonged disruption in a supply chain has an enormous impact on a country’s as well as the global economy. The international transportation network and its long supply chains are very fragile and vulnerable to terrorist abuse or similar attacks. The high number of agents add another level of risk. The products, factories, supply chain facilities and supply chain partners, carriers, people and information could all present danger to the supply chain. Globalization turned the market place into a competitive environment where companies seek to hire the most affordable workers as well as choose the cheapest suppliers or service providers. This trend spreads business practices out all over the world and increases the need for transportation while adding complexity to a company’s value chain. The most effective way is a worldwide cooperation of countries on securing the global trade system without hindering the trade flow. A global partnership involving all agents along a supply chain with harmonised and compatible systems, both for customs work and for the exchange of information would be the perfect solution. And collaboration and coordinated work reduces the risk of disruptions and is more cost-effective too. Since the terror attacks of September 11, 2001 on New York and Washington DC, the international trade community has dedicated more time and money on the issue of security. The U.S. government, the Canadian government and the Mexican government have established a multi-layered defense strategy to protect their people and country. International cargo that is being shipped to certain target countries poses a significant security risk. In particular, cargo containers can be abused to carry weapons, in particular weapons of mass destruction (WMD) or other dangerous items. Those containers are particularly vulnerable to changes from their legitimate commercial purpose due to the numerous transfers within the transport chain they are subject to. Those very same internationally moving containers, though, are of utter importance to global commerce as they ship about 95% of the world’s international cargo, in terms of value. Over 48 million containers are being shipped between seaports around the world. Intermodal transport has enabled trucks and trains to move goods around continents in the ocean containers. Any terrorist actions can have largescale damage to a country’s society and economy and thus it is essential to have systems in place that can prevent such events from happening beforehand. The United States of America was the first country to start introducing plans to identify high risk cargo shipments and soon Canada and Mexico followed. The initiatives seek to ensure security over different levels. There are three main areas of risk that these security initiatives seek to address. First, the security of vital cargo information relating to the contents and destination of the shipment must be accessible by customs authorities. This also includes IT security. Then there is the level of physical control through inspections and screening. The last level covers the entire supply chain through screening and background checks of every agent involved in the process. This includes all groups between the manufacturer and the final destination of the product. This thesis talks about cargo security initiatives in the NAFTA countries of the United States, Canada and Mexico for any shipments crossing borders between those countries by either road, sea, air or rail. It shows the development and intensification of those security regulations over the last years, analyses their purpose and recommends how to best deal with them if you are a business located in this area.

Details: Vienna: Institut für Transportwirtschaft und Logistik, WU Vienna University of Economics and Business, 2009. 133p.

Source: Internet Resource: Dissertation: http://epub.wu.ac.at/822/1/document.pdf

Year: 2009

Country: International

Keywords: Cargo Security (U.S., Canada, Mexico)

Shelf Number: 123240


Author: Seelke, Clare Ribando

Title: Trafficking in Persons in Latin America and the Caribbean (updated Sept. 2011)

Summary: Trafficking in persons (TIP) for the purpose of exploitation is a lucrative criminal activity that is of major concern to the United States and the international community. According to the most recent U.S. State Department estimates, roughly 800,000 people are trafficked across borders each year. If trafficking within countries is included in the total world figures, official U.S. estimates are that some 2 million to 4 million people are trafficked annually. While most trafficking victims still appear to originate from South and Southeast Asia or the former Soviet Union, human trafficking is also a growing problem in Latin America. Countries in Latin America serve as source, transit, and destination countries for trafficking victims. Latin America is a primary source region for people trafficked to the United States. As many as 17,500 are trafficked into the United States each year, according to State Department estimates. In FY2010, primary countries of origin for the 449 foreign trafficking victims certified as eligible to receive U.S. assistance included Mexico, Honduras, Haiti, El Salvador, and the Dominican Republic (along with India and Thailand). Since enactment of the Victims of Trafficking and Violence Protection Act of 2000 (TVPA, P.L. 106-386), Congress has taken steps to address human trafficking by authorizing new programs and reauthorizing existing ones, appropriating funds, creating new criminal laws, and conducting oversight on the effectiveness and implications of U.S. anti-TIP policy. Most recently, the TVPA was reauthorized through FY2011 in the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 (P.L. 110-457). Obligations for U.S.-funded anti-TIP programs in Latin America totaled roughly $17.1 million in FY2010. On June 27, 2011, the State Department issued its 11th annual, congressionally mandated report on human trafficking. The report categorizes countries into four “tiers†according to the government’s efforts to combat trafficking. Those countries that do not cooperate in the fight against trafficking (Tier 3) have been made subject to U.S. foreign assistance sanctions. While Cuba and Venezuela are the only Latin American countries ranked on Tier 3 in this year’s TIP report, seven other countries in the region—Barbados, Costa Rica, Dominican Republic, Ecuador, Panama, St. Vincent and the Grenadines, and the Bahamas—are on the Tier 2 Watch List. Unless those countries make significant progress in the next six months, they could receive a Tier 3 ranking in the 2012 report. Activity on combating TIP has continued into the 112th Congress, particularly related to efforts to reauthorize the TVPA and oversee TIP programs and operations, including U.S.-funded programs in Latin America. Congress may also consider increasing funding for anti-TIP programs in the region, possibly through the Mérida Initiative for Mexico, the Central America Regional Security Initiative (CARSI) or through other assistance programs. Congress is likely to monitor new trends in human trafficking in the region, such as the increasing involvement of Mexican drug trafficking organizations in TIP and the problem of child trafficking in Haiti, which has worsened since that country experienced a devastating earthquake on January 12, 2010. For more general information on human trafficking and a discussion of TIP-related legislation in the 112th Congress, see CRS Report RL34317, Trafficking in Persons: U.S. Policy and Issues for Congress, by Alison Siskin and Liana Sun Wyler.

Details: Washington, DC: Congressional Research Service, 2011. 23p.

Source: Internet Resource: RL33200: Accessed November 5, 2011 at: http://digitalcommons.ilr.cornell.edu/cgi/viewcontent.cgi?article=1865&context=key_workplace&sei-redir=1&referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3Dtrafficking%2520in%2520persons%2520in%2520latin%2520america%2520and%2520the%2520caribbean%25202011%26source%3Dweb%26cd%3D1%26ved%3D0CB0QFjAA%26url%3Dhttp%253A%252F%252Fdigitalcommons.ilr.cornell.edu%252Fcgi%252Fviewcontent.cgi%253Farticle%253D1865%2526context%253Dkey_workplace%26ei%3DIli1TpOxDOng2AWQ-_3MDQ%26usg%3DAFQjCNHe7MQuba4HeHzqaqdl0iSwdAgg0g#search=%22trafficking%20persons%20latin%20america%20caribbean%202011%22

Year: 2011

Country: International

Keywords: Child Trafficking

Shelf Number: 123241


Author: Bag, Parimal Kanti

Title: Betting in the Shadow of Match-Fixing

Summary: Two bookmakers compete in Bertrand fashion while setting odds on the outcomes of a sporting contest where an influential punter (or betting syndicate) may bribe some player(s) to fix the contest. Zero profit and bribe prevention may not always hold together. When the influential punter is quite powerful, the bookies may coordinate on prices and earn positive profits for fear of letting the `lemons' (i.e., the influential punter) in. On the other hand, sometimes the bookies make zero profits but also admit match-fixing. When match-fixing occurs, it often involves bribery of only the strong team. The theoretical analysis is intended to address the problem of growing incidence of betting related corruption in world sports including cricket, horse races, tennis, soccer, basketball, wrestling, snooker, etc.

Details: Norwich, UK: University of East Anglia AEP Discussion Papers in Economics, 2010. 57p.

Source: Internet Resource: Accessed November 7, 2011 at: http://ideas.repec.org/p/uea/aepppr/2010_11.html

Year: 2010

Country: International

Keywords: Bookies

Shelf Number: 123246


Author: Fox, Aubrey

Title: From the Ground Up: Promising Criminal Justice Projects in the US and the UK

Summary: From the Ground Up: Promising criminal justice projects in the US and the UK examines successful demonstration projects in the UK and the US that are attempting to reduce crime, drug use and incarceration, among other challenging goals. The report identifies a selection of innovative, groundlevel experiments in policing, probation, courts and crime prevention that have had a real impact. In this report the founders and lead practitioners share their experiences of creating innovative projects and in reviewing the projects the author identifies key practical lessons for how to successfully plan, implement and sustain new criminal justice endeavours.

Details: London: Policy Exchange, Centre for Justice Innovation, 2011. 47p.

Source: Internet Resource: Accessed November 7, 2011 at:

Year: 2011

Country: International

Keywords: Crime Prevention Programs (U.S. & UK)

Shelf Number: 123251


Author: Briscoe, Ivan

Title: What Makes Countries Vulnerable to Transnational Organised Crime?

Summary: Countries emerging from conflict or other major crises face numerous difficult challenges on the road to state-building. One of the most harmful is the rise of violent crime, which threatens weak state institutions and the rule of law. In a number of cases, this concern is accentuated by the presence of transnational organised crime. Instead of starting on a path of economic and institutional development, these nations are transformed into way stations on the route of illicit products – drugs, clandestine migrants, or commodities such as timber or diamonds – heading to rich consumer markets. A conservative estimate puts the total value of these global markets at $125 billion per year. The problems posed by transnational organised crime are serious and spreading. In Central Asia, West Africa and Central America, the wounds of civil war and political transition had not yet healed by the time the phenomenon appeared. Instead, criminal groups took full advantage of the weaknesses of governments and the rule of law in the aftermath of faltering transitions to democracy. These groups formed links with formal economic and political actors, and used their power where necessary to intimidate citizens into submission. Electoral processes, political parties, security forces, horizontal inequalities, ethnic rivalries and basic conceptions of citizenship have all been reshaped by criminal money and violence. This report explores in depth the exact nature of the threat posed by transnational organised crime and the conditions that give rise to its growth. In particular, it asks whether the presence of transnational groups in fragile states is an effect of international conditions – such as the need to supply a particular consumer market – or due to causes that are internal to the country. On this basis, it picks out five key factors that underlie the expansion of this sort of crime. These are: • the proximity to trafficking routes and destination markets; • favourable international security conditions; • extreme institutional fragmentation; • high levels of inequality; and • social atomisation. Above all, the report stresses the importance of the last three domestic vulnerabilities in providing criminal groups with exceptional leverage over state and security actors, businesses, and local populations. In conclusion, it offers a number of pointers for future policymaking that take into account the grave threat posed by transnational organised crime to stability and development. While this threat is undeniable, it is also true to say that it is the expression of fault lines and vulnerabilities in fragile states that cannot be repaired solely by law enforcement or donor exhortation.

Details: Oslo: Norwegian Peacebuilding Resource Centre, 2011. 16p.

Source: Internet Resource: Accessed November 8, 2011 at: http://www.humansecuritygateway.com/documents/NOREF_WhatMakesCountriesVulnerabletoTransnationalOrganizedCrime.pdf

Year: 2011

Country: International

Keywords: Organized Crime

Shelf Number: 123258


Author: Ekblom, Paul

Title: Final report WPA2 of ‘Bike Off 2 – Catalysing Anti Theft Bike, Bike Parking and Information Design for the 21st Century

Summary: This is the report on one of the Work Packages of the Bikeoff 2 project, funded by AHRC/EPSRC Design for the 21st Century. WPA2 is about „Standard generation through application of CCO framework‟. The standards in question apply to secure bicycle parking facilities. CCO – the Conjunction of Criminal Opportunity – is a conceptual framework for providing a unified theoretical map of immediate causes of criminal events, and an equivalent map of preventive interventions intended to block, weaken or divert those causes. The interventions can be created and implemented through products, places and communications which are deliberately designed to influence the causes of crime. In the present case the events and the interventions relate to bicycle parking, but the framework is generic. The output of WPA2 is intended to complement guidance obtained from a compilation of existing secure cycle parking experience, under WPA1, as modified by public contributions from a user Wiki. In fact, the wider aim, of which WPA2 is a preparation, is to compare design recommendations obtained from the two sources, the one theoretical, the other experiential. More details are in the introduction. The relevant section of the project application (April 2006) states: This project aims to generate a ‘Secured By Design†standard for bicycle parking and in so doing test Ekblom’s model of the ‘Conjunction of Criminal Opportunity’ as an appropriate framework for standard generation. To deliver this research the work packages will identify and generate standards, using different methodologies, in order to evaluate the efficacy of the standards, and the ‘fitness for task’ of the methodologies that generated them. The standards we generate will be combined to provide a definitive ‘Secured By Design’ standard for cycle parking. The definitive standard will be evaluated and ‘evolved’ by potential users, such as engineers, designers, cycle parking specifiers and providers and cyclists (users of that the facilities the standard seek to inform). The present report describes the process of adapting the CCO framework – quite significantly as it transpired – to fit in with the demands of the design process (and designers‟ ways of thinking). The purpose of the adapted framework was twofold: first, to develop a systematic method of crime risk analysis that was suited to the design field; and second, to translate the identified risks into the design recommendations which constitute the output of this work package. Part 1 introduces the approach to crime prevention evolving within the Design Against Crime Research Centre at Central Saint Martin‟s College of Art & Design, University of the Arts, London; and in particular, how this approach involves activity at a number of different levels, from preventive operations aimed at tackling crime at specific sites to developing innovative capacity to transfer to designers. It then describes the Bikeoff project within this context, sets the scene for the current Work Package, discusses the concept of standards and guidelines, and reviews sources of knowledge for developing designers‟ capacity, including CCO (as a „digest‟ of theory) and experience (as from reviews of existing designs). Part 2 sets out the CCO approach to crime prevention and design as it was at the start of the current project – CCO Classic. It first shows how CCO originated as a means of unifying crime prevention theories and classifying diverse practice, and ended up as a dual conceptual framework for mapping out the immediate causes of criminal events and the corresponding intervention principles that serve to prevent them. Key ideas are introduced covering Situational Crime Prevention, causal mechanisms (how crimes happen and how interventions work) and the importance of context. This is followed by an account of how in principle CCO can guide Design Against Crime and why it seems well-suited to the task; and how it came to be used, and tested, in the Bikeoff project. That process of bringing a theoretical criminological framework together with design and designers in fact caused CCO to evolve in several significant ways, documented next. These modifications included combining CCO with additional concepts such as crime „scripts‟ and moving from the consideration of crime in general to that of different kinds of crime risk, handled by the Misdeeds & Security framework. (These developments have more general implications for some of the traditional tenets and assumptions of Situational Crime Prevention.) To distinguish this new version from CCO Classic, this became known as CCO Dynamic. During the development process it also became clear that the scope of the Work Package, originally aimed at producing CCO standards, in fact would only meaningfully deliver CCO-based guidance. Part 3 describes how CCO Dynamic was applied to the task of generating guidance for securing bike parking furniture and facilities. It covers the overall procedure for generating design guidance using CCO Dynamic; the development of the underlying framework for analysing the risks; the development of the framework for the response to that risk, namely for design guidance; and finally the complete prescriptive design guidance output. Part 4 supplies a brief conclusion. How CCO performed in generating guidance for bike parking security, in comparison with the designers‟ experience (so-called „Best of Breed compilation), is reported in a subsequent document (WP4).

Details: London: University of Arts London, 2009. 135p.

Source: Internet Resource: Accessed November 8, 2011 at: http://ualresearchonline.arts.ac.uk/2174/1/WPA2_Ekblom_Jan_09_CCO.pdf

Year: 2009

Country: International

Keywords: Bicycle Theft

Shelf Number: 123267


Author: Bayley, David

Title: Police Corruption: What Past Scandals Teach about Current Challenges

Summary: Police corruption is an international problem. Historically, police misconduct has been a factor in the development of police institutions worldwide, but it is a particular problem in counterinsurgency and peacekeeping operations, such as the U.S.-led North Atlantic Treaty Organization police training program in Afghanistan. There, police abuse and corruption appear endemic and have caused some Afghans to seek the assistance of the Taliban against their own government. The most reliable and extensive knowledge about police corruption in the world’s English-speaking countries is found in the reports of specially appointed blue-ribbon commissions, independent of government, created for the sole purpose of conducting investigations of police corruption. To reduce police corruption, the commissions recommend creating external oversight over the police with a special focus on integrity, improving recruitment and training, leadership from supervisors of all ranks about integrity, holding all commanders responsible for the misbehavior of subordinates, and changing the organization’s culture to tolerate misbehavior less. The remedies proposed by the commissions, however, rely on a set of contextual conditions not commonly found in countries emerging from conflict or facing serious threats to their security. This report suggests triage and bootstraps as strategies for reducing police corruption in countries with security threats. Triage involves targeting assistance in countries where there are solid prospects for tipping police practice in the desired direction. Bootstraps involves using reform within the police itself as a lever to encourage systemic social and political reform in countries in crisis or emerging from conflict.

Details: Washington, DC: United States Institute of Peace, 2011. 20p.

Source: Internet Resource: Accessed November 9, 2011 at: http://www.usip.org/files/resources/SR%20294.pdf

Year: 2011

Country: International

Keywords: Police Corruption

Shelf Number: 123268


Author: Bouhana, Noemie

Title: Al Qa'ida-Influenced Radicalisation: A Rapid Evidence Assessment Guided by Situational Action Theory: Scientific Report

Summary: This paper presents findings from research into the causes of Al Qa'ida-influenced radicalisation. It looks to understand vulnerability and resilience to Al Qa‘ida influenced violent extremism; and distinguishes between indicators and causal factors of criminal and violent behaviour. It also explores what transferable knowledge can be applied from youth gangs, new religious movements and violent radical activism.

Details: London: Home Office, 2011. 113p.

Source: Internet Resource: Occasional Paper 97: Accessed November 9, 2011 at: http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/counter-terrorism-statistics/occ97?view=Binary

Year: 2011

Country: International

Keywords: Extremist Groups

Shelf Number: 123274


Author: Munton, Tony

Title: Understanding Vulnerability and Resilience in Individuals to the Influence of Al Qa’ida Violent Extremism

Summary: In the absence of a mature empirical evidence base it explores what transferrable knowledge can be taken from the more developed literature on other types of violent activity e.g. other terrorist activity, gangs, cults, etc. This report presents the findings of a Rapid Evidence Assessment (REA) of open source empirical studies that seek to answer two key questions: • What factors, social, psychological and physical, make a person more vulnerable to participation in Al Qa’ida (AQ)-influenced violent extremism? • What factors enable vulnerable individuals to resist the influence of AQ-influenced violent extremism? This report also presents the findings from a second targeted REA on other relevant types of violent activity, including: • other (non-AQ-influenced) types of terrorist activity; • animal rights activism; • cults; • gangs; • right-wing extremism; and • youth crime. The report discusses learning from these other areas and how far lessons learned can be applied to the study of AQ-influenced violent extremism. Both REAs involved systematic searches of relevant electronic databases and hand searches of academic journals and websites. Additional relevant literature was identified by topic experts, peer reviewers, specific websites, and through backward and forward citation chasing. Studies were included if they were based on empirical research, were relevant to the REAs’ questions and were assessed to be of high scientific quality. The empirical evidence base on what factors make an individual more vulnerable to AQ-influenced violent extremism is weak. Even less is known about why certain individuals resort to violence, when other individuals from the same community, with similar experiences, do not become involved in violent activity. The following conclusions are based on the limited empirical evidence base identified by the two REAs.

Details: London: Home Office, 2011. 90p.

Source: Internet Resource: Occasional Paper 98: Accessed November 9, 2011 at:

Year: 2011

Country: International

Keywords: Extremist Groups

Shelf Number: 123275


Author: Disley, Emma

Title: Individual Disengagement from Al Qa'ida-Influenced Terrorist Groups. A Rapid Evidence Assessment to Inform Policy and Practice in Preventing Terrorism

Summary: This paper looks at why and how individuals stop being violent and whether there are intervention practices to learn from. It also explores transferable knowledge from the literature on street gangs, religious cults, right-wing groups and organised crime groups.

Details: London: Home Office, 2011. 137p.

Source: Internet Resource: Occasional Paper No. 99: Accessed November 9, 2011 at: http://www.homeoffice.gov.uk/publications/science-research-statistics/research-statistics/counter-terrorism-statistics/occ99?view=Binary

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 123276


Author: Open Society Foundations

Title: Pretrial Detention and Health: Unintended Consequences, Deadly Results

Summary: Pretrial holding facilities in countries with developing and transitional economies often force detainees to live in filthy, over-crowded conditions, where they lack adequate health services. In the worst cases, detainees die; some centers are so bad that innocent people plead guilty just to be transferred to prisons where the conditions might be better. For many pretrial detainees, being locked away in detention centers where tuberculosis, hepatitis C, and HIV are easily contracted can be a death sentence. This paper, aimed at health professionals, presents a review of literature on health conditions and health services in pretrial detention in developing and transitional countries. It takes as its point of departure that the negative health impacts of excessive pretrial detention are an important reason to pursue pretrial justice reform. Its recommendations include calling on health professionals to support monitoring and research efforts on the issues, as well supporting prison health officials and public engagement.

Details: New York: Open Society Foundations, 2011. 88p.

Source: Internet Resource: Accessed November 11, 2011 at: http://www.soros.org/initiatives/justice/articles_publications/publications/ptd-health-20111103/ptd-health-20111103.pdf

Year: 2011

Country: International

Keywords: Detention Centers

Shelf Number: 123311


Author: Weilandt, Caren

Title: HIV in Prisons: Situation and Needs Assessment Toolkit

Summary: This toolkit is part of a set of documents produced by United Nations agencies aimed at providing up-to-date evidence-informed guidance on HIV in prisons. These include: • HIV/AIDS Prevention, Care, Treatment and Support in Prisons: A Framework for an Effective National Response. This document provides a framework for mounting an effective national response to HIV in prisons, based on the evidence reviewed in the Evidence for Action Technical Papers and on accepted international standards and guidelines, and reflecting principles of good prison management. It sets out 11 principles and 100 actions. Available at www.unodc.org/pdf/HIV-AIDS_prisons_July06.pdf • HIV and AIDS in places of detention: A training toolkit for policymakers, programme managers, prison officers and health care providers in prisons. This document provides information and guidance primarily to individuals and institutions with responsibilities for prisons and prisoners, and to people who work in and with prisons. In addition, it will assist everyone who has anything to do with prisons. Available in English and Russian at http://www. unodc.org/unodc/en/hiv-aids/publications.html?ref=menuside • HIV testing and counselling in prisons and other closed settings. This policy brief provides guidelines for ensuring access to voluntary counselling and HIV testing for prisoners. Available in English at http://www. unodc.org/unodc/en/hiv-aids/publications.html?ref=menuside • Women and HIV in prisons. This information note describes the HIV characteristics of women in prison and lists recommended responses. Available in English, Spanish, Russian and Bahasa Indonesian at http://www. unodc.org/unodc/en/hiv-aids/publications.html?ref=menuside • Policy Brief: Reduction of HIV Transmission in Prisons. This document provides a two-page summary of the evidence related to HIV prevention programmes in prisons. Available in English and Russian via www.who.int/hiv/pub/idu/idupolicybriefs/en/index.html • Evidence for Action Technical Papers on Effectiveness of Interventions to Address HIV in Prisons. These papers provide a comprehensive review of the effectiveness of interventions to address HIV in prisons. They contain the most detailed and rigorous analysis of the evidence related to HIV in prisons undertaken to date, with hundreds of references. They comprise ‘Dependence Treatments’; ‘Needle and Syringe Programmes and Decontamination Strategies’; ‘HIV Care, Treatment and Support’ and ’Prevention of Sexual Transmission’. Available in English and Russian at http://www. unodc.org/unodc/en/hiv-aids/publications.html?ref=menuside • Policy guidelines for collaborative TB and HIV services for injecting and other drug users - an integrated approach (pdf) . Available at http://whqlibdoc.who.int/publications/2008/9789241596930_eng.pdf • Guidelines for Control of Tuberculosis in Prisons. This document provides general guiding principles for the implementation of the STOP TB Strategy in prisons to accelerate case detection and treatment targets and to cure and prevent the emergence of drug resistance. Available at http://www.tbcta.org//Uploaded_files/Zelf/GuidelineTBPrisons1252321251.pdf

Details: Vienna: United Nations Office on Drugs and Crime, 2011. 92p.

Source: Internet Resource: Accessed November 15, 2011 at: http://www.unodc.org/documents/hiv-aids/publications/HIV_in_prisons_situation_and_needs_assessment_document.pdf

Year: 2011

Country: International

Keywords: Health Care, Prisons

Shelf Number: 123345


Author: Schreier, Fred

Title: Fighting the Pre-eminent Threats with Intelligence-led Operations

Summary: This paper discusses the role of intelligence, intelligence services and intelligence-led operations as crucial components of the efforts to counter the new risks, dangers and threats to states and their population. The end of the Cold War and globalisation has not only brought a multiplication of actors, sources of conflict and means to fight. Indeed, globalisation, accelerating techno-logical innovation, growing interdependence and vulnerability of modern states has dramatically enhanced the number and diversity of risks, dangers and threats. The fact that these are increasingly transnational in nature, originate more and more often from non-state actors and appear and mutate ever more quickly, renders the fight against them more difficult. This is particularly true for the unholy trinity of transnational terrorism, proliferation of weapons of mass destruction (WMD) and transnational organised crime (TOC) that have become the pre-eminent security challenges confronting the world and the new intelligence priorities. TOC is growing in volume, geographic reach and profitability, and is well positioned for further growth because it does, in many ways, have the most to gain from globalization. Growth and spread of TOC increase the risks of proliferation of WMD and, with it, of catastrophic transnational terrorism as proliferants and terrorists collude ever more symbiotically with TOC groups to move money, men and materials around the globe. The more the international order is threatened by asymmetric warfare of Islamistic terror networks, the more the threat perception will become multifaceted and chaotic if more actors can acquire WMD. These developments not only diminish the predictability of risks and dangers. The more diffuse and unpredictable the situation and the threat perception, the more difficult it will become to clearly distinguish between external and internal, civilian and military threats to a country, and between the strategic, operational or tactical levels of risks and dangers. More than ever before intelligence is the pre-requisite for all measures that aim at the effective prevention, disruption and suppression of these threats. But countering the pre-eminent threats from multiplying non-state actors that operate clandestinely requires more than just intelligence services. These threats can only be effectively counteracted, disrupted, pre-empted and prevented when the operations of all security sector organisations that are mandated to deal with them are intelligence-driven or intelligence-led. This requires a paradigm shift in national security strategy that not only entails a ‘whole of government’ approach and multilateral engagement, but a radical new approach with more intensive collaboration, interaction and information exchange by these organisations with the agencies of the intelligence community. This paper (1) sketches the main threats currently confronting all states. Part (2) elaborates what intelligence is and explains why intelligence is key to counter the expanding array of threats more effectively. Part (3) shows the application of intelligence and the contributions of intelligence-led operations to the fight against the pre-eminent threats. Part (4) explores patterns and problems of intelligence cooperation. In part (5) some of the implications which intelligence-led operations may have for democratic control, supervision, oversight and accountability are indicated. The paper ends with a list of key recommendations.

Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2009. 134p.

Source: Internet Resource: DCAF Occasional Paper – No. 16: Accessed November 15, 2011 at: http://www.dcaf.ch/DCAF-Migration/KMS/Publications/Fighting-the-Pre-eminent-Threats-with-Intelligence-led-Operations

Year: 2009

Country: International

Keywords: Intelligence Gathering

Shelf Number: 123349


Author: Fluri, Philipp

Title: Policing in Federal States

Summary: This book looks at different examples of federal police organizations: India, Russia, the USA, Switzerland as well as Spain as an example of a ‘federal police system in the making’. The studies help understand how and why federal police organizations came into being and function according to decentralized legislative and decision-making frameworks. The articles also seek to highlight the increased demand for coordination and harmonization of the policing approaches in federal states.

Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2011. 128p.

Source: Internet Resource: Nepal Stepstones Projects Series No. 2: Accessed November 15, 2011 at: http://www.dcaf.ch/DCAF-Migration/KMS/Publications/Policing-in-Federal-States

Year: 2011

Country: International

Keywords: Police Administration

Shelf Number: 123351


Author: Bastick, Megan

Title: The Role of Penal Reform in Security Sector Reform

Summary: Penal reform activities have been carried on in Europe and the United States since at least the late eighteenth century. Security sector reform (SSR), a much newer concept, is a governance-driven approach that looks to strengthen the roles of both state and non-state actors to deliver security to individuals and communities. As such, attention to the penal system is important in any comprehensive SSR process. However, much SSR programming overlooks penal elements, and lessons learnt through long experience in penal reform have not been applied to other SSR activities. There is limited discourse between the penal reform community ofpractice and the wider SSR community. This paper seeks to initiate a dialogue concerning the relationship between penal reform and wider security sector reform and governance. It is based on desk research and a number of interviews with penal reform practitioners.

Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2010. 78p.

Source: Internet Resource: CDAF Occasional Papers No. 18: Accessed November 15, 2011 at: http://www.dcaf.ch/DCAF-Migration/KMS/Publications/The-Role-of-Penal-Reform-in-Security-Sector-Reform

Year: 2010

Country: International

Keywords: Correctional Administration

Shelf Number: 123352


Author: Quirk, Joel

Title: Unfinished Business: A Comparative Survey of Historical and Contemporary Slavery

Summary: The history of slavery raises many uncomfortable political and moral questions. Until relatively recently, legal enslavement was widely regarded as a natural and all but inescapable feature of human existence, which appears to have been sanctioned, in one form or another, by every major civilization and religion. The key break with this enduring precedent occurred in the second half of the eighteenth century, with the emergence of an organized anti-slavery movement in some parts of Europe and the Americas. This fledgling movement would face tremendous political and economic obstacles. From the sixteenth century onwards, European traders had been supplying colonial settlements in the Americas with ever increasing numbers of slaves from Africa. This unprecedented investment in human bondage had proved to be a major commercial success, creating powerful vested interests that were heavily reliant upon slave labour. Over many decades, organized anti-slavery challenged this flourishing system on various fronts, leading to protracted contests over the status of slavery on both sides of Atlantic. After numerous setbacks, false starts and a series of often violent conflicts, slavery was legally abolished throughout the Americas, with the final act coming with the passage of a ‘Golden Law’ abolishing slavery in Brazil. The passing of Trans-Atlantic slavery is often viewed as an historical endpoint, which relegated slavery to the distant past. This is misleading. As this report makes clear, slavery remained legal in other parts of the globe well into the twentieth century, and in territories where slavery came to be legally abolished human bondage and extreme exploitation regularly continued under other designations. Many governments would rush to declare that slavery was no longer a problem, but these declarations rarely matched events on the ground. In the immediate aftermath of legal abolition, this was chiefly a question of the widespread use of forced, bonded and indentured labour in many jurisdictions. Over the last half century, the primary focus has gradually shifted towards practices which are analogous to legal slavery, with human trafficking, sexual servitude and child labour acquiring particular prominence. Interest in contemporary slavery has increased dramatically over the last ten years, but there remains a widespread tendency to view historical and contemporary slavery as independent fields of study. For most historians of slavery, current problems rarely enter into the picture, except perhaps as brief postscripts, which typically take the form of passing observations that the struggle against slavery has not entirely concluded. For those focused on the present, the bulk of whom are political activists and official agents, the history of slavery and abolition consistently takes a back seat to contemporary issues. While both approaches are perfectly legitimate and entirely understandable, they can indirectly foster an informal separation between past and present, which can obscure the historical roots of contemporary problems. This report moves beyond this artificial divide, providing the first ever comparative survey of both historical practices and contemporary problems. In doing so, it draws upon a wide range of literatures and source materials. The primary goal here is not to provide a comprehensive account of a specific issue or event in the history of slavery, but instead to integrate some of the key findings of existing treatments of many different events within a broader historical and political perspective. By concentrating upon important parallels between past and present, the report offers new ways of engaging with many of the key relationships and connections that have shaped the historical trajectory of slavery and abolition over the last five centuries. It is also important to recognize, however, that the report also operates at a high level of generalization. This has meant that a number of important developments have been passed over, or sketched in relatively brief terms. These shortcomings are hard to avoid in a survey of this type, especially given the scale of the global issues involved, so it is important to approach the information presented here as an open invitation to further analysis, rather than the final word on any particular topic. To assist additional inquiries, the report also includes a substantial number of references, which provide information on many key sources and authors for readers seeking further information on specific issues. The report is divided into five major chapters. The first chapter, ‘Defining Slavery in all its Forms,’ examines a number of definitions of slavery, both past and present. When it comes to the history of slavery, the main task facing any definition of slavery is developing a formula which separates slavery from related forms of servitude. When it comes to contemporary slavery, the main task facing any definition of slavery is specifying which activities are sufficiently similar to legal slavery that they deserve to be placed on the same footing. The second chapter, ‘The Question of Numbers’, examines a number of estimates of the scale of slavery, slave trading and other forms of human bondage. This starts with the history of Trans-Atlantic slavery, where a great deal of information is available. This wealth of material is unusual. In most cases estimates of slave numbers are confined to informed extrapolations, which can often be complicated by the illegal nature of many of the practices involved. The third chapter, ‘Human Bondage in Comparative Perspective’, identifies a number of differences and similarities between historical and contemporary practices. Four main themes are identified here; i) demand, acquisition and control, ii) transit and transfer, iii) slave roles, and iv) slave resistance. These themes follow a loose sequence of events, with demand for slaves providing a basis for various modes of enslavement, market-driven migration, and a series of commercial exchanges. Once slaves reach their destination, we confront the further question of slave roles, which have been characterized by a range of economic, reproductive, military and social considerations. The final theme of this chapter is slave resistance, which applies to every stage in this complex chain. Slave resistance is commonly associated with overt acts such as rebellion, flight and suicide, but it can also extend to long-term efforts to develop autonomous spaces under extremely difficult circumstances. By considering each of these themes in turn, this chapter identifies a number of key differences and similarities between various historical and contemporary practices, paving the way for further analysis of the history of organized anti-slavery and contemporary activism. The fourth chapter, ‘Legal Abolition’ starts by identifying three main paths through which the legal abolition of slavery has historically occurred. This finds expression in a series of brief case studies, starting with four countries which occupy key positions when it comes to the end of Trans-Atlantic slavery; the United States of America, Saint-Domingue/Haiti, Great Britain and Portugal. Each of these cases captures different aspects of a complex trajectory. The history of anti-slavery is often equated with social activism in Britain and the United States, but these countries are not representative of experiences elsewhere. These case studies are then followed by a survey of the history of the legal abolition of slavery in other parts of the globe, where anti-slavery measures were often closely connected with European imperialism and colonialism. This important relationship is explored through additional studies of the history of legal abolition of slavery in India, Nigeria, Ethiopia and Saudi Arabia. The fifth chapter, ‘Effective Emancipation’, explores some of the key limitations of the legal abolition of slavery. Although slavery has been legally abolished throughout the world, the serious problems associated with slavery have continued to this day in various guises. Something more is required: effective emancipation. The chapter begins with the aftermath of legal abolition, which can be divided into short and long term dimensions. The immediate component is concerned with the widespread use of other forms of human bondage as an informal substitute for slavery following legal abolition. The long term component is concerned with the enduring legacies of historical patterns of enslavement. The chapter then goes on to provide a further series of case studies of different aspects of contemporary slavery, focusing upon chattel slavery in Mauritania, debt-bondage in India, migrant domestic workers in Singapore, and human trafficking in Great Britain. The conclusion of the report, ‘Public Policy and Political Activism’, outlines a series of general strategies and recommendations for addressing contemporary problems. This platform draws upon the key insights of previous chapters of the report, making a case for both targeted action and sweeping socio-economic reform. This begins with four key themes; i) education, information and awareness ii) further legal reform, iii) effective enforcement, and iv) release, rehabilitation and restitution. These four themes can be viewed as the core of anti-slavery activism, offering a targeted platform that should command support from across the political and ideological spectrum. It is also clear, however, that the fight against both contemporary slavery and the long-term legacies of historical slave systems requires systemic efforts to address larger socio-economic problems. If we are serious about confronting contemporary slavery, we also need to be serious about larger questions of poverty, inequality, racism and discrimination.

Details: Paris: The Slave Route Project, Division of Cultural Policies and Intercultural Dialogue, UNESCO, 2008. 141p.

Source: Internet Resource: Accessed November 15, 2011 at: http://www.unesco.org/culture/pdf/UnfinishedBusinessReport2008.pdf

Year: 2008

Country: International

Keywords: Forced Labour

Shelf Number: 123354


Author: Cramer, Christopher

Title: Unemployment and Participation in Violence

Summary: How are unemployment and violence linked? Ideas about this link are driven by an OECD literature on crime, gangs and unemployment and by recent economic models of developing country ‘civil wars’. These ideas are commonly linked with an increasing interest in the age-structure of demography in developing countries, in particular the observation of a common ‘youth bulge’. There is a very widespread view that youth unemployment is a key cause of insurgency or civil war. This is despite the fact that there is barely any reliable evidence on youth unemployment for any developing country. Running through many assumptions about the role of labour markets, and in particular unemployment, in causing violence and violent conflict, is the influence of the “economic approach†championed by Gary Becker with respect to crime and punishment initially and then by others including Jack Hirshleifer. This paper first sets out the main features of the economic approach to the study of violence in developing countries, as a special class of economic approaches to an increasingly wide circle of social phenomena. The paper then shows that there are other analytical approaches to studying labour market participation and its links to violent behaviour – in wars and in other forms of violence, including domestic violence. From a range of analytical sources, it becomes clear that there is a rich body of work on the reasons why there may be a variety of relationships between employment, unemployment, and violence. This paper argues that it is not wise simply to read off violent outcomes from given degrees of demographic bulge or, indeed, from given labour market figures and argues that there are no grounds empirically for the commonly made claims that there is a strong, automatic causal connection from unemployment, underemployment, or low productivity employment to violence and war. The implications are: that there are other grounds for acting to protect the lives and improve the prospects of those very large numbers of people vulnerable to appalling working conditions, to un- and under-employment, to poor health and premature death, to violence, and to extreme poverty; that specific variables, such as unemployment, typically have rather complex implications for violent outcomes; and that labour market and economic policy, if they are to be a part of efforts to reduce violence, cannot be reduced to policies designed simply to maximise the number of work opportunities available at however competitive or apparently market clearing a wage rate. Above all, perhaps, the implication of the work reviewed in this paper is that we still know too little empirically, let alone theoretically, about the relationships between labour market participation, institutions and relations and violence. In particular, the rapid growth of interest among development economists in the past twenty years or so in violent conflict and its aftermath in developing countries has made many advances but has devoted very little attention to labour markets.

Details: Washington, DC: World Bank, 2010. 36p.

Source: Internet Resource: World Development Report 2011 Background Paper: Accessed November 19, 2011 at: http://wdr2011.worldbank.org/sites/default/files/pdfs/WDR%20Background%20Paper%20-%20Cramer.pdf?keepThis=true&TB_iframe=true&height=600&width=800

Year: 2010

Country: International

Keywords: Economic Conditions and Violence

Shelf Number: 123413


Author: Degenhardt, Louisa

Title: What Do We Know About the Extent of Illicit Meth/Amphetamine Use and Dependence? Results of a Global Systematic Review

Summary: Aims: Systematically review existing data on the prevalence of meth/amphetamine use and dependence. The aims of this paper are to: (1) describe the available international data on meth/amphetamine use and dependence; and (2) identify priorities for improving the quality and coverage of such estimates. Methods: Multiple search strategies: a) peer-reviewed literature searches (1990-2008) using methods recommended by the Meta-analysis of Observational Studies in Epidemiology (MOOSE) group; b) systematic searches of online databases; c) Internet searches to find any other evidence of use; d) repeated consultation and feedback from experts around the globe; e) a viral email sent to lists in the HIV and illicit drug fields. Culling and data extraction followed manualised protocols, with in-built systems of cross-checking and internal consistency. Data were extracted and graded according to predefined variables and quality scored. This paper reports the most recent and highest graded prevalence estimate for the general population and school population and reports the proportion of coverage of the world‟s population for use and dependence estimates, general population and school surveys, age and sex specific estimates, and most recent year of estimates. Results: There was some evidence of meth/amphetamine use or dependence in 181 countries/territories, comprising 99% of the world‟s population aged 15-64 years but there were no prevalence estimates in 104 of these countries. This was common in Asia, Oceania and Africa. School surveys were the most common method used (74 countries); general population surveys of meth/amphetamine use had been conducted in 48 countries. Nine countries had estimated the prevalence of dependence since 1990 (8% of the world‟s population 15-64 years). Estimates of past-year use varied extremely widely; past-year dependence estimates were all less than 1% (0.10-0.74%). Age ranges, methodologies and definitions of “amphetamines†differed widely. Conclusions: There is a global imperative to improve data on the extent of meth/amphetamine use and dependence. There were large gaps in dependence estimates even in high income countries that have the resources and infrastructure to carry out such studies. Public and policy concern about this issue has been increasing largely in the absence of any data on the extent of this “problemâ€. Any policies or other responses requiring some notion of “scale†are likely to be poorly targeted until this situation changes.

Details: Sydney: National Drug and Alcohol Research Centre, University of New South Wales, 2010. 74p.

Source: Internet Resource: Technical Report No. 310: Accessed November 23, 2011 at: http://ndarc.med.unsw.edu.au/sites/all/shared_files/ndarc/resources/TR.310.pdf

Year: 2010

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 123434


Author: Sety, Megan

Title: The Impact of Domestic Violence on Children: A Literature Review

Summary: More than one million Australian children are affected by domestic violence, according to the Personal Safety Survey (Australian Bureau of Statistics 2006). More than two decades of international research definitively shows that infants, children and adolescents experience serious negative psychological, emotional, social, and developmental impacts to their well-being from the traumatic ongoing experiences of domestic violence. A number of recent Australia studies examining the family law system have brought attention to the experiences of children affected by violence and an urgent call to improving policies and practices to protect and support children and victimised caregivers. Research has shown that children and victimised caregivers can cope and recover, particularly when specialised services are offered. Specialised programs and counselling models are rapidly being developed and implemented, often with a growing focus of attending to the mother-child relationship. This review examines the literature in general and the recent Australia studies of family law legislation to explore the impacts on children who are affected by domestic violence, and provides recommendations for generalist social service practitioners working with these families.

Details: Sydney: Australian Domestic & Family Violence Clearinghouse, University of New South Wales, 2011. 26p.

Source: Internet Resource: Accessed November 23, 2011 at: http://www.austdvclearinghouse.unsw.edu.au/documents/ImpactofDVonChildren.pdf

Year: 2011

Country: International

Keywords: Children Affected by Violence

Shelf Number: 123435


Author: Lindley, Jade

Title: Vulnerabilities to Trafficking in Persons in the Pacific Islands

Summary: There is emerging evidence that the Pacific Island region is vulnerable to the crime of trafficking in persons. Using information from a range of Pacific Island stakeholder forums and consultations conducted by the Australian Institute of Criminology (AIC), together with a review of the literature, key issues relevant to trafficking in persons in the Pacific Islands region are identified in this paper. Existing patterns of people movement, weak border and immigration controls, states affected by poor governance, failing rule of law and corruption, the impact of cultural practices entwined with poverty and a limited capacity to respond to natural disasters are identified as key vulnerabilities to trafficking in persons. It is noted that the factors that facilitate susceptibility to trafficking also provide focal areas for strategies to prevent and suppress trafficking in persons and to address transnational crime in the Pacific Islands region more generally. This paper provides a foundation for ongoing research on trafficking in persons in the Pacific Islands region and the identification of effective prevention strategies, which will be undertaken by the AIC in the future.

Details: Canberra: Australian Institute of Criminology, 2011. 7p.

Source: Internet Resource: Trends
& Issues in Crime and Criminal Justice, No. 428: Accessed November 23, 2011 at: http://www.aic.gov.au/documents/C/1/9/%7BC19D723B-44B8-4B02-9FA5-CB4470207AE7%7Dtandi428.pdf

Year: 2011

Country: International

Keywords: Human Trafficking (Pacific Islands)

Shelf Number: 123444


Author: Cockayne, James

Title: State fragility, organised crime and peacebuilding: towards a more strategic approach

Summary: Fragile states, with their ready pools of unemployed labour, populations inured to violence and weakened state capacity, offer sites of competitive advantage for militant organisations, criminal networks and political leaders alike. Collaboration among them may benefit all three – financing militancy, protecting crime and securing political control. Criminal networks threaten not only to fuel conflict, but also to undermine post-war gains – by criminalising politics and instrumentalising continuing disorder, thereby creating pervasive fragility in the international system. Yet the international community currently lacks a coherent approach to tackling organised crime in conflict-affected communities. This report argues that there are normative, analytical and practical obstacles to the development of an effective response. Firstly, at the normative level, sovereignty represents a constraint on international action, especially where crime and politics are intertwined. Secondly, there is analytical confusion regarding how to understand and respond to organised criminal actors in peacebuilding contexts. Security-oriented actors tend to treat organised criminals as potentially violent spoilers of peace processes – or potential partners for peace – and focus on coercion, negotiation and compromise. Development actors tend to focus on addressing the structural factors – such as high unemployment, access to weapons and access to profitable illicit markets – that criminal entrepreneurs exploit. These different approaches are poorly integrated and sometimes compete outright. Thirdly, there are numerous obstacles to the international mobilisation and organisation of the capacity needed to tackle organised crime effectively, particularly specialist investigative resources and analytical expertise. The report suggests treating organised crime as a strategy of governance, and differentiates among different strategies (predatory, parasitic, symbiotic) that may pose different threats to peacebuilding. Finally, it proposes a series of specific steps that might be taken immediately and in the medium and long term to equip peace builders with the analysis, tools and capacity they need to mount a more strategic response.

Details: Oslo, Norway: NOREF (Norwegian Peacebuilding Resource Centre), 2011.

Source: Internet Resource, NOREF Report: Accessed on December 8, 2011 at: http://www.peacebuilding.no/var/ezflow_site/storage/original/application/2af427c8039ed02db6fd29fab1144aa8.pdf

Year: 2011

Country: International

Keywords: Criminal Networks

Shelf Number: 123507


Author: Robertson, Robyn D.

Title: State of Knowledge: Female Drunk Drivers

Summary: The purpose of this report is to provide a current state of knowledge about drunk driving among female drivers. Its objectives are to describe the magnitude of the female drunk driver problem, the characteristics of these offenders, the current involvement of female drivers testing positive for alcohol in fatal crashes, and effective strategies that are available and being applied to manage this population.

Details: Ottawa: Traffic Injury Research Foundation, 2011. 116p.

Source: Internet Resource: Accessed January 10, 2012 at: http://www.tirf.ca/publications/PDF_publications/state_of_knowledge_female_impaired_drivers_11.pdf

Year: 2011

Country: International

Keywords: Driving Under the Influence

Shelf Number: 123540


Author: Bell, Brian

Title: Immigrant Enclaves and Crime

Summary: There is conflicting evidence on the consequences of immigrant neighbourhood segregation for individual outcomes, with various studies finding positive, negative or insubstantial effects. In this paper, we document the evolution of immigrant segregation in England over the last 40 years. We show that standard measures of segregation point to gentle declines over time for all immigrant groups. However, this hides a significant increase in the number of immigrant enclaves where immigrants account for a substantial fraction of the local population. We then explore the link between immigrant segregation, enclaves and crime using both recorded crime and self-reported crime victimization data. Controlling for a rich set of observables, we find that crime is substantially lower in those neighbourhoods with sizeable immigrant population shares. The effect is non-linear and only becomes significant in enclaves. It is present for both natives and immigrants living in such neighbourhoods. Considering different crime types, the evidence suggests that such neighbourhoods benefit from a reduction in more minor, non-violent crimes. We discuss possible mechanisms for the results we observe.

Details: Bonn, Germany: Institute for the Study of Labor, 2011. 42p.

Source: Internet Resource: IZA Discussion Paper No. 6205: Accessed January 10, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1976536

Year: 2011

Country: International

Keywords: Immigrants

Shelf Number: 123541


Author: United Nations Office on Drugs and Crime

Title: The Criminal Justice Response to Support Victims of Acts of Terrorism

Summary: The handbook draws on the national experiences of a broad range of geographically representative criminal justice experts regarding programmes of assistance and support for victims of acts of terrorism. This handbook is intended to share experiences related to support mechanisms for victims of terrorism, and to give policymakers and criminal justice officials practical insights into challenges faced, and good practices developed, by their counterparts at the national and regional level. Our hope is that this handbook will aid Member States in the development and implementation of programmes of assistance and support for victims of acts of terrorism within their respective criminal justice systems. Victims have long played a secondary, and mostly silent, role in criminal trials. UNODC recognizes the importance of representing victims’ interests in criminal proceedings and the relevance of developing comprehensive programmes that effectively provide adequate treatment to victims of acts of terrorism. Effective criminal prosecution of alleged perpetrators is a crucial factor in reducing the perception of victimization and of impunity for terrorist acts. Granting victims equal and effective access to justice is also essential. In order to further integrate the perspective of victims into UNODC’s capacity-building activities addressing the criminal justice aspects of countering terrorism, the role of victims and their surviving family members in criminal proceedings needs to be emphasized. The publication of this handbook comes at a moment of great sorrow for UNODC and for the entire United Nations. On 26 August 2011, the United Nations office in Abuja, Nigeria, was the target of a terrorist attack that shocked the world and drew global condemnation. The car bomb that was detonated cut short the lives of twenty-four friends and colleagues working for the betterment of humanity. The attack targeted not only the United Nations presence in Nigeria, but also its universal values and global missions of peace. In the face of such heinous acts, we have responded with strengthened resolve to fight against terrorism and build a safer, more just and peaceful world for all. We dedicate this publication to our colleagues who lost their lives in Abuja, and in the increasing number of terrorist attacks on United Nations’ premises in recent years, as well as to all victims of terrorist acts worldwide.

Details: Vienna: UNODC, 2011. 118p.

Source: Internet Resource: Accessed January 10, 2012 at: http://www.unodc.org/documents/terrorism/Victims_Rights_E-Book_EN.pdf

Year: 2011

Country: International

Keywords: Terrorism

Shelf Number: 123547


Author: Savona, Ernesto U.

Title: Understudied Organized Crime Offending: A Discussion of the Canadian Situation in the International Context

Summary: This report provides an analysis of selected possible understudied organized crime activities in the Canadian context, contributing to the knowledge on both of the nature and the scope of organized crime. The analysis involved an extensive review of the existing state of organized crime literature in the international context. The analysis was based on available literature, official reports and informed speculations.

Details: Ottawa: Public Safety Canada, 2011. 38p.

Source: Internet Resource: Accessed January 12, 2012 at: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/Understudied_Organized_Crime_Offending_A_Discussion_of_the_Canadian_Situation_in_the_International_Context-English.pdf

Year: 2011

Country: International

Keywords: Counterfeit Goods

Shelf Number: 123556


Author: Transform Drug Policy Foundation

Title: The War on Drugs: Creating Crime, Enriching Criminals

Summary: The global war on drugs has been fought for over 50 years, to achieve its stated goal of a “drug-free worldâ€. Yet despite the ever increasing resources spent on police and military efforts to suppress the illicit drug trade, supply has more than kept pace with rising global demand. Indeed, most indicators suggest drugs are cheaper and more available than ever before. This briefing summarises the crime-related costs stemming from the war on drugs, which include: • Organised crime arising from the illicit drug trade, and its knock-on effects in terms of money laundering, corruption and violence • Street-level crime committed by drug gangs and by dependent drug users attempting to support their habits • The criminalisation of users, excessive levels of incarceration, and crimes committed by governments under the banner of the drug war • The economic costs of drug war-related crime, and the criminal justice response to it There is overlap with other areas of the Count the Costs initiative – human rights (including a detailed discussion of prison issues), security and development, discrimination and stigma, public health, the environment and economics.

Details: London: Transform Drug Policy Founcation, 2011. 14p.

Source: Internet Resource: Accessed January 12, 2012 at:

Year: 2011

Country: International

Keywords: Drug Policy

Shelf Number: 123567


Author: Transform Drug Policy Foundation

Title: The War on Drugs: Causing Deforestation and Pollution

Summary: Examining a range of environmental issues surrounding the war on drugs, the briefing includes several case studies as well as sections on: •The futility of drug crop eradications •The aerial fumigation of drug crops, a practice that is still permitted in the world’s second most biodiverse country, Colombia •The deforestation that occurs as law enforcement drives drug crop producers into ever more remote and ecologically valuable regions •The pollution caused by unregulated, illicit drug production methods While some of the consequences of the war on drugs are relatively well known and understood by those aware of the issue, the environmental impacts of current drug policy are seldom given proper consideration. This must change. As this briefing outlines, if these environmental costs are to be minimised or avoided, alternative forms of drug control must be explored.

Details: London: Transform Drug Policy Foundation, 2011. 12p.

Source: Internet Resource: Accessed January 12, 2012 at: http://www.countthecosts.org/sites/default/files/Environment-briefing.pdf

Year: 2011

Country: International

Keywords: Crop Eradication

Shelf Number: 123591


Author: Sheptycki, James

Title: The Global Literature on Organized Crime: An Interpretive Report on the Development and Meta- Analysis of an Annotated Bibliographic Database for Canadian Policy Makers

Summary: The organization of crime in Canada affects and is affected by broader global currents, and Canadians can learn from examples of best practices both at home and abroad. Public Safety Canada [PSC] recently sought the development of an annotated bibliographic database, populated with a current body of literature which has been assessed for its validity and relevance, together with a meta-analysis of existing global research which can inform the criminal justice enforcement community and serve as a model for the continued expansion of reliable knowledge in the field. The following analytical report accompanies the delivery to Public Safety Canada of an expandable, updatable and electronically stored bibliographic database of research literature on the organization of crime and practical responses to it. This database is currently populated with over 300 annotated references and includes extensive search features which will support both researchers and criminal justice practitioners in their efforts against organized crime in Canada. In this report, the authors describe the method and scope of their global search for relevant and valuable research and policy literature. As well, organized within several subject theme categories, the authors offer extensive commentary on the nature and quality of the existing research and policy literature together with detailed interpretations on the evident trends in prevention and enforcement.

Details: Ottawa: Organized Crime Division, Law Enforcement and Policy Branch, Public Safety Canada,46p.

Source: Internet Resource: Accessed January 13, 2012 at: http://publications.gc.ca/collections/collection_2011/sp-ps/PS4-97-2010-eng.pdf

Year: 2010

Country: International

Keywords: Organized Crime

Shelf Number: 123600


Author: D'Amato, Alessio

Title: Bureaucrats vs the Mafia: Corruption, Extortion and Illegal Waste Disposal

Summary: We develop a simple model where an economic agent chooses the level of legal and illegal disposal. Illegal disposal implies corruption of a bureaucrat in charge of waste management. In the absence of a criminal organization, illegal disposal is performed by the agent, who is subject to enforcement and bribes the bureaucrat. At the opposite, in the presence of a criminal organization, illegal disposal is performed by the mafia, which requires an extortion rate from the agent and bribes the public official; in this latter case no enforcement on the agent is possible. The environmental authority sets the enforcement e¤ort as well as the waste tax rate. In our setting the waste tax rate can be either budget balancing or optimally de…ned. Results suggest that the presence of the ma…fia leads to a larger illegal disposal and a larger economic activity. Enforcement is always smaller in the presence of the mafi…a under the optimal tax rate, while the results are ambiguous under a budget balancing tax rate. Interestingly, the optimal tax rate implies smaller incentives for the criminal organization to enter the market, and welfare might be higher when the mafia is present.

Details: Unpublished paper: 2011. 16p.

Source: Internet Resource: Accessed January 13, 2012 at: http://www.webmeets.com/files/papers/EAERE/2011/434/Corruption_Mafia_Waste_EAERE2011.pdf

Year: 2011

Country: International

Keywords: Bribery

Shelf Number: 123602


Author: Taylor, Alice

Title: Women and the City: Examining the Gender Impact of Violence and Urbanisation. A Comparative Study of Brazil, Cambodia, Ethiopia, Liberia and Nepal

Summary: Utilising the participatory methodology of safety audits developed and tested by a range of organisations in the “safe cities movementâ€, the report looks into the lives of groups of women whose knowledge and views of their urban realities is central to creating safer cities. These include garment workers from urban factory areas in Phnom Penh, Cambodia, women attending universities in and around Monrovia in Liberia, and women informal vendors in Addis Ababa, Ethiopia, to name a few. The research explores the ways violence and insecurity limit poor urban women’s mobility and their participation in society. Urbanisation can bring new opportunities, particularly in relation to employment and participation in organised groups. However, it also brings many challenges. Across the world, women experience violence or the fear of violence on a daily basis, travelling to and from work, taking their children to schools and travelling to and from markets. Moreover, urban men and women experience violence differently. They also experience and perceive protection and safety differently. Analysing these differences is a central first step to guaranteeing women’s rights to freedom from violence or the threat of violence in urban areas. From an urban planning perspective, cities often struggle to maintain services and infrastructure that adequately meet the needs and are within reach of their growing populations. Specific barriers are experienced by the poor and particularly by poor women. In this research, the challenges faced by women often reflect the safety and health consequences that some migrants face in the process of rural to urban migration, such as lack of access to decent work opportunities, poor access to services and inadequate transportation. However, only too often, the challenges faced by women in cities are interpreted or excused as women’s fault, rather than the result of urban design that fails to take into account gendered impacts. For example, such violence may be excused on the basis of a woman’s choice of dress or her decision to travel alone, at night, unaccompanied by a male. Examining the gender impacts of urbanisation is central to informing programmes and policies that reflect women’s realities and promote women’s right to the city.

Details: Johannesburg, South Africa: ActionAid, 2011. 80p.

Source: Internet Resource: Accessed January 13, 2012 at: http://www.actionaid.org/publications/women-and-city-examining-gender-impact-violence-and-urbanisation

Year: 2011

Country: International

Keywords: Fear of Crime

Shelf Number: 123613


Author: Transform Drug Policy Foundation

Title: The War on Drugs: Undermining Human Rights

Summary: The global “war on drugs†has been fought for 50 years, without preventing the long-term trend of increasing drug supply and use. Beyond this failure, the UN Office on Drugs and Crime (UNODC) has identified many serious “unintended negative consequences†of the drug war – including widespread human rights abuses.(1) These human rights costs result not from drug use itself, but from choosing a punitive enforcement-led approach that, by its nature, criminalises many users, often the most vulnerable in society, and places organised criminals in control of the trade. This briefing summarises these human rights costs. There is naturally overlap with other areas of the Count the Costs project, including: security and development, discrimination and stigma, public health, crime, the environment, and economics.

Details: London: Transform Drug Policy Foundation, 2011. 18p.

Source: Internet Resource: Accessed January 17, 2012 at: http://www.countthecosts.org/sites/default/files/Human_rights_briefing.pdf

Year: 2011

Country: International

Keywords: Drug Control

Shelf Number: 123633


Author: U.S. Department of Homeland Security

Title: Intellectual Property Rights: Fiscal Year 2011 Seizure Statistics

Summary: Theft of intellectual property is a serious crime, and in Fiscal Year (FY) 2011, Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) remained vigilant in their commitment to protect America by expanding their efforts to seize infringing goods. Counterfeit and pirated goods pose a serious threat to America’s economic vitality, the health and safety of American consumers, and our critical infrastructure and national security. Through coordinated efforts to interdict infringing merchandise, including joint operations, CBP and ICE enhanced intellectual property enforcement while facilitating the secure flow of legitimate trade and travel. • The number of Intellectual Property Rights (IPR) seizures increased by 24% to 24,792 in FY 2011 from 19,959 in FY 2010. • The domestic value of IPR seizures decreased by 5% from $188.1 million to $178.9 million due to the following: • The number of high-volume but low-value seizures • The number of high-volume but low-value seizures, including express courier and consolidated shipments, increased significantly. • The average value of an IPR seizure dropped to $7,193 in FY 2011, the lowest average value for IPR seizures in the last 10 years. • The estimated Manufacturer’s Suggested Retail Price (MSRP) for all FY 2011 IPR seizures is $1.1 billion, a slight decline from FY 2010. • The value of consumer safety and critical technology seizures soared to more than $60 million due to an increase in pharmaceutical and perfume seizures. • The number of consumer safety and critical technology seizures increased by 44%, and the value of these seizures rose by 41% compared to FY 2010 totals.

Details: Washington, DC: U.S. Department of Homeland Security, 2011. 34p.

Source: Internet Resource: Accessed January 17, 2012 at: http://www.ice.gov/doclib/iprcenter/pdf/ipr-fy-2011-seizure-report.pdf

Year: 2011

Country: International

Keywords: Border Security

Shelf Number: 123639


Author: Kar, Dev

Title: Illicit Financial Flows from Developing Countries Over the Decade Ending 2009

Summary: This report provides estimates of illicit financial flows (IFFs) from developing countries over the decade 2000-2009 based on balance of payments (BoP), bilateral trade, and external debt data reported by member countries to the IMF and the World Bank. It should be noted that estimates of IFFs at the developing world, regional, and country levels presented in this report could differ from those published in the 2010 report due to revisions to underlying data, reported by member countries. The most notable finding in this report is that in 2009 IFFs from developing countries, led by the top ten exporters of illicit capital, most of which are in Asia and the Middle East and North Africa (MENA) region, have declined by 41 percent over the last year. Principal components analysis seems to indicate that this decline was the result of the global economic crisis which tended to reduce the source of funds (new external loans and net foreign direct investments), increase the use of funds and reduce trade mispricing due to lower trading volumes. We find no reason to subscribe the wide-ranging reduction in IFFs to far-reaching economic reform or improvements in overall governance in major emerging markets.

Details: Washington, DC: Global Financial Integrity, 2011. 100p.

Source: Internet Resource: Accessed January 17, 2012 at: http://www.ciponline.org/images/uploads/publications/illicit_financial_flows_from_developing_countries_over_the_decade_ending_2009.pdf

Year: 2011

Country: International

Keywords: Corrupt Practices

Shelf Number: 123640


Author: United Nations Office on Drugs and Crime

Title: Issue Paper: Smuggling of Migrants by Sea

Summary: Smuggling of migrants is defined by Article 3 of the Migrant Smuggling Protocol supplementing the United Nations Transnational Organized Crime Convention (UNTOC), as “...the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national.†The specific nature of the seaâ€based component of the smuggling journey resulted in a dedicated section on the issue in the Migrant Smuggling Protocol. While smuggling by sea accounts only for a small portion of overall migrant smuggling around the world, the particular dangers of irregular travel at sea make it a priority for response; though more migrant smuggling occurs by air, more deaths occur by sea. The journey of the migrant smuggled by sea often starts a significant distance away from the coast of departure. Some journeys to the coast may take mere days, but others can take place over years during which the migrant must work en route to raise money for his passage. Arduous desert crossings and victimization by smugglers and other criminals en route mean that some do not survive overland journeys to the coast. Contrasted with these extreme experiences, economically empowered migrants can afford a higher level of smuggling service and may experience no particular hardship, simply travelling through various international airport hubs toward the coastal country from where their sea journey commences. The type and size of vessel used to smuggle migrants by sea depends on the time, place and financial capacity of migrants undertaking the smuggling journey. In some countries, boats of only a handful of passengers are commonly intercepted by authorities, while in others vessels of several hundred people have been used. While voyages may be comfortable when conditions at sea are mild and the vessel is equipped with adequate food, water and sanitation, the journey is a harrowing one for the majority of migrants who report rough conditions, terrible cold and scarce food and water. The nature of the crime and its relationship with smuggling of migrants by land and by air means that it is a successful crime type that yields high profits for smugglers with all the risks being borne by migrants. Indeed, migrant smuggling by sea can be understood as a criminal business, which is competitively run as such. Smuggling by sea is generally carried out by flexible criminal groups or individuals operating on the basis of repeated contractual arrangements, rather than by hierarchical organizations. There are two methods used when vessels approach coasts of destination. One aims to reach land by evading detection by authorities, the other sets out to be detected and intercepted or rescued by authorities in territorial waters of destination coastal countries. In both situations, detecting smuggling vessels at sea is a key challenge for coastal states which may have limited resources and large search and rescue areas of responsibility. Upon detecting vessels, the key challenge is to balance objectives with obligations at international law, including the Migrant Smuggling Protocol. Smugglers are generally wellâ€informed about states’ protection obligations and act to exploit them, instructing migrants what to do upon interception to increase their chances of gaining entry into and remaining in countries of destination. For instance, officials responsible for intercepting vessels at sea have been faced with situations of people sabotaging their own vessels to force authorities to carry out rescues. Suggestions made in respect of encountering migrant smuggling at sea include Page 8 of 71 increased support of coastal states through joint patrols and provision of resources, and increased compliance with international legal standards and obligations in carrying out interceptions of smuggling vessels at sea. While responding to the situation at hand and ensuring that persons on board are appropriately assisted, a key challenge is to seize evidentiary opportunities to investigate smugglingâ€related crimes. The complex nature of migrant smuggling networks and their modus operandi means that smugglers cannot be identified purely by looking to smugglers who may be on board boats; the transnational criminal network itself must be traced from a smuggling vessel, back to the coast of embarkation, and from there back to countries of transit and origin. Suggestions made for improved investigation and prosecution of migrant smuggling by sea include harmonizing domestic legislation with the UNTOC and the Migrant Smuggling Protocol. Further it is suggested that sentences imposed for smuggling offences be publicized as a means of deterring wouldâ€be smugglers. Capacity building measures are also suggested so as to increase identification of smugglers on vessels, and to better link seaâ€based crimes with landâ€based smugglers. Preventing migrant smuggling by sea requires states to balance their obligations in international law with their legitimate interests in protecting state sovereignty from violation by organized crime groups. But law enforcement efforts alone are not adequate to prevent migrant smuggling by sea; the Migrant Smuggling Protocol stresses that prevention efforts must address root causes that lead a person into the hands of smugglers in the first place. Suggestions made for preventing migrant smuggling at sea include raising awareness about the dangers of sea smuggling journeys and the criminality of smuggling. Suggestions are also made to raise awareness of those who influence political and policy decisions, so policies put in place protect state sovereignty, uphold international obligations, and are not vulnerable to exploitation by smugglers. Also emphasised is the responsibility of coastal states of departure to intercept smuggling vessels before they embark on sea journeys. Beyond this, comprehensive data collection, analysis and research are suggested to strengthen evidenceâ€based responses. Experts from countries of origin, transit and destination unanimously agree that the most essential ingredient for effective and comprehensive response to migrant smuggling by sea is strengthened international cooperation to remove areas of impunity for smugglers along smuggling routes. Suggestions made for cooperating in response to migrant smuggling at sea include aligning activities with the Migrant Smuggling Protocol and increasing the role of UNODC in facilitating cooperative response. The value of bilateral and regional cooperation arrangements is stressed, with emphasis on flexible cooperative networks for effective and efficient onâ€theâ€ground response. Regular coordination meetings and joint operations are suggested to improve strategic and operational interagency coordination, as is the empowerment of central designated authorities to address migrant smuggling by sea. In short, while it is difficult to make generalizations about migrant smuggling by sea, two key points hold true around the world. Firstly, migrant smuggling by sea is the most dangerous type of smuggling for the migrants concerned, making it a priority concern for State response. Secondly, efforts to combat smuggling of migrants will be unsuccessful unless cooperation is strengthened not only between countries of sea departure and arrival, but also among the countries of origin, transit and destination along the entire smuggling route.

Details: Vienna: UNODC, 2011. 71p.

Source: Internet Resource: Accessed January 17, 2012 at: http://www.unodc.org/documents/human-trafficking/Migrant-Smuggling/Issue-Papers/Issue_Paper_-_Smuggling_of_Migrants_by_Sea.pdf

Year: 2011

Country: International

Keywords: Human Smuggling

Shelf Number: 123647


Author: Downes, Paul

Title: Not One Victim More: Human Trafficking in the Baltic States

Summary: Trafficking of women for sexual exploitation raises one of the most urgent and alarming challenges confronting states everywhere. A form of slavery which has thrived in an increasingly interconnected and globalised world, it defies easy resolution. Despite its prohibition in international and European law, and the fact that there have even been calls for its recognition as a crime against humanity, it is a phenomenon which has largely evaded legal attempts at resolution. In that context, this book makes an original, timely and far-reaching contribution to the debate around trafficking. Moving beyond the realm of legal anti-trafficking strategies, this victimcentred, empirical and multi-disciplinary work has resulted in an enlightening, multifaceted perspective on the difficult challenge of trafficking. Not only does this book provide an effective and much-needed platform for the victims of trafficking to record their experiences, but it also recognises and explores the possibilities of a holistic strategy in responding to trafficking, which harnesses both the co-operation of states and the expertise of a broad range of disciplines. Founded on a subtle empirical study of the experiences of the victims of trafficking, this book enables the victims of trafficking to convey their stories much more forcefully than abstract academic or statistical commentary ever could. The interviews of these victims facilitate examination of the reasons why these women become trapped by trafficking: mostly, poverty, despair, educational difficulties, inadequate socio-economic opportunities or coercion. They also convey the sense of isolation and social exclusion experienced by these women, the difficulties they have extricating themselves from trafficking after they have fallen victim to it, and the inadequacies of law in responding to their plight. By focusing on those who have fallen prey to trafficking as a result of the collapse of the former Soviet Union and the opening of the borders to the West, attention is also drawn to the cruel way in which trafficking exploits the innocent hopes of those crossing borders, in anticipation of new experiences and better lives. As for its multi-disciplinary perspective, this book recognises that antitrafficking strategies require not only international co-operation between states, but also inter-disciplinary contributions from psychology, law, social policy, economics and education. Insightful contributions are made here from all these disciplines, and throughout, the contributors write dispassionately, but sensitively, about this highly emotive issue, avoiding the brash, emotional and simplistic responses which can be so easily evoked in this context. While acknowledging that an ever-improving legal framework is important, emphasis is placed on the need for wide-ranging strategies which engage not only legislators, the police, prosecutors, and the courts, but indeed all state actors and nongovernmental organisations. Based on the evidence of the interviews, important practical recommendations are made which range from campaigns to increase awareness of the gravity of trafficking, to stricter monitoring of the standards of agencies arranging employment abroad, to training of state agents in dealing with trafficking, to counselling, return programmes, legal assistance and witness protection programmes for the victims themselves. Finally, while the themes and issues highlighted are explored in the context of the Baltic States, it is clear that the findings, conclusions and recommendations with regard to prevention, protection and prosecution have an application to wider European and international contexts. The rich combination of empirical work and multi-disciplinary perspectives provided by this book will make a meaningful and lasting contribution to the fight against trafficking of women for sexual exploitation.

Details: Tallinn, Estonia: Living for Tomorrow, 2008. 302p.

Source: Internet Resource: Accessed January 19, 2012 at: http://www.lft.ee/tf.oigus/tf.failid/2006925174343/Not_One_Victim_More.pdf

Year: 2008

Country: International

Keywords: Human Trafficking (Baltic States)

Shelf Number: 123668


Author: Casey, Sharon

Title: Review of Programmes in Youth Training Centres. Part 1: Literature Review

Summary: This report contains a detailed account of the published literature relevant to the delivery of effective programmes in youth training centres. This is important for several reasons: first it has been established that some programmes offered to offenders, even when delivered with the best of intentions, can work in opposite ways to those intended. In other words, some programmes increase, rather than decrease, the risk of a young person reoffending. The best examples of this comes from programmes like ‘Scared Straight’ (where young offenders are taken into adult prisons in an attempt to deter them from further offending), and boot camps (highly structured, physically challenging, residential programmes often run on paramilitary lines). Whilst significant efforts and resources have been allocated to the development and delivery of these types of programmes, evaluations have consistently shown that they do not produce the types of outcomes that they were intended to produce. In short, then, it is not always wise to trust our intuitions or personal beliefs about ’what works’ best for juvenile justice clients. Rather there is a need to evaluate different programmes against standard criteria, and base decisions about which programmes to offer on the basis of what can be shown to be the most effective. Indeed, this is the idea that underpins the notion of evidence based practice, and most health and justice organisations around the world would now subscribe to this approach to service delivery. That is not to say that programmes that have not been evaluated do not work, rather that we do not know whether they work. There is clearly an important role for development and pilot programmes, but these programmes should not form the basis for service delivery. By offering programmes that can be demonstrated to be effective, service providers become accountable to external agencies, young people and the community, and all stakeholders can have confidence in the quality of the services being offered. In this review, the evidence base underpinning effective programmes for young offenders is described. Evidence can come not only from programme evaluations, but also from theories about the causes of juvenile crime. Indeed researchers have shown that programmes that are based on a coherent theory are around six times more effective than programmes that are not. As such the first part of the review is dedicated to a review of different theories of crime. The focus here is on developmental theories of crime (that is, understanding how criminal behaviour changes as people grow older) as these are considered to be the most appropriate types of theory to guide programming decisions in youth justice. A number of different developmental theories are described, although there are many similarities between each of the theories. Each theory seeks to explain the way in which biological, individual, familial, social, and community and cultural factors interact with life events to create a situation where offending may occur. Such theories have led to the identification of both risk and protective factors for offending and how these may change at key transitional points (for example, starting school; moving from primary to high school; leaving school). This work is important as it suggests, theoretically, that if programmes and services can either reduce the number of (or intensity of) risk factors, or increase the number of protective factors, then they are likely to be effective in reducing the probability of a young person offending. In other words the theories offers important suggestions about what programmes should aim to change. There is now a reasonable body of evaluation research documenting the outcomes of a range of different types of programmes with young offenders. At the same time there are still many gaps in the literature – some of the research is conducted with older age groups (for example, young offenders are classified as from ages 15-21 years in some countries), and there is very little published research on effective programmes either for young women or for those who identify as from indigenous cultural backgrounds. However, evaluations have shown that programmes are more effective when they have certain characteristics, such as the types of person , the areas of functioning , and the methods used to bring about that change. For example, the most effective programmes are offered to those young people who are at the most risk of re-offending, address those areas of need that are most closely associated with the reasons why they offend (for example, substance use, associating with other offenders), and are delivered in ways that match the learning styles of adolescents (for example, structured and skills focussed). Perhaps unsurprisingly the most effective programmes are also delivered by highly trained staff who are well supported in their work. It is, however, clear that specialist programmes for juvenile offenders need to be developed such that they are age and developmentally appropriate. Programmes cannot simply be imported in from adult correctional settings. There is a limited research base from which to examine specific types of programmes, and in this review programmes for violent offenders, sexually aggressive offenders, and substance use are considered separately, along with the evidence for more generic programmes (such as cognitive skills and social skills programmes), programmes to improve family functioning (such as fostering programmes and multi-systemic therapy), and educational and vocational achievement. It is concluded that all of these programmes have an important role to play in any approach that seeks to meet the needs of youth justice clients. However, one programme is unlikely to meet all of the needs of a young person, and supplementary programmes targeting other areas (for example, health and education) also have an important role to play. Whilst this report is a review of the scientific and research literature, and has been written in an academic way that attempts to adequately describe the current knowledge base, the hope is that it will provide a stimulus for readers to think about how this evidence might inform their own practice. What is clear from this review is that the starting point for any review of programmes in the youth training centres has to be the theoretical and empirical evidence from Australia and internationally relating to what is currently known about what will work best for youth justice clients. In conclusion then, it is important for those involved in programme design and delivery to have some awareness of the literature reviewed in this report.

Details: Adelaide: Guardian for Children and Young People, 2008. 61p.

Source: Internet Resource: Accessed January 20, 2012 at: http://www.sapo.org.au/pub/pub10623.html

Year: 2008

Country: International

Keywords: Correctional Program, Juveniles

Shelf Number: 123691


Author: International Atomic Energy Agency

Title: Combating Illicit Trafficking in Nuclear and other Radioactive Material

Summary: This publication is intended for individuals and organizations that may be called upon to deal with the detection of and response to criminal or unauthorized acts involving nuclear or other radioactive material. It will also be useful for legislators, law enforcement agencies, government officials, technical experts, lawyers, diplomats and users of nuclear technology. In addition, the manual emphasizes the international initiatives for improving the security of nuclear and other radioactive material, and considers a variety of elements that are recognized as being essential for dealing with incidents of criminal or unauthorized acts involving such material.

Details: Vienna, Austria: International Atomic Energy Agency, 2001. 156p.

Source: IAEA Nuclear Security Series No. 6, Technical Guidance Reference Manual. Internet Resource: Accessed on January 22, 2012 at http://www-pub.iaea.org/MTCD/publications/PDF/pub1309_web.pdf

Year: 2001

Country: International

Keywords: Trafficking of Nuclear Materials

Shelf Number: 123725


Author: Matas, David

Title: Report Into Allegations of Organ Harvesting of Falun Gong Practitioners in China

Summary: It is alleged that Falun Gong practitioners are victims of live organ harvesting throughout China. This report presents the findings of an investigation into these allegations.

Details: Unpublished, 2006. 66p.

Source: Internet Resource: Accessed on January 23, 2012 at http://organharvestinvestigation.net/report0607/report060706-eng.pdf

Year: 2006

Country: International

Keywords: Human Rights

Shelf Number: 123745


Author: Iganski, Paul

Title: Rehabilitation of hate crime offenders

Summary: In October 2010 the Equality Act came into force which, among the new general duties it places on public bodies, requires public authorities to take action to “promote understanding†and “tackle prejudiceâ€. The duty on a public body to reduce prejudice can be seen to include working with those people in the community whose prejudice has an impact both on them and the people around them and therefore applies to the area of criminal justice and ‘hate crime’ offenders. However, despite the growing attention and interest in hate crime, there is a clear need for a shared learning about how to effectively manage offenders. This report aims to provide a contribution to that learning by presenting a research review of some of the initiatives that have been established. The aims of the research were to: identify, from an international search, programmes designed for the rehabilitation of hate crime offenders; determine the transferability of programmes, or elements of them, for practice learning in the UK; make recommendations for the design and delivery of rehabilitative programmes for hate crime offenders in the UK. The research drew on international knowledge and expertise to look for relevant programmes in North America, Australia and New Zealand, and Europe, as well as in the UK, and, when programmes were identified, sought more information wherever possible by visits and telephone contacts with those responsible for the programmes. No programmes were found in Australia, New Zealand or Canada. The programmes identified in the United States, most of which were aimed at young offenders, had mostly ceased to function, usually because of problems of funding. Programmes were, however, identified in Germany and Sweden, which – unlike programmes identified in the United Kingdom – are intended specifically for offenders who have or have had some contact with far-right racist groups. The UK programmes identified share with those in Europe a commitment to the acceptance and understanding, rather than the rejection and condemnation, of racially motivated offenders, and have shown that it is possible to work with them constructively while firmly conveying that racist attitudes and behaviour are not acceptable. On the basis of the research findings, and in the context of the 2010 Equality Act, a number of recommendations are made for the design and delivery of programmes for the rehabilitation of hate crime offenders in the UK.

Details: Scotland: Equality and Human Rights Commission, 2011. 56p.

Source: Research Report. Internet Resource: Accessed on January 26, 2012 at http://www.equalityhumanrights.com/uploaded_files/Scotland/Research/rehabilitation_of_hate_crime_offenders_report_word_for_web_2_.doc

Year: 2011

Country: International

Keywords: Bias Crime

Shelf Number: 123773


Author: Rinehard, Britta

Title: Armed Guards on Merchant Vessels

Summary: The threat of piracy off the coast of Somalia, as well as in the Gulf of Aden (GoA), Horn of Africa (HoA) and the Indian Ocean has sparked a new discussion on the use of privately contracted armed security personnel (PCASP) on board merchant vessels to prevent pirates from successfully boarding and hijacking a vessel. Vessels with low freeboard and/ or low speed are more vulnerable to pirate attacks. Therefore hiring armed guards on these vulnerable vessels are more likely. However, employing private armed guards to protect commercial vessels traveling through pirate-prone waters is controversial for a number of reasons, such as legal issues, safety concerns for seafarers and varying national regulations. This paper will provide a brief overview of the on-going debate over the use of PCASPs as well as recent movements related to this matter.

Details: Norfolk, VA: Civil-Military Fusion Centre (www.cimicweb.org), 2011. 10p.

Source: Internet Resource: Accessed on January 26, 2012 at https://www.cimicweb.org/Documents/CFC%20Anti-Piracy%20Thematic%20Papers/CFC_Anti-Piracy_Report_Armed%20Guards%20October%202011_Final_rmb.pdf

Year: 2011

Country: International

Keywords: Maritime Crime

Shelf Number: 123774


Author: Langelid, Torfinn

Title: Nordic Prison Education: A Lifelong Learning Perspective

Summary: In 1999, the Nordic Council adopted a recommendation on prison education in a Nordic perspective. In September 2001, a Nordic project group was appointed to carry out a study, with representatives from the prison and probation services and the educational authorities. The project was directed by the County Governor of Hordaland, Norway. A decision was adopted in 2007 to revise the report in relation to recent research, new surveys, and general developments in the Nordic countries. The purpose of the project was to provide a concise, overall and updated comparative view of education and training in prisons in Denmark, Finland, Norway and Sweden, as well as a brief description of the situation in Iceland, Greenland, the Faeroe islands and the Ã…land islands. If convicted prisoners are to be offered education on equal terms with others in society, the right to education must be clearly stipulated in the legislation. According to this report, good cooperation between the prison and probation services and other authorities is one of the key starting points for satisfying prisoners' educational needs. The prison education offered today does not satisfactorily correspond to prisoners' educational needs. Increased investments in prison education would probably be of added value for society as a whole. This report provides useful documentation for individuals working with any aspect of the wider problem complex relating to prison and probation services.

Details: Copenhagen, Denmark: Norden, 2009. 227p.

Source: Internet Resource: Accessed on January 27, 2012 at http://www.norden.org/en/publications/publikationer/2009-536/at_download/publicationfile

Year: 2009

Country: International

Keywords: Correctional Education (Nordic)

Shelf Number: 123842


Author: FATF-GAFI

Title: Global Money Laundering & Terrorist Financing Threat Assessment

Summary: Since 1989, the FATF has led efforts to counter the abuse of the international financial system by criminals. Over the years, governments, intergovernmental and multi-lateral organisations, the private sector and academics have made great progress in understanding the threats of money laundering (ML) and terrorist financing (TF) and the measures to be taken to make the abuse of the financial system for ML/TF purposes more difficult. But the problem of ML/TF remains and requires ongoing efforts, in particular in the area of detecting and taking enforcement actions against individuals and organisations who conduct these serious illegal activities. The Global Money Laundering and Terrorist Financing Threat Assessment (GTA) report provides an assessment of the global systemic ML/TF threats. The document is aimed at raising the level of understanding of these threats and their negative impact, and help governments to take decisive action to minimise the harms they can cause. The report is based on the in-depth typologies studies and the FATF's Strategic Surveillance Initiative. This initiative was established in 2008, with the following objectives: detect and share information on the types of criminal or terrorist activities that pose an emerging threat to the financial system; develop a more strategic and longer-term view of these threats. This initiative involves the use of a detailed questionnaire which both FATF and FSRB members respond to on a yearly basis. This report was prepared by a team of experts from across the globe. They provided important content, peer review and validation throughout the project with the aim of producing this assessment. The project team comprised members from law enforcement and other agencies responsible for identifying and combating ML/TF from 10 jurisdictions and 8 international organisations.

Details: Paris, France: FATF-GAFI (Financial Action Task Force), 2010. 76p.

Source: Internet Resource: Accessed on January 28, 2012 at http://www.fatf-gafi.org/dataoecd/48/10/45724350.pdf

Year: 2010

Country: International

Keywords: Financial Crimes

Shelf Number: 123847


Author: FATF-GAFI

Title: Organised Maritime Piracy and Related Kidnapping for Ransom

Summary: In recent years, there has been a growing concern over organised piracy on the high seas and kidnapping for ransom. These activities present a number of potential risks to the international financial system and challenges to the law enforcement and regulatory framework worldwide. Piracy for ransom and kidnapping for ransom are considered separate categories of serious criminal offences and as such, they are addressed independently in this study: 1) Maritime piracy for ransom: This section examines the financial implications of piracy as a major proceeds-generating offences. It provides a clear overview of patterns of illicit financial activity associated with this offence. 2) Kidnapping for ransom: This section focuses specifically on kidnapping as a means of financing terrorism and as a means to collect funds and support operations of terrorist groups. It provides a unique insight into the significance of revenue generated from this offence for a number of terrorist groups and criminal organisations, and the role of the formal financial sector. In addition to raising awareness of these important issues, the report also highlights some of the challenges associated with identifying, investigating, and tracing illicit flows associated with maritime piracy for ransom and kidnapping for ransom.

Details: Paris, France: FATF-GAFI (Financial Action Task Force), 2011. 48p.

Source: FATF Report: Internet Resource: Accessed on January 29, 2012 at http://www.fatf-gafi.org/dataoecd/40/13/48426561.pdf

Year: 2011

Country: International

Keywords: Kidnapping

Shelf Number: 123876


Author: Sörenson, Karl

Title: Wrong Hands on Deck? Combating Piracy & Building Maritim Security in Eastern Africa

Summary: This report investigates the threats to maritime security in Eastern Africa, the responses to deal with these threats and the prospects for building maritime security in the region. The report discusses three aspects of maritime security: economic security, state security, and human security. While the Somali piracy, which dominates the security agenda, is mainly an economic security problem, it has both state and human security implications. Other illegal activities, such as smuggling of weapons and drugs, illegal fishing, waste dumping and smuggling of humans are also analysed according to these categorises. The report argues that paying more attention to all these activities; their underlying incentives and area of impact, would benefit the international community’s current work to build maritime security in Eastern Africa.

Details: Stockholm, Sweden: FOI, Swedish Defense Research Agency, Division of Defense Analysis, 2011. 52p.

Source: User Report: Internet Resource: Accessed on January 29, 2012 at http://www.foi.se/upload/projekt/Afrikagruppen/FOI-R--3228--SE%20Marin%20S%C3%A4kerhet.pdf

Year: 2011

Country: International

Keywords: Human Smuggling

Shelf Number: 123877


Author: Mallory, Stephen L.

Title: The concept of asymmetrical policing

Summary: This paper examines the intelligence process and the strategies of problem-oriented policing, community policing, broken windows theory and Compstat. Each of these strategies requires more than just information. They require collection and dissemination of intelligence products and adjustments to meet the needs of different department and agencies. The research suggests that there is a lack of understanding by many police officers in the United States of the intelligence process and the value of analytical products to policing. There is a recognized need for training of police in the U.S. to achieve identification and understanding of crime, the trends and threats, and the nature and extent of the law enforcement response by employing critical thinking, or what is termed the intelligence process and intelligence-led policing. The paper introduces a new concept, asymmetrical policing, which is a response to the asymmetrical threats encountered by modern policing and the application of a variety of evolving strategies to modern policing.

Details: International Police Executive Symposium, 2007. 21p.

Source: IPES Working Paper No. 12: Internet Resource: Accessed on January 31, 2012 at http://www.ipes.info/wps/WPS%20No%2012.pdf

Year: 2007

Country: International

Keywords: Intelligence Gathering

Shelf Number: 123884


Author: Hechler, Hannes

Title: Can UNCAC address grand corruption? A political economy analysis of the UN Convention against Corruption and its implementation in three countries

Summary: The political economies of many developing countries are characterised by varying degrees of patronage and state capture, a reality that has far-reaching implications for measures addressing corruption. Political strategies in such contexts often include maintaining political and economic power through personalised relations and seeking to influence political decisions for the benefit of an individual or group. Gaining and retaining power within these systems is a resource-intensive process, and corruption is a common way to sustain extensive power networks. This report asks whether this insight has found its way into one of the most important current anticorruption instruments, the United Nations Convention against Corruption (UNCAC). Analysis of the Convention itself and implementation efforts in Bangladesh, Indonesia and Kenya suggest that UNCAC is only partly suited to address the political nature of corruption, especially if not complemented by further reform measures.

Details: Norway: U4/CMI Chr. Michelsen Institute, 2011. 86p.

Source: U4 Report: Internet Resource: Accessed on January 31, 2012 at http://www.u4.no/publications/can-uncac-address-grand-corruption/downloadasset/2222

Year: 2011

Country: International

Keywords: Bangladesh

Shelf Number: 123885


Author: DeShazo, Peter

Title: Judicial Reform in Latin America - An assessment

Summary: With an eye toward evaluating and measuring progress in judicial reform in Latin America during the latest wave of the reform process, the Americas Program of the Center for Strategic and International Studies (CSIS) in Washington, D.C., and the Justice Studies Center of the Americas1 (CEJA in Spanish) in Santiago, Chile, commissioned a series of papers on the topic that served as the basis for a conference held on June 7 in Washington, D.C. The individual studies, drafted by experts in the field, evaluated the judicial reform process in Argentina, Chile, Peru, Colombia, Venezuela, and Guatemala. Using these papers as points of reference, CSIS and CEJA brought together a group of distinguished experts in the field of legal reform in Latin America from universities, policy centers, civil society organizations, and the international financial institutions to analyze the current state of the administration of justice in the region. The June 7 conference was organized along the lines of three panels: two dealing with the individual country studies, with the author of each paper making an oral presentation followed by comments from a United States–based expert, and a final panel of four leading authorities providing regional analysis. This report summarizes the work of each of the three panels in the conference and outlines the conclusions reached and the recommendations for policymakers. The purpose of the project throughout was a practical one aimed at clarifying a regional picture of progress to date, or lack thereof, in judicial reform and at providing concrete suggestions to meet the challenges still pending. Electronic links to the country papers are listed in the text of this report.

Details: Washington, DC: CSIS Americas Program, 2006. 25p.

Source: Policy Papers on the Americas, Volume XVII, Study 2: Internet Resource: Accessed on January 31, 2012 at http://csis.org/files/media/csis/pubs/0609_latin_judicial_reform.pdf

Year: 2006

Country: International

Keywords: Administration of Justice

Shelf Number: 123887


Author: South Asia Initiative to End Violence Against Children

Title: Rapid Assessment of Existing Practices and Mechanisms Concerning Rescue, Recovery and Reintegration of Child Victims of Trafficking between India and Bangladesh

Summary: This rapid assessment examined the processes and mechanisms currently in place for the withdrawal, documentation, family tracing, repatriation, recovery and reintegration of trafficked Bangladeshi children in India, with particular attention to the protection and well-being of the child while in the care of India and Bangladesh government and NGOs. This is a process assessment, and does not investigate the policy considerations, legal implications or judicial proceedings in either Bangladesh or India that surround the issue.

Details: Nepal: South Asia Initiative to End Violence Against Children, Undated. 49p.

Source: Internet Resource: Accessed on January 31, 2012 at http://www.saievac.info/editor_uploads/File/UNICEF%20DOCS/01%20RRRI%20Rapid%20Assessment.pdf

Year: 0

Country: International

Keywords: Bangladesh

Shelf Number: 123915


Author: Farrington, David P.

Title: School-Based Programs to Reduce Bullying and Victimization

Summary: School bullying has serious short-term and long-term effects on children’s physical and mental health. Various anti-bullying programs have been implemented world wide and, more rarely, evaluated. Previous narrative reviews, summarizing the work done on bullying prevention, as well as previous meta-analyses of anti-bullying programs, are limited. The definition of school bullying includes several key elements: physical, verbal, or psychological attack or intimidation that is intended to cause fear, distress, or harm to the victim; an imbalance of power (psychological or physical), with a more powerful child (or children) oppressing less powerful ones; and repeated incidents between the same children over a prolonged period. School bullying can occur in school or on the way to or from school. It is not bullying when two persons of the same strength (physical, psychological, or verbal) victimize each other. This report presents a systematic review and meta-analysis of the effectiveness of programs designed to reduce school bullying perpetration and victimization (i.e. being bullied). The authors indicate the pitfalls of previous reviews and explain in detail how the present systematic review and meta-analysis addresses the gaps in the existing literature on bullying prevention.

Details: Oslo: Cambpell Collaboration Crime and Justice Group, 2009. 149p.

Source: Internet Resource: Campbell Systematic Reviews
2009:6: Accessed February 1, 2012 at: http://www.campbellcollaboration.org/news_/reduction_bullying_schools.php

Year: 2009

Country: International

Keywords: School Bullying

Shelf Number: 117563


Author: Geneva Declaration

Title: Global Burden of Armed Violence 2011

Summary: Drawing on comprehensive country-level data, including both conflict-related and criminal violence, it estimates that at least 526,000 people die violently every year, more than three-quarters of them in non-conflict settings. It highlights that the 58 countries with high rates of lethal violence account for two-thirds of all violent deaths, and shows that one-quarter of all violent deaths occur in just 14 countries, seven of which are in the Americas. New research on femicide also reveals that about 66,000 women and girls are violently killed around the world each year. This volume also assesses the linkages between violent death rates and socio-economic development, demonstrating that homicide rates are higher wherever income disparity, extreme poverty, and hunger are high. It challenges the use of simple analytical classifications and policy responses, and offers researchers and policy-makers new tools for studying and tackling different forms of violence.

Details: Geneva: Geneva Declaration, 2012. 175p. (Also available from Cambridge University Press)

Source: Internet Resource: Accessed February 1, 2012 at: http://www.genevadeclaration.org/measurability/global-burden-of-armed-violence/global-burden-of-armed-violence-2011.html

Year: 2012

Country: International

Keywords: Armed Violence

Shelf Number: 123918


Author: Eavis, Paul

Title: Working Against Violence: Practices in Armed Violence Reduction and Prevention

Summary: The aim of this working paper, Working Against Violence: Promising Practices in Armed Violence Reduction and Prevention, from the Geneva Declaration is to document promising practices in armed violence reduction and prevention (AVRP). Drawing from experiences across multiple sectors and organizations, it seeks to generate a better understanding of what is working and, in so doing, encourage more effective and efficient AVRP policies and programmes. The selection of promising practice examples contained in the working paper are drawn from a wide range of sources, including the findings of a series of regional ‘promising-/good-practice’ meetings that were held in Brazil, Guatemala, Kenya, Nigeria, Nepal, and Croatia throughout 2010 and 2011, as well as from academic evidence and international experience of AVRP. The paper first sets out a brief characterization of the different categories of AVRP interventions. The subsequent section provides an overview of promising practices, focusing on both direct and indirect AVRP programmes. The final section outlines a number of key recommendations for future AVRP programming.

Details: Geneva: Geneva Declaration Secretariat, 2011. 70p.

Source: Internet Resource: Working Paper: Accessed February 1, 2012 at: http://www.genevadeclaration.org/fileadmin/docs/WP-AVRP/GDWP_Working-against-violence.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 123922


Author: Rees, Edward

Title: Dealing with the kilat: An historical overview of small arms availability and arms control in Timor-Leste

Summary: Six years after independence and two years after the ‘Krize’, the role of small arms in Timor-Leste society has not yet received a thorough accounting. Such weapons have played a decisive role in shaping repressive tactics of the former colonial powers and countermeasures by resistance movements, through to contemporary criminal violence. Today, against a backdrop of weak institutions, lingering tension, and poorly enforced legislation and arms control norms, military and civilian-style arms continue to trigger interpersonal and collective violence. The issue of missing small arms from state stocks has generated media headlines every week for the last six months. Stories associated with the distribution of arms to civilians are no less controversial. The gradual militarization of Timor-Leste is a legacy of the country’s recent history. The modest numbers of arms flowing into the country during the Portuguese colonial period stand in stark contrast to the progressive arming of Timorese society in the 1970s, which lasted until 1999. Although there are in fact comparatively few small arms and light weapons in the country, sophisticated military-style weapons grew more common during the period of Indonesian occupation (1975–99), with a modest, but nevertheless significant, number held by the Timorese resistance. In tracing out a chronology of arms availability in Timor-Leste, this Issue Brief finds that the availability and motivations associated with arms acquisition and use evolved over time. During the Portuguese and Indonesian era, arms were used primarily as an instrument of repression by colonial forces, while armed groups used them to further resistance and insurrection. In the past decade, arms enabled and exacerbated communal violence, particularly in 1999 and 2006. But Timor-Leste is hardly awash with guns. While existing public and private holdings are poorly registered and accounted for, there are comparatively few manufactured arms in the country; however, craft weapons do present a clear challenge. Nevertheless, as the 2006 crisis readily demonstrated, even a small number of illicit small arms can generate a disproportionately large impact.

Details: Geneva, Switzerland: Timor-Leste Armed Violence Assessment, Small Arms Survey, 2008. 12p.

Source: TLAVA Issue Brief No. 1: Internet Resource: Accessed February 3, 2012 at http://www.timor-leste-violence.org/pdfs/Timor-Leste-Violence-IB1-ENGLISH.pdf

Year: 2008

Country: International

Keywords: Arms Control

Shelf Number: 123946


Author: Scambury, James

Title: Groups, gangs, and armed violence in Timor-Leste

Summary: Armed groups and gangs are not a new phenomenon in Timor-Leste, but evolved from clandestine resistance groups during the Indonesian colonial period to a heterogeneous multitude of collectives, including disaffected veterans, clandestine groups, political fronts, martial arts groups (MAGs), village-based gangs, youth collectives, and security organizations. Nine years after the end of the Indonesian occupation, the fact that gangs have diversified and multiplied is a testament to a range of social tensions in Timorese society and the continued weakness of the state and its institutions. During the occupation these groups protected their communities from Indonesian security forces and the latter’s proxies; now they protect their communities from one another. This Issue Brief reviews the presence and roles of gangs in Timor-Leste. In doing so, it examines their recent growth, the threats they pose, and their use of and access to weapons, in particular small arms.

Details: Geneva, Switzerland: Timor-Leste Armed Violence Assessment, Small Arms Survey, 2009. 8p.

Source: TLAVA Issue Brief No. 2: Internet Resource: Accessed on February 3, 2012 at http://www.timor-leste-violence.org/pdfs/Timor-Leste-Violence-IB2-ENGLISH.pdf

Year: 2009

Country: International

Keywords: Armed Violence

Shelf Number: 123947


Author: Benini, Aldo

Title: After the guns fall silent: Sexual and gender-based violence in Timor-Leste

Summary: Sexual and gender-based violence (SGBV) is a pervasive global phenomenon, but is often a politically sensitive and unacknowledged issue. It has serious consequences for the physical, reproductive, and psychological health and social well-being of individuals. It also reflects and reinforces inequalities between men and women. SGBV is increasingly regarded as an impediment to the economic and social development of states. This Issue Brief considers the scale and magnitude of SGBV directed against women and girls in Timor-Leste. It considers the culture of impunity that pervades the country around SGBV and impedes progress on this issue; the lack of ‘enjoyment’ of human rights by women and girls due to SGBV; and the systematic failure of the security and justice system to tackle violations. Focusing on both the pre- and post-independence eras, it synthesizes the evidence to help identify entry points for the prevention and reduction of SGBV.

Details: Geneva, Switzerland: Timor-Leste Armed Violence Assessment, Small Arms Survey, 2009. 8p.

Source: TLAVA Issue Brief No. 5: Internet Resource: Accessed February 3, 2012 at http://www.timor-leste-violence.org/pdfs/Timor-Leste-Violence-IB5-ENGLISH.pdf

Year: 2009

Country: International

Keywords: Female Victims

Shelf Number: 123948


Author: Parker, Sarah

Title: Handle with Care: Private Security Companies in Timor-Leste

Summary: In the wake of several highly publicized and troubling incidents involving private security companies (PSCs) in Iraq and Afghanistan in recent years, scholars and the media have increasingly focused on the role of PSCs in providing security in conflict and post-conflict settings. Th international debate surrounding the engagement of private security providers is becoming increasingly important in Timor-Leste, where two developments have influenced the local discussion. Firstly, the number of PSCs operating in Timor-Leste has increased since independence. Secondly, the government is considering legislation authorizing non-state security personnel (and other civilians) to carry and use firearms in the course of their duties. In parallel with the debate on the roles and regulation of private security providers, there is an emerging body of standards and best practices covering the activities of security firms, many of which originate within the industry itself. These standards should inform the development of regulations and/or codes of conduct governing the selection, licensing, and activities of private security personnel in Timor-Leste. The use of arms by private security personnel poses special challenges for Timor-Leste, where government capacity to appropriately regulate, monitor, and enforce weapons possession laws remains in question. If the Timorese government does proceed to adopt legislation allowing private security personnel to carry and use firearms, strong regulations should be carefully considered, such as strict restrictions on carrying and a prohibition on storing guns at home after hours. The aims of this paper are to: explore what is meant by 'private security' and the status of private security personnel; provide an overview of the PSCs operating in Timor-Leste; analyse efforts to regulate the private security industry at the national and international levels, with a special focus on the access to and use of arms by private security personnel; and explore some of the negative impacts of the use of armed private security in other countries.

Details: Geneva, Switzerland: Timor-Leste Armed Violence Assessment, Small Arms Survey, Undated. 19p.

Source: TLAVA Publication: Internet Resource: Accessed February 3, 2012 at http://www.timor-leste-violence.org/pdfs/Timor-Leste-Violence-Private-Security-Companies.pdf

Year: 0

Country: International

Keywords: Firearms

Shelf Number: 123949


Author: Council of Europe, Committee of Ministers

Title: International Police Standards - The European Code of Police Ethics

Summary: Legislating for the security sector is a complex and difficult task. Many lawmakers thus find it tempting to copy legislation from other countries. This expedites the drafting process, especially when the texts are available in the language of the lawmaker, but more often than not, the result is poor legislation. Even after being amended, the copied laws are often out of date before coming into effect. They may no longer be in line with international standards or they may not fully respond to the requirements of the local political and societal context. Copied laws are sometimes inconsistent with the national legislation in place. In some cases, there is simply no model law available in the region for the type of legislation that is needed. This has been the case in the Arab region, where the security sector has only slowly begun to be publicly debated. It is thus difficult to find good model laws for democratic policing or for parliamentary oversight of intelligence services. It is therefore not surprising that many Arab lawmakers have felt frustrated, confused, and overwhelmed by the task of drafting legislation for the security sector. They found it difficult to access international norms and standards because little or no resources were available in Arabic. Many of them did not know where to search for model laws and several were about to give up. Some eventually turned to DCAF for assistance. The idea of a practical toolkit for legislators in the Arab region came when practitioners began looking for a selection of standards, norms and model laws in Arabic that would help them draft new legislation. Experts from the Arab region and DCAF thus decided to work together and develop some practical tools. This toolkit is primarily addressed to all those who intend to create new or develop existing security sector legislation. This includes parliamentarians, civil servants, legal experts and nongovernmental organisations. The toolkit may also be helpful to security officials and, as a reference tool, to researchers and students interested in security sector legislation.

Details: Geneva, Switzerland: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2009. 45p.

Source: Toolkit - Legislating for the Security Sector (2): Internet Resource: Accessed February 4, 2012 at http://se2.dcaf.ch/serviceengine/Files/DCAF09/95671/ipublicationdocument_singledocument/b7d10cd7-b7a4-4c46-a333-34de98cd832e/en/CoE.pdf

Year: 2009

Country: International

Keywords: Criminal Justice Administration

Shelf Number: 123958


Author: von Carlowitz, Leopold

Title: Local Ownership in Practice: Justice System Reform in Kosovo and Liberia

Summary: Achieving local ownership is crucial for the success of justice reform programmes as part of international rule of law assistance and security sector reform (SSR) activities. This paper examines and compares the UN approaches to and experiences with local ownership in its efforts to reform the justice system in Kosovo and in Liberia. It thereby seeks to foster a better understanding of the concept and its implementation in practice.

Details: Geneva, Switzerland: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2011. 66p.

Source: DCAF Occasional Paper No. 23: Internet Resource: Accessed February 4, 2012 at http://www.dcaf.ch/content/download/35955/527127/file/OP23.pdf

Year: 2011

Country: International

Keywords: Criminal Justice Reform (Kosovo) (Liberia)

Shelf Number: 123960


Author: Montgomery, Ruth

Title: Female Staff Associations in the Security Sector: Agents of Change?

Summary: In most security sector institutions, women constitute a small minority of the personnel. Unwelcoming working environments discourage recruitment and retention of women, and thus create a vicious circle that perpetuates their minority status. At the same time, female security sector staff associations have multiplied, promoting networking and offering mutual support among members. Many of these associations have expanded their mandate to activities reaching beyond their members’ welfare. This occasional paper examines the structures, mandates and activities of a sampling of female staff associations and networks in the security sector, analyses whether and how they meet members’ needs, and gauges the effect or influence they have had on changing policies and practices in their institutions and in the communities they serve. Research for this paper focused on 67 international, national, regional, and local female security sector associations and networks in the military, police, corrections, justice system, fire and emergency services, immigration services, and in national security bodies and private security companies from around the world. An annex to the paper provides more information on the associations studied.

Details: Geneva, Switzerland: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2011. 87p.

Source: DCAF Occasional Paper No. 25: Internet Resource: Accessed February 4, 2012 at http://www.dcaf.ch/content/download/35981/527179/file/OP25_Female%20associations.pdf

Year: 2011

Country: International

Keywords: Police Recruitment and Selection

Shelf Number: 123961


Author: The Green Political Foundation

Title: Natural Resources and Conflict

Summary: Hollywood depicted it in graphic fashion: the film “Blood Diamond†tells the story of the battle for control of the diamond mines in the West African country of Sierra Leone and its brutal consequences for its people. The diamond trade's role in financing the wars in Angola, Liberia and Sierra Leone led to international condemnation of the trade in “conflict diamonds" and the launch of the Kimberley Process. The links between conflict and the extraction of a given resource are not always so clear-cut, however, and a country's resource wealth does not necessarily lead to violent conflict, as the examples of Norway and Canada, but also Botswana and Chile show. Yet resource-rich countries do appear to be more susceptible to conflict than the resource-poor. This risk seems to be greatest when resource extraction accounts for a substantial proportion (around 30%) of GDP1: in other words, in countries which are largely dependent on the export of primary commodities such as metal ores, oil and gas. This does not apply to countries with major oil fields and a small population, such as Brunei, Dubai and Kuwait, which can use the substantial revenues generated by their oil exports to purchase social peace. Yet in most resource dependent economically poor countries in Africa, Latin America and Asia, resource extraction is linked to conflict. So the question is this: which role do natural resources play in conflicts?

Details: Berlin: The Green Political Foundation,

Source: Internet Resource: Accessed February 4, 2012 at http://www.boell.de/downloads/Resources_and_Conflict.pdf

Year: 0

Country: International

Keywords: Conflict Diamonds

Shelf Number: 123967


Author: Kristoff, Madeline

Title: Policing in Palestine: Analyzing the EU Police Reform Mission in the West Bank

Summary: International efforts for security sector reform (SSR) and state building more broadly, have faced major challenges in the Palestinian Territories. Donor countries struggled to overcome an unwillingness at home to use aid funding for police reform purposes, while managing Israeli obstructionism and security concerns, rivalries between Palestinian police generals and a lack of Palestinian preparedness for the technical and practical aspects of police reform. In this context, the European Union Coordinating Office for Palestinian Police Support (EU COPPS) was established in 2005 as an EU Common Security and Defense Policy (CSDP) mission; the European Union Police Coordinating Office for Palestinian Police Support (EUPOL COPPS), the followup EU police mission, began in 2006. The role of EUPOL COPPS was to provide support to the Palestinian Civil Police (PCP) for immediate operational priorities and longer-term transformational change. As efforts in Iraq and Afghanistan have taught the international community, police reform is not as easy as the train-and-equip standard. Especially in postconflict environments, rebuilding the police should take into account the communities’ needs in order to build legitimacy for the institutions of government. This paper seeks to fill the gap of evaluation in the field of police reform efforts by answering the following questions: How should international actors think about police reform efforts in a subordinate, non-juridical and only partially empirical state, and what role do the monitoring and evaluation of police reform efforts play?

Details: Waterloo, Ontario, Canada: The Centre for International Governance Innovation (CIGI), 2012. 19p.

Source: SSR Issue Paper No. 7: Internet Resource: Accessed February 4, 2012 at http://www.cigionline.org/sites/default/files/SSR_Issue_no7.pdf

Year: 2012

Country: International

Keywords: Police Reform (Palestine)

Shelf Number: 123968


Author: Frost, Emilia

Title: Inclusive Security, Inclusive Cities

Summary: For the first time in history, the majority of the world’s population resides in urban centres. It is also estimated that virtually all population growth over the next 25 to 30 years will occur in cities (UN-HABITAT, 2008a, p.9). As urban areas have grown, so has the problem of urban armed violence. While urban areas are not necessarily more violent or less safe than rural areas, their size concentrates victims of violence (OECD, 2011, p. 13; World Bank, 2011a, p. 17). Armed violence thus represents a challenge not only for states, but also for local government authorities, particularly at the city level. Local government agendas typically feature security and the protection from violence as key campaigning and public administration issues. Security concerns are not limited to the realm of national governments; at the local level, residents now frequently demand local security provisions, violence reduction programming, protection from violent crime, and victim assistance. Meeting these demands by providing the required services can be costly. In addition, high levels of urban violence impede economic and social development and undermine local governance, trapping ‘the poorest population in a dangerous cycle of poverty and violence’ (World Bank, 2011a, p. 1). Still, cities continue to draw numerous migrants with an offer of greater economic and social opportunities. The simultaneous growth of cities and urban violence thus calls for more concerted efforts to promote sustainable development as well as effective armed violence reduction and prevention policies. The first section of this policy paper highlights the particularities of urban armed violence and its detrimental impact on development. The following section presents a selection of the most critical risks—inequality, firearms proliferation, and limited government capacity. The paper then proposes an agenda for cooperation between the Geneva Declaration and city governments around the world, outlining several concrete steps for more effective armed violence reduction and prevention (AVRP) strategies in urban areas.

Details: Geneva, Switzerland: Geneva Declaration Secretariate, Small Arms Survey, 2011. 8p

Source: Policy Brief: Internet Resource: Accessed February 5, 2012 at http://www.genevadeclaration.org/fileadmin/docs/Policy-paper/GD_Inclusive_Cities_-_English.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 123982


Author: Baltic Sea Parliamentary Conference

Title: Final report of the Working Group on Trafficking in Human Beings

Summary: Trafficking is an international cross-border crime that requires international cooperation and concerted action across borders. According to the Working Group the most important elements in the fight against this crime are to secure long term funding of for instance public authorities, specialized agencies, NGOs and intergovernmental organizations and projects, to apply victim-based, with particular emphasis on children, approach respecting human rights and to follow the money flows stemming from trafficking.

Details: Copenhagen, Denmark: NORDEN, 2011. 54p.

Source: Internet Resource: Accessed February 5, 2012 at http://www.norden.org/en/publications/publikationer/2011-416/at_download/publicationfile

Year: 2011

Country: International

Keywords: Human Smuggling

Shelf Number: 123987


Author: Chambers, Matthew

Title: International Piracy and Armed Robbery at Sea: Hindering Maritime Trade and Water Transportation Around the World

Summary: Over the 11-year period, 1998-2008, more than 3,600 acts of international piracy and armed robbery at sea have occurred. Figure 1 clearly shows that piracy affects all corners of the globe—from the Caribbean, to the Mediterranean, to the South China Sea. In 2008, East Africa accounted for the greatest number of incidents with 134, followed by the South China Sea (72 incidents) and West Africa (50 incidents). Table 1 shows the overall number of attacks has been on the decline in many parts of the world with acts of piracy occurring at a rate of about 25 per month in 2008, down from a peak of nearly 40 incidents per month in 2000. This decline was global in nature with one notable exception—the waters surrounding East Africa (e.g., Gulf of Aden, Red Sea) saw a 123 percent (74-incident) increase from the prior year.

Details: Washington, DC: U.S. Department of Transportation, Bureau of Transportation Statistics, 2010. 4p.

Source: Internet Resource: Accessed February 6, 2012 at: http://www.bts.gov/publications/special_reports_and_issue_briefs/special_report/2010_04_22/html/entire.html

Year: 2010

Country: International

Keywords: Armed Robbery, Ships

Shelf Number: 123990


Author: Australia. Office of the Inspector of Transport Security

Title: International Piracy and Armed Robbery at Sea: Security Inquiry Report

Summary: This Inquiry was conducted pursuant to a direction issued on 2 February 2009, in accordance with subsection 11(1) of the Inspector of Transport Security Act 2006 (the Act), to inquire into International Piracy and Armed Robbery at Sea, as a relevant transport security matter within the terms of the Act. The direction was given by the Federal Minister for Infrastructure, Transport, Regional Development and Local Government, the Honourable Anthony Albanese MP, and arose from a concern to ensure that the Australian Government had an accurate understanding of the prevailing international piracy and robbery at sea environment and the potential implications for Australian-related shipping trade. While the primary focus of the Inquiry was the threat of piracy to Australia and Australian shipping and crews, it included an international benchmarking assessment of the global piracy and armed robbery at sea situation. Before the late 1990s, the most sophisticated of pirate attack profiles involved the seizing of a ship to steal its cargo for future resale. In many cases it involved the re-birthing of a ship, often called ‘a phantom ship’, under another name and registry. In these attacks the pirates sometimes confined the crew for a time and then set them adrift; on other occasions they are believed to have murdered their victims. Since the 1990s, however, hijack and ransom has become the pirate modus operandi causing most international concern, with the Gulf of Aden and West Indian Ocean region recognised as the epicentre of the contemporary global piracy problem. Significant incidents of piracy are increasingly occurring in the Gulf of Guinea area of West Africa, centring on Nigeria. Other areas of continuing concern are the waters of the Indian subcontinent, Central America, the South China Sea and the Caribbean Sea.

Details: Canberra: Department of Infrastructure, Transport, Regional Development and Local Government, 2010. 94p.

Source: Internet Resource: Accessed February 6, 2012 at: http://www.infrastructure.gov.au/transport/security/oits/files/IPARS_SecurityInquiryReport.pdf

Year: 2010

Country: International

Keywords: Armed Robbery, Ships

Shelf Number: 123991


Author: International Organization for Migration

Title: Trafficking of men - a trend less considered: The case of Belarus and Ukraine

Summary: To date, trafficking in males has been underconsidered in research despite noteworthy signals that it is a violation faced by many males, adult and minors. Often severely exploited male migrants are overlooked as victims of trafficking (VoT). The noteworthy number of men exposed to trafficking necessitates assistance tailored to their specific needs and interests. Tailoring of services is required to the specific profile of male victim, not least according to their trafficking experience, whether they are a minor or adult and the family and social conditions to which they will return. Through the lens of trafficking in males (primarily adult men) from Belarus and Ukraine, this study considers male victim’s pre-trafficking life (namely their personal, family and socioeconomic background), trafficking experience (from recruitment, through transportation and during exploitation) and post trafficking experience (including assistance and protection needs). We examine, on the one hand, what is known about this less considered profile of trafficked persons and, on the other hand, what can be done to meet their needs, both as a means of assistance and protection. The study draws on primary data collected about 685 trafficked males assisted by IOM and its partners, through IOM’s Counter-Trafficking Module Database (CTM) in Geneva as well as qualitative information from interviews with and case files of assisted men. The specific experiences of trafficked males of Belarusian and Ukrainian nationality highlight some general patterns in terms of how trafficking takes place from these countries and, equally, some of the needs and interests of this specific target group. Attention to the gender dimensions of trafficking must be increasingly considered in research and anti-trafficking interventions.

Details: Geneva: IOM, 2008. 128p.

Source: IOM Migration Research Series No. 36: Internet Resource: Accessed February 7, 2012 at

Year: 2008

Country: International

Keywords: Human Trafficking (Belarus) (Ukraine)

Shelf Number: 124017


Author: Arslan, Hasan T.

Title: The Social and Operational Intersections of Environmental Extremism in North America and Europe

Summary: The radical environmental and animal rights movement (REARM) have been responsible for thousands acts of terrorism and extremist activities in the name of the environment and animal rights since 1980s. The perceived escalation of "direct actions" in recent years has led the law enforcement communities in the United States and the United Kingdom to focus investigatory efforts on the groups and individuals perpetrating these actions, resulting in several high profile arrests and prosecutions. While previous studies of environmental extremism have focused solely on single regions or countries such as North America, Europe, and/or United States, this dissertation aims to provide a comparative analysis of both regions, Europe and North America. Using a comprehensive dataset from 1982 and 2007 compiled by the Institute for the Study of Violent Groups, this dissertation analyzes similarities and differences of the animal liberation movement and environment groups with regard to their tactics, targets, and procedures (TTP) using VAR time series analysis and Chi-Square technique. One thing can be said based on this study; eco terrorism is on the rise and the frustration is mounting among members of the REARM. This study also established that animal rights groups in the U.K. influence the groups in the U.S.

Details: Houston, TX: Sam Houston State University, 2008. 224p.

Source: Dissertation: Internet Resource: Accessed February 7, 2012 at http://blogdev.isvg.org/wp-content/uploads/2011/01/out.pdf

Year: 2008

Country: International

Keywords: Environmental Extremism (North America) (Europe)

Shelf Number: 124020


Author: Barcenas, Lai-Lynn Angelica B.

Title: How Trade Facilitation Measures Impact Current Law and Policy on the Wildlife and Timber Trade: Case Study of the Greater Mekong Subregion

Summary: International trade is a strong driver of economic growth, and for developing countries like those in the Greater Mekong Subregion (GMS) there is a strong incentive to maximize its potential. Thus, efforts are being made to facilitate trade within the subregion through improvements in infrastructure, telecommunications and transportation. Among these efforts are trade facilitation measures designed to ease the export and import of goods. However, while these measures will increase the international trade of each GMS state, they may also have adverse effects on the biodiversity of the subregion. Global demand for wildlife and timber is already depleting the rich habitats of the GMS. The increased facility in the movement of goods across international borders that these trade facilitation measures would provide could further exacerbate such depletion. It is thus important for policymakers to carefully assess the emerging trade facilitation mechanisms and processes and determine potential risks and opportunities in curbing the unsustainable harvest of wildlife and timber, and their attendant trade.

Details: Winnipeg, Canada: IIPD - International Institute for Sustainable Development, 2010. 5p.

Source: Series on Trade and the Environment in ASEAN - Policy Brief 1: Internet Resource: Accessed February 7, 2012 at http://www.iisd.org/tkn/pdf/trade_facilitation_wildlife_timber_brief.pdf

Year: 2010

Country: International

Keywords: Law Enforcement

Shelf Number: 124021


Author: Cruz, Adrienne

Title: Gender-based violence in the world of work: Overview and selected annotated bibliography

Summary: Gender-based violence is described by many as the most prevalent human rights violation in the world. Of the varied ways in which sex discrimination manifests itself across the globe, such violence is exceptionally dehumanizing, pervasive and oppressive. No other form of sex discrimination violates so many fundamental human rights, as articulated in the 1948 United Nations Universal Declaration of Human Rights. These are included, for example, in Article 1 which provides that “All human beings are born free and equal in dignity and rightsâ€, Article 3 which provides that “Everyone has the right to life, liberty and security of personâ€, and Article 5 which provides that “No one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishmentâ€. Gender-based violence both reflects and reinforces inequalities between women and men. At least one in three women around the world is estimated to have been coerced into sex, physically beaten and/or otherwise abused in her lifetime. For women aged 15 to 44 years, such violence is a major cause of disability and death. Gender-based violence not only causes pain and suffering but also devastates families, undermines workplace productivity, diminishes national competitiveness, and stalls development. The International Labour Conference – in its June 2009 Resolution concerning gender equality at the heart of decent work – described gender-based violence as a critical and major global challenge to the goal of equality between women and men. The Conference – which annually brings together the ILO tripartite constituents comprising member States and representatives of workers’ and employers’ organizations from those countries – agreed on work-related strategies for its prevention and eradication. Based on the Conference’s recommendations, which included a call for tools about gender-based violence in the world of work, the Bureau for Gender Equality (GENDER) took the lead to track current research, investigate trends and develop this overview and annotated bibliography. Its aim is to contribute to policy development at national level, especially with entry points for responses and prevention in the world of work; enhance knowledge sharing of good practices on eliminating gender-based violence; serve as an information resource for capacity building, in particular for the tripartite constituents; and promote relevant key ILO messages, including from the 2009 ILC Conclusions. The first of three sections provides an overview of ILO’s own research and policy development on gender-based violence within its mandate, namely across the world of work, as well as good practices from operational activities. After explaining the aims and audience as well as methodology used for the bibliography, key terms are defined. This is followed by analysis of the exposure and risks for gender-based violence victims as well as perpetrators within the world of work. Reasons for tackling such violence are explained from both a rights-based and economic efficiency approach. Some particularly high-risk groups as victims are then described: child labourers, forced and bonded labourers, migrant workers, domestic workers, health services workers and sex workers. This is followed by discussion of the research on how using a men and masculinities perspective can reveal some men’s vulnerability to violence exposure, and ways to better engage males in stopping violence and promoting gender equality. The second section comprises the annotated bibliography. It is divided into two parts with entries in English, as well as some in French and Spanish as this tool is also available worldwide on the internet. The first part contains some 75 international, regional and country-based entries, and the second part contains over 50 tools, measures and guides. Each entry summary, which appears in the language of its publication, highlights key messages or research findings, lessons learned and/or good practices. A concluding section highlights some trends and challenges that emerged during the literature review, as well as opportunities identified to step up efforts for preventing and eradicating gender-based violence in the world of work. These are largely based on the above-mentioned 2009 ILC Conclusions and are summarized within the framework of the four strategic objectives of the ILO. These are employment, social protection, social dialogue and tripartism, and fundamental principles and rights including the role of international labour standards. A recurring theme throughout this section, as well as preceding ones, concerns the importance of social dialogue between the tripartite constituents in order to address and take action to prevent and stop gender-based violence in the world of work. A closing message recalls the 2009 Conference’s strong call to end gender-based violence, which it stressed was critical to achieving gender equality and decent work.

Details: Geneva: ILO International Labour Office, 2011. 80p.

Source: ILO Working Paper 3/2011: Internet Resource: Accessed February 7, 2012 at

Year: 2011

Country: International

Keywords: Gender Based Violence

Shelf Number: 124029


Author: OECD

Title: Reducing the Involvement of Youth in Armed Violence: Programming Note, Conflict and Fragility

Summary: Armed violence is an everyday reality for millions of people around the globe. More than 700 000 people die as a result of armed violence each year. Many more experience traumatic loss in their families and are left with lasting psychological and physical scars. The impact of armed violence extends further, negatively influencing development, peace and good governance, often by creating a climate of impunity, corruption and by undermining public institutions. It is also closely tied with transnational crime and the misery and abuse associated with the illegal trafficking of arms, drugs and people. Finally, the economic impact of armed violence is striking with the cost of lost productivity due to non-conflict armed violence alone estimated to cost upwards of USD 95 billion annually worldwide. This violence has important youth and gender dimensions. The majority of perpetrators and victims are men, while women and girls are at greater risk of violence that is less visible and committed in the private sphere, including intimate partner violence, child abuse, sexual and gender based violence. Measures at reducing armed violence are therefore also measures at reducing human suffering. The OECD DAC policy paper Armed Violence Reduction: Enabling Development, published in 2009, acknowledged as a challenge the increased levels of armed violence in non-conflict countries, the increasing linkage between conflict and crime, rapidly growing youth populations in the south and accelerating levels of unregulated urbanisation. The paper provided a methodology to help donors tackle the programming challenging of reducing armed violence. Building on the OECD DAC policy paper, three programming notes were developed to contribute to our understanding of specific types of armed violence: Youth and armed violence, armed violence in urban areas and Security System Reform in relation to Armed violence reduction. Each note aims to improve our understanding of these dynamics while also offering practical assistance on assessments, programme design, risk management, monitoring and evaluation, as well as on entry points for direct and indirect programming.

Details: OECD: 2011. 68p.

Source: Internet Resource: Accessed February 7, 2012 at http://www.oecd.org/dataoecd/18/12/47942093.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 124030


Author: Hames, Caroline

Title: Feeling Good About Feeling Bad ...A Global Review of Evaluation in Anti-Trafficking Initiatives

Summary: This research explores and assesses the evaluation of anti-trafficking policies and programmes worldwide, including three international, two regional and nine national anti-trafficking initiatives. It highlights common themes and emerging patterns between a range of approaches to evaluation in this sector and finds overwhelmingly that anti-trafficking initiatives are not being sufficiently evaluated, impeding the effectiveness of anti-trafficking responses and limiting progress in combating trafficking. Urgent action in the form of adequate evaluation systems is imperative to ensure anti-trafficking programmes are effectively targeted and delivered.

Details: Bangkok: Global Alliance Against Traffic in Women, 2010. 32p.

Source: Internet Resource: Accessed February 10, 2012 at: http://www.gaatw.org/publications/GAATW_Global_Review.FeelingGood.AboutFeelingBad.pdf

Year: 2010

Country: International

Keywords: Human Trafficking, Prevention

Shelf Number: 124032


Author: Brentz, Brooks

Title: Learning from Recent Threats to Cargo Security

Summary: On October 29, 2010, President Barack Obama confirmed that suspicious air cargo shipments destined for the United States contained explosive materials. Although these shipments were discovered in Dubai and England, the United States federal government grounded planes at Newark and Philadelphia airports to inspect packages based on fears of a terrorist threat originating from Yemen. Intervention prompted by intelligence sharing among governments of the countries involved prevented catastrophic outcomes. As with other near misses, governments are responding by reexamining cargo transport regulations and security practices. Accenture believes that it is time for manufacturer-shippers to do the same to protect against major disruptions to their global supply chains. However, given the vast volume of goods moving around the world and the multiple modes of transportation involved, practical approaches are needed to address the risks.

Details: Boston(?): Accenture, 2011. 8p.

Source: Internet Resource: Accessed February 10, 2012 at: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Learning_From_Recent_Threats.pdf

Year: 2011

Country: International

Keywords: Cargo Security

Shelf Number: 124039


Author: Ross, Thomas M.

Title: Wolves in Wolves' Clothing: The Role of the Chechen Mafia in the Formation of an Independent Chechen Republic

Summary: The path to Chechen autonomy has been tumultuous. Over the past 200 years, internal and external forces have played significant roles in shaping the territory and identity of the Chechen nation. Fierce resistance by Chechens has led Russian officials to label the region’s inhabitants as criminals. Chechen criminality was also affected by punishments for this resistance. Chechen resistance eventually let to the mass criminalization of the entire Chechen ethnicity. Mass criminalization exposed the Chechens to a wider Russian criminal world. Through illegal activities, Chechen criminals amassed significant resources. As the Soviet Union fell, Chechen organized crime groups were poised to support the bid for national independence led by former Soviet General Djohar Dudayev. This thesis contends that bottom-up and top-down forces were critical in forming a perception of Chechen criminality. The perception of criminality and its attendant punishments supported the rise of actual criminality, in a time where crime made possible the amassing of significant amounts of wealth and power. It was wealth and power that Dudayev’s fledgling government needed, Chechen organized crime groups would provide but at a cost. While providing material support to Dudayev organized crime elements infiltrated government positions to further their own interests.

Details: Monterey, CA: Naval Postgraduate School, 2011. 127p.

Source: Master's Thesis: Internet Resource: Accessed February 10, 2012 at http://www.hsdl.org/?view&did=689042

Year: 2011

Country: International

Keywords: Organized Crime (Chechnya)

Shelf Number: 124042


Author: Carpenter, Ted Galen

Title: Undermining Mexico's Dangerous Drug Cartels

Summary: Since President Felipe Calderón launched a military-led offensive against Mexico's powerful drug cartels in December 2006, some 42,000 people have perished. The situation is so bad that the Mexican government's authority in several portions of the country, especially along the border with the United States, is shaky, and the growing turbulence creates concerns that Mexico is in danger of becoming a failed state. Although such fears are excessive at this point, even that dire scenario can no longer be ruled out. U.S. political leaders and the American people also worry that Mexico's corruption and violence is seeping across the border into the United States. That danger is still fairly limited, but the trend is ominous. Both the number and severity of incidents along the border are rising. Experts propose several strategies for dealing with Mexico's drug violence. One suggestion is to apply the model used earlier to defeat the Colombian drug cartels. But the victory in Colombia is not as complete as proponents contend, and the situation in Mexico is far less favorable to using that strategy. Another suggested approach is to try to restore Mexico's status quo ante, in which the government largely looked the other way while drug traffickers sent their product to the United States. But too much has changed politically in Mexico for that approach, which would be only a temporary Band-Aid solution in any case. The only lasting, effective strategy is to defund the Mexican drug cartels. Reducing their billions of dollars in revenue requires the United States, as the principal consumer market for illegal drugs, to abandon its failed prohibition policy. That move would eliminate the lucrative black-market premium and greatly reduce the financial resources the cartels have available to bribe officials or hire enforcers to kill competitors and law enforcement personnel and intimidate the Mexican people. A refusal to abandon prohibition means that Mexico's agony will likely worsen and pose a significant security problem for the United States.

Details: Washington, DC: Cato Institute, 2011. 20p.

Source: Policy Analysis No. 688: Internet Resource: Accessed February 10, 2012 at http://www.cato.org/pubs/pas/PA688.pdf

Year: 2011

Country: International

Keywords: Border Security (U.S. and Mexico)

Shelf Number: 124075


Author: Oceans Beyond Piracy, One Earth Future Foundation

Title: The Economic Cost of Somali Piracy 2011

Summary: This report is One Earth Future Foundation’s (OEF) second assessment of the Economic Cost of Piracy. It estimates that Somali piracy cost between $6.6 and $6.9 billion in 2011. Our previous report on the Economic Cost of Piracy in 2010, estimated that piracy cost the world $7 - $12 billion. That initial report generated a significant amount of dialogue and feedback on the cost of piracy. This report is the result of extensive research conducted by OEF with the collaborative participation of multiple different stakeholders, and includes significant contributions made by commentators, experts, and others impacted by piracy. It assesses nine different direct cost factors, and is focused specifically on the economic impact of Somali piracy. While the report assesses the cost of piracy for the year of 2011, there were significant changes and developments in piracy throughout that year, and in many ways 2011 was the ‘tale of two years’: Overall, 2011 saw an increase in attacks by Somali pirates. This was driven by a rapid escalation in the number of hostages and hijackings in the first quarter of 2011. As expected, hijackings declined during the monsoon period. But in the last quarter of the year, the anticipated resurgence of piracy following the monsoon period did not eventuate. A number of factors may explain this pattern, including an extended period of monsoonal rough weather off the coast of Somalia, and the use of deterrence mechanisms such as private armed security. Other developing trends throughout the year included an altered re-routing model where ships transited close to the western Indian coastline (rather than around the Cape of Good Hope); and pirates’ changing use of mother ships from large vessels to smaller fishing boats. Further, 2011 saw a more aggressive response from military forces conducting counter-piracy missions in the region. The project finds that of the total costs of Somali piracy in 2011, the shipping industry bore over 80% of these costs, or between $5.3 and $5.5 billion.

Details: Broomfield, CO: One Earth Future Foundation, Oceans Beyond Piracy, 2011. 62p.

Source: Working Paper, One Earth Foundation: Internet Resource: Accessed February 10, 2012 at http://oceansbeyondpiracy.org/sites/default/files/economic_cost_of_piracy_2011.pdf

Year: 2011

Country: International

Keywords: Costs of Crime

Shelf Number: 124078


Author: Mejia Jr., Maximo Q.

Title: Piracy in shipping

Summary: Piracy in its various forms has posed a threat to trade and shipping for millennia. In the 1970s, a steady rise in the number of attacks ushered in the present phenomenon of modern piracy and not many parts of the world’s seas are free from piracy in one form or another today. This paper reviews the historical and geographical developments of piracy in shipping, with a discussion on contentious issues involved in defining piracy. Using data available on piracy acts collected from the IMB related to 3,957 attacks that took place between 1996 and 2008, we shed light on recent changes in geography and modi operandi of acts of piracy and investigate how poverty and political instability may be seen as the root causes of piracy.

Details: France: Laboratoire d'Economie et de Management Nantes-Atlantique, Université de Nantes, 2010. 34p.

Source: Lemna EA 4272 Working Paper: Internet Resource: Accessed February 11, 2012 at http://hal.archives-ouvertes.fr/docs/00/47/06/16/PDF/LEMNA_WP_201014.pdf

Year: 2010

Country: International

Keywords: Maritime Security

Shelf Number: 124085


Author: Dorn, Nicholas

Title: Bad Thoughts: Towards an Organised Crime Harm Assessment and Prioritisation System (OCHAPS)

Summary: This paper examines concepts of harm (damage, negative impact or consequences) arising from organised crime (OC) in the international, British and Dutch literatures. The context is policy makers’ interest in clarifying priorities for action through the criminal justice system, administrative measures and/or private sector partners. The paper concludes that prioritisation should depend not only on where the harm is greatest, but also on the extent to which of the responses/measures available to the public-private partners are capable of significantly reducing the harms (this is the question of effectiveness, efficiency, added value, or ‘amenability’ – the practical potential for harm reduction). Putting together these two overarching considerations, one arrives at the idea: Rating of harms x Rating of the effectiveness of actions = Justification for action. (The authors acknowledge that, in formulating priorities for action, the authorities may also have additional, policy-related considerations, however those are outside the ambit of this paper, which covers only ‘technical’ issues.) What then is harm, what is effectiveness, and how can they be ‘rated’? This paper identifies three distinct aspects of harm: (i) ‘hurts’ to victims (in a wide variety of social positions); (ii) ‘threat’ to the capabilities and integrity of ‘guardians’ (all public officials and private sector professionals who have roles in relation to the prevention and control of OC); and (iii) potential for ‘systemic damage’ (for example, undermining economic stability). Since harm types (i), (ii) and (iii) generally cannot be measured quantitatively in terms of one common metric (such as financial costs), qualitative assessment should be adopted. A common framework for comparison of harms may be provided by scales, running from 1 (lowest) to 5 (highest conceivable), doing this separately for hurts to victims, for threat to guardians, and for potential systemic damage. Only direct forms of harm should be considered – not indirect or response costs – since inclusion of the latter leads to circularity (spending yet more on what we have spent most upon in the past). Only tangible harms should be included (not so-called ‘intangible harms’, such as reputational damage of a person, firm, enforcement agency or country). Reasons include the consideration that such harms result from social reaction to criminal acts, rather than from the criminality per se. Also, some intangibles are found to be sites of deep social conflict, so evaluating them cannot be done without ‘taking sides’. As for effectiveness/amenability, it is suggested that prosecutors, police and others should asked to identify those measures that are seen to most strongly reduce the harms that are of greatest concern. In order to operationalise this harm effectiveness framework, more work is needed on harm and also on effectiveness/amenability. In summary, in order to prioritise cases, expert judgement will be needed on which of the available actions (of the criminal justice systems and administrative and private sector partners) have the best prospects for reducing each aspect of harm. This study was financially supported by the Ministry of Justice, The Hague, The Netherlands, and can also be found on the website of the WODC (Wetenschappelijk Onderzoek- en Documentatiecentrum).

Details: Rotterdam: Criminology Department, Erasmus School of Law, Erasmus University, 2010. 43p.

Source: Internet Resource: Accessed February 11, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1574071

Year: 2010

Country: International

Keywords: Harm Reduction

Shelf Number: 124086


Author: Daxecker, Ursula

Title: Insurgents of the Sea: Institutional and Economic Opportunities for Maritime Piracy

Summary: While piracy may evoke romanticized visions of swashbuckling, rum swigging, and skirt chasing pirates hoisting the Jolly Roger, it is not a relevant description of modern piracy. Maritime piracy has changed substantially by taking advantage of modernization and substantial upgrading of the weapons, vessels, and weapons it employs. In addition, as documented by the International Marine Bureau (IMB), the frequency of pirate attacks has increased significantly, with more than 2,200 piracy incidents occurring since 2004. We argue that piracy is a result of permissive institutional environments and the lack of legal forms of employment in states‟ fishing sectors. We investigate these arguments empirically using systemic and monadic-level data for the 1991-2009 period. Our empirical analyses show that state weakness and reductions in fish catch affect piracy as expected. These findings suggest that international efforts in combating piracy should center on improving the institutional environments and labor opportunities driving maritime piracy.

Details: Unpublished, Undated. 39p.

Source: Internet Resource: Accessed February 11, 2012 at http://ursuladaxecker.weebly.com/uploads/2/6/1/8/2618117/prins_and_daxecker_04-18-11.pdf

Year: 0

Country: International

Keywords: Maritime Crime

Shelf Number: 124087


Author: Lanham, Honor

Title: Walk the Plank: Somali Pirates and International Law

Summary: The perception of pirates as loveable rogues and swashbuckling sailors is a fanciful one. In reality, the piratical acts currently occurring off the coast of Somalia and in the Gulf of Aden present a major economic, humanitarian and security challenge to the global community. This is evidenced in the unprecedented international naval response. Currently, a naval coalition led by the United States of America (USA) and comprised of vessels and air support supplied by the European Union (EU), North Atlantic Treaty Organisation (NATO), India, China, Japan and Russia, amongst others, is patrolling affected sea tracts in the Horn of Africa. The upsurge in piracy and overwhelming naval response has thrown into stark relief the current international law framework governing piracy. Customary international law of the sea was codified in the 1982 United Nations (UN) Convention on the Law of the Sea (UNCLOS) referred to as “a constitution for the oceans.†With regard to a comprehensive definition of piracy, UNCLOS adopted the existing definition found in the 1958 UN Convention on the High Seas (UNCHS). That definition applies to both private ships and aircraft. While the inclusion of aircraft in the definition of piracy amounts to a progressive expansion of international law in this area, for the purposes of this dissertation, discussion shall solely focus on ships. The most distinctive aspect of the definition of piracy is that it is an offence confined to the high seas and thus outside the jurisdiction of any state. As well as defining piracy at international law, UNCLOS establishes enforcement and interdiction powers for the suppression of piracy and accordingly is the single most important international legal document in this area. Piracy was the first offence criminalised at international law and thus “inaugurates international criminal law.†It must be considered as distinct from any offence of piracy occurring in territorial waters recognised by domestic law. Part one of chapter one explores the historical development of the international crime of piracy and in particular the political interests which have determined its enforcement. Part two of chapter one establishes the extent of the Somali piracy epidemic. The serious economic, humanitarian and security threat piracy poses justifies current naval efforts and the need to support these efforts through the progressive development of international law which has occurred over the last 18 months. Chapter two traverses the key elements of the definition of piracy found in Art 101 of UNCLOS. It highlights controversy over the limited nature of that definition and justifies those limitations by reference to the historical antecedents of the offence of piracy. Importantly, this chapter highlights the fact that piracy should not be used as a vehicle to counter deficiencies in other areas of international law, namely terrorism. In chapter three, novel international and regional responses to piracy are assessed. In terms of international responses, in 2008 the UN Security Council (UNSC) began to respond to the challenges naval vessels were experiencing in suppressing piracy due to the limited nature of enforcement powers under UNCLOS. In particular, the UNSC has extended the ability of naval vessels to pursue pirates into territorial waters. The other notable international response is the use of bilateral prosecution agreements under which detained pirates are handed to Kenya for the purposes of prosecution. Finally, chapter three evaluates the Code of Conduct Concerning the Repression of Piracy and Armed Robbery Against Ships in the Western Indian Ocean and the Gulf of Aden established in January 2009 to coordinate regional responses to piracy. Having considered the origins of piracy, definitional issues and novel modern responses, chapter four proposes the establishment of an international piracy court. While UNCLOS defines piracy at international law, it is the responsibility of states to implement appropriate domestic laws which provide for the prosecution and sentencing of pirates. Empirically, states can be said to have failed in this respect. The inability and unwillingness of states to prosecute piracy, coupled with the highly questionable practice of handing states to Kenya for prosecution, justifies the creation of a specialised court.

Details: New Zealand: University of Otago, 2009. 72p.

Source: Bachelor of Laws Dissertation: Internet Resource: Accessed February 11, 2012 at http://www.otago.ac.nz/law/oylr/2009/Honor_Lanham.pdf

Year: 2009

Country: International

Keywords: Administration of Justice

Shelf Number: 124090


Author: Danelo, David J.

Title: Toward a U.S.-Mexico Security Strategy: The Geopolitics of Northern Mexico and the Implications for U.S. Policy

Summary: Since Mexican President Felipe Calderón took office in December 2006, Mexico’s drug war has taken over 30,000 lives, destabilized the U.S.-Mexico border, and become a security crisis for the North American continent. Two years ago, a December 2008 Pentagon report warned about the strategic consequences for the United States of a rapid collapse of two nations: Pakistan and Mexico. “The Mexican possibility might seem less likely,†said the report, “but the government, its politicians, police and judicial infrastructure are all under sustained assault by drug cartels.†Any sudden collapse would require a U.S. response “based on the serious implications for homeland security alone.†This scenario has not come to pass, and a full scale collapse of Mexico remains unlikely. That said, Mexico’s security situation has direct consequences in the United States. Along the U.S.-Mexico border, coalitions of sheriffs, agents, activists and concerned citizens have rallied to increase public awareness. According to the Drug Enforcement Agency, Mexican drug cartels maintain distribution networks in 295 U.S. cities through brutal gang activity. U.S. Secretary of State Hillary Clinton has joined a chorus of policy analysts and terrorism experts by referring to Mexico’s drug war as a “criminal insurgency.†In recent visits to Mexico, both President Barack Obama and the Secretary of State have acknowledged U.S. responsibility to reduce drug demand and invest in “partnership.†As the joint response to the 2009 H1N1 flu virus by U.S. and Mexican health officials illustrated, United States and Mexico policy responses are inextricably linked. Beyond Mexico City’s federal government, which does not appear in imminent danger of collapse, the United States should be most concerned about conditions in the six northern Mexican states. Because of the current structure of the U.S. and Mexican economies, security in the Mexican states bordering the United States represents an enduring U.S. strategic interest. Averaging $320-340 billion, Mexico and China annually alternate as America’s second largest trading partner. Since the North American Free Trade Agreement (NAFTA) was ratified in 1994, the Mexican states of Tamaulipas, Nuevo León, Coahuila, Chihuahua, Sonora, and Baja California have tripled in population. The 50 km free trade zone—extending on both sides of the border—represents the partnership that has fused the economies of both nations together. Given the degree of economic, cultural and physical connectivity, the ten states along the U.S.-Mexico frontier should be treated in many ways as a “Border Nation†when developing national security policy. The term “Border Nation†describes the region where U.S. government institutions can—and should—focus capacity building efforts, which will make a broader increase of stability more likely throughout Mexico. The Border Nation approach advocated in this monograph will produce better solutions for two reasons. First, analyzing both the U.S. southwest and northern Mexico as a separate region acknowledges the enduring economic connectivity between northern Mexico and the United States. While post-NAFTA economic growth has made the six northern states the most prosperous in Mexico, persistent violence has mortgaged these gains to drug cartels. Second, and most important, a Border Nation concept encourages U.S. officials to use an enduring geopolitical framework to develop partnerships that extend beyond diplomatic courtesies and translate into on-the-ground actions. In order to develop a practical strategic framework for partnership with Mexico in defeating the threats of the drug-fuelled criminal insurgency—which this monograph refers to as “land piracyâ€â€”the U.S. government must achieve a greater understanding of the local and regional dynamics of the six Mexican border states. Although the Merida Initiative represents a step forward in developing a viable strategic partnership, this agreement does not present operational or tactical solutions. Unless a better understanding of this area is achieved, and unless specific prescriptions are developed, the security situation throughout Mexico is unlikely to improve. This project has studied security, economic and political trends in northern Mexico and the U.S. southwest in order to develop a strategy for actions the U.S. government can take at the federal level to best support state and local security partnerships between the four U.S. and six Mexican border states to defend and deter the violence and address enduring security issues on both sides of the border. David Danelo has spent extensive time on the ground in Mexico researching conditions in the six northern Mexican states and examining methods for increasing local partnerships between U.S. and Mexican authorities. His field research frames the recommended changes in U.S. policy. No relationship in the Western Hemisphere is fraught with more geopolitical complexity than the one between Mexico and the United States. The two nations are both partners and competitors. Given the economic, social and cultural rivalries, security partnerships between the United States and Mexico have been difficult to create. Failure to build capacity and structure partnerships will enhance the strength of drug cartels and fuel instability and violence. The purpose of this project is to examine the one region—Border Nation—where an enduring security partnership is most vital to long term stability on the North American continent.

Details: Philadelphia, PA: Foreign Policy Research Institute, 2011. 31p.

Source: Internet Resource: Accessed February 12, 2012 at http://www.fpri.org/pubs/201102.danelo.geopoliticsofnorthernmexico.pdf

Year: 2011

Country: International

Keywords: Border Security (U.S.) (Mexico)

Shelf Number: 124096


Author: Denmark. Rockwool Foundation Research Unit.

Title: Criminals pay a high price after completing sentences

Summary: The sentence in the court is: "You will go to prison for four months, and then pay a fine of 15% of your earnings each month for the rest of your life." No such harsh and unusual sentence has ever been pronounced in a Danish court, but nevertheless that is precisely the punishment that a criminal can look forward to in Denmark if he or she ends up in prison. New research from the Rockwool Foundation Research Unit shows that criminals have a great deal more punishment awaiting them after their release from prison: a form of indirect punishment. No sentence to such punishment has been handed down, but it is no less real and immediate for all that. According to Torben Tranaes, Research Director at the Rockwool Foundation Research Unit, this additional punishment lies in the greater difficulty offenders experience in finding work than they had before the crime and punishment took place, and the greater difficulty they have in re-establishing and maintaining the same level of income as before. The analysis shows that this indirect punishment is relatively heavy in Denmark, compared for example with similar punishment in the USA. The Danish analysis was based on the incomes of all those who received their first unconditional prison sentence in the period 1994-2003. Details of the analysis are presented in a Rockwool Foundation Research Unit book entitled Forbryderen og samfundet (The offender and society) (Gyldendal, 2008), which also contains details of research into the consequences of crime for relationships and into the connection between unemployment and crime. The Danish book is summarized in the newsletter.

Details: Copenhagen, Denmark: Rockwool Foundation Research Unit, 2010. 12p.

Source: Rockwool Foundation Research Unit Newsletter: Internet Resource: Accessed February 12, 2012 at http://www.rff.dk/files/RFF-site/Publikations%20upload/Newsletters/Engelsk/2010_April_eng_sik.pdf

Year: 2010

Country: International

Keywords: Economics and Crime

Shelf Number: 124105


Author: Sweeting, Jeff

Title: Anti-Contraband Policy Measures: Evidence for Better Practice

Summary: Tobacco taxation has been used in many jurisdictions as a policy measure to discourage smoking. The effectiveness of taxation strategies can be undermined by widespread availability of tobacco products. This knowledge synthesis presents information on a wide-range of tobacco anti-contraband measures, in an effort to ascertain the relative effectiveness of various policy measures for addressing contraband in Canada and around the world. This report is based on a comprehensive literature search, a series of key informant interviews, and four Expert Focus Panels with participants from Canada, the United States and several European jurisdictions. This paper identifies and defines the different forms of contraband tobacco, including casual bootlegging, organized international smuggling, illicit manufacturing, tax-avoidance from duty-free sources, and counterfeit cigarettes. The effectiveness of ten anti-contraband policy measures are explored: licensing, tax-markings/stamping, tracking and tracing, record-keeping/control measures, enhanced enforcement, export taxation, tax harmonization, tax agreements/compacts, legally binding agreements with the tobacco industry and memoranda of understanding (MOUs), and public awareness campaigns. Analysis suggests that both type of contraband and means of distribution influence the effectiveness of different policies and the unintended consequences of action. For example, policy measures that were effective for legally manufactured, but cross-border smuggled cigarettes in the 1990s are less effective for illicitly manufactured and counterfeit cigarettes that dominate contraband activity today in many countries. Case studies of Brazil, Australia and Canada indicate that while contraband sources often emerge domestically, given the ease of transport and manufacture, sources can be easily displaced to neighboring or overseas jurisdictions. Inter-agency cooperation (both domestic and international) emerges as a vital component of all successful anti-contraband strategies. The dynamic nature of contraband supply requires a comprehensive approach that focuses on both immediate and future threats. Policies designed to ensure contraband tobacco products do not appear in the legitimate retail sector (such as tax-paid markings, licensing, record-keeping) and measures to ensure that counterfeit products are easily identified (such as enhanced taxation stamps) are vital resources. Adequate investment in enforcement is critical to the success of anti-contraband measures. Ontario Tobacco Research Unit 2 Given the global scope of the phenomenon, greater international cooperation and information sharing is paramount. Obstacles and potential solutions to implementing various anti-contraband measures are examined from the unique perspective of Canadian First Nations. Very little data exists on contraband tobacco and there is almost no evaluative research on the effectiveness of anti-contraband policy measures, making study of the problem extremely challenging.

Details: Toronto, ON: Ontario Tobacco Research Unit, 2009. 141p.

Source: Internet Resource: Special Report Series: Accessed February 13, 2012 at: http://www.otru.org/pdf/special/special_anti_contraband_measures.pdf

Year: 2009

Country: International

Keywords: Black Markets

Shelf Number: 124123


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: Investing in Security: A Global Assessment of Armed Violence Reduction Initiatives

Summary: Conservative estimates indicate that at least 740 000 men, women, youth and children die each year as a result of armed violence, most of them in low- and medium-income settings (Krause, Muggah, Wenmann 2008). The majority of these deaths occur in situations other than war, though armed conflicts continue to generate a high incidence of casualties. Approaches to preventing and reducing these deaths and related suffering are becoming increasingly important on the international agenda. The United Nations (UN) Secretary General (2009) and UN General Assembly (2008) highlighted the relationships between armed violence and under-development and various high-level diplomatic processes are drawing more attention to promising solutions. In spite of the global preoccupation with the costs and consequences of armed violence, comparatively little evidence exists about how to stem its risks and effects. Virtually no information is available on armed violence reduction and prevention (AVRP) interventions, much less their effectiveness. This report aims to fill this gap. It seeks to generate more understanding of what works and what does not when it comes to armed violence reduction and prevention (AVRP), to stimulate further evaluation and to contribute to more effective and efficient policies and programmes. The report is based on a large-scale mapping of AVRP activities around the world, focusing primarily on programming trends in six countries – Brazil, Burundi, Colombia, Liberia, South Africa and Timor-Leste. These countries represent the very different programming contexts – from high rates of urban criminal violence to protracted post-conflict insecurity – in which development practitioners are currently engaged. While offering new data and analysis, this assessment builds directly on the report Armed Violence Reduction – Enabling Development produced by the Organisation for Economic Co-operation and Development’s International Network on Conflict and Fragility (OECD, 2009a). An important evolution of AVRP programming in all six countries over the past decade was detected. Approximately two-thirds of all armed violence prevention and reduction activities reviewed in Brazil occurred between 2005 and 2010. Likewise, in Burundi, Colombia, Liberia, and Timor-Leste, nearly all initiatives began after 2005. Not only does the report highlight the importance of internationally-mediated peace processes and security promotion efforts as important entry points for preventing and reducing violence, it highlights the significant investments made by national governments and non-governmental organisations (NGOs) in more developmental approaches to AVRP over the past decade. This report draws attention to the experimentation and innovation of AVRP initiatives. It finds that many actors are already actively engaged in “direct†and “indirect†AVRP activities, even if they label their initiatives by a different name. Many different practical approaches are used in AVRP activities to achieve the common objective of improving safety and security. Not only are the defence, police and justice sectors involved, but also specialists involved in urban planning, population health, tertiary and secondary education and youth programming. What many have in common is the experience of pursuing common comprehensive interventions to improve safety and security. Implementing agencies are similarly varied, ranging from multilateral and bilateral agencies to governments, NGOs and private organisations engaged in relief, development and social entrepreneurship. The most promising AVRP activities are forged on the basis of inter-sectoral partnerships and evidencebased approaches, and operate simultaneously at the local and national levels.

Details: Paris: OECD, 2011. 82p.

Source: Internet Resource: Accessed February 14, 2012 at: http://www.oecd.org/dataoecd/10/0/48927716.pdf

Year: 2011

Country: International

Keywords: Armed Violence

Shelf Number: 124128


Author: Grauman, Brigid

Title: Cyber-security: The Vexed Question of Global Rules

Summary: This report is made up of a survey of some 250 leading authorities worldwide and of interviews carried out in late 2011 and early 2012 with over 80 cyber-security experts in government, companies, international organisations and academia. It offers a global snapshot of current thinking about the cyber-threat and the measures that should be taken to defend against it, and assesses the way ahead. It is aimed at the influential layperson, and deliberately avoids specialised language. For the moment, the “bad guys†have the upper hand – whether they are attacking systems for industrial or political espionage reasons, or simply to steal money - because the lack of international agreements allows them to operate swiftly and mostly with impunity. Protecting data and systems against cyber-attack has so far been about dousing the flames, although recently the focus has been shifting towards more assertive self-protection. The first part of this two-part report concentrates on the main issues that are slowing progress, starting with the absence of agreement on what we mean by terms like cyber-war or cyber-attack. It reflects sharp divisions over the rights of individuals and states in cyber-space. Most Western countries believe that freedom of access to the internet is a basic human right, and that he or she also has a right to privacy and security that should be protected by laws. UNESCO argues that the right to assemble in cyberspace comes under Article 19 of the Declaration of Human Rights. At the other end of the spectrum are those countries, like Russia and China, that favour a global treaty but nevertheless believe that access to the internet should be limited if it threatens regime stability, and that information can also be seen as a cyber-threat. For these countries, any state has the right to control content within its sovereign internet space. Linked to the rights and responsibilities of states is the thorny issue of attribution. There are those countries that say that attribution to a specific attacker is impossible, and that the focus has to be defence from attacks. Others argue that attribution is possible, but requires international cooperation, sharing of information and assistance from local authorities. Some states believe that cooperation is a threat to their sovereignty; others say they can’t be held responsible for the activities of individuals or private companies. And a number apparently fear openness because they don’t want to see restrictions on their political or military objectives. Some clear themes emerge from the report, and they are issues that need fairly urgent resolution. Among these is how and to what degree should a more proactive, some would say more bellicose, stance be developed both in the military and private arenas; the need for much greater international cooperation; introducing a more solid security architecture to the internet; and establishing cyber-confidence building measures as an easier alternative to any global treaty, or at least as a gapfiller until a treaty is agreed. The second part of this report are 21 country stress tests, complemented by findings from the global survey the SDA conducted in the autumn of 2011 among 250 top cyber-security specialists in 35 countries. They included government ministers, staff at international organisations, leading academics, think-tankers and IT specialists, and their views diverged widely on how to improve international cooperation in cyberspace, which over half of them now consider a global common like the sea or space.

Details: Brussels, Belgium: Security & Defence Agenda, 2012. 108p.

Source: Internet Resource: Accessed February 14, 2012 at: http://www.securitydefenceagenda.org/Portals/14/Documents/Publications/SDA_Cyber_report_FINAL.pdf

Year: 2012

Country: International

Keywords: Computer Crimes

Shelf Number: 124133


Author: United Nations Office on Drugs and Crime

Title: Guidelines for the Forensic analysis of drugs facilitating sexual assault and other criminal acts

Summary: Drug-facilitated crimes are criminal acts carried out by means of administering a substance to a person with the intention of impairing behaviour, perceptions or decision-making capacity. Drug-facilitated sexual assault occurs when a person is subjected to sexual act(s) while they are incapacitated or unconscious due to the effect(s) of ethanol, a drug and/or other intoxicating substance, and as a result unable to resist or consent to such acts. While the covert use of drugs to facilitate crimes has occurred over the centuries, it has recently been highlighted by a significant increase in reports worldwide. In response to UN Commission on Narcotic Drugs (CND) resolution 53/7 on 'International cooperation in countering the covert administration of psychoactive substances related to sexual assault and other criminal acts', UNODC organized a meeting of international subject-matter experts and developed Guidelines for the Forensic analysis of drugs facilitating sexual assault and other criminal acts. These Guidelines outline the investigative and analytical challenges related to drug-facilitated crimes and emphasize the importance of evidence collection as a basis for further investigation. They address the limitations of the analytical toxicological investigation and other issues that may impact the interpretation of results. Detailed consideration is given to all analytical aspects important in the detection and identification of substances and interpretation of results in the context of drug-facilitated sexual assault cases. The importance of collaboration of all parties involved in the investigation and the importance of collecting consistent data is also emphasized. The Guidelines aim to assist in the investigation, analytical detection and prosecution in drug-facilitated crime cases and provide guidance specifically to: i)investigators and medical professionals as to requirements for successful evidence collection including sample collection and storage; and ii) analytical toxicologists to carry out analysis of these substances and interpret results in cases of drug-facilitated crimes.

Details: Vienna, Austria: United Nations Office on Drugs and Crime, 2011. 58p.

Source: Internet Resource: Accessed February 14, 2012 at http://www.unodc.org/documents/scientific/forensic_analys_of_drugs_facilitating_sexual_assault_and_other_criminal_acts.pdf

Year: 2011

Country: International

Keywords: Criminal Evidence

Shelf Number: 124136


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Monitoring the impact of economic crisis on crime

Summary: Within the context of the United Nations Global Pulse initiative on monitoring the impact of crisis on vulnerable populations, this report presents the results of a unique cross-national analysis that aims to investigate the possible effects of economic stress on crime. Using police-recorded crime data for the crimes of intentional homicide, robbery and motor vehicle theft, from fifteen country or city contexts across the world, the analysis examines in particular the period of global financial crisis in 2008/2009. As economic crisis may occur over a relatively short timescale, this period, as well as – in many cases – up to 20 years previously, are examined using high frequency (monthly) crime and economic data. The report finds that, whether in times of economic crisis or non-crisis, economic factors play an important role in the evolution of crime trends. Out of a total of fifteen countries examined, statistical modelling identifies an economic predictor for at least one crime type in twelve countries (80 percent), suggesting some overall association between economic changes and crime. In eleven of the fifteen countries examined, economic indicators showed significant changes suggestive of a period of economic crisis in 2008/2009. Both visual inspection of data series and statistical modelling suggest that in eight of these eleven ‘crisis’ countries, changes in economic factors were associated with changes in crime, leading to identifiable crime ‘peaks’ during the time of crisis. Violent property crime types such as robbery appeared most affected during times of crisis, with up to two-fold increases in some contexts during a period of economic stress. However, in some contexts, increases in homicide and motor vehicle theft were also observed. These findings are consistent with criminal motivation theory, which suggests that economic stress may increase the incentive for individuals to engage in illicit behaviours. In no case where it was difficult to discern a peak in crime was any decrease in crime observed. As such, the available data do not support a criminal opportunity theory that decreased levels of production and consumption may reduce some crime types, such as property crime, through the generation of fewer potential crime targets. For each country/city a number of individual crimes and economic variables were analyzed. Across all combinations, a significant association between an economic factor and a crime type was identified in around 47 percent of individual combinations. For each country, different combinations of crime and economic predictors proved to be significant. Among the two methods used to analyze the links between economic and crime factors (visualization and statistical modelling), different combinations of factors were found to be significant and in five cases the two methods identified the same variables. Three out of these five cases represented city contexts rather than national contexts. This may indicate that associations between crime and economic factors are best examined at the level of the smallest possible geographic unit. Where an association between one or more economic variables and crime outcomes were identified by statistical modelling, the model frequently indicated a lag time between changes in the economic variable and resultant impact on crime levels. The average lag time in the contexts examined was around four and half months. In this respect, it should be noted that the relationship between crime and economy is not necessarily uni-directional. Whilst there are theoretical arguments for why changes in economic conditions may affect crime, it could also be the case that crime itself impacts upon economic and developmental outcomes, such as when very high violent crime levels dissuade investment. During the statistical modelling process, crime was set as the ‘outcome’ variable and economic data as the ‘independent’ variable. As such, the model was not used to investigate the converse relationship – whether changes in crime could also help explain economic outcomes. The statistical model proved successful at forecasting possible changes in crime for a number of crime typecountry/ city contexts. Forecasting for a period of three months using a statistical model with economic predictors proved possible with reasonable accuracy (both in terms of direction and magnitude) in a number of different contexts, including both in times of crisis and non-crisis. Many of the forecasts are sufficiently accurate to be of value in a practical scenario. Crime forecasts sometimes led, however, to underestimation of crime changes, suggesting that modelling of crime changes is not optimal when based on economic predictors alone. Indeed, economic changes are not the only factor that may impact levels of crime. The presence of youth gangs, weapons availability, the availability and level of protection of potential targets, drug and alcohol consumption and the effectiveness of law enforcement activity all play a significant role in enabling or restraining overall crime levels. Although the challenges remain significant, this report demonstrates that – with comparatively few resources – a lot may be learned from the application of analytical techniques to existing data. Continued methodological development, including the creation of an online data reporting ‘portal’, as well as the strengthening of exchange of information and experience, between countries, has the potential to lay the foundation of a strong ‘early-warning’ system. The analysis reported here does not prove the existence of relationships between economic factors and crime. It does provide strong indications that certain associations are present, and that much may be gained from further investigation. If the impact of economic stress on crime trends can be further understood, and even forecasted in the short-term, then there is the potential to gain much through policy development and crime prevention action.

Details: Vienna, Austria: United Nations Office on Drugs and Crime (UNODC),

Source: Internet Resource: Accessed February 14, 2012 at http://www.unodc.org/documents/data-and-analysis/statistics/crime/GIVAS_Final_Report.pdf

Year: 2012

Country: International

Keywords: Crime Rates

Shelf Number: 124137


Author: Blokhuis, Bregje

Title: Violation of Women's Rights: A cause and consequence of trafficking in women

Summary: The report reveals how gender discrimination and violence is linked to trafficking. It argues that effective prevention of trafficking in women or protection of women at risk of trafficking can only take place if women’s rights - in particular economic and social gender equality – are safeguarded and fulfilled. Gender equality and efforts to end violence against women must stand at the centre of any anti-trafficking policy or activity.

Details: Amsterdam, Netherlands: La Strada International, 2008. 116p.

Source: Internet Resource: Accessed February 14, 2012 at http://www.humantrafficking.org/uploads/publications/lastrada_08_rights_0708.pdf

Year: 2008

Country: International

Keywords: Human Rights

Shelf Number: 112356


Author: Kurtenbach, Sabine

Title: Youth Violence in Post-War Societies - Conceptual Considerations on Continuity and Change of Violence: Social and Political Fractures after Wars: Youth Violence in Cambodia and Guatemala

Summary: The present study is part of the research project on “Social and Political Fractures after Wars: Youth Violence in Cambodia and Guatemalaâ€. The project is financed by the German Foundation for Peace Research and is located at the Institute for Development and Peace at the University of Duisburg-Essen. The project aims at explaining different levels of youth violence in two post-war societies whose processes of war termination are regarded as successful. However, both societies face serious problems of post-war development that are closely related to the experiences of war and war termination. While Cambodia’s democratisation process is considered more or less as a failure, Guatemala suffers from levels of violence higher than during most of the war. The differences between both countries in levels of violence and mechanisms of violence control are also visible in the incidence of youth violence. The project aims to explain these differences through the contextualisation of youth violence. Thus the main focus is directed at the societal and political fractures war and war termination cause for youth and their life-worlds. The working hypotheses were related to differences according to a) the levels of social differentiation; b) the relationship between political and economic power; c) normative frameworks; and d) the sequencing of post-war developments (namely between liberalisation and stabilisation). This approach has methodological consequences insofar as different levels of youth violence are what we seek to explain. The perspective of the actors themselves is beyond our approach. After having identified the relevant fractures this would be the task of further research. This working paper introduces a conceptual framework for the analysis of both post-war societies and youth violence. This conceptual framework then serves as basis for the comparison of post-war developments in Cambodia and Guatemala with a focus on violence control and public security (working papers no. 2 and 3). The topic of youth violence will be addressed in working papers no. 4 and 5. The working papers will be followed by a comparison of the case studies and an outline of consequences for future research (working paper no. 6).

Details: Duisburg, Germany: Institute for Development and Peace, 2008. 43p.

Source: Project Working Paper No. 1: Internet Resource: Accessed February 14, 2012 at http://www.humansecuritygateway.info/documents/DSF_SocialPoliticalFracturesAfterWarsYouthViolence_Cambodia_Guatemala.pdf

Year: 2008

Country: International

Keywords: Juveniles

Shelf Number: 113633


Author: Mishna, Faye

Title: Interventions for Children, Youth, and Parents to Prevent and Reduce Cyber Abuse

Summary: Child participation in Internet safety interventions does not change risky online behaviour, according to a new Campbell review. The Internet has created a new communication tool, particularly for young people. Worldwide, the use of e-mail, websites, instant messaging, web cams, chat rooms, social networking sites and text messaging is exploding. While there are many benefits that result from electronic based communication, the Internet is at the same time a potential site for abuse and victimization. Young people can fall victim to sexual perpetrators, stalkers, exploiters, and peers who bully online. Interventions against cyber abuse have been developed in response to the growing need to protect children and youth from online dangers. The authors of a new Campbell review examined the effectiveness of cyber abuse interventions in increasing Internet safety knowledge and decreasing risky online behaviour. Having identified more than 3,000 potentially relevant studies, only three met the authors' eligibility criteria and were included in the review: an evaluation of the I-SAFE cyber safety program, an evaluation of the Missing cyber safety program, and an evaluation of an in-school cyber bullying intervention (HAHASO). Results provide evidence that participation in psycho-educational Internet safety interventions is associated with an increase in Internet safety knowledge; but it is not significantly associated with a change in risky online behaviour. The need for further research in this field is highlighted.

Details: Oslo: Campbell Collaboration, 2009. 54p.

Source: Campbell Systemic Reviews 2009:2, Internet Resource: Accessed February 14, 2012 at www.campbellcollaboration.org/lib/download/681/

Year: 2009

Country: International

Keywords: Crime Reduction

Shelf Number: 116293


Author: Davey, Corinne

Title: Change starts with us, talk to us! Beneficiary perceptions regarding the effectiveness of measures to prevent sexual exploitation and abuse by humanitarian aid workers: a HAP commissioned study

Summary: This research, conducted in Haiti, Kenya and Thailand, was commissioned by the Humanitarian Accountability Partnership (HAP), and sought to capture the views of beneficiaries of humanitarian assistance on the effectiveness of measures put in place to prevent sexual exploitation and abuse (PSEA) by humanitarian workers. This study is a follow up to similar research, also on behalf of HAP, conducted by Lattu in 20081. It examines whether organisations have worked effectively on PSEA measures in the intervening three years, such that beneficiaries now feel safer, more confident to report exploitation and abuse, and more assured that reports will be addressed appropriately. The review analyses the findings and recommendations of existing research, and examines humanitarian organisational policies, guidelines and standards for PSEA. It includes the views of UN and NGO personnel working in the three countries on how these policies and procedures are being implemented, what support they are receiving to set up appropriate mechanisms to protect vulnerable people from SEA and, most importantly, the views of beneficiaries on the effectiveness of these measures. The choice of the focus countries was made in part to provide some comparison over time, since Kenya and Thailand were featured in the previous study. In addition, the three countries cover different regions of the world, and represent different contexts and scenarios in relation to PSEA implementation. In Kenya, a PSEA initiative ended shortly before Lattu’s 2008 research. Two years on, there was now the opportunity to track the sustainability of previous PSEA efforts. Research in Kenya was also conducted in Kibera, one of the largest urban slums in Africa, which allowed for a comparison of measures adopted in an urban development context with those in the camps. In Thailand, a three-year initiative on PSEA was ending, which offered useful learning on the impact of a consistent and concerted effort. The recent earthquake in Haiti provided an example of how PSEA measures are being implemented in the context of a large-scale, rapid onset disaster. Consultation with groups of women, men, girls and boys inform the main findings of the research. A total of 732 beneficiaries participated in the study across the three countries, of which 411 were female and 321 male. The researchers elicited community opinions on exploitation and abuse by humanitarian workers but set this in the context of the exploitation and abuse that camp and host communities experience at the hands of other perpetrators, including members of their own communities. In doing so, the researchers were able to explore the impact of initiatives, such as those on gender-based violence (GBV) and child protection, to understand how these have been coordinated with organisational policies to ensure protection from exploitation and abuse by humanitarian workers. Beneficiaries in all locations, to a greater or lesser extent, reported that they still feel at risk of exploitation and abuse by humanitarian workers. In addition to sexual abuse and exploitation by humanitarian workers, the report describes high levels of violations occurring in the beneficiary populations at the hands of others. Organisational efforts to discuss issues of SEA with beneficiaries appear variable from location to location. Some organisations have put in place effective awareness-raising mechanisms, such as hiring a protection officer, holding regular group meetings, or the use of theatre and drama. These are proving effective in Thailand and in some camps in Haiti. However, the most common feedback from beneficiaries is that organisations have not discussed SEA with them, and that little has been agreed between organisations and beneficiaries to prevent SEA taking place. Under-reporting is still a major issue. Most beneficiaries say they would report SEA by humanitarian workers, but the actual number of reported cases does not appear to bear this out. Reporting depends on a number of factors, principally whether beneficiaries are clear on how to make the report, and the extent to which the reporting mechanism is considered confidential. Providing information to beneficiaries is a major challenge. The use of complaints boxes has not been well received by beneficiaries in Kenya because they are not perceived as being confidential. The lack of clear reporting mechanisms, including identified people to report to, is also a significant barrier to complaining. This reflects an opinion in all three countries. Most beneficiaries who were able to describe the reporting process, articulated a route they had devised themselves rather than a formal reporting mechanism designed by the organisations. In asking beneficiaries what formal process might help them in reporting, women generally wanted organisations to establish a specific place where reports could be made. Reporting also depends on whether or not beneficiaries see the incident as exploitative (consensual sex between humanitarian workers and beneficiaries may not necessarily by considered exploitative) and whether beneficiaries feel they have enough evidence to make a report. At times, it appears simply to be a matter of staff attitude. It is clear from the research, however, that the risk of exploitation and abuse of beneficiaries by humanitarian workers decreases when PSEA initiatives are consistently implemented. In Haiti, the risk was seen as highest in the immediate aftermath of the earthquake before PSEA initiatives were introduced. In Kenya, the 2004 – 2007 PSEA project was perceived to have made improvements in the situation for beneficiaries. However, since the three-year project ended and PSEA was incorporated into GBV work, some declines were noted. In Thailand, a concerted and coordinated effort has seen the cases of SEA by humanitarian aid workers reduce significantly. The recommendations in this report aimed at improving the effectiveness of agencies’ PSEA efforts are drawn from both beneficiaries’ suggestions and the researchers’ analysis. The report has been structured as follows: the introduction provides a background on PSEA efforts since 2002, other research that has been conducted, and the contexts in which research for this report was carried out. The main body of the report is designed to give the reader a sense of the beneficiaries’ voices - the section titles are formed as beneficiaries’ questions, and populated with actual quotes obtained during the country visits. Following the section on conclusions and recommendations, the report provides individual chapters focused on each country visited, giving more detail on the circumstances there, and the issues and perceptions of particular relevance to beneficiaries located in those countries.

Details: Geneva, Switzerland: The Humanitarian Accountability Partnership International, 2010. 124p.

Source: Internet Resource: Accessed February 17, 2012 at http://www.hapinternational.org/pool/files/change-starts-with-us.pdf

Year: 2010

Country: International

Keywords: Human Rights

Shelf Number: 124158


Author: Vlachova, Marie

Title: Women in an Insecure World: Violence against Women - Facts, Figures and Analysis

Summary: According to estimates by the United Nations, up to 200 million women and girls are demographically ‘missing’. The euphemism hides one of the most shocking crimes against humanity. Given the biological norm of 100 new-born girls to every 103 new-born boys, millions more women should be living amongst us. If they are not, if they are ‘missing’, then they have been killed, or have died through neglect and mistreatment. Women live in a very insecure world indeed. Many fall victim to gender selective abortion and infanticide (boys being preferred to girls). Others do not receive the same amount of food and medical attention as their brothers, fathers and husbands. Others again fall prey to sexual offenders, to ‘honour killings’ and to acid attacks (most often for refusing a suitor). An estimated 5,000 women are burnt to death each year in ‘kitchen accidents’ because their dowry was seen as being too modest. Scores succumb to the special horrors and hardships that conflict, war and post-conflict situations reserve for girls and women. A shocking number of women are killed within their own walls through domestic violence. Rape and sexual exploitation remain, moreover, a reality for countless women; millions are trafficked; some sold like cattle. The full magnitude of the issue sinks in only if we put the figures into perspective: The number of the ‘missing’ women, killed for gender-related reasons, is of the same order of magnitude as the estimated 191 million human beings who have lost their lives directly or indirectly as a result of all the conflicts and wars of the 20th century – which was, with two world wars and numerous other murderous conflicts, the most violent period in human history so far. A sustained demographic ‘deficit’ of 100- 200 million women implies that each year 1.5 to 3 million girls and women are killed through gender related violence. In comparison: each year some 2.8 million people die of AIDS, 1.27 million of malaria. Or, put in the most horrible terms: violence against women causes every 2 to 4 years a mountain of corpses equal to the Jewish Holocaust. Globally, women aged between fifteen and forty-four are more likely to be injured or die as a result of male violence than through cancer, traffic accidents, malaria and war combined. Women in an Insecure World has, therefore, tried to bring together in one book – in probably the most comprehensive effort so far – the facts and figures. Often these figures are not more than best estimates – for violence against women goes all too often unreported. The recognition that – in face of a problem of such magnitude – we cannot even count on good statistics is in itself a shocking and unacceptable fact.

Details: Geneva, Switzerland: Geneva Centre for the Democratic Control of Armed Forces, 2005. 32p.

Source: Internet Resource: Accessed February 17, 2012 at http://www.unicef.org/emerg/files/women_insecure_world.pdf

Year: 2005

Country: International

Keywords: Domestic Violence

Shelf Number: 124162


Author: Tasmania. Department of Justice, Sentencing Advisory Council.

Title: Arson & Deliberately Lit Fires

Summary: The Sentencing Advisory Council’s Consultation Paper into its first referral from the Attorney-General was released on 20 December 2011. The Sentencing Advisory Council is committed to giving the members of the community the opportunity to express their views about sentencing issues in Tasmania. The purpose of this Consultation Paper is to assist in the discussion about the legislative framework, sentencing options, intervention and community information programs available for adults and juveniles involved in fire setting in Tasmania. The Sentencing Advisory Council is inviting responses from all relevant stakeholders and members of the community on the range of questions posed in the Consultation Paper. The Council intends to use its responses to inform its advice to the Attorney-General.

Details: Tasmania: Sentencing Advisory Council, Department of Justice, 2011.

Source: Consultation Paper No. 1: Internet Resource: Accessed February 18, 2012 at http://www.sentencingcouncil.tas.gov.au/__data/assets/pdf_file/0010/187507/Arson_and_deliberately_lit_fires_-_consultation_paper.pdf

Year: 2011

Country: International

Keywords: Adult Offenders

Shelf Number: 124182


Author: Grieg, Alan

Title: Mobilising Men in Practice: Challenging sexual and gender-based violence in institutional settings - Tools, Stories, Lessons

Summary: Gender inequalities, and the violence that maintains them, are not simply a matter of individuals and their behaviours; they are maintained by the social, economic and political institutions that structure all of our lives. So, what can men do to work with women in challenging the institutionalised nature of sexual and gender-based violence? Through exploring ways of engaging men as gender activists within their every-day contexts, the Mobilising Men programme is working to better understand what it takes to confront sexual and gender-based violence in institutional settings. Since early 2010, the Institute for Development Studies, with support from UNFPA, has partnered with implementing civil society organisations in India, Kenya and Uganda to identify, recruit, train and support teams of male activists to work with women in developing campaigns to challenge and change the policies and cultures of specific institutional settings that condone or even fuel sexual and gender-based violence. ‘Mobilising Men in Practice’ brings together stories and lessons from this work, as well as some of the tools used by the partners in India, Kenya and Uganda. It is intended to inspire and guide others who are committed to engaging more men in efforts to address sexual and gender-based violence within the institutions in which we live our lives.

Details: Brighton, UK: Institute of Development Studies, 2012.

Source: Internet Resource: Accessed February 19, 2012 at

Year: 2012

Country: International

Keywords: Crime Prevention

Shelf Number: 124191


Author: International Drug Policy Consortium

Title: TNI-IDPC-Sentencing Council: Expert Seminar on Proportionality of Sentencing for Drug Offences

Summary: The Expert Seminar on Proportionality of Sentencing for Drug Offences was an initiative of the Transnational Institute working together with the International Drug Policy Consortium (‘IDPC’) and co-hosted by the Sentencing Council of England and Wales. The seminar was funded by the European Commission and the Open Society Institute and took place in London, England in May 2011. This seminar is the third in a series of expert discussions on drug policy designed to feed into moments of opportunity for policy and law reform at national and international level with detailed technical analysis and through examples of best-practice from across different jurisdictions. The moment of opportunity in this case was the Sentencing Council’s consultation on sentencing for drug offences which is due to produce definitive sentencing guidelines for England and Wales in the next year. A total of 31 people attended and comprised a mixture of domestic and international policy officials, the judiciary, and practitioners as well as representatives from non-governmental organisations and academic institutions. Four themes were covered over the course of the day: proportionality, the International Human Rights Perspective; the UK Experience and Consultation on Sentencing for Drug Offences; the Concept of Proportionality with a Focus on Different Levels of Involvement in Drug Offences; and drug ‘mules.’

Details: London: International Drug Policy Consortium, 2011. 41p.

Source: Internet Resource: Accessed February 19, 2012 at http://www.idpc.net/sites/default/files/library/IDPC-TNI%20Proportionality%20Report%20FINAL.pdf

Year: 2011

Country: International

Keywords: Drug Policy

Shelf Number: 124198


Author: Liang, Christina Schori

Title: Shadow Networks: The Growing Nexus of Terrorism and Organised Crime

Summary: Key Points: there are growing links between terrorist and organised crime groups who are sharing expertise and are cooperating in kidnapping, arms, drugs and human trafficking, as well as drug production, cigarette smuggling, extortion and fraud; The growing nexus of shared tactics and methods of terror and crime groups is due to four major developments: globalization, the communication revolution through the Internet, the end of the Cold War, and the global "war on terror"; Both terrorist and organised crime groups are leveraging the Internet for recruitment, planning, psychological operations, logistics, and fundraising. The Internet has become the platform for both organised crime and terrorists to conduct cybercrimes ranging from video piracy, credit card fraud, selling drugs, extortion, money laundering and pornography; The growing nexus has facilitated terrorists to access automatic weapons, including stand-off weapons and explosive devices, empowering them to challenge police, land and naval forces with the latest sophisticated weaponry and intelligence; The growing nexus of terrorism and organised crime is exacerbating efforts in war-fighting and peacemaking in Iraq and Afghanistan. Also, West Africa in general and the Sahel in particular have become a dangerous new trafficking hub uniting both terrorists and organised crime cartels across a wide and mostly ungoverned land mass; The growing nexus of terrorism and organised crime groups is challenging international and national security by weakening democratic institutions, compromising government institutions, damaging the credibility of financial institutions and by infiltrating the formal economy, leading to increased crime and human security challenges.

Details: Geneva: Geneva Centre for Security Policy, 2011. 6p.

Source: GCSP Policy Paper No. 20: Internet Resource: Accessed February 21, 2012 at http://gcsp.ch/content/download/6607/61163/download

Year: 2011

Country: International

Keywords: Internet

Shelf Number: 124228


Author: Kleinig, John

Title: Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

Summary: This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal democracies, namely, security and privacy. Both values are essential to individual liberty but they come into conflict in times when civil order is threatened, as has been the case from late in the twentieth century, with the advent of global terrorism and transnational crime. We seek to articulate legally sustainable, politically possible and technologically feasible global ethical standards1 for identity management technology and policies in liberal democracies in the contemporary global security context. Although the standards in question are to be understood as global ethical standards potentially to be adopted not only by the United States (US) but also by the European Union (EU), India, Australasia and other contemporary liberal democratic states, we take as our primary focus the tensions that have arisen between the US and the EU. This tension provides a good example of the kinds of challenges involved in developing global standards. It is exemplified by the 2006 disclosure concerning the US government’s access to SWIFT transactions and the controversy that has followed it, as well as the earlier and ongoing controversy over the 2004 US–EU Passenger Names Records (PNR) agreement. It also makes itself known in the ongoing debate over national identity cards. The first two conflicts make it clear that, however difficult it may be to develop global standards for the management of personal data, such standards are needed and that every effort should be made to develop them or at least to implement procedures for addressing conflicts among them. Naturally, authoritarian states do not share the liberal values underlying this project – values such as individual autonomy and privacy. Nevertheless, to the extent that such authoritarian states are evolving or are likely to evolve toward some form of liberal democracy, the results of this study will also be relevant to these states. Our purpose is to articulate standards and institutional initiatives that are sufficiently specific to determine – or at least substantially constrain – the requisite detailed security and privacy policies and prescriptions in national as well as international and transnational jurisdictions. The project distinguishes itself from other work in this field in two major respects. Firstly, the multi-disciplinary team of experts brought together for this project has enabled the integration of: (a) ethical principles, (b) national and international legal considerations, (c) effective law enforcement practices, (d) oversight and accountability concerns and (e) knowledge of existing and emerging technology, such as database mining and knowledge discovery technology, in the development of a framework of determinate and feasible ethical standards for identity management technology in the global security context. Secondly, the study has drawn on an international team of experts and focuses on common international standards and solutions, as befits the trans-jurisdictional and transnational nature of the problems to be addressed. Specifically, the project involves not only US personnel and institutions but also EU, Indian, and Australasian expertise.

Details: Canberra: ANU E Press, The Australian National University, 2011. 291p.

Source: Internet Resource: Practical Ethics and Public Policy Monograph 2: Accessed February 27, 2012 at: http://epress.anu.edu.au/apps/bookworm/view/Security+and+Privacy%3A+Global+Standards+for+Ethical+Identity+Management+in+Contemporary+Liberal+Democratic+States/8021/Text/cover.html

Year: 2011

Country: International

Keywords: Privacy and Ethics

Shelf Number: 124293


Author: Mitchell, Ojmarrh

Title: Drug Courts’ Effects on Criminal Offending for Juveniles and Adults

Summary: Drug courts are specialized courts in which court actors collaboratively use the legal and moral authority of the court to monitor drug-involved offenders’ abstinence from drug use via frequent drug testing and compliance with individualized drug treatment programs. Drug courts have proliferated across the United States in the past 20 years and been adopted in countries outside the United States. Drug courts also have expanded to non-traditional populations (juvenile and DWI offenders). The objective of this review is to systematically review quasi-experimental and experimental (RCT) evaluations of the effectiveness of drug courts in reducing recidivism, including drug courts for juvenile and DWI offenders. This systematic review critically assesses drug courts’ effects on recidivism in the short- and long-term, the methodological soundness of the existing evidence, and the relationship between drug court features and effectiveness.

Details: Oslo, Norway: Campbell Collaboration, 2012. 87p.

Source: Internet Resource: Campbell Systematic Review 2012:4: Accessed February 28, 2012 at: http://www.ndcrc.org/sites/default/files/mitchell_drugcourts_review.pdf

Year: 2012

Country: International

Keywords: Drug Abuse Treatment

Shelf Number: 124302


Author: Committee to Protect Journalists

Title: Attacks on the Press in 2011: A Worldwide Survy by the Committee to Protect Journalists

Summary: Trade and the Internet are turning us into global citizens, but the news we need is often stopped at national borders. Shadowy agents attack reporters in Pakistan, while criminals dictate the news in Mexico. Governments in Iran, China, and Turkey jail critical writers. Across Africa, authorities invoke security laws to intimidate news media. Attacks on the Press documents these and other emerging dangers worldwide. Compiled by the Committee to Protect Journalists, an independent nonprofit organization, Attacks on the Press is the world’s most comprehensive guide to international press freedom.

Details: New York: Committee to Protect Journalists, 2012. 462p.

Source: Internet Resource: Accessed February 28, 2012 at http://www.cpj.org/attacks_on_the_press_2011.pdf

Year: 2012

Country: International

Keywords: Journalists

Shelf Number: 124312


Author: LeBillon, Philippe

Title: Extractive Sectors and Illicit Financial Flows: What Role for Revenue Governance Initiatives?

Summary: Countries highly dependent on natural resources are among the most severely affected by the problem of illicit financial flows. Despite a lack of definite studies proving the correlation between higher dependency on natural resources and higher levels of illicit flows, there are grounds to believe extractive industries’ revenues provide a large contribution to these flows. Most existing initiatives to address governance issues in extractive sectors have not been designed with the problem of illicit financial flows in mind. They have generally contributed to increased levels of transparency in the sector but have not significantly influenced the likelihood that revenues from natural resources will be misappropriated and illicitly transferred. But extractive industries initiatives can be improved in this regard, and development aid, along with other stakeholders, can help. Among other priorities, transparency initiatives should demand higher disaggregation of information disclosed by extractive companies and host governments. Transparency requirements should extend beyond revenues to licensing, contracts, physical resource flows, and other production factors, as well as to public expenditure. Extractives transparency initiatives also need to integrate elements of the tax justice and tax evasion agendas in order to expand their relevance to the effort to reduce illicit financial flows.

Details: Bergen: Chr. Michelsen Institute (U4 Issue 2011:13) 41 p.

Source: Internet Resource: Accessed February 29, 2012 at: http://www.u4.no/publications/extractive-sectors-and-illicit-financial-flows-what-role-for-revenue-governance-initiatives/

Year: 0

Country: International

Keywords: Financial Crimes

Shelf Number: 124321


Author: Reed, Quentin

Title: Squeezing a Balloon? Challenging the Nexus Between Organised Crime and Corruption

Summary: Corruption and organised crime are of great concern to the international community: while the first is regarded as one of the greatest barriers to development, the second is seen as a key threat to international security and stability. In this context, corruption is best understood as the way in which organised crime infiltrates the state. Corruption is one of the primary enabling activities of organised crime, it makes possible and/or facilitate the conduct of this type of criminal activities. This U4 Issue argues that understanding the connections between both phenomena requires a deeper analysis of the relationships between organised criminals and public officials at different levels of the state. First, international standards and conventional wisdom tend to embrace a limited range of the possible policies that may be employed to tackle organised crime and the corruption, and are heavily oriented towards criminal law and enforcement. Second, policies to tackle both problems are usually developed without applying sound principles of policy‑making. The author argues for the development of policies based on proper analysis of the specific context, breaking down the problem into clear components, identifying their causes, and selecting specific and appropriate measures to address each component or causal factor. In particular, the author suggests there is a pressing need to correct the current bias towards criminal law enforcement solutions.

Details: Bergen: Chr. Michelsen Institute (U4 Issue 2009:7) 38 p.

Source: Internet Resource: Accessed February 29, 2012 at: http://www.u4.no/publications/squeezing-a-balloon-challenging-the-nexus-between-organised-crime-and-corruption-2/

Year: 0

Country: International

Keywords: Corruption

Shelf Number: 124322


Author: Beck, Adrian

Title: Automatic Product Indentification & Shrinkage: Scoping the Potential

Summary: The purpose of this paper is to explore the possibilities offered by recent developments within the sphere of product Auto Identification (Auto ID) technologies to impact upon the problem of shrinkage in the retail sector and their suppliers (both manufacturers and third-party logistics providers). Its purpose is not to provide specific strategies for its implementation, but to consider the potential to impact upon shrinkage in the short, medium and long term. In this respect, this document aims to generate discussion, debate and above all, raise questions about how this rapidly developing technology might be used, rather than to be overtly prescriptive in suggesting how it should be used. The research was commissioned by Efficient Consumer Response Europe (ECR) and uses as its base a series of in-depth discussions with European retailers and manufacturers, technology providers and developers, standards agencies and academics. In particular, a oneday workshop was organised in February 2002, in Brussels, when invited delegates were offered the opportunity to discuss in detail the prospects, problems and potential of Auto ID. The author is extremely grateful to all those who contributed their time, expertise and knowledge to assist in this research. In particular, the staff at the Auto ID Centre in Boston (US) and Cambridge (UK), and the members of the ECR Europe Shrinkage committee.

Details: Brussels: Efficient Consumer Response (ECR) Europe, 2002.

Source: White Paper for ECR Europe: Internter Resource: Accessed February 29, 2012 at http://www2.le.ac.uk/departments/criminology/people/bna/RFIDandShrinkageWhitePaperpdf

Year: 2002

Country: International

Keywords: Crime Prevention

Shelf Number: 124328


Author: Davies, John

Title: 'My Name is Not Natasha' How Albania Women in France Use Trafficking to Overcome Social Exclusion (1998-2001)

Summary: This book analyses and explains a trafficking crisis experienced by a group of Albanian women in Lyon, France, between 1998 and 2001. The book proposes new theoretical explanations for Albanian trafficking that considers women’s experiences of social stigma and exclusion as becoming the main reason for Albanian women being involved in trafficking, after an initial period when young women were mainly deceived into abusive relationships that were then used to coerce them into forced labour. The Albanian trafficking discourse is currently dominated by the idea that Roma and rural women experiencing poverty and social disadvantage are coerced or deceived into trafficking networks that move them across borders and reduce them to sexual slavery because of the ‘demand’ of men for paid sex. This book argues that the conceptualisation that considers trafficking as being best explained by the ‘demand’ of men for paid sex and the naivety of the trafficked women is inadequate for explaining many of the trafficking experiences reported by the Albanian women in Lyon. This book contends that many women were initially deceived into marriage with men who then exploited them; these deceived wives were subjugated through the exploitation of patrilocal marriages that invested in the husband the ability to make non-altruistic household decisions. This meant that their migration could be understood by refining the new economics of migration model and the role of non-altruistic actors who might exploit its processes. Once the nature of trafficking networks became well-known Albanian women increasingly refused to accept such marriages. However, because other Albanian women lacked social networks able to support them in their migration goals, many socially excluded divorced women began to use the trafficking networks as a mobility strategy in pursuit of migration goals beyond prostitution. The book thus argues that many trafficked women were not motivated to migrate because of economic considerations but by a determination to achieve social rehabilitation through foreign marriage. These women wanted to chain migrate but their weak social networks could not sustain their intended migration. Therefore, these women used trafficking as a means to reach destinations where they could build new networks and strengthen their old social networks. Then they would eventually re-engage with their social networks without being an onerous burden. This is a new analysis based on previously unknown data and so the book is original and adds to our knowledge regarding trafficking as a means to pursue chain migration goals by compensating for inadequate social networks through the use of trafficking networks. The book concludes that rather than being best explained by ‘demand’ as a focal problem trafficking can be better understood by considering trafficking as a gendered aspect of crisis in a migration order in transition. This extension of Van Hear’s migration order theory is also a new application of the subjective notion of intolerability as being a substantial motivation for migration.

Details: Amsterdam: Amsterdam University Press, 2009. 325p.

Source: IMISCOE Dissertations: Internet Resource: Accessed February 29, 2012 at http://dare.uva.nl/document/174696

Year: 2009

Country: International

Keywords: Female Victims

Shelf Number: 124330


Author: Moosa, Zohra

Title: Destined to fail? How violence against women is undoing development

Summary: Violence against women and girls is one of the starkest collective failures of the international community in the 21st century. Violence affects one in three women globally and is one of the most widespread abuses of human rights worldwide in times of both conflict and peace. It is a leading cause of death and disability among women of all ages. As this report shows, women face violence and the threat of violence at every stage of their lives. As well as representing a gross violation of human rights in its own right, violence against women also presents a fundamental barrier to eradicating poverty and building peace. Violence against women impoverishes individual women, as well as their families, communities and countries. It drains public resources, undermines human capital, and lowers economic productivity. Even the most conservative estimates measure national costs of violence against women and girls in the billions of dollars. Crucially, violence against women undermines women’s potential and ability to effect change in the world. Half the world’s population is unable to bring their skills fully to bear on the challenges of the day because they are fighting for their safety. A constant threat to their lives and well-being, violence against women robs women of choices and control over their own bodies, sexuality and lives. It gravely affects their chances of survival and their ability to lift themselves out of poverty. It stops them from securing a decent education, entering the employed workforce, leaving an abusive partner and participating in public life. Allowing violence against women to continue unabated sends the message that we do not value women or their lives. It also means that progress towards development goals is destined to fail.

Details: London: ActionAid, 2010. 27p.

Source: Internet Resource: Accessed February 29, 2012 at http://www.actionaid.org.uk/doc_lib/destined_to_fail.pdf

Year: 2010

Country: International

Keywords: Human Rights

Shelf Number: 124331


Author: Nowak, Matthias

Title: Femicide: A Global Problem

Summary: About 66,000 women and girls are violently killed every year, accounting for approximately 17 per cent of all victims of intentional homicides. While the data on which these conservative estimates are based is incomplete, it does reveal certain patterns with respect to the male v. female victim ratio in homicides, intimate partner violence, and the use of firearms in femicides— defined here as ‘the killing of a woman’. This Research Note examines lethal forms of violence against women. It relies on the disaggregated data on femicides produced for the Global Burden of Armed Violence 2011.

Details: Geneva: Small Arms Survey, Graduate Institute of International and Development Studies, 2012. 4p.

Source: Internet Resource: Accessed March 2, 2012 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-14.pdf

Year: 2012

Country: International

Keywords: Femicide

Shelf Number: 124337


Author: Cortright, David

Title: Friend not Foe: Civil Society and the Struggle against Violent Extremism - A report to Cordaid from the Fourth Freedom Forum and Kroc Institute for International Peace Studies at the University of Notre Dame

Summary: Repressive counterterrorism measures (CTMs) have led to an erosion of civil liberties and human rights in many countries. The repercussions have been felt keenly by civil society groups, especially in the global South. Overly restrictive security policies have contributed to a climate of suspicion toward nongovernmental groups, particularly those that challenge social exclusion and unequal power relations. Many of the organizations that work against extremism by promoting human rights and development are themselves being labeled extremist and are facing constraints on their ability to operate. Counterterrorism measures include a wide range of policies with differing impacts, which can be loosely characterized as the good, the bad, and the ugly. In the bad and ugly categories are CTMs that overemphasize security and distort development priorities, and that lead to extrajudicial killings, greater state repression, and increased human rights abuse. Repressive counterterrorism measures constrain the operational capacity of civil society actors and impede the work of groups promoting rights-based development. On the positive side are cooperative nonmilitary measures that enhance the capacity of governments to thwart terrorist attacks. Also in the good category are policies that encourage support for sustainable development and the defense of human rights, as recommended in the Global Counter-Terrorism Strategy adopted by the UN General Assembly in 2006. The evaluation of particular policies should be based on the degree to which they contribute to genuine security and democratic governance, while also upholding the rule of law and protecting the work of those striving to defend human rights, promote development, and resolve conflict. The recent trend toward the use of development funding for security-related programs has stirred controversy among development agencies and civil society actors. In the United States a growing percentage of development funding is being channeled through the Pentagon or integrated with military operations. Development advocates recognize the connections that exist between development and security, but they oppose the diversion of development funding to serve the security interests of governments in the global North. The integrity and autonomy of development and human rights activities must be respected as ends in themselves, not as means to other purposes. International policies to prevent the financing of terrorism have adversely affected nonprofit charities and have created a chilling effect in the donor community. Transnational Islamic NGOs have experienced particular difficulties in fulfilling the almsgiving obligation of the zakaat. In several countries, governments have adopted legislation and regulations curbing remittances and imposing conditions on foreign funding. Such restrictions have made it more difficult to finance independent humanitarian assistance, development, and conflict mediation activities. In response to the repressive pressures and restrictions that have been imposed on civil society groups and their supporters, NGOs have established a set of core principles, based on international legal conventions, for protecting the operational and political space of civil society groups. These are: the right to entry, defined as the freedom to associate and form organizations; the right to operate without unwanted state interference; the right to free expression; the right to communicate and cooperate freely internally and externally; the right to seek and secure resources; and the right to have these freedoms protected by the state. States have a duty under international law to assure all citizens the full range of human and civil rights, including freedoms of association and expression. Through their efforts for development and human rights, civil society groups are working to dry up the wells of extremism from which violence springs. Civil society organizations address political grievances, socio-economic injustices, and power imbalances that are among the roots causes of armed conflict. This work is not labeled counterterrorism, nor should it be, but it is exactly what is needed to counter violent extremism. International policymakers must recognize and protect this vital civil society mission and take action to eliminate counterproductive CTMs. In the global struggle against terrorism civil society groups should be welcomed as friends, not hounded as foes.

Details: Goshen, IN: Fourth Freedom Forum, 2008. 36p.

Source: Internet Resource: Accessed March 2, 2012 at http://humansecuritygateway.com/documents/KROC_FriendFoe_CivilSocietyAgainstViolentExtremism.pdf

Year: 2008

Country: International

Keywords: Civil Liberties

Shelf Number: 124351


Author: Atkinson, Amanda

Title: Interpersonal violence and illicit drugs

Summary: Interpersonal violence and illicit drug use are major public health challenges that are strongly linked. Involvement in drug use can increase the risks of being both a victim and/or perpetrator of violence, while experiencing violence can increase the risks of initiating illicit drug use.

Details: Liverpool: Centre for Public Health, Liverpool John Moores University, WHO Collaborating Centre for Violence Prevention, 2009. 25p.

Source: Internet Resource: Accessed March 4, 2012 at http://www.who.int/violenceprevention/interpersonal_violence_and_illicit_drug_use.pdf

Year: 2009

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 124379


Author: Ham, Julie

Title: What's the Cost of a Rumour? A guide to sorting out the myths and the facts about sporting events and trafficking

Summary: There has been a lot published on the supposed link between sporting events and trafficking, but how much of it is true and how much of it is useful? In this guide, we review the literature from past sporting events, and find that they do not cause increases in trafficking for prostitution. The guide takes a closer look at why this unsubstantiated idea still captures the imagination of politicians and some media, and offers stakeholders a more constructive approach to address trafficking beyond short-term events. We hope this guide will help stakeholders quickly correct misinformation about trafficking, develop evidence-based anti-trafficking responses, and learn what worked and what didn't in past host cities.

Details: Bangkok: Global Alliance Against Traffic in Women (GAATW), 2011. 75p.

Source: Internet Resource: Accessed March 9, 2012 at http://www.gaatw.org/publications/What's_the_Cost_of_a_Rumour-GAATW2011.pdf

Year: 2011

Country: International

Keywords: Evaluative Studies

Shelf Number: 124408


Author: Villettaz, Patrice

Title: The Effects of Custodial vs. Non-Custodial Sentences on Re-Offending: A Systematic Review of the State of Knowledge

Summary: As part of a broad initiative of systematic reviews of experimental or quasiexperimental evaluations of interventions in the field of crime prevention and the treatment of offenders, our work consisted in searching through all available databases for evidence concerning the effects of custodial and non-custodial sanctions on reoffending. For this purpose, we examined more than 3,000 abstracts, and finally 23 studies that met the minimal conditions of the Campbell Review, with only 5 studies based on a controlled or a natural experimental design. These studies allowed, all in all, 27 comparisons. Relatively few studies compare recidivism rates for offenders sentenced to jail or prison with those of offenders given some alternative to incarceration (typically probation). According to the findings, the rate of re-offending after a non-custodial sanction is lower than after a custodial sanction in 11 out of 13 significant comparisons. However, in 14 out of 27 comparisons, no significant difference on re-offending between both sanctions is noted. Two out of 27 comparisons are in favour of custodial sanctions. Finally, experimental evaluations and natural experiments yield results that are less favourable to non-custodial sanctions, than are quasi-experimental studies using softer designs. This is confirmed by the meta-analysis including four controlled and one natural experiment. According to the results, non-custodial sanctions are not beneficial in terms of lower rates of re-offending beyond random effects. Contradictory results reported in the literature are likely due to insufficient control of pre-intervention differences between prisoners and those serving “alternative†sanctions.

Details: Oslo: The Campbell Collaboration, 2006. 73p.

Source: Campbell Systematic Reviews 2006:13: Internet Resource: Accessed March 10, 2012 at

Year: 2006

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 124420


Author: Amnesty International

Title: Gender and Torture: Conference Report

Summary: Torture has been widely viewed in the past in terms of pain and suffering inflicted on a person – usually assumed to be male – in the custody of the state. However, this narrow understanding excludes many forms of severe pain and suffering deliberately inflicted on women and girls. It fails to recognize as torture crimes such as rape, domestic violence, targeted rape of lesbians, violence committed in the name of “honour†and also the infliction of severe pain and suffering through denial of reproductive rights. Such crimes are committed not only by agents of the state, but also by non-state actors with the acquiescence of the state. This report summarizes a two-day conference on the gender dimensions of the prohibition of torture and other cruel, inhuman or degrading treatment or punishment. Held in London in May 2011, the conference brought together representatives of NGOs and academics from around the world. They reflected on the role of the legal framework on torture in achieving justice and in holding states to account. Their findings are of interest to everyone concerned to clarify the law on torture and to ensure that as the law evolves, victims and survivors benefit and are able to seek an effective remedy.

Details: London: Amnesty International and REDRESS, 2011. 57p.

Source: Internet Resource: Accessed March 10, 2012 at http://www.redress.org/downloads/publications/GenderandTortureConferenceReport-191011.pdf

Year: 2011

Country: International

Keywords: Female Victims

Shelf Number: 124425


Author: Hunter, Philip

Title: Human Trafficking and Business: Good Practices to Prevent and Combat Human Trafficking

Summary: This brochure presents an overview and introduction to human trafficking and the role that business can play in addressing it. It explains in practical terms what human trafficking is, why it is an issue for business and what companies large and small can do to take action against it. Divided into two parts, this brochure (1) presents a section that gives an overview of the key issues linking human trafficking and business; and (2) a series of case studies that highlight the practical actions companies are taking to fight this abuse.

Details: Geneva: UN.GIFT, 2010. 68p.

Source: Internet Resource: Accessed March 11, 2012 at http://publications.iom.int/bookstore/free/UN.GIFT%20Private%20Sector.pdf

Year: 2010

Country: International

Keywords: Businesses and Crime

Shelf Number: 124450


Author: Noble, Cameron

Title: Urban Youth in the Pacific: Increasing resilience and reducing risk for involvement in crime and violence

Summary: The report “Urban Youth in the Pacific – Increasing Resilience and Reducing Risk for Involvement in Crime and Violence" was produced in response to a concern raised by the Forum Regional Security Committee (FSRC) about the involvement of a small but increasing number of urban youth in crime and violence and acknowledgment that the region can work towards building the resilience of young people. The report aims to provide policy and programming options for Pacific governments and other stakeholders, including the United Nations, to prevent young people becoming involved in crime and violence, and to fulfill their potential as productive citizens. The report covers issues like what factors push Pacific youth to become involved in crime and violence and what can be done to reduce the risk and increase the resilience of young people. The report highlights good policies and activities that address youth crime and violence. It contains case studies from six Pacific Island countries – the Federated States of Micronesia, the Republic of Marshall Islands, Papua New Guinea, Solomon Islands, Samoa and Tonga.

Details: Suva, Fiji: UNDP Pacific Centre: PIFS, 2011. 172p.

Source: Internet Resource: Accessed March 11, 2012 at http://www.undppc.org.fj/_resources/article/files/Full_Report_Urban_Youth.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 124458


Author: Kenny, Charles

Title: A Trio of Perspectives on Corruption: Bias, Speed Money and "Grand Theft Infrastructure"

Summary: A number of recent survey articles express hope that new data from enterprise surveys would shed new light on corruption complementing the corruption perception index by Transparency International. The paper explores this using the World Bank's Enterprise Survey data globally and not just the data on Eastern Europe and Central Asia that have been used before. The authors find that in general the Enterprise Survey data provide aggregate views on corruption that are similar to the corruption perception index. However, massive differences exist for key countries, such as China and India. This suggests that idiosyncratic, country-specific biases are at work in one or both data sources. The authors use the Enterprise Survey data and relate them to measures of bureaucratic complexity from the World Bank's Doing Business data, finding that more red tape is associated with higher corruption. The data are also consistent with the view that bribe payments reduce the burden of red tape. Finally, the paper looks at corruption in infrastructure. It has been suggested that the natural monopoly characteristics of infrastructure provide the lever to extract bribes. However, based on data on price-cost gaps, the authors find that infrastructure ventures in power and water typically charge prices below cost in developing economies, not anywhere near monopoly prices. Furthermore, the Enterprise Surveys do not suggest that infrastructure-related bribe payments are more significant than those, for example, related to tax payments or various forms of licensing. Existing sources on bribery surrounding specific projects suggest that the value of bribe payments may not be the biggest problem but the choice of uneconomic and inefficient projects. If infrastructure ventures were entirely dependent on revenue from user fees, they could not afford to pursue inefficient projects, thus reducing the cost of corrupt activity to society. Monopoly pricing would be better than the typical current pricing policy.

Details: Washington, DC: Finance, Economics and Urban Development, Sustainable Development Network, The World Bank, 2011. 27p.

Source: Policy Research Working Paper 5889, no. WSP5889: Internet Resource: Accessed March 11, 2012 at http://www-wds.worldbank.org/external/default/WDSContentServer/IW3P/IB/2011/11/28/000158349_20111128083654/Rendered/PDF/WPS5889.pdf

Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 124466


Author: Great Britain. National Audit Office

Title: Comparing International Criminal Justice Systems

Summary: This briefing was prepared for the House of Commons Justice Committee to provide an international dimension to its inquiry into the budget and structure of the Ministry of Justice in England and Wales. The briefing compares crime and criminal justice data from a number of different countries and sets out some of the challenges of making such comparisons. It also identifies a number of areas where it may be beneficial for the Ministry or others to do additional comparative work.

Details: London: National Audit Office, 2012. 56p.

Source: Briefing for the House of Commons Justice Committee: Internet Resource: Accessed March 13, 2012 at http://www.nao.org.uk//idoc.ashx?docId=558e0abc-7429-47cb-a1d9-51affadc6556&version=-1

Year: 2012

Country: International

Keywords: Administration of Justice

Shelf Number: 124473


Author: International Centre for the Prevention of Crime (ICPC)

Title: Public-Private Partnerships and Community Safety: Guide to Action

Summary: In recent years, more and more companies have sought new ways to contribute to the well-being and quality of life. The private sector engages in actions aimed at addressing various social problems and contributes to the development of communities, cities, and countries. Safety is an essential condition for development and the private sector is in a unique position to contribute to the prevention of crime and violence. ''The Public-Private Partnerships and Community Safety: Guide to Action'' publication is a practical guide that demonstrates how companies can engage in community safety. This guide is designed to help companies gain a better understanding of the importance of community safety and the role that the private sector can play in it, mobilize the right partners and identify ways of engagement to work on initiatives to improve community safety. Finally, it intends to inspire these companies by presenting promising actions that have been implemented throughout the world.

Details: Montreal: International Centre for the Prevention of Crime (ICPC), 2011. 160p.

Source: Internet Resource: Accessed March 13, 2012 at http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/Guide-Public-Private_Partnerships-FINAL.pdf

Year: 2011

Country: International

Keywords: Community Safety Partnerships

Shelf Number: 124517


Author: Dwan, Renata, ed.

Title: Executive Policing: Enforcing the Law in Peace Operations

Summary: The United Nations peace operations in Kosovo and East Timor are responsible for the enforcement of law and order, establishing local police forces, and protecting and promoting human rights. This executive authority distinguishes them from earlier missions where civilian police were deployed. In this book seven authors examine the legal and political implications, the training of international police in a multinational and multicultural context, the use of community policing, the crucial issue of cooperation between the military and the civilian police components, and what has been learned about planning for the handover to local authority.

Details: Solna, Sweden: Stockholm International Peace Research Institute, 2002. 156p.

Source: SIPRI Research Report No. 16: Internet Resource: Accessed March 14, 2012 at http://books.sipri.org/files/RR/SIPRIRR16.pdf

Year: 2002

Country: International

Keywords: Conflict and Violence

Shelf Number: 124538


Author: Kontorovich, Eugene

Title: Equipment Articles for the Prosecution of Maritime Piracy

Summary: This paper will discuss how the adoption into treaty or municipal law of equipment articles could facilitate the prosecution of piracy. Equipment articles are rules that create a judicial presumption of guilt on piracy charges for the crews of civilian vessels possessing certain specified equipment within a certain defined area of the high seas plagued by pirate attacks. For example, equipment articles could create a presumption of pircay for people found on a vessel less than a certain length, with engines of a certain horsepower, equipped with grappling hooks, boarding ladders, armed with RPGs and/or heavy machine guns, and/or far out at sea with obviously inadequate stores of food and water (which could suggest the skiff operates from a mothership). The presence of all or some of these things would only be relevant to a finding of piracy for vessels within a predefined exclusion zone in the Gulf of Aden or Indian Ocean - not for the whole world. Such laws were crucial to the prosecution and suppression of the transatlantic slave trade in the 19th century, perhaps the greatest example of international legal cooperation before World War I. Equipment articles could help make the current naval cooperation in the suppression of piracy translate to an end of legal impunity. The promulgation of equipment articles could bolster the other principal legal anti-piracy policies under discussion. Such rules could be used in trials in national courts, regional tribunals, or specially created international courts. By lowering the cost of prosecution, equipment articles would encourage a broader range of countries, from India to the U.S., to prosecute pirates. This could reduce the human rights concerns surrounding such trials. A major advantage of the equipment articles is that they are a relatively low-cost and quick solution, compared to more long-term fixes like creating new international tribunals or stabilizing Somalia. After the idea was first mentioned in a briefing paper from the One Earth Future Foundation, United States Department officials have already expressed some interest. Part I of this discussion paper describes the use of equipment articles by numerous countries in the 19th century to bring slave traders to justice. Part II discusses modern treaties and municipal laws that take a similar approach to hish seas crimes by using vessel configuration or cargo as a proxy for hard-to prove criminal intent. Part III briefly considers the manner in which equipment articles can be promulgated, such as national legislation, treaty, or Security Council resolution, and concerns about establishing a criminal intent.

Details: Broomfield, CO: One Earth Future Foundation, 2010. 10p.

Source: Dicussion Paper: Internet Resource: Accessed February 14, 2012 at http://www.oneearthfuture.org/images/imagefiles/EQUIPMENT%20ARTICLES%20FOR%20THE%20PROSECUTION%20OF%20MARITIME%20PIRACY.pdf

Year: 2010

Country: International

Keywords: International Cooperation

Shelf Number: 124143


Author: Katz, Barbara G.

Title: The Crime of Tax Evasion in Transition Economies

Summary: Frequent government changes, often bringing reversals in ideological orientations, forced agents in economies in transition to make economic decisions without knowing whether their next government would be more or less benevolent, democratic, corrupt, or able and willing to pursue economic growth. We present a model of agents facing the uncertainty of two future forms of government, who are able to insure against this uncertainty by opting out of the legal part of the economy. They opt out through a criminal act, specifically, hiding funds from taxation. In order to choose whether or not to steal, agents need to know what each government would do should it come to power. But each government, before it could make its decision, would need to know the choices of the agents who would, for example, produce tax revenues. This informational tension is resolved endogenously. We derive the resulting crime level in society and the optimal choices made by the potential governments. We examine how changes in governmental structure would affect the crime level, and how that, in turn, would affect capital flight.

Details: New York: Stern School of Business, New York University, 2011. 31p.

Source: Internet Resource: Accessed March 14, 2012 at http://web-docs.stern.nyu.edu/old_web/economics/docs/workingpapers/2011/wp%201-18-11%20katz.pdf

Year: 2011

Country: International

Keywords: International Crime

Shelf Number: 124540


Author: Friebel, Guido

Title: Human Smuggling

Summary: Despite its importance in global illegal migration, there is little, and mostly theoretical research on human smuggling. We suggest an analytical framework to understand the micro structure of the human smuggling market. Migrants interact with smuggling and financing intermediaries; these may or may not be integrated with each other, and with the migrants' employers. Policies of receiving countries (border controls, employer sanctions, deportation policies, sales of visa) affect the interactions in the smuggling market, and, hence, migration flows. We review the theoretical work, point to the scarce empirical evidence, and identify challenges for future theoretical, empirical work and policy advice.

Details: Bonn, Germany: Institute for the Study of Labor (IXA), 2012. 28p.

Source: IZA Discussion Paper No. 6350: Internet Resource: Accessed March 14, 2012 at http://ftp.iza.org/dp6350.pdf

Year: 2012

Country: International

Keywords: Human Smuggling

Shelf Number: 124541


Author: Friebel, Guido

Title: Smuggling Humans: A Theory of Debt-Financed Migration

Summary: We introduce financial constraints in a theoretical analysis of illegal immigration. Intermediaries finance the migration costs of wealth-constrained migrants, who enter temporary servitude contracts to repay the debt. These debt/labor contracts are easier to enforce in the illegal than in the legal sector of the host country. Hence, when moving from the illegal to the legal sector becomes more costly, for instance, because of stricter deportation policies, fewer immigrants default on debt. This reduces the risks for intermediaries, who are then more willing to finance illegal migration. Stricter deportation policies may thus, ex ante, increase rather than decrease the flow of illegal migrants. Furthermore, stricter deportation policies worsen the skill composition of immigrants. While stricter border controls decrease overall immigration, they may result in an increase of debt-financed migration. We also show that there are complementarities between employer sanctions and deportation policies. We use available evidence to check the empirical consistency of the theory.

Details: Bonn, Germany: Insitute for the Study of Labor (IZA), Undated. 48p.

Source: Internet Resource: Accessed March 14, 2012 at http://pages.nes.ru/sguriev/papers/Friebel-Guriev.pdf

Year: 0

Country: International

Keywords: Debt Bondage

Shelf Number: 124542


Author: Neanidis, Kyriakos C.

Title: Crime, Fertility, and Economic Growth: Theory and Evidence

Summary: This paper studies the link between crime and fertility and the way by which they jointly impact on economic growth. In a three-period overlapping genera- tions model, where health status in adulthood depends on health in childhood, adult agents allocate their time to work, leisure, child rearing and criminal ac- tivities. An autonomous increase in the probability o¤enders face in escaping apprehension, increases both crime and fertility non-monotonically, giving rise to an ambiguous e¤ect on growth. A cross-country empirical examination, based on data that span four decades, supports the non-linear e¤ects on both crime and fertility. At the same time, it reveals a negative e¤ect on output growth.

Details: Manchester, UK: Centre for Growth and Business Cycle Research, Economic Studies, University of Manchester, 2012. 49p.

Source: Discussion Paper Series No. 163: Internet Resource: Accessed March 14, 2012 at http://www.socialsciences.manchester.ac.uk/cgbcr/dpcgbcr/dpcgbcr163.pdf

Year: 2012

Country: International

Keywords: Arrest and Apprehension

Shelf Number: 124543


Author: Bowen & Shannon Frontline Consulting

Title: Human Trafficking, Sex Work Safety and the 2010 Games: Assessments and Recommendations

Summary: In 2007, Vancouver community organizations that work on issues related to sex work partnered with the Vancouver Police Department to establish the Sex Industry Worker Safety Action Group (SIWSAG). With a grant from the Government of British Columbia and support from the Vancouver Police Department, SIWSAG retained Frontline Consulting to produce a background study on the potential impact of the 2010 Olympic Games on the trafficking in persons for the purpose of sexual exploitation and on safety issues for sex workers. The study explores these issues though the experience of cities that have recently hosted mega sport events. This study represents the first step of a multiphased 2010 Impact project that is being undertaken by SIWSAG. The concepts of trafficking in persons for the purpose of sexual exploitation and sex work/prostitution have yet to be uniformly defined. Each term carries differing ideological frameworks and the attributes ascribed to each vary depending on political, social and economic contexts. Trafficking and sex work have a history of being conflated and this, compounded with political and economic agendas associated with global attention, combine to produce a myriad of responses that directly affect the lives of those identified as sex workers, victims of trafficking or both. Prostitution and trafficking activities as related to mega sporting events first came to public attention in Athens (2004) and Germany (2006). An increased number of sex workers and trafficking victims were expected to ‘flood’ into these locations during their respective mega events. Neither location experienced any increase that could be attributed to their hallmark event. The commonly held notion of a link between mega sports events, TIP (Trafficking in Persons) and sex work is an unsubstantiated assumption. Trafficking is an ongoing criminalized and clandestine activity in which victims either fear coming forward or have little opportunity to do so. For complex reasons, there have been no international trafficking convictions in Canada. International victims who seek to stay in Canada face significant challenges. There have been, to date, five domestic trafficking convictions in Canada. Canadian authorities estimate that up to 800 individuals are annually trafficked into Canada for the purposes of sexual exploitation. In Canada, communicating for the purpose of prostitution, procuring and keeping a bawdy house (brothel) are federal offences. The controversial debate around legalization, decriminalization and abolition of sex work was reignited as a result of the murder and abduction of 65 women in Vancouver’s sex industry during the 1990s. Aboriginal women’s advocates emphasize that the effects of colonial violence coupled with discriminatory legislation and a diminishment of Aboriginal women’s roles in society has led to their susceptibility to violence and exploitation. In Vancouver’s Downtown Eastside (DTES), it is estimated that more than 50% of the women who work on the street are Aboriginal women. Aboriginal women constituted a majority of missing women from the DTES during the period of 1995-2000. The Downtown Eastside is an economically deprived inner city neighbourhood with residents who are battling homelessness, poverty, drug addiction and HIV/AIDS, in addition to violence and povertyrelated criminal activity. Currently, DTES residents and service providers express increasing concern about the potential treatment of residents during the 2010 Games with many fearing that the authorities may seek to displace residents in an effort to reduce the impact of negative perceptions of the neighbourhood and simplify Games security requirements. Ten Olympic host cities were selected to contribute to this study and they include: Salt Lake City, Turin, Athens, Sydney, Atlanta, Germany, Calgary and Montreal, the UK and Vancouver. Contacts were invited to take part in telephone interviews or to respond via email. Vancouver contacts had the option of participating in a facetoface interview. Researchers reviewed 200 websites; 90 media articles, 88 academically reviewed journal articles, and 35 government reports in a quest to find information related to the project’s topics.

Details: Vancouver: Sex Industry Worker Safety Action Group, 2009. 150p.

Source: Internet Resource: Accessed March 16, 2012 at http://vancouver.ca/police/assets/pdf/reports-policies/report-human-trafficking-2010-games.pdf

Year: 2009

Country: International

Keywords: Human Trafficking

Shelf Number: 124554


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Model Law against the Illicit Manufacturing of and Trafficking in Firearms, Their Parts and Components and Ammunition

Summary: The Firearms Model Law has been developed by the United Nations Office on Drugs and Crime to assist States in implementing the provisions contained in the Protocol against the Illicit Manufacturing of and Trafficking in Firearms, their Parts and Components and Ammunition, supplementing the United Nations Convention against Transnational Organized Crime. By distinguishing between mandatory and optional provisions, and suggested provisions stemming from other legal instruments, the Model Law offers flexible solutions adaptable to the needs of each State, whatever its legal tradition and social, economic, cultural and geographical conditions. The Model Law is a voluntary tool, which requires careful adaptation to the specific domestic legal systems in which it is supposed to operate.

Details: Vienna: United Nations Office on Drugs and Crime (UNODC), 2011. 182.

Source: Internet Resource: Accessed March 18, 2012 at http://www.unodc.org/documents/legal-tools/Model_Law_Firearms_Final.pdf

Year: 2011

Country: International

Keywords: Arms Trafficking

Shelf Number: 124568


Author: The International Consortium of Investigative Journalists

Title: The Last Fish: Plunder in the South Pacific

Summary: Looting the Seas is an award-winning project by the International Consortium of Investigative Journalists looking at forces that are rapidly emptying oceans of fish. In its first installment ICIJ documented the massive black market in threatened bluefin tuna. In the second, it revealed that billions of dollars in subsidies flow into the Spanish fishing industry despite its record of flouting rules and breaking the law. For the last of the three-part investigation, ICIJ reporters focused on an unlikely protagonist: the bony, bronzed-hued jack mackerel in the southern Pacific. Industrial fleets, after fishing out other waters decimated it at stunning speed. Since so much jack mackerel is reduced to fishmeal for aquaculture and pigs, we eat it unaware with each forkful of farmed salmon. The plunder continues today as the world’s largest trawlers head south before binding quotas are established. Not long ago, this was one of the world’s richest fishing grounds. ICIJ reporters ranged from New Zealand’s South Island to the top of Norway and from ramshackle wharves in Chile and Peru to carpeted offices in Brussels and Hong Kong. They conducted more than 100 interviews; filed freedom of information requests in the European Union, Peru and the Netherlands; and analyzed more than 100,000 catch and inspection records. In Chile, where the damage is greatest, Juan Pablo Figueroa Lasch of the investigative reporting center CIPER looked at the few powerful families and industrial groups that control 87 percent of the jack mackerel catch. He lived aboard the Santa María II, watching as fishermen hauled up mostly empty nets. In Peru, Milagros Salazar of IDL-Reporteros investigated another species used for fishmeal, anchoveta. It is the world’s largest fishery. She found cheating so massive – at rigged scales and unsupervised docks – that at least 630,000 tons of fish “vanished†in just two and a half years. Fish, the reporters found, are at the heart of geopolitical wrangling among governments that protect, and often subsidize, their fleets. Mar Cabra, who covered Brussels, is still waiting for most EU records she requested through freedom of information laws. EU officials refused to give her catch records, saying disclosure would undermine the “protection of commercial interests.†Plenty of sources spoke frankly and at length. When Mort Rosenblum asked to speak with the elusive Ng Joo Siang, head of the giant Hong Kong fishing conglomerate, Pacific Andes, the company’s outsourced public relations people refused to transmit the request. But a call to the man’s cell phone produced a lengthy and revealing interview. Our media partners are Le Monde (France), the International Herald Tribune, South China Morning Post (Hong Kong), El Mundo (Spain) and Trouw (The Netherlands). In addition, ICIJ is co-producing a documentary with London-based tve that is planned to air on BBC World News TV in the spring. Key findings: Asian, European and Latin American fleets have devastated fish stocks in the southern Pacific, once among the world’s richest waters; Since 2006, jack mackerel stocks have declined by nearly twothirds. The oily fish is a staple in Africa, but people elsewhere are unaware that it is in their forkfuls of farmed salmon. Jack mackerel is a vital component of fishmeal for aquaculture; National interests and geopolitical rivalry have blocked efforts since 2006 to ratify a regional fisheries management organization that can impose binding regulations to rescue jack mackerel from further collapse; In Chile, a handful of companies controlled by wealthy families own rights to 87 percent of the jack mackerel catch; with government backing, they have secured unrealistically high quotas — beyond what scientists say are essential to save the stock; In Peru, the world’s second largest fishing nation, widespread cheating at fishmeal plants allows companies to overfish and evade taxes. At least 630,000 tons of anchoveta – worth nearly $200 million as fishmeal – “vanished†over two and a half years.

Details: The International Consortium of Investigative Journalists (ICIJ),

Source: Looting the Seas III: Internet Resource: Accessed March 18, 2012 at http://www.kintera.org/atf/cf/%7B4de9af69-2fdc-420c-944b-436045c9b0e8%7D/LOOTING_THE_SEAS_3.PDF?tr=y&auid=10229971

Year: 0

Country: International

Keywords: Environmental Crime

Shelf Number: 124851


Author:

Title: The Rule of Law in Kosovo

Summary: More than two years after declaring independence, Kosovo struggles with uneven rule of law and a weak justice system that is failing its citizens. The police, public prosecutors and courts are erratic performers, prone to political interference and abuse of office. Organised crime and corruption are widespread and growing. Realising that prosperity, relations with the European Union (EU) and affirmation as an independent state depend on the rule of law, the government has taken important steps, replacing key officials and passing long-delayed reforms. But critical weaknesses remain, notably in the courts, and the government, supported by the international community, must act swiftly to curtail them. Kosovo suffers from the widespread impression that it is run by a lawless political elite in control of every aspect of society. The EU rule of law mission, EULEX, is investigating widespread corruption at the highest levels, and its efforts to date have shown gaping holes in regulation and enforcement. This reputation keeps investment out and the country mired in poverty. A two-pronged approach is needed, tightening institutions and regulation to close off opportunities for corruption while investigating the worst of past abuses. In some respects, Kosovo’s reputation for lawlessness is exaggerated. The country has a low rate of violent crime, inter-ethnic crime is rare, and Serbs in most of Kosovo live securely. But the judicial system is weak. Few crimes end with their perpetrators in prison. Court procedures suffer from widespread distrust, fearful or unwilling witnesses and shoddy work by prosecutors. On the civil law side, it is all but impossible for citizens and domestic and international corporations to enforce their rights in court. Property disputes are widespread, and since they cannot be reliably resolved in court, occasionally degenerate into violence. The dysfunctional civil law system, choked with a backlog of cases stretching back to 2000-2001, scares off investment. Demoralised and exhausted judges both struggle under the case backlog and are dogged by a reputation for corrupion and favouritism. Plaintiffs endure baffling rounds of appeals, remands and delays, often featuring deliberate errors. Bribery and even violence have become attractive means of extrajudicial dispute resolution. The police are one of Kosovo’s genuinely multi-ethnic institutions, with Serbs and others integrated in all regions and at all levels. They have strong public support and a willing manpower pool but are poorly managed and lack vital skills as their leadership increasingly neglects training. The force can deal effectively with routine, low-level crime but has a limited ability to fight organised crime, financial crime and fraud, drugs and human trafficking and other specialised challenges. It has a hostile relationship with the public prosecutors, who are charged with leading all police investigations of serious crime. The consequence is that the police do as they please, and the prosecutors are under-serviced and overwhelmed. The institutions that monitor the justice system – the Kosovo Judicial Council (KJC), which oversees judges, the Police Inspectorate of Kosovo (PIK), and the justice ministry, which supervises prosecutors – are not working properly. The Council is paralysed by lengthy vacancies in key positions. Its components, notably the Office of Disciplinary Counsel and the Judicial Audit, responsible for investigating corruption and other problems in the courts, work well; still, their findings remain without effect because the full body cannot act. The ministry suffers from weak leadership and a lack of political support, though a new minister appointed in April 2010 is expected to improve performance. The justice system’s weakness is visible above all in Kosovo north of the Ibar River, the small Serb-held zone that Serbia in effect controls. There is no real criminal justice in the North, as its Serbia-run courts cannot cooperate with the UN-mandated Kosovo Police (KP). Nevertheless, the North’s crime levels are similar to those of Kosovo as a whole, and the small local population thrives on handouts from Belgrade. The border between Kosovo and Serbia has become much better controlled recently, and arrests, mainly in Serbia, have cut down drastically on smuggling. But the North remains a stumbling block in relations between Kosovo and Serbia and between both of these and EULEX. Out of excessive caution, the EU has not based its police in the North, leaving the area free for organised criminal gangs. Its efforts to replenish the Mitrovica court with local judges have failed, while offending both Pristina and Belgrade. This report surveys the domestic legal system; a subsequent report will cover international aspects of the rule of law issue.

Details: Brussels: Internation Crisis Group, 2010. 29p.

Source: Europe Report No. 204: Internet Resource: Accessed March 20, 2012

Year: 2010

Country: International

Keywords: Administration of Justice (Kosovo)

Shelf Number: 124620


Author: Goncalves, Marilyne Pereira

Title: Justice for Forests: Improving Criminal Justice Efforts to Combat Illegal Logging

Summary: Every two seconds, across the world, an area of forest the size of a football field is clear-cut by illegal loggers. In some countries, up to 90 percent of all the logging taking place is illegal. Estimates suggest that this criminal activity generates approximately US$10–15 billion annually worldwide—funds that are unregulated, untaxed, and often remain in the hands of organized criminal gangs. Thus far, domestic and international efforts to curb forest crimes have focused on preventative actions, but they have had little or no significant impact. While prevention is an essential part of enforcement efforts to tackle illegal logging, it has not halted the rapid disappearance of the world’s old-growth trees. New ideas and strategies are needed to preserve what is left of forests. This paper suggests that current practice be combined with a more targeted, punitive approach, through more effective use of the criminal justice system. It argues that the criminal justice system should form an integral part of any balanced and organized strategy for fighting forest crime. This strategy should include initiatives to enhance the efficiency of criminal justice in combating illegal logging—that is, the investigation, prosecution, and conviction of cases, as well as the confiscation of the proceeds of criminal activity. These initiatives should be deployed in parallel with preventive programs, and the two approaches should complement and reinforce each other. The criminal justice system has been used in the fight against illegal logging, but only in very sporadic instances and in limited and ineffective ways. Moreover, in those few cases, it has tended to target low-level criminals whose involvement in illegal logging is due to poverty. As such, it has created no real deterrent and has encouraged skeptics to further discount the relevance of criminal justice methods. Large-scale illegal operations are carried out by sophisticated criminal networks, and law enforcement actions need to be focused on the “masterminds†behind these networks—and the highlevel corrupt officials who enable and protect them. Pursuing these important targets through the criminal justice system will require creativity and a clear focus on those criminal justice rules and procedures that prove most effective. The objective of this paper is to inform policy makers and forestry and law enforcement actors how they can use the criminal justice system in fighting illegal logging. It seeks to mobilize them to take action and address the various criminal acts involved in illegal logging operations. The paper puts forward practical suggestions that can be implemented to achieve a tangible improvement in this fight. Rather than focusing on a single element of the criminal justice system, it provides a broad overview of the topic. Future papers may provide an opportunity to flesh out further detail. Because the role of the criminal system in fighting illegal logging has thus far been minimal, there are few documented successes, and little data to explain why the criminal justice system has not been more widely used in this context. To find new ideas as to how the criminal justice system can be used against illegal loggers, this paper therefore draws on experience gained from dealing with other types of crime (money laundering, corruption, and so forth). The policy and operational recommendations made in this paper are based on legal and operational frameworks that are already in place in almost every country in the world. By making good use of these existing frameworks, we can take an important step towards ensuring the preservation and the sustainable management of the world’s forests. Policy recommendations include: Develop an integrated criminal justice strategy for illegal logging that adopts and implements clear and comprehensive policies; Improve domestic cooperation; Enlist the private sector; Engage civil society actors; and Include criminal justice as part of development assistance programs to combat illegal logging. Operational recommendations include: Work together; Attack corruption; Proactively target vulnerabilities and significant offenders; Consider all applicable offenses—not just regulatory environmental offenses; Follow the money; Employ all available criminal tools to address these complex crimes; and Improve international cooperation.

Details: Washington, D.C.: The World Bank, 2012. 56p.

Source: World Bank Study R67: Internet Resource: Accessed March 21, 2012 at http://siteresources.worldbank.org/EXTFINANCIALSECTOR/Resources/Illegal_Logging.pdf

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 124631


Author: Carius, Alexander

Title: Minerals and Conflict: A Toolkit for Intervention

Summary: This toolkit is part of a series that explores how development assistance can address key risk factors associated with conflict. One area that is receiving increasing attention is the relationship between natural resources and violence. In many recent conflicts, valuable or scarce resources — land, water, timber, or minerals — have played a central role in both causing and sustaining violence. In particular, valuable minerals took center stage after "conflict diamonds" or "blood diamonds" became a prominent feature of Sierra Leone's civil war. Unfortunately, competition over minerals in the Democratic Republic of the Congo has followed a similarly brutal course. This toolkit: 1) examines the relationship between valuable minerals, such as diamonds or coltan, and violence; 2) discusses lessons learned in developing programs to deal with "conflict commodities"; 3) presents a range of program options; 4) provides a survey instrument that identifies key questions related to minerals and conflict; and 5) identifies relevant USAID mechanisms and implementing partners. Monitoring and evaluation tools are being developed.Together, the elements of this toolkit are designed to raise awareness about the linkages among valuable minerals, development assistance, and conflict; and to help integrate a conflict perspective into development programming. The toolkits in this series explore individual risk factors in depth.They do not identify all relevant factors linked to violence. As such, they are designed to serve as companion pieces to conflict assessments. Conflict assessments provide a broad overview of destabilizing patterns and trends in a society.They sift through the many potential causes of conflict that exist and zero in on those that are most likely to lead to violence (or renewed violence) in a particular context. While they provide recommendations about how to make development and humanitarian assistance more responsive to conflict dynamics, they do not provide detailed guidance on how to design specific activities.The toolkits in this series are intended to fill that gap by moving from a diagnosis of the problem to a more detailed discussion of potential interventions.Together, the assessment framework and toolkits are designed to help Missions gain a deeper understanding of the forces driving violence and to develop more strategic and focused interventions. This toolkit was initially authored by a team of researchers, including Alexander Carius (Adelphi Research); Geoffrey Dabelko (Woodrow Wilson International Center for Scholars); Doris Capistrano (CIFOR); Moira Feil (Adelphi Research); and Jason Switzer (International Institute for Sustainable Development). It was subsequently revised with substantial input from officers in USAID Missions, other bilateral and multilateral donor agencies, academic experts, and members of the NGO community. Comments, questions, and requests for additional information should be directed to the Office of Conflict Management and Mitigation.

Details: Washington, D.C.: Office of Conflict Management and Mitigation, U.S. Agency for International Development (USAID), 2005. 30p.

Source: Internet Resource: Accessed March 21, 2012 at http://www.usaid.gov/our_work/cross-cutting_programs/conflict/publications/docs/CMM_Minerals_and_Conflict_Toolkit_April_2005.pdf

Year: 2005

Country: International

Keywords: Conflict Minerals

Shelf Number: 124639


Author: United Nations Office on Drugs and Crime (UNODC)

Title: International Framework for Action To Implement the Smuggling of Migrants Protocol

Summary: While 129 States, to date, have ratified the United Nations Protocol against the Smuggling of Migrants by Land, Sea and Air, supplementing the United Nations Convention against Transnational Organized Crime, giving effect to the Protocol remains a challenge in all regions. Most countries do not have dedicated action plans or strategies. Most commonly, migrant smuggling is partially addressed through efforts to combat irregular migration, by strengthening border controls and through efforts undertaken against transnational organized crime. Where migrants are simply detained and returned to countries of origin without the smuggling actors involved in their migration being investigated, the criminal processes at work continue unchallenged. Where border controls are strengthened without addressing the root causes of irregular migration and demand for smuggling services, the modus operandi of smugglers will simply adapt. Where opportunities to safely and regularly migrate are not offered as part of a holistic response to migrant smuggling alongside measures to address root causes of irregular migration, the demand for migrant smuggling services will only increase. These considerations highlight the need to elaborate an International Framework for Action to implement the Smuggling of Migrants Protocol (Framework for Action) to harmonize and coordinate a holistic and global response to the phenomenon in countries of origin, transit and destination. The purpose of the Framework for Action is to assist Member States and non-state actors in identifying and addressing gaps in their response to migrant smuggling in accordance with international standards. The Framework for Action unpacks provisions of the Smuggling of Migrants Protocol, drawing upon international instruments, political commitments, guidelines and best practices to enable the implementation of a comprehensive response to migrant smuggling. The Framework for Action consists of a narrative section and a set of tables. The Narrative describes the key challenges in the implementation of the Migrant Smuggling Protocol and elaborates guiding principles in responding to them. The set of tables details practical measures that can be taken in response of four key pillars: i) Prosecution of migrant smugglers; ii) Protection of smuggled migrants and their rights; iii) Prevention of migrant smuggling; iv) Cooperation to address migrant smuggling. For each of the four pillars, the Framework for Action is divided into: Protocol Objectives, which reflect the provisions of the Smuggling of Migrants Protocol; Specific Objectives, which explain the intent of the provisions; Framework Requirements, setting out minimum standards for action; Implementation Measures, which offer best practices to achieve effective implementation; and Operational Indicators, to measure implementation and help monitor change over time.

Details: Vienna: United Nations Office on Drugs and Crime (UNODC), 2011. 176p.

Source: Internet Resource: Accessed March 23, 2012 at http://www.unodc.org/documents/human-trafficking/Migrant-Smuggling/Framework_for_Action_Smuggling_of_Migrants.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 124722


Author: Shaw, Mark

Title: Spotting the Spoilers: A Guide to Analyzing Organized Crime in Fragile States

Summary: Rarely considered a serious challenge until recently, organized crime and related serious crime have become a critical issue in many fragile states. Experience shows that organized crime must be addressed during the course of any peace operation or political mission, since in many cases it is the biggest impediment to peace. Given weak institutions, few economic opportunities, and serious security threats, the activities of organized crime can have a disproportionate and devastating impact in fragile states, particularly when a political transition to peace or democracy is underway. This guide is designed for people in multilateral organizations who want to analyze the nature of organized crime in a fragile state, and should be particularly useful for field staff of peacekeeping, peacebuilding, or political missions engaged in mission planning and post-conflict needs-assessment. The objective of this guide is to hopefully allow the production of what is generally called an Organized Crime Threat Assessment (OCTA). The OCTA is a tool for generating a strategic picture of organized crime that can lead to an evidence-based response, both in terms of policy and operations. The guide seeks to provide an overview of what steps can be taken to analyze and understand organized and serious crime in a particular country. It is not a guide for conducting a criminal investigation; rather, it is a way to gather together information on things that have not been focused on before and that impact the peace or political process.

Details: New York: International Peace Institute, 2012. 64p.

Source: Internet Resource: Accessed March 24, 2012 at http://www.humansecuritygateway.com/documents/IPI_SpottingtheSpoilers_AGuidetoAnalyzingOrganizedCrimeinFragileStates.pdf

Year: 2012

Country: International

Keywords: Conflice and Violence

Shelf Number: 124727


Author: Verité

Title: Help Wanted: Hiring, Human Trafficking and Modern-Day Slavery in the Global Economy

Summary: Verité’s HELP WANTED initiative – a research and advocacy effort described in this report – aims to clarify and publicize the ways in which current labor broker practices can create hiring traps; and to provide concrete approaches by which private sector, civil society, and governmental institutions can address this key point of leverage to reduce the risk of a worker ending up a victim of modern-day slavery. Labor brokers – middlemen in the recruitment, hiring and/or management of laborers – operate at the core of the global economy. Complex supply chains necessitate levels of coordination and expertise that are not easily found within a given company because the challenges are spread out over multiple countries and time zones, and workforces are in many instances comprised of workers from far-flung lands. Companies turn to labor brokers to manage many of these challenges, but the increasing use of labor brokers brings with it troubling issues of fragmented and opaque social accountability. For workers, labor brokerage increases migration and job acquisition costs and the risk of serious exploitation, including slavery. Verité is a global advocate for workers. Through our understanding of the perspectives of workers, we find solutions to human rights violations in good business practices. We work to remove dangers and abuses in workplaces around the world by providing knowledge, skills Workers are at heightened vulnerability to modern-day slavery when they have been brought to work away from their homes. This vulnerability is generated or exacerbated by the involvement of labor brokers. Labor brokers act as the middlemen, facilitating a connection between potential workers and their eventual employers. The system of labor brokerage is widespread, opaque, sometimes corrupt, and largely lacking in accountability. In some cases brokerages are substantial, well-organized companies. In others they are informal in their structure and outreach. In all cases their presence in the recruitment and hiring “supply chain†increases the vulnerability of migrant workers to various forms of forced labor once on-the-job. The debt that is often necessary for migrant workers to undertake in order to pay recruitment fees, when combined with the deception that is visited upon them by brokers about job types and salaries, can lead to a situation of debt-bondage – which, according to Anti-Slavery International, is “probably the least known form of slavery today, and yet it is the most widely used method of enslaving people.â€1 When a migrant worker finds herself in a foreign country, with formidable recruitment debt and possibly even ancestral family land hanging in the balance, on a work visa that ties her to one employer and a job that doesn’t remotely resemble the salary and conditions that were promised to her by her labor broker, she has fallen into what Verité calls a HIRING TRAP. There are few global workplace problems in more urgent need of attention. This report begins by offering key findings from recent Verité research on the intersection of brokers, migrant workers and slavery. This research was performed in a variety of sectors and locales across the globe, including: the migration of adults from India to the Gulf Cooperation Council (GCC) States of the Middle East for work in construction, infrastructure and the service sector; the migration of children and juveniles from the Indian interior to domestic apparel production hubs; the migration of adults from Guatemala, Mexico and Thailand to work in U.S. agriculture; and the migration of adults from the Philippines, Indonesia and Nepal to the Information Technology sector in Malaysia and Taiwan. This report then presents the factors that, in Verité’s view, constitute the major red flags for vulnerability of migrant workers to broker-induced forced labor. These red flags were present individually or in various combinations across all the sectors and locales of Verité’s research. A set of concrete activities and engagements to promote the fair hiring of migrant workers is offered at the close of the report.

Details: Amherst, MA: Verité, Undated. 72p.

Source: Internet Resource: Accessed March 25, 2012 at http://digitalcommons.ilr.cornell.edu/cgi/viewcontent.cgi?article=2135&context=globaldocs

Year: 0

Country: International

Keywords: Adult Victims

Shelf Number: 124750


Author: Seelinger, Kim Thuy

Title: The Investigation and Prosecution of Sexual Violence

Summary: Sexual violence occurs all over the world. A form of gender-based violence, sexual violence has been defined as “any sexual act, attempt to obtain a sexual act, unwanted sexual comments or advances, or acts to traffic a person’s sexuality, using coercion, threats of harm or physical force, by any person regardless of relationship to the victim, in any setting, including but not limited to home and work.†It takes myriad forms – for example, sexual assault, rape, forced marriage, genital mutilation, sexual slavery or trafficking. It can happen in a bedroom, alleyway or war zone. And, though the vast majority of victims are women, men and boys can also be victims, and women can be perpetrators. In this paper, we review the many challenges of prosecuting crimes of sexual violence, describing those challenges at each stage of the “life-cycle†of a sexual violence case. Although the creation of the International Criminal Court (ICC) has greatly increased the international community’s ability to prosecute sexual violence, national courts remain the principal site for rendering individuals accountable. The experience of the ICC and other international tribunals provides key lessons in how these cases should be prosecuted, and we draw on them extensively in this paper. However, our ultimate goal is to highlight some promising practices for the effective prosecution of sexual violence crimes in national courts.

Details: Berkeley, CA: Human Rights Center, University of California Berkeley, 2011. 71p.

Source: Internet Resource: Sexual Violence and Accountability Project, Working Paper Series: Accessed March 29, 2012 at: http://www.law.berkeley.edu/HRCweb/pdfs/SVA_IandP.pdf

Year: 2011

Country: International

Keywords: Prosecution, Sex Crime

Shelf Number: 124763


Author: Koenig, K. Alexa

Title: The Jurisprudence of Sexual Violence

Summary: This paper provides an overview of the international jurisprudence of sexual violence, focusing on legal milestones realized by the International Criminal Tribunal for Rwanda, the International Criminal Tribunal for the former Yugoslavia, and the International Criminal Court. This paper also offers a brief, comparative case study of how Kenya and its neighbors are currently adopting and adapting international criminal law to enhance their domestic legal frameworks, to facilitate the prosecution of sexual violence within their borders.

Details: Berkeley, CA: Human Rights Center, University of California Berkeley, 2011 68p.

Source: Internet Resource: Sexual Violence and Accountability Project, Working Paper Series: Accessed March 29, 2012 at: http://www.law.berkeley.edu/HRCweb/pdfs/SVA_Jurisprudence.pdf

Year: 2011

Country: International

Keywords: Prosecution, Sex Crimes

Shelf Number: 124764


Author: Mason-White, Holly

Title: Children of (Alleged) Offenders: Revised Draft Framework for Decision-Making

Summary: Around the world, children are affected when a parent goes into prison. Their relationships can change and come under strain, both with the incarcerated parent and with others. They can experience the stigma and shame of being associated with a prisoner. They may have to change their home, school and friends because of parental imprisonment. They may become poorer, with the family having less income and more prison-related costs. Their education may suffer and long-term prospects be at risk. And their attitudes towards the criminal justice system may be permanently affected by having a parent taken away. Children of incarcerated parents, like children in general, are all individuals. Each will have a different experience of and response to parental imprisonment, and the unique situation of each child should be considered in all interactions with them and decisions that affect them. However, they should in all cases be considered and their rights upheld, in particular their right not to be discriminated against because of the actions of their parent, their right to be consulted and heard in decisions affecting them, and their right to have their best interests be a primary consideration in all matters that affect them. This revised draft Framework is a comprehensive exploration of the relevant child rights issues throughout the criminal justice process, from a parent’s arrest or detention to release following imprisonment. Rather than trying to provide detailed answers to every issue raised, we hope to alert criminal justice and other professionals to the issues so that they can develop their own context-specific solutions. To aid this, we have included examples of potential good practice throughout, as well as relevant international and regional standards in the annexe.

Details: Geneva: Quaker United Nations Office, 2012. 99p.

Source: Internet Resource: Accessed March 30, 2012 at: http://www.quno.org/geneva/pdf/humanrights/women-in-prison/201203draft_framework_col.pdf

Year: 2012

Country: International

Keywords: Children of Prisoners

Shelf Number: 124771


Author: Kearney, Helen F.

Title: Children of Parents Sentenced to Death

Summary: The UN Committee on the Rights of the Child devoted its 2011 Day of General Discussion to ‘Children of Incarcerated Parents’. These children have committed no crime. Yet – as hundreds of participants who work with these children around the world came to testify – they are directly and powerfully impacted by their parent’s involvement with the criminal justice system. Over the course of the day, it became apparent that several issues within this neglected field require further consideration. One such issue was the differentiated impact of different crimes and sentences. Amnesty International prepared a written submission to raise awareness of the impact of a parent’s death sentence on children. It focussed on situations that occur in violation of existing international standards on the use of capital punishment, namely secrecy surrounding detention on death row and execution. However, whether or not a parent’s death sentence has been lawfully applied, their children are affected. Quakers oppose capital punishment in all circumstances, but this paper focuses on the children of parents sentenced to death. It begins to explore the diverse and multi-faceted impacts of the death sentence on the children of the accused.

Details: Geneva: Quaker United Nations Office, 2012. 36p.

Source: Internet Resource: Accessed March 30, 2012 at: http://www.quno.org/geneva/pdf/humanrights/women-in-prison/ChildrenOfParentsSentencedToDeath.pdf

Year: 2012

Country: International

Keywords: Capital Punishment

Shelf Number: 124775


Author: Bellis, Mark A.

Title: Preventing and Reducing Armed Violence. What Works?

Summary: The paper brings together promising and emerging evidence of what works to prevent interpersonal armed violence (through firearms), primarily in non-conflict situations. The paper provides an overview of the scale of armed violence, its impacts and the risk factors associated with it. It examines both direct approaches to preventing and reducing armed violence, and indirect approaches that do not address armed violence as their primary aim, but target risk factors for violence. Most scientific evidence currently comes from developed countries which generally have greater capacity and resources for designing, implementing and reporting the results of rigorous evaluations. However, the evidence-base from low- and middle-income countries is increasing, and this paper also provides examples of emerging evidence from around the world.

Details: New York: United Nations Development Programme; Oslo: Norwegian Ministry of Foreign Affairs, 2010. 44p.

Source: Internet Resource: Background Paper: Oslo Conference on Armed Violence
Achieving the Millennium Development Goals
20-22 April 2010: Accessed April 2, 2012 at: http://www.osloconferencearmedviolence.no/pop.cfm?FuseAction=Doc&pAction=View&pDocumentId=24291

Year: 2010

Country: International

Keywords: Armed Violence

Shelf Number: 124797


Author: Bayne, Sarah

Title: Preventing and Reducing Armed Violence. Development Plans and Assistance

Summary: The paper provides an overview of some of the emerging lessons learned about how armed violence reduction and prevention (AVR) priorities can be integrated into local, national and donor development plans and assistance strategies. AVR is driven by the humanitarian and development imperative to accelerate global development by reducing the global burden of armed violence. The AVR approach responds to contemporary challenges of violence by addressing the risk factors for crime, interpersonal violence and conflict. Local and national governments experience armed violence most directly and have pioneered a range of preventive responses, often with the support of local communities. The donor community and UN system are also increasingly aware of the potential of targeted preventive measures. They have begun to adapt their strategies and instruments to better assist countries in their struggle to prevent and reduce all forms of violence.

Details: New York: United Nations Development Program; Oslo: Norwegian Ministry of Foreign Affairs, 2010.

Source: Internet Resource: Background Paper, Oslo Conference on Armed Violence
Achieving the Millennium Development Goals
20-22 April 2010: Accessed April 2, 2012 at: http://www.osloconferencearmedviolence.no/pop.cfm?FuseAction=Doc&pAction=View&pDocumentId=24294

Year: 2010

Country: International

Keywords: Armed Violence

Shelf Number: 124798


Author: Moyes, Richard

Title: Victims and Survivors of Armed Violence. Responding to Rights and Needs

Summary: The paper reviews key areas of policy and service provision relevant to the rights of victims and survivors of armed violence. It notes the broad humanitarian and development impact of armed violence in both conflict and non-conflict settings, and introduces a rights-based approach to victims and survivors of violence that has been developed over recent decades. It then summarizes key issues in areas of health, justice and social and economic inclusion and considers the implications for national level planning. It concludes with broad recommendations to strengthen international responses to the impact of armed violence.

Details: New York: United Nations Development Program; Oslo: Norwegian Ministry of Foreign Affairs, 2010. 16p.

Source: Internet Resource: Background Paper, Oslo Conference on Armed Violence
Achieving the Millennium Development Goals
20-22 April 2010: Accessed April 2, 2012 at: http://www.osloconferencearmedviolence.no/pop.cfm?FuseAction=Doc&pAction=View&pDocumentId=24289

Year: 2010

Country: International

Keywords: Armed Violence

Shelf Number: 124799


Author: Gilgen, Elisabeth

Title: Measuring and Monitoring Armed Violence. Goals, Targets and Indicators

Summary: The paper sets out a framework of goals, targets and indicators to track armed violence, and to support prevention and reduction activities. The framework is based on extensive consultations with UN agencies and specialists in various disciplines. The three overall goals are to (1) reduce the number of people physically harmed from armed violence; (2) reduce the number of people and groups affected by armed violence, and (3) strengthen institutional responses to prevent and reduce armed violence. The paper also introduces eight specific targets that flow from these goals, and proposes specific indicators to measure progress towards achieving them. Taken together, the framework offers a means of comparing and measuring patterns and trends in armed violence to 2015 and beyond.

Details: New York: United Nations Development Program; Oslo: Norwegian Ministry of Justice, 2010. 32p.

Source: Internet Resource: Background Paper, Oslo Conference on Armed Violence
Achieving the Millennium Development Goals
20-22 April 2010: Accessed April 2, 2012 at: http://www.osloconferencearmedviolence.no/pop.cfm?FuseAction=Doc&pAction=View&pDocumentId=24290

Year: 2010

Country: International

Keywords: Armed Violence

Shelf Number: 124800


Author: Miller, Kevin E.

Title: Mercy, Justice, and Politics: John Paul II on Capital Punishment

Summary: Pope John Paul II’s 1995 Evangelium Vitae teaches that capital punishment ought not be used “except ... when it would not be possible otherwise to defend society.†Several interpretations of this teaching have been proposed. Through a close reading of the encyclical in itself, in light of John Paul’s other writings on the human person and morality, especially the 1980 Dives in Misericordia, and also in the context of such important influences upon him as Thomas Aquinas and Henri de Lubac, I dispute, on the one hand, the interpretation according to which John Paul is pointing toward possible acceptance of the view that capital punishment is, as intentional killing, intrinsically evil. This interpretation rests upon a reading of Aquinas that fails to see the valid logic of his limited defense of capital punishment, and on a reading of John Paul that exaggerates his departure from Aquinas. I also reject, on the other hand, the interpretation of John Paul’s teaching as a purely prudential judgment about what is best only in the circumstance of an unhealthy moral culture. This interpretation is incompatible with the logic of Evangelium Vitae, which concerns what is necessary both to build and then also to maintain a healthy culture, and is further disproved by demonstrating at length that John Paul’s teaching appeals to mercy as a moral principle always essential for full respect for human dignity insofar as this includes the capacity for conversion, and for the realization of true justice by human persons by nature “restless†apart from a supernatural relationship with God. This appeal is grounded primarily in Christian revelation, but the beginning of an appreciation of the value of mercy is also accessible through natural-law reasoning, based especially on our recognition of creation as already pure gift, requiring us to give ourselves to others in love beyond justice.

Details: Milwaukee, WI: Marquette University, 2011. 210p.

Source: Internet Resource: Dissertation: Accessed April 3, 2012 at: http://epublications.marquette.edu/cgi/viewcontent.cgi?article=1109&context=dissertations_mu

Year: 2011

Country: International

Keywords: Capital Punishment

Shelf Number: 124807


Author: Chaban, Stephanie

Title: Palestinian Women and Security: Why Palestinian Women and Girls Do Not Feel Secure

Summary: This report presents findings from focus group discussions and in-depth interviews conducted by the Geneva Centre for the Democratic Control of Armed Forces (DCAF) with Palestinian women and girls between June and November 2009 in the West Bank and in the Gaza Strip. These interviews and discussions aimed to draw out the perspectives of women and girls on issues relating to their security and gather them in to a cohesive report. This report does not intend to provide specific recommendations, but rather to highlight some of the key security issues identified by Palestinian women and girls. DCAF hopes that the report’s findings will encourage relevant stakeholders to integrate the perspectives of women and girls into the national security debate within the Palestinian Territories. During individual interviews and group discussions, Palestinian women and girls were asked about their security concerns, their experiences of violence, their perceptions and use of services provided by local authorities and/ or the international community, and were also asked to offer recommendations for improving services and, thus, their own security. Women and girls revealed that their feelings of insecurity are related to the ongoing conflict, society’s tacit acceptance of violence against women, their own lack of awareness of service providers, and their distrust of the available services. They gave detailed descriptions of the security threats they face; whether in the public sphere, at work/school, or at home, violence permeates all aspects of their everyday lives. Despite this pervasiveness, women and girls explained that they were reluctant to resort to women’s organisations, human rights organisations, or security and justice providers, such as the police and courts, because of the strong social stigma attached to reporting abuse. They also admitted to being unaware or distrustful of the organisations in charge of protecting them, at times questioning the very existence of such organisations, especially shelters. Women and girls were also concerned that the personnel at these organisations lacked the necessary professional skills and ethics to adequately and confidentially respond to their needs. Finally, many women and girls believed the legal system to be discriminatory and unfair to them. Hence, the recommendations of women and girls include awareness-raising events for all components of society, including men and boys; training for members of social services, women’s and human rights organisations, hospital staff and the police; more coordination between the different service providers; legal reform; and increased female representation and participation in these organisations and in political life in general. Although many women and girls admitted to not using available services, DCAF believes that their recommendations should be carefully examined. Palestinian policy-makers and international actors should also take them into account when considering measures for responding to the security needs of women and girls. A democratic debate on adjusting security services to the security needs of the population should integrate the perspectives of all Palestinians, including those of women, both young and old. Moreover, if services are to be used by women and girls, their needs and willingness to use such services should be precisely assessed. This report only constitutes a first step in this direction.

Details: Geneva: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2010. 68p.

Source: Internet Resource: Accessed April 5, 2012 at: http://www.ochaopt.org/documents/Palest_Women_Security_ENG[1].pdf

Year: 2010

Country: International

Keywords: Female Victims (Palestine)

Shelf Number: 124847


Author: Morselli, Carlo

Title: The Factors That Shape Organized Crime

Summary: Organized crime has received considerable attention among policy-makers and law enforcement agencies in recent decades. This development is, in part, due to the disproportionate harms produced by the illicit activities of criminal organizations and networks, as opposed to individuals and small groups. High-profile wars between rival groups, such as that between the Hells Angels and Rock Machine occurring in Quebec during the 1990s, have also contributed to the growing concern about organized crime. In addition, an increasing volume of violence, especially homicide, in Canada appears to be gang-related. In response to the increases in organized crime, federal, provincial and territorial governments want to further understand the nature of organized crime, by building upon existing research that would allow decision-makers to implement approaches to combat organized crime that were based on empirical evidence. There continues to be substantial gaps in the empirical data, impeding the development of appropriate policy responses to criminal activities that may be associated with organized crime. One area that has been of particular interest is the structure of organized crime groups and the factors that contribute to varying structures. The literature reviewed indicated that the structure of organized crime varies in terms of their flexibility and adaptability. Studies of organized crime groups increasingly show that social networks are critical to their understanding and that there are many small, loosely structured networks. The assumption of using social network analysis is that the connections between individuals and groups are crucial determinants of the performance and sustainability of criminal organizations. The social network approach may also be applied at different levels of analysis, thus offering a more complete understanding and approach for containing organized crime. Such applications have been well documented at the individual level, as criminal career research has demonstrated. In this particular project, the network approach was used to identify those variables that have the greatest impact upon criminal organizations and the linkages between them. The framework for this project complements the recent work by the Australian Federal Police who have established the Target Enforcement Prioritization Index (TEPI). The TEPI is designed along a matrix (or quadrant) framework in which decision makers are able to contemplate the level of risk associated with a target and the level of success that enforcement may have if targeting such a threat. The AFP experience with the TEPI is an initial guide for the present report in that it provides an understanding of how specific features of individuals, groups, and environments may be used to assess the scope and structure of organized crime in a given setting. The focus on this project was to review the literature pertaining to the structure of criminal organizations and networks in order to ultimately identify the relevant variables that can then be applied to the development of analytical models. The identification of variables affecting the structures of and linkages between organizations will then serve as the basis for future statistical modeling that will enhance the understanding of these organizations/networks and inform strategies to disrupt them. The information provided in this report will help police and policy-makers to understand how specific features of individuals, groups and environments may help in the assessment of the scope and structure of organized crime in a particular setting. The analytical report created in this project includes:  A catalogue of relevant individual, group, and environmental level variables;  Justification from previous research or theory for the inclusion of each variable, with regard to how and why it is relevant to criminal organizational structures and linkages;  The levels of measurement applicable to each variable;  Sources for the data necessary to measure each variable;  The explanatory power of each variable, given the evidence; and  A discussion of the overall dataset and the implications for modeling and analytical purposes The report assesses a number of individual, group/organization, and environmental level variables that may influence how individuals or groups structure their criminal operations in a variety of criminal market and legitimate settings. In as much as possible, we categorize such factors along individual, group, and environmental levels of measurement. In many cases, however, a factor transcends more than one level of analysis, forcing us to address the issue more broadly. The report focused on the following themes:  Formal Organizational Membership and Trust  Personality  Financial and Material Resources  Violence  Technological and Private Protection Capacities  Language Skills, Ethnic Composition, and Social Embeddedness  Crime Mobility, Diversity, and Continuity  Upperworld Conditions and Facilitators  Criminogenic Opportunities  Target Priority Furthermore, an inventory of the variables found to explain the structure of crime in organized crime, criminal market, and criminal network research has been assembled in a separate catalogue (refer to the Appendix). This catalogue is meant to facilitate the work of law-enforcement and policy officials who are in constant search of new avenues of inquiry to a wide array of problems addressed in this report. The catalogue is designed as an outline of the more elaborate research review. It provides details on the variable’s level of measurement, essential coding, impact on the structural features of criminal groups, explanatory power, and possible data sources that may be used to gather factual data for practical purposes.

Details: Ottawa: Public Safety Canada, 2010. 82p.

Source: Internet Resource: Accessed April 5, 2012 at: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-89-2010-eng.pdf

Year: 2010

Country: International

Keywords: Criminal Organizations

Shelf Number: 124849


Author: Bauhr, Monika

Title: Why Pay Bribes? Collective Action and Anticorruption Efforts

Summary: This paper suggests that the effectiveness of current anticorruption policy suffers from a focus on the scale of the corruption problem instead of type of corruption that is to be fought. I make a distinction between need and greed corruption. Contrary to the most commonly used distinctions this distinction focuses on the basic motivation for paying a bribe, and whether the bribe is used to gain services that citizens are legally entitled to or not. Greed corruption is used to gain advantages that citizens are not legally entitled to, build on collusion rather than extortion and can thereby remain invisible and unobtrusive. In greed corruption societies the costs of corruption are divided between a large number of actors and the negative effects of corruption on economic and democratic performance are delayed and diffuse. I subsequently use this distinction to develop three propositions about the relationship between corruption and institutional trust, and the effects of anticorruption policy. Using both cross country data and a case study of a low corruption context, I suggests a) That greed corruption can coexist with high institutional trust, and that it thereby may not follow the expected, and often confirmed, negative relationship between corruption and institutional trust b) That greed corruption may not produce civic engagement against corruption and c) That increased transparency may not produce the expected benefits in low need corruption contexts, since it can disproportionally alter expectations about the entrenchment of corruption in a society. In other words, the paper suggest that the balance between need and greed corruption in a society determines the effectiveness of traditional policy measures derived from the logic of principal agent theory, such as societal accountability and transparency, and that the relevance of collective action theory to understand the effects of anticorruption efforts can be extended to contexts where the overall level of corruption is low.

Details: Gothenburg, Sweden: QOG - The Quality of Government Institute, Univerity of Gothenburg, 2011. 23p.

Source: Internet Resource: QoG Working Paper Series 2011:18: Accessed April 6, 2012 at: http://www.qog.pol.gu.se/digitalAssets/1357/1357856_2011_18_bauhr_nasiritousi.pdf

Year: 2011

Country: International

Keywords: Bribes

Shelf Number: 124855


Author: Merkinaite, Simona

Title: A War Against Peopole Who Use Drugs: The Costs

Summary: This report aims to assess whether national funding allocated for drug-related measures achieves the goals of slowing down or reversing drug epidemics and protecting society from drug-related harms. It is based on comparing costs associated with both – law enforcement activities and public health measures such as harm reduction and drug treatment. The report draws on country costs assessments done in Georgia, Kyrgyzstan, Romania and Russia as well as analysis of data from other countries of the region, including Ukraine and Tajikistan. Key findings: • Punishment for petty, non-violent drug crimes—mainly but not solely limited to criminalization of people who use drugs—results in stigma and discrimination, and creates a political climate in which human rights norms are not applied in relation to people who use drugs. • Such policies lead to police harassment, misuse of power and extortion of money from drug users and/or their relatives. • In most countries of Eastern Europe and Central Asia (EECA), governments’ unwillingness to allocate funds for harm reduction, opioid substitution therapy (OST), HIV and hepatitis C treatment is determined not by insufficiency of national funding, but by prioritization of enforcement over health approaches. • Such misguided priorities also have significant (and negative) financial consequences. For example: – The Kyrgyzstan government spends around $1.25 million per year to enforce Article 246 of the Criminal Code (regarding possession of drugs with no intent to supply). By comparison, the budget for OST programs is $500,000, and is currently covered exclusively by external donors. OST costs $500 per patient a year, while punishment costs at least $625 per each person convicted for drug possession. – In 2010 alone, the prosecution of drug offenders (for use and supply) cost at least $100 million in Russia. In comparison, under the Budget Law for 2011, HIV prevention programming is to receive less than 3% of the total $640 million to be allocated in 2012 through the Federal Budget Law for HIV, hepatitis B and C, and the government continues to prohibit internationally accepted drug treatment interventions such as OST. The government therefore will spend millions more treating people infected with HIV than it would have in protecting their health and reducing transmission. – Georgia spends around $10.5 million annually on random street drug testing and an additional $4.7 million on imprisonment of drug offenders. This not only fails to deter people from using drugs (as eventually the majority return to drug use) but also increases criminality, social isolation and stigma. Only about 10% of the estimated 40,000 people who inject drugs are currently receiving harm reduction services, yet even that small share means that up to 1,000 new HIV infections have been averted. • Despite vast investment in law enforcement interventions, neither drug use nor the HIV epidemic has been contained. Across EECA there are an estimated 3.4 million to 3.8 million people who inject drugs, which represents the highest regional prevalence of injecting drug use worldwide. One in four injectors is believed to be living with HIV in the region, accounting for 57% of all infections. • In countries where the drugs of the choice become unavailable, people are switching to other, potentially more harmful substances. Such developments indicate that punitive drug laws (prohibition of certain substances) have, at best, marginal impacts on the overall level of drug use, and have negative impacts on health. • Prosecution and incarceration for drug-related offences is one of the key reasons behind the increase in prison populations across the region. Yet maintaining prisons is expensive, and many prison systems are chronically underfunded. Among the consequences are increased HIV transmission—because drugs are easily available in most prisons, but preventive commodities such as clean needles are not—and an increase in involvement in criminal gangs as prisoners seek ways to improve their food and safety position in penitentiaries.

Details: Vilnius, Lithuania: Eurasian Harm Reduction Network (EHRN), 2012. 36p.

Source: Internet Resource: Accessed April 6, 2012 at: http://dl.dropbox.com/u/64663568/library/a-war-against-people-who-use-drugs-the-costs.pdf

Year: 2012

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 124881


Author: Cheung, Yan Leung

Title: How Much Do Firms Pay As Bribes and What Benefits Do They Get? Evidence From Corruption Cases Worldwide

Summary: We analyze a hand-collected sample of 166 prominent bribery cases, involving 107 publicly listed firms from 20 stock markets that have been reported to have bribed government officials in 52 countries worldwide during 1971-2007. We focus on the initial date of award of the contract for which the bribe was paid (rather than of the revelation of the bribery). Our data enable us to describe in detail the mechanisms through which bribes affect firm value. We find that firm performance, the rank of the politicians bribed, as well as bribe-paying and bribe-taking country characteristics affect the magnitude of the bribes and the benefits that firms derive from them.

Details: Cambridge, MA: National Bureau of Economic Research, 2012. 71p.

Source: Internet Resource: NBER Working Paper Series, Working Paper 17981: Accessed April 9, 2012 at: http://www.nber.org/papers/w17981

Year: 2012

Country: International

Keywords: Bribery

Shelf Number: 124889


Author: Cross, Cassandra

Title: The Donald MacKay Churchill Fellowship to Study Methods for Preventing and Supporting of Victims of Online Fraud: Final Report

Summary: Every day inboxes are being flooded with invitations to invest money in overseas schemes, notifications of overseas lottery wins and inheritances, as well as emails from banks and other institutions asking for customers to confirm information about their identity and account details. While these requests may seem outrageous, many believe the request to be true and respond, through the sending of money or personal details. This can have devastating consequences, financially, emotionally and physically. While enforcement action is important, greater success is likely to come in the area of prevention, which avoids victim losses in the first place. Considerable victim support is also required by victims who have suffered significant losses, in trying to get their lives back on track. This project examined fraud prevention strategies and support services for victims of online fraud across the United Kingdom, United States of America and Canada. While much work has already been undertaken in Queensland, there is considerable room for improvement and a great deal can be learnt from these overseas jurisdictions. There are several examples of innovative and effective responses, particularly in the area of victim support, that are highlighted throughout this report. It is advocated that Australia can continue to improve its position regarding the prevention and support of online fraud victims, by applying the knowledge and expertise learnt overseas to a local context.

Details: Canberra City, Australia: Winston Churchill Memorial Trust, 2012. 61p.

Source: Internet Resource: Accessed April 9, 2012 at: http://www.churchilltrust.com.au/site_media/fellows/2011_Cross_Cassandra.pdf

Year: 2012

Country: International

Keywords: Computer Crimes

Shelf Number: 124892


Author: Cukier, Wency

Title: The Illicit Trade in Small Arms: Addressing the Problem of Diversion

Summary: Over the last decade, considerable attention has been paid to the global problem of the illicit trafficking of small arms. This paper will analyse the points of diversion and potential mechanisms to prevent diversion using a demand-and-supply framework. Concrete cases are examined to understand the contributing factors and ways in which the Programme of Action addresses these. The paper is structured in four parts: 1) Background, 2) Mechanisms of Diversion, 3) Measures to Reduce Diversion, and 4) Conclusions. The principal findings of the paper are: 1) Increasingly the evidence reaffirms the importance of understanding the root causes of political and criminal violence that drive the demand for illicit small arms. Where demand is strong because of acute insecurity, efforts to reduce diversion by increasing controls over the licit supply are less likely to be successful. Factors driving the demand for small arms include demographics, governance problems; weak and corrupt law enforcement; human rights violations; civil and identity conflicts and the failure of states to protect the vulnerable; social and economic disparities; inadequate post-conflict disarmament, demobilization, and reintegration of ex-combatants; and cultural attitudes. 2) Although the definitions vary by context, “licit†small arms are those possessed by states, police, and civilians in accordance with existing international conventions as well as national laws. “Illicit†small arms are those which are possessed in violation of existing international conventions and/or national laws. These may include small arms in the hands of states that are subject to UN Security Council sanctions or regional/subregional embargos or moratoria, or small arms in the hands of non-state actors, as well as small arms illicitly possessed by civilians. The distinctions and interactions between licit and illicit are complex. Distinguishing between licit/ illicit small arms sales is a function of 􀂃 the status of the buyer (entitled or proscribed); 􀂃 the status of the seller (licensed or unlicensed); 􀂃 the status of the weapon (licit or illicit model, licitly acquired or stolen, licit/illicit manufacture); and 􀂃 the details of the transaction (formal or informal). 3) While in some regions there is local craft production of illicit small arms, most illicit small arms begin as licit small arms. Diversion occurs through a variety of means, including: illegal manufacture or reactivation of deactivated weapons, illicit sales by states, illegal brokering, illegal sales by dealers, illegal sales by civilians, theft from state and civilian stockpiles, and illicit importation. 4) A review of cases reveals a wide variety of mechanisms to facilitate illicit sales, including the absence of appropriate controls, falsification of documents and inadequate implementation, and a limited capacity for enforcement. 5) Measures that address licit trade, possession, and use—whether by states, police and other public security agents, or civilians—are essential to reduce the risk that licit small arms will be diverted to licit markets or purposes. A principal purpose of international sanctions and embargos, conventions, programs of action, and national regulations that follow from them is to reduce the risk that licit small arms will be diverted to illicit markets and purposes.

Details: Ottawa: Peacebuild; Waterloo, ONT: Project Ploughshares, 2008. 26p.

Source: Internet Resource: Accessed April 10, 2012 at: http://www.muntr.org/v4/wp-content/uploads/2012/02/ADDRESSING-THE-PROBLEM-OF-DIVERSION.pdf

Year: 2008

Country: International

Keywords: Illegal Guns

Shelf Number: 124914


Author: Heise, Lori L.

Title: What Works to Prevent Partner Violence? An Evidence Overview

Summary: This document reviews the empirical evidence of what works in low- and middle-income countries to prevent violence against women by their husbands and other male partners. The purpose of the report is to help inform the future direction of DFID programming on violence against women with an eye towards maximizing its impact and ensuring the best use of scarce resources. Several key decisions are embedded in the decision to focus here on partner violence, which is only one of the many forms of violence and abuse that women and girls experience globally. First, partner violence is the most common form of violence. At the population level, it greatly exceeds the prevalence of all other forms of physical and sexual abuse in women’s lives. Second, more research is available on partner violence than on other forms of gender-based violence, making the topic more mature for review and synthesis. Third, partner violence is a strategic entry point for efforts to reduce violence more broadly – because the family, where the vast majority of violent acts occur, is also where habits and behaviours are formed for successive generations. Fourth, partner violence shares a range of determinants or contributing causes with other types of gender-based violence, especially at the level of norms and institutional responses. Focusing on partner violence also builds a strong and necessary foundation for preventing other forms of abuse. The review focuses on efforts to prevent partner violence, rather than evaluating services that are available for victims. In focusing on prevention rather than mitigation or response, the review concentrates on interventions designed to reduce the overall level of violence in the medium to long term, rather than on interventions to meet the immediate needs of victims. This shifts the focus of inquiry away from interventions designed to improve services towards programmes and policies designed to influence the underlying determinants of partner violence. Further discussion of the rationale for this decision is provided in body of the report. Finally, the review prioritizes programmes that have been evaluated using rigorous scientific designs, emphasizing formal impact evaluation. Practitioners and advocates have generated considerable insight into “what works†through decades of experience in the field piloting, refining, and studying particular programmes. These findings have been systematized in a number of “best practices†publications.

Details: London: U.K. Department for International Development, 2011. 130p.

Source: Internet Resource: Working Paper (version 2.0): Accessed April 11, 2012 at: http://www.dfid.gov.uk/R4D/PDF/Outputs/Gender/60887-Preventing_partner_violence_Jan_2012.pdf

Year: 2011

Country: International

Keywords: Domestic Violence, Prevention

Shelf Number: 124926


Author: Kelly, Liz

Title: Shifting Sands: A Comparison of Prostitution Regimes Across Nine Countries

Summary: This study was commissioned by the Home Office as part of Tackling Demand for Prostitution Review (Home Office, 2008), to update a report undertaken in 2003 for Glasgow City Council (Bindel and Kelly, 2004). The original project examined legal and policy responses to prostitution in four countries. Here that is extended to nine with an enhanced methodology In this introductory section we set out the context and the conceptual framework for the study. Whilst there is widespread agreement across the UK that the current legal framework is problematic, there is no consensus with respect to the available options. As we noted in the first study, prostitution has proved to be a complex issue for politicians and policy makers, within contexts of changing local and international conditions. Some argue that it is possible to trace regulation of prostitution back to the classical age (Hubbard et al, 2008), but it is in the modern period that we find the roots of current debates. From the mid-nineteenth century to the late twentieth century there were two broad positions: the ‘abolitionist’ – seeking to abolish the institution of prostitution - and the ‘regulatory’ – which reluctantly accepts the inevitability of prostitution and the responsibility of the state to regulate it. More recently other possibilities have entered the arena: legalisation and de-criminalisation, both of which seek, in different ways, to bring prostitution into the mainstream of social and economic policy. Most policy analysis draws on some variant (and there are many) of these typologies, not helped by occasional contrary re-workings in which conventional definitions of, for example, abolitionism, are inverted. Most importantly for us the use of typologies as a shorthand has precluded the careful explication of precisely what activities, and/or individuals, and/or locations are criminalised, regulated, or normalised and in what ways. Our first point of departure is that existing typologies are not only inadequate, but frequently misleading. In reality most countries work with amalgams of at least two approaches – with few, if any, making prostitution in all contexts legal, and law and policy targeting aspects that are considered harmful – at minimum prostitution of minors and trafficking. Moreover, national frameworks are administered at local levels, leading to considerable variations in the extent, locations and regulation of sex markets within, not just between, countries. To reflect these complexities throughout this report we refer to ‘prostitution regimes’. We originally used this concept in the first study, it has simultaneously been developed by others including Joyce Outshoorn who defines it as: ‘laws and practices that shape prostitution… in distinctive ways’. Laws and practices are insufficient however, since, as following chapters will illustrate, historical contexts, political and philosophical underpinnings and existing evidence bases are all critical in shaping approaches. It is the combination of these five elements which comprise prostitution regimes in our thinking. To explore the political and philosophical underpinnings in a little more detail, one can frame prostitution through a range of concepts. At minimum it can be addressed as an issue rooted in: morality; heath; social problems; gender orders; human rights; law and order (including national security); migration; labour/employment; capitalism and globalisation. Within each of these framings particular understandings of risk, safety, violence and social (dis)order can be mobilised. Whilst specific frames can be used by governments of very different hues, and organisations with markedly different policy goals, certain framings lead towards or away from some policy options and determine which Ministries will have the leading policy implementation role.

Details: London: Child & Woman Abuse Studies Unit, London Metropolitan University, 2009. 102p.

Source: Internet Resource: Accessed April 11, 2012 at: http://webarchive.nationalarchives.gov.uk/20100113210150/http://crimereduction.homeoffice.gov.uk/crimereduction052a.pdf

Year: 2009

Country: International

Keywords: Prostitutes

Shelf Number: 124931


Author: Amnesty International

Title: Rape and Sexual Violence: Human Rights Law and Standards in the International Criminal Court

Summary: This document identifies how the crimes of rape and sexual violence must, as a requirement of its own statute and a matter of international human rights law, be interpreted and applied with equality between men and women by the International Criminal Court (the Court). The Court has yet to rule on this matter in its jurisprudence. Such incorporation of human rights law and standards in the prosecution of rape and sexual violence should be undertaken by other international courts, as well as national courts, in order to discharge states’ duties under treaty and customary law. In order to incorporate human rights law and standards in its practice, the Court’s interpretation of the definition of the crimes should address the behaviour and actions of the perpetrator, and how this affects the victim’s ability to exercise free and genuine choice, that is, to enjoy his or her human right to physical and mental integrity and sexual autonomy, without discrimination. The Court’s deliberation should not just address the victim’s purported ‘consent’ in isolation. Human rights law and standards requires that investigations and prosecutions of the crimes of rape and sexual violence must be undertaken with careful attention given to the task of challenging stereotypes, which tend to undermine women’s equality before the law. The integrity of investigations and prosecutions should not be tainted by stereotypical assumptions, including assumptions about sexual violence towards men and boys, as well as towards women and girls. All references to the term ‘consent’ within the Elements of Crimes must be interpreted consistently with a fuller, more accurate and human-rights based understanding of the word consent – that a consensual decision is a decision made without force, threat of force, coercion, or taking advantage of a coercive environment. Where evidence of force, threat of force or coercion is present, there should absolutely be no additional element of law of consent for the prosecution to prove. Acts of rape which are committed in the jurisdiction of the Court can be identified as war crimes and crimes against humanity of rape and torture. The requirement in human rights law to eradicate stereotypes requires all acts of rape within the jurisdiction of the Court to be prosecuted as torture, in order to address stereotypical assumptions that rape, particularly rape of women and girls, is not a serious crime, and to acknowledge and make clear the perpetrators’ use of rape and sexual violence to intimidate, discriminate and humiliate victims.

Details: London: Amnesty International, 2011. 47p.

Source: Internet Resource: Accessed April 15, 2012 at http://www.amnesty.org/en/library/asset/IOR53/001/2011/en/7f5eae8f-c008-4caf-ab59-0f84605b61e0/ior530012011en.pdf

Year: 2011

Country: International

Keywords: Human Rights

Shelf Number: 124947


Author: Allen, Scott

Title: Leave No Marks: Enhanced Interrogation Techniques and the Risk of Criminality

Summary: Following the enactment of the 2006 Military Commissions Act, PHR united the legal expertise of Human Rights First with PHR’s medical expertise to issue the report Leave No Marks in August 2007, demonstrating that ten "enhanced" interrogation methods purportedly used by the CIA amounted to war crimes. The report demonstrated that interrogation techniques are likely to cause severe or serious physical and mental harm to detainees, and that the authorization of these techniques, whether practiced alone or in combination, may constitute torture and/or cruel and inhuman treatment, and may place interrogators at serious legal risk of prosecution for war crimes and other violations.

Details: Physicians for Human Rights, 2007. 57p.

Source: Internet Resource: Accessed April 15, 2012 at https://s3.amazonaws.com/PHR_Reports/leave-no-marks.pdf

Year: 2007

Country: International

Keywords: Criminality

Shelf Number: 124971


Author: International Trade Union Confederation (ITUC)

Title: Forced Labour: Mini Action Guide

Summary: Forced labour is often associated with slavery. That is correct. Forced labour is therefore often associated with the past. This is incorrect. Forced labour continues to manifest itself in new forms throughout the world, and certain contemporary forms are even increasing in numbers of victims in a context of globalisation and increased migration. The ILO made a very conservative minimum estimate in 2005 stating that at any given moment 12.3 million people are working in forced labour conditions. The way in which forced labour is used is constantly changing. The legislation abolishing slavery two centuries ago may have abolished formal slavery and legal ownership of certain people over others; however, in practice forced labour has never been eradicated. Workers in forced labour today loose their freedom of movement through more indirect and less obvious mechanisms such as debt bondage, serfdom, indentured labour, etc. At the same time there are still some persistent vestiges of traditional slavery in certain parts of Africa, and the difference between a modernday domestic worker abused, exploited and locked up in a private home or bonded labourers on remote farms or working with brick kilns and traditional slaves may in practice be smaller than we like to think. Forced labour is a truly global problem affecting every region and all countries in the world whether industrialised or developing, rich or poor. Labour intensive and unregulated industries are affected the most: agriculture, domestic work, construction, mining, quarrying and brick kilns, manufacturing processing and packaging, entertainment and prostitution. Forced labour constitutes the antithesis to decent work and violates all core labour standards. Forced labourers are often victims of discrimination based on ethnicity or sex, and cultural preconceptions about inferiority of certain groups of people are therefore – together with economic hardship – the main root causes of the entire phenomenon. Up to 50 percent of all forced labour victims are children in forced child labour, a “worst forms of child labourâ€. These workers are under extreme exploitation and often isolated from their peers. Freedom of association and the right to organise will seem a distant dream to them – let alone their right to collective bargaining. Trade unions in most countries around the world are campaigning for decent work for all. We cannot be serious about this if we still allow forced labour and human trafficking to foster in every country around the world.

Details: Brussels, Belgium: ITUC International Trade Union Confederation, 2008. 50p.

Source: Internet Resource: Accessed April 17, 2012 at http://www.ituc-csi.org/IMG/pdf/guide_forced_labour_EN.pdf

Year: 2008

Country: International

Keywords: Debt Bondage

Shelf Number: 124997


Author: van der Laan, Peter H.

Title: Cross-border Trafficking In Human Beings: Prevention and Intervention Strategies for Reducing Sexual Exploitation

Summary: Over the years, growing attention has been given to the phenomenon of trafficking in human beings (THB). Sexual exploitation was until recently by far the most commonly identified feature of THB, followed by forced labour. Many activities to combat trafficking for the purpose of sexual exploitation have been initiated by numerous supranational, international as well as national organizations. Much is written about these initiatives, but some areas have been neglected. Knowledge on ‘what works’ is in particular limited. The growing attention to THB entails a demand for more information. The severity of the crime and the impact on its victims makes it of utmost importance to gain more insight into the working and effectiveness of anti-trafficking strategies and interventions. The main objective of this review was to assess the presently available evidence on the effects of interventions that aim to prevent and suppress trafficking in human beings. The following questions were central to the systematic review: 1) What types of anti-THB strategies and interventions can be identified that have been accompanied by some form of empirical analysis? 2) Which of these studies incorporate (quasi-)experimental evaluations that are rigorous enough to determine the effect of these anti-THB strategies on preventing and suppressing THB? 3) What are the outcomes of these (quasi-)experimental studies? Policies or interventions to prevent or suppress cross border trafficking for the purpose of sexual exploitation have not been evaluated rigorously enough to determine their effect. Using different search strategies and key words in nine different languages, the authors identified 19.000 studies on trafficking that came out between January 2000 and June 2009. They examined and coded the full text of the 20 studies that contained a combination of the relevant key words in their title, subtitle and/or abstract. None of these were controlled and most did not even use pre- and post-test measures.

Details: Oslo: The Campbell Collaboration, 2011. 50p.

Source: Campbell Systematic Review 2011:9 : Internet Resource: Accessed April 17, 2012 at http://www.emnbelgium.be/sites/default/files/publications/cross_border_trafficking_systematic_review.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 124999


Author: Chemonics International Inc.

Title: Literature Review: Trafficking in Post-Conflict Situations

Summary: The review, conducted in 2004 and updated in July 2006, found a great deal of work on the subject of conflict and its effects on women, children, and gender-based violence; the gender aspects of peacekeeping; and human trafficking in countries that once were in conflict. However, very few of these works deal directly with the issues of conflict, human trafficking, and their interrelationships; even fewer works contain in-depth descriptions and analyses of conditions present in conflict and post-conflict situations, which particularly contribute to the emergence of human trafficking in post-conflict and neighboring countries. The exception is the growing body of work on child soldiers and women associated with the fighting forces (WAFF), recent works on human trafficking in women and girls for sexual exploitation in and around areas with peacekeeping missions, and the evolving links between post-conflict trafficking in persons and organized crime. From the literature review, most trafficking in post-conflict countries follows predictable patterns based on the country’s placement on the conflict spectrum. Immediately before and during conflict, human trafficking is primarily related to the recruitment and use of child soldiers1 and WAFF.2 At this stage, there is also human trafficking of refugees and displaced persons, especially for sexual exploitation or labor. Immediately following conflict, most child soldiers and WAFF victims are released and try to reintegrate back into civilian society—usually through a disarmament, demobilization, and reintegration (DDR) program. With the influx of large numbers of peacekeepers, human trafficking shifts toward prostitution of women and girls. In the post-conflict period, the lack of law and order and the large numbers of vulnerable and destitute populations, especially female refugees, internally displaced populations (IDPs), separated children, and war widows, contribute toward the country becoming a source and a transit point for human trafficking for sexual exploitation or forced labor. In this post-conflict climate, women and girls suffer disproportionately from lack of access to resources and education, thereby heightening their vulnerability to various forms of exploitation and human trafficking. In search of opportunities to improve their social, economic, and political situations in more developed cities or countries, yet lacking comprehensive information or access to legitimate migration programs, many of these persons fall victim to human traffickers. This phenomenon occurs not only in the immediate post-conflict period, but often well after the conflict has subsided. In some areas, such as the former Soviet Union and the Balkans, literature links post-conflict trafficking with organized and transnational crime. A few of the reviewed works also examine the role wealthier countries play as sources of demand and destination of trafficked persons. The literature review also revealed geographic patterns and trafficking trends. The work on child soldiers and WAFF is overwhelmingly related to the large number of continuing conflicts in Africa. The work on human trafficking and the presence of large numbers of peacekeepers tends to focus on the problems in the former Yugoslavia; however, more recent attention has turned toward trafficking for sexual exploitation in areas such as East Timor, Ethiopia and Eritrea, Afghanistan, and Iraq. The work on post-conflict trafficking is much broader- covering the former Soviet Union, Balkans, Africa, Southern Asia, South America and other areas of the world. Another emerging pattern is the heightened risk faced by displaced children and women before, during and after conflict. These risks include significant impediments and limited resources dedicated to poverty-alleviation and education programs, human rights awareness, rehabilitation and reintegration of victims within their home communities, as well as critical individual and public health risks from rising prevalence of HIV/AIDS and other related health complications. Among the most vulnerable populations are street children, IDPs and refugees. Yet, due to a lack of comprehensive data, population tracking, awareness-raising, multi-disciplinary examination of inter-related phenomena related to such persons in conflict and post-conflict situations, reliable information on their numbers, prevention and protection services and reliable indicators for measuring interventions for such victims are lacking.

Details: Washington, DC: United States Agency for International Development, 2006. 117p.

Source: Internet Resource: Accessed April 18, 2012 at: http://www.usaid.gov/our_work/democracy_and_governance/technical_areas/trafficking/pubs/Trafficking_Conflict_July2006.pdf

Year: 2006

Country: International

Keywords: Child Soldiers

Shelf Number: 125019


Author: Nelson, Sue

Title: Literature Review and Analysis Related to Human Trafficking in Post-Conflict Situations

Summary: The review found a great deal of work on the subject of conflict and its effects on women, children, and gender-based violence; the gender aspects of peacekeeping; and human trafficking in countries that once were in conflict. However, very few of these works deal directly with the issues of conflict, human trafficking, and their interrelationships; even fewer works contain in-depth descriptions and analyses of conditions present in conflict and post-conflict situations, which particularly contribute to the emergence of human trafficking in post-conflict and neighboring countries. The exception is the growing body of work on child soldiers and women associated with the fighting forces (WAFF), recent works on human trafficking in women and girls for sexual exploitation in and around areas with peacekeeping missions, and the evolving links between post-conflict trafficking in persons and organized crime. From the literature review, most trafficking in post-conflict countries follows predictable patterns based on the country’s placement on the conflict spectrum. Immediately before and during conflict, human trafficking is primarily related to the recruitment and use of child soldiers1 and WAFF.2 At this stage, there is also human trafficking of refugees and displaced persons, especially for sexual exploitation or labor. Immediately following conflict, most child soldiers and WAFF victims are released and try to reintegrate back into civilian society—usually through a disarmament, demobilization, and rehabilitation (DDR) program. With the influx of large numbers of peacekeepers, human trafficking shifts toward prostitution of women and girls. In the post-conflict period, the lack of law and order and the large numbers of vulnerable and destitute populations, especially female refugees, IDPs, separated children, and war widows, contribute toward the country becoming a source and a transit point for human trafficking for sexual exploitation or forced labor. In this post-conflict climate, women and girls suffer disproportionately from lack of access to resources and education, thereby heightening their vulnerability to various forms of exploitation and human trafficking. In search of opportunities to improve their social, economic, and political situations in more developed cities or countries, yet lacking comprehensive information or access to legitimate migration programs, many of these persons fall victim to human traffickers. This phenomenon occurs not only in the immediate post-conflict period, but often well after the conflict has subsided. In some areas, such as the former Soviet Union and the Balkans, literature links post-conflict trafficking with organized and transnational crime. A few of the reviewed works also examine the role wealthier countries play as sources of demand and destination of trafficked persons. The literature review also revealed geographic patterns and trafficking trends. The work on child soldiers and WAFF is overwhelmingly related to the large number of continuing conflicts in Africa. The work on human trafficking and the presence of large numbers of peacekeepers tends to focus on the problems in the former Yugoslavia; however, more recent attention has turned toward trafficking for sexual exploitation in areas such as East Timor, Ethiopia and Eritrea, Afghanistan, and Iraq. The work on post-conflict trafficking is much broader- covering the former Soviet Union, Balkans, Africa, Southern Asia, South America and other areas of the world. Another emerging pattern is the heightened risk faced by displaced children and women before, during and after conflict. These risks include significant impediments and limited resources dedicated to poverty-alleviation and education programs, human rights awareness, rehabilitation and reintegration of victims within their home communities, as well as critical individual and public health risks from rising prevalence of HIV/AIDS and other related health complications. Among the most vulnerable populations are street children, IDPs and refugees. Yet, due to a lack of comprehensive data, population tracking, awareness-raising, multi-disciplinary examination of inter-related phenomena related to such persons in conflict and post-conflict situations, reliable information on their numbers, prevention and protection services and reliable indicators for measuring interventions for such victims are lacking.

Details: Washington, DC: U.S. Agency for International Development, 2004. 118p.

Source: Internet Resource: Accessed April 19, 2012 at: http://www.usaid.gov/our_work/cross-cutting_programs/wid/pubs/trafficking_dai_lit_review.pdf

Year: 2004

Country: International

Keywords: Human Trafficking

Shelf Number: 125022


Author: Ham, Julie

Title: Moving Beyond 'Supply and Demand' Catchphrases: Assessing the Uses and Limitations of Demand-Based Approaches in Anti-Trafficking

Summary: In the anti-trafficking sector, the concept of ‘demand’ typically refers to consumers’, employers’ and clients’ demands for services provided by or products produced by trafficked labour. Although ‘demand’ is widely mentioned in the anti-trafficking literature (see page 16, What do stakeholders usually say about demand?), most references to ‘demand’ don’t go beyond brief statements about: • Needing more research on ‘demand’; • Raising awareness to reduce demand; • Demand as a root cause of trafficking; and • Reducing demand as a trafficking prevention measure. Generally, two different demand-based approaches are discussed as anti-trafficking strategies: (1) calling for the elimination of the sex work sector, and (2) reducing the demand that enables exploitation in various sectors where trafficking occurs. ‘End demand for prostitution’ approaches have been most heavily promoted by prostitution abolitionists, who claim that penalising sex workers’ clients will help fight trafficking. Sex workers rights groups and some antitrafficking organisations (including GAATW) have strongly opposed criminal penalties against clients as this approach: • Has not reduced trafficking or sex work; • Threatens sex workers’ income security and working conditions, such as by increasing competition amongst sex workers, and increasing the vulnerability of sex workers who must negotiate with nervous and scared clients (i.e. less time for workers to determine whether a potential client is safe or not); • Has not stopped violent or abusive clients who are more experienced at evading law enforcement, but has ended up impacting less experienced clients and ‘good’ clients; • Dismisses and silences the concerns, priorities and knowledge of sex workers; • Muddles anti-trafficking efforts by confusing trafficking with sex work; • Increases police’s power over sex workers; and • Increases stigma against women in sex work. Sex workers’ rights groups and anti-trafficking allies have tried to shift the concept of ‘demand’ in a more rights-based direction by: trying to reduce the demand for unprotected paid sex (e.g. by empowering sex workers to demand condom use), reducing the demand for exploitative labour practices within the sex work sector, and increasing awareness among ‘demand’ or clients about treating sex workers respectfully and ethically. Many sex workers rights organisations also advocate for decriminalising consensual sex work while retaining existing criminal penalties against violence in sex work. They and their allies argue that decriminalisation of consensual sex work would: • Help prevent the misuse of anti-trafficking laws to punish women in sex work; • Impact the ‘demand’ for commercial sex by increasing women’s power to manage or negotiate working conditions with clients; • Assist anti-trafficking efforts by fostering cooperation between police and sex workers; • Reduce police violence against sex workers by changing the amount of power police yield over sex workers; and • Allow sex workers to report violence and exploitation to the police without fear of arrest. Another anti-trafficking approach to demand focuses on tackling the demand for exploitative labour practices, in any sector where trafficking can occur. In the sex work sector, re-framing demand-based efforts to reducing the demand for exploitative labour practices in sex work may provide a more productive, rights-based approach than the ‘end demand for prostitution’ approaches currently touted by prostitution abolitionists. The demand for exploitative labour practices (including, but not limited to the sex work sector) generally refers to labour that is: • Low cost - including non-payment or underpayment; • Easy to control - including keeping workers from leaving abusive situations; and • Unprotected - social attitudes that normalise or justify exploitation and discrimination, unregulated labour. The demand for low cost, controllable and unprotected labour can stem from globalised economic processes demanding increasingly flexible labour, and discrimination that can normalise or justify exploitation. Although migrant labour isn’t inherently exploitable, social and political processes can change migrant labour into labour that can be exploited. Migrant labour becomes cheap, controllable and unprotected when: • Labour market demands are undermined by immigration policies; • Migrant workers are labelled or constructed as ‘illegal’; and when • Discrimination against migrants is normalised or justified. Strategies to reduce the demand for exploitative labour practices include: • Creating legal migration channels for working-class migrant workers; • Ensuring coherence between immigration and labour policies; • Decriminalising migration and protecting migrants’ rights; • Enforcing labour standards and improving working conditions; • Reducing discrimination against migrants; • Raising awareness among investors and consumers on how they can help reduce demand. The usefulness of current ‘demand’-based approaches in anti-trafficking may be limited because: • The main focus on clients and consumers can mask significant structural factors that need to be addressed, including poverty and restrictive immigration measures; • Simplistic economic analogies of ‘supply and demand’ may not help to clarify complex social issues, such as trafficking; • Demand-based approaches fail to acknowledge migrants’ and workers’ own demands, motivations, aspirations, resistance strategies and recommendations; and • People talk about ‘demand’ and ‘supply’ as if they’re not connected. Efforts to reduce the demand for exploitative labour practices may be more effective if stakeholders: • Recognise the different ways supply and demand can shape each other, e.g. a large supply of cheap labour can increase the demand for domestic workers; • Focus efforts on reducing the ability of employers to demand vulnerable, exploitable labor, in any sector, not just the sex work industry; • Listen to the ‘supply’s (i.e. workers’) demands, such as the demand for safe migration opportunities, and the demand for safe working conditions. It could well be that problems about ‘demand’ would be best met with ‘supply’-side solutions (i.e. strengthening workers’ rights). For example, how do domestic workers’ organising efforts and labour protections change the expectations and behaviour of employers?

Details: Bangkok, Thailand: Global Alliance Against Traffic in Women, 2011. 98p.

Source: Internet Resource: Accessed April 19, 2012 at: http://www.gaatw.org/publications/MovingBeyond_SupplyandDemand_GAATW2011.pdf

Year: 2011

Country: International

Keywords: Forced Labor

Shelf Number: 125023


Author: Jain, Saranga

Title: New Insights on Preventing Child Marriage: A Global Analysis of Factors and Programs

Summary: The international community and U.S. government are increasingly concerned about the prevalence of child marriage and its toll on girls in developing countries (UNICEF 2005; Save the Children 2004; Mathur, Greene and Malhotra 2003). One in seven girls in the developing world marries before 15 (Population Council 2006). Nearly half of the 331 million girls in developing countries are expected to marry by their 20th birthday. At this rate, 100 million more girls—or 25,000 more girls every day—will become child brides in the next decade (Bruce and Clark 2004). Current literature on child marriage has primarily examined the prevalence, consequences and reported reasons for early marriage. Much less has been analyzed about the risk and protective factors that may be associated with child marriage. Also, little is known about the range of existing programs addressing child marriage, and what does and does not work in preventing early marriage. The work presented here investigates two key questions: What factors are associated with risk of or protection against child marriage, and ultimately could be the focus of prevention efforts?; What are the current programmatic approaches to prevent child marriage in developing countries, and are these programs effective? This report is for policy-makers and development practitioners working on or planning a future program to prevent child marriage. New insights on risk and protective factors will help program designers find points of intervention to prevent child marriage. The program scan offers a better understanding of what programs currently exist and how to expand efforts.

Details: Washington, DC: International Center for Research on Women, 2007. 60p.

Source: Internet Resource: Accessed April 22, 2012 at http://www.icrw.org/files/publications/New-Insights-on-Preventing-Child-Marriage.pdf

Year: 2007

Country: International

Keywords: Child Marriage

Shelf Number: 125044


Author: United Nations Children's Fund. Innocenti Research Centre

Title: Early Marriage Child Spouses

Summary: This Digest focuses on early marriage - the marriage of children and young people under the age of 18 - from a human rights perspective. Research into early marriage has tended to concentrate on its impact on reproductive health, school drop-out and rising population figures, and there has been little examination of the practice as a human rights violation in itself. The Digest examines the scale of early marriage, its context, causes and its impact on every aspect of the lives of those affected - particularly young girls - and on wider society. It outlines strategies to help those who have been married at an early age, and for the prevention of early marriage through education, advocacy and alliance-building. The Digest concludes with a call for more rights-based research on an issue that has far-reaching consequences.

Details: Florence, Italy: Innocenti Research Centre, United Nations Children's Fund, 2001. 30p.

Source: Innocenti Digest No. 7, March, 2001: Internet Resource: Accessed April 22, 2012 at http://www.unicef-irc.org/publications/pdf/digest7e.pdf

Year: 2001

Country: International

Keywords: Child Marriage

Shelf Number: 125046


Author: Serojitdinov, Anvar

Title: IOM 2011 Case Data on Human Trafficking: Global Figures & Trends

Summary: IOM 2011 Case Data contains information on all trafficking cases assisted by the organisation in 2011. The tables contained within this document are based upon IOM case data where the organisation has been involved in providing direct assistance to a trafficked person in the context of an IOM countertrafficking project. Data is collected directly from trafficked persons and stored into the IOM human trafficking database. This covers approximately 20,000 cases encoded by 72 different missions. In Europe IOM has globally provided assistance to individual trafficked persons on 1606 occasions. 1315 of these persons were adults aged 18 and over, whereas 198 were minors and 93 unknown. 1010 of these individuals were female, 502 were males, and in 34 cases the sex of the individual was unknown.

Details: Geneva, Switzerland: International Organization for Migration (IOM), 2012. 32p.

Source: Internet Resource: Accessed April 24, 2012 at http://ec.europa.eu/anti-trafficking/download.action;jsessionid=1JBhPXCH6Yx2d7x12NtYT6Xkcyz6JlHTNhHTnzgPJnLhqJTjLWWx!-1664183480?nodeId=0c594432-d910-421a-864f-45f546ae3abb&fileName=IOM+Global+Trafficking+Data+on+Assisted+Cases+2012.pdf&fileType=pdf

Year: 2012

Country: International

Keywords: Crime Statistics

Shelf Number: 125061


Author: Morrison & Foerster, DLA Piper, Latham & Watkins and Reed Smith for MADRE

Title: Achieving Justice for Victims of Rape and Advancing Women's Rights: A Comparative Study of Legal Reform

Summary: The aftermath of the catastrophic earthquake in Haiti in January 2010 saw a dramatic increase in sexual violence and gave fresh impetus to long standing calls for rape law reform. International women's rights organisation MADRE requested this research to support the subsequent reform of rape legislation. The report reviews rape legislation and procedures in Brazil, Canada, France, South Africa, Sweden and the United States and supplies concrete examples of laws and policies that implement women's human rights. It includes models for statutes, protocols for victim services, and guides to police and prosecutorial procedures which respect the experiences of victims and advance gender justice. Morrison & Foerster led and coordinated this research, working with DLA Piper, Latham & Watkins and Reed Smith. Aside from the Haitian context, the research undertaken should be equally useful for the development of gender-based violence laws all over the world.

Details: London: Thomson Reuters Foundation, 2011. 52p.

Source: Internet Resource: Accessed April 26, 2012 at: http://www.trust.org/documents/connect/Madrev16-1final.pdf

Year: 2011

Country: International

Keywords: Human Rights

Shelf Number: 125066


Author: Heiberg, Turid, ed.

Title: Ten Essential Learning Points: Listen and Speak Out against Sexual Abuse of Girls and Boys

Summary: The UN Secretary General’s Study on Violence against Children offers an opportunity to speak out against sexual abuse of girls and boys and to identify ways of tackling this serious violation of children’s human rights. Two world congresses have paved the way for governments and the public to acknowledge the sexual exploitation of children, and the time is ripe for concerted actions to effectively protect children against all forms of child sexual abuse and exploitation. The issue of child sexual abuse deserves to be taken seriously by the world community. It is an invasion of the child’s most intimate zone, a violation of the child’s physical and psychological integrity and a transgression of the moral norms of the child and the society. It creates fear in the boy or girl, who may be harmed for life physically and mentally. The stigma and shame surrounding child sexual abuse in all societies usually leaves the child to face the harm in solitude. Disclosure of the abuse seldom leads to a conviction of the abuser – rather it is the child who is blamed and judged. International law, in particular the Convention on the Rights of the Child, does set high standards for protection of children against all kinds of violence, but national laws, customary laws, traditional practices, systems of justice and child welfare systems do not adequately protect children. Implementing children’s rights, including their rights to protection, are as a rule not prioritised and overlooked in many places and situations. Children are as a consequence, denied full enjoyment of their rights, the development of their abilities and meaningful participation in society. Save the Children's report on sexual abuse is based on consultations carried out in Canada, Colombia, Brazil, South Africa, Romania, Spain, Mozambique, Rwanda, Bangladesh, Nepal, Nicaragua and Syria. The report is a contribution to the UN Study on Violence against Children, a study which was requested by the UN General Assembly in 2001. This report is one of three global thematic submissions to the UN Study; the other two focus on Physical and Humiliating Punishment and Children in Conflict with the Law.

Details: London: The International Save the Children Alliance, 2005. 146p.

Source: Internet Resource: Accessed April 26, 2012 at: http://resourcecentre.savethechildren.se/content/library/documents/listen-and-speak-out-against-sexual-abuse-boys-and-girls-10-essential-lear

Year: 2005

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 125067


Author: Ellsberg, Mary

Title: Violence Against Women in Melanesia and Timor-Leste: Progress made since the 2008 Office of Development Effectiveness report

Summary: This report builds on an earlier report published in 2008 by the Office of Development Effectiveness (ODE) of AusAID that assessed current approaches to addressing violence against women and girls in five of Australia’s partner countries: Fiji, Papua New Guinea, Solomon Islands, Vanuatu and Timor-Leste. In 2011, AusAID commissioned the International Center for Research on Women to undertake a follow-up study to take stock of what has happened with regard to the three key strategies for advancing the violence against women agenda put forward by the ODE report: (1) increasing access to justice for survivors of violence; (2) improving access and quality of support services for survivors; and (3) promoting violence prevention. The study also investigates a fourth strategy: strengthening the enabling environment for ending violence against women. This report presents research findings on progress made since the ODE report in these four thematic areas in the same five countries. The study methodology consisted of a desk review, an online questionnaire, and key informant interviews. The resulting data showcase successes and lessons learned as well as gaps and shortcomings that need renewed commitment by a broad range of stakeholders.

Details: Washington, DC: International Center for Research on Women, 2012. 85p.

Source: Internet Resource: Accessed April 27, 2012 at: http://www.icrw.org/files/publications/Violence-against-women-in-Melanesia-Timor-Leste-AusAID.pdf

Year: 2012

Country: International

Keywords: Domestic Violence

Shelf Number: 125070


Author: Jewell, Sarah E.

Title: Conceptualising Violence Against Women in the Work of the United Nations Special Rapporteur on Violence Against Women

Summary: Since the creation of the mandate of the Special Rapporteur on Violence Against Women, its Causes and Consequences (SRVAW) in 1994, each of the three women who have held the position have sought to answer the question of what causes violence against women. The SRVAWs have drawn upon theoretical debates about violence against women and incorporated the ideas underpinning both a continuum of violence approach (that experiences of violence against women are connected through the gender of the victim-survivor and that violence against women is caused by patriarchal power structures) and the theory of intersectionality (that violence against women occurs because of the relationship between different types of oppression). Chapter One examines the relationship between a continuum of violence and intersectionality as approaches to violence against women. Chapter Two then examines how these approaches have been applied within the work of the SRVAW. I conclude that despite the significant progress, there is no easy way to articulate what causes violence against women that simultaneously captures the experiences of women as a class and where an individual is situated within multiple and intersecting power structures. This paper aims to show that the SRVAW’s analysis of the causes and consequences of violence against women would be enhanced by explicitly using the concepts of a continuum of violence and intersectionality in conjunction with one another to create a more holistic analysis.

Details: Canberra: Australian National University, 2011. 46p.

Source: Internet Resource: ANU College of Law Research Paper No. 12-15: Accessed April 27, 2012 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2038113

Year: 2011

Country: International

Keywords: Cycle of Violence

Shelf Number: 125077


Author: Contreras, Manuel

Title: Bridges to Adulthood: Understanding the Lifelong Influence of Men's Childhood Experiences of Violence

Summary: Great numbers of men report experiencing violence as children and these experiences have significant lifelong effects, according to the new analysis of the International Men and Gender Equality Survey (IMAGES) dataset included in this report. Adult men who were victims or witnesses of domestic violence as children, for instance, likely come to accept violence as a conflict-resolving tactic not only in intimate partnerships but also in their wider lives. Experiences of violence as children can also in their wider lives. Experiences of violence as children can also significantly influence how men relate to their partners and children and whether they show more or less gender-equitable attitudes. Men who experience violence as children as also consistently more likely to report low self-esteem and regular experiences of depression. Using IMAGES data from six countries (Brazil, Chile, Croatia, India, Mexico, and Rwanda), this report explores the prevalence and nature of violence against children as well as its potential lifelong effects. The report expands understanding of these issues by examining data from low- and middle-income countries, by analyzing men's reports of experiencing and perpetrating violence, and by examining broad categories of lifelong effects.

Details: Washington, DC: International Center for Research on Women (ICRW) and Rio de Janerio: Instituto Promundo, 2012. 48p.

Source: Internet Resource: Accessed April 28, 2012 at http://www.promundo.org.br/wp-content/uploads/2012/04/Bridges-to-Adulthood.pdf

Year: 2012

Country: International

Keywords: Domestic Violence (Brazil, Chile, Croatia, India,

Shelf Number: 125088


Author: Adams, Tani Marilena

Title: Chronic Violence and its Reproduction: Perverse Trends in Social Relations, Citizenship, and Democracy in Latin America

Summary: This report reviews a broad literature on the causes and social effects of chronic violence in Latin America – particularly in Mexico, Central America, Colombia, and the Caribbean – and details the consistent and diverse ways that chronic violence undermines social relations and support for democracy. The trends identified – also relevant for parts of Saharan Africa, Asia, and the Middle East – provoke ever increasing violence and social disintegration, and appear to constitute perverse norms among affected groups. Unabated, this problem –which remains largely overlooked by policy makers today – could constitute a growing threat to peace making and state building in affected regions throughout the world. The report proposes a collaborative initiative that will join international, national, and local actors to develop more effective approaches through research, policy reform, and local social action.

Details: Washington, DC: Woodrow Wilson International Center for Scholars, Latin American Program, 2012. 52p.

Source: Internet Resource: Accessed April 30, 2012 at: http://www.wilsoncenter.org/sites/default/files/LAP_111121_chronicviol2011_single_page_0.pdf

Year: 2012

Country: International

Keywords: Violence (Latin America)

Shelf Number: 125096


Author: Islam, Asif

Title: Police and Crime Against Firms in Developing Economies

Summary: Economic theory predicts that a rise in police presence will reduce criminal activity. However several studies in the literature have found mixed results. This study adds to the literature by exploring the relationship between the size of police and crime against firms, an important issue especially for developing economies. Using data for about 12,000 firms in 27 developing countries we find that increasing the police force has a negative effect on crime against firms. We also find that several macro-economic factors can weaken or strengthen this negative effect. The results are robust to various sensitivity checks.

Details: Munich: MPRA Munich Personal RePEc Archive, 2011. 34p.

Source: Internet Resource: MPRA Paper No. 36725; http://mpra.ub.uni-muenchen.de/36725/1/MPRA_paper_36725.pdf

Year: 2011

Country: International

Keywords: Crime and Development

Shelf Number: 125138


Author: Ghosh, Arghya

Title: Crime, Factor Abundance and Globalization: Evidence From Cross-Country Panel Data

Summary: Popular media and anecdotal evidence suggests that aspects of globalization, particularly trade liberalization, are associated with increasing social tension such as higher crime rates. Moreover recent theoretical models have suggested that trade liberalization might reduce crime, but the effect differs for labor abundant and capital abundant countries. Though there is substantial evidence that crime rates differ across countries the proposition that trade liberalization in itself has an impact on crime has not been tested in the literature. We test this theory and find that a higher degree of trade liberalization, as measured by both higher openness and lower import duty rates, tend to increase burglaries and thefts in labor abundant countries. In contrast, in capital abundant countries, trade liberalization has either a small negative effect or no effect on crime rates.

Details: Adelaide: University of Western Australia, School of Business, 2011. 35p.

Source: Internet Resource: Accessed May 3, 2012 at: http://economics.adelaide.edu.au/events/ATW2011/Robertson.pdf

Year: 2011

Country: International

Keywords: Business and Crime

Shelf Number: 125147


Author: Laczko, Frank

Title: Trafficking in Persons and Human Development: Towards A More Integrated Policy Response

Summary: Poverty is often regarded as the "root cause" of trafficking, but the linkages between poverty, lack of development and trafficking are complex. For example, there is some evidence to suggest that victims of cross-border trafficking are more likely to originate from middle-income rather than lower-income countries. Trafficking and development have tended to be treated as very separate policy areas and the assessment of the development impact of counter-trafficking programmes is still at an early stage. This paper outlines a possible framework for a more evidence-based approach to understanding the linkages between trafficking, trafficking policy and human development. The paper argues that the human development gains from greater mobility could be significantly enhanced if there was greater coherence between policies to combat trafficking and policies to promote development.

Details: New York: United Nations Development Program, 2009. 68p.

Source: Internet Resource: Human Development
Research Paper
2009/51: Accessed May 4, 2012 at: http://hdr.undp.org/en/reports/global/hdr2009/papers/HDRP_2009_51.pdf

Year: 2009

Country: International

Keywords: Human Trafficking

Shelf Number: 125155


Author: Jennings, Kathleen

Title: UN Peacekeeping Economies and Local Sex Industries: Connections and Implications

Summary: “Peacekeeping economies†have not been subject to much analysis of either their economic or socio-cultural and political impacts. This paper uses a gendered lens to explore some ramifications and lasting implications of peacekeeping economies, drawing on examples from four post-conflict countries with past or ongoing United Nations peacekeeping missions: Bosnia-Herzegovina, Kosovo, Liberia, and Haiti. The paper is particularly concerned with the interplay between the peacekeeping economy and the sex industry. It examines some of the characteristics and impacts of peacekeeping economies, arguing that these are highly gendered – but that the “normalization†of peacekeeping economies allows these effects to be overlooked or obscured. It also contends that these gendered characteristics and impacts have (or are likely have) broad and lasting consequences. Finally, the paper considers the initial impacts of UN efforts to tackle negative impacts of peacekeeping economies, particularly the zero-tolerance policy against sexual exploitation and the effort to “mainstream†gender and promote gender equality in and through peacekeeping. The paper suggests that the existence and potential longterm perpetuation of a highly gendered peacekeeping economy threatens to undermine the gender goals and objectives that are a component of most peace operations.

Details: Brighton, UK: MICROCON: A Micro Level Analysis of Violent Conflict, Institute of Development Studies at the University of Sussex, 2009. 31p.

Source: Internet Resource: MICROCON Research Working Paper 17; Accessed May 8, 2012 at: http://www.microconflict.eu/publications/RWP17_KJ_VNR.pdf

Year: 2009

Country: International

Keywords: Human Trafficking

Shelf Number: 125177


Author: Women's Institute for Alternative Development (WINAD)

Title: A Human Security Concern: The Traffick, Use and Misuse of Small Arms and Light Weapons in the Caribbean

Summary: This paper looks at the place of Small Arms and Light Weapons (SALW) as a threat to Human Security with specific reference to the Caribbean context. The concept of Human Security for the purpose of this paper is not limited to a State centric realist definition of the concept. Human Security is interpreted and interrogated within a more people centred approach to the concept. The intent of this paper is to outline the proliferation of Small Arms and Light Weight weapons within the framework of a compromised Human Security and as a hinderance to development. It further explores the major consideration of Human Security for the Small Island Developing States of the Caribbean region, investigating the political and economic development path as a contributor to and facilitator of this compromised security. Additionally, the unique geopolitics and economics of regional development and the space created for the proliferation of SALW is also looked at in terms of providing as holistic as possible an understanding of the factors which determine the mis-use of SALW within the region. In conclusion, the remedial work undertaken, both at the level of the State and non-State actors, specific to the social and economic fallout consistent with the proliferation and mis-use of SALW will be explored. The initiatives which seek to address the issue of SALW as a threat to human security at the national, regional and international levels. The overarching concerns of the paper are the place of gender within the Human Security and SALW dialogue and the place or impacts on the development agenda for these issues.

Details: Trinidad and Tobago: Women's Institute for Alternative Development (WINAD), 2010. 30p.

Source: Internet Resource: Accessed May 8, 2012 at http://www.cries.org/wp-content/uploads/2010/08/Documentos-8.pdf

Year: 2010

Country: International

Keywords: Human Security (Caribbean)

Shelf Number: 125202


Author: Hervieu, Benoit

Title: Organized Crime Muscling in on the Media

Summary: A total of 141 journalists and media workers were killed during the decade of the 2000s in attacks and reprisals blamed on criminal groups. Mafias and cartels today pose the biggest threat to media freedom worldwide. A transnational phenomenon, organized crime is more than the occasional bloody shoot-out or colourful crime story in the local paper. It is a powerful parallel economy with enormous influence over the legal economy, one the media have a great deal of difficulty in covering. Its elusiveness and inaccessibility to the media make it an even greater threat, both to the safety of journalists and to the fourth estate’s investigative ability. "Organized crime†is the generic label that the post-Cold War world has given to these new predators of journalism. Mafias, cartels, warlords recycled as traffickers, paramilitaries running rackets, separatist groups that traffic and extort to fund themselves – they have replaced the world’s remaining dictatorial regimes as the biggest source of physical danger to journalists. From newspapers to TV news, from crime reports to yellow press, the media seem to be reduced to counting the number of dead, including the dead within their own ranks. While organized crime often overlaps with a violent criminality consisting of rackets, kidnapping and murder, it is the expression of an economic and geopolitical reality that the media usually do not reflect, a reality that does not admit analysis of the types of criminal organizations involved, the way they operate and their ramifications. This dimension of organized crime, which is completely beyond the scope of the 24-hour news cycle, also includes its impact on the “legal world†and its various components, including the media. Far from wanting to overthrow the political, economic and media bases of societies, organized crime has every interest in participating in them and using them. This fundamental fact suggests that the media are vulnerable not just as victims but also as actors or cogs of a parallel system for which they can serve as information and public relations outlets.

Details: Paris: Reporters Without Borders, Undated. 10p.

Source: Inquiry Report: Internet Resource: Accessed May 8, 2012 at http://fr.rsf.org/IMG/pdf/organized_crime.pdf

Year: 0

Country: International

Keywords: Corruption

Shelf Number: 125209


Author: Tickner, Arlene B.

Title: Latin America and the Caribbean: Domestic and Transnational Insecurity

Summary: This paper will examine the two key axes of Latin American security dynamics: on the one hand, weak governance and citizen insecurity; and on the other, transnational organized crime and illicit flows. It will also explore their interlinkages, and the ways in which secondary security challenges in the region feed off of and/or reproduce them. Based upon this discussion the paper will then evaluate distinct mechanisms for coping with these problems, identify the most likely future security scenarios in the region and suggest a number of ways in which regional insecurity might be addressed more effectively. In Latin America and the Caribbean, the end of the Cold War coincided with transitions to democracy in Brazil and the Southern Cone, and the peaceful resolution of armed conflict in Central America.These developments, along with the intensification of globalization processes worldwide, inaugurated a hopeful era of “democratic peace†or “no war†suggesting a decreasing importance for traditional security matters. Although a series of bilateral border disputes continue to simmer in the region, the most intransient ones have been resolved. Indeed, since the 1995 war between Peru and Ecuador, interstate conflict has been all but erased, and military competition has been reduced dramatically. With the exception of Colombia’s entrenched civil war and Haiti’s faltering state, internal conflicts characterized by significant episodes of political violence have also become a distant memory. And yet, the countries of the region confront new types of security challenges that they have been hardpressed to tackle effectively. Ungovernability and institutional weakness plague the entire continent, albeit to differing degrees. High levels of political and economic instability and social unrest have led to a number of coups, presidential resignations and cyclical institutional crises since the 1990s. Furthermore, violence and citizen insecurity have reached epidemic proportions in many latitudes, making Latin America one of the most violent regions in the world today. Compounding this situation even further, transnational criminal organizations make increasing use of the area in order to stage their illegal activities. One of the most urgent tasks confronted by Latin America and the Caribbean is the enhancement of national capacities and intra-regional mechanisms to address its security predicament, which is rooted in domestic and transnational problems that are highly interrelated. Despite considerable attempts to develop a common security agenda and to strengthen multilateral cooperative mechanisms during the last fifteen years, the existing regional architecture continues to be ill-equipped to manage many of the nontraditional security challenges present in the region today. Although small strides have been made at the bilateral and subregional levels towards this goal, marked asymmetries and diversity within the region, combined with distinct political and military priorities and perceptions of risk on the part of different countries, pose serious obstacles to greater regionwide cooperation. United States security policy following 9/11 has also not been conducive to strengthening multilateral security arrangements, given its preference for unilateral action and its fixation on terrorism. At the same time, growing ideological rifts within the hemisphere itself, between the leftist, anti-globalization, anti-American governments of Venezuela, Cuba, Ecuador, and Bolivia, pro- American governments in Mexico, Colombia, Central America and the Caribbean, and a moderate progressive block led by Brazil, Chile and Argentina, constitute yet another challenge to dealing with regional insecurity more successfully in the future. This paper will examine the two key axes of Latin American security dynamics: on the one hand, weak governance and citizen insecurity; and on the other, transnational organized crime and illicit flows. It will also explore their interlinkages, and the ways in which secondary security challenges in the region feed off of and/or reproduce them. Based upon this discussion the paper will then evaluate distinct mechanisms for coping with these problems, identify the most likely future security scenarios in the region and suggest a number of ways in which regional insecurity might be addressed more effectively.

Details: New York: International Peace Academy, 2007. 20p.

Source: Working with Crisis Working Paper Series: Internet Resource: Accessed May 8, 2012 at http://www.ipacademy.org/media/pdf/publications/cwc_working_paper_latin_america_at3.pdf

Year: 2007

Country: International

Keywords: Arms Trafficking (Latin America) (Caribbean)

Shelf Number: 125212


Author: Meyers, Deborah W.

Title: Room for Progress: Reinventing Euro-atlantic Borders for a New Strategic Environment

Summary: a new MPI report by Deborah W. Meyers, Rey Koslowski and Susan Ginsburg, describes the latest developments in three elements of U.S. and E.U. border management: the recently established enforcement agencies, benefits and limitations of new information technology, and contentious developments surrounding visa-free travel policy. Highlights of ways in which U.S. and E.U. border control converge and diverge include: Whereas in 2006, the United States signed a $2.5 billion contract for the Secure Border Initiative to create a “virtual fence†to complement hundreds of miles of physical fencing, European border authorities tend to focus more on interior enforcement (e.g., at workplaces and points of contact with government agencies). There is increased convergence in strategies, though, with new Department of Homeland Security attempts to step up enforcement in the interior (e.g., at workplaces); In terms of tracking the entry of foreign nationals, both the United States and Europe have made strides. The US-VISIT program processed the entry of more than 76 million foreign visitors to the United States by January 2007. The European Schengen Information System and a secondary databases known as “SIS I+†and “SISone4all,†designed to bolster external border controls so internal border controls can be removed, will enable most of the new EU Member States to lift controls at land borders by January 2008 and at airports in March 2008; Meanwhile, US-VISIT exit controls are not yet in place. Similarly, international travelers leaving the European Union are subject to passport controls at airports and land borders, but SIS is used only for watch-list checks, and Member States have yet to link entry and exit controls; U.S. Customs and Border Protection’s fiscal year 2007 budget totals over $7.8 billion, while FRONTEX’s 2007 budget is €35 million (nearly triple its 2006 budget, but much less than that spent by Member States, which retain responsibility for policing their borders); While U.S. border enforcement agencies seek more staff, soon some E.U. Member States may need less. The United States is having trouble recruiting, training and retaining the border personnel necessary for rapid growth. If CBP reaches 18,000 agents by the end of 2008 as planned, it will have added as many agents in two years as were added in the previous ten. Meanwhile, the Schengen Agreement establishes a single external border for nearly all E.U. Member States, increasingly eliminating the need for border guards at interior borders; The European Union and the United States are both increasingly turning to information technology to screen flows of people in a manner that balances travel facilitation with border security. Halting illegal migration is a principal motivating force behind increasing expenditures on IT systems in Europe and the United States; While the United States has required travelers from Visa Waiver Program countries to carry electronic passports, or “e-passports,†with facial biometric data, U.S. citizens’ passports currently do not all meet this requirement. E.U. Member States have agreed on a requirement their e-passports include fingerprints as well as facial biometrics; In recent years, visa-free travel programs that waive short-term business or tourist visa requirements for nationals of select countries have become increasingly contentious amid heightened security concerns about terrorists who may enter through these programs and fears of increased illegal immigration by people overstaying their visas; and Because all E.U. Member States, except for the United Kingdom and Ireland, belong to the Schengen Area and are treated essentially as a single entity for internal travel, the E.U. claims that visa-waiver status granted to one Member State should apply to all. The United States has engaged in a “consultative process†about Member States’ status, which has not led to clear resolutions. A new U.S. law requires travelers to electronically file travel authorization requests with DHS prior to their departure and gives the Secretary of Homeland Security increased flexibility in setting and administering overstay standards. Ultimately, the authors suggest that U.S. and E.U. policymakers must engage in greater dialogue on the new security systems and structures they are developing, as well as enhance international cooperation on border management, specifically institutional, technological and visa arrangements, if they are to realize their shared goal of securing national and regional borders.

Details: Migration Policy Institute, 2007. 34p.

Source: Internet Resource: Accessed May 8, 2012 at http://www.migrationpolicy.org/pubs/EuroAtlanticBorders103107.pdf

Year: 2007

Country: International

Keywords: Border Control

Shelf Number: 125218


Author: Peace Studies Group

Title: Youth, Collective Urban Violence and Security: Key Findings

Summary: The aim of this paper is to discuss three main critical challenges which research and policymaking in the field of collective youth violence in urban contexts face today. This paper argues that we need to shift the focus of research in this area from “problematic†youth to the study of the ways in which violence permeates daily lives and becomes normalised through specific local social and political conditions. The paper then suggests that, in light of recent theory and empirical research, the relationship between violence and poverty should be re-evaluated. Additionally, and in order to properly address the causes of youth collective violence, this paper argues for a change of focus in the analysis of youth violent mobilisation. The suggested focus rests on the appeal of the symbolic revenues that mark the search for a valued social status and possibilities in contexts of adversity and violence. In fact, symbolic factors associated with the involvement in drugs trafficking and other violent activities and with youths’ contact with firearms are key factors, namely the search for status, power and respect, and attracting recognition from their male and female peers. The adrenaline and danger which youth experience through these activities are highly connected with gender constructions. Finally, this paper supports the progressively accepted evidence in favour of an urgent shift in how to address and prevent youth violence, claiming that repressive policies have hitherto failed to contain violence and to contribute to improving the formulation of preventive policies. This paper is based on data collection and analysis as well as reports from several studies conducted since 2006 in Rio de Janeiro (Brazil), San Salvador (El Salvador), Praia (Cape Verde) and Bissau (Guinea-Bissau).

Details: Brussels: Peace Studies Group, Initiative for Peace Building, 2011. 30p.

Source: Internet Resource: Accessed May 10, 2012 at: http://www.ifp-ew.eu/pdf/201107IfPEWYouthUrbanViolenceFindings.pdf

Year: 2011

Country: International

Keywords: Gang Violence

Shelf Number: 125236


Author: Williams, Phil

Title: Drug Trafficking, Violence, and Instability

Summary: The rationale for this series is a reflection of the ways in which the world of armed groups has changed and is continuing to change, and the impact of these changes on threats and challenges to national and global security. Although challenges posed by various kinds of violent armed groups initially appear highly diverse and unrelated to one another, in fact they all reflect the increasing connections between security and governance—and, in particular, the relationship between poor governance and violent armed groups. The growth in the number of states with capacity gaps, functional holes, and legitimacy deficits helps to explain the resurgence of a new medievalism, and the rise of illegal quasi-governments in localized areas. The irony is that after several decades in which the number of sovereign states represented in the United Nations (UN) has increased significantly, relatively few of these states can truly claim a monopoly on force within their territorial borders. Violent challengers to the Westphalian state have taken different forms in different parts of the world. These forms include tribal and ethnic groups, warlords, drug trafficking organizations, youth gangs, terrorists, militias, insurgents, and transnational criminal organizations. In many cases, these groups are overtly challenging the state; in others they are cooperating and colluding with state structures while subtly undermining them; in yet others, the state is a passive bystander while violent armed groups are fighting one another. The mix is different, the combinations vary, and the perpetrators of violence have different motives, methods, and targets. In spite of their divergent forms, however, nonstate violent actors share certain viii qualities and characteristics. As Roy Godson and Richard Shultz have pointed out, “As surprising as it may seem, pirate attacks off Somalia, militias in Lebanon, and criminal armies in Mexico are part of a global pattern and not anomalies.†Indeed, these violent armed groups or, as they are sometimes called, violent nonstate actors (VNSAs) represent a common challenge to national and international security, a challenge that is far greater than the sum of the individual groups, and that is likely to grow rather than diminish over the next several decades. Although the U.S. military—especially the Air Force and the Navy—still place considerable emphasis on the potential emergence of peer competitors among foreign armed forces, more immediate challenges have emanated not from states but from various kinds of VNSAs. This monograph, “Drug Trafficking, Violence, and Instability,†focuses on the complex relationship between human security, crime, illicit economies, and law enforcement. It also seeks to disentangle the linkages between insurgency on the one hand and drug trafficking and organized crime on the other, suggesting that criminal activities help sustain an insurgency, but also carry certain risks for the insurgency. Subsequent monographs will focus on specific areas where violent armed groups operate, or they will delve into specifics about some of those groups. Some works will be descriptive or historical, while others are more analytical, but together they will clarify the security challenges that, arguably, are the most important now faced by the United States and the rest of the world. The series will include monographs on Mexico, the Caribbean, and various kinds of violent armed groups.

Details: Pittsburgh: University of Pittsburgh, Matthew B. Ridgway Center for International Securities Studies; Carlisle, PA: U.S. Army War College, Strategic Studies Institute, 2012. 88p.

Source: Internet Resource: Accessed May 10, 2012 at: http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1101.pdf

Year: 2012

Country: International

Keywords: Criminal Organizations

Shelf Number: 125243


Author: World Growth

Title: A Poison, Not a Cure: The Campaign to Ban Trade in Illegally Logged Timber

Summary: Environmental groups, such as WWF and Greenpeace, have a global goal of halting commercial forestry and forestry in native forests. One of their strategies to advance this campaign is to generate global concern that illegal logging is a major global problem. One presumption is that high volumes of illegally-sourced wood products are entering the global market. This presumption cannot be substantiated and is very likely to be untrue. The campaign urges trade bans on imports of illegal timber. It has also been driven by industrialized countries, in particular the UK. The campaign is also supported by protectionist interests in the timber and paper industry in the U.S., the EU and Australia, with the aim of limiting imports of more competitive products from developing countries. It is commonly alleged that commercial interests drive illegal logging and that this, in turn, causes severe deforestation. This contention is wrong. The causes of deforestation and illegal logging are complex: they include poverty, increased population growth, poor governance and weak property rights. In most cases, illegal logging represents a failure of developing economies to enforce the law. The Extent of Illegal Logging The extent of illegal logging is uncertain. Most studies and policies have been based on a 2004 study by Seneca Creek and Associates for the American Forest and Paper Association which finds between 8% and 10% of produced and traded timber may come from suspicious sources. Other research shows only 15% of globally produced timber is traded. Even if it were desirable to use trade controls to achieve non-trade purposes, the share traded is so small, that leveraging is negligible and prospects of success very small. Though the report is cited frequently in the literature, it suffers from significant flaws, including a lack of comprehensive and reliable data sources. These limitations are acknowledged by the study’s authors who state that there is limited information on illegal logging and that it is impossible to know the extent of illegal forest activity with any degree of certainty. The study is now outdated with the incidence of illegal logging decreasing in key countries in recent years. The 2004 global estimate is, for the most part, based on illegal logging in Indonesia, with global wood exports principally attributed to the country. Since the report, a briefing paper by Chatham House has demonstrated that incidence of illegal logging has decreased by between 50% to 75%, with estimates of illegal logging in Indonesia as low as 40% as compared with the 70% to 80% estimated by Seneca Creek.

Details: Arlington, VA: World Growth, 2011. 29p.

Source: Internet Resource: Accessed May 14, 2012 at: http://www.worldgrowth.org/assets/files/WG_Illegal_Logging_Report_5_11.pdf

Year: 2011

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 125254


Author: Derks, Maria

Title: Improving Security and Justice Through Local/ Non-State Actors: The Challenges of Donor Support to Local/Non-State Security and Justice Providers

Summary: Local/nonâ€state actors often play an important role in the provision of justice and security services in many of the world’s fragile and (postâ€)conflict countries. With a view to improving their effectiveness, donors seeking to support justice and security development in those countries frequently look for ways to incorporate them in their programmes. However, given that nonâ€state actors can also be detrimental to local security and justice (for example when they form part of organized crime), supporting them also involves huge risks. With this dilemma in mind, the Clingendael Institute’s Conflict Research Unit investigated conceptual, policy and practical opportunities and challenges for including local/nonâ€state security and justice networks in security and justice programming. The project consisted of a conceptual deskâ€study; case studies in Colombia, the Democratic Republic of the Congo (DRC) and Burundi; and a synthesis phase focusing on the lessons learned from the project, complemented by an expert brainstorm meeting, on the practical issues that donors must deal with if they are to successfully include local/nonâ€state actors in security and justice programmes. The present report summarizes the findings from this synthesis effort. It concludes that in each of the cases examined, it was possible to identify local/nonâ€state actors suitable for support and ways to support them. They included actors such as local courts, lay judges, neighbourhood watch groups, community development councils, and trade associations. However, the research also identified a number of practical risks and challenges that donors need to manage and overcome in order to ensure that such actors are included effectively into broader, overall security and justice programmes. These broadly fall into five categories.

Details: The Hague: Netherlands Institute of International Relations ‘Clingendael’, 2012. 36p.

Source: Internet Resource: Accessed May 14, 2012 at: http://www.clingendael.nl/publications/2012/20120400_derks_improving_security.pdf

Year: 2012

Country: International

Keywords: Crime Prevention Programs

Shelf Number: 125257


Author: Costello, Meghan Y.

Title: An Environmental Scan of Best Practices in Supporting Persistent Youth Offenders in the Transition to Adulthood

Summary: The purpose of this study was to understand how persistent youth offenders in Alberta can be best supported as they transition into adulthood. In addition, this report intended to name best and promising practices in North America and internationally by considering programs and services that address the risk factors and needs that a persistent youth offender faces during the transition age. The objectives of this project were to: (1) Establish an understanding of the risk factors present among persistent youth offenders as they transition to adulthood; (2) Establish an understanding of the needs of persistent youth offenders as they transition to adulthood; and (3) Determine best practice in supporting persistent youth offenders as they transition to adulthood. In order to address these objectives, two research methodologies were employed. First, a literature review was conducted to establish the risk factors present among persistent youth offenders in their transition to adulthood, as well as their specific needs during this time. Second, an environmental scan was conducted in North America and internationally to identify best and promising practices that support persistent, transition-aged youth offenders as they progress into adulthood.

Details: Calgary, Alberta, Canada: Canadian Research Institute for Law and the Family, 2011. 42p.

Source: Internet Resource: Accessed May 14, 2012 at: http://people.ucalgary.ca/~crilf/publications/Transition_to_Adulthood_Best_Practices_Report-Final_Dec-2011.pdf

Year: 2011

Country: International

Keywords: Delinquency Prevention

Shelf Number: 125259


Author: Patterson, George T.

Title: The Effects of Stress Management Interventions Among Police Officers and Recruits

Summary: Law enforcement organizations began to take notice of officer stress during the late 1970s. Stress has been found to not only affect the officers’ job performance, but their personal lives and relationships as well. Because police officers are first responders to potentially stressful situations, their ability to successfully manage stress is critical not only to their own mental health but to the safety of society as a whole. Research has found that police officers who have difficulties coping with stress exhibit maladaptive behavior and personality traits such as aloofness, authoritarianism, cynicism, depersonalization, emotional detachment, suspiciousness, and excessive use of alcohol. High levels of stress can lead to serious physiological (headaches, stomachaches, backaches, ulcers, heart attacks) and psychological (anxiety, depression, flashbacks, and panic attacks) symptoms. Stress among police officers has also been connected to police misconduct and can also have a negative effect on the law enforcement organization due to lawsuits resulting from officers’ performance. Other organizational effects include impaired officer performance, lower productivity, poor morale, poor public relations, labor-management problems, tardiness and missed work, and officer turnover. Law enforcement organizations provide a wide variety of stress management interventions aimed at ameliorating officer stress. 5 The Campbell Collaboration | www.campbellcollaboration.org Abstract BACKGROUND Law enforcement organizations began to take notice of officer stress during the late 1970s. Stress has been found to not only affect the officers’ job performance, but their personal lives and relationships as well. Because police officers are first responders to potentially stressful situations, their ability to successfully manage stress is critical not only to their own mental health but to the safety of society as a whole. Research has found that police officers who have difficulties coping with stress exhibit maladaptive behavior and personality traits such as aloofness, authoritarianism, cynicism, depersonalization, emotional detachment, suspiciousness, and excessive use of alcohol. High levels of stress can lead to serious physiological (headaches, stomachaches, backaches, ulcers, heart attacks) and psychological (anxiety, depression, flashbacks, and panic attacks) symptoms. Stress among police officers has also been connected to police misconduct and can also have a negative effect on the law enforcement organization due to lawsuits resulting from officers’ performance. Other organizational effects include impaired officer performance, lower productivity, poor morale, poor public relations, labor-management problems, tardiness and missed work, and officer turnover. Law enforcement organizations provide a wide variety of stress management interventions aimed at ameliorating officer stress. OBJECTIVES The objectives of this systematic review were to identify, retrieve, evaluate and synthesize the available evidence regarding outcomes of stress management interventions provided to veteran police officers and recruits. The review question is: What are the effects of officer stress management interventions on stress outcomes?

Details: Oslo, Norway: The Campbell Collaboration, 2012. 54p.

Source: Internet Resource: Campbell Systematic Review 2012:7: Accessed May 15, 2012 at: http://www.campbellcollaboration.org/library.php

Year: 2012

Country: International

Keywords: Mental Health, Police Officers

Shelf Number: 125269


Author: Elias, Patricia

Title: Logging and the Law How the U.S. Lacey Act Helps Reduce Illegal Logging in the Tropics

Summary: Illegal logging and the associated trade of illegal wood products is a clandestine industry that threatens forests and economies. It can degrade forest ecosystems and increase vulnerability to complete deforestation. Illegal logging generates trade distortions by depressing world timber prices and reducing the competitive advantage of legal loggers and producers. Furthermore, these practices threaten the reputations of legitimate forestry producers and discourage sustainable management practices. In 2008, Congress passed amendments to the Lacey Act to extend the law’s jurisdiction to illegal plants and plant products, including wood. By closing the U.S. market to illegal wood products, the Lacey Act plays an important role in strengthening economic opportunities for legal and legitimate wood producers—both in the United States and abroad. This law helps lay the groundwork for additional reforms that reduce illegal logging, promote sustainable forestry, improve forest management decisions in local communities, and create long-term development opportunities. The Lacey Act amendments marked the world’s first-ever law prohibiting trade of illegally logged wood products. Supporting the implementation and enforcement of the Lacey Act is critical to promoting an environment of forest conservation, legal logging, and sustainable management worldwide.

Details: Cambridge, MA: Union of Concerned Scientists, 2012. 28p.

Source: Internet Resource: Accessed May 15, 2012 at: http://www.ucsusa.org/assets/documents/global_warming/illegal-logging-and-lacey-act.pdf

Year: 2012

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 125267


Author: Lansdown, Gerison

Title: Child Safety Online: Global Challenges and Strategies

Summary: Over the past twenty years the Internet has become an integral part of our lives. We have eagerly embraced its potential for communication, entertainment and information-seeking. For many of today’s children, the Internet, mobile phones and other technologies are a constant and familiar presence. For them, the distinction between online and offline has increasingly become meaningless, and they move seamlessly between both environments. An increasing number of children can scarcely imagine life without a social networking profile; videos and photographs shared online – often in real time – and online gaming. Indeed, young people are at the vanguard of technological change Their coming-of-age in this era of exponential innovation has widened the generational divide between them and their parents, their teachers and other caregivers. This gap, while becoming less stark in industrialized countries, is wider in lower income countries where caregivers arguably have fewer opportunities to access information and communication technology. But the situation is changing rapidly There is no doubt that the Internet yields numerous opportunities and benefits for children in terms of its impact on their educational attainment and social inclusion. However, it has also exposed children to dangers that defy age, geographic location and other boundaries that are more clearly delineated in the real world. This has resulted in risks to children and young people of having abusive images of them shared on the Internet; of being groomed or lured into sexual conversations or exploitation by adult offenders; of being bullied or harassed online. Bearing this in mind, the UNICEF Innocenti Research Centre has, in partnership with the Child Exploitation and Online Protection Centre in the United Kingdom, collaborated with a number of actors to undertake this study. The research explored children’s online behaviour, risks and vulnerability to harm, documenting existing preventive and protective measures to combat their online abuse and exploitation. The study draws on lessons from high- and middle-income countries, viewed through the lens of the dynamic that, given the speed of innovation, other countries may soon experience. What we have learned is that a singular approach to combating these crimes is not effective. What is required is a collective effort by policymakers, law enforcement agencies, social workers, teachers, parents and the private sector to systematically protect children. We have also discovered that many children are comfortable navigating the Internet and are able to avoid risks. They may see themselves as protectors of younger children and are themselves agents for change. Children should be allowed to express their views on how to mitigate risks, and they should be listened to and empowered to safely exploit the benefits of the Internet. However, we should not overestimate their ability to protect themselves. Ultimately, the onus lies with adults to put in place a framework that ensures children equal and equitable access to the Internet, along with a safer online environment. Access to knowledge, participation, leisure and play are fundamental rights of all children, as enshrined in the Convention on the Rights of the Child In today’s real and virtual worlds, it is our collective responsibility to ensure those rights for all children.

Details: Florence, Italy: UNICEF Innocenti Research Centre, 2011. 32p., technical report.

Source: Internet Resource: Accessed May 15, 2012 at: http://www.unicef-irc.org/article/825

Year: 2011

Country: International

Keywords: Bullying

Shelf Number: 125276


Author: United Nations Office on Drugs and Crime

Title: Police Information and Intelligence Systems

Summary: In recent years there have been some important developments concerning the use of criminal intelligence by law enforcement agencies in many parts of the world and these have resulted in an increasing recognition amongst practitioners that: 􀂃 timely and actionable criminal intelligence is essential to make an impact on the prevention, reduction and investigation of serious and organised crime, particularly when it is of a trans-national nature. (“Timely†means that it is provided in good time and “actionable†means that its detail and reliability supports the taking of action.); 􀂃 criminal intelligence can play a significant role in helping with the directing and prioritising of resources in the prevention, reduction and detection of all forms of crime – through the identification and analysis of trends, modus operandi, “hotspots†and criminals – both at the national and transnational level; and 􀂃 intelligence can form the bedrock of an effective policing model – often termed “Intelligence Led Policing†– where intelligence is essential to providing strategic direction and central to the deployment of staff for all forms of tactical policing activity, including community policing and routine patrols. Whilst significant differences will be seen in the understanding and acceptance of information and intelligence as a law enforcement tool, the fact remains that, in many countries and international organisations, criminal intelligence has been adopted as the law enforcement strategy of choice to drive policing forward in the next century.

Details: New York: UNODC, 2006. 38p.

Source: Internet Resource: Criminal Justice Assessment Toolkit 4: Accessed May 16, 2012 at: http://www.unrol.org/files/4_Police_Information_Intelligence_Systems.pdf

Year: 2006

Country: International

Keywords: Criminal Intelligence

Shelf Number: 125308


Author: Global Witness

Title: Forest Carbon, Cash & Crime: The Risk of Criminal Engagement in REDD+

Summary: Corruption in the forest sector has until now been overwhelmingly linked to logging, both illegal and legal, which in many countries has led to significant depletion of valuable tropical forests. But today incentive mechanisms such as REDD+, intended to compensate governments, communities or other groups in developing countries for reducing forest loss, are beginning to change the face of corruption in the sector. While corruption and illegality in logging continue to be a significant international problem, the potential for future REDD+ earnings is bringing about new corrupt practices, starting with cases of land grabs. REDD+ is also likely to lead to new forms of corruption not previously seen in the forest sector, such as questionable carbon accounting and manipulation of forest carbon measurements. The recognition of ‘carbon’ as a commodity to be measured and paid for creates a number of new opportunities for corrupt activities, since forest “carbon†is an intangible asset that is difficult to measure and relies on complex calculations that can be manipulated. Alongside the familiar risks of criminal activity encountered with such large financial flows – for example fraud, bribery and tax evasion – REDD+ poses some specific risks. These include increased illegal logging, linked to law enforcement capacities being stretched by the need to police additional forest protection efforts, illegal land grabbing, the theft and misappropriation of REDD+ funds, the manipulation of carbon measurements to exaggerate results and increase payments, and poor regulation of carbon markets. With the right national and international frameworks, plus sufficient funding, REDD+ is an unprecedented opportunity to address climate change, as well as protect natural forest ecosystems and biodiversity and deliver development benefits, especially for forest communities. Governance is key to the effective implementation and delivery of the intended outcomes of REDD+ - from international to grass roots level. A well-designed governance system is also needed to address the substantial risks of corruption and criminal involvement that are posed by REDD+. Significant sums of money are involved: the REDD+ mechanism is expected to require an estimated US$17- 33 billion every year, equivalent to up to a quarter of OECD aid flows in 2010,1 much of which will be pumped into forest-rich developing countries.2 Some of this money is already being paid out for preparation and pilot activities. For the most part, however, these forest-rich countries suffer from weak regulation and governance. More than 80% of countries currently receiving REDD+ funds fall into the bottom half of countries assessed for Control of Corruption by the World Bank. Past attempts to tackle forest loss in these countries have mostly failed, undermined by policy failures, perverse incentives and corruption. Given the large sums of money involved, there is also a substantial risk that criminal elements, including state actors, will undermine REDD+ and prevent it from achieving its overall objectives. So far there is also a serious funding gap. Only US$5 billion has been pledged by rich countries3 and it is unclear where the rest will come from. Welldesigned national REDD+ programmes with proper safeguards and measures to minimise corruption risks will encourage better REDD+ projects and instil confidence in those who provide funding that REDD+ is worth investing in. To address these risks, this paper calls for clear and effective safeguards to ensure transparent financial flows, improvements to governance throughout national REDD+ processes, and for donors to provide financial and technical support to recipient countries to improve governance as preparation for REDD+. Similarly, donors should consider other ways that existing aid programmes can be used to ensure appropriate REDD+ implementation. Immediate and sustained investment in building governance capacity will help ensure that REDD+ funds, once flowing, have a much better chance of reaching where they are needed and achieving genuine results for the climate. Further, law enforcement agencies, both national and international, should be encouraged to contribute their expertise to

Details: Holborn, UK: Global Witness, 2001. 24p.

Source: Internet Resource: Accessed May 16, 2012 at: http://www.salvaleforeste.it/en/reports/file/806.html?start=600

Year: 2001

Country: International

Keywords: Corruption

Shelf Number: 125313


Author: FERN

Title: Exporting Destruction: Export Credits, Illegal Logging and Deforestation

Summary: Exporting Destruction is the conclusion of research that included fieldwork in China, desk studies, and a new financial review, all commissioned to shine a light on the role that export credit agencies (ECAs) play in financing global deforestation. Through detailed case studies and historical research, FERN has been able to produce a set of policy recommendations that would, if implemented effectively, bring export credits in line with other publicly-funded institutions and reduce their potential for negative social and environmental impacts. The paper suggests that while the primary, if not sole, remit of ECAs is to promote their country’s domestic industries in competitive and risky environments, particularly in poor emerging markets, the huge amounts of money involved mean that they also have an important effect on policies and actions in the countries in which they support projects. To put their size in context, ECAs underwrite around US$100 billion annually in medium and long-term credits and guarantees, compared with, for example, multilateral development banks, which have a combined total of US$60 billion in loans per year. ECA involvement in activities that have fuelled unsustainable, and often illegal, deforestation in a number of countries has been documented since the mid 1990s. Evidence in this paper, gathered from community groups around the world, suggests that a number continue to be centrally involved in the sector. Their significance is primarily the result of their 'door opening' public finance status, as well as their focus on countries that are a high-risk for commercial operators, usually those which also lack the institutional governance to regulate their industries effectively. Direct ECA support for logging or timber trading is minimal because they are not particularly capital-intensive sectors, but significant support from ECAs has been instrumental in aiding the infrastructure and pulp and paper sectors for the last fifteen years, particularly for controversial expansion projects in Indonesia. FERN’s report shows that this support was, and continues to be, ‘blind’, not taking environmental or social issues into account or investigating whether operators’ prospectus documents were based on realistic assessments of the nature or ownership of the forest resource. This lack of ‘ground-truth’ in assessing projects is shown to be one of the core problems of ECAs. Although taxpayers fund them, their remit is often limited to economic considerations, and they are not currently subject to the binding environmental, social, human rights or transparency standards by which other public sector agencies are governed. The case studies clearly show that this has led to increased illegal logging, corruption and the opening of previously isolated forests. Indeed, experience highlighted in the studies suggest that no ECAs have the relevant procedures in place to identify and address the flawed operating and expansion model that much of the pulp and paper sector has followed. What’s more, by aiming for very low-transaction costs, most ECAs have little internal capacity for assessing the environmental or social impacts of the operations the help to finance. This report calls on Governments to urgently address the negative impact that ECA-supported operators have internationally, particularly in sensitive sectors such as forestry, and to develop safeguards that would ensure that the operations of export credit agencies do not serve to undermine international commitments to sustainable development and good governance in some of the poorest countries in the world. Such policies should draw on those already in place in most multilateral banks and some of the largest commercial ones, and be resourced and monitored to an extent which ensures diligent implementation. More specific details on what these policies should look like in the forest sector and how ECAs could be brought into line with two decades of their national governments commitments to tackle illegal logging and unsustainable deforestation can be found in Chapter 7.

Details: Moreton in Marsh, UK: FERN, 2008. 41p.

Source: Internet Resource: Accessed May 16, 2012 at: http://www.illegal-logging.info/uploads/FERNexportingdestruction.pdf

Year: 2008

Country: International

Keywords: Corruption

Shelf Number: 125314


Author: Metaparti, Satya Prakash

Title: Risk Management Initiatives for Post 9/11 Maritime Security

Summary: Following the terrorist attacks of September 11th, 2001, there has been a major worldwide focus on the threat of terrorism to trade, transportation and critical infrastructures. One area that has received particular attention is maritime trade and international shipping. The relative vulnerability of ports, ships, containers, and other maritime facilities worldwide combined with the importance of maritime trade to the global economy have resulted in several international and national measures to manage security risks in this area. Among these, the International Ship and Port Security (ISPS) Code by the United Nations, and domestic legislations of the United States such as the Container Security Initiative (CSI) have an international effect and are of particular significance. Despite the emergence of strong security responses, concerns about their adequacy and cost-effectiveness remain. Differing threat perceptions and erosion of sovereignty also impede effective implementation of these security measures. Based on these perceptions, this study questions whether the post 9/11 maritime security measures resulted from a sound application of the principles of risk management or were excessively politicized. This study also examines in detail the intrinsic factors within the shipping industry that contribute to its vulnerability or resilience, the underlying dynamics security responses, as well as their cost and effectiveness. Gaps in the effectiveness of these security measures are identified and possible remedial measures are suggested. This multidisciplinary study is based on the concepts of securitization from the political science domain and risk management principles from business studies, and is an attempt at reaching across disciplines to examine this important topic of contemporary interest. Qualitative inputs for this study were obtained through interviews with seafarers, industry experts and government/port officials and quantitatively backed by a user perception survey on the ISPS Code. Findings indicate that post 9/11 maritime security measures have enhanced the overall security of shipping. However, large gaps remain. Further, at a strategic level, there are differences among various stakeholders with regards to threat perceptions and the cost effectiveness of security. At an operational level, the study findings show excessive reliance on paper work, bureaucratization and restrictions on movement of goods and personnel. Recommendations at a strategic level include wider international cooperation and a decision making process that aims for broader consensus among all stakeholders. At a tactical/operational level, this study recommends better information sharing, reduced paperwork and integration of various shipboard sub-processes, such as those for safety, environment, quality, and security - which are currently separate - into a unified process that optimizes the available resources and reduces conflicting requirements.

Details: Hong Kong: Hong Kong University, 2009. 334p.

Source: Internet Resource: Accessed May 18, 2012 at: http://hdl.handle.net/10722/56504

Year: 2009

Country: International

Keywords: Maritime Crime

Shelf Number: 125344


Author: Human Rights First

Title: 2008 Hate Crime Survey

Summary: Human Rights First’s 2008 Hate Crime Survey—our second annual study—is a review of the rising tide of hate crime covering the region from the Far East of the Russian Federation and the Central Asian states across Europe to North America: the 56 participating states of the Organization for Security and Cooperation in Europe (OSCE). Human Rights First continues to document and analyze the reality of violent hate crime. We have reviewed available reports on violence motivated by prejudice and hatred, including the findings of the few official monitoring systems that provide meaningful statistical information. This data—combined with the findings of nongovernmental monitoring organizations as well as media reporting—provides important insights into the nature and incidence of violent hate crimes. Our aim is to raise the profile of these insidious crimes and the challenges they pose to societies that are becoming increasingly diverse. Hate crimes are everyday occurrences that result in broken windows and burnt out homes, mental distress and bodily harm—sometimes fatal. Hate crimes threaten whole communities who identify with the victim based on race, religion, or other attributes, leaving many to live in fear and alienated from the larger society. This report seeks to overcome official indifference and indecision in the fight against such crime. In the first part of this report, we examine six facets of hate crime in sections on Violence Based on Racism and Xenophobia, Antisemitic Violence, Violence Against Muslims, Violence Based on Religious Intolerance, Violence Against Roma, and Violence Based on Sexual Orientation and Gender Identity Bias. In the second part, we assess government responses to violent hate crimes in sections on Systems of Monitoring and Reporting and The Framework of Criminal Law.

Details: New York: Human Rights First, 2008. 186p.

Source: Internet Resource: Accessed May 19, 2012 at: http://www.humanrightsfirst.org/wp-content/uploads/pdf/FD-081103-hate-crime-survey-2008.pdf

Year: 2008

Country: International

Keywords: Bias Crimes

Shelf Number: 125263


Author: Levonkron, Nomi

Title: The Legalization of Prostitution: Myth and Reality. A Comparative Study of Four Countries

Summary: During the course of almost any discussion on the subject of prostitution and trafficking in women, one or more of those involved argues that the solution is to legalize prostitution. Those who support this approach claim that legalization will enable criminal elements to be identified and removed from the sex industry; will protect women’s rights; and will prevent a public nuisance. It is also claimed that the state will benefit from the taxation of the sex industry. Since a number of countries have gained practical experience in the legalization of prostitution, public debate on this question in Israel should be informed by this experience. As our study shows, the “legalization of prostitution†should not be seen as a homogenous concept. Different countries have introduced widely divergent arrangements or systems of legalization reflecting diverse approaches to prostitution. After presenting the principal features of the debate on the approach to be taken to prostitution and its institutionalization, we shall review the situation in Israel. Thereafter, we shall examine the arrangements for legalization as introduced in four countries, focusing on a number of aspects: The factors leading the country to legalize prostitution; the nature of the institutionalizing legislation; and the ways in which the process of legalization influenced all those involved – the victims of human trafficking and women engaged in prostitution, pimps and traders, and the position of state, particularly in economic terms. Lastly, we shall examine the ramifications of our study for Israel. Should the current policy be left intact or should it be changed; and if so – how? Can the legalization of prostitution provide a solution for the situation in Israel? The present study is unique in terms of the diversity of the sources on which it is based. In additional to theoretical literature, empirical and updated information that was collected from reports issued by governmental authorities and NGOs in the Netherlands, Germany, Australia, and the state of Nevada in the USA. The comparison between these different countries aimed to enable a thorough examination of the systems introduced to legalize prostitution in their local economic, political, and sociocultural contexts. The Netherlands and Germany are two adjacent nations; both are members of the European Union and both have a similar basic profile. This selection was balanced with countries from other continents with sharply different conditions, as reflected in the distinct systems they have adopted for the legalization of prostitution. The information collected for the study reflects a broad range of ideological positions on the subject of prostitution, from those who view it as a form of exploitation and humiliation of women to those who see prostitution as just another job. In each of the countries examined we contacted experts and relevant public bodies – the police, the prosecution service, the Special Rapporteur on trafficking in women, and human rights organizations that assist the victims of trafficking, as well as organizations that help women in the sex industry to claim their rights. We sent identical questionnaires to these sources in order to examine all aspects of the process of institutionalization. In addition to the abovementioned sources, the study is also based on the responses received from fifteen experts and organizations.

Details: Tel Aviv: Hotline for Migrant Workers, 2007p. 103p.

Source: Internet Resource: Accessed May 23, 2012 at: http://hotline.org.il/english/pdf/The_Legalization_Of_Prostitution_English.pdf

Year: 2007

Country: International

Keywords: Human Trafficking

Shelf Number: 125290


Author: Gilgen, Elizabeth

Title: Armed Violence: Spotlight on Lethal Effects

Summary: Armed violence—‘the intentional use of illegitimate force (actual or threatened) with arms or explosives, against a person, group, community, or state’ (Geneva Declaration Secretariat, 2008, p. 2)—has many harmful consequences, death being the most extreme. The reason why the number of violent deaths is frequently used as a proxy for armed violence is that killings are likely to be recorded more systematically than other crimes. Indeed, ‘[k]illing is treated seriously in all societies, which renders it more readily amenable to examination and measurement’ (Geneva Declaration Secretariat, 2011, p. 43). This Research Note is largely based on Chapter 2 of the Global Burden of Armed Violence 2011 (GBAV 2011) report, which presents the GBAV 2011 database (Gilgen, 2011). Established by the Small Arms Survey, the database provides an overview of the number of violent deaths that took place across all settings from 2004 to 2009, revealing that 9 out of 10 violent deaths occur in non-conflict settings. The chapter sheds light on the 58 countries most affected by armed violence between 2004 and 2009 and focuses on trends in countries that exhibit the highest rates of violent deaths per capita.

Details: Geneva: Small Arms Survey, Graduate Institute of International and Development Studies, 2012. 4p.

Source: Research Notes Number 17: Internet Resource: Accessed June 7, 2012 at http://mafiaandco.files.wordpress.com/2012/06/armed-violence-spotlight-on-lethal-effects.pdf

Year: 2012

Country: International

Keywords: Armed Violence

Shelf Number: 125328


Author: Briscoe, Ivan

Title: Crime and error: why we urgently need a new approach to illicit trafficking in fragile states

Summary: Transnational organized crime has boomed in some of the poorest and most fragile countries in the world, prompting the international community into renewed efforts to devise a response. So far, however, the results have not been impressive. Murder rates remain stubbornly high along the cocaine highways of Central America, West African crime expands unabated, and in Central Asia, the trade route for heroin from Afghanistan remains under the control of armed groups and opaque political interests. This brief seeks to explain the fundamental errors and misconceptions which ensure that the fight against global crime, while scoring ever more arrests and interdictions, has failed to make headway against trafficking through fragile states. Although progress has been made in understanding how security and justice systems work, Western donors still need to confront the endemic weaknesses of institution-building, the extraordinary allure of the global criminal economy, and the ways that politicians and business systematically collude with traffickers. The brief concludes by listing a series of new policy areas that could underpin a new approach. Above all, these emphasize reducing the receptivity of fragile states to criminal enterprise, staunching violence, and ensuring the gradual build-up of trust, probity and clean business.

Details: The Hague, The Netherlands: The Clingendael Conflict Research Unit, Netherlands Institute of International Relations, 2012. 6p.

Source: CRU Policy Brief #23: Internet Resource: Accessed June 7, 2012 at http://www.humansecuritygateway.com/documents/CRU_CrimeandError.pdf

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 125329


Author: Herbert-Burns, Rupert

Title: Countering Piracy, Trafficking, and Terrorism: Ensuring Maritime Security in the Indian Ocean

Summary: Multiple sources of insecurity afflict many of the countries that rim the Indian Ocean. These challenges include simmering conflicts between Persian Gulf states; terrorism in Pakistan, Sri Lanka, India, and Saudi Arabia; insurgency in Yemen and Iraq; state failure, civil war, and famine in Somalia; high-volume trafficking of drugs from Afghanistan via Pakistan and Iran; and piracy and armed robbery at sea. Not all of these security concerns have occurred at peak intensity at the same time, and thus it is arguable that they have been addressed ‘sufficiently’ on an ‘if and when’ basis. Even so, these risks threaten one of the most critical strategic and trading spaces in the world. The Persian Gulf remains the global market’s most important source of crude oil, while the northern Indian Ocean constitutes a key sector of the globe’s east-west-east trading belt. For this reason, it is all the more remarkable that these issues have not previously caused a greater holistic security breakdown in the Indian Ocean Region (IOR). As trends that have particularly worrisome security implications continue to evolve, it is conceivable that the conflated pressures of insurgent conflict, terrorism, political insecurity, illicit trafficking of all kinds, and piracy and vessel hijacking will outstrip the international and regional community’s ability to effectively respond to those issues in a sustained fashion. Decision-makers must now confront the logic of adopting a ‘management’ approach to these challenges. However, successful management of a security challenge of this magnitude, complexity, and interconnectedness requires policy coherence, imagination, longevity of participation, and considerable resources. Amidst the existential pressures of geopolitical fragility, internal political upheaval, insurgency, famine, and inter-state tensions, there is now a growing danger that the specific threats from terrorism, trafficking, and piracy will not get the resources and policy attention they require, and could therefore increase further in the near term and beyond. The purpose of this paper is to offer a concise appraisal of the current state of the primary maritime security challenges in the IOR, explore in greater detail the evolution of some key trends, and offer some pointers for policymakers and stakeholders as to what solutions and strategy adaptations might be worth considering going forward.

Details: Washington, DC: The Henry L. Stimson Center, 2012. 22p.

Source: Internet Resource: Accessed June 7, 2012 at http://www.stimson.org/images/uploads/research-pdfs/Indian_Ocean_Rising_Chapter_2_1.pdf

Year: 2012

Country: International

Keywords: Maritime Crime (Indian Ocean)

Shelf Number: 125336


Author: Engelke, Peter

Title: The Security of Cities: Development, Environment, and Conflict on an Urbanizing Planet

Summary: Humankind recently crossed an important threshold: over half of all people now live in cities. In contrast to most of human history, cities have become the default condition for human habitation almost everywhere on earth. Our species, in other words, is already an urban one and will become even more so throughout the twenty-first century. Urbanization is proceeding rapidly and at unprecedented scales in Asia, Africa, and the Middle East. Urbanization in Latin America has already reached levels rivaling Europe, North America, and Australia. These trends are ongoing. By 2030, all of the world's developing regions, including Africa, will have more people living in cities than in rural areas. Between 2010 and 2050, the world's urban population is expected to grow by 3 billion people-a figure roughly equal to the world's total population in 1950-with the great majority of these new additions living in developing-world cities. These statistics relay an important truth. During the twenty-first century, cities will increasingly shape social, political, economic, and environmental conditions everywhere on earth. Cities are powerful drivers of environmental change at the local, regional, and global scales. For example, urban processes of all kinds create local water and air pollution. Regionally, cities draw natural resources from far-flung hinterlands (energy, water, wood and forest products, fish, and agricultural products to name only a few). Globally, cities consume 60-80% of all energy used on earth and release about the same share of CO2 into the atmosphere. At the same time, cities and their inhabitants are greatly affected by all of these changes. Local pollution burdens, for example, most often fall heaviest on the poorest residents of poor cities. A city's demand for regional resources places strains on ecosystems hundreds or even thousands of miles distant. Global climate change adds to the mix of problems, increasing coastal flooding risks for low-lying cities, exacerbating urban heat island effects, and increasing the frequency of heat wave-related mass fatalities. Given the swift pace and enormous scale of global urbanization, cities must become an increasingly important part of the foreign and security policy discussions. Urbanization intersects with multiple issues that are well within the environmental security arena, including food security, human security, energy security, climate change, freshwater use, coastal-zone problems, public health and disease, and natural disaster planning and relief from drought, flooding, earthquakes, and storms. It also intersects with more traditional foreign and security issues, including those focused on economic development and trade as well as those focused on violence, conflict, and political instability-civil and international conflict, terrorism, state fragility, and global trafficking in drugs, weapons, and human beings (peonage, sex slavery, etc.).

Details: Washington, DC: Stimson, 2012. 49p.

Source: Working Paper: Internet Resource: Accessed June 13, 2012 at http://www.stimson.org/images/uploads/Cities.pdf

Year: 2012

Country: International

Keywords: Cities and Crime

Shelf Number: 125350


Author: Entorf, Horst

Title: Certainty and Severity of Sanctions in Classical and Behavioral Models of Deterrence: A Survey

Summary: This survey summarizes the classical fundamentals of modern deterrence theory, covers major theoretical and empirical findings on the impact of certainty and severity of punishment (and the interplay thereof) as well as underlying methodological problems, gives an overview of limitations and extensions motivated by recent findings of behavioral economics and discusses ‘rational’ deterrence strategies in subcultural societies.

Details: Bonn, Germany: Institute for the Study of Labor (IZA), 2012. 22p.

Source: IZA Discussion Paper No. 6516: Internet Resource: Accessed June 19, 2012 at http://ftp.iza.org/dp6516.pdf

Year: 2012

Country: International

Keywords: Deterrence

Shelf Number: 125378


Author: Wilson, Anne P.

Title: Trafficking Risks for Refugees

Summary: Refugees are at particular risk for human trafficking – a consequence of their vulnerable status, the devastating losses they have experienced, and their precarious life situations until durable solutions become available. According to the United National High Commissioner for Refugees, trafficking risks for refugees are at ever-increasing levels worldwide. This paper will provide an overview of both the constant and emerging facets of the refugee condition contributing to trafficking risk, and will offer policy and practice recommendations for risk reduction. The perspective offered is that of a national non-profit organization - Lutheran Immigration and Refugee Service - which resettles refugees from around the world in forty-five communities across the United States, serves asylum-seekers and other at-risk migrants in detention, and works with smuggled and trafficked migrant children. LIRS is a national faith-based nonprofit organization, founded in 1939, which works to engage communities in service to and advocacy for migrants and refugees. Our primary expertise in the area of refugees and trafficking comes from two decades of experience working with migrant children, the insights we have gained in serving “women at riskâ€, and our knowledge of the vulnerabilities within refugee populations in the post-resettlement period.

Details: Baltimore, MD: Lutheran Immigration and Refugee Service, 2011. 13p.

Source: Internet Resource: Accessed June 19, 2012 at http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1003&context=humtraffconf3

Year: 2011

Country: International

Keywords: Crime Reduction

Shelf Number: 125353


Author: Machin, Stephen

Title: Youth Crime and Education Expansion

Summary: We present new evidence on the causal impact of education on crime, by considering a large expansion of the UK post-compulsory education system that occurred in the late 1980s and early 1990s. The education expansion raised education levels across the whole education distribution and, in particular for our analysis, at the bottom end enabling us to develop an instrumental variable strategy to study the crime-education relationship. At the same time as the education expansion, youth crime fell, revealing a significant cross-cohort relationship between crime and education. The causal crime reducing effect of education is estimated to be negative and significant, and considerably bigger in (absolute) magnitude than ordinary least squares estimates. The education boost also significantly impacted other productivity related economic variables (qualification attainment and wages), demonstrating that the incapacitation effect of additional time spent in school is not the sole driver of the results.

Details: Bonn, Germany: Institute for the Study of Labor (IZA), 2012. 37p.

Source: IZA Discussion Paper No. 6582: Internet Resource: Accessed June 20, 2012 at http://ftp.iza.org/dp6582.pdf

Year: 2012

Country: International

Keywords: Education

Shelf Number: 125390


Author: Pacula, Rosalie Liccardo

Title: An Alternative Framework for Empirically Measuring the Size of Counterfeit Markets

Summary: NBER Program(s): PE This paper develops a new method for estimating trends in the size of counterfeit markets. The method draws on principles of microeconomic theory and uses aggregated product-level data to estimate counterfeiting activities in various geographic markets. Using confidential firm unit forecasts and actual sales information, a two stage approach is employed that first accounts for unexpected but observable factors that could lead to forecasting error and then, in the second stage, considers the influence of market susceptibility to IPR infringement. Data are analysed for 45 related products sold by a single firm operating in 16 countries during the period 2006-2011. Our models predict larger amounts of counterfeiting in countries with higher corruption norms, lower government control and effectiveness. Predictions of the level of counterfeiting obtained from the second stage are then compared to estimates of counterfeiting derived internally by the firm using shadow-shopping methods. While our two stage model generally under-predicts the level of counterfeiting in each year, it generates trends in counterfeiting that are broadly consistent with those obtained using more costly and intensive methods.

Details: Cambridge, MA: National Bureau of Economic Research, 2012. 36p.

Source: Internet Resource: NBER Working Paper No. 18171: Accessed June 26, 2012 at: http://papers.nber.org/papers/w18171?utm_campaign=ntw&utm_medium=email&utm_source=ntw

Year: 2012

Country: International

Keywords: Counterfeit Goods

Shelf Number: 125395


Author: Losel, Friedrich A.

Title: Strengthening Transnational Approaches to Reducing Reoffending: Final Report

Summary: The STARR Cambridge Team has produced six research products, comprising three systematic reviews and three questionnaire surveys. These products have focused on interventions to reduce reoffending among three offence categories, respectively: young offenders, domestic violence perpetrators, and substance abusing offenders. The questionnaire survey also gathered additional information on interventions to reduce reoffending among alcohol abusing offenders. The three systematic reviews investigated the current state of European evidence on programmes to reduce reoffending in each of the three primary offence categories under STARR’s purview. The questionnaire surveys clarified our understanding of what is currently practiced throughout Europe in reoffending programmes. We summarise the key conclusions from each of our primary research outputs below. Readers seeking further elaboration of the methods, processes, and outcomes are referred to the corresponding Appendices. In addition to conducting primary research, the Cambridge Team has made various other contributions to the STARR project: 1. support of the project partners in the design and execution of a series of focus groups on obstacles to programme evaluation; 2. provision of research guidance and expertise in the execution of the STARR project partners’ pilot projects in Bulgaria, Hungary, and France; 3. assistance in the organisation of the STARR seminars and conferences; 4. lectures at all STARR conferences; and 5. facilitation of group workshops at three STARR conferences and seminars. Furthermore, we have bolstered STARR’s international presence by disseminating selected findings in invited plenary lectures at a number of conferences; e.g., at the International Prisons and Corrections Conference at Ghent, Belgium (2010), International Conference of Psychology and Law at Miami, USA (2011), and the Summit of the Chinese Criminological Society at Hangzhou, China (2011).

Details: Cambridge, UK: Institute of Criminology, University of Cambridge, 2012(?). 158p.

Source: Internet Resource: Accessed June 28, 2012 at: http://www.cepprobation.org/uploaded_files/Rep%20STARR%20ENG.pdf

Year: 2012

Country: International

Keywords: Alcohol Abuse

Shelf Number: 125369


Author: Zywiec, Dawn Marie

Title: Women Trafficking Women and Children: An Exploratory Study of Women Sex Traffickers

Summary: There is little published literature on female sex traffickers in the United States. The purpose of this research was to explore the lived experiences of women sex traffickers. Method: This qualitative study primarily drew on in-depth, interpretive feminist methodology. Seven women offenders were interviewed twice for 90 minutes, from three different prisons. Six of the women were sex offenders. Narratives were analyzed and themes constructed. Through ongoing dialogue, the researcher was able to find meaning in, and to describe the women’s experiences. Although each woman’s experience was unique, there were commonalities in their narratives. Findings: Four themes emerged from the data analysis: pathways to prison, prison culture and experience, views towards victims, and giving back. The co-offender typology was the primary theme that emerged from the analysis of the transcripts. Fearing abandonment, most of the participants felt pressured by male partners to traffic children and commit other sexual offenses, often against their own children. Conclusion: Grounded in participants’ experiences, this study contributes to defining sex trafficking in a broader network and structure of oppression. The in-depth, descriptive findings of this research will hopefully expand anti-sex trafficking campaign prevention, and awareness knowledge.

Details: Carbondale, ILL: Southern Illinois University Carbondale, 2012. 233p.

Source: Internet Resource: Dissertation: Accessed June 28, 2012 at: her.siu.edu/dissertations/DZywiec.doc

Year: 2012

Country: International

Keywords: Female Sex Traffickers

Shelf Number: 125425


Author: U.S. Government Accountability Office

Title: Foreign Police Assistance: Defined Roles and Improved Information Sharing Could Enhance Interagency Collaboration

Summary: In April 2011, we reported that the United States provided an estimated $3.5 billion for foreign police assistance to 107 countries during fiscal year 2009. We agreed to follow up that report with a review of the extent to which U.S. agencies evaluated and coordinated their foreign police assistance activities. As such, this report (1) updates our analysis of the funding U.S. agencies provided for foreign police assistance during fiscal years 2009 through 2011, (2) examines the extent to which DOD and State/INL assess or evaluate their activities for countries with the largest programs, and (3) examines the mechanisms U.S. agencies use to coordinate foreign police assistance activities. GAO focused on DOD and State because they have the largest foreign police assistance programs. GAO analyzed program and budget documents and interviewed officials from DOD, State, Energy, the U.S. Agency for International Development, Justice, the Treasury, and Homeland Security. GAO recommends that (1) NSC complete its efforts to define agency roles and responsibilities, and (2) the Secretaries of Defense and State establish mechanisms to better share and document information among various U.S. agencies. NSC provided technical comments, but did not comment on our recommendation. DOD concurred and State partially concurred, noting the importance of interagency collaboration.

Details: Washington, DC: GAO, 2012. 67p.

Source: Internet Resource: GAO-12-534: Accessed June 29, 2012 at: http://gao.gov/assets/600/590747.pdf

Year: 2012

Country: International

Keywords: Foreign Police

Shelf Number: 125432


Author: West, Andy

Title: City Kids: Urbanisation and Its Consequences for Children’s Right to be Protected from Abuse, Neglect, Exploitation and Violence

Summary: During the second half of the 20th century the process of urbanisation has accelerated in developing countries. Over half of the world’s population – including a billion children – are now estimated to live in urban areas. This recent change from a predominantly rural to a majority urban population has implications for the protection of children from all forms of violence. Rising urban poverty deprives hundreds of millions of children of even basic services, particularly education, healthcare and child protection services. But to date, this has not been a priority on the migration, urbanisation and development agenda of local governments, international agencies or organisations focused on children’s welfare. This discussion paper focuses on urbanisation and its consequences for children’s right to be protected from abuse, neglect, exploitation and violence, and the importance of mainstreaming children’s needs into the routine practices of local governments. It highlights some of Save the Children’s child protection work in the context of urbanisation, notably in Ethiopia, South Africa, Romania, China, Bangladesh, Colombia, Libya, Bosnia & Herzegovina, Vietnam, and Latin America & the Caribbean. The paper also makes some important conclusions and points to the way forward.

Details: Save the Children, 2012. 21p.

Source: Internet Resource: Accessed June 29, 2012 at: http://resourcecentre.savethechildren.se/content/library/documents/city-kids-urbanisation-and-its-consequences-children%E2%80%99s-right-be-protected-

Year: 2012

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 125435


Author: Corlett, D.

Title: Captured Childhood: Introducing a New Model to Ensure the Rights and Liberty of Refugee, Asylum Seeker and Irregular Migrant Children Affected by Immigration Detention

Summary: This document explores the treatment of migrant, refugee, and asylum seeking children in detention facilities around the world. It presents the Child-sensitive Community Assessment and Placement model to help countries improve preventative measures against child detention and details good practice examples. This model is a 5-step process to avoid the detention of refugee, asylum seeker and irregular migrant children. It concludes with recommendations which promote the strengthening of community support and protection of migrant children on both national and international levels.

Details: Melbourne: International Detention Coalition, 2012. 114p.

Source: Internet Resource: Accessed June 29, 2012 at: http://www.ipjj.org/fileadmin/data/documents/strategies_planning/IDC_CapturedChildhoodImmigrationDetention_2012_EN.pdf

Year: 2012

Country: International

Keywords: Illegal Aliens

Shelf Number: 125438


Author: Wong, Jennifer

Title: Effectiveness of Street Gang Control Strategies: A Systematic Review and Meta-Analysis of Evaluation Studies

Summary: This systematic literature review and meta-analysis of evaluation studies on street gang control strategies focused on articles and reports from multiple bibliographic databases. The database search resulted in a total of 2,060 hits. Of the 297 studies that were examined, only 38 were retained for the systematic review after all screening procedures and inclusion criteria were applied. This list of studies was classified into a typology of five broad categories of street gang control strategies, including: 1) prevention, 2) gang activity regulation, 3) justice system based intervention, 4) comprehensive, and 5) holistic. A quantitative synthesis of program outcomes could not be undertaken because of the difficulty in pooling together studies that were incommensurate; it was considered substantively meaningless to produce a summary effect. Instead, a systematic review was undertaken. The systematic review of street gang control strategy evaluation studies revealed that findings in regard to effectiveness were not encouraging, especially for studies evaluating general prevention, and gang membership prevention programs. Overall, it was found that the more specific the targeted population, the more evaluations tended to show signs of effectiveness. Gang activity suppression programs was the only category of approaches in which evaluations found consistent positive outcomes. It was also found that the more chronic the gang problem, the more effective gang activity suppression approaches. None of the evaluations of comprehensive and holistic programs produced any strong evidence in terms of effectiveness. Probably the most surprising finding in this report concerned the Spergel Model, which was shown to be ineffective mostly due to implementation fidelity. Three major recommendations concerning gang control strategies were discussed: the need for consistent independent evaluations applying scientific methodologies; programs should be built on empirical research findings and not intuition or common sense; and evaluations should be an integral part of the implementation process of a program.

Details: Ottawa: Public Safety Canada, 2012. 76p.

Source: Internet Resource: Accessed July 2, 2012 at: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-121-2012-eng.pdf

Year: 2012

Country: International

Keywords: Gang Control Strategies

Shelf Number: 125446


Author: Rolles, Steve

Title: The Alternative World Drug Report: Counting the Costs of the War on Drugs

Summary: The Alternative World Drug Report, launched to coincide with publication of the UN Office on Drugs and Crime’s 2012 World Drug Report, exposes the failure of governments and the UN to assess the extraordinary costs of pursuing a global war on drugs, and calls for UN member states to meaningfully count these costs and explore all the alternatives. After 50 years of the current enforcement-led international drug control system, the war on drugs is coming under unparalleled scrutiny. Its goal was to create a "drug-free world". Instead, despite more than a trillion dollars spent fighting the war, according to the UNODC, illegal drugs are used by an estimated 270 million people and organised crime profits from a trade with an estimated turnover of over $330 billion a year – the world’s largest illegal commodity market. In its 2008 World Drug Report, the UNODC acknowledged that choosing an enforcement-based approach was having a range of negative "unintended consequences", including: the creation of a vast criminal market, displacement of the illegal drugs trade to new areas, diversion of funding from health, and the stigmatisation of users. It is unacceptable that neither the UN or its member governments have meaningfully assessed these unintended consequences to establish whether they outweigh the intended consequences of the current global drug control system, and that they are not documented in the UNODC’s flagship annual World Drug Report. This groundbreaking Alternative World Drug Report fills this gap in government and UN evaluations by detailing the full range of negative impacts resulting from choosing an enforcement-led approach.

Details: Count the Costs.org, 2012. 111p.

Source: Internet Resource: Accessed July 2, 2012 at: http://www.countthecosts.org/sites/default/files/AWDR.pdf

Year: 2012

Country: International

Keywords: Costs of Crime

Shelf Number: 125458


Author: Freeman, Michael

Title: Gangs and Guerrillas: Ideas from Counterinsurgency and Counterterrorism

Summary: In a discussion at the Naval Postgraduate School in Monterey, California, it became apparent that there were many similarities between insurgent behavior and gang behavior – similarities that would make a more rigorous analysis worthwhile. With this theme in mind, the faculty of the Defense Analysis Department at the Naval Postgraduate School, experts in counterinsurgency and counterterrorism operations, were enlisted to address these similarities and to share their theories, models, and ideas from their own disciplines of political science, sociology, anthropology, international relations, and more. This collection of short papers is the result.

Details: Monterey, CA: Naval Postgraduate School, 2011. 108p.

Source: Internet Resource: Accessed July 3, 2012 at: http://edocs.nps.edu/npspubs/scholarly/TR/2011/NPS-DA-11-001.pdf

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 125465


Author: Thoms, Kristen

Title: Development of DNA Analysis for Forensic Animal Investigations

Summary: DNA Analysis has been an important tool for forensic investigations, used to scientifically link an individual to a crime, and provide statistical relevance to the possibility that any other person could have contributed that biological evidence. This analysis has predominantly focused on human biological evidence, but animal-sourced evidence can provide equally compelling information to an investigation. Such analysis could be useful in cases that involve trace transfer of animal hairs (such as from a pet of the perpetrator onto a victim), cases that involve an animal directly (such as a animal cruelty cases), or cases that involve wildlife (such as the trade of endangered animal parts). Studies show that ~50% of US households contain a dog or cat, and that wildlife trade is estimated at $20 billion a year. However, animal DNA evidence has been used in only a small number of courtroom cases. This research seeks to outline the potential, limitations, and necessary development in research and technology to apply DNA analysis to animal evidence.

Details: Fairfax, VA: George Mason University, 2012. 55p.

Source: Internet Resource: Thesis: Accessed July 3, 2012 at: http://digilib.gmu.edu:8080/dspace/handle/1920/7883

Year: 2012

Country: International

Keywords: Animal Investigations

Shelf Number: 125466


Author: Lee, Samuel

Title: Human Trafficking and Regulating Prostitution

Summary: The effect of prostitution laws on human trafficking and voluntary prostitution is subject to debate. We argue theoretically that neither legalization nor criminalization can simultaneously protect voluntary prostitutes and unambiguously reduce trafficking. We propose an alternative, “hybrid†policy that achieves both objectives and restores the free market outcome that arises in the absence of trafficking: legal, strictly regulated brothels combined with severe criminal penalties for johns who buy sex outside of them. If a regulator wants to eradicate all prostitution instead, the optimal policy criminalizes all johns. Criminalizing prostitutes is ineffective and unjust because it fails to eradicate trafficking and penalizes victims. We consider cross-border trafficking, sex tourism, social norms, and political support for prostitution laws. The model predicts that the female-male income ratio is a key determinant of how much prostitution is involuntary, the consequences of prostitution laws, and the political will to enact or enforce them.

Details: New York: Stern School of Business, New York University, 2012. 46p.

Source: Internet Resource: Accessed July 5, 2012 at: http://web-docs.stern.nyu.edu/old_web/economics/docs/workingpapers/2012/LeePersson_HumanTraffickingandRegulatingProstitution.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 125471


Author: Wortley, Scot

Title: Identifying Street Gangs: Definitional Dilemmas and Their Policy Implications

Summary: The study of gangs in general – and street gangs in particular – has been plagued by the lack of a common gang definition.  Definitional issues have also had a negative impact on gang suppression and prevention activities.  The various criteria used to define street gangs have included: (1) age (i.e., members must be adolescents or young adults); (2) the existence of a group name; (3) distinctive group symbols or defining insignia (tattoos, colours, etc.); (4) control of a specific territory or turf; (5) group organization (i.e., leaders and followers); (6) number of members (most definitions require at least three members); (7) durability or stability (must exist as a social entity for a specified period of time); (8) formal or informal gang rules; (9) initiation rituals for new gang members; (10) street orientation (gang activities are conducted away from the home, work or school); (11) regular and/or continuous group involvement in crime, violence or delinquency; and 12) common ethnic or racial background.  Most experts agree that criminal behaviour should be a standard gang criterion. Agreement over other gang criteria has not been established.  How gangs are defined will have a major impact on how many gangs, gang members and gang-related crimes are identified within specific communities. The larger the number of criteria that have to be met, the smaller the gang count is going to be.  There is also a debate concerning how gangs and gang members should be identified. Some argue that only the police and other criminal justice experts have the necessary experience. Others have argued that we should only rely on information from self-identified gang members. Both arguments have their merits.  Many people have argued that there is a need for a standard gang definition. Advocates claim that a standard definition would: (1) enable accurate national, provincial and municipal estimates of gang activity; (2) improve our ability to make regional comparisons; (3) help document the risk-factors associated with gang activity within specific jurisdictions; (4) help document the amount of public funding needed to tackle gang problems within specific jurisdictions; (5) enable law enforcement officials from different jurisdictions to communicate in the same “language†and produce a common understanding of gangs, gang members and gang-motivated crime; and (6) improve the quality of gang investigations that involve police services from different regions.  It has also been argued that a standard gang definition would also help policy-makers determine the relative effectiveness of various law enforcement and gang prevention programs operating within different jurisdictions.  The Eurogang consortium, unlike its North American counterparts, has already reached a consensus regarding the definition of a gang.  The Eurogang consortium distinguish between “gang definers†and “gang descriptors.†Definers are the elements or criteria that characterize a group as a gang. Describers, on the other hand, are group characteristics or variables that can help distinguish one gang from another.  According to the Eurogang philosophy, a gang definition should not be influenced by group characteristics that are only “descriptors.†Descriptors include things like the gender or ethnic composition of the gang, whether the group has a name, territory or turf, patterns of criminal activity, the presence or absence of gang symbols or colours, gang argot, the level of group organization, initiation rituals, etc.  Taking the lead from the Eurogang example, this paper proposes the following gang definition: A gang is a group of three or more individuals that has existed for at least one month and engages in criminal activity on a regular basis. Gang-related crime can be conducted within the group context or by individual gang members in isolation -- as long as such criminal activity, directly or indirectly, benefits the gang.

Details: Ottawa: Organized Crime Division, Law Enforcement and Policy Branch, Public Safety Canada, 2010. 34p.

Source: Internet Resource: Accessed July 5, 2012 at: http://publications.gc.ca/collections/collection_2012/sp-ps/PS4-115-2011-eng.pdf

Year: 2010

Country: International

Keywords: Street Gangs

Shelf Number: 125474


Author: Ram, Christopher D.

Title: Meeting the Challenge of Crime in the Global Village: An Assessment of the Role and Future of the United Nations Commission on Crime Prevention and Criminal Justice

Summary: This book examines recent developments in the evolution of crime at the domestic and transnational level, the pressures that these have exerted on domestic law and policy and national sovereignty, and the effectiveness of the United Nations Commission on Crime Prevention and Criminal Justice as a collective response to those pressures. At the time of writing (April - December of 2011) the Commission, which was established in 1992, is in its 20th year, and a re-assessment is in order. In order to evaluate the effectiveness of the Commission, it is necessary to first assess the various functions it performs, whether by design or not, and the value of these functions to the Member States individually and the international community as a whole. This is more complex than it may seem, because effectiveness is largely in the eye of the beholder and must inevitably be assessed as against the expectations of the many different constituencies it serves, which are defined not only by national or regional economic, political or other substantive interests but also in terms of the diplomatic, criminological, security, development and intergovernmental, governmental or non-governmental lenses through which various participants perceive the Commission and its work. In this context, the book then considers developments of the past two decades and the perspectives of various constituencies on what has worked and what has not. It concludes that the benefits of the Commission and the work it mandates are, while often abstract, long-term and difficult to quantify, substantial when compared with the relatively small investment it demands from the Member States. At the 20th session, held in April 2011, the frustrations of many delegations appeared to crystallise in a new will to adopt procedural reforms, which bodes well for the future, but the Commission was also advised of major resource limits that will reduce the documentation by the Commission of its work, which bodes ill. These and other recent developments will be considered with a view to developing ideas and proposals for the future.

Details: Helsinki: European Institute for Crime Prevention and Control, affiliated with the United Nations (HEUNI), 2012. 144p.

Source: Internet Resource: Publication Series No. 73: Accessed July 5, 2012 at: http://www.heuni.fi/Satellite?blobtable=MungoBlobs&blobcol=urldata&SSURIapptype=BlobServer&SSURIcontainer=Default&SSURIsession=false&blobkey=id&blobheadervalue1=inline;%20filename=HEUNI%20report%2073%20final%2028022012.pdf&SSURIsscontext=Satellite%20Server&blobwhere=1331736235201&blobheadername1=Content-Disposition&ssbinary=true&blobheader=application/pdf

Year: 2012

Country: International

Keywords: Crime Prevention

Shelf Number: 125477


Author: Bekkevold, Jo Inge

Title: Anti-Piracy and Humanitarian Operations

Summary: Given the last decade's maritime cooperation in humanitarian assistance and disaster relief (HADR) operations after the 2004 tsunami and the 2011 earth quake and tsunami in Japan, and the last years' anti-piracy efforts off-Somalia and elsewhere, the first workshop on “Anti-Piracy and Humanitarian Operations†was a timely and important event. The first paper by a team of Norwegian scholars and naval officers assesses Norway’s contribution to multilateral anti-piracy missions in the Indian Ocean and Somalia. The paper by Bernard Cole, professor at the US National War College, is an analysis of several recent US HADR operations in the Asia-Pacific region. Sarabjeet Singh Parmar, research fellow at the Institute for Defence Studies and Analyses (IDSA), New Delhi, discusses the importance of HADR operations in India’s National Strategy. The last paper by Øystein Tunsjø, associate professor at the Norwegian Institute for Defence Studies, adresses the impact of recent and future maritime developments in Asia on Norwegian security.

Details: Oslo: Norwegian Institute for Defence Studies, 2012. 79p.

Source: Internet Resource: Accessed July 9, 2012 at: http://ifs.forsvaret.no/publikasjoner/IOS/Sider/IOS_1_2012.aspx

Year: 2012

Country: International

Keywords: Maritime Crime

Shelf Number: 125512


Author: Barnett, Laura

Title: Prostitution: A Review of Legislation in Selected Countries

Summary: This paper reviews the key legislative approaches to prostitution in a number of Western jurisdictions. In particular, it examines the specific laws and/or regulations these countries and states have instituted, and how they have fared in meeting their objectives.

Details: Ottawa: Legal and Legislative Affairs Division, Parliamentary Information and Research Services, 2011. 32p.

Source: Internet Resource: Background Paper: Accessed July 9, 2012 at: http://www.parl.gc.ca/Content/LOP/ResearchPublications/2011-115-e.pdf

Year: 2011

Country: International

Keywords: Prostitutes

Shelf Number: 125517


Author: Bridges, Malinda

Title: What's Best For Women: Examining the Impact of Legal Approaches to Prostitution in Cross-National Perspective and Rhode Island

Summary: This research analyzes legal approaches to prostitution on a cross-­â€national level in order to determine if legal methods that regulate prostitution have an effect on prostitution. In order to examine these concepts we first identify the legal approaches in the United States, Germany, the Netherlands, and Sweden. Following this analysis, the effects of these legal approaches are reported. Instead of working from a strictly sociological standpoint, this project focused greatly on the legal aspects that affect prostitution. This paper shows that legal approaches to prostitution do not have as great an impact on prostitution numbers as might be expected. There are also concerns about the validity of prior research on prostitution. From observing prostitution arrest data, it is possible to conclude that although indoor prostitution has been criminalized, there has been little change in the number of arrests for engaging in prostitution and virtually no change in arrests for promoting and assisting in prostitution. Advertising for sexual services in Rhode Island still exists. This leads to the conclusion that the legal changes to the prostitution laws in Rhode Island have not greatly impacted the prevalence of prostitution. In realizing this, I seek to revise theory, which is tied to prohibitionist approaches, specifically deterrence theory. This study concluded that more reliable research needs to be done in order to gather accurate numbers on the amount of prostitutes. Moreover, reconsidering traditional views on deterrence theory may lead to the reduction of prostitution. While legal approaches to prostitution may have some effect on prostitution prevalence, non-­â€legal solutions, such as partnerships between government and non-­â€profit agencies, which provide healthcare, employment training, mental and emotional support services, substance abuse treatment, safe sex supplies and court diversionary services may have a greater impact.

Details: Providence, RI: Rhode Island College, 2012. 65p.

Source: Internet Resource: Honors Projects Overview, Paper 54: Accessed july 9, 2012 at: http://digitalcommons.ric.edu/cgi/viewcontent.cgi?article=1055&context=honors_projects&sei-redir=1&referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3Dmalinda%2520bridges%2520%2522what%27s%2520best%2520for%2520women%2522%26source%3Dweb%26cd%3D1%26ved%3D0CEYQFjAA%26url%3Dhttp%253A%252F%252Fdigitalcommons.ric.edu%252Fcgi%252Fviewcontent.cgi%253Farticle%253D1055%2526context%253Dhonors_projects%26ei%3Drjv7T5yWDOrr6QHg_bDXBg%26usg%3DAFQjCNGudYPAUeirZWU_KU-Qz6DYfeV1DA#search=%22malinda%20bridges%20whats%20best%20women%22

Year: 2012

Country: International

Keywords: Prostitutes

Shelf Number: 125525


Author: Santos, Rita

Title: Women and Gun Violence: Key Findings from Rio de Janeiro (Brazil), San Salvador (El Salvador) and Maputo (Mozambique)

Summary: Since men constitute the majority of those who use and are victimised by guns worldwide, prevention and combat policies and programmes have been aimed almost exclusively at men and boys, paying scant attention to the roles and impacts of gun violence on women and girls. However, the continuum of violence experienced by women and girls in these contexts is a synthesis of the main social ingredients of violence and its cultural basis. Thus, alongside sound knowledge of men’s and boys’ involvement in gun violence, a clear understanding of women’s and girls’ needs, rights and vulnerabilities is essential to reduce gun violence in general. This report aims to contribute to fill this gap. This report will concentrate on the analysis of the typologies and motivations for the involvement of women and girls in armed violence (as direct agents who actively participate, or indirect agents who play supporting roles such as in the transportation of firearms, drugs or information), and identify the importance and symbolism which they attribute to firearms; the examination of the direct consequences (death and injuries) and some of the indirect effects of armed violence on the lives of women (guns as instruments of intimidation and sources of insecurity in situations of domestic violence as well as determinants for the condition of survivors or relatives of lethal victims of gun violence); the initiatives, formal and informal, led by women in these contexts in response to gun violence, namely efforts to improve arms control regulations.

Details: Brussels: Peace Studies Group, 2011. 32p.

Source: Internet Resource: Accessed july 10, 2012 at: http://www.ifp-ew.eu/pdf/IfPEW20110501WomenAndGunViolence.pdf

Year: 2011

Country: International

Keywords: Arms Control

Shelf Number: 125532


Author: Durch, William J.

Title: Understanding Impact of Police, Justice and Corrections Components in UN Peace Operations

Summary: Over the last decade or so, the UN Security Council gave complex UN peace operations broader mandates in police development, followed by mandates to help restore criminal justice systems and eventually for advisory support to national prison systems. The UN's rule of law community recognizes that an emphasis on quality of people and plans, what the UN calls a "capability-based approach," has to replace a quantity-based approach to meeting the requirements of such mandates. The Stimson Center's Future of Peace Operations Program responded to a request from the Office of Rule of Law and Security Institutions (OROLSI) in DPKO, coordinating with its Police Division and Criminal Law and Judicial Advisory Service (CLJAS), to study the effects, or more specifically, the impact that police, justice and corrections components in UN peace operations have on the areas in which they work. The study was set up to search for "minimum essential tasks" - those that 1) always seem needed in comparable ways across missions; and 2) seem to consistently have the desired effects on the host country's approach to police, justice and corrections. It found that while certain tasks may always be needed, their implementation is often dependent on characteristics of a mission's operational environment over which the mission cannot exert direct control. Missions face perhaps irresolvable dilemmas in being asked to deploy quickly into places where politics can prevent the quick actions that peacebuilding precepts dictate, or with resources inadequate to substitute for capacities that government lacks. That is, they often have resources sufficient to offer some security and stability but not sufficient for very much else. The study identifies areas where the imprints left by the police, justice and corrections components of UN missions are larger than those of other players and offers recommendations for those components.

Details: Washington, DC: Future of Peace Operations Program, The Stimson Center, 2012. 137p.

Source: Internet Resource: Accessed July 11, 2012 at: http://www.stimson.org/images/uploads/research-pdfs/Stimson_Police_Justice_and_Corrections_Impact_Report_FW_small.pdf

Year: 2012

Country: International

Keywords: Criminal Justice Systems

Shelf Number: 125536


Author: Wyler, Liana Sun

Title: Trafficking in Persons: International Dimensions and Foreign Policy Issues for Congress

Summary: Trafficking in persons, or human trafficking, refers to the subjection of men, women, and children to exploitative conditions that can be tantamount to slavery. Reports suggest that human trafficking is a global phenomenon, victimizing millions of people each year and contributing to a multi-billion dollar criminal industry. It is a centuries-old problem that, despite international and U.S. efforts to eliminate it, continues to occur in virtually every country in the world. Human trafficking is also an international and cross-cutting policy problem that bears on a range of major national security, human rights, criminal justice, social, economic, migration, gender, public health, and labor issues. The U.S. government and successive Congresses have long played a leading role in international efforts to combat human trafficking. Key U.S. foreign policy responses include the following: • Foreign Country Reporting to describe annual progress made by foreign governments to combat human trafficking, child soldiers, and forced labor. • Foreign Product Blacklisting to identify goods made with convict, forced, or indentured labor, including forced or indentured child labor. • Foreign Aid to support foreign countries’ efforts to combat human trafficking. • Foreign Aid Restrictions to punish countries that are willfully noncompliant with anti-trafficking standards. • Conditions on Trade Preference Program Beneficiaries to offer certain countries export privileges to the United States, only if they also adhere to international standards against forced labor and child trafficking. • Preventing U.S. Government Participation in Trafficking Overseas to punish and deter trafficking-related violations among U.S. government personnel and contractors. Although there is widespread support among policy makers for the continuation of U.S. antitrafficking goals, ongoing reports of such trafficking worldwide raise questions regarding whether sufficient progress has been made to deter and ultimately eliminate the problem, the end goal of current U.S. anti-trafficking policies. This report explores current foreign policy issues confronting U.S. efforts to combat human trafficking, the interrelationship among existing polices, and the historical and current role of Congress in such efforts. The 112th Congress has introduced and taken action on several bills related to human trafficking, including bills to reauthorize the Trafficking Victims Protection Act (TVPA), the cornerstone legislative vehicle for current U.S. policy to combat human trafficking, beyond FY2011 (S. 1301, H.R. 2830, and H.R. 3589). Given recent challenges in balancing budget priorities, the 112th Congress may choose to consider certain aspects of this issue further, including the effectiveness of international anti-trafficking projects, interagency coordination mechanisms, and the monitoring and enforcement of anti-trafficking regulations, particularly as they relate to the activities of U.S. government contractors and subcontractors operating overseas.

Details: Washington, DC: Congressional Research Service, 2012. 36p.

Source: Internet Resource: CRS Report R42497: Accessed July 11, 2012 at: http://www.fas.org/sgp/crs/row/R42497.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 125541


Author: Bate, Roger

Title: The Deadly World of Fake Drugs

Summary: The burden of fake and substandard drugs is not evenly distributed across the globe. Even where reporting systems are weak and the media is not free, most reported instances of substandard medicines occur in poorer countries, where poor regulation allows criminals to easily infiltrate weak supply chains. Although rich nations face fewer breakdowns in their regulation and supply systems, they are certainly not safe from this threat. This document provides a plethora of examples of the manufacture, sale, and distribution of fake and substandard drug examples from all over the world. Where possible, data has been summarized to report problems at the continental, regional and national levels. Although no comprehensive data on the magnitude of the counterfeit drug trade exists, this document illustrates the breadth, depth, and danger of the problem globally. Many of these examples were compiled from local news sources. Countries without a free press may not appear at all in the following pages, but it is doubtful that the lack of evidence reflects an inconsequential number of substandard drugs. It is much more likely that these locations have a major problem with counterfeit and substandard drugs but data for these locations are simply unavailable. Evidence we do have suggests that counterfeit products are as much a problem in locations without a free press as they are elsewhere. In fact, in some countries like North Korea, counterfeiting operations are part of a vast, government-sponsored enterprise. Some stories of major counterfeiting rings involve numerous countries. Since the reader may only be interested in a specific countries, key statistics from the study are quoted in each location they pertain to, resulting in some overlap. Finally, because of the nature of the literally hundreds of sources cited in this section, it is inevitable that there will be a confusion of definitions. What one reporter, government agency, police statement, pharmaceutical company, academic researcher and others may call a fake product, their peers may not. For this reason, the reports in this chapter should not be viewed as necessarily comparable. In some instances it is possible to tell the claims made apart but overall it is not, and therefore is rarely attempted. With this major caveat in mind, this document hopefully provides a useful detail of the widespread and dangerous nature of dangerous medicines.

Details: Washington, DC: American Enterprise Institute, 2012. 145p.

Source: Internet Resource: Accessed July 11, 2012 at: http://www.aei.org/files/2012/02/27/-appendix-a-master-2_170026856632.pdf

Year: 2012

Country: International

Keywords: Counterfeit Medicines

Shelf Number: 125547


Author: Waltman, Max

Title: The Ideological Obstacle: Charging Pornographers for Sexual Exploitation

Summary: Prostitution is a social practice where money is paid for sex. Social science research and other evidence suggest that the sex in pornography is generally supplied by persons who share similar unequal, exploitative, and coercive life circumstances as those who are prostituted generally share. Given that these conditions are similar, there appears to be little reason why the pornography industry should not be subjected to the same legal scrutiny as prostitution per se, as it could have extremely important implications for the population who are exploited in the sex industry. Thus, this paper inquires into the legal, political, and ideological obstacles to address the harmful exploitation of persons in the pornography industry by applying prostitution laws against pimps and other third parties to its production, finding that the obstacles to application are not legal but ideological and political. The paper takes a political science approach to constitutional issues, laws, legislative and judicial politics, drawing from political theory by authors such as Kimberle Crenshaw (intersectionality), Iris Marion Young (groups and inequality), Jane Mansbridge (representation), Ian Shapiro (constitutional politics), Laurel Weldon and Mala Htun (social movements and inequality). Sweden is selected as a case study, having been the first jurisdiction (1999) in the world that identified prostitution as a form of sex inequality related to gender-based violence, with pimps and johns as central in the cycle of exploitation and abuse - a legal approach more consistent with empirical evidence than conventional approaches viewing prostitution per se as either a moral crime of indecency, or a non-exploitative and tolerable work. Some comparative discussions are entertained throughout, with references to Canada, the United States, and international law.

Details: Stockholm: Department of Political Science, Stockholm University, 2012. 64p.

Source: Internet Resource: Working Paper presented at the Midwest Political Science Association Conference, Chicago IL, April 11-15, 2012 : Accessed July 13, 2012 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2050290

Year: 2012

Country: International

Keywords: Pornography

Shelf Number: 125614


Author: Miller, Frank

Title: Keep It Legal: Best Practices for Keeping Illegally Harvested Timber Out of Your Supply Chain

Summary: This manual has been developed by WWF’s Global Forest & Trade Network (GFTN) for use by organizations wishing to extend a program of responsible purchasing to further address difficulties arising from possible trade in “illegal†forest products. The manual has been developed to add detail to legality issues encountered by companies adopting a responsible purchasing program. The Keep It Legal manual is a living document, so it will be regularly updated using feedback from users to provide new information about what is happening in major exporting countries and in the critical supply regions, developments in supply chain management, and the wider global debate on the prevention of illegal logging. The Keep it Legal Manual is presented in five parts: Introduction—describes the purpose of this manual and its relationship to the GFTN guide to Responsible Purchasing of Forest Products. The illegal logging problem—describes the nature and magnitude of the illegal logging problem and the threat it poses to forests and the people and businesses that depend on them. Developing policies on legal compliance— explains the challenges involved in developing a clear, fair, and realistic policy on legal compliance. Reducing the risk of trading illegal timber— details a systematic approach to identifying and eliminating the risk of illegal wood entering your supply chain. Appendices—various practical tools that you can adapt for use in your company. The principles outlined in this manual are in line with WWF Global Forest & Trade Network (GFTN) participation requirements, and the manual will support GFTN trade participants in meeting those requirements. WWF has produced this manual with the intention that it should become the first point of reference for all parts of the timber supply chain seeking to establish what represents current best practice with respect to buying, processing, and selling legal timber and timber products. It consolidates the efforts of many different parties, including those companies at the forefront of efforts to avoid use of illegally harvested timber. The manual is aimed at any medium-size or large enterprise that purchases forest products, including processors, importers, manufacturers, wholesalers, and retailers. It may also be useful to smaller enterprises. The manual outlines the various ways in which purchasing organizations can demonstrate compliance with best practice and ultimately their own purchasing policies. It combines tried and tested mechanisms and new approaches and definitions, based upon on GFTN’s exetensive experience in the development of responsible purchasing programs. These approaches are designed to make the process of “keeping it legal†easier.

Details: Gland, Switzerland: World Wildlife Fund, 2006. 64p.

Source: Internet Resource: Accessed July 16, 2012 at: assets.panda.org/downloads/keep_it_legal_final_no_fsc.pdf

Year: 2006

Country: International

Keywords: Forests

Shelf Number: 125625


Author: United Nations Office on Drugs and Crime

Title: World Drug Report 2012

Summary: About 230 million people, or 5 per cent of the world’s adult population, are estimated to have used an illicit drug at least once in 2010. Problem drug users number about 27 million, which is 0.6 per cent of the world adult population. Throughout the world, illicit drug use appears to be generally stable, though it continues to be rising in several developing countries. Heroin, cocaine and other drugs kill around 0.2 million people each year, shattering families and bringing misery to thousands of other people. Illicit drugs undermine economic and social development and contribute to crime, instability, insecurity and the spread of HIV. Global opium production amounted to 7,000 tons in 2011. That is more than a fifth less than the peak of 2007 but an increase from the low level of 2010, the year in which a plant disease destroyed almost half of the opium harvest in Afghanistan, which continues to be the world’s biggest producer. The total area under coca bush cultivation in the world fell by 18 per cent between 2007 and 2010 and by 33 per cent since 2000. Efforts to reduce cultivation and production of the main plant-based problem drugs have, however, been offset by rising levels of synthetic drug production, including significant increases in the production and consumption of psychoactive substances that are not under international control. Although Member States are to be commended for their hard work in dealing with the drug problem, often with the support of UNODC, the figures sketched above indicate the scale of the challenge. The response by UNODC has been twofold: first, develop an integrated approach; and second, focus on prevention, treatment, alternative development and the promotion of fundamental human rights.

Details: New York: United Nations, 2012. 112p.

Source: Internet Resource: Accessed July 18, 2012 at: http://www.unodc.org/documents/data-and-analysis/WDR2012/WDR_2012_web_small.pdf

Year: 2012

Country: International

Keywords: Drug Abuse Prevention

Shelf Number: 125669


Author: Office of the Special Representative of the Secretary General on Violence against Children

Title: Tackling Violence in Schools: A Global Perspective. Bridging the Gap Between Standards and Practice

Summary: Education has a unique potential to create a positive environment in which non-violent behaviour can be learned, to provide skills that enable people to communicate, negotiate and support peaceful solutions to conflicts. However, in reality, within and around educational settings, both girls and boys continue to be exposed to violence, including verbal abuse, intimidation and physical aggression and, in some cases, sexual abuse. A new publication entitled Tackling Violence in Schools: A Global Perspective was launched at the event. The objectives of the panel discussion were to raise awareness about the global reality, causes and consequences of violence faced by children in and around schools; to share good practices and strategies on how to prevent and address violence in and around schools and to discuss the importance of cooperation at local, national, regional and international levels.

Details: New York: Office of the Special Representative of the Secretary General on Violence against Children, 2012. 57p.

Source: Internet Resource: Accessed July 18, 2012 at: http://srsg.violenceagainstchildren.org/sites/default/files/publications/Tackling%20Violence%20in%20Schools%20final.pdf

Year: 2012

Country: International

Keywords: School Bullying

Shelf Number: 125672


Author: Chabiera, Aleksandra, Coordinator

Title: Stop Heritage Crime: Good Practices and Recommendations

Summary: he objective of the EEA and Norway grants is to reduce social and economic disparities in Europe. The objective is also to strengthen the bilateral relationship between Poland and Norway. The protection of cultural heritage has been, and will continue to be, an important priority for the EEA and Norway grants. I am pleased that money is not only allocated to the revitalisation of monuments, but also to enforce the knowledge and awareness of the need for preventing illicit trade in cultural objects. The Cultural Exchange Fund has been an important tool for increasing cultural cooperation and establishing long-term relationships between cultural institutions in Poland and Norway. I am pleased that more than 70 projects have been supported, and a large number of events have taken place both in Norway and Poland, including music and theatre performances, art exhibitions, and workshops for artists and experts within the various areas of art and cultural heritage. National characteristics are found in cultural expressions in the forms of traditions, ideals, customs, values, music, art, designs, performances, architectural forms, handicrafts and narratives, therefore, cultural objects constitute an important part of our national identity. People travel more and more, and increasingly to distant and exotic places. The cultural impressions travel back home with us, sometimes as cultural objects. Many travellers are not aware of the fact that bringing cultural objects home deprives their countries of origin of the historical values that are important to their identity. Often this is more a matter of ignorance and carelessness than intentional crime. Cultural treasures constitute great values. There is, therefore, alsounfortunately, an international market for the illicit trade of such items. Countries at war and countries with weak legal systems and little control are the most vulnerable to such trade. The cultural objects that are traded on this black market are difficult to trace and to bring back. International cooperation is necessary to meet the challenges, both from ignorant travellers and from criminals. The UNESCO convention is important in this respect. I am pleased that Poland and Norway can learn from one another through the sharing of knowledge and experiences, this will improve awareness and actions in both countries.

Details: Warsaw, Poland: National Heritage Board of Poland, 2011. 148p.

Source: Internet Resource: Accessed July 19, 2012

Year: 2011

Country: International

Keywords: Antiquities

Shelf Number: 125684


Author: Fischer, Carolyn

Title: The Complex Interaction of Markets For Endangered Species Products

Summary: Economic models of trade in endangered species products often do not incorporate four focal arguments in the policy debate over trade bans: 1) law-abiding consumers may operate in another market, separate from illegal consumers, that trade would bring online; 2) legal trade reduces stigma, which affects demand of law-abiding consumers; 3) laundering may bring illegal goods to legal markets when trade is allowed; 4) legal sales may affect illegal supply costs. This paper analyzes systematically which aspects of these complicated markets, separately or in combination, are important for determining whether limited legalized trade in otherwise illegal goods can be helpful for achieving policy goals like reducing poaching.

Details: Washington, DC: Resources for the Future, 2001. 42p.

Source: Internet Resource: Discussion Paper 02-21: Accessed July 19, 2012 at: http://www.rff.org/rff/Documents/RFF-DP-02-21.pdf

Year: 2001

Country: International

Keywords: Economics

Shelf Number: 125691


Author: Lai, Gloria

Title: Drugs, Crime and Punishment: Proportionality of Sentencing for Drug Offences

Summary: Proportionality is one of the key principles of the rule of law aiming to protect people from cruel or inhumane treatment. The principle has been established in interna­tional and regional human rights agree­ments and many countries have adopted reflections of it in their constitution or penal code. Its applica­tion to drug-related offences is firstly the responsibility of the legislators, in defining the level of penalisa­tion of certain behaviours. The level of penalisation should be deter­mined according to the severity of damage that a certain behaviour causes to others or to society. Download the briefing (PDF) In the second instance, the courts and judges have to apply the principle of proportionality in defining the appropriate punishment for a particular case; and finally, proportionality also plays a role in the execu­tion of this punishment. This briefing paper looks at specific criteria of proportionality developed in the context of drug control and describes a number of recent attempts to recalibrate the often grossly disproportionate nature of current drug laws and their enforce­ment around the world. The core requirement of proportionality is that an individual’s rights and freedoms may only be limited to the extent that it is appro­priate and necessary for achieving a legiti­mate aim. Such standards further require that of the range of available op­tions for restricting an individual’s rights and free­doms in order to achieve a legiti­mate aim, the option that is least intrusive to fundamental rights should be adopted. In the context of drug offences, a legitimate aim of punishment should correspond with the basic objective of the UN drug control conventions: to improve the health and welfare of mankind. As a result, a propor­tionate sentence for a drug offence should be determined in accordance with the potential harm that a controlled sub­stance may cause to the health and welfare of a community. The principle of proportionality is under­stood in international law as an essential means for safeguarding fundamental human rights. Unfortunately, its applica­tion has often been limited to scaling the severity of punishment without questioning in principle the need to inflict a punish­ment at all – a problematic limitation, especially in the con­text of the contempo­rary drug policy debate where punishment is no longer assumed to be a necessary response for all drug-related acti­vities. Applying the principle of proportion­ality to drug control should transcend any predis­position towards punishment per se. The trend towards decriminalisation of posses­sion for personal use is a clear example that abstaining from punishment may well be the most appropri­ate outcome of a propor­tionality check of drug laws and sentencing practices for certain drug-related activities. RECOMMENDATIONS • Governments should review their laws, sentencing guidelines and practices for drug offences to evaluate their compliance with existing standards of proportionality. • A proportionality check should consider as an option that activities relating to certain acts or substances may be dealt with outside the realm of criminal law. For example, the possession, purchase or cultivation of drugs for personal use should not constitute offences. • Proportionate sentencing frameworks should distinguish between the type of drugs and the scale of the illicit activity, as well as the role and motivation of the offender : serious or organised traffickers; micro-traffickers (low-level dealers or smugglers); people dependent on drugs; and people who use drugs occasionally (or ‘recreationally’). • For drug-related offences committed due to drug dependency or to meet basic economic needs, services such as treatment, education, aftercare, rehabilitation or social integration should be offered as more humane, effective and proportionate alternatives to conviction. • For micro-trafficking offences, reduced or provisional sentences, as well as alternatives to imprisonment, should be promoted. The socio-economic circumstances in which an offence was committed and the financial gains of the offender should be considered as important mitigating factors. • Ensuring the consistent application of proportionate sentencing laws and guidelines should include addressing institutional biases against drug offenders, for example amongst judges. • The death penalty for drug offences should be entirely abolished.

Details: Amsterdam: Transnational Institute, 2012. 12p.

Source: Internet Resource: Series on Legislative Reform of Drug Policies Nr. 20: Accessed July 20, 2012 at: http://www.druglawreform.info/images/stories/documents/dlr20.pdf

Year: 2012

Country: International

Keywords: Drug Offenders

Shelf Number: 125695


Author: Pastor, Meghan A.

Title: Legal, Moral and Biological Implications of Poaching and Illegal Animal Trafficking on an International Scale

Summary: Poaching is a lucrative and international illegal business. According to some statistics, poaching is nearly a 20 million dollar trade, coming in third in profits after the illegal drug and arms trades. One of the most popular areas for poaching is the rainforest found in Brazil and Latin America, where some of the most varied and colorful fauna are found. (Giovanni, 2006) Other popular areas for poaching include China, India and Africa. Many of the animals that are captured to be sold later are either sold in open air markets such as Chatuchak in Thailand and others in China or are exported to other countries. (CNN) The majority of animals sold through illegal trafficking are bought by buyers in the United States, followed by Japan, Europe and the Middle East. (Dermota, 1995) They are often bought by rich collectors who enjoy “exotic petsâ€. According to Dermota’s research, a certain type of macaw can be sold in the United States for up to $10,000, while a certain monkey sells in Japan for over $50,000. With profits such as these, it is no surprise that many people have turned to the illegal animal market to make money. Certainly animal trafficking is a cruel prospect, even if one does not account for the animals that are killed just for their parts. Animals react poorly when being transported even under the best of circumstances. In a study by Hart et al in 2008 comparing the behavior and physical condition of a group of recently translocated African elephants to a group native to the area, it was found that the translocated elephants had an overall lower condition. As seen in Figure 1., the translocated elephants had a lower body condition than their native counterparts throughout all seasons that the study was performed. The body condition of the native elephants ranged from approximately 1.4 to 1.8 on a body scale ranging from 0 (poor) to 2 (good). The condition of the translocated elephants ranged from approximately 1.25 to 1.5. All seasons showed a lower value for the translocated elephants as compared to their native counterparts. They also had a higher mortality rate. (Hart et al, 2008) If these animals fared poorly under conditions that were optimized for their travel, it is no surprise that animals did not fare well under the poor conditions that are provided for them by poachers. Charles Bergman, a researcher who personally traveled to research the poaching issue, describes the conditions that these creatures travel under in their article, saying “They are smuggled in thermoses and nylon stockings, stuffed into toilet paper tubes, hair curlers and hubcaps.†(Bergman, 2009) With such disregard for the basic needs and comforts of the animal, it can be said that poaching is a cruel and unusual punishment for any animal that has to endure it. Not only that, but most animals either die or become sickly in transit. And the worst is yet to come. The rise of poaching as a global industry is not only a threat to individual animals, but to entire species.

Details: Newport, RI: Salve Regina, 2010. 22p.

Source: Internet Resource: Pell Scholars and Senior Theses, Paper 47: Accessed July 20, 2012 at: http://escholar.salve.edu/cgi/viewcontent.cgi?article=1047&context=pell_theses&sei-redir=1&referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3Dlegal%2520moral%2520and%2520biological%2520implications%2520of%2520poaching%2520and%2520illegal%2520animal%2520trafficking%2520on%2520an%2520international%2520scale%26source%3Dweb%26cd%3D1%26ved%3D0CFIQFjAA%26url%3Dhttp%253A%252F%252Fescholar.salve.edu%252Fcgi%252Fviewcontent.cgi%253Farticle%253D1047%2526context%253Dpell_theses%26ei%3DFzwJUPXXHcrX0QHgv9GGBA%26usg%3DAFQjCNGDh2iej63oOuT1jTs0M-iF8S1HGw#search=%22legal%20moral%20biological%20implications%20poaching%20illegal%20animal%20trafficking%20an%20international%20scale%22

Year: 2010

Country: International

Keywords: Animal Poaching

Shelf Number: 125698


Author: United Nations Office on Drugs and Crime

Title: Current Practices in Electronic Surveillance in the Investigation of Serious and Organized Crime

Summary: The value of employing electronic surveillance in the investigation of some forms of serious crime, in particular organized crime, is unquestionable. It allows the gathering of information unattainable through other means. Some countries have utilized surreptitious electronic surveillance for nearly a century. For others it is a more recent phenomenon, and for some it is not yet utilized at all. The use by law enforcement of electronic surveillance should not be an investigative tool of first resort, instead its use should be considered when other less intrusive means have proven ineffective or when there is no reasonable alternative to obtain crucial information or evidence. Even when electronic surveillance is appropriate, it will generally need to be used in conjunction with other investigation methods in order to be most effective. For those jurisdictions without any regulation, or with legislation which is lacking in some respect, the challenge is to develop a balanced system for the use of electronic evidence gathering. The balance which needs to be struck is that between the effective use of electronic evidence gathering and the protection of citizens’ rights. This includes balancing the cost of utilizing these methods against the ultimate public benefit gained from a conviction. These considerations should be weighed carefully by legislators, prosecutors, law enforcement and the like. It should also be noted that in some countries the existence of a federal system of governance means that electronic surveillance can be regulated at both a local and at a national level. Federal law will often apply where the investigation is into crime that crosses borders, however, organized crime is of course also investigated by local law enforcement. It is not possible for this document to comprehensively consider regulation of individual states, regions or provinces within countries, although their mention will occur where valuable examples arise.

Details: Vienna: UNODC, 2009. 48p.

Source: Internet Resource: Accessed July 24, 2012 at: http://www.unodc.org/documents/organized-crime/Law-Enforcement/Electronic_surveillance.pdf

Year: 2009

Country: International

Keywords: Criminal Investigations

Shelf Number: 125751


Author: Mell, Andrew

Title: Are "Gangstas" Peacocks? The Handicap Principle and Illicit Markets

Summary: Criminals who wear gang colors are acting in a surprisingly brazen way which must increase the probability of being caught and punished by the police. In our model this brazen behavior is a solution to an enforcement problem. The central idea is that less able criminals see lower gains from continued participation in crime because they will be caught and punished more often. Lower future gains imply that reputational concerns will be less effective at enforcing honesty. Only dealing with brazen criminals will become a good way to avoid dealing with incompetent criminals, because they cannot afford to mimic the brazen behavior. The principle is similar to the selection for a handicap in evolutionary biology.

Details: Oxford, UK: University of Oxford, Department of Economics, 2011. 32p.

Source: Internet Resource: Discussion Paper Series No. 558: Accessed July 24, 2012 at: http://www.economics.ox.ac.uk/index.php/papers/details/department_wp_558/

Year: 2011

Country: International

Keywords: Criminal Behavior

Shelf Number: 125755


Author: Mo, Pak Hung

Title: International Human Trafficking: Theory and Solution.

Summary: In this paper, we build a simple model to explain the choice of migration method and the root causes of international human trafficking (IHT). Our analyses result in several implications on the problems related to IHT. First, IHT is driven by poverty and international productivity/living quality disparities. Second, the existing humanitarian and/or suppressive approaches cannot solve the problem. Third, the best option for solving the problem is setting up the ‘reciprocal direct investment’ (RDI) scheme between leading and lagged economies. The RDI scheme can facilitate improvements in the quality of public governance in lagged economies and directly promote international competition, efficiency, trade liberalization and division of labor. The resulting convergence in global living quality at a higher level across nations will eliminate the root causes of illicit migrations.

Details: Hong Kong: Hong Kong Baptist Unviersity, 2011. 27p.

Source: Internet Resource: MPRA Paper No. 35104: Accessed July 24, 2012 at: http://mpra.ub.uni-muenchen.de/35104/1/MPRA_paper_35104.pdf

Year: 2011

Country: International

Keywords: Economic Conditions

Shelf Number: 125760


Author: United Nations Children's Fund (UNICEF). Innocenti Research Centre

Title: Assessing 'The Code of Conduct' for the Protection of Children from Sexual Exploitation in Travel and Tourism: Discussion Paper

Summary: The Code of Conduct for the Protection of Children from Sexual Exploitation in Travel and Tourism ('The Code') was established in 1998 by ECPAT Sweden with the assistance of the United Nations World Tourism Organization (UNWTO). Since 2004 there has been no comprehensive assessment of the impact of The Code. In addition, no performance monitoring system has been put in place.This assessment was designed to review the current performance of The Code, and to propose a set of criteria based on rights-based principles for measuring the impact and effectiveness of The Code at global and country levels.

Details: Florence, Italy: UNICEF Innocenti Research Centre, 2012. 50p.

Source: Internet Resource: Accessed July 25, 2012 at: http://www.unicef-irc.org/publications/662

Year: 2012

Country: International

Keywords: Child Prostitution

Shelf Number: 125769


Author: Institute for Security Studies

Title: Unban Violence and Humanitarian Challenges: Joint Report

Summary: This second colloquium organised jointly by the International Committee of the Red Cross (ICRC) and the European Union Institute for Security Studies (EUISS) aimed to present the causes and humanitarian consequences of urban violence, as well as related trends and challenges for the European Union and humanitarian actors. Two case studies have been selected, focusing on different types of violence affecting urban environments. The first case study examines pilot projects to address humanitarian needs arising from organised crime and gang violence in megacities; the second is an analysis of the humanitarian challenges emerging from urban violence in the context of uprisings, referring specifically to the lessons learned from the protests in the Arab world. Urban violence represents numerous challenges for policy makers and humanitarian actors alike. Today, more than half of the world’s population lives in cities and it appears that urban centres will absorb almost all new population growth in the coming decades. It has therefore become increasingly important to understand the dynamics of violence in an urban setting. By bringing together experts, academics and representatives from various relief organisations, the ICRC and the EUISS hope to have contributed to the debate and spurred further interest in this increasingly important issue. The present publication includes summaries of both the presentations provided by the speakers and the discussions held during the colloquium.

Details: Paris: Institute for Security Studies, 2012. 88p.

Source: Internet Resource: Accessed July 25, 2012 at: http://www.iss.europa.eu/uploads/media/Urban_violence_and_humanitarian_challenges.pdf

Year: 2012

Country: International

Keywords: Cities and Crime

Shelf Number: 125774


Author: Rosmarin, Ari

Title: A Quiet Revolution: Drug Decriminalisation Policies in Practice Across the Globe

Summary: Increasingly countries around the world are changing their drug policies by ending the criminalization of those who use and possess drugs for their own personal use. This report published by Release, the UK national center of expertise on drugs and drug laws, reviews the evidence in 21 countries that have adopted some form of decriminalization and has found that the model of enforcement adopted has little impact on the rates of drug use in a country. The paper defines decriminalization as the removal of sanctions under the criminal law, with optional use of administrative sanctions; under this model drug supply offences are still criminal acts. A Quiet Revolution: Drug Decriminalization Policies in Practice across the Globe shows that countries and States as disparate as Belgium, Estonia, Australia, Mexico, Uruguay, the Netherlands and Portugal have adopted different models of decriminalization. It also highlights that decriminalization is not a new phenomenon with some countries, such as Spain, having adopted a non-criminal approach to drug use since the 1970s. Research from Australia, highlighted in the report, showed that as well as not needlessly criminalizing people, decriminalization could have other positive consequences. This research compared individuals who had been criminalized for cannabis possession against those who had received a non-criminal response. It found that individuals given criminal penalties were more likely to suffer negative employment, relationship, and accommodation consequences as a result of their cannabis charge and were more likely to come into further contact with the criminal justice system.

Details: London: Release, 2012. 44p.

Source: Internet Resource: Accessed July 26, 2012 at: http://www.soros.org/sites/default/files/release-quiet-revolution-drug-decriminalisation-policies-20120709.pdf

Year: 2012

Country: International

Keywords: Decriminalization

Shelf Number: 125787


Author: Amnesty International

Title: Dangerous and Deadly Arms Trade

Summary: Hundreds of thousands of people are killed, injured, raped, repressed and forced to flee their homes every year as a result of the international arms trade. Families are torn apart. Livelihoods and lives are destroyed. Armed conflicts destroy social and economic infrastructure, breed corruption and divert public finances, denying the poor access to health care, water, food, shelter and education, increasing poverty and causing yet more deaths. For decades there has been a global treaty on the import, export and transfer of dinosaur bones yet there is no global treaty to strictly control the deadly trade in conventional arms. Revolvers, rifles, machine guns, bullets, hand grenades, missiles, rockets, armoured vehicles and other weapons and arms can be traded between governments, arms dealers and armed groups with few restrictions. Unscrupulous governments allow almost unlimited amounts of arms to be supplied to those flagrantly violating human rights and destroying lives. Regulation at the country level has failed to adapt to an increasingly globalized trade – components are sourced from across the world, and production and assembly take place in different countries. It’s time for all governments to commit to securing an international Arms Trade Treaty. amnesty.org/control-arms Under international law, states can only sell, acquire and possess arms for legitimate security, law-enforcement and self-defence needs. An Arms Trade Treaty must require that governments refuse arms transfers when those arms are likely to facilitate human rights violations or be diverted in breach of a UN arms embargo. Those violating such embargoes should be held accountable. An Arms Trade Treaty must also prohibit governments from transferring weapons, munitions or related equipment when they are likely to be used to commit or facilitate war crimes or crimes against humanity, including acts of genocide.

Details: London: Amnesty International, 2012. 36p.

Source: Internet Resource: Accessed july 30, 2012 at: http://amnesty.org/en/library/asset/ACT30/032/2012/en/2590b8de-5e88-4f78-b337-677eb642962d/act300322012en.pdf

Year: 2012

Country: International

Keywords: Arms Trade

Shelf Number: 125807


Author: International Labour Organization

Title: ILO Global Estimate of Forced Labour: Results and Methodology

Summary: Using a new and improved statistical methodology, the ILO estimates that 20.9 million people are victims of forced labour globally, trapped in jobs into which they were coerced or deceived and which they cannot leave. This figure, like the previous one in 2005, represents a conservative estimate, given the strict methodology employed to measure this largely hidden crime. Human trafficking can also be regarded as forced labour, and so this estimate captures the full realm of human trafficking for labour and sexual exploitation or what some call “modern-day slaveryâ€1. The figure means that around three out of every 1,000 persons worldwide are in forced labour at any given point in time. Women and girls represent the greater share of the total – 11.4 million (55%), as compared to 9.5 million (45%) men and boys. Adults are more affected than children – 74% (15.4 million) of victims fall in the age group of 18 years and above, whereas children aged 17 years and below represent 26% of the total (or 5.5 million child victims). Of the total number of 20.9 million forced labourers, 18.7 million (90%) are exploited in the private economy, by individuals or enterprises. Out of these, 4.5 million (22%) are victims of forced sexual exploitation, and 14.2 million (68%) are victims of forced labour exploitation in economic activities, such as agriculture, construction, domestic work or manufacturing. The remaining 2.2 million (10%) are in state-imposed forms of forced labour, for example in prisons, or in work imposed by the state military or by rebel armed forces. Turning to the regional distribution, the Asia-Pacific region (AP) accounts for by far the largest number of forced labourers – 11.7 million or 56% of the global total. The second highest number is found in Africa (AFR) at 3.7 million (18%), followed by Latin America and the Caribbean (LA) with 1.8 million victims (9%). The Developed Economies and European Union (DE&EU) account for 1.5 million (7%) forced labourers, whilst countries of Central, Southeast and Eastern Europe (non EU) and the Commonwealth of Independent States (CSEE) have 1.6 million (7%). There are an estimated 600,000 (3%) victims in the Middle East (ME)2. The prevalence rate (number of victims per thousand inhabitants) is highest in the CSEE and Africa regions at 4.2 and 4.0 per 1,000 inhabitants respectively, and lowest in the DE&EU at 1.5 per 1,000 inhabitants. The relatively high prevalence in Central and South Eastern Europe and CIS can be explained by the fact that the population is much lower than for example in Asia, while reports of trafficking for labour and sexual exploitation and of state-imposed forced labour in the region are numerous. The estimates also allow an assessment of how many people end up being trapped in forced labour following migration. There are 9.1 million victims (44% of the total) who have moved either internally or internationally, while the majority, 11.8 million (56%), are subjected to forced labour in their place of origin or residence. Cross-border movement is strongly associated with forced sexual exploitation. By contrast, a majority of forced labourers in economic activities, and almost all those in state-imposed forced labour, have not moved away from their home areas. These figures indicate that movement can be an important vulnerability factor for certain groups of workers, but not for others.

Details: Geneva: International Labour Organization, 2012. 48p.

Source: Internet Resource: Accessed July 30, 2012 at: http://www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/publication/wcms_182004.pdf

Year: 2012

Country: International

Keywords: Forced Labor (International)

Shelf Number: 125811


Author: United Nations Economic and Social Council. Commission on Crime Prevention and Criminal Justice

Title: World Crime Trends and Emerging Issues and Responses in the Field of Crime Prevention and Criminal Justice

Summary: The present document was prepared in accordance with the practice established by Economic and Social Council resolution 1990/18. The document provides information on preliminary results from the United Nations Survey of Crime Trends and Operations of Criminal Justice Systems covering the year 2010, on statistics on trends and patterns in intentional homicide and on the prominent theme of the twenty-first session of the Commission on Crime Prevention and Criminal Justice: Violence against migrants, migrant workers and their families. The document also includes an overview of some of the methodological challenges in obtaining crime and criminal justice data and improving their quality.

Details: Vienna: United National Economic and Social Council, 2012. 32p.

Source: Internet Resource: Accessed August 2, 2012 at: http://www.unodc.org/documents/data-and-analysis/Crime-statistics/V1250994.pdf

Year: 2012

Country: International

Keywords: Crime Measurement

Shelf Number: 125844


Author: Jewkes, Rachel

Title: Rape Perpetration: A Review

Summary: Rape can have an enduring impact on the lives, and health of victims, their families and communities. Both men and women perpetrate sexual violence (Sikweyiya Y and Jewkes 2009), however the majority of sexual offences are committed by men (Steffensmeier D, Zhong H et al. 2006). Research on what drives perpetration of rape and other forms of sexual violence is needed to inform prevention programmes – for this it is necessary to study men. This review summarises research on risk factors for sexual violence perpetration, the methodologies used to identify these risk factors and discusses the implications of this research for rape prevention strategies. Most of the literature reviewed focused on perpetration of sexual violence by men against women and girls. For the purposes of this review, risk factors are factors that increase the risk (likelihood) of a person perpetrating sexual violence. The review provides an overview of current discussions in the research literature around the main factors associated with rape perpetration, it does not follow the approach of systematic review, although the authors sought to identify all published papers on rape perpetration. In identifying this literature an internet search was conducted for published papers or reports with empirical research on rape perpetration from 1990 onwards. In so doing, 3,325 abstracts were identified; yielding 293 papers of interest for the study. The review includes qualitative and quantitative studies along with studies that discussed the origins, risk factors or frameworks for thinking about perpetration. Only English language databases were searched.

Details: Pretoria: Oak Foundation, 2012. 48p.

Source: Internet Resource: Accessed August 6, 2012 at: http://www.svri.org/RapePerpetration.pdf

Year: 2012

Country: International

Keywords: Rape

Shelf Number: 125865


Author: Ratledge, Leo

Title: Inhuman Sentencing: Life Imprisonment of Children in the Commonwealth

Summary: This report reviews the laws of Commonwealth States with regards to life imprisonment of children: that is all persons under 18 years of age. For the purposes of this report "life imprisonment" is defined to include a variety of types of sentence under which it is possible for a person to be legally detained for life. Such sentences include: life imprisonment without parole; life impisonment with the possibility of parole; detention at the pleasure of the executive or the courts; and indefinite detention sentences.

Details: London: Child Rights International Network, 2012. 45p.

Source: Internet Resource: Accessed August 6, 2012 at: http://www.crin.org/docs/Inhuman%20Setencing-1.pdf

Year: 2012

Country: International

Keywords: Juvenile Detention

Shelf Number: 125867


Author: Nowell, Kristin

Title: Wildlife Crime Scorecard: Assessing Compliance with and Enforcement of CITES Commitments for Tigers, Rhinos and Elephants

Summary: International commercial trade of elephants, rhinos and tigers – and their parts and products — is almost universally prohibited by CITES, the international endangered species trade convention, however the enforcement of this restriction remains weak. Illegal trade in ivory, rhino horn and tiger parts is of major conservation concern. While CITES mainly prohibits or regulates international trade, it has continued to expand its role to prevent illegal trade at the national level through the adoption of various “Decisions†and “Resolutionsâ€. This is critical to ensure illegal trade at national levels does not lead to international trade dynamics that undermine the conservation of elephants, rhinos and tigers, in addition to the effectiveness of the Convention itself. The approach to each species group differs, but all include national measures to control not only international, but also internal trade in the species’ parts, derivatives and products: • For tigers, it is recommended that internal trade be “prohibited†(Res Conf. 12.5 Rev. CoP15 ); • For rhinos, it is recommended that such trade be “restricted†(Res Conf. 9.14 Rev. CoP15); • For elephants, “unregulated domestic sale of ivory [is to] to be prohibited†under the Action Plan for the Control of Trade in Elephant Ivory Decision 13.26 Rev. CoP15 Annex 2). Other common themes include strengthening law enforcement; coordination with other countries; improved data collection; enacting deterrent legal penalties for illegal trade; and raising public awareness, especially among user groups. Tigers, rhinos and elephants were the subject of renewed and substantial concern at the 15th meeting of the Conference of the Parties to CITES (CoP15) in 2010 and the 61st meeting of the CITES Standing Committee (SC61) in 2011, specifically in regard to the scale of illegal trade. This report, produced to coincide with the 62nd meeting of the CITES Standing Committee (in July 2012), selects 23 range, transit and consumer countries from Asia and Africa facing the highest levels of illegal trade in elephant ivory, rhino horn and tiger parts (Annex 1), and evaluates their progress since CoP15 towards compliance with and enforcement of CITES commitments for these three species groups. Countries are scored green, yellow and red to signal recent implementation effort, and indicate whether governments are moving in the right direction to curb illegal trade in these species groups, or to indicate whether they have made little progress. Recent actions underpinning the country scores are discussed, and recommendations are made for all countries to improve compliance and enforcement, but with focus on key countries identified in this assessment as urgently needing to show progress. It is important to note that illegal internal trade in these three species groups persists in virtually all of the selected countries, however this report seeks to differentiate countries where it is actively being countered from those where current efforts are entirely inadequate. It should also be noted that a green score of all three species groups does not mean that the country in question is free of wildlife crime. In many cases there are widespread problems concerning illegal trade in other species, such as reptiles and primates. Moreover, some of these countries are performing poorly in terms of other conservation governance indicators and threats to the three species groups, such as the integrity of protected areas.

Details: Gland, SWIT: World Wildlife Fund, 2012. 36p.

Source: Internet Resource: Accessed August 7, 2012 at: http://www.wwf.se/source.php/1486859/WWF%20Wildlife%20Crime%20Scorecard%20Report[1].pdf

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 125903


Author: De Martino, Luigi

Title: Reducing Armed Violence, Enabling Development

Summary: The residents of low- and middle-income countries bear a grossly disproportionate share of the global burden of armed violence. Insecurity and high levels of violence have profoundly negative consequences for societies and the quality of people’s lives. Not only does armed violence in its different forms kill and injure hundreds of thousands of people every year, but the impact of wide-scale violence and armed conflict is devastating on a country’s public institutions, national economy, infrastructure, and social cohesion (GD Secretariat, 2008, p. 31). Violence stops or even reverses development, especially in low- and middle-income countries. At the same time, weak governance, economic stagnation, and social inequalities contribute to the persistence of violence. This Research Note relies mostly on the key findings of the 2008 and 2011 Global Burden of Armed Violence (GBAV) reports (GD Secretariat, 2008; 2011), as well as on the World Bank’s World Development Report 2011 (World Bank, 2011). It examines the negative relationship between armed violence and development by providing an overview of the impacts of armed violence and considering the links between armed violence and development; more specifically, it highlights the statistical evidence on the linkages between lethal violence and specific Millennium Development Goals (MDGs). A clear message emerges from this analysis: if countries and donors want to realize their development goals, then addressing the root causes of armed violence becomes a priority for policy-makers.

Details: Geneva, Switzerland: Small Arms Survey, 2012. 4p.

Source: Small Arms Survey Research Notes, Number 19: Internet Resource: Accessed August 8, 2012 at http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-19.pdf

Year: 2012

Country: International

Keywords: Armed Violence

Shelf Number: 125946


Author: Braunmiller, Julia

Title: The Protection Project Review of the Trafficking in Persons Report

Summary: On June 19, 2012, the United States Department of State, Office to Monitor and Combat Trafficking in Persons released the 2012 Trafficking in Persons Report (TIP Report). The TIP Report is comprehensive, well drafted, and thoroughly documented. In my opinion, the Report constitutes the primary reference and main source of information on efforts made by governments worldwide to combat trafficking in persons. The purpose of this review is to analyze the valuable information provided in the TIP Report. The Report is not only a diplomatic tool designed to engage governments in the battle against trafficking; it also serves an educational function, which has been the inspiration for this research.

Details: Washington, DC: The Protection Project, The Johns Hopkins University, The Paul H. Nitze School Of Advanced International Studies, 2012. 128p.

Source: Internet Resource: accessed August 13, 2012 at: http://www.protectionproject.org/wp-content/uploads/2012/07/TIP-Review-2012-Final.pdf

Year: 2012

Country: International

Keywords: Child Sex Tourism

Shelf Number: 126004


Author: Jennings, Will

Title: Tools of Security Risk Management for the London 2012 Olympic Games and FIFA 2006 World Cup in Germany

Summary: Mega-events such as the Olympic Games and the football World Cup represent a special venue for the practice of risk management. This paper explores management of security risks in the case of two sporting mega-events, the London 2012 Olympic Games and the FIFA 2006 World Cup in Germany. The analysis progresses in three stages. First, it explores three explanations that have dominated the literature on policy instruments and tools and introduces the generic tools of government approach developed by Christopher Hood (1983). Second, it reviews the tools used for security risk management at the two mega-events. Third, it evaluates competing explanations of tool choice and degree to which these are consistent with organisational strategies of risk management at the events. The findings highlight the importance of national political systems in influencing tool choice.

Details: London: Centre fo Analysis of Risk and Regulation, London School of Economics, 2009. 27p.

Source: CARR Discussion Paper No. 55: Internet Resource: Accessed August 13, 2012 at http://eprints.lse.ac.uk/36539/1/Disspaper55.pdf

Year: 2009

Country: International

Keywords: Event Planning

Shelf Number: 126012


Author: The Protection Project

Title: Reporting on the Status of Trafficking in Women in Accordance with Article 6 of the Convention on the Elimination of All Forms of Discrimination Against Women: Guidelines on the Interpretation of the Text of Article 6 of the Convention

Summary: Article 6 of the Convention on the Elimination of All Forms of Discrimination Against Women (CEDAW) reads as follows: "States Parties shall take all appropriate measures, including legislation, to suppress all forms of traffic in women and exploitation of prostitution of women." Article 6 lays the foundation for combating trafficking in women and exploitation of women for the purpose of prostitution and calls upon state parties to adopt all necessary measures to prevent the acts of trafficking and exploitation of prostitution of women. Consequently, state parties to the Convention, when reporting on Article 6 should cover the status of trafficking in women as well as exploitation of women in prostitution. In doing so, they must refer to all appropriate measures that they have taken including legislative measures. This publication includes a list of guidelines on interpreting the text of and reporting on Article 6 of the Convention.

Details: Washington, DC: The Protection Project at Johns Hopkins University, 2012. 30p.

Source: Internet Resource: Accessed August 13, 2012 at http://www.protectionproject.org/wp-content/uploads/2012/07/Guidelines-Art-6-CEDAW_Final1.pdf

Year: 2012

Country: International

Keywords: Discrimination

Shelf Number: 126014


Author: Soeiro, Mafalda

Title: Determinants of Highter Education Students' Willingness to Pay for Violent Crime Reduction: A Contingent Valuation Study

Summary: By eliciting an individual’s Willingness to Pay (WTP) for a reduction in crime risks, the contingent valuation method is one of the most solid methodologies in use to estimate the intangible costs of crime. However, very few studies have applied contingent valuation methods to random samples of the population located in high crime rate areas. This study is, to the best of our knowledge, the first attempt to apply the contingent valuation method to estimate how much a specific group of society, which is relatively prone to falling victim to (violent) crime, i.e., students, is willing to pay to reduce the likelihood of being the victim of violent crime. In contrast to the existing literature, our study focuses on a rather unexplored context, Portugal, where criminality and violent crime rates are relatively low by international standards, even though they have been on the rise. Based on responses from 1122 higher education students in a broad range of degrees (from Economics to Psychology and the Humanities), we found that 33% of our respondents have been victims of crime in the past, although in general they did not result in physical or psychological injuries. A reasonable percentage of the students (almost 40%) is very worried about falling victim to a crime and 52.8% worries moderately. Over 40% of our respondents were willing to pay a certain amount but less than 50€, whereas 20.8% were willing to pay between 50€ and 250€. On average, all other determinants constant, younger and female students revealed that they were more inclined to pay so as to avoid violent crime than their older and male counterparts. Low and high income Portuguese students do not differ in their willingness to pay more to avoid being victims of violent crime. Cautious behaviour, such as locking doors at home, and a strong opinion about policies and payment vehicles with potential to reduce the risk of crime is positively associated with the WTP. Finally, the students’ field of study surfaced as a key determinant of WTP – students enrolled in Economics and Management revealed a higher WTP. Such findings are likely to have a critical impact on crime and insurance policies.

Details: Porto, Brazil: Faculdade de Economia, Universidade do Porto, 2010. 41p.

Source: FEP Working Papers N. 384: Internet Resource: Accessed August 13, 2012 at http://wps.fep.up.pt/wps/wp384.pdf

Year: 2010

Country: International

Keywords: Costs of Crime

Shelf Number: 126018


Author: Delacote, Philippe

Title: Systemic Corruption, Scale Effects and Forest Harvesting

Summary: This paper explores the influence of scale effects and corruption on forest harvesting. Policy-maker and bureaucratic corruption are considered sequentially. Overall, the corrupt policy maker chooses a less stringent forest policy. Moreover, this permissive forest policy partly enhances bureaucratic corruption. This paper therefore partially supports the idea of systemic corruption. Finally, it appears that a larger number of lobbying firms tends to increase this effect.

Details: Nancy, France: INRA, 2008. 28p.

Source: Internet Resource: Accessed August 13, 2012 at http://ssrn.com/abstract=1016780

Year: 2008

Country: International

Keywords: Corruption

Shelf Number: 126020


Author: Davis, Robert C.

Title: Selected International Best Practices in Police Performance Measurement

Summary: Historically, police agencies have measured their performance against a very restricted set of crime-focused indicators, such as crime rates, arrests, and response times. However, modern police officers must be prepared to take on a wide variety of roles, from problem-solver to counselor and provider of first aid, among many others. Therefore, performance measures should be multidimensional to capture the complexity inherent in modern policing. In this era of tight budgets and deep cuts in municipal services, local officials have prioritized police performance improvement and the collection of measurable evidence to justify budget requests. Police departments also benefit from measuring performance; the results can help officials monitor department operations, promote adherence to policies and strategic plans, and detect patterns of bias or misconduct. By defining what is measured, executives send a signal to their command about what activities are valued and what results are considered important. Performance measures can also help track the progress of individual officers, the efficient use of funds, and many other indicators of organizational health. This report describes some of the key considerations involved in designing measures to evaluate law enforcement agencies. It also includes a framework for measuring performance and a detailed review of some international best practices.

Details: Santa Monica, CA: Center on Quality Policing, RAND, 2012.

Source: Technical Report: Internet Resource: Accessed August 13, 2012 at http://www.rand.org/content/dam/rand/pubs/technical_reports/2012/RAND_TR1153.pdf

Year: 2012

Country: International

Keywords: Evaluative Studies

Shelf Number: 126023


Author: Marshall, Phil

Title: Re-Thinking Trafficking Prevention: A Guide to Applying Behaviour Theory

Summary: Trafficking prevention, vulnerability reduction, and strengthened monitoring, evaluation, and analysis of programmes are all mandated under the 3rd COMMIT Subâ€regional Plan of Action (COMMIT SPA III, 2011â€2013) as well as the 2004 COMMIT Memorandum of Understanding. This Guide aims to support COMMIT Taskforces and partners in improving the effectiveness of trafficking prevention programmes though an analytical approach centred around the planning and measurement of behaviour change. The term “prevention†is used to describe a huge range of antiâ€trafficking interventions and has accounted for a large proportion of the investment in antiâ€trafficking. In source-based efforts to reduce vulnerability and migration, we find a host of awarenessâ€raising activities, microcredit schemes, vocational training, community protection networks, programmes to increase school attendance, and even the building of wells in rural communities to reduce seasonal migration. At destinations we find further awareness-raising efforts, emerging campaigns targeting consumers, migrant hotlines, and workplace inspections. Governments and other actors have also attempted to prevent trafficking in transit through strengthened border controls, restrictions on movement, particularly of young women and girls, and outâ€reach services for potentially vulnerable migrants in border areas, boat and bus terminals. To date, however, there has been limited analysis to understand how these efforts ultimately impact human trafficking or how they fit together into a set of activities to prevent human trafficking. Further, although the prevention of trafficking requires changes in behaviour, there have been few attempts to define prevention activities in behavioural terms. This paper seeks to highlight the potential advantages of doing so, demonstrating the benefits of behavioural theory, developed and refined in other fields, as a basis for stronger programme design and evaluation in the antiâ€trafficking sector. It will not provide extensive detail on behavioural theory, on which there is much documentation, but seeks to present core ideas in broad terms to antiâ€trafficking practitioners.

Details: Bangkok: United Nations Inter-Agency Project on Human Trafficking, 2011. 32p.

Source: Internet Resource: Accessed August 14, 2012 at http://www.no-trafficking.org/pub/rethinkingTraffickingPreventionWeb.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 126024


Author: Dottridge, Mike

Title: Children, Adolescents and Human Trafficking: Making Sense of a Complex Problem

Summary: This Issue Paper presents current knowledge about the scope and meaning of child trafficking. Although it might seem to be a simple subject to describe, it is not. First, there is the question of what a ‘child’ is. The international definition in the Convention on the Rights of the Child defines a ‘child’ as a person under the age of 18 but, at the same time, it recognizes the evolving capacity of adolescents to engage in certain activities and make certain decisions (UN Child Rights Convention, UN Committee on the Rights of the Child 2003). Additionally, there is confusion about how to distinguish between child employment, which is permissible, and child labor, which is not. Also, there is a conflict between international law and local practices because, in many countries, children routinely start to work before reaching the minimum legal age for employment set by international law.

Details: Washington, DC: Center for Human Rights & Humanitarian Law, Washington College of Law, American University, 2012. 21p.

Source: Issue Paper 5: Internet Resource: Accessed August 14, 2012 at http://rightswork.org/wp-content/uploads/2012/05/Issue-Paper-5.pdf

Year: 2012

Country: International

Keywords: Adolescents

Shelf Number: 126025


Author: Prenzler, Tim

Title: Rethinking Police Gifts and Benefits Policies

Summary: This paper reviews policing policies and practices on the receipt of gratuities, and considers when and how such gifts may be considered to impair police integrity and reputation. The acceptance of gifts and benefits – or ‘gratuities’ – has been described as ‘a police image problem that doesn’t seem to go away’ . This assertion was borne out recently in the ‘phone hacking scandal’ in the United Kingdom, when the Commissioner and Assistant Commissioner of the London Metropolitan Police resigned following allegations that officers were compromised in their investigations by improper associations with newspaper executives and reporters; including acceptance of lunches, other hospitality and gifts. The scandal prompted a review of standards related to police relationships by Her Majesty’s Inspectorate of Constabulary, which concluded, amongst other things, that policies on gifts and benefits were under-developed and under-enforced, and that a nationally consistent approach was needed. On a smaller scale, a recent corruption inquiry in Queensland – ‘Operation Tesco’ – revealed improper associations between police and criminals, facilitated in part through officers frequenting licensed premises while off duty, enjoying free entry and free drinks. These cases highlight how wider scandals or controversies over police conduct often bring lower level integrity issues to light, such as acceptance of gifts and benefits. For many people, the most prominent examples are likely to be half-price meals offered by fast food outlets. However, the practice can include free entry to nightclubs and sporting venues, free or subsidised travel for police on public transport, and gifts to procurement officers by companies tendering for police business. With these issues in mind, this CEPS Briefing Paper reviews the available research on the topic. The conclusions are that police acceptance of gifts and hospitality (however worthy or innocent the intention of the donors) can adversely affect the fair and impartial delivery of police services. The practice also has a strongly negative effect on public perceptions of police integrity and public confidence in police. A strict policy regime is required that prohibits anything other than the most minor gratuities offered on an incidental basis in circumstances where no obligation or expectation can be implied or perceived. Standards need to be clarified and communicated, and backed up by strict and consistent enforcement. A ‘disciplinary matrix’ is recommended as the most likely means of ensuring compliance through a graduated response to incidents of non-compliance.

Details: Nathan, QLD: ARC Centre of Excellence in Policing and Security, Griffith University, 2012. 6p.

Source: Internet Resource: Briefing Paper, Issue 14: Accessed August 16, 2012 at: http://www.ceps.edu.au/CMS/Uploads/file/issue%2014%20Rethinking%20Police%20Gifts%20and%20benefits%20policiesWEB.pdf

Year: 2012

Country: International

Keywords: Police Corruption

Shelf Number: 126043


Author: Scottish Government, Communities Analytical Services

Title: A Thematic Review of Literature on the Relationship Between Neighbourhoods, Housing and Crime

Summary: Summary • The relationship between housing, neighbourhoods and crime is best represented within neighbourhood effects research. This refers to the idea that effects are not a result of the characteristics of families and individuals who live in particular areas; rather, there is an additional area related effect which results from concentrated disadvantage. • Indirect neighbourhood effects include such aspects as criminal behaviour and social disorder. • Other research suggests that, contrary to neighbourhood effects, individual and family characteristics are more important in determining life chances and outcomes. • Collective efficacy, defined as social cohesion amongst neighbours, relates to neighbourhood cohesion and is considered by some to be a strong indicator of the level of crime and disorder in particular localities. It follows from this that strategies which enhance collective efficacy may have some impact on reducing some types of crime and disorder. • Neighbourhood effects research has led to a range of initiatives to tackle the relationship between neighbourhoods and crime, for example, community regeneration. • Housing and regeneration are important areas in the Scottish Government’s priorities for law, order and public safety, through strategies which seek to enhance community safety and regeneration. • Some UK research, such as the Edinburgh Study of Youth Transitions and Crime, suggests that the characteristics of the neighbourhoods in which young people live have some influence on delinquent and drug using behaviour, but that individual characteristics are also important. • Several schools of crime prevention through environmental design have developed, focusing primarily on architecture, housing construction and street layout. • Higher numbers of property and violent crimes have been found in areas with higher levels of deprivation, and the risk of being a victim of crime for those living in the 15% most deprived areas of Scotland is greater than for those living in the rest of Scotland. • Some research questions whether there is justification for the widespread adoption of policies to increase neighbourhood social mix, since this can result in physical segregation and a segregationalist attitude amongst residents. • The relationship between housing and crime for offender groups, including high risk offenders, has been increasingly recognised as a significant factor in reducing reoffending, with joined up working pursued as the most effective way to achieve this and to increase public safety.

Details: Edinburgh: Scottish Government, 2010.

Source: Internet Resource: Analytical Paper Series: Accessed August 16, 2012 at: http://www.scotland.gov.uk/Topics/Built-Environment/Housing/supply-demand/chma/marketcontextmaterials/housesandcrime

Year: 2010

Country: International

Keywords: Collective Efficacy

Shelf Number: 126049


Author: United States Agency for International Development

Title: United States Strategy to Prevent and Respond to Gender-based Violence Globally

Summary: Under the leadership of President Obama and Secretary Clinton, the United States has put gender equality and the advancement of women and girls at the forefront of the three pillars of U.S. foreign policy–diplomacy, development, and defense. This is embodied in the President’s National Security Strategy, the Presidential Policy Directive on Global Development, and the 2010 U.S. Quadrennial Diplomacy and Development Review (QDDR). Evidence demonstrates that women’s empowerment is critical to building stable, democratic societies; to supporting open and accountable governance; to furthering international peace and security; to growing vibrant market economies; and to addressing pressing health and education challenges. Preventing and responding to gender-based violence is a cornerstone of the Administration’s commitment to advancing gender equality. Such violence significantly hinders the ability of individuals to fully participate in and contribute to their families and communities–economically, politically, and socially. Vice President Biden, who authored the Violence Against Women Act while in the Senate, has been a leader in efforts to end violence against women and girls for two decades. Secretary of State Clinton and the U.S. Agency for International Development (USAID) Administrator Rajiv Shah also have been tireless advocates for ending gender-based violence, and have elevated this issue as a foreign policy priority. To further advance its commitment to gender equality and women’s empowerment, the Obama Administration has developed this new strategy to prevent and respond more effectively to genderbased violence globally. The purpose of the strategy is to establish a government-wide approach that identifies, coordinates, integrates, and leverages current efforts and resources. The strategy provides Federal agencies with a set of concrete goals and actions to be implemented and monitored over the course of the next three years with an evaluation of progress midway through this period. At the end of the three-year timeframe, the agencies will evaluate the progress made and chart a course forward. To ensure a government-wide perspective in developing this strategy, the White House, at the request of the U.S. Department of State and USAID, convened representatives from the U.S. Departments of State, the Treasury, Defense, Justice, Labor, Health and Human Services (including the U.S. Centers for Disease Control and Prevention (CDC) and the U.S. National Institutes of Health), and Homeland Security, as well as from the Office of the United States Trade Representative, the White House Office of Science and Technology Policy, USAID, the Peace Corps, and the Millennium Challenge Corporation. These included representatives working on the President’s Emergency Plan for AIDS Relief (PEPFAR), the Global Health Initiative (GHI), and the Office of the United States Government Special Advisor and Senior Coordinator for Children in Adversity. Additionally, the White House, the Department of State, and USAID held multiple consultations with civil society organizations to ensure that their perspectives informed the development of the strategy.

Details: Washington, DC: USAID, 2012. 60p.

Source: Internet Resource: Accessed August 17, 2012 at: http://www.state.gov/documents/organization/196468.pdf

Year: 2012

Country: International

Keywords: Domestic Violence

Shelf Number: 126057


Author: MacLean, Douglas

Title: Commercial Marriage Trafficking: Uncovering a Growing New Form of Transnational Human Trafficking, and Shaping International Law to Respond

Summary: In both the developing and the developed world, a rising demand for brides has led to an increase in marriage migration. As those who migrate for international marriages seek better lives, they become targets for criminal groups engaged in human trafficking. Unfortunately, international law on human trafficking, created as a floor for coordinated action, has become a ceiling; its silence on forced marriage has resulted in little movement on the international or domestic levels to tackle this growing new crime. As a result, marriage migrants, and even some who migrate for labor, are left at the mercy of commercial marriage traffickers. Drawing from work conducted at the United Nations Inter-Agency Project on Human Trafficking, this article uncovers the new phenomenon of commercial marriage trafficking, the conceptual gaps in international law that impede effective responses, and how those gaps can be successfully addressed. The article first introduces the definition of human trafficking under international law, discussing the crime in the context of marriage migration. Failures of international law to address exploitation in this specific context are then exposed and discussed. A new legal definition addressing the real-world realities of commercial marriage trafficking is introduced, turning the focus of scrutiny to the key point of exploitation, the act of marriage itself. The definition is examined through examples from real-world cases, with effective strategies for integrating the definition into existing international law discussed. Finally, key steps that states can immediately take to fight commercial marriage trafficking are drawn from existing international laws on marriage.

Details: Tokyo: The Center for Documentation of Refugees and Migrants, University of Tokyo, 2012. 37p.

Source: Internet Resource: Accessed August 17, 2012 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2122859

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 126060


Author: World Wide Fund (WWF). Tigers Alive Initiative

Title: How vulnerable are wild tigers to poaching in the sites critical for their survival?

Summary: As part of the global effort to double the number of the world’s remaining wild tigers, WWF has committed to support their recovery in 12 focal landscapes. In order to ensure the most effective use of its limited resources, WWF undertakes careful evaluations and monitoring of the landscapes and the individual sites that make up that landscape, particularly Protected Areas (PA). WWF carried out a preliminary assessment in April 2012 to gain insight into the relative security of sites crucial for increasing tiger population numbers in the places where WWF focuses support. Poaching is the most immediate threat to wild tiger populations worldwide (Champron et al., 2008; Check, 2006; Kenny et al., 1995) and therefore the main barrier to achieving the collective conservation goal of doubling the number of wild tigers by 2022 (Tx2). Stopping poaching is the single most direct action that can be taken to halt the decline in wild tigers and allow the recovery to begin. Substantial investments are being made by governments, donors and NGO partners to achieve the Tx2 goal. However, widespread poaching consistently undermines these efforts. In the fight against poaching, PAs are the first line of defence. Ideally PAs should be secure refuges for tigers that encourage healthy gene flow and steady population growth. If these sites are not effectively functioning as safe havens A recent preliminary assessment by WWF of 63 legally protected areas in seven tiger range countries shows that the minimum standards for protection according are only maintained in 22 of these areas, or 35%. This indicates that the areas set up to protect tigers and other threatened species are not necessarily the refuge they are designed to be. WWF’s internal preliminary assessment covered 84 locations, 63 of which are legally protected areas, in seven of the 12 countries where WWF currently works on tiger conservation. Scientists, researchers and managers working in the field, have determined these sites to be critical for wild tiger population growth. Each site was evaluated on three critical factors for protecting tigers: the number of protected area staff, the use of law enforcement monitoring tools, and whether the park was officially protected by law. Data for the assessment was collected from published sources and through a survey of WWF field staff and managers of the sites wherever available. Results from the assessment showed that staff and WWF field personnel from 41 of the 63 protected areas, or 65%, feel there are not enough staff to protect those areas and achieve Zero Poaching. One example is Malaysia’s Royal Belum State Park, critical for the survival of the Malayan tiger and where considerable poaching activity has been documented. Although occupying an area of over 1,000 km2, the park only has 17 enforcement staff. In contrast, protected areas such as Kaziranga National Park in India, with approximately 800 enforcement staff for about 860 km2, have been able to stem poaching activity. In Nepal, 2011 was recently celebrated as a Zero Poaching year for rhinos, which was largely attributed to the increase of range posts across several protected areas from 7 to 51. WWF has identified three actions tiger range governments can take immediately to launch an elevated operation towards Zero Poaching. These include identifying and delineating the most important sites requiring good protection from poaching, and ensuring these sites have sufficient numbers of enforcement staff who are well trained to monitor and improve their effectiveness by using monitoring systems. WWF also suggests that the police and judiciary need to help to ensure strict punishment on poaching and to actively engage local communities living adjacent to important tiger conservation areas.

Details: Kuala Lumpur, Malaysia: WWF-World Wide Fund for Nature, 2012. 14p.

Source: WWF TAI Report: Internet Resource: August 21, 2012 at http://awsassets.panda.org/downloads/wwf_tai_tiger_vulnerability_to_poaching_report_2012.pdf

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 126080


Author: Farah, Douglas

Title: Transnational Crime, Social Networks and Forests: Using natural resources to finance conflicts and post-conflict violence

Summary: Three case studies are used to argue that transnational organized crime networks for trafficking commodities, specifically timber, emerge in diverse circumstances of state strength and state absence that lead to cycles of violence. Criminal non-state armed actors operate in sub-national territories beyond state control in Petén, Guatemala, and areas of Colombia, while in Liberia, a strong but criminalized state loots the marginalized, resource-rich rural areas, rather than providing a positive state presence. The paper examines the social networks required at different nodes of the commodity chain. In all three cases, the networks rely first on traditional elites to act as local fixers, supplying the criminal state or non-state armed actor with connections to the market and financial networks needed to extract and sell the commodity. These local fixers, in turn, rely on "super fixers" to supply transport as well as weapons, ammunition and war materiel needed to fuel the violence, as well as to connect them to international "shadow facilitators" who can move illicit weapons and commodities, launder money, and obtain the fraudulent international documents, bank accounts, and shell companies needed. Timber, like alluvial diamonds, is as a ‘lootable†commodity-- extractible with low capital and skill requirements and diffusely located but often abundant in remote, porous border regions. Its transport is more bulky and detectable as well as being less valuable than diamonds and cocaine, so illegally sourced timber does not produce the discipline problems and is more easily “laundered†as legal than these other commodities. The environmental devastation created by timber harvest is especially damaging to subsistence forest-dependent communities. Palm oil, the fourth commodity examined, also has severe negative consequences for local communities and environment, but differs in that it requires the displacement of local communities in order to log and establish plantations, and requires time and capital inputs so cannot be quickly looted. Finally, palm oil is a “point source†commodity requiring centralized processing, transport, and management. These characteristics make the value of the forest land the primary source of conflict.

Details: Program on Forests (PROFOR), 2012. 56p.

Source: Internet Resource: Accessed August 21, 2012 at http://www.profor.info/sites/profor.info/files/Transnationalcrime_Farah.pdf

Year: 2012

Country: International

Keywords: Forests

Shelf Number: 126082


Author: Madison, Laura

Title: A Survey of Official and Unofficial Law Enforcement Twitter Accounts in Canada, the United Kingdom, and the United States

Summary: To use Twitter to its fullest potential for public communications, emergency management, and other functions, law enforcement agencies must first understand the medium -- not only how citizens use it, but also how their peers use it both officially and unofficially. This study, a survey of 1,089 police and police-related Twitter accounts, used 25 different criteria to show how agencies and officers are using Twitter, where they can improve, and implications for their future use.

Details: Canada: Canadian Association of Police on Social Media, 2010. 22p.

Source: Internet Resource: Accessed August 22, 2012 at http://www.sfu.ca/iccrc/content/twitter.survey.pdf

Year: 2010

Country: International

Keywords: Media and Communications

Shelf Number: 126091


Author: Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES)

Title: Elephant Conservation, Illegal Killing and Ivory Trade

Summary: Illegal killing of elephants for the illegal international trade in ivory is currently a very serious threat to elephant populations in many range States and may be leading to dramatic declines in some populations, particularly in central Africa. Data from the CITES MIKE programme indicate a continuing increase in levels of illegal killing of African elephants since 2006, with 2011 displaying the highest levels since MIKE records began. Similarly, data from the ETIS show a steady increase in levels of illicit ivory trade from 2004 onwards, with a major upsurge in 2009, and 2011 emerging as the worst year ever for large ivory seizures.

Details: Geneva, Switzerland: Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), 2012. 29p.

Source: Conference Document SC62 Doc. 46.1: Internet Resource: Accessed August 22, 2012 at http://www.cites.org/eng/com/SC/62/E62-46-01.pdf

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 126094


Author: Stoner, Sarah

Title: Current Global Trends in the Illegal Trade of Tigers

Summary: This is a presentation detailing the crime statistics on the illegal international trade of tigers and material from tigers, crime statistics, hotspot analysis and other information.

Details: New Delhi, India: World Wide Fund (WWF) & Global Tiger Initiative, 2012. 20p.

Source: Internet Resource: Accessed August 22, 2012 at http://www.globaltigerinitiative.org/wp-content/uploads/2012/07/TRAFFIC_Tiger_Trade_Analysis.pdf

Year: 2012

Country: International

Keywords: Crime Analysis

Shelf Number: 126098


Author: International Fund for Animal Welfare

Title: Stopping Illegal Wildlife Trade

Summary: Experts estimate that the demand for wildlife products such as tiger bone and elephant ivory is pushing some species to the brink of extinction. Elephants, tigers, and other animals with declining populations need legal protection from the trade in wildlife and wildlife products - with international collaboration in law enforcement. They need protection from poaching. They need consumers to reject wildlife products. Wild animals deserve a place in our future. IFAW believes that wild animals belong in the wild, not in commercial trade. This document offers statistics on such trade, and suggests countermeasures as well as other information about combating the illegal wildlife trade.

Details: Yarmouth Port, MA: International Fund for Animal Welfare (IFAW), 2011. 9p.

Source: Internet Resource: Accessed August 22, 2012 at http://www.ifaw.org/sites/default/files/wildlife_trade_us_0.pdf

Year: 2011

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 126099


Author: International Fund for Animal Welfare

Title: Killing with Keystrokes 2.0: IFAW's investigation into the European online ivory trade

Summary: Killing with Keystrokes 2.0: IFAW's investigation into the European online ivory trade surveyed websites in the UK, France, Germany, Portugal, Spain and Germany, and found a thriving in trade in ivory items the legality of most of which is questionable. In just two weeks, our survey found more than 660 items with a total advertising value of almost €650,000.00 across a variety of European websites. A shocking 98 per cent of adverts failed to comply with website policies or provide evidence of legality.

Details: Yarmouth Port, MA: International Fund for Animal Welfare, 2011. 11p.

Source: Internet Resource: Accessed August 22, 2012 at http://www.ifaw.org/sites/default/files/FINAL%20Killing%20with%20Keystrokes%202.0%20report%202011.pdf

Year: 2011

Country: International

Keywords: Endangered Species

Shelf Number: 126100


Author: Milliken, Tom

Title: The South Africa - Viet Nam Rhino Horn Trade Nexus: A deadly combination of institutional lapses, corrupt wildlife industry professionals and Asian crime syndicates

Summary: This document summarizes TRAFFIC’s comprehensive overview of events and dynamics currently driving an escalating illicit trade in rhino horns from South Africa to Viet Nam. Whilst it is recognized that there are other dimensions to the rhino horn trade within Africa and in Asia, this examination of the two principal countries serves to bring into focus many prominent characteristics of a still unfolding wildlife trade crisis of global importance. The story for South Africa is a data-rich narrative that underscores the intense preoccupation and commitment of that nation regarding rhino conservation. In contrast, almost no empirical data exist for understanding the Vietnamese side of the equation, which comes into focus primarily through a growing body of observational and anecdotal accounts. Regardless of any shortcomings, it is hoped that this effort will make a valuable contribution towards understanding the salient factors both in source country and end-use market that underlie the current rhino crisis. In turn, this knowledge should lead to remedial strategies, actions and interventions that serve to mitigate and prevent further losses of Africa’s iconic but threatened rhino species.

Details: Cambridge, UK: TRAFFIC, 2012. 180p.

Source: Internet Resource: Accessed August 28, 2012 at http://www.traffic.org/species-reports/traffic_species_mammals66.pdf

Year: 2012

Country: International

Keywords: Animal Poaching (South Africa) (Vietnam)

Shelf Number: 126123


Author: Bird, Annie

Title: Collateral Damage of a Drug War: The May 11 Killings in Ahuas and the Impact of the U.S. War on Drugs in La Moskitia, Honduras

Summary: In the early morning hours of May 11, 2012, residents of the peaceful indigenous community of Ahuas in northeastern Honduras awoke to the sound of low flying helicopters circling above the nearby Patuca River. Shortly afterwards, bursts of automatic gunfire were heard. Later that morning the Honduran National Police announced that they had killed two drug traffickers in the course of a counternarcotics operation that had recovered hundreds of kilos of cocaine. However, it soon emerged that local residents of Ahuas had a very different story to tell. Four innocent boat passengers, they said, had been killed by security agents: two women, one 14-year-old boy and one 21-year-old man. Four other passengers had been injured by gunfire, three of them critically. Men speaking English and identified as U.S. nationals were among the security agents who descended from the helicopters and attacked and threatened members of the community. In late July of 2012, analysts from Rights Action and the Center for Economic and Policy Research (CEPR) visited the Honduran capital and the region where the incident took place – the Department of Gracias a Dios – in order to collect detailed information connected to this incident from surviving victims and other eyewitnesses, Honduran state and local officials and U.S. officials. This report summarizes and analyzes the extensive testimony and other information obtained during the visit. It presents detailed narratives of the sequence of events on May 11 and provides detailed background profiles on the boat passengers who were fired upon as well as on key witnesses. It also describes the region and context in which the shooting incident occurred, in order to better understand its impact on the local community. Finally, it offers a series of key findings and formulates recommendations of next steps to be taken in order to ensure that justice is achieved in this case and that measures are taken – both by Honduran and U.S. policymakers – to avoid the recurrence of future tragic incidents of this nature.

Details: Washington, DC: Center for Economic and Policy Research (CEPR) in collaboration with Rights Action, 2012. 59p.

Source: Internet Resource: Accessed August 28, 2012 at http://www.cepr.net/documents/publications/honduras-2012-08.pdf

Year: 2012

Country: International

Keywords: Counternarcotics (Honduras) (U.S.)

Shelf Number: 126129


Author: Harris, Julian

Title: Keeping it Real: Combating the spread of fake drugs in poor countries

Summary: The outbreak of swine flu yet again brought fake medicines into the limelight, with Interpol warning of a quick spread in fake cures. Counterfeit and substandard medicines increasingly plague all corners of the world, causing death, suffering and provoking new drug resistant strands of disease. Up to a third of medicines in poor countries are counterfeit, according to the UK’s Department for International Development, while surveys in poor parts of the world show up to half of medicines are fakes. This paper estimates that 700,000 suffers of malaria and tuberculosis alone die annually due to fake drugs. This is the equivalent of four fully-laden jumbo jets crashing every single day. The root causes of the scourge of fake drugs must be understood in order to tackle the problem, with defective legal systems and government distortions of pharmaceutical markets largely to blame. Fortunately a new wave of technologies can protect the identity of high quality medicines, and are sufficiently complex to make counterfeiting economically unviable. Combined with stronger trademark laws and lower barriers to high quality medicines, these technologies offer real hope to the world’s poorest people.

Details: Washington, DC: International Policy Network - Health Issues, 2009. 30p.

Source: Internet Resource: Accessed August 28, 2012 at http://www.policynetwork.net/sites/default/files/keeping_it_real_2009.pdf

Year: 2009

Country: International

Keywords: Counterfeit Drugs

Shelf Number: 126131


Author: Moens, Alexander

Title: Measuring the Costs of the Canada-US Border

Summary: A decade has passed since the United States suffered the most violent foreign attack ever carried out on American soil. The negative consequences from the terrorist attacks of 9/11 have led to a new “security-first†orientation within many branches of the US government. As a result, the Canada-US border experienced a variety of new security regulations which have made it more costly to trade and travel between the two countries. This so-called thickening of the border has damaged the economic relationship between Canada and the US. Though an assortment of policies, programs, and pieces of legislation have been introduced to alleviate border restrictions, progress has been modest. Meanwhile, the costs associated with border crossing have not significantly decreased while government spending on border security has markedly increased. Despite the introduction of goal-oriented border security programs, the implementation and operational costs have largely been ignored. We argue that the border needs to be thought of in ways similar to other public programs; are the set goals achieved, and are they being achieved in the most efficient ways? Given the ongoing American concern about security we may face a situation in which border programs and costs increase, while slowdowns at the border persist. The border crossing efficiencies gained from new programs must exceed the costs for true progress to be made. Some key findings from this study include: after ten years of post-9/11 border innovations, the costs associated with border crossing have not significantly decreased while government spending on border security has markedly increased. In order to develop performance-based and cost-effective border management policies, an outline of costs associated with the border is required; Canadian and American governments should provide detailed descriptions of costs and expenditures for specific border programs and new security measures. Furthermore, these costs/expenditures must be linked to expected outcomes and timelines. "Costs and Results" based evaluations should be undertaken on a year-to-year basis, and subsequently made public; and, In December 2011, the governments of Canada and the United States issued a joint declaration called Beyond the Border: A Shared Vision for Perimeter Security and Economic Competitiveness. While the vision provides specific benchmarks and timelines for measuring progress, it does not tie these guidelines to government expenditures, or reductions in border crossing costs. Either we will continue with incremental and uncoordinated programs, creating some improvements but not lowering the overall cost of the border, or we will begin to create a new border regime.

Details: Calgary, Canada: Fraser Institute, 2012. 49p.

Source: Studies in Canada-US Relations: Internet Resource: Accessed September 4, 2012 at http://www.fraserinstitute.org/uploadedFiles/fraser-ca/Content/research-news/research/publications/measuring-the-costs-of-the-canada-us-border.pdf

Year: 2012

Country: International

Keywords: Border Control (Canada, U.S.)

Shelf Number: 126248


Author: Braga, Anthony

Title: Hot spots policing effects on crime

Summary: In recent years, crime scholars and practitioners have pointed to the potential benefits of focusing crime prevention efforts on crime places. A number of studies suggest that there is significant clustering of crime in small places, or “hot spots,†that generate half of all criminal events. A number of researchers have argued that many crime problems can be reduced more efficiently if police officers focused their attention to these deviant places. The appeal of focusing limited resources on a small number of high-activity crime places is straightforward. If we can prevent crime at these hot spots, then we might be able to reduce total crime. To assess the effects of focused police crime prevention interventions at crime hot spots. The review also examined whether focused police actions at specific locations result in crime displacement (i.e., crime moving around the corner) or diffusion (i.e., crime reduction in surrounding areas) of crime control benefits.

Details: Oslo: The Campbell Collaboration, 2012. 97p.

Source: Campbell Systematic Reviews 2012:8: Internet Resource: Accessed September 4, 2012 at http://www.campbellcollaboration.org/lib/download/2097/

Year: 2012

Country: International

Keywords: Crime and Place

Shelf Number: 126251


Author: United Nations Environment Programme

Title: Greening the Blue Helmets: Environment, Natural Resources and UN Peacekeeping Operations

Summary: This report aims to provide a comprehensive overview of how peacekeeping operations affect and are affected by natural resources and environmental conditions. The report is divided into two main parts. Part 1 reviews the environmental management of peacekeeping operations and showcases good practices, technologies and behaviours that have already been adopted. Part 2 examines the role that peacekeeping operations have played in stabilizing countries where violent conflicts have been financed by natural resources – including diamonds, gold, timber and oil – or driven by grievances over their ownership, access and control. It has been developed by UNEP in consultation with a number of international experts and nongovernmental organizations. In particular, it draws from valuable inputs from the Swedish Defence Research Agency, the International Institute for Sustainable Development and Global Witness. In the process of conducting the analyses, extensive consultations were conducted with the Department for Peacekeeping Operations (DPKO) and the Department for Field Support (DFS) at both the field and headquarter levels. The report is a component of ongoing technical collaboration between UNEP, DPKO and DFS, to increase the consideration given to natural resources and the environment in UN peacekeeping efforts. It has been developed in the context of UNEP’s mandate to “keep under review the world environmental situation in order to ensure that emerging environmental problems of wide international significance receive appropriate and adequate consideration by governments.†This report has been open to peer review by all of the current UN peacekeeping missions as well as to a selected number of international experts, academics and non-governmental organizations. The development process for this report has also been supported by UNEP’s Expert Group on Conflict and Peacebuilding. This work has been financed by the Government of Finland as a component of UNEP’s Environmental Cooperation for Peacebuilding programme.

Details: Nairobi, Kenya: United Nations Environment Programme, 2012. 134p.

Source: Internet Resource: Accessed September 4, 2012 at http://postconflict.unep.ch/publications/UNEP_greening_blue_helmets.pdf

Year: 2012

Country: International

Keywords: Natural Resources

Shelf Number: 126252


Author: United Nations

Title: Action Against Transnational Organized Crime and Illicit Trafficking, Including Drug Trafficking (2011-2013). Thematic Programme

Summary: This Thematic Programme on Action Against Transnational Organized Crime provides the framework for the United Nations Office on Drugs and Crime (UNODC) work against organized crime for the period 2011-2013. It outlines the context, the problems addressed and the challenges faced in preventing and combating organized crime in a globalized world. It describes the work of UNODC to assist countries in developing strategies, policies, action plans, programmes and projects in relation to all aspects of the United Nations Convention Against Transnational Organized Crime (UNTOC)and its three Protocols, as well as the three Universal Drug Conventions. This Thematic Programme develops responses to the six primary threats that have been identified. This response builds upon the Office’s core comparative advantages and expertise as a criminal justice sector provider, to close the loop on organized crime, challenging its perpetrators, disrupting its flows and its proceeds, whilst simultaneously building a culture of prevention and zero tolerance for crime and corruption, both nationally, regionally and internationally. The proposed programme strikes a balance between supporting long-term institutional capacity development objectives (for example, through building legislative and regulatory frameworks in line with international conventions, standards and norms) and working in partnership with the Governments of Member States to implement their policy priorities and strategies in a tangible and impact-orientated way. The programme presented here has three sub-programmes: • Sub-Programme 1: International Policy, Knowledge and Trends deals with UNODC’s normative role in support of the Conference of the Parties (COP) of UNTOC and the International Drug Conventions. This sub-programme drives forward critical international planning and policy making towards the framework of a coordinated and comprehensive international response. In addition, given the dynamic, opportunistic nature of organized crime, UNODC will utilize its expertise and experience to develop an evidence-based understanding of organized crime, monitor new and emerging forms of organized crime and the challenges that they present. • Sub-Programme 2: Regional and National Capacity Building and Technical Assistance guides the work of UNODC in ensuring the effective implementation of UNTOC and its Protocols through the provision of expert technical assistance, the creation of global tools (such as model laws, guides) and standardize proven approaches (through handbooks, case studies and international standards) which can serve as a platform for the customization of technical assistance and programme development via the Regional or Country Programmes which UNODC has already launched. These Programmes serve as an effective vehicle for Member States to promote international cooperation mechanisms, and build regional capacity in priority areas. • Sub-Programme 3: Human Trafficking and Migrant Smuggling describes the UNODC response to two heinous forms of organized crime most frequently characterized by human rights violations. As both phenomena are complex, so too are the approaches required in response. In responding to the mandate offered to UNODC through the UNTOC Protocols against Trafficking in Persons and with clear political momentum provided by the Global Plan of Action, UNODC seeks to position itself as a policy lead and central hub for the international anti-human trafficking community, and to build capacity for coordinated action around the four pillars of both the Protocol and the Global Plan of Action: prevention, protection, prosecution and partnership. The implementation of the Thematic Programme on Organized Crime and Illicit Trafficking, including Drug Trafficking, is a holistic exercise for all of UNODC, given the close inter-linkages and interdependencies of its mandates. However, the strategic leadership and accountability for delivery against this Thematic Programme is vested within the Division for Treaty Affairs, specifically the Organized Crime and Trafficking Branch (OCB) within UNODC, in close partnership and cooperation with the other substantive and geographical divisions of the Office.

Details: Vienna: United Nations, 2011. 119p.

Source: Internet Resource: Accessed September 5, 2012 at: http://www.unodc.org/documents/commissions/WG-GOVandFiN/Thematic_Programme_on_Organised_Crime_-_Final.pdf

Year: 2011

Country: International

Keywords: Drug Trafficking

Shelf Number: 126257


Author: Dahlgren, Stephan

Title: The Protection of Children from Illicit Drugs - A Minimum Human Rights Standard. A Child-Centered vs. a User-Centered Drug Policy

Summary: This report is a legal analysis of how human rights should be respected in the field of drug policy. The authors have reviewed international law governing both drug policy and human rights. They also examined statements from 20 international organizations and five UN agencies, which are active in this field. The main finding of the report is that Article 33 of the UN Convention on the Rights of the Child (often referred to as CRC) is the only one of the nine conventions governing human rights dealing with illicit drugs. There can be no mistaking of the meaning and intention of what CRC Article 33 aims to. It reads: "States Parties shall take all appropriate measures, including legislative, administrative, social and educational measures, to protect children from the illicit use of narcotic drugs and psychotropic substances as defined in the relevant international treaties and to prevent the use of children in the illicit production and trafficking of such substances." Thus, it is an obligation of every country that has ratified CRC to protect and sustain children's human rights to ensure a drug-free childhood. (Children are defined as persons under 18.) CRC is the most widely ratified of all conventions related to human rights. CRC Article 33 must always be the basis for any discussion of drug policy and human rights, internationally as well as nationally.

Details: Sweden: Fri Förlag, 2012. 131p.

Source: Internet Resource: Accessed September 10, 2012 at: http://wfad.se/images/articles/Protectionfromdrugs2012.pdf

Year: 2012

Country: International

Keywords: Child Protection, Drug Abuse

Shelf Number: 126292


Author: Gendarmerie Nationale

Title: Prospective Analysis on Trends in Cybercrime from 2011 to 2020

Summary: Cybercrime evolves and grows over time, as new information and communication technologies (ICT) are introduced. Everyone involved in the fight against cybercrime need to understand it in order to anticipate their actions. Twenty-two experts contributed to a prospective study on the decade from 2011 to 2020, based on an iterative process of electronic consultations, using the Delphi method and an open-ended questionnaire based on an ad hoc model. Their combined analyses made it possible to form a consensus on the trends and changes affecting cybercrime between now and 2020, through a discussion of the threats, attacks, authors, victims, and measures designed to keep information, government services, business and individual security and to provide a national defence in order to protect basic services, critical systems, and vital infrastructures. The dissemination of the results of the study is intended to encourage discussion on the strategies and resources to be implemented by decision-makers. For this purpose, it was presented during the 4th Upper Rhine Forum on Cyberthreats FRC2011, held at ENA (Ecole Nationale d’Administration) in Strasbourg, France, on 9th November 2011, on the topic "Cyberthreats at the horizon 2020", organized by the Région de Gendarmerie d'Alsace and the reserve officers (RC) of the Gendarmerie Nationale.

Details: Santa Clara, CA: McAfee, 2011. 54p.

Source: Internet Resource: Accessed September 11, 2012 at: http://www.mcafee.com/us/resources/white-papers/wp-trends-in-cybercrime-2011-2020.pdf

Year: 2011

Country: International

Keywords: Computer Crimes

Shelf Number: 126295


Author: Cahill, Joanne Clare

Title: Testing Two Theories of Criminal Careers: A Criminal Career Profile Approach

Summary: Criminal career research has emerged as a field interested in determining the factors related to the onset, frequency, duration, maintenance, and desistance of criminal behaviour (Blumstein & Cohen, 1987; Blumstein, Cohen, & Farrington, 1988). Various theories have been developed to account for these components of the criminal career, and the present research aims to examine the desistance components of two such theories in a sample of high risk adult offenders. Looking first at Moffitt’s (1993) adolescencelimited/ life-course persistent perspective, and then at Laub and Sampson’s (1993; Sampson & Laub, 2005) theory of informal social controls, there is limited evidence that either frequency of conviction or criminal career seriousness in high risk adult offenders can be explained well by reference to either of these theories alone. Although components of each theory appear to have some support within this sample, it is important to note that the prediction of future seriousness appears to be particularly difficult. Implications of these findings are discussed, with particular reference to policy concerns and areas for additional research.

Details: Wellington, NZ: Victoria University of Wellington, 2010. 124p.

Source: Internet Resource: Master's Thesis: Accessed September 12, 2012 at: http://researcharchive.vuw.ac.nz/bitstream/handle/10063/1737/thesis.pdf?sequence=2

Year: 2010

Country: International

Keywords: Criminal Careers

Shelf Number: 126316


Author: Meissner, Christian A.

Title: Interview and Interrogation Methods and Their Effects on True and False Confessions

Summary: We conducted a systematic review of the published and unpublished literatures on the interview and interrogation of suspects. Our focus was to examine the impact of accusatorial versus information-gathering approaches on the elicitation of confessions. Two meta-analytic reviews were conducted: one that focused on observational and quasi-experimental field studies of actual suspects in which ground truth (i.e., veracity of the confession statement) was unknown, and another that assessed experimental, laboratory-based studies in which ground truth was known. To be eligible, field studies must have included 1) at least one coded and quantified interviewing/interrogation method and 2) data on confession outcomes tied to the questioning style. Experimental studies must have included 1) at least two distinct interviewing or interrogation styles (e.g., direct questioning and accusatorial approach) and 2) sufficient data on true and/or false confession outcomes. Following an exhaustive search, 5 field studies and 12 experimental studies were deemed eligible for inclusion in the analyses. Results revealed that while both information-gathering and accusatory methods were similarly associated with the production of confessions in field studies, experimental data indicated that the information-gathering method increased the likelihood of true confessions, while reducing the likelihood of false confessions. Given the small number of independent samples, the current findings are considered preliminary, yet suggestive of the benefits of information-gathering methods in the interrogative context.

Details: Oslo, Norway: The Campbell Collaboration, 2012. 53p.

Source: Internet Resource: Campbell Systematic Reviews, 2012:13: Accessed September 12, 2012 at: www.Campbellcollaboration.org

Year: 2012

Country: International

Keywords: False Confessions

Shelf Number: 126317


Author: Global Agenda Council on Organized Crime

Title: Organized Crime Enablers

Summary: The Global Agenda Council on Organized Crime focused on the enablers of organized crime during the 2011-2012 term. This broad concept includes individuals, mechanisms and situations that play an important role in facilitating organized crime activities – whether intentionally or inadvertently – increasing its benefits and scale while reducing its risks. Organized crime exacts a multibillion cost on legitimate business, distorts markets and causes widespread ill-effects on society. Fuelled by the same forces of globalization that have expanded trade, communications and information worldwide, criminal syndicates now have unprecedented reach not only into the lives of ordinary people but into the affairs of multinational companies and governments worldwide. Although law enforcement has long focused on criminal gangs and illicit markets, only recently has it paid greater attention to those factors that enable such activities. This report focuses on the impact of enablers on three critical areas: cybercrime, money laundering and Free Trade Zones. In developing this report, the Council on Organized Crime took into account two main criteria: – continuity with its work in 2010-2011 on cybercrime and on money laundering in real estate – input received by Council on Organized Crime Members during virtual meetings and at the Summit on the Global Agenda in Abu Dhabi in October 2011

Details: Cologny/Geneva Switzerland: World Economic Forum, 2012. 27p.

Source: Internet Resource: Accessed September 13, 2012 at: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/GAC_Organized_Crime_2307_light_july.pdf

Year: 2012

Country: International

Keywords: Computer Crimes

Shelf Number: 126325


Author: Macdonald, Geraldine

Title: Cognitive-Behavioural Interventions for Children Who Have Been Sexually Abused

Summary: The sexual abuse of children is a substantial social problem that affects large numbers of children and young people worldwide. For many children, though not all, it can result in a range of psychological and behavioural problems, some of which can continue into adulthood. Knowing what is most likely to benefit children already traumatised by these events is important. This review aimed to find out if cognitive-behavioural approaches (CBT) help reduce the negative impact of sexual abuse on children. Ten studies, in which a total of 847 children participated, met the inclusion criteria for the review. The reporting of studies was poor, and there appear to be significant weaknesses in study quality. The evidence suggests that CBT may have a positive impact on the effects of child sexual abuse, including depression, post-traumatic stress and anxiety, but the results were generally modest. Implications for practice and further research are noted.

Details: Oslo, Norway: Campbell Collaboration, 2012. 73p.

Source: Internet Resource: Campbell Systematic Review 2012:14: Accessed September 13, 2012 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD001930.pub3/pdf

Year: 2012

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 126330


Author: Ouis, Pernilla

Title: Gender-Based Sexual Violence Against Teenage Girls in the Middle East: A comparative situational analysis of honour violence, early marriages and sexual abuse in Lebanon, the Occupied Palestinian Territories and Yemen

Summary: Working for the rights of girls in the Middle East and North Africa (MENA) has been Save the Children Sweden’s priority for the last years. Teenage girls in the region are predominantly exposed to severe violations of their rights according to the UN Convention on the Rights of the Child (CRC). The present project was initiated in order to produce a situation analysis on girls exposure to gender-based sexual violence in the region, as a continuation of work previously initiated about the struggle for girls rights in the MENA region. Examining the situation of teenage girls from a child rights perspective is an innovative and constructive approach that is perhaps a more successful strategy to deal with the issue than using the regular gender perspective. Teenage girls are children, and as such, are entitled to special rights. The project focused on three particular types of sexual violence against teenage girls in Lebanon, the occupied Palestinian Territories (OPT) and Yemen: honor violence, early marriages, and sexual abuse. The abovementioned forms of violence are related to sexuality, while only the two latter forms are sexual activities as such. Still, we categorize all three forms as sexual violence. Furthermore, since we are analysing these forms of sexual violence from a gender perspective, we can conclude that this violence is gender-based. Although boys are also victims in honourcultures, in the sense that they somehow are forced to “guard†and commit acts of violence against their sisters, we believe that the victims are primarily girls. We are concerned that girls are the most marginalised group in the region because they often face discrimination as females and as children. To focus too much on boys and other victims in honour cultures such as homosexuals, we believe would be another betrayal against the girls in the region. It should be stated that sexual violence against children exists in all societies around the world and is not a particular problem restricted to the MENA region. However, each society has its particular cultural-logic and mechanisms in the field of sexuality that have to be discerned and acknowledged. Some trends are general and almost universal, such as patriarchalism, as well as the shame and trauma associated to the victim of sexual abuse. This study emphasises analyzing in-depth gender-based sexual-abuse in the MENA region, rather than comparing the different problems between various cultures regarding this issue. Had our ambition been to compare various cultural traits and the problems of sexual violence between societies we would have had to conduct this study in a different way. Sexuality is often a controversial and charged topic touching the inner and existential aspects of our identity. Therefore, we are aware of the sensitivity of the subjects addressed in this report that include, gender roles, family building, religious morality, identity and kinship relations. Since this is a thorough analysis some of these aspects are criticized in the way that they are exploited for legitimising sexual abuse, for instance, Islam might be used to legitimise honour violence. By acknowledging this in our study, we do not say however, that Islam accepts honour-violence. Close kinship relations might be used as a method of psychological pressure on girls to marry early. Discussing this is not a criticism of kinship societies but only on some aspects of its practice.

Details: Beirut, Lebanon: Save the Children Sweden, 2007. 173p

Source: Internet Resource: Accessed September 13, 2012 at http://www.crin.org/docs/Gender_based_sexual_Violence.pdf

Year: 2007

Country: International

Keywords: Child Marriage (Lebanon) (Occupied Palestinian Ter

Shelf Number: 126335


Author: Robertson, Oliver

Title: Collateral Convicts: Children of incarcerated parents

Summary: Children of Incarcerated Parents’ was the topic for the 2011 UN Committee on the Rights of the Child’s Day of General Discussion (DGD), held in Geneva on Friday 31st September of that year. This was the first time that any part of the UN system had looked in detail at the issue of children affected by parental involvement in the criminal justice system, and it attracted unprecedented interest and engagement. Fifty-one written submissions from thirty-nine sources were made, while over 200 people took part in the discussion on the Day itself. An exhibition of children’s experiences and good practice (also named ‘Collateral Convicts’) accompanied the DGD, while workshops took place before and after the Day to explore the issues in more depth. This paper draws on all these sources, plus other important and relevant resources. Children of incarcerated parents, like children in general, are all individuals. Each will have a different experience of and response to parental imprisonment, and the unique situation of each child should be considered in all interactions with them and decisions that affect them. But regardless of individual circumstances, each child also has rights, including the right not to be discriminated against based on the status or activities of their parents (Convention on the Rights of the Child Article 2(2)), to the opportunity to be heard in any judicial and administrative proceedings affecting them (Article 12(2)) and the right to have their best interests be a primary consideration in all actions concerning them (Convention on the Rights of the Child Article 3(1)). Unfortunately, children of incarcerated parents are too easily ignored in the criminal justice system, which deals with identifying and responding to individual guilt or innocence. Children interacting with the criminal justice system (for example when visiting incarcerated parents) are ‘reduced to a security risk assessment, [while] within the broader community they are silent and silenced’. Only rarely do ministries responsible for children see them as a group of children exposed to particular challenges, meaning children of incarcerated parents often fall into the gaps between government agencies. Children of incarcerated parents exist in developing and developed countries all around the world, with certain experiences and features common to many such children. For many, the removal and detention of a parent is a negative experience, with implications for their future wellbeing. The risks associated with parental incarceration have been categorised into five main areas: 1. Risk of deprivation of basic necessities and opportunities; 2. Risk of danger of secondary victimisation and depersonalisation; 3. Risk of deterioration of overall situation of a child; 4. Risk of distance from incarcerated parent; and, 5. Risk of descent into antisocial behaviour More specifically, children may experience impacts including: physical and mental health impacts related to separation and other aspects of parental incarceration; a risk of relationship breakdown; the possibility of having to move house or be taken into care; financial difficulties; problems at school (educational and behavioural); increased vulnerability to neglect, abuse and victimisation; and difficulties in visiting incarcerated parents. ‘Finally it increases the risk of a child’s own prospects, as they fear or distrust authority, fail to receive the help they need, live in impoverished and unstable circumstances, and begin to accept prison as “normal†– or as the only place they can be with their mum or dad. Some of these problems will depend on factors such as the nature of the offence and sentence, the age and maturity of the child or which parent is imprisoned (children with incarcerated fathers are more likely to have another parent care for them than is the case when mothers are imprisoned). But as a group, children of incarcerated parents have faced all the issues detailed above and more, and would benefit from considered and timely interventions. As shown at the DGD, there are many examples of good practice from around the world, often small and inexpensive changes that make a major difference to the lives of children. Many are detailed below. Unfor tunately, these steps too often depend on the interest and involvement of individual prison staff or charities/non-governmental organisations (NGOs), rather than institutionalised good policy and practice. By sharing these examples and encouraging their use, we hope to increase the range, quality and consistency of support for children of incarcerated parents.

Details: Geneva: Quaker United Nations Office, 2011. 84p.

Source: Human Rights & Refugees Publications: Internet Resource: Accessed September 13, 2012 at http://www.quno.org/geneva/pdf/humanrights/women-in-prison/201203Analytical-DGD-Report-internet.pdf

Year: 2011

Country: International

Keywords: Child Welfare

Shelf Number: 126340


Author: Davis, Diane E.

Title: Urban Resilience in Situations of Chronic Violence

Summary: While the sources and forms of social and political violence have been extensively examined, the ways ordinary people along with their neighbors and officials cope with chronic urban violence have earned far less attention. This eight-case study of cities suffering from a history of violence explores this latter phenomenon, which we call resilience. We define resilience as those acts intended to restore or create effectively functioning community-level activities, institutions, and spaces in which the perpetrators of violence are marginalized and perhaps even eliminated. This report identifies the sets of conditions and practices that enhance an individual or a community’s capacity to act independently of armed actors. We specify the types of horizontal (e.g., intra-community, or neighborhood-to-neighborhood) and vertical (e.g., state-community) relationships that have been used to sustain this relative autonomy. Violence and responses to it are situated in physical space, and we look for the spatial correlates of resilience, seeking to determine whether and how physical conditions in a neighborhood will affect the nature, degrees, and likelihood of resilience. Urban resilience can be positive or negative. Positive resilience is a condition of relative stability and even tranquility in areas recently or intermittently beset by violence. Strong and cooperative relationships between the state and community, and between different actors—businesses, civil society, the police, etc.—tend to characterize positive resilience. Negative resilience occurs when violence entrepreneurs have gained effective control of the means of coercion, and impose their own forms of justice, security, and livelihoods. In such situations—most frequently in informal neighborhoods where property rights are vague or contested—the community is fragmented and seized by a sense of powerlessness, and the state is absent or corrupted. Our findings suggest that resilience appears at the interface of citizen and state action, and is strengthened through cooperation within and between communities and governing authorities. Resilience is robust and positive when ongoing, integrated strategies among the different actors yield tangible and sustainable gains for a particular community: improvement in the physical infrastructure, growing commercial activity, and communityoriented policing, to name three common attributes. When citizens, the private sector, and governing authorities establish institutional networks of accountability that tie them to each other at the level of the community, a dynamic capacity is created to subvert the perpetrators of violence and establish everyday normalcy. The security activities produced through citizen-state networks are most accountable, legitimate, and durable when they are directed and monitored by communities themselves, in a relationship of cooperative autonomy. More broadly, urban resilience benefits from good urban planning—promoting and investing in mixed commercial and residential land use, for example, particularly in areas of the city at-risk for crime, and building infrastructure that enables free movement of people within and between all neighborhoods (via pedestrian corridors; parks; public transport) to promote security and livelihoods. This speaks to the challenge of informality—the communities built up, usually on the city’s periphery, without regard to ownership rights. The legal entanglements of informality can be daunting, but some cities have finessed this to provide services, with substantially positive outcomes. Formal property rights or not, citizens of all income groups need to have the opportunity to live in vibrant areas where social, economic, and residential activities and priorities reinforce each other in ways that bring a community together in the service of protecting and securing those spaces. This process yields good results for the entire metropolitan area. Finally, this report develops the idea of legitimate security as a way to address the vexing interactions of the state and communities in the provision of security and positive resilience. The relationship of at-risk communities with the police is often troubled. Legitimate security addresses this by seeking to ensure democratic and participatory governance in every sense—political, civil, and social. It recognizes needs specific to marginalized and underrepresented populations, including ethnic/racial minorities, women, the poor, and indigenous groups. It is, moreover, a viable alternative to deleterious responses to insecurity—e.g., privatization of security, fortification of urban spaces, and vigilantism, among others. Legitimate security fosters broad participation and initiatives from “below†with an increased focus on multi-sector partnerships to provide more effective, lasting, and accountable ways forward for cities seeking security.

Details: Cambridge, MA: Massachusetts Institute of Technology, Center for International Studies; Washington, DC: United States Agency for International Development, 2012. 134p.

Source: Internet Resource: Accessed September 17, 2012 at: http://web.mit.edu/cis/urbanresiliencereport2012.pdf

Year: 2012

Country: International

Keywords: Crime Prevention

Shelf Number: 126361


Author: Australian Strategic Policy Institute

Title: Calming Troubled Waters: Global and Regional Strategies for Countering Piracy

Summary: Last October the Australian Minister for Foreign Affairs and the European Union High Representative for Foreign Affairs and Security Policy co-chaired a forum on piracy in the margins of the Commonwealth Heads of Government Meeting in Perth, attended by Indian Ocean Rim countries and stakeholders promoting security in Somalia and off the Horn of Africa. The Australian Government at that time agreed to host a Counter-Piracy Conference in Perth this year designed to explore further options to reduce piracy in Somalia and beyond. This Conference was held on 16–17 July 2012. It was attended by delegates from 59 countries and organisations and chaired by Mr Peter Jennings, Executive Director of the Australian Strategic Policy Institute. The Conference addressed global issues with piracy and armed robbery against ships. It compared the situation in the three main areas where these crimes are most prolific—in Southeast Asia, off the coast of Somalia and in the Gulf of Guinea—with a view towards gaining ideas about the lessons to be learned and how the fight against piracy and sea robbery might be strengthened at the national, regional and international levels. This Special Report opens with the speech presented by Warren Snowdon, Minister for Defence Science and Personnel, on behalf of Stephen Smith, Australian Minister for Defence to the Perth Counter-Piracy Conference. The report sets out a background paper prepared for the Conference by Dr Sam Bateman, Maritime Security Programme, S. Rajaratnam School of International Studies, Nanyang Technological University, Singapore, who was assisted in this task by ASPI’s Deputy Director, Dr Anthony Bergin. The report concludes with some personal reflections on the Perth international meeting by the Chairman of the Counter-Piracy Conference, as well as the final Chairman’s Statement, issued immediately following the conclusion of the Conference.

Details: Barton, ACT, Australia: Australian Strategic Policy Institiute, 2012. 44p.

Source: Internet Resource: Special Report -- Issue 47; Accessed September 17, 2012 at: http://www.aspi.org.au/publications/publication_details.aspx?ContentID=347&pubtype=10

Year: 2012

Country: International

Keywords: Armed Robbery

Shelf Number: 126362


Author: Candy Murphy and Associates

Title: Third Party Complaints of Anti-Social Behaviour in the Private Residential Tenancy Sector

Summary: The report begins by describing the situation of antisocial-behaviour in the private residential tenancy sector in Ireland in relation to anti-social behaviour, drawing largely on experience in the social housing sector. It goes on to look at experience in other countries, again largely drawing on the social housing sector. These countries were: – UK – US – Australia Additionally, a small amount of information was obtained from other countries that had been included in the review of rent deposit dispute mechanisms – Norway, the Netherlands and Greece.

Details: Dublin: Private Residential Tenancies Board, 2007. 55p.

Source: Internet Resource: Accessed September 17, 2012 at: https://www.housing.ie/Our-Publications/Private-Rented-Sector/PRTB_Third-Party-Complaints-of-Anti-Social-Behavio.aspx

Year: 2007

Country: International

Keywords: Antisocial Behavior

Shelf Number: 126363


Author: United Nations Office on Drugs and Crime

Title: Wildlife and Forest Crime Analytic Toolkit

Summary: Wildlife and forest offences are a complex phenomenon with many layers and dimensions. Wildlife and forest offences often result from the interplay of a multitude of factors—cultural, economic, social and environmental—and can involve a wide variety of actors. Thus, to achieve an effective response, wildlife and forest offences need to be addressed via a coordinated and multisectoral approach. This complexity makes it challenging for governments and international organizations to identify the strengths and weaknesses of and gaps in existing legislative, administrative, enforcement, judicial and preventive systems. Additionally, the fundamental difference between wildlife and forest offences and other forms of crimes should be acknowledged. Most property crimes, such as robbery, theft, arson and vandalism, are criminalized because they inflict harm on people or man-made property by creating uncertainty, diminishing confidence, and harming commerce and economic growth. All of these reasons apply for criminalizing the same acts against natural resources. However, there is an additional dimension to the fight against wildlife and forest crime; legislation to protect wildlife and forests also aims to ensure the sustainability of natural resource systems. This sets a different dynamic for wildlife and forest law enforcement, which should lead to the analysis of uses and users of wildlife resources taking into consideration the sustainability and promotion of compliance with good resource management policies. This Wildlife and Forest Crime Analytic Toolkit is intended to serve as an initial entry point for national governments, international actors, practitioners and scholars to better understand the complexity of the issue, and to serve as a framework around which a prevention and response strategy can be developed. The Toolkit provides an inventory of measures that can assist in the analysis of the nature and extent of wildlife and forest offences and in deterring and combating these offences. It is also intended to contribute to an understanding of the various factors that drive wildlife and forest offences to integrate the information and experience gained from such analysis into national, regional and international strategies. The Toolkit has been developed based on (a) lessons learned from national and international efforts to curtail illegal trade in wildlife, plants, animal derivatives and plant material, (b) scholarly analyses and the examination of cases, and (c) consultations with key stakeholders and relevant experts. The causes, components and consequences of wildlife and forest offences vary among countries, regions and societies around the world. There is no “one size fits all†solution to this issue. In formulating effective countermeasures, it is important that local patterns of wildlife and forest offences and the concerns of local communities be recognized and integrated into policy and legislation. The Wildlife and Forest Crime Analytic Toolkit is intended to provide a range of options that, in various combinations, will enable each country to assemble an integrated strategy that will be as effective as possible in meeting the country’s own unique needs. The measures set out in this Toolkit have been grouped into five key parts: legislation, enforcement, judiciary and prosecution, drivers and prevention, and data and analysis. The tools are organized thematically to ensure ease of use and to assist users in understanding the key issues confronting the system being analysed. The Toolkit in its current form will be pilot-tested in partnership with three selected national governments and will be revised to ensure that it is a practical, applicable tool. Additional material will be added as future needs are identified.

Details: Vienna, UNODC, 2012. 212p.

Source: Internet Resource: accessed September 17, 2012 at: http://www.unodc.org/documents/Wildlife/Toolkit.pdf

Year: 2012

Country: International

Keywords: Illegal Logging

Shelf Number: 126364


Author: TRANSCRIME

Title: Analysis of the Draft Protocol to Eliminate Illicit Trade in Tobacco Products

Summary: This report analyses the Draft Protocol to Eliminate Illicit Trade in Tobacco Products, currently under negotiation by the Intergovernmental Negotiating Body established by the Conference of the Parties to the World Health Organisation's Framework Convention on Tobacco Control. This study assesses the impact of the Draft Protocol on the illicit trade in tobacco products, identifying strong and weak points and possible improvements. This report also surveys the existing measures falling within the scope of the Draft Protocol in four countries in different continents (Canada, Italy, Singapore and South Africa), highlighting the differences and the incoherence among the surveyed countries.

Details: Trento, Italy: Transcrime, 2012. 73p.

Source: Internet Resource: Accessed September 18, 2012 at: http://transcrime.cs.unitn.it/tc/fso/pubblicazioni/AP/Transcrime-Analysis_of_the_Draft_Protocol_to_eliminate_ITTP.pdf

Year: 2012

Country: International

Keywords: Illegal Tobacco

Shelf Number: 126366


Author: Boudreau, Julie-Anne

Title: Constructing Youth Citizenship in Montreal and Mexico City: The Examples of Youth-Police Relations in Saint-Michel and Iztapalapa

Summary: Montreal has witnessed cyclical concerns about youth violence and street gangs. The threat is often “politically†constructed. Currently, Mexico City is struggling with a pervasive sense of insecurity. While the threat in Canada was largely attributed to mafias and organized crime throughout the 1990s (Sheptycki 2003), fear has crystallised on the figure of the young gang member in Mexico and Canada in the past few years. As Ungar writes, [y]outh thus become objects of collective fear, seen not as individuals but for the anxieties they cause and the jarring cultural changes they are seen to embrace. The particular impulsiveness of youths, wrapped up in their hostility to tradition and authority, only serves to aggravate these tensions. (Ungar 2009: 208)1 As a result, youths become the target of police action in public spaces. New repression measures are implemented, such as zero-tolerance policies or anti-gang operations, combined with a strengthened set of preventive actions ranging from youth brigades, to participatory youth projects, to community policing. In Montreal, preventive programs are generously financed by the Quebec Government and the Government of Canada. The money is channelled in priority boroughs selected on the basis of their scoring on a set of risk factors (such as household socio-economic status, school dropout rates, number of single-parent households, proportion of immigrants, general state of the built environment, the presence of gang activities in the borough, etc.). In Mexico City, particularly under the mayorship of Lopez Obrador (2000-2005), police reforms focused on community-run policing programs. The City of Mexico now has several programs for “at-risk†youths, including community youth brigades. Notably, and as discussed in greater detail in the Mexico section, today the Policía Sectorial, which is centrally overseen by the City, manages an outreach program for youth in schools that attempts to connect youth and police in a non-threatening environment. In addition to the citywide effort, Iztapalapa, the only borough in Mexico City with Auxiliary police directly under its command, also has a small team of Auxiliary police officers that implement similar efforts within the delegación. These programs are the closest thing to gang prevention efforts conducted by police in this borough. Such area-based approaches to crime prevention are reflected in the United Nations Guidelines for the Prevention of Crime (2002) and the earlier United Nations Guidelines for the Prevention of Urban Crime (1995), which call for a local approach to problem solving, taking into account the context of vulnerability to being victimized and/or to offending, as well as local resources. Situational approaches build on the “broken windows theory†(Wilson and Kelling 1982) among others, and community crime prevention, which includes consideration of such issues as social capital. The literature on street gangs by criminologists or psychologists (Goldstein 1991; Thornberry et al. 1993; Hawkins 1998) are also relevant. The concern is generally to find causal relationships between background factors (or risk factors) and illegal or violent acts, in order to point towards elements in which to intervene preventively. Over the course of the 1990s, this came to be known as the “new penology†(Feely and Simon 1992), which positions the criminal as a statistical probability to manage. Crime is not conceptualized as transgression; it is understood as the result of the accumulation of risk factors in a territory or an individual. Following this logic, the prevention system aims more to neutralize danger by regulating risks than by punishing or rehabilitating individuals. The stigmatizing effects of this (such as ghettoizing and/or racial profiling) have been largely documented by urban geographers and sociologists (Davis 1998; Symons 1999; Romero 2006; Wacquant 2006; Dikeç 2007). The work of Philoctète at the Maison d’Haïti in Saint-Michel in Montreal (confirmed by the data presented here) has documented how youths perceive the stigmatizing effects of prevention programs and research on their neighbourhood. Yet Saint-Michel has been very innovative in its approach to issues of street crime and insecurity in the borough, developing a comprehensive crime prevention approach which encompasses a range of socio-cultural, developmental and structural concerns. The neighbourhood police work on an area-based logic given the administrative structures in place, but recognize Saint-Michel as a community as well. The neighbourhood has seen many projects beyond gang prevention: support services of all types, work with migrant communities, cross-sector partnerships, community mobilization, etc. As Fady Dagher, former Police Commandant in Saint-Michel, said in a presentation at the 12th UN Congress in Salvador, they are trying to explicitly move from “zero tolerance†to “toleranceâ€. Much of this local approach is focused on the neighbourhood and the immediate community. Yet, a previous project has shown how moving around the city is important to youths and contributes greatly to their development (Cissé and Boudreau 2009; Guthrie 2009; Boudreau, Janni, and Chatel, 2011; see also Madzou and Bacqué 2008). This mobile and fluid aspect of youths’ everyday life is not always taken into account in prevention projects in Montreal and Mexico City. The developments in Saint-Michel are encouraging, but the youths to whom we spoke still feel at a distance from these programs and labelled as “vulnerableâ€. The previous research conducted by VESPA has highlighted depoliticization (making delinquency a technical, rather than a publicly debatable problem) as an important effect of these preventive approaches (Boudreau, Janni, and Chatel 2011). It became clear that one of the important effects of preventive measures framed by “at-risk†categorizations is to deny youths any sense of meaningful socio-political agency. As a street worker stated, “it is important to humanize the gang. In it, there are individuals with broken lives†(November 18, 2008, our translation). Viewing gangs as a technical problem of risk management depoliticizes the issue, while stripping youths of individual and group subjectivity. They are seen as vulnerable to gang recruitment rather than as individuals and groups able to act intentionally and autonomously. Parazelli’s (2004) work with street youths in Montreal demonstrates how they create their own autonomous space of action in reaction to the effects of this risk management logic of preventive action. Fortunately, some innovative projects on youth participation are seeking to counteract this (ICPC Youth Resource Guide 2010). With this project, we seek to contribute to this search for solutions.

Details: Montreal: Institut national de la recherche scientifique Centre - Urbanisation Culture Société, 2012. 167p.

Source: Internet Resource: Accessed September 21, 2012 at: http://im.metropolis.net/research-policy/research_content/doc/Youth-police_relations_in_Montreal_and_Mexico_City-final_report.pdf

Year: 2012

Country: International

Keywords: At-Risk Youth (Montreal, Canada, Mexico City)

Shelf Number: 126389


Author: Gerber, Monica

Title: Retribution as Revenge and Retribution as Just Deserts

Summary: Public attitudes towards law-breakers shape the tone and tenor of crime-control policy. The desire for retribution seems to be the main motivation underpinning punitive attitudes towards sentencing, yet there is some confusion in the research literature over what retribution really means. In this paper we distinguish between retribution as revenge (as the desire to punish criminal offenders to retaliate a past wrong by making the offender suffer) and retribution as just deserts (as the preference to restore justice through proportional compensation from the offender). Results from an online survey (n=176) provide evidence of two distinct dimensions of retribution, but we also show that these two dimensions have different ideological and motivational antecedents, and have different consequences in terms of the treatment of criminal offender. We find that retribution as revenge is associated with the motivation to enforce status boundaries with criminal offenders, as well as ideological preferences for power and dominance (as expressed by social dominance orientation) and in-group conformity (as expressed by right-wing authoritarianism). Endorsement of retribution as revenge also predicts the support of harsh punishment and the willingness to deny fair procedures. By contrast, retribution as just deserts is mainly predicted by a value restoration motive and by right-wing authoritarianism. After controlling for revenge, retribution as just deserts predicts support for procedural justice in the criminal courts. We conclude with the idea that beliefs about proportionality and compensation work as a buffer against the negative effects of revenge.

Details: London: London School of Economics & Political Science - Methodology Institute, 2012. 24p.

Source: Internet Resource: Working Paper; Accessed September 21, 2012 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2136237

Year: 2012

Country: International

Keywords: Just Deserts

Shelf Number: 126397


Author: Danish Crime Prevention Council

Title: The Effectiveness of Mentoring and Leisure-Time Activities for Youth At Risk: A Systematic Review

Summary: Community-based mentoring and leisure-time activities for youth at risk of offending can have promising effects for a variety of outcomes such as deviant behaviour, violence and delinquency – even when the young people’s negative behaviour is group-related. To begin with, the focus of research was prevention efforts addressing group-related violence alone, but a broader focus became more meaningful, considering many different factors concerning links between different kinds of crime and prevention, the available research, the characteristics of youth groups and the local challenges faced in Denmark. Troublesome youth groups are not always violent, and, if they are, violence is only one kind of crime among and linked to various others, which argues for a broader crime focus. Furthermore, the youth groups known in Denmark are mostly unstable with informal membership – they appear and disappear and rather have the shape of dynamic networks. The fact that young people gather in groups is a normal phenomenon, and youth groups are often based on friendship and common interests. Therefore, groups per se are not a fixed phenomenon to combat – rather their potentially deviant behaviour. Initial analyses also found that effect studies on gang prevention are often lacking or of a poor quality, which make them difficult to learn from. In addition, gang prevention and intervention projects mostly deal with adults and organized crime, whereas the aim of the review was promising prevention programmes and projects for youth at risk. An overview of various types of prevention efforts and their effects on this target group revealed that mentoring and leisure-time activities are applied to both general and group-related crime among young people. Community-based efforts within these two kinds of prevention were found to be the most well documented and promising ones and dealing with both deviant, delinquent and violent behaviour – also group-related. These kinds of interventions became the focus of the review. Mentoring and leisure-time activities are already applied in many Danish settings. A systematic review of effectiveness can qualify and guide practitioners dealing with actual problems ranging from mild and general to serious and group-related crime. After all, crime prevention is defined not by intentions to prevent, but by results, and since many risk and protective factors overlap, prevention efforts can possibly handle more than one problem. Whether they do must be examined thoroughly. This systematic review is based on structured and multi-disciplinary literature searches in articles published from 1980 to the end of 2011 in five international research databases, besides internet and reference searches. The literature has been screened systematically according to explicit inclusion and exclusion criteria. Among other things, the effect of the given prevention projects and programmes should be measured in terms of crime or mediating factors for crime, and the participating youth should include some 12-17-year-olds and at least 50 % boys, since they are at greater risk. Data has been extracted from each included full-text study in relation to many standardised categories describing, for instance, the given intervention, its target group, setting, organisation, effect etc., and, furthermore, many characteristics of the procedures of the study itself. Each study has undergone quality assessment, and overall low quality studies have been excluded.

Details: Glostrup: Danish Crime Prevention Council, 2012. 178p.

Source: Internet Resource: Accessed September 26, 2012 at: http://www.dkr.dk/sites/default/files/DKR%202012%20%20Mentoring%20and%20Leisure-Time%20Review.pdf

Year: 2012

Country: International

Keywords: At-risk Youth

Shelf Number: 126456


Author: Tyler, Tom R.

Title: Future Challenges in the Study of Legitimacy and Criminal Justice

Summary: Studies conducted over the last several decades have established that legitimacy shapes law-related behavior. They also make it clear that we should broaden our framework for understanding both how to conceptualize and measure legitimacy and for exploring its antecedents and consequences. This chapter reviews recent efforts to address these questions.

Details: New Haven, CT: Yale Law School, 2012. 27p.

Source: Internet Resource: Yale Law School, Public Law Working Paper No. 264:
Accessed September 26, 2012 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2141322

Year: 2012

Country: International

Keywords: Police Behavior

Shelf Number: 126460


Author: United Nations General Assembly. Human Rights Council

Title: Joint Report of the Office of the High Commissioner for Human Rights, the United Nations Office on Drugs and Crime and the Special Representative of the Secretary-General on Violence Against Children on Prevention of and Responses to Violen

Summary: The present report, submitted pursuant to Human Rights Council resolution 18/12, builds upon the 2006 United Nations Study on Violence against Children, which remains a foundational document for the prevention and elimination of all forms of violence against children in all settings, including within the juvenile justice system. This report describes the current situation of violence against children in the juvenile justice system, identifies the risks of violence to which children are exposed and analyses the systemic factors which contribute to violence. It provides a number of recommended strategies to prevent and respond to violence against children in the juvenile justice system.

Details: Vienna: United Nations, 2012. 19p.

Source: Internet Resource: Accessed September 27, 2012 at: http://srsg.violenceagainstchildren.org/document/a-hrc-21-25_505

Year: 2012

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 126471


Author: Myers, Adam

Title: The Objectification of Women as a Facilitator of Sex Trafficking Demand

Summary: Human trafficking represents one of the great social ills and avenues of international crime in our day. One facet of human trafficking, which involves the trafficking of women and girls into sex work industries, is perpetuated by demand within receiving states. Within developed states, this demand can be identified as being fostered by a culture of objectification of women, wherein women's bodies and sexual capability are seen as commodities. This objectified culture has been created and nurtured by cultural influences that vary in legality and general acceptance but are all pervasive practices, such as the presence of pornography, and depictions of women in general media sources such music, film, and advertising. The cultural sources of the objectification women must be seriously addressed in order to combat trafficking demand within developed receiving states.

Details: Unpublished Paper, 2011. 77p.

Source: Internet Resource: Accessed September 29, 2012 at: http://adamhmyers.com/Objectification-human%20trafficking.pdf

Year: 2011

Country: International

Keywords: Human Trafficking

Shelf Number: 126492


Author: Fergus, Lara

Title: Prevention of Violence Against Women and Girls

Summary: Ending violence against women and girls remains one of the most serious and ongoing challenges for the international system, Governments and civil society worldwide. The long-term efforts and advocacy of women’s and children’s organisations have helped place the issue high on national and international human rights and development agendas, and considerable progress has been made worldwide over recent years, particularly on improving justice and service responses for survivors. However interventions focussed on the aftermath of violence against women and girls, while essential, can only have limited impact on reducing violence itself – strategies are also urgently needed to stop such violence from occurring in the first place. Preventing such violence is a human rights obligation and an achievable goal, but one which requires sustained, coordinated and systematic action by Governments, the international community and civil society. This Background Paper was prepared to inform discussions at an Expert Group Meeting (EGM) on prevention of violence against women and girls, convened for 17–20 September 2012 in Bangkok, as part of the preparations for the fifty-seventh session of the Commission on the Status of Women (CSW). It analyses global progress, challenges and gaps in prevention of violence against women and girls, and identifies key guiding principles and promising practice examples. It makes initial indicative recommendations for international, regional and national stakeholders – particularly Governments as they have the primary responsibility for prevention of violence against women and girls – for further discussion and finalisation at the EGM itself. The Paper focuses on emerging evidence and practice for the development of holistic, multidimensional and long-term approaches to prevention, and highlights the responsibility of States to strengthen and invest in such approaches as part of their human rights obligations towards women and girls. Strategies for prevention of violence against women and girls in situations where States are not functioning effectively, are fragile or are in transition, including conflict, post-conflict and humanitarian settings – while having some commonalities with the practices referred to here – will necessarily be of a different order, and may be driven by different actors (e.g. humanitarian relief agencies). There is very little research and practice to draw upon regarding effective prevention of violence against women and girls in such settings, and the need for further work in this area is identified as a key gap in this Paper. Therefore, the bulk of the practice, evidence and recommendations referred to here is for stable situations where the State is in a position to lead long-term, multi-sectoral policy and programming.

Details: Bangkok, Thailand: United Nations Women, In cooperation with ESCAP, UNDP, UNFPA, UNICEF and WHO, 2012. 60p.

Source: Internet Resource: Accessed September 29, 2012 at: http://www.unwomen.org/wp-content/uploads/2012/09/cs557-EGM-prevention-background-paper.pdf

Year: 2012

Country: International

Keywords: Violence Against Girls

Shelf Number: 126493


Author: Findley, Michael

Title: Shell Games: Testing Money Launderers' and Terrorist Financiers' Access to Shell Companies

Summary: For criminals moving large sums of dirty money internationally, there is no better device than an untraceable shell company. This paper reports the results of an experiment soliciting offers for these prohibited anonymous shell corporations. Our research team impersonated a variety of low- and high-risk customers, including would-be money launderers, corrupt officials, and terrorist financiers when requesting the anonymous companies. Evidence is drawn from more than 7,400 email solicitations to more than 3,700 Corporate Service Providers that make and sell shell companies in 182 countries. The experiment allows us to test whether international rules are actually effective when they mandate that those selling shell companies must collect identity documents from their customers. Shell companies that cannot be traced back to their real owners are one of the most common means for laundering money, giving and receiving bribes, busting sanctions, evading taxes, and financing terrorism. The results provide the most complete and robust test of the effectiveness of international rules banning untraceable, anonymous shell companies. Furthermore, because the exercise took the form of a randomized experiment, it also provides unique insight into what causes those who sell shell companies to either comply with or violate international rules requiring them to collect identity documents from customers. Just as the random assignment to control (placebo) and treatment groups in drug trials isolates the effect of a new drug, so too the random assignment of low-risk “placebo†emails and different high-risk “treatment†emails isolated the effects of different kinds of risk on the likelihood of (a) being offered a shell company, and (b) being required to provide proof of identity. Key findings include:1 1. Overall, international rules that those forming shell companies must collect proof of customers’ identity are ineffective. Nearly half (48 percent) of all replies received did not ask for proper identification, and 22 percent did not ask for any identity documents at all to form a shell company. 5. Informing providers of the rules they should be following made them no more likely to do so, even when penalties for non-compliance were mentioned. In contrast, when customers offered to pay providers a premium to flout international rules, the rate of demand for certified identity documentation fell precipitously compared to the placebo.

Details: Nathan, Qld: Griffith University, 2012. 29p.

Source: Internet Resource: Accessed September 29, 2012 at: http://www.griffith.edu.au/__data/assets/pdf_file/0008/454625/Global-Shell-Games_CGPPcover_Jersey.pdf

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 126495


Author: International Advisory Commission of the Commonwealth Human Rights Initiative

Title: Police Accountability: Too Important to Neglect, Too Urgent to Delay

Summary: Some of the best policing in the world is found in the Commonwealth, and also some of the worst. But by and large, its 1.8 billion people do not have the policing they deserve. Police reform is too important to neglect and too urgent to delay. In too many countries, governments are failing in their primary duty to provide the public with an honest, efficient, effective police service that ensures the rule of law and an environment of safety and security. Today, membership to the Commonwealth is premised on countries practising democracy - and democratic governance requires democratic policing. The only legitimate policing is policing that helps create an environment free from fear and conducive to the realisation of people's human rights, particularly those that promote unfettered political activity, which is the hallmark of a democracy. Nevertheless, barring a few honourable exceptions, there is too much wrong with policing in the Commonwealth for the association and its member states to persist in closing their eyes to the fact that the continued presence of unreformed policing - powerful, unaccountable, coercive, biased, and corrupt - remains a badge of a long gone colonial subservience rather than a mark of confident sovereignty. Common colonial antecedents provide Commonwealth police structures a core resemblance but post-colonial histories have shaped present day policing in each country. The strengths and capabilities of police in the Commonwealth are now as diverse as the association itself. Sizes vary from less than 500 in tiny Dominica to more than a million in India. More importantly, population to police ratios vary: in South Africa for instance, there is one police officer per 404 people1; whereas in Bangladesh, it's one officer for every 1,200 people2. Some have huge financial and human resources to back them, while others must struggle to afford even basic stationery. Some - for example, Nigeria, Kenya and Canada - usually carry no lethal arms while others like South Africa, Jamaica, Sierra Leone and Northern Ireland routinely go armed. Some, like Malaysia, Trinidad and Tobago, and Fiji are strongly centralised while others are decentralised to state, provincial or local levels, such as Nigeria and the United Kingdom (UK). Some countries have a combination of national, state and local police forces. Canada and Australia, for instance, both have a federal police organisation, as well as state-level police organisations and Canada also has municipal police organisations. South Africa has one national police service and five separate municipal police services. India has 35 police forces and a proliferating number of paramilitaries and specialist forces, some directly under the control of the states while the ones at the centre fall under central government control. The evolution of policing values has also been influenced by individual national histories. In a few countries policing has benefited from relative affluence and long unbroken periods of peace and stability. Elsewhere policing has been negatively influenced by long periods of dictatorship, apartheid, one party rule, coups, internal conflicts, overweening executives, militarisation and politicisation and everywhere policing is now being shaped by the recent preoccupation with terrorism. But perhaps above all, poor policing in unreformed jurisdictions has been perpetuated and even fostered by the temptation of ruling regimes - elected or self-perpetuating - to retain a force wholly in its control and designed to suppress opponents and dissent with a heavy hand. Such police have proved especially valuable apparatus in retaining power at election time when rivalries and threat perceptions are heightened. The regime bias in policing has helped ruling elites topple governments as has happened in the Solomon Islands, retain them in the Maldives and assist in keeping them safe from challenge in many more.

Details: New Delhi: Commonwealth Human Rights Initiative, 2005. 116p.

Source: Internet Resource: Accessed September 29, 2012 at: http://www.humanrightsinitiative.org/publications/chogm/chogm_2005/chogm_2005_full_report.pdf

Year: 2005

Country: International

Keywords: Police Accountability

Shelf Number: 114626


Author: Fearon, James D.

Title: Homicide data, third revision - Background paper prepared for the WDR 2011 team

Summary: This brief paper summarizes results from an analysis of the WDR Homicide dataset (February 24, 2010), which is based primarily on estimates from the UNODC, with some changes or additions from national sources and the WHO. Although homicide rates appear to be the most reliable cross-national measure of crime, the best estimates we have are still probably much less reliable than parallel measures we have for presence and scale of civil conflict involving organized armed groups. This is so for two main reasons. First, the data are collected and reported by country agencies (police, usually), and procedures, definitions, and competence can vary greatly across countries and over time within them. Looking at the time series for particular countries suggests in many cases that large changes must be due to changed procedures or data collection policies, rather than changes in actual homicide rates. Second, there is a great deal of missing data. About 62% of all country years since 1960 have no homicide rate estimate, and about 47% of all country years since 1990. And of course, the data is not “missing at random†at all. Coverage is particular poor for lower income countries as indicated by Table 1, which shows the number of countries with homicide estimates, by region, for the year with the largest number of observations (2005). Notice that we have data for only 14 of 48 subSaharan Africa countries even in the best year, and for only 16 of 37 countries in Asia. It is entirely possible, even likely, that results for “global†models run below would be change if we had data for more of these missing Africa and Asian low income countries. As it is, it should be kept in mind that the global sample effectively overweights Western, Eastern European/FSU, and Latin American countries. Summary points: Homicide rates have been increasing markedly in Latin American and Caribbean countries since the early 1990s. There has been a slight tendency for higher homicide levels in drug producing or trafficking countries, but not very large. Basically, there has been an increase in homicide rates in the whole region; Elsewhere homicide rates appear to have either stayed steady or declined over the last 20 years, although for several regions we only have time-series data for a few countries (Africa, Asia, North Africa/Middle East in particular); Homicide rates tend to be highest in middle income countries, although this could be due to some correlated regional effect (esp. Latin America) rather than a causal effect of income level; Homicide rates tend to be higher in countries with greater income inequality, and this pattern seems to hold even when we compare countries within the same region. It is not clear why this is the case, and whether it is a causal effect; Homicide rates tend to be higher in democracies versus autocracies. This is true both across countries and when we look at the effect of transitions to democracy within countries. This may be a causal effect – it may be that authoritarian states have more aggressive, oppressive, and/or competent police forces than do typical new democracies, making for less crime in general. It could also be a measurement issue – perhaps autocracies are less inclined to report homicides. Higher economic growth rates predict lower homicide rates, even comparing periods within countries; Most of the correlates of civil war/conflict onset do not predict higher homicide rates. Higher income works the same way for both; richer countries have lower conflict risk and lower homicides. Democracy is essentially unrelated to conflict risk (controlling for income level), but associates with higher homicide rates; Measures of better governance in 1996 and 1998 are associated with lower homicide rates in the period 2000-2005. This relationship appears even when we control for income in 2000-2005. Interestingly, it only appears if we also control for degree of democracy, because it turns out that democracy is correlated with better governance but also with more homicides. Thus, comparing countries at similar levels of income and democracy, the ones judged to be better governed in terms of corruption, “government effectiveness,†regulatory quality, and (perhaps not surprisingly) “rule of law†in the late 1990s had lower homicide rates in 2000-2005.

Details: Department of Political Science, Stanford University, 2011. 25p.

Source: Background paper prepared for the WDR 2011 team: Internet Resource: Accessed September 30, 2012 at http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2011/06/01/000356161_20110601045939/Rendered/PDF/620370WP0Homic0BOX0361475B00PUBLIC0.pdf

Year: 2011

Country: International

Keywords: Crime Rates

Shelf Number: 126513


Author: Ataiants, Janna

Title: Policing People Who Inject Drugs: Evidence from Eurasia

Summary: The purpose of this briefing paper is to review up-to-date evidence on the 2 Policy and Advocacy Programme Officer, Eurasian Harm Reduction Network 3 Drug Policy Coordinator, Eurasian Harm Reduction Network 1 Consultant, Eurasian Harm Reduction NetworkConsultant, Eurasian Harm Reduction Network 2 institutionalisation of police violence toward people who use drugs across the region and the implications of these practices for public health and society. The review relies on data collected from several Eurasian countries and depicts instances of police abuse against people who use drugs as systematic practices widespread across the region. The paper concludes that the quantity and quality of interactions with the police profoundly shape the behaviour of people who use drugs and result in poor public health outcomes.

Details: London: International Drug Policy Consortium, 2012. 15p.

Source: IDPC Briefing Paper: Internet Resource: Accessed October 1, 2012 at http://dl.dropbox.com/u/64663568/library/IDPC-briefing-paper_Policing-people-who-inject-drugs-evidence-from-Eurasia.pdf

Year: 2012

Country: International

Keywords: Drug Use and Abuse, Injection

Shelf Number: 126539


Author: Financial Action Task Force

Title: Illicit Tobacco Trade

Summary: The Financial Action Task Force (FATF) Plenary met in Mexico City, during June 2011. It was at said Plenary where a proposal to conduct typology research work into money laundering and terror financing to be associated with the Illicit Trade in Tobacco (ITT) was accepted. March of 2011 also saw the OECD launch the “Oslo Dialogue†with the aim of promoting a whole of government approach to the tackling of financial crimes and illicit flows. This has been augmented by the G20 calling for strengthened inter-agency cooperation to fight illicit activities as well as the FATF adding tax crimes to the list of predicate offences. The proponents of the typology stated that the illicit tobacco trade was prone to money laundering. Trade was considered to be cash intensive and profitable whilst being accompanied by low levels of risk posed to the criminal groupings (in terms of detection, seizures, penalties, criminal procedure) contributing towards the manifestation of the related illicit activities. Key areas of concern included: a) Loss of revenue to the fiscal authorities. b) The use of the illicitly generated proceeds (i.e., to fund other crimes or the financing of terror). c) The ability to distinguish between illicit activities as undertaken by licit and illicit players in the tobacco sector. d) To identify the extent that governments enforcement agencies prioritise the addressing of illicit trade in tobacco when compared to other crimes. It was furthermore mentioned that the project was to augment work already conducted by the FATF, which included Trade Based Money Laundering (June 2006), Laundering the Proceeds of VAT Carousel Fraud (February 2007), ML Vulnerabilities in Free Trade Zones (February 2010) as well as the then recently published Global ML/TF Threat Assessment (June 2010). The identified key objectives were: a) To determine the extent of the Money Laundering and Terror Financing (ML/TF) vulnerabilities associated with illicit trade in tobacco at a global, regional and domestic level. b) To identify relevant case studies and determine trends and patterns from a global, regional and domestic perspective. c) To identify possible indicators which may assist financial and non financial institutions in developing mechanisms to identify, report and counter smuggling activities and the misuse of trade practices. d) To assist jurisdictions and FATF-Style Regional Bodies (FSRBs) in knowledge building and the identification of harms, drivers and measures associated with the illicit trade in tobacco. e) To enhance the efforts aimed at curbing ML and TF associated with the illicit trade in tobacco. This document provides a synopsis of the nature and extent of the ML/TF risks currently associated with the illicit trade in tobacco. It contains an overview of the problem statement and the data provided, as well as an analysis of the predicate offences, extent of associated money laundering and terror financing activities coupled lastly to the various jurisdictional enforcement responses to the curbing of this specific phenomenon.

Details: Paris: FATF, 2012. 80p.

Source: Internet Resource: Accessed october 4, 2012 at: http://www.fatf-gafi.org/media/fatf/documents/reports/Illicit%20Tobacco%20Trade.pdf

Year: 2012

Country: International

Keywords: Financial Crimes

Shelf Number: 126552


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: Illegal Trade in Environmentally Sensitive Goods

Summary: Illegal trade in environmentally sensitive goods, such as threatened wildlife, timber, hazardous waste, and ozone-depleting substances, has been a long-standing issue in the international trade and environment agenda. The nature of such illegal trade makes it difficult to fully understand its extent and impact on the environment. Developing effective policies to reduce illegal trade requires a clear understanding of what drives this trade and the circumstances under which it thrives. In this report, evidence-based on customs data and information from licensing schemes is used to document the scale of illegal trade, as well as the economic and environmental impacts of such trade. National and international policies have an important role to play in regulating and reducing illegal trade and the report highlights a range of measures that can be taken at both levels.

Details: Paris: OECD Publishing, 2012. 147p.

Source: Internet Resource: OECD Trade Policy Studies, 2012. Accessed October 4, 2012 at: http://www.oecd-ilibrary.org/docserver/download/fulltext/9712051e.pdf?expires=1349355092&id=id&accname=oid006203&checksum=68038CFB2A32D76B27CB3A01C5E7955F

Year: 2012

Country: International

Keywords: Hazardous Waste

Shelf Number: 126554


Author: Child Soldiers International

Title: Louder Than Words: An Agenda for Action to End State Use of Child Soldiers

Summary: The report “Louder than words: An agenda for action to end state use of child soldiers†was published to mark the tenth anniversary year of the entry into force of the Optional Protocol to the Convention on the Rights of the Child on the involvement of children in armed conflict. It examines the record of states in protecting children from use in hostilities by their own forces and by state-allied armed groups. It finds that, while governments’ commitment to ending child soldier use is high, the gap between commitment and practice remains wide. Research for the report shows that child soldiers have been used in armed conflicts by 20 states since 2010, and that children are at risk of military use in many more. The report argues that ending child soldier use by states is within reach but that achieving it requires improved analysis of “risk factorsâ€, and greater investment in reducing these risks, before the military use of girls and boys becomes a fact. Real prevention means tackling risk where it begins – with the recruitment of under-18s. A global ban on the military recruitment of any person below the age of 18 years – long overdue – must be at the heart of prevention strategies, but to be meaningful it must be backed by enforcement measures that are applied to national armies and armed groups supported by states. The report contains detailed analysis of the laws, policies and practices of over 100 “conflict†and “non-conflict†states providing examples of good practice and showing where flaws in protection put children at risk. It also shows how states can do more to end child soldier use globally via policies and practices on arms transfers and military assistance, and in the design of security sector reform programs. On the basis of this analysis a “10-Point Checklist†is included to assist states and other stakeholders in assessing risk and identifying the legal and practical measures needed to end child soldier use by government forces and state-allied armed groups.

Details: London: Child Soldiers International, 2012. 162p.

Source: Internet Resource: Accessed October 4, 2012 at: http://www.child-soldiers.org/global_report_reader.php?id=562

Year: 2012

Country: International

Keywords: Armed Conflict

Shelf Number: 126555


Author: Nellemann, Christian, ed.

Title: Green Carbon, Black Trade: Illegal Logging, Tax Fraud and Laundering in the Worlds Tropical Forests. A Rapid Response Assessment.

Summary: This report – Green Carbon, Black Trade – by UNEP and INTERPOL focuses on illegal logging and its impacts on the lives and livelihoods of often some of the poorest people in the world set aside the environmental damage. It underlines how criminals are combining old fashioned methods such as bribes with high tech methods such as computer hacking of government web sites to obtain transportation and other permits. The report spotlights the increasingly sophisticated tactics being deployed to launder illegal logs through a web of palm oil plantations, road networks and saw mills. Indeed it clearly spells out that illegal logging is not on the decline, rather it is becoming more advanced as cartels become better organized including shifting their illegal activities in order to avoid national or local police efforts. By some estimates, 15 per cent to 30 per cent of the volume of wood traded globally has been obtained illegally. Unless addressed, the criminal actions of the few may endanger not only the development prospects for the many but also some of the creative and catalytic initiatives being introduced to recompense countries and communities for the ecosystem services generated by forests. One of the principal vehicles for catalyzing positive environmental change and sustainable development is the Reduced Emissions from Deforestation and Forest Degradation initiative (REDD or REDD+). If REDD+ is to be sustainable over the long term, it requests and requires all partners to fine tune the operations, and to ensure that they meet the highest standards of rigour and that efforts to reduce deforestation in one location are not offset by an increase elsewhere. If REDD+ is to succeed, payments to communities for their conservation efforts need to be higher than the returns from activities that lead to environmental degradation. Illegal logging threatens this payment system if the unlawful monies changing hands are bigger than from REDD+ payments. The World’s forests represent one of the most important pillars in countering climate change and delivering sustainable development. Deforestation, largely of tropical rainforests, is responsible for an estimated 17 per cent of all man-made emissions, and 50 per cent more than that from ships, aviation and land transport combined. Today only one-tenth of primary forest cover remains on the globe. Forests also generate water supplies, biodiversity, pharmaceuticals, recycled nutrients for agriculture and flood prevention, and are central to the transition towards a Green Economy in the context of sustainable development and poverty eradication. Strengthened international collaboration on environmental laws and their enforcement is therefore not an option. It is indeed the only response to combat an organized international threat to natural resources, environmental sustainability and efforts to lift millions of people out of penury.

Details: United Nations Environment Programme, GRID Arendal. 2012

Source: Internet Resource: Accessed October 4, 2012 at:

Year: 2012

Country: International

Keywords: Illegal Logging

Shelf Number: 126558


Author: Liem, Marieke Christine Agatha

Title: Homicide Followed by Suicide. An Empirical Analysis

Summary: When headlines such as the ones above confront us every now and then our illusion of safety is shattered: the perpetrator is not a stranger, but someone who is wellâ€known to us. Although already considered to be incomprehensible, when in such killings the perpetrator subsequently kills himself, we remain puzzled. The event is even more puzzling given the fact that usually, these perpetrators are older, white men, who do not have a criminal record (Marzuk et al., 1992; Stack, 1997), thereby challenging our idea of the ‘conventional’ criminal. Some see the perpetrator as a victim of his own acts, whereas others are of the opinion that his suicide is spiteful as he cannot be brought to justice for his4 cruel acts. Acts in which a homicide is followed by the suicide of the perpetrator are termed homicideâ€suicides. So far our knowledge of homicideâ€suicide is remarkably limited, particularly in the Netherlands. In the first place, this concerns our empirical knowledge of the phenomenon. Given the differences in their very nature, both homicide and suicide have mostly been studied independently, or, as Stack has (1997) has pointed out: “Research on homicide has neglected suicide and research on suicide has neglected homicideâ€. Even though numerous studies have been conducted on both homicide (for an overview, see Nieuwbeerta & Leistra, 2003) and on suicide (e.g. Garssen & Hoogenboezem, 2007; Neeleman, 1998) in the Netherlands and elsewhere, up until now only a limited number of studies have undertaken the endeavor to examine homicideâ€suicides theoretically and empirically. Compared to the studies carried out on homicide and suicide, research on homicideâ€suicide is considerably limited. A second gap in our knowledge exists regarding theoretical approaches to homicide-suicide. So far, no comprehensive theoretical approach to the homicideâ€suicide phenomenon has been developed. Rather, from a current theoretical point of view homicideâ€suicide constitutes a combination of both homicide and suicide, both types of lethal violence resulting from aggressive impulses. These theories, however, do not clarify under which circumstances one chooses to commit one type of lethal violence over another type – and they certainly do not explain the occurrence of a homicide - suicide. Homicideâ€suicide is typically regarded as a variation of homicidal behaviour, where the subsequent suicide is the result of feelings of guilt or a fear of the judicial consequences, or as a variation of suicidal behavior, in which the victim is ‘taken along’ in the suicide of the perpetrator (Cavan, 1928; Milroy, 1993; West, 1965). The fact that we hardly have any adequate empirical or theoretical knowledge on homicideâ€suicide has major implications both from a criminal justice and a public health perspective. Within the criminal justice system, particularly concerning detention facilities, there is a need to distinguish suicidal from nonâ€suicidal homicide perpetrators. DuRand et al. (1995), for example, have shown that a charge of murder or manslaughter poses an important risk factor in prison suicide. Various other studies have found that the majority of those committing suicide in prison were accused of murder or manslaughter (Danto, 1989; Salive et al., 1989; Smialek & Spitz, 1978). Yet, none of these studies regarded the suicide as a reaction to the initial homicide. Rather, the homicide is considered as a correlate rather than a cause of prison suicide. Distinguishing suicidal from nonâ€suicidal homicide perpetrators might allow for improvements in the prevention of suicide in detention. From a public health perspective, considering homicideâ€suicide as primarily homicidal implies that prevention measures for homicide are parallel with those for homicideâ€suicide. Similarly, considering homicideâ€suicide as primarily suicidal infers that similar prevention measures for suicide might contribute to preventing homicidesuicides. However, perceiving of homicideâ€suicide as a separate phenomenon might require a different approach to prevention altogether. To sum up, homicide followed by the suicide of the perpetrator constitutes a neglected phenomenon in the scientific realm. This study aims to increase our knowledge of homicideâ€suicide in at least four ways, namely by: 1. Systematically reviewing previous empirical studies on homicideâ€suicide as well as previous theoretical notions connected with the homicideâ€suicide phenomenon; 2. Describing the nature and incidence of homicideâ€suicide in the Netherlands and putting these findings into an international perspective; 3. Advancing the state of knowledge by not only assessing homicideâ€suicides in isolation, but by comparing these acts to both homicide and suicide, in that way coming to an understanding of which characteristics explain the occurrence of homicideâ€suicide relative to other types of lethal violence; 4. Empirically assessing existing theoretical assumptions on homicideâ€suicide.

Details: Utrecht, The Netherlands: Utrecht University, 2010. 257p.

Source: Internet Resource: Dissertation: Accessed October 5, 2012 at: http://igitur-archive.library.uu.nl/dissertations/2010-0204-200151/liem.pdf

Year: 2010

Country: International

Keywords: Homicide

Shelf Number: 126559


Author: Romaniuk, Peter

Title: From Input to Impact: Evaluating Terrorism Prevention Programs

Summary: In the years following 9/11, threat assessments necessarily focused on the dangers posed by al-Qaida, its affiliates, and those inspired by its ideology. There are signs, however, that the threat today is more complex and diffuse, comprising extremists from all parts of the ideological spectrum who may act in small “self-starter†groups or, in some cases, as “lone wolves.†The paths to extremism are more varied than ever before, and as our understanding of contemporary patterns of radicalization has advanced, terrorism prevention initiatives have become more prevalent in the counterterrorism repertoire at the national and multilateral levels. As many states have elaborated terrorism prevention strategies in recent years, they have begun to confront similar challenges. Among these is the challenge of program evaluation. Is the turn toward prevention an effective response to the diverse extremist threats that states face today? How can the effectiveness of prevention policies be measured? What approaches have states advanced in evaluating the impact of terrorism prevention initiatives? In responding to this challenge, can lessons be gleaned from efforts to evaluate programs in related policy domains? This policy report provides an initial discussion of these questions. It draws on the discussions during a meeting entitled “Colloquium on Measuring Effectiveness in Counterterrorism Programming†and held in Ottawa on 9–10 February 2012, as well as discussions with experts, government officials, and an initial desktop literature review.

Details: New York: Center on Global Counterterrorism Cooperation, 2012. 24p.

Source: Internet Resource: Accessed October 7, 2012 at http://www.globalct.org/images/content/pdf/reports/CGCC_EvaluatingTerrorismPrevention.pdf

Year: 2012

Country: International

Keywords: Crime Prevention

Shelf Number: 126571


Author: Daudelin, Jean

Title: Moving Frontiers: Patterns of Drug Violence in the Americas

Summary: This paper looks at the dynamics of drug violence through a property rights lens, building on the work of Alson, Libecap and Mueller on land conflict in the Amazon. In the Americas, high levels of violence are concentrated in dysfunctional drug frontiers, i.e. in areas that have the following characteristics: the drug rent is large relative to the size of the local economy; the state's repressive capabilities are relatively limited; and local competition over the drug rent is poorly self-regulated. These dysfunctional drug frontiers move around, as the value of drug rents in particular areas changes; as state repression's incentives, capabilities and/or effectiveness change over time, increasing the cost of rent capture in particular areas, and decreasing it in others; and as the quality of the self-regulation of local competition over the drug rent gets better over time in some places, and worse in others.

Details: Ottawa, Ontario: Centre for Security and Defence Studies, The Norman Paterson School of International Affairs, Carleton University, 2010. 28p.

Source: Internet Resource: Accessed October 7, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1725955

Year: 2010

Country: International

Keywords: Armed Conflict (Americas)

Shelf Number: 126574


Author: Albanese, Jay S.

Title: Assessing Risk, Harm, and Threat to Target Resources against Organized Crime: A Method to Identify the Nature and Severity of the Professional Activity of Organized Crime and its Impacts (Economic, Social, Political)

Summary: The risk, harms, and threat posed by organized crime are a central concern of governments and citizens around the world. Methods to identify, rank, and combat organized crime activity are drawing greater attention in recent years as both domestic and international organized crime activities threaten legitimate economies, governments, and public safety. In response to calls for proactive work to better understand, anticipate, and respond to organized crime, methods are being developed to calibrate the comparative risk of different crime groups and different types of legal and illegal markets at risk for infiltration. Many international efforts are in their early stages, and lack a transparent approach or method, so an effort is made here to develop a more precise empirical, theoretically-based approach to risk assessment which has relevance across jurisdictions. The result reported here is a proposed methodology that offers both law enforcement and prevention efforts a basis for targeting resources using an objective rationale and risk model. In this way, the precise nature of different organized crime-related risks will be identified empirically, and which can be defended to skeptics, and permit the allocation of scarce resources to those organized crime problems found to pose the greatest risk. Furthermore, periodic application of this risk assessment method can be used to gauge the success of organized crime interdiction and prevention efforts over time. This working paper will move forward existing research and practical assessment efforts on organized crime both within (domestic) and also among countries (international) by offering a transparent approach not confined to any particular location. But first it is necessary to be clear about the precise issues to be assessed: what is organized crime, risk, harm, and threat - the four central elements to this effort.

Details: Santiago, Chile: Global Consortium on Security Transformation (GCST), 2012. 20p.

Source: GCST Working Paper Series No. 12: Library Resource: Don M. Gottfredson Library of Criminal Justice, Rutgers Newark Law Library, Acc. # 126642

Year: 2012

Country: International

Keywords: Costs of Crime

Shelf Number: 126642


Author: Shehayeb, Dina

Title: Planning and Designing Urban Space, Community and Crime Prevention: The Case of Arab Countries

Summary: World statistics on safety and security show that the MENA region has one of the lowest crime rates in the World (UN-HABITAT, 2007). Homicide rates are associated with combinations of social, economic, cultural and political factors that are unique to localities. Even though underlying risk factors, such as poverty, unemployment, and political conflict prevail in several of the Arab Countries, homicide rates for selected global regions shows that the Arab Countries still have the lowest rates. At city level, large and rapidly growing cities in the Middle East report significantly lower crime rates than urban places elsewhere (UN-HABITAT, 2007). Based on Crime Trends Survey data, the Middle East is one of the regions with the lowest rates of robbery, with 3 and 2 incidents per 100,000 inhabitants, respectively (UNOCD, 2005). The relation of urban space, community and crime prevention has not been studied enough in the region. Place-based crime prevention and reduction theories of defensible space since Oscar Newman (1972) have originated in certain social and cultural contexts and have been often challenged (Kennedy & Silverman, 1985; Merry, 1981; Rohe & Burby, 1988). This earlier trend of physical determinism ignores the role of other variables such as socio-cultural homogeneity, income, teenager-to-adult ratio, places where crimes occurred, and type of crime; the impact of which on crime and fear of crime proved highly significant (Coleman, 1985; Coleman, 1988, pp. 161-170; Mawby, 1977; Van der Wurff, 1988; Schweiteer et al 1999). More recently crime prevention through environmental design – CPTED (Jeffrey, 1977) situational crime prevention (Clarke,1997) and environmental criminology have increasingly been supported by empirical research suggesting that interaction between the social and the built environment including the physical design and its management plays a role in facilitating or diminishing opportunities for crime and violence. While there is no way of establishing causality between physical design or management and crime, some research indicates that 10 - 15 % of crimes have environmental design and management components (Schneider and Kitchen, 2002, 2007). However, the relation between design, management and social aspects as factors affecting crime lacks clarification. Another problem is the limited scope of intervention that this literature has targeted. Empirical research has focused on certain planning and design elements and ignored others. For example, lighting, landscape, and activity scheduling in urban space (UN-HABITAT, 2007) have been focused upon, but not land use planning, street pattern and conditions of the edge of urban space, all of which have proved to play a major role in influencing use and perceptions within urban space (Shehayeb et al., 2003; Shehayeb, 1995). The lack of integration of crime prevention strategies within comprehensive city planning practices has been emphasized as a factor in facilitating opportunities for urban crime (UN-HABITAT, 2007). Recent directions in crime prevention have addressed physical planning from a rather limited perspective; with an emphasis on more effective policing and control strategies such as video surveillance (UN-HABITAT, 2009). For example, they focus on elements such as street widening that can open up previously impenetrable urban areas to police and emergency service vehicles, or the creation of new and ‘better’ housing which would improve manifest living conditions and public control of urban spaces. Such guidelines may lead to reverse outcomes; increased policing maybe at the cost of community building and territorial claim, both of which are factors that have shown effectiveness in promoting safety and security, in some contexts better than policing! Mediating factors such as perceptions of safety, sense of community, and appropriation of space, highly practiced in many cities of the Arab World, should be explained to reveal the nature of the relation between urban space and crime. The role of culture as a modifier of both behavior in, and meaning of, the built environment should be understood so as to avoid making the mistake of formulating prescriptive guidelines and design recipes suitable in some socio-cultural contexts but not in others. This paper aims at exposing some wide-spread misconceptions about the relation between physical space and crime, explaining the role of mediating factors so as to better generalize conclusions to different contexts, and finally, to show how these factors are at play in the context of Egypt as a case study representing the Arab Countries.

Details: Santiago, Chile: Global Consortium on Security Transformation (GCST), 2010. 21p.

Source: GCST Policy Brief Series No. 16: Internet Resource: Accessed October 8, 2012 at http://s3.amazonaws.com/zanran_storage/www.securitytransformation.org/ContentPages/2467318928.pdf

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 126643


Author: Davis, Ian S.

Title: A Theory of Dark Network Design

Summary: This study presents a theory of dark network design and answers two fundamental questions about illuminating and interdicting dark networks: how are they configured and how are they vulnerable? We define dark networks as interdependent entities that use formal and informal ties to conduct licit or illicit activities and employ operational security measures and/or clandestine tradecraft techniques through varying degrees of overt, or more likely covert, activity to achieve their purpose. A dark network must design itself to buffer environmental hostility and produce output to achieve its purpose according to its design state. The level of hostility in the environment and the requirement for secure coordination of work determine the dark network’s design state. These factors yield four typological dark network configurations: Opportunistic-Mechanical; Restrictive-Organic; Selective-Technical; and Surgical-Ad hoc. Each configuration must allow the secure coordination of work between the dark network’s directional, operational, and supportive components and should adhere to the six principles of dark network design we identify: security, agility, resilience, direction setting, control, and capacity. If a dark network’s configuration does not fit its design state or violates the principles of dark network design, the network will be vulnerable to illumination and interdiction.

Details: Monterey, CA: Naval Postgraduate School, 2010. 177p.

Source: Iinternet Resource: Thesis: Accessed October 9, 2012 at: http://edocs.nps.edu/npspubs/scholarly/theses/2010/Dec/10Dec_Davis_Ian.pdf

Year: 2010

Country: International

Keywords: Criminal Networks

Shelf Number: 126650


Author: DiGiacomo, Richard J.

Title: Prostitution as a Possible Funding Mechanism for Terrorism

Summary: An essential component of defeating terrorist is targeting their financing and fundraising mechanisms. Successfully targeting terrorist financing may disrupt an organization’s existence, prevent an attack, or reduce the harm produced by an attack. As a result of these efforts, al Qaeda faces financial challenges they have not experienced in a decade. Whether in response to these efforts, or as a deliberate strategic shift, terrorist organizations have been extremely adaptive and creative in adjusting their fundraising efforts; specifically turning to criminal enterprises. While there is still debate regarding the level of cooperation between criminal and terrorist organizations, it is generally agreed that terrorist organizations and their affiliates are increasingly relying on criminal enterprises to fund their operations. This thesis will examine whether prostitution is funding terrorism, and if it is logical and reasonable to conclude that a highly adaptable terrorist organization would fund their operations using prostitution. Prostitution is a highly profitable business requiring no specialized skill set and very little cost to entry. The business opportunities are unlimited, and it is business that law enforcement, prosecutors, and the courts do not consider as a serious crime, but rather a harmless vice voluntarily entered into by all parties. A failure to seriously consider prostitution as a funding mechanism demonstrates a potentially fatal lack of imagination.

Details: Monterey, CA: Naval Postgraduate School, 2010. 91p.

Source: Internet Resource: Thesis: Accessed October 9, 2012 at: http://www.hsdl.org/?view&did=20517

Year: 2010

Country: International

Keywords: Organized Crime

Shelf Number: 126651


Author: United Nations Office on Drugs and Crime

Title: Criminal Intelligence: Manual for Front-line Law Enforcement

Summary: This manual offers criminal intelligence guidance to law enforcement officers, from understanding relevant concepts and categories, through to specific components of the intelligence process. The Manual specifically address the evaluation of sources and data, analysis and the analytical process, the role of analysis and analytical techniques. This manual offers criminal intelligence guidance to analysts from understanding relevant concepts and categories, through to specific components of the intelligence process. Specially, the manual clarifies evaluation sources of intelligence and data, focusing particularly on basic analytical techniques, including link analysis, event charting, flow analysis and telephone analysis. The manual also equips practitioners to develop inferences and present he results of their analysis.

Details: New York: UNODC, 2010. 58p.

Source: Internet Resource: Accessed October 9, 2012 at: http://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Front_Line_Law_Enforcement.pdf

Year: 2010

Country: International

Keywords: Criminal Intelligence

Shelf Number: 126658


Author: Rimer, Jonah

Title: Literature Review - Responding to Child & Youth Victims of Sexual Exploitation on the Internet

Summary: The sexual exploitation of children on the internet is a pertinent issue that has emerged to the forefront of society since the mainstream popularization of the internet in the mid 1990’s. Sexual exploitation on the internet is a concept encompassing three major forms of maltreatment against children: child pornography; child luring/unwanted sexual solicitation; and child prostitution/child sex tourism. When discussing these forms of abuse, as well as online sexual exploitation in general, there are many facets that must be taken into consideration. These include definitional issues of each form of abuse; characteristics of offenders and victims; the treatment of offenders; issues within law and law enforcement; advances in technology used by victims, perpetrators, and those combating online abuse; discoveries in scientific research that may increase the understanding of online abusers; an exploration of prevention efforts; a discussion of the relationship between child pornography, pedophilia, and contact offenses; and victim issues and responding to the needs of victims. These will be the significant themes and perspectives explored to summarize the key literature on the subject of the exploitation of children and youth on the internet.

Details: Toronto: Boost Child Abuse Prevention & Intervention, 2007. 128p.

Source: Internet Resource: Prepared for the “Responding to Child & Youth Victims of Sexual Exploitation on
the Internet†Training Seminar. September 24th to 27th, 2007. Blue Mountain
Resort, Collingwood, Ontario, Canada; Accessed October 9, 2012 at: http://www.boostforkids.org/LinkClick.aspx?fileticket=9o%2BhPW9lg6s%3D&tabid=166

Year: 2007

Country: International

Keywords: Child Pornography

Shelf Number: 126663


Author: Ospina, Maria

Title: Sexual Exploitation of Children and Youth Over the Internet: A Rapid Review of the Scientific Literature

Summary: The role of the Internet in the health and wellbeing of children and youth is just beginning to emerge as a priority topic in the public health research agenda. Public policy attention has recently focused on the impact of this medium on the attitudes, behaviour, and health of young people. Among the potential risks, the sexual exploitation and abuse of children and youth over the Internet is of substantial concern. Children and youth can be abused over the Internet in many ways: Internet-initiated grooming for purposes of sexual abuse (that is, online sexual solicitation), the possession, production, and distribution of Internet-based abuse images of children and youth, Internet-based receipt by children and youth of abuse images, and Internet-initiated incitement of or conspiracy to commit sexual abuse of children and youth through activities such as sex tourism and prostitution. These Internet-related sexual exploitation activities directly or indirectly result in offline situations of sexual abuse directed toward children. The need exists to identify the most vulnerable population of children and youth who are at risk of online sexual exploitation over the Internet, and to determine whether prevention and intervention programs for online sexual exploitation have been evaluated in the scientific literature. The objectives of this rapid review were: 1) to provide a descriptive overview and synthesis of information regarding the state of research on the frequency, effects, and risk factors for sexual exploitation of children and youth over the Internet; 2) to identify and evaluate the evidence available in the scientific literature on the assessment tools for children and youth who have been sexually exploited via the Internet; 3) to identify and evaluate the evidence available in the scientific literature on the safety, efficacy, effectiveness, economic, social, legal, or ethical aspects of prevention and therapeutic strategies for sexual exploitation of children and youth via the Internet; and 4) to map the health care, educational, and community resources available in Alberta and Canada regarding Internet safety and prevention of child and youth abuse and exploitation via the Internet.

Details: Edmonton, AB, Canada: Institute of Health Economics, 2010. 84p.

Source: Internet Resource: Accessed October 9, 2012 at: http://www.ihe.ca/documents/Online%20Sexual%20Exploitation.pdf

Year: 2010

Country: International

Keywords: Child Prostitution

Shelf Number: 126666


Author: Corabian, Paula

Title: Treatment for Convicted Adult Male Sex Offenders

Summary: Sexual offending has become a major challenge for social policy because of the high human and financial costs to victims and the social and health services as well as the high public investment in policing, prosecuting, and incarcerating sex offenders. There is an expectation that the correctional systems should make reasonable efforts to reduce the potential that convicted sex offenders will reoffend. One common approach to sex offenders’ management in countries with developed market economies is to provide specialized treatment programs. A number of different sex offender treatment (SOT) programs have been developed and are currently operating, but there continues to be controversy regarding how well they work. To evaluate the effectiveness of psychotherapy and pharmacotherapy interventions delivered within SOT programs to reduce the likelihood of reoffending in convicted adult male sex offenders. Eight systematic reviews (SRs) conducted on the effectiveness of SOT interventions and programs met the inclusion criteria of this overview. All eight SRs focused on the use of psychotherapy for convicted sex offenders, whereas one also included surgical castration and hormonal medication. In these studies there was considerable variability in how interventions were classified, the types of sex offenders involved, and the definition of outcomes. According to the reviewed evidence, studies in the area of SOT outcome research have improved over the past 10 years. However, the need for more rigour remains. The following are highlights from the reviewed evidence. —— Although the debate in the scientific literature on what SOT interventions and programs are most effective for convicted adult male sex offenders remains, the results from seven moderate- to-high quality SRs show small but statistically significant reductions in sexual and general recidivism rates among convicted adult male sex offenders treated with various cognitive behavioural therapy (CBT) approaches. —— The most recently published high quality SR found that SOT programs using CBT approaches that adhered to the risk/need/responsivity (RNR) model for offender assessment and rehabilitation were most effective in reducing the risk of recidivism in convicted male sexual offenders. On average, programs that followed all three RNR principles reported recidivism rates that were less than half the recidivism rates for comparison groups. In contrast, there was no effect on recidivism rates for programs that did not follow the RNR model. Confidence in these findings, however, must be tempered as the available evidence is based mostly on poor quality primary research studies. —— Although one SR of moderate quality reported promising results on the use of hormonal treatments as an adjuvant to psychotherapy, wellconducted and reported controlled studies are needed to establish the effectiveness of adjuvant hormonal treatment to reduce the risk of recidivism among sex offenders. —— Overall, the results reported by the selected SRs provide little direction regarding how to improve current treatment practices. • It is still not clear whether all sex offenders require treatment or whether current interventions are more appropriate for certain subgroups and typologies of offenders. • There are still uncertainties regarding the most useful elements and components of a SOT program for convicted adult male sex offenders. • There is no clear answer on whether the setting of the SOT program affects its impact on recidivism rates. While the evidence from seven moderate-to-high quality SRs suggests that SOT has the potential to reduce sexual and nonsexual recidivism, the reported findings provide stronger support for the effectiveness of CBT approaches and for programs adhering to the RNR model. Any conclusions drawn from this overview of SRs remain tentative. Given the methodological problems of the available primary research, it is difficult to draw strong conclusions about the effectiveness of SOT programs using various CBT approaches for such a heterogeneous population. The reviewed evidence does not provide clear answers to what are the components of an optimal SOT program and to whether where the program is delivered matters. All SRs concluded that more and better research is needed to clearly answer these questions.

Details: Edmonton, Alberta, Canada: Institute of Health Economics, 2010. 104p.

Source: Internet Resource: Accessed October 11, 2012 at: http://www.ihe.ca/documents/Treatment%20for%20Convicted%20Adult%20Male%20Sex%20Offenders.pdf

Year: 2010

Country: International

Keywords: Male Sex Offenders

Shelf Number: 126676


Author: Skelton, Ann

Title: Prevention of and Responses to Violence Against Children within the Juvenile Justice System

Summary: In its resolution 18/12 of 24 September 2011 on human rights in the administration of justice, in particular juvenile justice, the Human Rights Council invited the Office of the High Commissioner for Human Rights, the United Nations Office on Drugs and Crime and the Special Representative of the Secretary-General on Violence against Children to collaborate in the organization of an expert consultation on prevention of and responses to violence against children within the juvenile justice system and to submit a report thereon. The Expert Consultation took place in Vienna on 23-24 January 2012. It was hosted by the United Nations Office on Drugs and Crime (UNODC) and co-organized with the Office of the High Commissioner for Human Rights (OHCHR) and the Special Representative of the Secretary-General on Violence against Children, in cooperation with the Government of Austria. Participants included representatives from international and regional human rights bodies, governmental and State institutions, academia and civil society. The Expert Consultation focused on the risks and systemic factors contributing to violence against children within the juvenile justice system, and strategies and practical recommendations to prevent and respond to violence against children within the juvenile justice system. This report is informed by the results of the consultation and a research paper conducted by an independent consultant, Ann Skelton, of the University of Pretoria, South Africa.

Details: New York: Office of the Special Representative of the Secretary on Violence against Children; UNICEF, 2012. 75p.

Source: Internet Resource: Accessed October 13, 2012 at http://srsg.violenceagainstchildren.org/sites/default/files/publications_final/web_juvenile_justice_final.pdf

Year: 2012

Country: International

Keywords: Juvenile Corrections

Shelf Number: 126690


Author: Brooke, Sandra

Title: Surveillance and Enforcement of Remote Maritime Areas (SERMA): Surveillance Technical Options

Summary: Some of the most pristine marine ecosystems remaining on earth are in remote areas far from human population centers, both within national jurisdiction or beyond, on the high seas. Unfortunately even these areas are under pressure from the effects of human activities. Recognizing this, many countries have begun to manage activities in remote maritime areas as well as seeking to conserve areas of high ecological value through the establishment of marine protected areas. In recent years some very large offshore protected areas have been established within national EEZs and in addition some are now also being established on the high seas, through the efforts of several international organizations. Without effective enforcement however, these remote managed areas will remain no more than paper management plans and paper parks. Surveillance and enforcement is more challenging in large, remote areas than for nearâ€shore MPAs as they are often far from populated land, and therefore difficult to reach with traditional manned patrols, radar or other shortâ€range monitoring tools. Advanced technologies have been used successfully for surveillance of large areas, and there is great potential for expansion; however an associated response by law enforcement personnel is still essential to confirm and prosecute violations. Combining surveillance technologies into a single enforcement package has considerable costâ€saving potential and is emphasized throughout this report. Additionally, the obvious and targeted presence of law enforcement reduces attempted infractions since there is a perceived significant risk of being caught. This document reviews and evaluates a range of existing technological options for the surveillance of remote marine managed areas. Some of these technologies are currently in use by fisheries management agencies; some are currently the purview of groups like the military or security agencies; and others have hitherto been unexplored for such purposes. As commercial fishing (regulated or otherwise) is the single greatest pressure to most remote marine ecosystems, followed by vesselâ€based pollution, we pay particular attention to technologies for the monitoring of such activities. The paper initially discusses surveillance technologies for cooperative vessels; that is, those that are participating in a managed activity where monitoring systems are obligatory. The majority of the paper however describes the range of sensors and platforms that can be applied to the more challenging task of monitoring nonâ€cooperative vessels. Surveillance technologies alone are insufficient to ensure compliance, but they are a necessary component. This first paper in the series does not look at questions of integrating surveillance technologies into an enforcement regime; neither does it consider issues improving compliance. These are clearly key issues, and we anticipate giving these issues the space they deserve in subsequent publications.

Details: Seattle, WA: Marine Conservation Biology Institute, USA, 2010. 41p.

Source: Internet Resource: Accessed October 13, 2012 at http://www.marine-conservation.org/media/filer_public/2011/09/19/serma_tech-options_v12.pdf

Year: 2010

Country: International

Keywords: Environmental Crime

Shelf Number: 126691


Author: Schneider, Friedrich

Title: The Shadow Economy and Work in the Shadow: What Do We (Not) Know?

Summary: In this paper the main focus lies on the shadow economy and on work in the shadow in OECD, developing and transition countries. Besides informal employment in the rural and non-rural sector also other measures of informal employment like the share of employees not covered by social security, own account workers or unpaid family workers are shown. The most influential factors on the shadow economy and/or shadow labor force are tax policies and state regulation, which, if they rise, increase both. Furthermore the discussion of the recent micro studies underline that economic opportunities, the overall burden of the state (taxes and regulations), the general situation on the labor market, and unemployment are crucial for an understanding of the dynamics of the shadow economy and especially the shadow labor force.

Details: Bonn, Germany: IZA, 2012. 73p.

Source: IZA Discussion Paper No. 6423: Internet Resource: Accessed October 14, 2012 at http://ftp.iza.org/dp6423.pdf

Year: 2012

Country: International

Keywords: Crime and Economics

Shelf Number: 126696


Author: Wells, Adrian

Title: Public Goods and Private Rights: the Illegal Logging Debate and the Rights of the Poor

Summary: This briefing paper applies a rights perspective to understanding legal and institutional reform of the tropical forest sector. The sector is characterised by strongly competing interests, and massive differences in the power of stakeholders to influence the application of the law. The regulatory regime governing the sector often discriminates against the poor. This is of particular concern in the context of donor- and industry-led initiatives to combat illegal logging. Upholding legal frameworks which already fail to accommodate local rights could compound injustices. A rights perspective focuses attention on the channels by which the poor can contest and uphold their claims in the face of national and international interests in the forest sector.

Details: London: Overseas Development Institute, 2006. 5p.

Source: Forestry Briefing Number 9: Internet Resource: Accessed October 14, 2012 at http://www.odi.org.uk/resources/docs/800.pdf

Year: 2006

Country: International

Keywords: Environmental Crime

Shelf Number: 126700


Author: Cooper, Andrew F.

Title: "Remote" in the Easter Caribbean: The Antigua-US WTO Internet Gambling Case

Summary: The structure of the multilateral trading system is widely assumed to contain bias towards big actors, unevenly distributing access to the key processes of the system. Small countries, including Caribbean states, have long focused their attention on physical merchandise, while the US has taken on the role of disciplinarian, confronting countries that they perceive to be in violation of the General Agreement on Trade in Services (GATS). Brought to the WTO by Antigua, the Internet remote gambling case has challenged standard assumptions about the workings of the international trading system in the WTO context. A small country appearing to take the US on by itself, Antigua claimed the American government failed to live up to its commitment under GATS regarding “recreational services.†While Antigua argued for fairness in the WTO system, the US adopted a prohibitionist attitude to Internet remote gambling, citing domestic moral standards. Underwritten by the highly globalized Internet remote gambling industry, this case exemplifies what a small state can do to respond to dynamic changes imposed by globalization, confirming that small countries can sometimes punch above their weight in international relations.

Details: Waterloo, Canada: The Centre for International Governance Innovation, 2008. 20p.

Source: Caribbean Paper No. 4: Internet Resource: Accessed October 14, 2012 at http://hawk.ethz.ch/serviceengine/Files/ISN/56005/ipublicationdocument_singledocument/3e124b09-23dd-4c00-9056-e32bb4c9b4dc/en/CP_4.pdf

Year: 2008

Country: International

Keywords: Cyber Security

Shelf Number: 126702


Author: Gwynn, Mike

Title: Theft of Construction Plant & Equipment

Summary: This paper examines the problem of construction plant and equipment theft as it affects various insurance markets in the world and the actions which can be taken by those plant operators who wish to reduce their exposure to theft.

Details: International Association of Engineering Insurers, 2005. 33p.

Source: Internet Resource: Accessed October 15, 2012 at: http://www.imia.com/downloads/imia_papers/wgp43_2005.pdf

Year: 2005

Country: International

Keywords: Burglary

Shelf Number: 126731


Author: Delaney, Stephanie

Title: Protecting Children from Sexual Exploitation and Sexual Violence in Disaster and Emergency Situations

Summary: This manual is about how to protect children from sexual violence and sexual exploitation, specifically in disaster and emergency situations. It is not intended to be an academic, rather a practical guide that will be of use to people working directly in the field. The aim is to provide fundamental information to assist personnel working in emergency situations in responding to protect children, in terms of what can be done before disaster strikes (which might be called ‘mitigation’ efforts), in the immediate aftermath and in the longer term reconstruction phase. It also includes recommended actions and key considerations to be taken into account in the event of sexual violence or sexual exploitation.

Details: Bangkok: End Child Prostitution, Child Pornography and Trafficking of Children for Sexual Purposes (ECPAT), 2006. 119p.

Source: Internet Resource: Accessed October 15, 2012 at: http://www.preventionweb.net/files/2709_protectingchildren.pdf

Year: 2006

Country: International

Keywords: Child Abuse

Shelf Number: 126733


Author: Byberg, Jacqueline Helen Kingston

Title: Childless Child Porn - A 'Victimless' Crime? A Comparative Analysis of the Validity of the Current Restrictions in the United Kingdom and United States on Virtual Child Pornography in Relation to the Right to Free Speech

Summary: This paper will comment on the current prohibition of the (arguably) victimless crime of virtual child pornography (VCP) in both the US and UK and it’s interaction with the right to free speech. This paper is limited in it’s scope and will only discuss in passing the offence of prohibited images of a child, nor will it consider in anyway images that are a product of computer morphing, in which a physical element of a child is ‘morphed’ into an indecent image. The forthcoming discourse will contend that the current prohibition of VCP is an unjustifiable violation of the right to free speech, through the consideration of the practical and theoretical validity of the justifications for this prohibition. Furthermore, it will consider the possible advantages of restricting rather than prohibiting VCP. In order to achieve this the first chapter will briefly examine the development of the law regulating actual child pornography and the current legislation governing VCP in both the US and UK. The first chapter will also succinctly make note of the parallels that become evident when comparing the individual jurisdictional responses to VCP. The second chapter considers the right of free speech operationally in the US and UK, the legislative clarity of VCP’s current categorisation as obscene or indecent and the impact both this and private consumption has on the justifiability and adjudged proportionality of the prohibition. The third chapter will consider the prevailing justifications habitually referenced when defending the contravention of the right to free speech caused by the statutory prohibition of VCP. The fourth chapter will explore the interactions of the preceding chapters justifications with the right of free speech, consider alternate motivations for enacting the current prohibition as well as recommend a possible legislative solution. Lastly, the fifth chapter will conclude this paper.

Details: Durham, U.K.: Durham University - Durham Law School, 2012. 49p.

Source: Working Paper: Internet Resource: Accessed October 15, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2114564

Year: 2012

Country: International

Keywords: Child Pornography, Virtual

Shelf Number: 126743


Author: Dietz, Rebekah K.

Title: Illicit Networks: Targeting the Nexus Between Terrorists, Proliferators, and Narcotraffickers

Summary: Globalization and the liberal international marketplace have provided fertile ground for the rise of transnational and non-state actors. Unfortunately, while states and businesses have profited from the increased fluidity of borders and the rise of global commerce, so have the criminal organizations that threaten national and international security. These illicit networks are stateless; they conduct their business in failed or failing states, under the guise of legitimate commerce, and without regard to sovereign borders or even human life. They are the main facilitators of proliferation, terrorism, and narcotics around the world—undeterred and, perhaps, undeterrable. This thesis offers a comparative analysis of three main types of illicit networks: terrorist, proliferation and narcotics networks. Using Jemaah Islamiyah, the A.Q. Khan proliferation network, and the Medellín drug ‘cartel’ as case studies, it examines their typologies, motivations, structures, characteristics, and sources and patterns of funding. It examines if and how illicit networks overlap, with special attention to intra-network (e.g., terrorist networks with other terrorist networks) and inter-network (e.g., terrorist networks with narcotics networks) overlap. It then explores how this information can inform U.S. counter-network activity.

Details: Monterey, CA: Naval Postgraduate School, 2010. 135p.

Source: Internet Resource: Thesis: Accessed October 19, 2012 at: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA536899

Year: 2010

Country: International

Keywords: Criminal Networks

Shelf Number: 126752


Author: Farrington, David P.

Title: School Bullying, Depression and Offending Behaviour Later in Life An Updated Systematic Review of Longitudinal Studies

Summary: Bullying is a problem among children all over the world. In an earlier report in this series, two of the authors of this study have shown that systematic school programs have proven to be effective in preventing bullying. This was an encouraging result. A further question of interest is that of whether bullying also influences the bullies and the victims later on in life in terms of subsequent offending and mental health problems. The answer to this question would reveal whether the prevention of bullying also constitutes a means of preventing future crime and mental health related issues. This is the question answered by the four authors of this report on the basis of a systematic review that includes a number of statistical meta-analyses. There are never sufficient resources to conduct rigorous evaluations of all the crime prevention measures employed in an individual country such as Sweden. Nor are there resources to conduct scientific studies of all of the effects produced by e.g. early riskfactors on later offending. This report presents a systematic review, including a number of statistical meta-analyses, of the impact of bullying on later offending and depression, with regard to both the bullies and those exposed to bullying. The study follows the rigorous methodological requirements of a systematic review. The analysis combines the results from a substantial number of studies that are considered to satisfy a list of empirical criteria for measuring the correlations of bullying perpetration and victimization with offending and depression as reliably as possible. The meta-analysis then uses the results from these six previous studies to calculate and produce a robust overview of the impact of bullying on negative outcomes later in life. The systematic review, and the statistical meta-analyses, in this case builds upon a large number of scientific studies from different part of the world, producing highly relevant findings on the impact of bullying among children on offending and depression later in life. Although some important questions remain unanswered, the study provides the most accessible and far-reaching overview of this important issue that has been produced to date.

Details: Stockholm, Sweden: Brottsförebyggande rådet/The Swedish National Council for Crime Prevention, 2012. 116p.

Source: Internet Resource: Accessed October 19, 2012 at: http://www.bra.se/bra/bra-in-english/home/publications/archive/publications/2012-06-11-school-bullying-depression-and-offending-behaviour-later-in-life.html

Year: 2012

Country: International

Keywords: Bullying

Shelf Number: 126753


Author: Grove, Louise E.

Title: Preventing Repeat Victimization: A Systematic Review

Summary: A large proportion of all crimes are committed against crime victims who have been victimized before, a phenomenon known as repeat victimization. There is thus a potential to achieve substantial benefits by focusing crime prevention measures on individuals, institutions or objects that have previously been exposed to crime. Successful strategies of this kind would prevent repeat victimization, and thus also would prevent a substantial proportion of all the crimes committed. The crime prevention measures that are implemented to this end may take several different forms. The strategy is not primarily about specific kinds of measures, but rather involves a way of directing crime prevention measures at relevant targets. An increasing number of crime prevention initiatives have been directed at repeat victimization especially to prevent repeat burglaries. But how well do they work? What does the research tell us? This report presents a systematic review, including a statistical meta-analysis, of the effects of initiatives to prevent repeat victimization. The study follows the rigorous methodological requirements of a systematic review. The analysis combines the results from a number of evaluations that are considered to satisfy a list of empirical criteria for measuring effects as reliably as possible. The meta-analysis then uses the results from these previous evaluations to calculate and produce an overview of the effects associated with initiatives to prevent repeat victimization. The systematic review and the statistical meta-analysis presented in this report are based on a substantial number of empirical evaluations. Even though important questions remain unanswered, the study provides an accessible and far-reaching overview of the effects of initiatives to prevent repeat victimization. Generally, the results are encouraging; suggesting that appropriately targeted situational prevention measures can significantly reduce repeat burglaries.

Details: Stockholm, Sweden: Brottsförebyggande rådet/The Swedish National Council for Crime Prevention, 2012. 50p.

Source: Internet Resource: Accessed October 19, 2012 at: http://www.bra.se/download/18.1ff479c3135e8540b29800015728/2012_Preventing_repeat_victimization2.pdf

Year: 2012

Country: International

Keywords: Burglaries

Shelf Number: 126757


Author: Penal Reform International

Title: A Review of Law and Policy to Prevent and Remedy Violence Against Children in Police and Pre-trial Detention: Overview (draft)

Summary: This desk review (a working draft) aims to increase understanding of the specific legal and policy measures that can work to prevent and remedy violence against children in detention. The review focuses on eight countries: Bangladesh, Georgia, Jordan, Kazakhstan, Pakistan, Russia, Tanzania and Uganda. For each country the review aims to: •identify policy and legislative measures already in place to prevent and detect violence, to assist victims and to make perpetrators accountable; •highlight significant gaps in provision; and •make recommendations for improvements. This overview report summarises the findings of the eight country reports and is available in both English and Russian.

Details: London: Penal Reform International, 2012. 2 vols.

Source: Internet Resource: Accessed October 19, 2012 at: http://www.penalreform.org/publications/review-law-and-policy-prevent-and-remedy-violence-against-children-police-and-pre-trial

Year: 2012

Country: International

Keywords: Juvenile Detention

Shelf Number: 126763


Author: Ahokas, Juha

Title: Assuring Supply Chain Continuity in Industrial Supply Chains and Complying with Authorised Economical Operator AEO Europe. Final Version

Summary: Secure and reliable supply chains and networks enable companies to utilize global markets and resources. Outsourcing and globalization have enabled enterprises to extent their operations to new areas and benefit from economies of scale. Global logistic chains have turned out to be effective platform for the delivery of materials, semi-products and goods between the different economic areas and markets. The development has been beneficial to international companies and economic welfare has increased in several countries. On the other side, dynamic and complex supply chains enable opportunities for criminal action. They create platform for terrorism, crime and illegal competition. Some transnational and poly-crime oriented organized crime groups are aiming at controlling the whole production and distribution processes of entire criminal markets, optimizing profits and cutting out local and minor competitors, on a very rational way. To reach their goal they exploit transportation and financial sector, hire illicit labour to run and manage the supply chain, engage in money laundry, identity frauds and document forgery. International supply chains have turned out to be vulnerable for any crime actions and crime concerns have increased in companies and governments. Especially organized crime and terrorism pose threats to security and safety, to public health, to the environment or to consumers. Traditionally different companies and authorities have concentrated on securing their own operations and sphere of responsibilities. However, supply chain crimes are intertwined in supply chain operations, which transmit forward and reverse goods, services, cash and information. Relying only on inspections or border controls has proven to be always costly leaving doubts concerning the adequate inspection rate. Enterprises have very limited possibilities to self-acquire information related to the backgrounds of their business partners and prospect employees. Generally, crime is recognized to devastate social structures and fair competition. Additionally, private and political interest have emphasized crime preventive approach instead of post-crime measures, thus different kind of customs-government-trade partnerships are endorsed with mutual interest. The terrorist attacks in 2001 formed culmination point to concerns and approaches how to deal with terrorism and crime in supply chains. Since April 2002 several voluntary supply chain security programs and regulations have been established in global trade. The aim of the programs is simply to increase security in international supply chains. The companies fulfilling the security and safety criteria are considered to be secure and safe partners in the supply chain. The reliable traders respecting high standard security criteria benefit from trade facilitation measures: reduced data set for summary declarations, fewer physical and document-based controls, and priority treatment if selected for control. Supply chain security programs can be regarded as good international policy and practices when aiming at better secure supply chains against an intended posed crime act (theft, pilferage, money laundry, currency counterfeiting, industrial espionage, commodity counterfeiting, documents counterfeiting, malicious damage etc.). Additionally, implementation of programs have enabled several companies to gain collateral benefits, including better visibility to the supply chain, swifter response in case of any type of disruptions and lower insurance premiums. However, between security measures and benefits stands a black box, which makes unclear how security programs should be managed to maximize benefits. This publication aims at revealing the inner-side of the black-box. The guide presents and applies practices and procedures, which are approved in a sister discipline that is criminology. Rational choice and situational crime prevention are well-known approaches, which bring criminology down to earth in daily practices and decisions. Rational choice approach takes into consideration a variation and composition of potential crime offenders‘ motivations and capabilities to commit crimes. It supports security efforts and decisions concerning the strategic supply chain and operational design. Situational crime prevention approach provides tools to reduce the opportunities to commit crime and increase the risk of detection if deterrence fails. It focuses on crime opportunities in daily operations and resembles total quality management approach, which is well-known, proved and tried in supply chain and operational management. At last, situational crime prevention approach and total quality management approach are combined in new conceptual model for crime prevention in supply chains. AEO-programs are not self-explaining and self-executing programs. Quite the contrary, they just build a framework, where the compliance with requirements can be attained in several ways. We introduce an implementation model, which is based on teacher-learning cycle aiming at the most cost-efficient implementation in different companies and business units in various cultural conditions. Additionally, it supports government-private partnerships. The model is based on continuous improvement cycle. This guide has 10 chapters with following aims: Chapter 1 elucidates the background of supply chain security programs by presenting World Customs Organization‘s SAFE-program. Chapter 2 works as an incentive to start implementing AEO-supply chain security program. It lists potential benefits, which can be used as financial targets in implementation process. The list of benefits is based on comprehensive literature study. Chapter 3 describes how security issues are included in daily operations. Crime prevention and operational management practices are programmed in same conceptual framework. Chapter 4 elucidates AEO-requirements and appropriate security measures based on available security standards. Chapter 5 suggest methods allocate security resources in an efficient manner. Besides traditional risk assessment approach we emphasize inner-organizational co-operation and efficient communication when tracing crime related problems. Chapter 6 presents an implementation model based on continuous improvement and teaching-learning cycle. Chapter 7 presents customs AEO -audit approach. We give advises how the process could be conducted in an efficient way. Chapter 8 suggest an activity based cost management model, which makes security cost more transparent and traceable. Chapter 9 gives a short description concerning supply chain security technologies. Chapter 10 presents a short summary.

Details: Helsinki: Aalto University, School of Science and Technology, BIT Research Centre, 2012. 103p.

Source: Internet Resource: Accessed October 19, 2012 at: http://legacy-tuta.hut.fi/logistics/publications/Assuring_SC_Continuity.pdf

Year: 2012

Country: International

Keywords: Cargo Security

Shelf Number: 126764


Author: Smits, Jan

Title: If You Shoot My Dog, I Ma Kill Yo' Cat: An Enquiry Into the Principles of Hip-Hop Law

Summary: This article investigates how the law is perceived in hip-hop music. Lawyers solve concrete legal problems on basis of certain presuppositions about morality, legality and justice that are not always shared by non-lawyers. This is why a thriving part of academic scholarship deals with what we can learn about laymen’s perceptions of law from studying novels (law and literature) or other types of popular culture. This article offers an inventory and analysis of how the law is perceived in a representative sample of hip-hop lyrics from 5 US artists (Eminem, 50 Cent, Dr. Dre, Ludacris and Jay-Z) and 6 UK artists (Ms Dynamite, Dizzee Rascal, Plan B, Tinie Tempah, Professor Green and N-Dubz). After a methodological part, the article identifies four principles of hip-hop law. First, criminal justice is based on the age-old adage of an eye for an eye, reflecting the desire to retaliate proportionately. Second, self-justice and self-government reign supreme in a hip-hop version of the law: instead of waiting for a presumably inaccurate community response, it is allowed to take the law into one’s own hands. Third, there is an overriding obligation to respect others within the hip-hop community: any form of ‘dissing’ will be severely punished. Finally, the law is seen as an instrument to be used to one’s advantage where possible, and to be ignored if not useful. All four principles can be related to a view of the law as a way to survive in the urban jungle.

Details: Maastricht, Netherlands: Maastricht University, 2012. 17p.

Source: Working Paper Series: Internet Resource: Accessed October 22, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2158178

Year: 2012

Country: International

Keywords: Law and Popular Culture

Shelf Number: 126781


Author: Kemp, Geoffrey

Title: Maritime Security East of Suez: Sustaining the U.S. Role as the Key Policeman in Times of Change

Summary: This report examines U.S. power and the strategic environment in the Indian Ocean and South China Seas. This report is organized into three major sections. The first section provides background on how the Indian Ocean became such an important theater. It draws upon a study done for the Center for the National Interest (then known as the Nixon Center) by Justin de Rise, which we are publishing separately. We believe this study, especially the extensive database that supports it, makes a unique contribution to our understanding of the large number of maritime confrontations that have taken places in the Indian Ocean over the last 70 years. It provides a most useful tool for analysts to work with, given the extraordinary amount of data we have assembled and the use of new Google Maps interfaces. The second section focuses on one of our key findings, namely the growing importance of the U.S.-Indian maritime relationship. It includes the summary of a workshop held in New Delhi in February 2011 which drew together American and Indian maritime specialists, and has been published by the Center separately in expanded form under the title Maritime Security Challenges in the Indian Ocean Region. The report concludes with a summary of the emerging maritime environment and the challenges for all Middle Eastern and Asian powers, the United States, and others such as Britain, France, and Australia.

Details: Washington, DC: Center for the National Interest, 2012. 51p.

Source: Internet Resource: Accessed October 24, 2012 at: http://www.cftni.org/Maritime%20Security%20East%20of%20Suez.pdf

Year: 2012

Country: International

Keywords: Maritime Crime

Shelf Number: 126793


Author: United Nations Office on Drugs and Crime

Title: Criminal Intelligence: Manual for Analysts

Summary: This manual offers criminal intelligence guidance to analysts from understanding relevant concepts and categories, through to specific components of the intelligence process. Specially, the manual clarifies evaluation sources of intelligence and data, focusing particularly on basic analytical techniques, including link analysis, event charting, flow analysis and telephone analysis. The manual also equips practitioners to develop inferences and present he results of their analysis.

Details: Vienna: UNODC, 2011. 104p.

Source: Internet Resource: Accessed October 25, 2012 at: http://www.unodc.org/documents/organized-crime/Law-Enforcement/Criminal_Intelligence_for_Analysts.pdf

Year: 2011

Country: International

Keywords: Crime Analysis

Shelf Number: 126802


Author: United Nations Office on Drugs and Crime

Title: Digest of Terrorist Cases

Summary: The United Nations Office on Drugs and Crime (UNODC) brought together senior criminal justice experts—including Attorney-Generals and Chief Prosecutors—to share experiences and good practices on how to deal with terrorism cases. The outcome is this Digest of Terrorist Cases, giving policymakers and criminal justice officials practical ideas and expert insights on how to deal with a relatively new field of jurisprudence. It complements other UNODC tools that provide guidance on how to address acts of terrorism within a legal framework, like legislative guides. The judicial cases featured in this Digest cover relevant aspects of the international legal regime against terrorism. It provides a comparative analysis of national statutory frameworks for terrorism prosecutions, and it identifies legal issues and pitfalls encountered in investigating and adjudicating relevant offences. In addition, it identifies practices related to specialized investigative and prosecutorial techniques. It also addresses the links between terrorism and other forms of crime (like organized crime, the trafficking of drugs, people and arms), as well as how to disrupt terrorist financing.

Details: Vienna: UNODC, 2010. 144p.

Source: Internet Resource: Accessed October 25, 2012 at: http://www.unodc.org/documents/terrorism/09-86635_Ebook_English.pdf

Year: 2010

Country: International

Keywords: Drug Trafficking

Shelf Number: 126803


Author: United Nations Office on Drugs and Crime

Title: The Use of the Internet for Terrorist Purposes

Summary: The use of the Internet for terrorist purposes is a rapidly growing phenomenon, requiring a proactive and coordinated response from Member States. The United Nations Office on Drugs and Crime (UNODC) plays a key role in providing assistance to Member States, in furtherance of its mandate to strengthen the capacity of national criminal justice systems to implement the provisions of the international legal instruments against terrorism, and does so in compliance with the principles of rule of law and international human rights standards. In particular, in 2011, the General Assembly, in its resolution 66/178, reaffirmed the mandate of UNODC to continue to develop specialized legal knowledge in the area of counter-terrorism and pertinent thematic areas, including the use of the Internet for terrorist purposes. Despite increasing international recognition of the threat posed by terrorists’ use of the Internet in recent years, there is currently no universal instrument specifically addressing this pervasive facet of terrorist activity. Moreover, there is limited specialized training available on the legal and practical aspects of the investigation and prosecution of terrorism cases involving the use of the Internet. The present publication complements the existing resources developed by UNODC in the areas of counter-terrorism, cybercrime and rule of law. It also addresses the importance of developing integrated, specialized knowledge to respond to the technical assistance needs of Member States in combating this continually evolving threat. UNODC is deeply grateful for the generous support of the Government of the United Kingdom of Great Britain and Northern Ireland, which made the publication of that work possible. The publication, which is intended for use both as a stand-alone resource and in support of the capacity-building initiatives of UNODC, is aimed at providing guidance regarding current legal frameworks and practice at the national and international levels relating to the criminalization, investigation and prosecution of terrorist cases involving the Internet. Terrorism, in all its manifestations, affects us all. The use of the Internet to further terrorist purposes disregards national borders, amplifying the potential impact on victims. By highlighting cases and best practices that respond to this unique challenge, the present publication has two aims: first, to promote a better understanding of the ways in which communications technologies may be misused in furtherance of acts of terrorism and, second, to increase collaboration among Member States, so that effective criminal justice responses to this transnational challenge can be developed.

Details: Vienna: UNODC, 2012. 158p.

Source: Internet Resource: Accessed October 25, 2012 at: http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf

Year: 2012

Country: International

Keywords: Computer Crimes

Shelf Number: 126804


Author: International NGO Council on Violence Against Children

Title: Violating Children's Rights: Harmful Practices Based on Tradition, Culture, Religion or Superstition

Summary: All violations of children’s rights can legitimately be described as harmful practices, but the common characteristic of the violations highlighted in this report is that they are based on tradition, culture, religion or superstition and are perpetrated and actively condoned by the child’s parents or significant adults within the child’s community. Indeed, they often still enjoy majority support within communities or whole states. Harmful practices based on tradition, culture, religion or superstition are often perpetrated against very young children or infants, who are clearly lacking the capacity to consent or to refuse consent themselves. Assumptions of parental powers or rights over their children allow the perpetration of a wide range of these practices, many by parents directly, some by other individuals with parents’ assumed or actual consent. Yet the UN Convention on the Rights of the Child (CRC), ratified by almost every state, favours the replacement of the concept of parental “rights†over children with parental “responsibilities,†ensuring that the child’s best interests are parents’ “basic concern†(Article 18). Many of the practices identified in this report involve gross and unlawful discrimination against groups of children, including gender discrimination, and in particular discrimination against children with disabilities. Some are based on tradition and/or superstition, some on religious belief, others on false information or beliefs about child development and health. Many involve extreme physical violence and pain leading, in some cases intentionally, to death or serious injury. Others involve mental violence. All are an assault on the child’s human dignity and violate universally agreed international human rights standards. The International NGO Council on Violence against Children believes the continued legality and social and cultural acceptance of a very wide range of these practices in many states illustrates a devastating failure of international and regional human rights mechanisms to provoke the necessary challenge, prohibition and elimination. Comprehensive, children’s rights-based analysis and action are needed now. Above all, there must be an assertion of every state’s immediate obligation to ensure all children their right to full respect for their human dignity and physical integrity. This short report is designed to complement other current activities in the UN system that are focusing on harmful practices and children and will hopefully lead to more effective action. The UN Secretary-General’s Special Representative on Violence against Children, Marta Santos Pais, held an International Expert Consultation on the issue in June 2012 in Addis Ababa in which the International NGO Council was represented and prepared a submission. Two UN Treaty Bodies, the Committee on the Rights of the Child and the Committee on the Elimination of Discrimination against Women (CEDAW), are collaborating in drafting a General Comment/General Recommendation on harmful practices.

Details: International NGO Council on Violence Against Children, 2012. 58p.

Source: Internet Resource: Accessed October 26, 2012 at: http://www.crin.org/docs/InCo_Report_15Oct.pdf

Year: 2012

Country: International

Keywords: Child Abuse

Shelf Number: 126806


Author: Loaiza, Edilberto, Sr.

Title: Marrying too Young: End Child Marriage

Summary: This report is a clarion call to decision makers, parents, communities and to the world to end child marriage. It documents the current scope, prevalence and inequities associated with child marriage and highlights that by 2020, Some 142 million girls will be married by their 18th birthday if current trends continue. This translates into 14.2 million girls married each year, or 37,000 girls married each day. Child marriage jeopardizes girls’ rights and stands in the way of girls living educated, healthy and productive lives. It also excludes girls from fundamental decisions, such as the timing of marriage and choice of spouse. Girls living in rural areas of the developing world are twice as likely to be married before age 18 as their urban counterparts, and girls with no education are over three times more likely to do so than those with secondary or higher education. The report calls on governments and leaders to end child marriage by: Enacting and enforcing national laws that raise the age of marriage to 18, for both girls and boys. Using data to identify and target geographic “hotspots†– areas with high proportions and numbers of girls at risk of child marriage. Expanding prevention programmes that empower girls at risk of child marriage and address the root causes underlying the practice. Mitigating the harmful impact of child marriage on girls.

Details: New York: United Nations Population Fund, 2012. 74p.

Source: Internet Resource: Accessed November 2, 2012 at: http://www.unfpa.org/public/home/publications/pid/12166

Year: 2012

Country: International

Keywords: Child Marriage

Shelf Number: 126825


Author: Ayling, Julie

Title: What Sustains Wildlife Crime? Rhino Horn Trading and the Resilience of Criminal Networks

Summary: The problem of illegal trading in wildlife is a long-standing one. Humans have always regarded other sentient and non-sentient species as resources and tradeable commodities, frequently resulting in negative effects for biodiversity. However, the illegal trade in wildlife is increasingly meeting with resistance from states and the international community in the form of law enforcement and regulatory initiatives. So why does it persist? What makes the criminal networks involved in it resilient? In this paper I consider the networks involved in the illegal trade in rhinoceros horn that is currently posing an existential threat to most rhino species. The paper considers possible sources of these networks' resilience, both internal and external, and the implications for how the trade could be tackled.

Details: Canberra, Australia: Australian National University, 2012. 22P.

Source: Transnational Environmental Crime Project, Working Paper 2/2012: Internet Resource: Accessed November 3, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2152776

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 126857


Author: United Nations. General Assembly. Human Rights Council

Title: Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions

Summary: In States in which the death penalty continues to be used, international law imposes stringent requirements that must be met for it not to be regarded as unlawful. In the present report, the Special Rapporteur considers the problem of error and the use of military tribunals in the context of fair trial requirements. He also examines the constraint that the death penalty may be imposed only for the most serious crimes: those involving intentional killing. Lastly, he considers the issues of collaboration and complicity, in addition to transparency in respect of the use of the death penalty.

Details: Vienna: United Nations, 2012. 25p.

Source: United Nations Report A/67/275: Internet Resource: Accessed November 3, 2012 at http://daccess-dds-ny.un.org/doc/UNDOC/GEN/N12/457/80/PDF/N1245780.pdf?OpenElement

Year: 2012

Country: International

Keywords: Administration of Justice

Shelf Number: 126861


Author: von Boemcken, Marc

Title: Dealing with Private Security Companies: Options for Development Cooperation in Timor-Leste, Liberia and Peru

Summary: Private security industries challenge development cooperation in two ways. On the one hand, they constitute a significant part of the economy and the security sector of many developing countries. Private security thus immediately has an impact on a number of development-related factors, i.e. economic growth, social welfare and overall feelings of public safety. On the other hand, development agencies themselves increasingly rely on the services of private security companies. In some partner countries, missions of the United Nations (UN), bilateral donors, and international non-governmental organizations (INGOs) are even among the principal customers of commercial security services. Hence, they are directly implicated in the wider social and economic effects of the private security industry. How should development actors deal with private security companies? This BICC publication summarizes the main findings from field research on private security companies in three developing countries: Timor-Leste, Liberia and Peru. Each summary focuses on the specific relations between development cooperation and private security. The particular challenges, which the private security industry presents to development agencies, vary from case to case. Based on the country-specific findings, this publication concludes by outlining different options for how development cooperation can successfully align private security companies with more general developmental objectives.

Details: Bonn, Germany: Bonn International Center for Conversion, 2012. 7p.

Source: BICC Focus 11: Internet Resource: Accessed November 3, 2012 at http://www.bicc.de/uploads/tx_bicctools/BICC_Focus_11.pdf

Year: 2012

Country: International

Keywords: Collaboration

Shelf Number: 126864


Author: Heung, Carly

Title: Alcohol and Community-based Violence: A Systematic Review

Summary: Alcohol is one of the most widely available psychoactive drugs. Both alcohol use and violence share some common physiological, social, and economic variables. While the link between alcohol consumption and violent behaviour has been well established, the mechanisms – social and environmental influences – by which this occurs, are not fully understood. This association highlights the need to gain a better understanding of the contributing factors associated with alcohol-related violence. Purpose: To identify the associated effects of alcohol sales on community-based violence as explained in the existing literature. Methodology: A systematic review of recent literature published from 1999 to 2009 was completed. The search strategy included only articles published in English, with a specific focus on alcohol sales and community-based violence. Electronic databases, grey literature, reference lists of relevant studies and previously published reviews on similar topics were searched using seventeen keywords representing ‘alcohol use’ and ‘community-based violence’. Results: Twenty-eight studies were identified that addressed alcohol outlet density, hours and days of alcohol retail sale, price of alcohol, alcohol sales, characteristics of violent bars, and alcohol-related violent injuries from Emergency Room data. The general finding is that alcohol-related violence is perpetuated by the availability and harmful use of alcohol. Recommendations and Conclusion: These research findings provided ample basis for providing direction and recommendations for informing public health policies to reduce alcohol’s contribution to community-based violence. Eight strategies and 21 commendations are proposed which follow a coordinated, comprehensive health promotion approach incorporating healthy public policy and community action along with the ‘four pillars’: prevention, treatment, harm reduction, and enforcement.

Details: Toronto: Alcohol Policy Network, Ontario Public Health Association, 2010. 46p.

Source: Internet Resource: Accessed November 5, 2012 at: http://www.apolnet.ca/resources/pubs/rpt_Alcohol_and_Violence-2010.pdf

Year: 2010

Country: International

Keywords: Alcohol Abuse

Shelf Number: 126879


Author: Protection Project

Title: Understanding Trafficking in Persons in the MENA region: the Causes, the Forms, the Routes and the Measures to Combat a Serious Violation of Human Rights

Summary: In today’s globalized world in which many principles and traditions are being called into question, few rights such as the right to freedom and security enjoy such broad consensus. Trafficking in persons and all forms of enslavement, states around the world agree, must be confronted relentlessly and with all means available. Since the adoption of the United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons in 2000, many countries have therefore reformed their legislation to criminalize trafficking in persons within their jurisdictions and have taken concrete steps to eradicate the problem through the engagement of civil society, law enforcement personnel and the judiciary. To assist governments and the international community in implementing these new laws, a plethora of excellent training manuals on trafficking in persons have been published by national and international institutions. Some of these manuals are sector-specific, some of them focus on a region; others provide a general overview of the problem of trafficking without a specific regional or functional focus. Drawing from over 10 years of experience in providing capacity building trainings on trafficking in persons to all levels of society and to the governments in the greater MENA region, The Protection Project at the Johns Hopkins University, School of Advanced International Studies wrote this training manual with two objectives in mind: firstly, developing a training manual for practitioners specifically tailored to the forms and routes of trafficking in persons in the MENA region; secondly, addressing in detail some of the specific and particular issues of the region, including the Islamic law perspective on the combat against trafficking in persons. In referring to the MENA region the manual includes the following countries: Algeria, Bahrain, Comoros, Djibouti, Egypt, Iraq, Jordan, Kuwait, Lebanon, Libya, Mauritania, Morocco, Oman, Palestinian Authority, Qatar, Saudi Arabia, Somalia, Syria, Tunisia, United Arab Emirates, Sudan, Yemen. The training manual aims at providing the reader with a useful tool to understand the problem of trafficking in the MENA region through a three level approach: firstly, it provides an overview of the forms and routes of trafficking in persons in the MENA region; secondly, it analyzes the measures either taken or that should be taken to address the problem of trafficking in the region through the established 4 Ps approach; thirdly, it helps the understanding and memorization of the content of each chapter though review questions and practical exercises.

Details: Baltimore, MD: The Protection Project, John Hopkins University, 2012(?). 128p.

Source: Internet Resource: Accessed November 5, 2012 at: http://www.protectionproject.org/wp-content/uploads/2012/10/TIP-MENA-UNODC-QFCHT.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 126884


Author: MIT Senseable City Lab

Title: New Energy for Urban Security: Improving Urban Security Through Green Environment Design

Summary: UNICRI, in collaboration with the SENSEable City Laboratory of the Massachusetts Institute of Technology, has implemented a research project aimed at helping policymakers to design and implement effective urban security, crime prevention and criminal justice policies based on sustainable urban design. The project includes assessing the impact of sustainable urban design on the security and rule of law in contemporary cities. Within the framework of the project, the Institute published the report New Energy for Urban Security: Improving Urban Security through Green Environmental Design.

Details: Turin, IT: UNICRI; Cambridge, MA: Massachusetts Institute of Technology, 2011. 67p.

Source: Internet Resource: Accessed November 6, 2012 at: http://www.unicri.it/news/2011/1104-2_urban_security/110414_CRA_Urban_Security_sm.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 126886


Author: The Future Group

Title: Falling Short of the Mark: An International Study on the Treatment of Human Trafficking Victims

Summary: Victims of human trafficking live in a world of fear and despair. The treatment afforded to these victims when they finally emerge from the violent and brutal cycle of human trafficking tells us something about our own societies. This Study has been undertaken to evaluate the progress made by various developed countries towards implementing their international obligations to protect victims of human trafficking, and to assess the treatment given to these victims in comparison to international best practices. The Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime (“Trafficking Protocol”) was adopted on November 15, 2000, and came into force on December 25, 2003. With 117 signatories, it has widespread international support. One of its main objectives is to protect and assist trafficking victims. Part I of this Study consists of country narratives that describe and analyze the law and practice of selected jurisdictions with respect to their compliance with Articles 6-8 of the Trafficking Protocol. This Study concludes that Australia, Germany, Italy, Norway, Sweden and the United States are generally complying with their international obligations under the Trafficking Protocol related to the protection of victims of human trafficking. However, the United Kingdom has failed to meet these international standards and is currently reviewing its policy in this area in light of its recent ratification of the Trafficking Protocol. Canada has systematically failed to comply with its international obligations under the Trafficking Protocol related to the protection of victims of human trafficking. Canada’s record of dealing with trafficking victims is an international embarrassment and contrary to best practices. Since November 2004, The Future Group has been corresponding with the Government of Canada to attempt to obtain information on its compliance with Articles 6-8 of the Trafficking Protocol. In addition to extremely lengthy delays in responding to inquiries, former Liberal Cabinet Ministers passed the buck to each other, ignored the request for information, and failed to detail any steps that Canada has taken whatsoever to meet its international obligations in this regard. The new Conservative Government, under Prime Minister Stephen Harper, which took power in early February 2006, has not yet had an opportunity to announce its policy in this area. Part II of this Study provides a comparative analysis of best practices in the jurisdictions that are under review. Those countries that are global leaders in best practices, as well as those which have fallen short of the mark for the treatment of trafficking victims may be identified.

Details: Calgary, Alberta, Canada: The Future Group, 2006. 41p.

Source: Internet Resource: Accessed November 6, 2012 at: http://www.oas.org/atip/canada/Fallingshortofthemark.pdf

Year: 2006

Country: International

Keywords: Human Trafficking

Shelf Number: 126892


Author: Poolen, W.J.

Title: Intentional Disintegration of Cybercriminal Networks: Approaches in Network Strategic Security Modeling

Summary: This thesis assesses whether network strategic security models can be used for disintegration of cybercriminal networks. Strategic models are conceptualized as methods for security intervention that use network mathematical algorithms to define sets of targets in a hostile network that seem crucial to attack in order to disintegrate a cybercriminal network. Two strategic models are constructed that are associated with different types of targets in cybercriminal networks. One model focusses on hubs (computer devices, human operators and other nodes that interact within a network); the other model focusses on the exchange connections between clusters of interacting nodes. After elaboration of the strategic models a set of cases of cybercriminal interventions is invoked to investigate how the theoretical models contribute to real life intervention. In reflection on the cases and theory the main issue that becomes apparent is that the strategic models do not adequately take in account the ability of targeted networks to react to disintegration attempts. The notion of network resilience is considered and a subsequent theoretical attempt interprets network resilience as an effect of the relations that a network maintains with its resource networks. Networks are perceived to be embedded and interconnected in a network environment in which they exchange resources. Finally, a broadening of the theoretical understanding towards the multilayered aspects of a network is suggested to gain a more adequate perspective for network strategic security interventions.

Details: Amsterdam: Vrije Universiteit,, 2012. 69p.

Source: Internet Resource: Thesis: Accessed November 9, 2012 at: http://www.screenwork.nl/PDF/20120910_masterthesis_webversie.pdf

Year: 2012

Country: International

Keywords: Computer Crime

Shelf Number: 126899


Author: International Centre for the Prevention of Crime (ICPC)

Title: Comparative Report on Types of Intervention Used for Youth at Risk of Joining a Street Gang. Practices from Belgium, Canada and France

Summary: This comparative analysis report explores different modes of intervention aimed at identifying at-risk youth and promoting dialogue and gang disaffiliation in Canada, Belgium and France. The report contains three chapters, each on a specific country and 11 initiatives (3 Belgian, 4 French and 4 Canadian) are examined.

Details: Montreal: ICPC, 2011. 60p.

Source: Internet Resource: Accessed November 9, 2012 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/Comparative_report_on_types_of_intervention_used_for_youth_at_risk_of_joining_a_street_gang.pdf

Year: 2011

Country: International

Keywords: At-risk Youth

Shelf Number: 126904


Author: Mitchell, Ojmarrh

Title: The Effectiveness of Incarceration-Based Drug Treatment on Criminal Behavior: A Systematic Review

Summary: Many, if not most, incarcerated offenders have substance abuse problems. Without effective treatment, these substance-abusing offenders are likely to persist in non-drug offending. The period of incarceration offers an opportunity to intervene in the cycle of drug abuse and crime. Although many types of incarceration-based drug treatment programs are available (e.g., therapeutic communities and group counseling), the effectiveness of these programs is unclear. The objective of this research synthesis is to systematically review quasi-experimental and experimental (RCT) evaluations of the effectiveness of incarceration-based drug treatment programs in reducing post-release recidivism and drug relapse. A secondary objective of this synthesis is to examine variation in effectiveness by programmatic, sample, and methodological features. In this update of the original 2006 review (see Mitchell, Wilson, and MacKenzie, 2006), studies made available since the original review were included in an effort to keep current with emerging research.

Details: Oslo: Campbell Collaboration, 2012. 76p.

Source: Internet Resource: Campbell Systematic Reviews
2012:18: Accessed November 9, 2012 at: www.campbellcollaboration.org

Year: 2012

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 126905


Author: Kego, Walter

Title: The Untouchables: Russian 'Dirty Money' in Europe

Summary: In Europe, Russian organized crime rackets are quickly gathering a name for themselves as “untouchables.†As their wealth increases and EU banking regulation falters, it is a name that is ever more apt. Money laundering in the European Union by Russian organized crime remains a problem for member states. Governments and banks continue to allow the accounts and transactions of criminals to go unregulated. However, increased regulation hurts the profits of EU banks, which can potentially profit from the illegal transactions. Hence, governments are often reluctant to increase regulation in times of crisis. Despite member states’ reluctance to enforce regulations it is imperative they do so as these illicit channels bring with them an influx of crime and corruption into the EU.

Details: Nacka, Sweden: Institute for Security & Development Policy, 2012. 2p.

Source: ISDP Policy Brief No. 101: Internet Resource: Accessed November 12, 2012 at http://www.isdp.eu/images/stories/isdp-main-pdf/2012_kego-georgieff_untouchables.pdf

Year: 2012

Country: International

Keywords: Money Laundering (Europe)

Shelf Number: 126925


Author: Kurtenbach, Sabine

Title: Postwar Youth Violence: A Mirror of the Relationship Between Youth and Adult Society

Summary: Postwar societies are highâ€risk contexts for youth violence. Nevertheless, not all postwar societies are equally violent. This article explores how these variations can be explained by focusing on the interaction between youths and adult society in a comparison of Guatemala and Cambodia. Starting from the concept of socialization and the possibilities of performing status passages to adulthood, it analyzes not only the different risk factors but also the agency of young people and society in trying to cope with and overcome obstacles on the pathway to adulthood. Different patterns of war termination and of reconstruction after war’s end are identified as major intervening variables that explain the variations in youth violence in as well as across the case studies.

Details: Hamburg, Germany: German Institute of Global and Area Studies, 2012. 29p.

Source: German Institute of Global and Area Studies Working Papers, No. 199: Internet Resource: Accessed November 12, 2012 at http://www.giga-hamburg.de/dl/download.php?d=/content/publikationen/pdf/wp199_kurtenbach.pdf

Year: 2012

Country: International

Keywords: Post-Conflict Violence (Cambodia)(Guatemala)

Shelf Number: 126926


Author: Thiara, Ravi K.

Title: Vital Statistics 2 Key Findings Report on Black, Minority Ethnic and Refugee Women's and Children's Experiences of Gender-Based Violence

Summary: The report provides key findings from Imkaan’s Toolkit; a monitoring framework piloted with ten violence against women and girls (VAWG) organisations over a 3 month period. The monitoring tool captured data on Black, Minority Ethnic and Refugee (BMER) women’s and children’s access to specialist BMER services and other voluntary and statutory services. The findings provide a picture of the role and impact of specialist BMER VAWG services, with the aim to contribute to more informed policy and practice on BMER women and girls in the context of VAWG. Note: The findings from the first Toolkit pilot, Vital Statistics: The experiences of Black, Asian, Minority Ethnic and Refugee women and children facing violence and abuse, were published in 2010.

Details: London: Imkaan, 2012. 28p.

Source: Internet Resource: Accessed November 12, 2012 at http://dl.dropbox.com/u/85173313/Vital%20Statistics%20Two%202012%20%28Low%20res%29.pdf

Year: 2012

Country: International

Keywords: Female Victims

Shelf Number: 126928


Author: International Drug Policy Consortium

Title: IDPC Response to the UNODC World Drug Report 2012

Summary: 26 June 2012 saw the launch of the United Nations Office on Drugs and Crime (UNODC)’s flagship publication, the World Drug Report. This IDPC response provides an overview of the data and topics presented in the Report and where appropriate, within the broader context of the current state of the UN drug control framework, offer a critical analysis of both. This year’s publication represents an impressive and wide-ranging set of data collated and analysed by UNODC and provides an overview of recent trends and the current situation in terms of production, trafficking, consumption and the consequences of illicit drug use for treatment, drug-related diseases and drug-related deaths.

Details: London: International Drug Policy Consortium, 2012. 22p.

Source: Internet Resource: Accessed November 15, 2012 at http://dl.dropbox.com/u/64663568/library/IDPC-response-to-the-UNODC-world-drug-report-2012.pdf

Year: 2012

Country: International

Keywords: Crime Statistics

Shelf Number: 126930


Author: Lloyd, Paulette

Title: The Global Diffusion of Law: Transnational Crime and the Case of Human Trafficking

Summary: This article theorizes and analyzes the diffusion of criminal law globally. The past few decades have seen the proliferation of new laws criminalizing certain transnational practices, from money laundering to corruption; from insider trading to trafficking in weapons and drugs. Human trafficking is one example. How do we understand the fairly rapid move in the past two decades for many countries to criminalize the exploitative transshipment of people across borders. We argue that (1) issue framing is crucial; (2) once human trafficking is framed as linked to transnational crime, governments are more likely to adopt a prosecutorial approach to address it; and (3) the transnational crime frame explains the diffusion pattern of criminal statutes internationally. We test our argument by documenting the effect of issue framing and physical vulnerability on the diffusion of criminal law in this area. These results suggest the importance of combining both ideational and material factors to understand the spread of criminal law world-wide.

Details: Unpublished Paper; 2012. 55p.

Source: Internet Resource: Accessed November 20, 2012 at: http://www.socsci.uci.edu/files/internationalstudies/docs/2012/simmons.pdf

Year: 2012

Country: International

Keywords: Criminal Law

Shelf Number: 126938


Author: LeVoy, Michele

Title: Ten Ways to Protect Undocumented Migrant Workers

Summary: Every day hundreds of thousands of undocumented workers labor in different sectors of the economy in Europe. Undocumented workers often work and live in inhumane conditions, earning very little or no pay at all, and are insufficiently protected by legislation. Facing exploitation and abuse, many undocumented workers believe that they have no other option than to accept this situation. Fearing that they may be deported if they speak out, an overwhelming number suffer in silence. Meanwhile some economic sectors in the European Union are to a considerable extent dependent upon undocumented workers, who make up a substantial part of their workforce. This dependence may be hidden, not just by migrants’ silence, but by sub-contracting chains and employers’ complicity. PICUM, the Platform for International Cooperation on Undocumented Migrants, has collected detailed information obtained from NGOs, trade unions and other actors working with and advocating for undocumented workers, both in Europe and in the United States. The first section of this paper presents a summary of ten actions that contribute to the aim of respecting the dignity of undocumented migrants as humans and as workers. The second section of this paper presents ten policy recommendations that should be taken into account by policy makers. The employment and the exploitation of thousands of undocumented migrant workers in Europe is a symptom of the shortcomings of social, employment and migration policies. Tackling the roots of the problem of the exploitation of undocumented workers therefore constitutes a major challenge, requiring concerted efforts in all of these fields.

Details: Brussels: PICUM, 2005. 119p.

Source: Internet Resource: Accessed November 23, 2012 at: http://picum.org/picum.org/uploads/publication/Ten%20Ways%20to%20Protect%20Undocumented%20Migrant%20Workers%20EN.pdf

Year: 2005

Country: International

Keywords: Illegal Aliens

Shelf Number: 151470


Author: Interâ€American Commission on Human Rights. Rapporteurship on the Rights of the Child

Title: Juvenile Justice and Human Rights in the Americas

Summary: The Interâ€American Commission on Human Rights (IACHR) has had multiple occasions to deal with the issue of juvenile justice and its relationship to human rights when examining and deciding the petitions and cases submitted to it, and the precautionary measures requested of it, when conducting its visits and adopting reports on the situation of human rights in the member States of the Organization of American States (OAS), and at the public hearings convened during its sessions. Based on the information it received, the Commission has decided to prepare a thematic report to examine juvenile justice in the Americas and to make recommendations to the member States with a view to strengthening and improving their institutions, laws, policies, programs and practices in the area of juvenile justice and to ensure that those systems are implemented in accordance with the international corpus juris on the rights of children and adolescents. To make the preparation of this report possible, the IACHR signed a memorandum of understanding with the Regional Office for Latin America and the Caribbean of the United Nations Children’s Fund (UNICEF) and with the United Nations’ Office of the High Commissioner for Human Rights (OHCHR). It also received financial support from the Interâ€American Development Bank (IADB), Save the Children †Sweden, and the Government of Luxemburg. The Commission also wishes to acknowledge the cooperation of the Special Representative on Violence Against Children Office. The States of the region are confronted every day with the problems associated with criminal offenses committed by persons under the age of 18. International law has clearly established that a juvenile justice system must be in place for children and adolescents who violate criminal laws. But this special justice system does not apply to all children; instead, it applies only to those who have reached the minimum age at which they can be held accountable for violations of criminal law. Once that minimum age has been reached, the juvenile justice system must be applied to all children and adolescents, without any exceptions. Therefore, it is unacceptable for States to exclude from that system any person who has not yet attained adulthood, which, under international law, is at the age of 18. The report adopted by the IACHR identifies the international principles of human rights that juvenile justice systems must observe. This report underlines the member States’ obligations visâ€Ã â€vis the human rights of children and adolescents accused of violating criminal law. The report makes it clear that a juvenile justice system must ensure that children and adolescents enjoy all the same rights that other human beings enjoy; but it must also provide them with the special protections that their age and stage of development necessitate, in keeping with the main objectives of the juvenile justice system, namely, the rehabilitation of children and adolescents, their comprehensive development and their reincorporation into society to enable them to play a constructive role within it. In its report, the Commission observes that juvenile justice systems must respect the principles of law that specifically apply to minors, and the special ways in which the general principles of law are applied to persons who have not yet attained their adulthood. For example, a juvenile justice system must respect the principle of legality, which means that the system cannot impinge upon the life of children and adolescents by invoking a supposed need for protection or prevention of crime; instead, juvenile justice systems must be applied solely on the basis of preâ€existing law in which a certain conduct has been classified as a criminal offense. Juvenile justice systems must also guarantee the principle of last resort, which means, for example, that it must consider alternatives to adjudication in the case of violations of criminal law, and nonâ€custodial measures or other forms of deprivation of liberty, which in the case of persons under the age of 18 is to be used only as a last resort. Accordingly, the Commission urges States to move in the direction of eliminating penalties of incarceration in the case of children and adolescents. Furthermore, juvenile justice systems must be specialized, which means that they must feature laws, procedures, authorities and institutions specifically designed for children and adolescents alleged to have violated criminal law. All those working within the juvenile justice system must have received special instruction in children’s rights and be trained to work with children. In its report, the Commission also highlights the point that the due process guarantees, such as the right to a competent judge, the presumption of innocence, the right of defense, the right of appeal and others, must be fully respected in juvenile justice proceedings. The Commission explains the special ways in which these guarantees are observed when persons under the age of 18, who require specific protections, are involved. The Commission commends the legislative strides that many States have taken in recent years. It notes that most States of the region have a special legal framework in place in the area of juvenile justice. In many cases, the framework adopted measures in conformity with international standards on the subject. The Commission also recognizes the efforts made by some countries to bring their juvenile justice practices, institutions and facilities into line with international standards, especially in those States where economic resources are limited. However, the Commission is troubled by the weaknesses within the juvenile justice systems in the region, despite the legislative progress made in many countries since the adoption of the U.N. Convention on the Rights of the Child. Indeed, the Commission observes that there is a significant gap between the language of the States’ laws and the experiences of children and adolescents accused of violating criminal laws. In this report, the Commission examines how, with the exception of a few examples of best practices, the juvenile justice systems of the Americas are characterized by discrimination, violence, lack of specialization, and an abuse of the measures used to deprive juvenile offenders of their freedom. One of the chief causes of concern to the Commission is the fact that in a number of States of the Americas, very young children are held responsible and accountable for violations of criminal law; in some States, children as young as 7 can face criminal prosecution. The Commission is also disturbed by the fact that in the vast majority of States in the region, children and adolescents of 15, 16 and 17, are denied access to the specialized juvenile justice systems and are frequently tried in the ordinary adult criminal justice system, even though they are minors. Under some juvenile justice systems, children and adolescents are often transferred to ordinary courts, where they receive adult sentences and are forced to serve their sentences in adult prisons. Many children and adolescents in the region are thus being denied the protections afforded by the juvenile justice system. In summary, the IACHR is troubled by the practice on the part of some States of denying or offering fewer procedural guarantees, lowering the minimum age of criminal responsibility, and stiffening penal sentences. The Commission is also troubled by the fact that in some cases, children below the minimum age at which they can be held criminally responsible, are deprived of their liberty through soâ€called “protective†proceedings that end in punitive measures against the minor; all too often these proceedings are not conducted in strict observance of due process guarantees. The information compiled shows that on occasion, children and adolescents who have been abused, are indigent or have been deprived of their social and economic rights, are treated as criminals or routinely held responsible for violations of criminal law because of their condition in life, and are subjected to the juvenile justice system without ever having violated any criminal law. The same thing happens in the case of children and adolescents deemed to be “beyond parental control,†children and adolescents in “irregular situations,†children and adolescents accused of “status offenses,†i.e., acts they committed that would not be criminalized if committed by adults, or children or adolescents who have mental illnesses or diminished mental capacity who are criminalized instead of being given the proper medical care. The first contact of children and adolescents with the juvenile justice system is through the police, and is frequently a traumatic experience. The police often treat children and adolescents in a discriminatory manner and selectively arrest those that are poorest, belong to minorities, or those identified as belonging to certain groups because of their appearance. The IACHR has learned of police practices in which children and adolescents are routinely detained based on their appearance, or simply for being in certain places or because they are assumed to be 'atâ€risk', or abandoned because they are living on the streets or wandering around; the police sometimes round up such children and adolescents because of an increase in crime in some area, or because they are assumed to be gang members. It often happens that children and adolescents who commit or are accused of committing crimes are removed from any contact with family and community †contacts which are essential for the enjoyment of their rights and their development. Despite the international laws requiring that whenever possible, alternatives to adjudication are to be used in the case of children and adolescents, the IACHR report reveals that alternatives of this type are rarely used in most States of the region. The Commission also observes that in some States, officials of the judicial system, especially those outside the major cities, have little or no training in the area of children and human rights. Thus, the proceedings conducted in the juvenile justice system do not always observe due process guarantees and the principle of the best interests of the child. Similarly, although deprivation of liberty should be used only as a last resort in the case of children and adolescents, and should be for the shortest time possible, the Commission’s report shows that most juvenile justice systems in the Americas resort to deprivation of liberty, both before trial and after conviction. The IACHR also observes that the principles that must govern the sentences administered, such as the principle of proportionality, are often ignored in favor of prolonged sentences on the pretext that such sentences aid in the “rehabilitation†of children and adolescents. In some member States, this criterion leads to the imposition of indefinite sentences in which the children and adolescents will remain deprived of their liberty until such time as the person is deemed “rehabilitated†or reaches a certain age. The IACHR is also troubled by the failure to observe the human rights of children and adolescents when they are deprived of their liberty. In its report, the Commission observes that conditions in the facilities in which children and adolescents are deprived of their liberty are, in general, inadequate and often breed violence among the children or adolescents, or by State authorities. Furthermore, the detention conditions do not always properly guarantee the other rights of children and adolescents, rights that must never be restricted they are in custody, such as the right to life, to physical integrity, to health, to food, and to education and recreation. The report also examines how corporal punishment, solitary confinement, the use of psychotropic drugs to control juveniles, and other cruel, inhuman and degrading treatment continue to be used to discipline children and adolescents deprived of their liberty in the Americas, despite the fact that these punishments are strictly prohibited under international human rights law. The foregoing is compounded by the fact that, in many States, there are no mechanisms for filing complaints or securing independent supervision of the situation of children and adolescents accused of violating criminal laws or deprived of their liberty; in those States that do have such mechanisms, they are underfunded and therefore have very little effect. Thus, the States are not complying with their obligation to adequately prevent, investigate, punish and repair human rights violations of which children and adolescents are frequently victims during all phases of the juvenile criminal justice system. In its report, the Commission calls upon the member States to undertake to comply with their international obligations to protect and guarantee the human rights of children and adolescents in their juvenile justice systems. It also makes a number of specific recommendations concerning the measures that the States must take to adapt their juvenile justice systems to international standards in this area.

Details: Washington, DC: Organization of American States, 2011. 179p.

Source: Internet Resource: Accessed November 23, 2012 at: http://www.oas.org/en/iachr/children/docs/pdf/JuvenileJustice.pdf

Year: 2011

Country: International

Keywords: Juvenile Delinquency

Shelf Number: 126980


Author: Latonero, Mark

Title: The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking

Summary: In September 2012, President Obama identified human trafficking as one of the great human rights issues of our time, representing a “debasement of our common humanity that tears at the social fabric of our communities, endangers public health, distorts markets, and fuels violence and organized crime.†The nature and extent of human trafficking in modern society is complex and evolving, however, and our understanding of the phenomenon is fraught with contested terminologies and differing perceptions. Broadly speaking, human trafficking involves the severe sexual and labor exploitation of vulnerable people for financial gain, which amounts to a gross violation of human rights. Children exploited in the sex trade are especially at risk. What role does technology play in the shifting dynamics of human trafficking today? In this report, researchers at the USC Annenberg Center on Communication Leadership & Policy (CCLP) reveal how those involved in human trafficking have been quick to adapt to the 21st-century global landscape. While the rapid diffusion of digital technologies such as mobile phones, social networking sites, and the Internet has provided significant benefits to society, new channels and opportunities for exploitation have also emerged. Increasingly, the business of human trafficking is taking place online and over mobile phones. But the same technologies that are being used for trafficking can become a powerful tool to combat trafficking. The precise role that digital technologies play in human trafficking still remains unclear, however, and a closer examination of the phenomenon is vital to identify and respond to new threats and opportunities. This investigation indicates that mobile devices and networks have risen in prominence and are now of central importance to the sex trafficking of minors in the United States. While online platforms such as online classifieds and social networking sites remain a potential venue for exploitation, this research suggests that technology-facilitated trafficking is more diffuse and adaptive than initially thought. This report presents a review of current literature, trends, and policies; primary research based on mobile phone data collected from online classified sites; a series of firsthand interviews with law enforcement; and key recommendations to policymakers and stakeholders moving forward. While the sex trafficking of minors continues to expand across multiple media platforms, our research indicates that the rise of mobile technology may fundamentally transform the trafficking landscape. No other communication technology in history, including the Internet, has been adopted so rapidly around the world. The World Bank estimates that 75% of the global population has access to a mobile phone. Mobile’s ability to facilitate real-time communication and coordination, unbound by physical location, is also being exploited by traffickers to extend the reach of their illicit activities. Traffickers are able to recruit, advertise, organize, and communicate primarily—or even exclusively—via mobile phone, effectively streamlining their activities and expanding their criminal networks. In short, human traffickers and criminal networks are taking advantage of technology to reach larger audiences and to do illicit business more quickly and efficiently across greater distances. Mobile communication may also represent a breakthrough for interventions by law enforcement and the anti-trafficking community. Data gleaned from cellphones and mobile networks constitute a trail of information and evidence that can be a powerful tool in identifying, tracking, and prosecuting traffickers. Mobile technologies can also be used to reach vulnerable communities and raise public awareness. The rise of mobile has major implications both for the spread of human trafficking and for anti-trafficking efforts, and should be carefully considered by law enforcement, policymakers, and activists as they develop strategies to combat human trafficking in the United States and worldwide. Furthermore, the respect for privacy and civil liberties, and potential unintended consequences of technological interventions on victims and survivors, are crucial considerations in developing mobile-based solutions. This research expands on CCLP’s 2011 report examining the role of online technologies in human trafficking. Key findings of the 2011 report focused on the use of Internet technologies, particularly online classifieds and social media sites, for the sex trafficking of minors in the United States. The USC Information Sciences Institute (ISI) and CCLP collaborated to develop prototype software designed to detect possible cases of sex trafficking of minors online. Our research indicated that tools such as data mining, mapping, computational linguistics, and advanced analytics could be used by governmental and nongovernmental organizations, law enforcement, academia, and the private sector to further anti-trafficking goals of prevention, protection, and prosecution.

Details: Los Angeles: University of Southern California, Annenberg Center on Communication Leadership & Policy, 2012. 52p.

Source: Internet Resource: Research Series on Technology and Human Trafficking; Accessed November 23, 2012 at: http://www.ungift.org/doc/knowledgehub/resource-centre/USC-Annenberg-Technology-and-Human-Trafficking-2012.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 126983


Author: Miraglia, Paula

Title: Transnational Organised Crime and Fragile States

Summary: Transnational organised crime (TOC) refers to a fluid and diversified industry that engages in illicit activities ranging from drug and human trafficking to drug smuggling, piracy and money laundering. Although it may affect strong states, conflict-affected and fragile states are especially vulnerable to the dynamics of TOC and may provide more favourable conditions for its development. The implications for those states are many and serious. This paper outlines the ways in which TOC has evolved in recent years and how policy might be adapted to take account of this evolution. It emphasises that TOC today is less a matter of organised cartels established in producer or end-user states, but increasingly characterised by fluid, opportunistic networks that may for example specialise in transport and logistics. The paper recommends tackling the problem through a comprehensive approach that considers TOC as but one element within a greater complex of cause and effect. This would entail a re-evaluation of many current assumptions about TOC and a reformulation of current policies.

Details: Paris: Organisation for Economic Co-Operation and Development, 2012. 36p.

Source: Internet Resource:OECD Development Co-Operation Working Papers, WP 3/2012: Accessed November 24, 2012 at: http://www.clingendael.nl/publications/2012/20121026_briscoe_transnational_organised_crime.pdf

Year: 2012

Country: International

Keywords: Drug Trafficking

Shelf Number: 126988


Author: Scott, Michael S.

Title: Implementing POP: Leading, Structuring, and Managing a Problem-Oriented Police Agency

Summary: This manual is intended for police executives interested in promoting the practice of problem-oriented policing (POP) within their police agency. (In the United Kingdom, the concept is more commonly referred to as problem-oriented partnerships with the intention of emphasizing the criticality of external partnerships. It is not otherwise distinct.) Whether you’re a chief executive (police chief, chief constable, sheriff, or public safety director) already committed to the idea of POP, but looking for guidance on implementing it, or a senior-level executive tasked to plan your agency’s adoption of POP, this manual should help you decide what steps to take, and in what order, to make POP an integral part of how your police agency does business. If you lack the time to read the entire manual, read the Contents for a quick summary; you’ll know which sections you might want to read in full. At the end of each section we reference a few good and readily accessible publications should you want to read more. We have also created a companion annotated bibliography of POP studies that you can access online at www.popcenter.org. This manual assumes that you already know what POP is and that you are committed to the concept as a means of making your agency more effective. If this is not the case for you, visit the Center for Problem-Oriented Policing’s website, www.popcenter.org, for an abundance of information on the principles and practice of POP. This manual also assumes that you are well-versed in the basics of police management and therefore is not a primer or comprehensive text on the subject. Rather, it focuses only on the aspects of police administration and management that are most directly implicated in the shift to POP. Implementing POP is as much about the art of persuasion and of modifying police culture as it is about the mechanics of police administration. The practical realities of changing police organizations and the public’s expectations of police are far more complex than a step-by-step manual such as this one might imply. But we think the manual format serves as a useful reminder that for a police agency to truly adopt POP, all of its many systems, procedures, policies, structures, and personnel should be aligned and integrated in a way that makes practicing POP not only possible, but expected and encouraged. Each system, procedure, policy, structure, or employee, properly oriented to addressing problems, facilitates the orientation of other components. Throughout the manual, we offer many suggestions for making changes to a police agency’s operation. In so doing, we are mindful that police agencies come in all sizes and operate in a wide variety of political and legal environments, both of which implicate whether and how you implement these suggestions in your agency. We are also mindful that police agencies have varying tolerances for the pace of change with varying opportunities and obstacles to effecting changes. Even if for your agency a particular recommendation doesn’t make sense or is impractical at the time, consider its underlying principle and how it might be adapted to fit your agency’s and community’s needs, now or in the future.

Details: Washington, DC: U.S. Department of Justice, Community Oriented Policing Services, 2012. 47p.

Source: Internet Resource: accessed November 29, 2012 at: http://www.hsdl.org/?view&did=724958

Year: 2012

Country: International

Keywords: Police Administration

Shelf Number: 127040


Author: Akee, Randall

Title: Transnational Trafficking, Law Enforcement and Victim Protection: A Middleman Trafficker's Perspective

Summary: We explore three hitherto poorly understood characteristics of the human trafficking market - the cross-border ease of mobility of traffickers, the relative bargaining strength of traffickers and final buyers, and the elasticity of buyers' demand. In a model of two-way bargaining, the exact configuration of these characteristics is shown to determine whether domestic and foreign crackdowns on illicit employment mutually reinforce or counteract one another in efforts to stem the tide of trafficking. Estimation results from a gravity model of trafficking present evidence consistent with the mutual reinforcement view, indicating considerable ease of mobility, partial bargaining power, and inelastic demand.

Details: Bonn, Germany: Institute for the Study of Labor (IZA), 2011. 47p.

Source: Internet Resource: IZA Discussion Paper No. 6226: Accessed December 4, 2012 at: http://ftp.iza.org/dp6226.pdf

Year: 2011

Country: International

Keywords: Border Security

Shelf Number: 127122


Author: Institute for Economics and Peace

Title: 2012 Global Terrorism Index: Capturing the Impact of Terrorism from 2002 - 2011

Summary: The Global Terrorism Index is a comprehensive body of work which systematically ranks the nations of the world according to their terrorist activity. The index combines a number of factors associated with terrorist attacks to build a thorough picture of the impact of terrorism over a 10-year period, illustrating trends, and providing a useful data series for further analysis by researchers and policymakers. Produced by the Institute for Economics and Peace (IEP), the GTI is based on data from the Global Terrorism Database (GTD) which is collected and collated by the National Consortium for the Study of Terrorism and Responses to Terrorism (START). The GTD is considered to be the most comprehensive dataset on terrorist activity and has codified over 104,000 cases of terrorism. This report summarizes changing trends in terrorism over time, as well as analyzing its different dimensions in terms of geographic activity, methods of attack, organizations involved, and its national context in terms of economic development and governance. The index has also been compared to other socioeconomic indicators to determine what factors are commonly associated with terrorism.

Details: London: Institute for Economics and Peace, 2012.

Source: Internet Resource: Accessed December 7, 2012 at: http://reliefweb.int/sites/reliefweb.int/files/resources/2012-Global-Terrorism-Index-Report.pdf

Year: 2012

Country: International

Keywords: Terrorism (International)

Shelf Number: 127141


Author: Kuneviciute, Ieva

Title: Anti-Trafficking Campaign in Kosovo 2012: Pre-Campaign Survey Report

Summary: This report presents the results of a pre-Anti-Trafficking Campaign survey, which took place on 3-10 September 2012 in Prishtina, Prizren, Peja, Gjakova, Gjilan, Ferizaj and Mitrovica, as well as smaller towns and villages around. 280 interviews were conducted in total. People were interviewed about their knowledge and behaviour towards child trafficking, especially child street begging, child forced labour and child sexual exploitation, as well as, their attitude towards anti-trafficking campaigns and other activities. The report concludes that approximately half of the respondents have an average knowledge about child trafficking. The respondents were aware of various forms of child trafficking, however, the perception differed in various municipalities. Kosovo police was acknowledged as an important actor fighting against child trafficking. On the other hand, some institutions, e.g. NGOs were not given much importance. Finally, recommendations towards the activities of National Anti-Trafficking and Public Awareness Campaign are made.

Details: Kosovo: Terre des hommes - Delegation in Kosovo, 2012. 86p.

Source: Internet Resource: Accessed December 16, 2012 at http://s3.amazonaws.com/rcpp/assets/attachments/1511_Pre-campaign_survey_REPORT_19.09.2012_original.pdf

Year: 2012

Country: International

Keywords: Child Trafficking (Kosovo)

Shelf Number: 127216


Author: Operation Charm

Title: The Illegal Trade in Bears

Summary: Most of us have known bears from our earliest days, but today, all of the world’s bear species are threatened by illegal trade. The illegal trade in endangered species is worth billions of pounds every year and threatens the survival of species all over the world. Trade in endangered species is controlled by the Convention on International Trade in Endangered Species (CITES), an international agreement that has been signed by more than 170 countries, including the UK. CITES bans international trade in the world’s most endangered species and strictly controls trade in many others. All species of bears are included in the CITES listings. Even so the illegal trade continues and the UK plays a part in this. The illegal trade in endangered species, like any other trade, works on the basis of supply and demand. In many cases the consumer demand for endangered species products comes from wealthy countries like the UK. Wild bears are being killed for their gall bladders and the bile which they produce is highly valued as an ingredient in some traditional Chinese medicines. Others are farmed in China and Vietnam where they are forced to spend their lives in tiny cages and are “milked†of their bile every day. Still others are killed for their skins which are used as home “decorations†for the wall or the floor.

Details: London: Operation Charm, 2012. 16p.

Source: Internet Resource: Accessed December 17, 2012 at http://www.animalsasia.org/eng/images/index/index/Bearbilebooklet%28UK%29.pdf

Year: 2012

Country: International

Keywords: Bears

Shelf Number: 127232


Author: Connor, John M.

Title: Problems with Prison in International Cartel Cases

Summary: Around the year 2000, the Antitrust Division announced a new policy that would substitute more frequent and more severe prison sentences for heavier corporate fines in criminal cartel cases. This article documents that the Division has indeed imprisoned more cartel managers and obtained longer sentences, but has failed to achieve other goals. The elimination of no-jail plea deals has not been realized; the number of imprisoned executives per firm has not risen appreciably; adoption of criminalization by other jurisdictions is glacial; almost half of those executive who go to trial are acquitted; extradition is rare and problematic; and the number of fugitives is growing. Identifying the optimal mix of corporate and individual sanctions for deterrence remains elusive.

Details: West Lafayette, IN: Purdue University, 2012. 45p.

Source: Internet Resource: Accessed December 17, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2166414

Year: 2012

Country: International

Keywords: Business Cartels

Shelf Number: 127233


Author: Feigelson, Michael

Title: Stopping it Before it Starts: Strategies to Address Violence in Young Children's Lives

Summary: This document advocates for systematic and reliable measures of the effect of violence on young children. It was produced by the Bernard van Leer Foundation as a contribution to the International Expert Consultation on the Prevention and Response to Violence in Early Childhood held in Lima, Peru, August 27-28 2012. It presents evidence that violence in young children's lives can be prevented through programmes such as home visitation, family strengthening, women's economic empowerment, alcohol regulation, and efforts to change social norms. It examines policy windows to achieve impact at scale on violence against children, asserting that leaders need to engage more effectively in areas of social policy such as social protection, employment, women's rights, and public security. The document suggests that more sophisticated communications strategies can drive sustained public political engagement and gain new champions for violence prevention.

Details: The Hague: Bernard van Leer Foundation, 2012. 23p.

Source: Internet Resource: Accessed December 17, 2012 at http://srsg.violenceagainstchildren.org/sites/default/files/events/Expert%20Consultation%20Lima/International%20Consultation%20VAc-%20Discussion%20Paper.pdf

Year: 2012

Country: International

Keywords: Criminal Justice Policy

Shelf Number: 127234


Author: Nellemann, Christian

Title: Protecting the Environment and Natural Resources in Conflict Areas

Summary: This report offers photographs and diagrams, interspersed with text, related to the problem of protecting the environment and natural resources in conflict areas.

Details: Nairobi, Kenya: United Nations Environment Programme, 2012. 33p.

Source: Internet Resource: Accessed December 17, 2012 at http://www.interpol.int/content/download/6397/51451/version/1/file/ChristianNellemann%5B1%5D.pdf2Fdownload%2F6397%2F51451%2Fversion%2F1%2Ffile%2FChristianNellemann%5B1%5D.pdf&ei=fJXPUMqbDILC0QHdooC4DA&usg=AFQjCNGm1Eiy2ToEhGdoN-0zoU3QU7X2Gg&bvm=bv.1355325884,d.dmQ&cad=rja

Year: 2012

Country: International

Keywords: Armed Conflict

Shelf Number: 127235


Author: Greiff, Shaina

Title: No Justice in Justifications: Violence against Women in the Name of Culture, Religion, and Tradition

Summary: This briefing presents a survey of culturally justified violence against women, including how violence against women is justified by 'culture', the different forms this violence can take, and recommendations for change. The SKSW Campaign is undertaking projects on 'culture', women and violence, with partners in Senegal, Afghanistan, Nigeria, Pakistan, Indonesia, Iran, and Sudan. This briefing paper will therefore give a general overview of discourses on culture, tradition, and/or religion that are used to justify, and therefore perpetuate, specic manifestations of VAW in these focal countries, as well as local methods to counter such arguments. While recognising that culture and religion can be empowering for, and central to, both individual and collective identities, this article will look at the misuse of these discourses for the purpose of sanctioning impunity for perpetrators and silencing dissenters. This discussion concludes with recommendations for activists, scholars, and policy makers.

Details: Violence is Not Our Culture, 2010. 45p.

Source: Internet Resource: Accessed December 17, 2012 at http://www.violenceisnotourculture.org/sites/default/files/No%20Justice%20in%20Justifications%20-Violence%20against%20Women%20in%20the%20Name%20of%20Culture%2C%20Religion%20and%20Tradition%20%28Greiff%29.pdf

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 127236


Author: Kar, Dev

Title: Illicit Financial Flows from China and the Role of Trade Misinvoicing

Summary: The Chinese economy hemorrhaged US$3.79 trillion in illicit financial outflows from 2000 through 2011, according to a new report [PDF] released today by Global Financial Integrity (GFI), a Washington, DC-based research and advocacy organization. Amidst increased domestic concern over inequality and corruption, GFI’s study raises serious questions about the stability of the Chinese economy merely two weeks before the once-in-a-decade leadership transition. The research, conducted by GFI Lead Economist Dev Kar and GFI Economist Sarah Freitas, found that the illegal outflows—the proceeds of crime, corruption, and tax evasion—were largely due to a trade-based money laundering technique known as ‘trade misinvoicing ,’ which accounted for US$3.2 trillion, or 86.2%, of the total outflow of illegal capital over the 11 years studied. The trade misinvoicing figures were provided exclusively to The Economist, and appear in the latest edition of the magazine which hits newsstands tomorrow.

Details: Washington, DC: Global Financial Integrity, 2012. 26p.

Source: Internet Resource: Accessed December 17, 2012 at http://www.gfintegrity.org/storage/gfip/documents/reports/ChinaOct2012/gfi-china-oct2012-report-web.pdf

Year: 2012

Country: International

Keywords: Corporate Crime

Shelf Number: 127237


Author: Cho, Seo-Young

Title: Modelling for Determinants of Human Trafficking

Summary: This study aims to identify robust push and pull factors of human trafficking. I test for the robustness of 70 push and 63 pull factors suggested in the literature. By employing an extreme bound analysis, running more than two million regressions with all possible combinations of variables for up to 153 countries during the period of 1995-2010, I show that crime prevalence robustly explains human trafficking prevalence both in destination and origin countries. My finding also implies that a low level of gender equality may have constraining effects on human trafficking outflows, contrary to expectations. The linkage between general migration and human trafficking is less clear but a certain type of globalization facilitating migration – exposure to foreign contacts and information – determines human trafficking. Institutional quality matters more in origin countries than destinations.

Details: Berlin: Economics of Security, 2012. 41p.

Source: Economics of Security Working Paper 70: Internet Resource: Accessed December 21, 2012 at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2117838

Year: 2012

Country: International

Keywords: Crime Analysis

Shelf Number: 127248


Author: Stevens, Tim

Title: Countering Online Radicalisation: A Strategy for Action

Summary: Political extremists and terrorists are using the internet as an instrument for radicalisation and recruitment. This report – resulting from the first systematic effort to bring together industry, experts and government on the issue of online radicalisation – examines what can be done by governments, industry and civil society to counter their activities. Most governments have focused on technical solutions, believing that removing or blocking radicalising material on the internet will solve the problem. Yet, this report shows that any strategy that relies on reducing the availability of content alone is bound to be crude, expensive and counterproductive. Radicalisation is largely a real-world phenomenon that cannot be dealt with simply by ‘pulling the plug’. The analogy with countering child sexual abuse on the internet is flawed, because much of the material involved in child sexual abuse is clearly illegal and there are no political constituencies which might be offended if repressive action is taken against it. Any strategy that hopes to counter online radicalisation must aim to create an environment in which the production and consumption of such materials become not just more difficult in a technical sense but unacceptable as well as less desirable. Elements of this strategy include: Deterring the producers of extremist materials; Empowering online communities to self-regulate; Reducing the appeal of extremist messages; and, Promoting positive messages. The report thus develops concrete proposals for action within each of the four strands: Deterring producers, The selective use of takedowns in conjunction with prosecutions would signal that individuals engaged in online extremism are not beyond the law; Empowering online communities, The creation of an Internet Users Panel in order to strengthen reporting mechanisms and complaints procedures would allow users to make their voices heard; Reducing the appeal, More attention must be paid to media literacy, and a comprehensive approach in this area is badly needed; Promoting positive messages, The establishment of an independent start-up fund would provide seed money for grassroots online projects aimed at countering extremism. Efforts to counter online radicalisation must view new technologies and modes of interaction not as a threat but as an opportunity. Relying on government alone is not sufficient. It is vital to capitalise upon the potential contributions of all stakeholders, including internet companies and internet users.

Details: London: The International Centre for the Study of Radicalisation and Political Violence (ICSR), 2009. 31p.

Source: Internet Resource: Accessed January 13, 2013 at http://icsr.info/wp-content/uploads/2012/10/1236768491ICSROnlineRadicalisationReport.pdf

Year: 2009

Country: International

Keywords: Counter-Terrorism

Shelf Number: 127274


Author: Humansecurity-cities.org.

Title: Human Security for an urban Century: Local Challenges, Global Perspectives

Summary: The objective of this project has been to examine in detail the nature and scale of organized armed violence in urban areas and to explore the value of bringing a human security lens to the challenges posed by cities at the beginning of an “Urban Century.†For the first time in history, the majority of people now live in cities. Rapid urbanization is already shaping trends in global peace and security. Armed violence is increasingly taking place in sprawling hillside slums, involving adolescent boys with automatic weapons, corrupt police officers determined to “clean up†city streets, or vigilante groups who take justice into their own hands. The violence feeds on the toxic mix of transnational criminal organizations and failed public security. This book is the product of a unique research partnership between the Human Security Research and Outreach Program of Foreign Affairs and International Trade Canada, and the Canadian Consortium on Human Security, a research network operated through the University of British Columbia’s Centre of International Relations. Over the past year, our two organizations have together explored the issues of human security in urban spaces. Through this partnership, we have sponsored expert dialogues and conferences, supported graduate student research awards, created a new website (www.humansecurity-cities.org), and presented our early findings to international experts at the United Nations World Urban Forum in Vancouver in June 2006. These research and outreach efforts were critical to the identification of a new community of expertise relevant to the human security and cities agenda. This book provides an overview of what we have learned from these expert consultations. It provides a collection of contributions from 40 leading academics, civil society experts, government officials, and graduate students woven together with a general narrative that tells a compelling story about the human security challenges and opportunities we will face. Among its main conclusions is that building secure cities — cities with effective public security; inclusive, participatory governance; and positive social capital — will be critical to the prevention of armed violence and the protection of civilian populations from such violence when prevention fails. This research suggests that achieving “cities without slums†— the 11th target of the seventh UN Millennium Development Goal — will require a clear recognition of the linkages between security and development. It also suggests that much more work is required by researchers and policy makers in order to fully understand the profound implications rapid urbanization holds for for the human security agenda.

Details: Ottawa: humansecurity-cities.org, 2007. 112p.

Source: Internet Resource: Accessed January 17, 2013 at: http://www.eukn.org/E_library/Security_Crime_Prevention/Security_Crime_Prevention/Human_security_for_an_urban_century_local_challenges_global_perspectives

Year: 2007

Country: International

Keywords: Armed Violence

Shelf Number: 127337


Author: Thaler, Kai

Title: The Utility of Mixed Methods in the Study of Violence

Summary: The study of violence has expanded in recent decades, concurrent with a rise in the use of mixed quantitative and qualitative methods in research throughout the social and health sciences. Methodologists have also begun to engage in a thorough theorization of both the epistemological foundations and empirical practice of mixed methods research. Mixed methods enable us to tie the broader patterns revealed by quantitative analysis to underlying processes and causal mechanisms that qualitative research is better able to illuminate, examining and explicating the interactions of structure and agency. This paper examines how qualitative and quantitative research methods may best be integrated in the study of violence, providing and critiquing examples from previous work on different forms of violence. Through the use of mixed methods, we can both improve the accordance of theories and empirical studies with social reality and gain a more nuanced understanding of the causes and consequences of violence.

Details: Brighton, UK: MICROCON: A Micro Level Analysis of Violent Conflict, Institute of Development Studies at the University of Sussex,, 2012. 33p.

Source: Internet Resource: MICROCON Research Working Paper 61: Accessed January 22, 2013 at: http://www.microconflict.eu/publications/RWP61_KT_FINAL.pdf

Year: 2012

Country: International

Keywords: Mixed Methodology

Shelf Number: 127348


Author: Graham, Lesley

Title: Alcohol Problems in the Criminal Justice System: An Opportunity for Intervention

Summary: Alcohol is linked with crime, especially violent crime. Many people are incarcerated because of alcohol-related crime. Alcohol is not permitted in prisons except in a very few cases, and illicit use of alcohol in prison is not a major problem. Nevertheless, imprisonment gives an opportunity to tackle alcohol problems in prisoners, with the potential for positive effects on their families and friends and a reduction in the risk of re-offending, the costs to society and health inequalities. This publication describes an integrated model of care for alcohol problems in prisoners, with elements for best practice. The model starts with assessment of the seriousness of prisoners’ alcohol problems, using a validated screening tool, the WHO Alcohol Use Disorders Identification Test (AUDIT), and calls for interventions tailored to prisoners’ specific needs.

Details: Copenhagen: World Health Organization for Europe, 2012. 28p.

Source: Internet Resource: http://www.euro.who.int/__data/assets/pdf_file/0006/181068/e96751-ver-2.pdf

Year: 2012

Country: International

Keywords: Alcohol Abuse

Shelf Number: 127361


Author: Mazerolle, Lorraine

Title: Legitimacy in Policing: A Systematic Review

Summary: Police require voluntary cooperation from the general public to be effective in controlling crime and maintaining order. Research shows that citizens are more likely to comply and cooperate with police and obey the law when they view the police as legitimate. The most common pathway that the police use to increase citizen perceptions of legitimacy is through the use of procedural justice. Procedural justice, as described in the literature, comprises four essential components. These components are citizen participation in the proceedings prior to an authority reaching a decision (or voice), perceived neutrality of the authority in making the decision, whether or not the authority showed dignity and respect toward citizens throughout the interaction, and whether or not the authority conveyed trustworthy motives. Police departments throughout the world are implicitly and explicitly weaving the dialogue of these four principles of procedural justice (treating people with dignity and respect, giving citizens “voice†during encounters, being neutral in decision making, and conveying trustworthy motives) into their operational policing programs and interventions. OBJECTIVES This review synthesizes published and unpublished empirical evidence on the impact of interventions led by the public police to enhance citizen perceptions of police legitimacy. Our objective is to provide a systematic review of the direct and indirect benefits of policing approaches that foster legitimacy in policing that either report an explicit statement that the intervention sought to increase legitimacy or report that there was an application of at least one of the principles of procedural justice: participation, neutrality, dignity/respect, and trustworthy motives.

Details: Oslo: Campbell Collaboration, 2013. 147p.

Source: Internet Resource: Campbell Systematic Reviews
2013:1; Accessed January 23, 2013 at: http://www.campbellcollaboration.org/library.php

Year: 2013

Country: International

Keywords: Police Behavior

Shelf Number: 127363


Author: Karp, Aaron

Title: Estimating Law Enforcement Firearms

Summary: Law enforcement small arms present a contradiction of visibility and scarcity. Of the roughly 875 million firearms in the world, in virtually all large countries law enforcement weapons are the most visible in public. They are also the smallest major category of small arms, covering some 25 million firearms, compared to approximately 200 million military and 650 million civilian guns worldwide (Small Arms Survey, 2007). The agencies covered in this analysis include law enforcement agencies responsible for domestic security, i.e. police, gendarmes, official paramilitaries, and smaller agencies such as customs, game management, and prisons. What is easily observed individually can be opaque collectively. Few law enforcement agencies have a tradition of transparency, and official data on personnel and weapons inventories is rarely available to the public. When data is scarce, estimation is the basic approach to establishing law enforcement small arms totals. Estimation—based on the extrapolation of weapons-per-officer ratios from known cases and total numbers of officers—reveals that law enforcement firearms are distributed unevenly. Countries with the largest police forces typically appear to have one to two firearms per sworn officer. In other countries the ratio can drop to much less, e.g. 0.3 for England and Wales and 0.6 for the Central African Republic.

Details: Geneva, SWIT: Small Arms Survey, 2012. 4p.

Source: Internet Resource: Accessed January 23, 2013 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-24.pdf

Year: 2012

Country: International

Keywords: Guns

Shelf Number: 127368


Author: World Health Organization

Title: Violence Prevention: The Evidence

Summary: As noted in the World report on violence and health, violence has always been part of the human experience. Today, violence results in more than 1.5 million people being killed each year, and many more suffer non-fatal injuries and chronic, noninjury health consequences as a result of suicide attempts, interpersonal violence (youth violence, intimate partner violence, child maltreatment, elder abuse and sexual violence) and collective violence (war and other forms of armed conflict). Overall, violence is among the leading causes of death worldwide for people aged 15–44 years. “Despite the fact that violence has always been present, the world does not have to accept it as an inevitable part of the human condition. As long as there has been violence, there have also been systems – religious, philosophical, legal and communal – that have grown up to prevent or limit it. None has been completely successful, but all have made their contribution to this defining mark of civilization. Since the early 1980s, the field of public health has been a growing asset in this response. A wide range of public health practitioners, researchers and systems have set themselves the tasks of understanding the roots of violence and preventing its occurrenceâ€. Their experience and the scientific studies they have conducted clearly demonstrate that violence can be prevented and its impact reduced, in the same way that public health efforts have prevented and reduced pregnancy-related complications, workplace injuries, infectious diseases and illness resulting from contaminated food and water in many parts of the world. The factors that contribute to violent responses – whether they are factors of attitude and behaviour or related to larger social, economic, political and cultural conditions – can be changed. Violence can be prevented. This is not an article of faith, but a statement based on evidence. Violence prevention: the evidence is a set of seven briefings based on rigorous reviews of the literature which examines scientific evidence for the effectiveness of interventions to prevent interpersonal and selfdirected violence. Each briefing focuses on a broad strategy for preventing violence, and under that umbrella reviews the evidence for the effectiveness of specific interventions. The violence prevention strategies covered in the seven briefings are: 1. Developing safe, stable and nurturing relationships between children and their parents and caregivers; 2. Developing life skills in children and adolescents; 3. Reducing the availability and harmful use of alcohol; 4. Reducing access to guns, knives and pesticides; 5. Promoting gender equality to prevent violence against women; 6. Changing cultural and social norms that support violence; 7. Victim identification, care and support programmes. This document summarizes the headline findings from each of the seven briefings and spotlights the specific interventions within each strategy that have the strongest evidence for preventing violence.

Details: Geneva, SWIT: World Health Organization, 2010. 134p.

Source: Internet Resource: Accessed January 24, 2013 at: http://www.who.int/violence_injury_prevention/violence/4th_milestones_meeting/evidence_briefings_all.pdf

Year: 2010

Country: International

Keywords: Aggression

Shelf Number: 127374


Author: Nowak, Matthias

Title: Urban Armed Violence

Summary: Currently the majority of the world’s population lives in urban settlements. Cities are important sites of opportunities and contribute to economic growth and development, yet they also face many challenges; e.g. increasing numbers of urban residents live in poverty, lack basic services, and suffer high levels of armed violence and insecurity. With the growth of the urban population, urban armed violence is increasingly recognized as a major issue confronting efforts to safeguard urban human security and safety. But urban settlements also provide space for innovation and creativity in dealing with human security needs. A starting point for addressing the delicate balance between urban security needs and the opportunities that cities offer is to understand the scope and intensity of and trends in urban armed violence in order to inform context-specific and evidence-based policies and interventions. This Research Note addresses the state of research into and some of the main debates around urban armed violence. It draws on relevant literature and research and in particular on work done by the Small Arms Survey and the Geneva Declaration Secretariat in this area. Firstly, it briefly introduces data and research findings on sub-national and city-level armed violence, with a particular focus on lethal violence. The second section examines the use of firearms in urban violence. The following section summarizes some of the main debates and questions around researching, preventing, and reducing urban armed violence. The Research Note concludes with some recommendations for policy and further research.

Details: Geneva, SWIT: Small Arms Survey, 2012. 4p.

Source: Internet Resource: Small Arms Survey Research Notes, Number 23: Accessed January 24, 2013 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-23.pdf

Year: 2012

Country: International

Keywords: Armed Violence

Shelf Number: 127376


Author: Bhalla, Kavi

Title: Tracking National Homicide Rates: Generating Estimates Using Vital Registration Data

Summary: Violent deaths make up a substantial proportion of global mortality and morbidity. While reliable data is not available from much of the world, estimates from international studies suggest that between 526,000 and 600,000 violent deaths are committed annually, accounting for around one per cent of global deaths. Among young adult males, deaths from intentional interpersonal violence (hereafter referred to as ‘homicides’) account for over ten per cent of all deaths globally. In addition to deaths, interpersonal violence leads to substantial disability resulting from nonfatal injuries. Together, these deaths and injuries account for 1.3 per cent of the total global burden of disease and injury. This Issue Brief analyses the regional availability and quality of death registration data for estimating the national incidence of homicides. Key findings include: While death registration data is available for most high-income countries, its availability is erratic in other regions. Data is available for many countries from the Caribbean, Latin America, Eastern Europe, and Central Europe. However, little or no death registration data is available from countries in Africa, South Asia, and South-east Asia; Death registration-based homicide estimates provide useful insight into the global distribution of violence: Homicide rates are substantially higher in Eastern Europe, the Caribbean and the four Latin American regions, as compared with other regions of the world; Homicide rates are relatively low in high-income countries, the notable exception being the United States; Homicide rates are relatively stable in many regions and declining in Central and Eastern Europe; Homicide rates are lowest among the youngest and oldest age groups in most countries. However, homicide rates peak among young adults (15–29 years) in some regions and among older adults (45–59 years) in others; Firearms and sharp objects are the two most common mechanisms of homicide. Firearms are the most common mechanism of homicides in the most violent countries (those with the highest total homicide rates). The following section describes how death registration data is collected and presents a method with which to test certain aspects of its quality. The results of applying such quality tests to global death registration data are outlined. Finally, this Issue Brief discusses the implications of these findings for future research on improving estimates of national and regional homicide rates using data from the health sector.

Details: Geneva, SWIT: Small Arms Survey, 2012. 12p., app.

Source: Internet Resource: Issue Brief, No. 1: Accessed January 24, 2013 at: http://www.smallarmssurvey.org/fileadmin/docs/G-Issue-briefs/SAS-AVD-IB1-tracking-homicide.pdf

Year: 2012

Country: International

Keywords: Crime Statistics

Shelf Number: 127377


Author: Milliken, T.

Title: The Elephant Trade Information System (ETIS) and the Illicit Trade in Ivory: A report to the 16th meeting of the Conference of the Parties to CITES

Summary: Resolution Conf. 10.10 (Rev. CoP15) mandates “a comprehensive report to each meeting of the Conference of the Parties†on the data held in the Elephant Trade Information System (ETIS), one of the two monitoring systems for elephants under CITES. The objectives of ETIS, which has been managed and operated by TRAFFIC since 1997, are: i) measuring and recording levels and trends, and changes in levels and trends, of illegal hunting and trade in ivory in elephant range States, and in trade entrepôts; ii) assessing whether and to what extent observed trends are related to changes in the listing of elephant populations in the CITES appendices and/or the resumption of legal international trade in ivory; iii) establishing an information base to support the making of decisions on appropriate management, protection and enforcement needs; and iv) building capacity in range States. Covering the period 1996 through 2011, this report is the fifth major assessment of the ETIS data for presentation to the CITES Parties, and constitutes TRAFFIC’s reporting obligations for CoP16. This analysis was done in collaboration with the United Kingdom’s University of Reading, where Mr. Robert Burn and Dr. Fiona Underwood refined the analytical methods under a Darwin Initiative project and carried out the data analysis for this report. The interpretation of results, conclusions and recommendations draws particularly on research by and experience of TRAFFIC. Prior to submission to the CITES Secretariat, it was reviewed by members of the ETIS Technical Advisory Group. Further, technical papers on the methods and results of this analysis are being submitted to peer-review journals for publication in the scientific literature. TRAFFIC would like to acknowledge with gratitude the funding support from the United Kingdom’s Department of Environment, Food and Rural Affairs (Defra) Darwin Initiative programme, the U.S. Fish and Wildlife Service’s African Elephant Conservation Fund, the European Union’s MIKE phase two grant to the CITES Secretariat, and WWF for providing support for the operation and management of ETIS since CoP15, including the production of this report.

Details: London: TRAFFIC International, 2012. 30p.

Source: Internet Resource: CoP 16 Doc.xx.x: Accessed January 24, 2013 at: http://cites.org/eng/cop/16/doc/E-CoP16-53-02-02.pdf

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 127385


Author: Dalberg

Title: Fighting Illicit Wildlife Trafficking: A Consultation with Governments

Summary: This report summarizes the views of a number of governments and international organizations on illicit wildlife traffi cking. These views were collected through a series of structured interviews, and this report is the fi rst to provide a snapshot of current governmental and intergovernmental opinions on this topic. The current global approach to fi ghting illicit wildlife trafficking is failing, contributing to the instability of society and threatening the existence of some illegally traded species. The governments and international organizations consulted on this issue agree that the current approach is not suffi cient. However, opinions on the responsibility of different actors vary: countries that are primarily associated with demand are concerned with enforcement on the supply side, while countries that are primarily associated with supply are concerned with education and enforcement on the demand side. International organizations and government representatives point out that while there are individuals within governments and international organizations who are passionate about halting illicit wildlife trafficking, it is not a priority for governments. There is general agreement among governments and international organizations that the commitments made and the actions taken are uncoordinated and fail to address the issue effectively. There is broad recognition that the absence of an effective response threatens iconic species such as the rhinoceros, the tiger and the elephant and has far-reaching implications for society as a whole. Governments are in agreement that: • Illicit wildlife traffi cking compromises the security of countries. Much of the trade in illegal wildlife products is run by criminal groups with broad international reach, and the profi ts can be used to fi nance civil confl icts and terrorist-related activities. Illicit wildlife traffi cking is also linked to other forms of illegal traffi cking and money-laundering. • Illicit wildlife traffi cking hinders sustainable social and economic development. The corruption that is associated with illicit wildlife traffi cking, and the security threat posed by the often violent nature of illegal wildlife product sourcing, deter investment and hinder growth in source, transit and demand countries. They reduce the effectiveness of governments, deter civil engagement, erode the rule of law, harm the reputation of and trust in the state, and affect the growth of local communities. • Illicit wildlife traffi cking destroys natural wealth. Wildlife is considered an important asset by many communities – often the poorest – in the developing world. The illegal exploitation of wildlife is capable of heavily depleting species and, in some cases, of bringing a species close to extinction. • Illicit wildlife traffi cking poses risks to global health. Illicit wildlife traffi cking can represent a disease transmission mechanism that threatens the health of humans, livestock and ecosystems, and such trade prevents more effective, regulated and legitimate treatments for disease being sought. The representatives of governments and international organizations interviewed for this study pointed out that, to be successful, the approach to fi ghting illicit wildlife traffi cking needs to get to the core of the issue, changing the behaviour of those people who demand, supply and otherwise profi t from illicit wildlife traffi cking. The momentum is building, with commitments made at Rio+20, recent CITES meetings and other global platforms. The next step is for governments and the international community to deliver on their commitments and be held to account for their action or, crucially, their lack of action.

Details: Gland, SWIT: World Wildlife Fund, 2012. 36p.

Source: Internet Resource: Accessed January 24, 2013 at: http://awsassets.panda.org/downloads/wwffightingillicitwildlifetrafficking_lr_1.pdf

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 127394


Author: Dyson, Sue

Title: Building Cultures of Respect and Non-Violence: A Review of Literature Concerning Adult Learning and Violence Prevention Programs with Men

Summary: This report provides a review of effective practice in violence prevention education among men, drawing on literature on both adult education and violence prevention. It focuses in particular on efforts among male athletes in professional sporting and other settings, as well as those using ‘peer mentor’ approaches.

Details: Carlton, South VIC, Australia: VicHealth, 2009. 48p.

Source: Internet Resource: Accessed January 25, 2013 at: http://www.vichealth.vic.gov.au/Publications/Freedom-from-violence/Building-Cultures-of-Respect-and-Non-Violence.aspx

Year: 2009

Country: International

Keywords: Aggression

Shelf Number: 127402


Author: van Ours, Jan C.

Title: The Engine Immobilizer: A Non-Starter for Car Thieves

Summary: We provide evidence for a beneficial welfare impact of a crime policy that is targeted at strenghtening victim precaution. Regulation made application of the electronic engine immobilizer, a simple and low-cost anti-theft device, mandatory for all new cars sold within the European Union as of 1998. We exploit the regulation as source of exogenous variation in use of the device by year of manufacture of cars. Based on detailed data at the level of car models, we find that uniform application of the security device reduced the probability of car theft by an estimated 50 percent on average in the Netherlands during 1995-2008, accounting for both the protective effect on cars with the device and the displacement effect on cars without the device. The costs per prevented theft equal some 1,500 Euro; a fraction of the social benefits of a prevented car theft.

Details: Tilburg, The Netherlands: Tilburg University, Tilburg Law and Economics Center, 2013. 27p.

Source: Internet Resource: CentER Discussion Paper Series No. 2013-004
TILEC Discussion Paper No. 2013-001: Accessed January 29, 2013 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2202165


Year: 2013

Country: International

Keywords: Automobile Theft

Shelf Number: 127418


Author: Institute for Economics and Peace

Title: 2012 Global Terrorism Index: Capturing the Impact of Terrorism from 2002 - 2011

Summary: The Global Terrorism Index (GTI) is a comprehensive body of work which systematically ranks the nations of the world according to their terrorist activity. The index combines a number of factors associated with terrorist attacks to build a thorough picture of the impact of terrorism over a 10-year period, illustrating trends, and providing a useful data series for further analysis by researchers and policymakers. Produced by the Institute for Economics and Peace (IEP), the GTI is based on data from the Global Terrorism Database (GTD) which is collected and collated by the National Consortium for the Study of Terrorism and Responses to Terrorism (START). The GTD is considered to be the most comprehensive dataset on terrorist activity and has codified over 104,000 cases of terrorism. This report summarizes changing trends in terrorism over time, as well as analyzing its different dimensions in terms of geographic activity, methods of attack, organizations involved, and its national context in terms of economic development and governance. The index has also been compared to other socioeconomic indicators to determine what factors are commonly associated with terrorism.

Details: Sydney; New York: Institute for Economics and Peace, 2012. 56p.

Source: Internet Resource: Accessed January 29, 2013 at: http://reliefweb.int/sites/reliefweb.int/files/resources/2012-Global-Terrorism-Index-Report.pdf

Year: 2012

Country: International

Keywords: Terrorism (International)

Shelf Number: 127417


Author: Fletcher, Del Roy

Title: Offender Peer Interventions: What Do We Know?

Summary: The deployment of offenders in peer mentoring roles is increasingly viewed by the UK Government as a key means of ensuring continuity of support for those released from prison, making mainstream services go further; and providing employment opportunities for those displaying an aptitude for such roles. The Justice Secretary in a November 20th 2012 speech has put mentoring at the centre of his emerging plans to improve rehabilitation. The joint Department for Work & Pensions and Ministry of Justice (2010) offender employment review has also recommended that prisoners should provide peer support to assist prison-based Employment and Benefit Advisers. Similarly, the Department for Business Innovation and Skills (2011) has suggested investing in offenders that display an aptitude for mentoring roles to improve the prison learning and skills system. 1.2. Aims and objectives of the research Very little is currently known about the practice of using offenders as peer mentors. The present study seeks to begin to address this gap in our knowledge and has four key objectives: • to develop the evidence-base regarding the practice of using offenders in peer mentoring roles • to establish what works (and what does not) • to identify the individual and wider benefits and how these can be maximised in future provision • to develop principles of 'best practice'. 1.3. Research design CRESR has taken a qualitative approach to conducting the research. Qualitative methods are best suited to providing an in-depth understanding of the views, experiences and behaviours of key stakeholders as required by this study. The research comprised three key components: • a literature review to identify and synthesise international evidence • an in-depth case study of the practicalities of using offenders in peer support roles • an expert consultation with individuals drawn from the UK policy and practitioner community. Literature review The study began with a literature review which focussed on U.K. and U.S. material published in English from the 1980s onwards. The search strategy comprised four main methods: • review of academic databases • search of criminal justice agency websites • contact with an international network of experts • 'snowballing' from generic mentoring reviews. Key messages -- • the use of offenders in peer support roles is increasingly recommended by the UK Government as a key means of ensuring continuity of support for those released from prison; making mainstream services go further; and providing employment opportunities for those displaying an aptitude for such roles • yet the evidence-base for this type of approach is meagre. Very little research has investigated the use of offenders in peer support roles and many of the relevant studies have been carried out by individuals keen to extol its virtues • peer support is congruent with the dominant policy discourse which views crime and unemployment as manifestations of personal failure and poor social behaviour. Consequently, the deployment of peers underlines the importance of messages about personal responsibility and self-improvement • the case for the approach rests on four key propositions. First, peers can be effective 'identity models' for offenders- people they can identify with and are living proof that turning away from crime is possible. Second, peer support is necessary because offenders view professional staff as authority figures and are more likely to listen to individuals that have 'walked in their shoes'. Third, it is cost-effective. Finally, the approach can build social capital and resilience within deprived communities • previous research suggests that in the right circumstances peers may be better at engaging offenders; can act as 'identity models'; may be more effective at sharing information and knowledge; and can support managerial and front-line staff struggling with growing workloads • however, it also indicates that the pool of individuals possessing the requisite experience, aptitude and skills may be small; high rates of peer turnover may compromise service delivery; the ambiguity of the role means that mentors are placed in a 'grey area' where they are neither service users nor professionals; and peer programmes require considerable maintenance and support • the case study has exemplified some of the difficulties of integrating a non-traditional workforce. Peers have often lacked confidence and the necessary work-related 'soft' skills; some have found the transition to peer worker difficult and engaged in inappropriate behaviour. Moreover, the deployment of offenders can also reduce organisational flexibility because of the large amount of management support that is required.

Details: Sheffield, UK: Sheffield Hallam University, Centre for Regional Economic and Social Research, 2012. 26p.

Source: Internet Resource: Accessed January 29, 2013 at: http://www.shu.ac.uk/_assets/pdf/cresr-using-offender-KEP-report.pdf

Year: 2012

Country: International

Keywords: Delinquency Prevention

Shelf Number: 127419


Author: Kensy, Julia

Title: Drug Policy and Women: Addressing the Negative Consequences of Harmful Drug Control

Summary: A number of reports have documented the negative consequences of current prohibitionist drug control policies on health, human rights and development, and these are the subject of growing international attention. The past thirty years has also seen a growing number of studies on women’s participation in all levels of the drug trade. However, limited research currently exists on the particular impact of drug control on women. This briefing paper focuses on this gap. This briefing aims to highlight the effects of drug policy on women as producers, suppliers and consumers of drugs in order to inform and guide policy makers on practices that should be avoided, as well as highlight those policies which effectively incorporate and address women’s needs. This briefing also features ‘snapshots’ from women and service providers working with women that are affected by drug policies. These snapshots explore the complex consequences that drug policies have on both individuals and services. Such snapshots also highlight examples of interventions that seek to address the negative consequences of drug control and provide positive support to women.

Details: London: International Drug Policy Consortium, 2012. 21p.

Source: Internet Resource: IDPC Briefing Paper: Accessed January 30, 2013 at: http://www.grea.ch/sites/default/files/drug-policy-and-women-addressing-the-consequences-of-control.pdf

Year: 2012

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 127443


Author: Muzila, Lindy

Title: On the Take: Criminalizing Illicit Enrichment to Fight Corruption

Summary: Developing countries lose an estimated US$20–40 billion each year through bribery, misappropriation of funds, and other corrupt practices. Often, the most visible manifestation of corruption is the enrichment of a corrupt public official. Despite such visibility, prosecuting corruption can be very problematic, particularly when it requires proving the offer or acceptance of a bribe. Even when the corruption is established in a court of law, linking the proceeds of the crime to the offense in order to recover assets is a complex endeavor. In response, some countries looking to strengthen their overall arsenal against corruption have criminalized illicit enrichment. In its Article 20, the United Nations Convention against Corruption (UNCAC) recommends, but does not mandate, States Parties to adopt illicit enrichment as a criminal offense, defining the same as an intentional and “significant increase in the assets of a public official that he or she cannot reasonably explain in relation to his or her lawful income.†The illicit enrichment offense has spurred significant debates involving due processes of law. Others question how jurisdictions are actually using the offense. Finally, many jurisdictions that serve as financial centers do not recognize illicit enrichment as an offense, so tracing and recovering assets through mutual legal assistance is further complicated in illicit enrichment prosecutions. Against this background, this study provides policy makers, prosecutors, and other practitioners with a better understanding of the features of illicit enrichment. It draws on the preparatory work of international conventions, reviews of existing domestic provisions, and the jurisprudence on illicit enrichment. It is the StAR Initiative’s hope that the study will inform the work of decision makers considering adopting an illicit enrichment offense, and assist those implementing illicit enrichment to do so in a way that contributes to effective prosecution, confiscation, and asset recovery.

Details:

Source: Internet Resource: Accessed February 4, 2013 at: http://star.worldbank.org/star/sites/star/files/on_the_take-_criminalizing_illicit_enrichment_to_fight_corruption.pdf

Year: 2012

Country: International

Keywords: Asset Recovery

Shelf Number: 127477


Author: Bewley-Taylor, Dave

Title: The Limits of Latitude. The UN Drug Control Conventions

Summary: Faced with a complex range of drug related problems, a growing number of nations are exploring the development of nationally appropriate policies that shift away from the prohibition-oriented approach that has long dominated the field but is losing more and more legitimacy. In so doing, such countries must pay close attention to the UN based global drug control framework of which practically all nations are a part. This briefing paper outlines the international legal drug control obligations, the room for manoeuvre the regime leaves open to national policy makers and the clear limits of latitude that cannot be crossed without violating the treaties. It also covers the vast grey area lying between the latitude and limitations, including the legal ambiguities that are subject to judicial interpretation and political contestation. The paper applies the traffic light analogy to drug law reform in order to divide ongoing policy changes and emerging proposals into three categories regarding their legal tenability.

Details: Amsterdam: Transnational Institute, 2012. 24p.

Source: Internet Resource: Series on Legislative Reform of Drug Policies Nr. 18: Accessed February 5, 2013 at: http://www.tni.org/sites/www.tni.org/files/download/dlr18.pdf

Year: 2012

Country: International

Keywords: Drug Control Policy

Shelf Number: 127514


Author: Kar, Dev

Title: Illicit Financial Flows from Developing Countries: 2001-2010

Summary: The developing world lost US$859 billion in illicit outflows in 2010, an increase of 11% over 2009. The capital outflows stem from crime, corruption, tax evasion, and other illicit activity. The report finds that illicit financial flows. From 2001 to 2010, developing countries lost US$5.86 trillion to illicit outflows. Conservatively estimated, illicit financial flows have increased in every region of developing countries. Real growth of illicit flows by regions over study period is as follows: •Africa 23.8 percent, •Middle East and North Africa (MENA) 26.3 percent, •developing Europe 3.6 percent, •Asia 7.8 percent, and •Western Hemisphere 2.7 percent. Top 10 countries with the highest measured cumulative illicit financial outflows between 2001 and 2010 were: 1.China: US$2.74 trillion 2.Mexico: US$476 billion 3.Malaysia: US$285 billon 4.Saudi Arabia: US$210 billion 5.Russia: US$152 billion 6.Philippines: US$138 billion 7.Nigeria: US$129 billion 8.India: US$123 billion 9.Indonesia: US$109 billion 10.United Arab Emirates: US$107 billion.

Details: Washington, DC: Global Financial Integrity, 2012.

Source: Internet Resource: accessed February 7, 2013 at: http://iff.gfintegrity.org/iff2012/2012report.html

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 127521


Author: Qian, Yi

Title: Untangling Searchable and Experiential Quality Responses to Counterfeits

Summary: In this paper, we untangle the searchable and experiential dimensions of quality responses to entry by counterfeiters in emerging markets with weak intellectual property rights. Our theoretical framework analyzes the market equilibria under competition with non-deceptive counterfeiting and deceptive counterfeiting, respectively, as well as under monopoly branding. A key theoretical prediction is that emerging markets can be self-corrective with respect to counterfeiting issues in the following sense: First, counterfeiters could earn positive profits by pooling with authentic brands only when consumers have good faith in the market (believe in a low probability that any product is a counterfeit). When the proportion of counterfeits in the market exceeds a cutoff value, brands would invest in self-differentiation from the competitive fringe counterfeiters. Second, to attain a separating equilibrium with counterfeiters, branded incumbents upgrade the searchable quality (e.g. appearance) of their products more and improve the experiential quality (e.g. functionality) less, as compared to monopoly equilibrium. This prediction uncovers the nature of product differentiation in the searchable dimension and helps in analyzing the real-world innovation strategies employed by authentic firms in response to entries by counterfeit entities. In addition, the welfare analyses hint at a non-linear relationship between social welfare and intellectual property enforcement.

Details: Cambridge, MA: National Bureau of Economic Research, 2013. 32p.

Source: Internet Resource: NBER Working Paper Series; Working Paper 18784: Accessed February 11, 2013 at: http://www.nber.org/papers/w18784

Year: 2013

Country: International

Keywords: Counterfeiting

Shelf Number: 127560


Author: Broadhurst, Roderic

Title: Crime in Cyberspace: Offenders and the Role of Organized Crime Groups

Summary: This working paper summarizes what is currently known about cybercrime offenders and groups. The paper briefly outlines definition and scope of cybercrime, the theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups (OCG). The paper gives examples of known cases that illustrate individual and group behaviour, profiles typical offenders, including online child exploitation offenders, and describes methods and techniques commonly used to identify crimeware and help trace offenders.

Details: Canberra: Australian National University, 2013. 35p.

Source: Internet Resource: Working Paper: Accessed February 15, 2013 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2211842

Year: 2013

Country: International

Keywords: Cybercrime

Shelf Number: 127628


Author: Cohen, Dara Kay

Title: Wartime Sexual Violence: Misconceptions, Implications, and Ways Forward

Summary: Wartime rape is neither ubiquitous nor inevitable. The level of sexual violence differs significantly across countries, conflicts, and particularly armed groups. Some armed groups can and do prohibit sexual violence. Such variation suggests that policy interventions should also be focused on armed groups, and that commanders in effective control of their troops are legally liable for patterns of sexual violence they fail or refuse to prevent. Wartime rape is also not specific to certain types of conflicts or to geographic regions. It occurs in ethnic and non-ethnic wars, in Africa and elsewhere. State forces are more likely to be reported as perpetrators of sexual violence than rebels. States may also be more susceptible than rebels to naming and shaming campaigns around sexual violence. Perpetrators and victims may not be who we expect them to be. During many conflicts, those who perpetrate sexual violence are often not armed actors but civilians. Perpetrators also are not exclusively male, nor are victims exclusively female. Policymakers should not neglect nonstereotypical perpetrators and victims. Wartime rape need not be ordered to occur on a massive scale. Wartime rape is often not an intentional strategy of war: it is more frequently tolerated than ordered. Nonetheless, as noted, commanders in effective control of their troops are legally liable for sexual violence perpetrated by those troops. Much remains unknown about the patterns and causes of wartime sexual violence. In particular, existing data cannot determine conclusively whether wartime sexual violence on a global level is increasing, decreasing, or holding steady. Policymakers should instead focus on variation at lower levels of aggregation, and especially across armed groups.

Details: Washington, DC: United States Institute of Peace, 2013. 16p.

Source: Internet Resource: Accessed February 16, 2013 at: http://www.usip.org/files/resources/SR323.pdf

Year: 2013

Country: International

Keywords: Rape

Shelf Number: 127641


Author: Police Executive Research Forum

Title: Policing and the Economic Downturn: Striving for Efficiency Is the New Normal

Summary: This report provides details about PERF’s 2012 survey of law enforcement agencies, which found that 41 percent of responding departments were planning budget cuts for their next fiscal year. This was an improvement over a PERF survey two years earlier, which found that 61 percent of those same agencies were planning budget cuts. The report also includes a number of case studies of law enforcement agencies that have developed innovative strategies for dealing with significant budget cuts, including the departments in Corpus Christi, TX; Camden, NJ; Lane County, OR; and Manchester, England.

Details: Washington, DC: PERF, 2013. 48p.

Source: Internet Resource: Critical Issues in Policing Series: Accessed February 16, 2013 at: http://policeforum.org/library/critical-issues-in-policing-series/Economic_Downturn.pdf

Year: 2013

Country: International

Keywords: Costs of Crime (U.S.)

Shelf Number: 127645


Author: Environmental Justice Foundation

Title: Squandering the Seas: How Shrimp Trawling is Threatening Ecological Integrity and Food Security Around the World

Summary: Shrimp trawlers, particularly those in the tropics, can catch over 400 marine species in their nets. These non-target species or ‘bycatch’ are often discarded by shrimp fishermen – either they are inedible or are simply not worth retaining when shrimp is worth up to 30 times more per kilogram. Shrimp fisheries typically produce bycatch-to-shrimp ratios of 5:1 in temperate areas and 10:1 in the tropics. However, higher ratios have been found, such as 21:1 in the case of the Australian Northern Prawn Fishery. This essentially means 21 kg of marine organisms are caught in order to obtain 1 kg of shrimp. Currently, tens of millions of tonnes of bycatch are taken by shrimp trawl fisheries worldwide each year. Most shrimp trawlers discard this non-target catch. Shrimp fisheries alone are responsible for one third of the world’s discarded catch, despite producing less than 2% of global seafood. Shrimp often ends up on the tables of wealthy consumers in the developed world. It is a luxury item. For poor fishing communities, fish is a necessity. Globally, 450 million people rely on fisheries as a source of food and income. In Bangladesh, the fisheries sector provides 78% of animal protein intake for the average person. Equally high dependencies are found in other developing nations, yet it is countries such as these that face food security issues linked to overfishing. People in the developing world witness shrimp trawlers – sometimes foreign- owned – destroy their traditional fishing grounds and incidentally catch and squander local fish stocks. In some cases this fishing is illegal, in other cases it is the result of fisheries agreements, such as those between the EU and African nations. Yet those who suffer the environmental costs of shrimp trawling are unlikely to see the financial rewards of these agreements. Shrimp trawling frequently takes place in shallow coastal waters, which act as nursery grounds for many commercial fish species. Trawling removes vast numbers of juvenile fish that are needed to sustain fish stocks. In addition, by dragging large, heavy nets along the seabed, habitats that support marine life are damaged. One study found that the pass of a single trawl could remove up to 25% of seabed life. In heavily-trawled areas, habitats have little chance to recover and in some cases may be permanently altered. Shrimp trawling is thought to disrupt entire marine communities, altering biomass, size structure and diversity. Populations of vulnerable species are rapidly reduced. These species tend to be slow-growing and long-lived with low reproductive output and/or those dependent on structurally diverse seabed habitats. Some of these, such as turtles, are already endangered as a result of other human activities. Shrimp trawling presents one of the greatest threats to their continued survival. Indeed, it is estimated that 150,000 sea turtles are killed annually by shrimp trawlers. A creature that has lived on Earth for millions of years could be wiped out by consumer demand for a high value seafood. Damage caused by shrimp trawling is so significant that leading scientists have compared it to clear-cutting forests. However, unlike deforestation, the impacts of shrimp fisheries are only just beginning to receive international attention.

Details: London: Environmental Justice Foundations, 2003. 49p.

Source: Internet Resource: Accessed February 26, 2013 at: http://ejfoundation.org/sites/default/files/public/squandering_the_seas.pdf

Year: 2003

Country: International

Keywords: Offences Against the Environment

Shelf Number: 127724


Author: ActionAid

Title: Women and the City II: Combating Violence Against Women and Girls in Urban Public Spaces - The Role of Public Services

Summary: It is now well recognized that women and girls around the world face violence, sexual harassment and abuse in many of the spaces that they inhabit – their homes, workplaces, educational institutes, on streets and on public transport. Women’s fear of violence restricts their movement, limiting their use of public spaces, their movement from their homes and as a result, their full enjoyment of a range of human rights. ActionAid is working in different countries to make cities safe for women and girls through its Safe Cities Initiative.This initiative is founded on the concept of right to the city. The right to the city is the right of all city inhabitants, especially poor people, to have equitable access to all that a city has to offer and also to have the right to change their city in ways that they see fit. It entails: Freedom from violence and harassment, • including the fear of violence on the streets; Safe public spaces where women and girls • can move freely, without fear of assault; Access to water and sanitation, electricity, • transportation and other public amenities at residences and in public locations to reduce the risks of violence; Freedom from sexual harassment and abuse • in the workplace; Gender sensitive policing mechanisms for • reporting violence and obtaining redress, such as anti-violence centres/shelters; and Systems and structures for women and girls • to enjoy social, economic, cultural and political participation. This study, entitled Women and the city II: combating violence against women and girls in urban public spaces- the role of public services, was initiated to deepen our understanding about the links between violence against women and urban public services, to build evidence, to get communities as well as duty bearers to engage in the process and to strengthen our ability to work with women in these communities to seek change. Conducted in Brazil, Cambodia, Ethiopia, Kenya, Liberia and Nepal, this study comes at a time of significant global change. In 2008, the world reached a momentous milestone: for the first time in history, more than half of its human population – 3.3 billion people – lived in urban areas. By 2010, the global urban population outnumbered the rural population with 3.56 billion (51.5% of the global population) living in urban areas. This report is envisaged as a knowledge building and advocacy tool. Our expected audience includes local municipalities and community leaders, law enforcement, urban planners, non-governmental organisations, feminist movements, the safe cities movement in particular, policymakers and donors at the national and international levels. The report is divided into five sections, namely, an introduction that provides an overview of the right to the city and the global history of safe cities work; an outline of the methodology adopted for this study; country contexts for each of the six countries; key findings; and finally, recommendations.

Details: Johannesburg, South Africa: ActionAid, 2013. 76p.

Source: Internet Resource: Accessed March 1, 2013 at: http://www.actionaid.org/sites/files/actionaid/women_and_the_city_ii_1.pdf

Year: 2013

Country: International

Keywords: Fear of Crime

Shelf Number: 127741


Author: De Bock, Tine

Title: Exploring the Impact of Fear Appeals on the Prevention of Shoplifting

Summary: The present study investigates the effectiveness of fear appeals in preventing shoplifting among adolescents. We study the effects of type of punishment (social disapproval versus fines), probability of getting caught when shoplifting and severity of the punishment. Results show that social punishment messages should stress severe levels of social disapproval when the chance of getting caught is low. When social disapproval messages imply a high probability of apprehension, the severity of social rejection makes no difference for the shoplifting intentions. Finally, messages focusing on fines should depict large instead of small fines, irrespective of the communicated probability of getting caught.

Details: Ghent: University of Ghent, Faculty of Economics and Business Administration, 2010. 26p.

Source: Internet Resource: Working Paper: Accessed March 1, 2013 at: http://www.feb.ugent.be/nl/Ondz/wp/Papers/wp_10_668.pdf

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 127747


Author: Felbab-Brown, Vanda

Title: Focused Deterrence, Selective Targeting, DRug Trafficking and Organised Crime: Concepts and Practicalities

Summary: Organised crime and illicit economies generate multiple threats to states and societies. Yet, goals such as a complete suppression of organised crime may sometimes be unachievable, especially in the context of acute state weakness where underdeveloped and weak state insti­tutions are the norm. Focused-deterrence strategies, selective targeting, and sequential interdiction efforts are being increasingly embraced as more promising law enforcement alternatives. They seek to minimise the most pernicious behaviour of criminal groups, such as engaging in violence, or to maximise certain kinds of desirable behaviour sometimes exhibited by criminals, such as eschewing engagement with terrorist groups. The focused-deterrence, selective targeting strategies also enable overwhelmed law enforcement institutions to overcome certain under resourcing problems. Especially, in the United States, such approaches have produced impressive results in reducing violence and other harms generated by organised crime groups and youth gangs. Such approaches have, however, encountered implementation difficulties elsewhere in the world. This report first outlines the logic and problems of zero-tolerance and undifferentiated targeting in law enforcement policies. Second, it lays out the key theoretical concepts of law-enforcement strategies of focused-deterrence and selective targeting and reviews some of their applications, as in Operation Ceasefire in Boston in the 1990s and urban-policing operations in Rio de Janeiro during the 2000s decade. Third, the report analyses the implementation challenges selective targeting and focused-deterrence strategies have encountered, particularly outside of the United States. And finally, it discusses some key dilemmas in designing selective targeting and focused-deterrence strategies to fight crime.

Details: London: International Drug Policy Consortium, 2013. 20p.

Source: Internet Resource: Modernising Drug Law Enforcement
Report 2, Accessed March 5, 2013 at: http://dl.dropbox.com/u/64663568/library/MDLE-report-2_Focused-deterrence.pdf

Year: 2013

Country: International

Keywords: Drug Trafficking

Shelf Number: 127836


Author: Fink, Naureen Chowdhury

Title: Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations

Summary: Terrorism has always been a battle of ideas, reflecting a desire for violent and immediate political transformation. The technologies available in a globalized world today, however, have expanded the theater of conflict into a broader swath of spaces—governed, less governed, virtual—than ever. Groups such as al-Qaida understand that they can now wield influence as effectively with a video camera and an Internet connection as with an improvised explosive device. Such groups also invest heavily in their marketing capabilities. They have articulated a clear mission statement and excelled at this form of strategic communication, crafting messages based on audience perceptions and including actions as well as words. Al-Qaida’s call to arms, for example, is a globally resonant expression of its outlook, grievances, agenda, and demands and has a proven ability to turn passive observers into active participants in violent extremism. Yet, extremists do not constitute a monopoly in the marketplace of ideas. States and international organizations provide their own narratives that shape identities, relationships, and interactions among peoples and states, but they have often struggled to challenge extremist messages and draw on their own compelling stories. This should not be the case. The United Nations is the only international organization to boast universal membership and has spent more than six decades promoting sustainable development, promoting human rights and the rule of law, strengthening governance, and supporting representative government. Member states have worked together to mitigate violent conflict, support humanitarian assistance, and address threats to human security. The organization has a good story to tell, a powerful counternarrative to that proclaimed by extremist groups. Yet, does the story get out and reach key audiences outside and inside the United Nations? This report is the result of a study, undertaken as part of a broader effort on the part of the Center on Global Counterterrorism Cooperation to enhance multilateral capacities to prevent terrorism and violent extremism, that aims to examine how this message has been perceived and received by three key stakeholder communities around the United Nations: its own staff (at headquarters, in specialized agencies, and in the field); member states; and the broader public, collectively considered the “UN community.†Three main objectives underpin this project. 1. To identify the core message of the United Nations on countering terrorism and violent extremism and how this message shapes counterterrorism policy and practice 2. To examine whether and how this message informs and impacts three key audiences: (a) the UN system, including field missions and specialized agencies; (b) UN member states; and (c) the broader public 3. To explore how strategic communication can be used to enhance UN efforts to prevent terrorism and violent extremism and contribute to national and regional efforts to address terrorism and diminish radicalization and recruitment that bolster extremist groups This report presents a qualitative analysis of how strategic communication tools can amplify and enhance UN efforts to prevent terrorism and violent extremism, through the United Nations’ own initiatives as well as by supporting member states. The first two sections offer an overview of counterterrorism practice and the shift toward prevention, as well as the parallel shift at the United Nations, where the focus on preventive diplomacy, mediation, and conflict prevention has increased over the past decade. Section three examines the evaluation of strategic communication in practice and how it has been adopted by governments, civil society, and extremist groups. Sections four and five offer an analysis of UN counterterrorism communication and how it is perceived by internal and external audiences. Section six sets out some key lessons learned regarding the practice of strategic communication; although this study focuses on the United Nations, these principles may also be applicable to national and civil society actors. The last section offers a set of practical recommendations for consideration by UN actors, ranging from the macro to the micro level, in many instances considering how these ideas may be initiated within the existing counterterrorism architecture at the United Nations.

Details: Washington, DC: Center on Global Counterterrorism Cooperation (CGCC), 2013. 56p.

Source: Internet Resource: Accessed March 5, 2013 at: http://www.globalct.org/images/content/pdf/reports/Feb2013_CT_StratComm.pdf

Year: 2013

Country: International

Keywords: Counterrorism

Shelf Number: 127841


Author: Monaghan, Geoffrey

Title: Police Support for Harm Reduction Policies and Practices Towards People Who Inject Drugs

Summary: Over the last twenty five years or so an increasing number of police services from countries around the world have devised and implemented policies and practices that have specifically supported increasingly widespread harm reduction policies and practices aiming to prevent, halt and reverse HIV and hepatitis B and C (HBV and HCV) epidemics amongst PWIDs and their sexual partners. This briefing paper aims to shift the focus of the debate on policing and HIV-related outcomes and explore these more positive relationships and, where appropriate, the related benefits to be derived by police services engaging directly with people who inject drugs (PWIDs).

Details: London: International Drug Policy Consortium, 2013. 20p.

Source: Internet Resource: Modernising Drug Law Enforcement - Report 1: Accessed March 5, 2013 at: http://dl.dropbox.com/u/64663568/library/MDLE-report-1_Police-support-for-harm-reduction.pdf

Year: 2013

Country: International

Keywords: Drug Enforcement

Shelf Number: 127845


Author: Gallahue, Patrick

Title: Death Penalty for Drug Offences Global Overview 2012: Tipping the Scales for Abolition

Summary: The Death Penalty for Drug Offences: Global Overview 2012 – Tipping the Scales for Abolition is Harm Reduction International’s third annual overview on the status of the death penalty for drug offences worldwide. Tipping the Scales for Abolition documents the 33 countries and territories that retain death penalty for drug offences, including 13 in which the sentence is mandatory. In the past year many hundreds of people have been executed for drug offences in violation of international law in just a small minority of states that continue to operate at the fringes of international consensus. The trend towards abolition is, however, moving back in the right direction. This report details court cases and recent political debates that show an increasing discomfort with the death penalty for drugs, and in particular with mandatory death sentences.

Details: London: Harm Reduction International, 2012. 48p.

Source: Internet Resource: Accessed March 7, 2013, at http://www.ihra.net/files/2012/11/27/HRI_-_2012_Death_Penalty_Report_-_FINAL.pdf

Year: 2012

Country: International

Keywords: Capital Punishment

Shelf Number: 127855


Author: De Cat, Dennis

Title: Counterfeiting and Consumer Behaviour

Summary: Many reports state that the overall magnitude of counterfeiting is obviously on the rise. For instance, the Taxation and Customs Union from the European Commission (EC) reports that the number of counterfeit articles detained in EU member states only, has risen from 25 million in 1999 to 178 million in 2008 (European Commission, 2008). The most frequently cited number to ‘value’ counterfeiting is the one the OECD proposes in their analysis of international trade data. They suggest that, worldwide, up to USD 200 billion of internationally traded products could have been counterfeit in 2005. However, one must remain critical. As the OECD report suggests itself, “available information on counterfeiting and piracy falls far short of what is needed for robust analysis and for policymakingâ€. Chaudry and Zimmerman (2008) even state it is virtually impossible to determine the real size of the worldwide counterfeit product market as it concerns an illegal activity. Green and Smith (2002) blame the fact that there exists no exact standard or agreement about the factors that should be taken into account when calculating the monetary value of counterfeiting for this non-transparency. Nevertheless, they also suggest that product counterfeiting is significant and growing. This statement is confirmed by previous research on the reasons of counterfeit growth by Vagg and Harris (2000). Not only the magnitude of counterfeiting is increasing. The same goes for the scope of counterfeiting. Chaudry and Zimmerman (2008) state that the types of products being counterfeited are broadening. Not only CD’s, DVD’s, computer equipment, clothes and shoes are being counterfeited. Other product categories frequently being imitated are toys, pharmaceuticals, automobile component parts, electrical equipment, food and beverages, tobacco and personal care products. This is confirmed by the OECD (2008) which even finds a shift from luxury goods to common consumer goods. These results are also congruent with the findings of the Taxation and Customs Union from the EC. Gentry et al. (2006) even put it more extreme: “If one can attach some value to a consumer brand, one is likely to find counterfeit imitations of it, somewhere.†This view is supported by Lewis (2009) who ads the aspect of the illegal profit margin that has to be high enough before a product is attractive for being counterfeited. Despite the fact that other product categories are on the rise, the OECD (2008) and the EC (2008) report that fashion items (i.e. clothing, jewellery, accessories and footwear) still account for the largest part of counterfeit trade, e.g. the textile sector and jewellery together make up 66,2% of all interventions by European Customs. Gessler (2009) states that counterfeiting is the major obstacle the luxury fashion industry is facing today. These astonishing numbers explain why the author opted for investigating non-deceptive counterfeiting (i.e. people are fully aware of the fact they are buying a counterfeit at the time of purchase) and consumer behaviour in the luxury fashion industry. The consequences of counterfeiting are enormous at various levels. Gessler (2009) divides ‘the true costs of counterfeiting’, i.e. the consequences of the phenomenon, in six categories: the cost to brand owners, government burdens, the effects counterfeiting has on consumers, child and forced labour issues in the production of these counterfeits, organised crime and terrorist funding activities of counterfeiters and the moral cost of counterfeiting. Later on in this paper the author will make a distinction on the basis of personal and societal harm counterfeit trade causes. One thing is clear: counterfeiting may no longer be seen as a victimless crime as it has a damaging effect on businesses, national economies, consumers and on society as a whole (UNICRI, 2009; Santos and Ribeiro, 2006). In the anti-counterfeiting literature many authors propose different strategies to counter product and brand counterfeiting. These anti-counterfeiting tactics range from the use of RFID tags (Tuyls and Batina, 2006) to the development of new legal frameworks (Bush et al., 2001). However, Berman (2008) states also companies can contribute to the reduction of the counterfeiting problem through the development of consumer education programs that publicize the personal and societal dangers counterfeiting causes. A part of this education process is that ‘marketers need to develop advertising campaigns that focus on the significant safety, performance and financial risks associated with the purchase of counterfeit merchandise’. To the author’s best knowledge, no such research has been conducted before that classifies and investigates the potential consequences of counterfeiting in such an extensive way. Furthermore, by integrating the construct of ‘societal harm’, this research responds to the critical remark Gessler (2009) made: ‘Unfortunately, the societal impact of counterfeiting remains largely under researched and often neglected’. In this research we will assess the impact of consumers’ awareness of societal consequences on their attitudes toward purchasing CLFI. Altogether, the main interest of this research goes out to examining consumers’ attitude toward purchasing counterfeit luxury fashion items (CLFI) and their intention to purchase CLFI. More specifically, the author will be investigating if there exists a difference in attitude toward purchasing CLFI if one is being informed about the personal harm counterfeits cause rather than being informed about the societal consequences bound to counterfeit trade. In addition, several factors proven important in previous research (e.g. subjective norms, perceived behavioural control, etc.) will be reinvestigated in a Belgian context. The relationship between the price level, the quality level and perceived quality will be examined as well. Finally, the linkage between attitudes and intentions is assessed in a counterfeit-related context.

Details: Ghent, Belgium: Ghent University, 2010. 109p.

Source: Internet Resource: Thesis: Accessed March 7, 2013 at: http://lib.ugent.be/fulltxt/RUG01/001/459/733/RUG01-001459733_2011_0001_AC.pdf

Year: 2010

Country: International

Keywords: Consumer Behavior

Shelf Number: 127865


Author: Clemente, Dave

Title: Epub: Cyber Security and Global Interdependence: What Is Critical?

Summary: The evolution of interconnection between infrastructure sectors has been accelerated by the spread of cyberspace, which has become the 'nervous system' linking them. There is no avoiding the security implications emerging at the intersection of cyberspace and infrastructure. As countries become more dependent on infrastructure distributed around the world, the growing complexity of interconnections makes it harder for authorities to identify what infrastructure is 'critical'. Improving risk management relies on using rigorous definitions of what infrastructure is 'critical', which enables more effective prioritization and protection of nodes and connection points. In this context, the ever-rising importance of data makes distinctions between 'physical' and 'information' infrastructure increasingly irrelevant. Societal resilience can be just as important as infrastructure resilience, and policy-makers should consider closely what levels of societal dependency on digital technologies are appropriate. Building public confidence in the security and governance of the critical infrastructure ecosystem is essential to avoid policy-making driven by reactive or narrow interests. Meeting these security challenges requires better shared understanding of what is critical between those who protect an organization and those who set its strategic direction. Better understanding of the economic and political incentives that guide stakeholders also reveals the scope for potential cooperation.

Details: London: Chatham House, 2013. 46p.

Source: Internet Resource: Accessed march 7, 2013 at: http://www.chathamhouse.org/publications/papers/view/189679

Year: 2013

Country: International

Keywords: Cyber Security

Shelf Number: 127867


Author: Count the Costs

Title: The War on Drugs: Wasting billions and undermining economies

Summary: Whilst accurate figures are hard to come by, global spending on drug law enforcement certainly exceeds $100 billion each year. Given current economic conditions it is more important than ever that spending is effective and not a waste of taxpayer money. However, the huge investments in enforcement have consistently delivered the opposite of their stated goals—to reduce drug production, supply and use. Instead they have created a vast criminal market. This in turn has substantial social and economic costs, through crime and ill health, far exceeding even the billions in enforcement spending. There are huge opportunity costs to wasteful expenditure on this scale. As drug enforcement budgets continue to grow, other areas are being starved of funds, and cuts in government budgets are hitting public services and support for the needy. Despite the appalling track record of failure, the level of value-for-money scrutiny applied to drug enforcement spending has been almost zero, at both national and international levels. At a time of global economic crisis, after literally trillions wasted over the last half-century, it is time to meaningfully count the real economic costs of the war on drugs.

Details: London: Transform Drug Policy Foundation, 2012. 16p.

Source: Internet Resource: Accessed march 8, 2013 at: http://www.countthecosts.org/sites/default/files/Economics-briefing.pdf

Year: 2012

Country: International

Keywords: Drug Law Enforcement

Shelf Number: 127899


Author: Stoner, Sarah

Title: Reduced to Skin and Bones Revisited: An Updated Analysis of Tiger Seizures From 12 Tiger Range Countries (2000-2012)

Summary: In 2010, TRAFFIC produced ‘Reduced to Skin and Bones: An Analysis of Tiger Seizures from 11 Tiger Range Countries (2000-2010)’ (Verheij, 2010). The purpose of the present report is to provide an updated situational analysis of the current illegal Tiger Panthera tigris trade picture and to gain an improved understanding of one of the greatest threats to the Tiger’s survival. This report also aims to illustrate the need, use, practicability and direction that can be gained from the central collation and analysis of seizure data. Its conclusions outline the need for Tiger range and consumer countries to agree on and adhere to a standardized format for sharing and reporting data on poaching and illegal trade. Seizures are indicators both of illegal trade and of law enforcement effort. A lack of reported seizures (such as in Myanmar) needs to be considered against other data, which in this case points to substantial illegal transit trade, based on TRAFFIC market surveys. Seizure information was collected from a variety of sources, most importantly directly from a number of Tiger range country (TRC) governments, as well as TRAFFIC and WWF offices, supplemented with online research including media reports of government announcements of law enforcement activity. To render seizure data comparable, records of seized items were tallied as units that could be used to calculate the number of Tigers involved in each seizure. Since 2000, there have been 654 seizures of Tiger parts and derivatives across 12 TRCs (Bhutan, Bangladesh, China, India, Indonesia, Lao PDR, Malaysia, Myanmar, Nepal, Russia, Thailand and Viet Nam1). It is estimated that a minimum 1425 Tigers were seized during this period. Since only a fraction of Tigers in illegal trade are intercepted by law enforcement, the scale of criminal activity represents a serious ongoing threat to the survival of wild Tigers, generally considered to number as low as 3200. India, the country with the largest national wild Tiger population, reported the most seizures since 2000 (336). Next were China (58) and Viet Nam (50), which have small numbers of wild Tigers, but large numbers of captive animals. Both China and Viet Nam have been identified as important zones of consumption for illegal Tiger products. Looking at recent seizures (2010-2012), the proportion that India accounts for shows a downward trend, 29% of total seizures compared to 58% for 2000-2009. Conversely, the proportion of seizures has increased for other TRCs such as China, Malaysia, Nepal and Russia but is most notable for Viet Nam, rising from 6% to 14%. Moreover, Indonesia with a relatively small wild Tiger population and few known captive animals, disproportionately seized almost 20% of all Tigers seized in the past three years. Clearly, as this study demonstrates, demand persists - tigers are still being poached and seized. Improved law enforcement and the emergence of intelligence-led policing may mean that some aspects of the illicit trade are being displaced to online markets. As has been revealed in China, offenders have shown that they can adapt their modus operandi to circumvent detection, including a shift towards the trading of Tiger parts and products online. It is paramount that law enforcement also adopts this approach by identifying the current and relevant threats and shifts their focus to ensure they are one step ahead of the offenders. Understanding how end-user markets operate will ensure that criminals cannot continue to evade detection.

Details: London: TRAFFIC International, 2013. 54p.

Source: Internet Resource: Accessed March 9, 2013 at: http://assets.worldwildlife.org/publications/542/files/original/traffic_species_mammals73.pdf?1362619925

Year: 2013

Country: International

Keywords: Animal Poaching

Shelf Number: 127907


Author: Nellemann, Christian

Title: Elephants in the Dust - The African Elephant Crisis. A Rapid Response Assessment

Summary: The African elephant, the largest remaining land mammal on the planet, is facing the greatest crisis in decades. Reports of mass elephant killings in the media vividly illustrate the situation across many African elephant range states. Results from monitoring and systematic surveys conducted under the UNEP-hosted CITES treaty reveal that poaching levels have tripled in recent years, with several elephants killed every single hour of the day. In Central and West Africa, the elephant may soon disappear from whole areas unless urgent action is taken. Organized syndicates ship several tons of ivory at a time to markets in Asia, and hundreds of elephants are killed for every container sent. Indeed, this report documents nearly a tripling in the number of large-scale ivory seizures by customs authorities, revealing the scale and heavy involvement of international criminal networks that must be addressed. The report, however, also provides optimism if action is taken by governments within Africa and in ivory market countries. Improved law enforcement methods, international collaboration with the United Nations Office for Drugs and Crime, the World Customs Organization and INTERPOL and measures to reduce demand can be implemented with success if countries and donors join forces. Indeed, large and previously secure elephant populations in Southern Africa are evidence of the fact that both elephants and their habitats cannot only be well-managed, but, coupled with tourism, can also become a source of income. Improved public awareness is also key. Many people including businessmen and women are often unaware that the ivory they may be exchanging as gifts could have been sourced illegally. Among other awareness activities, UNEP is currently working with its Goodwill Ambassador, actress Li Bingbing, and the City of Shanghai to bring the issue of ivory poaching to the attention of the public.

Details: Norway: GRID-Arendal, UNEP, CITES, IUCN, TRAFFIC, 2013. 80p.

Source: Internet Resource: Accessed March 11, 2013 at: http://www.grida.no/publications/rr/elephants/

Year: 2013

Country: International

Keywords: Animal Poaching

Shelf Number: 127909


Author: Newman, Mark

Title: A Systematic Review of Selected Interventions to Reduce Juvenile Re-offending

Summary: What do we want to know? This is a report of the methods and results of a systematic review of primary research on the effectiveness of selected interventions to reduce juvenile re-offending. The review provides answers to the question of the relative effectiveness of a small number of selected interventions in reducing juvenile re-offending. What did we find out about interventions? Consistent evidence of reducing re-offending • Pre-sentencing Diversion – personal skill straining + for first time offenders. The intervention included: o personal skills training/ counselling which is about anger management, personal responsibility and decision making. o some form of reparation to the community/ victim of crime. o family involvement. compared to standard diversion (caution & monitoring). • Community based family residential placement for female juvenile offenders. The intervention included: o Residential placement for six months to a year in small group supportive ‘family type’ environment. o personal skills training/ counselling which is about anger management, personal responsibility and decision making. o Monitoring and use of appropriate incentives and sanctions. compared to standard residential placement. Promising effects (positive or negative) limited or inconsistent evidence • ‘Teen Courts’ compared to other diversion – Positive • Community based family residential placements compared to standard residential placements for male juvenile offenders – Positive Insufficient evidence • Secure incarceration compared to community sentence • Psycho-dynamic counselling compared to ‘normal Court interventions • Pre-sentence diversions compared to court community sentence • Multi component diversion for persistent offenders (comparison not clear) • Multi-component diversion for mixed groups of offence severity (comparison not clear) • Supported transition from secure incarceration to community compared to no or limited support • Probation plus sports counselling compared to probation only • Violence re-education programme compared to court imposed community service.

Details: London: EPPI-Centre, Social Science Research Unit, Institute of Education, University of London, 2012. 120p.

Source: Internet Resource: EPPI-Centre report no. 2008T: Accessed March 12, 2013 at: http://eppi.ioe.ac.uk/cms/LinkClick.aspx?fileticket=3YwaW7wpQnU%3D&tabid=3360

Year: 2012

Country: International

Keywords: Delinquency Prevention

Shelf Number: 127914


Author: Regehr, Cheryl

Title: Interventions to Reduce Distress in Adult Victims of Sexual Violence and Rape: A Systematic Review

Summary: Beginning with the articulation of Rape Trauma Syndrome (Burgess 1974), the traumatic aftermath of sexual assault on victims has become a focus of social and legal policy, scholarly inquiry, and mental health interventions. The wide variety of psychosocial treatment modalities for victims of sexual violence reported in the literature and used in practice are predominantly based on psychodynamic, cognitive-behavioural or feminist-informed theoretical frameworks. Some modalities have been specifically designed for victims of sexual violence while others have been adapted from use with other traumatized populations. Although there is evidence of effective treatments for addressing traumatic stress in victims of many types of trauma, modalities specific to victims of sexual assault have not been systematically tested. Evidence suggests that trauma associated with rape or sexual assault differs from trauma stemming from other experiences, in part due to the strong element of self-blame, the individualized nature of this type of trauma, social support and social acceptance factors, and the higher incidence of concurrent depression. Therefore, it is critical to examine the effectiveness of interventions specific to victims of sexual violence and rape. The objective of this review was to examine the effectiveness of psychotherapeutic interventions in reducing symptoms of distress and trauma for victims of sexual assault and rape.

Details: Oslo: Campbell Collaboration, 2013. 133p.

Source: Internet Resoruce: Campbell Systematic Reviews
2013:3 Accessed March 12, 2013 at: http://campbellcollaboration.org/lib/project/97/

Year: 2013

Country: International

Keywords: Psychological Interventions

Shelf Number: 127924


Author: Stiles, Daniel

Title: Stolen Apes - The Illicit Trade in Chimpanzees, Gorillas, Bonobos and Orangutans. A Rapid Response Assessment

Summary: The illegal trade in wildlife makes up one part of the multi-billion dollar business that is environmental crime and is increasingly being perpetrated at the cost of the poor and vulnerable. These criminal networks, operating through sophisticated chains of intermediaries, steal the heritage and the natural resources of countries and communities working towards sustainable development, jeopardizing existing successes in the achievement of the Millennium Development Goals and undermining the transition towards resource-efficient Green Economies. UNEP, working with partners such as INTERPOL and operating under agreements like the UNEP-hosted Convention on the International Trade in Endangered Species of Wild Fauna and Flora (CITES) and the UNEP/UNESCO Great Apes Survival Partnership (GRASP), is attempting to bring attention to the issue, build awareness at the political and public levels and catalyze a response. This report focuses on the trade of great apes – bonobos, chimpanzees, gorillas and orangutans. The trafficking of these animals adds additional and unwelcome pressures on the already endangered species, which in many of their range States, attract tourism and thus contribute to the local economy. The trafficking of great apes is not new – it has gone on for well over a century. But the current scale of trafficking outlined in this report underlines how important it is that the international community and the organizations responsible for conserving endangered species remain vigilant, keeping a step ahead of those seeking to profit from illegal activities. The illegal trade in great apes mirrors the recent spike in elephant and rhino poaching, as well as the rise in illegal logging. UNEP and INTERPOL recently launched a report showing that between 50 and 90 per cent of the logging taking place in key tropical countries of the Amazon Basin, Central Africa and Southeast Asia is being carried out by organized crime, threatening not only local species – including many great apes where they occur – but also jeopardizing efforts to combat climate change through initiatives such as the United Nations Collaborative Programme on Reducing Emissions from Deforestation and Forest Degradation in Developing Countries (UN-REDD) In a world where natural resources are increasingly scarce, addressing illegal activities on the ground and across supply chains is increasingly challenging. However, such action should be also an opportunity to improve cooperation between nations and ensure a more sustainable planet.

Details: Arendal, Norway: United Nations Environment Programme, GRID-Arendal, 2013. 56p.

Source: Internet Resource: Accessed March 12, 2013 at: http://www.grida.no/publications/rr/apes/

Year: 2013

Country: International

Keywords: Animal Poaching

Shelf Number: 127927


Author: Ugur, Menmet

Title: Evidence on the Economic Growth Impacts of Corruption in Low-Income Countries and Beyond: Systematic Review

Summary: Corruption is a symptom and an outcome of institutional weakness, with potentially adverse effects on a country’s economic performance. In the last two decades, a wide range of scholars, policy-makers and practitioners have expressed concerns that corruption has gone hand-in-hand with extensive liberalisation reforms and led to poor economic outcomes, including slow growth and high levels of growth volatility. This systematic review aims to provide comparable, reliable and verifiable estimates of the effect of corruption on economic growth by controlling for study heterogeneity in terms of growth measures, data sources and country groupings. Our objectives are to address the impact of corruption on economic growth theoretically and empirically with a view to: (a) providing a narrative synthesis of the types of corruption and the causal links between corruption and growth; (b) providing a meta-synthesis of the empirical evidence on the direct and indirect effects of corruption on growth; and (c) mapping the narrative synthesis with the meta-analysis in order to derive policy conclusions and indicate potential avenues for further research. The review focuses on the growth impacts of corruption in low-income countries (LICs), but we also provide evidence for a larger set of countries for comparative purposes.

Details: London: EPPI-Centre, Social Science Research Unit, Institute of Education, University of London, 2011. 140p.

Source: Internet Resource: http://www.dfid.gov.uk/r4d/PDF/Outputs/SystematicReviews/Corruption_impact_2011_Ugur_report.pdf

Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 127961


Author: Mendez, Juan E.

Title: Report of the Special Rapporteur on Torture and other Cruel, Inhuman or Degrading Treatment or Punishment

Summary: The present report focuses on certain forms of abuses in health-care settings that may cross a threshold of mistreatment that is tantamount to torture or cruel, inhuman or degrading treatment or punishment. It identifies the policies that promote these practices and existing protection gaps. By illustrating some of these abusive practices in health-care settings, the report sheds light on often undetected forms of abusive practices that occur under the auspices of health-care policies, and emphasizes how certain treatments run afoul of the prohibition on torture and ill-treatment. It identifies the scope of State‟s obligations to regulate, control and supervise health-care practices with a view to preventing mistreatment under any pretext. The Special Rapporteur examines a number of the abusive practices commonly reported in health-care settings and describes how the torture and ill-treatment framework applies in this context. The examples of torture and ill-treatment in health settings discussed likely represent a small fraction of this global problem.

Details: Vienna: United Nations Human Rights Council, 2013. 23p.

Source: Internet Resource: A/HRC/22/53: Accessed March 18, 2013 at: http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session22/A.HRC.22.53_English.pdf

Year: 2013

Country: International

Keywords: Cruel and Unusual Punishment

Shelf Number: 128000


Author: Slabber, Marilize

Title: Community-based Domestic Violence Interventions A Literature Review – 2012

Summary: This literature and research review looked at the status of domestic violence interventions in Canada, United Kingdom, Australia, United States and New Zealand. The domestic violence field is dominated by two approaches. The Domestic Abuse Intervention Project Programme (DAIP or the Duluth Programme) is based on a feminist psycho-educational model. An analysis of violence from this perspective suggests it is a result of socio-political forces that are influenced by patriarchal philosophy. Programmes focus on teaching clients about power and control elements that cause domestic violence. Clients also learn about engaging in their relationships or developing relationships on the basis of respect, equality and non violence. Cognitive behavioural approaches, on the other hand, assume that domestic violence is a learned behaviour that can be replaced with nonviolent behaviours. They include cognitive, emotional, behavioural analyses and skills training techniques. It is often difficult to make clear distinctions between the two models as many programmes combine elements of both. Programmes in key jurisdictions vary across and/or within countries. Canada and the United Kingdom generally adhere to the Risk-Needs- Responsivity (RNR) model but community programmes in the United Kingdom may also be based on the Duluth model. In the United States, programme standards and processes vary across states; programmes appear to be based largely on pro feminist or blended models approach to domestic violence also varies across states and programmes appear to be Duluth-based. Some regions have developed culturally suitable programmes. The New Zealand Department of Corrections does not have specialised prison programmes for domestically violent offenders. Male domestic violence offenders are referred to prison-based general offending programmes (i.e. Special Treatment Units or Medium Intensity Programmes) based on individual risk and needs assessment. Community-based domestic violence programmes are contracted in from Ministry of Justice-accredited private providers. These programmes are mostly Duluth-based and psycho-educational, with cognitive behavioural elements. They also need to be culturally responsive. Both high risk and moderate risk offenders and mandated and non- mandated domestically violent offenders are eligible to attend community programmes. There have been few evaluation studies of domestic violence programmes. Assessments of Duluth-type and cognitive behavioural programmes or a combination of the two show few or no significant differences in effectiveness between programme types. At best programmes appear to have a weak positive impact on recidivism rates. Overall, the research provides more information on what does not work rather than on effective ways to stop family violence. Findings from research on other interventions with general offenders suggest that the most effective interventions are consistent with the principles of risk, needs and responsivity. These principles are principles are also relevant to domestically violent offenders. Treatment effectiveness is enhanced when programmes maintain treatment integrity. Some groups of domestic violence offenders may have additional needs and/or responsivity issues such as difficulties with motivation, serious mental illness, personality disorders and substance abuse. The review noted the weak positive impact on recidivism rates of domestic violence offenders within a risk, needs and responsivity framework.

Details: Wellington, NZ: Psychological Services, Department of Corrections, 2012. 26p.

Source: Internet Resource: Accessed March 18, 2013 at: http://www.corrections.govt.nz/__data/assets/pdf_file/0007/649042/COR_Community_Based_Domestic_Violence_Interventions_WEB_2.pdf

Year: 2012

Country: International

Keywords: Community-Based Treatment Programs

Shelf Number: 128006


Author: International Centre for the Prevention of Crime (ICPC)

Title: International Report on Crime Prevention and Community Safety

Summary: The ICPC’s 2012 International Report on Crime Prevention and Community Safety presents key subjects on the international agenda regarding crime and violence, highlighting forms in which prevention can address these issues to generate more resilient and cohesive communities around the world. The third edition of the Report focuses on five topics of significance for crime prevention policymaking at the international level: Human Trafficking, Informal Settlements, Post-Conflict and Post-Disaster Areas, Drug Production in Developed Countries and ICPC’s own Global Survey on Safety in Cities. It analyses these issues from the prevention perspective and contributes to the larger debate on responses to crime using ICPC’s 18 years of expertize in the field. The International Report provides information and tools to help governments, local authorities, international organizations and other actors implement successful crime prevention policies in their countries, cities and communities.

Details: Montreal: ICPC, 2012. 180p.

Source: Internet Resource: Accessed March 20, 2013 at: http://www.crime-prevention-intl.org/en/publications/report/report/article/translate-to-english-rapport-international-2012-sur-la-prevention-de-la-criminalite-et-la-secu.html

Year: 2012

Country: International

Keywords: Crime Prevention

Shelf Number: 128012


Author: Picard, Pierre M.

Title: Bank Secrecy, Illicit Money and Offshore Financial Centers

Summary: International and national institutions regularly put pressure on offshore financial centers and their clients to enforce compliance with anti-money laundering regulations and that in spite of the existence of bank secrecy. This paper discusses the winners and losers of such policies. Surprisingly, aggregate proffits and tax revenues can increase under those policies. In addition, we show that offshore banks can be encouraged to comply with rigorous monitoring of the investor's identity and the origin of his/her funds when the pressure creates sufficiently high risk of reputational harm to this investor. Nevertheless, the effcient pressure policy is dichotomous in the sense that a social planner chooses zero pressure or the pressure that just entices offshore banks to comply. By contrast, the implementation of those pressure policies on an onshore institution may be inefficient. Finally, we show that deeper financial integration fosters compliance by the offshore center while it also gives better incentives for delegated organizations to effectively induce compliance.

Details: Luxembourgh: CREA, University of Luxembourg, and CORE, Université catholique de Louvain, 2009. 38p.

Source: Internet Resource: Paolo Baffi Centre Research Paper No. 2009-45 : Accessed March 20, 2013 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1411584

Year: 2009

Country: International

Keywords: Financial Crimes

Shelf Number: 128013


Author: Lack, M.

Title: Catching On? Trade-related Measures as a Fisheries Management Tool

Summary: This report examines the experience of regional fisheries management organizations (RFMOs) with the use of trade-related measures. There has been a marked increase in the use of trade-related measures by RFMOs over the last decade. This has been driven by: the deteriorating status of many fish stocks; uncertainty as to the actual levels of fishing mortality on these stocks; and the undermining of conservation and management measures by illegal, unreported and unregulated (IUU) fishing.

Details: Cambride, UK: TRAFFIC International, 2007. 49p.

Source: Internet Resource: Accessed March 21, 2013 at: http://www.traffic.org/fisheries-reports/traffic_pub_fisheries1.pdf

Year: 2007

Country: International

Keywords: Illegal Fishing

Shelf Number: 128061


Author: Environmental Justice Foundation

Title: Lowering the Flag: Ending the Use of Flags of Convenience by Pirate Fishing Vessels

Summary: Illegal, Unreported and Unregulated (IUU) or ‘pirate’ fishing is plundering fish stocks, devastating marine environments and stealing from some of the poorest people of the world. IUU is the term given to any fishing activity that contravenes national or international laws, such as using banned fishing gears; targeting protected species; operating in protected or reserved areas or at times when fishing is prohibited; or operating without any form of permit or license to fish. IUU fishing vessels cut costs to maximise profits and use a variety of means, including Flags of Convenience to avoid detection and penalty for wrongdoing. • Globally, pirate fishing accounts for US$10 – 23.5 billion a year, representing between 11 and 26 million tons of fish. It is a highly profitable activity being driven by the enormous global demand for seafood, threatening the future of world fisheries. The impacts are social, economic, and environmental. Many IUU operators deliberately target poor developing countries. • While international law specifies that the country whose flag a vessel flies is responsible for controlling its activities, certain states operate ‘open registries’ that allow foreign-vessels to fly their flag for a relatively tiny fee. Known as Flags of Convenience (FoC), many of these countries lack the resources or the will to monitor and control vessels flying their flag, allowing pirate fishing operations to avoid fisheries regulations and controls. • FoC are notoriously easy, quick and cheap to acquire, obtainable over the internet for just a few hundred dollars. Vessels can re-flag and change names several times in a season, a practice known as “flag hoppingâ€. Backed by shell companies, joint-ventures and hidden owners, FoC reduce the operating costs associated with legal fishing, and make it extremely difficult to identify and penalise the real owners of vessels that fish illegally. • Available data indicates that there are currently 1061 fishing vessels equal to or longer than 24 metres registered with FoC. Globally a further 8.5% of fishing vessels are listed as ‘flag unknown’, although it is likely that some of these are flying FoC. Regional Fisheries Management Organisation (RFMO) blacklists are dominated by vessels registered to FoC or flag unknown. While some RFMO whitelists of authorized vessels do contain a number flagged to FoC, total RFMO lists added together do not approach the total number of FoC fishing vessels - leaving open the question of how and where these vessels are operating. EXECUTIVE SUMMARY • As well as fishing vessels, refrigerated transport vessels (know as ‘reefers’) flying FoC have been widely implicated in IUU fishing operaô€†Ÿons; in West African field investigations undertaken by EJF virtually all IUU reefers were documented flying FoC. Reefers allow IUU fishing vessels to tranship their catches, restock on food and bait, refuel and re-crew without having to make the lengthy (and costly) journey to port. 700 reefers are currently registered with FoC; Panama, Bahamas and Liberia account for 70%. Even those reefers whitelisted by RFMOs favour FoC; 86% of Fish Carriers on ICCAT lists are taking advantage of FoC registration • European Union(EU) and East Asian companies dominate the ownership of FoC vessels. Taiwanese, South Korean, Chinese and Japanese companies are significant, while overall EU ownership of fishing vessels flying FoC has increased by 9% since 2005. There has been a recent large shift in ownership of vessels flying FoC to Panamanian companies, however it is likely that many of these are shell companies registered in Panama by foreign, and hidden, beneficial owners. • Economically the benefits to FoC States of registering fishing vessels are minimal. Annual revenues are estimated to accrue US$3-4 million to the major FoC registries from flagging fishing vessels, a tiny amount when compared to the millions of dollars lost by individual countries and the billions lost globally to IUU fishing. • Among FoC States further economic losses are now likely as a result of trade sanctions by RFMOs, as well as the incoming EU-IUU regulation, due to be implemented in January 2010. This will target non-cooperative States, leaving FoC countries that depend on fisheries exports extremely vulnerable to losing access to the largest seafood market in the world. • In light of the current crisis facing global fisheries, failure to end the exploitation of FoC by IUU fishing operations will undermine efforts to achieve sustainable fisheries management, marine ecological security and the development of many, primarily developing, coastal States. Closing open registries to fishing vessels offers an efficient and cost-effective measure to combat IUU fishing. This report therefore calls for action to end the granting of Flags of Convenience to fishing vessels, and those vessels that support fishing activities, by individual States, RFMOs, and bodies such as the European Union, Commonwealth and United Nations.

Details: London: Environmental Justice Foundation, 2009. 38p.

Source: Internet Resource: Accessed March 21, 2013 at: http://www.illegal-fishing.info/uploads/Loweringtheflagfinal.pdf

Year: 2009

Country: International

Keywords: Illegal Fishing

Shelf Number: 128063


Author: Søreide, Tina

Title: Certified Integrity? Forest Certification and Anti-Corruption

Summary: Forest certification schemes regulate forest exploitation and trade across many countries. In the absence of a multilateral agreement on limiting deforestation, they provide rules to balance the social, economic and ecological values of forest resources. Expansion of these schemes into tropical countries that display poor governance and high levels of corruption has raised questions about these schemes’ performance in such contexts. Referring to the case of the Forest Stewardship Council – a global forestry certification system – the authors looked at whether forest certification schemes can address corruption issues. While forest certification is not primarily geared towards detecting and preventing corruption, they may have some anti-corruption effects in countries where corruption is sporadic but not systemic. This is due to their role in documenting forest management practices and applying third-party monitoring.

Details: Bergen, Norway: U4 Anti-Corruption Resource Centre at the Chr. Michelsen Institute, 2013. 24p.

Source: Internet Resource: U4 Issue, January 2013, No. 1: Accessed March 22, 2013: http://www.u4.no/publications/certified-integrity-forest-certification-and-anti-corruption/

Year: 2013

Country: International

Keywords: Corruption

Shelf Number: 128070


Author: Born Free Foundation

Title: Ivory Update. Prepared for the: 54th Meeting of the CITES Standing Committee 2nd – 6th October 2006, Geneva

Summary: This ivory report documents the seizure of more than 30 tonnes of ivory since CoP13 (November 2004). Since 1998, when the Species Survival Network first began collecting data on ivory seizures, more than 151 tonnes of ivory have been recorded as seized. This interim ivory report has been prepared for the 54th meeting of the CITES Standing Committee (SC54) and is intended to update the Parties on significant ivory seizure information since CoP13. It will additionally discuss elephant issues that will arise at SC54, including the one-off trade of ivory approved at CoP12, MIKE (Monitoring the Illegal Killing of Elephants) baseline data, and the ivory Action Plan. Finally, it will comment on the issue of ivory stockpiles and problems relating to the harmonisation of seizure reporting. At the 12th meeting of the Conference of the Parties to CITES (Santiago, Chile, 2002), the Parties approved a one-off sale of 60 tonnes of ivory (30 tonnes from South Africa, 20 tonnes from Botswana and 10 tonnes from Namibia). No such trade has taken place as conditions placed upon these exports have not been met to the satisfaction of the Standing Committee. These conditions are: i) only registered government-owned stocks, originating in the State (excluding seized ivory and ivory of unknown origin) and, in the case of South Africa, only ivory originating from the Kruger National Park; ii) only to trading partners that have been verified by the Secretariat, in consultation with the Standing Committee, to have sufficient national legislation and domestic trade controls to ensure that the imported ivory will not be re-exported and will be managed in accordance with all requirements of Resolution Conf. 10.10 (Rev CoP12) concerning domestic manufacturing and trade; iii) not before the Secretariat has verified the prospective importing countries, and the MIKE programme has reported to the Secretariat on the baseline information (e.g. elephant population numbers, incidence of illegal killing); iv) a maximum of 20,000kg (Botswana), 10,000kg (Namibia) and 30,000kg (South Africa) of ivory may be traded, and despatched in a single shipment under strict supervision of the Secretariat; v) the proceeds of the trade are used exclusively for elephant conservation and community conservation and development programmes within or adjacent to the elephant range; and vi) only after the Standing Committee has agreed that the above conditions have been met.

Details: Horsham, UK: Born Free Foundation, 2006. 8p.

Source: Internet Resource: Accessed march 23, 2013 at: http://www.bornfree.org.uk/fileadmin/user_upload/files/reports/SCIvoryReportFINAL.pdf

Year: 2006

Country: International

Keywords: Animal Poaching

Shelf Number: 128094


Author: Ervin, J., N. Sekhran, A. Dinu. S. Gidda, M. Vergeichik andJ. Mee.

Title: Protected Areas for the 21st Century: Lessons from UNDP/GEF's Portfolio

Summary: The world’s biodiversity – the species, ecosystems and ecological processes that compose the natural world – are of incalculable value to humanity. The world’s agricultural systems depend upon biodiversity to sustain genetic plant and animal diversity, to provide pollination services, and to maintain irrigation services. The world’s cities depend upon biodiversity to provide clean drinking water to their burgeoning populations. The world’s coastal communities, in which one-half to two-thirds of all of humanity resides, depend upon the natural infrastructure of coral reefs, sea grass beds, and mangroves to buffer them from the impacts of climate change, including sea-level rise and increased storm surges. The world’s inland communities depend upon the natural infrastructure of healthy forests, grasslands and wetlands to buffer them against increased drought, flooding, disease and natural disasters. While biodiversity provides the fundamental goods and services upon which all life depends, including human societies, it is of particular importance to the 2.7 billion people – more than a quarter of the world’s population – who survive on less than $2 a day. As much as 70 percent of the world’s poorest people depend critically upon biodiversity to provide them with life’s most basic necessities, including food, water, shelter, medicine and their livelihoods, and a sixth of the world’s population depends upon the biodiversity within protected areas for their livelihoods. Despite the fundamental importance of biodiversity to human life and social development, the world is facing unprecedented and largely irreversible losses in biodiversity. Current extinction rates are approaching 1,000 times the background rate, and may climb to over 10,000 times the background rate during the next century if present trends in species loss and climate change continue. As many as 70 percent of the world’s known species are at risk of extinction by 2100 if global temperatures rise more than 3.5o Celsius. The loss of biodiversity and the resulting destabilization of ecosystem services undermine the very foundations of human welfare – in short, the social costs of biodiversity loss are enormous and immeasurable. Protected areas are the cornerstone of global biodiversity conservation. Over the past 40 years, governments and non-governmental organizations alike have made unprecedented investments in the establishment of protected areas around the world. As a result, the world’s terrestrial protected areas encompassed more than 18 million sq km in 2010, compared with just over 2 million sq km in 1970. As the first decade of the 21st Century comes to a close, emerging drivers of change are transforming our concept of protected areas – what they are and what they should do. Protected areas are expected to do more – in terms of their ecological, social and economic contributions – than ever before. Not only are they expected to provide habitat for endangered wildlife, but also to contribute to livelihoods for local communities, to generate tourism revenues to bolster local and national economies, and to play a key role in mitigation of and adaptation to climate change, among many other diverse functions and contributions. Purpose and objectives of this publication The following report looks at how changing 21st Century expectations about the roles and functions of protected areas are beginning to shape protected area management around the world and identifies emerging best practices for protected areas under a new paradigm that views protected areas as part of a planetary life support system. The report is based on case studies drawn largely from the portfolio of projects financed by the Global Environment Facility (GEF) through the United Nations Development Programme (UNDP). The GEF is the world’s most significant multilateral funding source for protected areas. Since the Convention on Biological Diversity’s Programme of Work on Protected Areas was ratified in 2004, UNDP/ GEF has supported work in more than 700 protected areas around the world, covering nearly every goal, target and action under the Programme of Work. Following this introductory section, which presents background on historical and evolving concepts of protected areas and their roles, the report is organized according to eight key themes that are shaping protected areas management in the 21st Century. These themes range from enabling policy environments to management planning, governance, participation, and sustainable finance, to name but a few. For each of the eight themes, the report presents a snapshot of the current status of implementation, a set of emerging best practices, and one or more case studies that illustrate innovative and successful approaches.

Details: New York: United Nations Development Programme and Montreal: Convention on Biological Diversity, 2010. 132p.

Source: Internet Resource: Accessed March 23, 2013 at: http://www.undp.org/content/undp/en/home/librarypage/environment-energy/ecosystems_and_biodiversity/protected_areas_forthe21stcentury.html

Year: 2010

Country: International

Keywords: Biodiversity

Shelf Number: 128095


Author: Turtle Conservation Coalition

Title: Turtles in Trouble: The World’s 25+ Most Endangered Tortoises and Freshwater Turtles—2011

Summary: Turtles are in serious trouble. They are among the world’s most endangered vertebrates, with about half of their more than 300 species threatened with extinction. We commonly hear about the plight of other animal groups; however, turtles are much more at risk of impending extinction than birds, mammals, amphibians, or sharks and rays, and paralleled among the larger vertebrate groups only by the primates (Turtle Taxonomy Working Group 2010, www. iucnredlist.org, Hoffmann et al. 2010). Turtles throughout the world are being impacted by a variety of major threats, to which many are gradually succumbing. They are being collected, traded, and eaten or otherwise used, in overwhelming numbers. They are used for food, pets, traditional medicine—eggs, juveniles, adults, body parts—all are exploited indiscriminately, with little regard for sustainability. On top of the targeted onslaught, their habitats are being increasingly fragmented, destroyed, developed, and polluted. Populations are shrinking nearly everywhere. Species worldwide are threatened and vulnerable, many are critically endangered, others teeter on the very brink of extinction, and a few have already been lost forever, with eight species and two subspecies having gone extinct since 1500 AD (see table, p. 5). The world’s living tortoise and freshwater turtle species are a remarkable evolutionary success story. There are about 328 currently recognized modern species (452 taxa; Turtle Taxonomy Working Group 2010). Turtles have existed for about 220 million years, since the Late Triassic Era, outlasting their early contemporaries, the dinosaurs. Turtles and tortoises have evolved a remarkable armored shell that has remained relatively unchanged through evolution, and while other vertebrate species have evolved and gone extinct, the basic body form of turtles has remained an obvious testament to their success and their ability to survive millions of years of natural selection. However, the previously successful survival adaptations of turtles, including delayed sexual maturity, high fecundity combined with high juvenile mortality, and a long adult life-span with low natural adult mortality, have left turtle populations vulnerable to new and devastating threats posed by human exploitation and habitat loss. Turtles and tortoises are major biodiversity components of the ecosystems they inhabit, often serving as keystone species from which other animals and plants benefit— Desert and Gopher Tortoises in North America, Giant River Turtles in the Amazon basin of South America, Pig-nosed Turtles in Australia and New Guinea, Giant Tortoises in the Galápagos and Seychelles islands, and large Flapshell and Softshell Turtles in Asia—all represent major components in their environments and are part of the web of interacting and co-dependent species that constitute healthy functioning ecosystems. Without turtles and tortoises, those ecosystems and the critically important human-welfare ecoservices they provide, would gradually suffer from the loss of biodiversity and degrade in ways still incompletely understood and difficult to predict. No turtle species should be lost to extinction, as none are expendable or unimportant. Increasingly, however, human activities are endangering many turtle and tortoise species while driving others into extinction. We are facing a turtle survival crisis unprecedented in its severity and risk. Humans are the problem, and must therefore also be the solution. Without concerted conservation action, many of the world’s turtles and tortoises will become extinct within the next few decades. It is now up to us to prevent the loss of these remarkable, unique jewels of evolution. Without intervention, countless species will be lost. We need to work together for the survival of turtles throughout the world, to understand the risks and threats turtles face, to define survival and conservation objectives, and to develop the successful management strategies and organizational alliances that can help us reach those goals.

Details: Lunenburg, MA: IUCN/SSC Tortoise and Freshwater Turtle Specialist Group, Turtle Conservation Fund, Turtle Survival Alliance, Turtle Conservancy, Chelonian Research Foundation, Conservation International, Wildlife Conservation Society, and San Diego Zoo Global, 2011. 54p.

Source: Internet Resource: Accessed March 23, 2013 at: http://cmsdata.iucn.org/downloads/top_25__turtles_in_trouble_2011__2_.pdf

Year: 2011

Country: International

Keywords: Tortoises

Shelf Number: 128106


Author: Global Tiger Initiative Secretariat

Title: Global Tiger Recovery Program Implementation Report 2012

Summary: In November of 2010, leaders of the 13 Tiger Range Countries (TRCs) assembled at an unprecedented International Tiger Forum in St. Petersburg, Russia. With the extinction of wild tigers looming, they unanimously adopted the St. Petersburg Declaration on Tiger Conservation and endorsed its implementation mechanism, the Global Tiger Recovery Program (GTRP). The overarching goal of the St. Petersburg Declaration and the GTRP is to double the global number of wild tigers across their range by 2022, the next Year of the Tiger, from an estimated 3,200 to more than 7,000. This Summit, the first-ever devoted to an endangered species, marked a historic milestone in tiger conservation and in biodiversity conservation more broadly. The St. Petersburg Declaration represents a commitment to go beyond governments and NGOs creating isolated impacts to working collaboratively for collective impact to achieve a shared vision. The comprehensive GTRP comprises the National Tiger Recovery Priorities (NTRP) of the 13 TRCs and Global Support Programs to be spearheaded by international and national partners to bolster country efforts. The GTRP outlines the concerted country-specific and collaborative actions required in the first five years of the program to move toward the 2022 goal. These actions fall under several broad themes: policy and institutional change; habitat protection and management; controlling tiger and prey poaching; institutional strengthening and capacity building; increasing community engagement and reducing human-tiger conflict; controlling illegal trade in tigers and reducing the demand that drives it; cooperation to manage transboundary tiger landscapes and to combat illegal trade; scientific monitoring, surveys, and research; and finding new sources of sustainable financing for tiger conservation. The emphasis on these themes varies from TRC to TRC, depending on each TRC’s unique challenges and situation. To track progress toward the shared goal, TRC governments committed to transparent mutual accountability for implementing the actions necessary for recovering tigers in their particular context. Partners are holding themselves accountable to the TRC’s for fulfilling their promised support programs. All agreed to periodic stocktaking to review progress, consider new information, and establish future program directions. The First Stocktaking Meeting of Senior Officials and Experts to Review Implementation of the GTRP took place on May 15- 17, 2012, in New Delhi, India. All 13 TRCs reported on their progress as well the challenges and obstacles each faced in implementing their Priority Implementation Activities (PIAs). Partners also reported on their progress and setbacks. At the same time, the TRCs and partners outlined priorities for 2012-2013. Progress in 2011 and the first half of 2012 was impressive and a clear sign that the political will generated at the 2010 Tiger Summit is leading to action on the ground. TRCs completed or made progress on most of their PIAs and partners did the same. TRCs are actively collaborating, sharing knowledge and experience. Some activities took longer to get going than planned, but that is to be expected in a new and highly ambitious undertaking involving 13 governments and dozens of partners in NGOs and international organizations. After some initial delay, external funding streams have begun to flow, and the outlook for developing the resources needed to fully fund the GTRP seems bright. The Global Tiger Initiative was founded just four years ago, in June 2008. It will take considerably more time for tigers to begin to recover and to determine whether we are moving toward the goal of doubling their numbers. The progress reported here gives cause for some optimism but it is imperative that the momentum be maintained. Also encouraging is news of a potential new TRC. Kazakhstan, once home to the Caspian tiger subspecies, is working toward reintroducing tigers to their former range there. Other TRCs with very low tiger numbers are also beginning to plan for restoring tigers to their priority landscapes. How this Report was Prepared and is Organized The St. Petersburg Declaration charged the Global Tiger Initiative (GTI) Secretariat, based at the World Bank where the GTI was founded in 2008, with a coordinating role in implementing the GTRP and supporting and encouraging the TRCs in their efforts. Before the Tiger Summit, the GTI and the TRCs were engaged in a rigorous interactive process to develop the NTRPs and the GTRP. Since the Summit, this process has continued as TRCs developed individual lists of PIAs: these were the milestones the TRC planned to reach by the end of the first implementation period. Similarly, a Partners’ To-Do List of milestones was agreed upon. All were periodically revised and updated through mid-2012. It was agreed that progress would be assessed against the PIAs and Partners’ list. To develop this first Global Tiger Recovery Program Implementation Report 2012, each TRC provided to the GTI Secretariat a two-page summary of their progress in implementation of its PIAs, including a self-assessment of whether it completed a PIA, made significant or some progress toward completing it, or made no progress. Each TRC also contributed brief information on a best practice or success story, major challenges, and PIAs for 2012-2013. Before and after the stocktaking, TRCs had opportunities to revise their summaries. These country summaries form the bulk of this report.

Details: Washington, DC: The World Bank,, 2012. 64p.

Source: Internet Resource: Accessed March 25, 2013 at: http://www.globaltigerinitiative.org/wp-content/uploads/2012/07/GTRP_Implementation_Report_2012.pdf

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 128117


Author: Global Tiger Initiative Secretariat

Title: Global Tiger Recovery Program 2010–2022

Summary: Wild tigers are under threat of extinction across their entire range. Wild tigers (Panthera tigris) have for centuries occupied a very special place in the nature and culture of Asia. These magnificent big cats sit at the top of the ecological pyramid in vast Asian forest landscapes. The presence of viable populations of wild tigers is an indicator of the integrity, sustainability, and health of larger ecosystems. However, wild tigers are on the brink of extinction, with only about 3,200 to 3,500 surviving today, scattered among 13 Asian Tiger Range Countries (TRCs): Bangladesh, Bhutan, Cambodia, China, India, Indonesia, Lao PDR, Malaysia, Myanmar, Nepal, Russian Federation, Thailand, and Vietnam. Diverse, rich, but undervalued tiger ecosystems are degrading and disappearing. Tiger landscapes support tigers, their prey, and a vast amount of biodiversity. They also contribute to human well being, locally and globally, through the provision of many ecosystem services such as water harvesting, carbon sequestration, plant genetic materials, food security and medicinal plants, and opportunities for community-based tourism. Most of these benefits are not currently monetized so tiger landscapes are significantly undervalued in national and global agendas. As a result, degradation, fragmentation, and loss of natural habitats, depletion of prey animals, and poaching to supply a large illegal global trade in their body parts, have pushed wild tigers and their landscapes to the brink of extinction. These threats are exacerbated by limited capacity for conservation action and, in most TRCs, by insufficient resources. The Global Tiger Recovery Program (GTRP) seeks to empower TRCs to address the entire spectrum of threats, domestic as well as those that are transboundary in nature, and work toward increased financial sustainability through the integration of conservation objectives into development. To solve the tiger crisis, which represents the larger Asian biodiversity crisis, the TRCs, international organizations, and civil society have come together on a collaborative platform within the framework of the Global Tiger Initiative (GTI). After a two-year process of sharing knowledge and best practices and developing a common vision, the GTRP was developed, with the shared goal of doubling the number of wild tigers globally by 2022 through actions to: (i) effectively manage, preserve, protect, and enhance tiger habitats; (ii) eradicate poaching, smuggling, and illegal trade of tigers, their parts, and derivatives; (iii) cooperate in transboundary landscape management and in combating illegal trade; (iv) engage with indigenous and local communities; (v) increase the effectiveness of tiger and habitat management; and (vi) restore tigers to their former range. The foundation of the GTRP is 13 individual National Tiger Recovery Priorities (NTRPs) that outline the urgent priority activities each TRC will take to contribute to the global goal. These NTRPs are buttressed with other actions that TRCs need to do in concert with others, such as arresting transboundary illegal trade, knowledge sharing, and establishing robust systems for monitoring populations, habitats, and overall progress. Additional actions to eliminate illicit demand for tiger parts and their derivatives and to undertake habitat valuation in order to promote payment for ecosystem services schemes are also included in the GTRP portfolio of 80 activities. The GTRP calls for incremental financing of about US$350 million over the first five years of the program, over and above the domestic financing to be provided by individual TRCs, based on their ability. TRCs have identified policy and institutional reforms to enhance the effectiveness of these proposed expenditures. TRCs have built considerable early momentum in implementing policy and institutional actions. Financial support for GTRP implementation is to be through a flexible financing mechanism that enables all potential funders—official bilateral programs, multilateral development banks, and the GEF, international NGOs, as well as private and corporate entities—to support the GTRP portfolio, which is to be kept current. Program management and coordination arrangements are built on the establishment and strengthening, as needed, of robust national implementation mechanisms, supported by TRC-wide and global processes to ensure mutual accountability and transparency through vigorous monitoring and reporting of progress. The existing Global Tiger Forum (GTF) is to be strengthened to play its mandated intergovernmental role and, until longer-term coordination arrangements are agreed upon, the TRCs asked the GTI Secretariat to support the implementation phase. Suitable collaborative platforms for those providing support to TRCs, through financing, capacity building, or arresting illegal trade, are to be created. Expected results include stabilized tiger populations in most critical habitats by year five and overall doubling by 2022; critical tiger habitats becoming inviolate and protected areas professionally managed; significant reduction in poaching and illegal trade and trafficking along with decreased illicit demand for tiger body parts and derivatives; consistent monitoring in place; and economic valuation of all tiger landscapes completed as a basis for sustainable financing. The GTRP is the last best hope for tigers. Wild tigers are at a tipping point and action, or inaction, in the coming decade will decide their fate. Action will lead to the tiger’s recovery; inaction or mere maintenance of the status quo will lead to its extinction. The GTRP represents the last best hope for the survival of the world’s most magnificent species and the conservation of the valuable landscapes in which it lives.

Details: Washington, DC: World Bank, 2011. 70p.

Source: Internet Resource: Accessed March 25, 2013 at: http://www.globaltigerinitiative.org/download/St_Petersburg/GTRP_Nov11_Final_Version_Eng.pdf

Year: 2011

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 128118


Author: Collins, John, ed.

Title: Governing The Global Drug Wars

Summary: International drug control efforts began in 1909, with the aim of eradicating the abuse of certain drugs by controlling their supply. A complex international system of enforcement grew up based on this belief in supply control. A century on, the empirical data is available and overwhelming: the system has failed. Worse, it has become increasingly clear that the human cost of pursuing many of its policies renders them unjustifiable. From mass incarceration in the United States and Asia, to the HIV/AIDS epidemic flooding Russia and the waves of violence rippling through Latin America – current global drug policies are worsening current global drug problems. This is no longer a point of controversy, but as Joseph Spillane suggests, is something which ‘no serious scholar questions’. Nevertheless, driven by a mixture of bureaucratic and ideological inertia, the international drug control system, governed through the UN and enforced by a number of core states, continues to pursue many of the same failed policies. This report asks why the system evolved in the way that it did, and explores the potential for reform. Often, those seeking to understand the complex and opaque international drug control system look to the wording of its various conventions and governing treaties – both of which are open to wide interpretation. However, as William McAllister points out, the system evolved through complex diplomatic, bureaucratic, social and interpersonal forces. It is only through an understanding of these broader forces that we can properly explain how the system was constructed and why it continues to function in the way that it does. Building on this discussion of historical complexity, David Courtwright examines the reasons why some drugs have traditionally been the subjects of ‘war,’ while others have become deeply ingrained in the mainstream economy. This is a question expanded upon by James Mill’s survey of the questionable scientific evidence underpinning cannabis’ co-option into international controls. As Joseph Spillane’s analysis shows, in order to better understand current international drug policies we should focus more attention on the considerable harms that these policies create. In particular he suggests that researchers should concentrate on the wealth of evidence available from the daily experience of contemporary drug addicts, which reveals the, often-harrowing impacts of the various drug wars. Paul Gootenberg analyses the interaction between international policies and shifting cocaine ‘commodity chains’ in Latin America over the last century, culminating in the current Mexican crisis. In so doing, he highlights a seemingly inherent tendency of international drug policy makers to create larger and more violent problems than their interdictionist policies resolve. Former Swiss President Ruth Dreifuss and her colleague Diane Steber evaluate Switzerland’s interaction with the international system, highlighting the pressure exerted on states trying to pursue policies outside the traditional supply-centric paradigm. David Bewley-Taylor then examines ‘the UNGASS decade’ between 1998 and 2008, when the international community committed itself to achieving ‘a drug free world’. He argues that the consensus that characterised this period is now fracturing as nation states are more openly pursuing alternative approaches. In the final section of this report we look towards the future of the system and highlight specific areas in need of immediate reform. Damon Barrett shows that the current system is lacking in basic human rights oversight, and as a result is permitting systematic human rights abuses. Joanne Csete focuses on the International Narcotics Control Board’s (INCB) support for unscientific policies internationally and its refusal to endorse best practice public health policies, particularly around HIV/AIDS prevention. She argues that the INCB remains ‘the most closed and least transparent of any entity supported by the United Nations.’ The machinery of international drug control has solidified around outdated modes of thinking and failed policies. Despite this, it has proved remarkably successful at restricting policy experimentation worldwide and encouraging the continuation of counterproductive approaches. Two steps need to be taken. First, there need to be immediate measures to incorporate basic human rights standards and improve the level of oversight within the system. This is particularly urgent in the areas of international funding decisions and the operation of the INCB. Second, an independent root and branch review of the approach to, and apparatus governing, international drug control needs to be conducted with a view to long-term structural reforms. Such a review must begin with a deep understanding of the historical forces that have shaped and continue to underpin the current policies and system. This report should serve as a starting point.

Details: London: London School of Economics, 2012. 70p.

Source: Internet Resource: LSE Ideas; Special Report SR014: : Accessed March 25, 2013 at: http://www2.lse.ac.uk/IDEAS/publications/reports/SR014.aspx

Year: 2012

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 128121


Author: Altherr, Sandra

Title: Canapés to Extinction: The international trade in frogs’ legs and its ecological impact

Summary: In some regions of India, frogs are called “jumping chickens,†as their taste is similar to chicken. Their palatability to humans is why billions of frogs are consumed annually. In many countries in Asia, Africa, and Latin America frogs are collected for subsistence or local consumption. Some of these same countries are engaged in the commercial trade of frogs and frog products— including frogs’ legs—supplying markets in the European Union (EU) and the United States of America (USA), where native frog populations have been seriously depleted (Mohneke 2011, Lannoo et al. 1994). While frog farming plays an increasing role in meeting the global demand for frogs’ legs, in several countries millions of frogs are still taken from the wild to satisfy international demand. The exploitation of wild frogs to sustain this trade mainly focuses on larger-bodied species of the family Ranidae, such as the Asian brackish frog (Fejervarya cancrivora) and giant Javan frog (Limnonectes macrodon, formerly Rana macrodon). Some experts warn that even for common, fast-growing and fecund amphibian species, present levels of exploitation may be far from sustainable (Mohneke 2011, Bickford pers. comm. 2010, Lau et al. 2008). Within the last 20 years, Indonesia has become the world’s leading exporter of frogs’ legs, followed by China, Taiwan. The present report gives an overview of recent developments, trends, and the impacts of the frogs’ legs trade since the 1980s. The role of the EU and the USA as the main consumer markets is documented. During the last decade the EU imported an annual mean volume of 4,600 tonnes of frogs’ legs. With 84% of total imports, Indonesia is by far the leading supplier for the EU market (with the vast majority of those frogs being wild-caught). Belgium, France and the Netherlands are the main importers within the EU (see Section 3.1). In recent years, the USA has been annually importing on average 2,280 tonnes of frogs’ legs of the species Rana spp. Almost the same volume of live frogs (2,216 tonnes)—mainly American bullfrogs—is imported by the USA to supply the Asian-American market (see Section 3.2). The report recommends measures exporting and importing countries should take to reduce the extreme burden on wild frog populations as well as avoid other ecosystem risks within both range states and importing countries.

Details: Munich, Germany: Pro Wildlife; Washington, DC: Defenders of Wildlife and Animal Welfare Institute, 2011.

Source:

Year: 2011

Country: International

Keywords: Frog's Legs

Shelf Number: 128133


Author: Thornhill, Daniel J.

Title: Ecological Impacts and Practices of the Coral Reef Wildlife Trade

Summary: It is estimated that 14–30 million fish, 1.5 million live stony corals, 4 million pounds of coral skeleton, 65–110 thousand pounds of red and black coral, and 9–10 million other invertebrates are removed each year from ecosystems across the world to supply the aquarium, curio/home décor, and coral jewelry industries. This trade has a collective annual value estimated in the hundreds of millions of dollars, and involves over 45 source countries. This report examines the ecological impacts and practices associated with the ornamental trade in coral reef wildlife, including a lack of monitoring and regulation, illegal harvesting practices (including poaching and cyanide fishing), and a sizeable black market for reef-dwelling organisms. Over-collection of coral reef wildlife can potentially cause far-reaching consequences for coral reef ecosystems, disrupting trophic webs and removing creatures that play important roles in the reef. The combined effects of collection could weaken coral reefs, making them less able to respond to the larger threatsthat imperil these ecosystems globally, like climate change and ocean acidification.

Details: Washington, DC: Defenders of Wildlife, 2012. 174p.

Source: Internet Resource: Accessed March 26, 2013 at: http://www.defenders.org/sites/default/files/publications/ecological-impacts-and-practices-of-the-coral-reef-wildlife-trade.pdf

Year: 2012

Country: International

Keywords: Coral Reefs

Shelf Number: 128134


Author: Schneider, Friedrich

Title: Money Laundering and Financial Means of Organized Crime: Some Preliminary Empirical Findings

Summary: After giving a short literature review, the paper tries a quantification of the volume of money laundering activities, with the help of a MIMIC estimation procedure for the years 1995 to 2006 for 20 highly developed OECD countries. The volume of laundered money was 273 billions USD in the year 1995 for these 20 OECD countries and increased to 603 billions USD in 2006. The overall turnover in organized crime had a value of 595 billion USD in 2001 and increased to 790 billion USD in 2006. These figures are very preliminary but give a clear indication how important money laundering and the turnover of organized crime is nowadays.

Details: Berlin: Economics of Security, c/o Department of International Economics, German Institute for Economic Research, 2010. 30p.

Source: Internet Resource: Economics of Security Working Paper 26: Accessed March 27, 2013 at: http://www.diw.de/documents/publikationen/73/diw_01.c.354167.de/diw_econsec0026.pdf

Year: 2010

Country: International

Keywords: Financial Crimes

Shelf Number: 128146


Author: Gerritzen, Berit C.

Title: Facts or Ideology: What Determines the Results of Econometric Estimates of the Deterrence Effect of Death Penalty? A Meta-Analysis

Summary: Provided that the literature on the deterrent effect of capital punishment is overall inconclusive, the fact that individual authors persistently claim to have found solid evidence in one or the other direction raises two questions. Firstly, what are the causes for these different results? Do different data samples, estimation methods or time periods lead to different results or do the outcomes merely reflect prior convictions of the authors? Secondly, to what extent is it possible to derive such diverging results by slightly changing the specification of the test equations without violating scientific standards? After a survey of the over forty reviews of this literature available so far, we perform a meta-analysis of 102 deterrence studies published between 1975 and 2011. The profession of the author turns out to be the only statistically significant explanatory variable: Economists claim significantly more often to have found a significant deterrence effect than members of law or other social science departments. Furthermore, using a panel data set of U.S. states, we show how easy it is to derive contradictory results by employing alternative specifications. Thus, our results reinforce the claim that the empirical evidence presented to date is by far too fragile in order to base political decisions on it.

Details: Munich: CESifo Group, consisting of the Center for Economic Studies (CES), the Ifo Institute and the CESifo GmbH , 2013. 36p.

Source: Internet Resource: CESIFO WORKING PAPER NO. 4159: Accessed March 27, 2013 at: http://www.cesifo-group.de

Year: 2013

Country: International

Keywords: Capital Punishment

Shelf Number: 128149


Author: Environmental Investigation Agency

Title: The Inside Story: Environmental criminals’ perceptions of crime, corruption and CITES

Summary: The Environmental Investigation Agency (EIA) and partners conduct on the ground investigations engaging environmental crime offenders. Investigations document illegal trade, what facilitates it and the emerging trends, which is then presented to international decision-makers. Over the years, EIA’s direct engagement with active environmental offenders has yielded rich insights into their attitudes and perceptions: about what helps them do business and what deters them; the market trends and how these compare to previous years; how they perceive the criminal justice system; what they anticipate for their future business, and for the future of the species which they trade. In source, transit and destination countries, individuals operating at different stages of the illegal trade chain describe similar dynamics: corruption (bribes and payoffs), weakly enforced legislation, the ability to exploit parallel legal markets and loopholes, even how domestic policies stimulate demand for protected species. As valuable as they are, offenders’ perceptions are not currently being taken into account by all the stakeholders in environmental crime. This is compounding a situation where environmental crime is not being fully or effectively addressed. Knowing how and what environmental criminals are thinking should not be the sole domain of non-governmental organisations (NGOs), undercover journalists, individual law enforcement officers or the communities living in areas where crime happens. The Convention on International Trade in Endangered Species (CITES), with a membership of 178 Parties, seeks to regulate trade so it does not threaten species, but it does not exist in a vacuum. EIA’s investigations have found environmental criminals are not ignorant about CITES, or about domestic legislation. A species’ protected status or scarcity can mean that criminals ‘bank on extinction’, exploiting higher demand or higher financial ‘value’.

Details: London: EIA, 2013. 28p.

Source: Internet Resource: Accessed March 28, 2013 at: http://www.eia-international.org/wp-content/uploads/The-Inside-Story-lo-res.pdf

Year: 2013

Country: International

Keywords: Endangered Species

Shelf Number: 128161


Author: Protection Project, Johns Hopkins Unviersity

Title: Child Protection Model Law. Best Practices: Protection of Children from Neglect, Abuse, Maltreatment, and Exploitation

Summary: In September 2009, The Protection Project at The Johns Hopkins School of Advanced International Studies started a joint project with the International Centre for Missing and Exploited Children to draft a Model Law on Child Protection aimed at protecting children from all forms of neglect, abuse, maltreatment, and exploitation. The project envisioned the holding of various expert group meetings globally to accompany the drafting process by identifying key issues of child protection in each region of the world and suggesting legislative solutions. The Model Law was written through six drafting stages – each version being carefully revised and expanded to reflect the discussions at the regional expert meetings. The final version of the Model Law incorporates international standards and best practices of child protection, based on the protection measures of the 1989 Convention on the Rights of the Child (CRC) and its two optional protocols from the year 2000, the Optional Protocol to the CRC on the sale of children, child prostitution and pornography (OPSC) and the Optional Protocol to the CRC on the involvement of children in armed conflict (OPAC). Over the course of the project, more than 400 national laws relating to child protection from over 150 countries were researched and analyzed to identify best practices.

Details: Washington, DC: The Protection Project, The Johns Hopkins University Paul H. Nitze School of Advanced International Studies (SAIS); Alexandria, VA: The International Centre for Missing & Exploited Children (ICMEC), 2013. 253p.

Source: Internet Resource: Accessed March 30, 2013 at: http://www.protectionproject.org/wp-content/uploads/2010/11/CP-Model-Law_Jan-2013_Final-w-cover.pdf

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 128172


Author: Morgera, Elisa

Title: Wildlife Law and the Empowerment of the Poor

Summary: There is a wide variety of interests to be balanced in wildlife management. These interests range from the conservation of biodiversity and specific endangered species and their habitats, to valuable opportunities in ecotourism or hunting tourism, to the needs and traditions of the local population relating to hunting and collection of animals or their product for cultural/religious practices. Although revenues from the wildlife sector may be considered irrelevant as a contribution to the national gross domestic product, wildlife’s influence on local economies can be significant. Some rural communities see wildlife as a source of food. Some see wildlife habitat as potential timber or farmland. And some see wildlife hunting or ecotourism as a source of cash. Good laws can provide a framework for good wildlife management. An appropriate legal framework can conserve wildlife while reducing poverty and increasing food security. Enacting effective legal reforms, though, remains challenging. In 2007–2008, FAO and the International Council for Game and Wildlife Conservation (CIC) reviewed legislation on wildlife management in Western and Central Asia. This review launched a regional dialogue on international obligations and standards on wildlife management, based on current challenges at national and regional levels. This regional initiative led to a set of design principles on how to develop effective national legislation on sustainable wildlife management (available at www.fao.org/legal). These principles sought to provide tools for the analysis of existing legal frameworks, as well as provide guidance for developing new legislation based on international standards and best practices. In addition, the principles aim to help decision-makers, legal drafters and resource managers to understand wildlife legislation, engage in participatory and interdisciplinary legislative drafting, and use legislation to support sustainable wildlife management for the empowerment of the poor and environmental sustainability. In 2009, FAO undertook to further refine these principles, taking into account the challenges faced and lessons learnt by wildlife legislators in other regions of the world. To this end, a series of regional studies examined the legislation of selected countries in Africa, Latin America, South-east Asia and Oceania.1 These studies analysed laws concerning wildlife tenure (ownership and use rights and obligations, links with land and forest tenure), public participation in wildlife decision-making and planning, and community-based wildlife management. The purpose was to identify legal tools that allow disadvantaged people to directly benefit from wildlife management, thereby improving food security, alleviating poverty, enhancing rural livelihoods and ultimately contributing to the legal empowerment of the poor.2 The studies also considered the strengths and weaknesses of current legal frameworks in promoting environmental sustainability and socio-economic development. The present study synthesizes and analyses the findings of the abovementioned regional legal reviews, identifies current trends and shortcomings, and singles out innovative legal solutions. On this basis, it also refines the design principles to develop effective national legislation on sustainable wildlife management, emphasizing the legal tools that empower the poor, particularly local and indigenous communities.

Details: Rome: Development Law Service, FAO (Food and Agriculture Organization of the United Nations) Legal Office, 2010. 340p.

Source: Internet Resource: FAO Legislative Study 103: Accessed March 30, 2013 at: http://www.fao.org/docrep/013/i1906e/i1906e00.pdf

Year: 2010

Country: International

Keywords: Biodiversity

Shelf Number: 128176


Author: International Fund for Animal Welfare (IFAW)

Title: Caught in the Web: Wildlife Trade on the Internet

Summary: The Internet has revolutionised our lives and opened up huge opportunities for doing business and communicating. However, it also provides increased opportunities for the unscrupulous or the criminal to operate, taking advantage of the unregulated and impersonal nature of transactions. The trade, both legal and illegal, in live and dead animals (including body parts) is increasing and the Internet is coming to play a central role in the activities of illegal traders. This trade has devastating implications for both wildlife conservation and animal welfare. Whole species risk being wiped out by over-exploitation. Millions of animals caught up in the trade suffer immensely and many die, resulting in yet more being taken from the wild. For this report, IFAW UK monitored the nature and scale of wildlife trade on the Internet over several months. We found that, each week, thousands of animals and animal parts – from live primates to stuffed polar bears, from giant ivory tusks to tiny dried seahorses – are being offered for sale on the Internet. IFAW found a shocking array of species for sale in which all commercial trade is legally prohibited or strictly regulated. Within an intensive one week survey, we found over 9,000 wild animal products and specimens and live wild animals for sale, predominantly from species protected by law. A further 122 traders were identified, each advertising an unspecified number of items – often in sizeable quantities. Our survey was limited to certain species and products, so the figures cited here represent only the tip of the iceberg of Internet trade in protected species. Illegal wildlife trade is now an arrestable offence in the UK and some aspects of the trade are classified as serious and organised crime. However, the increasing use of the Internet to organise illegal wildlife trade poses new challenges to legislators and enforcement agencies. The Government, the intelligence service and other enforcement agencies in the UK have recognised the problem and have already devoted resources to tackling it, although these are insufficient to deal with the apparent scale of the trade. Even establishing the actual scale of wildlife crime is complicated by the lack of truly reliable data and this is particularly the case in relation to Internet trade. A series of reports have called for a better understanding of how much illegal trading is organised over the Internet to assist in taking concerted action to disrupt criminal activity. The legal framework that applies to Internet trade in wildlife, including live animals, spans national, regional and international legislation relating to endangered species, animal welfare and Internet trading. Contemporary international law has fallen behind in its consideration of commercial Internet activity. Specific laws to combat abuses are not yet well developed at the international level, although there is a recognition that concerted action is best taken globally. Some individuals are taking advantage of this situation to perpetrate illegal wildlife trade. Whether or not traders are aware that they are breaking the law, the negative impact on endangered species and on the welfare of individual animals is the same. However, it is also currently far too difficult for those buyers and sellers wishing to act within the law to check what can be legally sold or to report suspect items. The information that is available is often inadequate and difficult to access. Auction sites on which wildlife is traded have taken very limited voluntary action to inform users or to facilitate reporting of potentially illegal wildlife items. The lack of information available on auction sites may be in part a consequence of the lack of gravity accorded to wildlife crime in general. This situation must be remedied urgently through statutory regulation. Attempts have been made to address the use of the Internet to commit or facilitate other types of crime. This report considers options for regulation and enforcement that have been applied in the areas of child pornography, online pharmacies and defamation. These provide valuable models for more effective and relevant regulation of wildlife trade. Good cooperation between enforcement agencies, both nationally and internationally, has delivered notable successes. Explicit campaigns enabling and encouraging users to report instances of ‘suspect’ material posted allow enforcement authorities to gain a far wider reach. International organisations have identified the need for closer connections between international law and domestic laws to further a more effective response to the diverting of drugs via Internet pharmacies. Better inter-agency cooperation and a better coordinated response from legislators would be useful in the fight against illegal wildlife trade organised on the Internet.

Details: London: IFAW, 2005. 41p.

Source: Internet Resource: March 15, 2019 at: https://s3.amazonaws.com/ifaw-pantheon/sites/default/files/legacy/Report%202005%20Caught%20in%20the%20web%20UK.pdf

Year: 2005

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 128198


Author: INTERPOL Environmental Crime Programme

Title: Project Web: An Investigation Into the Ivory Trade Over the Internet Within the European Union

Summary: INTERPOL’s Project Web was launched following studies by the International Fund for Animal Welfare (IFAW), which concluded that elephant ivory is the most widely traded wildlife product over the Internet. Project Web is intended to provide an initial snapshot and insight from a law enforcement perspective into the drivers, scale, nature, and involved entities of the illegal trade in ivory over the Internet. Over a period of two weeks, ten participating countries from the European Union (EU) conducted surveillance of their national auction sites to identify advertisements for ivory items. The details of 660 advertisements on 61 auction sites were analysed and estimated to have a total volume of around 4,500 kilograms of ivory and a total value of approximately EUR 1,450,000. Through analysis of its two week Internet surveillance data, Project Web found that ivory is predominantly sold by individuals residing in the country where they are selling the item, although a number of advertisements did have international links. Enforcement data from other sources was also analysed, but often could only provide a limited representative picture of the total volume of ivory illegally imported into the EU. In particular, Project Web identified through customs seizure analysis that the majority of ivory sold was in the form of worked items shipped from mainly four African countries. The ivory was predominantly traded through EU countries, with Asia as the destination. However, three EU countries and North America were also identified as common final destinations. The report also demonstrated that the enforcement of this electronic trade is in its infancy and presents new challenges. Few Internet companies have policies governing the sale of ivory, and those that do have weaknesses in enforcing their own regulations. Law enforcement participants also identified a lack of legislation as a weakness, specifically that governing the Internet trade of ivory and other wildlife products, and cited a lack of prioritisation at departmental and political levels. This can lead to the combination of a strongly profit driven illicit market with little risk of detection or prosecution. While Project Web demonstrates that the Internet is being used in the ivory trade, the extent to which the Internet is an important medium in the illegal trade cannot be conclusively determined with the existing legislation and available data. However, it is clear that specially adapted legislation and strong collaboration with customs is needed to further investigate this crime type, in order to determine the scale and nature of the illegal trade so that appropriate enforcement measures can be taken against it. To this end, the Project Web report also includes a number of recommendations to improve responses to the illegal trade of wildlife products online.

Details: Washington, DC: International Fund for Animal Welfare, 2013. 36p.

Source: Internet Resource: Accessed April 4, 2013 at: http://www.ifaw.org/sites/default/files/Project%20Web%20-%20PUBLIC.pdf

Year: 2013

Country: International

Keywords: Computer Crimes

Shelf Number: 128207


Author: Schwartz, Matthew

Title: Criminal Justice and Rule of Law Capacity Building to Counter Terrorism in Fragile Institutional Contexts: Lessons From Development Cooperation

Summary: This policy brief argues that aligning counterterrorism capacity-building agendas within a framework informed by the development cooperation experience could greatly enhance the effectiveness and sustainability of criminal justice and rule of law capacity assistance in general and in preventing terrorism specifically. After providing definitions of capacity and capacity building, this brief outlines the five basic principles of the OECD’s Paris Declaration on Aid Effectiveness as they relate to capacity development. The discussion then turns to how criminal justice and rule of law capacity building can contribute to countering terrorism and to mitigating conditions conducive to violent extremism by enhancing the capacity of weak state institutions to deliver equitable security and justice to all. It concludes by offering guidance based on best practices and lessons learned from past and ongoing capacity-building efforts in accordance with key themes presented over the course of the brief.

Details: Washington, DC: Center on Global Counterterrorism Cooperation, 2012. 11p.

Source: Internet Resource: Policy Brief: Accessed April 4, 2013 at: www.globalct.org

Year: 2012

Country: International

Keywords: Counter-Terrorism

Shelf Number: 128208


Author: Penal Reform International

Title: Women in Detention: A Guide to Gender-Sensitive Monitoring

Summary: Women in detention: a guide to gender-sensitive monitoring - is designed to help bodies monitoring places of detention incorporate a gender perspective into their work and to address the problem of violence against women and girls in detention. This guide introduces the UN Bangkok Rules and other relevant sources of international law to bodies monitoring places of detention, including National Preventive Mechanisms, and provides guidance on assessing risk factors and making recommendations to improve the protection of women against torture and other cruel, inhuman or degrading treatment or punishment.

Details: London: Penal Reform International, 2013. 22p.

Source: Internet Resource: Accessed April 4, 2013 at: http://www.penalreform.org/files/Women%20in%20Detention%20-%20a%20guide%20to%20gender%20sensitive%20monitoring_English_0.pdf

Year: 2013

Country: International

Keywords: Female Inmates

Shelf Number: 128209


Author: Hinton, Rachael

Title: Armed Violence Monitoring Systems

Summary: There is increasing global awareness that accurate and reliable data on the scope, scale, and causes of all forms of armed violence is vital for shaping policy, developing programmatic responses, and monitoring progress. Armed violence is strongly associated with negative development outcomes and slow progress towards the achievement of the Millennium Development Goals (Geneva Declaration Secretariat, 2011, p. 145).1 Over the past few years the realization that the development and security of a wide range of countries, cities, and citizens were threatened by armed violence led to a global agenda for the prevention and reduction of such violence (OECD, 2011, p. 11). This agenda identified a number of entry points and resulted in the engagement of an increasingly diverse spectrum of actors and players, including, for example, in the areas of conflict prevention, peacebuilding, crime prevention, and public health. In the context of their own agendas, various stakeholders acknowledge the importance of applying evidence-based policy-making through the improved measurement and monitoring of armed violence. Some have established mechanisms and tools for monitoring and research, such as observatories (on crime and violence) or armed violence monitoring systems (AVMSs) to better understand the extent and distribution of armed violence in a variety of geographic settings in low-, middle-, and high-income countries (Gilgen and Tracey, 2011).

Details: Geneva, SWIT: Small Arms Survey, 2013. 4 p.

Source: Internet Resource: Small Arms Survey Research Notes • Number 27: Accessed April 5, 2013 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-27.pdf

Year: 2013

Country: International

Keywords: Armed Violence

Shelf Number: 128283


Author: Burrowes, Nina

Title: The Rape and Sexual Assault of Men -- A Review of the Literature

Summary: This report provides a brief overview of all the literature on male rape and sexual assault that was published between 1990 and 2012. The report illustrates which topics are being researched and what the latest evidence-based practice is. The amount of information provided on each piece of literature is necessarily brief. This report is therefore a catalogue of the research and should be used to browse the published work and identify articles or chapters to read in full.

Details: London: Survivors UK, 2013. 63p.

Source: Internet Resource: Accessed April 5, 2013 at: http://www.survivorsuk.org/wp-content/uploads/2013/02/The-rape-and-sexual-assault-of-men_-A-review-of-the-literature.pdf

Year: 2013

Country: International

Keywords: Male Rape

Shelf Number: 128287


Author: Klimburg, Alexander, ed.

Title: National Cyber Security Framework Manual

Summary: As stated in the Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation of November 2010, NATO Member States have recognised that malicious cyber activities ‘can reach a threshold that threatens national and Euro-Atlantic prosperity, security and stability’.1 In order to assure the security of NATO’s territory and populations, the Alliance has committed to continue fulfilling its essential core tasks, inter alia, to deter and to defend against emerging security challenges, such as cyber threats.2 The revised NATO Policy on Cyber Defence of 8 June 2011 focuses NATO on the protection of its own communication and information systems in order to perform the Alliance’s core tasks of collective defence and crisis management.3 However, as cyber threats transcend State borders and organisational boundaries, the policy also stresses the need for cooperation of the Alliance with NATO partner countries, private sector and academia.4 NATO Member States reinforced the importance of international cooperation by stating in the Chicago Summit Declaration of May 2012 t hat ‘[t]o address the cyber security threats and to improve our common security, we are committed to engage with relevant partner countries on a case-by-case basis and with international organisations [...] in order to increase concrete cooperation.’5 Against this background, it is of paramount importance to increase the level of protection against cyber threats and to steadily improve the abilities to appropriately address cyber threats by Allies and NATO’s partner countries. The ‘National Cyber Security Framework Manual’ addresses national cyber security stakeholders in NATO Member States or NATO partner countries, including leaders, legislators, regulators and Internet Service Providers. It will serve as a guide to develop, improve or confirm national policies, laws and regulations, decisionmaking processes and other aspects relevant to national cyber security. Hence, this Manual will support NATO’s goal of enhancing the ‘common security’ with regard to ‘cyber security threats’, as expressed by the Allies in the aforementioned Chicago Summit Declaration. The implementation, maintenance and improvement of national cyber security comprises a range of elements. These can address strategic documents of political nature, laws, regulations, organisational and administrative measures, such as communication and crisis management procedures within a State, but also purely technical protection measures. Furthermore, awareness raising, training, education, exercises and international cooperation are important features of national cyber security. Thus, the aspects to be considered reach from the strategic through the administrative or operational to the tactical level. This Manual addresses all of those levels in the various sections, shows different possibilities of approaches to national cyber security, and highlights good practices within national cyber security strategies and techniques. This approach is based on the reasoning that States have different features and prerequisites with regard to their legal framework, historical and political contexts, governmental structure, organisational structures, crisis management processes, and mentality. Therefore, this Manual cannot provide a ‘blueprint’ which would be feasible and useful for all States, but rather shows diverse aspects and possibilities to be considered in the course of drafting a national cyber security strategy. Due to its rather academic approach – although being of practical use – and the incorporation of military aspects, the Manual differs from publications with a similar goal and target audience.

Details: Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2012. 253p.

Source: Internet Resource: Accessed April 5, 2013 at: http://www.ccdcoe.org/publications/books/NationalCyberSecurityFrameworkManual.pdf

Year: 2012

Country: International

Keywords: Cybercrime

Shelf Number: 128289


Author: Stevens, Alex

Title: Applying Harm Reduction Principles to the Policing of Retail Drug Markets

Summary: The policing of drug markets is usually conceptualised primarily as a matter of law enforcement – drug dealers and people who use drugs (PWUDs) are breaking the law, and the role of the police is to reduce such law breaking. However, the wider purpose of policing is to ensure the safety of the community by reducing harms to its members. This report examines the interaction between law enforcement and harm reduction in the policing of retail level drug markets. Key Points: • The level of harm is more important than the size of the market. • Visible, open air drug markets tend to be more harmful per unit of use than hidden, closed drug markets • Policing tactics that are not experienced by the community as being fair, lawful and effective will harm police legitimacy and community relations. • Some enforcement-led approaches, including short-term crackdowns and large scale stop and search, are unlikely to produce sustainable reductions in drug sales. They may increase levels of violence and health harms and reduce police legitimacy. • It is rarely possible to eliminate retail drug markets, but well designed and implemented policing tactics can force the drug market to take less harmful forms. • Applying harm reduction principles to drug policing may boost police legitimacy as well as community safety. • Focused deterrence and ‘pulling levers’ may reduce both harm and crime, but this depends on the context and on careful implementation and evaluation.

Details: London: International Drug Policy Consortium, 2013. 15p.

Source: Internet Resource: Modernising Drug Law Enforcement
Report 3: Accessed April 6, 2013 at: http://dl.dropbox.com/u/64663568/library/MDLE-report_3_applying-harm-reduction-to-policing-of-retail-markets.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 128303


Author: United Nations Development Programme

Title: Informal Justice Systems: Charting a Course for Human Rights-Based Engagement

Summary: until recently, informal justice systems (ijs) were relatively invisible in development partner-assisted justice interventions. yet, ijs form a key part of individuals’ and communities’ experience of justice and the rule of law, with over 80 percent of disputes resolved through informal justice mechanisms in some countries.1 ijs may be more accessible than formal mechanisms and may have the potential to provide quick, relatively inexpensive and culturally relevant remedies. given this central role and increasing government and partnering donor interest in ijs, it is key to build an understanding of ijs and how best to engage with them for the strengthening of human rights, the rule of law and access to justice. in many countries, there is a prevalence of ijs, which demands that governments and development partners take these systems more seriously, especially with regard to ijs and women’s and children’s rights. this does not mean that development organizations should promote ijs at the expense of a functioning unitary legal order or that they should oppose the existence of ijs. rather, it is recognition that ijs are an empirical reality, albeit a complicated one. at the same time, growing numbers of countries are requesting un assistance to engage with ijs and strengthen their ability to provide justice and legal protection. the un’s approach to engagement on rule of law and access to justice is as an effort to ensure international norms and standards for all who come into contact with the formal and informal justice system, including victims, witnesses or alleged offenders. ijs are complex and deeply varied; many drawing their normative structures and legitimacy from the local communities and society in which they operate. the un does not presume that engagement with ijs can adopt a ‘one-size-fits-all’ approach. like all legal mechanisms, ijs function within changing societies and communities and can be responsive to the particular individual circumstances of a case in the application of cultural norms. the obligation to respect, protect and fulfil human rights, including through the provision of justice and legal remedies, extends to formal and informal systems alike. Both types of justice systems can violate human rights, reinforce discrimination, and neglect principles of procedural fairness. ijs in many contexts deal with issues that have a direct bearing on the best interests of women and children, such as issues of customary marriage, custody, dissolution of marriage, inheritance and property rights. the operative questions surrounding ijs and the rights of women and children are significant. While it is especially important to note that the structures, procedures and substantive decisions of some ijs neither safeguard nor promote women’s rights and children’s rights, the existence of ijs does not of itself contravene international human rights principles. indeed, ijs can provide avenues for the delivery of justice and the protection of human rights, particularly where formal justice systems lack capacity, and ijs can enjoy widespread community legitimacy and support. the study seeks to identify how engagement with ijs can build greater respect and protection for human rights. it highlights the considerations that development partners should have when assessing whether to implement programmes involving ijs, the primary consideration being that engagement with the ijs neither directly nor inadvertently reinforces existing societal or structural discrimination – a consideration that applies to working with formal justice systems as well. the study also examines the value of ijs in offering, in certain contexts, flexible structures and processes, cost-effectiveness and outreach to grassroots communities.

Details: New York: UNDP, UN Women: UNICEF, 2013. 398p.

Source: Internet Resourse: Accessed April 6, 2013 at: http://www.unwomen.org/wp-content/uploads/2013/01/Informal-Justice-Systems-Charting-a-course-for-human-rights-based-engagement-Full-Study.pdf

Year: 2013

Country: International

Keywords: Dispute Resolution

Shelf Number: 128305


Author: Fink, Naureen Chowdhury

Title: Mastering the Narrative: Counterterrorism Strategic Communication and the United Nations

Summary: Terrorism has always been a battle of ideas, reflecting a desire for violent and immediate political transformation. The technologies available in a globalized world today, however, have expanded the theater of conflict into a broader swath of spaces—governed, less governed, virtual—than ever. Groups such as al-Qaida have articulated a clear mission statement and excelled at strategic communication, crafting messages based on audience perceptions and including actions as well as words. Yet, extremists do not constitute a monopoly in the marketplace of ideas. States and international organizations provide their own narratives that shape identities, relationships, and interactions among peoples and states, but they have often struggled to challenge extremist messages and draw on their own compelling stories. This should not be the case. The United Nations is the only international organization to boast universal membership and has spent more than six decades promoting sustainable development, promoting human rights and the rule of law, strengthening governance, and supporting representative government. Member states have worked together to mitigate violent conflict, support humanitarian assistance, and address threats to human security. The organization has a good story to tell, a powerful counternarrative to that proclaimed by extremist groups. Yet, does the story get out and reach key audiences outside and inside the United Nations? This report presents a qualitative analysis of how strategic communication principles can strengthen international efforts to address terrorism and violent extremism. The report examines the evolution of the challenge and draws on discussions with officials, diplomats, and experts to offer a series of recommendations for enhancing strategic communications on counterterrorism. While this study focuses on the United Nations, the key principles and recommendations may also be applicable to governments and international organizations confronting this complex transnational threat.

Details: Washington, DC: Center on Global Counterterrorism Coooperation, 2013 56p.

Source: Internet Resource: Accessed April 6, 2013 at: http://www.globalct.org/publications/mastering-the-narrative-counterterrorism-strategic-communication-and-the-united-nations/

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 128312


Author: Berger, J.M.

Title: Who Matters Online: Measuring influence, evaluating content and countering violent extremism in online social networks

Summary: It is relatively easy to identify tens of thousands of social media users who have an interest in violent ideologies, but very difficult to figure out which users are worth watching. For students of extremist movements and those working to counter violent extremism online, deciphering the signal amid the noise can prove incredibly daunting. This paper sets out a first step in solving that problem. We have devised a scoring system to find out which social media accounts within a specific extremist circle were most influential and most prone to be influenced (a tendency we called exposure). Our starting data centered on followers of 12 American white nationalist/white supremacist “seed†accounts on Twitter. We discovered that by limiting our analysis to interactions with this set, the metrics also identified the users who were highly engaged with extremist ideology. Within our total dataset of 3,542 users, only 44 percent overtly identified themselves as white nationalists online. By measuring interactions alone—without analyzing user content related to the ideology—we narrowed the starting set down to 100 top-scoring accounts, of which 95 percent overtly selfidentified as white nationalist. Among the top 200, 83 percent self-identified, and for the top 400, the self-identification rate was 74 percent. A comparison analysis run on followers of anarchist Twitter accounts suggests the methodology can be used without modification on any number of ideologies. Because this approach is entirely new (at least in the public sphere), the paper spends some time discussing the methodology and findings in some detail, before concluding with a series of recommendations for countering violent extremism (CVE) based on the findings. The key terms for understanding the recommendations are: • Influence: The tendency of a user to inspire a measurable reaction from other users (such as a replies or retweets). • Exposure: The flip side of influence, this is the tendency of a user to respond to another user in a measurable way. • Interactivity: The sum of influence and exposure scores, roughly representing how often a user interacts with the content of other users. Our key findings include: • Influence is highly concentrated among the top 1 percent of users in the set. • High scores in both influence and exposure showed a strong correlation to engagement with the seed ideology (white nationalism in our primary analysis, and anarchism in a secondary analysis). • Interactivity, the sum of influence and exposure scores, was even more accurate at identifying users highly engaged with the seed ideology. In the course of collecting the data needed to measure influence and exposure, we incidentally collected a large amount of data on hashtags and links used by people who follow known white nationalists on Twitter. When we examined this data, we discovered that members of the dataset were highly engaged with partisan Republican and mainstream conservative politics. The paper presents a significant amount of context needed to properly evaluate this finding. Working from these findings, the paper makes several recommendations for new CVE initiatives with a focus on NGO efforts, which was the purpose of this research, although we recognize our findings will likely have utility for government efforts in this sphere as well. Our recommendations include: • We believe these metrics offer ways to concretely measure which types of CVE approaches are effective and which are not, bringing some clarity to a realm where strategies are often wishful and based on assumptions, while conclusions are often anecdotal and inconclusive. • The concentration of influence among a very few users suggests that disruptive approaches and countermessaging should be targeted to the top of the food chain, rather than working with the larger base of users. • Our analysis found that the seed accounts—all wellknown white nationalist ideologues and activists—were not necessarily producing the most popular content and links to external Web sites. The collected data can be used to find the most important external content sources, and target them for disruption through terms-of-service violation reporting, or through counter-messaging. • By tracking these metrics on an ongoing basis, NGO efforts to counterprogram against extremist narratives can be evaluated to measure how many users adopt or respond to counter-messaging content, and how much influence accrues to different kinds of positive messaging. • Since the data suggests white nationalists are actively seeking dialogue with conservatives, CVE activists should enlist the help of mainstream conservatives, who may be considerably more successful than NGOs at engaging extremists with positive messaging. Further research may also suggest avenues for engagement between other kinds of extremists and other mainstream political and religious movements. Finally, we believe that these metrics are only a starting point for the study of extremist use of social media. We believe the metrics and approaches here can be further refined, and we believe that additional research may yield substantial new techniques for monitoring and countering the promotion of violent ideologies online.

Details: London: International Centre for the Study of Radicalisation and Political Violence (ICSR), King's College London, 2013. 56p.

Source: Internet Resource: Accessed April 9, 2013 at: http://icsr.info/wp-content/uploads/2013/03/ICSR_Berger-and-Strathearn.pdf

Year: 2013

Country: International

Keywords: Extremists Groups

Shelf Number: 128326


Author: Banks, Debbie

Title: Environmental Crime: A threat to our future

Summary: Since its inception in 1984 the Environmental Investigation Agency has been exposing environmental crime around the globe and has sought greater political support for strong enforcement action against these crimes. Yet despite the fact that environmental crime poses a growing threat, it remains a low priority for the international enforcement community. This report shows the scale and impacts of environmental crime and calls for strong political will to tackle it as a matter of urgency. Environmental crimes can be broadly defined as illegal acts which directly harm the environment. They include: illegal trade in wildlife; smuggling of ozonedepleting substances (ODS); illicit trade in hazardous waste; illegal, unregulated, and unreported fishing; and illegal logging and the associated trade in stolen timber. Perceived as ‘victimless’ and low on the priority list, such crimes often fail to prompt the required response from governments and the enforcement community. In reality, the impacts affect all of society. For example, illegal logging contributes to deforestation. It deprives forest communities of vital livelihoods, causes ecological problems like flooding, and is a major contributor to climate change – up to one-fifth of greenhouse gas emissions stem from deforestation. Illicit trade in ODS like the refrigerant chemicals chlorofluorocarbons (CFCs), contributes to a thinning ozone layer, which causes human health problems like skin cancer and cataracts. Environmental crime generates tens of billions of dollars in profits for criminal enterprises every year, and it is growing. In part, this is due to the proliferation of international and regional environmental agreements, leading to more controls on a range of commodities. It is also due to mutations in the operations of criminal syndicates, which have been diversifying their operations into new areas like counterfeiting and environmental crime. Environmental crimes by their very nature are trans-boundary and involve cross-border criminal syndicates. A tiger skin or an ivory tusk passes through many hands from the poaching site to the final buyer. A tree felled illegally can travel around the world from the forest via the factory to be sold on the market as a finished wood product. In the era of global free trade, the ease of communication and movement of goods and money facilitate the operations of groups involved in environmental crime. The development of statutory enforcement agencies has struggled to keep pace with such change, and issues such as jurisdiction restrict efforts to foster better cross-border cooperation against crimes like illegal logging. These factors lead to a situation where environmental crimes offer high profits and minimal risk. It is time for the international community to wake-up to the menace of environmental crime and show the necessary political will to tackle the criminal gangs plundering our planet for a quick profit.

Details: London: Environmental Investigation Agency, 2008. 28p.

Source: Internet Resource: Accessed April 9, 2013 at: http://www.unodc.org/documents/NGO/EIA_Ecocrime_report_0908_final_draft_low.pdf

Year: 2008

Country: International

Keywords: Environmental Crimes

Shelf Number: 128333


Author: Amnesty International

Title: Death Sentences and Executions 2012

Summary: Despite some negative developments, the use of the death penalty in 2012 overall confirmed the global trend towards abolition. The USA was the only country in the Americas to have carried out executions in 2012. However, just nine states in the USA carried out executions in 2012, compared to 13 in 2011. Connecticut became the 17th abolitionist US state. Despite setbacks in the Asia-Pacific region – including the resumption of executions in India and Pakistan – Viet Nam did not carry out death sentences and Singapore observed a moratorium on executions while considering amendments to its death penalty laws. In sub-Saharan Africa, further progress was visible. The government of Ghana plans to abolish the death penalty in the new Constitution. There are no more prisoners on death row in Sierra Leone. Belarus continued to be the only country in Europe and central Asia to carry out executions. Legislation to remove the death penalty completely came into effect in Latvia in January, making it the 97th country abolitionist for all crimes worldwide. In December the UN General Assembly adopted the fourth resolution on a moratorium on the use of the death penalty, with 111 Member States voting in favour. This report analyzes some of the key developments in the application of the death penalty in 2012, presenting figures gathered by Amnesty International on the number of death sentences handed down and executions carried out during the year. Amnesty International opposes the death penalty in all cases without exception, regardless of the nature or circumstances of the crime; guilt, innocence or other characteristics of the individual; or the method used by the state to carry out the execution.

Details: London: AI, 2013. 68p.

Source: Internet Resource: Accessed April 12, 2013 at: http://www.amnestyusa.org/sites/default/files/worlddpreport2012.pdf

Year: 2013

Country: International

Keywords: Capital Punishment

Shelf Number: 128344


Author: Mancini, Francesco, ed.

Title: New Technology and the Prevention of Violence and Conflict

Summary: There are now 6 billion cell phone subscriptions in the world, and one third of the world’s population is online. These numbers are growing rapidly, particularly in the developing world, and they demonstrate an unparalleled level of global interconnectivity. They also point to the unprecedented amount of data that we are generating while using new information and communication technologies (ICTs): in 2012 alone, humans generated more data than over the course of their entire history. This report explores the ways in which ICTs and the data they generate can assist international actors, governments, and civil society organizations to more effectively prevent violence and conflict. It examines the contributions that cell phones, social media, crowdsourcing, crisis mapping, blogging, and big data analytics can make to short-term efforts to forestall crises and to long-term initiatives to address the root causes of violence. Five case studies assess the use of such tools in a variety of regions (Africa, Asia, Latin America) experiencing different types of violence (criminal violence, election-related violence, armed conflict, shortterm crisis) in different political contexts (restrictive and collaborative governments). The cases demonstrate clearly that employing new technologies for conflict prevention can produce very different results depending on the context in which they are applied and whether or not those using the technology take that context into account. This is particularly true in light of the dramatic changes underway in the landscapes of violence and conflict on a global level. As such, instead of focusing on supply-driven technical fixes, those undertaking prevention initiatives should let the context inform what kind of technology is needed and what kind of approach will work best. With this in mind, lessons and insights from across the cases point to seven promising steps for strengthening prevention efforts that involve new technologies. 1. Even if you crowd-source your hammer, not every problem is a nail. New technologies have the potential to make huge contributions to violence- and conflictprevention efforts, but they are not a panacea for holistic solutions. International organizations and governments should examine all the tools at their disposal for preventing conflict, and civil society organizations should not be blinkered by their particular thematic focus. 2. Consider the context. The cases show that socioeconomic, cultural, and demographic factors will all influence whether technology can have a positive impact, which technology would be appropriate, and how technologies could or should be combined. International organizations and governments should make needs assessments and feasibility studies that address these factors standard practice. Civil society organizations should also include such needs assessments or conflict and peace assessments in their proposals when seeking funding from donors. 3. Do no harm. Failure to consider the possible knock-on effects of applying a specific technology can lead to fatal outcomes in violent settings. Spoilers also leverage new technologies to incite violence, promote conflict, and perpetrate crimes. As such, a conflict-sensitive approach remains vital from conception to completion of any initiative involving new technologies. As part of project design and implementation, every actor should identify possible spoilers, conduct a cost-benefit analysis that incorporates levels of risk, develop mechanisms to mitigate risks, and create contingency plans. 4. Integrate local input throughout, and don’t reinvent the wheel. Examples abound where an absence of local input meant there was a lack of buy-in from the affected communities, project financing was unsustainable, the credibility of the information collected was questionable, or there was duplication of work. Once a project is underway, continual consultation with and involvement of the affected community is vital. In general, the application of new technological tools to prevention efforts at the local level works best when integrated into existing civil society initiatives. 5. Use technology to help information flow horizontally more than vertically. Horizontal citizen-to-citizen ICT initiatives can help to connect more “warners†and “responders†more quickly and closer to the crisis. They can also contribute to communities’ resilience in the long term. International organizations should consider supporting spontaneous microinitiatives in this area, provide funding to develop local capacity, improve connectivity between different initiatives, and help the sharing of best practices. Civil society organizations should identify and reward skilled individuals and groups in local communities who can adopt new technologies for preventing violence and conflict. 6. Establish consensus regarding ownership, use, and sharing of information. New technologies make it possible for international organizations and government agencies to acquire more information and more granular information to inform prevention efforts. International organizations, governments, and civil society actors should establish consensus around questions of privacy, access, and use of digital data in any given initiative. This will make prevention efforts more legitimate in the eyes of the affected communities, and ultimately more effective. 7. Foster partnerships for better results. There are indications that prevention initiatives that drew on the complementary strengths of international donors, governments, the private sector, and civil society proved more effective. International organizations and governments are well placed to foster such partnerships and should invest in doing so for more promising results. Given the frequent paralysis at national and international levels when it comes to preventing conflict, the empowerment of individuals to participate in conflict-prevention initiatives in their own communities and societies may be one of the most significant innovations created by advances in technology. This is particularly true when it comes to bridging the persistent gulf between warning and response. Much more research is needed to assess how ICT can be used to generate action at the local level, as well as to inform or warn. In the long run, however, the most effective approach to using new technologies for conflict prevention may well be the one needed in prevention more broadly: one that successfully balances both grassroots, decentralized efforts and the more rationalized and coordinated activities of governments and international organizations.

Details: New York: International Peace Institute, 2013. 104p.

Source: Internet Resource: Accessed April 12, 2013 at: http://reliefweb.int/sites/reliefweb.int/files/resources/ipi-e-pub-nw-technology-conflict-prevention-advance.pdf

Year: 2013

Country: International

Keywords: Cell Phones

Shelf Number: 128347


Author: United Nations Office on Drugs and Crime. Global SMART Programme

Title: The Challenge of New Psychoactive Substances

Summary: UNODC launched the Global Synthetics Monitoring: Analyses, Reporting and Trends (SMART) Programme in September 2008. The Programme seeks to enhance the capacity of Member States and authorities in priority regions, to generate, manage, analyse and report synthetic drug information, and to apply this scientific evidence-based knowledge to design the policies and programmes. The Global SMART Programme is being implemented in a gradual phased manner, with East Asia being the first focus priority region. Operations in Latin America started in 2011. This report is the first global situation assessment on new psychoactive substances put forward under the Global SMART Programme and pursuant to Commission on Narcotic Drugs Resolution 55/1 on “Promoting international cooperation in responding to the challenges posed by new psychoactive substancesâ€, which requested the United Nations Office on Drugs and Crime to provide an update to its 2011 report entitled “Synthetic cannabinoids in herbal productsâ€, addressing a wider range of new psychoactive substances, in addition to synthetic cannabinoids, and to take into consideration the creation of a compilation of new psychoactive substances encountered by Member States, to serve as an early warning advisory. It constitutes the first step in providing consolidated up to-date analysis, based primarily on the information shared by Member States and the International Collaborative Exercise network of drug analysis laboratories. It is hoped that the information on new psychoactive substances presented in this report will make a practical contribution to addressing the significant threat posed by the manufacture, trafficking and use of these substances throughout the world, and place policymakers in a better position to evaluate the drug situation, and to make informed decisions on intervention and prevention strategies. This report provides an overview of the situation throughout the world. It outlines the emergence of different groups of new psychoactive substances in the regions and highlights several key issues associated with these substances, including reported adverse effects associated with their use, the challenges for the identification of these substances and their subsequent control through legislation. While the information presented points towards increasing efforts by the countries to address the NPS problem, it also highlights the need for continued and joint efforts, both at the national as well as regional levels. It is hoped that this report will contribute to a better understanding of the NPS problem and in developing effective strategies to address it.

Details: Vienna: Laboratory and Scientific Section United Nations Office on Drugs and Crime, 2013. 122p.

Source: Internet Resource: Accessed April 16, 2013 at: http://www.unodc.org/documents/scientific/NPS_2013_SMART.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 128358


Author: Wille, Christina

Title: Operating in Insecurity. Shifting patterns of violence against humanitarian providers and their staff

Summary: This report identifies the following trends over the last 15 years: • The proportion of national staff affected by all types of security events has increased among all types of humanitarian aid providers (UN, Red Cross, and INGOs), an effect that is particularly strong during periods of active fighting. This suggests that the exposure to the most dangerous environments has been increasingly transferred to national staff members. The trend is slightly less apparent among INGOs than for UN and Red Cross agencies. • The proportion of international female staff members who experience severe security events has decreased, even though absolute numbers have risen. The reason for this remains unclear. • In contrast to INGOs, the proportion of security events affecting the UN and the Red Cross over time has fallen in some contexts and risen in others. The proportion of events affecting the UN has decreased in rural areas and during road travel. However, in urban areas and during periods of active fighting, UN agencies continue to experience security events in above average proportions. We interpret this trend as indicating that the UN’s security policies have succeeded in limiting staff exposure in areas of wellknown risk (in rural areas and on the road) through a variety of measures. Nonetheless, these figures highlight continued exposure to insecurity in specific areas, particularly in cities and during periods of active fighting between conflict parties. • The proportion of security events affecting Red Cross agencies in rural areas has fallen, but their proportion of security events occurring during travel on the road remains high. The Red Cross also experiences a high proportion of severe security events during periods of active fighting and in urban contexts. We suggest that this reflects the ICRC’s and National Societies’ presence during periods of active fighting, as well as their continued travel to hot spots to access people in need. • Across all contexts, INGOs continue to bear the greatest share of security events. This is particularly true in rural areas and during road travel, and slightly less so in urban areas and during active fighting. We interpret this as reflecting an increased INGO presence in areas of sustained assistance, in particular in rural areas, but cannot judge to what extent security measures and intentional targeting by perpetrators influences this trend. • Overall we believe that the pattern of security events suggests an overall increase in humanitarian presence in highly insecure places. This, in turn, affects their exposure and vulnerability to violence and insecurity, and might influence perpetrator intention as well.

Details: Corsier-sur-Vevey, Switzerland: Insecurity Insight, 2013. 27p.

Source: Internet Resource: Insecurity Insight Report 13-1; Accessed April 16, 2013 at: http://www.insecurityinsight.org/files/Report_13_1_Operating_in_Insecurity.pdf

Year: 2013

Country: International

Keywords: Humanitarian Aid Workers

Shelf Number: 128377


Author: Hartelius, Jonas

Title: Narcoterrorism

Summary: The concept of “narcoterrorism†was introduced in 1983 by the Peruvian President Belaunde Terry to designate terroristâ€like attacks against his country’s drug enforcement police. Drug criminals utilized methods from political assailants to influence the politics of the country by causing terror and obstructing justice. Later, ideology-driven terrorist organizations took up illegal drug trade as a source of income. Over the years, several definitions of “narcoterrorism†have been introduced. The widest definition is given by the Oxford dictionary (1999): “Terrorism associated with the trade in illicit drugsâ€. It does not indicate whether ideological and political or, criminal and commercial motives are the main driving factors. The simplest way of describing narcoterrorism is, perhaps, as a part of an illegal complex of drugs, violence and power, where the illegal drug trade and the illegal exercise of power have become aggregated in such a way that they threaten democracy and the rule of law. The manifestations of narcoterrorism are manifold and far reaching: increased drug production; wide spread abuse of drugs; serious drug-related crime; threats to the rule of law, public security, and public health; money laundering; infiltration of the legal economy; and financing of terrorism. It has been estimated that the FARC guerilla of Colombia has a net profit from drugrelated crime (including the “taxation†and “protection†of the illegal cocaine trade) of at least 300 million USD every year. The annual total income from the drug trade for movements such as alâ€Qaeda has been estimated by the U.N. to be 2.4 billion USD. Twelve of the 28 organizations, which in October 2001 were listed as terrorist organizations by the U.S. State Department, were stated to be involved in the illegal drug trade, ranging from Sendero Luminoso of Peru to the “Tamil Tigers†of Sri Lanka. Narcoterrorism represents another step in the development of organized drug crime in the postwar period. It surpasses the traditional drug syndicates and drug cartels in being much more autonomous and having paramilitary strength. Yet another step is represented by “narcostatesâ€. A narcostate is a state (or region), where the operators of the drug trade through their economic, political and paramilitary strength influence the exercise of power by the central government. Current examples are Afghanistan and Colombia. The debate on countermeasures against narcoterrorism is parallel to the debate on countermeasures against the global illegal drug trade. The consumer countries, who are mainly industrial or post-industrial countries, locate the problem with the producer countries and their production and distribution of illegal drugs. They call for elimination of the problem “at sourceâ€, e.g. by crop replacement or by police and customs action against the illegal production and distribution of drugs. The producer countries, who mainly are developing countries, point to the demand in the consumer countries as the driving force for the illegal trade. They call for the consumer countries to reduce their demand in order to dry up the industry, e.g. by prevention, treatment and local drug enforcement.

Details: New York: EastWest Institute; Stockholm, Swedish Carnegie Institute, 2008. 36p.

Source: Internet Resource: Policy Paper 3/2008: Accessed April 16, 2013 at: mercury.ethz.ch

Year: 2008

Country: International

Keywords: Drug Trafficking

Shelf Number: 128380


Author: Asha, Omar

Title: Khat -- A Drug of Growing Abuse

Summary: The National Association of Somali Women in Sweden and together with the Swedish National Association of Immigrants Against Drugs (SIMON) have taken educational mat erial. Our purpose is to stop the spread of drugs by using the force of knowledge and personal involvement. In order to create a strong public opinion against khat and to support individual khat abusers, it is necessary to have basic knowledge about khat, about its history, about the development of a drug dependence, about consequences of khat abuse for the family and the economy etc. In this booklet we write frankly about khat, about our views on drugs and about how the drug abuser is affected by his or her abuse. We approach the topic step by step with the aim of assisting group discussions founded on fact-based material. The purpose of this study material, Khat – a drug of growing abuse, is to enable discussions and thinking about the khat drug.

Details: Brussels: Europe Against Drugs, 2008. 19p.

Source: Internet Resource: Accessed April 16, 2013 at: http://www.eurad.net/filestore/PDF/Khatpublication.pdf

Year: 2008

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 128381


Author: Lowther, Jason

Title: Crime and Punishment in the Wildlife Trade

Summary: The attitude of the UK’s legal system towards the ever-increasing illegal wildlife trade is inconsistent. It does not adequately reflect the nature and impact of the crimes, and it is erratic in its response. The result is that the courts perceive wildlife crime as low priority, even though it is on the increase. Having said that, there are positive indications that change is taking place, thanks largely to increased political awareness of environmental issues, and increased lobbying by nongovernmental organisations. The United Kingdom’s laws regulating the trade in wildlife reflect a tripartite system of control encompassing international, European Community (EC) and our own domestic legislation. Within each tier is the potential for difference in implementation, and while the EC is a strong centralising force, for the member states there remain discrepancies in implementation and practice. While the UK has a legislative framework that is generally supportive of the fight against wildlife trade crime, it lacks effectiveness in some areas because it allows the imposition of low penalties in the majority of prosecuted cases. Not only that, but there are also only limited provisions for “joined-up” working between the principal agencies involved in bringing such cases to court. This relative ineffectiveness does not derive from lack of effort on the part of the enforcing authorities, but rather by laws which, in theory and in practice, do not provide an appropriate deterrent to offenders. There is an apparent lack of seriousness attached to wildlife trade offences. This is surprising, given the potentially high rewards at stake for very little risk of detection and penalty, and because of the seriousness of their impact on species sustainability. Issues of seriousness and tolerance need to be examined, so that public and judicial attitudes towards such offences can be re-shaped. One response to this challenge would be to make offences under the Control of Trade in Endangered Species (Enforcement) Regulations 1997 (COTES) arrestable. This change in the law would give the police increased powers and would enable enforcement agencies to take more effective action against wildlife criminals. At the same time it would rightfully acknowledge the seriousness of the illegal trade itself. This would not be out of line with offences committed under the Customs and Excise Management Act 1979 (CEMA) which are arrestable: indeed, it would incorporate an element of certainty into the law that is at present missing. Compared with other jurisdictions, the UK has a relatively well-developed system of laws. However, it does not compare favourably with the US, where custodial sentences are often imposed for wildlife trade offences and levels of fines are higher. The UK has the potential to impose higher penalties, but chooses not to. Now, our membership of the EU and the free market without borders offers important opportunities to frame effective law, but presents a challenge in terms of greater internal control. The illegal wildlife trade has immeasurable impacts that can potentially affect biodiversity through the loss of endangered species. These impacts are not adequately taken into account by the courts when cases are prosecuted. One way of addressing this would be to develop and issue effective sentencing guidelines. At present, no specialised guidance or awareness training is given to judges or magistrates, many of whom will rarely come across wildlife trade offences because prosecutions are so infrequent. In addition, the present system of precedent-based guidance in the UK is insufficient, given the very few cases that reach the higher courts It would therefore be useful for those who impose sentences to have guidelines at their disposal. These could be along the lines of those already developed for certain environmental offences, such as water pollution, where issues affect human quality of life. These have succeeded in raising the perception of the seriousness of environmental offences, and there is no reason why similar guidelines may not be successful in relation to wildlife trade offences. Overall, there are varying and inconsistent approaches to the law by enforcement and other agencies, as there are in terms of the imposition of penalties for illegal wildlife trade. This raises doubts about any deterrent value. Of course, the fear of a severe penalty is not a sufficient deterrent in itself – the potential offender must realise at the outset that there is a certainty of detection and arrest, and that the authorities will prosecute. At present, this is unlikely. The risks that wildlife offenders take are minimal, and the rewards extremely high, when balanced against the chance of getting caught and the likely penalty that would be imposed.

Details: Godalming, Surrey, UK: World Wildlife Fund - UK, The Species Programme, 2002. 41p.

Source: Internet Resource: Accessed April 17, 2013 at: http://www.wwf.org.uk/filelibrary/pdf/crime_and_punishment.pdf

Year: 2002

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 111723


Author: Fink, Naureen Chowdhury

Title: The Roles of Women in Terrorism, Conflict, and Violent Extremism Lessons for the United Nations and International Actors

Summary: This policy brief explores the conceptual and operational challenges in integrating a gender dimension into counterterrorism policy and programming and offers a set of recommendations for the United Nations and other actors to consider when developing effective and sustainable counterterrorism efforts.

Details: Goshen, IN: Center on Global Counterterrorism Coooperation, 2013. 18p.

Source: Internet Resource: Policy Brief: Accessed April 18, 2013 at: http://www.globalct.org/wp-content/uploads/2013/04/NCF_RB_LS_policybrief_1320.pdf

Year: 2013

Country: International

Keywords: Extremist Groups

Shelf Number: 128409


Author: Santos, Anna

Title: Do Wildlife Trade Bans Enhance or Undermine Conservation Efforts?

Summary: The billion dollar businesses of both legal and illegal wildlife trade show little decline and continue to pose major threats to global biodiversity. Despite international wildlife trade bans such as the Appendix I listing of the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), the illegal trade of wildlife undermines conservation efforts. Evidence has shown that Appendix I listing can inadvertently increase black market prices and trade of wildlife. However, examples of national scale bans combined with CITES restrictions can decrease wildlife trade activity. More collaboration and integrative measures between global, national and local institutions are needed to combat wildlife trade issues.

Details: College Station, TX: Applied Biodiversity Science NSFâ€IGERT, Texas A&M University, 2011. 16p.

Source: Internet Resource: Accessed April 18, 2013 at: http://biodiversity.tamu.edu/files/2012/08/ABS_Perspectives-1_3_Santos_etal.pdf

Year: 2011

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 128417


Author: Painter, Anthony

Title: Democratic Stress, the Populist Signal and Extremist Threat: A call for a new mainstream statecraft and contact democracy

Summary: The rise of populism seen across Europe and the US is exposing old and hidden fault-lines in democratic systems. Mainstream parties seem powerless to respond to basic popular anxieties. Many appear blind to the reality that elite political projects have run their course. Democracy is under considerable stress – and fissures are opening up out of which new forms of populism and extremism have emerged. And yet populists are routinely dismissed as ‘protest’ parties, ‘clowns’ and ‘flashes in the pan’. In fact, real demand exists for Europe’s populists – of different kinds – and they must be seen as serious challenger movements that the established parties ignore at their peril. Today, Policy Network launches a significant new report entitled “Democratic stress, the populist signal and extremist threatâ€. The report is based on a substantial European research project which has over the past 8 months investigated campaigns, policies and political approaches targeted at populism and extremism at the national, local and neighbourhood levels. Working with a wide range of politicians, experts, campaigners, academics and public officials, it has considered how parties – of the left and right – have responded to their different manifestations in countries across Europe. The final report identifies where mainstream politics has failed to date and sets out a strategic evaluation of how the antagonistic and corrosive aspects of populist impulses and identity politics can be resisted and defeated. The conclusion sets forward an approach blending 'statecraft' and 'contact democracy', with case-study examples.

Details: London: Policy Network/ Barrow Cadbury Trust, 2013. 56p.

Source: Internet Resource: Accessed April 22, 2013 at: http://www.policy-network.net/

Year: 2013

Country: International

Keywords: Extremist Groups

Shelf Number: 128430


Author: International Organization for Migration (IOM)

Title: Children on the Move

Summary: Millions of children are on the move, both within and between countries, with or without their parents. The conditions under which movement takes place are often treacherous, putting migrant children, especially unaccompanied and separated children, at an increased risk of economic or sexual exploitation, abuse, neglect and violence. Policy responses to protect and support these migrant children are often fragmented and inconsistent and while children on the move have become a recognised part of today's global and mixed migration flows they are still largely invisible in debates on both child protection and migration. This publication targets policymakers and practitioners in the field of migration and child protection, along with academics and activists, and sheds light on the situation of migrant children. The publication is the result of a collective effort by a number of specialists from different organizations, was edited by Mike Dottridge (an independent child rights specialist) and includes a foreword by Professor François Crépeau (United Nations Special Rapporteur on the human rights of migrants). Table of Contents •Preface •Introduction to six articles by members of the research subgroup of the Inter-Agency Working Group •Children on the move: A different voice •Migrant children in child labour: A vulnerable group in need of attention •Unaccompanied migrant children and legal guardianship in the context of returns: The missing links between host countries and countries of origin •Protecting and supporting children on the move: Translating principles into practice •Challenges faced in protecting children on the move: An NGO perspective •Children’s migration: Towards a multidimensional child protection perspective.

Details: Geneva, SWIT: IOM, 2013. 114p.

Source: Internet Resource: Accessed April 25, 2013 at: http://publications.iom.int/bookstore/index.php?main_page=product_info&cPath=41_7&products_id=936

Year: 2013

Country: International

Keywords: Child Protection

Shelf Number: 128492


Author: Accra Caucus on Forests and Climate Change

Title: Realising Rights, Protecting Forests: An Alternative Vision for Reducing Deforestation

Summary: The Accra Caucus on Forests and Climate Change is a network of southern and northern NGOs representing around 100 civil society and Indigenous Peoples' organizations from 38 countries, formed at the United Nations Framework Convention on Climate Change (UNFCCC) meeting in Accra, Ghana in 2008. The Caucus works to place the rights of indigenous and forest communities at the centre of negotiations on Reducing Emissions from Deforestation and Degradation (REDD), and to ensure that efforts to reduce deforestation promote good governance and are not a substitute for emission reductions in industrialised countries. In this report the Caucus proposes an alternative vision for achieving the objective of reducing deforestation, arguing for policies and actions that would tackle the drivers of deforestation, rather than focusing exclusively on carbon. Drawing on case studies from organisations with experience of working with forest communities, the report highlights problems linked to the implementation of REDD and suggests ways in which policies to reduce deforestation can actually work on the ground. Through case studies from selected countries the report highlights three critical components: full and effective participation (Indonesia, Ecuador, Democratic Republic of Congo); secured and equitable land rights (Brazil, Cameroon, Papua New Guinea) and community-based forest management (Tanzania, Nepal).

Details: London: Rainforest Foundation UK, 2010. 40p.

Source: Internet Resource: Accessed April 25, 2013 at: http://www.rainforestfoundationuk.org/Accra_Report_ENG

Year: 2010

Country: International

Keywords: Conservation

Shelf Number: 128501


Author: Niebling, Sarah

Title: Youth Camps: A Review of the International Literature Around the Philosophies, Principles, Processes and Outcomes of Youth Camp Initiatives in Reducing Offending and Re-Offending Behaviours and Increasing the Success of Rehabilitation Efforts for Yo

Summary: This literature review was conducted to investigate the philosophies, principles, processes and outcomes of youth camp initiatives both in Australia and in New Zealand, the United States, Canada, and the United Kingdom. The purpose of reviewing the international literature in this field was to compare and contrast the different models of youth camps. This will: Determine which of these key models are effective in addressing the needs of both Indigenous and non-Indigenous juvenile offenders and at-risk young people Provide a foundation for making informed decisions regarding best practice approaches in reducing offending and re-offending behaviours Assist policy makers in increasing the success rate of rehabilitation and reintegration back into the community upon a young person’s release from a youth camp program There were four youth camp models that were reviewed for the purposes of this report. These four models were (1) traditional boot camps, (2) wilderness and adventure camps, (3) sports and recreational camps, and (4) arts, music and cultural camps. Traditional boot camps emphasise military training exercises, strict discipline, punishment and obedience to authority (Atkinson, 1995; Caputo, 2004; MacKenzie & Donaldson, 1996). This type of intervention for juvenile offenders may be effective in reducing recidivism and rehabilitating offenders, but it is difficult to say with certainty due to many inconsistencies in the literature. More objective program design, assessment and evaluation methods are needed to increase understanding of the effectiveness of traditional boot camp interventions. Wilderness and adventure camps involve taking young offenders to remote, rural or environmental locations where the clients have opportunities for “routine, personal space, regular meals and positive reinforcement†(Polsen & Chiauzzi, 2003, p. 6). The literature has indicated that these types of camps have a greater likelihood of generating long-term behavioural change when compared with traditional boot camp strategies (Polsen & Chiauzzi, 2003). Sports and recreational camps focus on developing team work, fitness and physical strength through sporting and recreational activities (Mason & Wilson, 1988; Sallybanks, 2002). As was stated above for traditional boot camps, it is difficult to say with certainty how effective sports and recreational camps are in reducing recidivism in juvenile offenders, as only a limited amount of research has been conducted in the field of sporting and recreational intervention mechanisms. Arts, music and cultural camps focus on all three areas of arts, music and culture in attempting to rehabilitate Indigenous juvenile offenders and reintegrate them back into society (Dryfoos, 1993). As was stated above for sports and recreational camps, not enough empirical research has been conducted to accurately determine the effectiveness of these interventions when addressing the needs of Indigenous juvenile offenders and at-risk young people. The results of this literature review will provide a basis for policy makers, academics and community workers to make informed decisions regarding best practice approaches for juvenile offenders and at-risk youth from both Indigenous and non-Indigenous backgrounds. Careful consideration of all youth camp initiatives is important in ensuring that a best practice framework is adopted for the most appropriate treatment of both Indigenous and non-Indigenous young people. The development of structured best practice models for specific target groups may assist in reducing offending and re-offending behaviours in addition to increasing the chances of successfully reintegrating young offenders back into the community.

Details: Brisbane, QLD: Eidos, 2006. 40p.

Source: Internet Resource: Accessed mary 1, 2013 at: http://www.eidos.org.au/v2/images/documents/FinalReports/YouthCamps.pdf

Year: 2006

Country: International

Keywords: Boot Camps

Shelf Number: 106734


Author: Baumann, Florian

Title: Status Concerns as a Motive for Crime?

Summary: This paper analyzes the implications of potential offenders caring about their relative status. We establish that subjects' status concerns can result in multiple-equilibrium crime rates and may modify the standard comparative-statics results regarding how the crime rate changes in response to a higher detection probability and higher sanctions. In addition, we argue that the socially optimal level of the detection probability and the sanction will often be higher when potential offenders care about their relative positions. Our analysis can be linked to one of the most important criminological theories of crime, namely strain theory.

Details: Munich: Center for Economic Studies (CES), the Ifo Institute and the CESifo GmbH, 2013. 36p.

Source: Internet Resource: CESIFO WORKING PAPER NO. 4225: Accessed May 1, 2013 at:

Year: 2013

Country: International

Keywords: Crime Rates

Shelf Number: 128582


Author: Global Initiative to End All Corporal Punishment of Children

Title: Ending Legalised Violence against Children. Global Report 2012

Summary: We live in a time of incredible change – relentless political and social upheaval (for better or worse), technological advances, ever more and faster methods of communicating and information sharing…. It seems that little stays the same for long. But the pace of change in how we treat children remains stubbornly slow. It is shocking that at this point in the 21st century we are still fighting entrenched attitudes that hitting children is OK or even a duty. On the one hand this situation makes all the more remarkable the achievements of the 33 states which have enacted laws to prohibit corporal punishment and are now focusing their efforts on ensuring the laws are implemented and that children can live their lives free from violence at the hands of those who care for them. But on the other hand it exposes the low status that children still have in too many societies, a failure to regard them as fully human and holders of human rights, and a refusal to perceive their ongoing subjection to physical and emotional assault in their own homes and in places of learning as a serious violation of their fundamental human rights that should be rectified immediately. We can rightly celebrate the progress described in these pages, but we can equally question why it is that so many children are yet to benefit from full legal protection from all forms of corporal punishment in all settings of their lives. In last year’s Global Report, Paulo Sérgio Pinheiro, who led the UN Secretary General’s Study on Violence against Children, drew attention to the target of 2009 which the Study report set for prohibition of all legalised violence against children: “Yes this was wildly over-optimistic – but how could we justifiably be ‘realistic’ about the time it takes to convince governments to prohibit such obvious human rights violations against their youngest citizens? How could we be true to children and yet condemn another whole generation to suffer childhoods scarred by deliberate and legalised adult violence?†This report documents increasing numbers of active campaigns in all regions: we must work together to insist that states fulfil their obligations to the present generation of children.

Details: Global Initiative to End All Corporal Punishment of Children; Save the Children Sweden, 2012. 34p.

Source: Internet Resource: Accessed May 1, 2013 at: http://www.endcorporalpunishment.org/pages/pdfs/reports/GlobalReport2012.pdf

Year: 2012

Country: International

Keywords: Child Maltreatment

Shelf Number: 128589


Author: Coyle, Andrew

Title: A Human Rights Approach to Prison Management. Handbook for Prison Staff. Second Edition

Summary: The second edition of the ICPS handbook A Human Rights Approach to Prison Management was launched by Baroness Glenys Kinnock, Minister of State with responsibility for Human Rights at a reception in the Foreign and Commonwealth Office on 27 October. The first edition of the handbook was published in 2002 It has been translated into 16 languages and is widely used in prison reform work around the world. This handbook underlines the importance of managing prisons within an ethical context which respects the humanity of everyone involved in a prison: prisoners, prison staff and visitors. This ethical context needs to be universal in its appeal and this universality is provided by the international human rights instruments. There is also a pragmatic justification for this approach to prison management: it works. This style of management is the most effective and safest way of managing prisons. What this approach underlines is that the concept of human rights is not merely another subject to be added to the training curriculum. Rather, it suffuses, and is an integral part of, good prison management.

Details: London: International Centre for Prison Studies, King's College London,

Source: Internet Resource:

Year: 0

Country: International

Keywords: Correctional Administration

Shelf Number: 128592


Author: Tacoli, Cecilia

Title: Urbanization, Gender and Urban Poverty: Paid Work and Unpaid Carework in the City

Summary: The majority of the world’s population now live in urban centres, which will also absorb virtually all population growth in the next century. Urbanisation involves major shifts in the ways people work and live, and offers unprecedented opportunities for improved standards of living, higher life expectancy and higher literacy levels, as well as better environmental sustainability and a more efficient use of increasingly scarce natural resources. For women, urbanisation is associated with greater access to employment opportunities, lower fertility levels and increased independence. However, urbanisation does not necessarily result in a more equitable distribution of wealth and wellbeing. In many low and middle income nations, urban poverty is growing compared to rural poverty. Specific aspects differentiate urban poverty from rural poverty. While urban residents are more dependent on cash incomes to meet their essential needs, income poverty is compounded by inadequate and expensive accommodation, limited access to basic infrastructure and services, exposure to environmental hazards and high rates of crime and violence. This gives urban poverty a distinctive gendered dimension as it puts a disproportionate burden on those members of communities and households who are responsible for unpaid carework such as cleaning, cooking and looking after children, the sick and the elderly. At the same time, cashbased urban economies mean that poor women are compelled, often from a very young age, to also engage in paid activities. In many instances this involves work in the lowest-paid formal and informal sector activities which, at times of economic crises, require increasingly long hours for the same income. Combined with cuts in the public provision of services, higher costs for food, water and transport, efforts to balance paid work and unpaid carework take a growing toll on women. A gendered perspective of urban poverty reveals the significance of non-income dimensions such as time poverty. It also highlights fundamental issues of equality and social justice by showing how women’s unequal position in the urban labour market, their limited ability to secure assets independently from male relatives and their greater exposure to violence. Section 1 of this paper summarises current understandings of urban poverty and their gender implications. Section 2 then examines the demographic consequences of urbanization on fertility, rural–urban migration and sex ratios and how this affects the form and organisation of households. Section 3 describes the context and consequences of women’s’ growing participation in urban labour markets, with special attention to the sectors where women concentrate: the urban informal sector and domestic service. Section 4 on shelter and services shows how gendered disadvantage exacerbates the already difficult living conditions of the urban poor. This is further explored in Section 5 on gender-based violence and its links with urbanization and urban life. The conclusion draws on current debates on the ‘feminisation of poverty’ and time poverty to examine their contribution to the broader understanding of both gendered disadvantage and urban poverty.

Details: London: Human Settlements Group, International Institute for Environment and Development (IIED); New York: Population and Development Branch, United Nations Population Fund (UNFPA), 2012. 48p.

Source: Internet Resource: Urbanization and Emerging Population Issues Working Paper 7: Accessed

Year: 2012

Country: International

Keywords: Gender-Based Violence

Shelf Number: 128598


Author: Bronk, Christopher

Title: Risk-Intelligent Governance in the Age of Cyberthreats

Summary: Cybersecurity is an issue of foremost interest for policymakers in the world's government, corporations, nongovermental organizations, academic institutions, and other associations. However, remedy for the myriad cyberthreats and vulnerabilities continues to elude technologists and policymakers alike. In this paper, we consider the concept of cyberrisk intelligence, a general concept of understanding the varied phenomena that impact an organization's capacity to secure its digital communitions and resources from eavesdropping, theft, or attack. We also consider the deeper economics of information held and transmitted in digital form and how those economics may alter thinking on risk modeling. Finally, we offer guidance on how organizations and entire sectors of business activity may want to alter their thinking on cybersecurity issues beyond a technological framing to include an informational perspective aligned with business activities.

Details: Houston, TX: Rice University, James A. Baker III Institute for Public Policy, 2013. 16p.

Source: Internet Resource: Risk Intelligence Series
Issue No. 23: Accessed May 2, 2013 at: http://bakerinstitute.org/publications/ITP-pub-RiskIntelligentGovernance-042613.pdf

Year: 2013

Country: International

Keywords: Cybercrime

Shelf Number: 128600


Author: Surtees, Rebecca

Title: Re/integration of Trafficked Persons: Supporting Economic Empowerment

Summary: Meaningful re/integration is a complex and costly undertaking. It requires a full and diverse package of services for the individual (and often also the family) to address the root causes of trafficking as well as the physical, mental and social impacts of their exploitation. Obstacles to sustainable recovery and re/integration for trafficking victims are myriad and often specific to the socio-cultural, economic or political situation in the country where re/integration takes place. Central to any assistance programme must be a victim and human rights centred philosophy with sustainable re/integration as the measure of success. This philosophy lies at the core of the Foundation’s strategy which aims not only to support different models and approaches to re/ integration in different countries but also to analyse the strengths of the various strategies as well as any inhibitors to full re/integration success. This paper is the third of a series that aim to shed light on good practices in the area of re/integration as well as important lessons learned. With its focus on monitoring and evaluation, it addresses one of the most challenging and under-considered aspects of re/integration work. Often perceived simply as paperwork that needs to be done in order to meet donors’ requirements, monitoring and evaluation is put forward here as a major tool to systematise re/integration work and to ensure that assistance is appropriate and effective.

Details: Brussels: King Baudouin Foundation; Washington, DC: NEXUS Institute, 2012. 98p.

Source: Internet Resource: Issue paper #4: Accessed May 2, 2013 at: http://www.nexusinstitute.net/publications/pdfs/Re-integration%20of%20trafficked%20persons,%20developing%20m&e%20mechanisms,%20KBF%20&%20NEXUS%202009.pdf

Year: 2012

Country: International

Keywords: Economics

Shelf Number: 128604


Author: Brunovskis, Anette

Title: Leaving the past behind? When victims of trafficking decline assistance

Summary: While many victims of human trafficking for sexual exploitation are assisted within the numerous anti-trafficking programmes developed in countries of destination and origin, an increasingly noted trend has been that many identified victims decline the assistance offered to them. To date, little systematic knowledge has been available on why this is so, and what the consequences are. This report analyses the issue based on interviews with 39 victims of trafficking and 13 women and transgender persons in street prostitution whose status with respect to trafficking could not be determined, as well as a large number of anti-trafficking actors, in Albania, Moldova and Serbia. The authors found that victims decline assistance for a large variety of reasons, stemming from their personal circumstances; because of the way assistance is organized; and due to factors in their social surroundings, including negative assistance experiences in the past. Many do not accept because they feel it is not a real option, and are left to cope on their own with unattended post-trafficking problems. The insight that victims who decline often have other assistance needs than those catered for within the assistance system today should be incorporated into future assistance planning and design.

Details: Oslo, Norway: Fafo; Washington, DC: NEXUS Institute, 2007. 162p.

Source: Internet Resource: Accessed May 2, 2013 at: http://www.fafo.no/pub/rapp/20040/20040.pdf

Year: 2007

Country: International

Keywords: Human Trafficking

Shelf Number: 109314


Author: United Nations Office on Drugs and Crime

Title: Assessment Guide to the Criminal Justice Response to the Smuggling of Migrants

Summary: The Assessment Guide to the Criminal Justice Response to the Smuggling of Migrants provides an inventory of measures for assessing the legislative, investigative, prosecutorial, judicial and administrative responses to the smuggling of migrants by land, sea and air, for deterring and combating such crime, and for integrating the information and experience gained from such assessment into successful national, regional and international strategies. The Assessment Guide is based on lessons learned from domestic and international efforts to curtail the smuggling of migrants, scholarly analysis and case examinations, and consultation with key stakeholders and relevant experts. The Assessment Guide is a standardized and cross-referenced set of measures designed to enable government officials in immigration, customs and law enforcement agencies and United Nations agencies, as well as other organizations, industry and individuals, to conduct comprehensive assessments of domestic systems, to identify areas of technical assistance, to assist in the design of interventions that incorporate international standards and norms on the prevention and suppression of the smuggling of migrants, and to assist in training on these issues.

Details: New York: UNODC, 2013. 174p.

Source: Internet Resource: Accessed May 2, 2013 at: http://www.unodc.org/documents/human-trafficking/Migrant-Smuggling/UNODC_2012_Assessment_Guide_to_the_Criminal_Justice_Response_to_the_Smuggling_of_Migrants-EN.pdf

Year: 2013

Country: International

Keywords: Human Smuggling

Shelf Number: 128607


Author: Feeny, Thomas

Title: In Best or Vested Interests? An Exploration of the Concept and Practice of Family Reunification for Street Children

Summary: As the movement advocating children’s participation in their own life decisions gathered pace in the late 1990s and early 21st century, governments were left with increasingly few options given their continued antipathy to the presence of these children on the streets. NGOs had begun to take the initiative by offering non-formal education opportunities and vocational training to try and give children the skills to get themselves off the streets, but these efforts continued to struggle in the wider context of a society still very much averse to the mere existence of these children. The response taken by many was therefore to move towards preventive or ‘early’ intervention, spurred on by better understandings of the multiple factors both pushing and pulling children onto the streets. It was into this arena that family reunification programmes emerged – the main characteristics being (a) recognition of the family as the most sustainable partner with regard to the children’s welfare; (b) an acknowledgement that the original causes of family separation need addressing and resolving; and (b) a belief that this can be achieved through procedural and participatory counseling of the child and/or the family members concerned. To suggest that these ideas were completely new would be wrong – as noted earlier, the importance of the family environment had already been emphasised in both religious ideals and the legal provisions of the CRC. Rather, it was that the context proved more fertile to such programmes, with the touted high-profile success of reunification strategies targeting children affected by war, such as Rwanda in the late 1990s. Family-partnered interventions were also in tune with contemporary donor demands for sustainability and participation, while also allowing NGOs to claim such programmes as morally and ethically ‘correct’ and in the ‘best interests’ of the child. Unfortunately, the most important question of methodology – how this reunification process should best be performed – remains unclear. Whatever the motivation behind them, family reunification programmes are now rapidly taking off in many countries around the world, in spite of the inherent methodological uncertainty. Already, organisations have begun to proudly proclaim 80-90% success rates for their reunification programmes, and more and more of their fellow agencies are showing signs of interest. This study sets out to go ‘behind the scenes’ of family reunification programmes from a number of perspectives. In Part One, it will look at the conceptual theory that underpins this intervention, and examine how constructions of the ‘family’ and the ‘child’ have influenced policy making in this field. It will then reconsider these in light of contemporary research material on the social realities of street children’s lives. Part Two will then explore the practical issues relating to the entire process of reunification itself, from the early stages of identifying children on the streets to monitoring their welfare in the weeks and months after reunification with their family. A final Conclusion will then discuss the findings of the study and its implications for organisations operating or considering starting family reunification programmes with street children. Areas for future research are also highlighted.

Details: London: Consortium for Street Children, 2005. 65p.

Source: Internet Resource: Accessed May 3, 2013 at: http://www.streetchildren.org.uk/_uploads/Publications/In_Best_or_Vested_Interests.pdf

Year: 2005

Country: International

Keywords: Child Protection

Shelf Number: 128612


Author: van Beinum, Jenny

Title: Human Trafficking in International Criminal Law: Pulling the trigger of international jurisdiction

Summary: The aim of this essay is to determine whether human trafficking can or should be regarded as an international crime, triggering international criminal jurisdiction. Current international criminal law has a limited scope. Article 5 of the Statute of the ICC (hereinafter referred to as the ‘Rome Statute’ or the ‘ICC Statute’) gives a limitative list of crimes triggering the jurisdiction of the International Criminal Court (hereinafter referred to as the ‘ICC’ or the ‘Court’). Article 7 in turn provides us with a non-exhaustive list of crimes that can be considered as ‘crimes against humanity’. Answering the question whether human trafficking can trigger international jurisdiction will lead down two paths. The first one is to look at international criminal law as it is now applied and assess whether the crime of human trafficking fits into the existing categories of international crimes, more specifically whether it can be categorized as a crime against humanity. The concept of crimes against humanity and their distinctive legal features will be discussed in this light and applied to the nature and features of the crime of human trafficking. Secondly, on a more theoretical level, different theories on justifying international criminal law will compared to see whether human trafficking can trigger international intervention and pierce the veil of state sovereignty. Even though this essay will look at whether or not it is possible to have international jurisdiction over human trafficking, it does not touch upon the question if it is desirable that human trafficking is tried internationally. The desirability of the international prosecution of crimes is a whole different subject that exceeds the scope of this essay. The main focus in the following chapters will be on the possibility of international adjudication of human trafficking under current international criminal law and legal theories. This essay starts with two descriptive chapters. Chapter 1 gives the legal definition of the crime of human trafficking and Chapter 2 will discuss its scope and nature. These descriptive chapters will prove useful and necessary at a later stage however, they will not provide a sufficient basis to say whether or not the crime of human trafficking is severe enough to be qualified as a crime against humanity. Neither the definition nor the scale of the crime says anything about the nature or the gravity of the offence. Classifying or qualifying the crime of human trafficking as an international crime merely on the basis of its definition or scale would lead to the adoption of a quantitative criterion for international crimes. Applying such a criterion is very undesirable and should be avoided at all costs because evils simply cannot be compared.2 Therefore, instead, Chapter 3 will first dwell upon the question what turns a crime into a crime against humanity. In search of a non-quantitative approach, the legal theories of Larry May and David Luban will be used to assess what constitutes a crime against humanity. Chapter 4 will then focus on justifying international criminal law by discussing various legal theories on this subject. In the final chapter, Chapter 5, the findings from the previous chapters will be used to answer the central question of this essay. The distinctive legal features of crimes against humanity as outlined under chapter 3 will be compared to those of the crime of human trafficking as described under Chapters 1 and 2, and the legal theories discussed under Chapter 4 will be applied to the crime of human trafficking in order to conclude whether human trafficking can pull the trigger of international criminal jurisdiction.

Details: Amsterdam: Strafrecht of the University of Amsterdam, 2013. 63p.

Source: Internet Resource: Thesis: Accessed May 4, 2013 at: http://dare.uva.nl/document/477415

Year: 2013

Country: International

Keywords: Human Trafficking (International)

Shelf Number: 128665


Author: Perez Solla, Maria Fernando

Title: Slavery and Human Trafficking International Law and the Role of the World Bank

Summary: This paper reviews the international legal framework applicable to the World Bank and Member States on contemporary forms of slavery, in particular, trafficking. The Palermo Trafficking Protocol is specially analyzed. Moreover, the paper refers to the preventive framework constituted by human rights obligations, particularly those of international labor law. The World Bank’s mandate appears to permit preventive action. The Articles expressly refer to the goal of improving conditions of labor. On one hand, the Bank’s practice includes today work in areas linked to human rights, which reveals tacit agreement by Member States. In addition, human rights obligations have been widely accepted by the international community, though implementation is poor. Moreover, poverty causes vulnerability to slavery-like practices, and they perpetuate poverty. A modest set of recommendations and areas in which further research is needed are included. The paper encourages mainstreaming the issues analyzed strategically in the Bank’s core operations (concerning processes and results), with country-led and country specific efforts, identifying the issues important for poverty reduction and growth.

Details: Washington, DC: Social Protection & Labor, The World Bank, 2009. 69p.

Source: Internet Resource: SP Discussion Paper no. 0904: Accessed May 8, 2013 at: http://siteresources.worldbank.org/SOCIALPROTECTION/Resources/SP-Discussion-papers/Labor-Market-DP/0904.pdf

Year: 2009

Country: International

Keywords: Forced Labor

Shelf Number: 128677


Author: Slogogin, Christopher

Title: A Comparative Perspective on the Exclusionary Rule in Search and Seizure Cases

Summary: The modern United States Supreme Court views the exclusionary rule as a means of deterring police conduct that unduly infringes privacy or autonomy interests. But in years past the Court also proffered two other reasons for exclusion: the importance of ensuring the integrity of the legal system (primarily by avoiding judicial complicity with police illegality) and the need to vindicate constitutional guarantees. Some version of one or both of the latter two rationales also appears to be the primary motivation behind the exclusionary rules in other countries. In contrast to the United States, however, in most of these countries exclusion is not very common. Those countries that focus on systemic integrity take into account not only the de-legitimizing impact of failing to exclude illegally seized evidence but also the truth-denigrating effect of excluding evidence. Those countries that focus on vindicating fundamental rights tend to define those rights narrowly, or undercut the vindication rationale in various other ways. After describing these developments, this paper examines, from both empirical and theoretical perspectives, the difficulties that arise in applying the deterrence, systemic integrity,and rights vindication models of the rule and concludes with thoughts about the possible alternatives to exclusion, the ways in which the exclusionary remedy can be refined, and the interaction of the exclusionary rule with substantive search and seizure law.

Details: Nashville, TC: Vanderbilt University Law School, 2013. 25p.

Source: Internet Resource: Vanderbilt University Law School
Public Law & Legal Theory
Working Paper Number 13-21: Accessed May 9, 2013 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2247746

Year: 2013

Country: International

Keywords: Criminal Law

Shelf Number: 128688


Author: Feldt, Lutz

Title: Maritime Security – Perspectives for a Comprehensive Approach

Summary: Challenges to “Maritime Security†have many faces – piracy and armed robbery, maritime terrorism, illicit trafficking by sea, i.e. narcotics trafficking, small arms and light weapons trafficking, human trafficking, global climate change, cargo theft etc. These challenges keep evolving and may be hybrid in nature: an interconnected and unpredictable mix of traditional and irregular warfare, terrorism, and/or organized crime. In our study we focus on piracy, armed robbery and maritime terrorism. Starting with principle observations regarding Maritime Security and the threat situation, we have a look at operational requirements and maritime collaboration featuring Maritime Domain Awareness. Finally, we give recommendations for political, military and business decision makers.

Details: Berlin: Institut für Strategie- Politik- Sicherheits- und Wirtschaftsberatung ISPSW, 2013. 25p.

Source: Internet Resource: ISPSW Strategy Series: Focus on Defense and International Security Issue No. 222: Accessed May 9, 2013 at: www.ispsw.de

Year: 2013

Country: International

Keywords: Armed Robbery

Shelf Number: 128690


Author: War Child

Title: An Unwanted Truth? FOCUSING THE G8: Shining a Spotlight on Sexual Violence against Children in Conflict

Summary: This report warns that international governments are failing to take seriously the scale of sexual abuse against children in conflict. According to War Child, G8 countries, whose foreign ministers are meeting today in London, have a “once in a lifetime chance†to stop sexual violence against children. According to An Unwanted Truth? millions of children around the world are regularly subjected to sexual abuse: Every day, over 600,000 children around the world are estimated to be raped or suffer sexual violence: more children than live in Birmingham, Leeds, Liverpool and Sheffield combined. In some war-torn countries, including the Central African Republic, over 50% of children surveyed reported having been victims of sexual abuse or exploitation. Over 51% of cases of sexual violence in the post-election crisis in Côte d’Ivoire were children. Despite this, the report says that international governments, including the G8 of leading nations, have overlooked child victims of abuse and instead focused on sexual violence as a women’s issue and on more visible aspects of humanitarian disasters. The report says it is crucial that G8 foreign ministers meeting in London this week commit to using their international influence and finance to stop this child abuse. Download the report below.

Details: London: War Child, 2013. 25p.

Source: Internet Resosurce: Accessed May 9, 2013 at: http://cdn.warchild.org.uk/sites/default/files/An-Unwanted-Truth-April-2013.pdf

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 128693


Author: Thiele, Ralph D.

Title: Building Maritime Security Situational Awareness

Summary: Maritime domain security relies on the ability to build a comprehensive awareness of maritime activity. Although it is still in the developmental stages situational awareness is the prerequisite of maritime domain security. Today technological developments such as spaceâ€based systems, overâ€theâ€horizon radar, and nearshore and harbour acoustics can be incorporated into a layered approach to increase security. To identify and address weaknesses in the system, industry and academia have been discussing ways in which technology, based on advanced modelling and simulation tools can be used to identify threats and determine potential impacts. Numerous governmental, military and business organizations already possess valuable inputs into shared situational awareness. However, no one source captures all of the maritime information needed or currently available. The information exchange between government agencies and with private industry, in particular, sharing common databases, is the real power behind maritime domain awareness centres.

Details: Berlin: Institut für Strategie- Politik- Sicherheits- und Wirtschaftsberatung ISPSW, 2013. 10p.

Source: Internet Resource: ISPSW Strategy Series: Focus on Defense and International Security Issue No. 182: Accessed May 13, 2013 at: http://www.isn.ethz.ch/isn/Digital-Library/Publications/Detail/?id=140759

Year: 2013

Country: International

Keywords: Maritime Crime

Shelf Number: 128696


Author: Martens, Jonathan

Title: Counter Trafficking and Assistance to Vulnerable Migrants. Annual Report of Activities 2011

Summary: IOM continues to fight against the exploitation of migrants in all its forms, especially the severe human rights violations suffered by trafficked persons. Through the implementation of its Assistance to Vulnerable Migrants (AVM) programmes and projects, IOM has assisted more than 26,000 trafficked persons and exploited migrants since 1997. In 2011, IOM implemented 220 AVM projects in 94 countries throughout the world. These projects included a broad range of activities, such as institutional capacity building, dialogue and cooperation, data collection and research, evaluations, and direct assistance to trafficked persons and exploited migrants. In this first annual report of AVM activities, prepared by the Migrant Assistance Division (MAD), we will focus on IOM’s direct assistance to trafficked persons and vulnerable migrants, in particular the provision of voluntary, safe, and sustainable return and reintegration assistance. The report brings together internal data from more than 150 IOM Missions around the world in an effort to reflect our protection and assistance activities and to identify promising practices.

Details: Geneva, SWIT: International Organization for Migration, 2012. 112p.

Source: Internet Resource: Accessed May 13, 2013 at: http://www.iom.int/files/live/sites/iom/files/What-We-Do/docs/Annual_Report_2011_Counter_Trafficking.pdf

Year: 2012

Country: International

Keywords: Forced Labor

Shelf Number: 128715


Author: International Labour Organization

Title: World Report on Child Labour: Economic vulnerability, social protection and the fight against child labour

Summary: This new report is the first in a series to be published annually by the ILO’s International Programme on the Elimination of Child Labour. It brings together research on child labour and social protection, identifying policies that are designed to achieve multiple social goals. It discusses the role of poverty and economic shocks in rendering households vulnerable to child labour and considers the impact on child labour of cash transfers, public employment programmes, social insurance and other social protection initiatives as they have been implemented around the world. The report distils a broad range of research in economic and social policy and should be of interest to those looking for ways to combat poverty in the present and reduce its burden on the next generation.

Details: Geneva, SWIT: International Labour Organizations, 2013.

Source: Internet Resource: Accessed May 13, 2013 at: http://www.ilo.org/washington/WCMS_178184/lang--en/index.htm

Year: 2013

Country: International

Keywords: Child Labor (International)

Shelf Number: 128718


Author: Coren, Esther

Title: Interventions for Promoting Reintegration and Reducing Harmful Behaviour and Lifestyles in Street-connected Children and Young People: A Systematic Review

Summary: BACKGROUND Numbers of street-connected children and young people run into many millions worldwide and include children and young people who live or work in street environments. Whether or not they remain connected to their families of origin, and despite many strengths and resiliencies, they are vulnerable to a range of risks and are excluded from mainstream social structures and opportunities. OBJECTIVES To summarise the effectiveness of interventions for street-connected children and young people that promote inclusion and reintegration and reduce harms. To explore the processes of successful intervention and models of change in this area, and to understand how intervention effectiveness may vary in different contexts. RESULTS We included 11 studies evaluating 12 interventions from high income countries. We did not find any sufficiently robust evaluations conducted in low and middle income countries (LMICs) despite the existence of many relevant programmes. Study quality overall was low to moderate and there was great variation in the measurement used by studies, making comparison difficult. Participants were drop-in and shelter based. We found no consistent results on a range of relevant outcomes within domains of psychosocial health, substance misuse and sexual risky behaviours despite the many measurements collected in the studies. The interventions being evaluated consisted of time limited therapeutically based programmes which did not prove more effective than standard shelter or drop-in services for most outcomes and in most studies. There were favourable changes from baseline in outcomes for most participants in therapy interventions and also in standard services. There was considerable heterogeneity between studies and equity data were inconsistently reported. No study measured the primary outcome of reintegration or reported on adverse effects. The review discussion section included consideration of the relevance of the findings for LMIC settings.

Details: Oslo: Campbell Collaboration, 2013.

Source: Internet Resource: Campbell Systematic Review 2013:6: Accessed May 13, 2013 at: www.campbellcollaboration.org

Year: 2013

Country: International

Keywords: At-risk Youth

Shelf Number: 128720


Author: Berkeley Policy Association

Title: Evaluation of the International Organization for Migration and its Efforts to Combat Human Trafficking

Summary: This report presents the findings of an evaluation of the International Organization for Migration (IOM) and its efforts to combat human trafficking. The evaluation gives in our view a balanced insight into strengths and weaknesses of the single largest collaboration partner for the Ministry of Foreign Affairs on this topic. During the period 2000-2010 IOM received approximately NOK 89 million to its counter trafficking work. IOM staff is regarded as “highly skilled†and “very supportive.†The report highlights capacity-building, awareness-raising, and victim support as areas where the organization has been successful. The work with victims has not only enabled the organisation to support structures to assist those in need, but has also provided insights into the trafficking problem which have informed other initiatives. This does not mean that there is no room for improvement. At this point, it is important, that IOM focuses on strengthening its internal processes including those relating to how progress is measured, which lessons are captured and feed into future programmed development and particularly those relating to ensuring that IOM’s expressed commitment to human rights consistently translates into practice. Furthermore IOM is recommended to increase collaboration with other organisations in order to reduce overlap between its counter trafficking activities and the work of other organizations. Although IOM’s internal view is that a major strength of the organization is being able to address all aspects of trafficking, staff of organizations outside of IOM did not agree and commonly expressed the concern that IOM’s attempt to address all areas of counter-trafficking exceeds IOM’s mandate. With regard to Norway, the major recommendation is to increase the timeframe of project funding. Today IOM’s work is funded on a project-by-project basis – referred to as projectisation – with only three percent of overall funds coming from core operational resources. One consequence of this form of funding is that IOM tends to create projects in response to donor requests, rather than having a more systematic frame or criteria for determining when and how to allocate resources to countries or programmes.

Details: Oslo, Norway: Norad (Norwegian Sgency for Development Cooperation, 2011. 196p.

Source: Internet Resource: Accessed May 15, 2013 at: http://www.iom.int/jahia/webdav/shared/shared/mainsite/activities/ct/Evaluation-IOM-CT.pdf

Year: 2011

Country: International

Keywords: Human Trafficking (International)

Shelf Number: 128742


Author: Ray, Patricia

Title: Still On The Street - Still Short Of Rights. Analysis of policy and programmes related to street involved children

Summary: This report provides an analysis of the situation of street involved children and highlights programmatic initiatives being implemented by international and local non-governmental organisations. The report begins with an explanation of why this research on street involved children was conducted and continues with main chapters 2 to 8, each of which end with a concluding section that pulls together the main points of the chapter.• Chapters 2, 3 and 4 discuss who street involved children are, how they come to be there and what they experience whilst involved with the street. • Chapter 5 analyses the legal frameworks which are pertinent to street involved children • Chapter 6 describes approaches to policy and programme work with street involved children.• Chapters 7 and 8 examine the prevention and response to street involvement by children, and in Chapter 8 the main conclusions and recommendations of the report are brought together

Details: London: Consortium for Street Children; Geneva: Plan International, 2011. 44p.

Source: Internet Resource: Accessed May 15, 2013 at: http://resourcecentre.savethechildren.se/sites/default/files/documents/3849.pdf

Year: 2011

Country: International

Keywords: Child Protection

Shelf Number: 128745


Author: Thomas de Benítez, Sarah

Title: State of the World's Street Children: Research

Summary: Commissioned by CSC, State of the World's Street Children: Research brings together a comprehensive collection of literature about street children from the last decade. It draws on over 400 pieces of research, determining where advances have been made in the knowledge about this often over-looked group and dispelling some unfounded assumptions. It also identiï¬es where the gaps are in current knowledge to reveal areas where further exploration is needed. The book is aimed at scholars, researchers, practitioners, NGOs and anyone with an interest in street children.

Details: London: Consortium for Street Children, 2011. 104p.

Source: Internet Resoruce: Street Children Series 2: Accessed May 15, 2013 at: http://www.streetchildren.org.uk/_uploads/publications/State_of_the_Worlds_Street_Children_Research_final_PDF_online.pdf

Year: 2011

Country: International

Keywords: Child Protection

Shelf Number: 128746


Author: Petrosino, Anthony

Title: Scared Straight and Other Juvenile Awareness Programs for Preventing Juvenile Delinquency: A Systematic Review

Summary: Programs like ˜Scared Straight" involve organized visits to prison facilities by juvenile delinquents or children at risk for becoming delinquent. The programs are designed to deter participants from future offending by providing first-hand observations of prison life and interaction with adult inmates. Results of this review indicate that not only does it fail to deter crime but it actually leads to more offending behavior. Government officials permitting this program need to adopt rigorous evaluation to ensure that they are not causing more harm to the very citizens they pledge to protect. ˜Scared Straight" and other programs involve organized visits to prison by juvenile delinquents or children at risk for criminal behavior. Programs are designed to deter participants from future offending through first hand observation of prison life and interaction with adult inmates. OBJECTIVES To assess the effects of programs comprising organized visits to prisons by juvenile delinquents (officially adjudicated or convicted by a juvenile court) or pre-delinquents (children in trouble but not officially adjudicated as delinquents), aimed at deterring them from criminal activity. Studies that tested the effects of any program involving the organized visits of juvenile delinquents or children at-risk for delinquency to penal institutions were included. Studies that included overlapping samples of juvenile and young adults (e.g. ages 14-20) were also included. We only considered studies that randomly or quasi-randomly (i.e. alternation) assigned participants to conditions. Each study had to have a no-treatment control condition with at least one outcome measure of “post-visit†criminal behavior. DATA COLLECTION AND ANALYSIS We report narratively on the nine eligible trials. We conducted one meta-analysis of post-intervention offending rates using official data. Information from other sources (e.g. self-report) was either missing from some studies or critical information was omitted (e.g. standard deviations). We examined the immediate post-treatment effects (i.e. ‘first-effects’) by computing Odds Ratios (OR) for data on proportions of each group re-offending, and assumed both fixed and random effects models in our analyses. RESULTS The analyses show the intervention to be more harmful than doing nothing. The program effect, whether assuming a fixed or random effects model, was nearly identical and negative in direction, regardless of the meta-analytic strategy. AUTHOR’S CONCLUSIONS We conclude that programs like ‘Scared Straight’ are likely to have a harmful effect and increase delinquency relative to doing nothing at all to the same youths. Given these results, we cannot recommend this program as a crime prevention strategy. Agencies that permit such programs, however, must rigorously evaluate them not only to ensure that they are doing what they purport to do (prevent crime) – but at the very least they do not cause

Details: Oslo: The Campbell Collaboration, 2013. 55p.

Source: Internet Resource: Campbell Systematic Reviews
2013:5: Accessed May 15, 2013 at: http://www.campbellcollaboration.org/lib/?go=monograph&year=2013

Year: 2013

Country: International

Keywords: At-Risk Yough

Shelf Number: 128747


Author: Whitman, S.

Title: Children and Youth in Marine Piracy: Causes, Consequences and the Way Forward

Summary: According to the Failed States Index Data 2011, created by the Fund for Peace Organization, 6 countries most affected by piratical activity fall within the top 15 most fragile states. This includes Somalia, Cote d’Ivoire, Guinea, Pakistan, Yemen and Nigeria. Piracy is not the main factor as to why these countries are fragile, at the same time, not all fragile littoral states have marine piracy. However, this does demonstrate the importance of looking at the broader social, political and economic environment that enables piracy. Understanding the human factors associated with piracy activity and the root causes is critical to the development of solutions to address piracy. The Dalhousie Marine Piracy Project (DMPP) has undertaken such an integrated and interdisciplinary approach to addressing the problem of contemporary piracy and its impact on the shipping and coastal communities. In so doing, it comprehensively examined the four interdependent themes of Law and Governance, Socio-Economic, Operational Responses, and Information Management; assessed current literature on the topic of contemporary marine piracy; and, through analysis of that work, highlighted potential areas for policy development and implementation. Piracy appears to develop where weak or non-existent government and enforcement capabilities, impoverished coastal communities, and shipping targets exist in relatively close proximity. Other elements such as organized criminality, youth unemployment, political conflict and even natural disasters may also contribute to the likelihood of piracy emerging as a major threat to shipping in a particular region. The DMPP has examined the economic, political and social conditions, which have led to contemporary outbreaks of piracy with the intention of identifying and evaluating the effectiveness of current and proposed responses to piracy. This paper highlights an important and growing issue identified from the DMPP research. Of deep concern is the increasing evidence that children and youth are being recruited by piracy gangs with little recognition among those responsible for addressing piracy and the complexities this introduces. For this particular problem, however, it is important to note that systematic collection of data on this matter does not currently exist and as such, it has been difficult to conduct a clear, evidenced-based assessment of the situation. As such, three key objectives of this paper are: (i) to raise the awareness of the failure to address the question of the involvement of children and youth by those involved in either studying or addressing piracy and (ii) to provide a rationale for the collection and accessibility of disaggregated data on those committing piracy by those who are capturing, releasing, reporting and prosecuting those involved in piracy activity and (iii) to provide possible alternatives to addressing marine piracy by focusing on the challenges posed by the involvement of children and youth. In addition, it should be noted that many who are involved in studying or addressing marine piracy have failed to pose questions regarding the involvement of children and youth. This means that a critical gap in the data collection, research, and responses to marine piracy have yet to be considered as a potential approach in the overall effort to halt or reduce marine piracy.

Details: Halifax, Nova Scotia: Dalhousie Marine Piracy Project, 2012. 20p.

Source: Internet Resource: Marine
Affairs Program Technical Report #5: Accessed May 20, 2013 at: http://marineaffairsprogram.dal.ca/Files/Dalhousie-Marine-Affairs-Program-Technical-Report-%235-2012-12.pdf

Year: 2012

Country: International

Keywords: Child Protection

Shelf Number: 128759


Author: Sloan, M.

Title: Dalhousie Marine Piracy Project: Operational Responses for the Discouragement and Suppression of Marine Piracy

Summary: The overall goal of the Dalhousie Marine Piracy Project (DMPP) is set out in the capping paper to this Inter-Sectoral Working Group Draft of the operational responses module report. Scope -- Under the operational responses thematic area of the DMPP, the following sub-themes have been examined a. The discouragement of piracy: disincentive strategies designed to discourage or frustrate piracy activities. b. The suppression of piracy: Operational responses, naval patrols, integrated enforcement initiatives, surveillance and intelligence. 3. This report considers operational responses employed to counter recent and current outbreaks of piracy, and draws initial deductions from that analysis. It then applies those deductions to identifying the operational response issues that need to be addressed in order to deal effectively with future piracy outbreaks. Although written as a stand-alone report, it complements, and is complemented by, reports from the other DMPP modules.

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 154p.

Source: Internet Resource: (Marine Affairs Program Technical Report #3): Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/Dalhousie-Marine-Affairs-Program-Technical-Report-%233-2012-12.pdf

Year: 2012

Country: International

Keywords: Hostages

Shelf Number: 128760


Author: MacPhee, J.

Title: Dalhousie Marine Piracy Project: Beating the Banks: Hawala’s Place in the Global Financial Environment and its Potential Links to Piracy

Summary: Hawala is an informal system that allows its users to transfer money quickly, reliably, and inexpensively. It is prevalent in countries where infrastructure is lacking and political corruption is widespread. As such, it is able to fill a major gap in citizens’ access to financial services. In Somalia, for example, hawala is the only reliable way of moving money into the country. Hence, it is used by members of the Somali diaspora to send remittances to their families, as well as by United Nations agencies and non-governmental organizations to get aid money to those in need. Its contribution to these societies is vital. However, all of this takes place under the radar of formal financial institutions and regulatory bodies. This makes it an attractive channel for criminal groups that wish to fund or launder proceeds of illegal activities. Money can be transferred anonymously, and transaction records are scant or nonexistent. It is important to note, however, that illicit users make up only a small percentage of total clients, overall. For example, even using the highest estimate, Somali piracy proceeds could have made up only 6% of total money transferred out of the country through hawala in 2010. Viable alternatives are needed to draw users away from hawala and new developments in mobile money transfer technology could represent a promising first step. This SMS-based service allows individuals to deposit money into an account that they can access through their cell phones, using it for personal transfers or purchases. This innovation addresses many of the gaps in formal banking services that keep hawala in demand; mobile transfers are cheap, instant, and accessible to all segments of society. Through the use of new technology and strategic partnerships, legitimate users of hawala may begin to move away from informal transfer channels, leaving the system a weaker tool for the criminals left behind.

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 21p.

Source: Internet Resource: Marine Affairs Program Technical
Report #8: Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/Dalhousie-Marine-Affairs-Program-Technical-Report-%238-2012-12.pdf

Year: 2012

Country: International

Keywords: Financial Crimes

Shelf Number: 128761


Author: Hodgson, J.R.F.

Title: Dalhousie Marine Piracy Project The Role of the International Maritime Organization In Combating Piracy

Summary: The objective of this paper is to explore the role of IMO as the leading multilateral agency tasked with addressing the issue of piracy, and to assess the effectiveness of that role in the light of the serious issues and challenges presented by the current scale of piracy off the East Coast of Africa, and elsewhere in the world. More particularly its goal is to examine the degree to which the mandate and authority assigned to the Organization for dealing with security issues such as piracy is adequate and appropriate. Also for consideration is whether the treaty and governance parameters within which it is constrained to operate enable the Organization to meet its responsibilities. A particular focus is the effectiveness of the decision-making challenges associated with IMO’s policy development process, involving as it does a multilateral body that must not only work with national administrations, interest groups and industry, but must also interface with numerous other multilateral bodies. This paper is proposed as a first step in a two (or more) step process. The intent is that it provides a basis for discussion with those members of the staff of IMO who are engaged in policy development, and program design and implementation, and with leading maritime industry associations and NGOs, with a view to confirming, modifying and/or amplifying observations made in the paper. It is therefore structured to generate ‘Discussion Points’, which can then form the basis for such discussions. These Discussion Points are therefore included in the text of the paper and assembled at the end. It should be stressed that the focus of this short paper is upon the effectiveness of IMO and its governance processes in addressing the issue of piracy. To undertake this assessment it is necessary to provide brief outlines of the nature and extent of the piracy related work in which IMO is engaged. It is, however, beyond the scope of the paper to provide a comprehensive description and analysis of this work, and the reader must look elsewhere for such material.

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 42p.

Source: Internet Resource: Marine Affairs Program Technical Report #7: Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/Dalhousie-Marine-Affairs-Program-Technical-Report-%237-2012-12.pdf

Year: 2012

Country: International

Keywords: Maritime Crimes

Shelf Number: 128762


Author: Whitman, S.

Title: Dalhousie Marine Piracy Project: Exploring an Integrated Approach to the Suppression and Prevention of Marine Piracy

Summary: Piracy, one of the oldest crimes in history, has had its peaks and lows of activity throughout various regions around the world. Even though each outbreak has its own set of actors, motives, tactics and targets, anti-piracy responses have understandably focused on addressing the problem as it arises on the sea. This focus on where the problem manifests itself as opposed to the source of the problem has failed to sufficiently address the root causes of piracy. On the premise that the source of piracy is deeply embedded in the social, political and economic structures of society, the Dalhousie Marine Piracy Project (DMPP) goal was to undertake an integrated and interdisciplinary approach to assessing and addressing the problem of contemporary piracy and its impact on the shipping and coastal communities. To achieve this goal, the DMPP aimed to understand potential piracy situations before they manifest, and sought to identify appropriate social, economic, security and political indicators and actions needed to prevent outbreaks of piracy. To that end, it also sought to provide a comprehensive suite of integrated policy alternatives to be considered by key policy actors in the suppression and prevention of piracy In pursuit of the above goal, the project, entitled ‘Policy Development and Interdisciplinary Research for Actions on Coastal Communities, Youth and Seafarers’, embarked on: A comprehensive examination of contemporary piracy to determine the true socio-economic costs and effects that piracy has on seafarers, coastal states and those communities; An integrated assessment of cross-cutting policy alternatives for dealing with the problem in a comprehensive manner; A review of the consequences associated with implementing the identified policy options; An identification of the strategic directions that need to be adopted to implement corrective measures; and, The development of a preliminary generalized model for predicting the emergence of piracy. The DMPP team recognized the significant contributions being made by scholars and practitioners who have focused on addressing the problem of piracy from either a thematic focus (e.g. operational, economic or social) and/or a geographic focus (e.g. the Horn of Africa). In contrast to this approach, the DMPP focused on drawing on these existing analyses to identify cross-cutting linkages and gaps in the knowledge base that require policy makers’ attention at the international, regional, national and local levels, in an effort to address potential actions to contribute to the discouragement and suppression of piracy The objective was not to conduct original research, but to deliver policy innovative outputs from the analysis in the form of an interdisciplinary suite of policy options that reflected a paradigmatic shift in the way piracy is understood, suppressed and prevented. The intention is to make the recommended policy options available for public comment, and to present them to governments, the private sector, agencies of the United Nations and civil society, including Non- Government Organizations (NGOs). A key objective of the DMPP is to pursue opportunities for getting the project findings onto the agenda of high-level meetings of policy makers and practitioners to develop specific policy responses aimed at addressing the problem of global marine piracy in an integrated manner. This interdisciplinary report seeks to draw on the analysis of the socio-economic, governance aspects and operational response factors inherent in contemporary marine piracy in order to capture the key findings of each thematic area of study and, thereafter, to expand on those findings that have synergies across the reports. The report reflects the ‘integrated or interdisciplinary thinking’ of the DMPP Team - the application of the collective mind - in collating all the relevant data about the socio-economic and human costs of piracy, the counter-piracy policies and practices, and varied legal regimes, organizational strategies and governance processes. The report goes on to provide a clear reference point for other follow-up research projects and presentations.

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 24p.

Source: Internet Resource: Marine
Affairs Program Technical Report #4: Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/Dalhousie-Marine-Affairs-Program-Technical-Report-%234-2012-12.pdf

Year: 2012

Country: International

Keywords: Maritime Crimes

Shelf Number: 128763


Author: Reuchlin, J.W.

Title: Dalhousie Marine Piracy Project The Economic Impacts of Piracy on the Commercial Shipping Industry: A Regional Perspective

Summary: This report assesses the economic impacts of maritime piracy on the commercial shipping industry. For the purpose of this report this industry consists of maritime transport and fisheries. The maritime transport industry includes the transport of cargo and passengers. Both form an important part of the global economy. For example 75% of the total world trade measured in tonnes and 59% in terms of value is transported by sea (Mandryk, 2009). With regard to the maritime transport of passengers, the cruise industry accommodated an estimated 15 million passengers in 2010 (FCCA, 2011) and 1.7 billion people made use of ferries in 2007 (IMO, 2011). The total amount of persons that make use of maritime transport is even higher when considering the use of yachts around the world. The fishing industry is equally important as it provides over 34 million people employment as fishers and the estimated first-sale value of the captured fish was US$ 93.9 billion in 2008 (FAO, 2010). In recent years piracy has increasingly become a threat for the commercial shipping industry. There are four geographic regions in which almost all acts piracy and armed robbery occur. These four large regions are: Latin America and the Caribbean (LAC), Southeast Asia (SeA), the Gulf of Guinea (GoG), and the Northern and Western Indian Ocean (NWIO).

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 69p.

Source: Internet Resource: Marine Affairs Program Technical
Report #6: Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/Dalhousie-Marine-Affairs-Program-Technical-Report-%236-2012-12.pdf

Year: 2012

Country: International

Keywords: Economics of Crime

Shelf Number: 128766


Author: Fanning, L.

Title: Dalhousie Marine Piracy Project: Legal, Institutional and Governance Arrangements for Apprehending and Prosecuting Marine Pirates

Summary: Under the broader mandate of the DMPP, the Law and Governance Module is investigating three (3) major themes that focus on the origins and manifestations of piracy; the apprehension of piracy; and the prosecution of piracy. This Report is a key output from the first phase of the project which primarily utilized desk top research conducted between June 2011 and February 2012. Its main purpose is to serve as a discussion piece for the DMPP external Law and Governance Module working group members. It is anticipated that working group members will critically review the context and analysis of the report for accuracy and omissions, identify priority areas for attention, identify areas for further research and recommend draft policy options anticipated to address issues surrounding the law and governance aspects of contemporary marine piracy. For ease of reference and additional insight, the Report offers some key discussion points within its sections and conclusion. Whilst by no means exhaustive, the research analysis reflected herein is geared towards answering four major research questions pertaining to: 1) The current legal and institutional arrangements for addressing piracy; 2) The current legal regime dealing with the apprehension, prosecution and incarceration of pirates; 3) The legal status of pirates, child pirates, suspect pirates, organizers and their backers; and, 4) The governance conditions that allow piracy to gain a foothold. The discussions provide an interpretive outline of the three major formulations or definitions of piracy found within international law, a summary of the national approaches taken by States to incorporate those definitions in their national laws dealing with the suppression of crime at sea; and examine how the DMPP-formulated definition complies with current legal practices. While a plethora of arrangements exist that both directly and indirectly have a role in addressing piracy, the Report also highlights the key arrangements for coordinating and organizing the fight against piracy at the international, regional and other institutional/organizational levels. Given the role of the International Maritime Organization (IMO) as the leading multilateral agency tasked with addressing the issue of piracy, the DMPP Law and Governance team undertook a preliminary analysis to assess the effectiveness of that role in light of the serious issues and challenges presented by the current scale of piracy off the East Coast of Africa, and elsewhere in the world. Drawing upon several insightful interpretations of the rights, duties and obligations of states in the investigation, apprehension and prosecution of suspect pirates, the resulting analysis concluded that the legal regime and mechanisms employed to date have not been without its challenges and difficulties. In addition to national courts, several other avenues have been recommended and analyzed, whether they are applicable for prosecuting those found committing or attempting to commit acts of piracy, including those involved in piracy operations, more particularly piracy backers, organizers and financiers. Emphasis has also been placed on those who use Hawala and other value transfer systems to facilitate the movement of funds to aid piracy operations, those who seek to employ children as pirates and those who may be proven guilty of participating in transnational organized crime, or in extreme cases, crimes against humanity. Special consideration was also given to the status and rights of the child, prosecution of young offenders and the problems with returning a child to the worst forms of labor. In deliberating on the dominant conditions that have seemingly allowed piracy to gain a foothold particularly within the East African region (Horn of Africa), some structural indicators evident within functional/strong states were examined as the basis for analyzing the influence of failed states and to some extent, weak states, on maritime piracy operations. Additionally, analysis of the current literature undertaken for this project suggests that the effectiveness of existing governance regimes at the national, regional and international levels are inextricably linked to the root causes of piracy. Similarly, the linkages between and among relevant institutional arrangements in terms of their functionalities and the process for ensuring data and information, analysis and advice are provided to guide decision-making at national, regional and international levels need to be determined and where necessary, strengthened. From a governance effectiveness perspective, it is evident that there is a broad array of policy actors who are engaged in addressing the problem of marine piracy. As such, the DMPP research has highlighted that considerable emphasis should be placed by scholars, practitioners and decision-makers on the need to understand and address marine piracy at multiple jurisdictional levels. Before concluding, the Report discusses the initial efforts of the DMPP to develop a generalized predictive model that would provide the global maritime community with a preliminary decision-support tool aimed at anticipating potential piracy ‘hot spots’. The development of this predictive model draws upon the research conducted by all three of the DMPP modules and identifies the socioeconomic, governance, legal and other relevant precursors to the outbreak of contemporary piracy. The policy implications of such a tool are widespread as it can provide the incentives needed for targeted pre-emptive responses to be structured and focused before the problem becomes manifest. Most significantly, it has the potential to modify and enhance governance regimes in areas flagged as potentially susceptible to piracy and more than likely (to experience piracy activity in the near future), with the potential for other global, regional and national security-related risks.

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 139p.

Source: Internet Resource: Marine Affairs
Program Technical Report #2: Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/MAP_Technical_Report_%232.pdf

Year: 2012

Country: International

Keywords: Maritime Crimes

Shelf Number: 128769


Author: Whitman, S.

Title: Dalhousie Marine Piracy Project: The Root Causes and True Costs of Marine Piracy

Summary: Although the Socio Economic Module Draft Report conceptualizes piracy as an economic crime, it also considers political, social, and historical facts associated with piratical activity. The overall aim is to provide a report that may lead to more proactive approaches to combatting piracy in the future by considering the root causes and how to prevent future outbreaks. The Socio Economic Module was tasked with investigating two major themes under the broader DMPP project, including: 1) The cost of piracy: the effect piracy is having on the commercial shipping, including responses by the shipping and insurance industry, and uses of risk management, including the safety of seafarers. 2) The prevention of piracy: considering the social, political and economic factors which contribute to the emergence of piracy, including and exploration of parallels between child soldiers and loss of livelihoods following natural disasters. In order to address the broader themes listed above, the Socio Economic Module took a comparative case study approach to its research, focusing on geographic regions that are currently affected by piratical activity. This includes: Southeast Asia, Gulf of Guinea, Gulf of Aden, and Latin America and the Caribbean. Such an approach allowed us to identify both specific and common socio-economic factors related to piracy by tracing its origins and evolution. The global analysis of the root causes of piracy can be summarized as follows: 1) Economic Root Causes: a. The relatively high chances of substantial income; b. The relatively low costs of and attack; c. The relatively low opportunity costs and economic risks. 2) Social Root Causes: a. Maritime Capacity and tradition in a region; b. The ability to gain social status through piracy; c. The existence of grievance; d. The existence of community support for piracy. 3) Political Root Causes: a. The existence of corruption within the state; b. The presence of armed groups; c. Limited state capacity; d. Regional disputes. Given these root causes, it is a challenge to address how to prevent the occurrence of maritime piracy. The Socio Economic Module seeks to provide new theoretical paradigms through which to address piracy: 1) Conflict Prevention Theory requires a multi-pronged approach that requires sincere commitment to short, medium and long-term objectives. The principles of the Responsibility to Protect doctrine should be born in mind and applied to the piracy problematique. 2) Addressing the Demand side of the problem in terms of the lessons learned from the drug and human trafficking paradigms provides potential remedies. The inelasticity in the demand for piracy has undermined the operational and security-centric interventions to date. 3) Corporate Social Responsibility and Globalization need to be considered as piracy is a profit making business that has benefitted from globalized markets and technology. Can the remedies to piracy be found in the principles of corporate social responsibility – through the creation of programmes, taxes, and infrastructure development that impacts poverty levels, unemployment, and violence and corruption levels in the regions where piracy exists? Key areas for further research that have been identified include: 1) the Environmental impacts on piracy; 2) Latin America and emerging trends; 3) Links to the small arms trade; 4) Links to human trafficking; 5) Links to the drug trade; 6) Human costs of piracy; 7) The relationship between subsistence pirates and organized pirates; 8) Gender dimensions of piracy.

Details: Halifax, Nova Scotia: Dalhousie University, 2012. 135p.

Source: Internet Resource: Marine Affairs Program Technical Report #1: Accessed May 21, 2013 at: http://marineaffairsprogram.dal.ca/Files/MAP_Technical_Report_%231.pdf

Year: 2012

Country: International

Keywords: Economics of Crime

Shelf Number: 128770


Author: Food and Agriculture Organization of the United Nations

Title: Model Scheme on Port State Measures to Combat Illegal, Unreported and Unregulated Fishing

Summary: This document contains the text of the Model Scheme on Port State Measures to Combat Illegal, Unreported and Unregulated Fishing. An FAO Expert Consultation to Review Port State Measures to Combat Illegal, Unreported and Unregulated Fishing was convened in 2002 with a view to facilitating the implementation of the 2001 FAO International Plan of Action to Prevent, Deter and Eliminate Illegal, Unreported and Unregulated Fishing. The Consultation focused its work on a paper entitled “Port State Control of Foreign Fishing Vesselsâ€. Inter alia, it discussed elements that could be included in a regional memorandum of understanding (MOU) on port State measures to combat IUU fishing. The Consultation acknowledged that such a MOU could serve as an effective tool to enhance responsible fisheries management. Subsequently, in 2004, a FAO Technical Consultation to Review Port State Measures to Combat Illegal, Unreported and Unregulated Fishing was held. It was convened on the recommendation of the 2003 FAO Committee on Fisheries (COFI). The Consultation addressed (i) substantive issues relating to the role of the port State in combating IUU fishing and (ii) principles and guidelines for the establishment of regional memoranda on port States measures. The Consultation approved a Model Scheme on Port State Measures to Combat Illegal, Unreported and Unregulated Fishing. COFI in 2005, in endorsing the report and recommendations of the 2004 Technical Consultation, agreed that follow-up work to the Consultation should be undertaken, especially with respect to operationalizing the Model Scheme. The Governments of Japan, Norway, Sweden and the United States of America contributed financially through the FAO FishCode Programme to the preparatory activities leading to the development and publication of the Model Scheme.

Details: Rome: Food and Agriculture Organization of the United Nations, 2007. 59p.

Source: Internet Resource: Accessed May 22, 2013 at: ftp://ftp.fao.org/docrep/fao/010/a0985t/a0985t00.pdf

Year: 2007

Country: International

Keywords: Fishing Industry

Shelf Number: 128774


Author: Schäfer, Rita

Title: Men as Perpetrators and Victims of Armed Conflicts: Innovative Projects Aimed at Overcoming Male Violence

Summary: A more detailed analysis of various diverging war experiences of boys, male adolescents and men is essential for development cooperation in post-war societies and must be taken into consideration for project planning and implementation. Differentiated gender perspectives are required in order to put an end to tolerated, widespread gender-specific and sexualized violence. In addition, violence among male youth and men is a threat to often very fragile peacebuilding processes. Many of them were ex-combatants or soldiers and most of them face an uncertain future and unemployment after their release. This study outlines the formation of the male identity before and after wars, thereby also touching on the problem of child soldiers. On the basis of country studies, projects and programs will be presented that have contributed to changes in behavior and attitudes among boys, adolescents and men after wars or armed conflicts. The research focuses on innovative approaches from African countries. Additionally, examples from other continents will be presented. The selection of projects and programs represents the priority and cooperation countries of the Austrian Development Cooperation (ADC). Guidelines from the ADC and international treaties are referenced in detail. The many concrete examples draw on experiences at local, national and international level, as well as on theme-related studies from various organizations of the United Nations and numerous non-governmental organizations. Moreover, the study examines projects for education and awareness raising on masculine gender identity, sexuality, fatherhood and health. Noteworthy are also the cultural, media and sports programs for community building among youth. The powers of traditional, religious and local authorities are expounded through examples, as they can promote or interfere with change processes. Lastly, the study provides recommendations for the ADC. This study builds on previous work from the Vienna Institute for International Dialogue and Cooperation (VIDC) on gender and children in armed conflicts.

Details: Vienna: VIDC – Vienna Institute for International Dialogue and Cooperation, 2013. 96p.

Source: Internet Resource: Accessed May 25, 2013 at: http://www.vidc.org/fileadmin/Bibliothek/DP/Nadja/VIDC_Schaefer_E_Druckversion.pdf

Year: 2013

Country: International

Keywords: Armed Conflicts

Shelf Number: 128794


Author: Organization of American States

Title: The Drug Problem in the Americas: Studies. The Economics of Drug Trafficking

Summary: Summary and Findings: ï‚· While estimating the size of global and hemispheric drug markets presents tremendous challenges, evidence suggests that some two thirds of total revenues are earned at the final, retail level in consuming countries. ï‚· Wholesalers and traffickers through transit countries account for another 20-25 percent of revenues, while just under 1 percent of total retail sales finds its way to drug cultivators in the Andes. ï‚· In terms of the size of overall drug markets, the most recent UN estimates place total retail sales of illicit drugs at some $320 billion or 0.9 percent of GDP. Other estimates are lower. ï‚· The UN estimates annual drug revenues in the Americas at $150 billion or just under half the global total, though other estimates are lower. North America currently occupies a dominant share of the hemispheric total, reflecting higher prices as well as higher drug prevalence, though this could change in future years. ï‚· Cocaine estimates enjoy better consensus, with U.S. sales accounting for some $34 billion out of a global retail cocaine market of about $85 billion. Cocaine estimates for the rest of the hemisphere are a small fraction of this figure, but this could change when revised Brazilian data become available. ï‚· Estimates of marijuana and methamphetamine revenues suffer particularly high rates of uncertainty.

Details: Washington, DC: OAS, 2013. 46p.

Source: Internet Resource: Accessed May 25, 2013 at: http://www.cicad.oas.org/main/policy/informeDrogas2013/laEconomicaNarcotrafico_ENG.pdf

Year: 2013

Country: International

Keywords: Drug Markets

Shelf Number: 128797


Author: Organization of American States

Title: The Drug Problem in the Americas: Studies. Drugs and Security

Summary: The relationship between the drug problem and security can be explained principally by the state’s weakness in performing its law and order functions, property protection and crime prevention. The varying capabilities of different states in the region to guarantee protection for their citizens and effective law enforcement constitute a key variable in understanding why in some countries the drug problem is viewed as a major security threat, while in others its effect is less intense. While drug use tends to be high among people who have committed crimes, this does not mean that the majority of drug users commit crimes. The relationship between drug use and the occurrence of crime tends to be highest in specific urban spaces, and is generally associated with drug use by socially marginalized groups. Drug trafficking is an important factor behind the high mortality rates of some countries in the hemisphere. Nevertheless, there is not enough evidence to conclude that recent changes in drug trafficking routes have resulted in a decline in violent deaths, suggesting that other underlying factors may be driving this violence. The relationship between the drug problem and organized crime works both ways: Illegal drugs provide resources that fuel crime, while organized crime serves as the engine to sustain much of the drug market. From a security perspective, the problem is more about organized crime than drugs. Illegal firearms trafficking is a major problem throughout the hemisphere, exacerbated by the relationship between illegal drugs and organized crime. Illegal drugs drive crime, violence, corruption, and impunity. These four factors are key to understanding the interaction among prohibition, criminal organizations, and state institutions. The drug problem accentuates corruption within countries, taking advantage of institutional weaknesses, lack of controls and regulations, and lack of judicial independence. Institutional responses to address the drug problem may trigger reactions that further aggravate levels of violence and crime. Often times, State attempts to combat criminal factions simultaneously and head-on lead to fragmentation and power vacuums that exacerbate violence.

Details: Washington, DC: OAS, 2013. 48p.

Source: Internet Resource: Accessed May 25, 2013 at: http://www.cicad.oas.org/main/policy/informeDrogas2013/drogasSeguridad_ENG.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 128798


Author: International Juvenile Justice Observatory (IJJO)

Title: End Violence against Children in Custody. International and European Regulation and Policies

Summary: Children and young people all over the world are in need of protection and special care when they come into conflict with the law. This is the inspiration behind the establishment of the International Juvenile Justice Observatory (IJJO), which offers an inter-disciplinary system of information, communication, debates, analysis and proposals concerning different areas relating to the development of juvenile justice in the world. Indeed, The IJJO aims to be an ambitious endeavour that promotes an international and interdisciplinary approach to issues related to juvenile justice, based on UN rules and regulations and implemented through its mission and activities. These rules and regulations include: the UN Convention on the Rights of the Child, the UN Guidelines for the Prevention of Juvenile Delinquency (The Riyadh Guidelines), the UN Standard Minimum Rules for the Administration of Juvenile Justice (The Beijing Rules) and the UN Standard Minimum Rules for Non-custodial Measures (The Tokyo Rules). In this framework, the IJJO attaches importance to the promotion of a holistic and interdisciplinary concept of juvenile justice, based on three fundamental axes: the prevention of juvenile delinquency, penal intervention and educational measures and finally socio-professional reinsertion. Concerning the penal and educational measures, the IJJO provides a permanent forum for analysis, information and reflection on topics related to a child friendly justice. For that, The IJJO has a benchmarking function; it develops scientific researches, establishes good practice criteria and disseminates information on efficient strategies related to policies and interventions for the protection of young offenders’ rights. In this way, the protection of young offender’s rights and, more specifically, children victims of violence in custody is one of its advocacy priority, respecting always the Convention on the Rights of the Child (CRC).

Details: IJJO, 2012. 28p.

Source: Internet Resource: Accessed May 25, 2013 at: http://www.oijj.org/

Year: 2012

Country: International

Keywords: Juvenile Detention

Shelf Number: 128823


Author: Stiles, Margot L.

Title: Stolen Seafood: The Impact of Pirate Fishing on Our Oceans

Summary: Pirate fishing may be understood best by standing on the beach and gazing out to sea. Almost all crime at sea takes place beyond the horizon line, hidden from view. This vast wilderness is exploited not only for fish, but as a hiding place for criminal activities. Stolen fish are caught illegally, evading a wide range of safeguards to undercut the costs of doing business. Blatant violation of catch limits, gear restrictions and safety precautions are frequently carried out by a small fraction of fishermen, undermining the efforts of responsible fishing companies. The resulting damage to marine resources can lead to smaller catches, slowed recovery of depleted stocks or even collapse for the most vulnerable fisheries. Pirate, or illegal, fishing is often lumped together with unregulated and unreported fishing under the abbreviation “IUU.†Unregulated fishing takes place in nations that lack the resources to establish fisheries laws or monitoring. Some unreported fishing stems from a lack of scientific data collection, while other unreported catches conceal illegal activity. These three dimensions of illegal fishing are a major threat to the oceans, consumers and seafood businesses around the world.

Details: Washington, DC: Oceana, 2013. 28p.

Source: Internet Resource: Accessed May 25, 2013 at: http://oceana.org/sites/default/files/reports/Oceana_StolenSeafood.pdf

Year: 2013

Country: International

Keywords: Fishing Industry

Shelf Number: 128825


Author: Turner, Catherine

Title: Out of the Shadows: Child Marriage and Slavery

Summary: This report reviews the literature available on child marriage to show that a potentially high proportion of children in marriage are in slavery. Despite a good deal of publicity around child marriage its links with slavery have received very little attention to date. As not all child marriage (involving under 18 year-olds) is slavery, the report outlines the relevant international slavery framework to help clarify when child marriage could amount to slavery. It also notes gaps at the international level for addressing child marriage as a slavery issue, and at the national level in terms of tackling it in law and practice. It also deals with the complexity of root causes.

Details: London: Anti-Slavery International, 2013. 50p.

Source: Internet Resource: Accessed May 25, 2013 at: http://www.antislavery.org/includes/documents/cm_docs/2013/c/child_marriage_final.pdf

Year: 2013

Country: International

Keywords: Child Marriage

Shelf Number: 128826


Author: Smith, Ardea

Title: The Seductive Orchid: A look into the Justifications and Motivations Behind the Illicit Flora Economy

Summary: In a world that is focused on conserving what is deemed ‘sexy’ no creature better fits this description than the exotic and colorful orchid. The history of this often delicately depicted flora is a sordid tale that spans the globe, from the murky swamps of the Fakahatchee State Preserve in Florida to the Amazonian tropics of Brazil and Borneo where deadly tropical diseases and harsh wilderness threaten orchid hunters at every turn. Set against the backdrop of such foreboding environments, the orchid stands out as a sophisticated version of the wild area in which it lives, its vibrant colors and twisted leaves tempered by its smooth petals and soft curves. “Orchids are subtle, delicate, voluptuous and masters of disguise. They take on the shapes, scents and colours that seduce the insects they feed upon. But they are best of all at seducing humans†(You can get off alcohol and drugs, but you can never get off orchids. Never 2006). How have orchids become so closely associated with such avid exotic sexual appeal? One of the primary interests in writing this paper was to understand how seduction became so closely associated with orchids and how this definitional framework for understanding orchids in the Western world influences or drives the illicit orchid market. The metaphors and descriptors governing the orchid market connect directly to the current motivations and justifications used by orchid smugglers and orchid consumers to continue their hunt for wild flora. An investigation into the behavioral component of the illicit orchid trade presents some clues to the obstacles facing the crackdown on orchid smuggling but also prompts a larger question; should we as citizens care and work to change the behavior of orchid smugglers? Biodiversity and sustainability of our collective ecosystem are two powerful motivators to stop the harvesting of wild orchids. However, in assessing the overall damage of the wild orchid industry to the environment a study of this illicit economy runs into the problem of the “politics of numbers†(Dillman 2012) that encompasses issues of rarity and taxonomy. With a sometimes-cloudy view of the dangers of continued orchid trafficking, it is difficult to always formulate and justify a need to curb orchid smuggling activities. The solutions offered in this paper encapsulate the difficulties of dealing with an illicit economy and in particular, the seductive orchid.

Details: Tacoma, WA: University of Puget Sound, 2011(?). 21p.

Source: Internet Resource: Accessed May 25, 2013 at: http://www.pugetsound.edu/files/resources/11228_Smith.pdf

Year: 2011

Country: International

Keywords: Conservation

Shelf Number: 128830


Author: Organization of American States

Title: The Drug Problem in the Americas: Studies. Legal and Regulatory Alternatives

Summary: FINDINGS ï‚· Over the past two years, the hemispheric drug policy debate has become much more active and intense. Marijuana legalization initiatives in Uruguay and two western U.S. states are drawing broad attention in the hemisphere. ï‚· About a dozen OAS member states have non-criminal or reduced penalties or no penalty at all for possession of a personal amount of controlled substances, including Argentina, Brazil, and Mexico. ï‚· Decriminalization of marijuana for personal use is common in many states of the United States, in practice or by law. ï‚· The available evidence suggests that reducing penalties for possession of small quantities has little effect on the number of users. ï‚· Legalization of controlled substances, especially if commercialized, could complicate prevention efforts, decrease prices, and thus expand use and addiction, with all the negative consequences that accompany these trends. ï‚· Assuming well-functioning regulatory structures, legalization could reduce many of the negative consequences with which society is most concerned, including violence, corruption, and public disorder surrounding drug distribution; the transmission of blood-borne diseases associated with shared needles; and the incarceration of hundreds of thousands of low-level drug offenders. ï‚· There is limited evidence available to accurately measure tradeoffs, and it is difficult to predict exactly to what extent legalization would reduce violence and other harms or increase the prevalence of addiction and use. The results would vary by country, by drug, and by the nature of the legalization regime adopted. No country has legalized any of these drugs, and neither historical analogies (such as to the period when cocaine was legal in many Western countries) nor comparisons to alcohol prohibition provide much insight.

Details: Washington, DC: OAS, 2013. 42p.

Source: Internet Resource: Accessed May 28, 2013 at: http://www.cicad.oas.org/main/policy/informeDrogas2013/alternativasLegales_ENG.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 128833


Author: Financial Action Task Force (FATF)

Title: National Money Laundering and Terrorist Financing Risk Assessment

Summary: This document is intended to provide guidance on the conduct of risk assessment at the country or national level, and it relates especially to key requirements set out in Recommendation 1 and paragraphs 3-6 of INR 1. In particular, it outlines general principles that may serve as a useful framework in assessing ML/TF risks at the national level. The guidance contained in this document takes into consideration previous FATF work, which is still valid reference material. The general principles contained in this paper are also relevant when conducting risk assessments of a more focussed scope, such as in assessments of a particular financial or DNFBP sector (for example, the securities sector) or of thematic issues (for example, the proceeds of corruption related ML). All of these types of assessments (comprehensive, sectoral or thematic) carried out at the national level may also form the basis for determining whether to apply enhanced or specific measures, simplified measures, or exemptions from AML/CFT requirements. Furthermore, while FATF Recommendation 1 does not create specific risk assessment obligations regarding the financing of proliferation of weapons of mass destruction, the general principles laid out in this guidance could also be used in conducting a risk assessment for this area. The guidance in this document is not intended to explain how supervisors should assess risks in the context of risk-based supervision, although risk-based supervision will likely be informed by a national-level risk assessment. Also, this guidance does not provide further explanation of RBA obligations and decisions for financial institutions and DNFBPs. The FATF has issued separate guidance on implementing the RBA for specific sectors and professions, and that material will be reviewed and, as necessary, modified in light of the revised FATF Recommendations. This guidance document is not a standard and is therefore not intended to designate specific actions necessary to meet obligations under Recommendation 1 and INR 1 or any other Recommendations dealing with the RBA. Criteria for technical compliance and for assessing effectiveness relevant to this and all other FATF Recommendations may be found in the FATF assessment methodology. The practices described in this guidance are intended to serve as examples that may facilitate implementation of these obligations in a manner compatible with the FATF standards. This guidance is structured as follows: ï® This section (1) lays out the purpose, scope and status of this guidance, along with an outline of the core FATF obligations relevant to ML/TF risk assessments at any level. ï® Section 2 lays out general principles that should be taken into account when conducting ML/TF risk assessments at the country or national level. ï® Section 3 discusses how to organise a national-level ML/TF risk assessment, its frequency, and the data and information that could be used while undertaking such an assessment. ï® Section 4 presents a high-level view of the three main stages involved in the ML/TF risk assessment process (identification, analysis and evaluation). ï® Section 5 considers the outcome and dissemination of the risk assessment product. ï® Annexes to this document contain additional information relating to ML/TF risk assessment including summaries of selected national-level assessments.

Details: Paris: FATF, 2013. 60p.

Source: Internet Resource: FATF Guidance: Accessed May 28, 2013 at: http://www.fatf-gafi.org/media/fatf/content/images/National_ML_TF_Risk_Assessment.pdf

Year: 2013

Country: International

Keywords: Financial Crimes

Shelf Number: 128840


Author: Brack, Duncan

Title: Combating Illegal Logging: Interaction with WTO Rules

Summary: •Controlling international trade in illegal timber is an essential part of the effort to reduce illegal logging. Consumer countries are taking a range of measures including the EU's FLEGT licensing scheme and Timber Regulation, the Australian Illegal Logging Prohibition Act, the US Lacey Act, and public procurement policies in several countries. •Since these measures are designed to alter the existing patterns of international trade in timber and timber products, concerns are often raised about their compatibility with World Trade Organization rules. •The outcome of any potential dispute case would rest on the interpretation of various clauses of the GATT and other WTO agreements, but there is no experience to date of WTO dispute cases dealing with even vaguely similar issues. •It is important to be aware of the broad constraints placed by WTO rules in designing such measures for controlling trade in illegal timber, which seem likely to be increasingly used. The more the measure diverges from the core WTO principle of non-discrimination in trade, and the more trade-disruptive it is, the more vulnerable it could be to challenge. •Within these constraints, governments have plenty of flexibility to adopt measures designed to exclude illegal timber from international trade. None of the main measures being pursued at present should experience any conflict with WTO rules.

Details: London: Chatham House, 2013. 16p.

Source: Internet Resource: Accessed May 30, 2013 at: http://www.chathamhouse.org/publications/papers/view/191299

Year: 2013

Country: International

Keywords: Illegal Logging

Shelf Number: 128849


Author: Turner, James

Title: Implications for the New Zealand Wood Products Sector of Trade Distortions due to Illegal Logging A report prepared for the Ministry of Agriculture and Forestry

Summary: This study determined, for New Zealand, the production, trade and price effects of international trade distortions due to illegal logging. The study considered the effect of illegal logging on both the price and competitiveness of New Zealand wood products in domestic and foreign markets. Two complementary economic models, the Global Forest Products Model (GFPM) and Radiata Pine Market Model (RPMM) were used to view the New Zealand forest sector in its full international context. While the GFPM provides a global perspective, the RPMM provides a richer description of the New Zealand radiata pine forestry and sawmilling sectors. countries in the policies and institutions that govern forest utilisation, and hence the rules that apply in determining whether logs are legally sourced. Differences between government and NGO approaches to assessment explain much of the variation found in estimates of illegal logging. NGO assessments include issues such as logging concession award processes, whether forests are managed “sustainablyâ€, and whether taxes and fees have been levied at a fair or market rate. Governmental organisations, on the other hand, focus on the extent that wood can be traced to an officially sanctioned logging operation. The most comprehensive, and widely quoted, review of illegal logging and trade is Seneca Creek (2004)1, which derived estimates that generally fell between the extremes of the NGO and governmental sources. Recognising the limitations of each source, this present study relied on the range of assessments to derive “lowâ€, “most likelyâ€, and “high†estimates (Table 1). Due to the scope of the review and its widespread recognition Seneca Creek (2004) was influential in our derivation of the “most likely†scenario. Potential for the recently announced increase in the Russian softwood log export tax to have significant repercussions for the global forest sector meant that an additional set of projections included the tax.

Details: Wellington, NZ: New Zealand Ministry of Agriculture and Forestry, 2007. 192p.

Source: Internet Resource: Accessed May 30, 2013 at: http://maxa.maf.govt.nz/forestry/illegal-logging/trade-distortion-implications/Final_Report.pdf

Year: 2007

Country: International

Keywords: Economics of Crime

Shelf Number: 128850


Author: Russo, Francesco Flaviano

Title: Cocaine: The Complementarity Between Legal and Illegal Trade

Summary: The smuggling cost of an imported illegal good decreases as the volume of legally imported goods increases. First because more imports are typically associated to an increased number of transporters, which is an increased supply of potential smugglers. Second because, as the number of shipments increases, the individual inspection probability decreases, lowering the risk born by the smugglers and thus their compensation. I test this theory using data on the market for cocaine, finding empirical support: in a panel of countries, an increased volume of imports is robustly associated to a decreased price of cocaine. Legal and illegal trade appear to be complementary.

Details: Naples, Italy: CSEF - Centre for Studies in Economics and Finance, Department of Economics, University of Naples, 2010. 40p.

Source: Internet Resource: Working Paper No. 253: Accessed May 30, 2013 at: http://www.csef.it/WP/wp253.pdf

Year: 2010

Country: International

Keywords: Cocaine (Italy)

Shelf Number: 128853


Author: Button, Mark

Title: Measuring Fraud in Overseas Aid: Options and Method

Summary: This report seeks to identify and select an appropriate methodology to measure fraud losses in the different modalities of aid. It explores the experience of other countries, donors and multilateral bodies in measuring fraud in overseas aid and discovers little evidence that bilateral donors, multilateral agencies or UK NGOs use Fraud Loss Measurement Techniques (FLM) to assess fraud levels in their overseas aid budgets. Some governments and multilateral agencies find it useful to have large sampling exercises to collect measures of wider losses due to what they call ‘Improper Payments’ or some similar term. Reported figures vary widely from organisation to organisation and over time: e.g. the total estimated Improper Payments rate for USAID was reported as 0.85% in 2008 and 0.28% for 2009; but the estimated financial impact of irregularities on the budget of the European Anti Fraud Office OLAF rose from 1.13% in 2009 to 1.27% 2010. FLM-type exercises are used by government agencies such as the DWP, HMRC, the NHS and Medicare in the US. Again there is considerable variation between agencies and types of expenditure: the DWP estimated fraud rate varied from 0.0% for pensions to 4.1% for jobseekers allowance; the HMRC estimated a total ‘direct tax gap’ for 2009 at 5.8%; a recent NHS study highlighted a fraud loss rate of 4.7% for a medical locum agency’s invoicing: and the US Medicare reported 7.6% ‘Improper Payments’ in 2009. This report examines the potential for FLM exercises applied to the complex and challenging environment of overseas aid and aid modalities. It shows that FLM approaches, being rare in this context, would be difficult and expensive to apply to a bilateral donor complete budget. However, the report argues that there are elements of the a bilateral budget where FLM can be undertaken and with the development of fraud resilience checks and a fraud loss model much greater understanding of the risk of fraud in different contexts can be gauged. As a result the report concludes on the need to: • Recognise that FLM and the broader development of counter fraud capacity are a form of aid. • Reject attempts to measure total fraud in a ‘super measure’ on all the bilateral donor budget as this is too complex and expensive to achieve. • Seek to use FLM to measure fraud where this is practicable. Work should be focussed upon: the bilateral donor Administration, Direct Purchasing, Developing Countries’ government departments and NGOs receiving aid from the donor. • Carry out further work to: develop resilience checks for the overseas aid fraud context and to create models for predicting range of likely fraud losses. The report also notes the need for a political lead from the top of the bilateral aid donor that enhancing the resilience to fraud should be a condition of aid to governments and international agencies and that multilateral organisations should also move towards enhancing the resilience to fraud as a condition of their aid to countries and to NGOs. The report makes the following recommendations that Bilateral aid agencies: 1. Consider FLM and the broader development of counter fraud capacity as a form of aid. 2. Reject attempts to measure total fraud in its budget as this is too complex and expensive to achieve. 3. Seek to use FLM to measure fraud. These should be focussed upon: – Administration; – Direct Purchasing; – Countries’ government departments and NGOs receiving aid (number depending upon budget). 4. Carry out further work to: – Develop resilience check for overseas aid fraud context; – Create model for predicting range of likely fraud losses.

Details: Portsmouth, UK: University of Portsmouth, Centre for Counter Fraud Studies, 2012. 47p.

Source: Internet Resource: Accessed May 30, 2013 at: http://r4d.dfid.gov.uk/pdf/outputs/misc_gov/60908-DFID_FINAL_REPORT_March2012post_david.pdf

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 128859


Author: Chiu, Jessica

Title: Punitive Drug Law and the Risk Environment for Injecting Drug Users: Understanding the Connections

Summary: This paper, prepared for the Global Commission on HIV and the Law, reviews the evidence documenting the effects of punitive laws and law enforcement practices on the HIV risk environment for injecting drug users (IDUs). It then provides an overview of global drug policy, drawing on a mixture of regional reports and country case studies. Section lll summarises the adoption of harm reduction practices and policies. Finally, the paper looks at a selection of strategies that countries around the world have implemented to improve the HIV risk environment for IDUs. These include interventions to make law enforcement less harmful and more conducive to health; the integration of harm reduction and drug treatment programmes into the criminal justice system; and changes to national anti-drug laws for possession and individual use that move away from punitive anti-drug penalties.

Details: Philadelphia: Temple University, School of Law, 2011. 58p.

Source: Internet Resource: Working paper
prepared for the Third Meeting of the Technical Advisory Group of the Global Commission on HIV and the Law, 7-9 July 2011: Accessed May 30, 2013 at: http://www.hivlawcommission.org/index.php/working-papers?task=document.viewdoc&id=98

Year: 2011

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 128860


Author: United Nations Children’s Fund (UNICEF)

Title: Breaking the Silence on Violence against Indigenous Girls, Adolescents and Young Women. A call to action based on an overview of existing evidence from Africa, Asia Pacific and Latin America

Summary: Even before the adoption of the declaration in 2007, the United Nations Permanent Forum on Indigenous Issues (UNPFII) had at its Fifth Session in 2006 recommended to United Nations organizations and States to provide comprehensive reports on violence against indigenous women and girls, particularly sexual violence and violence in settings of armed conflict. This study responds to that call. It finds that violence against these groups must be understood within the broader contexts of indigenous peoples’ historic and continuing marginalization and discrimination, violations of their collective and individual rights, displacement, extreme poverty and often-limited access to culturally appropriate basic services and justice – a finding that is consistent with the views of the UNPFII and the International Indigenous Women’s Forum. However, in all societies there are practices to keep, practices to change and practices to reconsider. While indigenous peoples continue to value and perpetuate their culture and way of life, we should not be exempt from this type of reflection. We hope this report will trigger change so that indigenous communities – women, men, girls and boys – can play their role in guaranteeing a life free from violence and discrimination for indigenous girls, adolescents and young women. As the study exposes gaps in research and data collection in regard to violence against these groups, it is the collective responsibility of States, indigenous The United Nations Declaration on the Rights of Indigenous Peoples includes Article 22, which ensures that indigenous women and children enjoy the full protection and guarantees against all forms of violence and discrimination. At the time of negotiating this provision, the drafters knew that the contexts in which many indigenous women and girls live place them at risk of violence. Foreword Grand Chief Edward John, Chairperson United Nations Permanent Forum on Indigenous Issues Otilia Lux de Coti Executive Director, International Indigenous Women’s Forum peoples, civil society organizations and United Nations agencies, funds, programmes and special mandate holders to further examine and assess their real experiences in order to effectively focus interventions and strengthen protective factors that work to prevent and reduce the likelihood of violence. To truly realize the rights of indigenous girls, adolescents and young women, there must be a positive and cooperative environment for their promotion and protection. It is our hope that this study will catalyse action so that together we will not only declare that violence is unacceptable but also make its prevention and elimination a living reality.

Details: New York: UNICEF, 2013. 75p.

Source: Internet Resource: Accessed May 30, 2013 at: http://srsg.violenceagainstchildren.org/sites/default/files/documents/Breaking_the_Silence_on_Violence_against_Indigenous_Girls_Adolescents_and_Young_Women_Report.pdf

Year: 2013

Country: International

Keywords: Indigenous Peoples

Shelf Number: 128883


Author: Braithwaite, Valerie

Title: A Multipronged Approach to the Regulation of Workplace Bullying

Summary: This paper reviews the substantial body of research on workplace bullying with a view to developing a regulatory framework for controlling and preventing bullying problems. The paper argues that  Top down approaches in dealing with workplace bullying are unlikely to be effective;  Local knowledge, understanding and capacity are crucial to managing workplace bullying;  Workplace bullying is an interpersonal issue that can be triggered and sustained by a host of factors including the personalities of the people involved, the norms of the workplace, structural features of the work, management style and emotional well-being;  Workplace bullying can be understood as a competitive struggle of oneupmanship that locks individuals into bullying/victim roles;  Better management of shame is at the heart of workplace bullying problems;  Because of the complex set of factors leading to shame and shaping bullying, a multipronged approach is necessary that engages all levels of the organization. This might include organizational policy, organizational backing of local plans for managing bullying, mentoring, counselling, restorative justice conferencing, overhaul of work structures and practices, and mediation;  Where workgroups communicate well, show respect for each other, are fair and open in their dealings with each other and are supported by their senior officers, compliance with policies such as anti-bullying is likely to be higher.

Details: Canberra: Regulatory Institutions Network, Australian National University, 2013. 26p.

Source: Internet Resource: RegNet Occasional Paper 20: Accessed June 1, 2013 at: http://regnet.anu.edu.au/sites/default/files/ROP20.pdf

Year: 2013

Country: International

Keywords: Restorative Justice

Shelf Number: 128884


Author: Seddon, Toby

Title: Regulating Global Drug Problems

Summary: The problems associated with the global drug trade are amongst the most challenging and intractable of all those facing policy-makers. The global drug prohibition system is widely acknowledged as a costly and counterproductive failure, not only presiding over a massive expansion of the problem but also causing a range of damaging side-effects, notably fuelling organised crime. The need for new thinking has never been more evident. It is argued that current arguments for drug policy reform, whilst highly effective at critiquing prohibition, are nevertheless based on a false understanding of the nature of markets and regulation. This paper sets out an alternative constitutive conception of drug control which not only provides a better basis for challenging prohibition but also a more fruitful framework for developing an alternative approach. It is suggested that the regulation perspective outlined in this paper represents a new paradigm for addressing the challenges presented by global psychoactive commerce in the early twenty-first century.

Details: Canberra: Australian National University, Regulatory Institutions Network (RegNet), 2013. 32p.

Source: Internet Resource: RegNet Research Paper No. 2013/6 : Accessed June 1, 2013 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2261026

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 128889


Author: Schjolberg, Judge Stein

Title: Peace and Justice in Cyberspace. Potential new global legal mechanisms against global cyberattacks and other global cybercrimes

Summary: In the prospect of an international criminal court lies the promise of universal justice. Without an international court or tribunal for dealing with the most serious cybercrimes of global concern, many serious cyberattacks will go unpunished. The most serious global cyberattacks in the recent year, have revealed that almost nobody is investigated and prosecuted, and nobody has been sentenced for those acts. Such acts need to be included in a global treaty or a set of treaties, and investigated and prosecuted before an international criminal court or tribunal. Cyberspace, as the fifth common space, after land, sea, air and outer space, is in great need for coordination, cooperation and legal measures among all nations. It is necessary to make the international community aware of the need for a global response to the urgent and increasing cyberthreats. Peace, justice and security in cyberspace should be protected by international law through a treaty or a set of treaties under the United Nations. The progressive developments of global cyberattacks, such as massive and coordinated attacks against critical information infrastructures of sovereign States, must necessitate an urgent response for a global treaty.

Details: A Background Paper for EastWest Institute (EWI) Worldwide Cybersecurity Summit Special Interest Seminar: Harmonizing of Legal Frameworks for Cyberspace New Delhi, India October 30-31, 2012. 40p.

Source: Internet Resource: Background Paper: Accessed June 1, 2013 at: http://cybersummit2012.com/sites/cybersummit2012.com/files/EWICybersecuritySummit.pdf

Year: 2012

Country: International

Keywords: Cyber Security

Shelf Number: 128910


Author: Environmental Investigation Agency (EIA)

Title: Enforcement Not Extinction: Zero Tolerance on Tiger Trade

Summary: The International Tiger Forum held in November 2010 in Saint Petersburg, Russia, provides an exciting opportunity. Convened by Prime Minister Vladimir Putin, leaders of Tiger Range Countries (TRC) endorsed a declaration and Global Tiger Recovery Program (GTRP) to double the tiger population by 2022, the next Year of the Tiger, setting the tone for future national and global efforts. Many of the strategies advocated in the Forum have been proposed repeatedly since the last Year of the Tiger. Some are older still. On paper they appear objective, logical and scientific – yet governments have failed to implement them thoroughly or consistently. Will this time be any different? Can world leaders rise to the challenge and deliver meaningful action, not simply fine words? Drawing on EIA’s experience of investigating the illegal trade in consumer countries, this position paper highlights the key recommendations on law enforcement that have consistently been made over the years and examines the possible underlying reasons why they have not yet been implemented. Accepting that these enforcement recommendations are still key to the survival of the wild tiger, we identify actions that governments can take to overcome those obstacles and demonstrate real progress and change on the ground. We call upon governments to prioritise the following: • Secure greater involvement of police and Customs officers in tiger and other Asian big cat conservation • Reduce demand for tiger and other Asian big cat parts • Expand the use of intelligence-led enforcement in combating tiger trade • Improve international cooperation to disrupt transnational criminal networks • Continue with reform of judicial processes • Increase resources to combat wildlife crime • Improve the motivation of enforcement personnel • Tackle corruption in wildlife crime

Details: London: EIA, 2011. 28p.

Source: Internet Resource: Accessed June 4, 2013 at: http://www.eia-international.org.php5-20.dfw1-1.websitetestlink.com/wp-content/uploads/reports210-1.pdf

Year: 2011

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 128960


Author: Zain, Sabri

Title: Behaviour Change We Can Believe In: Towards A Global Demand Reduction Strategy for Tigers

Summary: With populations of Tigers continuing to plummet in the wild over the past decades, it would appear that campaigns and other public awareness initiatives to reduce consumer demand for parts and derivatives from this and other endangered species have failed to stem the tide of illegal killing. This paper discusses why conservationists need to explore new approaches to understanding and influencing the behaviours that are driving consumer demand for these products, and examines tools and models that can address the underlying drivers of these behaviours. Various principles employed in the disciplines of social psychology, economics and behavioural economics (where the first two disciplines overlap) are outlined, as well as some key factors that are important to consider for anyone developing strategies that seek to influence the behaviour of consumers of wildlife products. Some strategic guidelines and a framework for applying these factors to the development of a global demand reduction strategy for Tigers are also outlined.

Details: Cambridge, UK: TRAFFIC, 2012. 23p.

Source: Internet Resource: Accessed June 4, 2013 at: www.traffic.org

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 128961


Author: Hui, Kai-Lung

Title: Marginal Deterrence in the Enforcement of Law: Evidence from Distributed Denial of Service Attack

Summary: By studying a panel dataset of distributed denial of service attack across 240 countries over 5 years, we find that enforcing the Convention on Cybercrime had increased the intensity of attack by 43 to 52 percent. It did not significantly reduce the chance for a country to be selected for the attack. We conducted a battery of identification and falsification tests to show that such increased attack intensity arose because of failure in marginal deterrence, instead of other theories such as brutalization, stigmatization, or defiance, or general forms of endogeneity. We show that raising the standard of proof of conviction is one way to facilitate marginal deterrence, but it has the undesirable effect of raising the offense rate. We discuss other possible solutions.

Details: Unpublished paper, 2013. 58p.

Source: Internet Resource: Accessed June 6, 2013 at: http://home.ust.hk/~davcook/marginal%20deterrence.pdf

Year: 2013

Country: International

Keywords: Computer Crimes

Shelf Number: 128967


Author: Global Commission on Drug Policy

Title: The Negative Impact Of The War On Drugs On Public Health: The Hidden Hepatitis C Epidemic

Summary: Hepatitis C is a highly prevalent chronic viral infection which poses major public health, economic and social crises, particularly in low and middle income countries. The global hepatitis C epidemic has been described by the World Health Organization as a ‘viral time bomb’, yet continues to receive little attention. Access to preventative services is far too low, while diagnosis and treatment are prohibitively expensive and remain inaccessible for most people in need. Public awareness and political will with regard to hepatitis C are also too low, and national hepatitis surveillance is often non-existent. The hepatitis C virus is highly infectious and is easily transmitted through blood-to-blood contact. It therefore disproportionately impacts upon people who inject drugs: of the 16 million people who inject drugs around the world, an estimated 10 million are living with hepatitis C. In some of the countries with the harshest drug policies, the majority of people who inject drugs are living with hepatitis C – more than 90 percent in places such as Thailand and parts of the Russian Federation. The hepatitis C virus causes debilitating and fatal disease in around a quarter of those who are chronically infected, and is an increasing cause of premature death among people who inject drugs. Globally, most HIV-infected people who inject drugs are also living with a hepatitis C infection. Harm reduction services – such as the provision of sterile needles and syringes and opioid substitution therapy – can effectively prevent hepatitis C transmission among people who inject drugs, provided they are accessible and delivered at the required scale. EXECUTIVE SUMMARY Instead of investing in effective prevention and treatment programmes to achieve the required coverage, governments continue to waste billions of dollars each year on arresting and punishing drug users – a gross misallocation of limited resources that could be more efficiently used for public health and preventive approaches. At the same time, repressive drug policies have fuelled the stigmatisation, discrimination and mass incarceration of people who use drugs. As a result, there are very few countries that have reported significant declines in new infections of hepatitis C among this population. This failure of governments to prevent and control hepatitis disease has great significance for future costs to health and welfare budgets in many countries. In 2012 the Global Commission on Drug Policy released a report that outlined how the ‘war on drugs’ is driving the HIV epidemic among people who use drugs. The present report focuses on hepatitis C as it represents another massive and deadly epidemic for this population. It provides a brief overview of the hepatitis C virus, before exploring how the ‘war on drugs’ and repressive drug policies are failing to drive transmission down. The silence about the harms of repressive drug policies has been broken – they are ineffective, violate basic human rights, generate violence, and expose individuals and communities to unnecessary risks. Hepatitis C is one of these harms – yet it is both preventable and curable when public health is the focus of the drug response. Now is the time to reform.

Details: Rio de Janeiro – RJ – Brasil: The Commission, 2013. 24p.

Source: Internet Resource: Accessed June 7, 2013 at: http://www.globalcommissionondrugs.org/hepatitis/gcdp_hepatitis_english.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 129005


Author: Robertson, Oliver

Title: Lightening the Load of the Parental Death Penalty on Children

Summary: One of the little-asked questions in debates over the death penalty is what happens to the children of the offender. The arrest, sentencing and (potential) execution of a parent affect children greatly, but they receive little consideration and less support. Some of the impacts on children of parents sentenced to death or executed are similar to those experienced by children of prisoners more generally. These include how they experience the arrest and trial of a parent, some of the issues around visiting a parent in prison, and considerations about what they are told and when. Even in these cases, children of parents sentenced to death may experience the issues at greater intensity or with additional aspects that other children of prisoners do not face. But there are also areas where the nature of the death penalty itself, and the procedures accompanying it, mean the experiences of these children are categorically different from those of their peers. These include dealing with the execution itself, and learning to continue living after the execution in the knowledge that a parent has been killed by the State. This paper begins by providing some basic information about children of parents sentenced to death, issues that persist through the whole of a parent’s interaction with the criminal justice system. Next, it looks at issues that are similar to those faced by other children of prisoners, but focuses on the ways in which children of parents sentenced to death are different. For a more detailed account of the situation of children of prisoners worldwide, including recommendations and examples of good practice, read QUNO’s 2012 paper Collateral Convicts. Thirdly, the fundamentally different issues are considered, those only children of parents sentenced to death experience. There are a limited number of recommendations included throughout: these are not intended to be comprehensive, instead only covering those areas where there is already clarity about a positive way forward.

Details: Geneva, SWIT: Quaker United Nations Office, 2013. 62p.

Source: Internet Resource: Accessed June 18, 2013 at: http://www.quno.org/geneva/pdf/humanrights/women-in-prison/2013LighteningLoad-English.pdf

Year: 2013

Country: International

Keywords: Capital Punishment

Shelf Number: 129015


Author: Center on Global Counterterrorism Cooperation

Title: To Protect and Prevent: Outcomes of a Global Dialogue to Counter Terrorist Abuse of the Nonprofit Sector

Summary: This joint CGCC and United Nations report summarizes the outcomes of a multiyear project led by the UN and aimed at developing a common understanding of sound practices to counter the risk of terrorism financing through the nonprofit sector, protecting the sector and preventing terrorist abuse of nonprofit organizations. The project included two global-level meetings and five regional-level expert meetings. More than 50 states and 80 nonprofit organizations participated in the meetings, in addition to representatives of relevant UN and multilateral agencies, officials from the Financial Action Task Force (FATF) and FATF-style regional bodies, and the financial sector.

Details: Washington, DC: , 2013. 32p.

Source: Internet Resource: Accessed June 18, 2013 at: http://www.globalct.org/publications/to-protect-and-prevent-outcomes-of-a-global-dialogue-to-counter-terrorist-abuse-of-the-nonprofit-sector/

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 129018


Author: Volpi, Elena

Title: Street Children: Promising Practices and Approaches

Summary: In many regions of the world, the phenomenon of street children is unabated, while it is emerging in others where it was unknown so far. Behind child disconnection lie highly vulnerable families and communities, many struggling to come to terms with economic liberalization and growing inequality. Disconnection can also be traced to a lack of communication in the family and the weakening of social capital. Street children are an alarm signaling the dire need for social development and poverty reduction policies to improve the situation in the community at large, and to prevent more young people from becoming marginalized. While preventive interventions are essential, those children already facing the hardships of street life need immediate opportunities for human development via special protection programs. This report distills the main lessons learned from a number of programs that have attempted to meet the special needs of street children worldwide. Its purpose is to help potential donors understand activities in this area and identify promising practices.

Details: Washington, DC: World Bank, 2002. 41p.

Source: Internet Resource: Accessed June 22, 2013 at: http://siteresources.worldbank.org/WBI/Resources/wbi37196.pdf

Year: 2002

Country: International

Keywords: Delinquency Prevention

Shelf Number: 129138


Author: Boulton, Michael

Title: Living in a World of Violence: An Introduction to the Gang Phenomenon

Summary: Gang violence is a feature of everyday life in some countries, where entire communities are dominated by gangs and gang culture. The violence affects men, women and children alike. Many victims are young people who are targeted by the gangs for recruitment and to carry out criminal activities. In fact, in certain regions, much of the gang violence is committed by children against other children. The gang phenomenon is increasing in certain areas and has proven difficult for many states to address. Some of the repressive measures taken against the gangs, by some of the Central American states for instance, have been found to be at variance with international human rights law. The result of escalating violence has been a steady outflow of people from these countries seeking international protection. Some have sought asylum in countries including the United States (US), Canada, Mexico, Australia and European states. This paper is an introduction to the gang phenomenon and aims to provide a brief overview of some of its characteristics globally. The reader will be provided with insights into gang culture, an understanding of how different gangs operate, the various forms of harm and violence involved, and how particular groups of persons are affected by gangs. Though gangs tend to vary widely in visibility, structure, activities, and historical and sociological origins, they share a number of common characteristics. A particular emphasis will be given to societies with serious gang problems where people have become the targets of gang-related violence and have been forced to seek protection across international borders, including El Salvador, Guatemala, Honduras, Jamaica, Brazil and the Russian Federation. The paper also touches on how gang-related violence and government policies designed to combat gangs may cause displacement and lead to asylum claims. Decision-makers, practitioners and others working on refugee status determination, who wish to learn more about the gang phenomenon, may find the present paper helpful as background reading. As the paper is written from a displacement angle, it does not look at prison gangs, which have generally not surfaced in the gang-related asylum jurisprudence. After setting out the scope of enquiry (Section 2), the paper proceeds with an examination of the roots of gang culture from a historical and sociological perspective, highlighting the linkages between post-conflict situations and the emergence of gangs (Section 3). Gang activities and rituals are then analysed with a view to illustrating the significant levels of violence and human rights abuses related to gangs (Sections 4 and 5). Additionally, the impact upon migrants and displaced persons as groups vulnerable to victimization by gangs is assessed (Section 6). The final section of the paper focuses on the issue of state protection and the various approaches that states have adopted in seeking to address gang violence (Section 7).

Details: Geneva, SWIT: United Nations High Commissioner for Refugees, 2011. 30p.

Source: Internet Resource: Legal and Protection Policy Research Series: Accessed June 22, 2013 at: http://www.unhcr.org/4e3269629.pdf

Year: 2011

Country: International

Keywords: Gang Violence

Shelf Number: 129140


Author: IRIN (UN Office for the Coordination of Humanitarian Affairs)

Title: Youth in Crisis: Coming of Age in the 21st Century

Summary: Across the globe, a generation of youth is rapidly reaching adulthood bearing the tragic consequences of their nations’ worst problems. In this ‘Youth in Crisis’ In-Depth, IRIN traces the impact of the events shaping their lives, from the illegal forced marriage of teenage girls in Afghanistan and Ethiopia, to the tripling of school fees and the deteriorating education system in Zimbabwe. Cultural conservatism, as well as fear of attacks on schools by Taliban insurgents, and poverty, mean half of all Afghan children do not go to school, and those who do often ‘graduate’ to unemployment. To be young in some nations is to be more disadvantaged than one’s parents were: the numbers of children attending school in the Republic of Congo has fallen from almost 100 per cent before the 1998-2002 civil war to below 75 percent now. The same is true in northern Uganda where high illiteracy rates are a consequence of two decades of war and insecurity, condemning Acholi youngsters brought up in displaced peoples’ camps to a life of far fewer opportunities than older siblings, parents and even grandparents. Educational and economic collapse is given as one reason for the ease with which militias in the east of the Democratic Republic of Congo recruited teenagers into their ranks - demobilisation programmes struggle to convince many of them to resume civilian lives. Young Somalis, who escaped violence at home, face a different problem: as part of an ‘educated elite’ at schools in refugee camps in Kenya, they are unable to put their education to good use as long as Kenya’s government curtails their movement outside the camps. Life beyond school is equally challenging: some medical students in Conakry, the capital of Guinea, arrive hours before classes just to save a space close enough to a university lecturer to hear him speak. Classes often stretch to more than 1,200 students and lecturers demand financial rewards for granting students good marks. Young Guineans with degrees end up hawking goods on city streets - a factor influencing their decision to agitate for political change, which they say “is going to come with violenceâ€. University campuses in Côte d’Ivoire have become a breeding ground for pro-government political militancy and extortion, while Nigeria is trying to curb the influence of predatory student cults that in the past few years have opened fire on students in examinations, and continue to intimidate or kill anti-cult activists. Gang culture dominates the lives of tens of thousands of South Africans in Cape Town. In addition, youngsters addicted to tik (crystal meth) land up in juvenile detention centres where conditions and counselling are inadequate. Street gangs are also common in N’Djamena, capital of Chad, a country where the role of the youth is said to have been crucial to every political transition since 1975. Emotionally bereft, many Rwandan teenagers are not rebelling but still recovering from the 1994 genocide that defined their lives. Loss and injustice also characterise the lives of an estimated 250,000-300,000 Kenyan street children, while three-quarters of Kenyan sex workers interviewed for a United Nations report said they felt commercial sex was an acceptable way to make money. In Pakistan, the wealth gap between rich and poor is blamed for a surge in petty crime, committed mostly by people aged 16-25 years. Drug addiction is also a problem among the young and privileged. Since the attacks of 11 September 2001 in the United States and the war in Afghanistan that followed, many middle-class boys in Pakistan have been turning away from Western lifestyles and identifying with extremist Islamic groups and the violence they promote. ‘Soul hunters’ from religious or criminal groups in the densely populated Ferghana Valley linking Kyrgyzstan, Tajikistan and Uzbekistan prey on young people facing unemployment or migration to Russia or Kazakhstan - vocational training set up under the Soviet system to provide skills for the labour market has collapsed. In the Occupied Palestinian Territories, some young people take pride in joining groups involved in what they term resistance to Israel, while in Lebanon more teenagers have joined Lebanon’s Hezbollah political party since the 2006 war between Hezbollah militias and Israel’s largely conscripted army. In Iraq, some families say they would rather see their teenagers and children die fighting American soldiers than become victims of spiralling sectarian violence. These issues form part of IRIN’s In-Depth on ‘Youth in Crisis,’ which also contains features on the transition from childhood to adulthood, education, war, migration, HIV/AIDS, violence and urbanisation, as well as photos, links and references.

Details: Nairobi: IRIN, 2007. 80p.

Source: Internet Resource: IRIN In-Depth: Accessed June 25, 2013 at: http://www.irinnews.org/pdf/in-depth/youth-in-crisis-irin-in-depth.pdf

Year: 2007

Country: International

Keywords: Forced Marriage

Shelf Number: 129162


Author: World Health Organization

Title: Global and Regional Estimates of Violence Against Women: Prevalence and health effects of intimate partner violence and non-partner sexual violence

Summary: This report, developed by the World Health Organization, the London School of Hygiene and Tropical Medicine and the South African Medical Research Council presents the first global systematic review and synthesis of the body of scientific data on the prevalence of two forms of violence against women — violence by an intimate partner (intimate partner violence) and sexual violence by someone other than a partner (nonpartner sexual violence). It shows, for the first time, aggregated global and regional prevalence estimates of these two forms of violence, generated using population data from all over the world that have been compiled in a systematic way. The report also details the effects of violence on women’s physical, sexual and reproductive, and mental health. The findings are striking: • overall, 35% of women worldwide have experienced either physical and/or sexual intimate partner violence or non-partner sexual violence. While there are many other forms of violence that women may be exposed to, this already represents a large proportion of the world’s women; 1. Secretary-General says violence against women never acceptable, never excusable, never tolerable, as he launches global campaign on issue. New York, United Nations Department of Public Information, News and Media Division, 2008 (SG/ SM/11437 WOM/1665). • most of this violence is intimate partner violence. Worldwide, almost one third (30%) of all women who have been in a relationship have experienced physical and/or sexual violence by their intimate partner. In some regions, 38% of women have experienced intimate partner violence; • globally, as many as 38% of all murders of women are committed by intimate partners; • women who have been physically or sexually abused by their partners report higher rates of a number of important health problems. For example, they are 16% more likely to have a low-birth-weight baby. They are more than twice as likely to have an abortion, almost twice as likely to experience depression, and, in some regions, are 1.5 times more likely to acquire HIV, as compared to women who have not experienced partner violence; • globally, 7% of women have been sexually assaulted by someone other than a partner. There are fewer data available on the health effects of non-partner sexual violence. However, the evidence that does exist reveals that women who have experienced this form of violence are 2.3 times more likely to have alcohol use disorders and 2.6 times more likely to experience depression or anxiety. There is a clear need to scale up efforts across a range of sectors, both to prevent violence from happening in the first place and to provide necessary services for women experiencing violence. The variation in the prevalence of violence seen within and between communities, countries and regions, highlights that violence is not inevitable, and that it can be prevented. Promising prevention programmes exist, and need to be tested and scaled up.2 There is growing evidence about what factors explain the global variation documented. This evidence highlights the need to address the economic and sociocultural factors that foster a culture of violence against women. This also includes the importance of challenging social norms that support male authority and control over women and sanction or condone violence against women; reducing levels of childhood exposures to violence; reforming discriminatory family law; strengthening women’s economic and legal rights; and eliminating gender inequalities in access to formal wage employment and secondary education. Services also need to be provided for those who have experienced violence. The health sector must play a greater role in responding to intimate partner violence and sexual violence against women. WHO’s new clinical and policy guidelines on the health-sector response to violence against women emphasize the urgent need to integrate issues related to violence into clinical training. It is important that all health-care providers understand the relationship between exposure to violence and women’s ill health, and are able to respond appropriately. One key aspect is to identify opportunities to provide support and link women with other services they need – for example, when women seek sexual and reproductive health services (e.g. antenatal care, family planning, post-abortion care) or HIV testing, mental health 2. Preventing intimate partner violence and sexual violence against women. Taking action and generating evidence. Geneva, World Health Organization, 2010. and emergency services. Comprehensive postrape care services need to be made available and accessible at a much larger scale than is currently provided. The report shows that violence against women is pervasive globally. The findings send a powerful message that violence against women is not a small problem that only occurs in some pockets of society, but rather is a global public health problem of epidemic proportions, requiring urgent action. It is time for the world to take action: a life free of violence is a basic human right, one that every woman, man and child deserves.

Details: Geneva, SWIT: World Health Organization, 2013. 80p.

Source: Internet Resource: Accessed June 27, 2013 at: http://apps.who.int/iris/bitstream/10665/85239/1/9789241564625_eng.pdf

Year: 2013

Country: International

Keywords: Battered Women

Shelf Number: 129189


Author: Kundnani, Arun

Title: Blind Spot? Security Narratives and Far-Right Violence in Europe

Summary: This paper discusses the challenges of countering farâ€Right political violence in the wake of the terrorist attack carried out by Anders Behring Breivik in Norway in July 2011. With brief case studies of Britain, the Netherlands, Denmark and Belgium, it argues that classic neoâ€Nazi groups are being supplemented by new ‘counterâ€jihadist’ farâ€Right movements, which use various modes of political action, including participation in elections, streetâ€based activism and terrorist violence. Building on recent interest among scholars and practitioners in the role of narratives and performativity in counterâ€terrorism, this paper argues that official security discourses tend to hinder efforts to counter farâ€Right violence and can unwittingly provide opportunities for counterâ€jihadists to advance their own narratives. When leaders and officials of Western European governments narrate issues of multiculturalism and radical Islamism in ways that overlap with counterâ€jihadist ideology, it suggests a need for reflection on the unintended sideâ€effects of their security discourse. The paper concludes with a discussion of how governments can rework their security narratives to oppose farâ€Right violence.

Details: The Hague: The International Centre for Counterâ€Terrorism (ICCT), 2012. 39p.

Source: Internet Resource: ICCT Research Paper, June 2012: Accessed June 28, 2013 at: http://www.icct.nl/download/file/ICCT-Kundnani-Blind-Spot-June-2012.pdf

Year: 2012

Country: International

Keywords: Counter-Terrorism

Shelf Number: 129196


Author: Iakobishvili, Eka

Title: Cause for Alarm: The Incarceration of Women for Drug Offences in Europe and Central Asia, and the need for Legislative and Sentencing Reform

Summary: This report sets out to answer two basic questions. 1. How many women are in prison for drugs in Europe and Central Asia? 2. What proportion of the total female prison population do these women comprise? It represents the first attempt to collate such figures for the whole region, and the answers highlight a growing problem. Namely that too many women are in prison for non-violent drug offences in the region. The answers also raise numerous other questions that beg further research. Every year, an increasing number of women come into conflict with the law. There are now more than half a million women and girls in penal institutions around the world.1 It has also been estimated that over 100,000 women are incarcerated in European prisons on any given day.2 Harm Reduction International’s research of fifty-one European and Central Asian countries suggests that there are over 112,500 women in prison across the region. Of these, 28% – or 31,400 women – are in prison for drug offences.3 This represents more than one in four incarcerated women in the region, demonstrating the impact of drug laws and drug enforcement on rates of imprisonment of women. In fact, drug offences outstrip by a considerable margin all others as the reason for women entering prison. This percentage, however, hides considerable national variation. In a few countries, less than 10% of women in prison are serving sentences for drugs. But in others this figure is between 40—50%, and in some cases reaches as high as 70%. It should always be remembered, however, that behind these statistics are real individuals; women whose individual circumstances and lives are masked by the top-line numbers. The vast majority are in prison for non-violent drug offences, for which women are disproportionately imprisoned. In some countries, many are ‘drug mules’. They are mostly women from socially and economically marginalised backgrounds, whose crimes are driven by poverty. A large number struggle with mental health or drug dependence issues, or both. Low literacy levels are all too common, as are histories of sexual and physical abuse. Many are also mothers. This report is intended to shed light on these problems, beginning with the influence of drug enforcement on female prison populations. Given the high percentage of women incarcerated across the European and Central Asian region for drug offences, it is clear that legal and sentencing reform is an urgent requirement.

Details: London: Harm Reduction International, 2012. 28p.

Source: Internet Resource: Accessed June 28, 2013 at: http://www.ihra.net/files/2012/03/11/HRI_WomenInPrisonReport.pdf

Year: 2012

Country: International

Keywords: Female Drug Offenders

Shelf Number: 129206


Author: Gallahue, Patrick

Title: Partners in Crime: International Funding for Drug Control and Gross Violations of Human Rights

Summary: “Partners in Crime: International Funding for Drug Control and Gross Violations of Human Rights†documents how millions of dollars in drug enforcement funding and technical assistance are spent in countries with grave human rights concerns. Donor states include the United States, Australia Germany, France, the United Kingdom, Sweden and the European Union. Human rights abuses in the context of drug enforcement are well documented, but in the name of drug control, donor states are routinely supporting practices in other countries that they themselves regard as morally reprehensible and illegal, including executions, arbitrary detention, slave labour and cruel, inhuman and degrading treatment, sometimes amounting to torture. Using the examples of the death penalty and abusive drug detention centres, this report shows just how little regard is given to human rights in drug enforcement funding and co-operation, including when such funds are passed through the United Nations.

Details: London: Harm Reduction International, 2012. 48p.

Source: Internet Resource: Accessed June 28, 2013 at: http://www.ihra.net/files/2012/06/22/Partners_in_Crime_web1.pdf

Year: 2012

Country: International

Keywords: Drug Control

Shelf Number: 129207


Author: Iakobishvili, Eka

Title: Inflicting Harm: Judicial corporal punishment for Drug and Alcohol Offences in Selected Countries

Summary: Thousands of drug users and alchohol consumers - and people found in possession of small amounts of drugs and alcohol - are subjected to judicially - sanctioned caning, flogging, lashing, or whipping each year. In a landmark study, released by Harm Reduction International in Malaysia recently, it has been found that over forty states apply some type of judicial corporal punishment for drug and alcohol offences. The vast majority of these sentences are handed down in countries such as Malaysia, Singapore, Iran and Saudi Arabia. The reports states that state-sanctioned violence such as this is in clear violation of international law. The use of caning, flogging, lashing and whipping is in direct violation of international law that prohibits the use of corporal punishment. UN human rights monitors have expressed their concern number of times about the legislation in various countries that allow law enforcement to inflict these types of cruel, inhumane and degrading punishments. Judicial corporal punishment is practiced in countries such as Singapore, Malaysia, Iran, Yemen, Saudi Arabia, Qatar, United Arab Emirates, Libya, Brunei, Darussalam, Maldives, Indonesia (Aceh) and Nigeria (northern states) and many more.

Details: London: Harm Reduction International, 2011. 35p.

Source: Internet Resource: Accessed June 28, 2013 at: http://www.ihra.net/files/2011/11/08/IHRA_CorporalPunishmentReport_Web.pdf

Year: 2011

Country: International

Keywords: Alcohol Offenses

Shelf Number: 129208


Author: Bernard van leer Foundation

Title: Community Violence and Young Children: Making Space for Hope

Summary: Since 2007, one of my responsibilities at the Bernard van Leer Foundation has been supporting advocacy for young kids in Ciudad Juárez, Mexico. During this period we have had some success – new policy, a growing coalition of advocates, and a fourfold increase in public childcare provision. But also during this period, Ciudad Juárez recorded a homicide rate about three times that of 13th-century Holland, and well above many current war zones. So, while we are pleased to see progress, it is hard to fully celebrate. Kids are safer in childcare and parents are less stressed, but they are both still scared. The last issue of Early Childhood Matters was devoted to the topic of domestic violence. This time we turn to the effects of community violence on young children. As the authors in this journal confirm, we know that just growing up around this kind of persistent violence changes the architecture of children’s brains, obstructs their ability to learn and literally makes them sick. For example: • Shonkoff and Fox explain how prolonged exposure to fear in early childhood can impair the development of the pre-frontal cortex and future executive function (page 7). • Guerra et al. describe how exposure can be linked to both mental health problems in young children and physical health such as asthma (pages 8–9). • Sharkey finds significant effects on Chicago preschoolers’ cognition when a homicide had occurred in the last week within 1500 feet of a child’s home (pages 10–12). Complementing these scientific accounts, Nashieli Ramirez’s description from Ciudad Juárez (page 13) looks at the problem through the eyes of young children themselves. She puts a human face on how little people experience these big problems, in the same way that the interview with Beth by Hermílio Santos gives a moving account from a mother’s point of view (page 17). These are important reminders of how young children’s lives are affected by violence on a day-to-day basis even though they themselves are not directly involved. In this vein, Robert Muggah and Helen Mostue explore the development of an index that can give voices like these a more systematic treatment, arguing that such an index would be a better barometer for success than simply counting shootings and killings (page 26). One idea that all of the authors in this issue of Early Childhood Matters seem to share is that violence is contagious – something exemplified by the mapping exercise shared in Elizabeth Ward’s article about Jamaica (page 33). The more we see it in the community, the more we see it at home, and vice versa. But, as Susan Lee points out in an article on her experience with the Advancement Project in Los Angeles, in places with exceptionally high levels of community violence we need to stabilise the situation in order to make families’ lives easier. In her words, ‘before we can expect improved educational and health outcomes, the goal must be to achieve a basic level of safety so that children can learn and thrive.’ What I find most compelling in this series of articles, however, is the sense of hope. Hidden between layers of text describing the gravity of the problem, authors in this journal have shown that there are things that we can do to reduce community violence and to mitigate the effects of this violence on young children. We can get away from what Susan Lee denominates ‘a lethal absence of hope’ and we have results to prove it. • Detective Chief Superintendent John Carnochan explains how the Scottish police took the lead on a violence prevention strategy that has led to a 50% reduction in gang violence in Strathclyde (page 36). • Yvonne Bezerra de Mello describes a harm reduction strategy for children who have been witness to violence, implemented through 150 schools in Rio de Janeiro, going into detail about the successful recuperation of three young children who experienced extreme levels of post-traumatic stress (page 40). • Susan Lee writes about a programme run by Mayor Antonio Villaraigosa that has helped reduce homicides by 33% in some of the most violent neighbourhoods of Los Angeles (page 44). • Alicia Lieberman shows evidence from randomised controlled trials of how parent–child psychotherapy has improved child and maternal mental health after exposure to violence, evidence which has informed a Child Development – Community Policing Programme implemented in 16 us sites (page 48). • Charles Ransford recounts the experience of Cure Violence, which has achieved reductions of between 16% and 56% in shootings and killings in Chicago and Baltimore and is now being replicated in South Africa and Iraq (page 54). • Mayor Rodrigo Guerrero of Cali discusses VallenPaz, a strategy that returned 400 families who had been violently displaced to their homes and prevented any further displacement despite the ongoing conflict in the area (page 59). These stories and others like them are the ones that I think we need to help people remember. Explaining the extraordinary impacts on a young child’s brain of just growing up around this kind of violence may get us an extra five minutes of a policymaker’s time, but unless we can offer some semblance of tangible hope then the hard facts will eventually fall on deaf ears.

Details: The Hague: Bernard van leer Foundation, 2012. 62p.

Source: Internet Resource: Early Childhood Matters: Accessed July 1, 2013 at: http://bernardvanleer.org/Community-violence-and-young-children-making-space-for-hope

Year: 2012

Country: International

Keywords: Children and Violence

Shelf Number: 129222


Author: Bank for International Settlements. Basel Committee on Banking Supervision

Title: Sound Management of Risks Related to Money Laundering and Financing of Terrorism - Consultative Document

Summary: The Basel Committee has a long-standing commitment to promote the implementation of sound policies and procedures to combat money laundering (ML) and the financing of terrorism (FT). Its commitment to combating ML and FT is fully aligned with its mandate to strengthen the regulation, supervision and practices of banks worldwide with the purpose of enhancing financial stability. Prudent management of risks related to ML and FT along with effective supervisory oversight are critical in protecting the safety and soundness of banks and the integrity of the international financial system. The inadequacy or absence of sound management can increase the exposure of banks to serious risks, especially reputational, operational, compliance and concentration risks. Recent developments, including robust enforcement actions taken by regulators and the corresponding direct and indirect costs incurred by banks due to their lack of diligence in applying appropriate risk management policies, procedures and controls, have highlighted those risks. These costs and damage could probably have been avoided had the banks maintained effective risk-based policies and procedures to protect against risks arising from ML and FT. In February 2012, the Financial Action Task Force (FATF) released a revised version of the International Standards on Combating Money Laundering and the Financing of Terrorism and Proliferation (the FATF standards), to which the Committee provided input. The Committee's intention in issuing this consultative paper is to support countries' implementation of the FATF standards with respect to their banks and banking groups, by exploring complementary areas and leveraging the expertise available in both organisations. Therefore, these guidelines are intended to be consistent with and to supplement the goals and objectives of the FATF standards. The Committee has included cross-references to FATF standards in this document in order to assist banks in complying with national requirements based on the implementation of those standards.

Details: Basel, Switzerland: Basel Committee on Banking Supervision, 2013. 32p.

Source: Internet Resource: Accessed July 1, 2013 at: http://www.bis.org/publ/bcbs252.pdf

Year: 2013

Country: International

Keywords: Money Laundering

Shelf Number: 129229


Author: Manuel, Celie

Title: Systematic Review of Youth Crime Prevention Interventions

Summary: This systematic literature review was commissioned by the Danish Crime Prevention Council to supplement the existing knowledge base about youth crime prevention and provide useful information about implementation and effectiveness of known crime prevention initiatives. The review is one component of a larger project commenced by the Danish Crime Prevention Council to collect information about methods and implementation processes for youth crime prevention interventions. Within the scope of this project, a network of prevention ambassadors is being established across Danish municipalities and it is the hope of the Danish Crime Prevention Council that this systematic literature review can inform and qualify the work of these prevention ambassadors in their local prevention efforts. INTERVENTIONS THAT INCLUDE A FOCUS ON THE SOCIAL ENVIRONMENT OF YOUTH HAVE GREATER LIKELIHOOD OF SUCCESS We included primary, secondary and tertiary prevention interventions and analysed them according to their delivery modes splitting them into seven different types: individual interventions, family-based, group-based, or school-based interventions, community oriented or systems-oriented interventions or interventions with multiple delivery modes. The greatest likelihood of positive intervention results was found for comprehensive interventions that aim to develop a more pro-social environment for target youth and that do not merely focus on individual-level factors such as cognition and behaviour management. The interventions that were most frequently successful were those with multiple delivery modes or delivered to the entire family. 63% and 57% of interventions with multiple delivery modes and family-based interventions respectively showed positive effects in terms of reducing disruptive or criminal behaviour. This is in comparison with a third or less of the school- or group-based interventions included in this review. The review also found trends to suggest that interventions with durations of at least four to six months were more likely to be effective than shorter durations in reducing disruptive or criminal behaviour. At the same time, most interventions lasting over four months had multiple delivery modes and it is as such not possible to separate effects related to longer duration from effects related to a more comprehensive approach. Also, interventions that appear to take a resource-oriented rather than a problem-focussed approach had a higher likelihood of success. This inference is tempered by the unverified assessment of approach and the fact that only few problem-focussed interventions were included in the review. GAPS IN RECENT YOUTH CRIME PREVENTION LITERATURE The systematic literature review reveals that very few quality evaluations using a control-group design have been conducted in a European let alone a Nordic setting. The vast majority of included interventions are from the United States. Due to the differences in juvenile justice systems and target group characteristics generally, translation of findings from the U.S. to the Danish context is problematic. As an example of this, an intervention such as Multisystemic Therapy (MST) which is one of the blueprints for violence prevention in the U.S. (showing sustained effects and successful replication across study sites) was not found to be better than usual services when implemented in Sweden. Recently evaluated youth crime prevention interventions distin-guish only broadly between different types of youth offenders and youth with problem behaviour. Very few interventions target for instance ethnic minorities, girls or youth with specific risk characteristics. Similarly, the interventions identified in this review do not, for the most part, expressly recognize youth offending as group behaviour, though this is the case for the majority of youth offending in Denmark. THE LITERATURE BASE FOR THE SYSTEMATIC REVIEW Seventy-two studies (incl. journal articles, dissertations, book chapters and reports) published between 2008 and 2012 were identified through a systematic literature search conducted for this review. Selected studies used using experimental or quasi-experimental research designs targeting 12-17 year olds and focusing on effects in terms of disruptive or criminal behaviour. Fifty-six studies were of adequate quality to allow a plausible inference of causality between intervention implementation and evaluation findings. These form the basis for the analysis of intervention characteristics and intervention effectiveness across preventive levels and intervention delivery modes.

Details: Copenhagen: SFI Udgivelsesdato (Danish National Centre for Social Research), 2013. 312p.

Source: Internet Resource: Accessed July 3, 2013 at: http://www.sfi.dk/rapportoplysninger-4681.aspx?Action=1&NewsId=3850&PID=9267

Year: 2013

Country: International

Keywords: At-risk Youth

Shelf Number: 129236


Author: Financial Action Task Force (FATF)

Title: Money Laundering and Terrorist Financing Vulnerabilities of Legal Professionals

Summary: Criminals seek out the involvement of legal professionals in their ML/TF activities, sometimes because a legal professional is required to complete certain transactions, and sometimes to access specialised legal and notarial skills and services which could assist the laundering of the proceeds of crime and the funding of terrorism. The report identifies a number of ML/TF methods that commonly employ or, in some countries, require the services of a legal professional. Inherently these activities pose ML/TF risk. When clients seek to misuse the legal professional’s services in these areas, even law abiding legal professionals may be vulnerable. The methods are: •misuse of client accounts •purchase of real property •creation of trusts and companies •management of trusts and companies •managing client affairs and making introductions •undertaking certain litigation •setting up and managing charities The report also describes red flag indicators of ML/TF which may be useful to legal professionals, self-regulatory bodies (SRBs), competent authorities and law enforcement agencies. In this report, over 100 case studies referring to these and other ML/TF methods were taken into account. Some of these case studies show that not all legal professionals are undertaking client due diligence (CDD) when required. Even where due diligence is obtained, if the legal professional lacks understanding of the ML/TF vulnerabilities and red flag indicators, they are less able to use that information to prevent the misuse of their services. The report also challenges the perception sometimes held by criminals, and at times supported by claims from legal professionals themselves, that legal professional privilege or professional secrecy would lawfully enable a legal professional to continue to act for a client who was engaging in criminal activity and/or prevent law enforcement from accessing information to enable the client to be prosecuted.

Details: Paris: FATF, 2013. 146p.

Source: Internet Resource: Accessed July 3, 2013 at: http://www.fatf-gafi.org/documents/documents/mltf-vulnerabilities-legal-professionals.html

Year: 2013

Country: International

Keywords: Financial Crimes

Shelf Number: 0


Author: Robertson, Robyn D.

Title: Alcohol Interlock Programs: Data Management System Implementation

Summary: In December 2010, a two-day workshop was organized in Toronto to bring together program administrators and vendors to discuss the issues of vendor oversight and automated data management systems. Representatives from four interlock vendors (ACS, Draeger, Lifesafer, and Smart Start) were in attendance along with program administrators from Colorado, Illinois, Minnesota, Oklahoma, Texas, and South Carolina. The focus of discussions included state and vendor experiences with data management and reporting, core steps to develop a data management system, and essential elements of a data management system. This report, along with a companion piece entitled Alcohol Interlock Programs: Vendor Oversight (released in 2011) was borne out of those discussions. This document provides an overview of some important issues to consider when transitioning from a paperbased system to an automated system. It is structured in four key sections: 1. Plan development; 2. System components; 3. Essential system requirements; 4. Vendor interactions. An automated data management system implementation checklist for agencies is also included in Appendix C.

Details: Ottawa, ONT:Traffic Injury Research Foundation, 2013. 40p.

Source: Internet Resource: Accessed July 8, 2013 at: http://www.tirf.ca/publications/PDF_publications/NHTSA_Tech_Assistance_DataManagement_9.pdf

Year: 2013

Country: International

Keywords: Alcohol Interlock Devices (Canada, U.S.)

Shelf Number: 129269


Author: Financial Action Task Force

Title: International Best Practices: Targeted Financial Sanctions Related to Terrorism and Terrorist Financing (Recommendation 6)

Summary: FATF Recommendation 6 requires countries to implement the targeted financial sanctions regimes to comply with the United Nations Security Council Resolutions (UNSCRs) relating to the prevention and suppression of terrorism and terrorist financing, such as UNSCR 1267(1999) and its successor resolutions, and UNSCR 1373(2001). Efforts to combat terrorist financing are greatly undermined if countries do not freeze the funds or other assets of designated persons and entities quickly and effectively. This updated best practices paper reflects the latest relevant UNSCRs in response to challenges faced by countries in the implementation of Recommendation 6. The paper provides best practices that could help countries in their implementation of the targeted financial sanctions to prevent and suppress terrorist financing in accordance with the relevant UNSCRs.

Details: Paris: FATF, 2013. 21p.

Source: Internet Resource: Accessed July 8, 2013 at: http://www.fatf-gafi.org/documents/documents/bpp-finsanctions-tf-r6.html

Year: 2013

Country: International

Keywords: Financial Crimes

Shelf Number: 129272


Author: United Nations Children's Fund

Title: Juvenile Justice in the CEE/CIS region: Progress, Challenges, Obstacles and Opportunities

Summary: This paper describes the most significant advances made in the development of juvenile justice systems in the CEE/CIS region over the past decade, and the most important challenges remaining. The paper also provides some key recommendations for further impact on the rights of the children involved. It is mainly based on a series of assessments of the juvenile justice systems in fifteen countries of the region – from Albania to Uzbekistan – conducted by the UNICEF Regional Office for CEE/CIS in between 2006 and 2011. In many countries in the region, the process of developing juvenile justice systems began shortly after the year 2000 and was supported by UNICEF in most countries. International NGOs contributed to the reform, especially through the establishment of pilot projects (e.g., the Open Society Institute in Kazakhstan) and the creation of diversion programmes (e.g., the Coram Children’s Legal Centre (UK) in Tajikistan). Support was also provided by the European Commission as well as, among others, the Swedish International Development Cooperation Agency, the Swiss Agency for Development and Cooperation and the Government of the Netherlands. Recommendations of the United Nations Committee on the Rights of the Child often were instrumental in triggering the reform process. Efforts initially focused on situation analyses, capacity-building and legislative reform and gradually shifted towards more comprehensive approaches to the development of a fully edged juvenile justice system. In many countries, the reform process now appears to be deepening and, possibly, accelerating. On the other hand, there are still a few countries where lack of transparency makes it difficult to appreciate how juvenile justice functions in practice. Until recently, the overriding aim of juvenile justice reform was defined in terms of ‘humanization’ by many of the governments engaged in the reforms. In practical terms, this translated into goals such as avoiding the prosecution of children involved in minor offences, making sentences shorter, eliminating violence and ill-treatment, preventing children from being detained with adults, improving physical conditions in prisons, and so on. These are all important goals, but they often overlooked the fact that one of the purposes of juvenile justice is to reduce reoffending. During the first decade or so of reform efforts, insufficient attention was given to the prevention of offending and reoffending. This is beginning to change. All countries in the region have adopted new criminal legislation during the last two decades, as part of broader efforts to bring their legal systems into compatibility with international human rights standards. In most of them, further amendments concerning juvenile justice have been made in recent years. With some exceptions, the law in force now generally complies with international standards. These and other reforms mentioned below have resulted in decreasing rates of detention and imprisonment in some countries. In the Republic of Moldova, for example, the total number of children in pretrial detention and juvenile prison fell by 68 per cent between 2007 and 2010. This followed important reforms to the Criminal Code in 2007, which inter alia restricted pretrial detention to juveniles accused of a serious offence, limited the duration of pretrial detention to four months, made prison sentences discretionary for reoffenders, shortened the length of prison sentences for juveniles, and made juveniles eligible for early release after serving one third to two thirds of their sentence. In Armenia, during the past three years, detention of children both pre- and post-trial has been maintained at what is probably the lowest possible level – i.e., approximately 15 children in pretrial detention and 15 children in custodial sentence. (See below for more examples.) Legislation is, however, not always applied properly due to many factors, including the systemic weakness of the administration of justice, the persistence of values inconsistent with human rights and a dominant culture of impunity. Treatment of children in the correctional system has been largely ‘humanized’, but treatment in pretrial detention facilities and police custody often violates international standards. Secondary prevention remains very poor. Diversion schemes often are not accompanied with the support that children and families would need in order to prevent reoffending. Alternative sentences are imposed relatively frequently, but programmes for assisting offenders given alternative sentences are scarce. Support for reintegration into the community is almost nonexistent. The development of specialized institutions and programmes, including specialized police units, juvenile courts, probation services, legal aid programmes and restorative justice programmes, has been slow.

Details: Geneva, SWIT: UNICEF, 2013. 16p.

Source: Internet Resource: Accessed July 8, 2013 at: http://www.unicef.org/ceecis/EU_UNICEF_Juvenile_Justice_in_the_CEECIS_Region.pdf

Year: 2013

Country: International

Keywords: Juvenile Justice Reform

Shelf Number: 0


Author: Costello, Cathryn

Title: Building Empirical Research into Alternatives to Detention: Perceptions of Asylum-Seekers and Refugees in Toronto and Geneva

Summary: 5 Executive Summary This research study examines the workings of ‘alternatives to detention’ (ATDs) through empirical research in two contexts, Toronto, Canada, and Geneva, Switzerland. Relying on a detailed literature review, and qualitative research carried out in summer 2012 in Toronto and Geneva, the report attempts to capture the workings of ATDs in particular from the perspective of the asylum seekers, refugees and other migrants they most closely affect. The study identifies the cooperative predisposition of asylum-seekers, which seems to be rooted in four subjective factors, namely: (1) the refugee predicament and fear of return; (2) inclination towards lawabidingness and commitment to obey the law; (3) trust and perceptions of fairness of the host state, in particular in its Refugee Status Determination (RSD) process; and (4) the desire to avoid irregular residence, in particular the attendant hardship and vulnerability. The report crucially identifies the conditions that foster cooperation, by assessing the interviewees' experiences of the divergent reception conditions available in Toronto and Geneva. ATDs seem more likely to encourage this cooperative disposition if they entail and are perceived to entail suitable reception conditions; fair RSD and other legal processes; and holistic support to navigate legal processes and life in the host country. Perceptions of RSD fairness seemed to depend on (1) being afforded a proper hearing; (2) consistency of decision-making; and (3) taking decisions promptly. The single most important institutional feature that fostered trust was (4) access to early reliable legal advice and assistance. The report also addresses the processes for securing release from immigration detention in Toronto and Geneva, namely detention reviews, to the extent that these procedures determine access to some ATDs. In Toronto, the work of the Toronto Bail Program (TBP) in the context of conditional release is examined. While accepting that some limitations exist in the TBP system, it is concluded that the TBP provides a potential model for supervised release of some asylum-seekers from detention.

Details: Geneva, SWIT: United Nations High Commissioner for Refugees 2013. 50p.

Source: Internet Resource: Accessed July 9, 2013 at: http://www.refworld.org/pdfid/51a6fec84.pdf

Year: 2013

Country: International

Keywords: Asylum, Right of (Canada, Switzerland)

Shelf Number: 129283


Author: Friedrich-Ebert-Stiftung

Title: Being Tough Is Not Enough – Curbing transnational organized crime

Summary: The devastating effects and challenges linked to organized crime have become ever more visible in recent years. It is no great news that organized crime is a truly globalized, transnational business. Flows of both its »products« and related illegal funds largely ignore national borders. At the same time, the scope, patterns and effects of organized crime vary locally, nationally and regionally. Any strategy to counter organized crime needs to be tailored to the respective level, while building on international collaboration. But while transnational cooperation of criminal networks is increasing and adapting, government and governance responses remain too static and stuck within the confines of national borders. International and transnational cooperation in curbing organized crime is still in its infancy. However, it is not only the transnational dimension that renders organized crime so difficult to tackle. It is also a multifaceted challenge in terms of its patterns and impact. The immediate threats to human security and the violence related to organized crime – as currently most apparent in the Mexican drug war – are the most visible negative impact. Beyond that, however, organized crime severely undermines statehood and democratic governance through corruption, intimidation or even state capture in many parts of the world. It also fuels existing violent conflicts or re-ignites dormant ones. Not only in Colombia or the Sahel region are the increasing interrelations between conflict parties, terrorist organizations and networks of organized crime a source of destabilization and concern. Adding the negative impact that organized crime has on the legal part of the economy, one begins to understand that addressing organized crime is about more than just more effective law enforcement. Tackling organized crime in a sustainable manner requires the development and implementation of intelligent, multidimensional approaches to untangle networks and address the incentive structures and enabling factors of the various business models. In the context of our work to promote peace and security, the Friedrich-Ebert-Stiftung (FES) aims at facilitating a strategic reflection on comprehensive policy responses to curb organized crime. In February and March 2013, a smaller expert and parliamentary meeting in Brussels and a wider international expert conference in Berlin represented milestones in this endeavor. Beyond discussing recent trends and effects of organized crime in general, the meetings zoomed in on two central aspects: the illegal drug market, which is arguably still the most profitable one for organized crime, and money laundering, the bottom line of organized crime. The meetings were part of a continuous engagement and will be systematically followed up. Some of the analysis and suggestions discussed during the meetings were results of FES’ work in the different regions. For instance, the process that led to the studies and drug policy reform proposals from Latin America were initiated within the framework of an FES regional security policy project. The respective dialogs in the various regions will continue. But during the Berlin conference, it became particularly obvious that there is also more work to be done in Germany. Given that organized crime not only operates in Germany but also compromises German and European policies – for instance in the fields of security, foreign affairs, development and health – Germany needs to engage much more pro-actively in the international development and implementation of comprehensive responses. Against this background, this conference documentation is meant not only to summarize past debates, but also to stimulate future ones. FES remains committed to providing input, facilitating dialog nationally and internationally and further strengthening the network of actors addressing the challenge of organized crime from different angles and in different parts of the world. To be sure, there will be no easy responses to the challenges posed by organized crime, as experience has shown. Curbing organized crime is more than a matter of repressive measures and law enforcement. In this sense, the subtitle of the Berlin conference remains a guiding theme of further debates and a reminder to be creative in designing comprehensive strategies and policies: Being tough is not enough.

Details: Berlin: Friedrich-Ebert-Stiftung, 2013. 52p.

Source: Internet Resource: Conference Report: Accessed July 9, 2013 at: http://library.fes.de/pdf-files/iez/10034-20130603.pdf

Year: 2013

Country: International

Keywords: Criminal Networks

Shelf Number: 129329


Author: Roudi-Fahimi, Farzaneh

Title: Ending Child Marriage in the Arab Region

Summary: This policy brief presents the latest data on child marriage in the Arab region, which includes members of the League of Arab States (stretching from Morocco to Oman). It explains how ending child marriage would help countries achieve their Millennium Development Goals (MDGs) that aim to combat poverty and improve health and quality of life for all. The brief emphasizes the importance of taking a broad approach to end child marriage, including mandating more years of compulsory education, setting and enforcing the legal minimum age of marriage, raising community awareness about the harm caused by early marriage, and involving families to find ways to prevent child marriage.

Details: Washington, DC: Population Reference Bureau, 2013. 8p.

Source: Internet Resource: Policy Brief: Accessed July 9, 2013 at: http://www.prb.org/pdf13/child-marriage-arab-region.pdf

Year: 2013

Country: International

Keywords: Child Marriage (Arab Region)

Shelf Number: 129341


Author: Moser, Caroline

Title: Understanding the Tipping Point of Urban Conflict: Global Policy Report

Summary: The purpose of this Global Policy Report is to provide general policy recommendations from the four city studies undertaken for the research project Understanding the Tipping Point of Urban Conflict: Violence, Cities, and Poverty Reduction in the Development World (UTP), carried out by the University of Manchester in collaboration with partner institutions in Kenya, India, Chile and Switzerland. The project, which runs from 1 September 2010 to 31 August 2012, is funded by an award from the ESRC/DFID Joint Scheme for Research on International Development (Poverty Alleviation). This report starts by briefly summarising the background to the project, its objectives, conceptual framework, rationale for case study selection, and methodology. It then discusses the key findings by city, before turning to comparative policy recommendations. The report draws on documents produced during the course of the research project, including city profiles, sub-city findings, and city-level policy briefs.

Details: Manchester, UK: Urban Tipping Point, University of Manchester, 2012. 26p.

Source: Internet Resource: Working Paper #7: Accessed July 10, 2013 at: http://www.urbantippingpoint.org/documents/Working%20Papers/WP7_GlobalPolicyReport.pdf

Year: 2012

Country: International

Keywords: Poverty

Shelf Number: 129352


Author: Global Commission on Drug Policy

Title: The War on Drugs and HIV/AIDS: How the Criminalization of Drug Use Fuels the Global Pandemic

Summary: The global war on drugs is driving the HIV/AIDS pandemic among people who use drugs and their sexual partners. Throughout the world, research has consistently shown that repressive drug law enforcement practices force drug users away from public health services and into hidden environments where HIV risk becomes markedly elevated. Mass incarceration of non-violent drug offenders also plays a major role in increasing HIV risk. This is a critical public health issue in many countries, including the United States, where as many as 25 percent of Americans infected with HIV may pass through correctional facilities annually, and where disproportionate incarceration rates are among the key reasons for markedly higher HIV rates among African Americans. Aggressive law enforcement practices targeting drug users have also been proven to create barriers to HIV treatment. Despite the evidence that treatment of HIV infection dramatically reduces the risk of HIV transmission by infected individuals, the public health implications of HIV treatment disruptions resulting from drug law enforcement tactics have not been appropriately recognized as a major impediment to efforts to control the global HIV/AIDS pandemic. The war on drugs has also led to a policy distortion whereby evidence-based addiction treatment and public health measures have been downplayed or ignored. While this is a common problem internationally, a number of specific countries, including the US, Russia and Thailand, ignore scientific evidence and World Health Organization recommendations and resist the implementation of evidence-based HIV prevention programs – with devastating consequences. In Russia, for example, approximately one in one hundred adults is now infected with HIV. In contrast, countries that have adopted evidence-based addiction treatment and public health measures have seen their HIV epidemics among people who use drugs – as well as rates of injecting drug use – dramatically decline. Clear consensus guidelines exist for achieving this success, but HIV prevention tools have been under-utilized while harmful drug war policies have been slow to change.

Details: Rio de Janeiro: Global Commission on Drug Policy, 2012. 24p.

Source: Internet Resource: Accessed July 10, 2013 at: http://globalcommissionondrugs.org/wp-content/themes/gcdp_v1/pdf/GCDP_HIV-AIDS_2012_REFERENCE.pdf

Year: 2012

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 129353


Author: Haines, Samantha

Title: International Approaches to Reducing Deliberately Lit Fires: Prevention Programmes

Summary: The aim of this research was to identify and review the implementation, operation, key elements, and success of programmes in place to prevent deliberately lit fires in New Zealand and overseas. This report explores the prevention programmes currently operating for people who deliberately light fires, in New Zealand, Australia, United Kingdom, United States of America and Canada. It also investigates what experience arsonists in New Zealand may have with prevention initiatives over the course of their life and their perception of what might prevent people from deliberately lighting fires.

Details: Auckland, NJ: New Zealand Fire Commission, 2006. 150p.

Source: Internet Resource: New Zealand Fire Service Commission Research Report Number 62: Accessed July 10, 2013 at: http://www.fire.org.nz/Research/Publishsed-Reports/Documents/f681f64ad67dc137741540efc6a452bf.pdf

Year: 2006

Country: International

Keywords: Arson (International)

Shelf Number: 129354


Author: Haines, Samantha

Title: International Approaches to Reducing Deliberately Lit Fires: Statistical Data and Fire Investigations

Summary: The aim of this research was to review and document for New Zealand and overseas (Australia, UK, USA and Canada) the: statistical data for deliberately lit fires including the distribution across different property types and communities; fire cause investigation and reporting process including how raw data is collected; and to document figures for monetary losses in deliberately fires compared to losses incurred in all fires.

Details: Auckland, NZ: New Zealand Fire Service Commission, 2006. 156p.

Source: Internet Resource: New Zealand Fire Service Commission Research Report Number 62: Accessed July 10, 2013 at: http://www.fire.org.nz/Research/Publishsed-Reports/Documents/6011792098926564c160358da39e9fbb.pdf

Year: 2006

Country: International

Keywords: Arson (International

Shelf Number: 129355


Author: U.S. Federal Bureau of Investigation. Criminal Investigative Division

Title: (U) Mara Salvatrucha (MS-13): An International Perspective

Summary: The purpose of this assessment is to provide an overview of the international activities of the MS-13 criminal organization. The report is the result of the analysis of arrest records, law enforcement reports, deportation records, interviews, and observations conducted by members of the MS-13 National Gang Task Force (NGTF) regarding documented MS-13 members in the United States; Chiapas, Mexico; El Salvador; and Honduras. Violent MS-13 members have crossed international boundaries and key members have documented links between the United States and the countries addressed in this assessment.

Details: Washington, DC: Federal Bureau of Investigation, 2005. 39p.

Source: Internet Resource: Accessed July 11, 2013 at: http://info.publicintelligence.net/FBI-MS13.pdf

Year: 2005

Country: International

Keywords: Gang Violence

Shelf Number: 129366


Author: Moser, Caroline

Title: Understanding the Tipping Point of Urban Conflict: Participatory methodology for gender-based and political violence

Summary: The objective of this working paper is to outline the participatory violence appraisal (PVA) methodology implemented for the sub-city level studies in the ‘Understanding the Tipping Points of Urban Conflict’ (UTP) research project. It is intended to assist researchers when designing sub-city or local level research. As such it does not provide a definitive ‘blueprint’ but rather elaborates a generic methodology that may be easily adapted to the needs of different research objectives. This working paper complements the UTP Concept Paper (Moser and Horn 2011) that sets out the UTP research project’s objectives, and its associated conceptual framework. Underlying the UTP project is the assumption that two concepts – tipping points and value chains – provide added value and introduce new perspectives on an already much debated and contested issue, namely violence in cities of the South. As elaborated in detail in the concept paper the research focuses less on documenting a static phenomenon, be it conflict or violence, and more on examining the shift from one state to another, in this case from conflict to violence – the so-called tipping point – and from one type of violence to another, identified as a violence chain. A focus on processes rather than a phenomenon requires a research methodology that moves from statistical measurement to a narrative understanding of social, economic and political processes – but also one that is sufficiently robust and cannot be dismissed as anecdotal information. Considerations such as these have important implications for the design of the research methodology.

Details: Manchester, UK: Global Urban Research Centre, University of Manchester, 2012.

Source: Internet Resource: Working Paper #2: Accessed July 11, 2013 at: http://www.urbantippingpoint.org/documents/Working%20Papers/WP2_March2012.pdf

Year: 2012

Country: International

Keywords: Gender-Based Violence

Shelf Number: 129371


Author: Penal Reform International

Title: A Review of Law and Policy to Prevent and Remedy Violence against Children in Police and Pre-Trial Detention in Eight Countries: Country Reports for: Bangladesh, Georgia, Jordan, Kazakhstan, Pakistan, Russian Federation, Tanzania and Uganda

Summary: Throughout the criminal justice process – during arrest, at the police station and in detention – children are at risk of violence from police, prison staff, adult detainees and their peers. Such violence takes many forms, including torture, beatings, isolation, use of restraints, rape, harassment, self-harm and humiliation. In some countries, children can be handed violent and inhumane sentences, including corporal punishment and even the death penalty. They may also experience unreasonable disciplinary measures in prison, such as corporal punishment or solitary confinement. The impact of violence on children in the general population can have irreversible and life-long consequences. Children who experience violence are more likely to engage in risk-taking behaviours later in life, going on to perpetrate violence against others, experience depression, unintended pregnancy and obesity, and engage in other high-risk behaviours such as smoking, alcohol and drug use. In recent years, the issue of violence against children deprived of their liberty has come to the fore as a severe violation of child rights, which is frequently invisible and under-researched. Supported by the UK Department of International Development, this programme of work aims to reduce and eliminate violence against children in detention around the world by promoting reform of law, policy and practice through international and national advocacy, training and research. To date: We have researched and published baseline studies on legislation and policy, initially in eight countries around the world: Bangladesh, Georgia, Jordan, Kazakhstan, Pakistan, Russia, Tanzania and Uganda. These reviews aims to increase our understanding of the specific legal and policy measures that can work to prevent and remedy violence against children in police and pre-trial detention. These desk reviews (working draft, August 2012) aim to increase understanding of the specific legal and policy measures that can work to prevent and remedy violence against children in detention. Eight countries were researched: Bangladesh, Georgia, Jordan, Kazakhstan, Pakistan, Russia, Tanzania and Uganda. For each country, the review aims to: •identify policy and legislative measures already in place to prevent and detect violence, to assist victims and to make perpetrators accountable; •highlight significant gaps in provision; and •make recommendations for improvements. There are eight individual country reports (Country Reports for: Bangladesh, Georgia, Jordan, Kazakhstan, Pakistan, Russian Federation, Tanzania and Uganda) , and a summary report (working draft) which pulls together findings from these eight reports.

Details: London: Penal Reform International, 2013. 9 vols.

Source: Internet Resource: Accessed July 13, 2013 at: http://www.penalreform.org/publications/review-law-and-policy-prevent-and-remedy-violence-against-children-police-and-pre-tria-0

Year: 2013

Country: International

Keywords: Juvenile Detention

Shelf Number: 129382


Author: Munyo, Ignacio

Title: The Juvenile Crime Dilemma

Summary: I develop a dynamic model of behavior to analyze juvenile crime. The consistent decisions between crime and legal activities of forward-looking youths depend upon their work- and criminal-specifi…c human capital, which in turn are shaped by their history of past choices. The model explicitly recognizes the contrasting levels of punishment of the juvenile and adult criminal systems. In order to evaluate whether the model explains the evolution of crime, I calibrate it and test whether it can account for the observed variations in crime levels, as economic and legal factors change over time. The model is able to reproduce virtually all the recent increase in juvenile crime by a¤ecting key model parameters in line with observed facts. Additional counterfactual results suggest an increase in the expected punishments of young offenders within the juvenile justice system is a better way to fi…ght juvenile crime than the reduction of the age of criminal responsibility.

Details: Unpublished paper, 2013. 19p.

Source: Internet Resource: Accessed July 13, 2013 at: http://www.ceres-uy.org/pdfs/the_juvenile%20crime_dilemma_june%202013.pdf

Year: 2013

Country: International

Keywords: Criminal Responsibility

Shelf Number: 129392


Author: Côté-Lussier, Carolyn

Title: The Evil, Poor, Disliked and Punished: Criminal stereotypes and the effects of their cognitive, affective and behavioural outcomes on punitiveness toward crime

Summary: Why does the public so staunchly support harsh criminal justice policies when the social, fiscal and political costs are so great? Individuals in countries such as Canada, the UK and USA continue to want criminal offenders to receive stiffer sentences despite growing prison populations and some indication of lower crime rates (Cullen, Fisher & Applegate, 2000; Donohue, 2007; King, 2008; Raphael, 2009; Tseloni et al., 2010; Useem et al., 2003; Walmsley, 2009). Criminological research has identified cognitive and affective pathways that predict punitiveness toward crime, such as the judged wrongfulness and harmfulness of crime, and moral outrage (Carlsmith & Darley, 2008). The overall contribution of the five papers presented in this thesis is to identify the cognitive, affective and behavioural pathways that link social perception of criminals to punitiveness toward crime. Working at the intersection of social psychology and criminology, the thesis applies theoretical frameworks such as the Stereotype Content Model (Fiske, Cuddy, Glick & Xu, 2002) and Behaviour from Intergroup Affect and Stereotypes map (Cuddy, Fiske & Glick, 2007) to identify the functional relation between social perception and punitiveness. Using different methodologies and at different levels of analysis, this thesis provides strong evidence that the content of criminal stereotypes is associated with specific cognitive (e.g., perceiving crime as being more serious), affective (e.g., feeling anger and a lack of compassion) and behavioural (e.g., wanting to exclude and attack) responses. In turn, criminal stereotypes and their outcomes engender punitive intuitions, decisions and attitudes. These findings reconcile extant criminological research on punitiveness with social psychological research on the function of social stereotypes. This thesis also speaks more broadly to the association between punitiveness toward crime and basic social psychological processes related to interpersonal perception and relations. In this respect, this thesis makes a significant contribution to the study of punitiveness toward crime and has important social policy implications.

Details: London: The London School of Economics and Political Science (LSE), 2012. 312p.

Source: Internet Resource: Dissertation: Accessed July 16, 2013 at: http://etheses.lse.ac.uk/475/

Year: 2012

Country: International

Keywords: Criminal Justice Policy

Shelf Number: 129397


Author: Jacobi, Liana

Title: Marijuana on Main Street: What if?

Summary: Illicit drug use is prevalent. While the nature of the market makes it di¢ - cult to determine sales with certainty, estimates are around $150 billion a year in the US. Marijuana is the most common illicit drug used, where the US spends upwards of $7.7 bil- lion per year in law enforcement (Miron, 2005). For the past 30 years there has been a debate regarding marijuana legalization. There are two important avenues through which legalization could impact use: it would make marijuana easier to get, and it would remove the stigma (and cost) associated with illegal behavior. Studies to date have not considered either of these avenues explicitly. However, both are important for policy. We develop and estimate a model of marijuana use that disentangles the impact of limited accessibility from consumption decisions based solely on preferences (and distaste for illegal behavior). We …nd that both play an important role and that individuals who have access to the illicit market are of speci…c demographics. We …nd that selection into who has access to cannabis is not random, and the results suggest estimates of the demand curve will be biased un- less selection is explicitly considered. Counterfactual results indicate that making marijuana legal and removing accessibility barriers would have a smaller relative impact on younger individuals but still a large impact in magnitude. Use among teenagers would (a little less than) double and use among individuals in their thirties and forties would almost triple.

Details: Unpublished paper, 2013. 29p.

Source: Internet Resource: Accessed July 17, 2013 at: https://economics.adelaide.edu.au/research/seminars/2013-cannabis.pdf

Year: 2013

Country: International

Keywords: Drug Legalization

Shelf Number: 129419


Author: Potrafke, Niklas

Title: Policies against Human Trafficking: The Role of Religion and Political Institutions

Summary: I investigate empirically the role of religion and political institutions in policies against human trafficking, using the new 3P Anti-trafficking Policy Index. The dataset contains 175 countries. The results show that governments in countries with Christian majorities implement stricter anti-trafficking policies than countries with Muslim majorities. The differences between countries with Christian and Muslim majorities is pronounced in dictatorships but less so in democracies. The influence of religion on the overall 3P Anti-trafficking Policy Index is driven by protection and prevention policies. As compared to prosecution policies that mainly target the perpetrators of human trafficking, protection and prevention policies mainly protect the victims of human trafficking, i.e. predominantly women. The conclusions are consistent with other empirical findings regarding the association between religion, political institutions, and human development.

Details: Munich: Center for Economic Studies & Ifo Institute, 2013. 43p.

Source: Internet Resource: CESIFO WORKING PAPER NO. 4278: Accessed July 17, 2013 at: http://ideas.repec.org/p/ces/ceswps/_4278.html

Year: 2013

Country: International

Keywords: Human Rights

Shelf Number: 129423


Author: Anderberg, Dan

Title: Unemployment and Domestic Violence: Theory and Evidence

Summary: Is unemployment the overwhelming determinant of domestic violence that many commentators expect it to be? The contribution of this paper is to examine, theoretically and empirically, how changes in unemployment affect the incidence of domestic abuse. The key theoretical prediction is that male and female unemployment have opposite-signed effects on domestic abuse: an increase in male unemployment decreases the incidence of intimate partner violence, while an increase in female unemployment increases domestic abuse. Combining data on intimate partner violence from the British Crime Survey with locally disaggregated labor market data from the UK’s Annual Population Survey, we find strong evidence in support of the theoretical prediction.

Details: Munich: CESifo (Center for Economic Studies & Ifo Institute, 2013. 37p.

Source: Internet Resource: CESifo Working Paper no. 4315: Accessed July 17, 2013 at: http://www.cesifo-group.de/ifoHome/infoservice/News/2013/07/news-20130716-CESifo-wp-4315.html

Year: 2013

Country: International

Keywords: Domestic Violence

Shelf Number: 129427


Author: Ferri, Marica

Title: Media Campaigns for the Prevention of Illicit Drug Use in Young People (Review)

Summary: Background Substance-specific mass media campaigns which address young people are widely used to prevent illicit drug use. They aim to reduce use and raise awareness of the problem. Objectives To assess the effectiveness of mass media campaigns in preventing or reducing the use of or intention to use illicit drugs amongst young people. Search methods We searched the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library 2013, Issue 1), including the Cochrane Drugs and Alcohol Group’s Specialised Register; MEDLINE through PubMed (from 1966 to 29 January 2013); EMBASE (from 1974 to 30 January 2013) and ProQuest Dissertations & Theses A&I (from 1861 to 3 February 2013). Selection criteria Cluster-randomised controlled trials, prospective and retrospective cohort studies, interrupted time series and controlled before and after studies evaluating the effectiveness of mass media campaigns in influencing drug use, intention to use or the attitude of young people under the age of 26 towards illicit drugs. Data collection and analysis We used the standard methodological procedures of The Cochrane Collaboration. Main results We included 23 studies involving 188,934 young people, conducted in theUSA, Canada and Australia between 1991 and 2012. Twelve studies were randomised controlled trials (RCT), two were prospective cohort studies (PCS), one study was both a RCT and a PCS, six were interrupted time series and two were controlled before and after (CBA) studies. The RCTs had an overall low risk of bias, along with the ITS (apart from the dimension ’formal test of trend’), and the PCS had overall good quality, apart from the description of loss to follow-up by exposure. Self reported or biomarker-assessed illicit drug use was measured with an array of published and unpublished scalesmaking comparisons difficult. Pooled results of five RCTs (N = 5470) show no effect of media campaign intervention (standardised mean difference (SMD) -0.02; 95% confidence interval (CI) -0.15 to 0.12). We also pooled five ITS studies (N = 26,405) focusing specifically on methamphetamine use. Out of four pooled estimates (two endpoints measured in two age groups), there was evidence of a reduction only in past-year prevalence of methamphetamine use among 12 to 17 years old. A further five studies (designs = one RCT with PCS, two PCS, two ITS, one CBA, N = 151,508), which could not be included in meta-analyses, reported a drug use outcome with varied results including a clear iatrogenic effect in one case and reduction of use in another. Authors’ conclusions Overall the available evidence does not allow conclusions about the effect of media campaigns on illicit drug use among young people. We conclude that further studies are needed.

Details: The Cochrane Collaboration, 2013. 109p.

Source: Internet Resource: The Cochrane Library 2013, Issue 6: Accessed July 17, 2013 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD009287.pub2/pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 129428


Author: Durnescu, Ioan

Title: Resettlement Research and Practices. An International Perspective.

Summary: This report provides a comprehensive account of resettlement practices and research around the world. The main focus is around the questions: what are the initiatives that have been found effective by research and how are they implemented into real life settings. An adapted version of the framework provided by Taxman (2004) is instrumental in structuring the presentation. Therefore, research findings and practices are divided into three different stages: institutional stage, pre-release stage and the post-custody stage. A summary of the existing theoretical models available is also provided. In this part, Risk-Needs-Responsivity model and the Desistance paradigm receive a more extended account since they are the dominant ones and are already considered effective by the empirical studies. A few messages are important to retrieve from this section. First, it is essential that prisoners are treated fair and just and the quality of the professional relationship is carefully observed. Second, programs based on cognitive restructuring, motivating offenders and developing human and social capital seem to be the most effective in triggering and supporting change. As for the institutional stage a number of ideas stood up as important learning points: programs should start as soon as possible after the sentence and are organized from the release perspective, programs should be designed and delivered by motivated and professional staff that strongly believe in change, programs such as vocational training, education, drug rehabilitation and therapeutic - community are acknowledged in systematic reviews as effective in preventing reoffending. At the pre-release stage concepts such as continuity, coherence and consistency are important for describing effective programs. Two programs – FOR...A Change and Reducing the Risk of Reoffending – seem to incorporate these concepts and produced promising results. Programs dealing with transition from inside to the outside world and also with employment produced also useful conclusions. In the post-release stage it is important to continue the programs started inside the prison and overcome the reintegration barriers while supporting hope and motivation within released people. Issues like employment, stigma, financial aid, community and family are discussed in some depth. Some of the conclusions refer to the fact that research already produced some important hard data that can be used in real life settings. More has to be done to promote prison and probation organisations to become true learning organisation. Research on penology issues should employ more sensitive and credible methodologies such as quasi-experimental or experimental designs. In the same time qualitative insights should be pursued in order to understand better what, with whom and in what context change is possible. In the final part of the report the author suggests an European project structured in three directions: develop a trans-theoretical model for resettlement, pilot the model and evaluate it.

Details: Utrecht, The Netherlands: European Organisation for Probation, 2011. 30p.

Source: Internet Resource: Accessed July 17, 2013 at: http://www.cepprobation.org/uploaded_files/Durnescu-CEP-Resettlement-research-and-practice-final.pdf

Year: 2011

Country: International

Keywords: Correctional Treatment Programs

Shelf Number: 129431


Author: Gratius, Susanne

Title: Youth, Identity and Security: Synthesis Report

Summary: The latest synthesis report summarizes the research that was produced as part of the cluster on youth, identity and security of the Initiative for Peacebuilding – Early Warning Analysis to Action (IfP-EW). The cluster scrutinized different approaches toward youth and urban violence with a special focus on the gender perspective. This latest report combines the results of case studies conducted as part of the project and provides recommendations for European policy-makers. Today, rapid and unregulated urbanization and chronic urban violence are some of the leading concerns of policy-makers. Urban centres are home to half of the world’s population and some of the world’s highest homicide rates occur in urban areas of countries which are not at war. The report Youth, Identity and Security deals with the diverse approaches to youth and urban violence based on case studies in eight countries: Brazil, Cape Verde, El Salvador, Guatemala, Guinea-Bissau, Honduras, Mozambique and Venezuela. Though violence outbreaks occur predominantly in underprivileged neighbourhoods in developing countries, the report underlines that it is not so much poverty or “underdevelopment†which foster urban youth violence. The social status and the possibilities of being a gang member appeal young people and motivate them to resort to violence. The report argues that policy-makers, both at the national and international level, should not consider violent youth as isolated target groups or as threats. Rather, they should be perceived as mirroring society itself and as indicators of discriminatory state policies. The report calls for a paradigm shift in approaching urban violence: considering it a product of socio-economic and political reality rather than exclusively a public security issue. It should therefore be treated as a horizontal issue, concerning not only the justice and public security policy sectors, but also education, employment and health.

Details: Brussels: Initiative for Peacebuilding - Early Warning, 2012. 22p.

Source: Internet Resource: Accessed July 17, 2013 at: http://www.interpeace.org/2011-08-08-15-19-20/latest-news/2012/358-youth-identity-and-security

Year: 2012

Country: International

Keywords: Urban Areas

Shelf Number: 129435


Author: Walsh, J. Michael

Title: Illegal Drugs and Driving

Summary: This report attempts to summarize global activities on the subject of "Illicit Drugs and Driving". The goal of the working group was to identify what is known about the scope of the problem, to provide a discussion of the current status of political, legislative, and law enforcement efforts, and to make recommendations for new strategic initiatives and future research. A survey was developed to assess the current status of global legislation regarding driving under the influence of illegal drugs. An attempt was made to assess whether testing for alcohol and illegal drugs was permitted under current laws, the circumstances under which such testing was authorized, and the logistics of the testing process. The survey was sent out to all ICADTS members/affiliates and responses were received from 62 individuals representing 16 nations and 12 U.S. states [approximately 42% response rate]. Results of the survey indicate that most countries currently have existing laws that cover driving under the influence of illegal drugs in some fashion. Ninety-three percent of respondents indicate that the laws in their countries/states permit testing for illegal drugs. However, only 28% of survey respondents indicated that the current laws in their country would permit roadside drug tests. Survey results clearly indicated a concern about the growing problem of driving under the influence of drugs, and that marijuana, cocaine, amphetamines (including amphetamine analogs- e.g. MDMA), opiates, and the illegal use/high dose use of benzodiazepines constitute the principal illegal drug use of concern. DUI statutes in most countries are complex and create difficulties in enforcement. [N.B. There is a detailed discussion of the legal complexities in Section II.] With regard to the prosecution of drugged driving most statutes require proof of impairment due to the use of illegal drug. This legislative approach is difficult to enforce because proving that the drug "caused" the impairment is problematical. Germany, Belgium, Sweden and 8 of the U.S. states have established 'Per Se' Laws that avoid having to prove impairment due to drug. This 'Per Se' law approach allows the prosecution to be based solely on the analytical detection of drugs in body fluids [primarily blood / urine]. Survey responses indicate clearly that while alcohol testing is a routine procedure in most countries of the world, testing for non-alcohol drugs is only occasionally used. If drug testing were to become more common saliva would be the preferred specimen matrix.

Details: Utrecht, The Netherlands: International Council on Alcohol, Drugs and Traffic Safety (ICADTS), 2000. 96p.

Source: Internet Resource: ICADTS Working Group Report – “Illegal Drugs and Drivingâ€: Accessed July 18, 2013 at: http://www.icadts.nl/reports/Drugs-FinalReport.pdf

Year: 2000

Country: International

Keywords: Driving Under the Influence (International)

Shelf Number: 129443


Author: Tendulkar, Rohini

Title: Cyber-crime, Securities Markets and Systemic Risk

Summary:  The soundness, efficiency and stability of securities markets relies on the quality of information provided; the integrity of people and service provision; the effectiveness of regulation; and increasingly the robustness of supporting technological infrastructure. Yet, there is limited public, targeted and in-depth study into how one of the more prominent technology-based risks: cyber-crime could and is impacting securities markets.  Cyber-crime can be understood as an attack on the confidentiality, integrity and accessibility of an entity’s online/computer presence or networks – and information contained within. The Evolving Nature of Cyber-Crime  In recent years, cyber-crime has become increasingly sophisticated, making it difficult to combat, detect and mitigate. The rise of a relatively new class of cyber-attack is especially troubling. This new class is referred to as an ‘Advanced Persistent Threat’ (APT).1  The costs of cyber-crime to society so far may already be substantial. Some studies cite figures as high as $388 billion2 or $ 1 trillion3. While these high numbers are contentious due to lack of reliability when it comes to reporting direct and indirect costs, a growing number of high-profile cyber-attacks, high financial losses incurred, and other real-world manifestations suggest a potential for widespread impact. A focus on the world’s exchanges  To gather unique insights into the cyber-crime threat from a securities market perspective, the IOSCO Research Department, jointly with the World Federation of Exchanges Office, conducted a cyber-crime survey (hereafter the WFE/IOSCO survey) to some of our core financial market infrastructures - the world’s exchanges.4  This survey is intended as part of a series of surveys exploring perspectives and experiences with cyber-crime across different groups of securities market actors, financial institutions and regulators.  In this first survey, a vast majority of respondents agree that cyber-crime in securities markets can be considered a potentially systemic risk (89%). The following factors shed light on why:  Size, complexity and incentive structure  Cyber-crime is already targeting a number of exchanges. Over half of exchanges surveyed report experiencing a cyber-attack in the last year (53%).  Attacks tend to be disruptive in nature (rather than aiming for immediate financial gain). The most common forms of attack reported in the survey are Denial of Service attacks and malicious code (viruses). These categories of attack were also reported as the most disruptive. Financial theft did not feature in any of the responses.  This suggests a shift in motive for cyber-crime in securities markets, away from financial gain and towards more destabilizing aims. It also distinguishes cyber-crime in securities markets from traditional crimes against the financial sector e.g. fraud, theft.  Potential effect on market integrity and efficiency; infiltration of non-substitutable and/or interconnected services  The instances of attacks against exchanges means that cyber-crime is already targeting securities markets’ core infrastructures and providers of essential (and non-substitutable services). At this stage, these cyber-attacks have not impacted core systems or market integrity and efficiency. However, some exchanges surveyed suggest that a large-scale, successful attack may have the potential to do so.  Level of transparency and awareness  Transparency in the form of information sharing is occurring widely. 70% of exchanges surveyed note that they share information with authorities, overseers or regulators. However, most of these arrangements are national in nature.  There is also a high level of awareness of the threat across exchanges surveyed. Around 93% of exchanges surveyed report that cyber-threats are discussed and understood by senior management and almost 90% report having in place internal plans and documentation addressing cyber-crime.  Level of cyber-security and cyber-resilience  All exchanges surveyed appear to have in place myriad proactive and reactive defence and preventative measures (see Annex B) and report that cyber-attacks are generally detected immediately. Annual cyber-crime training for general (non-IT) staff is also a staple amongst the majority of respondent exchanges.  However, a small but significant number of exchanges surveyed recognize that 100% security is illusionary, with around a quarter recognizing that current preventative and disaster recovery measures may not be able to stand up against a large-scale and coordinated attack.  Around half of exchanges surveyed report having two separate groups for handling physical and cyber threats. Separation of the two teams could lead to challenges in engaging with cyber-physical threats, however these challenges may be easily overcome (if not already) through efficient and on-going coordination between the two groups. Further information around the level of coordination between these two groups could shed light on this point.  Around 22% of exchanges surveyed report having cyber-crime insurance or something similar. This is mainly due to lack of availability or insufficient coverage of available insurance.  Effectiveness of regulation  A number of respondents expressed doubt over the effectiveness of current regulation in deterring cyber-criminals from damaging markets, since the global nature of the crime makes it difficult to identify and prosecute them. Only 59% of exchanges surveyed report sanctions regimes being in place for cyber-crime, in their jurisdiction. Of these, only half (55%) suggest that current sanction regimes are effective in deterring cyber-criminals. Engaging with the risk  In terms of the future role of securities market regulators in engaging with cyber-crime in securities markets, the following activities were highlighted most frequently by exchanges surveyed:  Updating/implementing regulation and standards (in collaboration with other authorities);  Identifying and providing guidance on best practice, principles and/or frameworks;  Building, partaking in and promoting information sharing networks;  Acting as a repository of knowledge for securities market participants to tap into (e.g. keep up to date with trends, house technical expertise to answer industry questions, collect and record cases, identify biggest risks).  Many of the exchanges surveyed underline a need for further policy but assert that any efforts in this space should:  avoid being prescriptive;  maintain flexibility to adapt to changing risks;  concentrate on information sharing; effective regulations/legislation; providing guidance and principles; and not interfere with an institution’s own tailored internal measures or policy.

Details: Paris: International Organisation of Securities Commissions or the World Federation of Exchanges. 2013. 59p.

Source: Internet Resource: Staff Working Paper: [SWP1/2013]: Accessed July 18, 2013 at: http://www.world-exchanges.org/files/statistics/pdf/IOSCO_WFE_Cyber-crime%20report_Final_16July.pdf

Year: 2013

Country: International

Keywords: Computer Crime

Shelf Number: 129445


Author: Bruce, Judith

Title: Violence Against Adolescent Girls: A Fundamental Challenge to Meaningful Equality

Summary: Societies, rich and poor alike, are increasingly articulating commitments that guarantee girls safe and equal access to entitlements, services, social participation, and economic opportunities. Yet threats of violence in many forms—culturally affirmed (child marriage, female genital mutilation), intimate (carried out by family members and partners), casual (carried out by strangers), and planned (trafficking)— intervene to prevent girls from claiming their rights. Many countries are signatories to the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) and the Convention on the Rights of the Child (CRC), and stipulate equality between males and females in their constitutions. Theoretically, safe access to resources and facilities is equally afforded to girls and boys, however a far higher proportion of boys and a smaller subset of usually more privileged girls may actually claim their rights and opportunities. The graphic on the right provides a general illustration of how violence impedes structural access. Girls’ lives are often conditioned around the possibility of violence. And acts of violence exert additional power over girls because the stigma of violence often attaches more to a girl than to her perpetrator. The experience of violence is devastating at the individual emotional and physical level. Its power to interrupt or fully disable girls’ access to entitlements, social participation, and—crucially— safe and decent livelihoods is an equally compelling reason to stop it. Violence is so pervasive in many societies that it has the feeling of being an active “plan†or even an opposing sector undermining the investments made by other sectors in girls’ well- being. Part of the “plan†to deny the rights of girls, even when society has made progress, is to condition them to avoid opportunity in order to manage risk. As girls internalize their responsibility for managing this risk, they begin to precensor their potential.

Details: Washington, DC: Population Council, 2011. 20p.

Source: Internet Resource: A Girls First! Publication: Accessed July 18, 2013 at: http://www.popcouncil.org/pdfs/2012PGY_GirlsFirst_Violence.pdf

Year: 2011

Country: International

Keywords: Adolescents

Shelf Number: 129446


Author: Johnson, Bryan M.

Title: Report: Feasibility Study of a Cigarette Tax Stamp Program in American Samoa

Summary: A recent TAO report (May 2011) found that cigarettes were likely being smuggled into American Samoa and that as a result the government of the territory (ASG) was losing a significant of amount of cigarette excise tax revenue each year. The TAO report recommended that ASG implement a cigarette tax stamp program in order to control and prevent this smuggling. In support of that TAO recommendation, a feasibility study of a cigarette tax stamp program in American Samoa was commissioned by the American Samoa Community Cancer Network, and a report on the results of that feasibility study made. In order to establish the need for a cigarette tax stamp program, the feasibility study estimated the number of cigarettes that had been smuggled into American Samoa in 2010. That estimate (based on an analysis of demographic and cigarette excise tax data) indicated that as many as 5,792,924 cigarettes had been smuggled into the territory that year (smuggling referring to both the evasion and avoidance of excise taxes), which at the territory‟s cigarette excise tax rate of $0.125 per cigarette represented a revenue loss to ASG of $724,116. According to that estimate, the percentage of revenue losses to the government of American Samoa due to cigarette smuggling in 2010 was 8.4 percent, but the study calculated that even if the percentage of excise tax revenue lost to cigarette smuggling was only 3 to 5 percent, the revenue losses in 2010 would have still ranged from $257,547 to $429,247. Therefore, the study came to the following conclusions: 1. Based on an analysis of available data as well as other evidence, it was likely that millions of cigarettes were smuggled into the territory each year and that this smuggling deprived the government of American Samoa of hundreds of thousands of dollars. 2. That the territory‟s smuggling problem would continue and was likely to become worse in the near future if the cigarette excise tax rate were to be increased, and that such smuggling would deprive the government of badly-needed revenue and pose an on-going threat to public health. 3. That the government should take immediate measures to combat the problem, including the implementation of a cigarette tax stamp program. 4. That such a program would facilitate the control and tracking of cigarettes imported into American Samoa and would be cost-effective. In support of its recommendation to implement a cigarette tax stamp program, the feasibility study‟s report:  Discusses the current regulatory environment in American Samoa regarding the importation and sale of cigarettes into the territory  Examines possible sources of cigarettes smuggled into American Samoa  Explains what a cigarette tax stamp is and how it works  Discusses how a cigarette tax stamp program in American Samoa would work and what would be needed to implement this program  Estimates the costs involved in establishing this program and its potential economic benefits  Discusses cigarette tax stamp programs in place in several states in the U.S. (especially Hawaii, which could serve as a model for American Samoa) The study report‟s CD also contains information on where and how to purchase and/or obtain tax stamping machines and tax stamps as well as further technical assistance (in the “Resources†file).

Details: American Samoa: American Samoa Community Cancer Network, 2011. 28p.

Source: Internet Resource: Accessed July 22, 2013 at: http://tiotala.com/wp-content/uploads/2012/04/AS_cig_tax_stamp_study_report.pdf

Year: 2011

Country: International

Keywords: Cigarette Taxes

Shelf Number: 129481


Author: Baker, David

Title: A Snapshot of the Policing Practitioner and Academic Nexus: The Search for Enhanced Public Safety and Security

Summary: This article explores how policing practitioners and academics at the 2011 IPES meeting shared collaborative reflections and creative responses in order to improve public safety and security. Debate focused on how best to establish safer communities, but participants conceded that this will always remain a work-in-progress. This article argues that community trust and confidence in police and police having trust in communities are essential ingredients for nurturing police-community partnerships and public safety. A range of issues is discussed: evidence-based policing, research and practice interconnection, citizen surveys and observations, best practice in public order policing, global security, and crime prevention initiatives.

Details: Geneva, SWIT: Geneva Centre for the Democratic Control of Armed Forces (DCAF), 2013. 25p.

Source: Internet Resource: Working Paper no. 47: Accessed July 22, 2013 at: http://www.dcaf.ch/Publications/IPES-DCAF-Working-Paper-Series

Year: 2013

Country: International

Keywords: Collaboration

Shelf Number: 129482


Author: Pink, Grant

Title: Law Enforcement Responses to Transnational Environmental Crime: Choices, challenges, and culture

Summary: This paper considers the issue of law enforcement responses to transnational environmental crime with a particular focus on the role of environmental regulatory agencies. More specifically, it identifies and analyses the various operational and policy factors which inform and shape responses to transnational environmental crime. The aim of this paper is to furnish environmental regulatory agencies with information, options, and strategies so they can more effectively detect, deter, and disrupt this form of transnational crime. The paper outlines the different roles and functions of police agencies, customs and port authorities, and environmental regulatory agencies in terms of their efforts in the fight against transnational environmental crime. It also compares the use of administrative, civil, and criminal law enforcement responses by these response agencies.

Details: Canberra: Transnational Environmental Crime Project, Department of International Relations, School of International, Political & Strategic Studies, ANU College of Asia and the Pacific and Australian National University, 2013. 34p.

Source: Internet Resource: Working Paper 4/2013: Accessed July 23, 2013 at: http://ips.cap.anu.edu.au/sites/default/files/IPS/IR/TEC/TEC%20Working%20Paper%204_2013_1_Grant_Pink_Law_Enforcement_Responses.pdf

Year: 2013

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 129496


Author: Renner, Michael

Title: The Anatomy of Resource Wars

Summary: In several countries around the developing world, abundant natural resources help fuel conflict, either by attracting predatory groups seeking to control them or by financing wars that were initially caused by other factors. Prominent examples include Sierra Leone, Angola, Democratic Republic of the Congo, Sudan, and Afghanistan. Conflict has also erupted in several countries where the benefits of mining and logging projects—oil in Columbia and Nigeria, timber and natural gas in Indonesia, and copper in Bougainville/Papua New Guinea—accrue to a small elite while the social and environmental burdens are borne by local communities. Governments, rebels, and warloads have made billions of dollars by selling conflict commodities and have used the money to arm themselves and line their own pockets. But the cost of these conflicts has been extraordinary—more than 5 million people killed during the 1990's, as many as 20 million driven from their homes, and considerable environmental destruction. In this new publication, Senior Researcher, Michael Renner assesses the anatomy of resource wars, examines a number of specific cases, and discusses efforts to break the link between resources and conflict.

Details: Washington, DC: Worldwatch Institute, 2002. 91p.

Source: Internet Resource: Worldwatch Paper #162: Accessed July 24, 2013 at: http://www.worldwatch.org/node/828

Year: 2002

Country: International

Keywords: Illegal Trade

Shelf Number: 129503


Author: Mundy-Taylor

Title: Into the Deep: Implementing CITES Measures for Commercially-Valuable Sharks and Manta Rays

Summary: Over the past twenty years, the conservation and management of sharks has been the subject of much attention and discussion among Parties to the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). During this period, a significant amount of research and information has been generated on this issue within CITES processes, with Parties also having adopted a number of recommendations for action in the form of CITES Resolutions and Decisions, and proposals for listing of various shark species (Basking Shark Cetorhinus maximus, the Whale Shark Rhincodon typus, the Great White Shark Carcharodon carcharias and Sawfish Pristidae spp.) in the CITES Appendices. A summary of CITES processes related to shark conservation and management, from 1994 to present, is provided in Appendix A. At the 16th meeting of the Conference of the Parties (CoP16) held in Bangkok, Thailand, in March 2013, four new proposals to list a number of commercially important marine species in Appendix II of CITES were adopted as follows: ï‚· Oceanic Whitetip shark Carcharhinus longimanus ï‚· Porbeagle Lamna nasus ï‚· Scalloped Hammerhead shark Sphyrna lewini, Great Hammerhead shark Sphyrna mokarran, and Smooth Hammerhead shark Sphyrna zygaena (hereafter referred to collectively as “Hammerheadsâ€)1 ï‚· Manta rays Manta spp. The entry into effect of the above listings has been delayed by 18 months to 14 September 2014, to enable Parties to resolve related technical and administrative issues. At CoP16, the European Union (EU) announced that it was providing funding through the CITES Secretariat to support capacity building for the implementation of the CITES listings of commercially-valuable marine species, with a focus on developing Parties. In order to ensure the effective allocation of these funds, the European Commission requested that TRAFFIC carry out a rapid assessment of capacity building priorities and needs. Consequently, the aim of this Report was to compile and collate readily available information on: (i) the main Parties likely to be affected by the listings; (ii) international, regional and domestic regulations and measures that may be mutually supportive of, and complementary to, the listings; (iii) the main challenges expected in relation to implementation of the listings; and (iv) any existing or planned capacity building initiatives and tools available to support the listings, in addition to potential gaps and needs. The Report is composed of the following four main Parts: I. Key exporters, re-exporters and consumers of the shark and ray species listed in the CITES Appendices at CoP16 II. International, regional and domestic policies, regulations and measures relevant to CITES implementation III. Implementation of the CITES CoP16 shark and ray listings: challenges, available resources and capacity building initiatives IV. Overview of key gaps in capacity and priorities for future work Additional/supporting information is provided in Appendices A to P.

Details: Cambridge, UK: TRAFFIC, 2013. 116p.

Source: Internet Resource: Accessed July 2, 2013 at: www.traffic.org

Year: 2013

Country: International

Keywords: CITES

Shelf Number: 129506


Author: Security Council Report

Title: Women, Peace and Security: Sexual Violence in Conflict and Sanctions

Summary: Security Council Report’s third Cross-Cutting Report on Women, Peace and Security analyses statistical information on women, peace and security in country-specific decisions of the Security Council and developments in 2012, with a particular focus in the case study on the nexus between sexual violence in conflict and sanctions imposed by the Security Council. The report also examines the Council’s inconsistency in including language on the UN’s zero-tolerance policy on sexual exploitation and abuse for UN personnel in resolutions establishing or renewing mandates for peace missions. The report will also briefly touch on key developments on the women, peace and security agenda in early 2013. Since our first Cross-Cutting Report on Women, Peace and Security in 2010, there has been significant growth in the UN system’s focus on this thematic issue. The first Special Representative of the Secretary-General on Sexual Violence in Conflict was appointed in February 2010, and in January 2011 a system-wide entity on women’s equality and empowerment, UN Women, was established. Both the head of UN Women and the Special Representative have briefed the Security Council regularly since taking up their respective positions. Three years since the start of these institutional processes, it seems appropriate to examine how the establishment of these offices at UN headquarters, the continued deployment of gender expertise in the field as well as gender expertise supplementing the work of various sanctions committees’ experts groups have complemented the Security Council’s own approach to the women, peace and security agenda. This report will assess whether a more robust women, peace and security infrastructure has improved the flow of information to the Security Council and, if so, whether such improvement, in turn, has translated into an enhanced focus on these matters in Council decision-making, and in particular, in the work of its sanctions committees. Specifically, this report examines the Council’s follow-through on its own intention expressed in resolutions 1820 (2008), 1888 (2009) and 1960 (2010) to consider including designation criteria for the imposition of sanctions pertaining to acts of rape and other forms of sexual violence. To examine the nexus between sexual violence and activity by the Security Council and its sanctions committees, this report reviews the mandates of relevant sanctions regimes, the application of sanctions and relevant listing and designation criteria and reporting by associated expert groups on sexual and gender-based violence. The report will consider the sanctions regimes imposed on Côte d’Ivoire, the Democratic Republic of Congo (DRC), Iraq, Liberia, Libya, Somalia and Sudan as examples of the Security Council’s approach to women, peace and security issues—in particular whether such tools have been used to enhance accountability for sexual violence in armed conflict. In addressing the issue of accountability for perpetrators of sexual violence, the case study will also briefly touch on parallel international justice mechanisms where they exist. The past two years have been a time of particular division in the Council, with significant push-back by several permanent and elected Council members on the key thematic issues including on women, peace and security, children and armed conflict and protection of civilians. There has been repeated criticism by some Council members that the reporting on women, peace and security, particularly on sexual violence, has gone beyond its mandate by including countries that are not on the Security Council’s agenda. However, the overarching observation of this study is that this push-back has largely played itself out in difficult and protracted negotiations at the thematic level but has not negatively impacted the integrity of the Council’s women, peace and security normative framework. Interestingly, despite this controversy at the thematic level, the women, peace and security agenda continued to be substantively applied in the Council’s country-specific resolutions, the Council expanded its work at the committee-level when considering sexual violence or rape as designation criteria in various sanctions regimes and there has been regular interaction between the Council and UN Women and the Special Representative on Sexual Violence in Conflict. The Council’s interaction with the Special Representative has been especially notable at both the Council level—insofar as she has briefed not only on her broader mandate but also on several country-specific situations—and her office’s interactions with several expert groups of the Council’s sanctions committees. However, the study did reveal one area of concern regarding the Council’s inclusion of the UN’s zero-tolerance policy in its relevant resolutions. In a review of the resolutions in effect in 2012 for 12 peacekeeping operations and seven political and peacebuilding missions, only eight had mandates that included a reference to the zero-tolerance policy on sexual exploitation and abuse for UN personnel. In practice, the Council has not been involved in the matter and the issue has been left to the discretion of the Secretariat and troop-contributing countries.

Details: New York: Security Council Report, 2013. 44p.

Source: Internet Resource: Accessed August 5, 2013 at: http://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/cross_cutting_report_2_women_peace_security_2013.pdf

Year: 2013

Country: International

Keywords: Conflict-Related Sexual Violence

Shelf Number: 129516


Author: del Frate, Anna Alvazzi

Title: Non-lethal Firearm Violence

Summary: When a gun is fired the result is not always fatal: many victims survive. This may sound like good news, but the consequences of firearm injuries can be extremely severe, and treatment and recovery place a heavy burden on survivors, their families, communities, and society. Non-lethal firearm violence is far more widespread than deaths from firearms worldwide. A better knowledge of the incidence and patterns of non-lethal firearm violence would clarify the overall burden of armed violence on society and underpin the development of effective responses. Yet current information about non-lethal firearm injuries is limited, and is hampered by a lack of data. This Research Note summarizes findings published in the Small Arms Survey 2012: Moving Targets,1 focusing especially on the impact of intentional injuries committed with a firearm (firearm assaults), but also considering the consequences of self-inflicted and unintentional firearm injuries. The first section explains how the type of firearm and ammunition, as well as the availability of medical care, influence the ‘survivability’ of firearm injuries; the second reviews existing data sources; the third section presents available data on the incidence of non-fatal injuries; while the last one examines direct and indirect costs of firearm injuries.

Details: Geneva, SWIT: Small Arms Survey, 2013. 4p.

Source: Internet Resource: Research Notes, No. 32: Accessed August 6, 2013 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-32.pdf

Year: 2013

Country: International

Keywords: Gun Violence

Shelf Number: 129549


Author: Center for Strategic and International Studies

Title: The Economic Impact of Cybercrime and Cyber Espionage

Summary: Is cybercrime, cyber espionage, and other malicious cyber activities what some call “the greatest transfer of wealth in human history,†or is it what others say is a “rounding error in a fourteen trillion dollar economy?†The wide range of existing estimates of the annual loss—from a few billion dollars to hundreds of billions—reflects several difficulties. Companies conceal their losses and some are not aware of what has been taken. Intellectual property is hard to value. Some estimates relied on surveys, which provide very imprecise results unless carefully constructed. One common problem with cybersecurity surveys is that those who answer the questions “self-select,†introducing a possible source of distortion into the results. Given the data collection problems, loss estimates are based on assumptions about scale and effect— change the assumption and you get very different results. These problems leave many estimates open to question. In this initial report we start by asking what we should count in estimating losses from cybercrime and cyber espionage. We can break malicious cyber activity into six parts: • The loss of intellectual property and business confidential information • Cybercrime, which costs the world hundreds of millions of dollars every year • The loss of sensitive business information, including possible stock market manipulation • Opportunity costs, including service and employment disruptions, and reduced trust for online activities • The additional cost of securing networks, insurance, and recovery from cyber attacks • Reputational damage to the hacked company Put these together and the cost of cybercrime and cyber espionage to the global economy is probably measured in the hundreds of billions of dollars. To put this in perspective, the World Bank says that global GDP was about $70 trillion in 2011. A $400 billion loss—the high end of the range of probable costs—would be a fraction of a percent of global income. But this begs several important questions about the full benefit to the acquirers and the damage to the victims from the cumulative effect of cybercrime and cyber espionage.

Details: Santa Clara, CA: McAfee, 2013. 20p.

Source: Internet Resource: Accessed August 6, 2013 at: http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime.pdf

Year: 2013

Country: International

Keywords: Costs of Crime

Shelf Number: 129556


Author: Wyler, Liana Sun

Title: International Illegal Trade in Wildlife: Threats and U.S. Policy

Summary: Global trade in illegal wildlife is a potentially vast illicit economy, estimated to be worth billions of dollars each year. Some of the most lucrative illicit wildlife commodities include elephant ivory, rhino horn, sturgeon caviar, and so-called “bushmeat.†Wildlife smuggling may pose a transnational security threat as well as an environmental one. Numerous sources indicate that some organized criminal syndicates, insurgent groups, and foreign military units may be involved in various aspects of international wildlife trafficking. Limited anecdotal evidence also indicates that some terrorist groups may be engaged in wildlife crimes, particularly poaching, for monetary gain. Some observers claim that the participation of such actors in wildlife trafficking can therefore threaten the stability of countries, foster corruption, and encourage violence to protect the trade. Reports of escalating exploitation of protected wildlife, coupled with the emerging prominence of highly organized and well-equipped illicit actors in wildlife trafficking, suggests that policy challenges persist. Commonly cited challenges include legal loopholes that allow poachers and traffickers to operate with impunity, gaps in foreign government capabilities to address smuggling problems, and persistent structural drivers such as lack of alternative livelihoods in source countries and consumer demand. To address the illicit trade in endangered wildlife, the international community has established, through the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), a global policy framework to regulate and sometimes ban exports of selected species. Domestic, bilateral, regional, and global efforts are intended to support international goals of sustainable conservation, effective resource management, and enforcement of relevant laws and regulations. Increased recognition of the potential consequences of wildlife trafficking has caused some observers and policymakers to question the efficacy of existing U.S. and international responses and consider new options for addressing the problem. In November 2012, for example, then- Secretary of State Hillary Clinton announced the beginning of a revitalized effort to combat international wildlife trafficking. In July 2013, President Barack Obama issued Executive Order 13648 on Combating Wildlife Trafficking. The Executive Order identified poaching of protected species and the illegal trade in wildlife and their derivative parts and products as an escalating international crisis that is in the national interest of the United States to combat. The U.S. Congress has played a role in responding to these ongoing challenges and evaluating U.S. policy to combat international wildlife trafficking. Over time, Congress has enacted a wide range of laws to authorize conservation programs, appropriate domestic and international funding for wildlife protection and natural resource capacity building, and target and dismantle wildlife trafficking operations. In recent years, Congress has also held hearings and events that have addressed the growing problem of wildlife crimes and raised key questions for next steps. Interest in wildlife crime may continue in the 113th Congress. Congressional activity may include evaluating the seriousness of the threat as a national security issue, as well as raising questions regarding the effectiveness of existing policies, ranging from biodiversity programs to anti-crime activities.

Details: Washington, DC: Congressional Research Service, 2013. 26p.

Source: Internet Resource: RL34395: Accessed August 6, 2013 at: http://www.fas.org/sgp/crs/misc/RL34395.pdf

Year: 2013

Country: International

Keywords: Illegal Trade

Shelf Number: 129557


Author: den Heyer, Garth

Title: The Role of Civilian Police in Peacekeeping: 1999–2007

Summary: The role of police officers in peacekeeping missions has expanded considerably since their inclusion in the first United Nations mission to the Congo in July 1960. The role of the police in that deployment was to assist the Congo government in maintaining law and order while the Belgian military withdrew from the country. Since that mission, the role of police has evolved— in unison with the evolution of peacekeeping—from one of monitoring the democratic election process to one of providing law enforcement services and of assisting with reform and reorganization of police services in post-conflict countries. Two of the biggest changes for police in peacekeeping occurred in the late 1990s with the advent of executive policing, which involved international police being responsible for local policing and for undertaking capacity development of indigenous police services. Coinciding with those changes, academics and practitioners have confirmed that the post-conflict role of police is of great importance and that police are necessary to provide the fundamentals for nation building. In parallel, the complexity of peacekeeping missions has changed the role that police play from one of mentoring the postconflict nation’s police service to one of (a) developing institutional police capacity, (b) supporting reform, and (c) restructuring and rebuilding local police (Hills, 2009; Murtaugh, 2010). The United Nations and the European Union have had to ensure that they had the administrative, strategic, and political structures in place to plan, deploy, support, and manage large comprehensive missions that comprise both police and military goals and objectives that address such changes. The United Nations recognized the change in the police peacekeeping environment when it created a police adviser position in the mid-1990s. The position included responsibility for advising the Department of Peacekeeping Operations about police-related matters. The significance of the police adviser was increased further on May 15, 2000, with the establishment of the Civilian Police Unit within the Department’s Military and Civilian Police Division. The Civilian Police Unit’s core functions included the following: • Prepare plans for the police components of field missions, monitor their implementation, and revise them as necessary. • Develop civilian police guidelines and standing operating procedures for field missions. • Establish a liaison with member states in regard to (a) the identification and deployment of civilian police officers to field missions, (b) the operational requirements of the mission, and (c) the related personnel and administrative issues. As a result of the change in emphasis and the complexity of missions, the existing institutional framework is now being tested. More than 12,500 United Nations police now exist who are from more than 90 countries and are deployed on 17 different field missions. New ways of thinking about how police are deployed, what their role is during deployment, how they undertake their duties, and how their performance is measured is needed because of the scale and comprehensiveness of modern missions. The first step in understanding how to best assist postconflict nations in the rule of law context is to understand the role of police in peacekeeping. The second step is to ensure that the service the police are delivering is meeting the requirements of the local government. The final step is identifying police officers who have the appropriate level of skill for the mission and then ensuring that they understand what their role in the mission is, how the mission is to be achieved, and how their performance will be measured. The findings from this study may assist police planners, practitioners, and researchers who are part of a widening audience that has an interest in the role of police in post-conflict or underdeveloped nations. The study fills a vacuum in previous research about how peacekeeping missions were planned, managed, and evaluated from the police perspective, and it takes the findings from 23 peacekeeping missions and develops a dynamic new police peacekeeping model that may be used in such situations. The proposed model is comprehensive but simple and easily understood. It is hoped that this research and the subsequent model provide mission leaders with the tools to implement policies and programs that will effectively reform police agencies in post-conflict nations.

Details: Washington, DC: Police Foundations, 2012. 228p.

Source: Internet Resource: Accessed August 8, 2013 at: http://www.policefoundation.org/sites/pftest1.drupalgardens.com/files/201304/Den%20Heyer%20(2012)-%20Civilian%20Police%20in%20Peacekeping.pdf

Year: 2012

Country: International

Keywords: Civilian Police

Shelf Number: 129574


Author: Gibbs, Jennifer C.

Title: Targeting Blue: Why We Should Study Terrorist Attack on Police

Summary: With almost 12% of all attacks since 1970 targeting law enforcement, police make attractive targets for terrorist groups for several reasons, yet studying this unique phenomenon is largely neglected in the academic literature. Perhaps the scant research on this topic is due to a debate over whether attacks on police are considered terrorism and a concern about typological theorizing. This paper is a call to academic arms for scholars to study the unique phenomenon of terrorism targeting the police, arguing that such violence is indeed terrorism and disaggregating terrorism target type is beneficial for theoretical development and evidence-based policy.

Details: International Police Executive Symposium, 2013. 22p.

Source: Internet Resource: Working Paper no. 45: Accessed August 8, 2013 at: http://www.ipes.info/WPS/WPS_No_45.pdf

Year: 2013

Country: International

Keywords: Assaults on Police

Shelf Number: 129580


Author: Helfstein, Scott

Title: Edges of Radicalization: Ideas, Individuals and Networks in Violent Extremism

Summary: This paper examines radicalization as a social phenomenon through the behavior of individuals and networks. Violent extremists, individuals pursuing political change through violence, remain committed to striking the U.S. homeland and its interests abroad. It is important to understand how radical ideas spread to counter or contain this immediate and persistent threat. This study argues that the spread of violent extremism cannot be fully understood as an ideological or social phenomenon, but must be viewed as a process that integrates the two forces in a coevolutionary manner. The same forces that make an ideology appealing to some aggrieved group of people are not necessarily the same factors that promote its transfer through social networks of self-interested human beings. This means that there is value in differentiating why radical ideologies resonate among individuals, and how individuals come to adopt and advocate those ideas. This report helps contextualize the current terrorist threat, the role of technology in radicalization, and next steps in decoding radicalization.

Details: West Point, NY: Combating Terrorism Center at West Point, 2012. 71p.

Source: Internet Resource: Accessed August 8, 2013 at: http://www.ctc.usma.edu/posts/edges-of-radicalization-ideas-individuals-and-networks-in-violent-extremism

Year: 2012

Country: International

Keywords: Extremist Groups

Shelf Number: 129585


Author: Denney, Lisa

Title: Securing Communities: The what and the how of community policing

Summary: Community policing has gained popularity amongst donors, governments, police departments and communities as a mechanism for achieving a diverse range of goals – from crime reduction to improved state-society relations. Yet while community policing initiatives are widespread across the globe, there is little consensus on its definition, objectives or models. Given the ambiguity surrounding its precise meaning, this paper maps the ‘what’ and the ‘how’ of community policing, setting out what it means and hopes to achieve, and how it manifests and is shaped by factors such as histories of state-society relations. Development actors have become particularly interested in community policing in recent times with the recognition that security and justice are fundamental to development processes, and that security must be tailored to the needs and interests of local communities. However, while community policing provides opportunities that can strengthen accountable safety, security and justice, it is not a panacea; those supporting or implementing such practices need to be aware of the associated risks. Furthermore, given the current donor interest in community policing, there is a need for greater analytical clarity about the features above.

Details: London: Overseas Development Institute, 2013. 44p.

Source: Internet Resource: Background Paper: Accessed August 8, 2013 at: http://www.odi.org.uk/sites/odi.org.uk/files/odi-assets/publications-opinion-files/8491.pdf

Year: 2013

Country: International

Keywords: Community Policing (International)

Shelf Number: 129593


Author: Domingo, Pilar

Title: The Political Economy of Pre-trial Detention

Summary: On any given day, over 3 million people are held in pre-trial detention (PTD). On average, this represents one out of every three people detained, but this rises to one in two detainees in many countries. PTD is a relatively discrete justice issue that is clearly identifiable and can be addressed before escalation, presenting an important opportunity for policymakers (from ministries and donor agencies) to engage in reform. It is also diagnostic in relation to broader justice challenges and state–society relations, making it a useful gauge of other blockages within the justice sector. The objective of this paper is to develop an analytical framework that draws on political economy analysis (PEA) that can contribute to identifying the drivers of PTD. This can then be taken to country level to inform programming in ways that improve results.

Details: London: Overseas Development Institute, 2013. 31p.

Source: Internet Resource: Accessed August 8, 2013 at: http://www.odi.org.uk/sites/odi.org.uk/files/odi-assets/publications-opinion-files/8257.pdf

Year: 2013

Country: International

Keywords: Criminal Justice Reform

Shelf Number: 129594


Author: Shaw, Mark

Title: Know Your Enemy: An Overview of Organized Crime Threat Assessments

Summary: There is increasing awareness within police forces and international organizations that organized crime is a growing threat to security. However, due to a lack of data and insufficient knowledge about illicit activities, criminal justice experts are often left chasing shadows. To rectify this problem, more attention has been devoted to developing and using organized crime threat assessments in recent years, particularly for use in vulnerable states that are less resistant to infiltration by criminals. This paper briefly considers the history of organized crime threat assessments, the process in which they have been produced and used, and criticisms that have been leveled against them. Finally, it considers their applicability to fragile and postconflict countries and the kind of requirements that would need to be fulfilled for threat assessments to be an effective tool against organized crime in such contexts.

Details: New York: International Peace Institute, 2011. 7p.

Source: Internet Resource: Issue Brief: Accessed August 10, 2013 at: http://www.ipinst.org/media/pdf/publications/ipi_e_pub_know_your_enemy.pdf

Year: 2011

Country: International

Keywords: Organized Crime (International)

Shelf Number: 129608


Author: Kemp, Walter

Title: The Elephant in the Room: How Can Peace Operations Deal with Organized Crime?

Summary: "The Elephant in the Room" shows how organized crime–once considered a problem isolated to a few, mostly urban, communities–has become globalized and now affects a wide range of the UN’s activities, including the maintenance of international peace and security. It describes how crime has become a serious threat in almost every theater where the UN has peace operations, and juxtaposes this with an analysis of mission mandates which contain few operational references to crime. Case studies based on field research in Haiti, Guinea-Bissau, and Kosovo show the impact of organized crime on stability, governance, and development and demonstrate the challenges faced by the international community in helping states to deal with this problem. The report argues that unless peace operations can identify and deal with spoilers involved in illicit activities at an early stage, better assess conflict economies, and disrupt illicit markets, organized crime will continue to flourish in theaters where peace operations are deployed–hindering their operability and the very development, security, and justice that the UN seeks to promote. The report concludes by making recommendations designed to increase the effectiveness of peace operations when dealing with transnational organized crime.

Details: New York: International Peace Institute, 2013. 86p.

Source: Internet Resource: Accessed August 10, 2013 at: http://www.ipinst.org/images/pdfs/ipi_e-pub-elephant_in_the_room.pdf

Year: 2013

Country: International

Keywords: Illicit Markets

Shelf Number: 129609


Author: Fink, Naureen Chowdhury

Title: Evaluating Countering Violent Extremism Programming: Practice and Progress

Summary: As the threat from terrorism becomes more diffuse, networked, and transnational, with newly emerging lone terrorists or small groups, so too have the tools of counterterrorism continued to evolve. Policymakers and practitioners are focusing more on preventing and countering radicalization and recruitment and improving the resilience of individuals and communities against the appeal of violent extremism. Reflective of these trends, efforts on countering violent extremism (CVE)1 have emerged in a relatively short period as an increasingly important instrument in the counterterrorism tool kit as an integral part of their wider strategic objectives on countering terrorism. States are more attentive to the development of CVE strategies and are supporting initiatives that move beyond policy development and into implementation. Additionally, multilateral counterterrorism actors, such as the European Union and United Nations, have expanded their interest in CVE activities. Of particular note in this regard is the Global Counterterrorism Forum (GCTF), an informal, multilateral counterterrorism body comprising 29 countries plus the European Union that was launched in September 2011.2 The GCTF serves as a platform for identifying critical civilian counterterrorism needs and mobilizing the necessary expertise and resources to address such needs and enhance global cooperation. In December 2012, the Hedayah International Center of Excellence for Countering Violent Extremism was launched as an initiative of the GCTF in Abu Dhabi to assist governments and stakeholders in their efforts.3 Furthermore, regional organizations and civil society actors are becoming increasingly engaged in the development and implementation of CVE programming. This shift toward a more proactive approach to terrorism and the resulting proliferation of CVE programming have raised questions and concerns about its effectiveness. Challenges exist not only in designing preventive programs but also in developing tools for measuring and evaluating their impact. For example, developing a CVE intervention requires that a number of questions be addressed: How does radicalization occur, and at what stage in the radicalization process is an intervention warranted? Should CVE programs target all who are sympathetic to the causes espoused by militant groups or only those who have provided active support? Do programs that address some of the grievances often associated with violent extremism, such as underdevelopment, inequality, or sociopolitical marginalization, merit being tagged with a CVE label? What kind of added value can be provided by CVE programs that are not included within development, education, or conflict mitigation and peace-building efforts? The responses to these questions are important for establishing the scope and parameters of the program and in contributing to the development of indicators against which success can be measured, which should ideally be embedded in program design from the outset. Once the intervention has been designed, however, a number of obstacles remain in measuring its impact. These challenges include (1) determining the scope of the evaluation; (2) attributing causality where the desired outcome is a nonevent, i.e., “measuring the negativeâ€; and (3) obtaining resources and technical expertise to conduct an evaluation.4 To a large extent, the answers to these questions will vary across regions and contexts and be determined by lessons learned from past practices. Reflecting the prevalence of CVE programs, there is now greater acceptance of the need to invest in program evaluation in order to address the questions and concerns about preventive interventions. It is no longer a question of whether, but how to conduct these evaluations.

Details: Goshen, IN: Center on Global Counterterrorism Cooperation, 2013. 24p.

Source: Internet Resource: Accessed August 10, 2013 at: http://www.globalct.org/wp-content/uploads/2013/07/Fink_Romaniuk_Barakat_EVALUATING-CVE-PROGRAMMING_2013.pdf

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 129612


Author: Ortoleva, Stephanie

Title: Forgotten Sisters - A Report on Violence against Women with Disabilities An Overview of its Nature, Scope, Causes and Consequences

Summary: This report, prepared by scholars and human rights advocates who are members of the Working Group on Violence against Women with Disabilities, focuses on the prevalence and pervasiveness of violence against women and girls with disabilities. The Working Group recognizes the need to ensure that women and girls with disabilities are included as full participants in data-gathering, analysis, and proposed solutions as the mandates of Ms. Rashida Manjoo, the UN Special Rapporteur on Violence against Women, its Causes and Consequences, and Mr. Shuaib Chalklen, the Special Rapporteur on Disability, move forward. Additionally, the Working Group calls on international organizations, especially those focused on women’s rights such as the UN Commission on the Status of Women (which will consider as its priority thematic issue violence against women at its 57th session in March 2013) and UN Women, and the international community, governments and non-governmental organizations (NGOs) to join us in the effort to highlight these critical issues. Because women with disabilities make up a significant part of the world’s population, principles of fairness and equality require that the world engage in a vigorous discussion on how to end violence against them. According to the World Health Organization (WHO) and the World Bank (WB), more than one billion people (approximately 15% of the world’s population) live with some form of disability. Significantly, for the World Bank and World Health Organization disability level threshold of 40, which includes those experiencing significant difficulties in their everyday lives for both low income and high income countries, the male disability prevalence rate is 12 with standard error .18 and the female disability prevalence rate is 19.2 with standard error .19. Based on these figures, it is clear that women with disabilities constitute a significant portion of the global population and that the pervasive violence against women with disabilities must be addressed. The 2011 Report of the United Nations Special Rapporteur on Violence Against Women focused on the multiple and intersecting forms of discrimination that contribute to and exacerbate violence against women, noting that factors such as ability, age, access to resources, race/ethnicity, language, religion, sexual orientation and gender identity and class can exacerbate the violence women experience. Although women with disabilities experience many of the same forms of violence all women experience, when gender and disability intersect, violence takes on unique forms, has unique causes, and results in unique consequences. Further, women with disabilities who are also people of color or members of minority or indigenous peoples, or who are lesbian, trans-gender or intersex or who live in poverty, can be subject to particularized forms of violence and discrimination. These intersections must be explored in greater depth to ensure that the complexities of violence against women with disabilities are properly understood and addressed.

Details: Boston: Northeastern University School of Law, 2012. 229p.

Source: Internet Resource: School of Law Faculty Publications. Paper 184; Accessed August 20, 2013 at: http://iris.lib.neu.edu/cgi/viewcontent.cgi?article=1184&context=slaw_fac_pubs

Year: 2012

Country: International

Keywords: Disabilities

Shelf Number: 129616


Author: United Nations Interregional Crime and Justice Research Institute (UNICRI)

Title: Confiscation of the Proceeds of IP Crime: A modern tool for deterring counterfeiting and piracy

Summary: The theft of Intellectual Property (IP) in the forms of trademark counterfeiting and copyright piracy is a socio-economic problem of enormous scale that has escalated significantly in the last decade. In one country after another, the massive infiltration of counterfeit and pirated products has created an enormous drain on national economies around the world — crowding out billions in legitimate economic activity and facilitating an “underground economy†that deprives governments of revenues for vital public services, forces higher burdens on tax payers, dislocates hundreds of thousands of legitimate jobs and exposes consumers to dangerous and ineffective products. Moreover, the Internet is increasingly exploited as an illicit marketplace for counterfeiting and piracy. The latest estimate from ICC BASCAP indicates that the total global value of counterfeiting and piracy could reach a staggering peak of USD 1.7 trillion by 2015. IP crime has emerged as a lucrative and growing new activity for organized criminal networks. There is strong evidence that organized criminal groups are moving into counterfeiting and piracy in ever-growing numbers. The high profits and low risk associated with modest penalties and lax enforcement of intellectual property IP crime has made this a major new business opportunity for organized crime networks. Today, counterfeiting and piracy play a key role in the operations of transnational criminal organizations. One recent example of this was the Interpol-led Operation “Black Poseidonâ€. The operation targeted products being traded illicitly across Eastern Europe (namely Belarus, Georgia, Moldova, Turkey and Ukraine) by transnational organized crime groups. Counterfeit products included computers, pharmaceuticals, agrochemicals, electronics, alcohol and cigarettes. The operation led to the seizure of goods worth over €120 million and 1,400 persons under arrest or investigation. The emergence of organized IP crime accelerates the globalization of counterfeiting and piracy, helps fund other criminal activities such as extortion, illegal drugs and human trafficking, compromises the international financial system for money laundering purposes and, ultimately, makes it more difficult for existing law enforcement measures to be effective.

Details: Turin, Italy: United Nations Interregional Crime and Justice Research Institute, 2013. 84p.

Source: Internet Resource: accessed August 10, 2013 at: www.iccwbo.org

Year: 2013

Country: International

Keywords: Copyright Piracy

Shelf Number: 129618


Author: Alkaabi, Ali

Title: A Comparative Analysis of the Extent of Money Laundering in Australia, UAE, UK and the USA

Summary: The IMF has estimated that the extent of money laundering globally is between 2 to 5 percent of the world’s gross domestic product. This figure is larger than the GDP of all but a handful of countries and represents correspondingly huge risks to global financial stability and to the financial well-being and stability of many countries. This paper provides a comparative analysis of the extent of Money Laundering over the last decade across four countries which represent a spectrum of economic development and culture: Australia, the UAE, the UK and the USA. We do so with a view to understanding their anti-money laundering systems and their recent efforts to improve the effectiveness of those systems. In the case of the UAE, we examine also the cultural influences which differentiate it from the other three countries and which have necessarily been a factor in shaping those efforts and their current system. Money laundering and related statistics including the number of Suspicious Activity Reports (SARs) received from 1999 to 2008 are analyzed. The paper consolidates and analyses information made available by the government websites of these countries and information made available through other sources, both academic and non-academic. It is clear that international efforts to combat money laundering have achieved considerable success over the decade. It is also clear that there is more to be done, by policy makers, by regulators, and by evaluators, and in particular that success in combating money laundering globally must more precisely address cultural and historical differences amongst the international community.

Details: Unpublished paper, 2010. 13p.

Source: Internet Resource: Finance and Corporate Governance Conference 2010 Paper ; Accessed August 12, 2013 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1539843

Year: 2010

Country: International

Keywords: Financial Crimes

Shelf Number: 129624


Author: Romyn, David

Title: Red-Teaming Terrorist Attacks: A Simulation Approach

Summary: This paper reviews the sequence of events leading up to terrorist attacks, in particular, the tasks that must be undertaken, being target selection, weapons acquisition, surveillance and implementation. Through an online survey of participants involved in counter terrorism operations, the authors identified preferences for a particular order in these tasks, and specific target locations. It is also noted that specific attributes in target locations are deemed to be important. The authors highlight how this study’s findings could enhance current counter terrorism strategies.

Details: Nathan, QLD, AUS: ARC Centre of Excellence in Policing and Security, 2013. 4p.

Source: Internet Resource: Briefing Issue 23: Accessed August 19, 2013 at: http://www.ceps.edu.au/CMS/Uploads/file/Issue%2023_WEB.pdf

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 129642


Author: Ponemon Institute LLC

Title: Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Summary: With the increasing cost and volume of data breaches, cyber security is quickly moving from being considered by business leaders as a purely technical issue to a larger business risk. This shift has spurred increased interest in cyber insurance to mitigate the cost of these issues. In a new study sponsored by Experian® Data Breach Resolution, Ponemon Institute surveyed risk management professionals across multiple sectors that have considered or adopted cyber insurance. Based on responses, many understand that security is a clear and present risk. Indeed a majority of companies now rank cyber security risks as greater than natural disasters and other major business risks.

Details: Ponemon Institute, 2013. 25p.

Source: Internet Resource: Accessed August 19, 2013 at: http://www.experian.com/innovation/business-resources/ponemon-study-managing-cyber-security-as-business-risk.jsp?ecd_dbres_cyber_insurance_study_ponemon_referral

Year: 2013

Country: International

Keywords: Crimes Against Businesses

Shelf Number: 129646


Author: Hunt, Alice E.

Title: Beyond Bullets: Strategies for Countering Violent Extremism

Summary: To guide future American efforts to counter violent Islamist extremism, the Center for a New American Security launched a strategy development process modeled after President Eisenhower’s Project Solarium. CNAS asked five experts to recast the effort in sustainable terms and in a manner consistent with American values. The result was a series of essays that recommended new counterterrorism tools and strategies for the Obama administration. Kristin Lord, John Nagl, and Seth Rosen present a comprehensive strategy to combat violent Islamist extremism. David Kilcullen recommends a “balanced • response†that disaggregates disparate Islamist groups and recalibrates the civilian and military tools of U.S. power. Larry Diamond focuses on democratization in • the Arab world as a means to staunch the supply of violent extremists and the grievances that inspire them. Camille Pecastaing suggests that the U.S. government dismantle the “war on terror,†relegate counterterrorism to the jurisdiction of technical government agencies, and educate the American public about the true nature of the threat. Harvey Sapolsky proposes a reduction of U.S. • military deployments in order to undercut extremist propaganda and conserve limited resources. Finally, Daniel Benjamin presents a counter• terrorism strategy that would recommit the United States to international legal standards and to expand civilian tools of government, while continuing to track down al Qaeda. CNAS researchers James Miller and Alice Hunt then convened the authors, along with leading experts and stakeholders from the U.S. government, to debate the merits and challenges of each approach. From these discussions, CNAS researchers crafted a draft strategy and presented it to the authors and outside experts at a second conference. The feedback from that session, along with a series of expert reviews, resulted in the final documents presented in this volume.

Details: Washington, EC: Center for a New American Security, 2009. 127p.

Source: Internet Resource: Accessed August 19, 2013 at: http://www.cnas.org/files/documents/publications/LordNaglRosen_Beyond%20Bullets%20Edited%20Volume_June09_0.pdf

Year: 2009

Country: International

Keywords: Counter-Terrorism

Shelf Number: 129647


Author: Interpol. Environmental Crime Programme

Title: Guide to Carbon Trading Crime

Summary: Over recent decades there has been a growing scientific consensus that average global temperatures are rising as a result of increased concentrations of greenhouse gases in the atmosphere caused by human activities, particularly industrialization. In response to this scientific evidence, the global community agreed in 1992 to an international treaty, the United Nations Framework Convention on Climate Change (UNFCCC). The treaty requires countries to cooperatively consider what they could do to limit average global temperature increases and the resulting climate change and to cope with whatever impacts were, by then, inevitable. As at June 2013, the treaty has been ratified by 195 parties.1 In 1997, the Kyoto Protocol was adopted as an international agreement under the UNFCCC and entered into force in February 2005.2 As at June 2013, there are 192 parties to the Protocol.3 The major feature of the Protocol is that it sets binding targets for 37 industrialized countries (the “Annex I†parties)4 and the European Community to reduce their emissions of six specified types of greenhouse gases – the three most important being carbon dioxide (CO2), methane (CH4) and nitrous oxide (N2O). The others being hydrofluorocarbons (HFCs), perfluorocarbons (PFCs), and sulphur hexafluoride (SF6). While countries are encouraged to reduce emissions of all these greenhouse gases, for the purposes of standardising the measurements, the emissions of these other gases are converted into the equivalent “global warming potential†of CO2. For example, methane (CH4) has 21 times the global warming potential of carbon dioxide (which is measured over a 100 year timescale).5 Therefore the emission of 1 tonne of methane is considered to be equivalent to the emission of 21 tonnes of carbon dioxide. While the Kyoto Protocol requires signatory countries to meet their targets primarily through domestic measures, it also provides for a number of flexible mechanisms that allows them to offset their emissions by purchasing reductions made in other countries. This is done by purchasing “unitsâ€, each unit being equivalent to one tonne of CO2 (emissions of other greenhouse gases being converted to the equivalent number of tonnes of CO2). Through the trading of these units to offset emissions of greenhouse gases, a new commodity has been created in the form of emission reductions or removals. Since carbon dioxide (CO2) is the principal greenhouse gas, this market is widely referred to as the “carbon marketâ€,6 with each of the units traded commonly referred to as “carbon creditsâ€.7 Under the Kyoto Protocol, countries are to keep precise records of the trades carried out. Transfers and acquisitions of carbon credits are tracked and recorded through the registry systems under the Protocol. The UN Climate Change Secretariat, based in Bonn, Germany, keeps an international transaction log to ensure secure transfer of carbon credits between countries and to verify that transactions are consistent with the rules of the Protocol. Emissions trading schemes may also be established as climate policy instruments at the national and regional levels. Under such schemes, governments set emissions obligations to be reached by the participating entities. The European Union’s Emissions Trading Scheme (EU-ETS) is the largest in operation. INTERPOL, through its Environmental Crime Programme and the Economic and Financial Crimes sub-Directorate, recognize that emerging carbon markets, like any market, are at risk of exploitation through criminal means and therefore require proper monitoring and enforcement to ensure environmental and financial integrity. This guide is not intended to take a position on the value of carbon trading in either a general or specific form but is intended to assess the current vulnerabilities of the existing and emerging carbon markets and provide fundamental information necessary to establish adequate policing of these mechanisms. INTERPOL is the only international police organization with a trans-boundary mandate, with designated units addressing both environmental and financial crimes. Its mandate includes the exchange of criminal intelligence and sensitive information between law enforcement agencies amongst INTERPOL’s 190 member countries. INTERPOL recognizes carbon trading crime as a new and emerging type of environmental and financial crime. Before assessing the potential scope for criminal activity, this report offers a comprehensive overview of the carbon market and carbon trading in practice, for those unfamiliar with its operations and terminology.

Details: Lyon, France: Interpol, 2013. 31p.

Source: Internet Resource: Accessed August 19, 2013 at: www.interpol.int

Year: 2013

Country: International

Keywords: Carbon Trading Crime (International)

Shelf Number: 129663


Author: World Customs Organization

Title: Illicit Trade Report: 2012

Summary: Illicit trade involves money, goods or value gained from illegal and otherwise unethical activity. It encompasses a variety of illegal trading activities, including human trafficking, environmental crime, illegal trade in natural resources, intellectual property infringements, trade in certain substances that cause health or safety risks, smuggling of excisable goods, trade in illegal drugs, and a variety of illicit financial flows. These activities cause a wide range of economic, social, environmental or political damage. Estimates of the global retail value of illicit trade vary, but recent estimates by Global Financial Integrity (GFI) place the total at US$ 650 billion for goods, and at US$ 2 trillion if illicit financial flows are included1. Customs administrations address risk wherever it is found and, increasingly, as early in the supply chain as possible. The WCO, through its Customs Enforcement Network (CEN), has been recording Customs seizures worldwide to allow tracking and analysis of the latest trends and patterns in relation to illicit trade. These recorded seizures do not only contribute to better knowledge about current smuggling and cross-border criminal activities but also reveal important information about evolving or emerging risks in the international Customs context. The WCO Illicit Trade Report comprises six chapters. Each chapter is dedicated to a single thematic area : Drugs, Revenue, IPR/Health and Safety, Environment, Security and the Customs Enforcement Network. The commentary on each of these outlines our programmes, activities undertaken within the programmes and key observations associated with those activities.

Details: World Customs Organization, 2013. 135p.

Source: Internet Resource: Accessed August 19, 2013 at: http://www.cites.org/fb/2013/wco_illicit_trade_report_2012.pdf

Year: 2013

Country: International

Keywords: Alcohol Smuggling

Shelf Number: 129664


Author: Mason, Cody

Title: International Growth Trends in Prison Privatization

Summary: For-profit prison privatization, which dates back to 16th Century England, began to enjoy a modern reincarnation in the United States in the 1980s. Privatization advocates promised low-cost, quality, detention services at a time when government resources were being strained under the weight of exploding prison populations. It was on the back of these promises that lawmakers and officials would hand over eight percent of America’s prisoners, as well as larger amounts of its federal pre-trial and immigrant detainees, to privately owned or operated facilities by 2011. However, although privatization has enjoyed a steady reemergence in the United States, the companies managing these facilities have faced persistent criticism for providing low-quality services, failing to save taxpayer money, and negatively affecting criminal justice policy. Despite these failures, several countries have followed the United States in utilizing private prisons and detention centers with the intent of decreasing correctional expenditures and reducing prison overcrowding. These developments have helped private U.S. prison companies diversify their investments at a time when America’s prison population growth has stalled. For example, 14 percent of the revenue for America’s second largest private prison company, The GEO Group, came from international services in fiscal year 2012. Similarly, the spread of prison privatization has also benefited for-profit companies from other countries, including UK-based G4S, which claims to be the largest security service provider in the world. Together, these companies have thrived off of the expanded privatization of prisons, immigration detention systems, and other governmental services, while often failing to deliver on the services that were promised. This report investigates the trends identified above and explores the growth of for-profit prison privatizations across the globe. Noteworthy findings discussed in this report include: • At least 11 countries, spread across North America, South America, Europe, Africa, and Oceania, are engaged in some level of prison privatization. • While the United States maintains the highest total number of privately held prisoners, Australia, Scotland, England and Wales, and New Zealand hold a larger proportion of prisoners in private facilities, with a high of 19 percent in Australia. • As in the United States, immigrant detention has been a particular target of privatization in the United Kingdom, which has 73 percent of its immigrant detainees held privately, and Australia, which has a wholly private immigrant detention system. • The prison privatization market outside of the United States is dominated by The GEO Group and two British companies, G4S and Serco. • Media reports from countries including the United Kingdom, New Zealand, Australia, and Canada have reflected research conducted in the United States showing that private prison companies’ profit motives often lead to inadequate services and unsafe conditions.

Details: Washington, DC: The Sentencing Project, 2013. 23p.

Source: Internet Resource: Accessed August 22, 2013 at: http://sentencingproject.org/doc/publications/inc_International%20Growth%20Trends%20in%20Prison%20Privatization.pdf

Year: 2013

Country: International

Keywords: Private Prisons

Shelf Number: 129671


Author: Koren, Elaine

Title: Travelling Child Sex Offenders: Annotated Bibliography

Summary: This annotated bibliography is based on a literature review using open source, academic and grey literature reviewing existing promising practices of preventing travelling child sex offenders (TCSOs) and their related activities. Its focus is to identify relevant research that could identify issues from the literature relating to promising practices to address this phenomenon, lessons learned, and trends. The paper uses explicit criterion, limiting hidden biases and assumptions, and enabling replication of the research by others.

Details: Ottawa: Public Safety Canada, 2013. 62p.

Source: Internet Resource: RDIMS# 782503: Accessed October 28, 2013 at:

Year: 2013

Country: International

Keywords: Child Prostitution

Shelf Number: 131401


Author: Subramanian, Ram

Title: Sentencing and Prison Practices in Germany and the Netherlands: Implications for the United States

Summary: Germany and the Netherlands have significantly lower incarceration rates than the United States and make much greater use of non-custodial penalties, particularly for nonviolent crimes. In addition, conditions and practices within correctional facilities in these countries - grounded in the principle of "normalization" whereby life in prison is to resemble as much as possible life in the community - also differ markedly from the U.S. In February 2013 - as part of the European-American Prison Project funded by the California-based Prison Law Office and managed by Vera - delegations of corrections and justice system leaders from Colorado, Georgia, and Pennsylvania together visited Germany and the Netherlands to tour prison facilities, speak with corrections officials and researchers, and interact with inmates. Although variations in the definitions of crimes, specific punishments, and recidivism limit the availability of comparable justice statistics, this report describes the considerably different approaches to sentencing and corrections these leaders observed in Europe and the impact this exposure has had (and continues to have) on the policy debate and practices in their home states. It also explores some of the project's practical implications for reform efforts throughout the United States to reduce incarceration and improve conditions of confinement while maintaining public safety.

Details: New York: Vera Institute of Justice, 2013. 24p.

Source: Internet Resource: accessed October 1, 2013 at: http://www.vera.org/sites/default/files/resources/downloads/european-american-prison-report.pdf

Year: 2013

Country: International

Keywords: Punishment

Shelf Number: 131576


Author: Lehti, Martti

Title: NRILP Comparative Homicide Time Series (NRILP-CHTS)

Summary: Homicide research has been a long-standing research focus in Finnish criminology and also in the research programme of the National Research Institute of Legal Policy (Lappi-Seppala 2001). This traditional emphasis refl ects the fact that Finnish homicide rates have been for a long time higher than homicide rates in other Nordic countries (Savolainen et al. 2008; Kivivuori & Lehti 2011; Kivivuori et al. 2012). Homicide scholarship inspired by the comparatively high Finnish homicide rates also contributed to early international comparative data building. Refl ecting this research programme, the NRILP created the Finnish Homicide Monitor (Lehti & Kivivuori 2012) in 2002 and has subsequently participated in ongoing efforts to create a European Homicide Monitor (Granath et al. 2011; Liem et al. 2013). The NRILP Comparative Homicide Time Series (NRILP-CHTS) continues these research emphases. Its goal is to serve as an additional research asset for international homicide research. The CHTS dataset incorporates data on homicide levels and trends drawn from publicly available national and international sources. Currently it includes information on annual homicide rates and numbers of 193 independent countries, 40 self-governing regions, and 17 historical administrative entities. Annual numbers of homicide victims by gender are available for 124 independent countries, 33 self-governing regions, and 12 historical administrative entities; annual homicide mortality rates by gender for 103 independent countries, 13 self-governing regions, and 6 historical administrative entities. For each country, the longest possible time series duration has been incorporated. The dataset is updated annually.

Details: Helsinki: National Research Institute of Legal Policy, 2013. 12p.

Source: Internet Resource: Research Brief 32/2013: Accessed November 6, 2013 at: http://www.optula.om.fi/Satellite?blobtable=MungoBlobs&blobcol=urldata&SSURIapptype=BlobServer&SSURIcontainer=Default&SSURIsession=false&blobkey=id&blobheadervalue1=inline;%20filename=kansainv%C3%A4linen%20henkirikollisuus%2032%20eng.pdf&SSURIsscontext=Satellite%20Server&blobwhere=1382644107526&blobheadername1=Content-Disposition&ssbinary=true&blobheader=application/pdf

Year: 2013

Country: International

Keywords: Crime Statistics

Shelf Number: 131585


Author: Javelin Strategy and Research

Title: 2013 LexisNexis True Cost of Fraud Study. Merchants Struggle Against an Onslaught of High-Cost Identity Fraud and Online Fraud

Summary: While the rebounding economy is softening the blow of merchant fraud losses, merchants are still paying $2.79 in costs for each dollar of fraud losses they incur, up $0.10 on the dollar from 2012 (see figure 1). A spike in online fraud is responsible for these higher costs, as fraud through the online channel burdens merchants with higher fees and replacement costs than fraud through in-person or other channels. The surge in online fraud is driven by the proliferation of malware and data breaches, which facilitate the theft and misuse of consumers' payment card, merchant account, and alternative payments account information. Merchants would be wise to focus on customer identity and transaction verification, particularly for online transactions, as online fraud and identity fraud take a greater percent of fraud losses in 2013. Large e-commerce merchants demonstrate exemplary fraud attitudes and behaviors which mitigate the effect of fraud losses on their bottom line. These merchants believe that fraud is inevitable, but understand that their prevention efforts will result in more positive customer relationships (see figure 5). They use a greater number of fraud technology solutions than all merchants (5 solutions vs. 2, on average), and lose a relatively low (and declining) percent of revenue to fraud each year (from .60% in 2012 to .53% in 2013) (see figure 3). International merchants adhere to the same beliefs and behaviors to a lesser degree, though still more than all merchants (see figures 5 and 13). Although they lose more revenue to fraud each year, they reduced this percent even as their domestic-only counterparts saw an increase this year (see figure 17). Mobile merchants saw an increase in fraud as a percent of revenue this year (from .64% in 2012 to .75% in 2013) (see figure 3). While displaying similar attitudes to large e-commerce merchants as to the positive effects of reducing fraud, they are most likely among all segments to view fraud mitigation costs as burdensome (see figure 4).

Details: New York: LexisNexis, 2013. 37p.

Source: Internet Resource: Accessed November 7, 2013 at: http://www.lexisnexis.com/risk/downloads/assets/true-cost-fraud-2013.pdf

Year: 2013

Country: International

Keywords: Crimes Against Businesses

Shelf Number: 131600


Author: United Nations Office on Drugs and Crime

Title: Comprehensive Study on Cybercrime

Summary: In 2011, at least 2.3 billion people, the equivalent of more than one third of the world's total population, had access to the internet. Over 60 per cent of all internet users are in developing countries, with 45 per cent of all internet users below the age of 25 years. By the year 2017, it is estimated that mobile broadband subscriptions will approach 70 per cent of the world's total population. By the year 2020, the number of networked devices (the 'internet of things') will outnumber people by six to one, transforming current conceptions of the internet. In the hyper-connected world of tomorrow, it will become hard to imagine a 'computer crime', and perhaps any crime, that does not involve electronic evidence linked with internet protocol (IP) connectivity. 'Definitions' of cybercrime mostly depend upon the purpose of using the term. A limited number of acts against the confidentiality, integrity and availability of computer data or systems represent the core of cybercrime. Beyond this, however, computer-related acts for personal or financial gain or harm, including forms of identity-related crime, and computer content-related acts (all of which fall within a wider meaning of the term 'cybercrime') do not lend themselves easily to efforts to arrive at legal definitions of the aggregate term. Certain definitions are required for the core of cybercrime acts. However, a 'definition' of cybercrime is not as relevant for other purposes, such as defining the scope of specialized investigative and international cooperation powers, which are better focused on electronic evidence for any crime, rather than a broad, artificial 'cybercrime' construct. In many countries, the explosion in global connectivity has come at a time of economic and demographic transformations, with rising income disparities, tightened private sector spending, and reduced financial liquidity. At the global level, law enforcement respondents to the study perceive increasing levels of cybercrime, as both individuals and organized criminal groups exploit new criminal opportunities, driven by profit and personal gain. Upwards of 80 percent of cybercrime acts are estimated to originate in some form of organized activity, with cybercrime black markets established on a cycle of malware creation, computer infection, botnet management, harvesting of personal and financial data, data sale, and 'cashing out' of financial information. Cybercrime perpetrators no longer require complex skills or techniques. In the developing country context in particular, subcultures of young men engaged in computer-related many of whom begin involvement in cybercrime in late teenage years. Globally, cybercrime acts show a broad distribution across financial-driven acts, and computer-content related acts, as well as acts against the confidentiality, integrity and accessibility of computer systems. Perceptions of relative risk and threat vary, however, between Governments and private sector enterprises. Currently, police-recorded crime statistics do not represent a sound basis for cross-national comparisons, although such statistics are often important for policy making at the national level. Two-thirds of countries view their systems of police statistics as insufficient for recording cybercrime. Police-recorded cybercrime rates are associated with levels of country development and specialized police capacity, rather than underlying crime rates. Victimization surveys represent a more sound basis for comparison. These demonstrate that individual cybercrime victimization is significantly higher than for 'conventional' crime forms. Victimization rates for online credit card fraud, identity theft, responding to a phishing attempt, and experiencing unauthorized access to an email account, vary between 1 and 17 per cent of the online population for 21 countries across the world, compared with typical burglary, robbery and car theft rates of under 5 per cent for these same countries. Cybercrime victimization rates are higher in countries with lower levels of development, highlighting a need to strengthen prevention efforts in these countries. Private sector enterprises in Europe report similar victimization rates - between 2 and 16 per cent - for acts such as data breach due to intrusion or phishing. Criminal tools of choice for these crimes, such as botnets, have global reach. More than one million unique IP addresses globally functioned as botnet command and control servers in 2011. Internet content also represented a significant concern for Governments. Material targeted for removal includes child pornography and hate speech, but also content related to defamation and government criticism, raising human rights law concerns in some cases. Almost 24 per cent of total global internet traffic is estimated to infringe copyright, with downloads of shared peer-to-peer (P2P) material particularly high in countries in Africa, South America, and Western and South Asia.

Details: Vienna: UNODC, 2013. 320p.

Source: Internet Resource: Draft: Accessed November 7, 2013 at: http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

Year: 2013

Country: International

Keywords: Computer Crime

Shelf Number: 131602


Author: Jenkins, Suzanne

Title: Beyond Gender: An Examination of Exploitation in Sex Work

Summary: Although there are conflicting perspectives on prostitution in the feminist literature, female prostitutes are usually regarded as victims of gender-specific exploitation, either in the form of sexual-domination or socio-economic-inequality. Male prostitution has usually been excluded from feminist analyses on the basis that it is thought to be less exploitative than female prostitution. In this thesis, I expand upon feminist theories of gendered exploitation by comparing the experiences of male, female and transgendered escort sex-workers. Using a qualitative approach, my research explores whether prostitution is inherently exploitative and what conditions create and exacerbate sex-workers‟ vulnerability to victimisation, including the influence of current legal approaches to prostitution. My findings indicate that although neither male nor female sex-workers experience high levels of exploitation, female escorts are more vulnerable to particular types of victimisation; however, rather than reflecting existing feminist theories of prostitution, this is not, typically, the result of either sexual-or economic-oppression. Instead, I argue that exploitation largely results from the social stigma attached to prostitution, and that this is exacerbated by an over-emphasis on discourses of victimhood in feminist perspectives on, and legal approaches to, commercial-sex. By arguing that women only choose sex-work in the face of sexual or economic disadvantage, the notion that women are intrinsically susceptible to exploitation is reinforced. This denies women agency, and puts them in a disadvantaged position from which to negotiate their working lives. In particular, because female sex-workers are more likely to be dependent upon third-parties to facilitate their work, women are at greater risk of exploitation. I argue that exploitation could be effectively reduced by decriminalising and regulating sex industry organisers so that sex-workers can enter into communal working relationships. Given feminism‟s aim of empowering women, I argues that a more constructive feminist approach would be to move away from a gender-specific notion of exploitation to one which recognises the reality that women can, and sometimes do choose to sell sexual services, and that their right to do so should not be dependent upon notions of victimhood.

Details: Staffordshire, UK: Keele University, 2009. 312p.

Source: Internet Resource: Dissertation: Accessed November 7, 2013 at: http://myweb.dal.ca/mgoodyea/Documents/Sex%20work%20-%20General/Beyond%20gender%20Jenkins%20PhD%202009.pdf

Year: 2009

Country: International

Keywords: Prostitutes

Shelf Number: 131603


Author: Grove, Louise

Title: Synergies of Syntheses: A Comparison of Systematic Review and Scientific Realist Evaluation Methods for Crime Prevention

Summary: This thesis makes two significant contributions to the advancement of knowledge within crime prevention. The first of these is to evaluate the success of repeat victimisation prevention interventions. Interventions across four crime types are assessed herein, and the context-mechanisms-outcome configurations examined. The second contribution of this thesis is to assess two techniques of meta-evaluation: systematic reviews and realist syntheses. Each of these techniques is used in turn to assess the repeat victimisation prevention interventions. The contribution of each technique to the knowledge pool is then discussed, and the question of whether they are complementary or contradictory approaches answered. The thesis is framed in the context of evolutionary epistemology, which is the philosophy underpinning both approaches to meta-evaluation addressed herein. The thesis starts, with an examination of: firstly, how the evaluation methods in question have evolved, and the background to their scientific worth; and secondly, how situational crime prevention measures have evolved over time. The thesis then examines the two competing approaches for their contribution to the evaluation ecosystem by using both to assess repeat victimisation prevention interventions. Finally, the last section poses the question of whether it is survival of the fittest, or whether co-existence or adaptation could be the key to survival for these two meta-evaluative methodologies. Repeat victimisation prevention is revealed as an effective way of reducing crime, with a need for further research to apply the principle across further crime types. A requirement is identified for a greater breadth and depth of information to be included in future crime prevention evaluations. The systematic review is shown to be a useful way of assessing the overall effectiveness of the interventions, whilst the realist synthesis fills in the detail of why some interventions work and others fail. It is concluded that both approaches to meta-evaluation have useful contributions to make, and that a third way incorporating the best elements from each method should be developed.

Details: Leicestershire, UK: Loughborough University, 2010. 251p.

Source: Internet Resource: Dissertation: Accessed November 11, 2013 at: https://dspace.lboro.ac.uk/dspace-jspui/handle/2134/6756

Year: 2010

Country: International

Keywords: Crime Prevention

Shelf Number: 131629


Author: United Nations Special Representative of the Secretary-General on Violence Against Children

Title: Promoting Restorative Justice for Children

Summary: SRSG Santos Pais launched a new thematic report on Restorative Justice for Children in a high level event organized with the Governments of Indonesia and Norway during the General Assembly Debate on the Rights of the Child. The event counted on the participation of experts from Norway and Indonesia, as well as representatives from independent children's rights institutions, academia and civil society organizations. The discussion aimed at sharing models and experiences of child sensitive restorative justice processes and programs and to promote enhanced cooperation in this area at national, regional and international levels. This new SRSG report promotes a paradigm shift in the juvenile justice system moving from punitive to restorative justice approaches that respect and protect the rights of the child. The report highlights how such restorative justice programmes provide significant benefits for the children involved, for the victims and for society in general.The report presents important recommendations to consolidate restorative justice initiatives at the national level. These include strong legislative provisions such as decriminalizing status offences and survival behaviour and establishing legal safeguards to protect the child's best interests, and the child's right to freedom from violence and discrimination. Legislation should also provide law enforcement, prosecutors and the judiciary with options for diverting children away from the criminal justice system; it should foresee alternative and educative measures such as warning, probation, judicial supervision and community work, to be applied in combination with restorative justice processes or when restorative justice is not appropriate. The report also highlights that restorative justice and informal justice mechanisms, while being accessible at the local levels and playing an important role in the protection and reintegration of children, should never jeopardize children's rights or preclude children from accessing the formal justice system. Investing in effective training is equally important, including on children's rights and on necessary skills to promote dialogue and manage emotions and conflict and securing children's safety. Moreover, guidelines and standard operational procedures should be assured to all relevant law enforcement and justice actors, including the police, prosecutors, the judiciary, probation officers, lawyers, social workers, facilitators and mediators. Coordination between restorative justice service providers and justice actors is a key dimension of an effective restorative justice system and should be institutionalized at the national and local levels, and close cooperation should be encouraged between relevant stakeholders, including in informal justice systems. Similarly, well-trained professionals, available resources to support programs and invest in capacity building and bilateral and international cooperation, should be also promoted e.g. to document and gather data. Awareness-raising and social mobilization campaigns should be undertaken at the national and local levels with relevant stakeholders, including traditional and religious leaders and the media, to enhance understanding of restorative justice and promote child-friendly attitudes among justice professionals and service providers, and to sensitize the general public to the importance of restorative justice.

Details: New York: SRSG on Violence Against Children, 2013. 67p.

Source: Internet Resource: Accessed November 11, 2013 at: http://srsg.violenceagainstchildren.org/sites/default/files/publications_final/srsgvac_restorative_justice_for_children_report.pdf

Year: 2013

Country: International

Keywords: Juvenile Justice Reform

Shelf Number: 131635


Author: Spangaro, Jo

Title: What is the Evidence of the Impact of Initiatives to Reduce Risk and Iincidence of Sexual Violence in Conflict and Post-Conflict Zones and other Humanitarian Crises in Lower- and Middle-Income Countries? A Systematic Review

Summary: What evidence exists for the impact of initiatives to reduce risk and incidence of sexual violence in conflict and post-conflict zones and other humanitarian crises in lower and middle-income countries? Who wants to know and why? Sexual violence in the context of conflict and other humanitarian crises is widespread, with at least one in four women in conflict situations affected. Men and children are also at heightened risk. In these settings, sexual violence may be committed i) as a tactic of armed conflict, ii) opportunistically due to situational vulnerability, iii) as a form of sexual exploitation by peacekeepers or humanitarian staff, or iv) as a form of familial or community violence exacerbated by weakened social or legal structures. Since 2000, the United Nations (UN) Security Council has passed five resolutions that addressed this problem among others, prompting the issue of various guidelines and training packages. No previous systematic reviews of evidence for reducing risk and incidence of sexual violence in conflict or other crisis have been undertaken to date. There is now a need to gauge the impact of interventions undertaken to address this problem. Methods of the review A realist approach was adopted, suited to complex problems as it enables analysis of contextual factors and underlying program mechanisms. An extensive literature search employed 23 bibliographic databases, 26 websites, and a hand search of three journals. Included studies were those containing primary empirical data describing implementation or impact of interventions aimed at reducing risk or incidence, or addressing harm from sexual violence occurring in conflict, postconflict or other humanitarian crisis settings in lower or middle-income countries. Studies included were published from 1 January 1990 to 1 September 2011. A total of 2,656 studies was identified, after removal of duplicates. Following the application of exclusion criteria, 49 studies were selected as being in scope for the review and were mapped. Nine studies which reported on overarching policy responses were excluded, leaving 40 studies in the full review. Although much of the broader literature refers to militarised sexual violence committed by combatants, the majority of studies found addressed sexual violence committed opportunistically or within the family/community. Twenty studies reported outcomes and the other twenty reported only on the implementation of interventions (see Appendix 3.1 for a map of the studies). The majority of the studies identified in the review described interventions for sexual violence in post-conflict settings, with few addressing prevention or the conflict context. Most interventions were provided by multilateral agencies, international non-government organisations (NGOs) or national governments, with a few provided by local NGOs or community groups. Seven strategy types were identified: i) survivor care interventions (10 studies); ii) livelihood initiatives (2 studies); iii) community mobilisation initiatives (3 studies); iv) personnel initiatives, e.g. recruitment or training (3 studies); v) systems and security, predominantly firewood patrols or fuel alternatives (3 studies); vi) interventions using a combination of these strategies (13 studies); and vii) legal interventions (6 studies). Most interventions targeted women or were non-specific. Two interventions targeted young people specifically, both were disarmament, demobilisation and reintegration (DDR) interventions, but neither found reduced risk/incidence (Amone-P'Olak 2006; Denov 2006). No studies were found which targeted men specifically as victims.

Details: London: EPPI-Centre, Social Science Research Unit, Institute of Education, University of London, 2013. 170p.

Source: Internet Resource: Accessed November 13, 2013 at: http://reliefweb.int/sites/reliefweb.int/files/resources/Conflict_zones_2013Spangaro_report.pdf

Year: 2013

Country: International

Keywords: Conflict-Related Sexual Violence

Shelf Number: 131642


Author: Fontanarosa, Joann

Title: Interventions for Adult Offenders With Serious Mental Illness

Summary: Objective. To comprehensively review the evidence for treatments for offenders with serious mental illness (i.e., schizophrenia, schizoaffective disorder, bipolar disorder, or major depression) in jail, prison, or forensic hospital, or transitioning from any of these settings to the community (e.g., home, halfway house). Data sources. We searched 12 internal and external databases including MEDLINE, PreMEDLINE, and Embase for the time period January 1, 1990, through August 20, 2012. Review methods. We refined the topic, Key Questions, and protocol with experts in the field and determined the study inclusion criteria and risk-of-bias items a priori. Abstract and full-text review and the risk-of-bias assessment were done in duplicate. A second reviewer verified data extraction. Extracted study information included study design, patient enrollment and baseline characteristics, risk-of-bias items, and outcome data. Because of the nature of the available evidence, we chose to perform a qualitative synthesis rather than meta-analysis. We graded the strength of evidence for each treatment comparison and outcome based on the size, risk of bias, and results of the evidence base. We discussed applicability by focusing on the populations, interventions, and settings of the studies. Results. We included 19 publications describing 16 comparative trials. The studies were conducted in the United States, Canada, United Kingdom, New Zealand, and Australia. The risk of bias for all reported outcomes was medium for 15 trials and low for 1 trial. For incarceration-based interventions, evidence of low strength favored antipsychotics other than clozapine over treatment with clozapine for improving psychiatric symptoms. For all other incarceration-based interventions assessed - other pharmacologic therapies, cognitive therapy, and modified therapeutic community - evidence was insufficient to draw any conclusions. For individuals transitioning from the incarceration setting to the community, evidence of low strength supported discharge planning with benefit-application assistance and integrated dual disorder treatment compared with standard of care for increasing mental health service use and/or reducing psychiatric hospitalizations. Evidence was insufficient for comparing interventions administered by a forensic specialist with interventions administered by mental health professionals and for comparing interpersonal therapy with psychoeducation for offenders transitioning from incarceration to the community. More comparative trials are needed to increase our confidence in the findings for which the strength of evidence is low and to address the questions for which the evidence was insufficient. Conclusions. We identified some promising treatments for individuals with serious mental illness during incarceration or during transition from incarceration to community settings. Treatment with antipsychotics other than clozapine appears to improve psychiatric symptoms more than clozapine in an incarceration setting. Two interventions, discharge planning with Medicaid-application assistance and integrated dual disorder treatment programs, appear to be effective interventions for seriously mentally ill offenders transitioning back to the community. The applicability of our findings may be limited to the populations and settings in the included studies.

Details: Rockville, MD: Agency for Healthcare Research and Quality U.S. Department of Health and Human Services, 2013. 249p.

Source: Internet Resource: Comparative Effectiveness Review Number 121; Accessed November 13, 2013 at: http://effectivehealthcare.ahrq.gov/ehc/products/406/1644/mental-illness-adults-prisons-report-130820.pdf

Year: 2013

Country: International

Keywords: Mental Health Services

Shelf Number: 131643


Author: Flynn, Michael

Title: The Hidden Costs of Human Rights: The Case of immigration Detention

Summary: Many liberal democracies betray a noticeable discomfort when it comes to public scrutiny of immigration detention, neglecting to release comprehensive statistics about it, cloaking detention practices in misleading names and phrases, and carefully choosing which activities they define as deprivation of liberty. On the other hand, these same countries have laboured to expand their detention activities and to encourage their neighbours to do the same. What explains this simultaneous reticence towards and embrace of immigration detention? This Global Detention Project working paper argues that a largely unrecognized variable influencing the evolution of immigration detention has been the promotion of some key human rights norms, which has helped spur states to adopt new institutions dedicated to this practice while at the same time prompting them to shift the burden of global migration to countries on the periphery of the international system.

Details: Geneva, Switzerland: Global Detention Project, Programme for the Study of Global Migration, Graduate Institute of International and Development Studies, 2013. 13p.

Source: Internet Resource: Global Detention Project Working Paper No. 7: Accessed November 13, 2013 at: http://www.globaldetentionproject.org/fileadmin/publications/Flynn_Hidden_Costs.pdf

Year: 2013

Country: International

Keywords: Illegal Aliens

Shelf Number: 131647


Author: Heimann, Fritz

Title: Exporting Corruption: Progress Report 2013: Assessing Enforcement of the OECD Convention on Combating Foreigh Bribery

Summary: This is the eighth annual progress report on OECD Convention enforcement by Transparency International. The OECD Convention on Combating Bribery of Foreign Public Officials in International Business Transactions, adopted in 1997, requires each signatory country to make foreign bribery a crime. It is a key instrument for curbing the export of corruption globally because the 39 signatory countries are responsible for two-thirds of world exports and three-quarters of foreign investment. The OECD Working Group on Bribery conducts a follow-up monitoring programme which reviews the parties' implementation of the Convention's provisions. Nine to ten country reviews are issued each year. Our annual progress reports represent an independent assessment of the status of OECD Convention enforcement, based on reports from our national chapters in 37 OECD Convention countries (excluding Iceland and Russia). Countries are classified in four enforcement categories this year: Active, Moderate, Little and No enforcement.

Details: Berlin: Transparency International, 2013. 119p.

Source: Internet Resource: Accessed November 13, 2013 at: http://www.transparency.de/fileadmin/pdfs/Themen/Internationales/2013_ExportingCorruption_OECDProgressReport_EN.pdf

Year: 2013

Country: International

Keywords: Bribery

Shelf Number: 131655


Author: Walk Free Foundation

Title: The Global Slavery Index 2013

Summary: This inaugural edition of the Global Slavery Index report: 1 Provides a ranking of 162 countries around the world, based on a combined measure of three factors: estimated prevalence of modern slavery by population, a measure of child marriage, and a measure of human trafficking in and out of a country. 2 Identifies factors relevant to risk of slavery and provides a standardised measure of these factors that allows comparison country by country. 3 Examines the strength of government responses to modern slavery for the 20 countries at the top and bottom of the Index ranking. These studies describe the problem, government responses, and action needed. Modern slavery includes slavery, slavery-like practices (such as debt bondage, forced marriage, and sale or exploitation of children), human trafficking and forced labour.

Details: Walk Free Foundation, 2013. 136p.

Source: International Resource: Accessed November 23, 2013 at: http://www.ungift.org/doc/knowledgehub/resource-centre/2013/GlobalSlaveryIndex_2013_Download_WEB1.pdf

Year: 2013

Country: International

Keywords: Child Marriage

Shelf Number: 131681


Author: Koren, Elaine

Title: International Entry-Exit Security Systems: Annotated Bibliography

Summary: This annotated bibliography is based on a literature review using open source, academic and grey literature reviewing existing entry-exit systems used by travellers arriving in or departing from the formal ports of entry (POEs) for three countries and one region. Its focus is to identify relevant research that could identify existing practices and infrastructure established in Australia, the EU, NZ and the US.

Details: Ottawa: Public Safety Canada, 2013. 89p.

Source: Internet Resource: Accessed November 23, 2013 at: http://www.publicsafety.gc.ca/lbrr/archives/cn63312767-eng.pdf

Year: 2013

Country: International

Keywords: Border Patrol

Shelf Number: 131682


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Corruption and the Smuggling of Migrants

Summary: How does corruption impacts the facilitation of irregular migration by organized crime groups? What actions can be taken? UNODC launched the Issue Paper: Corruption and the Smuggling of Migrants in the margins of the Working Group on the Smuggling of Migrants held in Vienna in November 2013 to assist policy makers and practitioners prevent and address corruption related to the smuggling of migrants. Corruption often undermines national and international efforts to prevent and control the smuggling of migrants, just as it affects the control of other forms of transnational crime such as trafficking in persons, in firearms, or in narcotics. Organized criminal groups make frequent use of corruption, often together with intimidation and violence, to facilitate their migrant smuggling operations. Migrant smuggling can generate large revenues which smugglers can use to corrupt officials and obtain their complicity. Criminal organizations can take advantage of immigration control and public security systems that are weakened by corruption. In fact, most migrant smuggling operations would not last long without resorting to corruption in one form or another. Combating corruption is therefore an essential, yet often neglected, element of any comprehensive strategy to address the problems of migrant smuggling. Developed through expert consultations (national experts from Canada, India, Kenya, Pakistan, Panama, Romania, South Africa, Spain, Ukraine, United Kingdom, United States of America, together with Europol, Frontex, the International Organization for Migration, the International Centre for Migration and Development, and the Regional Mixed Migration Secretariat - East Africa), the Issue Paper: Corruption and the Smuggling of Migrants looks at the intersections between corruption and the smuggling of migrants, and the main challenges and good practices to prevent and combat these intertwined issues.

Details: Vienna: UNODC, 2013. 57p.

Source: Internet Resource: Issue Paper: Accessed December 5, 2013 at: http://www.unodc.org/documents/human-trafficking/2013/The_Role_Of_Corruption_in_the_Smuggling_of_Migrants_Issue_Paper_UNODC_2013.pdf

Year: 2013

Country: International

Keywords: Corruption

Shelf Number: 131749


Author: Buiza, Cynthia

Title: Misunderestimating Corruption

Summary: Estimates of the extent of corruption rely largely on self-reports of individuals, business managers, and government officials. Yet it is well known that survey respondents are reticent to tell the truth about activities to which social and legal stigma are attached, implying a downward bias in survey-based estimates of corruption. This paper develops a method to estimate the prevalence of reticent behavior, in order to isolate rates of corruption that fully reflect respondent reticence in answering sensitive questions. The method is based on a statistical model of how respondents behave when answering a combination of conventional and random-response survey questions. The responses to these different types of questions reflect three probabilities—that the respondent has done the sensitive act in question, that the respondent exhibits reticence in answering sensitive questions, and that a reticent respondent is not candid in answering any specific sensitive question. These probabilities can be estimated using a method-of-moments estimator. Evidence from the 2010 World Bank Enterprise survey in Peru suggests reticence-adjusted estimates of corruption that are roughly twice as large as indicated by responses to standard questions. Reticence-adjusted estimates of corruption are also substantially higher in a set of ten Asian countries covered in the Gallup World Poll.

Details: Washington, D.C.: Policy Research Working Paper, The World, 2013. 40p.

Source: Policy Research Working Paper 6488: Internet Resource: Accessed January 16, 2014 at

Year: 2013

Country: International

Keywords: Corruption

Shelf Number: 131782


Author: Barrett, Damon

Title: Injecting Drug Use Among Under-18s: A Snapshot of Available Data

Summary: Young people who inject drugs have specific developmental, social and environmental vulnerabilities. They are less likely to use harm reduction and treatment services and are less informed about risks and their rights. Early onset of injecting, and being a new injector, have been associated with increased risks of HIV and hepatitis C transmission, while specific groups of young people, especially those that are street involved, are at considerably higher risk. The legal status of being a minor, meanwhile, raises challenges for both achieving a better understanding of the situation and for the development of targeted harm reduction interventions. This report is the first attempt to provide a global snapshot of available data on injecting drug use among children and young people under the age of 18. Based on desk research and expert questionnaires it finds that injecting among under-18s represents a data 'blind spot' impeding our ability to assess service need and to estimate budgetary implications. Available studies that have looked at injecting among this age group, however, provide important insights from every region and make a clear case for more action.

Details: London: Harm Reduction International, 2013. 78p.

Source: Internet Resource: Accessed January 31, 2014 at: http://www.ihra.net/files/2013/12/12/injecting_among_under_18s_snapshot_WEB1.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 131813


Author: Di Tella, Rafael

Title: Happiness and Beliefs in Criminal Environments

Summary: This paper uses newly available data to describe the distribution of crime victimization and other criminal activities (including drug trafficking and corruption) around the world. The paper then documents a negative (positive) correlation between measures of criminal activity and happiness and measures of positive (negative) emotions. The paper also studies the correlation between ideological beliefs and criminal activity, finding that crime victims are more likely to believe that hard work does not pay and that the government should increase the amount of redistribution to the poor.

Details: Washington, DC: Inter-American Development Bank, 2008. 46p.

Source: Internet Resource: Research Department Working Paper: 662: Accessed January 31, 2014 at: http://www.iadb.org/res/publications/pubfiles/pubWP-662.pdf

Year: 2008

Country: International

Keywords: Crime

Shelf Number: 131815


Author: Williams, R. Seth

Title: Toolkit on Police Integrity

Summary: The Toolkit on Police Integrity aims to assist police services in designing effective measures to curb police corruption, increasing their ability to fight crime, improving public security and strengthening the rule of law and public trust in the police. The Toolkit contains nine chapters. 1.Introduction: corruption and policing 2.Values, rules and behaviour 3.Organisation 4.Supporting police officers facing ethical questions 5.Internal control 6.External oversight and control 7.Investigation 8.Capacity building 9.Instruments

Details: Geneva, SWIT: DCAF, 2012. 373p.

Source: Internet Resource: Accessed January 31, 2014 at: http://www.dcaf.ch/Publications/Toolkit-on-Police-Integrity

Year: 2012

Country: International

Keywords: Police Behavior

Shelf Number: 131831


Author: Rupp, Thomas

Title: Meta Analysis of Crime and Deterrence: A Comprehensive Review of the Literature

Summary: Crime matters to society. As reported elsewhere - and according to common sense - crime causes huge economical and psychological damage to individuals, the economy and to society itself. Therefore, it is natural that a society - through its legislative, executive and judiciary - tries to control crime. For thousands of years the idea that the fear of arrest and subsequent punishment will deter people from committing crimes, has been a major tool in this concept. While punishment has several motivations such as revenge, retribution, normative guidance, correction and deterrence, the latter was theorized late in the 18th and 19th century by Marchese Beccaria (1819); Bentham (1830) and Chadwick (1829). Deterrence is recognized as a method for preventing potential delinquents from committing crimes by the threat of punishment. As far as deterrence is concerned, punishment is not meant to be anything like a “fair compensation” for a crime already committed but as a price potential offenders would have to pay for a future crime. Empirical tests of the effectiveness of deterrence began just “recently” in the 20th century. However, after the formulation of a formal model by Becker (1968) and its empirical verification by Ehrlich (1973) an increasing amount of literature emerged which scrutinized the theory of deterrence and its empirical application. Deterrence is embedded in a body of theories of understanding crime. While it is based on the idea that people adjust their unlawful behavior to changing incentives - expressed by the probability and severity of punishment - many other theories exist on why people offend; from genetic characteristics to social and cultural differences. We describe a selection of such theories in more detail in subsection 2.1.3. Nevertheless, most of these theories can be encompassed by an economic framework: a crime will be committed if the benefits from it exceed its expected costs. While any exact identification and determination of these abstract measures seem to be impossible, criminal behavior - very often expressed by official crime rates - should change when the probability and severity of punishment changes. Most of the empirical studies exploit this principle and make it subject to statistical tests to find out whether any evidence of a deterrent effect can be found. Literally hundreds of such studies have emerged in the last four decades and have been subject of an intense debate. The discussion has been - and still is - especially heated about the question whether the death penalty deters crime or not. However, for almost all offenses two studies can be found which come to completely different results; one finding strong support for a deterrent effect while the other cannot find any evidence of it being at work. This situation is, at least, very unsatisfying from a scientific point of view. Moreover, public policy would obviously greatly benefit from a better understanding of the effectiveness of deterrence. The large number of available studies, the heterogeneity of their results, the scope of studied populations, offenses and implemented techniques offer a perfect playground for a quantitative analysis of the literature. While many qualitative literature surveys of studies covering the deterrence issue have been published (see subsection 2.1.2) there are almost no analytical reviews to be found. While Antony and Entorf (2003) and M¨uller (2003) were first steps and feasibility studies of a meta analysis, we are only aware of Pratt (2004) as one further quantitative literature survey. However, the latter considers deterrence only at the margin and focusses on the differences between several selected theories of crime. To the best of our knowledge, the cross-disciplinary project “Metaanalyse empirischer Abschreckungsstudien - ein quantitiver methodenkritischer Vergleich kriminologischer und ¨okonomischer Untersuchungen zur negativen Generalpr¨avention” was the first comprehensive attempt to use the existing bulk of studies to identify the driving factors behind the heterogeneity of results and to analytically assess the current situation of research. Some preliminary results - with a snapshot of the acquired data - are published in D¨olling et al. (2006) and D¨olling et al. (2007). This thesis originates from this work and utilizes the full data set of all 700 acquired studies. In the following chapters we address several questions in more detail: are there any key factors which determine the results of a study (e.g., the studied population, the statistical methods employed, the cultural background of the authors, the studied offense, etc.)? Is there any significant deterrent effect overall? How reliable is the retrieved information? Since there are almost no prior theories about the strength and direction of any potential key factors we resort to methods of data mining. Afterwards, we employ several tests to assess the quality of the calculated estimators, i.e., how well the estimators perform in reproducing and forecasting results. Indeed, we can identify several elements of the design of a study, the cultural background of an author and offense-specific properties which affect the outcome of a study. Whether or not these elements measure a direct effect or - to some extent - pick up other neglected effects belongs to the subsequent interpretation. Nonetheless, our results should contribute to the knowledge of crime and the understanding of its literature. The thesis is organized as follows. Chapter 2 summarizes the theoretical background of several theories about deterrence and - with a focus on the rational choice approach - the corresponding problems and empirical and statistical issues. It also shows the large variety of fields the theory of deterrence is applied in and that a lot of contradictory results exist in the literature. The large body of inconsistent results is one of the main reasons why a meta analysis should be helpful to increase the understanding of deterrence. Chapter 3 contains the creation of the data base and its statistical analysis. Several techniques are used to identify important factors which may determine the results of an individual study. Chapter 4 then puts these results into perspective and shows how reliable, trustworthy and usable these estimates are. Subsequently, the results of the best models, in regard to precision and fit, are discussed in more detail. Finally, chapter 5 concludes this thesis and recapitulates the main issues and results. Furthermore, the appendix contains some minor findings which are interesting but not essential as well as an extensive description of all available variables and displays all included studies (accompanied with some important additional information).

Details: Darmstadt: Technische Universitat Darmstadt, 2008. 323p.

Source: Internet Resource: Dissertation: Accessed February 3, 2014 at: http://tuprints.ulb.tu-darmstadt.de/1054/2/rupp_diss.pdf

Year: 2008

Country: International

Keywords: Deterrence

Shelf Number: 131839


Author: Goldberg, Michael

Title: How Firms Cope with Crime and Violence: Experiences from around the World

Summary: Crime and violence inflict high costs on the private sector-costs that are rising globally, according to the World Bank's Enterprise Surveys, discussions with chambers and associations, and the Bank's Country Partnership Strategies, which reference the losses in terms of gross domestic product (GDP). In Latin America and the Caribbean, for example, losses due to crime and violence have been estimated at 9 percent of GDP in Honduras, 7.7 percent in El Salvador, and 3.6 percent in Costa Rica. In sectors such as clothing assembly, international purchasers can shift know-how and capital quickly to less violent destinations, while other sectors such as extractive industries are more likely to stay despite rising violence. Behind the statistics are human costs: lost jobs; shifting of businesses' working capital from productive uses to security firms; and an increase in contraband, fraud and corruption, and "rule of law" issues. In this book, original case studies from Brazil, Colombia, Jamaica, Mexico, Nepal, and Rwanda illustrate the specific challenges to businesses and the coping mechanisms that firms and groups of firms have used successfully against crime and violence. The book's findings have implications for the private sector, governments, and the World Bank's efforts to support both under difficult circumstances.

Details: Washington, DC: The World Bank, 2014. 109p.

Source: Internet Resource: Accessed March 11, 2014 at: https://openknowledge.worldbank.org/handle/10986/16539

Year: 2014

Country: International

Keywords: Costs of Crime

Shelf Number: 131854


Author: Muggah, Robert

Title: 100 Best Practices in Child Protection

Summary: Children are among our most vulnerable populations. The injustices many children suffer are unspeakable and occur in all corners of the globe, in all walks of life. The term “child protection” is very broad and can encompass a wide range of issues. Custody and support, child abuse and neglect, violence against children, child prostitution, child pornography, sex tourism, child labor, and trafficking in children are just some of the issues that arise when discussing child protection. Civil society organizations and government agencies are actively working around the world to address many of these problems and to better provide broad protections for children. The Protection Project at The Johns Hopkins University School of Advanced International Studies and the International Centre for Missing and Exploited Children encourage the dissemination of information on child protection best practices. This guide is intended to offer examples of some successful initiatives undertaken by civil society organizations as well as individuals and government agencies concerned with protecting children around the world. The document is divided into seven parts—Part I focuses on child protection principles and definitions; Part II highlights several child protection measures and services; Part III presents initiatives focused on the protection of children in the family and community; Part IV looks at programs aimed at the protection of children from sexual exploitation; Part V includes examples of projects focused on the protection of children from economic exploitation; Part VI looks at the protection of children in situations of emergency, including armed conflict; and Part VII features the protection of children in the justice system. This division of issues follows the topics addressed by the “Child Protection Model Law – Best Practices: Protection of Children from Neglect, Abuse, Maltreatment, and Exploitation” another publication based on a joint research inititative of The Protection Project and the International Centre for Missing and Exploited Children.

Details: Washington, DC: The Protection Project at the Johns Hopkins University Paul N. Nitze School of Advanced International Studies; Alexandria, VA: International Centre for Missing & Exploited Children, 2013. 122p.

Source: Internet Resource: A Series of 100 Best Practices, Volume III: Accessed march 12, 2014 at: http://www.protectionproject.org/wp-content/uploads/2014/01/Best-Practices-in-Child-Protection-2013.pdf

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 131865


Author: Howard, Russell D.

Title: The Nexus of Extremism and Trafficking: Scourge of the World or So Much Hype?

Summary: In a globalized and increasingly interconnected world, the transfer of information, expertise, and relationships are becoming more complex and more commonplace. The interconnectedness of criminal organizations that span not only countries but across regions of the globe is troubling. However, more troubling is the possibility of the linking of transnational criminal organizations with insurgent and terrorist organizations as addressed in this work by Brigadier General (retired) Russ Howard and Ms. Colleen Traughber. The radical ideologies propagating politically motivated violence now have the opportunity to leverage and participate in traditionally criminal enterprises. This melding of form and function provides criminals with new networks and violent extremists with new funding sources and potential smuggling opportunities. General Howard and Ms. Traughber delve into the nexus between violent extremist elements and transnational criminal elements by first clarifying whether a real problem exists, and if so, what is the appropriate role for Special Operations Forces (SOF) in confronting it. The authors bring rigor to the subject matter by dissecting the issue of intention and opportunities of criminal organization and violent extremists. The question is confounded by the authors who note the wide variance in the motivations and opportunities of both different criminal organizations and extremist organizations. What the authors do make clear is that the trafficking of humans, weapons, drugs, and contraband (HWDC) is a natural way for the criminals and extremists to cooperate. To bring the issue into focus, the authors systematically examine case studies dealing with the nexus between specific organizations and HWDC trafficking opportunities. Human trafficking in Europe and the former Soviet Union; weapons trafficking in the Far East, Asia, and South America for money; the narcotics trade by the Revolutionary Armed Forces of Columbia; Hezbollah and Kurdistan Workers' Party, as well as contraband smuggling of cigarettes, are all used to examine the extremist/criminal nexus. The connections become clear as the authors discuss each of the HWDC issues within the nexus; what is also clear is that often the nexus is a simple marriage of convenience. General Howard and Ms. Traughber transition from the vignettes to how this nexus will impact SOF and interagency partners. Most importantly, the authors recognized a need for SOF to expand their mission set, and authorities to more appropriately address criminality in support of extremist groups. The authors identify issues for SOF including the traditional delineation between law enforcement activities and military activities. The findings, therefore, make a case that as SOF move into the future and are required to confront the nexus between extremists and criminals, a new definition and some deep thought need to be given to expanding SOF roles and authorities.

Details: MacDill AFB, FL: Joint Special Operations University, 2013. 98p.

Source: Internet Resource: JSOU Report 13-6: Accessed March 12, 2014 at: https://jsou.socom.mil/JSOU%20Publications/13-6_Howard_Nexus_FINAL.pdf

Year: 2013

Country: International

Keywords: Cigarette Smuggling

Shelf Number: 131881


Author: European Monitoring Centre for Drugs and Drug Addiction (EMCDDA)

Title: Multidimensional Family Therapy for Adolescent Drug Users: A Systematic Review

Summary: During adolescence, some young people may experiment with both licit and illicit substances (alcohol, tobacco, cannabis and other drugs). This can have an impact on their behaviour, their relationships with others and how they function in society. For those who develop substance use disorders, family has a vital role to play in addressing this issue. This EMCDDA Paper focuses on a form of inclusive therapy that involves the young person, their family and their environment. Based on five studies carried out in the United States and the EU, the holistic approach encapsulated by Multidimensional family therapy delivers promising results that are visible both during therapy and after it has ended. However, the approach requires family engagement which cannot always be obtained, and may come at a higher cost than other therapeutic options.

Details: Luxembourg: Publications Office of the European Union, 2014. 29p.

Source: Internet Resource: EMCDDA Papers: Accessed March 12, 2014 at: http://www.emcdda.europa.eu/attachements.cfm/att_222780_EN_TDAU13008ENN.pdf

Year: 2014

Country: International

Keywords: Adolescents

Shelf Number: 131882


Author: Bewley-Taylor, Dave

Title: The Rise and Decline of Cannabis Prohibition: The History of Cannabis in the UN Drug Control System and Options for Reform

Summary: The cannabis plant has been used for spiritual, medicinal and recreational purposes since the early days of civilization. In this report the Transnational Institute and the Global Drug Policy Observatory describe in detail the history of international control and how cannabis was included in the current UN drug control system. Cannabis was condemned by the 1961 Single Convention on Narcotic Drugs as a psychoactive drug with "particularly dangerous properties" and hardly any therapeutic value. Ever since, an increasing number of countries have shown discomfort with the treaty regime's strictures through soft defections, stretching its legal flexibility to sometimes questionable limits. Today's political reality of regulated cannabis markets in Uruguay, Washington and Colorado operating at odds with the UN conventions puts the discussion about options for reform of the global drug control regime on the table. Now that the cracks in the Vienna consensus have reached the point of treaty breach, this discussion is no longer a reformist fantasy. Easy options, however, do not exist; they all entail procedural complications and political obstacles. A coordinated initiative by a group of like-minded countries agreeing to assess possible routes and deciding on a road map for the future seems the most likely scenario for moving forward. There are good reasons to question the treaty-imposed prohibition model for cannabis control. Not only is the original inclusion of cannabis within the current framework the result of dubious procedures, but the understanding of the drug itself, the dynamics of illicit markets, and the unintended consequences of repressive drug control strategies has increased enormously. The prohibitive model has failed to have any sustained impact in reducing the market, while imposing heavy burdens upon criminal justice systems; producing profoundly negative social and public health impacts; and creating criminal markets supporting organised crime, violence and corruption. After long accommodating various forms of deviance from its prohibitive ethos, like turning a blind eye to illicit cannabis markets, decriminalisation of possession for personal use, coffeeshops, cannabis social clubs and generous medical marijuana schemes, the regime has now reached a moment of truth. The current policy trend towards legal regulation of the cannabis market as a more promising model for protecting people's health and safety has changed the drug policy landscape and the terms of the debate. The question facing the international community today is no longer whether or not there is a need to reassess and modernize the UN drug control system, but rather when and how to do it.

Details: Amsterdam: Transnational Institute; Swansea, UK: Research Institute for Arts and Humanities, Swansea University, 2014. 88p.

Source: Internet Resource: Accessed March 13, 2014 at: http://www.tni.org/sites/www.tni.org/files/download/rise_and_decline_web.pdf

Year: 2014

Country: International

Keywords: Cannabis

Shelf Number: 131900


Author: London Assembly. Police and Crime Committee

Title: Neglect, Abuse and Violence Against Older Women

Summary: The objective of the Madrid International Plan of Action on Ageing (MIPAA) was the elimination of all forms of neglect, abuse and violence against older persons (MIPAA, 2002). In addition, it was acknowledged clearly in the Plan of Action that "Older women face greater risk of physical and psychological abuse due to discriminatory societal attitudes and the nonrealization of the human rights of women. Some harmful traditional practices and customs result in abuse and violence directed at older women, often exacerbated by poverty and lack of access to legal protection." (para. 108). Since the adoption of the Madrid Plan of Action, the problem of abuse against older persons, in all its forms, has grown. The results of the second review and appraisal of the Madrid Plan of Action in 2012 showed clearly that neglect, abuse and violence against older persons was acknowledged as a major policy issue in all regions, regardless of level of development.1 The General Assembly pronounced 15 June as World Elder Abuse Awareness Day in 2012. Discussion of legislation on human rights protection against neglect, abuse and violence has become a main focus of the ongoing discussions of the General Assembly Open-ended Working Group on Ageing. However, despite the evidence from available data that older women are at greater risk of abuse and violence, older women have not been mainstreamed into ongoing research and discussion on violence against women. For instance, the campaign by UN Women on Ending Violence Against Women has made no mention of older women as a vulnerable group. Therefore, the United Nations Department of Economic and Social Affairs (DESA), together with its focal point on ageing in the Division for Social Policy and Development (DSPD), began a discussion based on current research, available data and the terminology used in academic circles to describe and classify violence and abuse against older women. The majority of academic research and discourse has been conducted in developed countries, and agreement on terminology and meanings has-by no means-been clear or agreed. This lack of agreed definitions was one of the problems that explained the lack of visibility of older women in the discourse surrounding the issue of violence and abuse. The purpose of the present publication is to provide an overview of the current state of knowledge about the abuse of older women. The main forms or categories of abuse against older women are discussed, particularly in relation to differing definitions of neglect, abuse and violence against women and older adults. Prevalence rates from studies using different definitions and incorporating different forms of abuse can vary greatly, depending on whether the study focuses on intimate partner violence, older adult abuse or, specifically, on the abuse of older adults in protective settings. Prevalence rates are also influenced by whether the data are based on one-year, five-year or lifetime cumulative time frames, and which old-age cohorts are included in the study samples. The publication discusses the challenges that this has presented to researchers. Risk factors identified through prevalence and other studies include age and gender, as well as care-dependency in cases of neglect. The publication provides a summary of selected study findings on the health consequences of abuse and violence against older women, as well as sources of data collection and some of the challenges that this presents to researchers. The publication provides an overview of preventive measures for addressing the issue, presenting the findings of evaluations on their effectiveness, where available. It gives an overview of main approaches to addressing the abuse of older women, and key interventions - including policies and programmes for the protection of older women victims of abuse - along with outcomes, where evaluations have been completed.

Details: New York: United Nations, 2013. 65p.

Source: Internet Resource: Accessed March 13, 2014 at: http://www.un.org/esa/socdev/documents/ageing/neglect-abuse-violence-older-women.pdf

Year: 2013

Country: International

Keywords: Elder Abuse

Shelf Number: 131905


Author: Lavigne, David

Title: Elephants and Ivory

Summary: If the international conservation community is serious about protecting and conserving the world’s remaining elephants, it needs fundamentally to change its approach. It must abandon the many myths that currently drive elephant conservation, and replace them with a more realistic and knowledge-based approach. The book begins with a review of what is currently known today about elephants, their taxonomy, distribution, population trends, conservation status, and the current threats to their continued existence in the wild. It then reviews some of the issues that continue to hinder elephant conservation today, before examining what a new, knowledge-based approach to conservation might look like. The book ends with specific suggestions as to what might be done to protect and conserve elephants if we really want to give the largest surviving land mammal reasonable prospects for survival. Nothing much will happen, however, without the public and political will to deal with the obvious problems that confront elephant conservation today. Likewise, it is only through moral judgment and political choice that we will take the steps necessary to safeguard the future, and that includes not only the future of elephants, their populations and culture, but also the future of the environment, the economy, and human society.

Details: Ottawa, CAN: International Fund for Animal Welfare, 2013. 979p.

Source: Internet Resource: Accessed March 14, 2014 at: http://issuu.com/ifaw/docs/elephants_and_ivory_issuu/2

Year: 2013

Country: International

Keywords: Elephants

Shelf Number: 131923


Author: Pantucci, Raffaello

Title: A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists

Summary: The troublesome question of how and whether to consider what are commonly referred to as Lone Wolf terrorists within the broader roster of terrorist groups is something that has regularly confounded security analysts for a variety of reasons. This article attempts to create some sort of typology to start to define the group, with specific reference to the instances of Lone Wolves (or Lone Wolf Packs, an admittedly paradoxical choice of words that is defined in the article as small, isolated groups of individuals involved in terrorism) who claim to adhere to an extremist Islamist ideology. The article offers four subsets to the definition, drawing upon a detailed analysis of a variety of different plots in Europe and North America: Loner, Lone Wolf, Lone Wolf Pack, and Lone Attacker. The purpose of the article is to offer some preliminary thoughts on the issue of Lone Wolves, and start a process towards deeper understanding and closer analysis of the phenomenon. This is of particular salience given the frequency with which security analysts cite the phenomenon as a threat and the increasing way in which Al Qaeda ideologues refer to it.

Details: London: International Centre for the Study of Radicalisation and Political Violence, 2011. 23p.

Source: Internet Resource: Accessed March 15, 2014 at: http://icsr.info/wp-content/uploads/2012/10/1302002992ICSRPaper_ATypologyofLoneWolves_Pantucci.pdf

Year: 2011

Country: International

Keywords: Islam

Shelf Number: 131928


Author: Rabinovich, Lila

Title: Reducing Alcohol Harm: International Benchmark

Summary: The National Audit Office (NAO) of the United Kingdom commissioned RAND Europe to examine the structure and effectiveness of healthcare interventions aimed at preventing and reducing alcohol harm in a selected number of countries. The countries selected were Australia, Canada, Germany, the Netherlands and the United States. The objective of the research is to inform the work of the NAO in the area of the prevention and reduction of alcohol harm in healthcare interventions in England. Through this research, the NAO aims to understand the effectiveness of the interventions used in England and identify interesting and effective practices in other countries that could be transferable to the English context and inform the country's alcohol strategy. This report contains four main sections. In Chapter 2, this report sets out the main international statistics on alcohol harm, including comparative data on alcohol consumption, the prevalence of heavy and binge drinking, and data on alcohol-related mortality and morbidity. In Chapter 3, the study describes the main features of the healthcare systems and strategies of the selected countries. In Chapters 4 and 5, the report describes international evidence of the effectiveness of healthcare and non-healthcare interventions aimed at alcohol harm, respectively. In order to come to the conclusions in this report, we used a document review of the available information on the organization of the healthcare system and interventions aimed at alcohol harm in the selected countries; analysed the data on alcohol harm; and reviewed the international evidence on the effectiveness of interventions aimed at preventing alcohol harm. We also undertook telephone interviews and e-mail exchanges with a variety of experts in the area of alcohol harm in the selected countries. This report is likely to be of interest to other Supreme Audit Institutions (SAI), public health officials, and officials and academics involved in alcohol policy and strategy.

Details: Cambridge, MA: RAND Europe, 2008. 94p.

Source: Internet Resource: Accessed March 17, 2014 at: http://www.rand.org/content/dam/rand/pubs/technical_reports/2008/RAND_TR592.pdf

Year: 2008

Country: International

Keywords: Alcohol Abuse

Shelf Number: 131941


Author: Penal Reform International

Title: Neglected Needs: Girls in the Criminal Justice System

Summary: Girls are one of the most vulnerable groups involved in criminal justice systems because of their age, gender and small numbers. Relatively little is known or understood about offending by girls, their specific needs whilst in detention, or about what is effective in terms of gender-sensitive rehabilitation and social reintegration measures. This paper examines the specific challenges faced by girls in contact with the criminal justice system and makes recommendations for strengthening the protection of their rights. It explores how girls face discriminatory treatment in terms of the type of offences for which they are detained, their access to fair trial guarantees, and the lack of suitable alternatives to detention. It then looks at some of the specific challenges faced by girls in detention and the international and regional standards in place to address these, focusing on: - protection from violence - access to adequate healthcare - provision of rehabilitation and reintegration services - access to effective remedy.

Details: London: Penal Reform International, 2014. 24p.

Source: Internet Resource: Accessed March 17, 2014 at: http://www.penalreform.org/wp-content/uploads/2014/02/girls-crim-just-v4.pdf

Year: 2014

Country: International

Keywords: Female Offenders

Shelf Number: 131946


Author: Verite

Title: Labor Brokerage and Trafficking of Nepali Migrant Workers

Summary: This report describes research conducted on the relationship between labor brokerage and the risk of forced labor among Nepali migrant workers employed abroad. The research examines forced-labor triggers in Nepal and India and receiving-country mechanisms that encourage forced labor in Malaysia, the United Arab Emirates (U.A.E.), and Israel. The role of Guatemala and Mexico as transit countries for Nepali workers traveling illegally to the U.S. is also explored. Study Objectives Verite conducted research to determine the different types of labor-brokerage networks that exploit both documented and undocumented Nepali migrant workers; to find the points in the employment life cycle at which exploitation occurs; to identify the factors that increase migrant workers' vulnerability to exploitation; and to identify viable policy options to reduce Nepali migrant workers' vulnerability to exploitation. Verite conducted research in Nepal and in receiving countries, including Malaysia and the U.A.E., with case studies on Nepali workers in Israel and Guatemala. Verite researchers reviewed relevant literature, followed by contextual analysis of relevant audit findings, social-institutional mapping, and extensive interviews (one-on-one and group) with workers, NGOs, government officials, labor advocates, and unions in Malaysia, the U.A.E., Guatemala, and Israel.

Details: Amherst, MA: Verite, 2013. 108p.

Source: Internet Resource: Accessed March 18, 2014: http://www.verite.org/sites/default/files/images/Humanity%20United-Nepal%20Trafficking%20Report-Final_1.pdf

Year: 2013

Country: International

Keywords: Forced Labor

Shelf Number: 131958


Author: Smedslund, G.

Title: Cognitive Behavioural Therapy for Men Who Physically Abuse their Female Partner (Review)

Summary: In national surveys, between 10% and 34% of women have reported being physically assaulted by an intimate male partner. Cognitive behavioural therapy (CBT) or programmes including elements of CBT are frequently used treatments for physically abusive men. Participants either enroll voluntarily or are obliged to participate by means of a court order. CBT not only seeks to change behavior using established behavioural strategies, but also targets thinking patterns and beliefs. Objectives To measure effectiveness of CBT and programmes including elements of CBT on men's physical abuse of their female partners. Selection criteria Randomised controlled trials that evaluated the effectiveness of cognitive behavioural therapy for men who have physically abused their female partner and included a measure of the impact on violence. Main results Six trials, all from the USA, involving 2343 participants, were included. A meta-analysis of four trials comparing CBT with a no intervention control (1771 participants) reported that the relative risk of violence was 0.86 (favouring the intervention group) with a 95% confidence interval (CI) of 0.54 to 1.38. This is a small effect size, and the width of the CI suggests no clear evidence for an effect. One study (Wisconsin Study) compared CBT with process-psychodynamic group treatment and reported a relative risk of new violence of 1.07 (95% CI 0.68 to 1.68). Even though the process-psychodynamic treatment did marginally better than CBT, this result is equivocal. Finally, one small study (N = 64) compared a combined CBT treatment for substance abuse and domestic violence (SADV) with a Twelve-Step Facilitation (TSF) group. An analysis involving 58 participants investigated the effect on reduction in frequency of physical violence episodes. The effect size was 0.30 (favouring TSF) with 95% CI from -0.22 to 0.81. Authors' conclusions There are still too few randomised controlled trials to draw conclusions about the effectiveness of cognitive behaviour therapy for male perpetrators of domestic violence.

Details: Cochrane Database of Systematic Reviews 2011, Issue 2. 35p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD006048.pub2/pdf

Year: 2011

Country: International

Keywords: Abusive Men

Shelf Number: 131962


Author: Dennis, J.A.

Title: Psychological Interventions for Adults Who Have Sexually Offended Or Are At Risk of Offending (Review)

Summary: Sexual offending is a legal construct that overlaps, but is not entirely congruent with, clinical constructs of disorders of sexual preference. Sexual offending is both a social and a public health issue. Victim surveys illustrate high incidence and prevalence levels, and it is commonly accepted that there is considerable hidden sexual victimisation. There are significant levels of psychiatric morbidity in survivors of sexual offences. Psychological interventions are generally based on behavioural or psychodynamic theories. Behavioural interventions fall into two main groups: those based on traditional classical conditioning and/or operant learning theory and those based on cognitive behavioural approaches. Approaches may overlap. Interventions associated with traditional classical and operant learning theory are referred to as behaviour modification or behaviour therapy, and focus explicitly on changing behavior by administering a stimulus and measuring its effect on overt behaviour. Within sex offender treatment, examples include aversion therapy, covert sensitisation or olfactory conditioning. Cognitive behavioural therapies are intended to change internal processes - thoughts, beliefs, emotions, physiological arousal - alongside changing overt behaviour, such as social skills or coping behaviours. They may involve establishing links between offenders' thoughts, feelings and actions about offending behaviour; correction of offenders' misperceptions, irrational beliefs and reasoning biases associated with their offending; teaching offenders tomonitor their own thoughts, feelings and behaviours associated with offending; and promoting alternative ways of coping with deviant sexual thoughts and desires. Psychodynamic interventions share a common root in psychoanalytic theory. This posits that sexual offending arises through an imbalance of the three components of mind: the id, the ego and the superego, with sexual offenders having temperamental imbalance of a powerful id (increased sexual impulses and libido) and a weak superego (a low level of moral probation), which are also impacted by early environment.

Details: Cochrane Database of Systematic Reviews, 2012, Issue 12. 97p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD007507.pub2/pdf

Year: 2012

Country: International

Keywords: Psychological Interventions

Shelf Number: 131963


Author: Mytton, J.A.

Title: School-Based Secondary Prevention Programmes for Preventing Violence (Review)

Summary: Are school-based programmes aimed at children who are considered at risk of aggressive behaviour, effective in reducing violence? Violence is recognised as a major global public health problem, thus there has been much attention placed on interventions aimed at preventing aggressive and violent behaviour. As aggressive behaviour in childhood is considered to be a risk factor for violence and criminal behaviour in adulthood, violence prevention strategies targeted at children and adolescents, such as school-based programmes, are considered to be promising interventions. Some school-based prevention programmes target all children attending a school or class, whilst others confine the intervention to those children who have already been identified as exhibiting, or threatening, behaviour considered to be aggressive, such an approach is known as 'secondary prevention'. A wide variety of school-based violence prevention programmes have been implemented over the last 20 years, yet we are still without a full understanding of their effectiveness. The objective of this systematic review was to determine the effectiveness of school-based secondary prevention programmes to prevent violence (that is those interventions targeted at children identified as aggressive or at risk of being aggressive). The authors examined all trials investigating the effectiveness of secondary violence prevention programmes targeted at children in mandatory education compared to no intervention or a placebo intervention. The authors found 56 studies; the overall findings show that school-based secondary prevention programmes aimed at reducing aggressive behaviour do appear to produce improvements in behaviour. The improvements can be achieved in both primary and secondary school age groups and in both mixed sex groups and boy-only groups. Further research is needed to investigate if the apparent beneficial programmes effects can be realised outside the experimental setting and in settings other than schools. None of the studies collected data on violent injury, so we can not be certain of the extent to which an improvement in behaviour translates to an actual injury reduction. In addition, more research is needed to determine if the beneficial effects can be maintained over time, and if the benefits can be justified against the costs of implementing such programmes.

Details: Cochrane Database of Systematic Reviews, 2006, Issue 3. 97p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD004606.pub2/pdf

Year: 2006

Country: International

Keywords: Crime Prevention

Shelf Number: 131964


Author: Carney, T.

Title: Brief School-Based Interventions and Behavioural Outcomes for Substance-Using Adolescents (Review)

Summary: Can brief interventions delivered in schools reduce substance use among adolescents? Adolescents worldwide are known to use both legal and illegal substances to different degrees, which can lead to other problems. Brief interventions are short programmes that aim to help reduce or stop substance use, in this case among adolescents. We conducted a Cochrane systematic review to look at the effectiveness of school-based brief interventions for substance use and substance-related problem behaviours among adolescents. The studies compared brief intervention programmes with two major kinds of comparison or control groups, 1) an information provision group and 2) an assessment-only group where participants received no intervention. Results of the review were mixed as we found studies that showed that brief intervention had no effects on substance use as well as studies where the brief intervention significantly reduced substance use and other problem behaviours. The pattern of results indicated that participants who received a brief intervention generally did better in reducing their substance use than participants who received no intervention at all. However, participants who received a brief intervention did no better in reducing their substance use than participants who received information only interventions. Across these intervention programmes, the evidence of benefit we found for a general reduction in substance use (especially cannabis, and less so for alcohol) was of limited quality. In view of the risk of bias, variation in study findings and imprecision, we are unable to make definitive statements about the effectiveness of these interventions.

Details: Cochrane Database of Systematic Reviews, 2014, Issue 2. 53p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD008969.pub2/pdf

Year: 2014

Country: International

Keywords: Drub Abuse and Addiction

Shelf Number: 131965


Author: Perry, Amanda E.

Title: Interventions for Drug-Using Offenders with Co-occurring Mental Illness (Review)

Summary: Interventions for drug-using offenders with co-occurring mental illness Background A number of policy directives are aimed at enabling people with drug problems to live healthy, crime-free lives. Drug-using offenders with co-occurring mental health problems represent a group of people who access treatment for a variety of different reasons. The complexity of the two problems makes the treatment and rehabilitation of this group of people particularly challenging. Study characteristics The review authors searched scientific databases and internet resources to identify randomised controlled trials (where participants are allocated at random to one of two or more treatment groups) of interventions to reduce, eliminate, or prevent relapse or criminal activity of drug-using offenders with co-occurring mental illness. We included people of any gender, age or ethnicity. Key results We identified eight trials (three of which are awaiting classification) evaluating treatments for drug-using offenders with co-occurring mental illness. The interventions included case management via a mental health court, a therapeutic community and an evaluation of motivational interviewing techniques and cognitive skills (a person's ability to process thoughts) in comparison to relaxation training. Overall, the combined interventions were not found to reduce self report drug use, but did have some impact on re-incarceration rates, but not re-arrest. A specific analysis of therapeutic community interventions did subsequently reduce re-incarceration but proved to be less effective for re-arrest and self report drug use. Two single studies evaluating case management via a mental health drug court and motivational interviewing and cognitive skills did not show significant reductions in criminal activity and self report drug use respectively. Little information is provided on the costs and cost-effectiveness of such interventions and trial evaluations focusing specifically on the needs of drug misusing offenders with co-occurring mental health problems are required. Quality of the evidence This review was limited by the lack of information reported in this group of trials and the quality of the evidence is unclear. The evidence is current to March 2013.

Details: Cochrane Database of Systematic Reviews, 2014, Issue 1. 90p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD010901/pdf

Year: 2014

Country: International

Keywords: Drug Abuse Treatment

Shelf Number: 131966


Author: Perry, Amanda E.

Title: Pharmacological Interventions for Drug-Using Offenders (Review)

Summary: Drug-using offenders by their nature represent a socially excluded group in which drug use is more prevalent than in the rest of the population. Pharmacological interventions play an important role in the rehabilitation of drug-using offenders. For this reason, it is important to investigate what we know works when pharmacological interventions are provided for offenders. The review identified 17 trials (six of which are awaiting classification) containing 2,678 offenders. Interventions included evaluations of (1)naltrexonen comparison with routine parole, social psychological treatment or both, (2) methadone maintenance in comparison with different counselling options and (3) naltrexone, diamorphine and buprenorphine in comparison with a non pharmacological alternative and in combination with another pharmacological treatment. Overall, the findings suggest that such interventions have an impact on reducing drug use and criminal activity to a variable extent. Methadone does not seem to perform better than control intervention in different settings. However, because the number of studies is small, this finding should be taken with caution. Findings on the effects of individual pharmacological interventions on drug use and criminal activity show mixed results. Buprenorphine and methadone, were shown to reduce subsequent drug use but results were statistically significant only for methadone. We could not evaluate the impact of buprenorphine on criminal activity because we did not have the relevant study data. Methadone was not found to have a significant impact on reduction of re-incarceration whereas naltrexone, significantly reduced re incarceration. We also investigated whether one treatment was better than another. We found no significant differences between any of the drug comparisons (methadone vs buprenorphine, diamorphine and naltrexone) on any of the outcome measures. Aside from any practical implications relating to administration or the cost of the drug this suggests that one drug does not perform better than another. The results were based on the findings of single trials and should be interpreted with caution until further trial evidence is available to confirm or refute these findings. One study provided some cost comparisons between buprenorphine and methadone, but data were not sufficient to generate a cost-effectiveness analysis. In conclusion, we found that pharmacological interventions do reduce subsequent drug use and criminal activity (to a lesser extent). Additionally, we found individual differences and variation between the degree to which successful interventions were implemented and were able to sustain reduction of drug use and criminal activity.

Details: Cochrane Database of Systematic Reviews, 2013, Issue 12. 99p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD010862/pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 131967


Author: Perry, Amanda E.

Title: Interventions for Female Drug-Using Offenders (Review)

Summary: Background Drug-using offenders naturally represent a socially excluded group where drug use is more prevalent than in the rest of the population. A growing number of female offenders are being incarcerated for drug-related crimes. For this reason it is important to investigate what we know about what works for female offenders. Study characteristics The review authors searched scientific databases and internet resources to identify randomised controlled trials (where participants are allocated at random to one of two or more treatment groups) of interventions to reduce, eliminate, or prevent relapse or criminal activity of female drug-using offenders. We included people of any age or ethnicity. Key results We identified 11 trials (four of which await classification) of female drug-using offenders. The interventions included: i) two evaluations of therapeutic community (TC) treatment in comparison to an alternative sentencing option and an educational cognitive skills programme; ii) three evaluations of community-based management; iii) a cognitive behavioural programme in comparison to treatment as usual; and iv) buprenorphine treatment. Overall, the findings suggest that together such interventions have an impact on reducing self-reported drug use and re-incarceration. e found individual treatment interventions had differing effects and the results should be interpreted with caution. We identified too few studies to evaluate whether the treatment setting (for example, court or community) had an impact on the success of such programmes. Promising results highlight the use of TC programmes with aftercare and a gender-responsive treatment (GRT) programme; however, this was only one study. No information is provided on the cost and cost effectiveness of these studies. In conclusion, high quality research is required to evaluate the effectiveness of different treatment options for female drug-using offenders. Further information on the processes involved in the engagement of women mandated to substance abuse programmes, together with evaluations of cost effectiveness research, will enable policy makers to make informed choices about commissioning the use of adapted programmes specifically targeted at female offenders.

Details: Cochrane Database of Systematic Reviews, 2014, Issue 1. 88p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD010910/pdf

Year: 2014

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 131968


Author: Hassiotis, A.A

Title: Behavioural and Cognitive-Behavioural Interventions for Outwardly-Directed Aggressive Behaviour in People with Learning Disabilities (Review)

Summary: Challenging behaviour is a significant cause of social exclusion for people with learning disabilities. ('Learning disabilities' is also known as ' intellectual disabilities'). There is no firm evidence as yet about which interventions help people with learning disabilities most with their challenging behaviour. In this review we assess the efficacy of behavioural and cognitive behavioural interventions for a specific type of challenging or 'problem' behaviour, that is, outwardly-directed aggression.

Details: Cochrane Database of Systematic Reviews, 2008. Issue 4. 47p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD003406.pub3/pdf

Year: 2008

Country: International

Keywords: Aggression

Shelf Number: 131970


Author: Smith, Leslie A.

Title: Therapeutic Communities for Substance Related Disorder (Review)

Summary: Therapeutic communities (TCs) are a popular treatment for the rehabilitation of drug users. The results of this review show that there is little evidence that TCs offer significant benefits in comparison with other residential treatment, or that one type of TC is better than another. Prison TC may be better than prison on it's own or Mental Health Treatment Programmes to prevent re-offending postrelease for inmates.

Details: Cochrane Database of Systematic Reviews, 2006, Issue 1. 42p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD005338.pub2/pdf

Year: 2006

Country: International

Keywords: Correctional Programs

Shelf Number: 131973


Author: Willis, Charlene

Title: Alcohol Ignition Interlock Programmes for Reducing Drink Driving Recidivism (Review)

Summary: Convicted drink drivers are sometimes offered the choice of a standard punishment, or for an alcohol ignition interlock to be fitted to their car for a fixed period. To operate a vehicle equipped with an interlock, the driver must first give a breath specimen. If the breath alcohol concentration of the specimen is too high, the vehicle will not start. A number of studies have been conducted to see whether the interlock stops drink drivers from offending again. Most of these studies have not been of high quality. The interlock seems to reduce re-offending as long as it is still fitted to the vehicle, but there is no long-term benefit after it has been removed. However, more studies of good quality are needed to confirm these findings. The low percentage of offenders who choose to have an interlock fitted also makes it difficult to reach firm conclusions about their effectiveness.

Details: Cochrane Database of Systematic Reviews, 2009, Issue 1. 29p.

Source: Internet Resource: Accessed March 29, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD004168.pub2/pdf

Year: 2009

Country: International

Keywords: Alcohol Interlock Devices

Shelf Number: 131974


Author: Ashman, Lorraine L.M.

Title: Interventions for Learning Disabled Sex Offenders (Review)

Summary: Sex offending is of increasing public concern with calls for longer terms of imprisonment and closer supervision of such offenders in the community. Currently a variety of treatment approaches are used including medication and talking therapies, though little is known about their success rates. The small group of sex offenders with learning disabilities pose a particular challenge as talking therapies need to be modified to account for the offender’s limited understanding. We could find no randomised controlled trial evidence to guide us in the treatment of learning disabled sex offenders.

Details: Cochrane Database of Systematic Reviews, 2008, Issue 1. 19p.

Source: Internet Resource: Accessed March 19, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD003682.pub2/pdf

Year: 2008

Country: International

Keywords: Learning Disabilities

Shelf Number: 131975


Author: Peterke, Sven

Title: Regulating “Drug Wars” and Other Gray Zone Conflicts: Formal and Functional Approaches

Summary: Academic debate on whether so-called “drug wars” can be classified as “armed conflicts” is more than just semantic. Indeed, the official designation of a situation as an armed conflict carries with it attendant rights and obligations applicable to states and non-state actors alike. The legal regime regulating armed conflicts is referred to as International Humanitarian Law (IHL). Some social scientists fail to understand that the debate on the applicability of IHL to “drug wars” is only marginally influenced by the broader discussions on “new wars” and “fourth generation warfare”. This article considers the principal international legal approaches to engaging with ostensibly new types of organized violence. It reviews historical progress with respect to the regulation of so-called “non-international armed conflicts” and considers the track record to date. The paper finds that the “formal approach”, based as it is on the cautious development of IHL´s existing legal basis, failed to offer a satisfying degree of legal certainty. The paper also notes how an alternative set of approaches is emerging - referred to here as “functional approaches”. The paper shows that this new generation of strategies could potentially complement the formal approach by offering alternative means of effectively regulating “drug wars” and other gray zone conflicts.

Details: Rio de Janeiro, Brazil: Humanitarian Action in Situations other than War, 2012. 27p.

Source: Internet Resource: HASOW Discussion Paper 2: Accessed March 20, 2014 at: http://www.hasow.org/uploads/trabalhos/79/doc/170820526.pdf

Year: 2012

Country: International

Keywords: Drug Policy

Shelf Number: 131980


Author: European Commission. Directorate-General for Home Affairs

Title: Helping Boys to Break the Cycle of Family Violence: A Literature Review

Summary: In May 2011, Berry Street commissioned Change Point Learning and Development to undertake a literature review of programs across the world aimed at helping boys to break the cycle of family violence. In keeping with the assigned brief, this report focuses on research about programs for boys between the ages of 8 and 18, with emphasis on groupwork approaches. The report emphasises programs for boys who have direct or indirect experience of violence in the home, and/or boys who show signs of developing violent behavior themselves. This report explores and makes recommendations regarding options for developing interventions to prevent and reduce violence amongst boys aged between 8 and 18 years of age. Young people may be involved in, or at risk of, specific types of violence, including school violence, bullying, dating violence, domestic violence, gang violence and sexual violence. Each of these has its own literature and specialist interventions. We examined some of the research on these related types of violence and present some of the programs, research findings and other resources from these in this paper.

Details: Melbourne: Berry Street, 2012. 60p.

Source: Internet Resource: Accessed March 20, 2014 at: http://www.berrystreet.org.au/Assets/1846/1/Helpingboystobreakthecycleoffamilyviolence-literaturereview.pdf

Year: 2012

Country: International

Keywords: Children and Violence

Shelf Number: 131986


Author: European Monitoring Centre for Drugs and Drug Addiction (EMCDDA)

Title: Regional strategies across the world: a comparative analysis of intergovernmental policies and approaches,

Summary: This paper offers a comparison of the drug strategies and plans adopted over the last five years by six intergovernmental organisations engaging 148 countries in four continents. It informs decision-makers, professionals and researchers working in the area of international drug policy about the way in which countries of the same region have decided to strategically approach drug-related security, social and health problems. Drug strategies and plans offer interesting insights both when analysed individually and when compared across regions. This paper describes the way in which drug strategies are structured and addresses their priorities and objectives. It looks at the main approaches to demand and supply reduction and analyses the manner in which these interventions are referred from region to region. The content analysis reveals interesting similarities but also important differences. When seen in the light of the current international drugs policy debate, regional drug strategies may provide an important contribution for assessing the drug problem at international level.

Details: Luxembourg: Publications Office of the European Union, 2014. 27p.

Source: Internet Resource: EMCDDA Papers: Accessed March 21, 2014 at: http://www.emcdda.europa.eu/attachements.cfm/att_224386_EN_TDAU14002ENN.pdf

Year: 2014

Country: International

Keywords:

Shelf Number: 131997


Author: Weatherburn, Don

Title: A Review of Restorative Justice Responses to Offending

Summary: The present review sought to determine on the available evidence (a) whether restorative justice (RJ) is an effective means of reducing re-offending (b) what benefits victims of crime obtain from participation in the RJ process (c) whether the public supports the principles of RJ and (d) how the cost and efficiency of RJ proceedings compare with conventional courts in cost and efficiency (i.e. time taken to finalize cases). The review finds little reliable evidence that RJ reduces re-offending. Victims who participate in RJ are generally satisfied with the experience but it is unclear whether they are more satisfied than victims in similar cases that are dealt with in court. The limited evidence available suggests that the public supports the principles of RJ. It appears to be a less expensive and more efficient way of finalizing criminal cases involving young people but, once again, the evidence on this issue at this stage is rather limited.

Details: Sydney: Australia and New Zealand School of Government, 2013. 20p.

Source: Internet Resource: Evidence Base, Issue 1: http://journal.anzsog.edu.au/publications/4/EvidenceBase2013Issue1.pdf

Year: 2013

Country: International

Keywords: Recidivism

Shelf Number: 104861


Author: Jenkins, Brian Michael

Title: The 1995 Attempted Derailing of the French TGV (High-Speed Train) and a Quantitative Analysis of 181 Rail Sabotage Attempts

Summary: On August 26, 1995, the Saturday of the final and busiest weekend of France's summer holiday season, terrorists attempted to derail the TGV (Train a Grande Vitesse) between Lyon and Paris by planting a bomb. Fortunately, their crude triggering mechanism failed to detonate the bomb, and subsequent analysis indicates that even had the bomb gone off, the explosion would not have derailed the train. The TGV episode, one of a continuing series of case studies by the Mineta Transportation Institute, points to a continuing problem: Since 1995, terrorists have attempted to derail trains on at least 144 occasions. Because of the expansion of high-speed rail systems in Europe, Asia, and North America, where 15 high-speed rail projects are in preparation or under way in the United States alone, this case study has been expanded to include a chronology and statistical analysis of attempted derailments worldwide. This analysis examines the geographic distribution of the attempts, the methods used by the saboteurs, and the outcomes. Although based on a small universe of events, it underscores both the attractiveness to terrorists of attacking transportation systems-a successful attack can result in high body counts, significant disruption, dramatic images, and enormous publicity, all things sought by terrorists-and the difficulties of achieving success.

Details: San Jose, CA: Mineta Transportation Institute, College of Business, San Jose State University, 2010. 66p.

Source: Internet Resource: MTI Report 09-12: Accessed March 28, 2014 at: http://transweb.sjsu.edu/MTIportal/research/publications/documents/TGV_book%20(with%20covers).pdf

Year: 2010

Country: International

Keywords: Bombings

Shelf Number: 132014


Author: Donald, Jennifer S.

Title: The Use of Social Media Networks and Mobile Phone Applications for Reporting Suspicious and Criminal Activities on Mass Transit

Summary: The threat of terrorism remains in the forefront daily, and public transportation systems remain a preferred target for terrorist attacks. Mass transit customers have long served as the "eyes and ears" of the public transportation environment. In support of the Department of Homeland Security's See It Say It campaign, mass transit customers contribute to this effort by reporting suspicious and criminal activities on subways and buses. The use of social media networks and mobile phone applications by mass transit law enforcement is slowly evolving as a tool for reporting suspicious and criminal activities on subways and buses. By reviewing the data and current use of social media networks and smartphone applications such as by mass transit law enforcement agencies, this thesis demonstrates that citizens want to play a role in assisting law enforcement in solving crimes. Mass transit law enforcement agencies can leverage community involvement and reduce crime by providing customers with an anonymous means for reporting suspicious and criminal activities. However, whether the use of social media networks and smartphone applications have resulted in an increase in reporting suspicious and criminal activities and a reduction in crime is unresolved, warranting future study in this area.

Details: Monterey, CA: Naval Postgraduate School, 2013. 117p.

Source: Internet Resource: Thesis: Accessed March 28, 2014 at: http://www.hsdl.org/?view&did=750162

Year: 2013

Country: International

Keywords: Public Transportation

Shelf Number: 132018


Author: Kilmer, Beau

Title: Multinational Overview of Cannabis Production Regimes

Summary: In July 2013, the Research and Documentation Centre (WODC) of the Netherlands Ministry of Security and Justice asked RAND Europe to provide a multinational overview of cannabis production regimes, with a special focus on identifying and describing official statements and/or legal decisions made about production regimes for non-medical and non-scientific purposes (i.e. recreational use for adults). This research report describes the ways in which these policies developed in selected countries, and the legal, legislative and voters' decisions that shaped them. It pays attention to whether there have been formal statements from these countries about whether and how the new policies fit within the existing international legal framework. However, it does not make an assessment about whether these countries are compliant with the treaties. The report also does not take a position about whether changes in cannabis production policies would be good or bad for society.

Details: Cambridge, UK: Rand Europe, 2013. 82p.

Source: Internet Resource: Accessed April 18, 2014 at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR500/RR510/RAND_RR510.pdf

Year: 2013

Country: International

Keywords: Cannabis

Shelf Number: 132063


Author: Ablon, Lillian

Title: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Summary: Markets are good because they facilitate economic efficiency, but when that efficiency facilitates criminal activity, such "black markets" can be deemed harmful. Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets in both the tools (e.g., exploit kits) and the take (e.g., credit card information). As with most things, intent is what can make something criminal or legitimate, and there are cases where goods or services can be used for altruistic or malicious purposes (e.g., bulletproof hosting and zero-day vulnerabilities). This report describes the fundamental characteristics of these markets and how they have grown into their current state in order to give insight into how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options that could minimize the potentially harmful influence these markets impart. This report assumes the reader has a basic understanding of the cyber, criminal, and economic domains, but includes a glossary to supplement any gaps. This report should be of interest to cybersecurity, information security, and law enforcement communities. It was sponsored by Juniper Networks as part of a multiphase study on the future security environment.

Details: Santa Monica, CA: RAND, 2014. 83p.

Source: Internet Resource: Accessed April 19, 2014 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR600/RR610/RAND_RR610.pdf

Year: 2014

Country: International

Keywords: Black Markets

Shelf Number: 132082


Author: Blaya, Catherine

Title: Expel Violence! A Systematic Review of Interventions to Prevent Corporal Punishment, Sexual Violence and Bullying in Schools

Summary: School violence and peer victimization have become a focus concern due to isolated single, extremely violent events (e.g. school shootings). Even in its less serious forms, the issues of violence and behaviour management in schools trigger a great deal of stress for both pupils and school staff. More broadly, school victimization is a predictor of school drop out; criminality; as well as social exclusion for both victims and perpetrators (Olweus, 1991; Farrington, 1993; Smith, 2004). It is also damaging to the general school climate and quality of education (Debarbieux, 1999). School bullying has become one of the main concerns in Northern Europe (Olweus,1978), England (Smith and Sharp, 1994), Spain (Ortega, 1992) and throughout Europe and other countries such as Australia, Japan and North America (Rigby & Slee, 1991; Twemlow et al., 1996; Smith et al., 1999; Cowie, 2000). Other types of violence such as corporal punishment and sexual abuse are common in some countries. Corporal punishment, although it contravenes the UN Convention on the Rights of the Child remains legal in many countries. Research provided evidence that it remains to be considered the best solution for misbehaviour or conflicts with children by some teachers and head-teachers. This includes developed countries such as the United States, where in the late 1980's, it was estimated that corporal punishment was administered between 1 and 2 million times in schools (American Academy of Pediatrics - Committee on School Health, 2000). It is commonly administered to maintain attention and order within the classroom; for poor timekeeping or as a result of bad academic grades (Human Rights Watch: http://www.hrw.org). Sexual abuse by teachers is frequent in some countries. This is not only traumatic for the victims, but also provides a negative male role model to witnesses. In other countries, the fear of girls being sexually abused or threatened leads some ethnic minorities to exclude them from mainstream education (Blaya, 2003). Male pupils and male teachers are usually the perpetrators, with female pupils being the victims. Sexual violence has an impact not only on mental, but also on physical health and is the focus of concern of the World Health Organization and public health sectors worldwide due to sexually transmitted diseases, mainly HIV.

Details: Woking, Surrey, UK: Plan Limited, 2008. 182p.

Source: Internet Resource: Accessed April 22, 2014 at: https://plan-international.org/learnwithoutfear/files/expel-violence-english

Year: 2008

Country: International

Keywords: Child Sexual Violence

Shelf Number: 132129


Author: Kiedrowski, John

Title: Trends in Indigenous Policing Models: An International Comparison

Summary: The report reviews Indigenous policing models in Canada, the United States, Australia and New Zealand. These countries were selected due to similarities in their colonial history, laws, political structures and the socio-economic outcomes of their respective Indigenous peoples. The purpose of the report is to facilitate opportunities for the exchange of information on Indigenous policing models, research and policy issues. The report, however, is not an exhaustive overview of all Indigenous policing initiatives, but an attempt to initiate information sharing, and enhance cross-national communication and discussion in this critically important area. In the countries reviewed, the Indigenous population is growing at a more rapid rate than the non-Indigenous people. At the same time, the Indigenous people have a much higher rate of offences, arrest and incarceration than non-Indigenous population. Furthermore, the Indigenous people are more socially and economically challenged in terms of unemployment, education and health care. This setting poses a challenge for delivering policing services. Among the countries reviewed, Canada is alone in having a comprehensive and national policing program (FNPP) for its Aboriginal peoples. In the United States many of the reservations have their own policing services which evolved from Congressional legislation. Recently, Congress passed the Tribal Law & Order Act of 2010 to help establish partnerships between the Tribes and Federal government to better address the public-safety challenges that confront the Tribal communities. In Australia, the Royal Commission Into Aboriginal Deaths and Custody was the impetus for determining how policing models will service the Indigenous communities. Recently, the policing models have also been associated with the development of community partnership agreements and performance measures to better determine the impact of policing services. In New Zealand, policing services models continue to follow the Maori Responsiveness Strategy, which is geared towards building partnership and relations with the Maori people. The report identifies a few promising policing practices that can have a positive impact on public safety for Indigenous people. These practices where incorporated into an integrated policing model which highlights the importance of such factors as police training, the development of community partnerships, understanding Indigenous tradition and culture, and the use of a holistic framework. Finally, the report concludes that there is a critical need for further empirical research and more information sharing, and cross-national exchanges.

Details: Ottawa: Public Safety Canada, 2013. 59p.

Source: Internet Resource: Accessed April 23, 2014 at: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/trnds-ndgns-plc-mdl/trnds-ndgns-plc-mdl-eng.pdf

Year: 2013

Country: International

Keywords: Aboriginals

Shelf Number: 132144


Author: Rud, Iryna

Title: Education and Youth Crime: A Review of the Empirical Literature

Summary: This paper provides a systematic literature review on the relationship between education and criminal behavior of young people, using the Technology of Skill Formation (Cunha & Heckman, 2007) as a theoretical framework. The nature of youth crime is different than the nature of adult crime. We analyze studies that evaluate childhood and adolescence interventions and studies that examine the effects between education and criminal behavior of young people. The former suggests a link between education and youth crime. The latter shows that education reduces the probability of criminal behavior in adolescence and young adulthood, whereas early criminal involvement is likely to have a negative impact on educational attainment. The underlying mechanisms of these effects are generally not identified and can combine different components, such as incapacitation effects, skill acquisition and peer effects.

Details: Amsterdam: University of Amsterdam, 2013. 32p.

Source: Internet Resource: Tier Working Paper Series, Tier WP 13/06: Accessed April 24, 2014 at: http://www.tierweb.nl/assets/files/UM/Working%20papers/TIER%20WP%2013-06.pdf

Year: 2013

Country: International

Keywords: Crime Prevention

Shelf Number: 132161


Author: Duvvury, Nata

Title: Intimate Partner Violence: Economic Costs and Implications for Growth and Development

Summary: Violence against women, recognized globally as a fundamental human rights violation, is widely prevalent across high-, middle- and low–income countries. Violence against women has significant economic costs in terms of expenditures on service provision, lost income for women and their families, decreased productivity, and negative impacts on future human capital formation. This paper makes a major contribution to the discussion of economic implications of intimate partner violence (IPV) through its conceptual mapping of the links between IPV and economic growth, based on a review of literature on their complex dynamics. It reviews costing methodologies and identifies types of costs that potentially can be estimated given different degrees of data availability. Data from nine countries indicate that costs are substantial, from 1-2 percent of GDP, although criteria and methodologies vary and are not directly comparable. In the economies reviewed here, this amount nearly equals government spending on primary education. This paper argues for a focus on estimating impacts on productivity, a key driver of economic growth. It also calls for committed action by both national governments and The World Bank Group in terms of integrating consideration of IPV and violence against women and girls (VAWG) into national and sectoral development plans and Bank funding streams; strengthening national statistics offices to collect, manage, and analyze data on violence systematically and regularly; prioritizing multi-sectoral and inter-ministerial responses; and, most importantly, establishing a dedicated budget or funding streams for tackling IPV and VAWG.

Details: Washington, DC: The World Bank, 2013. 97p.

Source: Internet Resource: Accessed April 24, 2014 at: http://www.worldbank.org/content/dam/Worldbank/document/Gender/Duvvury%20et%20al.%202013%20Intimate%20Partner%20Violence.%20Economic%20costs%20and%20implications%20for%20growth%20and%20development%20VAP%20No.3%20Nov%202013.pdf

Year: 2013

Country: International

Keywords: Costs of Crime

Shelf Number: 132165


Author: Organization for Security and Co-operation Europe, Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings

Title: Policy and Legislative Recommendations Towards the Effective Implementation of the Non-Punishment Provision with Regard to Victims of Trafficking

Summary: Trafficking in human beings is a massive phenomenon of modern-day slavery, which sees millions of individuals deprived of their liberty and freedom of choice, exploited with coercive and abusive means for a variety of purposes ranging from sexual and labour exploitation, to forced criminality and to the removal of organs or any other illicit lucrative form of exploitation. Very few receive assistance and protection as victims of a serious crime; more often they are arrested, detained and charged with immigration offences, for soliciting prostitution or engaging in illegal work, making false statements or they are fined for violations of administrative laws and regulations. Furthermore, the increasing prevalence globally of human trafficking for enforced criminality also exposes victims of trafficking to committing a multitude of offences such as, but not limited to, theft, pick-pocketing, drug trafficking, cannabis cultivation and fraud. It is often a deliberate strategy of the traffickers to expose victims to the risk of criminalization and to manipulate and exploit them for criminal activities. It is therefore not uncommon that victims of trafficking commit criminal offences or other violations of the law directly connected with, or arising out of, their trafficking situation. In these situations they often come to the attention of the authorities primarily as offenders and they may not be easily recognized as actual victims of a serious crime. Therefore, States should be fully aware of these developments in order to enable accurate victim identification and effective investigation of the trafficking crime, as well as to ensure effective protection of victims’ rights, including non-punishment of victims for offences caused or directly linked with their being trafficked. The principle of non-punishment of victims is affirmed in a number of international standards, including legally and politically-binding instruments. In the OSCE region, participating States committed to endorse a human rights-based and victim-centred approach to anti-trafficking action, an approach that respects the dignity and human rights of trafficking victims at all times. Such a human rights approach calls for governments and parliaments to take the lead in their national jurisdictions to ensure that legislation and policy are not negatively impacting on the protection of rights of trafficked persons. The non-punishment of victims of trafficking for offences they have committed as a consequence, or in the course, of being trafficked is an essential element of such a human rights approach. With a view to supporting participating States in the implementation of these commitments, the OSCE Special Representative and Co-ordinator for Combating Trafficking in Human Beings (hereinafter SR), in close consultation with partners in the Alliance against Trafficking in Persons, has engaged in the development of policy guidance to assist States in the translation into practice of the commitment on the non-punishment of victims of trafficking. This paper examines the principle of non-punishment in international law, explores the scope of its application and discusses the challenges in its practical implementation. It includes a number of practical examples and court cases which were made available by national agencies, NGOs and legal professionals who have been examining these issues extensively, in particular the Belgian Centre for Equal Opportunities and Opposition to Racism, the Bureau of the Dutch National Rapporteur on Trafficking in Human Beings, as well as UK courts and lawyers. The paper concludes with the provision of practical guidance, and the formulation of policy and legislative recommendations, towards the effective implementation of the non-punishment provision with regard to victims of trafficking.

Details: Vienna, Austria: OSCE, 2013. 36p.

Source: Internet Resource: Accessed April 28, 2014 at: http://www.osce.org/secretariat/101002?download=true

Year: 2013

Country: International

Keywords: Forced Labor

Shelf Number: 132190


Author: Flynn, Michael

Title: How and Why Immigration Detention Crossed the Globe

Summary: Today in countries across the globe, immigration-related detention has become an established policy apparatus that counts on dedicated facilities and burgeoning institutional bureaucracies. Before the decade of the 1980s, however, detention appears to have been largely an ad hoc tool, employed mainly by wealthy states in exigent circumstances. This paper details the history of key policy events that led to the diffusion of detention practices during the last 30 years and assesses some of the motives that appear to have encouraged this phenomenon. The paper also endeavors to place the United States at the center of this story because its policy decisions were instrumental in initiating the process of policy innovation, imitation, and - in many cases - imposition that has helped give rise to today's global immigration detention phenomenon. More broadly, in telling this story, this paper seeks to flesh out some of the larger policy implications of beyond-the-borders immigration control regimes. Just as offshore interdiction and detention schemes raise important questions about custody, accountability, and sovereignty, they should also spur questions over where responsibility for the wellbeing of migrants begins and ends. As this paper demonstrates, when it comes to immigration detention, all the answers cannot be found just at home.

Details: Geneva, Switzerland: Global Detention Project, Programme for the Study of Global Migration, Graduate Institute of International and Development Studies, 2014. 34p.

Source: Internet Resource: Global Detention Project Working Paper No. 8: Accessed May 3, 2014 at: http://www.globaldetentionproject.org/fileadmin/publications/Flynn_diffusion_WorkingPaper_v2.pdf

Year: 2014

Country: International

Keywords: Illegal Aliens

Shelf Number: 132215


Author: Rudolph, Alexandra

Title: International Human Trafficking: Measuring Clandestinity by the Structural Equation Approach

Summary: Worldwide human trafficking (HT) is the third most often registered international criminal activity, ranked only after drug and weapon trafficking. The aim of the paper is to measure the extent of HT inflows to destination countries. It proposes the application of the Multiple Indicators Multiple Causes (MIMIC) structural equation model in order to include potential causes and indicators in one model and generate an index of the intensity of HT in destination countries. Thus, we account for the unobservable nature of the crime as well as for visible aspects that both shape the extent of it. By including both dimensions of the trafficking process the model is applied over a period of ten years. The resulting measure orders 142 countries between 2000 and 2010 according to their potential of being a destination country based on characteristics of the trafficking process. The results are that OECD countries are the most likely destination countries while developing countries are less likely.

Details: Bonn: Institute for the Study of Labor (IZA), 2013. 49p.

Source: Internet Resource: IZA Discussion Paper No. 7867: Accessed May 5, 2014 at: http://ftp.iza.org/dp7867.pdf

Year: 2013

Country: International

Keywords: Human Trafficking

Shelf Number: 132237


Author: DLA Piper

Title: Empty Threat: Does the Law Combat Illegal Wildlife Trade? A Ten-Country of Legislative and Judicial Approaches

Summary: In 1975, the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) entered into force through ratification or accession by ten countries. Today, 179 countries are Parties to CITES, and yet illegal trade in wildlife has continued to proliferate to the point where it ranks behind only illegal trafficking in drugs, guns and human beings in the value of the illegal trade. Each of the 179 Contracting Parties has some form of principal domestic legislation implementing CITES and setting out offences relating to the illegal trade in wildlife which are subject to prosecution through some form of domestic judicial process. Many Contracting Parties also have ancillary legislation that can be used to prosecute illegal trade in wildlife. Examples include legislation with respect to money laundering, illegal use of weapons and anti-corruption legislation. Numerous factors are often cited as drivers of the proliferation of illegal trade in wildlife including wealth, poverty and cultural demand. Strong principal and ancillary legislation and enforcement through an effective judicial process act as deterrents to this criminal activity. By contrast, weak or limited legislation enforced on a haphazard basis by a judiciary with limited experience or capacity to prosecute not only fails to deter but furthers an environment where those engaging in such activity are emboldened. Notwithstanding the number of contracting parties to CITES, work still needs to be done to strengthen legislation around the world and improve prosecutorial and judicial capacity and processes. DLA Piper was engaged by the Royal Foundation of the Duke and Duchess of Cambridge and Prince Harry (the "Royal Foundation") on behalf of the United for Wildlife partnership to review and evaluate the state of legislation and judicial processes with respect to illegal trade in wildlife in ten countries: Cameroon, China, Democratic Republic of Congo, Kenya, Malaysia, the Philippines, Tanzania, Thailand, Uganda and Vietnam. A team of 55 lawyers from 15 DLA Piper Offices around the world reviewed and analysed the relevant principal and ancillary legislation and domestic prosecutorial and judicial processes, using this information to produce a report for each country. Following an executive summary, each country report includes an overview of the principal legislation on illegal trade in wildlife. This is also the domestic legislation implementing CITES. The reports then discuss the criminal penalties (fines and imprisonment) associated with illegal trade in wildlife, with an emphasis on whether such penalties cause the crime to be considered a "serious crime" within the meaning of the United Nations Office of Drugs and Crime ("UNODC"). The reports also review relevant ancillary legislation that can be used to prosecute crimes associated with the illegal trade in wildlife. Each report then assesses the local judicial process and capacity to enforce the domestic principal or ancillary legislation. The reports then conclude with observations and recommendations based on the findings of the country team.

Details: London: DLA Piper, 2014. 47p.

Source: Internet Resource: Accessed May 5, 2014 at: http://www.dlapiperprobono.com/export/sites/pro-bono/downloads/pdfs/Empty-Threat---Does-the-law-combact-illegal-wildlife-trade---Summary-Report-2014.pdf

Year: 2014

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 132238


Author: Simpson, Sally S.

Title: Corporate Crime Deterrence: A Systematic Review

Summary: BACKGROUND Corporate crime is a poorly understood problem with little known about effective strategies to prevent and control it. Competing definitions of corporate crime affect how the phenomenon is studied and implications for reducing it. Therefore, in this review, we use John Braithwaite's definition (1984: 6) which specifies that corporate crime is "the conduct of a corporation, or of employees acting on behalf of a corporation, which is proscribed and punishable by law." Consistent with this approach, this review focuses on various legal strategies aimed at companies and their officials/managers to curtail corporate crime. Interventions may be punitive or cooperative, but the goal is to prevent offending and increase levels of corporate compliance. OBJECTIVES Our overall objective is to identify and synthesize published and unpublished studies on formal legal and administrative prevention and control strategies—i.e., the actions and programs of government law enforcement agencies, legislative bodies, and regulatory agencies on corporate crime. We then assess the impact of these strategies on individual and company offending. Included are legal and administrative interventions such as new laws or changes in laws, inspections by regulatory agencies, punitive sanctions and non-punitive interventions aimed at deterring or controlling illegal behaviors. CRITERIA FOR INCLUSION OF STUDIES We were highly inclusive in our selection criteria, including studies that encompass a wide variety of methodologies: experimental (e.g., lab studies or vignette surveys), quasi-experimental (e.g., pre/post-tests), and non-experimental (e.g., correlational statistics using secondary data). The studies included also contained a wide variety of data (e.g., data from official agencies, corporate reports, individuals' survey responses, etc.). Our search included published and unpublished articles, reports, documents, and other readily available sources. The outcome of interest, corporate offending, could reflect actual behavior or behavioral intentions as reported by respondents. Out of the 40 possible treatment categories, we were able to calculate a mean effect size for 19. Although most showed a positive albeit non-significant treatment effect, some (including a significant effect) were iatrogenic. Looking at the specific mechanisms, the impact of law on corporate crime showed a modest deterrent effect at the firm and geographical level of analysis (there was not enough data to calculate effect sizes for individuals). However, this finding is limited to cross-sectional studies. For punitive sanctions, where there was substantially more data from which to calculate effect sizes, we observe a similar pattern: A tendency toward deterrence across units of analysis, with relatively few significant effects regardless of whether data are cross-sectional or longitudinal. The one area where there appears to be a consistent treatment effect is in the area of regulatory policy, but only at the individual level. Effects for other levels are contradictory (with some positive and others iatrogenic) and none are statistically significant. Regarding moderator effects, the least methodologically rigorous designs— those that were not experimental versus experimental designs and those without statistical control variables versus controls were associated with a treatment effect. We also found that older studies were associated with stronger deterrent effects—perhaps because the older studies are less methodologically rigorous that those that are newer. Other moderator results were less clear (publication bias, country bias, disciplinary bias; offense type), but given how few of the analyses revealed strong treatment effects overall we think it is premature to draw any conclusions from these findings and call instead for more methodologically rigorous and focused studies particularly in the punitive sanction and regulatory policy areas.

Details: Oslo: Campbell Collaboration, 2014. 106p.

Source: Internet Resource: Campbell Systematic Review 2014:4: Accessed May 5, 2014 at: http://www.campbellcollaboration.org/lib/project/199/

Year: 2014

Country: International

Keywords: Corporate Crime

Shelf Number: 132243


Author: Winokur, Marc

Title: Kinship Care for the Safety, Permanency, and Well-Being of Children Removed from the Home for Maltreatment: A Systematic Review

Summary: BACKGROUND Every year a large number of children around the world are removed from their homes because they are maltreated. Child welfare agencies are responsible for placing these children in out-of-home settings that will facilitate their safety, permanency, and well-being. However, children in out-of-home placements typically display more educational, behavioural, and psychological problems than do their peers, although it is unclear whether this results from the placement itself, the maltreatment that precipitated it, or inadequacies in the child welfare system. OBJECTIVES To evaluate the effect of kinship care placement compared to foster care placement on the safety, permanency, and well-being of children removed from the home for maltreatment. SEARCH METHODS We searched the following databases for this updated review on 14 March 2011: the Cochrane Central Register of Controlled Trials (CENTRAL), MEDLINE, PsycINFO, CINAHL, Sociological Abstracts, Social Science Citation Index, ERIC, Conference Proceedings Citation Index-Social Science and Humanities, ASSIA, and Dissertation Express. We handsearched relevant social work journals and reference lists of published literature reviews, and contacted authors. SELECTION CRITERIA Controlled experimental and quasi-experimental studies, in which children removed from the home for maltreatment and subsequently placed in kinship foster care were compared with children placed in non-kinship foster care for child welfare outcomes in the domains of well-being, permanency, or safety. DATA COLLECTION AND ANALYSIS Two review authors independently read the titles and abstracts identified in the searches, and selected appropriate studies. Two review authors assessed the eligibility of each study for the evidence base and then evaluated the methodological quality of the included studies. Lastly, we extracted outcome data and entered them into Review Manager 5 software (RevMan) for meta-analysis with the results presented in written and graphical forms. RESULTS One-hundred-and-two quasi-experimental studies, with 666,615 children are included in this review. The 'Risk of bias' analysis indicates that the evidence base contains studies with unclear risk for selection bias, performance bias, detection bias, reporting bias, and attrition bias, with the highest risk associated with selection bias and the lowest associated with reporting bias. The outcome data suggest that children in kinship foster care experience fewer behavioural problems (standardised mean difference effect size -0.33, 95% confidence interval (CI) -0.49 to -0.17), fewer mental health disorders (odds ratio (OR) 0.51, 95% CI 0.42 to 0.62), better well-being (OR 0.50, 95% CI 0.38 to 0.64), and less placement disruption (OR 0.52, 95% CI 0.40 to 0.69) than do children in non-kinship foster care. For permanency, there was no difference on reunification rates, although children in non-kinship foster care were more likely to be adopted (OR 2.52, 95% CI 1.42 to 4.49), while children in kinship foster care were more likely to be in guardianship (OR 0.26, 95% CI 0.17 to 0.40). Lastly, children in non-kinship foster care were more likely to utilise mental health services (OR 1.79, 95% CI 1.35 to 2.37). AUTHORS' CONCLUSIONS This review supports the practice of treating kinship care as a viable out-of-home placement option for children removed from the home for maltreatment. However, this conclusion is tempered by the pronounced methodological and design weaknesses of the included studies.

Details: Oslo: The Campbell Collaboration, 2014. 292p.

Source: Internet Resource: Campbell Systematic Review 2014:2: Accessed May 5, 2014 at: http://www.campbellcollaboration.org/lib/project/51/

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 132244


Author: Holt, Thomas J.

Title: Examining the Structure, Organization, and Processes of the International Market for Stolen Data

Summary: Over the last two decades, consumers have come to depend on computers and the Internet to engage in commerce and manage their finances. Businesses also rely on these technologies in order to process and maintain consumer data in massive databases. As a result, there has been a substantial increase in the risk of theft and fraud stemming from cybercriminals who can compromise these resources to their advantage. Recent evidence suggests that hackers who acquire sensitive consumer data sell this information to others in on-line forums for a profit. In turn, an underground economy has developed around the sale of stolen data, involving various resources that can be used to convert electronic data into real world currency and engage in various forms of cybercrime. There is, however, generally little research on the economics of these markets, or the distribution of goods sold. There is also minimal research on the social organization of market actors and the network structures present that support the stolen data market generally. To address these questions, this study utilizes a sample of 1,899 threads generated from 13 web forums, 10 of which use Russian as their primary language and three which use English. These forums were hosted around the world, and act as online advertising spaces for individuals to sell and buy a range of products. The content of these forums were downloaded and translated from Russian to English to create a purposive, yet convenient sample of threads from each forum. Qualitative content analyses were conducted to code the products and quantitative assessments demonstrate that the majority of products sold in these forums were some form of stolen data (84.3%). The majority of sellers offered dumps, referring to bank account or credit card data (44.7%), as well as CVV data from credit cards (34.9%) and various forms of electronic data, such as eBay and PayPal accounts (1.4%). A number of sellers also offered resources to obtain currency from these accounts on or off-line (7.4%), and a small proportion sold malware and tools to engender cybercrimes. Products had a range of advertised prices, and the majority of stolen data came from the United States and Europe. These pricing structures were directly influenced by market forces, with differences evident in more legitimate forums with a higher degree of trust between participants. A qualitative analysis was employed using grounded theory techniques and aspects of Best and Luckenbill's (1994) framework of deviant organization to examine the associations and working relationships present between participants at the micro and macro-level. The findings suggest that the markets are primarily collegial in nature at the individual level, enabling individuals to work together in order to facilitate transactions. There is also a distinct division of labor between participants on the basis of the products sold and skill sets available. At the macro-level, eight of the forums appear to operate as formal organizations based on managerial structures and long-term operations relative to other forms of on-line criminality. Finally, quantitative social network analysis techniques were applied to explore the network structures present between participants within the forums in this sample. The density of the various networks were generally low, but the majority of networks had over 50 percent of users connected. Sellers were the most central actors, though buyers and neutral users posted more frequently and were critical to the facilitation of information sharing and communication of user reputation. In addition, there was a high correlation between the number of posts and the number of users in each forum. As a result, these networks appear to have substantive redundancies that make them difficult to disrupt through traditional external means of node removal.

Details: Unpublished report to the U.S. National Institute of Justice, 2014. 156p.

Source: Internet Resource: Accessed May 5, 2014 at: https://www.ncjrs.gov/pdffiles1/nij/grants/245375.pdf

Year: 2014

Country: International

Keywords: Computer Crime

Shelf Number: 132000


Author: International Labour Office (ILO), Special Action Programme to Combat Forced Labour

Title: Hard to See, Harder to Count: Survey Guidelines to Estimate Forced Labour of Adults and Children

Summary: ILO global estimates on child and forced labour have focused a spotlight on these persistent and severe violations of the human rights of children and adults. The magnitude of forced labour, estimated to affect at least 20.9 million people, of whom about a quarter are children, has served to demonstrate the urgency of action to address the needs of these most vulnerable workers, and prevent others from falling prey to such exploitation. But the estimates have also highlighted the critical need for sound statistics at national level. Criminal phenomena such as forced labour present obvious measurement challenges; conventional survey instruments are often ill-equipped to capture those child and adult workers concealed in hidden workshops, or toiling in fields under a burden of debt. Human trafficking can also be regarded as forced labour, and these guidelines can be used to measure the full spectrum of human trafficking abuses or what some people call "modern-day slavery". The only exceptions to this are cases of trafficking for organ removal, forced marriage or adoption, unless the latter practices result in forced labour. Action to address child labour and forced labour lies at the heart of the ILO's decent work agenda, guided by ILO standards on these subjects. The International Programme on the Elimination of Child Labour (IPEC) has, since 1992, worked to eradicate child labour in all parts of the world. In 1998, ILO member States adopted the Declaration on Fundamental Principles and Rights at Work, thereby committing themselves to respect, promote and realise freedom of association and the right to collective bargaining, and the elimination of forced labour, child labour and discrimination at work. The International Labour Office, for its part, committed itself to assist member States in their efforts. Shortly thereafter, the Programme to Promote the Declaration was established and, in 2001, a Special Action Programme to combat Forced Labour (SAP-FL) was created as part of this programme. In recent years, IPEC and SAP-FL have invested considerable effort and resources in devising and testing survey methodologies for application at country level, to allow robust national estimation of the number of adults and children in forced labour, and deeper insights into the causes and nature of these problems. This work has represented a real and rewarding collaborative effort between the ILO and the various national institutions (national statistical offices and others) which partnered with ILO for implementing the national surveys.

Details: Geneva: ILO, 2012. 122p.

Source: Internet Resource: Accessed May 6, 2014 at: http://www.aihr-resourcescenter.org/administrator/upload/documents/hard.pdf

Year: 2012

Country: International

Keywords: Child Labor

Shelf Number: 132251


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Study on Homicide 2013: Trends, Contexts, Data

Summary: The Global Study on Homicide 2013 seeks to shed light on the worst of crimes - the intentional killing of one human being by another. Beyond resulting in the deaths of nearly half a million people in 2012, this form of violent crime has a broad impact on security - and the perception of security - across all societies. This study, which builds on the ground-breaking work of UNODC's first Global Study on Homicide in 2011, is particularly timely as the international community is engaged in defining the post-2015 development agenda. As United Nations Secretary-General Ban Ki-Moon has made clear, development progress cannot be achieved or sustained amid violence, insecurity and injustice. By improving understanding of the underlying patterns and trends related to different forms, settings and risk factors of homicide at the global, regional, national and sub-national levels, this study can be a strategic tool in supporting governments' efforts to address root causes and enhance criminal justice responses. Alongside intentional homicide related to other criminal activities and socio-political agendas, the study examines homicide related to interpersonal conflict, which includes homicides perpetrated by intimate partners or family members. Unlike other forms of homicide, which vary significantly across regions and from year to year, intimate partner and family-related homicide remains persistent and prevalent. While the vast majority of global homicide victims are men, it is overwhelmingly women who die at the hands of their intimate partners or family members. Normative standards for improving criminal justice responses to eliminate violence against women have been agreed by all United Nations Member States; clearly more must be done to improve States' capacities to effectively prevent, investigate, prosecute and punish all forms of violence against women. With regard to different settings in which lethal violence occurs, the study indicates that homicide and violence in countries emerging from conflict can become concurrent contributors to instability and insecurity. If we want to build peace, interventions must address not only the conflict itself but also surges in homicide resulting from organized crime and interpersonal violence, which can flourish in settings with weak rule of law. Specific risk factors such as alcohol and drug use and the availability of weapons are also examined in the study in order to improve understanding of how they shape patterns and prevalence of lethal violence. Deeper understanding of these enablers can inform and enhance policies aimed at preventing intentional homicides from happening in the first place. Ultimately, efforts to prevent unlawful homicide will not be effective unless governments and the international community address those who are most at risk, of both offending or becoming a victim of homicide. More than half of all global homicide victims are under 30 years of age. Much of this violence takes place in urban areas. Effective policies and strategies must not only target at-risk young people but involve them and local communities to work together to break the cycle of violence.

Details: Vienna: UNODC, 2014. 155p.

Source: Internet Resource: Accessed May 6, 2014 at: http://www.unodc.org/documents/gsh/pdfs/2014_GLOBAL_HOMICIDE_BOOK_web.pdf

Year: 2014

Country: International

Keywords: Alcohol Related Crime, Disorder

Shelf Number: 132257


Author: Christin, Nicolas

Title: Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace

Summary: We perform a comprehensive measurement analysis of Silk Road,an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight months between the end of 2011 and 2012, including daily crawls of the marketplace for nearly six months in 2012. We obtain a detailed picture of the type of goods sold on Silk Road, and of the revenues made both by sellers and Silk Road operators. Through examining over 24,400 separate items sold on the site, we show that Silk Road is overwhelmingly used as a market for controlled substances and narcotics, and that most items sold are available for less than three weeks. The majority of sellers disappears within roughly three months of their arrival, but a core of 112 sellers has been present throughout our measurement interval. We evaluate the total revenue made by all sellers, from public listings, to slightly over USD 1.2 million per month; this corresponds to about USD 92,000 per month in commissions for the Silk Road operators. We further show that the marketplace has been operating steadily, with daily sales and number of sellers overall increasing over our measurement interval. We discuss economic and policy implications of our analysis and results, including ethical considerations for future research in this area.

Details: Pittsburgh, PA: CyLab, Carnegie Mellon University, 2012. 11p.

Source: Internet Resource: Accessed May 7, 2014 at: http://www.andrew.cmu.edu/user/nicolasc/publications/Christin-WWW13.pdf

Year: 2012

Country: International

Keywords: Computer Crime

Shelf Number: 132262


Author: LSE Expert Group on the Economics of Drug Policy

Title: Ending the Drug Wars

Summary: A major rethink of international drug policies is under way. The failure of the UN to achieve its goal of 'a drug free world' and the continuation of enormous collateral damage from excessively militarised and enforcement-led drug policies, has led to growing calls for an end to the 'war on drugs'. For decades the UN-centred drug control system has sought to enforce a uniform set of prohibitionist oriented policies often at the expense of other, arguably more effective policies that incorporate broad frameworks of public health and illicit market management. Now the consensus that underpinned this system is breaking apart and there is a new trajectory towards accepting global policy pluralism and that different policies will work for different countries and regions. The question, however, remains, how do states work together to improve global drug policies? This report highlights two approaches. First, drastically reallocating resources away from counterproductive and damaging policies towards proven public health policies. Second, pursuing rigorously monitored policy and regulatory experimentation.

Details: London: LSE (London School of Economics) Expert Group on the Economics of Drug Policy, 2014. 84p.

Source: Internet Resource: http://www.lse.ac.uk/IDEAS/publications/reports/pdf/EndingDrugWarsFINAL.pdf

Year: 2014

Country: International

Keywords: Drug Control

Shelf Number: 132283


Author: Environmental Investigation Agency

Title: In Cold Blood: Combating Organised Wildlife Crime

Summary: The Environmental Investigation Agency (EIA) has been documenting and analyzing environmental crimes and abuses that impact our natural world for three decades. The objective has been to motivate governments to implement and enforce policies, laws and practices to protect species and habitats threatened by trade and unsustainable exploitation. EIA's modus operandi includes undercover investigations into the criminals perpetrating these crimes. In the 1980s, EIA documented the role of the Poon family, a sophisticated and organised transnational criminal network engaged in trafficking ivory from Africa, via the Middle East to east Asia. Over a decade later, EIA's analysis of individuals and companies implicated in the seizure of more than seven tonnes of ivory in Singapore in 2002 revealed that members of the Poon network were still involved in the illegal ivory trade. To this day, none of the key players involved in the 2002 seizure have been prosecuted. A lack of effective enforcement to disrupt the international syndicates involved in wildlife crime is a common and persistent problem. This is often due to a lack of investment and commitment from the highest levels of government to deliver a proactive, multi-agency, targeted and effective response. The current unprecedented level of political attention given to wildlife crime represents a crucial opportunity to turn previous commitments to combat organised wildlife crime into action. The international community must now ensure that the rule of law is fully applied to wildlife crime, and that enforcement techniques honed in other areas of serious crime are used to dismantle wildlife trafficking syndicates. This report features case studies that illustrate the successes and shortcomings in efforts to disrupt criminal networks, prosecute criminal masterminds and confiscate the proceeds of wildlife crime. The role of serious and organized criminal networks in wildlife crime is not an overnight phenomenon, but in the face of chronic government failure to treat it seriously, networks have persisted and prospered. Yet there are also examples where enforcement has been effective. Many frontline officers take great risks to curb wildlife poaching and smuggling. Specialised agencies and international organisations are yielding results. This dedication must be backed by political commitment to turn the tide against the current escalation of wildlife crime. Now is the time for enforcement, not extinction.

Details: London: EIA, 2014. 24p.

Source: Internet Resource: Accessed May 7, 2014 at: http://eia-international.org/wp-content/uploads/EIA-In-Cold-Blood-FINAL.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 132284


Author: American University. Washington College of Law. Center for Human Rights and Humanitarian Law

Title: Torture in Healthcare Settings: Reflections on the Special Rapporteur on Torture's 2013 Thematic Report

Summary: xiii Foreword As part of its mission to create new tools and strategies for the creative advancement of international human rights norms, in 2012, the Center for Human Rights & Humanitarian Law at American University Washington College of Law and WCL Visiting Professor Juan E. Mendez, created The Anti-Torture Initiative (ATI). The ATI supports the mandate of the United Nations Special Rapporteur on torture and other cruel, inhuman and degrading treatment or punishment (SRT), a position which Professor Mendez holds. The ATI monitors and assesses the implementation of the SRT's country-specific and thematic recommendations, develops effective follow-up models for expanded implementation for SRT recommendations, and supports the creative advancement of the SRT mandate to end torture worldwide. The publication of this volume, Torture in Healthcare Settings: Reflections on the Special Rapporteur on Torture's 2013 Thematic Report, is one such creative model. It is a first-of-its-kind compilation, which seeks to follow-up and expand upon a thematic report by the SRT. The volume asks a wide variety of stakeholders and thought-leaders to reflect on the SRT's 2013 report on Torture and Ill-Treatment in Health Care Settings (A/HRC/22/53), and to provide a critique and analysis to help promote discussion of the myriad of important issues raised in the report.

Details: Washington, DC: Center for Human Rights & Humanitarian Law, 2014. 346p.

Source: Internet Resource: Accessed May 8, 2014 at: http://antitorture.org/wp-content/uploads/2014/03/PDF_Torture_in_Healthcare_Publication.pdf

Year: 2014

Country: International

Keywords: Health Care

Shelf Number: 132286


Author: Samani, Raj

Title: Digital Laundry: An analysis of online currencies, and their use in cybercrime

Summary: The European Central Bank (ECB) points out notable differences between virtual currency and electronic money schemes. Electronic money uses a traditional unit of currency and is regulated; virtual currencies are unregulated and use an invented currency. Virtual currencies offer a number of benefits to customers: They are reliable, relatively instant, and anonymous. Even when privacy issues have been raised with particular currencies (notably Bitcoin), the market has responded with extensions to provide greater anonymity. Market response is an important point because regardless of law enforcement actions against Liberty Reserve and e-gold, criminals quickly identify new platforms to launder their funds. As a platform grows in popularity, so too will attacks and subsequent law enforcement actions. We saw this recently with Liberty Reserve and e-gold, and the recent cyberattacks against Bitcoin. Increasing popularity also raises the attention of law enforcement officials. Despite such platforms establishing their operations in countries considered as "tax havens," its operators are still subject to investigation, and possibly arrest. This concern recently led to the Russian Foreign Ministry warning its citizens who suspect they may be arrested to avoid countries with extradition treaties with the United States. The warning cited the arrest of Liberty Reserve's founder as an example. Although money laundering and cyberattacks are the focus of this paper, electronic currencies also act as the main method of payment for illicit products such as drugs, as well as for other products and services that enable cybercrime. We discussed products and services in Cybercrime Exposed: Cybercrime-as-a-Service; we'll look at drugs in this paper when we discuss the Silk Road market. The Silk Road is the best known online drug market but it is only the tip of the iceberg, as there are numerous such marketplaces. Regardless of the level of scrutiny by regulators and law enforcement, criminals will continue to migrate activities to alternate platforms. They have done this with Liberty Reserve and e-gold, to name two examples; simply shutting down the leading platform will not solve the problem.

Details: Santa Clara, CA: McAfee, 2013. 17p.

Source: Internet Resource: Accessed May 10, 2014 at: http://www.mcafee.com/us/resources/white-papers/wp-digital-laundry.pdf

Year: 2013

Country: International

Keywords: Cybercrime

Shelf Number: 132315


Author: Child Rights International Network

Title: Child Sexual abuse and the Holy See: The Need for Justice, Accountability and Reform. A Preliminary Report

Summary: The UN Committee on the Rights of the Child is seeking detailed information on sexual violence against children by Catholic clergy around the world, its cover up within the Church and the denial of justice and compensation for victims. The scale of the abuse is huge, affecting countless victims around the world. The Holy See is up for review during the UN Committee on the Rights of the Child's (CRC) 65th session on 16 January 2014. In a formal communication with the Holy See in July 2013, the CRC, noting "the recognition by the Holy See of sexual violence against children committed by members of the clergy, brothers and nuns in numerous countries around the world, and given the scale of the abuses...", requested detailed information on all cases of child sexual abuse committed by members of the clergy, brothers and nuns or brought to the attention of the Holy See over the reporting but when the Holy See's response to the UN Committee was issued in December 2013,3 it did not provide the full disclosure sought by the Committee. Despite stating that it considers the Convention on the Rights of the Child as "the most important among the rules of international law", it declined to provide this information, stating that the matter did not fall within its jurisdiction and that it is "not the practice of the Holy See to disclose information on the religious discipline". At the heart of the CRC's review of the Holy See are the issues of transparency, access to justice for children and protection from violence - issues which CRIN believes are crucial to securing children's status as individuals with rights. This preliminary global research report maps the scale of child sexual abuse committed by clerics of the Catholic Church and evidence of cover up attempts by the Vatican and Church authorities. It provides an overview of litigation brought by victims of abuse against Catholic clergy seeking remedies for gross violations of their rights. Our aim is to press the Holy See to become more transparent as a State with human rights obligations, and to open it up to further and effective scrutiny by United Nations bodies. We sincerely hope the report will demonstrate solidarity with victims and help to ensure that their voices are heard and acted on by the United Nations as well as the Holy See itself.

Details: London: CRIN, 2014. 47p.

Source: Internet Resource: http://tbinternet.ohchr.org/Treaties/CAT/Shared%20Documents/VAT/INT_CAT_CSS_VAT_17113_E.pdf

Year: 2014

Country: International

Keywords: Catholic Church

Shelf Number: 104114


Author: World Health Organization

Title: Preventing Violence: Evaluating Outcomes of Parenting Programmes

Summary: Violence is both a serious human rights violation and a major public health concern. It affects the general well-being, physical and mental health, and social functioning of millions of people; it also puts strain on health systems, lowers economic productivity, and has a negative effect on economic and social development. In particular, the number of children affected by violence each year is a major concern. Child maltreatment affects children's physical, cognitive, emotional and social development. It can lead to the body's stress response system being overactive, which can harm the development of the brain and other organs, and increase the risk for stress-related illness and impaired cognition (the capacity to think, learn and understand). Maltreatment is a risk factor for mental health, education, employment and relationship problems later in life. It also increases the likelihood of behavior that is a risk to health, such as smoking, drinking heavily, drug use, over-eating and unsafe sex. These behaviours are, in turn, major causes of death, disease and disability, including heart disease, cancer, diabetes and suicide - sometimes decades later. Victims of maltreatment are also more likely to become perpetrators and victims of other types of violence later in life. Child maltreatment negatively affects a country's economy, due to expenses relating to treating victims' health problems, welfare costs, lowered economic productivity and so forth. In the United States of America (USA), in 2010, the lifetime cost for each victim of non-fatal child maltreatment was estimated to be US$ 210 012. The many serious economic, physical and mental health consequences of child maltreatment mean that it makes sense to develop and implement effective prevention strategies. Child maltreatment is more likely in families that have difficulties developing stable, warm and positive relationships. Children are at increased risk of being maltreated if a parent or guardian has a poor understanding of child development, and therefore has unrealistic expectations about the child's behaviour. This is also the case if parents and guardians do not show the child much care or affection, are less responsive to the child, have a harsh or inconsistent parenting style, and believe that corporal punishment (for example, smacking) is an acceptable form of discipline. Strengthening parenting therefore plays an important role in preventing child maltreatment. One way of strengthening parenting is through parenting programmes. Although many parenting programmes do not specifically aim to reduce or prevent violence, those which aim to strengthen positive relationships through play and praise, and provide effective, age-appropriate positive discipline, have the potential to do so. Parenting programmes to prevent violence usually take the shape of either individual or group-based parenting support. An example of individual parenting support is home visits, which involve trained home visitors visiting parents (typically only the mother) in their homes both during and after their pregnancy. The home visitor supports and educates parents so as to strengthen parenting skills, improve child health and prevent child maltreatment. Group-based parenting support, on the other hand, is typically provided by trained staff to groups of parents together. These programmes aim to prevent child maltreatment by improving parenting skills, increasing parents' understanding of child development and encouraging the use of positive discipline strategies. Most parenting programmes that have proven to be effective at preventing violence have been developed and tested in high-income countries such as the USA and the United Kingdom. There is very little work on parenting programmes in lowand middle-income countries. However, there is evidence from low-resource settings that positive parent-child relationships and a positive parenting style can buffer the effects of family and community influences on children's development, including violent behaviour later in life. From what is already known, there is good evidence to support promoting parenting programmes across different cultural and economic backgrounds. Because we do not know enough about parenting programmes in low- and middle-income countries, evaluations of programmes are critical. First, we need to confirm that desired results are achieved in new contexts. Second, because of the lack of resources available to fund programmes in poorer countries, evaluations can prevent time and money from being wasted on programmes that do not work. Third, the results from outcome evaluations can be used to influence governments to fund parenting programmes. This document was designed to help strengthen the evidence for parenting programmes aimed at preventing violence in low- and middle-income countries. The intended audiences are: - policy-makers; - programme developers, planners and commissioners; - high-level practitioners in government ministries, such as health and social development; - nongovernmental organisations; - community-based organisations; and - donors working in the area of violence prevention.

Details: Geneva, SWIT: World Health Organization, 2013. 32p.

Source: Internet Resource: Accessed May 14, 2014 at: http://apps.who.int/iris/bitstream/10665/85994/1/9789241505956_eng.pdf?ua=1

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 104859


Author: International Consortium of Investigative Journalists

Title: Tobacco Underground: The Global Trade in Smuggled Cigarettes

Summary: Tobacco Underground is a project of the International Consortium of Investigative Journalists. Working with reporters in more than a dozen countries, ICIJ is charting the frontlines of the illicit traffic in cigarettes. During 2000 and 2001, a team of reporters from the International Consortium of Investigative Journalists broke a series of landmark stories exposing how leading tobacco companies worked with criminal networks to smuggle cigarettes around the world. Relying on interviews with insiders and thousands of internal industry documents, the unique team - based in six countries - pieced together how smuggling played a key role in big tobacco's strategy to boost sales and increase market share. Those revelations, and others that followed, helped prompt lawsuits and government inquiries, and led to promises of a global crackdown on the illegal trade in tobacco.

Details: Washington, DC: International Consortium of Investigative Journalists, 2009. 190p.

Source: Internet Resource: Accessed May 15, 2014 at: http://cloudfront-9.icij.org/sites/icij/files/tobaccounderground_0.pdf

Year: 2009

Country: International

Keywords: Cigarette Smuggling

Shelf Number: 132375


Author: Collett, Elizabeth

Title: Trade-Offs in Immigration Enforcement

Summary: Unauthorized migrants - those without a legal right of residence - live in all modern industrialized countries. Beyond their responsibility to respond to the challenges of fast-paced, diverse migration patterns, it is vital that public and private sector institutions address the harms associated with illegal or unauthorized migration. Policymakers face significant constraints in addressing this population, including insufficient financial and human resources, and legal frameworks that protect individuals regardless of their residence status. This report, part of a Transatlantic Council on Migration series focused on migration "bad actors," argues that a successful migration enforcement regime is best defined as one that does limited (or zero) harm to a country's institutions of governance and to citizens' livelihoods, while fortifying public trust that the government is running an efficient and effective system. The report concludes that policymakers have two main policy options: to offer legal residence to unauthorized immigrants, or to identify them and seek to return or deport them to their country of origin. Yet return remains an incomplete policy option. Despite political and public distaste for the policy, regularization remains a frequently employed tool. The authors suggest that one of the key elements of success in this field may well be the recognition that success is not solely an enforcement approach, but one which takes the broad range of policy tools (including regularization) into account.

Details: Washington, DC: Migration Policy Institute, 2014. 17p.

Source: Internet Resource: Accessed May 17, 2014 at: http://www.migrationpolicy.org/research/trade-offs-immigration-enforcement

Year: 2014

Country: International

Keywords: Border Security

Shelf Number: 132386


Author: Krug, Anita

Title: Case Study Series: The impacts of drug policy on young people - Mauritius

Summary: Since the 1980s, Mauritius has experienced increasing levels of injecting drug use and has now one of highest per capita rates of illicit opiate use. Whilst Mauritius does have an established harm reduction response to drug use, young people who use drugs are denied access to these life-saving services and receive little support, leading to poor health outcomes and lost opportunities. Instead of supporting and protecting the health and well-being of young people who use drugs in Mauritius, drug policy has had a marginalising effect, both in the immediate and longer term. This case study looks at these issues, presenting information drawn from surveillance data, policies and experiences of both local service providers and young people who use drugs themselves. In light of the challenges that young people face, this paper concludes with a series of recommendations for policy reform.

Details: London: International Drug Policy Consortium, 2014. 7p.

Source: Internet Resource: Accessed June 4, 2014 at http://dl.dropboxusercontent.com/u/64663568/library/IDPC-Youth-RISE-drug-policy-case-study_Mauritius.pdf

Year: 2014

Country: International

Keywords: Drug Policy

Shelf Number: 132407


Author: Christin, Nicolas

Title: Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace

Summary: We perform a comprehensive measurement analysis of Silk Road, an anonymous, international online marketplace that operates as a Tor hidden service and uses Bitcoin as its exchange currency. We gather and analyze data over eight months between the end of 2011 and 2012, including daily crawls of the marketplace for nearly six months in 2012. We obtain a detailed picture of the type of goods sold on Silk Road, and of the revenues made both by sellers and Silk Road operators. Through examining over 24,400 separate items sold on the site, we show that Silk Road is overwhelmingly used as a market for controlled substances and narcotics, and that most items sold are available for less than three weeks. The majority of sellers disappears within roughly three months of their arrival, but a core of 112 sellers has been present throughout our measurement interval. We evaluate the total revenue made by all sellers, from public listings, to slightly over USD 1.2 million per month; this corresponds to about USD 92,000 per month in commissions for the Silk Road operators. We further show that the marketplace has been operating steadily, with daily sales and number of sellers overall increasing over our measurement interval. We discuss economic and policy implications of our analysis and results, including ethical considerations for future research in this area.

Details: Pittsburgh, PA: Carnegie Mellon University, CyLab, 2012. 26p.

Source: Internet Resource: Accessed June 4, 2014 at http://www.andrew.cmu.edu/user/nicolasc/publications/TR-CMU-CyLab-12-018.pdf

Year: 2012

Country: International

Keywords: Black Markets

Shelf Number: 132408


Author: Environmental Investigation Agency (EIA)

Title: Blood e-Commerce: Rakuten's profits from the slaughter of elephants and whales

Summary: The Rakuten Group, via its wholly owned Japanese subsidiary Rakuten Ichiba (www.rakuten.co.jp), is the world's largest online trader in elephant ivory and whale products. Rakuten Ichiba sells thousands of elephant ivory products, made from the tusks of African elephants that are currently being slaughtered at the rate of up to 50,000 a year in the worst ever poaching crisis. Hundreds of whale products, including endangered fin whale from Iceland and products from the whale and dolphin drive hunts in Taiji featured in the documentary The Cove, are also being sold on Rakuten Ichiba. It is the biggest known online retailer of elephant ivory and cetacean products in the world. The Rakuten Group, through Rakuten Ichiba, is directly responsible for these sales and is therefore directly profiting from the killing of elephants and whales. In recent years, international condemnation of Japan's whale and dolphin hunts, along with concerns about pollution and food safety, have led Japan's leading supermarket chains - AEON, Ito-Yokado, Seiyu and Uny - to prohibit the sale of whale or dolphin products in thousands of stores. Japan's leading seafood companies Maruha, Kyokuyo and Nippon Suisan have all ended the production of canned whale meat and other frozen whale products. Two major online retailers - Amazon and Google - have followed suit, stopping all sales or advertisements of whale, dolphin and ivory though their Japanese e-commerce sites. Rakuten must do the same. In June 2013, a search for 'whale meat' on www.rakuten.co.jp yielded 773 whale products for sale, while the broader term 'whale' generated over 1,200 food products. Many of these originated from baleen whales, namely fin, sei, minke and Bryde's whale, which are all protected species under the moratorium on commercial whaling established by the International Whaling Commission (IWC) since 1986. These species are also afforded the highest level of protection by the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES), which prohibits international trade. Despite this, a number of companies were selling endangered fin whale imported from Iceland. Many products were from toothed cetacean species (known as 'small cetaceans'), namely Baird's beaked whales and pilot whales. A further 14 products were not listed with a species name, contrary to the requirements of Japan's labelling laws. Some of the whale products sold by Rakuten Ichiba are highly polluted with mercury and pose a significant risk to the health of consumers. Scientists have documented mercury levels more than 1,000 times higher than the Government of Japan's safe advisory level in species caught in Japanese coastal waters. Nine whale products were purchased from Rakuten Ichiba in 2013 and tested for mercury. Eight of these exceeded the Japanese national limit for total mercury concentration of 0.4 parts per million (ppm), with one sample of pilot whale meat having a shocking mercury concentration of 9.5 ppm, more than 20 times higher than the Japanese regulatory limit. The average mercury level of the nine products was 4.2 ppm, more than 10 times higher than the regulatory limit. In February 2014, searches for 'ivory' on www.rakuten.co.jp yielded more than 28,000 ads for elephant ivory products, indicating that a significant demand for elephant ivory persists in Japan. Items found include name seals, jewellery, musical instruments, accessories and chopsticks. Over 95 percent of products available were name seals, or 'hankos', used by individuals and companies to sign documents with their signatures engraved into the ivory. Much of Japan's trade in ivory hankos is supported by illegal African elephant ivory - between 2005-10, illegal ivory accounted for up to 87 per cent of the ivory hankos produced in Japan. Japan also has a specific demand for 'hard ivory' from Central Africa's endangered forest elephants and there are many hard ivory products available for sale on Rakuten Ichiba. In response to devastating poaching levels in the 1980s, the international ban on elephant ivory trade went into effect after the 1989 CITES Appendix I listing of African elephants, leading to a dramatic reduction of elephant poaching across much of Africa as ivory prices plummeted. However, the ban was undermined when CITES later approved two international sales of African ivory, first to Japan in 1999 and then to Japan and China in 2008. Existing legal domestic markets in countries such as Japan continue to fuel the demand for ivory. Japan's domestic ivory controls have failed to comply with the requirements of CITES to effectively control the trade in ivory and prevent poached ivory from entering the domestic market. Large numbers of poached ivory tusks have been laundered into Japan's domestic market as a result. Africa's elephants are being rapidly wiped out by poaching to meet the escalating demand for trinkets made from their tusks. By listing ivory products for sale, Rakuten Ichiba is helping to stimulate the market for ivory products in Japan and perpetuate illegal ivory flows and the poaching of elephants. Prominent internet retailers such as Amazon, Google and eBay have banned the sale of elephant ivory on all their controlled sites, including their Japanese sites. The Rakuten Group should follow suit and become part of the solution rather than contributing to the poaching epidemic. As the Rakuten Group directly profits from Rakuten Ichiba's sale of elephant and whale products, it is responsible not only for facilitating the sale of products from endangered and protected species but also for allowing the sale of food products which are highly contaminated with mercury and a health threat to the people consuming them. The Environmental Investigation Agency (EIA) is calling on the Rakuten Group and its global affiliates and subsidiaries, including Rakuten Ichiba, to immediately enact a permanent ban on the sale of all elephant, whale and dolphin products.

Details: London: EIA, 2014. 16p.

Source: Internet Resource: Accessed June 4, 2014 at http://www.eia-international.org/wp-content/uploads/Blood-e-Commerce-FINAL.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 132409


Author: Roe, Dilys

Title: The elephant in the room: sustainable use in the illegal wildlife trade debate

Summary: Illegal transnational wildlife trade is currently attracting considerable international attention. This is partly due to conservation concerns but also to suggestions of links with organised crime and militant groups. The attention afforded to this issue is much needed and the various international initiatives that have emerged rightly take a multi-faceted approach. But they tend to emphasise law enforcement and demand reduction, with considerably less focus on effective incentives for community-based and private sector management. In particular, the role of sustainable use as a tool for both conservation and local development has generally been overlooked. Wildlife is one of the strongest assets for many rural communities, and depleting it through illegal trade removes potential income. But tackling illegal trade in ways that further restrict sustainable use can limit communities' options even more. Addressing wildlife crime effectively means developing approaches that protect wildlife for poor people not from poor people.

Details: London: International Institute for the Environment and Development, 2014. 4p.

Source: IIED Briefing: Internet Resource: Accessed June 4, 2014 at http://pubs.iied.org/pdfs/17205IIED.pdf

Year: 2014

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 132410


Author: Wiest, Julie B.

Title: Casting Cultural Monsters: Representations of Serial Killers in U.S. and U.K. News Media

Summary: Serial murder is deeply embedded in Western cultures, and serial killers are the subject of widespread coverage in news and entertainment media. Despite ample differences among serial murder cases and serial killers, most mass media portrayals of these cases tend to present two images: the serial killer as monster and the serial killer as celebrity. Media representations reveal much about a culture, and the use of extreme images like monsters and celebrities speak especially loudly. Yet, few researchers have explored cultural meanings embedded in representations of serial killers. Informed by theoretical arguments within cultural sociology and drawing on a qualitative content analysis of news articles published in the United States and the United Kingdom, this study explores news media representations of serial killers and uncovers links to broader cultural meanings. Although there are several similarities in the ways U.S. and U.K. news sources represent serial murder, important differences are evident. In particular, U.K. articles include more monster imagery and U.S. articles include more celebrity imagery. Implications and meanings behind these representations are discussed, especially as they reveal cultural values and beliefs.

Details: Oxford, UK: Conference Draft Paper, 12th Global Conference on Monsters and the Monstrous, 2014. 23p.

Source: Internet Resource: Accessed June 9, 2014 at http://www.inter-disciplinary.net/at-the-interface/wp-content/uploads/2014/05/wiestmonpaper1.pdf

Year: 2014

Country: International

Keywords: Crime and Media

Shelf Number: 132421


Author: Environmental Investigation Agency (EIA)

Title: Routes of Extinction: The corruption and violence destroying Siamese rosewood in the Mekong

Summary: This is a tragic true story of high culture, peerless art forms, and a rich historical identity being warped by greed and obsession, which consumes its very foundations to extinction and sparks a violent crime wave across Asian forests. It is a stark warning to the range states of the Mekong region that the redwoods of Asia are under assault with violent social and environmental consequences. It starts in one of dozens of glitzy malls across mainland China, where an aspiring collector admires swathes of shops selling elaborately carved wooden furniture and artworks, each valued at hundreds of thousands of dollars. In the lobby of a five-star hotel in high-rise Singapore, a wily and animated timber trader laughs while explaining how he bribes senior officials of the Lao government to access stocks of illegal precious woods seized by officials. In Pakse, Laos, bordering Thailand, a niece of the head of the local military command profits from sales of illegal precious timbers seized by the military. She knows the paperwork from the corrupted sale will launder five times more illegal wood. In Dong Ky, near Hanoi, Vietnam, a reported triad leader stacks cash into a bag while explaining timber smuggling routes across the land border into China, and advises that his operations are protected by border officials on the pay roll. In Shenzhen, China, a logistics broker offers official Lao government export permits illegitimately in his possession to legitimise illegal wood stolen from Laos and facilitate its entry into mainland China from Hong Kong, violating an international treaty decision designed to prevent the extinction of the wood species concerned. In Thailand, yet another Cambodian logger is killed in a firefight with forest rangers. The following week a Thai forest ranger is killed by armed loggers in a nearby national park. Meanwhile, a well-connected commodities trader offers access to hundreds of containers of seized timber held in Bangkok ports for US$50 million. Welcome to the corrupt and bloody illegal Siamese rosewood trade, born out of China's growing obsession with "Hongmu". Over the past ten years, demand in China for luxury reproduction wood furniture and cultural artworks rooted in Ming and Qing dynastic aesthetics has soared. The increasing rarity of the timbers involved has led to dramatic price rises, exacerbated by a flood of hot investment money. With rare timbers already threatened with commercial, if not biological, extinction, laws put in place to protect Siamese rosewood (Dalbergia cochinchinensis) have been swept away by corruption, driven by the huge financial incentives offered by timber traders supplying the Chinese market. In March 2013, the world agreed to protect Siamese rosewood from unsustainable and illegal trade under the Convention on International Trade in Endangered Species (CITES). This report details the findings of EIA's investigations into the Siamese rosewood trade in recent years, including in the year since the CITES listing. It reveals how crime, corruption, and ill-conceived government policies from Thailand to China, via Laos and Vietnam, are likely to result in the demise of Siamese rosewood in the coming years, unless significant and rapid reforms are made. It also reveals weaknesses in the CITES listing that fundamentally undermine the application of the treaty to Siamese rosewood, and doubtless other species. While responsibility lies with countries in which the tree grows (Thailand, Laos, Vietnam and Cambodia), it is the state-supported commodification and commercialisation of China's rich Hongmu cultural heritage that has provided all the money, and China is where all the timber has gone. EIA's findings also show how Siamese rosewood is now all but gone, and as a result attention is now being focused on other precious replacement species. Unless governments respond strongly to the crimes outlined in this report, the "redwoods" of Asia will follow Siamese rosewood along the route to extinction.

Details: London: Environmental Investigation Agency, 2014. 28p.

Source: http://eia-international.org/wp-content/uploads/Routes-of-Extinction-FINAL-lo-res.pdf

Year: 2014

Country: International

Keywords: CITES

Shelf Number: 132439


Author: Witchcraft and Human Rights Information Network (WHRIN)

Title: 21st Century Witchcraft Accusations & Persecution - 2013 Global Report

Summary: In many countries throughout the world, being accused of witchcraft, black magic or other forms of evil, can result in serious violations of human rights including, at the most extreme, torture and death. Women, children, the disabled and the elderly are particularly vulnerable to these forms of abuse. This is still a world-wide phenomenon that remains largely unrecognised: The extent and distribution of it is largely unknown and, as yet, no formal mechanism exists to record, monitor or respond to such violations. To establish an idea of the global spread of the various spiritual beliefs that result in violations of human rights, WHRIN monitored online media reports in 2013 of cases of abuse and the interventions that have been carried out by governments, Non-Governmental Organisations (NGOs) and human rights activists. This report may represent the first systematic attempt to assess the scale of the problem worldwide and responses to it.

Details: Thurnham, UK: Witchcraft and Human Rights Information Network,2014. 12p.

Source: Internet Resource: Accessed June 12, 2014 at http://www.whrin.org/wp-content/uploads/2014/03/WHRIN-UN-report_small-FINAL.pdf

Year: 2013

Country: International

Keywords: Human Rights Abuses

Shelf Number: 132446


Author: University of Paris 1 Pantheon-Sorbonne

Title: Protecting the Integrity of Sport Competition: The Last Bet for Modern Sport

Summary: The University Paris 1 Pantheon-Sorbonne and the International Centre for Sport Security (ICSS) today released the ground-breaking results of a two-year research programme into sport corruption. It includes startling figures on the scale and scope of the sport-betting market, which is identified as the primary purpose for match-fixing. The report also provides detailed analysis of current efforts to combat corruption and presents guiding principles including practical steps that can be taken by sport, governments and betting. According to the Sorbonne-ICSS Report - 'Protecting the Integrity of Sport Competition: The Last Bet for Modern Sport' - the manipulation of sport competition and betting threatens all countries and regions, with football and cricket the sports most under siege. Other sports affected include: tennis, basketball, badminton and motor racing. The report states that the most manipulated competitions are at a national level but highlights that the 'fixing' of competition and betting is instigated at a transnational level. Size of sport betting market The report shows that manipulation takes place in the context of a growing sports economy, which now accounts for 2% of the global GDP, with a transnational sports-betting market of estimated wagers worth between $200 - 500 billion, more than 80% of which is illegal. The findings reveal: - Asia and Europe represents 85% of the total legal and illegal market - Europe makes up 49% of the legal market, whilst Asia makes up 53% of the illegal market - Legal sports betting currently delivers only $4 billion of official tax revenues for countries - More than 8,000 legal operators offer sports betting - 80% are in territories with a low rate of tax and few inspections. - The number of illegal operators is impossible even to estimate The advent of the internet has led to an unprecedented expansion of sport betting offers, with online betting now representing 30% of the global market. The sports betting market has been transformed into a multi-billion dollar industry with betting exchanges, live betting, betting on more low-profile events and derivative betting formulas, as well as higher return rates for bettors. Significantly though, the evolution of the betting regulatory models hasn't kept up, with authorities often ill-equipped to deal with the illegal and under-regulated betting, together with the related issues of manipulation and money laundering.

Details: Dohar, Qatar: International Centre for Sport Security, 2014. 129p.

Source: Internet Resource: Accessed June 14, 2014 at: http://www.theicss.org/sport-integrity-forum/

Year: 2014

Country: International

Keywords: Corruption

Shelf Number: 132453


Author: Holmes, Erin

Title: The Problem of Youth Drugged Driving and Approaches to Prevention: A Systematic Literature Review

Summary: Concern about the frequency of drugged driving among youth is high, as the combination of impairment and lack of driving experience increases their risk relative to other age groups of being involved in a collision. Even when they are not impaired by alcohol or drugs, 16- to 19-year-olds have a fatal crash rate more than four times as high as that of drivers aged 25-34 and nine times as high as drivers aged 45-54 (Mayhew, Simpson & Singhal, 2005). Cannabis use and driving, in particular, is a problem among youth, as cannabis is the drug most commonly found in young drivers who are fatally injured in crashes (Asbridge, Poulin & Donato, 2005; Beasley, Beirness & Porath-Waller, 2011). To reduce the occurrence of drugged driving among youth, targeted prevention efforts are needed to educate, raise awareness, change attitudes and alter behaviour. This report systematically reviews the literature on prevention initiatives and approaches aimed at reducing drugged driving among youth and to determine their effectiveness. The findings from this review will help to inform the development of future drugged driving prevention initiatives specific to a youth audience. Methods Researchers conducted a systematic search of literature from a number of databases. They identified, screened and included as evidence relevant studies that evaluated interventions directed to youth to prevent drugged driving. Of the 106 studies the researchers identified, they included nine studies for analysis. The researchers also conducted an environmental scan of drugged driving prevention programs and campaigns internationally. In addition to online searches, they reached out to road safety and drug policy experts to inquire about the availability of these types of programs and campaigns. Key Findings The available body of youth drugged driving prevention literature is limited and outdated, which makes it difficult to offer conclusive findings as to the effectiveness of initiatives or their features. However, the evidence included in this systematic review does highlight four program models and three awareness campaigns that have proven to be promising in altering youth attitudes and perceptions about drug use and driving. Some evidence shows that education and prevention programs have a positive impact on increasing knowledge and altering youth perceptions about risky behaviours such as drugged driving. The evidence on media and awareness campaigns is weaker, although it does suggest that the messaging reaches its target audience and increases awareness. However, insufficient evidence exists at this time to indicate that these approaches are effective in changing behaviour. The programs in the studies use different models with various theoretical underpinnings, structures, delivery mechanisms and content. However, some common features among these initiatives appear promising and can be considered for future interventions: - Specific approaches, such as encouraging youth to examine their attitudes, think critically, make responsible choices and communicate, could create opportunities for empowerment. - The teaching of coping skills, life skills and peer pressure resistance strategies, as well as having youth assume leadership roles, could build self-esteem. - The involvement of parents and engagement of the community could expand the outreach and impact of prevention initiatives. Data about the prevalence and characteristics of the problem suggest a need to develop and deliver drugged driving prevention initiatives targeted to a youth audience. To better inform these efforts, more research is required to determine the effectiveness of existing programs and campaigns, and to establish agreed-upon best practices. Conclusions This systematic review identifies several prevention programs and awareness campaigns that increased participant knowledge and altered youth perceptions about drugged driving. While definitive conclusions about the impact of these programs and campaigns on behaviour cannot be drawn because of the limited body of literature, the review does identify promising prevention strategies that affected knowledge and changed attitudes in this area. Prevention initiatives should consider approaches that include teaching specific skills and critical, reflective thinking about decisions. The involvement of parents and engagement of the community could expand the outreach and impact of prevention initiatives.

Details: Ottawa, ON: Canadian Centre on Substance Abuse, 2014. 42p.

Source: Internet Resource: Technical Report: Accessed June 14, 2014 at: http://www.ccsa.ca/Resource%20Library/CCSA-Youth-Drugged-Driving-technical-report-2014-en.pdf

Year: 2014

Country: International

Keywords: Driving Under the Influence

Shelf Number: 132456


Author: Whittington, R.

Title: A Systematic Review of Risk Assessment Strategies for Populations at High Risk of Engaging in Violent Behaviour: Update 2002-8

Summary: This review systematically examines the research literature published in the period 2002-8 on structured violence risk assessment instruments designed for use in mental health services or the criminal justice system. Violence is a major social problem and improved assessment of those who present an above-average risk is an important goal in the overall strategy for addressing the issue. Techniques for formally assessing individual and social risk factors have developed rapidly over the past two decades from a process of unstructured clinical judgement to one of structured assessment based on empirically tested instruments. A vast number of structured risk assessment instruments relating to violence in different populations have been developed over this period and attempts have been made elsewhere to summarise aspects of the literature relating to various instruments. This review adopted much broader inclusion criteria than previously used in order to capture and summarise data on the widest possible range of available instruments. Objectives The objectives of the review were to address two questions: (1) what features (i.e. population, instrument, outcome measure and design aspects) are associated with a risk assessment instrument score being significantly associated with a violent outcome? and (2) which risk assessment instruments have the highest level of predictive validity for a violent outcome?

Details: London: National Institute for Health Research, 2013. 146p.

Source: Internet Resource: Health Technology Assessment, Vol. 17, Issue 50: Accessed June 14, 2014 at: http://www.journalslibrary.nihr.ac.uk/__data/assets/pdf_file/0006/87108/FullReport-hta17500.pdf

Year: 2013

Country: International

Keywords: Crime Prevention

Shelf Number: 132459


Author: Enggist, Stefan

Title: Prisons and Health

Summary: This book outlines important suggestions by international experts to improve the health of people in prison and to reduce the risks posed by imprisonment to both health and society. In particular, it aims to facilitate better prison health practices in the fields of: -human rights and medical ethics; -communicable diseases; -noncommunicable diseases; -oral health; -risk factors; -vulnerable groups; and -prison health management. It is aimed at professional staff at all levels of responsibility for the health and well-being of detainees and at people with political responsibility. The term "prison" covers all institutions in which a state holds people deprived of their liberty.

Details: Copenhagen: World Health Organization, Regional Office for Europe, 2014. 189p.

Source: Internet Resource: Accessed June 16, 2014 at: http://www.euro.who.int/__data/assets/pdf_file/0005/249188/Prisons-and-Health.pdf?ua=1

Year: 2014

Country: International

Keywords: Health Care

Shelf Number: 132461


Author: Center for Strategic and International Studies

Title: Net Losses: Estimating the Global Cost of Cybercrime. Economic Impact of Cybercrime II

Summary: Putting a number on the cost of cybercrime and cyber-espionage is the headline, but the dollar figure begs important questions about the damage to the victims from the cumulative effect of losses in cyberspace. The cost of cybercrime includes the effect of hundreds of millions of people having their personal information stolen-incidents in the last year include more than 40 million people in the US, 54 million in Turkey, 20 million in Korea, 16 million in Germany, and more than 20 million in China. One estimate puts the total at more than 800 million individual records in 2013. This alone could cost as much as $160 billion per year. Criminals still have difficulty turning stolen data into financial gain, but the constant stream of news contributes to a growing sense that cybercrime is out of control. For developed countries, cybercrime has serious implications for employment. The effect of cybercrime is to shift employment away from jobs that create the most value. Even small changes in GDP can affect employment. In the United States alone, studies of how employment varies with export growth suggest that the losses from cybercrime could cost as many as 200,000 American jobs, roughly a third of 1% decrease in employment for the US. Using European Union data, which found that 16.7 workers were employed per million Euros in exports to the rest of the world,6 Europe could lose as many as 150,000 jobs due to cybercrime (adjusting for national differences in IP-intensive jobs), or about 0.6% of the total unemployed. These are not always a "net" loss if workers displaced by cyberespionage find other jobs, but if these jobs do not pay as well or better. If lost jobs are in manufacturing (and "the main engine for job creation") or other high-paying sectors, the effect of cybercrime is to shift workers from high-paying to low-paying jobs or unemployment. While translating cybercrime losses directly into job losses is not easy, the employment effect cannot be ignored. The most important cost of cybercrime, however, comes from its damage to company performance and to national economies. Cybercrime damages trade, competitiveness, innovation, and global economic growth. What cybercrime means for the world is: - The cost of cybercrime will continue to increase as more business functions move online and as more companies and consumers around the world connect to the Internet. - Losses from the theft of intellectual property will also increase as acquiring countries improve their ability to make use of it to manufacture competing goods. - Cybercrime is a tax on innovation and slows the pace of global innovation by reducing the rate of return to innovators and investors. - Governments need to begin serious, systematic effort to collect and publish data on cybercrime to help countries and companies make better choices about risk and policy.

Details: Santa Clara, CA: Intel Security, McAffee, 2016. 24p.

Source: Internet Resource: Accessed June 18, 2014 at: http://www.mcafee.com/hk/resources/reports/rp-economic-impact-cybercrime2.pdf

Year: 2014

Country: International

Keywords: Computer Crime

Shelf Number: 132501


Author: Turner, Shelley

Title: Case Management with Women Offenders: Literature Review

Summary: This literature review relates to case management in community corrections with women offenders. The review summarises research outcomes about best practice principles for the management of women offenders under community corrections supervision. The review also examines the outcomes of evaluations of case management as a supervisory and rehabilitative mechanism. The central purpose of the review is to inform a Dedicated Women's Case Management pilot project conducted by Corrections Victoria, which involves using specialist case managers for women offenders, assessed as being at medium to high risk of re-offending or with multiple and complex needs. The review examines international and Australian literature on effective practice and 'what works' with offenders and, in particular women offenders, to reduce recidivism, as well as international and Australian literature on case management approaches in community corrections, with particular reference to those designed for women offenders.

Details: Melbourne: Department of Justice - Corrections Victoria, 2010. 51p.

Source: Internet Resource: Accessed June 19, 2014 at: http://www.corrections.vic.gov.au/utility/publications+manuals+and+statistics/literature+review+on+case+management+with+women+offenders

Year: 2010

Country: International

Keywords: Case Management

Shelf Number: 132510


Author: American Civil Liberties Union

Title: Victims of Complacency: The Ongoing Trafficking and Abuse of Third Country Nationals

Summary: This report examines the ongoing trafficking and abuse of Third Country Nationals ("TCNs"), tens of thousands of whom are hired yearly through U.S. Government ("USG") contracts to work in support of U.S. military and diplomatic missions in Iraq and Afghanistan. This large and diverse civilian workforce, or "army behind the army," hails primarily from developing countries such as Nepal, India, the Philippines, and Uganda, and performs low-wage but essential services, including construction, security, and food services. As a result of widely publicized incidents-such as the abduction and murder of twelve Nepali men whom Government contractors trafficked into Iraq in 2004 - the U.S. Government came under pressure to eliminate trafficking and labor abuses from the U.S. contracting industry. Although the Government then adopted a "zero-tolerance" policy against trafficking, reports of abuse continued to surface. In 2007, U.S. Government contractors trafficked a group of Fijian women to Iraq and subjected them to various forms of abuse and exploitation. In 2008, 1,000 South Asian workers staged protests on the outskirts of Baghdad after a Government subcontractor confined them to a windowless warehouse without money or work for as many as three months. Most recently, in December 2011, dozens of Ugandan TCNs held a series of rallies in Baghdad; their employer, a U.S.-based contractor, had left them stranded - with no pay and no return airfare - upon losing its USG contract as a result of the military drawdown. In light of these ongoing abuses, this report aims to: 1. Shed light on the system by which U.S. Government contractors continue to traffic and abuse TCNs, as well as explain in detail how this system operates, whom it benefits, and how it affects TCNs; 2. Explain how this system violates U.S. and international prohibitions against human trafficking and labor abuse; 3. Demonstrate that U.S. Government measures to address these problems are failing to prevent contractors from engaging in trafficking and labor abuse; and 4. Recommend concrete steps the U.S. Government should take in order to eliminate trafficking and abuse from the U.S. contracting industry. In addition to public sources, this report draws upon a) interviews conducted with a wide range of experts and other actors, including Government officials, journalists, attorneys, anti-trafficking advocates, and representatives of the contracting industry; b) documents obtained by the American Civil Liberties Union ("ACLU") through Freedom of Information Act ("FOIA") litigation on trafficking and forced labor of TCNs; and c) interviews with Indian nationals who worked previously for U.S. contractors in Iraq and Afghanistan.

Details: New York: ACLU, 2012. 100p.

Source: Internet Resource: Accessed June 19, 2014 at: http://www.aclu.org/files/assets/hrp_traffickingreport_web_0.pdf

Year: 2012

Country: International

Keywords: Forced Labor

Shelf Number: 132512


Author: Seelinger, Kim Thuy

Title: Safe Haven: Sheltering Displaced Persons from Sexual and Gender-Based Violence. Comparative Report

Summary: As part of its Sexual Violence Program, the Human Rights Center conducted a one-year study in 2012 to explore and improve understanding of the options for immediate, temporary shelter for refugees, internally displaced persons, and other migrants fleeing sexual and gender-based violence in countries affected by conflict or natural disaster. We define "shelter" flexibly. For example, it may come in the form of a traditional safe house, a network of community members' homes, or another safe space coordinated by a base organization. Our aim was to generate research-based evidence to inform donors, policymakers, and international and local actors about types of relevant models, priority challenges, and promising practices. The study focused on three key objectives: 1. Identify and describe shelter models available to refugees, the internally displaced, and migrants fleeing sexual and gender-based violence. 2. Identify unique challenges experienced by staff and residents in these settings and explore strategies to respond to these challenges. 3. Explore protection needs and options for particularly marginalized victim groups, such as male survivors, sexual minorities, sex workers, and people with disabilities. The aim and objectives were the same across each of the studies carried out in Colombia, Haiti, Kenya, and Thailand. Our research focused primarily on programs that served communities of refugees, migrants, and internally displaced persons (IDPs), including those operating in a camp setting. We also studied mainstream shelters to identify protection options and innovations in urban settings. Study outputs include four country-specific reports and one comparative assessment that contain guiding considerations for the United Nations High Commissioner for Refugees (UNHCR) and other stakeholders involved in the provision of protection to these populations.

Details: Berkeley, CA: Human Rights Center, University of California, Berkeley, School of Law, 2013. 81p.

Source: Internet Resource: Accessed June 19, 2014 at: http://www.alnap.org/resource/8607

Year: 2013

Country: International

Keywords: Gender-Based Violence

Shelf Number: 132514


Author: Amnesty International

Title: Torture in 2014: 30 Years of Broken Promises

Summary: Torture. The word evokes a world of suffering and fear. It is the object of near-universal condemnation. Yet, today, 30 years after the ground-breaking un Convention against torture was adopted, torture is flourishing in at least three quarters of the world's countries, despite some significant steps forward. a global survey commissioned by Amnesty International has revealed that almost half of the world's population do not feel safe from torture. Over the past five years, Amnesty International has reported on torture and other ill-treatment in 141 countries and from every world region. While in some of these countries Amnesty International has documented only isolated and exceptional cases, in others torture is systemic. This is a human rights violation that is shrouded in secrecy, inflicted on people when they are at their most isolated and vulnerable. Absolute figures of the number of torture victims are impossible to calculate. However, as this document shows, there is irrefutable evidence that torture is a truly global crisis. This briefing provides an overview of the use of torture in the world today. it looks at when and why torture is inflicted and at the most common methods used. it shows why government denials that torture occurs ring hollow and why Amnesty International's global campaign to Stop torture is still so urgently needed in 2014.

Details: New York: Amnesty International, 2014. 50p.

Source: Internet Resource: Accessed June 19, 2014 at: http://www.amnestyusa.org/sites/default/files/act400042014en.pdf

Year: 2014

Country: International

Keywords: Human Rights Abuses

Shelf Number: 132517


Author: Room, Robin

Title: Roadmaps to Reforming the UN Drug Conventions

Summary: The three UN Drug Conventions of 1961, 1971 and 1988 currently impose a 'one-size-fits-all' prohibitionist approach to drug policy throughout the world. This report, released December 2012, explains in detail how the Conventions could be amended in order to give countries greater freedom to adopt drug policies better suited to their special needs. In particular, the report details the treaty amendments that would be necessary if a country (or, better, a group of countries working together) wished to experiment with either of the following options: i) clear and explicit decriminalisation of the possession of one or more currently controlled substances for personal use ii) the creation of a regulated, non-medical market in one or more controlled substances.

Details: London: Beckley Foundation, 2012. 179p.

Source: Internet Resource: Accessed June 19, 2014 at: http://www.beckleyfoundation.org/Roadmaps-to-Reform.pdf

Year: 2012

Country: International

Keywords: Decriminalization

Shelf Number: 132526


Author: Lavorgna, Anita

Title: Transit Crimes in the Internet Age: How new online criminal opportunities affect the organization of offline transit crimes

Summary: There is a general consensus that the Internet has expanded possibilities for so-called transit crimes-i.e., traditional trafficking activities. However, the extent to which the Internet is exploited by offenders to carry out transit crimes and the way in which it has changed those offenders' behaviors and the criminal processes remains under-investigated. The aim of this thesis is to understand what kind of criminal opportunities the Internet offers for conducting transit crimes and how these opportunities affect the organization of transit crimes, as concerns both the carrying out of the criminal activity and the patterns of relations in and among criminal networks. In order to achieve this goal, a model of script analysis-a way to highlight the sequence of actions that are carried out for a determinate criminal activity to occur- was developed in order to classify the criminal opportunities that the Internet supplies for selected transit crimes (wildlife trafficking, trafficking in counterfeit medicines, sex trafficking, and trafficking in recreational drugs), to identify cyber-hotspots, and to allow a richer and deeper understanding of the dynamics of Internet-mediated transit crimes. The data were collected by means of case study research and semi-structured interviews to law enforcement officers and acknowledged experts. For each criminal activity considered, through the script framework it has been possible to identify different types of criminal opportunities provided by the Internet. The empirical evidence presented demonstrates that the criminal markets considered have become-even if to a different extent-hybrid markets which combine the traditional social and economic opportunity structures with the new one provided by the Internet. Among other findings, this research indicates that not only has the Internet opened the way for new criminal actors, but it also has reconfigured relations among suppliers, intermediaries, and buyers. Furthermore, results were compared across transit crimes to illustrate whether and to what extent Internet usage impacts them differently. The differences seem to depend primarily on the social perception of the seriousness of the criminal activity, on the place it fills in the law enforcement agenda, and on the characteristics of the actors involved. This study, albeit with limitations, provides an accurate description of the Internet as crime facilitator for transit crimes. It concludes by highlighting the possibilities of environmental criminology as a theoretical framework to investigate Internet-mediated transit crimes, offering some final observations on how relevant actors behave online, and suggesting new directions for research.

Details: Trento, Italy: University of Trento, Doctoral School of International Studies, 2013. 212p.

Source: Internet Resource: Dissertation: Accessed June 19, 2014 at: http://eprints-phd.biblio.unitn.it/1185/1/PhD_Dissertation_Lavorgna.pdf

Year: 2013

Country: International

Keywords: Computer Crime

Shelf Number: 132532


Author: Raoult, Sacha

Title: The Mirror Image of Asylums and Prisons: An International Study

Summary: A previous study found an inverse relationship between mental hospital rates and prison rates in the United States over the period 1934-2001. Surprisingly, current levels of mass incarceration in the United States replicate closely the rates of asylum confinement in the 1950s, right before the massive political, medical, and intellectual shift toward psychiatric deinstitutionalization. This paper is a follow-up study that shows how widespread internationally this off-setting effect of asylum and prisons seems to be. We first show how, on almost two centuries of data, every French prison trend is compensated by an inverse asylum trend. We then turn to recent international data to show that, apart from Scandinavia, contemporary prison rates in the Western world mirror the asylum rates before deinstitutionalization. We then offer research avenues and hypotheses that may help explain and understand the implication of these results.

Details: New York: Columbia Law School, 2014. 34p.

Source: Internet Resource: Columbia Public Law Research Paper No. 14-389; Columbia Law and Economics Working Paper No. 472: Accessed June 20, 2014: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2442944

Year: 2014

Country: International

Keywords: Asylum

Shelf Number: 132537


Author: Hodgkinson, Peter

Title: Capital Punishment Briefing Paper

Summary: This briefing paper is offered as a critique of the received wisdom of abolition strategies against the background of an evidence based analysis of the literature. A point of interest to begin with is to try to tease out the motivation of individuals and groups that consider themselves death penalty abolitionists - they are a mixed bunch. On the one hand, there are those who oppose capital punishment based on the offence, and others, based on the characteristics of the defendant or on the death penalty process itself. Some individuals and countries restrict their support to murder; others for crimes including rape, child sexual abuse, drug trafficking, kidnapping, bribery, corruption, adultery, apostasy and arson. There is neither clarity, agreement, nor consistency worldwide about which, crimes attract the death sentence, nor, as to why a particular crime should be distinguished as deserving of death. 'Abolitionists' influenced by this approach remain so only until the 'unacceptable' crimes have been removed from the purview of capital punishment. Further opposition to capital punishment is based on specific characteristics of the defendant, for example, they oppose sentencing to death those under the age of eighteen at the time of the offence, those with mental impairment or mental illness, women, pregnant women, or those over a certain age (e.g. 65 years). Some oppose its mandatory imposition, the possibility of wrongful convictions, the mode of execution, or policies with their roots in religious beliefs (Islam, Mormonism and some schools of Christianity). Examples of dissonance within the abolitionist camp are provided by such occasions as the trial and execution of Timothy McVeigh, the Oklahoma City bomber. A poll conducted shortly before Timothy McVeigh's execution showed that 20% out of the 80% that supported his execution were ordinarily opposed to capital punishment. In another report, Richard Dieter, Director of the Death Penalty Information Centre, is reported as saying, 'With McVeigh, you don't have the questions of innocence or lack of counsel or some of the others things that have particularly troubled folks about (other recent) executions. It's nothing like the typical death-penalty case.' Another example of this 'exceptionalism' is demonstrated by Australia's policy regarding the death penalty and the case of the Bali bombers. In an ABC News broadcast4 Philip Alston, Professor of Law at New York University and the UN spokesman on the death penalty described the stance taken by the Federal Government of Australia over the execution of the Bali bombers as 'Australian exceptionalism strategy', as it appears to support a position inconsistent with its apparent opposition to the death penalty in cases involving Australian citizens. The next government formed by the Australian Labour Party, after a slow start, has brought a note of optimism with statements from government ministers and the PM reflecting their support for total abolition and a decision to table a resolution at the UN along these lines. Other examples of exceptionalism are provided by certain countries which consistently excuse or commute the death penalty for citizens of powerful and influential countries - Vietnam provides a good example of such an approach. The execution of Saddam Hussein in Iraq led to the unseemly spectacle of governments and individuals worldwide falling over themselves to avoid making unequivocal statements opposing it. Some disguised their obvious approval by restricting their criticism to the process not the principle. In the UK, then Foreign Secretary, Margaret Beckett, was reported as saying that she welcomed the fact that Saddam Hussein 'has been tried by an Iraqi court for at least some of the appalling crimes he committed against the Iraqi people' and that his execution meant that he had been 'held to account'. In the same statement, she did, however, also state that the British government remained opposed to the death penalty5. Another example of exceptionalism? The vast majority of death penalty scholarship and scholars are based in the USA and on its use in the United States of America and despite the fact that the USA represents the experience of only 5% of the world's population, its data and debate tends to dominate the Western approach to capital punishment. Whilst one should not ignore the wealth of information and scholarship the US experience provides the reality is that there is precious little authoritative material on capital punishment in other countries though in recent years attempts have been made by some, including the CCPS, to redress the balance. The crucial distinction that needs to be made is between the valuable contribution the US data makes to the general debate and its relevance to understanding the death penalty worldwide. The core reasons for retaining or removing the death penalty differ from country to country but generally include such issues as deterrence, public opinion, rights of victims, religious doctrine and alternative penalties - all this against a background of understandable concern of its citizens that an explosion in violent crime would follow the removal of the death penalty. Professor Roger Hood identifies several factors that he believes have influenced the increase in the number of abolitionist countries: the spread of international treaties and of the human rights movement; political pressure; political leadership; and rejection of injustices associated with totalitarian regimes. He proposes four main objections to the death penalty, 1] capital punishment violates the fundamental right to life, 2] capital punishment is not a unique deterrent, 3] the administration of the death penalty, even in developed legal systems, is inherently and irredeemably flawed, and 4] its effect is counter-productive in that it gives out very confused moral messages.

Details: London: Centre for Capital Punishment Studies, Westminster University Law School, 2010. 97p.

Source: Internet Resource: Accessed June 26, 2014 at: http://www.westminster.ac.uk/?a=79134

Year: 2010

Country: International

Keywords: Capital Punishment

Shelf Number: 132539


Author: Terre des hommes

Title: Webcam Child Sex Tourism. Becoming Sweetie: A novel approach to stopping the global rise in Webcam Child Sex Tourism

Summary: Rising Internet usage rates and persistent poverty in the developing world have fostered the emergence of a rapidly growing new form of online child sexual exploitation. "Webcam Child Sex Tourism" (WCST) takes place when adults pay or offer other rewards in order to direct and view live streaming video footage of children in another country performing sexual acts in front of a webcam. WCST enables predators to sexually abuse children in other countries with ease and frequency using their Internet-connected personal computers. And despite the fact that WCST is prohibited by international laws and most national criminal codes, the enforcement of those laws has so far been lax. Terre des Hommes Netherlands works to end child exploitation and to assist victims around the world. In recent years, we have been overwhelmed by the surging number of child victims of WCST in the Philippines. The psychological damage that exploitation through WCST has on children is profound and permanent. We recognize that victim assistance alone cannot stop the expansion of such a rapidly growing form of child exploitation. That knowledge motivated us to undertake this study in search of a solution that governments around the world can apply to reduce the global demand for WCST. Key facts: The United Nations and the US Federal Bureau of Investigation estimate that there are 750,000 predators connected to the Internet at any moment. Those predators contribute to a vast global demand for WCST. Moreover, an estimate that tens of thousands of children in the Philippines alone are exploited through WCST, suggests that this form of long-distance child abuse appears to take place with great frequency. However, the alarming fact that only six predators have ever been convicted for engaging in WCST should inspire shame and immediate action by governments around the world. This is a problem that urgently needs the world's attention. Insight: The vast global demand for WCST provides incentives for criminals, impoverished parents, and vulnerable children in developing countries to capitalize on the opportunity to raise their income by increasing the "supply" of children who perform webcam sex shows for money or other rewards. Taking targeted action to reduce the global demand for WCST that is sustained by online predators will effectively reduce the growing number of child victims who constitute the "supply" side of the trade. Our research: What started as research into the WCST trade led us to a viable solution to this global problem. We began the research for this report by gathering information about the nature of the phenomenon of WCST: the physical and online environments in which it takes place, the global trends that have fostered its emergence, and the legal status of WCST in international law and in the national criminal and penal codes of 21 countries. We found that the legal framework prohibiting WCST widely exists, but governments are not adequately enforcing their own child protection laws when the victims are located outside of their borders. Highlighting that point is our finding that only six predators worldwide have been convicted for engaging as customers in WCST. That finding led us to wonder how often WCST actually takes place online. Four Terre des Hommes Netherlands researchers spent 10 weeks posing as prepubertal Filipino girls on 19 public chat rooms. During that short period, a total of 20,172 predators from 71 countries committed crimes by soliciting the researchers, whom the predators believed to be minors, for paid webcam sex performances. But 20,172 crimes in a sample of 19 chat rooms likely reflects only a small fraction of the number of crimes actually taking place every day when we consider the US Federal Bureau of Investigation's estimates that there are 40,000 online chat rooms on which predators lurk. Moreover, WCST takes place on social networking sites, adult webcam sites and online dating sites, in addition to chat rooms. It is likely that WCST takes place tens of thousands of times each day. The finding that WCST is such a common crime on public chat rooms led us to investigate whether law enforcement agencies are not adequately enforcing existing child protection laws because they are unable to identify predators engaging in WCST. We found that identifying predators seeking webcam sexual performances from children can be achieved through the use of a proactive investigation technique. During the 10 weeks spent collecting data, the four Terre des Hommes Netherlands researchers identified 1,000 predators seeking webcam sex performance from children on public chat rooms. They were identified using only information available in public online databases and data provided by predators. No computer hacking or illegal methods were applied. Instead, we just asked predators to provide identifying information under the fictional pretext-a technique known as "social hacking." The following report is the most comprehensive study on WCST undertaken to date. However, the findings of our research, while alarming, only provide a small glimpse into how vast the phenomenon of WCST actually is. While we cannot extrapolate conclusions about the global prevalence of WCST, we do prove that there is a very high incidence of predators seeking WCST on 19 public chat rooms in a 10-week period. Furthermore, based on our analysis of trends in technological developments and other forms of child sexual exploitation, we predict that the WCST trade will continue to grow and spread to other countries if governments around the world do not take immediate action. If action is not taken, we fear that WCST will spiral as far out of control as the online child pornography industry, which is now a multi-billion dollar international trade that law enforcement agencies cannot reign in. Call to action: Currently, law enforcement agencies are hobbled by reactive investigation policies-they investigate crimes against child victims of WCST only after children report the crimes. But, for a number of reasons, children do not report these crimes very often. We call on government agencies in charge of justice to immediately adopt proactive law enforcement policies that empower law enforcement agencies to patrol public online spaces known to be hotspots for WCST and to prosecute predators committing these crimes without waiting for children or parents to report them.

Details: The Hague: Terre des Hommes, 2013. 113p.

Source: Internet Resource: Accessed June 26, 2014 at: http://www.terredeshommes.org/wp-content/uploads/2013/11/Webcam-child-sex-tourism-terre-des-hommes-NL-nov-2013.pdf

Year: 2013

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 132541


Author: Felbab-Brown, Vanda

Title: Security Considerations for Conducting Fieldwork in Highly Dangerous Places or on Highly Dangerous Subjects

Summary: While readily acknowledging that interviewing criminals, militants and intelligence and security actors can get one arrested, kidnapped or killed, Felbab-Brown presents a set of fieldwork guidelines and personal anecdotes that illustrate possible approaches for researchers as they confront the very real security threats inherent to their line of work. Felbab-Brown argues that conducting both secure and effective research that minimizes threats to the external and internal validity of causal claims and policy assessment demands extensive preparation and the ability to stay calm under pressure, while also knowing how to turn adrenaline into one's advantage, engage in quick, on-the-spot reasoning and make continual judgments about the fluid security situation in which one is working. She emphasizes the importance of specific logistical and security preparation-which can easily equal the time to be spent in the field-and advises that multiple research trips are usually necessary for establishing a set of contacts that can eventually serve as a gateway to certain regions, interlocutors and interviewees.

Details: Washington, DC: Brookings Institute, Social Science Research Council, 2014. 29p.

Source: Internet Resource: Working Paper on Research Security No. 3,: Accessed June 26, 2014 at: http://www.brookings.edu/~/media/research/files/papers/2014/06/06_security_considerations_fieldwork_felbab_brown/06_security_considerations_fieldwork_felbab_brown_report.pdf

Year: 2014

Country: International

Keywords: Personal Security

Shelf Number: 132546


Author: American Bar Association

Title: How Do Fortune 100 Corporations Address Potential Links to Human Rights Violations in a Globally Integrated Economy?

Summary: The report, "How Do Fortune 100 Corporations Address Potential Links to Human Rights Violations in a Globally Integrated Economy?" presents the first ever analysis of major companies' publicly available policies on human trafficking, forced labor and the trade in conflict minerals. The researchers found that 54 percent of all Fortune 100 companies have publicly available policies addressing human trafficking and that 66 percent have policies on forced labor. Furthermore, when the research team eliminated companies without supply chains (such as those engaged in insurance, banking and financial services), the remaining 79 companies - termed the "Target Group" in the study - displayed even greater coverage, with nearly two-thirds (66 percent) having policies on human trafficking and more than three-quarters (76 percent) having policies on forced labor. In addition, over one third (37 percent) of all Fortune 100 companies had publicly available policies addressing conflict minerals and over four in ten (43 percent) of the Target Group had such policies. Because not all Fortune 100 companies deal in conflict minerals, the numbers on these policies are lower.

Details: Washington, DC: American Bar Association; Tempe, AZ: Arizona State University, 2014. 45p.

Source: Internet Resource: http://www.americanbar.org/content/dam/aba/administrative/human_rights/fortune_100_report_on_trafficking.authcheckdam.pdf

Year: 2014

Country: International

Keywords: Businesses

Shelf Number: 132547


Author: Camman, Carolyn

Title: Environmental Scan of Canadian and International Aboriginal Corrections Programs and Services

Summary: To help inform the evaluation of Strategic Plan on Aboriginal Corrections (SPAC) in 2010/11 and CSC's future planning and policy decisions in this area, the University of Saskatchewan was contracted to undertake an external environmental scan of Aboriginal corrections programs and services within Canada and internationally. Program searches extended across the four elements of the Aboriginal Corrections Continuum of Care model but specifically excluded programs and services provided or funded by CSC. Pre-dispositional programs and services (e.g. sentencing circles, presentence diversion programs) were also excluded from the scan. The scan of corrections programs and services targeted to Aboriginal offenders revealed 38 (non-CSC) programs across Canada and 67 programs and services internationally. All Continuum of Care categories were represented, with the greatest number falling within the 'Intervention' category.

Details: Saskatoon: University of Saskatchewan, Forensic Behavioural Sciences and Justice Studies Initiative, 2011. 114p.

Source: Internet Resource: Accessed June 26, 2014 at: http://www.usask.ca/cfbsjs/research/pdf/research_reports/CSC_Environmental_Scan_Mar_22_corr.pdf

Year: 2011

Country: International

Keywords: Aboriginals

Shelf Number: 132553


Author: Heilman, Brian

Title: The Making of Sexual Violence. How Does a Boy Grow Up to Commit Rape?

Summary: Women and girls around the world experience staggering levels of rape and other forms of sexual violence. This violence devastates lives, unhinges communities, and hampers greater social and economic development. While the severity, frequency, and purpose of this violence can broaden during times of conflict or emergency, its foundations are laid during "peacetime," as is underscored by the extreme levels of violence observed consistently across the globe. Yet it is only in recent decades that policymakers, researchers, and programmers have begun to pay closer attention to this urgent violation of human rights and barrier to sustainable development. This report presents an overview of five study sites of the International Men and Gender Equality Survey (IMAGES), presents findings related to men's self-reported perpetration of sexual violence, investigates seven domains of possible influences on men's sexual violence perpetration and provides actionable lessons and recommendations.

Details: Washington, DC: International Center for Research on Women and Promundo, 2014. 16p.

Source: Internet Resource: Accessed June 26, 2014 at: http://www.icrw.org/files/publications/The%20Making%20Of%20Sexual%20Violence%20-%20June%202014%20-%20WEB%20PREVIEW.pdf

Year: 2014

Country: International

Keywords: Males

Shelf Number: 132556


Author: Nellemann, Christian, ed.

Title: The Environmental Crime Crisis: Threats to Sustainable Development from Illegal Exploitation and Trade in Wildlife and Forest Resources

Summary: Given the alarming pace, level of sophistication, and globalized nature that illegal trade in wildlife has now notoriously achieved, UNEP initiated a Rapid Response Assessment to provide some of the latest data, analysis, and broadest insights into the phenomenon. Tackling illegal wildlife trade demands this examination of the relationship between the environmental resources at stake, their legal and illegal exploitation, the loopholes that exacerbate the situation, the scale and types of crimes committed, and the dynamics of the demand driving the trade. In the international community, there is now growing recognition that the issue of the illegal wildlife trade has reached significant global proportions. Illegal wildlife trade and environmental crime involve a wide range of flora and fauna across all continents, estimated to be worth USD 70-213 billion annually. This compares to a global official development assistance envelope of about 135 billion USD per annum. The illegal trade in natural resources is depriving developing economies of billions of dollars in lost revenues and lost development opportunities, while benefiting a relatively small criminal fraternity. This report focuses on the far-reaching consequences of the environmental crime phenomenon we face today. The situation has worsened to the extent that illegal trade in wildlife's impacts are now acknowledged to go well beyond strictly environmental impacts - by seriously undermining economies and livelihoods, good governance, and the rule of law Even the security and safety of countries and communities is affected: the report highlights how wildlife and forest crime, including charcoal, provides potentially significant threat finance to militias and terrorist groups. Already recognized as a grave issue in DRC and Somalia by the UN Security Council, the assessment reveals that the scale and role of wildlife and forest crime in threat finance calls for much wider policy attention, well beyond those regions.

Details: Arendal, NO; Nairobi: GRID-Arendal, 2014. 106p.

Source: Internet Resource: Accessed June 30, 2014 at: http://www.grida.no/publications/rr/crime/

Year: 2014

Country: International

Keywords: Environmental Crime

Shelf Number: 132569


Author: Midgley, Tim

Title: Identifying approaches and measuring impacts of programmes focused on Transnational Organised Crime

Summary: This paper identifies and analyses a broad range of approaches and intervention strategies that have been applied to tackle Transnational Organised Crime (TOC). It focuses on the impact and effectiveness of these approaches in breaking the links between TOC and violence, conflict and insecurity. It identifies challenges associated with measuring the impact of these approaches, and includes possible indicators (with relevant datasets) that could be used to capture impacts. It is intended to act as a useful resource for development practitioners responsible for the management of existing, or development of new, programmes aimed at tackling the destabilising impacts of TOC on development objectives, including security and justice objectives. It also aims to be a useful resource to inform policy makers working on broader organisational approaches to addressing TOC as a driver of conflict, including cross-government approaches and inter-governmental development, security and rule of law strategies and initiatives. It is hoped that by identifying key indicators relating to a wide range of approaches to addressing TOC, a set of common indicators can be developed that may be used to assess progress against anti-TOC efforts at both the national and global levels. The paper identifies six, inter-related and overlapping theories of change that guide the majority of programmes focused on TOC. A series of core assumptions under each are identified, and assumptions underpinning them are discussed. Challenges and dilemmas associated with measuring progress against each are outlined, and examples of possible indicators that could be used to assess progress are presented.

Details: London: Saferworld, 2014.

Source: Internet Resource: Accessed July 1, 2014 at: http://www.saferworld.org.uk/resources/view-resource/812-identifying-approaches-and-measuring-impacts-of-programmes-focused-on-transnational-organised-crime

Year: 2014

Country: International

Keywords: Crime Prevention

Shelf Number: 132575


Author: Scott, Kenneth

Title: Prosecuting Pirates: Lessons Learned and Continuing Challenges

Summary: Since 2005, there has been growing consensus and frequently recurring calls in the international community for the leaders, financiers, and land-based facilitators of modern maritime piracy to be prosecuted. There is broad recognition (at least in concept and rhetoric) that successfully prosecuting the low-level skiff pirates, while part of the equation, will ultimately have limited impact on ending or substantially reducing piracy, at least in terms of the law enforcement and prosecution components of national and international counter-piracy efforts. Indeed, one of the four priorities of the Contact Group on Piracy off the Coast of Somalia for 2013 and beyond is "[t]o strengthen and focus law enforcement efforts to disrupt pirate networks ashore, including by establishing effective information exchanges among prosecutors, investigators and private industry" Yet to date, with the exception of the conviction of two pirate negotiators (which might be considered mid-level management) and the recent arrest of pirate leader Mohamed Abdi Hassan (better known as "Afweyne") in Belgium, there have been no prosecutions of higher- or top-level pirate leaders, financiers, or facilitators. While approximately 1,200 pirates have been, or are being prosecuted in various parts of the world (primarily in Somalia, 402; Kenya, 164; Yemen, 129; and Seychelles, 124),2 almost none of them can be considered anything more than low-level skiff pirates. Why is that the case, and what lessons can the international community and national authorities learn from our experience fighting East African piracy, in fighting piracy elsewhere, or indeed dealing with other international and transnational crime?

Details: Broomfield, CO: Oceans Beyond Piracy, 2014. 66p.

Source: Internet Resource: Accessed July 1, 2014 at: http://oceansbeyondpiracy.org/sites/default/files/attachments/ProsecutingPiratesReportDigital_2.pdf

Year: 2014

Country: International

Keywords: Maritime Crime

Shelf Number: 132579


Author: Aldridge, Judith

Title: Not an 'Ebay for Drugs': The Cryptomarket 'Silk Road' as a Paradigm Shifting Criminal Innovation

Summary: The online cryptomarket Silk Road has been oft-characterised as an 'eBay for drugs' with customers drug consumers making personal use-sized purchases. Our research demonstrates that this was not the case. Using a bespoke web crawler, we downloaded all drugs listings on Silk Road in September 2013. We found that a substantial proportion of transactions on Silk Road are best characterised as 'business-to-business', with sales in quantities and at prices typical of purchases made by drug dealers sourcing stock. High price-quantity sales generated between 31-45% of revenue, making sales to drug dealers the key Silk Road drugs business. As such, Silk Road was what we refer to as a transformative, as opposed to incremental, criminal innovation. With the key Silk Road customers actually drug dealers sourcing stock for local street operations, we were witnessing a new breed of retail drug dealer, equipped with a technological subcultural capital skill set for sourcing stock. Sales on Silk Road increased from an estimate of $14.4 million in mid 2012 to $89. million by our calculations. This is a more than 600% increase in just over a year, demonstrating the demand for this kind of illicit online marketplace. With Silk Road functioning to considerable degree at the wholesale/broker market level, its virtual location should reduce violence, intimidation and territorialism. Results are discussed in terms of the opportunities cryptomarkets provide for criminologists, who have thus far been reluctant to step outside of social surveys and administrative data to access the world of 'webometric' and 'big data'.

Details: Unpublished paper, 2014. 29p.

Source: Internet Resource: Accessed July 1, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2436643

Year: 2014

Country: International

Keywords: Drug Dealers

Shelf Number: 132582


Author: Woodiwiss, Michael

Title: Moralism, Mafias and Markets: The evoluation of popular and governmental understanding of organized crime

Summary: By June 2012, 147 nations had signed the United Nations (UN) Convention against Transnational Organized Crime (UNTOC). Most governments, therefore, broadly share a common understanding of the problem and ways to combat it. From the background literature to the Convention it is also clear that it followed on from the 1988 UN Convention against the Illicit Traffic in Narcotic Drugs and Psychotropic Substances and was thus part of an effort to strengthen the global drug prohibition regime as well as to bring some order to a world where illicit trading flows seem to be out of governmental control. By signing the Convention governments agreed to put in place organized crime control methods mainly pioneered in the United States or recommended by the United States as transnational policing has evolved to combat what is now commonly perceived as an international security threat. These methods include anti-money laundering measures, the confiscation of criminal assets, the ending of bank secrecy, the protection of witnesses, the carrying out of international joint police investigations, the exchange of information, and the provision of mutual legal assistance. In 2010 the United Nations Office on Drugs and Crime (UNODC) launched a publication entitled, The Globalization of Crime; A Transnational Organized Crime Threat Assessment. This represents the international community's current understanding and approach to organized crime and is already influencing the way individual states present the problem to their peoples. The report featured a large number of maps and charts to illustrate illicit trading flows and their markets. It found that, 'Drugs remain the highest value illicit commodities trafficked internationally, by quite a wide margin' and added that the 'flows coming closest are actually those best integrated into licit markets - counterfeit goods and illicit timber - as well as those involving illicit human movements'. The hope was that an effective review mechanism to measure progress and identify needs would emerge from the UNODC's research efforts. This paper tracks the evolution of the understanding of organized crime from its American origins to the analysis outlined in the UNODC report. It begins by describing the construction of narratives that convinced people first in the U.S. and then internationally of the need for drastic and co-ordinated action against organized crime, and the evolution of widely-accepted but inadequate national and international responses to organized and transnational organized crime. Although there are methodological flaws and false assumptions in the UNODC's analysis, as pointed out by Peter Andreas, this paper finds much that is positive in it, particularly in the move away from conspiracy interpretations towards the need for a better and more insightful understanding of criminal markets. At the same time, the analysis warns that a radical departure from the current prohibitive approach to the many and varied kinds of drugs now available in the global marketplace is required in order to limit the undoubtedly destructive impact of organized criminal activity to any significant extent.

Details: Bristol, UK: University of the West of New England, 2013. 18p.

Source: Internet Resource: Working Paper: Accessed July 2, 2014 at: http://eprints.uwe.ac.uk/22126/2/MoralismFinalVersion.pdf

Year: 2013

Country: International

Keywords: Illegal Trade

Shelf Number: 132607


Author: Ricardo, Christine

Title: Engaging Boys and Young Men in the Prevention of Sexual Violence: A Systematic and Global Review of Evaluated Interventions

Summary: Violence against women is a widespread issue, one that exists in all cultural and socio-economic contexts. Among the various forms of violence that girls and women suffer, rape is often the least visible and least reported. In many cases, such as in dating or married relationships, rape or other forms of sexual violence may not even be recognized by social or legal norms. While the underlying causes of sexual violence are multiple and complex, among the core causes are unequal gender norms and power dynamics between men and women. Throughout the world, boys and men are largely the perpetrators of sexual violence, and girls and women are the victims. It is increasingly understood that men's use of violence is generally a learned behavior, rooted in the ways that boys and men are socialized. There is evidence that this is often at an earlier age than many of the current violence prevention and sexuality education programs target. Adolescence is a time when many boys and young men first explore and experiment with their beliefs about roles in intimate relationships, about dating dynamics and male-female interactions. Research has shown that this is also the time when intimate partner violence first starts to manifest itself, and the earlier and more often it occurs, the more it reinforces the idea that violence is a "normal" part of dating relationships (Laner 1990). A key challenge, therefore, in primary rape prevention is to intervene before the first perpetration of rape or sexual violence, and to reach boys and young men when their attitudes and beliefs about gender stereotypes and sexuality are developing. In this context, it is necessary to reach boys and young men (and girls and young women) with programs that address sexual violence before expectations, attitudes and behaviors about dating are well developed (Fay and Medway 2006). It is also necessary to challenge gender norms and sexual scripts that often underlie coercion and violence in relationships, including "those cultural norms that normalize intimate sexual violence as a 'natural' or 'exaggerated' expression of innate male sexuality" (Carmody and Carrington 2000). In addition, it is necessary to teach adolescents effective communication and problem-solving skills and to promote a culture of responsibility for preventing sexual violence (Berkowitz 2004). In recent years, there has been a significant increase in attention to programming with boys and men and the evidence base regarding what works and what does not work. Violence prevention is still an area in which there are many questions and there is a need for consolidating evidence for advocacy and practice purposes. While there are already many existing reviews of rape prevention programs with male university students and dating violence prevention programs with adolescents, these reviews have largely been limited to North American or Australian context and most often focused only on those programs published in the academic literature - not grey literature. This review is more extensive, in terms of age range (adolescents) and settings (global), and in terms of program goals and scope because it includes those programs that do not have rape prevention as primary focus, but which address underlying risk factors.

Details: Washington, DC: Promundo, 2011. 72p.

Source: Internet Resource: Accessed July 2, 2014 at: http://reliefweb.int/sites/reliefweb.int/files/resources/menandboys.pdf

Year: 2011

Country: International

Keywords: Dating Violence

Shelf Number: 132611


Author: Libicki, Martin C.

Title: Hackers Wanted: An Examination of the Cybersecurity Labor Market

Summary: There is a general perception that there is a shortage of cybersecurity professionals within the United States, and a particular shortage of these professionals within the federal government, working on national security as well as intelligence. Shortages of this nature complicate securing the nation's networks and may leave the United States ill-prepared to carry out conflict in cyberspace. RAND examined the current status of the labor market for cybersecurity professionals - with an emphasis on their being employed to defend the United States. This effort was in three parts: first, a review of the literature; second, interviews with managers and educators of cybersecurity professionals, supplemented by reportage; and third, an examination of the economic literature about labor markets. RAND also disaggregated the broad definition of "cybersecurity professionals" to unearth skills differentiation as relevant to this study. In general, we support the use of market forces (and preexisting government programs) to address the strong demand for cybersecurity professionals in the longer run. Increases in educational opportunities and compensation packages will draw more workers into the profession over time. Cybersecurity professionals take time to reach their potential; drastic steps taken today to increase their quantity and quality would not bear fruit for another five to ten years. By then, the current concern over cybersecurity could easily abate, driven by new technology and more secure architectures. Pushing too many people into the profession now could leave an overabundance of highly trained and narrowly skilled individuals who could better be serving national needs in other vocations.

Details: Santa Monica, CA: RAND, 2014. 106p.

Source: Internet Resource: Accessed July 3, 2014 at: http://www.rand.org/pubs/research_reports/RR430.html

Year: 2014

Country: International

Keywords: Computer Crime

Shelf Number: 132617


Author: Lawson, Katherine

Title: Global Impacts of the Illegal Wildlife Trade: The Costs of Crime, Insecurity and Institutional Erosion

Summary: Poaching of endangered species to feed the illicit global trade of wildlife - estimated to be worth between $8 and $10 billion per year excluding fisheries and timber - is rising at an alarming rate. Activity in the illegal ivory trade has more than doubled since 2007 and is over three times larger than it was during the last peak in 1998, with the street value of ivory capable of reaching up to $2,205 per kilogram in Beijing. Rhino horn can sell for $66,139 per kilogram - more than the price of gold or platinum - on the Chinese black market. This report analyses the global impacts of the illegal wildlife trade, investigating links between the illicit trade in wildlife products and the erosion of national institutions in affected countries, national and transnational security threats and the role of armed non-state actors in civil conflict. Elephants and rhinoceros are most prominent among the animals being killed to feed rising demand for their tusks and horns across the world. On the basis of the evidence provided by a detailed literature review, this report focuses on the illegal trade in elephant ivory and rhino horn originating in sub-Saharan Africa. Former US Secretary of State Hillary Clinton described the illegal wildlife trade in 2012 as 'a global challenge that spans continents and crosses oceans'. This trade can no longer be viewed exclusively as an environmental concern. Although the trafficking of live animals and animal products remains a serious conservation issue, this crime threatens the stability and security of societies involved at every point along the chain. It was the rise in illegal wildlife trade that prompted Mrs Clinton to describe this phenomenon as 'a national security issue, a public health issue, and an economic security issue'. Across Africa, elephants and rhinos are being targeted by poachers and armed non-state actors - including rebel movements such as the Lord's Resistance Army - to satisfy increasing demand from growing middle classes across the world, particularly in Southeast Asia where ivory products and rhino horn are considered status symbols and used as ingredients in traditional medicine. Meanwhile, transnational organized crime groups and armed non-state actors are able to exploit institutional weakness, civil conflict and legislative loopholes in both source and consumer countries to feed this rising demand for rare commodities, acquiring vast profits. A discordance between national legislation and institutional capacities for implementation on the one hand, and multilateral environmental agreements such as the Convention on International Trade in Endangered Species of Wild Flora and Fauna (CITES) on the other, means that national legislation often remains inadequate to support these initiatives, protect endangered species and regulate cross-border trade. Attempts have been made to enhance support for the implementation of national wildlife regulations, such as the creation of the International Consortium on Combating Wildlife Crime (ICCWC). However, regulations stipulating which animal products can be legally traded vary greatly by country, resulting in a parallel legal and illegal trade. The legal trade in wildlife products is estimated at over $300 billion per year; a figure that can obscure the lesser but still significant value of the illegal trade. Just as important as the devastating effects on biodiversity is the evidence in this report that the illegal wildlife trade erodes state authority and fuels civil conflict, threatening national stability and provoking substantial economic losses internationally. But the true scale of the trade is unknown, as are its indirect costs in security and political implications. Restricting an analysis of the global implications of environmental crime to biodiversity considerations limits the focus to wildlife supply countries. The illegal wildlife trade involves poachers, armed non-state actors from source nations, international crime groups and institutional corruption across global network chains and a range of players involved in demand countries - from organized crime syndicates and non-state actors to legitimate authorities. To combat the threat, leaders in the international community - especially from supply and demand countries - need to collectively expand and deepen their levels of cooperation. Better and shared information will position governments to counter this transnational crime more effectively, as will enhancing the design and implementation of national and regional legislation and invoking stricter penalties against illegal traffickers and traders.

Details: London: Chatham House, 2014. 64p.

Source: Internet Resource: Accessed July 7, 2014 at: http://www.chathamhouse.org/sites/files/chathamhouse/public/Research/Africa/0214Wildlife.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 132624


Author: Boda, Zsolt

Title: Literature Review on Fear of Crime and Public Attitudes Towards Crime, Justice and Punishment

Summary: Research under WP4 "State-of-the-Art Public Perceptions" focused on drawing the general picture on attitudes towards crime, justice and punishment, as well as mapping the phenomena by their geographical and social location in Europe, and resulted in a paper featuring a literature review on fear of crime and public attitudes towards crime, justice and punishment. Specifically, the paper provides a systematic, up-to-date literature review of the key European research on fear of crime, punitive attitudes and trust in justice. The task is subdivided into sections on "trust in justice", "fear of crime", and "punitive attitudes". The aim is to identify the most common explanations that can be found in academic literature about the patterns and possible causes of fear of crime, punitive attitudes and trust in justice.

Details: Fiducia (New European Crimes and Trust-Based Policy), 2012. 50p.

Source: Internet Resource: Accessed July 7, 2014 at: http://www.fiduciaproject.eu/media/press_releases/8/D4.1.Literature%20review%20on%20fear%20of%20crime%20and%20public%20attitudes%20towards%20crime,%20justice%20and%20punishment.pdf

Year: 2012

Country: International

Keywords: Fear of Crime

Shelf Number: 132629


Author: Gilligan, Robbie

Title: Learning from Children Exposed to Sexual Abuse and Sexual Exploitation: Synthesis Report of the Bamboo Project Study on Child Resilience

Summary: The Bamboo study was inspired by an interest in exploring the value and relevance of the concept of resilience for understanding children's experience and prospects when faced with the reality or possibility of sexual abuse or exploitation. The study set out to answer the question 'What may be learned from the life experience of children, adults, families and communities and programme practice that contributes to an understanding of resilience in the prevention of and recovery from child sexual abuse and exploitation?'. Following an intensive process of consultation and discussion, the question became the guiding question for the overall project convened and sponsored by Oak Foundation and conducted in three countries - Bulgaria, Ethiopia and Nepal. This report provides a synthesis of the main findings from the overall project based on the three country reports. The term resilience has acquired wide currency in the children's services field in recent years. While it commands a lot of interest, a universal definition remains elusive. While there are some attempts to quantify resilience, most discussion still treats it in a qualitative sense. Rather like beauty, resilience may be said to lie in the eye of the beholder. Even this suggestion, however, is itself potentially controversial since many might assume or assert that resilience resides, where relevant, in the person or grouping being observed. This issue of definitions and understanding remained very live throughout the whole lifetime of this study, from initial scoping work and debates around design, right through to detailed planning and fieldwork activity for the in-country studies. Initial attempts to achieve a singular and precise common definition of resilience (in relation to children and young people) were wisely abandoned after much discussion as the challenges of that effort became clear. It proved possible to proceed on the basis of a 'spacious' understanding of the concept of resilience in relation to children. This saw resilience as a child's capacity to resist and do well in challenging circumstances by drawing on sometimes hidden strengths and resources. The study sought to inquire whether indeed such strengths and resources were present (or could be observed) in the lives of the sample of children to be studied and whether they played a protective and supportive role that was meaningful in influencing the child's prospects. Gradually, over the course of the project, it became clear that the study had to have a wider focus than resilience in the face of sexual abuse/exploitation alone. The wider context of the lives of the children and young people in the study asserted itself very forcefully. It was neither feasible nor desirable to ignore the complexity of this wider backdrop and its influence. The study came to have three dimensions: the children's experience of, or exposure to, sexual abuse and exploitation; the wider social conditions of the children's lives; and the research project's interest in the theme of resilience and its possible relevance in the lives of the children. 'Resilience' thinking influenced the study in terms of the kind of questions and data that were of interest. In planning the project, an important focus was to be on the resources and supports that children found in their lives. Resilience was to be less an explicit topic of conversation with children in research interviews (in which they could be asked questions using the term), and more a lens through which to reflect on data when it arrived back on the desks of the local research teams and eventually reached the members of the Project's International Steering Committee in the form of draft country reports. In practice, this nuanced distinction was hard to maintain, and it is clear that at least some local research team members remained very committed to paying explicit attention to the concept of resilience in discussions with some research participants.

Details: Geneva, SWIT: Oak Foundation, 2014. 44p.

Source: Internet Resource: Accessed July 7, 2014 at: http://www.oakfnd.org/sites/default/files/Learning%20from%20Children%20Exposed%20to%20Sexual%20Abuse%20and%20Sexual%20Exploitation%20Synthesis%20Report%20of%20the%20Bamboo%20Project%20Study%20on%20Child%20Resilience.pdf

Year: 2014

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 132632


Author: Muggah, Robert

Title: Researching the Urban Dilemma: Urbanization, Poverty and Violence

Summary: In 2007, the world became a predominantly urban society. Across the world, an estimated three quarters of economic production takes place in cities. Urbanization brings with it possibilities of improved access to jobs, goods and services for poor people in developing countries and beyond as globalization trends connect cities world-wide. However, urbanization has also brought new challenges in terms of conflict, violence and urban governance - and citizen security in particular. The World Bank's landmark 2011 World Development Report highlighted the significance of violence as a development problem. Its work noted how violence is changing, becoming less structured around notions of civil war and conflict, and more focused around criminal violence, terrorism and civil unrest. The impacts of violence on human development are significant and varied. As Stergios Skaperdas has documented, they include direct costs such as death and injury, destruction to public infrastructure, personal property and assets, as well as indirect costs like psychological trauma, population displacement, the disruption of social services, reduced economic growth, brain drain and increased spending on law enforcement. What is clear is that violence has emerged as one of the central development challenges of our time. Virtually all fragile states have experienced repeated episodes of violence, and the large majority of the world's poorest people live in states affected by violence - over 1.5 billion people. As the 2011 World Development Report has underscored, the close relationship between violence and poverty is reflected in this stark fact: no low-income fragile or conflict-affected state has yet to achieve a single Millennium Development Goal. Today's cities are centres of multi-layered violence. Criminal and organized violence, associated with the drug trade in some countries have become entwined with national politics. Gangs and militias have come to substitute for public authority, offering some protection to communities, but often at great cost. Social violence, including violence within the household, is also a significant problem, particularly for vulnerable youth and women living in these environments. In response to these challenges, Canada's International Development Research Centre (IDRC) and the United Kingdom's Department for International Development (DFID) have launched Safe and Inclusive Cities. This collaborative research initiative is aimed at generating an evidence base on the connections between urban violence, inequalities and poverty and on identifying the most effective strategies for addressing these challenges. The present study marks the first step in this endeavour, and has served to inform the design and scope of the Safe and Inclusive Cities research initiative. Towards this end, the study set out to achieve four objectives: 1. Document what is known about the connections between violence, inequalities and poverty in urban centres and assess the strength of the knowledge base. Particular focus was given to assessing evidence from Latin America and the Caribbean, Sub-Saharan Africa and South Asia; 2. Describe the state of theory on violence, urbanization and poverty reduction, and assess the extent to which they interact, and whether emerging evidence actually informs theoretical debates and assumptions guiding work in these fields; 3. Identify key evidence gaps that require further investigation; and 4. Map out key actors (researchers and research organizations) that are producing knowledge on these issues. The outcome is a study that promotes an integrated and comprehensive approach to tackling the challenges posed by rapid urbanization, escalating violence, and increased poverty and inequalities.

Details: Ottawa: International Development Research Centre, 2012.

Source: Internet Resource: Accessed July 9, 2014 at: http://www.idrc.ca/EN/PublishingImages/Researching-the-Urban-Dilemma-Baseline-study.pdf

Year: 2012

Country: International

Keywords: Poverty

Shelf Number: 129785


Author: Cooray, Arusha

Title: Does Corruption Promote Emigration? An Empirical Examination

Summary: This paper empirically investigates the relationship between corruption and the emigration of those with high, medium and low levels of educational attainment. The empirical results indicate that as corruption increases the emigration rate of those with high levels of educational attainment also increases. The emigration rate of those with middle and low levels of educational attainment, however, increases at initial levels of corruption and then decreases beyond a certain point. Splitting the sample by income inequality suggests that increased inequality reduces the ability to emigrate. The policy conclusion is, that government actions should focus on controlling corruption, which in turn would lead to funds being channeled more productively into education and also lead to a fall in inequality which would reduce emigration.

Details: Bonn, Germany: Institute for the Study of Labor, 2014. 32p.

Source: Internet Resource: IZA Discussion Paper No. 8094: Accessed July 10, 2014 at: http://ftp.iza.org/dp8094.pdf

Year: 2014

Country: International

Keywords: Corruption

Shelf Number: 132639


Author: Schneider, Friedrich

Title: Outside the State -- the Shadow Economy and Shadow Economy Labor Force

Summary: In this paper the main focus lies on the shadow economy and on work in the shadow. The most influential factors on the shadow economy are tax policies and state regulation. The size of the shadow economy was decreasing over 1999 to 2007 from 34.0% to 31.2% for 161 countries (unweighted average). Furthermore, economic opportunities, taxes and regulations, the general situation on the labor market, and unemployment are crucial for an under-standing of the dynamics of the shadow labor force. Opposite to the decrease of the shadow economy (value added figures), the shadow economy labor force increased for most countries over the period 1999 to 2007.

Details: Munich, Germany: CESifo (Center for Economic Studies and Ifo Institute for Economic Research); , 2014. 29p.

Source: Internet Resource: CESifo Working Paper Series No. 4829 : Accessed July 10, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2461652

Year: 2014

Country: International

Keywords: Economic Crime

Shelf Number: 132641


Author: Dodman, David

Title: Understanding the Nature and Scale of Urban Risk in Low- and Middle-Income Countries and its Implications for Humanitarian Preparedness, Planning and Response

Summary: More than half of the world's population now lives in urban centres. Most of the world's urban population and its largest cities lie outside the most prosperous nations and almost all future growth in the world's urban population is projected to be in low- and middle-income countries. Within these urban centres it is common for up to 50 per cent of the population to live in informal settlements. These are often located on land that is exposed to hazards, with poor-quality provision for water, sanitation, drainage, infrastructure, healthcare and emergency services. The residents of these low-income and informal settlements are therefore highly vulnerable to a range of risks, many of which are specific to urban settings. Yet despite this, many humanitarian agencies have little experience of working in urban areas, or of negotiating the complex political economies that exist in towns and cities. This working paper has two main purposes: (1) to review the quality of the evidence base and to outline knowledge gaps about the nature and scale of urban risk in low- and middle-income countries; and (2) to assess the policy implications for humanitarian preparedness, planning and response. It does so by analysing a wide range of academic and policy literature and drawing on a number of interviews with key informants in the field. It particularly focuses on evidence from Africa and Asia, but also draws on case studies from Latin America, because many examples of good practice come from this region. The paper aims to help ensure that humanitarian and development actors are able to promote urban resilience and disaster risk reduction and to respond effectively to the humanitarian emergencies that are likely to occur in cities.

Details: London: Human Settlements Group, International Institute for Environment and Development (IIED), 2013. 89p.

Source: Internet Resource: Accessed July 11, 2014 at: http://pubs.iied.org/pdfs/10624IIED.pdf

Year: 2013

Country: International

Keywords: Poverty

Shelf Number: 132644


Author: Schultze-Kraft, Markus

Title: 'External Stresses' and Violence Mitigation in Fragile Contexts: Setting the Stage for Policy Analysis

Summary: Following on from the World Bank's World Development Report 2011 on conflict, security and development, a debate has emerged about the role of so-called 'external stresses' in generating 'new' forms of violence and insecurity in poor and fragile countries. The Bank posits that the combination of internal stresses (e.g. low income levels, high youth unemployment) and external stresses (e.g. cross-border conflict spillovers, illicit drug trafficking) heightens the risk of different forms of violence, which are not confined to inter-state and civil war but range from communal conflicts to criminal violence and terrorism. This perspective is useful in as much as it makes explicit that instability and political disorder are not only related to domestic weaknesses of fragile states, but are also conditioned by outside forces. Yet the binary internal-external/fragility-vulnerability model that underpins the World Bank's analysis of external stresses appears to be too limited to inform strategies to address the challenges that arise from pressures as diverse as illicit transnational trafficking, price and resource shocks, and cross-border conflict spillovers. A more comprehensive and nuanced framework for policy analysis is called for, based on the recognition that external stresses: (a) tend to involve external, internal as well as transnational actors and variables that are often interrelated; (b) create both losers and winners, and can promote the interests of powerful state and non-state groups in and outside of the country or world region under 'stress'; and (c) do not all have the same kind of impact on states and societies in terms of generating violence.

Details: Brighton, UK: Institute Of Development Studies, 2013. 15p.

Source: Internet Resource: Evidence Report No. 36: Accessed July 11, 2014 at: https://www.ids.ac.uk/files/dmfile/ER36FinalOnline.pdf

Year: 2013

Country: International

Keywords: Drug Trafficking

Shelf Number: 132645


Author: United Nations Office of Drugs and Crime

Title: Focus on The Illicit Trafficking of Counterfeit Goods and Transnational Organized Crime

Summary: As a global, multibillion dollar crime, organized criminal groups have not hesitated to cash in on the trade in counterfeit goods. In many parts of the world, international, regional and national law enforcement authorities have uncovered intricate links between this crime and other serious offences including illicit drugs, money laundering and corruption. Some estimates put the counterfeit business at well in excess of $250 billion a year and hundreds of billions more, if pirated digital products and domestic counterfeit sales are included. The involvement of organized criminal groups in the production and distribution of counterfeit goods has been documented by both national and international authorities. Groups such as the Mafia and Camorra in Europe and the Americas, and the Triads and Yakuza in Asia have diversified into the illicit trafficking of counterfeit goods, while at the same time being involved in crimes varying from drug and human trafficking, to extortion and money laundering. UNODC's own research reports have recognized the strategic and operational criminal link between counterfeiting and activities such as drug trafficking. There is an additional societal impact caused by counterfeiting. The trade in counterfeit products can result in increased corruption and law enforcement costs, have a serious impact on public health and safety, lead to social and environmental concerns, and result in the infringement of other criminal and administrative laws such as tax and customs evasion as well as fraud. The illicit trafficking of counterfeit goods: A criminal act With the combination of high profits and low penalties resulting from a greater social tolerance compared to other crimes, the illicit trafficking of counterfeit goods is an attractive money-making avenue for organized criminal groups. In some instances, the illicit trafficking of counterfeit goods is more profitable than other illegal activities, such as the trafficking and sale of narcotic drugs, people and weapons. Yet while the illicit trafficking of counterfeit goods is often perceived as a 'lesser crime', the consequences can be quite serious, with the costs going far beyond just the illegal copying of products.

Details: Vienna: UNODC, 2014. 10p.

Source: Internet Resource: Accessed July 11, 2014 at: http://www.unodc.org/documents/counterfeit/FocusSheet/Counterfeit_focussheet_EN_HIRES.pdf

Year: 2014

Country: International

Keywords: Counterfeit Products

Shelf Number: 132649


Author: United Nations Office of Drugs and Crime

Title: Global Synthetic Drugs Assessment: Amphetamine-type stimulants and new psychoactive substances

Summary: This report provides an analysis of the global synthetic drugs market and for this purpose includes both Amphetamine-Type Stimulants (ATS) and New Psychoactive Substances (NPS). The expansion of global ATS markets is of increasing concern, conveyed by the 2009 Political Declaration and Plan of Action on International Cooperation towards an Integrated and Balanced Strategy to Counter the World Drug Problem. This report aims to provide an improved understanding of the problem based on scientific evidence and experiences that show the complex interplay between the demand for and the supply of ATS in different contexts. Previous reports have focused on ATS, but given the growing presence of NPS on illicit drug markets, this report takes a more comprehensive view of the situation. Plant-based psychoactive substances, such as khat, have also been included in discussions on emerging NPS, as these have become of increasing concern in certain regions. While the NPS issue is not new, it has gained in importance on an international level at the fifty-fifth session of the Commission on Narcotic Drugs (CND) in March 2012, when Member States decided to monitor emerging trends in the composition, production and distribution of NPS as well as patterns of use, and to share that information and adopt appropriate measures aimed at reducing supply and demand. The use of NPS that pose a health threat, has grown rapidly over the past decade and there have been increasing reports of the availability and manufacture of such substances. Given the fast-paced nature of the NPS market, there is a continued need for analysis of the scope and magnitude of the global synthetic drugs problem based on forensic and scientific data and qualitative information for effective policy decision-making.

Details: Vienna: UNODC, 2014. 88p.

Source: Internet Resource: Accessed July 11, 2014 at: http://www.unodc.org/documents/scientific/2014_Global_Synthetic_Drugs_Assessment_web.pdf

Year: 2014

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 132659


Author: University of Victoria. Collaborative Community Health Research Centre

Title: Research Review of Best Practices for Provision of Youth Services

Summary: This report identifies elements of "best practice" in service delivery for high-risk youth. "Best practices" are based on the results of a review of current literature related to evidence of program model's effectiveness. The report also addresses barriers to service delivery affecting the high-risk youth population. In order to provide a context for examining effective approaches for high-risk youth, the report describes characteristics of specialized population groups, such as: - Runaway - Homeless - Street Involved - Suicidal - Substance Misuse - LBGTQ - Sexually Exploited - Drop-Outs The report also examines effective approaches within program/service areas, such as: - Outreach - Independent Living - Emergency Shelters - Transitional Housing - Youth and Peer Mentoring - System Development - Youth-Family Mediation - Reunification - School-Based Services - Youth Addiction Services - Aboriginal Services - Youth Development Approach The main findings of this review on effective service delivery for high-risk youth is that services need to aim to achieve appropriate cognitive, interpersonal, social and physical competencies that protect youth exposed to high risk by integrating a combination of targeted individual and system focused services which reach-out into the daily circumstances of the youth through some strategic alliances between school, family, ommunity that are implemented and sustained in a local context.

Details: Vancouver, BC: Ministry of Children and Family Development, 2002. 217p.

Source: Internet Resource: Accessed July 14, 2014 at: http://www.mcf.gov.bc.ca/youth/pdf/best_practices_provision_of_youth_services.pdf

Year: 2002

Country: International

Keywords: At-risk Youth

Shelf Number: 132672


Author: International Labour Office

Title: Profits and Poverty: The Economics of Forced Labour

Summary: The global integration of economies, including labour markets, has brought many opportunities for workers and businesses. Despite the past years of economic crisis, it has generally spurred economic growth. However, the growth in the global economy has not been beneficial for all. Today, about 21 million men, women and children are in forced labour, trafficked, held in debt bondage or work in slave-like conditions. The publication of this new ILO report on the economics of forced labour takes the understanding of forced labour, human trafficking, and modern forms of slavery to a new level. It builds on earlier ILO studies on the extent, cost and profits from forced labour. For the first time, it looks at both the supply and demand sides of forced labour, and presents solid evidence for a correlation between forced labour and poverty. What's more, it provides startling new estimates of the illegal profits generated through the use of forced labour, as well as new evidence of the key socio-economic factors that increase the risk of falling victim to coercion and abuse. These new findings come as progress is being made in the struggle against forced labour. State-imposed forced labour is declining in importance when compared to the extent of forced labour in the private economy. Of course, vigilance is needed to prevent state-imposed forced labour from resurging. But attention must now be focused on understanding what continues to drive forced labour and trafficking in the private sector. Chapter 1 lays the groundwork for an understanding of forced labour and what it is, and examines the importance of defining forced labour and related practices, such as human trafficking and slavery. It reviews the global forced labour estimates published by the ILO in 2012, which were significantly higher than the ILO's earlier estimate. Chapter 2 examines the profits from forced labour. Using a new and expanded methodology and based on the 2012 Global Estimate, the report provides updated estimates of the global profits generated by forced labour. Chapter 3 provides a new analysis of the socio-economic factors that make people vulnerable to forced labour. Based on a series of ground-breaking country surveys that consider a range of different cohorts and factors, it highlights where forced labour is most likely to occur and provides a striking correlation between household vulnerability to sudden income shocks and the likelihood of ending up in forced labour. It also elucidates risk factors that can increase vulnerability to forced labour, such as poverty, lack of education, illiteracy, gender and migration. The results of this study serve to highlight the critical need for standardized data collection methods across countries that enable the ILO and other international organisations to generate more reliable global figures, measure trends and better understand risk factors. What's more, it also shows how understanding the socio-economic factors that increase a person's vulnerability to forced labour can help drive the development of new, more robust and concrete strategies that augment existing programmes. In addition, it calls for a strengthening of laws and policies based on normative responses and an expansion of preventive measures that can keep people out of forced labour. The report concludes that there is an urgent need to address the socio-economic root causes of this hugely profitable illegal practice if it is to be overcome. Comprehensive measures are required that involve governments, workers, employers and other stakeholders working together to end forced labour. It shows how the continued existence of forced labour is not only bad for its victims, it's bad for business and development as well. And it aptly illustrates that forced labour is a practice that has no place in modern society and should be eradicated as a matter of priority.

Details: Geneva, ILO, 2014. 66p.

Source: Internet Resource: Accessed July 15, 2014 at: http://www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/publication/wcms_243391.pdf

Year: 2014

Country: International

Keywords: Cost Benefit Analysis

Shelf Number: 132678


Author: Spinks, Harriet

Title: Destination Anywhere? Factors affecting asylum seekers' choice of destination country

Summary: - At the end of 2011 there were over 16 million refugees and asylum seekers worldwide. By far the majority of these are hosted in the developing world, close to the refugee-producing hotspots. However significant numbers do make their way to developed countries to apply for asylum. - In the context of increasing numbers of asylum seekers arriving in Australia by boat in recent years, there has been much debate about the impact of certain policy measures on numbers of arrivals, and the relative significance of 'pull' versus 'push' factors in influencing the rate of arrivals. - There is a growing body of research (albeit largely from outside Australia) into the issue of asylum destination choice - that is, the extent to which asylum seekers are able to exercise choice when it comes to their destination country, and their reasons for choosing certain countries over others. - This research reveals a number of common themes, chief among them being that asylum seekers generally have limited options available to them, and choices are made within a very narrow field of possibilities. Their choices and their journeys are often strongly influenced by the people smugglers, or agents, they engage to assist them. - Where asylum seekers are able to exercise choice in determining their destination country, factors such as the presence of social networks, historical ties between the countries of origin and destination, and the knowledge or belief that a certain country is democratic, where human rights and the rule of law are likely to be respected, are highly influential. - Policies and processes relating to the asylum procedure in destination countries are generally not well known and therefore not highly significant in influencing choice of destination. This represents a major challenge for governments which are attempting to curb flows of asylum seekers through changes to asylum policy.

Details: Canberra: Parliament of Australia, 2013. 24p.

Source: Internet Resource: Research Paper no. 1, 2012-13: Accessed July 16, 2014 at: http://parlinfo.aph.gov.au/parlInfo/download/library/prspub/2209855/upload_binary/2209855.pdf;fileType=application/pdf

Year: 2013

Country: International

Keywords: Asylum

Shelf Number: 132683


Author: Plummer, Carol

Title: Using Policies to Promote Child Sexual Abuse Prevention: What is Working?

Summary: Taxi drivers in some coastal African cities have been trained in child sex tourism and become part of the prevention network by not connecting tourists with children forced into sex work (cab driver, personal communication, 2008). Similarly, in many countries, large hotel chains and tourist destinations have posted notices that they do not tolerate child sexual exploitation (personal observation and T. Omwenga, personal communication, Kenya, July, 2008,) or have posters greeting tourists at their airports with similar messages (personal observation, Ghana, 2012). Some of these posters explicitly state that employees will not tolerate or accommodate exploitive behavior and will contact police if they suspect it. All of these activities are examples of policy in practice. The general public may understand policy as laws or rules made at a state or national level, instituted by legislation. In practice, policy is much broader than this and includes both formal and informal actions and processes that guide prevention and response. A formal policy is a course of action outlined in writing that guides institutional efforts and management of resources. Formal policies often include pieces of legislation, ordinances, and public rules and regulations. The ways in which formal policies get implemented heavily depend on individuals, communities, and systems. What individuals and organizations actually do, or fail to do, to prevent and respond to child sexual abuse constitutes informal policy. Many policy advocates understand that working to create or improve policy is a two-way street. Policy may be intended to influence the actions of individuals, but individuals also have the ability to influence, adapt, and inspire changes in policy. Even policies like the ones in African business communities described above have their challenges. Innovative policies often prompt a change in tactics for people who sexually offend. In this case, people traveling to commit child sexual exploitation used large bribes to low-income taxi drivers, convincing them to provide information and transportation (C. Maternowski, personal communication, 2012). Similarly, as larger hotels participated in anti-exploitation campaigns, much illegal business has shifted to smaller hotels, necessitating new strategies in policy development. As conditions change, sometimes as a result of good policy work, re-evaluation and design of new tactics is necessary. Every day, policy advocates are working to mandate the implementation of prevention programming as well as institutionalize the prevention of child sexual abuse. This Applied Research paper looks at policies specific to child sexual abuse prevention. A person perpetrates child sexual abuse when he or she exposes a child to sexual acts or behavior (National Sexual Violence Resource Center [NSVRC], 2011). Child sexual abuse may include sexual acts that involve penetration, touching the child's breasts or genitals, making a child touch the perpetrator's breasts or genitals, voyeurism, or commercial sexual exploitation (Finkelhor, Hammer, & Sedlak, 2008). These acts can be performed by adults or by other children. It is important to remember that formal policy definitions of child sexual abuse vary between states. Criminal legal definitions may also vary from those used in child protective services. The field of public health identifies three levels of prevention: primary, secondary, and tertiary. The primary prevention of child sexual abuse addresses actions, behaviors and norms before the abuse is ever perpetrated. Secondary and tertiary prevention efforts address issues and responses after abuse has been perpetrated. These reactive efforts promote safety and healthy outcomes for the individuals and communities affected by child sexual abuse and prevent abuse from occurring again in the future. All three types of prevention are equally important and comprehensive child sexual abuse prevention strategies work to address the issue at each level. Policies designed to prevent child sexual abuse can promote or influence all three. Many existing policy efforts address the secondary and tertiary levels of prevention. Our review will focus on available research on existing policies and evidence of effectiveness. We will briefly discuss international policy efforts to prevent child sexual abuse, but particularly focus on reviewing efforts in the United States. We also make recommendations for future policy advocacy work, including ways to expand policy to include primary prevention.

Details: Harrisburg, PA: VAWnet, a project of the National Resource Center on Domestic Violence, 2013. 21p.

Source: Internet Resource: Accessed July 16, 2014 at: http://www.vawnet.org/Assoc_Files_VAWnet/AR_CSAPolicies.pdf

Year: 2013

Country: International

Keywords: Child Prostitution

Shelf Number: 132685


Author: Brooks, Oona

Title: Violence Against Women: Effective Interventions and Practices with Perpetrators: A literature review

Summary: This report presents a review of literature on effective interventions and practices to deal with perpetrators of violence against women. The key focus is with those interventions and practices which are aimed at reducing re-offending, rather than primary prevention and or public education work. The review was commissioned by the Scottish Government in order to inform development of Scotland's strategy for preventing the causes and consequences of violence against women. Many initiatives in relation to violence against women, in particular in relation to domestic abuse, rape prevention and stalking, operate with the twin aim of improving responses to both victims and perpetrators. While this review focuses on what works to deal with perpetrators, it is important to acknowledge that appropriate responses to victims will improve their engagement with the criminal justice system and therefore facilitate improved legal responses to violence against women.

Details: Glasgow: Scottish Centre for Crime and Justice Research, 2014. 72p.

Source: Internet Resource: Report No. 01/2014: Accessed July 16, 2014 at: http://www.sccjr.ac.uk/wp-content/uploads/2014/06/VAW-Literature-Review-SCCJR-Report-No-05-20141.pdf

Year: 2014

Country: International

Keywords: Abusive Men

Shelf Number: 132696


Author: Friehe, Tim

Title: Crime and Self-Control Revisited: Disentangling the Effect of Self-Control on Risk and Social Preferences

Summary: In economic models, risk and social preferences are major determinants of criminal behavior. In criminology, low self-control is considered a fundamental cause of crime. Relating the arguments from both disciplines, this paper studies the relationship between self-control and both risk and social preferences. To exogenously vary the level of self-control, we use a well-established experimental manipulation. We find that low self-control causes less risk-averse behavior. The effect of self-control on social preferences is not significant. In sum, our findings support the proposition that low self-control is a facilitator of crime. While our study is motivated by the literature on the determinants of criminal behavior, it has important implications for dual-system models and documents endogeneity of economic preferences.

Details: Bonn: Center for Economic Studies & ifo Institute (CESifo, 2014. 30p.

Source: Internet Resource: CESifo Working Paper No. 4747: Accessed July 17, 2014 at: http://www.cesifo-group.de/ifoHome/publications/working-papers/CESifoWP/CESifoWPdetails?wp_id=19108815

Year: 2014

Country: International

Keywords: Criminal Behavior

Shelf Number: 132711


Author: Petros, Melanie

Title: The Costs of Human Smuggling and Trafficking

Summary: It has become almost axiomatic to begin papers on human smuggling and trafficking by stating that they remain under-researched phenomena. Increasingly, however, this is not the case, and new empirical research has begun to plug some of the gaps. What is true, nevertheless, is that this research is largely scattered. Still relatively little information is available in academic publications, with the concentration of empirical evidence spread across policy papers, migration bulletins and the media. Probably as a result, it is also true that this information has rarely systematically been analysed. There is, for example, still no reliable global overview of the scale or dynamics of human smuggling and trafficking; certain geographical regions and routes are far better understood than others, and there are very few comparative studies. In contrast, this paper attempts to draw together some of this scattered information - it is based on analysis of over 500 secondary sources. It is concerned specifically with the costs of human smuggling and trafficking, and adopts a longitudinal and global perspective - asking how costs vary across the world, how they have changed over time and what factors other than origin and destination determine their level.

Details: Geneva, SWIT: Global Commission on International Migration, 2005. 21p.

Source: Internet Resource: Global Migration Perspectives, No. 31: Accessed July 18, 2014 at: http://www.refworld.org/docid/42ce53934.html

Year: 2005

Country: International

Keywords: Costs of Criminal Justice

Shelf Number: 114680


Author: Shull, Aaron

Title: Global Cybercrime: The Interplay of Politics and Law

Summary: Examining global cybercrime as solely a legal issue misses an important facet of the problem. Understanding the applicable legal rules, both domestically and internationally, is important. However, major state actors are using concerted efforts to engage in nefarious cyber activities with the intention of advancing their economic and geostrategic interests. This paper explores the recent unsealing of a 31-count indictment against five Chinese government officials and a significant cyber breach, perpetrated by Chinese actors against Western oil, energy and petrochemical companies. The paper concludes by noting that increased cooperation among governments is necessary, but unlikely to occur as long as the discourse surrounding cybercrime remains so heavily politicized and securitized. If governments coalesced around the notion of trying to prevent the long-term degradation of trust in the online economy, they may profitably advance the dialogue away from mutual suspicion and toward mutual cooperation.

Details: Waterloo, ON, Canada: Centre for International Governance Innovation (CIGI), 2014. 23p.

Source: Internet Resource: Internet Governance Papers, Paper no. 8: Accessed July 21, 2014 at: http://www.cigionline.org/sites/default/files/no8_1.pdf

Year: 2014

Country: International

Keywords: Computer Crime

Shelf Number: 132725


Author: Aubert, Veronique

Title: Unspeakable Crimes Against Children: Sexual Violence in Conflict

Summary: The prevalence of rape, sexual exploitation and sexual violence against children in conflict is shocking. In some contexts more than 80% of those affected are children. This report addresses key questions to understanding sexual violence against children in conflict: What's the scale of the problem? Who suffers? Where does it happen? Who are the perpetrators? Why does it happen? What's the impact on children? The report looks at how we can protect children in these situations and identifies gaps in funding. It makes recommendations to G8 countries to tackle these horrific crimes against children.

Details: London: Save the Children, 2013. 50p.

Source: Internet Resource: Accessed July 21, 2014 at: http://www.savethechildren.org.uk/resources/online-library/unspeakable-crimes-against-children

Year: 2013

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 132726


Author: Bell, Brian

Title: Crime Scars: Recessions and the Making of Career Criminals

Summary: Recessions lead to short-term job loss, lower levels of happiness and decreasing income levels. There is growing evidence that workers who first join the labour market during economic downturns suffer from poor job matches that have a sustained detrimental effect on their wages and career progression. This paper uses a range of US and UK data to document a more disturbing long-run effect of recessions: young people who leave school in the midst of recessions are significantly more likely to lead a life of crime than those graduating into a buoyant labour market. These effects are long lasting and substantial.

Details: Bonn: Institute for the Study of Labor (IZA), 2014. 50p.

Source: Internet Resource: IZA Discussion Paper No. 8332: Accessed July 23, 2014 at: http://ftp.iza.org/dp8332.pdf

Year: 2014

Country: International

Keywords: Economics and Crime

Shelf Number: 132736


Author: Willman, Alys

Title: Sexual and Gender-Based Violence: What is the World Bank Doing, and What Have We Learned? A Strategic Review

Summary: Sexual and gender-based violence (SGBV) is the most egregious manifestation of gender inequality. At least 35% of the world's women have experienced some form of Gender-Based Violence (GBV), and numerous men have been victimized as well. Even in contexts of open warfare, the scale of injuries and deaths due to SGBV far eclipses that seen on the battleground. SGBV involves a range of perpetrators and takes many different forms, from workplace harassment, domestic and intimate partner violence, to sexual violence, female genital mutilation, sex-selective abortion, trafficking, and in the most extreme cases, femicide. The impacts of such violence extend far beyond the individual survivors, affecting households, communities and spanning across generations. They can range from physical injuries, to psychological trauma and loss of livelihood or employment. Economically, survivors of SGBV not only have reduced short-term income potential, they may have immediate and long-term medical expenses or have injuries that reduce long-term income and productivity.

Details: Washington, DC: World Bank, 2013. 60p.

Source: Internet Resource: Accessed July 23, 2014 at: http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2013/12/09/000461832_20131209163906/Rendered/PDF/832090WP0sexua0Box0382076B00PUBLIC0.pdf

Year: 2013

Country: International

Keywords: Children Exposed to Violence

Shelf Number: 132737


Author: Shepherd, Jonathan

Title: How to Achieve More Effective Services: The Evidence Ecosystem

Summary: The creation and adoption of effective policies, programmes and interventions depends on a functional evidence ecosystem. In whichever policy or service area it serves, the purpose of this system is to sustain continuous evidence generation, synthesis and evidence-informed action. As in all efficient systems, form follows function. Not only must each stage be operational but also stages must be connected and the flow of evidence and its translation into "what works" needs to be maintained. This means that at each stage, demand and supply of quality-assured evidence are needed, together with demand for the products of the system by commissioners and end users. The What Works Centres are an essential part of this ecosystem and need to be concerned not just with evidence synthesis and adoption but with the whole system in their sector so that faults can be identified and put right. This strategic perspective is important if the What Works Centres are to achieve and increase behaviour change. The generic recommendations listed below, and those specific to each What Works sector, are therefore designed to address both structural and functional problems that were identified in a series of interviews. For some Centres there are major capacity shortfalls, especially for evidence generation; for others there are disconnects, for example, between academics and front line services, and between commissioners in the same sector; for others still, the workforce needs to be categorised and professionalised so that target groups for training and training sources can be identified. Raw and synthesised evidence in the forms in which it is currently published is generally unusable by many practitioners - and sometimes does more harm than good. Changing course in all sectors on the basis of evidence depends on implementing a range of interventions that motivate practitioners, their managers, commissioners and policy makers to do this. A series of recommendations based on an evidence review is therefore a central part of this report.

Details: Cardiff: Cardiff University, What Works Network, 2014. 60p.

Source: Internet Resource: Accessed July 23, 2014 at: http://www.vrg.cf.ac.uk/Files/2014_JPS_What_Works.pdf

Year: 2014

Country: International

Keywords: Crime Prevention

Shelf Number: 132741


Author: World Bank

Title: Enforcing Environmental Laws for Strong Economies and Safe Communities

Summary: This roadmap for environmental and natural resources law enforcement (ENRLE) sets forth a course of action for the World Bank's ENRLE Community of Practice for FY2013-15. It outlines for senior management a strategy to mobilize and strengthen the Bank's engagement in the fight against environmental and natural resource crime, an issue that has significant detrimental effects on the economic, social, political, and environmental stability of our client countries. The roadmap also serves as a mobilizing tool for staff and management in regional departments to demonstrate the importance of ENRLE and to outline the menu of solutions that the Community of Practice (COP) can offer to strengthen our clients' fight against environmental and natural resource crime. Recent spikes in poaching, in illegal logging, and in illegal, unreported, and unregulated (IUU) fishing have amplified the already urgent need for action. These crimes increase poverty, shrink prosperity, and magnify social and political tensions that undermine healthy communities and strong economies. Investment returns in wise environmental and natural resource law enforcement can be high. Criminal activities that affect the environment and natural resources are on the increase and pose an increasingly serious threat to development. Data and analyses reviewed by the World Bank's Community of Practice on ENRLE begin to show the magnitude of illegal logging, poaching of wildlife, trade in endangered species, wildland arson, criminal toxic releases, and other environment and natural resource-related crimes. They also show the diversity of the criminal threat, ranging from small-scale, artisanal crime that arises from poverty and inequities to growing problems of organized transnational criminal networks and enterprises using corruption, money laundering, technology, and other sophisticated methods to exploit persistent weaknesses in resource management and law enforcement. All World Bank client countries suffer from these crimes and are underserved by existing international law enforcement institutions and available mechanisms for support, capacity building, and operational cooperation. Vulnerability to environment crimes is often deepened by overarching problems of governance, corruption, and weaknesses in accountability at the national level. Environmental and natural resource crime is common, but in many countries it is rarely prosecuted. The very elements that make these crimes possible-that natural capital is undervalued, seldom properly guarded, and often has unclear or contested ownership-also compromise prosecution. This Roadmap FY2013-15 builds on recently scaled-up support for ENRLE that includes project commitments on the order of $50-60 million per year. Along with investments, the Bank supports advisory and analytic work and leadership in regional and international processes and dialogue. While the Bank is not a law enforcement agency, its established programs to support natural resource and environmental management and to safeguard global public goods, its commitment to strengthening good governance and to fighting corruption, and its partnerships with key law enforcement agencies such as Interpol and Europol give it an opportunity and responsibility to do more. This report discusses how the World Bank Group (WBG) will mobilize to work better on ENRLE. Recognizing the evolving global context, a new and fully mobilized Community of Practice will put more emphasis on building a constituency within the WBG to work on the range of ENRLE issues, on building the capacity of WBG staff to provide investment and technical assistance on ENRLE, on strengthening analytical work to develop a pipeline of ENRLE investments, and on fostering demand among clients for Bank investment in ENRLE.

Details: Washington, DC: World Bank, 2014. 26p.

Source: Internet Resource: Agriculture and environmental services discussion paper ; no. 5: Accessed July 25, 2014 at: http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2014/02/20/000442464_20140220144545/Rendered/PDF/843960REVISED0000Enforcing0Env0Laws.pdf

Year: 2014

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 132778


Author: Financial Action Task Force

Title: Risk of Terrorist Abuse in Non-Profit Organisations

Summary: Terrorist organisations and non-profit organisations have very different objectives, but often rely on similar logistical capabilities: Funds, material, personnel and public influence are key resources for non-profit organisations (NPOs). Terrorist organisations seek the same resources to further their cause, which makes NPOs vulnerable for abuse by terrorists or terrorist networks. FATF Recommendation 8 requires that countries review their laws and regulations to ensure that NPOs cannot be abused for the financing of terrorism. This typologies report examines in detail, how and where NPOs are at risk of terrorist abuse. The report uses case studies as well as input collected from law enforcement, other government actors and NPOs themselves to increase awareness of the methods and risk of abuse for terrorism of the NPO sector, both domestically and internationally. The report highlights that NPOs are at risk of being abused for terrorism at different levels: from the misappropriation of street-level fundraising to the infiltration of terrorist organisations at the programme delivery level to promote their ideology.

Details: Paris: Financial Action Task Force, 2014. 141p.

Source: Internet Resource: Accessed July 25, 2014 at: http://www.fatf-gafi.org/media/fatf/documents/reports/Risk-of-terrorist-abuse-in-non-profit-organisations.pdf

Year: 2014

Country: International

Keywords: Terrorism

Shelf Number: 132780


Author: Financial Action Task Force

Title: Financial flows linked to the production and trafficking of Afghan opiates

Summary: 1. Drug trafficking is a business, but our understanding of this enterprise and response to it remain limited - less than 0.5% of the total laundered funds are seized. 2. In 2011, the annual volume of the global opiate market was estimated at USD 68 billion (with around USD 60 billion from Afghan opiates). However, no widely agreed method or framework currently exists to map "the business model". Although a number of business modelling methodologies appear to have been created by academics, multilateral bodies and private organisations, the survey responses suggest that it remains unclear if these methodologies have been practically incorporated into law enforcement and FIU's intelligence collection plans and disruption strategies. 3. Terrorists profit from and are engaged in opiate trafficking - over half the Afghan Taliban Senior Leadership listed under United Nations Security Council Resolution (UNSCR) 1988 are involved in drug trafficking. 4. The UN Al Qaida and Taliban Monitoring Team assesses that opiate-financing will imminently be the leading source of income for the Afghan Taliban and thus enable a major threat to the national security of Afghanistan and wider regional stability. 5. International opiate traffickers rely on the services of financial professionals, either unwitting or complicit, to manage their assets but no global system exists to alert countries or the private sector of these individuals and entities, or to freeze the assets of opiate traffickers. 6. At most stages in the enterprise, opiates and associated financial flows do not follow the same routes. 7. The Afghan opiate business is believed to be a mixture of both cartels and multiple markets. There appears to be no single or small group of cartels that control the global opiate trade; but some groups control significant portions of the trade along various routes. However, detailed and reliable information regarding this issue remains limited and this can be considered a key information gap. 8. Between 50-90% of all financial transactions in Afghanistan are conducted via money or value transfer services (MVTS). Illicit use of MVTS appears to be a critical capability for opiate trafficking networks, not only in Afghanistan but also internationally. 9. The majority of illicit funds are likely moved through, and possibly stored in, financial centres. As the region's leading financial centre, the United Arab Emirates' (UAE) financial system appears to be particularly vulnerable to abuse by opiate traffickers, regionally and internationally. 10. Cash, commodity-transfer and MVTS appear to be the leading value transfer instruments at the cultivation and manufacture stages of the enterprise; the formal financial system, MVTS and high-value commodities appear to facilitate international distribution of opiates. 11. Apart from cash, new payment methods (including virtual currencies) are used at consumer and international distribution stages of the Afghan opiate enterprise, albeit less than the above methods but may pose significant challenges to regulators, financial intelligence units (FIUs) and law enforcement agencies. 12. Many similarities exist between financing methodologies of different illicit drugs. Opiate-specific and more generic red flag indicators have been identified and collated. 13. This project was conducted in parallel with the Paris Pact (UNODC) Illicit Financial Flows analysis. The ML/TF threats from illicit groups, vulnerabilities in AML/CFT systems and opportunities identified herein are being used for immediate technical assistance delivery within the framework of the UNODC's current activities.

Details: Paris: Financial Action Task Force, 2014. 77p.

Source: Internet Resource: Accessed July 25, 2014 at: http://www.fatf-gafi.org/media/fatf/documents/reports/Financial-flows-linked-to-production-and-trafficking-of-afghan-opiates.pdf

Year: 2014

Country: International

Keywords: Drug Markets

Shelf Number: 132781


Author: Malloch, Margaret

Title: The Elements of Effective Through-Care. Part 1: International Review

Summary: This report forms Part 1 of a two-part review of the elements of effective through-care. It examines the international evidence in order to identify practice that appears to be effective, alongside areas that may hinder effective interventions. Part 2 examines this evidence alongside a review of practice in Scotland. The available evidence, consisting of international research and practice evaluations, clearly highlights the practical issues that prisoners experience at the point of release and transition into the community. These issues often appear more entrenched for short-term prisoners for whom rates of reconviction are highest. The review confirms that already existing difficulties in areas such as accommodation, income, employment, drug and alcohol problems can actually deteriorate after release from custody, and imprisonment may serve to further marginalise particular groups (for example women, young and elderly prisoners, and minority ethnic groups). While programmes in prison may help prepare prisoners for release, according to international research and evaluations these programmes will have greater impact if stable accommodation and employment opportunities are available in the community. Reductions in reoffending appear to be directly related to the availability of support following release, with international evidence suggesting that after-care may be as important as the provision of interventions during the period of custody. Through-care is intended to ensure processes are in place to support prisoners as they move back into their local communities and, to some extent, mitigate the worst effects of detrimental social and economic factors which affect the lives of many people processed by the criminal justice system. There is significant variation regarding the legislative context of through-care provision which can consist of both policy and statutory bases; varying across countries but also across regions and local states within a national framework. The provision of support at this transitional stage can reduce the likelihood of reoffending. Internationally, challenges to the provision of through-care arise from fragmentation of services, under-funding and a limited evidence base for service development. While this review drew on an extensive range of international literature, there are a number of limitations in the evidence available and very little evidence of outcomes obtained as a direct result of through-care services. Differences are evident between academic or independent reviews of through-care provision and project evaluations or policy analysis. Different methodological approaches can also hamper attempts to consider evidence comparatively and an over-reliance on reconviction data often obscures many of the 'softer' measures which are present in the process of (re)-integration. However, despite these caveats, there is sufficient evidence from which a number of conclusions may be drawn with regard to through-care provision.

Details: Edinburgh: Scottish Centre for Crime & Justice Research, 2013. 66p.

Source: Internet Resource: Report No. 03/2013: Accessed July 28, 2014 at: http://www.sccjr.ac.uk/wp-content/uploads/2013/10/International_Through-care_Review.pdf

Year: 2013

Country: International

Keywords: Aftercare

Shelf Number: 132806


Author: Gomis, Benoit

Title: Illicit Drugs and International Security: Towards UNGASS 2016

Summary: In spite of a decades-long 'war on drugs', the global drug trade persists as a significant problem for international security given its scale, the number of deaths related to trafficking and consumption it creates, and the organized crime and corruption it fuels. The international drug control system has been ineffective in reducing the size of the market and in preventing the emergence of new drugs and drug routes that cause and shift instability around the world. Current drug policies have been counter-productive, often causing more harm than the drugs themselves through capital punishment for offences, widespread incarceration, discrimination in law enforcement, violation of basic human rights in forced 'treatment' centres, and opportunity costs. In the last three years, the drug policy debate has evolved more than in the previous three decades. There remain a number of political obstacles to making recent developments sustainable ahead of the UN General Assembly Special Session (UNGASS) on drugs in 2016, but these should not be used as excuses for continuing with a failed status quo.

Details: London: Chatham House, 2014. 16p.

Source: Internet Resource: Briefing Paper: Accessed July 31, 2014 at: http://www.chathamhouse.org/sites/files/chathamhouse/home/chatham/public_html/sites/default/files/0214Drugs_BP2.pdf

Year: 2014

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 132853


Author: Mills, Alice

Title: Family Violence Courts: A Review of the Literature

Summary: This review focuses on the existing evaluation research on specialist family courts that has taken place primarily in Commonwealth jurisdictions and, to a lesser extent, the United States. The review begins with a brief overview of the development of family violence courts and then considers existing evaluations, highlighting the methodological approaches used and the key findings. The review concludes by considering the contributions of the existing research for future evaluations of family violence courts.

Details: Auckland, NZ: Centre for Mental Health Research, University of Auckland, 2013. 33p.

Source: Internet Resource: Accessed July 31, 2014 at: http://www.lawfoundation.org.nz/wp-content/uploads/2013/12/3.-Family-violence-courts.-A-review-of-the-literature.pdf

Year: 2013

Country: International

Keywords: Domestic Violence

Shelf Number: 132870


Author: United Nations Development Programme

Title: Community Security and Social Cohesion: Towards a UNDP Approach

Summary: The dynamics of violent conflict are changing across the globe. The number of violent conflicts is decreasing, yet the level of social violence is greater than ever. Levels of violence are now higher in a number of non-conflict countries than in countries at war, and communities are facing increasing threats to their security and social cohesion. These changing trends reflect the complex and volatile nature of the root causes of violence, and highlight the importance of adopting a dynamic and multi-faceted approach to addressing these issues. Such complex challenges can no longer be met with separate, sectoral interventions. In light of these changing trends and given the need to balance institutional support with strengthening communities and their ability to resist armed violence, UNDP has prioritized community security and social cohesion as a key goal of its Strategic Plan (2008-2013). To help guide UNDP's evolving work in this area, the Bureau for Crisis Prevention and Recovery (BCPR) has produced this paper to provide a conceptual framework and common understanding of community security and social cohesion and to support the design and implementation of effective programmes in this area. The paper recognizes the imperative to strengthen community security and social cohesion in a multi-sectoral and cross-cutting manner, informed by a clear understanding of the drivers and causes of violence. It also highlights the importance of collaboration across the UN system so that comprehensive assessments and planning processes can lead to effective programming. The paper is the result of a substantive review of UNDP's practice in this field from 14 countries in crisis or emerging from crisis. The paper reflects extensive consultations with UNDP Country Offices, field practitioners, civil society partners, researchers and governments. Most importantly, it has been informed by lessons learnt from communities that are in crisis and those that have averted crisis.

Details: Geneva, SWIT: UNDP, Bureau for Crisis Prevention and Recovery, 2009. 66p.

Source: Internet Resource: Accessed August 6, 2014 at: http://www.th.undp.org/content/dam/thailand/docs/CommSecandSocialCohesion.pdf

Year: 2009

Country: International

Keywords: Communities and Crime

Shelf Number: 132902


Author: International Labour Office

Title: Marking Progress Against Child Labour. Global estimates and trends 2000-2012

Summary: Since the year 2000, the ILO has been taking stock and measuring global progress on the reduction of child labour. Since 2006, it has undertaken this analysis in light of the target set by the International Labour Organization of eliminating all the worst forms of child labour by 2016. This report follows the Global Report series on child labour under the follow up to the ILO Declaration on Fundamental Principles and Rights at Work. Its focus is on the presentation of the new fourth round of child labour estimates for 2012 and to identify the trends from 2000 to 2012. The estimates are based on refined estimation techniques fully comparable with the ones for 2000, 2004 and 2008 rounds. The Report is divided into four parts. Chapter 1 presents the main results of the newest estimates and trends as well as a brief overview of the driving action behind the results. Chapter 2 provides the details on the newest estimates for the year 2012. Chapter 3 presents a dynamic global picture updating the trends for the period 2000-2012. Chapter 4 sets out some pointers on the way forward. The publication of this Report is timed to provide input into the III Global Conference on Child Labour being held in Brasilia in October 2013.

Details: Geneva: ILO, International Programme on the Elimination of Child Labour (IPEC), 2013. 60p.

Source: Internet Resource: Accessed August 6, 2014 at: http://www.ilo.org/wcmsp5/groups/public/---ed_norm/---ipec/documents/publication/wcms_221513.pdf

Year: 2013

Country: International

Keywords: Child Labor

Shelf Number: 132908


Author: Inter-American Commission on Human Rights. Rapporteurship on the Rights of Persons Deprives of Liberty

Title: Report on the Use of Pretrial Detention in the Americas

Summary: For more than a decade, the Inter-American Commission on Human Rights (hereinafter "the IACHR", "the Inter-American Commission" or "the Commission") has considered the arbitrary and illegal use of pretrial detention a chronic problem in many countries of the region. In its recent Report on the Human Rights of Persons Deprived of Liberty in the Americas, the IACHR listed the excessive use of pretrial detention among the most serious and widespread problems in the region and noted that this dysfunctionality in criminal justice systems is in turn the cause of other problems such as overcrowding and the failure to separate detainees awaiting trial from the convicted. Along with other structural problems linked to the respect for and the guarantee of the rights of persons deprived of liberty, this situation has also been systematically identified in the Americas by United Nations monitoring mechanisms, whose mandate includes safeguarding the human rights of persons under criminal prosecution and/or deprived of liberty, such as: the Human Rights Committee (HRC), the Committee against Torture (CAT), the Subcommittee on Prevention of Torture (SPT), the Working Group on Arbitrary Detention (WGAD) and the Special Rapporteur on Torture and other cruel, inhuman or degrading treatment or punishment (SRT). Similarly, other qualified actors such as the United Nations Latin American Institute for the Prevention of Crime and the Treatment of Offenders (ILANUD), have deemed that "[e]specially serious within the issue of the accelerated increase of prison populations is the case of prisoners awaiting trial"; therefore, "the region must continue its efforts to maintain more prudent levels of unconvicted prisoners." The Report on the High Level Expert Group Meeting on the United Nations Standard Minimum Rules for the treatment of prisoners, which was held in Santo Domingo, laid out some of the common causes at the regional level for the high proportion of prisoners awaiting trial, such as delays in bringing criminal defendants to trial, the absence of adequate legal advice, the influence of public opinion and the "tendency for prosecutors and judges to order that those awaiting trial should be held in detention, rather than making other arrangements for pre-trial supervision in the community." The excessive use of pretrial detention in the Americas has also been acknowledged by other bodies of the Organization of American States (OAS), such as at the Third Meeting of Officials Responsible for Penitentiary and Prison Policies, where reference was made to the "excessive use of preventive detention," and it was estimated that in the region "more than 40% of the prison population is on pretrial detention". The foregoing situation exists in spite of binding international norms that are very clear in recognizing the presumption of innocence and the exceptional nature of pretrial detention; the broad recognition of these rights at the constitutional level in the region; and the political will expressed at the highest level by the States twenty years ago in the framework of the Summits of the Americas, where governments made the commitment to "[t]ake the necessary steps to remedy inhumane conditions in prisons and to minimize the number of pretrial detainees" (The Miami Plan of Action, 1994). In this context, the Inter-American Commission considers that the excessive use of pretrial detention runs contrary to the very essence of the democratic rule of law, and that implementing this measure as a form of expeditious justice that results in a kind of anticipated sentence is flagrantly contrary to the provisions of the American Convention and Declaration, and the principles from which the Charter of the Organization of American States has drawn inspiration. Moreover, the use of pretrial detention is an important measure of the quality of the administration of justice and, as such, has a direct bearing on the quality of democracy. The IACHR recognizes the duty of States to maintain public order and protect all persons under their jurisdiction from crime and violence. Nonetheless, the Commission reiterates the longstanding principle enshrined in the Inter-American system that "irrespective of the nature or gravity of the crime prosecuted, the investigation of the facts and the eventual trial of specific persons should be carried out within the limits and according to the procedures that permit public safety to be preserved, with full respect for the human rights." Additionally, the Inter-American Court of Human Rights (hereinafter "the Inter-American Court" or "the Court") has held that "[t]he concept of rights and freedoms as well as that of their guarantees cannot be divorced from the system of values and principles that inspire it. In a democratic society, the rights and freedoms inherent in the human person, the guarantees applicable to them and the rule of law form a triad. Each component thereof defines itself, complements and depends on the others for its meaning." As is covered in depth in this report, excessive use of pretrial detention is a complex problem caused by a variety of factors, such as: issues of legal design, structural deficiencies in administration of justice systems, interferences with judicial independence and deeply rooted tendencies in judicial culture and practice.

Details:

Source: Internet Resource: Accessed August 6, 2014 at: http://www.oas.org/en/iachr/pdl/reports/pdfs/Report-PD-2013-en.pdf

Year: 2014

Country: International

Keywords: Criminal Procedure

Shelf Number: 132910


Author: Wigell, Mikael

Title: Transatlantic Drug Trade: Europe, Latin America and the Need to Strengthen Anti-Narcotics Cooperation

Summary: - The cocaine business has changed significantly in recent years. Once concentrated in Colombia, it has now expanded to the entire Latin American region with Brazil, Mexico, Central America, and Venezuela having become central corridors for the illegal traffic. - As the market for cocaine has been contracting in North America, Latin American drug networks have switched their attention to Europe, which is now the world's fastest growing market for cocaine. - The cocaine enters Europe mainly by exploiting the legitimate container trade. Most shipments continue to be directed to Western Europe, but recently the illicit trade has been expanding eastward with new entry points opening up in the Black Sea and Balkan area. There are also indications of a possible new entry point in the Eastern Baltic Sea area. - Not only are Latin American criminal organizations expanding their activities on the European drug market, but they are also exploiting the European financial crisis to launder their profits and move into other branches of the economy. - The growing transatlantic cocaine trade calls for improving inter-regional counter-narcotics cooperation. Concrete steps should be taken to promote stronger links between anti-drugs programmes, development cooperation and public security policies on both sides of the Atlantic.

Details: Helsinki: Finnish Institute of International Affairs, 2012. 9p.

Source: Internet Resource: FIIA Briefing Paper 132: Accessed August 11, 2014 at: http://www.fiia.fi/en/publication/343/transatlantic_drug_trade/

Year: 2013

Country: International

Keywords: Cocaine

Shelf Number: 132969


Author: Forensic Technology Inc.

Title: The International Trade in Endangered Species and the Firearm Nexus

Summary: Armed criminals on the move leave firearms and related evidence strewn across multiple jurisdictions spanning city, provincial, and national boundaries. This movement can greatly hamper police efforts in solving transnational crimes like the trade in endangered species. Therefore, an intelligence-led policing effort is required.

Details: Côte St-Luc , QC, CAN: Forensic Technology Inc., 2012. 15p.

Source: Internet Resource: White Paper: Accessed August 11, 2014 at: http://www.forensictechnology.com/endangered-species-white-paper?&__hssc=&__hstc&hsCtaTracking=6c3de391-05b5-4289-8d11-a564dc2723da%7C6a880138-c177-43f4-a645-5aed0cab663e

Year: 2012

Country: International

Keywords: Animal Poaching

Shelf Number: 132987


Author: Segura, Renata

Title: The Global Drug Policy Debate. Experiences from the Americas and Europe

Summary: The cultivation, trafficking and consumption of illegal drugs have historically posed a multilayered series of challenges to the state: from how to minimize health risks and provide treatment and support to those who use drugs, to the security and governance threats posed by trafficking groups and networks. While global in nature, the challenges presented by the illicit drug trade are also contextual. Lack of progress in addressing the manifold challenges posed by the illicit drug trade has led to a growing acknowledgement of the need for a serious rethink of global drugs policy. The authors underscore the importance of, and encourage the creation of national and regional commissions that are tasked with reviewing current drug policies and recommending changes. It also examines current calls in Latin American for a review of the so-called 'war on drugs', highlighting the role that outspoken leaders are playing in shaping the debate on drug policy, as well as current shifts from a policing-focused approach to one that accounts for the safety and health of drug users. The paper looks in particular detail at the experiences of Mexico, Central America and the Caribbean, arguing that other transit regions such as West Africa should consider implementing multi-faceted strategies to respond to drug trafficking and the growing incidence of drug consumption. In this regard, it highlights examples of how exclusive reliance on repressive strategies known as mano dura can often backfire, resulting in the displacement of trafficking routes, an increase in violence, prison overcrowding and further marginalization of vulnerable populations. Finally, it highlights some actions the West Africa Commission on Drugs might adopt for its own advocacy strategy including strategic diplomacy, the development and dissemination of empirically-grounded papers on the impact of drug trafficking, drug consumption and treatment in the West Africa sub-region, and discussions and debates with relevant stakeholders on the findings of such reports; engagement of civil society; and raising of public awareness. The West Africa Commission on Drugs is faced with the difficult task of advocating for policies aimed at preventing or mitigating problems of drug use, criminality, violence, and threats to governability that have been experienced by other countries, without having complete certainty on how -or even if- the same challenges will arise in Africa. Carrier and Klantsching, in their book "Africa and the War on Drugs" argue that historical analysis would indicate that Africa might be spared from the destiny of the Andean countries, and that more harm can be done by implementing a prohibitionist regime that assumes an identical path will be followed. This warning should not fall on deaf ears. However, critics of their argument have underscored the dangers of understating the "growing power of drug money in African electoral politics, local and traditional governance, and security" (Gberie, 2012; Cockayne, 2012). They have also pointed out that having a critical perspective on the existing drug control regime must not mean turning a blind eye to the threats that come with drug trafficking and consumption, such as corruption and the emergence of criminalized states (Kavanagh et al, 2013). Similarly, while drug consumption rates currently remain relatively low in Africa, the situation can change rapidly, as happened in some Latin American countries. As noted by UNODC (2013), there are already strong indications that drug use is on the rise in West Africa. It is naturally easier to achieve the political support needed to implement policies that respond to serious problems, such as a health epidemic or extended violence, than to embrace innovative and data-based policies in order to prevent or mitigate these problems. Explaining to both elites and the population why it is indispensable that West Africa act assertively to pre-empt a situation that may emerge will be a central challenge for the WACD. This paper examines such efforts in the Americas and Europe, drawing lessons for West Africa. It argues that the current drug control regime does provide some leeway for implementing policy reforms that move away from the prohibitionist regime, and provides examples of alternative policies that have been introduced by national and local authorities in different countries. The paper provides examples from Europe to underscore the importance of using empirical research and sound data to design drug policies, highlighting successful examples of harm reduction programs, and examining ways in which governments have moved away from legal frameworks that rely on the criminalization of drug use.

Details: Geneva, SWIT: Kofi Annan Foundation and the West Africa Commission on Drugs, 2013. 42p.

Source: Internet Resource: WACD Background Paper No. 7: Accessed August 12, 2014 at: http://www.wacommissionondrugs.org/wp-content/uploads/2013/12/Global-Drug-Policy-Debate-Experiences-2013-11-28.pdf

Year: 2013

Country: International

Keywords: Drug Enforcement

Shelf Number: 133013


Author: Barton, Alana

Title: Violence and Harassment Against Women in the News Media: A Global Picture

Summary: This report provides the first comprehensive picture of the dangers faced by many women working in news media around the world. It describes the types of violence and threats female journalists encounter and considers how these incidents affect their ability to conduct their work. The report identifies trends among reported incidents and offers suggestions about what individuals and organizations might do to mitigate the dangers of reporting in hostile environments and provide a safe working environment at home.

Details: Washington, DC: International Women's Media Foundation, 2014. 40p.

Source: Internet Resource: Accessed August 12, 2014 at: http://www.iwmf.org/wp-content/uploads/2014/03/Violence-and-Harassment-against-Women-in-the-News-Media.pdf

Year: 2014

Country: International

Keywords: Journalists

Shelf Number: 133018


Author: Nadal, Alejandro

Title: Leonardo's sailors: A review of the economic analysis of wildlife trade

Summary: Illegal trade of wildlife has been recognised as an important driver of biodiversity loss. In many quarters the use of legal markets has been presented as the best policy option for conservation, giving way to the economic analysis of wildlife trade and markets. This paper focuses on the analytical framework used in these analyses and on its deficiencies, both at the conceptual or theoretical level, as well as from an empirical point of view. We examine the implications of using a partial equilibrium framework dominated by comparative statics in all models and the implications of ignoring market structure, strategic behaviour and multi-product operations in key segments of the supply chain. Furthermore, this review considers the way in which demand is conceptualised and the implications of ignoring the role of economic policies. Our study shows that the literature advocating trade as a conservation solution for endangered species relies on models that are based on simplistic and/or extremely restrictive assumptions. In most cases, these models also rely on conceptual tools that have been theoretically discredited. Failure to take into account the theoretical and empirical issues covered in this review undermines recommendations to adopt market-based policies in response to conservation problems.

Details: Manchester, UK: University of Manchester, Leverhulme Centre for the Study of Value, 2014. 50p.

Source: Internet Resource: LCSV Working Paper Series No. 6: http://thestudyofvalue.org/wp-content/uploads/2014/06/WP5-Nadal-and-Aguayo-Leonardos-Sailors-2014.pdf

Year: 2014

Country: International

Keywords: Economics of Crime

Shelf Number: 133023


Author: Jenkins, Sarah

Title: Securing Communities: Summaries of key literature on community policing

Summary: This document contains extended summaries of key background texts and readings from both academic and policy literatures which elucidate and debate the definitions, objectives, models and influencing factors of community policing in different contexts. There is an extensive literature on community policing and it was not possible to cover it all in these summaries. What is included here are key contributions to the literature that have been helpful in understanding the different manifestations of community policing around the world. The material is organised alphabetically.

Details: London: ODI (Overseas Development Institute), 2013. 59p.

Source: Internet Resource: Accessed August 13, 2014 at: http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/8657.pdf

Year: 2013

Country: International

Keywords: Community Policing

Shelf Number: 133027


Author: Groenewald, Hesta

Title: Police Reform through Community-Based Policing: Philosophy and Guidelines for Implementation

Summary: Police reform is being increasingly recognized as a fundamental element of conflict management. A police service supported by the community and capable of arresting insecurity can have a far-reaching impact in enabling lasting economic, social and political development. Police reform also can complement and embolden other programming in the areas of security sector reform, rule of law and good governance. Efforts to reform the police and improve their service delivery face daunting political, financial, logistical and historical obstacles. Its very complexity can be intimidating, touching on issues of management, leadership, political will, attitudes, established behaviors and negative public perceptions. However, its centrality means that it cannot be shied away from. With police reform being undertaken by an ever-widening range of actors, a clearer understanding of what police reform entails and how it should be undertaken is essential. A community-based approach emphasizes both reforming the police and refurbishing their public image. Going beyond a narrow focus on crime, the philosophy proposes police and communities working together in partnership in order to address community concerns. When successfully executed, it can both develop security and secure development. Success is contingent upon a well-understood philosophy, clearly thought out plan and a well organized and managed process to achieve it. Certain factors are also critical to a successful community-based policing engagement. A minimum degree of order is required as is a conducive context and political support from key actors within the country: government, police and civil society. A shared understanding of goals among international actors and co-ordination between them is especially advantageous. An implementation framework should include four phases: pre-engagement analysis and assessment; design and planning; managing the implementation; and evaluation and drawback. In such a complex undertaking, a managed process of change is critical. A successful implementation entails comprehensive and detailed strategic planning. Goals should be clearly defined, bear relation to context and a road map drawn to prudently achieve them. Plans should be flexible: ongoing monitoring and evaluation of the process will ensure that plans respond to changing circumstances. Care should be taken not to do too much too soon but incrementally build up the organizational capacity of police and communities. Design, planning, implementation, monitoring, and evaluation of the intended engagement should be as wide and consultative as possible to ensure that the police, government, and civil society feel meaningfully involved. The program should establish benchworks for progress. Helpful for ensuring donor funding, it demonstrates what has been achieved and is a measurement for deciding when a reform process can continue without international involvement. Executive

Details: New York: International Peace Academy; London: SaferWorld, 2004. 27p.

Source: Internet Resource: Accessed August 14, 2014 at: http://pksoi.army.mil/doctrine_concepts/documents/UN/POLICE_REFORM.pdf

Year: 2004

Country: International

Keywords: Community Policing

Shelf Number: 133045


Author: Lorenc, Theo

Title: Environmental interventions to reduce fear of crime: systematic review of effectiveness

Summary: Background: Fear of crime is associated with negative health and wellbeing outcomes, and may mediate some impacts of the built environment on public health. A range of environmental interventions have been hypothesized to reduce the fear of crime. Methods: This review aimed to synthesize the literature on the effectiveness of interventions in the built environment to reduce the fear of crime. Systematic review methodology, following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidance, was used. Studies of environmental interventions which reported a fear of crime outcome and used any prospective evaluation design (randomized controlled trial (RCT), trial or uncontrolled before-and-after study) were included. Eighteen databases were searched. The Hamilton tool was used to assess quality. A narrative synthesis of findings was undertaken . Results: A total of 47 studies were included, 22 controlled and 25 uncontrolled, with total sample sizes ranging from n = 52 to approximately n = 23,000. Thirty-six studies were conducted in the UK, ten studies in the USA and one study in the Netherlands. The quality of the evidence overall is low. There are some indications that home security improvements and non-crime-related environmental improvements may be effective for some fear of crime outcomes. There is little evidence that the following reduce fear of crime: street lighting improvements, closed-circuit television (CCTV), multi-component environmental crime prevention programs or regeneration programs. Conclusions: There is some evidence for the effectiveness of specific environmental interventions in reducing some indicators of fear of crime, but more attention to the context and possible confounders is needed in future evaluations of complex social interventions such as these.

Details: Systematic Reviews, 2013, 2:30. 10p.

Source: Internet Resource: Systematic Reviews 2013, 2:30: Accessed August 14, 2014 at: http://clok.uclan.ac.uk/10663/1/10663_clayton.pdf

Year: 2013

Country: International

Keywords: Built Environment

Shelf Number: 133057


Author: Gagliardi, Pete

Title: Transnational Organized Crime and Gun Violence: a Case for Ballistic Intelligence Sharing

Summary: - National and international crime experts agree that transnational crime and its associated violence is a fast growing problem in the world today meriting the attention of the global law enforcement community. - Credible researchers have suggested that transnational crime can be considered in the context of 1. Illicit markets, and 2. Criminal groups. - Many illicit transnational markets are linked to firearms and violence (e.g. insurgency & terrorism, migrant smuggling, drug trafficking, and the poaching of endangered species). The same is true for many organized criminal groups (e.g. ethnic gangs/maras, drug cartels, regional criminal groups, outlaw motorcycle gangs, and fugitives). - Police efforts in solving the types of violence associated with transnational crime are greatly hampered because, as criminals move, evidence of their crimes is scattered across national borders. - Assuming that "every crime gun has a story to tell", law enforcement can reap great benefits by taking a "presumptive approach" to the investigation of gun crime. This approach is based on the premise that: 1. Valuable information for law enforcement use can be extracted from crime guns and related evidence; and 2. People, processes, and technology are available to help sustain the production of actionable information from this data which can help police solve and prevent gun related crimes. - The INTERPOL Ballistics Information Network (IBIN) can help police extend this "presumptive approach" across borders in an efficient and effective manner to address transnational crime and violence. IBIN was created in 2009 as a platform for the large-scale international sharing and comparing of ballistic data. Just as fingerprint data can link crimes and criminals across international borders, IBIN can identify matches between pairs of spent bullets and cartridge cases within minutes, thereby helping forensic experts give police investigators timely information about crimes, guns, and suspects. - INTERPOL'S IBIN Program leverages the power of automated ballistics technology to provide the global law enforcement community with a "world-wide ballistics data sharing network". With such a network in place, internationally mobile criminals who use firearms to further their illicit activities will find escaping detection increasingly challenging. - In searching for efficient and effective processes to implement IBIN, one does not have to look much further than INTERPOL's front door. INTERPOL routinely formulates Field Operations Support Programs that target both illicit transnational markets and transnational criminal groups. In conclusion: - The public safety benefits of collecting and exchanging of ballistics data across nations are obvious and undeniable only when ballistic intelligence sharing is viewed from a proper law enforcement context and perspective. - Cross-jurisdictional sharing of ballistics information not only makes sense when the distinctive circumstances of a case dictate it, but also when law enforcement and forensic organizations focus their efforts on the following sectors: 1. Specific border frontier regions, 2. Specific transnational illicit markets, and/or 3. Specific criminal groups. - Finally, the true benefits of transnational ballistic intelligence sharing come to light when one considers the societal costs of gun violence. Every day that we wait, a criminal somewhere remains free to shoot and kill again... and the cost of crime on our global society rises ever higher.

Details: Forensic Technology, 2010. 20p.

Source: Internet Resource: White Paper: Accessed August 22, 2014 at: http://www.forensictechnology.com/Portals/71705/docs/WP_TransnationalGunCrimesAndBallisticIntelligenceSharing_2010-10-21_A4.pdf

Year: 2010

Country: International

Keywords: Ballistics

Shelf Number: 133079


Author: Macvean, Michelle

Title: Evidence review: An analysis of the evidence for parenting interventions in Australia

Summary: Overview This analysis of parenting programs was conducted by the Parenting Research Centre for the Department of Families, Housing, Community Services and Indigenous Affairs (FaHCSIA), the funders of Family Support Programs (FSP) in Australia. The report provides an analysis of the evidence for parenting interventions, with a focus on: target populations; target child, parent and family outcomes; and ratings of effectiveness. Factors to consider when implementing programs in the Australian context are also presented. Methods Step A: Program information and effectiveness ratings were collated from international web-based clearinghouses and evidence for additional programs was sought from systematic reviews of parenting programs. Step B: A Rapid Evidence Assessment (REA) of Australian evaluations of parenting programs was conducted. Published and unpublished literature dated 2002-2012 was included, with programs rated for effectiveness. Findings The analysis found 34 international and 25 Australian programs with strong evidence, with only two programs with strong evidence at both the international level and within Australia (i.e., Triple P and Parent-Child Interaction Therapy). A large proportion of the programs with good evidence targeted child behaviour specifically in children with identified behavioural problems. Other outcomes, in particular basic child care, were targeted infrequently in the programs with strong evidence. There is little evidence for programs targeting specific groups of parents, such as those with intellectual disabilities or mental illnesses and teen parents. Conclusions and limitations Further rigorous program evaluations are needed to determine the effectiveness of many of the reviewed programs. Although systematic in its approach, this analysis was time-limited and some programs may have been missed from review. Readers are advised to seek updated evidence before selecting and implementing programs.

Details: Melbourne: Parenting Research Centre, 2013. 52p.

Source: Internet Resource: Accessed August 22, 2014 at: http://www.parentingrc.org.au/images/stories/evidence_review_parenting_interventions/main_report_evidencereviewparentinginterventions.pdf

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 133083


Author: Robertson, Jeremy

Title: Effective Parenting Programmes: A review of the effectiveness of parenting programmes for parents of vulnerable children

Summary: The urgent need to address New Zealand's high rate of child maltreatment has led to the search for effective interventions to reduce child maltreatment and its main risk factors. The 2012 White Paper for Vulnerable Children highlighted the importance of positive parenting practices for optimal child development and the value of supporting parenting, especially in the early years. An action from the White Paper was for SuPERU to review and report on effective parenting programmes by the end of 2013. For the purposes of this review we focused on parenting support programmes for parents of vulnerable children aged zero to six years. This included parent education, parent training programmes and home visiting programmes, but excluded general support that does not address parenting (such as financial assistance, mental health and drug abuse programmes). We aimed to provide evidence on the effectiveness of parenting support programmes in reducing maltreatment, or the risk of maltreatment, of vulnerable children. We first reviewed international research, determining common features of successful programmes overseas. We then reviewed the evidence for the effectiveness of New Zealand programmes. The review highlighted a number of issues related to the effectiveness of programmes (such as programme implementation) and these are also covered in this report.

Details: Wellington, NZ: SuPERU, a division of Families Commission, 2014. 190p.

Source: Internet Resource: Research Report no. 1/14: Accessed August 22, 2014 at: http://www.familiescommission.org.nz/sites/default/files/downloads/Effective-Parenting-Programme-Report.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 133084


Author: Lawrenson, Tim

Title: Cyberattacks -The Significance of the Threat and the Resulting Impact on Strategic Security

Summary: Cyberspace is now so intrinsic to a modern state's economy that it is vital to protect it as part of that state's national security. However certain features of cyberspace make it an increasingly attractive attack domain. Despite some rather hysterical press headlines, this analysis shows that cybercrime is the principal threat, rather than cyberterror or cyberwarfare; albeit the growing scale of state-sponsored cybercrime is a concern because it carries an inherent risk of escalation into cyber (or conventional) warfare. A comprehensive, layered cyber-security strategy is needed to overcome some of the more problematic attractions of cyberspace as an attack domain. This strategy must improve actual system security as well as enhancing people's confidence in the resilience of the cyber-enabled world.

Details: London: Royal College of Defence Studies, 2011. 31p.

Source: Internet Resource: Thesis: Seaford House Paper 2010/11: Accessed August 22, 2014 at: http://www.da.mod.uk/colleges/rcds/publications/seaford-house-papers/2011-seaford-house-papers/shp11lawrenson.pdf/view

Year: 2011

Country: International

Keywords: Computer Security

Shelf Number: 131353


Author: Monsalve, Ivan

Title: Transnational Criminal Organisations and their impact on the States National Security

Summary: Globalization era had brought the opening of boundaries and technological changes taken by Organized Crime to developed and became a transnational threat that affects all states in its security, stability and prosperity. This threat turns out to be a challenge for the National Security of the States and the International Community not only locally, but also regionally and globally. This dissertation analyse the patterns of the Transnational Crime activity, which permeate and destabilize the legal and constitutional systems within the nations and which then turn threaten the National Security. Since the end of the Cold War The transnational crime organisations are consider a new threat to the States National Security, affecting its security, stability and prosperity. The main issues questions that can be answer along this paper are: how great a threat does transnational crime pose within different nations? Do criminal organisations act differently within different nations? What are their methods and behaviours? How do criminal organisations use new technologies to establish an international network? How do criminal organisations develop their business skills, to facilitate their growth and establish economic sustainability? What kinds of methods are used by these organisations to gain control of territory within a nation?

Details: London: Defence Academy of the United Kingdom, 2013.

Source: Internet Resource: Seaford House Paper: Accessed August 23, 2014 at: http://www.da.mod.uk/colleges/rcds/publications/seaford-house-papers/2013-seaford-house-papers/shp-2013-monsalve.pdf/view

Year: 2013

Country: International

Keywords: Criminal Networks

Shelf Number: 131354


Author: Academic Council on the United Nations System (ACUNS) Vienna Liaison Office

Title: Femicide: A Global Issue that Demands Action

Summary: Femicide is the ultimate form of violence against women and girls and takes multiple forms. Its many causes are rooted in the historically unequal power relations between men and women and in systemic gender-based discrimination. For a case to be considered femicide there must be an implied intention to carry out the murder and a demonstrated connection between the crime and the female gender of the victim. So far, data on femicide have been highly unreliable and the estimated numbers of women who have been victims of femicides vary accordingly. Femicides take place in every country of the world. The greatest concern related to femicide is that these murders continue to be accepted, tolerated or justified - with impunity as the norm. To end femicide we need to end impunity, bring perpetrators to justice, and every individual has to change his/her attitude towards women. To date, the United Nations has not adopted a resolution directly addressing gender-related killings. According to the declaration on the Elimination of Violence against Women, violence against women "means any act of gender-based violence that results in, or is likely to result in, physical, sexual or psychological harm or suffering to women and girls, including threats of such acts, coercion or arbitrary deprivation of liberty, whether occurring in public or in private life". This definition fails to include explicitly violence that can lead to death and consequently misses an important component of violence against women. On the occasion of the International Day for the Elimination of Violence against Women, the Vienna Liaison Office of the Academic Council on the United Nations System (ACUNS) organized a one-day symposium on femicide in the United Nations (UN) Office in Vienna, with the kind support of the Austrian Federal Ministry for European and International Affairs; the Permanent Missions to the UN Office at Vienna of Austria, Argentina, Philippines, Thailand, and the United Kingdom of Great Britain and Northern Ireland; Small Arms Survey and the Vienna NGO Committee on the Status of Women. Member State representatives, social scientists, NGO representatives, law enforcement officials, prosecutors and feminist activists had the opportunity to speak about femicide, explain its meaning and causes, and presented examples of best practice in fighting femicide. Participants agreed in the VDF that there are at least 11 forms of femicide and that the UN must do more to conduct research on the extent of these killings and evaluate programmes set up to combat femicides. This publication is the result of this symposium and comprises the speeches and presentations of the various experts of the symposium. They discussed the issue of femicide from different perspectives, addressed the problems related to femicide including impunity and proposed comprehensive ways to fight this crime efficiently. In addition to the speeches this publication contains further information about the major forms of femicide. These short articles give an overview of the various crimes, including a description of the extent of the respective form of femicide and best practice examples to fight this crime.

Details: Vienna: The Council, 2013. 156p.

Source: Internet Resource: Accessed August 23, 2014 at: http://www.genevadeclaration.org/fileadmin/docs/Co-publications/Femicide_A%20Gobal%20Issue%20that%20demands%20Action.pdf

Year: 2013

Country: International

Keywords: Femicide

Shelf Number: 129902


Author: Thomas, Chantal

Title: International Law against Sex Trafficking, in Perspective

Summary: This study places international law on sex trafficking in a broad theoretical and historical context. First, it identifies the international law on sex trafficking as part of an "international law of prohibitionism" that operates as a particular kind of response to and management of globalization. Second, this study identifies dynamic forces both "external to" and "internal to" law that lead to prohibitionism. "External" factors refer to economic, sociological and cultural phenomena that seem to have triggered the turn to prohibition. The international legal framework responds to and reflects these external sociological factors; these factors are also productive of state power for the purposes of policing illegal transactions. Taking an historical approach, it is possible to construct a loose parallel between prohibitionism during the turn of the 19th and 20th centuries. If such dynamics helped secure the basis for the modern administrative state in the early 20th century, by supporting the consolidation of national police power, they may undergird and reinforce the expansion, not only of national, but also of international legal authority, in the 21st. The study's "internal" factors are social and legal concepts that determine the formulation, interpretation and application of a legal test. This internal analysis here examines the interaction within doctrinal structures of the dichotomy between legal consent and legal coercion, and of the mediating concepts of normality and abnormality. Both external and internal factors buttress the international law of prohibition as a basis for the expansion of state authority and of the authoritativeness of international law. Third, the study refines the historical context mentioned above to look at the international law against sex trafficking in particular. In the last great era of unregulated economic expansionism, the turn of the 19th century, concerns similar to anti-trafficking were in wide circulation, but expressed under the rubric of "white slavery." The earlier law, and the discourse surrounding it, exhibited some of the same features as the contemporary law. Finally, this study suggests that, whatever the moralistic or misguided features of prohibitionism, its rise may also prefigure a transition to broader market regulation. Prohibitionism is deeply implicated in a laisser-faire approach to law; it is the mirror image of, but also the continuation of, the vast apparatus necessary to maintain a market-oriented regulatory posture. It provides a vocabulary - mediated by constructs of 'abnormality,' or 'extraordinary' cases - to enable the discussion of market controls in an ideological environment in which such discussion might otherwise be discouraged. Even as it supports the market, however, prohibitionism is also associated with a set of concerns about the market's potentially harmful effects. Under the ideological constraints of laisser-fair-ism, concerns relating to the abuses of the deregulated market may tend to focus on extraordinary cases. Such concerns, however, though first expressed about "abnormal" contracts (such as those related to the trafficking of persons), may turn out slowly to gain sufficient currency to apply to "ordinary," "normal" contracts. As legal subjects, women seem to have provided the template for this discursive transformation in both historical eras (consider that the West Coast Hotel case that ended the Lochner era addressed the social need to protect women in the workplace). If the study's suggestions are accurate, then, prohibitionism may signal a change from the view that market regulation must be exceptional to an understanding of its pervasive importance.

Details: Ithaca, NY: Cornell Law School, 2014. 62p.

Source: Internet Resource: Cornell Legal Studies Research Paper No. 13-85 : Accessed August 25, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2274095

Year: 2014

Country: International

Keywords: Criminal Law

Shelf Number: 133134


Author: Denney, Lisa

Title: A problem-focused approach to violence against women: The political-economy of justice and security programming

Summary: The United Nations Commission on the Status of Women ended its 57th session on 15 March 2013 with an outcome document affirming the importance of eliminating violence against women (VAW). The Commission was unable, however, to achieve consensus on a global action plan. The negative reaction of some UN member states to an action plan is a worrying reminder of ongoing resistance to reform. These persistent challenges highlight the continuing struggle to gain a serious global commitment to address VAW and recognise it as a breach of women's fundamental human rights. Engaging in this struggle, many donors have put addressing VAW generally, and in fragile and conflict-affected situations (FCAS) specifically, at the top of the development agenda and made it a major priority of international policy. But in practice progress remains difficult, not least due to entrenched resistance and discriminatory socio-political norms and gender relations that persist in many societies. The problem of violence against women therefore needs to be addressed from the perspective of the concrete socio-political and cultural conditions that shape its particular features and the relevant context specific dynamics of conflict, post-conflict patterns of violence and fragility. International efforts to support reform in the area of VAW in FCAS need to go beyond prescriptive approaches that focus on what access to protection, justice and redress should look like. We propose here an approach that engages with the specificities of the problem - paying attention to context, and the concrete political-economy dynamics of the drivers of VAW - and takes account of the real options that women face in navigating the available security and justice chains to seek protection, redress and justice.

Details: London: Overseas Development Office, 2013. 12p.

Source: Internet Resource: Accessed August 25, 2014 at: http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/8325.pdf

Year: 2013

Country: International

Keywords: Domestic Violence

Shelf Number: 133145


Author: Holmes, Rebecca

Title: Preventing and responding to gender-based violence in humanitarian crisis

Summary: In recent years, international concern over gender-based violence (GBV) in emergencies has grown exponentially. Beginning in the mid-1990s with small programmes in a few countries, GBV interventions providing at least basic survivor care and support are now the norm rather than the exception in humanitarian programming. However, while international attention to GBV has increased substantially, there remains a lack of data on and understanding of good practice in relation to GBV programming in humanitarian contexts, and a lack of consensus on how to apply GBV concepts and terminology. This has resulted in a lack of agreement on how to define, prioritise, prevent and respond to gender-based violence in humanitarian contexts. In response to these challenges, this Network Paper maps and critically analyses good practice in preventing and responding to gender-based violence in humanitarian contexts to support humanitarian practitioners and policymakers to improve the quality of GBV programming. It is based on a review of the literature relating to gender-based violence in emergencies, funded by the UK Department for International Development. The review aimed to answer a number of key questions around the monitoring and evaluation of existing programmes; key features of 'successful' programming; needs assessments, programme design and funding; the effects of mainstreaming GBV programming in humanitarian action; and the state of knowledge and use of GBV guidelines.

Details: London: Overseas Development Institute, Humanitarian Practice Network, 2014. 30p.

Source: Internet Resource: Network Paper No. 77: Accessed August 25, 2014 at: http://www.odihpn.org/hpn-resources/network-papers/preventing-and-responding-to-gender-based-violence-in-humanitarian-crises

Year: 2014

Country: International

Keywords: Domestic Violence

Shelf Number: 133147


Author: Thompson, Dennis F.

Title: Two Concepts of Corruption

Summary: To combat institutional corruption, we need to distinguish it clearly from individual corruption. Individual corruption occurs when an institution or its officials receive a benefit that does not serve the institution and provides a service through relationships external to the institution under conditions that reveal a quid pro quo motive. Institutional corruption occurs when an institution or its officials receive a benefit that is directly useful to performing an institutional purpose, and systematically provides a service to the benefactor under conditions that tend to undermine procedures that support the primary purposes of the institution. Institutional corruption does not receive the attention it deserves partly because it is so closely (and often unavoidably) related to conduct that is part of the job of a responsible official, the perpetrators are often seen as (and are) respectable officials just trying to do their job, and the legal system and public opinion are more comfortable with condemning wrongdoing that has a corrupt motive. Yet institutional corruption, which is usually built into the routines and practices of organizations, is usually more damaging to the institution and society than individual corruption, which in advanced societies typically consists of isolated acts of misconduct with effects limited in time and scope.

Details: Cambridge, MA: Harvard University, Edmond J. Safra Center for Ethics, 2013. 24p.

Source: Internet Resource: Edmond J. Safra Working Paper, No. 16: Accessed August 28, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2304419

Year: 2013

Country: International

Keywords: Institutional Corruption

Shelf Number: 131257


Author: Lucchi, Elena

Title: Humanitarian Interventions in Situations of Urban Violence

Summary: Urban violence, even though it may not qualify as warfare under international humanitarian law, can involve large numbers of people who are killed, injured, raped, kidnapped, tortured and forcibly displaced. Violence is sometimes short-lived, but it can also become chronic. Urban violence is a particular and challenging context for humanitarian organisations. Intended primarily for field staff involved in programme design and evaluation, this latest ALNAP Lessons Paper will help humanitarian organisations to start establishing criteria for engagement in situations of urban violence and to improve humanitarian responses which specifically address the effects of violence.

Details: London: ALNAP/ODI, 2014. 28p.

Source: Internet Resource: ALNAP Lessons Paper: Accessed August 28, 2014 at: http://www.alnap.org/resource/9810

Year: 2014

Country: International

Keywords: Conflict Zones

Shelf Number: 133153


Author: Wyler, Liana Sun

Title: International Drug Control Policy: Background and U.S. Responses

Summary: The global illegal drug trade represents a multi-dimensional challenge that has implications for U.S. national interests as well as the international community. Common illegal drugs trafficked internationally include cocaine, heroin, and methamphetamine. According to the U.S. intelligence community, international drug trafficking can undermine political and regional stability and bolster the role and capabilities of transnational criminal organizations in the drug trade. Key regions of concern include Latin America and Afghanistan, which are focal points in U.S. efforts to combat the production and transit of cocaine and heroin, respectively. Drug use and addiction have the potential to negatively affect the social fabric of communities, hinder economic development, and place an additional burden on national public health infrastructures. International efforts to combat drug trafficking are based on a long-standing and robust set of multilateral commitments, to which the United States adheres. U.S. involvement in international drug control rests on the central premise that helping foreign governments combat the illegal drug trade abroad will ultimately curb illegal drug availability and use in the United States. To this end, the current Administration maintains the goal of reducing and eliminating the international flow of illegal drugs into the United States through international cooperation to disrupt the drug trade and interdiction efforts. Despite long-standing multilateral commitments to curb the supply of illicit drugs, tensions appear at times between U.S. foreign drug policy and approaches advocated by independent observers and other members of the international community. In recent years, an increasing number of international advocates, including several former and sitting heads of state, have begun to call for a reevaluation of current prohibitionist-oriented international drug policies. Alternatives to the existing international drug control regime may include legalizing or decriminalizing certain drugs. Debates may also focus on shifting priorities and resources among various approaches to counternarcotics, including supply and demand reduction; the distribution of domestic and international drug control funding; and the relative balance of civilian, law enforcement, and military roles in anti-drug efforts.

Details: Washington, DC: Congressional Research Service, 2013. 47p.

Source: Internet Resource: RL34543: Accessed August 28, 2014 at: http://fas.org/sgp/crs/row/RL34543.pdf

Year: 2013

Country: International

Keywords: Drug Control Policy

Shelf Number: 129902


Author: Organization for Security and Co-operation in Europe, Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings

Title: Trafficking in Human Beings Amounting to Torture and other Forms of Ill-treatment

Summary: This Fifth Occasional Paper in the Occasional Paper Series of the OSR/CTHB addresses and denounces the use of torture and other forms of ill-treatment by traffickers as a means to subjugate, control and punish trafficked people. It analyses under which circumstances trafficking can amount to torture or other forms of ill-treatment and it identifies the connection between both human rights violations from a clinical perspective. Importantly, the Paper provides the conceptual framework to understand what trafficking cases entail in terms of the physical and psychological effects on trafficked persons, and the legal and clinical implications that flow from this characterization, including in terms of legal entitlements. The Paper builds on the important work of the former UN Special Rapporteur on torture and other cruel, inhuman or degrading treatment or punishment, Professor Dr. Manfred Nowak and the strong and long-standing clinical and policy experience of the British NGO, the Helen Bamber Foundation. Part 1 of the Paper authored by the Ludwig Boltzmann Institute of Human Rights outlines and compares the existing legal frameworks on human rights, human trafficking as well as on torture and other forms of ill-treatment. Part 2 of the Paper examines the clinical links between human trafficking and torture, both in terms of the nature (physical and psychological) of the injuries from torture and ill-treatment, the impact of trafficking on victims and what this implies for effective assistance and sustained recovery This Occasional Paper is meant to provide a policy tool for decision makers and practitioners especially from the legal and medical sector dealing with human trafficking. Based on desk research, field work and case study analysis, it is also an excellent tool to inform the daily work of law enforcement, the judiciary, civil society, academia, the medical profession and the international community in their fight against human trafficking which should be firmly based on the rule of law and human rights.

Details: Vienna: OSCE, 2013. 126p.

Source: Internet Resource: accessed September 2, 2014 at: http://www.osce.org/cthb/103085?download=true

Year: 2013

Country: International

Keywords: Human Rights

Shelf Number: 131254


Author: Watson, Callum

Title: Preventing and Responding to Sexual and Domestic Violence against Men: A Guidance Note for Security Sector Institutions.

Summary: Sexual and domestic violence (SDV) presents a serious security threat in all societies and one that security sector institutions such as the police, justice system, armed forces and prisons are increasingly beginning to address. Historically, SDV was thought to almost exclusively affect women, yet recent studies in several countries have indicated that there are also large numbers of male victims. These men often share similar security needs with female victims, but they also experience gender-specific barriers to accessing security and justice caused, in part, by the fact that the issue of SDV against men remains shrouded in silence and misconceptions. With this in mind, this guidance note is designed to serve as a tool to enable security sector institutions to provide a more effective, gender-sensitive approach to preventing and responding to SDV against men. The first half of this publication provides an overview of the characteristics and incidence of SDV committed against men as well as an outline of who the perpetrators and victims are and what impact these forms of violence tend to have on the victim. It then highlights how these factors translate into gender-specific barriers to reporting and why the security sector should seek to overcome them. The second half of the publication begins with a collection of recommendations on how security sector institutions can improve their ability to prevent and respond to SDV against men. This is followed by some suggested self-assessment questions designed to help these institutions understand how they currently respond to SDV against men with the aim of identifying areas of further work.

Details: Geneva: DCAF, 2014. 89p.

Source: Internet Resource: Accessed September 2, 2014 at: http://www.gssrtraining.ch/images/stories/PDF/AResources/Preventing_Responding_Sexual_Domestic_Violence_against_Men.pdf

Year: 2014

Country: International

Keywords: Abused Men

Shelf Number: 133165


Author: United Nations Human Settlements Programme

Title: Building Urban Safety Through Slum Upgrading

Summary: Excluded from the city's opportunities, physically, politically and economically marginalized, slum dwellers are particularly vulnerable to crime and violence. They face an acute risk of becoming victims or offenders and live in a state of constant insecurity. Only a few cities have incorporated a coherent component to prevent crime and mitigate violence in their urban development agendas. Impact on urban safety has occurred somewhat unexpectedly. That is the main lesson to be drawn from the pages of this book: urban policy integration.

Details: Nairobi, Kenya: UN-HABITAT, 2011. 109p.

Source: Internet Resource: Accessed September 2, 2014 at: http://mirror.unhabitat.org/pmss/listItemDetails.aspx?publicationID=3222

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 133169


Author: United Nations Special Representative of the Secretary-General on Violence Against Children

Title: Toward a World Free from Violence: Global Survey on Violence Against Children

Summary: Every year, and in every region of the world, millions of children suffer the cumulative impact of physical, mental and emotional violence, and millions more are at risk. Violence against children takes place in every setting, including those where children should be safest - in schools, in care institutions and at home. Like a contagion, violence spreads through communities and is transmitted to future generations. Across regions and countries, it threatens children's survival and development, erodes family structures, jeopardizes education, generates social insecurity and consumes precious national resources. The Global Survey on Violence against Children, conducted under the auspices of the Special Representative of the Secretary General on Violence against Children, examines the measures in place around the world to ensure follow-up to the recommendations set out in the 2006 UN Study on Violence against Children, especially those recommendations intended to prevent violence against children, protect child victims and hold perpetrators to account. The Survey reveals that there has been some progress on these issues since the 2006 study, but this progress has been too slow, too uneven and too fragmented to bring violence to an end. Most girls and boys who are exposed to violence still live in isolation, loneliness, and fear. Many children simply do not know where to turn for help, especially when the perpetrator is a family member, caregiver, teacher or anyone else responsible for their protection and well-being. Freedom from violence is a fundamental human right, enshrined in the Convention on the Rights of the Child (CRC). The CRC is clear and unambiguous: any form of violence against children is unacceptable and children must be protected from any practice that threatens their well-being and human dignity. Freedom from violence is a right that the international community has promised to safeguard for all children, everywhere and at all times. It is time to deliver on that promise.

Details: New York: United Nations, 2013. 161p.

Source: Internet Resource: Accessed September 2, 2014 at: http://resourcecentre.savethechildren.se/sites/default/files/documents/2013_unicef_-_toward_a_world_free_of_violence1_0.pdf

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 133171


Author: World Health Organization. Region Office for Europe

Title: Women's Health in Prison: Action guidance and checklists to review current policies and practices

Summary: The checklists in this document are an important tool in ensuring greater safety and better quality medical care for women in prison, and are designed to assist a review of current policies and practices relating to women's health in prisons. They follow from the Declaration on women's health in prison: correcting gender inequity in prison health and a background paper on women's health in prison, published in April 2009 by the World Health Organization Regional Office for Europe and the United Nations Office on Drugs and Crime, and are therefore based on the evidence presented. While the checklists are aimed primarily at decision- and policy-makers, senior prison managers and prison health staff, there are important interconnections between them. They can also be useful for civil society organizations working on or monitoring the situation of women and their health in prison settings.

Details: Copenhagen: WHO, 2011. 24p.

Source: Internet Resource: Accessed September 4, 2014 at: http://www.euro.who.int/en/health-topics/health-determinants/prisons-and-health/publications/2011/womens-health-in-prison-action-guidance-and-checklists-to-review-current-policies-and-practices

Year: 2011

Country: International

Keywords: Correctional Institutions

Shelf Number: 133172


Author: Association of Certified Fraud Examiners

Title: Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study

Summary: Summary of Findings -Survey participants estimated that the typical organization loses 5% of revenues each year to fraud. If applied to the 2013 estimated Gross World Product, this translates to a potential projected global fraud loss of nearly $3.7 trillion. -The median loss caused by the frauds in our study was $145,000. Additionally, 22% of the cases involved losses of at least $1 million. -The median duration - the amount of time from when the fraud commenced until it was detected - for the fraud cases reported to us was 18 months. -Occupational frauds can be classified into three primary categories: asset misappropriations, corruption and financial statement fraud. Of these, asset misappropriations are the most common, occurring in 85% of the cases in our study, as well as the least costly, causing a median loss of $130,000. In contrast, only 9% of cases involved financial statement fraud, but those cases had the greatest financial impact, with a median loss of $1 million. Corruption schemes fell in the middle in terms of both frequency (37% of cases) and median loss ($200,000). -Many cases involve more than one category of occupational fraud. Approximately 30% of the schemes in our study included two or more of the three primary forms of occupational fraud. -Tips are consistently and by far the most common detection method. Over 40% of all cases were detected by a tip - more than twice the rate of any other detection method. Employees accounted for nearly half of all tips that led to the discovery of fraud. -Organizations with hotlines were much more likely to catch fraud by a tip, which our data shows is the most effective way to detect fraud. These organizations also experienced frauds that were 41% less costly, and they detected frauds 50% more quickly. -The smallest organizations tend to suffer disproportionately large losses due to occupational fraud. Additionally, the specific fraud risks faced by small businesses differ from those faced by larger organizations, with certain categories of fraud being much more prominent at small entities than at their larger counterparts. -The banking and financial services, government and public administration, and manufacturing industries continue to have the greatest number of cases reported in our research, while the mining, real estate, and oil and gas industries had the largest reported median losses. -The presence of anti-fraud controls is associated with reduced fraud losses and shorter fraud duration. Fraud schemes that occurred at victim organizations that had implemented any of several common anti-fraud controls were significantly less costly and were detected much more quickly than frauds at organizations lacking these controls. -The higher the perpetrator's level of authority, the greater fraud losses tend to be. Owners/executives only accounted for 19% of all cases, but they caused a median loss of $500,000. Employees, conversely, committed 42% of occupational frauds but only caused a median loss of $75,000. Managers ranked in the middle, committing 36% of frauds with a median loss of $130,000. -Collusion helps employees evade independent checks and other anti-fraud controls, enabling them to steal larger amounts. The median loss in a fraud committed by a single person was $80,000, but as the number of perpetrators increased, losses rose dramatically. In cases with two perpetrators the median loss was $200,000, for three perpetrators it was $355,000 and when four or more perpetrators were involved the median loss exceeded $500,000. -Approximately 77% of the frauds in our study were committed by individuals working in one of seven departments: accounting, operations, sales, executive/upper management, customer service, purchasing and finance. -It takes time and effort to recover the money stolen by perpetrators, and many organizations are never able to fully do so. At the time of our survey, 58% of the victim organizations had not recovered any of their losses due to fraud, and only 14% had made a full recovery.

Details: Austin, TX: Association of Certified Fraud Examiners, 2014. 80p.

Source: Internet Resource: Accessed September 9, 2014 at: http://www.acfe.com/rttn/docs/2014-report-to-nations.pdf

Year: 2014

Country: International

Keywords: Costs of Crime

Shelf Number: 133182


Author: United Nations Children's Fund - UNICEF

Title: Hidden in Plain Sight: A statistical analysis of violence against children

Summary: Interpersonal violence - in all its forms - has a grave effect on children: Violence undermines children's future potential; damages their physical, psychological and emotional well-being; and in many cases, ends their lives. The report sheds light on the prevalence of different forms of violence against children, with global figures and data from 190 countries. Where relevant, data are disaggregated by age and sex, to provide insights into risk and protective factors

Details: New York: UNICEF, 2014. 206p.

Source: Internet Resource: Accessed September 9, 2014 at: http://www.unicef.org/publications/index_74865.html

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 133249


Author: Logan, Trevon

Title: Face Value: Information and Signaling in an Illegal Market

Summary: Economists argue that rich information environments and formal enforcement of contracts are necessary to prevent market failures when information asymmetries exist. We test for the necessity of formal enforcement to overcome the problems of asymmetric information by estimating the value of information in an illegal market with a particularly rich information structure: the online market for male sex work. We assemble a rich dataset from the largest and most comprehensive online male sex worker website to estimate the effect of information on pricing. We show how clients of male sex workers informally police the market in a way that makes signaling credible. Using our institutional knowledge, we also identify the specific signal male sex workers use to communicate quality to clients: face pictures. We find that there is a substantial return to information, and that it is due entirely to face pictures. Interestingly, the return is in the range of returns to information estimated for legal markets. We also provide suggestive evidence that our premium to face pictures is not being driven by a beauty premium. The findings provide novel evidence on the ability of rich information environments to overcome the problems of asymmetric information without formal enforcement mechanisms.

Details: Cambridge, MA: National Bureau of Economic Research, 2009. 51p.

Source: Internet Resource: NBER Working Paper No. 14841: Accessed September 10, 2014 at: http://www.nber.org/papers/w14841.pdf

Year: 2009

Country: International

Keywords: Illegal Markets

Shelf Number: 133266


Author: Ayling, Julie

Title: Harnessing Third Parties for Transnational Environmental Crime Prevention

Summary: Because transnational environmental crime (TEC) can result in the demise of an environmental resource or irreversible damage to the environment, its prevention is a critical issue. Deterrence through law enforcement can go only a limited distance towards preventing TEC. However, there is a huge potential for third parties to be active participants, alongside governmental authorities, in crafting and implementing strategies for TEC prevention. This paper explores the ways in which the capacities of third parties - non-state, non-offending actors - are now, and could be, harnessed by states for this purpose. It draws together concepts and theories from policing studies, criminology, and regulatory studies to highlight changing relationships between the state and non-state actors in relation to crime control, and applies them to TEC. A more systematic approach to TEC prevention using third parties requires dedicated strategic analysis and planning on the part of states, working individually and together.

Details: Canberra: Department of International Relations, Australian National University, 2013. 19p.

Source: Internet Resource: Working Paper 3/2013: Accessed September 11, 2014 at: http://ips.cap.anu.edu.au/sites/default/files/IPS/IR/TEC/TEC_Working_Paper_3_2013_Ayling_Harnessing.pdf

Year: 2013

Country: International

Keywords: Environmental Crimes

Shelf Number: 129898


Author: Gray, Larissa

Title: Few and Far: The Hard Facts on Stolen Asset Recovery

Summary: Corruption has a devastating impact on developing and transition countries, with estimates of $20 billion to $40 billion per year stolen by public officials, a figure equivalent to 20 to 40 percent of official development assistance flows. The return of the proceeds of corruption - asset recovery - can have a significant development impact. Returns can be used directly for development purposes, such as improvements in the health and education sectors and reintegration of displaced persons, with additional benefits of improved international cooperation and enhanced capacity of law enforcement and financial management officials. This StAR-OECD publication reports on how OECD countries are performing on asset recovery. Drawing on data collected between 2006 and 2012, the report provides recommendations and good practices and suggests specific actions for development agencies. Few and Far is primarily intended to support the anti-corruption and asset recovery efforts of developed and developing jurisdictions, with a particular focus on actions for development agencies. In addition, civil society organizations engaged in governance and development issues may wish to use these findings and recommendations in their reports and advocacy efforts.

Details: Washington, DC: The World Bank, 2014. 96p.

Source: Internet Resource: Accessed September 12, 2014 at: https://star.worldbank.org/star/sites/star/files/few_and_far_the_hard_facts_on_stolen_asset_recovery.pdf

Year: 2014

Country: International

Keywords: Corruption

Shelf Number: 133288


Author: Global Commission on Drug Policy

Title: Taking Control: Pathways to Drug Policies that Work

Summary: The upcoming United Nations General Assembly Special Session on Drugs (UNGASS) in 2016 is an unprecedented opportunity to review and re-direct national drug control policies and the future of the global drug control regime. As diplomats sit down to rethink international and domestic drug policy, they would do well to recall the mandate of the United Nations, not least to ensure security, human rights and development. Health is the thread that runs through all three of these aspirations, and the UN global drug control regime has the 'health and welfare of mankind' as its ultimate goal. But overwhelming evidence points to not just the failure of the regime to attain its stated goals but also the horrific unintended consequences of punitive and prohibitionist laws and policies. A new and improved global drug control regime is needed that better protects the health and safety of individuals and communities around the world. Harsh measures grounded in repressive ideologies must be replaced by more humane and effective policies shaped by scientific evidence, public health principles and human rights standards. This is the only way to simultaneously reduce drug-related death, disease and suffering and the violence, crime, corruption and illicit markets associated with ineffective prohibitionist policies. The fiscal implications of the policies we advocate, it must be stressed, pale in comparison to the direct costs and indirect consequences generated by the current regime. The Global Commission proposes five pathways to improve the global drug policy regime. After putting people's health and safety at the center of the picture, governments are urged to ensure access to essential medicines and pain control. The Commissioners call for an end to the criminalization and incarceration of users together with targeted prevention, harm reduction and treatment strategies for dependent users. In order to reduce drug related harms and undermine the power and profits of organized crime, the Commission recommends that governments regulate drug markets and adapt their enforcement strategies to target the most violent and disruptive criminal groups rather than punish low level players. The Global Commission's proposals are complimentary and comprehensive. They call on governments to rethink the problem, do what can and should be done immediately, and not to shy away from the transformative potential of regulation. The obstacles to drug policy reform are both daunting and diverse. Powerful and established drug control bureaucracies, both national and international, staunchly defend status quo policies. They seldom question whether their involvement and tactics in enforcing drug policy are doing more harm than good. Meanwhile, there is often a tendency to sensationalize each new "drug scare" in the media. And politicians regularly subscribe to the appealing rhetoric of "zero tolerance" and creating "drug free" societies rather than pursuing an informed approach based on evidence of what works. Popular associations of illicit drugs with ethnic and racial minorities stir fear and inspire harsh legislation. And enlightened reform advocates are routinely attacked as "soft on crime" or even "pro-drug." The good news is that change is in the air. The Global Commission is gratified that a growing number of the recommendations offered in this report are already under consideration, underway or firmly in place around the world. But we are at the beginning of the journey and governments can benefit from the accumulating experience where reforms are being pursued. Fortunately, the dated rhetoric and unrealistic goals set during the 1998 UNGASS on drugs are unlikely to be repeated in 2016. Indeed, there is growing support for more flexible interpretations and reform of the international drug control conventions aligned with human rights and harm reduction principles.

Details: Rio de Janeiro - RJ - Brasil: Global Commission on Drug Policy, 2014. 45p.

Source: Internet Resource: Accessed September 12, 2014 at: http://www.gcdpsummary2014.com/#foreword-from-the-chair

Year: 2014

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 133289


Author: Sprandel, Marcia

Title: Transatlantic Journeys: An Exploratory Research on Human Trafficking from Brazil to Italy and Portugal

Summary: The exploratory research "Transatlantic Journeys" on human trafficking from Brazil to Italy and Portugal was conducted in the framework of the EU funded project "Promoting Transnational Partnerships: Preventing and Responding to Trafficking in Human Beings from Brazil to EU Member States", which aims at contributing to combat trafficking in human beings by reducing the incidence of trafficking from Brazil to EU Member States, particularly Portugal and Italy, in the medium to long term. This publication presents and analyses the findings of the exploratory research, which was conducted by three different research teams, working independently in Brazil, Italy and Portugal.

Details: Vienna: International Centre for Migration Policy Development (ICMPD), 2011. 290p.

Source: Internet Resource: Accessed September 12, 2014 at: http://www.icmpd.org/fileadmin/ICMPD-Website/ICMPD-Website_2011/Capacity_building/THB/Publications/Transatlantic_Journeys.pdf

Year: 2011

Country: International

Keywords: Child Trafficking

Shelf Number: 133291


Author: Winkler, Carol K., ed.

Title: Visual Propaganda and Extremism in the Online Environment

Summary: Visual images have been a central component of propaganda for as long as propaganda has been produced. But recent developments in communication and information technologies have given terrorist and extremist groups options and abilities they never would have been able to come close to even 5 or 10 years ago. There are terrorist groups who, with very little initial investment, are making videos that are coming so close to the quality of BBC or CNN broadcasts that the difference is meaningless, and with access to the web they have instantaneous access to a global audience. Given the broad social science consensus on the power of visual images relative to that of words, the strategic implications of these groups' sophistication in the use of images in the online environment is carefully considered in a variety of contexts by the authors in this collection.

Details: Carlisle, PA: Strategic Studies Institute and U.S. Army War College Press, 2014. 256p.

Source: Internet Resource: Accessed September 12, 2014 at: http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1213

Year: 2014

Country: International

Keywords: Extremism

Shelf Number: 133295


Author: International Centre for Migration Policy Development

Title: Stepping Up the Fight against Trafficking for Labour Exploitation

Summary: The publication Stepping Up the Fight against Trafficking for Labour Exploitation was drafted in the framework of the project "Capacity Building for Combating Trafficking for Labour Exploitation (CB LAB)", funded by the Ministry of Foreign Affairs of the Kingdom of the Netherlands and implemented by the International Centre for Migration Policy Development (ICMPD). The project aimed at setting up a programme of training sessions on trafficking for labour exploitation and related matters, such as cross-border judicial cooperation, transnational police investigation and European and international legal frameworks of combating labour exploitation. This publication summarises the proceedings of the project by reiterating the most important lessons learned and provides a basis for potential replication of one or more of the training sessions conducted in its framework. Based on the recommendations collected and the many forward-looking suggestions, the project team hopes to continue providing support to the countries that participated in the project, catering to the training needs of all target groups while fostering continuity and promoting transnational cooperation. The model for designing multidisciplinary transnational capacity-building activities, introduced by this project publication, is already being used as inspiration for cooperation and similar initiatives in other geographic areas

Details: Vienna: International Centre for Migration Policy Development, 2013. 66p.

Source: Internet Resource: Accessed September 15, 2014 at: http://www.icmpd.org/fileadmin/ICMPD-Website/ICMPD_General/Publications/Stepping_Up_the_Fight_against_Trafficking_for_Labour_Exploitation_Final.pdf

Year: 2013

Country: International

Keywords: Forced Labor

Shelf Number: 133307


Author: FreightWatch International

Title: 2013 Global Cargo Theft Threat Assessment

Summary: Global cargo theft risks as shown on the above map vary greatly from country to country. Even within individual countries, risks can vary from region to region. On a country-by-country basis, cargo theft threats, as most other criminal activity, are typically rooted in social, economic and cultural conditions. The prevention of cargo theft on a global scale requires intimate knowledge of incident trends on a regional basis, as security programs and mitigation techniques do not always transfer successfully from region to region. Organizations must diligently gather intelligence and adapt their anti-theft programs to address local threats. The purpose of this report is to outline the risk of cargo theft on a global level, highlighting significant countries in the global supply chain in order to assist industry decision-makers in determining their supply chain security needs. According to data collected by FreightWatch International from numerous sources across the globe, including but not limited to FreightWatch International's own databases, its customers, law enforcement agencies, industry organizations, insurance industry sources and news reports, Mexico, Brazil, South Africa, the United States and Russia are the countries most at risk for cargo theft globally. Unless otherwise noted in this assessment report, when specific theft statistics are noted in this assessment report those statistics are derived from FreightWatch International's own data based on cargo security services provided by FreightWatch International to its customers. As such, total theft figures for a particular country or region are likely higher than stated. Please note that this assessment report expresses the opinions of FreightWatch International based on the specific data reviewed. Global cargo theft circumstances and risks can and do change, sometimes frequently and/or quickly, and in ways that may make the facts and opinions expressed in this assessment report no longer complete or valid. As such, the extent to which you rely on the facts and opinions expressed in this assessment should be made entirely by you, in your sole discretion, only after careful analysis of all relevant facts applicable to your business.

Details: Austin, TX: FreightWatch International, 2013. 70p.

Source: Internet Resource: Accessed September 15, 2014 at: http://www.freightwatchintl.com/sites/default/files/attachments/FreightWatch%202013%20Global%20Cargo%20Theft%20Threat%20Assesment%20Full_0.pdf

Year: 2013

Country: International

Keywords: Cargo Theft

Shelf Number: 133313


Author: Briggs, Rachel

Title: Review of Programs to Counter Narratives of Violent Extremism: What Works and What are the Implications for Government?

Summary: It is now recognised that violent extremists have made effective use of the Internet and social media to advance their aims, whether through engagement, propaganda, radicalisation or recruitment. While the quality of their output varies, a growing proportion is professional, well produced, contains compelling messages and is delivered by charismatic individuals. In short, it appeals to the new YouTube generation, which expects high-end products that are well-timed and effective. These extremist groups and networks are also transitioning from their own standalone websites and forums towards social media platforms, such as Facebook, Twitter and YouTube, to take their messages to a much wider audience. Governments are interested in understanding what can be done to counter this content, both illegal and legal, which can incite or glamorise the use of violence. Much of the emphasis to date has been placed on restrictive measures, such as takedowns and filtering. While it is important for governments to enforce the law - and be seen to be doing so - there are severe limitations on the effectiveness of this response, given the speed with which new data is uploaded and the limited capacity of law enforcement agencies. More recently, there has been growing interest in alternative approaches to the problem. One such potential solution is provided by 'counter-narratives'; attempts to challenge extremist and violent extremist messages, whether directly or indirectly, through a range of online and offline means. Counter-narrative has become a catch-all term for a wide range of activities with different aims and tactics, everything from public diplomacy and strategic communications by government, to targeted campaigns to discredit the ideologies and actions of violent extremists. In order to make sense of the complex range of actions and initiatives described as 'counter-narratives', the report sets out a 'counter-messaging spectrum', which is comprised of three main types of activities: government strategic communications, alternative narratives and counter-narratives. The counter-messaging spectrum is summarised in the table overleaf. This report was commissioned by Public Safety Canada. It aims to review the state of knowledge about efforts to counter narratives of violent extremism and make recommendations for governments, such as the Canadian government, to guide their emerging work in this sensitive area of policy. It is important to stress that counter-narrative work as an area of public policy is in its infancy. While community and civil society groups have been conducting this work for many years, governments are new to the issue and the private sector is feeling its way with extreme caution. This means that there are only a small number of case studies to draw upon. For this reason, as well as the limited scope of the project, the recommendations for government are tentative.

Details: London: Institute for Strategic Dialogue, 2013. 68p.

Source: Internet Resource: Accessed September 15, 2014 at: http://www.strategicdialogue.org/CounterNarrativesFN2011.pdf

Year: 2013

Country: International

Keywords: Extremist Groups

Shelf Number: 133316


Author: Pavanello, Sara

Title: Survival in the City: Youth, displacement and violence in urban settings

Summary: - Youth, displacement and violence in urban environments are treated as separate areas in humanitarian research, policy and practice. Despite being a key driver of vulnerability, urban violence and its humanitarian consequences are not well understood by the humanitarian community. - Displaced populations, particularly displaced youth, are often particularly exposed to urban violence. However, their needs and vulnerabilities typically go unaddressed. - Tackling the causes of violence in urban settings is a challenge that goes beyond strictly humanitarian concerns to encompass long-term development efforts. While humanitarian action is an important element of the response to urban violence it is inherently limited, and a complementary approach involving development strategies and programmes is required to tackle the root causes of this violence.

Details: London: Overseas Development Institute, Humanitarian Policy Group, 2012. 4p.

Source: Internet Resource: HPG Policy Brief 44: Accessed September 15, 2014 at: http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/7627.pdf

Year: 2012

Country: International

Keywords: At-risk Youth

Shelf Number: 133320


Author: Domingo, Pilar

Title: Dealing with legacies of violence: Transitional justice and governance transitions

Summary: The politics of redress, justice and accountability feature in most post-conflict and post-repression settings. This places transitional justice firmly on the policy agenda of international support to governance transitions. This Background Note reviews some key issues and questions to emerge from the growing literature on transitional justice. It looks at the expansion in the mandate and scope of transitional justice, the range of possible mechanisms and the political factors that influence choices and outcomes in practice. The paper concludes by setting out some key points that international actors need to consider if they are to engage strategically with these processes. Key messages include: - Where domestic political conditions are conducive to transitional justice, there are good reasons for the international community to support these processes. - There is a broad range of transitional justice mechanisms. Their objectives have evolved from an immediate concern with outcomes for victims to more ambitious goals related to state- and peace-building processes. - Transitional justice is a young field of empirical study. More is now known about the political factors that influence the possibility of transitional justice and its subsequent trajectory. - But little is known about both the effectiveness of international support to these processes and their impact on longer-term political and social outcomes.

Details: London: Overseas Development Institute, 2012. 11p.

Source: Internet Resource: Background Note: Accessed September 15, 2014 at: http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/7686.pdf

Year: 2012

Country: International

Keywords: Reparations

Shelf Number: 133321


Author: Schmid, Alex P.

Title: Violent and Non-Violent Extremism: Two Sides of the Same Coin?

Summary: In this Research Paper, ICCT Visiting Research Fellow Dr. Alex P. Schmid seeks to clarify some conceptual issues that tend to obscure the debate about how best to counter violent extremism. The main focus of this Research Paper is on obtaining a clearer understanding of what "Islamist extremism" entails in the context of the ongoing debate on allegedly "acceptable" non-violent extremists and "unacceptable" violent extremists. The author discusses a number of conceptualisations of religious extremism in the context of liberal democracies and also distinguishes, inter alia, between merely "not (yet) violent" militancy and principled non-violent political activism in the Gandhian tradition. The author argues that the distinction between "non-violent extremism" and "violent extremism" is not a valid one. The paper provides a set of twenty indicators of extremism that can be used as an instrument for monitoring extremist statements and actions, with an eye to challenging and countering such non-democratic manifestations.

Details: The Hague: International Centre for Counter-Terrorism, 2014. 31p.

Source: Internet Resource: ICCT Research Paper, 2014: Accessed September 2, 2014 at: http://www.icct.nl/download/file/ICCT-Schmid-Violent-Non-Violent-Extremism-May-2014.pdf

Year: 2014

Country: International

Keywords: Counter-Terrorism

Shelf Number: 133388


Author: Banfield, Jessie

Title: Crime and Conflict: The new challenge for peacebuilding

Summary: This report is offered as a contribution to the growing effort to understand the nexus between organised crime, armed violence and fragility, and to design effective responses. At the heart of the document is the hypothesis that an application of the approaches and overall lens of peacebuilding can enrich broader efforts to reduce and transform contemporary armed violence and fragility linked to organised crime. This approach has not been widely tested in practice, but when it has the results are promising. Over the course of the 20th century, a major period of inter-state warfare and wars of decolonisation gave way to an era of predominantly civil conflicts. The last decade points to further shifts, with far fewer civil wars now recorded worldwide. In their wake, observers seem to agree that conflict is again changing, but a common narrative as to the dominant direction of these changes, and hence the contours of the global peace and security agenda, has yet to gel. However, one major factor correlated to current changing forms of armed violence is now known to be the effect of new patterns, as well as increased scope and scale, both of organised crime and shadow economies operating at national and sub-national levels. Overlapping and blurred categorisations of a raft of non-state armed groups are often strung together in attempts to describe the complexities involved. We can identify three broad dimensions to organised crime and its relationship to armed violence and fragility that can help us hone in on the key problems to be tackled. First, its connection to power holders and political interests poses challenges to governance and statebuilding approaches where the state itself is complicit. Second, attention to the incentives that pull and/or push individuals into crime helps us to identify broad-based response strategies. Third, globalized market structures in key crime commodities, such as illegal drugs, point to the need to look inwards as much as outwards in their response in countries where high demand sustains the financial flows and profits of organised crime. This paints a complex picture. Given this complexity, the degree of consensus on the limitations of current approaches to the problem is perhaps not surprising. For example: - There is widespread recognition that notions of sovereignty can protect state officials complicit in organised crime; - The emphasis on locking up criminals as a major component of the global response to the problem may actually exacerbate violence in some cases; - Little headway has been made in reducing the receptivity of fragile contexts to criminal enterprise; and - Peacebuilding interventions have yet to adequately frame the issue of organised crime within overall responses to conflict and violence. Organised crime has hitherto been treated primarily as a law and order problem. The shift away from an exclusive focus on law enforcement has begun, but it is very recent. Nevertheless, attention to the relationship between organised crime and state fragility is increasing in development policy agendas, and is the subject of a number of recent reports and seminars. This reflects growing recognition that levels of armed violence and associated fragility related to organised crime in different settings demand policy-makers and practitioners to work across the range of factors and policy arenas involved, such as law enforcement and crime prevention, security and diplomacy, development and peacebuilding, and public health. The peacebuilding sector has been slow to come to the table, no doubt influenced by funders' priorities and institutional silos that currently work against the types of joined-up responses that are needed. However, designing interventions that are broad-based and transformative in intent can help to underpin a new generation of responses. In particular: - Conflict analysis is crucial for understanding the dynamics at play. Rounded analysis through a peace and conflict lens, differentiating between root causes, proximate causes and triggers, will help to inform more holistic responses and ensure that projects 'do no harm' - avoiding the unintentional reinforcement of negative conflict dynamics; - Dialogue - often initiated, facilitated and sustained by third parties who are trusted for their impartiality and/or expertise - can bring together the actors involved in and affected by the problem in order to generate solutions; and - Civic activism and empowerment emphasise the importance of bringing a wider range of actors to the fore. The capacity to leverage lasting solutions is to be found beyond state institutions and within and across communities. This includes not only non-governmental organisations (NGOs), but also business leaders, women's organisations, religious institutions and academics. In its concluding section, this report offers five priority areas for action: 1. Conflict-sensitive approaches need to be brought to bear on law enforcement. Law enforcement will remain a key response mechanism to the nexus between organised crime, armed violence and fragility. However, it needs to adopt a 'do no harm' approach as advocated by the peacebuilding sector in relation to development assistance. 2. There is a need for improved analysis and information flow across the whole range of local, national and global dimensions of organised crime. While there has been a flurry of attention to the issues, enormous knowledge gaps remain. Greater analytical purchase across all dimensions will facilitate better monitoring of the impact of policy responses. 3. There needs to be a more innovative and creative way of dealing with predatory power holders. Current state-building approaches require a deeper understanding of the role of predatory power holders, including how criminal agendas can be factored into peace negotiations and processes.

Details: London: International Alert, 2014. 52p.

Source: Internet Resource: Accessed September 23, 2014 at: http://international-alert.org/sites/default/files/CVI_CrimeConflict_EN_2014.pdf

Year: 2014

Country: International

Keywords: Armed Violence

Shelf Number: 133394


Author: Open Society Foundations

Title: Presumption of Guilt: The Global Overuse of Pretrial Detention

Summary: Around the world, millions are effectively punished before they are tried. Legally entitled to be considered innocent and released pending trial, many accused are instead held in pretrial detention, where they are subjected to torture, exposed to life threatening disease, victimized by violence, and pressured for bribes. It is literally worse than being convicted: pretrial detainees routinely experience worse conditions than sentenced prisoners. The suicide rate among pretrial detainees is three times higher than among convicted prisoners, and ten times that of the outside community. Pretrial detention harms individuals, families, and communities; wastes state resources and human potential; and undermines the rule of law. The arbitrary and excessive use of pretrial detention is a massive and widely ignored pattern of human rights abuse that affects - by a conservative estimate - 15 million people a year. The right to be presumed innocent until proven guilty is universal, but at this moment some 3.3 million people are behind bars, waiting for a trial that may be months or even years away. No right is so broadly accepted in theory, but so commonly violated in practice. It is fair to say that the global overuse of pretrial detention is the most overlooked human rights crisis of our time. Presumption of Guilt examines the full consequences of the global overuse of pretrial detention. Combining statistical analysis, first-person accounts, graphics, and case studies of successful reforms, the report is the first to comprehensively document this widespread but frequently ignored form of human rights abuse.

Details: New York: Open Society Foundations, 2014. 269p.

Source: Internet Resource: Accessed September 24, 2014 at: http://www.opensocietyfoundations.org/sites/default/files/presumption-guilt-09032014.pdf

Year: 2014

Country: International

Keywords: Human Rights Abuses

Shelf Number: 133401


Author: Fellmeth, Gracia LT

Title: Educational and skills-based interventions for preventing relationship and dating violence in adolescents and young adults (Review)

Summary: Relationship and dating violence is a significant problem among adolescents and young adults. Relationship violence includes a range of violent behaviours, from verbal abuse to physical and sexual assault, and from threats to rape and murder. Currently there are many programmes in schools and universities and within community settings that aim to prevent relationship violence. It is important to establish whether these programmes work and whether they result in long-term reductions in relationship violence. This review looked at the results of 38 studies. The results showed no convincing evidence that the programmes decreased relationship violence, or that they improved participants' attitudes, behaviours and skills related to relationship violence. The results showed that participants' knowledge about relationships improved slightly following the programmes. These results should be interpreted with caution, as individual studies differed in the types of participants and interventions that they used and the ways in which changes were measured. None of the studies looked at the effect of the programmes on physical and mental health. Further studies, which follow participants for a longer period of time and which look at the relationship between attitudes, knowledge, behaviour, skills and the number of times relationship violence occurs, are required to improve our understanding of how well these programmes work.

Details: Cochrane Collaboration, 2013. 83p.

Source: Internet Resource: The Cochrane Database of Systematic Review2013, Issue 6: Accessed September 24, 2014 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD004534.pub3/pdf/standard

Year: 2013

Country: International

Keywords: Dating Violence

Shelf Number: 133404


Author: Rose, Gregory

Title: Universalizing Jurisdiction Over Marine Living Resources Crimes

Summary: A growing world population, and especially coastal and island communities in the developing world, depend upon healthy oceans as a source of livelihoods and food. But the oceans are in crisis. As much as 85 percent of global fisheries are exploited to their limits or beyond. Ninety percent of large predatory fish are gone. Coastal habitats are under stress from a multitude of activities. Efforts to manage fisheries and to protect important marine habitats are stymied by illegal activity. Marine living resource crime, including the illegal catching of fish and the destruction of habitats or ecosystems, often crosses national borders and involves several nationalities, including that of crew, flag of vessel and ownership, as well as in the supply chain from boat to plate. Marine living resource crime obstructs efforts to sustainably manage marine resources. Serious violations of international rules for the conservation and management of marine living resources need an urgent response. Transnational crime cases warrant international legal cooperation. Marine living resource crime must be addressed if we are to achieve the goals agreed at Rio+20 to ensure sustainable development. WWF is working to help governments, communities and industry ensure the world's oceans are healthy and can provide food security and sustainable livelihoods into the future. This report, commissioned by WWF, and prepared by the Australian National Centre for Ocean Resources and Security (ANCORS) sets out a range of options to combat marine living resource crime. It argues for particular international legal actions to enforce laws against marine living resources crimes. Coordinating enforcement requires harmonizing enactments against marine living resources crime, which are small, but revolutionary, steps towards universalizing jurisdiction to deliver effective governance at sea. States will then better be able to ensure the oceans can provide food security and livelihoods for generations to come.

Details: New York: World Wildlife Fund, 2013. 120p.

Source: Internet Resource: Accessed September 25, 2014 at: http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2261&context=lhapapers

Year: 2013

Country: International

Keywords: Crimes Against Nature

Shelf Number: 133410


Author: Myers, Juliette

Title: Untying the Knot: Exploring Early Marriage in Fragile States

Summary: Tying the knot: an expression that for most of us evokes happy memories of one of the best days of our lives. However, the fun of planning the wedding and the heady excitement of the first weeks of marriage will not be the experience of 13.5 million girls this year. Instead, fearing threats, and encouraged or coerced into marriage as a means of protection, nearly one-in-three girls in developing countries will marry before the age of 18. The younger the girl, the more harmful the consequences: I have seen girls as young as eight being married off to men decades older than them. The impact of sexual activity on children who are too young can be catastrophic. Children having children continues to be a common phenomenon across the developing world, with deaths caused by early pregnancy and birth complications the biggest cause of mortality for girls aged 15-19. Beyond the physical harm they face, is the complete loss of childhood. Children who marry do not play with their friends, are often not attending school, do not have access to opportunities for their future, and are confined within roles which bring responsibilities that they did not choose and often do not understand. This report unravels the links between fragility and early marriage. By showing how marriage is used as a perceived means of 'protection' for girls, this report is a unique contribution to the evidence base of factors driving early marriage prevalence. Revealing the complex causes of this harmful practice, World Vision also identifies key actions that can be taken, both globally and by the UK Government, to reduce the stress on communities and provide families with alternative, effective means of really protecting their daughters.

Details: Fox Mine, Milton Keynes, UK: World Vision UK, 2013. 52p.

Source: Internet Resource: Accessed September 25, 2014 at: http://www.worldvision.org/resources.nsf/main/press-reports/$file/untying-the-knot_report.pdf

Year: 2013

Country: International

Keywords: Child Marriage

Shelf Number: 133420


Author: Law Library of Congress, Global Legal Research Center

Title: Sentencing Guidelines: Australia, England and Wales, India, South Africa, Uganda

Summary: Sentencing guidelines in the common law countries of Australia, England and Wales, India, South Africa, and Uganda vary significantly. England and Wales have a Sentencing Council that develops offense-specific guidelines that the courts must follow, while Uganda's Supreme Court has developed guidelines that are advisory only. In India and Australia, no formal guidelines exist and judges retain wide discretion in sentencing, but both countries have mechanisms in place to provide general guidance-in Australia through state legislation and in India through a series of court decisions that identify relevant sentencing factors.

Details: Washington, DC: Law Library of Congress, 2014. 58p.

Source: Internet Resource: Accessed September 25, 2014 at: http://www.loc.gov/law/help/sentencing-guidelines/sentencing-guidelines.pdf

Year: 2014

Country: International

Keywords: Courts

Shelf Number: 133423


Author: Sellar, John M.

Title: Policing the Trafficking of Wildlife: Is there anything to learn from law enforcement responses to drug and firearms trafficking?

Summary: The "tipping point" on wildlife crime is fast approaching: the extinction of key species and irreparable damage to the environment are both imminent possibilities in the near future. Growing demand for wildlife products in key markets has triggered a professionalization and aggression in poaching which is unparalleled. Armed with advanced weaponry, surveillance equipment and facilitated by extensive corruption, the criminal market in wildlife crime is now one of the most significant illicit markets in the world. Key species such as the rhino are being slaughtered at record levels. Lesser known animals are traded at a scale that is almost incomprehensible. This is no longer just a criminal act: it is warfare. The law enforcement community, at national and international levels, has long been engaged in what are described as 'wars' against narcotic and firearm trafficking. These two forms of criminality share many of the same features as those of wildlife trafficking, particularly as all three involve: the harvesting or acquisition of material or products in one State; usually require illicit export from the same State; the subsequent clandestine movement of the material or products across further national borders (regularly many borders and also intercontinentally); illicit import to the State of destination; and final delivery to customers and consumers. This paper is not an attempt to determine whether battles have been lost or won in each of these wars. Rather, it seeks to describe some of the strategies adopted by individual nations and international alliances to respond to drug and firearms trafficking, the manner in which they have rallied their troops, and examines whether illegal trade in wildlife can be thought of as a 'common enemy' and, thus, addressed in a similar fashion. The assessment and findings presented in this report are drawn from the extensive experience of the author, a law enforcement professional with over four decades of experience. The author held the role of Chief of Law Enforcement for CITES, and during 14 years with CITES he conducted 234 missions to 66 countries, assessing enforcement in the field and designing strategies to tackle wildlife trafficking. Thus while this study may not draw upon comprehensive research, it nonetheless presents an unparalleled expert perspective of the global state of affairs.

Details: Geneva, SWIT: Global Initiative against Transnational Organized Crime, 2014. 46p.

Source: Internet Resource: Accessed September 25, 2014 at: http://www.rhinoowners.org/WYSI/assets/SRP%20DOCS/Global%20Initiative%20-%20Wildlife%20Trafficking%20Law%20Enforcement%20-%20Feb%202014.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 133424


Author: Milliken, Tom

Title: Illegal Trade in Ivory and Rhino Horn: As Assessment to Improve Law Enforcement Under the Wildlife TRAPS Project

Summary: Illegal rhino horn trade has reached the highest levels since the early 1990s, and illegal trade in ivory increased by nearly 300 percent from 1998 to 2011, according to a new report by U.S. Agency for International Development (USAID) partner TRAFFIC. The report, Illegal trade in ivory and rhino horn: an assessment to improve law enforcement, is a key step to achieving USAID's vision to adapt and deploy a range of development tools and interventions to significantly reduce illegal wildlife trafficking. The report was prepared by the wildlife monitoring network TRAFFIC in partnership with USAID. The assessment uses robust analysis to identify capacity gaps and key intervention points in countries combating wildlife trafficking. Seizure data indicate that "the fundamental trade dynamic now lies between Africa and Asia," according to the report. In China and Thailand, elephant ivory is fashioned into jewelry and carved into other decorative items, while wealthy consumers in Vietnam use rhino horn as a drug which they mistakenly believe cure hangovers and detoxify the body. Rhinos and elephants are under serious poaching pressure throughout Africa, with even previously safe populations collapsing: Central Africa's forest elephants have been reduced by an estimated 76 percent over the past 12 years while in Tanzania's Selous Game Reserve, elephant numbers have fallen from 70,000 in 2007 to only 13,000 by late 2013. A record 1004 rhinos were poached in 2013 in South Africa alone - a stark contrast to the 13 animals poached there in 2007 before the latest crisis began. Record quantities of ivory were seized worldwide between 2011 and 2013, with an alarming increase in the frequency of large-scale ivory seizures (500 kg or more) since 2000. Preliminary data already show more large-scale ivory seizures in 2013 than in the previous 25 years. Although incomplete, 2013 raw data already represent the greatest quantity of ivory in these seizures in more than 25 years. Both rhino horn and ivory trafficking are believed to function as Asian-run, African-based operations, with the syndicates increasingly relying on sophisticated technology to run their operations. In order to disrupt and apprehend the individuals behind them, the global response needs to be equally sophisticated. "There's no single solution to addressing the poaching crisis in Africa, and while the criminals master-minding and profiting from the trafficking have gotten smarter, so too must enforcement agencies, who need to improve collaborative efforts in order to disrupt the criminal syndicates involved in this illicit trade," says Nick Ahlers, the leader of the Wildlife TRAPS Project. Rhino horn is often smuggled by air, using international airports as transit points between source countries in Africa and demand countries in Asia. Since 2009, the majority of ivory shipments have involved African seaports, increasingly coming out of East Africa. As fewer than 5 percent of export containers are examined in seaports, wildlife law enforcement relies greatly on gathering and acting on intelligence to detect illegal ivory shipments. The report recommends further developing coordinated, specialized intelligence units to disrupt organized criminal networks by identifying key individuals and financial flows and making more high level arrests. Also critically important are improved training, law enforcement technology, and monitoring judiciary processes at key locations in Africa and Asia.

Details: Cambridge, UK; TRAFFIC International; Washington, DC: USAID, 2014. 30p.

Source: Internet Resource: A Traffic Report: Accessed September 27, 2014 at: http://www.traffic.org/storage/W-TRAPS-Elephant-Rhino-report.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 133456


Author: Dastouri, Serenna

Title: Drug Detection Strategies: International Practices within Correctional Settings

Summary: The current report was completed in response to the recommendations of both a focus group study on drug interdiction in Correctional Service Canada (CSC) institutions (Johnson and Allen, 2006) and the Independent Review Panel on federal corrections (2007) to examine and report on effective drug detection methods used in other correctional jurisdictions and provides insight into the efficacy of these methods. The intention is to assist in determining which interdiction technologies currently in use should be maintained and whether tools utilized in other jurisdictions could be considered for future use. The report begins with an overall description of the most widely-used drug detection techniques and practices in selected jurisdictions, including their current use in CSC, and reports on their strengths and limitations. The second section of the report examines studies that have evaluated the effect that these practices have had on the drug situation in institutions in the jurisdictions examined. The four main interdiction strategies reviewed are the use of canine detecting units, trace detection technology, bulk detection technology, and mandatory drug testing. All four strategies are currently employed by CSC. The canine units, bulk technology, and mandatory drug testing are all also used in the UK, US and Australia. Internationally, the use of trace detection technology was documented only in the United States, with the exception of one Australian institution. Although numerous major correctional jurisdictions use detector dogs (e.g., US, UK, Australia, Canada), there is no conclusive research evidence to demonstrate that canine detecting units have a significant impact on reducing the availability of drugs in correctional facilities. Trace detection technology has the capacity to identify many of the drugs of concern but research has demonstrated that trace detection is more sensitive to certain drugs (e.g., cocaine) than others (e.g., marijuana or drugs in pill form) and can generate high "false positive" rates. Research suggests that trace detection may reduce the availability of drugs in prison. Urine is the biological specimen most commonly used to test for drug metabolites in a correctional setting. Overall, results on the effectiveness of urinalysis as a deterrent are mixed. Issues of concern include the ease of altering urine specimens and the variability in metabolite half-lives of different substances which makes drugs with a longer half-life (e.g., marijuana) easier to detect in urine than those that metabolize quickly (e.g., cocaine or opiates) and the potential that this may result in drug-using inmates switching to more serious drugs with a shorter half-life in an effort to avoid detection. However, unequivocal evidence to support this contention is not currently available. Overall, it is clear that all of the drug detection tools examined are capable of detecting drugs. However, each method comes with certain benefits and drawbacks, sometimes in a complementary fashion. What remains unclear is which tool or combination of tools yield the most accurate (low false positive and false negative), cost-effective results. Therefore, the ability to detect drugs and the impact of the use of these tools on inmate drug use, drug seizures, and drug smuggling (by inmates, staff and visitors) is currently unknown. Many of the evaluations examined were not easily comparable due to the inconsistent collection and presentation of data. Furthermore, the difficulty of acquiring accurate baseline data renders it difficult to determine the overall effect of any single interdiction method on the amount of illicit drugs entering the facilities.

Details: Ottawa: Correctional Service of Canada, 2012. 60p.

Source: Internet Resource: Research Report No. R-258: Accessed September 27, 2014 at: http://www.publicsafety.gc.ca/lbrr/archives/cn21488-eng.pdf

Year: 2012

Country: International

Keywords: Canine Units

Shelf Number: 133457


Author: Gastrow, Peter

Title: Transnational organised crime: The stepchild of crime-combating priorities

Summary: Experts continue to argue about an appropriate definition for organised crime, and ordinary citizens and lawmakers do not really know what it means. We tend to feel intense about the crime categories that make up organised crime, such as the trafficking of women and children, the poaching and smuggling of rhino horn and ivory, the selling of fake medicines, abalone poaching, the smuggling of endangered species, trafficking in narcotics, bank fraud or cybercrime. But organised crime as a concept tends to leave most people untouched. Pressure from voters on politicians and the latter's hope of re-election contribute to crime- combating strategies being short term, uncoordinated and confined within national borders. Little attention is paid to transnational organised crime even though it is developing into a major international security threat. It has gone global, but effective global responses have not been developed. Undoubtedly, some of the battles against transnational organised crime are being won, but we are losing the war. The vulnerabilities of developing countries should make the warning lights for Africa go on even stronger than elsewhere. Through its regional organisations and the AU, Africa should start working on a coordinated regional approach towards countering transnational organised crime on the continent, because individual states will no longer be able to do so on their own.

Details: Pretoria, South Africa: Institute for Security Studies, 2013. 4p.

Source: Internet Resource: Policy Brief: Accessed October 1, 2014 at: http://www.issafrica.org/publications/policy-brief/transnational-organised-crime-the-stepchild-of-crime-combating-priorities

Year: 2013

Country: International

Keywords: Drug Trafficking

Shelf Number: 133525


Author: KPMG

Title: Global profiles of the fraudster: White-collar crime -- present and future

Summary: Fraud specialists have long debated whether it is possible to develop a profile of a fraudster that is accurate enough to enable organizations to catch people in the act of fraud or even beforehand. The prediction of a crime before it occurs is, at least for now, the subject of science fiction. But an analysis of the constantly changing nature of fraud and the fraudster can help organizations stiffen their defenses against these criminal activities. Forewarned is forearmed. Global profiles of the fraudster contains KPMG International's analysis of 596 fraudsters member firms investigated between 2011 and 2013 with insights into the relationship between the attributes of fraudsters, their motivations and the environments in which they flourish. KPMG International gathered data from fraud investigations conducted by KPMG member firms' forensic specialists in Europe, Middle East and Africa (EMA), the Americas, and Asia-Pacific regions between August 2011 and February 2013. The survey examined 'white-collar' crime investigations conducted across the three regions where we were able to identify the perpetrator and could provide detailed contextual information on the crime. We have developed a series of themes in order to understand the changing relationship among the fraudster, his/her environment and the frauds committed. And after taking into account the insights of our investigation leaders around the world, we conclude that the type of fraud and the type of fraudster are continually changing.

Details: Zurich, SWIT: KPMG, 2013. 28p.

Source: Internet Resource: Accessed October 6, 2014 at: http://www.kpmg.com/Global/en/IssuesAndInsights/ArticlesPublications/global-profiles-of-the-fraudster/Documents/global-profiles-of-the-fraudster-v2.pdf

Year: 2013

Country: International

Keywords: Crimes Against Businesses

Shelf Number: 133560


Author: Jetter, Michael

Title: Terrorism and the Media

Summary: This paper systematically analyzes media attention devoted to terrorist attacks worldwide between 1998 and 2012. Several aspects are related to predicting media attention. First, suicide missions receive significantly more coverage, which could explain their increased popularity among terrorist groups. This result is further supported by Oaxaca-Blinder decompositions, suggesting that it is not the particular characteristics of suicide attacks (e.g., more casualties) that are driving heightened media attention. Second, less attention is devoted to attacks in countries located further away from the US. Third, acts of terror in countries governed by leftist administrations draw more coverage. However, this finding is not confirmed for suicide attacks conducted in countries ruled by leftist administrations. Fourth, the more a country trades with the US, the more media coverage an attack in that country receives. Finally, media attention of any terror attack is both predictive of the likelihood of another strike in the affected country within seven days' time and of a reduced interval until the next attack

Details: Bonn, Germany: Institute for the Study of Labor, 2014. 55p.

Source: Internet Resource: IZA Discussion Paper No. 8497: Accessed October 8, 2014 at: http://ftp.iza.org/dp8497.pdf

Year: 2014

Country: International

Keywords: Media

Shelf Number: 134226


Author: Wolfe, Simon

Title: Whistleblower Protection Laws in G20 Countries: Priorities for Action

Summary: Background The G20 countries committed in 2010 and 2012 to put in place adequate measures to protect whistleblowers, and to provide them with safe, reliable avenues to report fraud, corruption and other wrongdoing. While much has been achieved as a result of the G20 commitment, on the whole much remains to be done to meet this important goal. Many G20 countries' whistleblower protection laws continue to fail to meet international standards, and fall significantly short of best practice. Lacking strong legal protections, government and corporate employees who report wrongdoing to their managers or to regulators can face dismissal, harassment and other forms of retribution. With employees deterred from coming forward, government and corporate misconduct can be perpetuated. Serious wrongdoing such as corruption, fraud, financial malpractice, public health threats, unsafe consumer products and environmental damage can persist without remedy. Objective This report analyses the current state of whistleblower protection rules in each of the G20 countries, applying to the identification of wrongdoing in both the public and private sectors. It is the first independent evaluation of G20 countries' whistleblowing laws for both the private and public sectors, having been researched by an international team of experts drawn from civil society and academia. While G20 countries do self-reporting on implementation, to date this reporting has been "broad brush", and tends towards a more flattering and less useful picture of progress than may really be the case. By contrast, this report uses recognised principles to provide a more in-depth picture of the state of progress, and whether a case for continued high-level cooperation remains. Each country's laws were assessed against a set of 14 criteria (see Table below), developed from five internationally recognised sets of whistleblower principles for best legislative practice. The report is based on a public consultation draft released in June 2014. Earlier draft findings and the consultation draft were distributed to a wide range of experts and whistleblowing-related NGOs in G20 countries. The consultation draft was also submitted to all G20 governments for comment, through the T20 (Think20) engagement group and the G20 Anti-Corruption Working Group. This report only analyses the content of laws related to whistleblower protection in each country. This written law is only part of what is necessary to ensure those who reveal wrongdoing are protected in practice, with actual implementation of any law representing a different and ongoing challenge for G20 countries. We stress that positive assessment of the presence and comprehensiveness of legal provisions in this report is not a measure of the extent or quality of actual whistleblower protection in any country. Further, in countries with lower scores, there may be cultural or other norms that in fact indirectly assist in practical protection of whistleblowers.

Details: Blueprint for Free Speech, 2014. 76p.

Source: Internet Resource: Accessed October 9, 2014 at: https://blueprintforfreespeech.net/wp-content/uploads/2014/09/Whistleblower-Protection-Laws-in-G20-Countries-Priorities-for-Action.pdf

Year: 2014

Country: International

Keywords: Corporate Crime

Shelf Number: 133609


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children

Summary: This Study on the effects of new information technologies on the abuse and exploitation of children was prepared pursuant to Economic and Social Council resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children, in which the Council expressed concern that increasingly rapid technological advances have created new possibilities for the criminal misuse of new information and communication technologies. The study is based primarily on open source research and the outcomes of an informal expert group meeting on ICT facilitated abuse and exploitation of children, held in Vienna from 23 to 25 September. In accordance with Council resolution 2011/33, relevant information from the 2013 Comprehensive Study on Cybercrime prepared for the consideration of the open-ended intergovernmental expert group on cybercrime is also taken into account. The study is divided into four chapters and contains a glossary as an annex.

Details: Vienna: UNODC, 2014. 72p.

Source: Internet Resource: Accessed October 9, 2014 at: https://www.unodc.org/documents/commissions/CCPCJ/CCPCJ_Sessions/CCPCJ_23/E-CN15-2014-CRP1_E.pdf

Year: 2014

Country: International

Keywords: Child Abuse

Shelf Number: 133926


Author: Gibbs, Stephen

Title: Applying the Theory and Techniques of Situational Criminology to Counterinsurgency Operations: Reducing Insurgency through Situational Prevention

Summary: This research introduces and adapts the 25 techniques of Situational Crime Prevention for use in counterinsurgency operations. These techniques are based on a set of powerful theories within the fields of Environmental and Situational Criminology. Situational Prevention is a strategy that addresses specific crimes, or insurgent activity, by managing, designing, and manipulating the environment in a manner that seeks to increase the risk to the insurgent, while reducing the insurgent's potential reward for committing the act. The 25 techniques offer a practical means to apply these theories to the reality of counterinsurgency operations. Use of the 25 techniques would expand the repertoire of preventive countermeasures, and enable a security force to intervene in the causal chain events to prevent or reduce the occurrence of insurgent violence and crime. These techniques originate from five core principles: increasing effort, increasing risk, reducing rewards, removing excuses, and reducing provocations.

Details: Monterey, CA: Naval Postgraduate School, 2010. 77p.

Source: Internet Resource: Thesis: Accessed October 9, 2014 at: https://www.hsdl.org/?view&did=21247

Year: 2010

Country: International

Keywords: Counter-Terrorism

Shelf Number: 133612


Author: Eck, John E.

Title: Intelligence Analysis for Problem Solvers

Summary: before the attack - that is, for failing to detect a pattern in the scattered items of information about the hijackers that had come to the attention of various federal and state agencies. The resulting calls for intelligence reform were at first confined to the nation's security agencies, the FBI and the CIA. Soon police leaders began to argue that their agencies, too, had a vital role in addressing terrorism and that they must be included in the loop. Terrorism may have raised the profile of police intelligence, but it is not the main reason for improving its use. Police intelligence has a far wider role in public safety, crime reduction, and order maintenance. This wider role is explored throughout this manual. Unfortunately, the word "intelligence" also raises public fears that secretly collected police information will be used to subvert individual liberties and democratic institutions. We will touch on these concerns later; here, we should explain why we wrote the manual, who it is for, and what it covers. What is this manual about and who is it for? As we discuss in Step 1, intelligence analysis is "a process for making sense of a diverse array of information about crime problems created by offender groups, with the goal of reducing crime." Numerous books and manuals for crime analysts are available that describe how to process data to guide police anti-crime tactics and strategies. In contrast, most writing on police intelligence focuses on data gathering and sharing, administration, and legal requirements. These are all important topics, but they do not help the analyst analyze, i.e., make sense of the data in order to glimpse behind the veil of a criminal enterprise. Our manual fills this gap by providing a practical guide to intelligence analysis, much like our earlier manual on crime analysis written for the Center for Problem-Oriented Policing. In writing this manual, it soon became clear that police intelligence has a much larger mission than simply finding out who is up to no good, who they hang out with, what they are about to do, and where they can be found. These are the sorts of questions we normally expect police intelligence to address. However, there are other questions that intelligence analysis can effectively address, such as: How do offenders commit their crimes? What circumstances help them commit their crimes? And, what countermeasures might prevent them from doing so? In short, we look beyond the "who" to address "how," "when," "where," and "what." This manual fuses aspects of intelligence analysis with Problem-Oriented Policing. The links between the two have been ignored in the past, with the exception of Jerry Ratcliffe's book referenced below. However, knowing how intelligence analysis can help solve problems and how problem solving can improve the effectiveness of intelligence analysis will aid any police practitioner interested in reducing crime or disorder. This manual is not intended to serve the entire law enforcement community. Nor does it describe all facets of intelligence. Rather it focuses on the analysis of intelligence, and we wrote it for three groups in local policing agencies: (1) intelligence officers and analysts, (2) crime analysts who might need to use intelligence information and, (3) police managers who supervise crime and intelligence analysts. If you are such a manager, and you find that the work of analysts is something of a mystery, then we hope this manual can demystify their work and help you make better use of your analysts.

Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services; Madison, WI: Center for Problem-Oriented Policing, 2013. 144p.

Source: Internet Resource: Accessed October 9, 2014 at: http://www.popcenter.org/library/reading/pdfs/Intell-Analysis-for-ProbSolvers.pdf

Year: 2013

Country: International

Keywords: Crime Analysis

Shelf Number: 133627


Author: International Organization for Migration (IOM)

Title: Fatal Journeys: Tracking Lives Lost during Migration

Summary: "Fatal Journeys: Tracking Lives Lost During Migration," the world's most comprehensive tally to date of migrant fatalities across land and sea. With a count surpassing 40,000 victims since 2000, IOM calls on all the world's governments to address what it describes as "an epidemic of crime and victimization." "Our message is blunt: migrants are dying who need not," said IOM Director General William Lacy Swing, "It is time to do more than count the number of victims. It is time to engage the world to stop this violence against desperate migrants." The research behind "Fatal Journeys," which runs to over 200 pages, began with the October 2013 tragedy when over 400 migrants died in two shipwrecks near the Italian island of Lampedusa. The report, compiled under IOM's Missing Migrants Project, indicates Europe is the world's most dangerous destination for "irregular" migration, costing the lives of over 3,000 migrants this year. Calculations based on incidents compiled by The Migrants Files, a joint project conducted under the aegis of Journalism++ , suggests over 22,000 migrants have died trying to reach Europe since 2000, mainly on treacherous routes across the Mediterranean Sea. Besides counting fatalities, the Missing Migrants Project is part of a broader effort to use social media to engage communities around the world. With this month's Malta shipwreck tragedy, IOM offices worldwide received calls and emails from family members across Europe and the Middle East seeking news about their missing relatives, many of whom are now feared dead. Going forward, the Missing Migrants Project will lend a powerful voice of deterrence to keep future victims from embarking on these dangerous journeys.

Details: Geneva, SWIT: International Organization for Migration, 2014. 216p.

Source: Internet Resource: Accessed October 11, 2014 at: http://www.iom.int/files/live/sites/iom/files/pbn/docs/Fatal-Journeys-Tracking-Lives-Lost-during-Migration-2014.pdf

Year: 2014

Country: International

Keywords: Immigration

Shelf Number: 133929


Author: Law Library of Congress, Global Legal Research Center

Title: Police Weapons in Selected Jurisdictions

Summary: This report examines the weapons and equipment generally at the disposal of law enforcement officers in several countries around the world. It also provides, for each of these countries, a brief overview of the rules governing the use of weapons by law enforcement officers. Precise and reliable information on the weapons and equipment of some countries' police forces was often difficult to find.

Details: Washington, DC: Law Library of Congress, 2014. 105p.

Source: Internet Resource: Accessed October 17, 2014 at: http://www.loc.gov/law/help/police-weapons/police-weapons.pdf

Year: 2014

Country: International

Keywords: Guns

Shelf Number: 133737


Author: van der Gaag, Nikki

Title: Because I am a Girl: The State of the World's Girls 2011: So What About Boys?

Summary: Why should boys and young men care about gender equality? 1.Girls' and women's rights are human rights. If men and boys believe in justice and fairness, they will be able to see that their mothers, sisters and girlfriends are often not treated the same way as they are, do not enjoy the same level of respect in the community, and do not have the same opportunities to make choices about their lives. 2.Greater gender equality will help boys to succeed in school, to be comfortable with their own identity, to be confident in expressing emotions and to be equipped with the skills to build positive relationships of mutual trust and respect. 3.Gender equality has often meant more freedom for girls and women to define themselves in new ways, but little corresponding change for boys and men. A new perspective on gender is about a more productive way of viewing power relationships to the benefit of both sexes.

Details: Toronto: Plan International, 2011. 206p.

Source: Internet Resource: Accessed October 20, 2014 at: http://plancanada.ca/Downloads/BIAAG/GirlReport/BIAAG-Report-2011-prerelease.pdf

Year: 2011

Country: International

Keywords: Gender Equality

Shelf Number: 133749


Author: Chandran, Remi

Title: Bytes beyond Borders: Strengtning Transboundary Information Sharing on Wildlife Crime through the Wildlife Enforcement Monitoring System (WEMS) Initiative,

Summary: The multi-billion dollar illegal wildlife trade is a global crisis that not only threatens the conservation of protected species but also has deep implications for peace and security in nations across the world. As wildlife trafficking becomes more organized and illegal trade of wildlife continues to flourish on the ground and in cyberspace, there is an urgent need for a concerted international effort to gather and share wildlife crime information among law enforcement and policymakers, empowering them to stem the tide of wildlife trafficking. There are several good examples out of such efforts, primarily by the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) and INTERPOL, to combat wildlife poaching and transboundary illegal wildlife trade. At a policy level, the formation of the International Consortium on Combating Wildlife Crime (ICCWC)1 can be considered as one of the major achievements in recent times, where CITES, INTERPOL, World Bank, UN Office on Drugs and Crimes (UNODC) and World Customs Organization have come together as one unit to address the issue. The good work done by civil society, including WWF, TRAFFIC, International Fund for Animal Welfare (IFAW), Environmental Investigation Agency (EIA) and member organizations of the International Union for Conservation of Nature (IUCN) and Species Survival Network (SSN) including grass root NGOs, is noteworthy as well. Yet, combating wildlife crime remains a big challenge. The collective efforts of the conservation community and governments are still unable to check the behaviour of poaching syndicates and organized criminals. We remain far behind in finding an adequate response to the crisis.

Details: Yokohama: United Nations University Institute of Advanced Studies, 2013. 8p.

Source: Internet Resource: Policy Brief: Accessed October 22, 2014 at: http://archive.ias.unu.edu/resource_centre/bytes_beyond_borders-strengthening_transboundary_information.pdf

Year: 2013

Country: International

Keywords: Animal Poaching

Shelf Number: 133794


Author: Pereznieto, Paola

Title: The costs and economic impact of violence against children

Summary: This briefing paper presents the main findings of a report commissioned by ChildFund Alliance, exploring the economic impacts and costs of violence against children. It presents a summary of the available evidence from different countries and provides some estimates of the global costs of violence and exploitation against children. The briefing discusses government spending to prevent and respond to violence against children as well as good preventive practices. It also provides some policy recommendations. In summary, this report finds that there are significant costs for individuals, communities, governments and economies from the different forms of violence against children. In the case of global costs resulting from physical, psychological and sexual violence, these costs can be as high as 8% of global GDP. Considering other forms of violence, such as children's involvement in hazardous work, the global costs are estimated to be $97 billion every year, which is equivalent to seven times Iceland's 2013 GDP. The economic impact of another form of violence against children - that of children associated with armed forces or groups - has been estimated to be $144 million annually.

Details: London: Overseas Development Institute, 2014. 79p.

Source: Internet Resource: Accessed October 24, 2014 at: http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/9177.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 133815


Author: Boriboonthana, Yossawan

Title: The effect of restorative justice practices on crime victims : a meta-analysis

Summary: When the restorative justice idea is implemented, its goals and values might not be entirely pursued clue to various factors such as penal goals, relevant social theories, cultural difference, and the values and norms of people in society. These factors might have an influence on its practices as well as its electiveness. Moreover, empirical evidence relating to the effect of restorative justice practices on crime victims is not consistent and casts doubt on its reliability and validity. These limitations snake it uncertain that restorative justice practices can restore victims. Therefore, this research study aims to investigate the actual effect by systematically analysing quantitative and qualitative findings of the existing studies conducted in various countries, compare the effect between different restorative justice practices. i. e. conferencing and mediation and the conventional criminal justice system: and investigate factors relating, to the effect. i. e., case characteristics, scheme characteristics and study characteristics. The meta-analytical method is used to analyse research findings collected from 17 restorative justice schemes implemented in Australia, Canada, New Zealand, United States and United Kingdom. Results from the meta-analysis confirm that comer acing and mediation have a profound effect on the outcomes of victim satisfaction, perception of fairness, fear of revictimisation, attitude toward offenders, agreement completion, and receiving of an apology. The effect ranges from 2 to 12 times as opposed to the conventional justice system with the highest on the outcome of the receiving of an apology and the lowest on the outcome of the perception of fairness. Two outcomes are examined further and results show that restorative justice practices are likely to increase victim satisfaction and perception of fairness among victims of serious cases more so than among victims of less serious cases. In addition, they are likely to increase victim satisfaction and perception of fairness on victim's attitude toward the way their cases were handled than the case outcomes. These findings confirm the importance of the restorative process and suggest that restorative justice schemes should put more emphasis on serious cases.

Details: Sheffield, UK: Sheffield University, 2006. 262p.

Source: Internet Resource: Thesis: Accessed October 27, 2014 at: http://etheses.whiterose.ac.uk/3582/1/427216.pdf

Year: 2006

Country: International

Keywords: Restorative Justice

Shelf Number: 133816


Author: Jones, Derek

Title: Understanding the Form, Function, and Logic of Clandestine Insurgent and Terrorist Networks: The First Step in Effective Counternetwork Operations

Summary: Lieutenant Colonel Derek Jones wrote this School of Advanced Military Studies award-winning comprehensive study of clandestine cellular networks and the effect on counterinsurgency operations in 2008 while a student at the School of Advanced Military Studies, Fort Leavenworth, Kansas. Consequently, his monograph, although timeless in its discussion and analysis of clandestine cellular networks, was drafted years before the May 2011 operation against Osama bin Laden that resulted in his death. Therefore, the paper does not address the impact on such organizations from the death of its most charismatic leader. His monograph does provide, however, a theoretical, doctrinal, and operational understanding of the form, function, and logic of clandestine cellular networks resulting in valuable insight and understanding of the complex nature of these organizations. As the world s societies have migrated into the urban areas, according to Lieutenant Colonel (LTC) Jones, the urban guerrilla, underground, and auxiliaries, all operating as clandestine cellular networks, have become increasingly important, especially the core members of the movement within the underground. His analysis presents the problem from a Western military, and especially the counterinsurgent perspective pointing out that the primary components of these networks, the underground and auxiliary elements and the urban guerrillas, exist among and are drawn from the local population. As such, thus, they continually frustrate counterinsurgent operations. Any misapplication of force by the counterinsurgent, in LTC Jones s view, automatically delegitimizes the government s efforts. LTC Jones answered the primary research question what is the form, function, and logic of clandestine cellular networks? Although each insurgency is unique, underground clandestine cellular networks as the foundation of insurgent organizations are not, nor are their form, function, and logic.

Details: MacDill Air Force Base, Florida: Joint Special Operations University, 2012. 139p.

Source: Internet Resource: JSOU Report 12-3: Accessed October 27, 2014 at: http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA572767

Year: 2012

Country: International

Keywords: Counterterrorism

Shelf Number: 131728


Author: Salamanca, Luis Jorge Garay

Title: Understanding the Structure of Transnational Criminal Networks Operating in the U.S./Mexico Border and the Southeastern Border of the European Union

Summary: Systemic crime and systemic corruption, much like any other activity, require the interaction of different agents. Some of those interactions are sporadic and some are permanent. In general, there are "many situations that social actors create and must negotiate in their behavior" (Radil, Flint, & Tita, 2010, p. 308), and it is possible to model and analyze those situations when arranged as a social network. Additionally several States and multilateral agencies acknowledge Transnational Criminal Networks (TCNs) as one of the most important threats for the domestic and transnational stability. Bearing this in mind, the purpose of this document is to model and analyze situations of crime consisting on Transnational Criminal Network (TCNs) operating in the southern border of The United States and the Southeastern border of the European Union, both regions concentrating some of the most dangerous and powerful TCNs on a global scale. The present document consists of eight sections. The first is the methodological and theoretical framework. The second is an introduction to the current situation of crime in Mexico. The third is the model and analysis of a TCN operating across Mexico and the United States, in which members of "Los Zetas" and "La Familia Michoacana" participate on activities of drug and hydrocarbons trafficking. The fourth section is an analysis of how the modeled Mexican TCN operates inside the United States. Implications for the stability and national security of the United States are also explored in the fourth section. The fifth section is an introduction to the situation of crime and corruption in Bulgaria, herein interpreted as the southeastern border of the European Union. In the sixth section four TCNs are modeled and analyzed: two consisting on crime transiting through Bulgaria, related to Drug Trafficking, and two consisting on exporting human trafficking from Bulgaria to Western Europe and a Skimming network. The final section is a summary of recommendations for improving the confrontation of TCNs.

Details: Bogota, Colombia: Vortex Foundation; Sophia, Bulgaria: Risk Monitor, 2013. 235p.

Source: Internet Resource: Accessed October 27, 2014 at: http://www.informeescaleno.com.ar/images/Understanding_the_Structure_Bulg_grant.pdf

Year: 2013

Country: International

Keywords: Border Security

Shelf Number: 133820


Author: NetNames

Title: Behind the Cyberlocker Door: A Report on How Shadowy Cyberlocker Businesses Use Credit Card Companies to Make Millions

Summary: Digital theft of copyrighted content, has surged as for-profit pirate sites continue making money by illegally distributing movies, music, TV shows and other content. Cyberlockers are among the most profitable content theft sites, but very little research has been conducted to determine how much money they are pocketing by illegally distributing the work of content creators. As a society, we can no longer shrug off content theft as the isolated activity of high school and college students who want to watch a movie or listen to music for free. Recent reports, this one by NetNames and one earlier this year by MediaLink, lay bare the truth that content theft is big business, raking in hundreds of millions of dollars a year - essentially bleeding the Internet for profit while making it less attractive for generations to come. Content theft harms not only creators whose products are stolen and legitimate distributors that are forced to compete with cyberlockers who pay nothing for the content that drives their business. It also hurts consumers who pay the price for "free" content in a reduction of quality choices as revenues are reduced, and may be subjected to identity theft and malware that cyberlockers are associated with. New research by NetNames has demonstrated that: - It's easy to profit on the Internet when you leverage other people's creative works. In fact, it is possible you could make millions of dollars doing so. - There is a compelling difference between the business models of rogue cyberlockers that peddle in content theft and legitimate cloud storage services. - Malware is a serious issue when it comes to content theft. - Major brands are victimized by content thieves who leverage these brands to make their own rogue sites seem legitimate. - That all it takes for bad operators to succeed is for the facilitators of commerce - payment processors and the advertising industry, among other stakeholders- to do nothing. In the NetNames research, for example, MasterCard and Visa could be used to buy subscriptions on almost all the cyberlockers. The question is what we do about it. It's going to take concerted action by the Internet and the payment processors, advertising industries, consumers, public interest groups, Internet safety organizations and responsible government officials to address this corrosive issue that threatens our basic trust in our online world.

Details: London: Digital Citizens Alliance, 2014. 50p.

Source: Internet Resource: Accessed October 30, 2014 at: http://www2.itif.org/2014-netnames-profitability.pdf

Year: 2014

Country: International

Keywords: Computer Crimes

Shelf Number: 133832


Author: United Nations Children's Fund - UNICEF

Title: Ending Violence Against Children: Six Strategies for Action

Summary: Ending Violence Against Children: Six Strategies for Action provides evidence of effective programmes to address violence against children drawn from UNICEF's decades of experience, and informed by key partners. Case studies from around the globe illustrate how well-crafted prevention and response strategies can reduce the prevalence and impact of violence against children. The report is released as part of the #ENDviolence global initiative calling for an end to all forms of violence against children. It is directed at government leaders, civil society representatives, the private sector and the international development community

Details: New York: UNICEF, 2014. 68p.

Source: Internet Resource: Accessed October 30, 2014 at: http://www.unicef.org/publications/files/Ending_Violence_Against_Children_Six_strategies_for_action_EN_9_Oct_2014.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 133836


Author: Levy, Liz

Title: What Works to Reduce Crime?: A Summary of the Evidence

Summary: This evidence review was undertaken to support strategic thinking on what works to reduce crime in relation to the following three key strategies: 1. Targeting the underlying causes of crime so that the urge or need to offend is reduced; 2. Deterring potential offenders by ensuring that the cost of offending is greater than the benefits. 3. Increasing the difficulty of offending by reducing opportunities to commit crime. The aim of the review was to examine the research evidence on reducing crime in relation to both the underlying causes of crime (that may originate in the early life course) and the immediate antecedents of a criminal event. This is in recognition of the need to address both factors in order to reduce crime effectively and to highlight key messages for the Building Safer Communities programme. More broadly, it aimed to identify whether the Scottish Government should consider additional or alternative measures to tackling crime. It did not consider strategies to reduce the risk of recidivism (or re-offending) however, as this is the focus of a separate published review of the literature on Reducing Reoffending. Figure 1 on page 8 provides a summary of the four key strategies for reducing crime in diagrammatic form. It is important to note that the review does not purport to provide a comprehensive and definitive account of the evidence on what works to reduce crime, but rather constitutes a collation of the material which could be identified and accessed within a relatively short space of time. It is hoped that the work will provide a foundation upon which new and existing research evidence may be added as it becomes available or is identified in the future.

Details: Edinburgh: Scottish Government, Justice Analytical Services, 2014. 83p.

Source: Internet Resource: Accessed October 30, 2014 at: http://www.scotland.gov.uk/Resource/0046/00460517.pdf

Year: 2014

Country: International

Keywords: Crime Prevention

Shelf Number: 133843


Author: Masciandaro, Donato

Title: Worldwide Anti-Money Laundering Regulation: Estimating Costs and Benefits

Summary: The aim of this article is to offer a simple framework for estimating the benefits and costs of anti-money laundering regulation, based on a prudent estimation of the economic value of the worldwide money laundering. Using the multiplier model of the relationship between criminal markets revenues and money laundering activities and data for 2004, the value of money laundering is equal to US$ 1.2 trillions (2.7%of the world GDP), while the maximum theoretical benefit in combating money laundering using financial regulation - in steady state - is equal to S$ 280 billion (0.6% of the world GDP). If the aggregate figures keep to the previous more conservative estimates, the methodology is the crucial innovation. The estimates are the product of a explicit macro framework, and they can be replicated, improved using more consistent data, or contrasted implementing alternative models.

Details: Milan: Bocconi University - Department of Economics, 2008.

Source: Internet Resource: Paolo Baffi Centre Research Paper No. 2008-12 : Accessed October 30, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1136107

Year: 2008

Country: International

Keywords: Cost-Benefit Analysis

Shelf Number: 133976


Author: Barrett, Nicole A.

Title: Laws to Combat Sex Trafficking: An Overview of International, National, Provincial and Municipal Laws and their Enforcement

Summary: This report examines current legislation, regulations and law enforcement issues relating to human trafficking for sexual exploitation at four levels: the international, national, state/provincial, and municipal. The report is part of on-going research for the Task Force on the Trafficking of Women and Girls in Canada, convened by the Canadian Women's Foundation (CWF). A previous research report to the Task Force discusses the incidence of sex trafficking in Canada as well as specific issues of trafficking for sexual exploitation in Canada and the impacts on women and girls in particular. The overall purpose of the research is to analyze Canada's legal framework for addressing sex trafficking, place Canada's current legislative responses to sex trafficking at federal, provincial and municipal levels in the context of international obligations and recent developments in other countries, and to examine possible responses and innovative practices for the law and law enforcement. The report is intended to aid the Task Force in formulating its programming and policy responses to the significant problem of sexual exploitation of women and girls in Canada. The report is divided into six main sections, which look at the context in which legislation should be considered, and examines the four levels of applicable law, including a brief discussion of internet regulation as it relates to sex trafficking. The six sections include: - An introduction, providing methodology and context - International protocols and obligations relating to sex trafficking and selected examples of foreign national and state/provincial legislation on human trafficking and prostitution - Canadian Federal legislation - Canadian Provincial legislation - Canadian Municipal regulation - Regulating the internet The final section of the report summarises the main issues arising from the research for further consideration by the Task Force. Summary charts on current international, Canadian Provincial and Municipal responses, and an overall matrix of legislative responses to trafficking for sexual exploitation are included as Appendices to the report (Appendices I-VII).

Details: Toronto: Canadian Women's Foundation, 2013. 106p.

Source: Internet Resource: Accessed October 30, 2014 at: http://canadianwomen.org/sites/canadianwomen.org/files//Laws%20to%20Combat%20Sex%20Trafficking_2.pdf

Year: 2013

Country: International

Keywords: Child Prostitution

Shelf Number: 133880


Author: Great Britain. Home Office

Title: Drugs: international comparators

Summary: Covers approaches to drugs misuse and drug addiction in other countries: - detailing drug consumption rooms; - heroin-assisted treatment; - dissuasion commissions; - drug courts; - prison-based treatment; - prison-based harm-reduction; - new psychoactive substances; - supply-side regulation of cannabis; - decriminalising the possession of drugs for personal use

Details: London: Home Office, 2014. 59p.

Source: Internet Resource: Accessed November 3, 2014 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/368489/DrugsInternationalComparators.pdf

Year: 2014

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 133934


Author: United Nations Children's Fund - UNICEF

Title: Ending Child Marriage: Progress and Prospects

Summary: Worldwide, more than 700 million women alive today were married before their 18th birthday. More than one in three (about 250 million) entered into union before age 15. Boys are also married as children, but girls are disproportionately affected. In Niger, for instance, 77 per cent of women aged 20 to 49 were married before age 18 in contrast to 5 per cent of men in the same age group. Even in countries where child marriage is less common, the same gender differences are found. In the Republic of Moldova, for example, 15 per cent of women aged 20 to 49 were married before age 18 compared to 2 per cent of men. Furthermore, girls are often married to considerably older men. In Mauritania and Nigeria, more than half of adolescent girls aged 15 to 19 who are currently married have husbands who are 10 or more years older than they are. Child marriage is a manifestation of gender inequality, reflecting social norms that perpetuate discrimination against girls. Child marriage among girls is most common in South Asia and sub-Saharan Africa, and the 10 countries with the highest rates are found in these two regions. Niger has the highest overall prevalence of child marriage in the world. However, Bangladesh has the highest rate of marriage involving girls under age 15. South Asia is home to almost half (42 per cent) of all child brides worldwide; India alone accounts for one third of the global total.

Details: New York: UNICEF, 2014. 8p.

Source: Internet Resource: Accessed November 3, 2014 at: http://www.unicef.org/media/files/Child_Marriage_Report_7_17_LR..pdf

Year: 2014

Country: International

Keywords:

Shelf Number: 133935


Author: Heisecke, Karin

Title: Ending Violence against Women and Girls: The world's best laws and policies

Summary: In 2014, the Future Policy Award celebrates laws and policies that contribute to ending one of the most pervasive human rights violations: violence against women and girls. One in three women worldwide suffers some form of violence in her lifetime. By restricting women's choices and limiting their ability to act, the persistence of violence against women has serious consequences for peace and security, economic development and poverty reduction. Thus, it hampers all efforts towards a future just society. International experts from academia, civil society and international organisations have nominated twenty-five policies from around the world which were implemented to improve the lives of women. Together, they reflect the broad scope of existing policy responses at local, national and transnational levels. It is important to acknowledge that violence against women and girls is both a cause and a consequence of gender inequality and, in order to end it, a transformation of gender relations towards a more gender just society is necessary. This cannot be achieved through any single law or policy: the winners of the Future Policy Award provide inspiration for specific "parts of the puzzle" of a range of policy measures that can together lead to an end of violence against women and girls. Our analysis and the Jury's decision on the winners have provided important insights into the key elements of best laws and policies in this field. We have summarised them in the section "key recommendations".

Details: Hamburg, German: World Future Council, 2014. 24p.

Source: Internet Resource: Accessed November 3, 2014 at: http://worldfuturecouncil.org/fileadmin/user_upload/Future_Policy_Award/FPA_2014/fpa2014_brochure_en_final.pdf

Year: 2014

Country: International

Keywords: Domestic Violence

Shelf Number: 133940


Author: Goodhand, Jonathan

Title: Drugs, (dis)order and agrarian change: the political economy of drugs and its relevance to international drug policy

Summary: In May 2014 the School of Oriental and African Studies (SOAS) hosted a workshop, co-funded by NOREF and Christian Aid, designed to facilitate dialogue between scholars working on the political economy of drugs, conflict and development in Asia, Africa and Latin America. The workshop explored how political economy perspectives, derived from long-term empirical research on drugs-affected regions, can enhance understanding of, and policy responses to, drug production and trafficking. This approach, rather than seeing drugs as "exceptional" and "criminal", seeks to situate the role of illicit economies within broader processes of state formation and agrarian change. Contributions to the workshop revealed the highly differentiated and context-specific dynamics of drug economies, and how different configurations of institutions and security markets can lead to different kinds of relationships between drugs, state-building, agrarian change and development. This research does not lend itself to simple policy narratives or prescriptions, but it does suggest that there can be no universal and de-contextualised solutions to "the drug problem". Dogmatic and irreconcilable positions, adopted by both those advocating harsher prohibition and those arguing for blanket decriminalisation, fail to reflect sufficiently on the impacts such policies will have on drug-producing countries. A more grounded, comparative perspective is urgently needed in an arena where policies are often anything but evidence based and where data are patchy or politicised. Counter-narcotic (CN) strategies, based on a reification of the perceived linkages between drugs, instability and state fragility, often provide only a partial, and in some cases deeply misleading, insight into the economic and political orders that emerge around drug production. Political economy provides a corrective to these deeply entrenched biases and blind spots, by incorporating an analysis of aspects of drug economies and counter narcotics (CN) strategies that are frequently treated as residual or circumvented, including the varying levels and types of violence surrounding drug economies; the complex motives of those involved in drug production and trafficking; the linkages between licit and illicit commodities in processes of agrarian transformation; the potential developmental outcomes of drugs economies; the relationship between illicit economies and differing configurations of authority and rule; and a socially differentiated account of who gains and who loses from counter-narcotics policies. In doing so, political economy approaches provide a powerful analytical lens for developing a more contextually attuned public policy on drugs.

Details: Oslo: Norwegian Peacebuilding Resource Centre (NOREF), 2014. 4p.

Source: Internet Resource: Occasional Publication: Accessed November 4, 2014 at: http://www.peacebuilding.no/var/ezflow_site/storage/original/application/6ae957894148ed319a377eee7c775065.pdf

Year: 2014

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 133967


Author: Halliday, Terence

Title: Global Surveillance of Dirty Money: Assessing Assessments of Regimes to Control Money-Laundering and Combat the Financing of Terrorism.

Summary: The International Monetary Fund's (IMF, Fund) program on Anti-Money Laundering and Combating the Financing of Terrorism (AML/CFT) has been integrally involved in the global system for AML/CFT in coordination with other key players, particularly the Financial Action Task Force (FATF). AML/CFT assessments, whether by the Fund or other assessor bodies, contribute to the key Fund activities of surveillance, financial support and technical assistance in support of domestic and international financial stability. These evaluations are taken seriously by both assessors and assessed. It is timely to evaluate the IMF's involvement in the AML/CFT system and to reconsider relevant aspects of the FATF standards, methodologies and practices more generally. The Center on Law and Globalization (CLG) obtained agreement from the IMF to conduct an independent critical analysis of IMF Reports on the Observance of Standards and Codes (ROSCs) during the 3rd round with the intent that the appraisal of past practices might inform advances in IMF and FATF methodologies and practices. Findings of the study are based on extensive interviews at the IMF and the FATF, detailed analysis of documents, close examination of four IMF assessments, site visits to three countries, and review of related literatures. This study finds that the IMF has contributed significantly to efforts that will improve the standards and methodology for assessing AML/CFT systems worldwide. The IMF has shown an openness to independent investigation of its practices; a willingness to ask baseline questions about the objectives and efficacy of AML/CFT regimes; a commitment to experimentation in assessment techniques; an impetus to clarify AML/CFT goals and objectives; leadership in the drive for assessments to appraise whether effective outcomes have resulted from implementation of standards; an investment in highly-qualified experienced assessment teams; undertaken initiatives to find new forms of valid and reliable data; intentions to forge tighter linkages between specific AML/CFT tools and targeted problems in financial systems, e.g., tax evasion, corruption; and effectiveness in raising donor moneys to invest in technical assistance to countries in need of reforms.

Details: Chicago: The Center on Law and Globalization (CLG), 2014. 61p.

Source: Internet Resource: accessed November 10, 2014 at: http://www.lexglobal.org/files/Report_Global%20Surveillance%20of%20Dirty%20Money%201.30.2014.pdf

Year: 2014

Country: International

Keywords: Corruption

Shelf Number: 134007


Author: Global Initiative Against Transnational Organized Crime

Title: Improving Development Responses to Organized Crime

Summary: Over the past decade, there has been a growing realization that organized crime is a spoiler to development. This realization has been charted in a number of seminal reports: in 2005, the report of the Secretary-General "In Larger Freedom" highlighted the challenges of preventing the achievements of the Millennium Development Goals (MDGs) highlighted organized crime as one of the principle threats to peace and security in the 21st Century. In the same year, a UNODC report underscored the linkage between under-development and a crime prone environment. The 2010 "Keeping the Promise" report of the Secretary- General recognized that in order to achieve the MDGs, there would need to be capacity to explicitly respond to organized crime. The World Development Report 2011 concluded that both conflict and organized crime have the same detrimental effect on development: Resulting in 20% less development performance. The "Action Agenda" of the Secretary-General in 2012 cited the need to respond better to organized crime as a priority to achieving a stable world. While organized crime is not a new phenomenon, what is new is both its growth and reach, and the degree to which it threatens countries with the least capacity to respond. There are specific constituencies that are seeing a direct impact of organized crime on their ability to achieve their development objectives. For those working on environmental issues, for example, criminal flows are becoming a fairly significant problem. In areas like sustainable forestry, a substantial proportion of development assistance is being diverted through illegal logging. In addressing fisheries or marine ecosystems, addressing the problem of mass-scale illegal fishing has become more urgent than other research priorities. Globally, more citizens are killed through organized crime related violence in one year than have been killed in terrorist related incidents over the last two decades. In many parts of the world, including in some vulnerable and fragile states, organized crime both exploits and exacerbates conditions that allow it to thrive. In many developing countries organized crime has undermined state institutions across sectors, including for example, in the areas of environment, health, welfare and education, and further weakens state capacity to ensure the rule of law and provide security to citizens. The result is a vicious cycle: organized crime negatively impacts on the rule of law, human and economic development creating the conditions for further instability and distorted or weak governance. Thus while it has become a commonly accepted doctrine that organized crime is a spoiler to peace and development, where the debate has evolved in recent years is to recognize that effective solutions to reducing organized crime and mitigating its impacts are not to be found without development approaches. A combination of the extent of the impact of organized crime, but also the acknowledgement that many of its causes relate to a wider set of governance, social, developmental and other factors, has highlighted incontrovertibly that a narrow security approach will not be effective in countering the problem. It has been proven now in a number of theatres, that investments concentrated on building the capacity of security institutions - police and customs units - cannot alone provide a sustainable solution. It has become imperative that the weight of the development community and their tools can be brought to bear. While the issue may have been recognized to be of importance, the policy debate as to what this means in practical terms for development programming is now only getting underway. Within a broader context of the shifts in the development debate globally, including within the framework of the revision of the MDGs, there is now significant scope for further exploring the role of development actors in countering organized crime and building communities and state institutions that are resilient to its deleterious impacts. The development community needs to review its toolbox and align its responses in what is traditionally considered to be a security space. This report is drawn from a seminar in April 2014, hosted by the Global Initiative against Transnational Organized Crime and the Ministry for Foreign Affairs of the Netherlands. The seminar brought together 50 experts from national governments, multi-lateral organizations, think tanks and NGOs working in the development sector. Governments represented were Austria, Germany, Mexico, The Netherlands, Norway, Sweden, Switzerland, the United Kingdom, the United States and the European Union.

Details: Geneva, SWIT: Global Initiative Against Organized Crime, 2014. 20p.

Source: Internet Resource: Accessed November 10, 2014 at: http://www.globalinitiative.net/download/global-initiative/Global%20Initiative%20-%20Improving%20Development%20Responses%20to%20Organized%20Crime%20-%20July%202014.pdf

Year: 2014

Country: International

Keywords: Crime Against the Environment

Shelf Number: 134008


Author: Helfstein, Scott

Title: Risky Business: The Global Threat Network and the Politics of Contraband

Summary: The report makes four main points that run counter to previous conceptions of crime-terror connectivity and the global illicit network. 1) Rather than operating in numerous smaller networks, the criminals and terrorists in our study are largely subsumed (98%) in a single network of 2,700 individuals with 15,000 relationships. Connectivity among actors within the illicit marketplace is relatively high. This should not be construed to say that the network is a cohesive organizational entity. Rather, the phenomenon observed and documented here is a self-organizing complex system built through social connections from the bottom up. 2) By most measures of connectivity, terrorists are more central than almost all other types of criminals, second only to narcotics smugglers. The transnational nature of some terrorist actors allows them to link disparate criminal groups. Importantly our study does not provide evidence that terrorists are shunned by criminal actors because of their ideological motivations. 3) The conventional wisdom that explains crime-terror connectivity as a product of failed or economically poor states is challenged here. Generally speaking, connectivity between terrorists and criminals is highest in resource-rich countries that have little incentive to support substate actors (comparative advantage theory) and resource-poor countries that are incentivized to support criminal or terrorist groups (augment state capabilities theory). 4) Despite the interest surrounding big data and data science, the results of data acquisition and utilization often falls short of their potential. A growing number of data sources and tools offer an opportunity to conduct analyses addressing global challenges like the crime-terror "nexus." Advancing this agenda requires asking questions in unique ways and pursuing creative approaches and partnerships to aggregating and analyzing data.

Details: West Point, NY: Combating Terrorism Center at West Point, 2014. 89p.

Source: Internet Resource: Accessed November 10, 2014 at: https://www.ctc.usma.edu/v2/wp-content/uploads/2014/05/RiskyBusiness_final.pdf

Year: 2014

Country: International

Keywords: Contraband

Shelf Number: 134009


Author: Chiba, Saori

Title: Behavioral Economics of Crime Rates and Punishment Levels

Summary: Empirical studies have shown, paradoxically, that increasing the probability of apprehension can correlate with an increase in the total number of criminal actions. To examine this phenomenon, this paper develops a theory of "personal rules" based on the tradeoff between one's self-image of criminal productivity and the temptation - salience of the present - of taking the easy way out by committing a crime. This theory analyzes transformation of lapses into precedents that undermine future self-restraint. The foundation for this transformation is imperfect recall of one's own criminal productivity within certain defined parameters, which leads people to draw inaccurate inferences from their past actions. Rationalization may lead to overestimation of the expected utility of committing a crime when the opportunity presents itself.

Details: Universita Ca' Foscari Venezia - Department of Management, 2014. 47p.

Source: Internet Resource: Department of Management, Università Ca' Foscari Venezia Working Paper No. 2014/21 : Accessed November 12, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2511322

Year: 2014

Country: International

Keywords: Causes of Crime

Shelf Number: 134039


Author: Organization for Economic Co-operation and Development (OECD)

Title: Identification and Quantification of the Proceeds of Bribery: Revised Edition

Summary: Confiscation and recovery of the proceeds of bribery are key elements inthe international framework to fight corruption. The two key international legal standards are the 1997 OECD Convention on Combating Bribery of Foreign Public Officials in International Business Transactions (OECD Anti-Bribery Convention) and the 2005 UN Convention against Corruption (UNCAC). This study focuses on the identification and quantification of the proceeds of active bribery. It was undertaken as a joint effort between the OECD Working Group on Bribery in International Business Transactions (Working Group) and the World Bank-UNODC Stolen Assets Recovery Initiative (StAR) in order to support countries' efforts to confiscate the proceeds of active bribery, which is required of Parties to both the OECD Anti-Bribery Convention and UNCAC. The final text, approved following a peer review process in the context of the StAR initiative, was discussed and adopted officially by the OECD Working Group on Bribery on 23 June 2011. The study is intended to provide practitioners, legislators and policy makers with practical information on the technical issues of identification and quantification of proceeds of active bribery. It provides examples of how proceeds have been identified and quantified in different jurisdictions; we use mostly examples from cases that have actually occurred.

Details: Paris: OECD; Washington, DC: International Bank for Reconstruction and Development/The World Bank, 2012. 75p.

Source: Internet Resource: Stolen Asset Recovery Initiative: Accessed November 12, 2014 at: http://www.oecd.org/daf/anti-bribery/50057547.pdf

Year: 2012

Country: International

Keywords: Asset Recovery

Shelf Number: 134052


Author: Ponemon Institute

Title: The Impact of Cybercrime on Business. Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil

Summary: Cyber criminals today are increasingly leveraging malware, bots and other forms of sophisticated threats to attack organizations for various reasons, including financial gain, business disruption or political agendas. In many cases, cybercriminals often target multiple sites and organizations to increase the likelihood of an attack's initial success and viral spread. With new variants of malware being generated on a daily basis, many companies struggle to fight these threats separately and the majority of attacks are often left undetected or unreported. In addition, cybercriminals are no longer isolated amateurs. They belong to well-structured organizations with money, motivation and goals, often employing highly skilled hackers that execute targeted attacks. Such organizations can deploy considerable threat intelligence, time and resources in order to execute attacks that can cost cybercrime victims significant amounts of money. Unfortunately, this trend is only growing more complex as businesses experience a surge in Web 2.0 use, mobile computing and the cloud, creating more channels of communication and vulnerable entry points into the network. Conducted by Ponemon Institute and sponsored by Check Point Software Technologies, we are pleased to present the findings of The Impact of Cybercrime on Business. The purpose of the study is to better understand the likelihood, frequency and magnitude targeted threats have on organizations across all company sizes and industries, and to understand how IT practitioners are addressing the risk for future remediation and precautions. In this study we surveyed 2,618 highly experienced business leaders and IT security practitioners located in the United States, United Kingdom, Germany, Hong Kong and Brazil. Respondents were asked to focus on five of the most prevalent types of attacks: botnets, Advanced Persistent Threats (APTs), denial of service (DoS) attacks, viruses, worms and trojans and social engineering attacks to evaluate what impact they have on businesses, including their level of risk, motivations, types of information compromised and cost. As the study will show, there are significant differences in practices and perceptions among IT practitioners in all five countries.

Details: Traverse City, MI: Ponemon Institute, 2012. 21p.

Source: Internet Resource: Accessed November 12, 2014 at: http://www.ponemon.org/local/upload/file/Impact_of_Cybercrime_on_Business_FINAL.pdf

Year: 2012

Country: International

Keywords: Computer Crimes

Shelf Number: 134061


Author: Inserra, David

Title: The Visa Waiver Program: Enhancing Security, Promoting Prosperity

Summary: The Visa Waiver Program (VWP) is a valuable tool supporting U.S. tourism and trade, public diplomacy, and national security. The VWP allows residents of member countries to visit the U.S. without a visa for up to 90 days in exchange for security-cooperation and information-sharing arrangements and reciprocal travel privileges for U.S. residents. The VWP is extended only to U.S. allies and friends that meet certain security and immigration requirements. News of European passport holders joining the Islamic State in Iraq and Syria (ISIS), however, have created concerns about radicalized Western fighters abusing the VWP to engage in terrorism here in the U.S. While radicalized Britons or Germans are certainly of great concern to all nations threatened by Islamist terrorism, it is not a good reason to end the VWP. The VWP promotes security and the ISIS threat only emphasizes the importance of the VWP's intelligence-sharing requirements and adding appropriate nations to the program.

Details: Washington, DC: Heritage Foundation, 2014. 3p.

Source: Internet Resource: Issues Brief No. 4274: Accessed November 13, 2014 at: http://thf_media.s3.amazonaws.com/2014/pdf/IB4273.pdf

Year: 2014

Country: International

Keywords: National Security

Shelf Number: 134085


Author: Soreide, Tina

Title: Drivers of Corruption: A Brief Review

Summary: Drivers of Corruption: A Brief Review provides an overview of scholarly literature explaining the risk of corruption. Corrupt acts are subject to decision making authority and assets available for grabbing. These assets can be stolen, created by artificial shortage, or become available as the result of a market failure. Assets that are especially exposed to corruption include profits from the private sector, revenues from the export of natural resources, aid and loans, and the proceeds of crime. Whether opportunities for corruption are exploited depends on the individuals involved, the institution or society they are part of, and the law enforcement circumstances. Corruption usually persists in situations in which players are aware of the facts but nonetheless condone the practice. Absence of reaction can result from information asymmetries (in which the people who are supposed to act are not aware of the need to act), coordination failure, patronage-determined loyalty, and incentive problems at the political level. This review of results and insights from different parts of the scholarly literature on corruption focuses on areas where research can guide anticorruption policy. Drivers of Corruption also describes a number of corruption-related challenges in need of more attention from researchers

Details: Washington, DC: The World Bank, 2014. 95p.

Source: Internet Resource: Accessed November 14, 2014 at: https://openknowledge.worldbank.org/bitstream/handle/10986/20457/916420PUB0Box30UBLIC009781464804014.pdf?sequence=1

Year: 2014

Country: International

Keywords: Corruption (International)

Shelf Number: 134087


Author: Ferstman, Carla

Title: Criminalizing Sexual Exploitation and Abuse by Peacekeepers

Summary: Summary - Sexual exploitation and abuse continue to pervade peacekeeping missions, and peacekeepers benefit from near-total impunity. - Several seminal United Nations (UN) studies and expert reports provide a useful blueprint of where the gaps lie, what must be done to address them, and how to do so. - Zero-tolerance UN policies have focused on preventing new abuse and strengthening codes of conduct. These goals are laudable but undermined when not accompanied by consistent discipline and criminal accountability. - Despite eight years of annual resolutions that underscore the need to address the problems, there is no evidence of greater accountability. - More work is needed to finish the job. States are responsible for disciplining and punishing their troops, but the UN must do more to ensure that this happens. - The UN needs to work actively with states to bridge the gaps in domestic legislation by issuing written advice and publishing model legislation. - The UN should publicly name and shame those states that fail to investigate and prosecute credible cases. - The UN should refrain from accepting troop contingents from countries that repeatedly fail to live up to their written assurances to investigate and prosecute. - The memorandum of understanding governing the relationship between the UN and troop-contributing countries should be further revised to introduce greater conditionality into the acceptance and removal of troop contingents.

Details: Washington, DC: United State Institute of Peace, 2013. 16p.

Source: Internet Resource: Special Report: Accessed November 15, 2014 at: http://www.usip.org/sites/default/files/SR335-Criminalizing%20Sexual%20Exploitation%20and%20Abuse%20by%20Peacekeepers.pdf

Year: 2013

Country: International

Keywords: Military

Shelf Number: 134091


Author: Prieger, James E.

Title: Violence in Illicit Markets: Unintended Consequences and the Search for Paradoxical Effects of Enforcement

Summary: The textbook competitive model of drug markets predicts that greater law enforcement leads to higher black market prices, but also to the unintended consequences of greater revenue and violence. These predictions are not in accord with the paradoxical outcomes evinced by recent history in some drug markets, where enforcement rose even as prices fell. We show that predictions of the textbook model are not unequivocal, and that when bandwagon effects among scofflaws are introduced, the simple predictions are more likely to be reversed. We next show that even simple models of noncompetitive black markets can elicit paradoxical outcomes. Therefore, we argue that instead of searching for assumptions that lead to paradoxical outcomes, which is the direction the literature has taken, it is better for policy analysis to choose appropriate assumptions for the textbook model. We finish with performing such an analysis for the case of banning menthol cigarettes. Under the most plausible assumptions enforcement will indeed spur violence, although the legal availability of electronic cigarettes may mitigate or reverse this conclusion.

Details: Malilbu, CA: Pepperdine University, School of Public Policy, 2014. 43p.

Source: Internet Resource: Accessed November 18, 2014 at: http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1051&context=sppworkingpapers

Year: 2014

Country: International

Keywords: Black Markets

Shelf Number: 134133


Author: Prieger, James E.

Title: Unintended Consequences of Enforcement in Illicit Markets

Summary: Legal enforcement of bans on goods can reduce the size of the black market but lead to greater violence by increasing revenue in the illicit market. However, the link between enforcement and violence is not as simple as is suggested by the textbook model, even for a competitive market. Nevertheless, under plausible assumptions more enforcement on trafficking in the illicit good leads to more violence.

Details: Malibu, CA: School of Public Policy, Pepperdine University, 2014. 11p.

Source: Internet Resource: School of Public Policy Working Papers. Paper 51: Accessed November 18, 2014 at: http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1050&context=sppworkingpapers

Year: 2014

Country: International

Keywords: Black Markets

Shelf Number: 134135


Author: Child Protection Monitoring and Evaluation Group

Title: Measuring Violence against Children - Inventory and assessment of quantitative studies

Summary: Research and data on violence against children are scarce and inconsistent, especially in low- and middle-income countries. As a result, rigorous evidence on the extent, nature and impact of violence against children and on the underlying social norms and attitudes that perpetuate it is limited. Robust data are needed to develop evidence-based programmes and policies that can prevent and respond to violence, to establish baselines and monitor progress, and for advocacy. Such data are also needed to inform the development of and improve campaigns, laws, regulations and services that contribute to children's protection and well-being. The last two decades have witnessed a proliferation of different measurement activities aimed at filling the existing gaps, primarily through population-based sample surveys. Initiatives have been undertaken by or with the support of international agencies, international and local non-governmental organizations (NGOs), government institutions and researchers. The fact that governments and others have expressed interest in advancing in this area and have invested in improving related data-collection efforts is a positive step forward. While many organizations and individuals are active in research on violence against children, no gold standard for measuring this sensitive issue has been agreed upon internationally. As a result, different approaches have been developed to gather data, including the use of diverse indicators, questionnaires and study designs. This combination of factors has often led to the collection of inconsistent and unreliable data. It has also raised important questions about the risks and ethical issues that arise when the data-collection process involves children. The Child Protection Monitoring and Evaluation Reference Group's (CP MERG) Technical Working Group on Data Collection on Violence against Children was established to provide guidance in this area and to produce outputs that can assist countries and partners in their efforts to gather data that are both reliable and useful and obtained in an ethically sensitive manner. The goal is to support, facilitate and coordinate the development of guidelines, standards and tools for the collection of data on violence against children at global, regional and national levels. With these objectives in mind, the Working Group decided to undertake a review of quantitative studies on violence against children to provide an overview of some recent data-collection activities that will feed into the development of guidelines. This review focused mainly on studies conducted in low- and middle-income countries; however, three studies from Western Europe (Germany, Switzerland and the United Kingdom) and one study from the United States were also included. The review was based upon interviews with key informants, the identification of large-scale studies on violence against children, and an in-depth assessment of surveys from six countries and one subregion: Chile, the Eastern Caribbean, Georgia, India, the Republic of Moldova, the United Kingdom and the United Republic of Tanzania. Surveys conducted as part of larger international survey programmes, such as the Multiple Indicator Cluster Surveys and Demographic and Health Surveys, were not included in the review.

Details: New York: Division of Data, Research and Policy, UNICEF,2014. 109p.

Source: Internet Resource: Accessed November 18, 2014 at: http://data.unicef.org/corecode/uploads/document6/uploaded_pdfs/corecode/CP-MERG-REPORT_205.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134137


Author: Steven, David

Title: If Not Now, When? Ending Violence Against the World's Children

Summary: Key Messages -- A target to end abuse, exploitation, trafficking and all forms of violence, and torture against children has been proposed as part of the post-2015 development agenda. Support for this target is based on the recognition that no violence against children is justifiable and all violence against children is preventable. It forms part of a broader commitment to the role peaceful and inclusive societies play in sustainable development. At present, an epidemic of violence undermines child survival and development, while causing broader economic damage and trapping children into cycles of violence they may not escape as adults. Ambitious post- 2015 commitments on children's education, health, and wellbeing cannot be met as long as so many children live in fear. While the challenge of protecting all children is a substantial one, strategies exist for tackling violence and other forms of abuse. With the right policies and sufficient resources, substantial improvements in child safety can be achieved in less than a decade. Proposed targets to protect, prevent and address violence against children must be included in the final version of the new development agenda, with governments persuaded this is a signature issue that will resonate with the public around the world. But as Nelson Mandela wrote a decade ago, safety and security don't just happen: they are the result of collective consensus and public investment. We must now begin preparing for implementation of new targets, moving beyond aspirations to credible plans. We now have an historic opportunity to unite the world behind a global, national, and local movement to protect children from violence, based on increased political will, a global partnership that will protect children, and the identification of pathfinder countries that will be ready to deliver the new agenda from January 2016. The next twelve months are critical. We must: 1. Secure an unequivocal global commitment to ending violence against children. Governments must be convinced that tackling violence is an essential and resonant priority that will significantly improve the lives of children. A target to end violence against children must be retained in the post-2015 development agenda. 2. Develop foundations that will allow implementation to begin in January 2016. An aspiration to end violence must be turned into something more concrete. Priorities include forming the partnership to scale up action to prevent violence and protect children and the coalition of pathfinder countries prepared to act first. 3. Create opportunities for world leaders to pledge support for urgent action to protect children. Champions are needed to advocate for implementation of targets to end all forms of violence against children. The Financing for Development conference in July and Heads of State and Government Summit in September 2015 should be used to announce ambitious commitments.

Details: New York: New York University, Center on International Cooperation, 2014. 23p.

Source: Internet Resource: Accessed November 18, 2014 at: http://www.globaldashboard.org/wp-content/uploads/2014/If_Not_Now_When_Final_201014.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134138


Author: Saifudeen, Omer Ali

Title: The Cyber Extremism Orbital Pathways Model

Summary: The starting premise of this study is that internet-based communications possess unique characteristics that warrant the need to have a discrete pathway model to explain online radicalisation. This online radicalisation pathway model would especially apply to the growing communities of young netizens whose socio-psychological makeup is shaping a "new normal" in the way we exchange information and interact. The proposed Cyber Extremism Orbital Pathways Model (CEOP) describes how online cognitive radicalisation can move towards real-world violent extremism. The model also elucidates the multitude of competing forces in cyberspace that promote or impede such radicalization and what this means for online counter-radicalisation strategies. The CEOP model is based on inferences made from content and discourse analysis of extremist narratives on the internet and current studies about internet-based communications. The research took into account distinctive factors that made internet-based messaging more persuasive and this includes the effects of crowdsourcing. Finally, the CEOP model suggests how the same persuasive communication strategies used on the internet by extremists can be conversely used to counter online radicalisation.

Details: Singapore: S. Rajaratnam School of International Studies, 2014. 32p.

Source: Internet Resource: RSIS Working Paper No. 283: Accessed November 20, 2014 at: http://www.rsis.edu.sg/wp-content/uploads/2014/11/WP283.pdf

Year: 2014

Country: International

Keywords: Cybercrime

Shelf Number: 134170


Author: U.S. Government Accountability Office

Title: Human Trafficking: Oversight of Contractors' Use of Foreign Workers in High-Risk Environments Needs to Be Strengthened

Summary: Since the 1990s, there have been allegations of abuse of foreign workers on U.S. government contracts overseas, including allegations of TIP. In 2002, the United States adopted a zero tolerance policy on TIP regarding U.S. government employees and contractors abroad and began requiring the inclusion of this policy in all contracts in 2007. Such policy is important because the government relies on contractors that employ foreign workers in countries where, according to State, they may be vulnerable to abuse. GAO was mandated to report on the use of foreign workers. This report examines (1) policies and guidance governing the recruitment of foreign workers and the fees these workers may pay to secure work on U.S. government contracts overseas and (2) agencies' monitoring of contractor efforts to combat TIP. GAO reviewed a nongeneralizable sample of 11 contracts awarded by DOD, State, and USAID, composing nearly one-third of all reported foreign workers on contracts awarded by these agencies at the end of fiscal year 2013. GAO interviewed agency officials and contractors about labor practices and oversight activities on these contracts. What GAO Recommends GAO recommends that agencies (1) develop a more precise definition of recruitment fees and (2) ensure that contract monitoring specifically includes TIP. DOD concurred with the first recommendation, while State and USAID noted that forthcoming regulations would prohibit all recruitment fees. Agencies concurred with the second recommendation.

Details: Washington, DC: GAO, 2014. 67p.

Source: Internet Resource: GAO-15-102: Accessed November 25, 2014 at: http://www.gao.gov/assets/670/666998.pdf

Year: 2014

Country: International

Keywords: Foreign Workers

Shelf Number: 134244


Author: Thom, Katey

Title: Evaluating Community Justice: A Review of Research Literature

Summary: Community courts and community justice centres work in partnership with local organisations and the wider community to problem-solve local justice, crime and safety issues. The first community courts were developed in the United States and have now spread to the United Kingdom, Canada, South Africa, Australia and New Zealand, with interest from places as far as China. By 2009 there was estimated to be over 70 community courts and community justice centres around the world (see http://www.courtinnovation.org/research/community-courtsaround-world). This report provides a comprehensive overview and critical exploration of existing evaluations on community courts and justice centres. It is hoped that this report will act as a resource for future considerations of the development, implementation and on-going evaluation of community justice approaches in New Zealand.

Details: Auckland: Centre for Mental Health Research, 2013. 26p.

Source: Internet Resource: Accessed November 25, 2014 at: http://www.lawfoundation.org.nz/wp-content/uploads/2013/12/2.-Evaluating-community-justice.-A-review-of-research-literature.docx.pdf

Year: 2013

Country: International

Keywords: Community Courts

Shelf Number: 134250


Author: TRAFFIC

Title: Precious Woods: Exploitation of the Finest Timber

Summary: Precious wood species are often restricted in geographical range or in habitat. This natural scarcity can increase the price further, as in addition to the desirable qualities of the PW that lead to its demand there is often limited availability. These species are usually slow-growing, and, according to the musical instrument trade, are almost never of sufficient quality if grown faster in plantations (the resultant wood is said to have a different density and therefore resonance due to the grow rings being further apart). It may be, however, that if a deliberate attempt were made to grow species more slowly, and for longer, better quality wood would result. There can be pressure to cut PWs before they reach optimum size as trees become scarce. PWs are anecdotally cited as being harvested on a tree-by-tree basis rather than from formal concessions. This type of harvesting is more difficult to control than in well-delimited concessions and can be illegal. These species are often listed in the IUCN Red List of Threatened Species. History shows that unabated trade pressure may result in PWs becoming extremely scarce and in very short supply, which may result in them becoming commercially or even biologically extinct. Species that are currently widespread but that have reasonably valuable inherent qualities, may become PWs in the future in the absence of careful management and responsible trade. Our experience during this study was that semi PW species were less likely to be listed in the IUCN Red List of Threatened Species than PWs. However, this does not necessarily mean that they are not at risk; it often simply means that they have not been evaluated. This category of species may well become the PWs of the future. It is likely that some species currently considered PWs were in fact considered SPWs in the past.

Details: London: Chatham House, 2012. 62p.

Source: Internet Resource: Chatham House Workshop: Tackling the Trade in Illegal Precious Woods 23-24 April 2012: Accessed December 8, 2014 at: www.traffic.org

Year: 2012

Country: International

Keywords: Environmental Conservation

Shelf Number: 134267


Author: De La Rue, Lisa

Title: School-Based Interventions to Reduce Dating and Sexual Violence: A Systematic Review

Summary: BACKGROUND The incidence of psychological, physical, and sexual violence in intimate dating relationships has a significant impact on young people. These issues are of great concern to researchers, educators, and administrators who strive to help youth be happy and healthy. This review focused on prevention and intervention efforts implemented in schools that sought to reduce or prevent incidents of dating violence. OBJECTIVES The main objective of this review was to evaluate and synthesize the efficacy of school-based interventions that sought to reduce or prevent teen dating violence or sexual violence in intimate relationships. Specifically this review evaluated the impact of dating violence prevention programs implemented in middle and high schools on changing attitudes or beliefs supportive of teen dating violence, reducing incidents of dating violence perpetration, or reducing incidents of dating violence victimization. Additionally, this review examined potential substantive or methodological variables (e.g., program characteristics, age, gender, location) that moderated the effect sizes.

Details: Oslo: Campbell Collaboration, 2014. 111p.

Source: Internet Resource: Campbell Systematic Review 2014:7: Accessed December 10, 2014 at: http://www.campbellcollaboration.org/lib/project/268/

Year: 2014

Country: International

Keywords: Dating Violence

Shelf Number: 134303


Author: World Health Organization

Title: Global Status Report on Violence Prevention 2014

Summary: Despite indications that homicide rates decreased by 16% globally between 2000 and 2012, violence remains widespread. Released today, the "Global status report on violence prevention 2014" reveals that 475 000 people were murdered in 2012. Homicide is the third leading cause of death globally for males aged 15-44 years. These facts highlight the importance of creating more decisive action to prevent violence. Jointly published today by WHO, the United Nations Development Programme, and the United Nations Office on Drugs and Crime, the report indicates that: only one third of the 133 countries surveyed are implementing large-scale initiatives to prevent violence, such as bullying prevention programmes, visits by nurses to families at risk, and support to those who care for older people; just over half the countries are fully enforcing a set of 12 laws generally acknowledged to prevent violence, although 80% of countries have enacted them; only half of all countries have services in place to protect and support victims of violence The "Global status report on violence prevention 2014" is the first report of its kind to assess national efforts to address interpersonal violence, namely child maltreatment, youth violence, intimate partner and sexual violence, and elder abuse. Individual country profiles reflect the extent to which key violence prevention programmes and laws and selected services for victims of violence are being implemented.

Details: Geneva, SWIT: WHO, 2014. 292p.

Source: Internet Resource: Accessed December 10, 2014 at: http://www.who.int/violence_injury_prevention/violence/status_report/2014/en/

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134305


Author: Braun, Birgit

Title: Wildlife Detector Dogs: A guideline on the training of dogs to detect wildlife in trade

Summary: According to IUCN, the International Union for the Conservation of Nature, the current extinction rate is estimated to exceed the natural rate by at least 1000 times. The international community is aware of the threat of unsustainable and particularly illegal trade that can result in the extinction of species. After the loss of habitat, unsustainable collection and use is the second main factor that puts wild animal and plant species at risk of extinction. In the interest of future generations, it is an important challenge to stop the decline of threatened animals and plants species. It is estimated that trade in wild plants and animals and their derivatives is worth several billions of US dollars per year, and millions of wild plants and animals are involved in international trade every year. In 2009, the World Customs Organization (WCO) organized a global day-long Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) Operation. Through increased checks, Customs administrations seized about 4630 endangered live species as well as products. This operation demonstrates the great dimension of illegal wildlife trade, which in turn demonstrates the need for increased enforcement of wildlife trade laws and regulations. Detector dogs can perceive the smallest concentrations of odours and have a highly evolved ability to discriminate between scents. They are used to detect hidden contraband like drugs, weapons, cigarettes and cash, but are also suitable for the detection of wildlife and their derivatives. They can be used to screen checked-in or hand carried baggage, freight or on the body of smugglers. This ability enables dog handlers with their dogs to carry out quick and discreet controls. Detector dogs therefore are suitable tools in the fight against the smuggling of wildlife and their derivatives. In 1998, TRAFFIC, the wildlife trade monitoring network of WWF and IUCN , launched a report, The Feasibility of Using Canines to Detect Wildlife Contraband (Parry-Jones, R. 1998). This report was followed by a Master's thesis, Enforcement of CITES in Germany: the use of sniffer dogs to detect wildlife contraband (Felgentreu, B. 2004, in German). Both reports compiled infor-mation on existing wildlife detector dog programmes and provided recommendations for their use and implementation. Following these promising results and the demonstrated potential to use detector dogs to fight against illegal trade in wildlife the first International Expert Workshop on Wildlife Detector Dogs was held in 2006 in Bad Schandau, Germany (Felgentreu, B. 2006). This workshop was a promising start for the development and implementation of wildlife detector dog programmes in several European countries and was followed by a second Workshop organized by the General Directorate of Customs of the Czech Republic and a third Workshop organized by Corpo Forestale dello Stato, Italy. The results of these workshops demonstrated a high potential to use dogs detecting wildlife contraband in the EU and led to the independent development of wildlife detector dog programmes in several European countries.

Details: Berlin: WWF Germany, 2013. 16p.

Source: Internet Resource: Accessed December 10, 2014 at: www.traffic.org

Year: 2013

Country: International

Keywords: Canines

Shelf Number: 134313


Author: Kramer, Matthew H.

Title: The Purgative Rationale for the Death Penalty: Replies to Steiker and Danaher

Summary: Carol Steiker and John Danaher have recently published thought-provoking critiques of my 2011 book "The Ethics of Capital Punishment". In this paper I respond to the main points in their respective critiques. The paper goes beyond the book in two chief ways. First, it significantly expands on what the book has said about the role of everyone's self-respect in the purgative rationale for the death penalty. Second, in response to some of Danaher's remarks, the paper modifies the book's account of the wrongness of executing defendants who have become certifiably insane after being convicted of terrible crimes.

Details: Cambridge, UK: University of Cambridge, Faculty of Law, 2014. 30p.

Source: Internet Resource: Legal Studies Research Paper Series No. 68/2014: Accessed January 15, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2539134

Year: 2014

Country: International

Keywords: Capital Punishment

Shelf Number: 134315


Author: Kemp, Walter

Title: From the Margins to the Mainstream: Toward an Integrated Multilateral Response to Organized Crime

Summary: Since the end of the Cold War, organized crime has moved from being a marginal problem in a few cities and regions to being a mainstream threat to national stability and international peace and security. While the threat has become transnational, the multilateral response has been slow, disjointed, and reactive. Broad structural changes are needed to deal more effectively with illicit trafficking and other activities of organized criminal groups. This report-the third in a trilogy of publications by the "Peace without Crime" project of the International Peace Institute (IPI)1-calls for a more integrated multilateral response to organized crime. It highlights the impact of organized crime, provides an overview of international efforts made to tackle the problem, and suggests steps toward a more effective response.

Details: New York: International Peace Institute, 2014. 40p.

Source: Internet Resource: Accessed January 22, 2015 at: http://www.globalinitiative.net/download/general/global/1409_margins_to_mainstream_toc.pdf

Year: 2014

Country: International

Keywords: Criminal Networks

Shelf Number: 134438


Author: Moestue, Helen

Title: Digitally Enhanced Child Protection: How new technology can prevent violence against children in the Global South

Summary: The last decade has witnessed growing appreciation of the potential of information and communication technologies (ICTs) to protect children from violence. The issue of violence against children (VAC) is of singular importance. And while the full scope and scale of VAC remains hidden from view there is wide spread consensus that "every year and in every region of the world, millions of children suffer the cumulative impact of physical, mental and emotional violence, and millions more are at risk". Although ICT innovation for child protection is comparatively advanced in North America and Western Europe, there is less known about new tools in lower- and middle-income settings in the Americas, Africa and Asia. This Strategic Paper begins filling this knowledge gap and reviews the emerging character and functions of ICTs to prevent VAC in the global South. Drawing on assorted cases from Benin, Brazil, Kenya, Uganda and other countries, it provides a hint of the diversity of emerging experiences around the world. In the process, the Strategic Paper provides insights into emerging trends, typologies, and threats. Key findings include: - Mobile and digital technology are being harnessed in multiple ways to protect children, including through: (a) the digitization of existing child protection systems (b) helplines (c) citizen reporting and crowd mapping (d) mobile research and survey tools(e) big data analysis, and (f) tech-driven campaigning and information sharing; - These initiatives frequently combine the offer of assistance to children with the collection of real time data. This model in turn generates critical information for advocacy and can inform future child protection interventions; - Such approaches save time and money, and are breaking down the social, cultural and practical barriers to violence reporting. However, digital data collection raises important ethical questions about consent and confidentiality; - Innovation is emerging from a wide range of fields, including child protection, social development, the humanitarian sector, public health and the wider violence prevention field, and is often facilitated by creative public-private partnerships. Different disciplines are using the same tools; - Basic SMS based reporting systems have immense potential. Certain open source digital platforms offer the potential for scaling-up, especially systems such as Frontline SMS, Rapid SMS and Ushahidi, which integrate basic mobile phones for crowd-sourcing violence reporting and community mapping; and - There is a widening array of initiatives that enable children themselves to be informed, empowered and included in their own protection. Digitized survey tools, that can be used for and by children even in emergency settings, include Open Data Kit and Kobo Toolbox. The Strategic Paper considers the emerging landscapes of ICTs for VAC. It first sets the scene exploring the character and dynamics of violence against children, especially in low- and middle-income settings. The opening section also considers the expansion of ICTs and ethical implications in their application among children and youth. The second section introduces a typology of different ICTs including the digitization of child protection systems, child helplines, citizen reporting and crowd mapping, mobile research tools, Big Data analytics and technology-enabled campaigns. Section three explores how different sectors and disciplines are engaging with these new tools - including child protection experts, relief and development professionals and the public health community. The Paper closes with a brief consideration of next steps in the evolution of ICTs to prevent and reduce VAC.

Details: Rio de Janeiro: Igarape Institute, 2014. 36p.

Source: Internet Resource: Strategic Paper 10: Accessed January 28, 2015 at: http://igarape.org.br/wp-content/uploads/2014/11/Artigo-estrategico-10-Child-Protection-4.pdf

Year: 134475

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134475


Author: International Fund for Animal Welfare

Title: Wanted -- Dead or Alive: Exposing Online Wildlife Trade

Summary: IFAW has shared key results from its reports with national enforcement agencies in order that they might assess whether to investigate if traders have sold items in breach of the law. It is not possible to measure the scale of illegal online wildlife trade based on IFAW investigations alone. This requires law enforcement agencies to record and publish wildlife cybercrime prosecutions as well as the number of incidents or intelligence logs that relate to this issue. Sadly IFAW's investigations are taking place at a time when wildlife poaching levels are alarmingly high with reports of more than 100,000 elephants killed for their ivory in just three years1 and a recent increase in the number of large ivory seizures. The illegal trade in ivory, wildlife and wildlife parts and products is not only a threat to the conservation of species, but also to national and global security as well as to social and economic development in the countries in which it occurs. The illegal wildlife trade generates an estimated US $19 billion per year. It ranks fourth on the list of the most lucrative global illegal activities closely behind drugs, counterfeiting and human trafficking. Meanwhile, cybercrime is a growing area of concern, as was highlighted in the United Kingdom's Home Office Select Committee report of 2013 on e-crime, which states: "We live in a world where terms like 'cybercrime' no longer belong in the realm of science fiction. Modern devices such as smart phones and tablets have brought the internet not only to our fingertips but to our bedsides, our pockets and to our children. And yet there is strong evidence that access to such technology, with all its opportunities and benefits, can put businesses and families at increasing risk of exploitation and internet-based crime (e-crime)." It was in this context of high levels of poaching and the increasing threat of cybercrime that IFAW investigated the trade in endangered wildlife taking place on 280 online marketplaces in 16 countries during a six week period in 2014. Investigators found a total of 33,006 endangered wildlife and wildlife parts and products from species listed on the Convention of International Trade in Endangered Species of Wild Fauna and Flora (CITES) Appendix I and II available for sale in 9,482 advertisements, estimated to be worth at least US $10,708,137. Of the advertisements, 54 per cent were for live animals while 46 per cent were for animal parts and products. Ivory, reptiles and birds were the most widely traded items, with ivory and suspected ivory featuring in almost one-third of all advertisements and reptiles accounting for one-quarter of the items found for sale. IFAW investigators submitted 1,192 intelligence files to law enforcers, which equates to almost 13 per cent of the advertisements. While it was not possible to determine the legality of each item provided to law enforcers based on the information available to the investigators, IFAW shared this information with enforcers because it believes that it could inform or be used as the grounds for future police or customs criminal investigations. At a time when poaching of endangered wildlife has reached unprecedented levels, the widespread availability of the internet has transformed some traditional criminal activity to the extent that law-breaking takes place on an extraordinary scale. IFAW believes it is essential that governments, policy makers, law enforcers and online marketplaces do not ignore online wildlife crime in their battle for justice. Governments must ensure they have robust laws in place that specifically tackle the unique challenges of wildlife cybercrime supported by sufficient enforcement capacity, while online marketplaces must commit to strong policies that are effectively implemented to prevent their platforms being abused by wildlife criminals. Lastly consumers must be made aware of the devastating cost of wildlife crime

Details: London: IFAW, 2014. 62p.

Source: Internet Resource: Accessed January 30, 2015: http://www.ifaw.org/sites/default/files/IFAW-Wanted-Dead-or-Alive-Exposing-Online-Wildlife-Trade-2014.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 134495


Author: Stanley, Karlyn D.

Title: Business Bribery Risk Assessment

Summary: Corruption is a major problem that can inhibit global business investment, especially in emerging markets; however, businesses operating overseas have inadequate tools for assessing business bribery risk and their potential risk of violating various anti-corruption laws. This report introduces a new index, the TRACE Matrix, for business bribery risk assessment that we believe has advantages over existing alternatives. The TRACE Matrix provides a quick and useful guide for businesses operating overseas that is based on a conceptual model of bribery risk and supported by data specific to firms. The objective of this index is to help firms assess the propensity for government bribery and its associated business risk and to provide data to inform compliance processes. We have developed a business bribery risk methodology using existing, publicly available cross-country data about risk factors, drawing on diverse data sources focused on business information. We have aggregated the data to provide a composite score for each country based on distinct categories of risk, much like a health index score that combines the key factors important to health (e.g., blood pressure, heart rate). Although countries are ranked by their composite scores, it is also possible to view the results for the different factors included in the composite score and identify the key drivers of that score. This allows firms to adjust their risk assessment and compliance practices to better suit country-specific conditions.

Details: Santa Monica, CA: RAND, 2014. 75p.

Source: Internet Resource: Accessed January 30, 2015 at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR800/RR839/RAND_RR839.pdf

Year: 2014

Country: International

Keywords: Bribery

Shelf Number: 134500


Author: Shadbolt, Tanya

Title: Hauling Out: International trade and Management of Walrus

Summary: This report from TRAFFIC and WWF-Canada examines the international trade in walrus parts and derivatives in view of the looming additional threat posed to this Arctic species from climate change and the break up of sea ice. Although commercial hunting of Walrus populations has not occurred since the mid 20th Century, hunting for subsistence purposes is still permitted in Canada, the United States, Greenland and Russia, with a small walrus sport hunt allowed in Canada. Norway is the only range State that prohibits the hunting of walrus. Hunting helps to maintain the cultural identity of Arctic peoples and contributes to a traditional subsistence economy in the region, both as a source of food and in generating income. According to the report, Hauling out: International trade and management of Walrus, on average up to 5,406 walruses (555 Atlantic Walruses Odobenus rosmarus rosmarus and 4,851 Pacific Walruses O. r. divergens) were hunted per year from 2006/2007 to 2010/2011. This equates to less than 3% and 4% respectively of the estimated global populations for each subspecies. International trade in walrus parts and derivatives is regulated by the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES). Based on CITES trade data on walrus skulls and tusks, between 461and 772 walruses were represented in international trade during 2005 to 2009, an average of 92-154 per year. The majority of the skulls and tusks were from Atlantic Walrus. Overall, the report finds a lack of long-term data and poor quality of information on population estimates for walruses making it difficult to determine the true impact of international trade or what the current or future impact on walrus populations will be from climate change. Currently neither illegal hunting nor illegal trade appear to be at levels that would cause conservation concern. The report therefore recommends a number of steps to improve monitoring of international trade in walrus parts and steps to obtain better data on the population size, trend and demographics of both Atlantic and Pacific Walrus populations to ensure harvest levels are sustainable.

Details: Vancouver, BC: TRAFFIC and WWF-Canada, 2014. 176p.

Source: Internet Resource: Accessed January 31, 2015 at: http://d2ouvy59p0dg6k.cloudfront.net/downloads/haulingout_report.pdf

Year: 2014

Country: International

Keywords: Walrus

Shelf Number: 134515


Author: Buxton, Julia

Title: Drugs and Development: The Great Disconnect

Summary: Key Points - The 2016 United Nations General Assembly Special Session on the World Drug Problem (UNGASS) will see a strong lobby in support of development oriented responses to the problem of drug supply, including from the United Nations Office on Drugs and Crime (UNODC). - The promotion of Alternative Development (AD) programmes that provide legal, non-drug related economic opportunities for drug crop cultivators reflects the limited success of enforcement responses, greater awareness of the development dimensions of cultivation activities and the importance of drugs and development agencies working co-operatively in drug environments. - Evidence from thirty years of AD programming demonstrates limited success in supply reduction and that poorly monitored and weakly evaluated programmes cause more harm than good; there has been little uptake of best practice approaches, cultivators rarely benefit from AD programmes, the concept of AD is contested and there is no shared understanding of 'development'. - AD was popularised in the 1990s when development discourse emphasised participatory approaches and human wellbeing. This is distinct from the development approaches of the 2000s, which have been 'securitised' in the aftermath of the Global War on Terror and which re-legitimise military participation in AD. - UNGASS 2016 provides an opportunity for critical scrutiny of AD and the constraints imposed by the 1961 Single Convention on Narcotic Drugs on innovative, rights based and nationally owned supply responses. Cultivation is a development not a crime and security issue. Consideration must be given to a reconfiguration of institutional mandates, with supply and cultivation control removed from the UNODC and brought into the remit of development agencies. - Deliberation around the post 2015 Sustainable Development Goals provides an entry point for new approaches to drug issues in the Global South and an opportunity to reverse the human, development and public health harms caused by current counter-narcotics policies.

Details: Swansea, UK: Global Drug Policy Observatory, Swansea University, 2015. 66p.

Source: Internet Resource: Policy Report 2: Accessed February 3, 2015 at: http://www.swansea.ac.uk/media/The%20Great%20Disconnect.pdf

Year: 2015

Country: International

Keywords: Drug Enforcement

Shelf Number: 134516


Author: World Wildlife Fund

Title: Illegal Russian Crab: An Investigation of Trade Flow

Summary: World Wildlife Fund investigated the trade flow of illegal and legal crab harvested from Russian waters throughout the Pacific Rim to better understand the likelihood of U.S. importation of illegally harvested Russian crab, as well as conservation concerns associated with overharvest of crab from Russian waters. This report found the following: - Official customs data from South Korea, Japan, China and the United States indicate that in 2013, these four countries (which account for nearly all of Russia's official crab exports) imported 1.69 times as much live and frozen crab from Russia as official Russian harvest levels. Over the past decade, the level of overharvest due to illegal crab harvesting was two to four times the legal limit, causing grave concern about the sustainability of several Russian Far East crab species. - Foreign-flagged vessels harvest crab illegally in Russian waters, and some Russian-flagged vessels either overharvest or harvest crab illegally. Misdeclaring product quantities, off-loading undeclared product onto a transport vessel at sea, or delivering undeclared crab (or declared using fake documentation) directly to a foreign port are known techniques to launder crab. Foreign ports receiving Russian crab are typically in Japan and South Korea and are also likely to be intermediary stop-offs or final destinations for illegal Russian crab. - WWF examined the Automatic Identification System (AIS) signals for 32 vessels believed to have delivered crab to Hokkaido, Japan in early 2012. Two foreign-flagged vessels showed a pattern that indicated harvesting in Russian waters and three foreign-flagged vessels approached the Russia-Japan maritime border, which could indicate transshipment. Five Russian-flagged vessels showed a pattern of possible harvesting in Russian waters and motoring directly to ports in Japan without stopping in a Russian port first to register the catch, therefore potentially violating Russian law (if crab or other seafood from Russian waters was off-loaded in Japan). - Several species of crab are commercially important to both Alaska and Russian crab fisheries, but the highest value is garnered by red king crab (Paralithodes camtschaticus). King crab is consumed in large quantities in the United States with the source of this crab generally split between domestic harvests from Alaska and imports from Russia. On average over the last ten years, three-quarters of the king crab consumed in the U.S. market is from Russia. With 21% of total U.S. crab imports coming from Russia in 2012, the United States is likely importing crab that was harvested illegally. - The current U.S. system for seafood imports is not able to detect or block every shipment of illegally harvested crab. Currently, seafood-tracking systems that verify legality are not in common practice. - In recent years, Russia has worked to shrink the illegal crab problem by developing bilateral agreements with Japan and South Korea, developing a national plan of action to address illegal fisheries, and continued enforcement at-sea. Yet the problem is multilateral and it demands a multilateral solution.

Details: Anchorage, Alaska: World Wildlife Fund Arctic Field Program, 2014. 40p.

Source: Internet Resource: Accessed February 3, 2015 at: http://assets.worldwildlife.org/publications/733/files/original/WWF_Illegal_crab_report_final_15_Oct_2014.pdf?1413407573

Year: 2014

Country: International

Keywords: Crabs

Shelf Number: 134522


Author: Burnett, Mark

Title: Illegal Fishing in Arctic Waters: Catch of Today - Gone Tomorrow?

Summary: Illegal, unreported and unregulated fishing is a global concern, costing nations upwards of $10 billion (US$15.5 billion) annually. Few places are of such great concern as the Arctic, home to some of the most outstanding marine ecosystems and most productive fisheries in the world. Indeed, between them the Barents Sea cod fishery and the Russian Far Eastern pollock fishery alone account for between 20 and 25% of the global catch of whitefish. Recent years have seen significant progress in reducing - though by no means eliminating - IUU fishing in the Barents Sea. A new WWF report, Illegal Fishing in Arctic Waters, finds, however, that it remains a concern in the western Bering Sea and the Sea of Okhotsk in the Russian Far East. Moreover, globalization of the fishing industry has resulted not only in new markets and new governance structures, but also in new challenges and obstacles to combating the truly international criminal activity that IUU fishing has become.

Details: Oslo: World Wildlife Fund International Arctic Programme, 2008. 52p.

Source: Internet Resource: accessed February 3, 2015 at: http://d2ouvy59p0dg6k.cloudfront.net/downloads/iuu_report_version_1_3_30apr08.pdf

Year: 2008

Country: International

Keywords: Fishing Industry

Shelf Number: 134523


Author: Grabosky, Peter

Title: The Evolution of Cybercrime, 2004-2014

Summary: This article reviews developments in cybercrime in the ten years to 2014. It observes that in the basic substance of cybercrime offences is essentially the same as in the past. However, cybercrimes are now executed with greater sophistication, increasingly for purposes of financial gain, and by an increased diversity of organizational structures, including government agencies and state proxies. The article concludes with a discussion of applications of digital technology that have emerged over the past decade, and their potential for criminal exploitation.

Details: Australian National University (ANU) - Research School of Social Sciences (RSSS); Australian National University (ANU) - Regulatory Institutions Network (RegNet): 2014. 18p.

Source: Internet Resource: RegNet Research Paper No. 2014/58: Accessed February 4, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2535605

Year: 2014

Country: International

Keywords: Criminal Exploitation

Shelf Number: 134543


Author: Global Initiative to End All Corporal Punishment of Children

Title: Cruel, inhuman and degrading: ending corporal punishment in penal systems for children

Summary: This report documents that 38 states, which include just under 40% of the world's children, have not fully prohibited the sentencing of children to corporal punishment by their courts and 67 states have not prohibited violent punishment of children in penal institutions. It is being launched at the 2015 World Congress on Juvenile Justice, which "aims to become a milestone in the implementation of international norms". How can these states, 25 years after adoption of the Convention on the Rights of the Child, continue to ignore their international obligations and maintain these barbaric practices? For many children, I fear we are barely at the starting point in respecting their human dignity: we must all redouble explicit advocacy.

Details: London: Global Initiative, 2015. 16p.

Source: Internet Resource: Accessed February 5, 2015 at: http://www.endcorporalpunishment.org/pages/pdfs/reports/Juvenile%20Justice%20Report%202015%20singles.pdf

Year: 2015

Country: International

Keywords: Corporal Punishment

Shelf Number: 134548


Author: CP MERG

Title: Ethical principles, dilemmas and risks in collecting data on violence against children: A review of available literature

Summary: Ethical guidelines are crucial when carrying out research on violence against children (VAC). Such guidelines help to minimize the risk of potential harm resulting from the data collection process to participants, researchers and others, and ensure that any remaining risks are outweighed by the potential benefits. Research ethics and methodologies are closely linked, with ethically sound research protocols and tools adding to the value of the research. Recent years have seen growing efforts to collect data on VAC and close gaps on child protection monitoring, evaluation and research. However, there are, as yet, no internationally recommended or agreed upon ethical guidelines for VAC research. This literature review is a contribution to the foundations for the development of such ethical guidelines. It aims to capture current thinking around ethical issues and provide empirical support to guide recommendations for ethical research practice and decision-making in collecting data on VAC. The review was prepared on behalf of the Technical Working Group on Data Collection on Violence against Children (part of the Child Protection Monitoring and Evaluation Reference Group). A sister project that has been carried out simultaneously to this research provides a more detailed inventory and assessment of existing tools and methods to collect data on VAC. This review examines documentation, including both published and 'grey' literature that is of specific relevance to research ethics in collecting data on VAC. It includes ethics guidelines, codes, protocols and practice-related documentation, as well as research-based publications. An Internet-based search was used to identify and locate documentation for review. The review has six main sections: 1. An introduction to the review and its aims. 2. A discussion of the scope and methodology of the review. 3. A review of ethics documentation, such as guidelines, codes and standards, focusing on aspects relevant to VAC. This starts with an overview of ethical principles and frameworks to provide a philosophical context for the paper, followed by a review of the documentation used to guide the implementation of ethics in research with children, and ethical policy and codes. 4. A review of publications relevant to ethics in research on VAC. 5. A discussion of the ethical challenges and dilemmas that emerged during the review process and possible recommendations from the literature. 6. Concluding comments.

Details: New York: Statistics and Monitoring Section/Division of Policy and Strategy, UNICEF, 2012. 93p.

Source: Internet Resource: Accessed February 7, 2015 at: http://data.unicef.org/corecode/uploads/document6/uploaded_pdfs/corecode/EPDRCLitReview_193.pdf

Year: 2012

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134563


Author: International Centre for the Prevention of Crime (ICPC)

Title: Study on Intimate Partner Violence Against Women - Government of Norway

Summary: Since May 2013, ICPC has been conducting a research study commissioned by the Government of Norway to identify strategies and practices implemented around the world which aim to tackle and prevent domestic violence. The report include an overview of the legislative measures and action plans as well as the evaluated programmes developed in different countries, and offer recommendations based on good practices for the prevention .

Details: Montreal: ICPC, 2014. 69p.

Source: Internet Resource: Accessed February 7, 2015 at: http://www.crime-prevention-intl.org/uploads/media/Final_-_research_study_on_IPV_08.pdf

Year: 2014

Country: International

Keywords: Domestic Violence

Shelf Number: 134567


Author: Petesch, Patti

Title: How communities manage risks of crime and violence

Summary: Why are some communities peaceful while others struggle with persistent crime and violence? This background note presents a relatively new and insightful comparative case study literature that seeks to explain this variance. Much of the recent work on community violence favors interactional arguments, an approach that traces risks of violence to the interests and actions of elite actors and their ties to armed groups, on the one hand, and the quality of trust and networks among the wider social groups in a community, on the other. A rich literature especially surrounds persistent problems of collective violence between ethnic and religious groups, which accounts for the largest share of today's major violent conflicts. Violence patterns have strong geographic, gender, and generational dimensions. Rates of crime and violence are usually higher in cities than rural areas, and within cities violence frequently clusters in poorer communities. Young men are the chief perpetrators and victims of crime and violence. Nevertheless, problems of domestic violence against women continue to be severe in many localities around the world, but are often poorly addressed and documented by local law enforcement. Many case studies are making important contributions to understanding causes of violence by framing their samples to include communities in relatively close proximity with similar demographics and other traits, but strong differences in levels of crime and violence. In explaining the variation in violence, however, scholars differ in their relative emphasis on the role of local leaders and associational life. Ashutosh Varshney's (2002) exploration of Hindu-Muslim strife in six cities of India found that the three peaceful cities in the sample were distinguished by their strong inter-ethnic networks that functioned to constrain political leaders from addressing conflicts through violent means. The three cities affected by waves of ethnic riots, by contrast, lacked such integrated networks among their local businesses, political parties, unions, professional associations, clubs and neighborhoods. Other comparative studies emphasize the pivotal role of leaders in mobilizing violence. A case study of lynch mobs in rural Indonesia by Janet Welsh (2010), for instance, assigns great weight to local leaders, and concludes that communities with high incidence of mobbing were characterized by active involvement or tacit approval of leaders and law enforcement. Community case studies of national and municipal policing reforms, decentralized poverty programs, and active policies to reduce social group inequalities demonstrate the strong potential of public action to influence local levels of crime and violence. The case study literature indicates that building community capacities for managing risks of crime and violence requires recognition of formal and informal local governance systems, civic networks, and the uncertain dynamics of change processes on the ground. Policy measures and community programs are discussed that improve crime and violence monitoring systems, reduce societal fragility and social group inequalities, strengthen local law and order and conflict mediation capacities, expand local economic opportunities, and provide effective redress mechanisms for community development interventions.

Details: Washington, DC: World Bank, 2013. 41p.

Source: Internet Resource: Background Paper: Accessed February 9, 2015 at: http://siteresources.worldbank.org/EXTNWDR2013/Resources/8258024-1352909193861/8936935-1356011448215/8986901-1380568255405/WDR14_bp_Community_Violence-Petesch.pdf

Year: 2013

Country: International

Keywords: Communities and Crime

Shelf Number: 134569


Author: Islam, Asif

Title: Economic growth and crime against small and medium sized enterprises in developing economies.

Summary: Several studies have explored the relationship between economy-level crime rates or individual-level crime and economic growth. However, few studies have examined the relationship between economic growth and crime against firms. This study uses data for about 12,000 firms in 27 developing countries and finds that economic growth is negatively associated with crime. This relationship is stronger for small and medium firms than large firms. The study also explores several economy-wide factors and their influence on the growth-crime relationship for small and medium enterprises. The results are robust to various sensitivity checks.

Details: Washington, DC: World Bank, 2014. 38p.

Source: Internet Resource: Policy Research working paper ; no. WPS 6768: Accessed February 9, 2015 at: Several studies have explored the relationship between economy-level crime rates or individual-level crime and economic growth. However, few studies have examined the relationship between economic growth and crime against firms. This study uses data for about 12,000 firms in 27 developing countries and finds that economic growth is negatively associated with crime. This relationship is stronger for small and medium firms than large firms. The study also explores several economy-wide factors and their influence on the growth-crime relationship for small and medium enterprises. The results are robust to various sensitivity checks.

Year: 2014

Country: International

Keywords: Crimes Against Businesses

Shelf Number: 134574


Author: Perry, Jennifer

Title: Digital stalking: A guide to technology risks for victims

Summary: Stalking affects millions of people in the UK Stalking is often perceived as only a crime against women. It is true that women are more likely to be victims of stalking and they are also more likely to be physically assaulted or murdered by their stalkers. According to the Home Office, 9.3% of men and 18.7% of women have been victims of stalking since the age of 16 (UK Home Office, January 2011). In a survey on cyberstalking carried out by the University of Bedfordshire (Maple, Short and Brown, 2011) 35% of the victims who responded were men. Where women are more concerned about injury, men are significantly more concerned about damage to reputation and financial loss. Men are more likely to be harassed using instant messaging (IM) and work e-mail. Men were also more likely to experience harassment by work colleagues. In the same study, women were more fearful than men of being physically assaulted. Women were most likely to harassed by an ex-boyfriend (21.2%) or ex-partner (10.4%). Women reported being harassed more via mobile phone/texts. Both sexes report significant harassment via social networks. The University of Bedford study demonstrates that perpetrators will use multiple forms of technology to torment their victims. Stalking by ex-partners accounts for the largest group of victims, with the majority of these victims being women. 80% of women in this group were previously physically assaulted while in the relationship. In approximately 50% of the cases the stalking behaviour started while they were in the relationship (Mullen, Pathe and Purcell, 2009). Survivors of domestic violence are at higher risk of physical harm. The Metropolitan Police found that 40% of domestic violence murders were also victims of stalking (ACPO Homicide Working Group, 2003). This group of stalking victims needs to take extra precautions, not only because of the risk, but also because the stalker often has much more information about, and insight into, the victim. S/he also has greater opportunity to access the victim, for example s/he might still live with her or they may be separated but share friends, financial assets, or caring responsibilities.

Details: Lydney, UK: Network for Surviving Stalking; Bristol, UK: Women's Aid, 2012. 87p.

Source: Internet Resource: Accessed February 9, 2015 at: http://www.womensaid.ie/download/pdf/digital_stalking_guide_v2_nov_2012.pdf

Year: 2012

Country: International

Keywords: Computer Crimes

Shelf Number: 134575


Author: Williams, Naomi

Title: 100 Promising Practices on Safer Cities: Collation of Urban Safety Practices

Summary: As crime and violence becomes an even greater concern for residents in urban areas globally, two general approaches have been developed to address this scourge. On one hand, national governments have attempted to reinforce security through repression. These repressive measures include increasing police manpower, increasing the term of prison sentences, and applying repressive measures which are difficult to administer and at the same time questionable, e.g. "zero tolerance". Such measures can also include curfews for minors or the lowering of the age of legal responsibility. The second approach favours prevention in addition to repression. This can be undertaken in two ways. One way involves the centralisation of the fight against insecurity by making police officers the key players in the matter and subordinating the prevention' practitioners to them. The other tends to decentralise the fight through the delegation to the local authorities of the leadership through a partnership between civil associations in which the police can participate. It should be noted that in the two approaches, one often sees police reform applied in parallel to the implementation of preventive actions. While the repressive approach has the advantage of having immediate effects which can satisfy the short-term demands of public opinion and the needs for effectiveness of the political class, it is clearly evident, however, that the cost of repression is much higher than that of prevention and that prevention has a long term and broad range of effects on quality of life. A social call for safer cities and urban spaces is nowadays clearly voiced. Such a demand concerns directly all those who are responsible for urban development projects. Bearing this in mind, UN-Habitat has embarked on the progressive development of an urban safety approach that builds on a culture of prevention within a sustainable human settlement and more specifically a sustainable urban development agenda The development of this urban approach to crime and violence prevention reveals that the principles governing the layout, functionality and management of streets and urban spaces that determine quality of urban life are close to those that contribute to feelings of safety of urban users. That is why urban safety has become an accepted goal of urban development projects and has provided local authorities and urban stakeholders with a great opportunity to take advantage of the Safer Cities approach to change the face of cities for the better - to produce better quality of life for urban residents, to enhance values of citizenship and social cohesion and to create liveable urban environments. But equally, without documenting lessons from practice on the application of the prevention approach at the local level, there is an enormous risk that urban stakeholders continue to apply the prevention models of two decades ago that have achieved little impact due to their design and lack of systematization - consequently the scourge of crime and violence continues to perpetuate itself in those cities and communities and more segregated urban communities continue to be produced offering no social context or cohesion, no new hopes or possibilities for the most vulnerable groups in the society. There is plenty of evidence about the right and wrong ways to go about the prevention and reduction of urban crime and violence and there is a gathering consensus that the way forward is enhancing multi-dimensional, multi-stakeholder, integrated and holistic approaches to urban safety. Yet there is still not much debate and application of the principles of this approach to urban safety to address the problem of delivery of urban safety for all. The problem of delivery is multifaceted, however two key aspects can be underlined: the weak institutional capacity of local government in many countries often manifested by bad urban governance, planning and management practices; and the lack of political will to decentralize national security policies to the institutions of local government, often seeing local as the interface of the police station with local communities. Coupled with this, is the fact that in the face of rising crime and violence, many local authorities resort to short term quick win actions as opposed to long term social prevention measures which many suspect as more costly to plan and develop. In addition, planning authorities are not well enough informed about the multi-sectoral benefits which are associated with holistic approaches on the prevention of urban crime and enhancement of urban safety, to incorporate these more enlightened principles more robustly in their urban planning, urban management and urban governance principles, nor confident enough to work to actively implement this type of safety-conscious urban development. Accordingly, this report, which presents the case for urban safety, has been written with two audiences in mind - public authorities on the one hand and urban stakeholders on the other hand. The goal of this report is not to be prescriptive but rather to foster an understanding of how the safer cities model has evolved from practice and to provide a source of reference for the elaboration of UN Guidelines on Safer Cities. The 100 practices have been classified into 5 categories : - YOUTH SAFETY PRACTICES - GENDER SAFETY PRACTICES - URBAN DEVELOPMENT SAFETY PRACTICES - COMMUNITY MOBILIZATION SAFETY PRACTICES - POLICING & SECURITY SAFETY PRACTICES - GOVERNANCE SAFETY PRACTICES

Details: s.l.:Global Network of Safer Cities, 2014. 214p.

Source: Internet Resource: Accessed February 11, 2015 at: http://efus.eu/files/2014/12/100-Promising-Practices-on-Safer-Cities-1-1.pdf

Year: 2014

Country: International

Keywords: Cities

Shelf Number: 134591


Author: Vives-Cases, Carmen

Title: Preventing and addressing intimate partner violence against migrant and ethnic minority women: the role of the health sector

Summary: Violence against women is an extreme manifestation of gender inequality in society and a serious violation of fundamental human rights. Intimate partner violence (IPV) is the most common type of such violence and takes place within couples. IPV can lead to death, physical injury, functional impairment, mental health problems, negative health behaviour, chronic conditions and reproductive health problems. Institutional discrimination, lack of access to or knowledge of services, and cultural differences can prevent women who are not only experiencing IPV but also migrants or members of ethnic minorities from seeking help. This policy brief aims to provide input into the role of the health sector in preventing and addressing IPV among migrant women and those of ethnic minorities. It describes the scope of the problem, presenting key evidence, and makes recommendations for health policy and health systems, health facilities and health service providers.

Details: Copenhagen: World Health Organization, Regional Office for Europe, 2014. 28p.

Source: Internet Resource: accessed February 12, 2015 at: http://www.euro.who.int/__data/assets/pdf_file/0018/270180/21256-WHO-Intimate-Partner-Violence_low_V7.pdf?ua=1

Year: 2014

Country: International

Keywords: Battered Women

Shelf Number: 134601


Author: Buxton, Julia

Title: The Rise and Challenge of Dark Net Drug Markets

Summary: Key Points - Recent years have seen a dramatic growth in the sale of a variety of illicit substances on Dark Net drug markets, with on line sales projected to increase exponentially due to expanding internet availability, evolving technologies and the profusion of social media. - This new form of retail market poses a major challenge to not only law enforcement agencies but also the UN international drug control system and related legal structures within which these agencies operate. - For vendors and purchasers who use the sophisticated, user friendly and increasingly secure Dark Net sites, hidden markets present a safer environment for drug transactions and they reduce the multiple risks (coercion, violence, arrest, exposure to other drugs) associated with 'street' sales. - Research demonstrates that anonymised user forums and online chat rooms encourage and facilitate information sharing about drug purchases and drug effects, representing a novel form of harm reduction for drug users and an entry point for drug support services. - Experience to date shows that enforcement efforts through surveillance, hacking and other forms of interdiction may be successful in closing down a particular site, but at the cost of proliferating hidden drug markets and incentivising technological innovation. - Given an acknowledged lack of technical capacity, legal constraints and poor international enforcement coordination, Dark Net interdiction efforts should prioritise high-end crimes such as child sexual exploitation, cyber terrorism and weapons trafficking, and work with self-regulating, 'ethical' drug sites to enhance understanding of high-level criminality on the Dark Net. - The 2016 UN General Assembly Session (UNGASS) on the World Drug Problem is a timely opportunity to discuss reform of the UN drug control treaty system to better deal with the challenges of the increasingly complex illicit drug market in the twenty-first century.

Details: Swansea, UK: Global Drug Policy Observatory, Swansea University, 2015. 24p.

Source: Internet Resource: Policy Brief 7: Accessed February 12, 2015 at: http://www.swansea.ac.uk/media/The%20Rise%20and%20Challenge%20of%20Dark%20Net%20Drug%20Markets.pdf

Year: 2015

Country: International

Keywords: Computer Crimes

Shelf Number: 134609


Author: Perliger, Arie

Title: The Rationale of Political Assassinations

Summary: The current study aims to improve our understanding of the causes and implications of political assassinations by employing quantitative analyses on a comprehensive data set. The findings illustrate the trends that characterize the phenomenon and challenge some of the existing conventions about political assassinations and their impact. This study puts forth the rationale that the logic of political assassinations is different from that of other manifestations of political violence. Hence, it is important to understand the unique factors that may encourage or discourage violent groups or individuals from engaging in political assassinations. Moreover, it seems reasonable to assume that these factors vary among different types of assassinations, because in most cases the characteristics of the targeted individual shape the nature and objectives of the assassination. Indeed, this study establishes that different processes trigger different types of assassinations, and that different types of assassinations generate distinct effects on the political and social arenas.

Details: West Point, NY: Combating Terrorism Center at West Point, 2015. 81p.

Source: Internet Resource: Accessed February 12, 2015 at: https://www.ctc.usma.edu/posts/the-rationale-of-political-assassinations

Year: 2015

Country: International

Keywords: Political Assassinations

Shelf Number: 134617


Author: Panda Security

Title: The Cyber-Crime Black Market: Uncovered

Summary: Many of us in the team at Panda Security spend a lot of time traveling and attending all types of events: from specialized IT industry fairs and congresses, to those aimed at businesses, end-users, etc. Yet even though it is becoming more common to hear about the arrest of hackers that steal information and profit from it in many different ways, there are still many members of the public, not necessarily dedicated to IT security, who ask us: "Why would anyone want to steal information from me? I don't have anything of interest..." Another factor to bear in mind is that today's profit-oriented malware is designed to steal data surreptitiously, so the first indication that you have been a victim is when you get your bank or Paypal account statement. Moreover, there is a general perception that this problem only affects home users, and that businesses are immune. The result of our research, as you will read below, shows that this is not the case: Today nobody - neither home users nor businesses- is safe from confidential data theft (and the consequent fraud). This is despite the increased effort in recent years to improve awareness and education in IT security, initiated by governmental agencies in many countries, and of course, thanks to the security industry as a whole, along with other institutions, organizations, media, blogs, etc., who have been assisting with the task for some time now. Although we don't have precise data, we believe that this nefarious business has expanded with the economic crisis. Previously it was in no way easy to locate sites or individuals dedicated to this type of business, yet now it's relatively simple to come across these types of offers on underground forums.

Details: Madrid: Panda Security, 2011. 44p.

Source: Internet Resource: Accessed February 18, 2015 at: http://www.wgains.com/Assets/Attachments/The-Cyber-Crime-Black-Market.pdf

Year: 2011

Country: International

Keywords: Computer Crime

Shelf Number: 134636


Author: Alazab, Mamoun

Title: Spam and Criminal Activity

Summary: The Internet is a decentralized structure that offers speedy communication, has a global reach but also provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with the spread of the Internet, cybercrime has rapidly evolved but attacks via email (spam) remain one of the major vectors for the dissemination of malware and many predicate forms of cybercrime. Spam as 'social engineering' is probably the most popular means for spreading and injecting malware on computers and other digital devices. Unlike cybercrime that targets 'low volume-high value' victims such as banks but often requires advanced hacking capability, spam enables malware to reach 'high volume low value' targets, which are less likely to have effective anti-virus or other countermeasures in place. A typical example is the spreading of malicious emails, containing content that entices the recipient to click on a URL link to a malicious web site or download a malicious attachment. Deceptions achieved through the 'social engineering' of email messages are relatively well understood but less is known about advanced methods like 'spear phishing,' and whether different forms of social engineering are related to different types of malware and crime. Understanding the nature of spam activity, and the threat posed by malicious spam emails, especially the prevalence, frequency, duration and severity of these common forms of cybercrime is the key to prevention. Our research examines spam email attachments and URLs to profile and predict the types of spam that represent serious potential sources of malware infection. We describe the nature and trends in spam borne malware from our cross-disciplinary analysis of data. We argue that because the focus of IT security on perimeter-protection is becoming increasingly ineffective, there is a need to refocus crime prevention activities on the modus operandi of offenders. This research used real world' data sets provided by the Australian Communication and Media Authority (ACMA) spam intelligence dataset (SID). We processed 13,450,555 million spam emails: of the 492,978 found with attachments 21.4% were malicious, and of the 6,230,274 that contained a URL, 22.3% of the web links were malicious.

Details: Canberra: Regulatory Institutions Network, Australian National University, 2014. 30p.

Source: Internet Resource: RegNet Research Paper No. 2014/44: Accessed February 18, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2467423##

Year: 2014

Country: International

Keywords: Computer Crimes

Shelf Number: 134637


Author: Bastick, Megan

Title: Integrating Gender into Internal Police Oversight

Summary: The guidance note is designed to assist those working at the strategic or management level in police services and in bodies that manage and oversee the police, as well as those supporting police reform and/or gender mainstreaming strategies, including OSCE staff. It is intended to serve as reference material for good policing practice, presenting strategies that might be adapted to the different contexts, needs and resources of different police services. This guidance note includes: - An overview of police oversight; - Discussion of why gender is important to police oversight; - Guidance as to how gender can be integrated into police oversight in a number of key areas; - A self-assessment tool for police services; and - A list of additional resources.

Details: Geneva: DCAF, OSCE, OSCE/ODIHR, 2014. 64p.

Source: Internet Resource: Accessed February 23, 2015 at: http://www.osce.org/odihr/118326?download=true

Year: 2014

Country: International

Keywords: Female Police Officers

Shelf Number: 134664


Author: CIRCA Group Europe Limited

Title: Reserve Police Forces. An investigation into roles, responsibilities, training and deployment; and Danish Police Servivce, best practice alternative

Summary: The purpose of the research was twofold: - To identify how many of the original EU-15 countries have a part-time reserve police force - To explore at greater depth a number of aspects of selected part-time reserve police forces. The methodology covered the following phases: a survey of the original EU-15 member states to identify which states had a reserve police force and a telephone survey of five countries - Canada, Finland, New South Wales (Australia), the Netherlands and Scotland. A 'reserve police force' in the context of this report is defined as a part-time police force who's members have other full-time occupations and whose duties are usually limited to 8 hours or 4 hours duty per week. They are known as 'Special Constables' in the UK, Australia and Canada. In the European Union of 15 members, 12 countries have no reserve police force. The following countries do have a reserve police force: - UK - England, Scotland, Wales and Northern Ireland - The Netherlands - Germany The other 12 of EU-15 Member States do not have a reserve police force. They are Austria, Belgium, Denmark, France, Finland, Italy, Ireland, Greece, Luxemburg, Portugal, Spain and Sweden.

Details: Dublin: CIRCA Group Europe, 2006. 113p.

Source: Internet Resource: Accessed February 23, 2015 at: http://www.gra.cc/Circa_Garda_Reserve_Report-4-1-.pdf

Year: 2006

Country: International

Keywords: Police Agencies

Shelf Number: 134669


Author: Kabeer, Naila

Title: Violence against Women as 'Relational' Vulnerability: Engendering the Sustainable Human Development Agenda

Summary: Violence against women can be conceptualized as a 'relational vulnerability', reflecting women's subordinate status within hierarchical gender relations and the dependencies associated with it. While such violence can take many different forms, this paper focuses on the interpersonal violence of 'normal' times, most often within the home at the hands of intimate partners. The paper provides estimates of incidence, which suggest that it varies considerably across countries and by social group. Factors that lead to violence against women operate at individual, relational, community and societal levels, and help to explain some of this variation. They also suggest the need for interventions operating at these different levels. In conclusion, the paper argues that not only is violence against women and girls a fundamental violation of their human rights, but also has serious consequences for their wellbeing and capabilities, and imposes significant economic costs. These comprise both the direct financial costs of dealing with the phenomenon and the indirect productivity costs that result from it. Ending violence against women is a key component in any sustainable human development agenda and a critical priority for the post-Millennium Development Goal (MDG) development framework.

Details: New York: United Nations Development Programme, Human Development Report Office, 2014. 46p.

Source: Internet Resource: Occasional Paper, 2014: Accessed February 26, 2015 at: http://hdr.undp.org/sites/default/files/kabeer_hdr14.pdf

Year: 2014

Country: International

Keywords: Abused Women

Shelf Number: 134682


Author: Magson, Jessica

Title: Drugs, Crime and decriminalisation: Assessing the impact of drug decriminalisation policies on the efficience and integrity of the criminal justice system

Summary: In recent decades a number of countries have moved away from a prohibitionist model of drug control towards policies that prioritise harm reduction and rehabilitation, with the goal of reducing demand and minimising the social and individual harms caused by drug abuse. In Portugal and the Czech Republic, low-threshold possession of any drug is a misdemeanour rather than a criminal offence, diverting users away from the criminal justice system and in the case of Portugal, providing support through newly created Dissuasion Commissions. The authorities in Uruguay have long decriminalised drug possession and are now on the cusp of regulating the supply and distribution of cannabis. Drug use and abuse continues in all three countries but demand has remained stable and notable successes have been observed. In the UK there are also growing calls from frontline practitioners and officials in the criminal justice system for a similar process of diversion and regulation, and we have now reached a stage where significant numbers in the police, courts, prisons and probation services are critical of both the effectiveness and intellectual coherence of the drug laws they are charged with upholding. Set in this context, the report considers how the criminal justice system may be affected by the removal of criminal penalties for possession-only offences, as well as a longer-term shift to supply-side regulation. Drawing on meetings with officials in Portugal, the Czech Republic and Uruguay it explains some of the lessons we can learn from their experiences, as the government works to support recovery and reduce demand in the UK. There are four main findings to this report that together reinforce arguments in support of the diversion of possession cases away from the criminal justice system; Enhanced efficiency and streamlined processes - All the different strands of the system (police, courts, prisons, and probation) should to differing extents make efficiency gains, see a gradual fall in their caseload and a longer-term trend of enhanced trust with the individuals they are working with. The police in particular are likely to see their work dealing with drug users simplified. These improvements depend on reform being enacted with a proper prioritization of diversion to health and social support, attention to practical detail and clear strategic vision. Feasibility - A diversionary system would in the first instance require limited statutory change and fairly minor adjustments to staff procedures, and the UK is in the strong position of being able to draw on and expand existing pilots and national schemes supporting rehabilitation. Opportunities for greater strategic and structural coherence - Effective rehabilitation in Portugal was enabled by a strategic shift towards multidisciplinary oversight, reflecting the complex needs of problematic users and the diverse impact of drug abuse on areas such as health, employment, education and housing. The diversion of possession offences is unlikely to have a significant impact on rehabilitation rates unless combined with a broader set of reforms that allow health and welfare agencies to better identify and provide support to problematic users. There is a case for adjusting oversight responsibilities in the UK in a similar way, to better align policy with responses on the ground. International alignment - There is a clear international shift towards a reassessment of approaches to drug control. We know that reform is best achieved incrementally. The UK is now in a strong position to reform its possession laws, better preparing the country for a possible future of supply-side regulation. Proactive engagement would allow the UK to feed in its well known rule of law expertise in helping to shape multilateral decisions that could have a huge bearing on the nation's own domestic landscape.

Details: Winston Churchill Memorial Trust, 2014. 52p.

Source: Internet Resource: Accessed March 2, 2015 at: http://www.wcmt.org.uk/sites/default/files/migrated-reports/1200_1.pdf

Year: 2014

Country: International

Keywords: Drug Control Policy

Shelf Number: 134737


Author: Savignac, Julie

Title: Guide on the Implementation of Evidence-Based Programs: What Do We Know So Far?

Summary: Through its National Crime Prevention Centre (NCPC), Public Safety Canada fosters the development and implementation of evidence-based crime prevention interventions in Canada. To this end, the NCPC supports the implementation and evaluation of community-based initiatives to identify what works, how it works, and what it costs. The question of "how" has often been overshadowed in favour of the demonstration of program impacts. Yet the quality of the implementation of prevention programs is a key factor in their success. For example, an effective implementation of a promising program has a greater chance of producing positive results than a less rigorous implementation of a model program. Program results that demonstrate little effectiveness may not be caused by a lack of sound treatment and intervention, but by weaknesses in the program's implementation. Practitioners and researchers in crime prevention increasingly face a common challenge: the successful, effective implementation of evidence-based practices. The emergence of this interest in implementation-related issues coincides with the realization that merely selecting an effective program is not enough and that, even with the development of best practice guides, various experiences in the field have shown that effective programs have not delivered the expected results. An effective program, combined with a high-quality implementation, increases the likelihood of achieving positive results among the clients served. Emphasis should be placed not only on program selection, but also on the identification of effective conditions for implementation. Presently, the literature confirms that some aspects of implementation are generalizable, particularly with regard to the stages and key components. Whether it is a crime prevention program or a program in a related field, for example in the education or health and social services sector, implementation is based on the same general core principles. However, certain conditions in the implementation of crime prevention programs suggest that there may be certain elements, even particular challenges and facilitative strategies that are specific to this sector. The fact that these programs target a population with multiple risks, sometimes even clients with a criminal record; the identification of young people with the right profile to participate in the program and their recruitment; the use of retention strategies to maintain participation in the program; the sometimes limited involvement of families; and the dual role of certain partners are just a few instances illustrating that the implementation of prevention programs requires strategies adapted to these conditions. An approach including empirical studies specific to the implementation of crime prevention programs must be pursued in order to shed light on these questions. This guide on the implementation of evidence-based programs outlines current knowledge on key elements, proposes implementation planning tools and provides examples from various case studies.

Details: Ottawa: Public Safety Canada, National Crime Prevention Centre, 2014. 59p.

Source: Internet Resource: Research Report: 2014-01: Accessed March 4, 2015 at: http://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/gd-mplmnttn-vdnc-prgrms/gd-mplmnttn-vdnc-prgrms-en.pdf

Year: 2014

Country: International

Keywords: Crime Prevention Programs

Shelf Number: 134739


Author: Ahmad, Yusuf

Title: Reducing Violence and Improving the Rule of Law: Organized Crime, Marginalized Communities, and the Political Machine

Summary: This literature review seeks to highlight specific policy interventions against risk factors that predispose communities towards gangs, organized crime, and electoral violence; and interventions that attack each of those types of violence directly. This is by no means a comprehensive report, given the extensive scholarship that has been dedicated to these three issues. It is, however, a starting point from which we can begin to explore the success or failure of policy interventions, and the contexts in which they have been found to work or fail. We hope to add to this review before and following the workshop, with the help of workshop participants.

Details: Washington, DC: World Justice Project, Carnegie Endowment for International Peace, 2014. 77p.

Source: Internet Resource: Accessed March 4, 2015 at: http://carnegieendowment.org/files/Violence_lit_review.pdf

Year: 2014

Country: International

Keywords: Gang Related Violence

Shelf Number: 134741


Author: International Centre for the Prevention of Crime (ICPC)

Title: Human Trafficking, Other Forms of Exploitation and Prevention Policies

Summary: This report explores strategies and initiatives related to the prevention of human trafficking that have been implemented in various developed countries. It covers the following themes: strategies aimed at combating human trafficking; enumeration; dissemination and coordination between the various levels to prevent and combat human trafficking; data collection systems; position in relation to application and evaluation.

Details: Montreal: International Centre for the Prevention of Crime, 2014. 138p.

Source: Internet Resource: Accessed March 4, 2015 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/2014/HT_report_English_FINAL_20-10-14_Revised.pdf

Year: 2014

Country: International

Keywords: Human Trafficking

Shelf Number: 134744


Author: Hadfield, Phil

Title: Night-Time Economy Management: International Research and Practice. A Review for the City of Sydney, September 2011

Summary: Details the most effective approaches in night time economies according to the international literature. This includes areas such as public health, responding to heavy episodic drinking, public realm profiling, licensing approaches, design and service interventions and developing sustainable and service based policies. - Young adults are both core consumers of nightlife and the most likely to engage in heavy sessional drinking to an extent which places themselves and others at risk of harm. English street surveys suggest that NTE participants drink more than the national average and at levels above average for their age group. Drinking to intoxication is a major mechanism through which alcohol causes harm. In terms of NTE management, it is the large numbers of people who are brought together and provided with opportunities - and sometimes inducements - to drink to intoxication which generates the main risks of crime, incivility, injury, and ill-health. - Drinking patterns can vary between nightlife areas within the same city, as well as by region. This may include the extent of pre-loading prior to arrival. One explanation for this feature is the variability of social scenes within the NTE, which is linked to different attractions, audiences (especially by age) and substance use choices. - In the UK research literature, those visitors surveyed later in the evening had consumed more alcohol, as had those with earlier onset times for their drinking. Thus, increasing the availability of alcohol through extended licensing hours for clubs and bars appears to correlate with increasing levels of alcohol consumption and therefore drunkenness and related harms. This factor may be one issue for the City to consider in its decision-making. - Drinking at home in preparation for a night out (pre-loading) has been associated with higher levels of intoxication, and greater risk of crime and victimisation when out 'on the town', as well as greater control and duty of care burdens for licensed premises, the police, and emergency health-care services. In several research studies conducted across North West England around a half, or more, of all respondents reported having consumed alcohol prior to entering the nightlife environment (preloading; e.g. at home, a friend's house, or in a hotel room). Preloading was significantly more common among younger respondents. One policy response to pre-loading may be to introduce levers reducing the price differential between alcohol purchased in the bottle shop, bar/hotel, and nightclub sectors. - Levels of drunkenness found within local NTE social scenes have a direct influence upon criminal justice and public health outcomes. As an illustration of this: "premises that produce the most assault-related injuries are also those that produce the greatest proportion of severely intoxicated patrons, suggesting that underlying premises-specific risks may contribute to both forms of alcohol-related harm" (Moore et al., 2011: 363). This has important implications for local enforcement, prevention and research activity as, aggregated at the premises level, venues that accommodate the highest proportions of severely intoxicated customers can be identified using police data and surveyor ratings of intoxication. - In relation to poly-drug use, it is difficult to draw generalisable lessons from what remains a small literature in terms of policy relevance. This is because the range of substances being consumed and mixed by nightlife patrons is now extensive and varies considerably between social scenes at the city and regional level, as well as internationally. For example, within one city, substance choices are likely to vary between the users of bars and nightclubs, and between different music scenes, including across different events hosted within the same licensed premises. This suggests the need to improve our understanding of the subtle patterns of drug taking in order to inform policy and shape education and harm reduction strategies. Given the diversity and fragmentation of drug use trends the central message of the evidence points to the need for in-depth local level research in order to identify use patterns and associated harms for which appropriate local level responses might then be devised. - Some of the most consistent evidence in poly-drug studies surrounds cocaine use and its mixing with alcohol. This has been linked to greater levels of social and physiological harm than the use of either substance individually; including propensities to violence. This is a significant issue in some areas due to the high prevalance of cocaine use in licensed premises. - Policy responses to poly-drug use face conflicting concerns regarding effective law enforcement in relation to the possession and use of illegal substances and the need to communicate harm miminisation messages to nightlife audiences and venue operators without appearing to condone illegal activity. One reason for the relative inactivity of city authorities around the world in responding to illegal drug use in comparison to alcohol is that there has been comparatively little evidence of a link with general public disorder in nightlife, nor is there any legitimate source of supply toward which action to improve standards might be applied. This can mean that recreational drug users face a vacuum in service provision precisely because they are not seen as a threat to wider society. - Evidence suggests that enforcement activity to prevent drunkenness and sales to intoxicated individuals can be effective, especially when targeted at 'high risk' venues. As Stockwell et al., (1997:1) argue, there are important practical advantages in 'sharpening the focus' of alcohol policy away from aggregate levels of consumption towards: "(i) the ability to distinguish between low risk and harmful consumption of alcohol; (ii) the ability to predict which drinkers are most likely to experience harmful consequences of drinking; (iii) the acceptability of policy objectives to government and industry; and (iv) the acceptability of prevention strategies to the general public."

Details: Leeds: www.philhadfield.co.uk / City of Sydney: 2011. 271p.

Source: Internet Resource: Accessed March 9, 2015 at: http://www.cityofsydney.nsw.gov.au/__data/assets/pdf_file/0016/131740/InternationalEvidenceLiteratureReview.pdf

Year: 2011

Country: International

Keywords: Alcohol Law Enforcement

Shelf Number: 134771


Author: Mailath, George J.

Title: When and How the Punishment Must Fit the Crime

Summary: In repeated normal-form (simultaneous-move) games, simple penal codes (Abreu, 1986, 1988) permit an elegant characterization of the set of subgame-perfect outcomes. We show that the logic of simple penal codes fails in repeated extensive-form games. By means of examples, we identify two types of settings in which a subgame-perfect outcome may be supported only by a profile with the property that the continuation play after a deviation is tailored not only to the identity of the deviator, but also to the nature of the deviation.

Details: Munich: Center for Economic Studies and Ifo Institute (CESifo), 2015. 24p.

Source: Internet Resource: CESifo Working Paper No. 5225: Accessed March 11, 2015 at: http://www.cesifo-group.de/ifoHome/publications/working-papers/CESifoWP/CESifoWPdetails?wp_id=19159443

Year: 2015

Country: International

Keywords: Penal Codes

Shelf Number: 134902


Author: Hannah, Julie

Title: Human rights, drug control and the UN special procedures: Preventing arbitrary detention through the promotion of human rights in drug control

Summary: The UN drug control bodies rarely mention human rights, while the UN human rights mechanisms rarely mention drug control. In effect, the two speak different languages and hold different priorities. Research underway at the International Centre on Human Rights and Drug Policy reveals that the historical treatment of drug control issues within the special procedures system is insufficient to have an impact on current drug control policy and practice. Reporting by mandate holders on drug control has been scattered and rarely collaborative, despite the numerous intersections drug control issues present across the mandates. As the special procedures develop their programme of work for the coming year, they have an important opportunity to consider ways in which coordination across the mandates can enhance the promotion and protection of human rights while countering the world drug problem - both to have an impact on policy-making and to close the normative gaps between the two legal regimes. Ways in which the special procedures can organise their work to such ends should include the following: - Contribute to the development of a joint special procedures statement for submission to the UN General Assembly Special Session on Drugs in 2016. A UN General Assembly Special Session on Drugs scheduled for mid-2016 is an important opportunity for the special procedures to have an impact on the drug policy debate, and ensure that human rights is rooted firmly at the centre of reforms moving forward. - Advance the normative development of human rights and drug control through collaborative and individual thematic reporting on the promotion and protection of human rights while countering the world drug problem. The normative gaps highlighted in this research present numerous opportunities for mandate holders to develop lines of inquiry within their individual work and through collaborative reporting. This can include: an analysis of normative gaps; suggestions for standard setting measures that target stakeholders responding to the world drug problem, and; promoting the issue as a thematic human rights concern within the broader UN human rights mechanisms.

Details: Colchester, UK: International Centre on Human Rights and Drug Policy, University of Essex, 2015. 23p.

Source: Internet Resource: https://dl.dropboxusercontent.com/u/64663568/library/wgad-final.pdf

Year: 2015

Country: International

Keywords: Drug Control

Shelf Number: 134903


Author: World Health Organization

Title: Improving efforts to prevent children's exposure to violence: a handbook for defining programme theory and planning for evaluation in the new evidence-based culture

Summary: As part of a global movement to direct greater attention and resources to child protection, programmes aimed at reducing children's exposure to violence are being implemented with increasing frequency across the world. These programmes are diverse and range from raising public awareness of the issues to widening and strengthening government policies and protective structures, improving children's and families' access to medical, therapeutic and legal support, and increasing children's and parents' protective skills. Over the last several decades a substantial body of research has accumulated, providing much needed information about the experience of violence in childhood. We now know that child abuse, neglect, peer violence, sexual victimization and exposure to domestic and community violence are suffered by very large numbers of children. We understand much more about the serious negative consequences of violence exposure on children's physical and mental health, effects that can carry through from generation to generation. In addition, we have come to appreciate that children's health and safety concerns often cluster together, and that children and families with the fewest resources often suffer from disproportionate levels of exposure to violence. Evaluation research has also helped us to identify which prevention and intervention strategies work well and make the biggest difference to children's well-being. What is needed now is a global movement to build on this knowledge in order to channel programme efforts in increasingly effective ways. Given the seriousness of the problem of children's exposure to violence and the scarcity of resources with which to tackle it, our focus should be to ensure that: - new programmes and initiatives are grounded in research knowledge; - programmes are routinely evaluated so that we continue to learn more about what works and what does not. It is only by sharing, using and growing the evidence base that we will hasten our positive impact on the lives and well-being of children worldwide. This handbook is intended to help implementing agencies (e.g. nongovernmental organizations (NGOs), development/foreign aid agencies, community-based organizations, not-for-profit agencies) make better use of existing research and plan for evaluation when designing and implementing child violence prevention programmes, and also to convey these intentions to potential funding organizations.

Details: Geneva, SWIT: WHO, 2014. 48p.

Source: Internet Resource: Accessed March 12, 2015 at: http://apps.who.int/iris/bitstream/10665/144308/1/9789241507882_eng.pdf?ua=1

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134911


Author: International Institute for Environment and Development

Title: Conservation, crime and communities: Case studies of efforts to engage local communities in tackling illegal wildlife trade

Summary: Wildlife crime is at the top of the international conservation agenda. Current strategies for addressing it focus on law enforcement, reducing consumer demand and engaging local communities in conservation. To date considerably more attention has been paid to the first two strategies than to the third. This volume of case studies explores a range of different models of community engagement - from awareness - raising to community-based rapid response teams - and a wider range of conservation incentives - from land leases, to sustainable use schemes, to reinvigorated cultural institutions and social status. The case studies highlight that while community engagement is not a panacea for tackling wildlife crime - and indeed there are examples where it has proved to be a real challenge - it can, under the right circumstances, be highly effective. We need to learn from these examples. In the long run, the survival of some of the world's most iconic wildlife species lies in the hands of the communities who live alongside them.

Details: London: IIED, 2015. 52p.

Source: Internet Resource: Accessed March 12, 2015 at: http://pubs.iied.org/14648IIED.html

Year: 2015

Country: International

Keywords: Community-Based Approaches

Shelf Number: 134915


Author: Martin, Catherine

Title: Casualities of War: How the war on drugs is harming the world's poorest

Summary: Since the mid-twentieth century, global drug policy has been dominated by strict prohibition, which tries to force people to stop possessing, using and producing drugs by making them illegal. This approach, which has come to be known as the 'War on Drugs', has not only failed to achieve its goals - it is fuelling poverty, undermining health, and failing some of the poorest and most marginalised communities worldwide. Just like tax dodging, climate change and unfair trade rules, current global drug policies undermine global efforts to tackle poverty and inequality. Yet, unlike with these issues, the development sector has remained largely silent when it comes to drug policy. If, as international NGOs, we are serious about dealing with the root causes of poverty and not just the symptoms, we cannot afford to ignore drug policy. It's time we recognised the threat that unreformed global drug policy poses to our attempts to tackle poverty worldwide. The sector can no longer be absent from debates on drug policy reform. As governments prepare for the post-2015 Sustainable Development Goals and the UN General Assembly's Special Session (UNGASS) on Drugs in 2016, we have a unique opportunity to ensure the rights of the poorest and most marginalised are at the heart of the negotiations.

Details: London: Health Poverty Action, 2015. 28p.

Source: Internet Resource: Accessed March 12, 2015 at: http://www.healthpovertyaction.org/wp-content/uploads/downloads/2015/02/Casualties-of-war-report-web.pdf

Year: 2015

Country: International

Keywords: Drug Policy (International)

Shelf Number: 134916


Author: Dugato, Marco

Title: Maritime Piracy Worldwide

Summary: The phenomenon of maritime piracy dates back to the beginning of seafaring. Since the 1980s, maritime piracy has re-emerged as an international problem because of a significant rise in the recorded attacks. The security of maritime routes is a matter of concern for national governments, ship owners and trade companies whose vessels face the risk of being robbed of their cargo or hijacked for a ransom. Maritime piracy is a complex phenomenon that, according to the definition used, comprises different criminal behaviours (e.g., theft, robbery, kidnapping), modus operandi (e.g., massive armed attacks, insiders, use of skiffs and mother ships) and targets (e.g., the goods carried on the ship, the belongings of the crew, the ship itself). These features may change over time and over space. Looking at the evolution and peculiarities of this phenomenon in different areas can help to identify regularities and implement more effective countermeasures. In recent years, Transcrime has been active in promoting the idea that actual reductions of complex crime phenomena can be reached through specific prevention strategies. This approach relies on accurate analyses of the available data to identify regular patterns and risk factors. This study summarises some of the findings that emerged from the research Transcrime conducted on maritime piracy, using a comparative approach.

Details: Trento: Transcrime - Universita degli Studi di Trento, 2015. 15p.

Source: Internet Resource: Transcrime Research in Brief no. 1: Accessed march 16, 2015 at: http://www.transcrime.it/wp-content/uploads/2015/02/maritime-piracy.pdf

Year: 2015

Country: International

Keywords: Cargo Theft

Shelf Number: 134932


Author: United Nations General Assembly. Human Rights Council

Title: Report of the Special Rapporteur on torture and other cruel, inhuman or degrading treatment of punishment

Summary: In the present report, the Special Rapporteur focuses on children deprived of their liberty from the perspective of the prohibition of torture and other cruel, inhuman or degrading treatment or punishment. In the report, the Special Rapporteur explores the international legal framework and standards protecting children deprived of their liberty from being subjected to torture or other ill-treatment and from experiencing developmentally harmful and torturous conditions of confinement. He also examines specific statutes and standards applying to prevent torture and ill-treatment of children deprived of liberty, and shortcomings in the practical implementation of legal standards.

Details: New York: UN General Assembly, 2015. 21p.

Source: Internet Resource: Accessed March 18, 2015 at: http://www.ohchr.org/EN/Issues/Torture/SRTorture/Pages/SRTortureIndex.aspx

Year: 2015

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 134946


Author: Lawson, Sam

Title: Stolen Goods: The EU's Complicity in Illegal Tropical Deforestation

Summary: Previous studies commissioned by the EU have shown that the EU has been leading the world in imports of 'embodied deforestation' in the form of agricultural and timber products. This study goes a step further, by showing that the EU is also one of the largest importers of products resulting from illegal deforestation. The study estimates that in 2012, the EU imported EUR 6 billion of soy, beef, leather and palm oil which were grown or reared on land illegally cleared of forests in the tropics - almost a quarter of the total world trade. The Netherlands, the UK, Germany, Italy and France are among the largest consumers of these illegally sourced deforestation commodities, being collectively responsible for two-thirds of EU purchasing by value and three-quarters in terms of the areas of forest destroyed.

Details: Moreton in March, UK: FERN, 2015. 28p.

Source: Internet Resource: http://www.fern.org/sites/fern.org/files/Stolen%20Goods_EN.pdf

Year: 2015

Country: International

Keywords: Forests

Shelf Number: 134949


Author: Boukli, Paraskevi

Title: Imaginary penalities: reconsidering anti-trafficking discourses and technologies

Summary: The antithesis between a criminalisation and a human rights approach in the context of trafficking in women has been considered a highly contested issue. On the one hand, it is argued that a criminalisation approach would be better, because security measures will be fortified, the number of convictions will inevitably increase, and states' interests will be safeguarded against security threats. On the other hand, it is maintained that a human rights approach would bring more effective results, as this will mobilise a more 'holistic' approach, bringing together prevention, prosecution, protection of victims and partnerships in delivering gendered victim services. This antithesis, discursively constructed at an international level, cuts across a decentralised reliance on the national competent authorities. To investigate this powerful discursive domain, I set these approaches within the larger framework of a tripartite 'anti-trafficking promise' that aims to eliminate trafficking through criminalisation, security and human rights. I ask how clearly and distinctively each term has been articulated, by the official anti-trafficking actors (police and service providers), and what the nature of their interaction is within the larger whole. In grappling with these questions, I undertake both empirical and theoretical enquiry. The empirical part is based on research I conducted at the Greek anti-trafficking mechanisms in 2008-2009. The theoretical discussion draws, in particular, on the concept of 'imaginary penalties' introduced in the criminological work of Pat Carlen. I consider what it might mean to bring this concept to bear in the context of anti-trafficking. In my analysis, criminalisation is linked to a 'toughness' rhetoric, an ever-encroaching and totalising demand for criminal governance. Security is shown to express the contemporary grammar of criminalisation, crafting a global language of risks and threats as core elements of the post 9/11 ideological conditions in the area of crime control. Finally, human rights are figured as tempering or correcting the criminal law for the sake of victims' protection. Together, these three elements constitute a promise that, once they are balanced and stabilised, trafficking can be abolished. Yet it is not only trafficking that is at stake. My study shows how anti-trafficking discursive formations also produce particular forms of subjectivity and conceptions of class, sex, ethnicity and race. The upshot is to bring into focus the imaginary penalities at the centre of anti-trafficking discourses and technologies, while also suggesting the possibilities for contesting and transforming their subjects and fields of operation. The thesis opens up the conceptual map of future critical engagement with the relation of structural inequalities and imaginary penalities.

Details: London: London School of Economics, 2012. 390p.

Source: Internet Resource: Dissertation: Accessed March 18, 2015 at: http://etheses.lse.ac.uk/435/

Year: 2012

Country: International

Keywords: Anti-Trafficking

Shelf Number: 134950


Author: Transform Drug Policy Foundation

Title: Ending the War on Drugs: How to win the global drug policy debate

Summary: This is a guide to making the case for drug policy and law reform from a position of confidence and authority, with a particular focus on the issue of legal regulation of currently illegal drug markets - an issue that is now core to the drugs debate. It is for every policymaker, media commentator, and campaigner who not only recognises that the 'war on drugs' is a counterproductive failure that is creating catastrophic unintended consequences, but who also wants to convince others to back reform. It will equip you with the constructive arguments, different approaches and nuanced messaging needed to address the concerns and interests of diverse audiences. This will enable you to not just win the argument, but make the new allies needed to turn the current unparalleled momentum for reform into concrete policy change nationally and internationally.

Details: London: Transform Drug Policy Foundation, 2015. 176p.

Source: Internet Resource: Accessed March 18, 2015 at: http://www.tdpf.org.uk/resources/publications/ending-war-drugs-how-win-global-drug-policy-debate

Year: 2015

Country: International

Keywords: Drug Enforcement

Shelf Number: 134951


Author: Financial Industry Regulatory Authority

Title: Report on Cybersecurity Practices

Summary: Like many organizations in the financial services and other sectors, broker-dealers (firms) are the target of cyberattacks. The frequency and sophistication of these attacks is increasing and individual broker-dealers, and the industry as a whole, must make responding to these threats a high priority. This report is intended to assist firms in that effort. Based on FINRA's 2014 targeted examination of firms and other related initiatives, the report presents FINRA's latest work in this critical area. Given the rapidly evolving nature and pervasiveness of cyberattacks, it is unlikely to be our last. A variety of factors are driving firms' exposure to cybersecurity threats. The interplay between advances in technology, changes in firms' business models, and changes in how firms and their customers use technology create vulnerabilities in firms' information technology systems. For example, firms' Web-based activities can create opportunities for attackers to disrupt or gain access to firm and customer information. Similarly, employees and customers are using mobile devices to access information at broker-dealers that create a variety of new avenues for attack. The landscape of threat actors includes cybercriminals whose objective may be to steal money or information for commercial gain, nation states that may acquire information to advance national objectives, and hacktivists whose objectives may be to disrupt and embarrass an entity. Attackers, and the tools available to them, are increasingly sophisticated. Insiders, too, can pose significant threats. This report presents an approach to cybersecurity grounded in risk management to address these threats. It identifies principles and effective practices for firms to consider, while recognizing that there is no one-size-fits-all approach to cybersecurity. Key points in the report include: 00 A sound governance framework with strong leadership is essential. Numerous firms made the point that board- and senior-level engagement on cybersecurity issues is critical to the success of firms' cybersecurity programs. 00 Risk assessments serve as foundational tools for firms to understand the cybersecurity risks they face acrosacross the range of the firm's activities and assets-no matter the firm's size or business model. 00 Technical controls, a central component in a firm's cybersecurity program, are highly contingent on firms' individual situations. Because the number of potential control measures is large and situation dependent, FINRA discusses only a few representative controls here. Nonetheless, at a more general level, a defense-in-depth strategy can provide an effective approach to conceptualize control implementation. 00 Firms should develop, implement and test incident response plans. Key elements of such plans include containment and mitigation, eradication and recovery, investigation, notification and making customers whole. 00 Broker-dealers typically use vendors for services that provide the vendor with access to sensitive firm or client information or access to firm systems. Firms should manage cybersecurity risk exposures that arise from these relationships by exercising strong due diligence across the lifecycle of their vendor relationships. 00 A well-trained staff is an important defense against cyberattacks. Even well-intentioned staff can become inadvertent vectors for successful cyberattacks through, for example, the unintentional downloading of malware. Effective training helps reduce the likelihood that such attacks will be successful. 00 Firms should take advantage of intelligence-sharing opportunities to protect themselves from cyber threats. FINRA believes there are significant opportunities for broker-dealers to engage in collaborative self defense through such sharing.

Details: Washington, DC: FINRA, 2015. 46p.

Source: Internet Resource: Accessed March 18, 2015 at: https://www.finra.org/sites/default/files/p602363%20Report%20on%20Cybersecurity%20Practices_0.pdf

Year: 2015

Country: International

Keywords: Computer Security

Shelf Number: 134961


Author: Cigar, Norman

Title: Tribal Militias: An effective tool to counter Al-Qaida and its affiliates?

Summary: Despite over a decade of open war, dealing with Al-Qaida and its affiliates in the Middle East is likely to remain a concern for the foreseeable future and will pose a challenge requiring the use of any tool that is likely to be effective in meeting the threat. Most of the local societies in which Al-Qaida has operated in the Middle East and Africa after September 11, 2001, have a predominantly tribal character or at least have a strong tribal component (Iraq, Yemen, Libya, Syria, Somalia, Mali, and Sinai). Developing effective tools to counter Al-Qaida's continuing presence in that social environment, therefore, is a priority and requires understanding Al-Qaida's critical vulnerabilities when it operates in those societies and developing the means to counter Al-Qaida's efforts. This monograph addresses the role of tribal militias in the context of the fight against Al-Qaida. The intent is to enrich policy analysis and clarify options for future operations by focusing on past experience in order to identify the positive and negative aspects related to the use of such militias. The focus in this monograph is on Iraq and Yemen. However, many of the lessons learned may be applied more broadly. The thesis is that the capabilities which tribally-based militias provide may be one of the most efficient, cost-effective tools against Al-Qaida. In some cases, such militias can act as a force multiplier for U.S. Landpower forces, whether deployed on the ground in significant numbers, or, in other cases, if such militias can reduce the need for a U.S. commitment on the ground in environments that might present unfavorable conditions for a significant U.S. Landpower footprint. At the same time, given the complexity of the local political environment, tribal militias are no panacea, but can be a two-edged sword. Like any weapon, the use of tribal militias has to be understood and wielded with caution and skill in order to avoid unintended consequences. This discussion includes two models for the tribal militias based on the nature of their patron. In Model 1, the patron of a militia is an outside entity; in Model 2, the national government is the patron (although an outside entity may provide ancillary support). The first case study deals with a Model 1 situation, where a foreign patron - the United States - acted in that role in Iraq beginning in late-2006 and lasting through the hand-over to Iraqi authorities during the period from December 2008 to April 2009. The second case study deals with two ongoing Model 2 situations, again with Iraq, but taking place after the national government's assumption of responsibility for the tribal militia in 2009. This case study is especially useful for comparative purposes with the first case study. The third case study deals with Yemen, where the local government has acted as the militia patron since 2012.

Details: Carlisle Barracks, PA: United States Army War College Press, 2015. 116p.

Source: Internet Resource: Accessed March 19, 2015 at: http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1230.pdf

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 134967


Author: Alpert, Geoffrey P.

Title: Measuring the impact of organisational culture and climate on police officers' decisions and behaviour

Summary: The behaviour of police officers, particularly those at the operational frontline, attracts a high level of public scrutiny with frequent calls for increased accountability. The results of negative behaviour, or perceived faulty or biased decision-making, can affect the reputation of the whole organization and leave an enduring impression upon the public. Understanding the influences on police officer decision-making and behaviour, particularly those that an organization can change or control, can lead to optimal behaviour, improved police effectiveness and enhanced public confidence. This Working Paper looks at the police as an organization, and the influences on positive and negative officer decision making and behaviour, specifically detailing concepts of organizational culture and climate. Approaches to the measurement of these are outlined and the discussion concludes by proposing a mixed-method approach to understanding police culture to improve police behaviour. The behaviours of police vehicle accidents and the use of force are presented as examples to illustrate the approach

Details: Mt Gravatt, QLD. : ARC Centre of Excellence in Policing and Security, 2012. 10p.

Source: Internet Resource: Working Paper, Issue 1: Accessed March 19, 2015 at: http://www.ceps.edu.au/CMS/Uploads/file/GAlpert_JRojek_LPorter_issue1.pdf

Year: 2012

Country: International

Keywords: Police Accountability

Shelf Number: 134974


Author: Grimshaw, Roger

Title: Institutional care and poverty: evidence and policy review

Summary: Five institutional care settings were covered: prisons; immigration detention centres; mental health placements including psychiatric secure hospitals and centres; placements for children being looked after including homes, residential schools and units for children; and placements for people with disabilities. In an increasingly globalised world the task of collating international evidence becomes more important and the review focused on more than 500 studies drawn from North America, Europe, and Australasia, in addition to the UK.

Details: London: Centre for Crime and Justice Studies, 2014. 71p.

Source: Internet Resource: Accessed March 19, 2015 at: http://www.crimeandjustice.org.uk/sites/crimeandjustice.org.uk/files/Institutional%20Care%20and%20Poverty%20Report%20August%202014.pdf

Year: 2014

Country: International

Keywords: Immigrant Detention

Shelf Number: 134982


Author: Redress

Title: Redress for Rape. Using international jurisprudence on rape as a form of torture or other ill-treatment

Summary: Rape is an egregious crime with devastating consequences for victims. However, until relatively recently it has not been the subject of serious attention within the international human rights law framework. Rape - at both the domestic and international level - was traditionally largely invisible, or trivialised as a "private matter", an unfortunate incident, the result of a woman's careless conduct, or the inevitable result of war. As such, it was not cast as the responsibility of states, was rarely addressed in international human rights discourse, and was not to be found explicitly within the human rights violations prohibited by the core international conventions adopted during the course of the twentieth century. The past two decades have seen a significant normative change in this area. It is now clearly established at the international level that rape is a crime of the highest order, that states do have the responsibility to prevent and respond to it, whoever commits it, and that survivors of rape are entitled to the same level of protection and response as any other victim of violence. This normative change has started to have an impact in achieving accountability in some high profile individual cases, has increased scrutiny by international human rights bodies on the practices of states, and may have helped to improve responses of authorities in some jurisdictions. However the reality is that rape continues on a massive scale, and the majority of victims of rape around the world - both women and men - face almost insurmountable barriers to justice. This report hopes to provide a useful resource for those seeking to build upon these developments, helping to translate them into change for individuals and communities. It does so by focusing on one strategy which has been fruitfully used both to bring rape within the international legal framework, and to seek justice in individual cases: making the link between rape and torture and other prohibited ill-treatment.

Details: London: Redress, 2013. 124p.

Source: Internet Resource: Accessed March 23, 2015 at: http://www.redress.org/downloads/publications/FINAL%20Rape%20as%20Torture%20(1).pdf

Year: 2013

Country: International

Keywords: Rape

Shelf Number: 135000


Author: Child Rights International Network

Title: Inhuman Sentencing: Life Imprisonment of Children Around the World

Summary: In 2010 CRIN, with other partners, launched a campaign for the prohibition of inhuman sentencing of children - defined to include sentences of death, life imprisonment and corporal punishment. Frustrated by the narrow focus on life imprisonment without parole within the children's rights community, CRIN published a report on life imprisonment in the Commonwealth in 2012, highlighting the prevalence of life imprisonment throughout the Commonwealth States and the different forms that life sentences could take. This report was followed up in 2013 with a report on life sentences for children in the European Union. Life imprisonment sentences cover a diverse range of practices, from the most severe form of life imprisonment without parole, in which a person is sentenced to die in prison so long as their sentence stands, to more indeterminate sentences in which at the time of sentencing it is not clear how long the sentenced person will spend in prison. What all of these sentences have in common, however, is that at the time the sentence is passed, a person is liable to be detained for the rest of his or her natural life. International human rights standards universally condemn life imprisonment without parole for children, and now the United States is the only State which continues to sentence children to this form of extreme sentencing. This focus on the worst forms of the sentence, however, has disguised the practice of less severe or overt forms of life imprisonment. The United Nations has begun to look at life imprisonment of children more generally and in November 2012, the General Assembly urged States to consider repealing all forms of life imprisonment for children. The Human Rights Council, meanwhile, has called on States twice to prohibit life imprisonment of children in law and practice. Nonetheless, 73 States retain life imprisonment as a penalty for offences committed while under the age of 18 and a further 49 permit sentences of 15 years or longer and 90 for 10 years or longer. Life imprisonment and lengthy prison sentences for child offenders are not the preserve of a diminishing few, they can be found in the criminal laws of the majority of States. CRIN is concerned that States are handing out lengthy sentences to children, yet international condemnation is often limited to life imprisonment without parole and the death penalty. It is essential - indeed long overdue - to widen the focus and challenge any sentence which, at the time it is passed, a child is liable to be detained for the rest of his or her natural life. It is also time to look at laws permitting the lengthy detention of children, which fall short of the standards set by the Convention on the Rights of the Child. CRIN, with other commentators, believes that the only justification for the detention of a child should be that the child has been assessed as posing a serious risk to public safety. Courts should only be able to authorise a short maximum period of detention after which the presumption of release from detention would place the onus on the State to prove that considerations of public safety justify another short period of detention. The same principles should apply to pre-trial detention. This report serves to highlight the prevalence and the plurality of laws permitting life imprisonment for children, laws that potentially condemn children to die in prison, and hopes to lead to reviews of the sentencing of children to ensure they are fully compliant with the CRC and other instruments. CRIN believes that life imprisonment, of any type, does not have a place in juvenile justice.

Details: London: Child Rights International Network, 2015. 48p.

Source: Internet Resource: Accessed March 26, 2015 at: https://www.crin.org/sites/default/files/life_imprisonment_report_final.pdf

Year: 2015

Country: International

Keywords: Juvenile Detention

Shelf Number: 135059


Author: United Nations Institute for Training and Research

Title: UNOSAT Global Report on maritime piracy: A geospatial analysis 1995-2013

Summary: This global report on maritime piracy has identified several important trends related to maritime security. Based on a refined and detailed analysis of primarily data from International Maritime Organization (IMO) Global Integrated Shipping Information System (GISIS) "Piracy and Armed Robbery" module UNITAR has been able to explore how trends in geospatial patterns and severity of reported piracy incidents are developing, from 1995 to 2013. Some detailed geospatial analyses focus on the period 2006-2013 due to improved records for geo-locating incidents. Our analysis includes the added cost of piracy for the maritime industry at a global level and how these are linked to anti-piracy initiatives. Furthermore, costs related to paid ransoms and effects on the local economy in piracy land-bases are explored. There are two areas where significant trends in piracy activities are observed: the Western Indian Ocean, including the Gulf of Aden, and the Gulf of Guinea. In other areas, notably eastern Indian Ocean, including the Malacca Strait, and in South America, no major trends are observed. While activities in South America are relatively minor, piracy in the Malacca Strait continues to be a major disruptior for safe routes in the eastern Indian Ocean.

Details: Geneva: United Nations Institute for Training and Research, 2014. 40p.

Source: Internet Resource: Accessed April 1, 2015 at: http://unosat.web.cern.ch/unosat/unitar/publications/UNITAR_UNOSAT_Piracy_1995-2013.pdf

Year: 2014

Country: International

Keywords: Geospatial Analysis

Shelf Number: 135104


Author: Villettaz, Patrice

Title: The Effects on Re-offending of Custodial vs. Non-custodial Sanctions: An Updated Systematic Review of the State of Knowledge

Summary: As part of a broad initiative of systematic reviews of experimental or quasi-experimental evaluations of interventions in the field of crime prevention and the treatment of offenders, our work consisted in searching through all available databases for evidence concerning the effects of custodial and non-custodial sanctions on re-offending. For this purpose, we examined, in 2006, more than 3,000 abstracts, and identified more than 300 possibly eligible studies. For the update, nearly 100 additional potentially eligible studies published or completed between 2003 and 2013 have been identified. For the update, 10 matched-pair design studies and one RCT have been abstracted. One study (Bergman 1976) that, in 2006, had been classified as an RCT turned out, after closer examination, to have been quasi-experimental with respect to the comparison of the custodial and the non-custodial groups. As a result, it has been "downgraded" and included among the quasi-experimental studies in this update. The findings of the update confirm one of the major results of the first report, namely that the rate of re-offending after a non-custodial sanction is lower than after a custodial sanction in most comparisons. However, this is true mostly for quasi-experimental studies using weaker designs, whereas experimental evaluations and natural experiments yield results that are less favourable to non-custodial sanctions. It can be concluded that results in favour of non-custodial sanctions in the majority of quasi-experimental studies may reflect insufficient control of pre-intervention differences between prisoners and those serving "alternative" sanctions.

Details: Oslo: Campbell Collaboration, 2015. 92p.

Source: Internet Resource: Campbell Systematic Reviews, 2015:1: Accessed April 1, 2015 at: http://www.campbellcollaboration.org/lib/?go=monograph&year=2015

Year: 2015

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 135108


Author: Pyman, Mark

Title: Arresting corruption in the police. The global experience of police corruption reform efforts

Summary: This report is the result of a survey of global experience of police anti-corruption reforms. It analyses police corruption and looks at reforms that were undertaken to tackle it. The report offers a way to analyse police corruption more systematically through a 'police typology', and looks at examples of police reform in 10 countries around the globe: Australia, Afghanistan, China, Georgia, Honduras, Jamaica, Kenya, Serbia, Singapore, and Venezuela.

Details: London: Transparency International, UK, 2012. 83p.

Source: Internet Resource: Accessed April 2, 2015 at: http://issuu.com/tidefence/docs/2012-11_arrestingcorruptioninpolice

Year: 2012

Country: International

Keywords: Police Behavior

Shelf Number: 135137


Author: Kenyon, Will

Title: Diagnosing Bribery Risk: Guidance for the conduct of effective bribery risk assessment

Summary: Transparency International's guidance provides specific, practical advice based on real-life experience on how to conduct an effective bribery risk assessment. Identifying and evaluating bribery risk is essential to the design and implementation of an effective anti-bribery programme. It's fundamentally a management responsibility, supported by compliance, internal audit and other functions as appropriate. Law enforcement agencies and regulators around the world have made it clear that bribery risk assessment is the foundation of an anti-bribery programme. In the UK, risk assessment is one of the six principles enshrined in the Ministry of Justice Guidance and is also a focus of the thematic reviews carried out by the Financial Services Authority (FSA) (now the Financial Conduct Authority or FCA). Furthermore, the Department of Justice (DOJ) and Securities and Exchanges Commission (SEC) in the US have recently published their resource guide The Transparency International guide includes: - 10 good practice principles for bribery risk assessment - A risk assessment template - with an illustrated documented example - Bribery risk assessment process check list

Details: London: Transparency International UK, 2013. 60p.

Source: Internet Resource: Accessed April 2, 2015 at: http://www.transparency.org.uk/publications/15-publications/678-diagnosing-bribery-risk

Year: 2013

Country: International

Keywords: Bribes (U.K.)

Shelf Number: 135138


Author: Afilipoaie, Alois

Title: The Growing Industry of Darknet Marketing

Summary: Tor's hidden services have allowed a new form of low-risk high-profit drug dealing to emerge and grow quickly over the last four years. Vendors of narcotics are utilising innovative marketing techniques that mirror those used by legal, 'real-world' and web-based businesses to promote and sell goods and services. These range from offers of free samples and discounts, to the use of banner adverts and brand management. Drug marketing is becoming increasingly sophisticated as more users and buyers flock to the Tor network and as hidden markets become more diversified and competitive.

Details: Singleton Park, Swansea, UK: Global Drug Policy Observatory, 2015. 4p.

Source: Internet Resource: Accessed April 6, 2015 at: http://www.swansea.ac.uk/media/GDPO%20SA%20Marketing.pdf

Year: 2015

Country: International

Keywords: Drug Dealing

Shelf Number: 135157


Author: Baliki, Ghassan

Title: Crime and Victimization

Summary: Historically, higher crime rates have been associated with higher inequality and poverty. Nevertheless, there remains an ambiguity over the most prominent socioeconomic factors that increase crime rates and individual victimization. This paper discusses victimization and crime rate data collections from the International Crime Victimization Survey (ICVS), the UNODC, and the World Value Surveys (WVS) in an effort to achieve three goals: (1) conduct an assessment on perceptions of public and private insecurity, as well as the fear of victimization; (2) provide a robust cross-regional comparison, where possible, on incidence of crime and evaluate the variability of exposure to victimization across gender and urban and rural residences; and (3) undertake a supplementary regional assessment for Latin America and the Caribbean to match perceptions with actual experience of crime to evaluate the magnitude of the gap in perceived risk of victimization among individuals.

Details: Washington, DC: World Bank, 2014. 25p.

Source: Internet Resource: Background Note: Accessed April 6, 2015 at: http://siteresources.worldbank.org/EXTNWDR2013/Resources/8258024-1352909193861/8936935-1356011448215/8986901-1380568255405/WDR2014_bn_Crime_and_Violence_Baliki.pdf

Year: 2014

Country: International

Keywords: Crime Rates

Shelf Number: 135158


Author: Kantorowicz, Elena

Title: Cognitive Biases and Procedural Rules: Enhancing the Use of Alternative Sanctions

Summary: The practice of short-term imprisonment has been long criticised due to its criminogenic effect and costs. To minimise its use, many countries introduced alternative sanctions such as community service or home confinement with electronic monitoring. Unfortunately, in practice those sanctions are often imposed on non-prison bound offenders, a phenomenon termed "the net-widening problem". Consequently, instead of reducing the prison population, the alternative sanctions substitute lighter punishments such as fine or conditional imprisonment. The discretion power whether to impose a prison sentence or its alternatives lies in the hands of the courts. Therefore, the way to enhance the use of alternative sanctions as a substitute to short-term imprisonment is to change the behaviour of judges. This paper adopts the unique approach of behavioural law and economics in order to discuss procedural rules that have the potential to achieve the above-mentioned goal. Each of the analysed procedural rules explains the cognitive biases, which judges are subject to when choosing between a prison sentence and an alternative punishment. Following that, this paper analyses how the suggested procedural rules overcome or use those biases in order to promote the use of alternative sanctions.

Details: Rotterdam: Erasmus University Rotterdam , 2014. 22p.

Source: Internet Resource: Rotterdam Institute of Law and Economics (RILE) Working Paper Series No. 2014/10 : Accessed April 6, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2531418

Year: 2014

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 135162


Author: Kantorowicz, Elena

Title: Can Imprisonment Be Cheaper? The Law and Economics of Private Prisons

Summary: Custody is the most expensive method of punishment in the western world, as compared to other alternatives. Although expensive, prison is an indispensible instrument to deal with judgment proof or dangerous offenders. Hence, by using the law and economics approach, this paper explores prison privatization as an instrument for less expensive incarceration. This method has the potential to reduce the prison costs without hampering its quality. However, a restructuring of the current contracts is needed to achieve this purpose. The attention given to the topic of private prisons by the law and economics scholars, especially in the European context, is limited and this paper attempts to fill this gap. The present paper applies arguments from the bureaucracy and political science literature to explain the inefficiencies of public prisons. Subsequently, the potential problems of private prisons are presented through the principle-agent model and solutions are offered.

Details: Rotterdam: Erasmus University Rotterdam, 2014. 32p.

Source: Internet Resource: Accessed April 6, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2449265

Year: 2014

Country: International

Keywords: Costs of Corrections

Shelf Number: 135163


Author: Reece, Helen

Title: Debating Rape Myths

Summary: In a recent article, I argued that the regressiveness of current public attitudes towards rape has been overstated, suggesting that, to a troubling extent, we are in the process of creating myths about myths. The article itself and the arguments contained within it have provoked various responses from feminists. While these responses proceed at times on the basis of misunderstandings or misinterpretations of my argument, they are helpful both in clarifying areas of disagreement and in underscoring some important points of agreement - at times explicitly by accepting, and at other times implicitly by leaving unchallenged, some of my core claims. In what follows, I aim to point out the misunderstandings or misinterpretations, and to clarify both the areas of assent and the areas of dissent in an attempt to move us towards the productive public conversation we believe we want.

Details: London: London School of Economics and Political Science, 2014. 23p.

Source: Internet Resource: LSE Legal Studies Working Paper No. 21/2014 : Accessed April 7, 2015 at: http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2497844

Year: 2014

Country: International

Keywords: Rape

Shelf Number: 135164


Author: Inter-American Commission on Human Rights

Title: Violence against journalists and media workers: Inter-American standards and national practices on prevention, protection and prosecution of perpetrators.

Summary: The murder of journalists and members of the media is the most extreme form of censorship. As the Inter-American Court of Human Rights ("Inter-American Court" or "Court") has observed, "journalism can only be exercised freely when those who carry out this work are not victims of threats or physical, mental or moral attacks or other acts of harassment." Such actions infringe, in a particularly radical way, not only the affected person's individual freedom of thought and expression, but also the collective dimension of this right. Acts of violence against journalists (term that should be understood broadly, from a functional perspective) or media workers for reasons connected to their professional activity violate both the individual's right to express and impart ideas, opinions and information, as well as the rights of citizens and societies as a whole to seek and receive information and ideas of any nature. Regarding this, as the United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression has stated, an attack on a journalist is "an attack against the principles of transparency and accountability, as well as the right to hold opinions and to participate in public debates, which are essential for democracy". When these crimes are committed with impunity, it encourages the commission of similar violent acts and can result in communicators being silenced or self censoring. As will be shown later on, impunity has a strong chilling effect on the exercise of freedom of expression, and its consequences for democracy - which depends on the free, open and dynamic exchange of ideas and information - are particularly serious. As the Inter-American Court has found on a number of occasions, freedom of expression is the cornerstone of the very existence of a democratic society; consequently, it can be said that a society that is not well informed is not a society that is truly free.

Details: Washington, DC: IACHR, 2013. 189p.

Source: Internet Resource: Accessed April 9, 2015 at: http://www.oas.org/en/iachr/expression/docs/reports/2014_04_22_Violence_WEB.pdf

Year: 2013

Country: International

Keywords: Freedom of the Press

Shelf Number: 135197


Author: Przyswa, Eric

Title: Counterfeit Medicines and Criminal Organisations

Summary: Counterfeit Medicines are a major threat that is spreading dangerously across the globe and the International Institute of Research Against Counterfeit Medicines (IRACM) has decided to present a study report to decipher the relationship between organized crime and medicine counterfeiting. Today, every country, every person can come into contact with counterfeit medicines. The risk of taking counterfeit medicines "involuntarily" is increased exponentially for any potential patient of the "global village". This risk can become a real danger to individual lives, but also a global threat to public health. The IRACM wishes to alert the public by publishing this report to raise awareness among governments and citizens and help consumer-patients to make careful choices, whether on the internet or at markets in developing countries where drugs are sold on stalls at lower prices. The purpose of such a report is a hot topic as medicine counterfeiting issues have escalated to worrying heights with the growth of international trade and the Internet. This problem now generates major public health issues on an international scale. As for criminal organizations, they are often perceived simplistically in public debate and this research on this new subject seeks to attempt to characterize the structures that exist. The study focuses not only on Western countries but also on Russian and especially Chinese aspects, often regarded as strategic. This novel research report includes the best international academic sources and seeks to identify the logic behind the most significant criminal strategies rather than provide a hypothetical exhaustive list of organizations involved in such illegal trafficking. Many criminal organizations Based on our research, it is clear that criminal organizations are involved in medicine counterfeiting and three types of organization can be identified: Small-sized organizations (two to five people) often created by opportunistic individuals motivated by short-term gains. These organizations offer specific products at attractive prices. Medium-sized transnational organizations whose criminal profile varies: these may be structures stemming from organized crime (Wuppertal case1), opportunistic businessmen using sophisticated techniques to manage their organization (Arnaud B. case2) or people more directly connected to the pharmaceutical industry (Gillespie case). Large-scale and transnational organizations as seen in two significant cases: - The RxNorth case involving a Canadian distributor which, in parallel with its business, organized a complex system to import counterfeit medicines made in China into the United States, transiting them through Hong Kong, the Middle East, the UK and the Bahamas. - Another, even more complex example: a so-called "Jordanian-Syrian" network created in 2003 during the U.S. invasion of Iraq and which, through a succession of opportunities, evolved into multiple subnetworks in the region (Jordan, Palestinian territories, Egypt, Syria), then moved to the West with a counterfeit cancer drug whose network transited through several countries (Egypt, Turkey, Switzerland, Great Britain) before finally reaching the U.S. market. This case, which has received little media coverage, is thought to be the largest criminal network of medicine counterfeiting still active. Chinese organized crime has a very strategic role and it is important to distinguish Chinese criminal cases involving the Western market (the case of Kevin Xu, a businessman who specialized in exports), from cases mostly involving the local market where the criminals often have connections to the healthcare sector. Lastly, there are foreign structures that create local companies that serve to build transnational networks based in this leading region for the manufacture of counterfeit medicines. On the Internet there are two types of criminal structures. The first category includes opportunistic online networks set up on an ad hoc basis by being grafted onto "real" trade with the end consumer in the distribution phase. The second category of organizations is dedicated exclusively to online distribution with globalized affiliation techniques and aggressive advertising on search engines or through spam. The most significant case of a cybercrime organization in recent years involves the Russian Glavmed and SpamIt affiliation programs. The affiliates of these two networks benefited from "prefabricated" online pharmacies and a dozen SpamIt affiliates earned over $1 million in commission on their website. Vast criminal organizations Generally speaking, certain analytical limitations in deciphering these organizations have been identified and differentiate our analyses from most sources on the subject. Despite the proven involvement of Italian criminal organizations in the counterfeiting of luxury goods and the healthcare sector, their presence in the organization of counterfeit medicine trafficking is difficult to prove. However, the report raises the theoretical possibility of the Mafia's involvement in certain strategic locations such as harbours. As for the Chinese Triads, analysing their involvement has proven to be difficult, as research in mainland China is complex. In short, we must be cautious regarding the presence of traditional criminal organizations in our field of study. The involvement of terrorist organizations is also difficult to prove, despite many reports seeking to document money laundering linked to counterfeit medicine trafficking. But the explanations given are often related to broader geopolitical issues, raising doubts over the objectivity of such analyses (Hezbollah for example). However, the involvement of the IRA in the organization of a vast counterfeit veterinary drug trafficking network in the early 90s between Northern Ireland and Florida has been clearly proven. In sum, the report identifies these criminal organizations and their activities and characterizes them in several ways: - Fragmented crime through better access to illegal activities. The "massification" of printing, production and distribution techniques has clearly facilitated such developments. - Criminal organizations often operate based on a "structural holes" approach, seeking to maximize the systemic flaws in the supply chain or on a broader scale (free trade zones, tax havens, servers hosted in "protected" areas, etc.). - On a large scale, these organizations are characterized by a hybrid network structure, where licit operators can cooperate with illicit ones or be directly involved in such criminal trafficking. - In terms of timelines, it is important to distinguish between organizations likely to generate a major risk over a relatively short period of time, and that need to be dismantled as quickly as possible, and large hybrid organizations whose total elimination can take years. - To our knowledge, there are no sustainable large-scale transnational criminal organizations that combine trafficking on the Internet and trafficking in the "real" world. - Paradoxically, networks on the Internet often seem to have a more structured and consistent organization than organizations involved in medicine counterfeiting in the "real" world, which are more difficult to observe. - The counterfeit medicines distributed are no longer limited to "convenience" drugs but also include major diabetes and cancer treatments.

Details: Paris: Institut de Recherche Anti-Contrefacon de Medicaments, 2013. 129p.

Source: Internet Resource: Accessed April 9, 2015 at: http://www.iracm.com/wp-content/uploads/2014/02/Contrefacon-de-Medicaments-et-Organisations-Criminelles-EN.pdf

Year: 2013

Country: International

Keywords: Counterfeit Goods

Shelf Number: 135203


Author: Denney, Lisa

Title: Securing communities? Redefining community policing to achieve results

Summary: Community policing is a popular donor strategy within wider police reforms in many developing countries - with programmes in places as diverse as Bangladesh, Jamaica and Sierra Leone. It takes a variety of forms, but often includes alternative dispute resolution, police-community forums, joint police-community patrols, community outreach, the establishment of community policing as a police-wide philosophy and/or specific police units tasked with responsibility for community policing. In addition to these multiple forms, community policing is ascribed a diverse set of objectives by the different actors involved (governments, police, communities and donors), including reduced crime, improved police-community relations, increased police accountability and strengthened state-society relations. As a result of the conceptual confusion surrounding community policing, the 'Securing communities' project at the Overseas Development Institute (ODI) attempted to map the diversity of practices that fall within its remit, to examine how community policing is shaped in different contexts and to probe the plausibility of many of the objectives ascribed to community policing. This synthesis paper draws together the findings of a background paper and four case studies (in Ethiopia, Jamaica, Sri Lanka and Timor-Leste), as well as wider reviews of the literature and country examples. Key findings include: -Despite the popularity of community policing within wider police reforms, there is little consensus on its definitions, objectives and models; -Communities, police, governments and donors ascribe a range of competing objectives to community policing, many of which are overambitious; -Community policing is shaped by a number of features of the context, which we must understand in order to develop realistic expectations of what kinds of change are possible; -There is a need to be more realistic about what community policing can achieve, focusing on specific safety and security problems are dependent on what the context allows.

Details: London: Overseas Development Institute, 2015. 27p.

Source: Internet Resource: Accessed April 15, 2015 at: http://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/9582.pdf

Year: 2015

Country: International

Keywords: Community Policing

Shelf Number: 135213


Author: Sampson, Robyn

Title: There are alternatives: A handbook for preventing unnecessary immigration

Summary: International human rights laws and standards make clear that immigration detention should be used only as a last resort in exceptional cases after all other options have been shown to be inadequate in the individual case. Despite the clear direction to authorities to first consider less onerous options, there is little clarity over how this can be achieved in a systematic manner. This research was undertaken to address this gap. The aim was to identify and describe any legislation, policy or practice that allows for asylum seekers, refugees and migrants to reside in the community with freedom of movement while their migration status is being resolved or while awaiting deportation or removal from the country. This was achieved through an extensive review of existing literature; an international online survey of 88 participants in 28 countries; and international field work in nine countries including in-depth interviews with 57 participants and eight site visits. Participants included representatives of governments, non-governmental organisations, international human rights organisations and key agencies from the United Nations.

Details: Melbourne: International Detention Coalition, 2011. 83p.p.

Source: Internet Resource: Accessed April 15, 2015 at: http://idcoalition.org/wp-content/uploads/2013/08/There-Are-Alternatives.pdf

Year: 2011

Country: International

Keywords: Alternatives to Imprisonment

Shelf Number: 135219


Author: Hoatson, Lesley

Title: Evaluating the impact of International Detention Coalition. Work towards ending and limiting unnecessary immigration detention and developing alternatives

Summary: The IDC commissioned a comprehensive External Evaluation to consolidate key insights. Conducted by Lesley Hoatson, an accredited evaluator of NGO, UN and government programs, the evaluation looks at the impact of the IDC's work. It provides qualitative and quantitative analysis of advocacy outcomes as well as recommendations to strengthen the work of the IDC, following interviews with a wide range of members, funders, governments and stakeholders. Significantly the evaluation finds: - A broad range of stakeholders hold overwhelming support, respect and trust for the IDC - The IDC is seen as leading a community of practice that has moral authority and uses this political capital to move detention reform forward - The IDC has been a major contributor to the shift in the international debate towards alternatives to detention by offering leadership, technical expertise, groundbreaking research, capacity building and training - 90% of the 77 countries the IDC is working in now have NGOs advocating for alternatives to immigration detention, representing a 5 fold increase since 2009 - From this work has come changes to law, policy and practice and a significant number of people have either been released from detention

Details: Melbourne: International Detention Coalition, 2014. 72p.

Source: Internet Resource: Accessed April 15, 2015 at: http://idcoalition.org/wp-content/uploads/2014/12/IDC-Evaluation-2014.pdf

Year: 2014

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 135220


Author: Chertoff, Michael

Title: The Impact of the Dark Web on Internet Governance and Cyber Security

Summary: With the Internet Corporation for Assigned Names and Numbers' contract with the United States Department of Commerce due to expire in 2015, the international debate on Internet governance has been re-ignited. However, much of the debate has been over aspects of privacy and security on the visible Web and there has not been much consideration of the governance of the "deep Web" and the "dark Web." The term deep Web is used to denote a class of content on the Internet that, for various technical reasons, is not indexed by search engines. The dark Web is a part of the deep Web that has been intentionally hidden and is inaccessible through standard Web browsers. A relatively known source for content that resides on the dark Web is found in the Tor network. Tor, and other similar networks, enables users to traverse the Web in near-complete anonymity by encrypting data packets and sending them through several network nodes, called onion routers. Like any technology, from pencils to cellphones, anonymity can be used for both good and bad. Users who fear economic or political retribution for their actions turn to the dark Web for protection. But there are also those who take advantage of this online anonymity to use the dark Web for illegal activities such as controlled substance trading, illegal financial transactions, identity theft and so on. Considering that the dark Web differs from the visible Web, it is important to develop tools that can effectively monitor it. Limited monitoring can be achieved today by mapping the hidden services directory, customer data monitoring, social site monitoring, hidden service monitoring and semantic analysis. The deep Web has the potential to host an increasingly high number of malicious services and activities. The global multi-stakeholder community needs to consider its impact while discussing the future of Internet governance.

Details: Waterloo, ON: London: Centre for International Governance Innovation and the Royal Institute for International Affairs, 2015. 18p.

Source: Internet Resource: Paper Series: No. 6: Accessed April 15, 2015 at: https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf

Year: 2015

Country: International

Keywords: Computer Crimes

Shelf Number: 135233


Author: United Nations Environment Programme

Title: Emerging Technologies: Smarter ways to fight wildlife crime

Summary: The illegal trade of animals - for luxury goods, traditional medicine or cultural ceremonies, pets, entertainment, and even research - is a major threat to wildlife conservation and welfare (Baker et al., 2013). Poachers and illegal traders use highly sophisticated and rapidly changing techniques to avoid detection. To keep pace with the "war on wildlife", conservation and law enforcement communities have started to adopt cutting-edge military tools and techniques. High-tech equipment can magnify counter-poaching efforts without requiring armies of rangers or risking lives. Tools include acoustic traps, mobile technology, mikrokopters, radio frequency identification tags, encrypted data digital networks, camera traps, DNA testing, radio collars, metal scanners, and satellite imagery.

Details: Sioux Falls, SD: UNEP, Global Environmental Alert Service, 2015. 11p.

Source: Internet Resource: Accessed April 15, 2015 at: http://na.unep.net/geas/archive/pdfs/GEAS_Jun2014_EmergingTechnologies_illegalwildlife.pdf

Year: 2015

Country: International

Keywords: Animal Poaching

Shelf Number: 135236


Author: Environmental Investigation Agency (EIA)

Title: High Profit/Low Risk: Reversing the wildlife crime equation

Summary: In February 2014, global leaders convened for The London Conference on Illegal Wildlife Trade, an unprecedented gathering "to help eradicate illegal wildlife trade and better protect the world's most iconic species from the threat of extinction". The outcome was the London Declaration, calling for a range of actions including: the designation of wildlife crime as a serious crime; applying the same investigative techniques and tools currently applied to other transnational organised crimes; enhanced international cooperation; demand-reduction; supporting communities; and addressing corruption and money-laundering. International wildlife crime has long been recognised as a serious organised crime with far-reaching global impacts. It is destabilising, subverts the rule of law and the proceeds may fuel other organised criminal activities and conflict. While accelerating biodiversity loss, wildlife crime robs resource-dependent communities of livelihoods, undermines local and national economies and also poverty alleviation efforts. A single live wild elephant can generate over US$1.6 million for tourism revenue over its lifetime, yet some of the least developed countries are experiencing high levels of elephant poaching for ivory trade. Meanwhile, rangers risk their lives on the front line of ecosystems: in 10 years, an estimated 1,000-plus park rangers have been killed, 80 per cent by commercial poachers and armed militia groups. It has become increasingly dangerous to defend rights to land and the environment, yet killers of environmental defenders are not being brought to justice. The London Declaration of 2014 was one of a number of events, announcements and declarations from the international community, variously recognising the serious nature of wildlife crime and urging steps to address it. The Declaration itself lists 16 other wildlife-related meetings and initiatives which took place between 2010 and the London meeting and urges the full implementation of their measures; additionally, there have been several meetings since, including some at high-level. In March 2015, the Government of Botswana hosts the follow-up conference to review status of implementation of the actions agreed as part of the London Declaration. A year down the line, it is time for signatories to describe their progress against commitments, although formal indicators of activity are yet to be formulated. Wildlife crime has brought about devastating impacts in one year alone. The South African Government reported it lost 1,215 of its rhinos to poaching in 2014,9 an average of three rhinos killed every day in an escalating slaughter driven by resurgent rhino horn trade in Vietnam and China. Asian rhinos are also under threat: in 2014, 35 rhinos were poached in India. Elephants continue to face the devastating consequences of ivory trade, with a 2014 study finding 100,000 elephants had been killed over three years11 and initial reports show at least 26 tonnes of ivory seized internationally during 2014, representing at least 3,880 dead elephants; while 215 Asian big cats were intercepted in illegal trade, including 61 tigers. This briefing highlights examples of best practice, showing how countries have implemented some elements of the London Declaration. It also shows where barriers to implementation remain and the gaps which countries can fill to deter wildlife criminals. EIA supports the London Declaration commitments regarding anti-poaching and communities but, given EIA's organisational focus, the examples relate primarily to those sections of the London Declaration concerning legislative law enforcement and demand-reduction.

Details: London; Washington, DC: EIA, 2015. 16p.

Source: Internet Resource: A briefing for the Kasane Conference on Illegal Wildlife Trade March 25, 2015: Accessed April 15, 2015 at: https://drive.google.com/viewerng/viewer?url=http://eia-international.org/wp-content/uploads/EIA-High-Profit-Low-Risk-FINAL.pdf

Year: 2015

Country: International

Keywords: Animal Poaching

Shelf Number: 135239


Author: Surtees, Rebecca

Title: Traffickers and trafficking. Challenges in researching human traffickers and trafficking operations, 2014

Summary: While much research and literature exists about trafficking victims, far less is known about the persons responsible for their exploitation. A clearer picture of how traffickers operate is vital in efforts to prevent and combat the crime of human trafficking and can be used in the development of criminal justice and social welfare responses to human trafficking - informing policies, strategies and interventions. To date, much of what is known about trafficking and traffickers is drawn from information provided by trafficking victims. Because trafficked persons are key witnesses to events in the trafficking process, there are substantial strengths to victim-derived data. At the same time, there are some significant limitations to this type of information. This paper discusses some of the fault lines involved in understanding traffickers and trafficking operations through the lens of trafficked persons and their individual trafficking experiences. These limitations make clear that an improved understanding of traffickers and trafficking operations requires looking beyond victim-derived datasets to other information sources, including research with traffickers themselves. This paper concludes with a discussion on recent research efforts on traffickers and trafficking, which signal potential ways forward of improving research on this significant human rights issue and crime. These include in particular drawing on criminal justice data sets as well as engaging directly with persons involved in trafficking, each of which affords important insight into various aspects of the other side of human trafficking. These studies also make clear that such research is not only possible but also essential to a thorough and holistic understanding of trafficking.

Details: Geneva, SWIT: International Organization for Migration; Washington, DC: NEXUS Institute, 2014. 76p.

Source: Internet Resource: Accessed April 20, 2015 at: http://publications.iom.int/bookstore/free/Nexus_Traffickers_and_trafficking_FINAL_WEB.pdf

Year: 2014

Country: International

Keywords: Human Trafficking

Shelf Number: 135264


Author: Koops, Bert-Jaap

Title: Cyberspace, the cloud, and cross-border criminal investigation. Cyberspace, the cloud, and cross-border criminal investigation

Summary: With the rise of cloud computing (using scalable computing resources as a service via the Internet), computer data are increasingly stored remotely - 'in the cloud' - instead of on users' devices. Due to the distributed, dynamic, and redundant nature of cloud storage, a particular file can often be stored in multiple places simultaneously, while it may not be stored in any single place in its entirety. For speed-optimisation reasons, data may be stored in the server park closest to the user's normal location. Cloud computing can involve multiple providers in different layered constellations and data can be encrypted. The cloud thus has significant implications for criminal investigation, particularly in cases where digital evidence is sought. Local search and seizure by the police will yield less and less evidence as users use cloud services such as webmail and remote data storage. This reinforces existing challenges of cyber-investigation, which not only requires swift evidence-gathering due to the vulnerability of data loss, but also powers to gain access to data remotely. One particular challenge in cyber-investigation is that such remote evidence-gathering powers will quickly extend beyond national borders. Under the rules of international law, states must then resort to traditional procedures of mutual legal assistance. This is, broadly speaking, a challenging process in cyber-investigations. In addition to organisational limitations, such as lack of capacity or priority-setting, and some legal limitations, such as double criminality, mutual assistance procedures are viewed by those conducting on-line investigations as cumbersome or ineffective for seeking digital evidence. Despite efforts to streamline and facilitate mutual legal assistance in cyber-investigation, the procedures remain inadequate in situations in which there is a need for expeditious data gathering, or where (cyber)criminals move data around with high frequency, and also where the location of the data cannot, or only through time-consuming efforts, be identified, which may often be the case in cloud computing situations. Where mutual legal assistance procedures do not work sufficiently, the question arises whether and under what conditions cross-border investigations are allowed, which is relevant not only for cybercrimes but for all crimes where perpetrators communicate via email or smartphone apps or use cloud storage services. Although a number of efforts have been aimed at trying to move forward in the field of cross-border cyber-investigation, these efforts have not yet resulted in any tangible improvement. A key reason for this is that territorially-based national sovereignty forms the basis of the international order and as a result, international law is strict in prohibiting investigative activities on foreign territory without the consent of the state concerned. The situation is thus one of stalemate: cyber-investigation officials wish to move forward in cross-border investigation but cannot do so because of the current limitations of international law and because the specific challenges of cyber-investigation have so far not induced states to create new international rules in this area that put strict interpretations of sovereignty aside. It is against this background of a 21st-century cloud computing paradigm meeting with 20th-century-based procedures for mutual legal assistance in criminal matters that the central problem of this study takes shape. This report aims to advance the debate on cross-border cyber-investigation by combining the fields of cyber-investigation and international law. The central question addressed in this study is what limits and what possibilities exist within international law for cross-border cyber-investigations by law enforcement authorities. The focus is on cloud storage services, but the analysis applies more generally to Internet investigations, in particular in the form of remote searches and the contacting of foreign service providers to request data. In particular, the report focuses on questions of the legality of cross-border access to data under international law in terms of the core principles of territorial integrity and non-interference in domestic affairs rather than on questions of human rights. The research for this report is based on desk research of international and supranational law and policy and academic literature in the fields of cyber-investigation and of international law, and on an international expert meeting with twenty experts in criminal law, cybercrime, Internet, and international law.

Details: Tilburg, NETH: TILT - Tilburg Institute for Law, Technology and Society, 2014. 101p.

Source: Internet Resource: Accessed April 20, 2015 at: http://english.wodc.nl/onderzoeksdatabase/2326-de-gevolgen-van-cloudcomputing-voor-de-opsporing-en-vervolging.aspx?cp=45&cs=6796

Year: 2014

Country: International

Keywords: Cloud Computing

Shelf Number: 135266


Author: Elwick, Alex

Title: Improving outcomes for young offenders: An international perspective

Summary: This review of international approaches to education and interventions for young people in custody identifies differences between judicial systems, and in particular youth justice systems, across the world. It focuses on reoffending behaviour in these different systems and the methods these administrations employ to address the issue. The review draws upon a series of case studies from a range of high-performing jurisdictions in order to exemplify institutions, interventions and programmes which have either been shown to have a positive impact on reoffending or indirectly contribute towards these acknowledged or proven high-performing systems. Based upon these case studies, a number of key features of provision for young offenders in custody emerge which, within their own contexts, contribute to a successful approach. These include: - Education is placed at the heart of an institution's focus. - Interventions are personalised and targeted. - Staff are given multidisciplinary training, often to graduate level, and custodial staff are also involved in the education of offenders. - Institutions are relatively small, and are split into units which are even smaller. - There are high ratios of staff to offenders. - Offenders are assigned mentors who work with them up to 12 months after their release. - Activities within the community are a key aspect of provision. - Residential facilities are locally distributed, situated reasonably close to the homes of young offenders. Building on this analysis, a number of recommendations are made in terms of the future of youth custody in England and Wales:

Details: Reading, Berkshire, UK: CfBT Education Trust, 2013. 32p.

Source: Internet Resource: Accessed April 20, 2015 at: http://cdn.cfbt.com/~/media/cfbtcorporate/files/research/2013/r-improving-outcomes-2013.pdf

Year: 2013

Country: International

Keywords: Educational Programs

Shelf Number: 135268


Author: Inter-Agency Coordination Group against Trafficking in Persons (ICAT)

Title: Preventing Trafficking in Persons by Addressing Demand

Summary: During the first decade following the adoption of the UN Trafficking in Persons Protocol, most efforts to prevent trafficking in persons (TIP) focused on what is often referred to as the supply side, concentrating on those who were seen as vulnerable to becoming victims of trafficking in person. Partly as a result of a perceived lack of progress for such supply side interventions, recent years have seen an increased interest in identifying and addressing factors that contribute to the demand that fosters all forms of labour exploitation. One of the ways in which this demand is met, is through trafficking in persons, which this paper aims to explore. The present paper is the second in a series of policy papers elaborated jointly by the member organizations of the Inter-agency Coordination Group against Trafficking in Persons. Its purpose is to provide guidance to organizations and practitioners by mapping out the dimensions of this demand as it relates specifically to trafficking in persons for labour exploitation, as well as highlighting strategies that can be used to address this aspect of the problem. The paper proceeds to identify concrete steps that can be taken by different actors to effectively reduce this demand. This paper concentrates specifically on demand that contributes to trafficking for labour exploitation in the context of the production of goods and/or services. The paper thus excludes trafficking for other purposes (including forced marriage, begging, forced criminality and organ removal), each of which has particular nuances. The paper further does not address demand that contributes to trafficking for the purpose of sexual exploitation. The paper does however make frequent reference to forced labour. While forced labour and trafficking for labour exploitation are not fully synonymous - not all forced labour involves trafficking and not all trafficking for labour exploitation amounts to forced labour - they both result from similar demand factors. Further, many relevant initiatives against exploitative labour practices are framed in terms of forced labour rather than trafficking in persons. The paper is divided into three parts. Part I provides an introduction to the concept of demand in the context of trafficking in persons for labour exploitation, the international legal framework relating to demand, and the reasons for increased attention to this area. The aim is not to create a definitive definition of demand but rather to identify an overall framework for Part II of the paper. This identifies different strategies and approaches for addressing demand and includes suggestions on possible steps to be taken with regard to each strategy. Part III consists of concluding comments, incorporating a brief summary of main recommendations.

Details: Vienna, Austria: ICAT, 2014. 30p.

Source: Internet Resource: Accessed April 20, 2015 at: http://www.ungift.org/doc/knowledgehub/events/ICAT_Demand_paper_-_FINAL.pdf

Year: 2014

Country: International

Keywords: Crime Prevention Programs, Human Trafficking

Shelf Number: 135272


Author: Balarezo, Christine A.

Title: Selling Humans: the Political Economy of Contemporary Global Slavery

Summary: Human trafficking is a growing illegal crime, both in terms of numbers and profits. Thus, important to consider, as it is a human rights, political, criminal justice, national security, and economic issue. Previous studies have these examined these human trafficking factors independently, yet none have really taken into account how they work simultaneously. This study examines why human trafficker continues to occur, particularly at the domestic and transnational level, and also why some countries are better able to effectively deal with this problem in terms of criminalizing human traffickers. It is argued that at the domestic level, traffickers first must take into account the operating costs, illegal risks, bribery, and profits of the business. After considering these basic elements, they then need to consider the world, including economic, political, geographic, and cultural factors that may help facilitate human trafficking. However, human trafficking can occur across large geographic distances, though rare. This is more likely to happen based on the type of human trafficking group, available expatriate or immigrant networks, the origin-transit-destination country connection, or strength of the bilateral economic relationship between origin and destination countries. Finally, looking at why some countries are better able to criminalize traffickers helps us to better understand how human trafficking can be discouraged. In short, conformity of a country's domestic anti-human trafficking law, as well as the degree of enforcement, should increase the probability of criminalizing a human trafficker. These three theoretical arguments help to better understand the nature of the business, and more importantly, why human trafficking continues.

Details: Denton, TX: University of North Texas, 2013. 249p.

Source: Internet Resource; Dissertation: Accessed April 20, 2015 at: http://digital.library.unt.edu/ark:/67531/metadc407818/

Year: 2013

Country: International

Keywords: Human Slavery

Shelf Number: 135280


Author: Hansen, Randall

Title: Securing Borders: The Intended, Unintended, and Perverse Consequences

Summary: All countries have the same basic goals in regard to national borders: to ensure that the beneficial movement - of legal goods, tourists, students, business people, and some migrants - is allowed, while keeping unwanted goods and people out of the country. All countries also face a similar set of border enforcement goals and challenges. They must prevent cross-border terrorism, illegal migration, human smuggling and trafficking, and other criminal activity such as drug trafficking. In adopting policies and practices to combat these activities, countries also face a common and basic dilemma: policies in any one area have perverse, regrettable, and often unintended, consequences and feedbacks. As states implement extensive border controls and apply a wide variety of deterrence measures such as visas and carrier sanctions to prevent illegal migration, they indirectly push unauthorized migrants into the hands of smugglers and traffickers who promise to evade these controls. This report is first in a series that focuses on ways to curb the influence of these"bad actors" who pose challenges to countries' immigration control efforts. The report outlines the security-related challenges that borders are intended to address and, in turn, the perverse consequences that tighter border enforcement generates. The report analyzes challenges in five key categories: terrorism, asylum, human smuggling and trafficking, illegal migration, and drug trafficking. Turning to policy implications of the analysis, the authors argue that in order to operate successfully in the changing landscape of border management, and prevent the perverse consequences of border control efforts, policymakers must focus on principles of good governance. Weak states cannot have strong borders, and states will not get border policy right unless they get their institutions right. Accordingly, proper border policy depends on a commitment to the rule of law, low levels of corruption, effective police and border control forces, and successful coordination both among responsible agencies and with like-minded states. To this end, this report offers several policy recommendations for more effective border security.

Details: Washington, DC: Migration Policy Institute, 2014.

Source: Internet Resource: Accessed April 20, 2015 at: http://www.migrationpolicy.org/research/securing-borders-perverse-consequences

Year: 2014

Country: International

Keywords: Border Security

Shelf Number: 135282


Author: Bamfield, Joshua

Title: Changing Retail, Changing Loss Prevention

Summary: At one time, protecting a retail corporation's assets was a role seen primarily as a policing one and retailers employed personnel (often with a police or military background) to carry out this task. The main role was to apprehend thieves stealing from the organisation and to prevention violent crime. The expectation was that this role was to be carried out mostly by arresting malefactors and handing them to the police. The value of retail security was often judged in terms of the numbers of arrests made and the efficiency of individual loss prevention officers would frequently be measured in terms of whether they had achieved their target number of arrests. Starting with the U.S. the 'retail security' (ie policing) model of loss prevention has been increasingly disparaged. The role of loss prevention, as its name suggests, has been to minimise retail loss rather than arresting large numbers of people. Loss prevention has been seen as being more concerned with financial and operational performance capable of reducing or preventing losses of all kinds. Specialist skills of investigation and arresting thieves without creating civil liability are of course essential to loss prevention work, but they only form part of what is required. The emphasis increasingly has been upon the prevention and deterrence of offending, and much less upon apprehending as many thieves as is practicable. Indeed, at its best, a good loss prevention department might have no arrests at all if its prevention work is of a very high order, although in practical terms this is highly unlikely. Apprehending thieves, processing them and handing them to the police (inevitably involving some court appearances) is extremely expensive and often costs more than the merchandise recovered when a thief is caught. Loss prevention specialists certainly patrol the stores and investigate suspicious employee behaviour, but loss prevention also includes preparing improved procedures, ensuring greater conformity with company loss prevention policy, training staff to be more aware of potential loss, analysing loss and working with other departments to mitigate actual or potential losses caused by error or procedural failures (as well as loss caused by crime), and helping to develop new policies needed for the changing pattern of retail losses, such as online losses or losses caused by the growing problem of refund/returns fraud.

Details: Newark, Nottinghamshire, UK: Centre for Retail Research, 2013. 16p.

Source: Internet Resource: Accessed April 20, 2015 at: http://all-tag.com/wp-content/uploads/2013/04/GRTB_Changing_Retail_Changing_Loss_Prevention_2013.pdf

Year: 2013

Country: International

Keywords: Crime Against Businesses

Shelf Number: 135305


Author: Kantorowicz, Elena

Title: Day-Fines: Should the Rich Pay More?

Summary: Fine is an efficient method of sanctioning since the burden on the taxpayer for enforcing it is low and the offender is even transferring wealth to the society. However, using the law and economics analysis, this paper suggests that the day-fine is a superior model to other forms of fines. This pecuniary measure takes into account the income of the offender alongside with the severity of the offense. Consequently, criminals with different socioeconomic status committing the same crime would pay the same portion of their wealth but not the same absolute amount of money. Using this structure the day-fine has a potential to deter the rich and the poor and avoid the costly sanction of imprisonment.

Details: Rotterdam: Erasmus University Rotterdam, 2015. 23p.

Source: Internet Resource: Rotterdam Institute of Law and Economics (RILE) Working Paper Series No. 2014/12 : Accessed April 21, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2387442

Year: 2014

Country: International

Keywords: Crime and Economics

Shelf Number: 135323


Author: Allen, Rob

Title: Global Prison Trends: 2015

Summary: This report is designed to describe key global trends in the use and practice of imprisonment and to identify some of the pressing challenges facing states that wish to organise their penitentiary system in accordance with international norms and standards. Topics include: - Prison populations and rates of imprisonment - Prison management - Prison regimes - New technologies - Criminal justice, social policy and sustainable development The report also includes a Special Focus pull-out section on the impact of the 'war on drugs' and its implications for prison management. Significant international developments, recent research projects and precedent-setting court decisions are highlighted throughout. Global Prison Trends is intended to be an annual publication. Tracking trends and challenges in criminal justice systems will be vital to designing and assessing measures intended to strengthen the rule of law as a means to advancing sustainable development.

Details: London: Penal Reform International, 2015. 52p.

Source: Internet Resource: Accessed April 22, 2015 at: http://www.penalreform.org/wp-content/uploads/2015/04/PRI-Prisons-global-trends-report-LR.pdf

Year: 2014

Country: International

Keywords: Correctional Administration

Shelf Number: 135332


Author: Ditmore, Melissa

Title: When sex work and drug use overlap: Considerations for advocacy and practice

Summary: The report examines the multiple and varied contexts within which drug use (including use of alcohol and non-psychoactive substances, including some hormones and image- and performance-enhancing drugs) and sex work overlap. It provides a snapshot of available evidence on the factors that contribute to vulnerability among people who sell sex and use drugs. Drawing on experience from the harm reduction and sex work communities, the report explores implications for practice, highlighting existing programmes that reach people who sell sex and use drugs around the world, and offering practical suggestions on how programmes can better serve this overlapping population. While this broad and complex area cannot be explored in depth within a document of this length, the report aims to draw attention to this often neglected area, and inform policy and programmatic discussions. It is primarily intended to be useful for people who use drugs and sell sex, and those who work with them, in order to inform advocacy and programming. It may also be useful to civil society organisations, government and multilateral agencies with an involvement in programming and policy making on drugs, sex work and health.

Details: London: Harm Reduction International, 2013. 46p.

Source: Internet Resource: Accessed April 22, 2015 at: http://www.ihra.net/files/2014/08/06/Sex_work_report_%C6%924_WEB.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 135363


Author: Kantorowicz, Elena

Title: Any-Where Any-Time: Ambiguity and the Perceived Probability of Apprehension

Summary: Enforcement is a costly endeavour. Thus, governments ought to be innovative in designing less costly policies, yet, effective in preventing crime. To this end, this paper suggests using insights from behavioural law and economics. Empirical evidence demonstrates that police have an important effect in deterring crime. However, increasing the number of policemen is a costly policy. Therefore, this paper explores policy changes which exploit offender's ambiguity aversion in order to reduce crime without increasing the police force. Namely, empirical evidence suggests that criminals are better deterred by ambiguous detection. Thus, this paper analyses the ways to randomize the apprehension strategies to meet this end. Furthermore, it provides new evidence, based on a survey, that potential violators are largely not aware of policy changes. Inasmuch as the information regarding the intensified uncertainty is essential to its success, this paper discusses the possibility to increase criminals' awareness through the 'availability heuristic'.

Details: Rotterdam: Erasmus University, Rotterdam Institute of Law and Economics, 2014. 33p.

Source: Internet Resource: Rotterdam Institute of Law and Economics (RILE) Working Paper Series, No. 2014/11: Accessed April 23, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2202329

Year: 2014

Country: International

Keywords: Costs of Criminal Justice

Shelf Number: 135371


Author: Amnesty International

Title: The Human Rights Impact of Less Lethal Weapons and Other Law Enforcement Equipment

Summary: Law enforcement agencies around the world regularly misuse so-called "less-lethal" weapons and equipment for torture and their use can also have deadly consequences, Amnesty International and the Omega Research Foundation said as they launched a new briefing at the United Nations Crime Congress in Doha, Qatar. The Human Rights Impact of Less Lethal Weapons and Other Law Enforcement Equipment details the medical and other risks associated with a wide range of weaponry and equipment used in policing, including crowd control during demonstrations, as well as in prisons. And it recommends stricter controls or, in some cases, bans to stem future abuses. Amnesty International and Omega acknowledge the importance of developing less-lethal weapons, equipment and technologies, to reduce the risk of death or injury inherent in police use of firearms and other existing weapons. When used responsibly by well-trained and fully accountable law enforcement officials, less-lethal weapons can prevent and minimize deaths and injuries to assailants, suspects and detainees, as well as protect the police and prison officers themselves. But such equipment can have damaging and even deadly effects if it is not used in compliance with international human rights law and standards. It can also have a particularly harmful impact on some people, including the elderly, children, and pregnant women, or those with compromised health. Amnesty International has documented how law enforcement officials commit a wide range of human rights violations using such equipment - including torture and other ill-treatment in custody, as well as excessive, arbitrary and unnecessary use of force against demonstrators. The briefing covers five categories of equipment: Restraints: thumb cuffs, fixed cuffs, leg irons and restraint chairs; Kinetic impact devices: police batons and other striking weapons, spiked batons and kinetic impact projectiles including plastic bullets, rubber bullets, baton rounds and bean bag projectiles; Riot control agents: chemical irritants such as tear gas and pepper spray, including those dispensed from fixed installation dispensers; Electric shock devices: Tasers and other projectile electric shock devices, stun batons, stun shields and body-worn electric shock equipment such as stun belts; Acoustic devices and other technologies used to disperse crowds: audible sound wave technology that emits a deterrent noise, as well as water cannon. In cases where the items have a legitimate use, the organizations recommend controls to prevent their misuse. In the case of new technology which is not yet adequately tested, suspension pending further research by independent experts is recommended. Lastly, the organizations call for prohibitions on equipment which has no legitimate purpose which cannot be achieved by safer alternatives. Less-lethal weapons and restraints have developed considerably since the adoption of some international human rights standards relevant to law enforcement. For example, since the UN Basic Principles on the Use of Force and Firearms were adopted in 1990, a range of ever more advanced weaponry and other technologies have come into use by law enforcement agencies around the world. With the exception of the USA and the European Union, the trade in security and law enforcement equipment is either unregulated or subject to laxer restrictions than the trade in conventional weapons. Amnesty International and Omega are calling for stricter controls, including a licensing system for transfers of law enforcement equipment to safeguard against its potential abuse by the end user.

Details: London: AI, 2015. 30p.

Source: Internet Resource: Accessed April 23, 2015 at: http://www.amnestyusa.org/sites/default/files/human_rights_impact_less_lethal_weapons_doha_paper.pdf

Year: 2015

Country: International

Keywords: Crowd Control

Shelf Number: 135374


Author: Reuter, Peter

Title: Draining Development? Controlling Flows of Illicit Funds from Developing Countries

Summary: A growing concern among those interested in economic development is the realization that hundreds of billions of dollars are illicitly flowing out of developing countries to tax havens and other financial centers in the developed world. This volume assesses the dynamics of these flows, much of which is from corruption and tax evasion. What causes them, what are their consequences and how might they be controlled? The chapters by authors from a variety of backgrounds, including criminologists and practicing lawyers as well as economists, examine many dimensions of the phenomenon. For example, one chapter examines the political economy of the issue; to what extent is this the consequence of a more general failure of governance, so that it is more a manifestation of government weakness or can it be identified with a few specific features? Two other chapters examine major illegal markets (drug trafficking and human smuggling) to assess how they contribute to these flows. Other chapters are concerned with the corporate role in the phenomenon, particularly the possibility that transfer pricing (in which firms set prices for international trade among wholly owned affiliates) might play a major role in moving money illicitly.

Details: Washington, DC: The World Bank, 2012. 531p.

Source: Internet Resource: Accessed April 23, 2015 at: http://elibrary.worldbank.org/doi/book/10.1596/978-0-8213-8869-3

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 135376


Author: Inter-Agency Coordination Group against Trafficking in Persons (ICAT)

Title: The International Legal Frameworks concerning Trafficking in Persons

Summary: This paper characterizes key related elements of the anti-trafficking response today, highlights assumed features that still require development and recommends a number of prioritized actions to bring to bear provisions and legal obligations from different bodies of law and legal instruments that are relevant to the task of preventing human trafficking, protecting victims, and prosecuting perpetrators.

Details: Vienna: ICAT, 2012. 17p.

Source: Internet Resource: Accessed April 24, 2015 at: http://www.ungift.org/doc/knowledgehub/resource-centre/ICAT/ICAT_Policy_Paper_1_The_International_Legal_Instruments.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 135381


Author: Campaniello, Nadia

Title: Women in crime: Over the last 50 years women have been increasing their participation in the labor market and in the crime market

Summary: In recent decades, women's participation in the labor market has increased considerably in most countries and is converging toward the participation rate of men. Though on a lesser scale, a similar movement toward gender convergence seems to be occurring in the criminal world, though many more men than women still engage in criminal activity. Technological progress and social norms have freed women from the home, increasing their participation in both the labor market and the crime market. With crime no longer just men's business, it is important to investigate female criminal behavior to determine whether the policy prescriptions to reduce crime should differ for women. There is still a gender gap in the crime market, but the number of women committing crimes is on the rise, partly because other socio-economic gender gaps have been shrinking. Women have more freedom than in the past, and with that come more opportunities for crime. Despite increasing social equality, police and judicial systems still tend to be more lenient with female than with male offenders. Policies to reduce wage disparities between skilled and unskilled female workers, such as incentivizing female education, might reduce crime among disadvantaged women. Family support policies, by encouraging marriage and having children, might also reduce crime among women.

Details: Bonn: IZA World of Labor, 2014. 10p.

Source: Internet Resource: Accessed April 24, 2015 at: http://wol.iza.org/articles/women-in-crime-1.pdf

Year: 2014

Country: International

Keywords: Economics and Crime

Shelf Number: 135385


Author: Enste, Dominik H.

Title: The shadow economy in industrial countries: Reducing the size of the shadow economy requires reducing its attractiveness while improving official institutions

Summary: The shadow (underground) economy plays a major role in many countries. People evade taxes and regulations by working in the shadow economy or by employing people illegally. On the one hand, this unregulated economic activity can result in reduced tax revenue and public goods and services, lower tax morale and less tax compliance, higher control costs, and lower economic growth rates. But on the other hand, the shadow economy can be a powerful force for advancing institutional change and can boost the overall production of goods and services in the economy. The shadow economy has implications that extend beyond the economy to the political order. The shadow economy should not be seen as solely an economic problem, to be resolved by attacking the symptoms through higher fines and tougher controls. A country-specific analysis of causes and consequences is necessary in order to develop policy measures appropriate to the country's level of development. Policymakers should view illicit work as a signal of the need to decrease the attractiveness of the shadow economy through better regulation, a fair and transparent tax system, and more efficient institutions (good governance). Organized crime and illegal employment should nevertheless be fought through stricter controls and enforcement.

Details: Bonn: IZA World of Labor, 2015. 10p.

Source: Internet Resource: Accessed April 24, 2015 at: http://wol.iza.org/articles/shadow-economy-in-industrial-countries-1.pdf

Year: 2015

Country: International

Keywords: Financial Crime

Shelf Number: 135386


Author: Cabrejo le Roux, Amanda

Title: Tightening the Net: Toward a Global Legal Framework on Transnational Organized Environmental Crime

Summary: This report has been commissioned in the context of a collaboration between WWF and the Global Initiative against Transnational Organized Crime. The two organizations joined forces as they are both convinced of the need to open a broad debate concerning legal strategies to address environmental crime as a form of transnational organized crime. This report draws upon two previous research papers which highlighted the necessity to conduct a global legal review, exploring existing international legal frameworks and cutting-edge legal answers. The first paper was the Global Initiative's Baseline Assessment report ("The Global Response to Transnational Organized Environmental Crime", June 2014). The second paper was an internal paper prepared for WWF by the Environmental Law Centre of the International Union for Conservation of Nature (IUCN) written by Lydia Slobodian ("Addressing Transnational Wildlife Crime through a Protocol to the UN Convention against Transnational Organized Crime. A Scoping Paper", November 2014). Large extracts of this internal paper are incorporated into the present report. In this context, a draft report was written by the lead author, Amanda Cabrejo le Roux, who is a legal consultant with the Global Initiative and a researcher in International and Comparative Criminal Law1. An expert consultation meeting was then held in Geneva on 11 March 2015 to discuss preliminary findings presented in the draft report. This report benefits from this fruitful discussion and incorporates experts' comments. To sum up, this report is the result of a cross-sectoral fertilization of ideas and it is envisioned as a thought-provoking starting point for examining legal frameworks currently available to combat transnational organized environmental crime, at the global, regional and national levels. The study seeks not to be prescriptive but to stimulate an open discussion and to explore potential avenues regarding means of moving this important dialogue forward.

Details: Geneva: Global Initiative against Transnational Organized Crime, 2015. 51p.

Source: Internet Resource: Accessed April2 4, 2015 at: http://www.globalinitiative.net/download/global-initiative/WWF-Global%20Initaitive%20-%20Towards%20a%20Global%20Legal%20Framework%20on%20Env%20Crime%20-%20April%202015.pdf

Year: 2015

Country: International

Keywords: Offenses Against the Environment

Shelf Number: 135389


Author: Bondaroff, Teale N. Phelps

Title: The Illegal Fishing and Organized Crime Nexus: Illegal Fishing as Transnational Organized Crime

Summary: More than 90% of the world's fisheries are currently fully or over-exploited. A 2008 study estimated that the annual global illicit fishing catch was between 11 - 26 million tonnes, equal to more than 1,800 pounds of wild-caught fish stolen from the oceans every second. Despite this, illicit fishing is treated predominantly as a regulatory issue, a matter of different actors violating regulations, perhaps opportunistically or out of ignorance. However, as this report, "The Illegal Fishing and Organized Crime Nexus," commissioned jointly by the Global Initiative with The Black Fish, a Netherlands-based international organisation working to end illegal overfishing, now proves, illicit fishing practices are increasingly taking the form of a highly organized transnational crime. Rather than fishers accidentally violating regulations, this evidence-based account documents systematic and highly coordinated efforts to violate fishing laws and regulations around the world, putting the stability of marine ecosystems in serious jeopardy. We see how illicit fishers enable their activities through the violation of labour and environmental standards, corruption, bribery and violence. Case studies presented in the report also reveal an even darker side to illicit fishing - connected to human trafficking, illegal drug smuggling, serious violence and murder. It demonstrates the engagement of known mafia groups and criminal networks that profit from the practice. Despite this evidence, illicit fishing continues to be treated as a regulatory issue instead of as a form of transnational crime, and as such this practice is able to flourish with minimal enforcement or penalties. The report concludes that urgent and multilateral action is to be initiated to halt the growing multi-billion dollar illegal fish market. Recommendations advocate for the importance of urgently strengthening international regulations regarding shipping and vessels, creating domestic legislation designed to treat IUU fishing as a crime; dramatically increasing the punishments of offenders and significant enhancement of monitoring and enforcement are additional recommendations.

Details: Geneva, SWIT: Global Initiative against Transnational Organized Crime, 2015. 84p.

Source: Internet Resource: Accessed April 25, 2015 at: http://www.globalinitiative.net/download/global-initiative/GI%20Black%20Fish%20-%20Illegal%20Fishing%20and%20Organized%20Crime%20Nexus%20-%20April%202015.pdf

Year: 2015

Country: International

Keywords: Illegal Fishing

Shelf Number: 135390


Author: Fink, Naureen Chowdhury

Title: Thinking Outside the Box: Exploring the Critical Roles of Sports, Arts, and Culture in Preventing Violent Extremism

Summary: Unlike traditional law-enforcement and military responses to terrorism and conflict, countering violent extremism (CVE) efforts take a preventive approach aimed at reducing the appeal and recruiting potential of extremist groups. Recent attacks across the world, such as those in Ottawa and Sydney, for example, have highlighted concerns about smaller groups and individuals who may be acting with little or no formal association with a terrorist group. Consequently, preventive approaches that serve to enhance early identification and response capacities have gained greater traction. The relative youth of foreign fighters traveling from both Western and non-Western countries to Iraq and Syria has also highlighted the need for creative and innovative interventions. However, despite the increased emphasis on countering violent extremism by governments and international actors like the Global Counterterrorism Forum (GCTF), preventive approaches have continued to focus on measures associated with criminal justice, law enforcement, and legal responses. The use of sports, arts, and culture is sometimes considered by policymakers and practitioners as too peripheral to security issues and yet extremist groups effectively utilize them in their narratives and recruitment strategies. Efforts to prevent and counter violent extremism have sought increasingly to engage youth, communities, and marginalized groups, including women, and sports, arts, and culture offer much underutilized platforms to address the ideologies and root causes of violent extremism. As the 2015 U.S. National Security Strategy notes, in the long term, such efforts "will be more important than our capacity to remove terrorists from the battlefield." To foster a more inclusive discourse on multidimensional approaches to preventing and addressing violent extremism, the Global Center on Cooperative Security and Hedayah, the International Center of Excellence for Countering Violent Extremism, have partnered on a series of workshops to bring together governments, practitioners, and experts to share lessons learned and best practices, as well as to inform the development and implementation of CVE policies and programs. One of these workshops, held at Hedayah in Abu Dhabi in May 2014, focused on the role of sports, arts, and culture in CVE efforts, particularly on the ways they might enhance educational initiatives to directly or indirectly contribute to CVE objectives. The workshop drew on, and complemented, other discussions that focused on the role of education and the roles of families and communities in countering violent extremism and enhancing community resilience, and projects focused on counternarratives and strategic communication, among others. This brief explores the history of cultural diplomacy and use of sports in conflict situations and draws on discussions at the May 2014 workshop, as well as desk research, to examine relevant lessons learned and good practices for integrating sports, arts, and culture into CVE efforts. It concludes with some practical policy and programming recommendations for policymakers and practitioners focusing on countering violent extremism. It is important to note that sports, arts, and cultural interventions for CVE purposes should take into consideration the local push and pull factors leading to radicalization and recruitment into violent extremism as well as the local context where these policies and programs will be carried out. That is, sports, arts, and cultural programming do not necessarily have to be specifically related to countering violent extremism, but this policy brief outlines ways in which sports, arts, and culture could be effectively integrated into CVE programming.

Details: Washington, DC: Global Center on Cooperative Security, 2015. 13p.

Source: Internet Resource: Policy Brief: Accessed April 25, 2015 at: http://www.globalcenter.org/wp-content/uploads/2015/02/15Feb17_SAC_Brief_Hedayah_GlobalCenter.pdf

Year: 2015

Country: International

Keywords: Extremist Groups

Shelf Number: 135391


Author: Messick, Richard E.

Title: Corruption risks in the criminal justice chain and tools for assessment

Summary: This U4 issue paper provides policymakers in developing nations, their citizens, and U4's partners in the donor community with an overview of where corruption is most likely to arise in the investigation, prosecution, trial, and incarceration stages of the criminal justice process. Each chapter focuses on a specific stage, providing a summary of the principal decision makers involved, the tasks they perform, the most common types of corruption risk, the tools available to assess the risks, and, where sufficient experience exists, an evaluation of the usefulness of these assessment tools. While some basic risk management approaches are noted, the emphasis is on analysis and assessment of problems. Much of what is known about corruption at the different stages of the criminal justice system comes from developed country experiences. In many cases, however, the drivers of corruption are the same across all countries. In using the available set of tools to assess corruption risks in criminal trials and appeals, the greatest challenge for practitioners is finding the relevant parts of general assessment tools that assess the particular corruption risks. The paper concludes with an appeal for integrated corruption risk assessment tools and accessible reporting. Only a sector-wide lens will allow identification of the linkages and dependencies within the criminal justice chain, providing a basis for targeted reform efforts and a comprehensive anti-corruption strategy.

Details: Bergen, Norway: CHR. Michelsen Institute, Anti-corruption Resource Centre, 2014. 51p.

Source: Internet Resource: Accessed April 29, 2015 at: http://www.u4.no/publications/corruption-risks-in-the-criminal-justice-chain-and-tools-for-assessment/

Year: 2015

Country: International

Keywords: Corruption

Shelf Number: 135402


Author: Walmsley, Roy

Title: World Pre-trial / Remand Imprisonment List. Pre-trial detainees and other remand prisoners in all five continents)

Summary: The World Pre-trial/Remand Imprisonment List gives details of the number of prisoners held in pre-trial detention and other forms of remand imprisonment in 194 independent countries and dependent territories. It also shows the percentage of pre-trial/remand prisoners within each national prison population and the pre-trial/remand population rate (the number of pre-trial/remand prisoners per 100,000 of the national population). An estimate is also made of the total world pre-trial/remand population and attention is drawn to differences in the level of pre-trial/remand imprisonment across the world. The information is the latest available at the end of October 2007.

Details: London: King's College London, International Centre for Prison Studies, 2014. 6p.

Source: Internet Resource: Accessed April 29, 2015 at: http://www.prisonstudies.org/sites/prisonstudies.org/files/resources/downloads/wptril.pdf

Year: 2014

Country: International

Keywords: Pretrial Detention

Shelf Number: 135416


Author: Walmsley, Roy

Title: World Female Imprisonment List (2nd Edition)

Summary: This second edition of the World Female Imprisonment List shows the number of women and girls held in penal institutions, as pre-trial detainees (remand prisoners) or having been convicted and sentenced, in 212 prison systems in independent countries and dependent territories. It also shows the percentage of women and girls within each national prison population. The information is the latest available on the situation up to the beginning of 2012. In addition this second edition includes, where available, information about trends in the female prison population since 2000.

Details: London: International Centre for Prison Studies, 2012. 6p.

Source: Internet Resource: Accessed April 29, 2015 at: http://www.prisonstudies.org/sites/prisonstudies.org/files/resources/downloads/wfil_2nd_edition.pdf

Year: 2012

Country: International

Keywords: Female Inmates

Shelf Number: 135417


Author: Ohlenschlaeger, Jens Peter

Title: Reducing ship generated marine litter - recommendations to improve the EU port reception facilities directive

Summary: Marine litter is an increasing threat to the health of European and global marine ecosystems, with costly environmental, economic and social consequences. One of the sources to this pollution comes from ships, which legally or illegally discharge their solid waste (waste) into the sea.The EU Port Reception Facilities (PRF) Directive (2000/59/EC) regulates how ships discharge their waste to port reception facilities in the EU. The PRF Directive pursues the same aim as the MARPOL Convention, namely to reduce the amount of pollution in seas and coastlines of Member States caused by ship generated waste and cargo residues discharged into the sea by shipping. The Directive came into force in 2002 and an EMSA study published in 2012 has shown an increase in waste delivery to Member State ports since then. Despite this increase, illegal discharges of ship generated waste into the sea still take place. There are several explanations for this. These include insufficient control and inspection of the ships, and the difficulties in doing so, and a lack of appropriate economic incentives for waste delivery, or indeed, perverse incentives for waste delivery. Little transparency regarding the operation of the waste handling facilities and a lack of clarity in some ports regarding the role and responsibilities of the various actors involved may also be responsible. It has become apparent that the Directive is not prescriptive enough in these respects and clearer guidelines and stricter requirements would be desirable and beneficial for the ports. This is especially true regarding the cost recovery system, as the Directive leaves a lot of room for interpretation, which has resulted in many different systems being implemented across European ports, thereby creating an uneven playing field and allowing less than optimal systems to be implemented. This study recommends that the Directive should be revised to put a stronger focus on: - The applied cost recovery system (degree of indirect fee); - The efficiency of the waste notification system; - The port authority involvement in ship waste handling (taking responsibility, control and monitoring); - The "one stop shop" approach, and - The inspection regime in the port regarding waste delivery.

Details: London: Institute for European Environmental Policy, 2013. 35p.

Source: Internet Resource: Accessed April 29, 2015 at: http://www.ieep.eu/assets/1257/IEEP_2013_Reducing_ship_generated_marine_litter_-_recommendations_to_improve_the_PRF_Directive.pdf

Year: 2013

Country: International

Keywords: Illegal Dumping

Shelf Number: 135424


Author: Dufwenberg, Martin

Title: Legalizing Bribe Giving

Summary: A model of "harassment bribes," paid for services one is entitled to, is developed to analyze the proposal to legalize paying these bribes while increasing fines on accepting them. We explore performance as regards corruption deterrence and public service provision. Costs of verifying reports make the scheme more effective against larger bribes and where institutions' quality is higher. A modified scheme, where immunity is conditional on reporting, addresses some key objections. The mechanism works better against more distortionary forms of corruption than harassment bribes, provided monetary rewards can compensate bribers for losing the object of the corrupt exchange. Results highlight strong complementarities with policies aimed at improving independence and accountability of law enforcers.

Details: Stockholm: Stockholm School of Economics (SITE); Centre for Economic Policy Research (CEPR, 2013. 35p.

Source: Internet Resource: Working Paper no. 13: Accessed April 30, 2015 at: https://ideas.repec.org/p/igi/igierp/515.html

Year: 2013

Country: International

Keywords: Bribes

Shelf Number: 135426


Author: Brackenridge, Celia

Title: Child Exploitation and the FIFA World Cup: A review of risks and protective interventions

Summary: This review was commissioned by the Child Abuse Programme (CAP) of Oak Foundation, a large international philanthropic organisation. It forms part of CAP's effort to win societal rejection of practices such as the sexual exploitation of children and adolescents around major sporting events (MSEs), and to embed prevention and protection from exploitation as a permanent concern for global sports-related bodies. This review is intended to inform action in countries that host MSEs and to provide some suggestions on how hosting countries can avoid past pitfalls and mistakes in relation to child exploitation, especially economic and sexual exploitation. Importantly, it also acts as a call to action by those responsible for commissioning and staging MSEs, such as FIFA and the IOC, to anticipate, prepare for and adopt risk mitigation strategies and interventions. Positive leadership from these culturally powerful bodies could prove decisive in shifting hearts, minds and actions in the direction of improved safety for children. A three-pronged research design was adopted: more than 70 experts in NGOs, sport organisations and government departments were approached for interviews; a systematic search of relevant literature was conducted; and, several case studies were selected from past child protective interventions associated with MSEs. The work was intended to discover the extent of the evidence base supporting protective interventions associated with MSEs that address risk mitigation in general and child economic and sexual exploitation in particular. The many benefits of MSEs for child development related to learning, healthy lifelong physical activity, civic pride and multi-cultural sensitisation are well documented. These benefits should obviously be weighed against concerns about child exploitation and MSEs. The review found that: - some commercial enterprises associated with MSEs - both legal and illegal - still use child labour; - children are frequently victims of the community displacement typically associated with MSEs; - child sexual exploitation linked to MSEs appears to be hidden behind other social problems such as diverted services, family stress, poverty and domestic violence; - human trafficking for sexual exploitation associated with MSEs appears adult-focussed, responsive to advocacy interventions and difficult to measure. Where it does occur it is likely to mask harms to children. Whilst the risks of child exploitation were found to have increased during some of MSEs, the examples discussed all highlight the universal rarity of reliable empirical data concerning child exploitation around these events. In future, robust research designs, focused specifically on children, are essential in order to verify the many assertions that were uncovered. Responses to minimise the impact of risks for children associated with MSEs were found to be wide-ranging. It is evident from the literature, and from our consultations, that dedicated child-focussed responses are scarce. Very few programmatic or advocacy interventions are age-specific and most address general rather than particular risks. Also, human trafficking appears to overshadow all other risks in relation to the attention, resources and priority afforded to it by programmers, irrespective of the relative significance of this risk for children. There is very little material on programmes and advocacy related specifically to child labour, child sexual exploitation and displacement. This skew in the literature opens up interesting issues for future research. Importantly, it also masks the fact that children are all-too-often victims when adults close to them are exploited. So, whilst many of the initiatives described in the review are targeted at adults it should be recognised that they can also have important prevention benefits for children.

Details: London: Brunel University London, Brunel Centre for Sport, Health and Wellbeing, 2013. 38p.

Source: Internet Resource: Accessed April 30, 2015 at: http://www.brunel.ac.uk/__data/assets/pdf_file/0003/369273/Child-Protection-and-the-FIFA-World-Cup-FINAL.pdf

Year: 2013

Country: International

Keywords: Child Protection

Shelf Number: 135428


Author: Brackenridge, Celia

Title: Sport, Children's Rights and Violence Prevention: A Sourcebook on Global Issues and Local Programmes

Summary: UNICEF is the world's largest child protection agency. The work of UNICEF is delivered through diverse agencies and national settings. Frequently, sport is used by the agency as a mechanism for repairing broken communities after human conflicts or natural disasters. However, sport itself is by no means neutral when it comes to the safety and welfare of the child. In 2007 this issue was recognised as a gap in the provisions of UNICEF. To their credit, and thanks largely to the persuasive powers of Susan Bissell, then working at the UNICEF International Research Centre in Florence, Italy, the staff at UNICEF convened a roundtable of experts in research and policy on welfare in sport. Over the next few years, the group drew together a report on the state of evidence about violence to children in sport and a summary of available prevention policies. This report, authored by Celia Brackenridge (UK), Kari Fasting (Norway), Sandra Kirby (Canada) and Trisha Leahy (Hong Kong) was published as a United Nations Innocenti Research Centre Review in 2010 and entitled Protecting Children from Violence in Sport: A review with a focus on industrialized countries. It was not possible within that relatively short document to provide many details of the research and policy issues that it addressed. Hence it was agreed that a second, companion volume would be compiled to give interested readers further information and practical examples of both global and local projects to prevent violence to children in sport. For several reasons, that companion volume sat on the presses for some years. We have decided to publish it here in the state that it was left in 2008, to stand as a record of the issues at that time and to fill a gap in the ever-widening trail of literature about child rights and safety in sport. Inevitably, both science and practice have moved on in the intervening years. Several significant initiatives for child athlete welfare have started and the growth of scientific studies in this field has been exponential. As one example, the editors launched BIRNAW in 2010, a network of some 45 interested researchers, policy makers, sport organisations and other stakeholders who wish to advance the field, whose first publication is available as a free download (Brackenridge and Rhind, 2010, see Note 1 below). There are also now new websites, research projects and coalitions of advocates and scientists across the world that were not active before 2008. We make no apology for omitting these here: others are working on texts that will take the story forward from 2008. For our part, this book represents simply one step in recording the journey towards child safety in and through sport.

Details: London: Brunel University London, 2012. 202p.

Source: Internet Resource: Accessed April 30, 2015 at: http://www.brunel.ac.uk/__data/assets/pdf_file/0005/369293/2012-Sport-and-childrens-rights-edited-book.pdf

Year: 2012

Country: International

Keywords: Athletes

Shelf Number: 135429


Author: Dimant, Eugen

Title: A Crook is a Crook ... But is He Still a Crook Abroad? On the Effect of Immigration on Destination-Country Corruption

Summary: This paper analyzes the impact of migration on destination-country corruption levels. Capitalizing on a comprehensive dataset consisting of annual immigration stocks of OECD countries from 207 countries of origin for the period 1984-2008, we explore different channels through which corruption might migrate. We employ different estimation methods using Fixed Effects (FE) and Tobit regressions in order to validate our findings. Moreover, we also address the issue of endogeneity by using the Difference-Generalized Method of Moments (GMM) estimator. Independent of the econometric methodology, we consistently find that while general migration has an insignificant effect on the destination country's corruption level, immigration from corruption-ridden origin countries boosts corruption in the destination country. Our findings provide a more profound understanding of the socio-economic implications associated with migration flows

Details: Munich: Center for Economic Studies & Ifo Institute, 2014. 42p.

Source: Internet Resource: CESifo Working Paper no. 5032: Accessed April 30, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2518956

Year: 2014

Country: International

Keywords: Corruption

Shelf Number: 135433


Author: United Nations

Title: Handbook on Women and Imprisonment. 2nd edition, with reference to the United Nations Rules for the Treatment of Women Prisoners and Non-custodial Measures for Women Offenders (The Bangkok Rules)

Summary: The present Handbook forms part of a series of tools developed by The United Nations Office on Drugs and Crime to support countries in implementing the rule of law and the development of criminal justice reform. It is designed to be used by all actors involved in the criminal justice system, including policymakers, legislators, prison managers, prison staff, members of non-governmental organizations and other individuals interested or active in the field of criminal justice and prison reform. It can be used in a variety of contexts, both as a reference document and as a training tool. What the Handbook covers The main focus of the Handbook is female prisoners and guidance on the components of a gender-sensitive approach to prison management, taking into account the typical background of female prisoners and their special needs as women in prison (chapters 1 and 2). Three special categories of female prisoners have been included in chapter 2 of the Handbook: pretrial detainees, foreign national women and girls in prison (sections 13.1, 13.2 and 13.3). These three groups were selected because their vulnerability and special needs are particularly pronounced due to the cumulative effects of their status and gender. However, it is important to note that, according to Convention on the Rights of the Child-a legally binding instrument that most States have ratified or acceded to-States should only deprive a child of his or her liberty as a measure of last resort and for the shortest possible period of time (Art. 37 (b) CRC). In addition, girls and boys deprived of their liberty should be dealt with by a specialized juvenile justice system that promotes alternative measures to formal judicial institutionalization of girls should be avoided to the maximum possible extent, and separate strategies and policies in accordance with international standards need to be designed for the treatment and rehabilitation of this category of prisoners. The distinctive needs of minorities and indigenous peoples in terms of their access to gender and culture specific programmes and services are covered in chapter 2, as relevant. For more detailed guidance on the needs of women prisoners from ethnic and racial minority groups and indigenous peoples, as well as other groups, such as older women prisoners, women with disabilities and women under sentence of death, the reader should refer to the UNODC Handbook on Prisoners with Special Needs, which covers the needs of such prisoners, men and women. Reference will need to be made to both handbooks, when dealing with the situation of such categories of female prisoners. In view of the significant rise in the rate of women's imprisonment in many countries worldwide, the Handbook also provides an overview of measures that could be taken to reduce the female prison population (chapter 3). It puts forward some recommendations, taking into consideration the most common offences which lead to women's imprisonment and the harmful effects of imprisonment on the social reintegration of a large majority of female offenders. It must be emphasized that this section of the Handbook does not provide a comprehensive examination of the reasons for the growing rate of women's imprisonment in different regions and countries, nor detailed guidelines on how this challenge may be addressed in different contexts. Neither does it provide a thorough overview of the impact of women's imprisonment on their children, though this is a key concern that is repeatedly highlighted in the Handbook. It covers some of the issues that stand out in relation to women's increasing imprisonment, and a number of measures that can reduce their rate of incarceration, when it does not serve the purposes of justice or social reintegration. By highlighting and drawing attention to some key issues, this chapter aims to generate further research and the development of policies and strategies to reduce the female prison population in different countries and regions worldwide. In this context, readers may also wish to consult the UNODC Handbook of Basic Principles and Promising Practices on Alternatives to Imprisonment, the UNODC Handbook on Restorative Justice Programmes and the UNODC Handbook on Strategies to Reduce Overcrowding in Prisons, for further practical guidance. Recognizing the shortage of information on the background and characteristics of women offenders in many countries, chapter 4 addresses the need for research, planning, evaluation, public awareness-raising and training. This area is considered essential to improve the knowledge base about women offenders, to develop strategies and policies to best meet the needs of women offenders and their children, and to The United Nations General Assembly resolution on human rights in the administration of justice, adopted on 22 December 2003 called for increased attention to be devoted to the issue of women in prison, including the children of women in prison, with a view to identifying the key problems and ways in which they can be addressed. The United Nations General Assembly resolution 61/143 on the intensification of efforts to eliminate all forms of violence against women, adopted on 19 December 2006, stressed that 'violence against women' means any act of gender-based violence that results in, or is likely to result in, physical, sexual or psychological harm or suffering to women, including ... arbitrary deprivation of liberty, whether occurring in public or in private life", and urged States, among others, "[t]o review and, where appropriate, revise, amend or abolish all laws, regulations, policies, practices and customs that discriminate against women or have a discriminatory impact on women, and ensure that provisions of multiple legal systems, where they exist, comply with international human rights obligations, commitments and principles, including the principle of non-discrimination"; "[t]o take positive measures to address structural causes of violence against women and to strengthen prevention efforts that address discriminatory practices and social norms, including with regard to women who need special attention ... such as ... women in institutions or in detention...", among others; and to provide training and capacity-building on gender equality and women's rights for law enforcement personnel and the judiciary, among others. This Handbook aims to assist legislators, policymakers, prison managers, staff and non-governmental organizations to implement the provisions of the Bangkok Rules as well as the resolutions and recommendations of the United Nations to address the gender-specific needs of women prisoners. It also aims to increase the awareness about the profile of female offenders and to suggest ways in which to reduce their unnecessary imprisonment by rationalizing legislation and criminal justice policies, and by providing a wide range of alternatives to prison at all stages of the criminal justice process.

Details: New York: UNODC, 2014. 162p.

Source: Internet Resource: Accessed May 1, 2015 at: http://www.unodc.org/documents/justice-and-prison-reform/women_and_imprisonment_-_2nd_edition.pdf

Year: 2014

Country: International

Keywords: Correctional Administration

Shelf Number: 135445


Author: Amnesty International

Title: Death Sentences and Executions 2014

Summary: An alarming number of countries used the death penalty to tackle real or perceived threats to state security linked to terrorism, crime or internal instability in 2014, Amnesty International found in its annual review of the death penalty worldwide. The number of death sentences recorded in 2014 jumped by almost 500 compared to 2013, mainly because of sharp spikes in Egypt and Nigeria, including mass sentencing in both countries in the context of internal conflict and political instability. The USA continued to be the only country to put people to death in the region, although executions dropped from 39 in 2013 to 35 in 2014 - reflecting a steady decline in the use of the death penalty in the country over the past years. Only seven states executed in 2014 (down from nine in 2013) with four - Texas, Missouri, Florida and Oklahoma -responsible for 89 per cent of all executions. The state of Washington imposed a moratorium on executions in February. The overall number of death sentences decreased from 95 in 2013 to 77 in 2014. But there was also good news to be found in 2014 - fewer executions were recorded compared to the year before and several countries took positive steps towards abolition of the death penalty.

Details: London: AI, 2015. 76p.

Source: Internet Resource: Accessed May 4, 2015 at: http://www.amnestyusa.org/pdfs/DeathSentencesAndExecutions2014_EN.pdf

Year: 2015

Country: International

Keywords: Capital Punishment

Shelf Number: 135493


Author: Warner, Ann

Title: More Power to Her: How Empowering Girls Can Help End Child Marriage

Summary: The International Center for Research on Women's report, "More Power to Her: How Empowering Girls Can Help End Child Marriage", shows how and why investing in girls is critical to the global movement to end child marriage. The practice, which cuts across global cultures and religions, turns more than 14 million girls worldwide into child brides every year, violating their basic human rights - and hindering larger international development efforts. ICRW has been at the forefront of exposing the harms caused by child marriage, and identifying solutions to prevent it, for more than 15 years. In 2011, ICRW identified five promising strategies to prevent child marriage. With this latest study, ICRW set out to discover how programs in Bangladesh, Egypt, Ethiopia and India are working to empower both girls at-risk of child marriage as well as already married girls, and how empowerment leads to changes in knowledge, attitudes and practices. Based on four case studies - programs run by CARE (Ethiopia), BRAC (Bangladesh), Save the Children (Egypt) and Pathfinder International (India) - ICRW's findings show that girl-focused programs expand girls' ability to make strategic life choices by providing them with access to critical resources. The information, skills and social support that they gain help to instill a transformation within girls: increasing their self-awareness, their self-efficacy and their aspirations. They also introduce girls to alternatives to marriage, such as school and livelihood opportunities, and enhance their ability to influence key 'gatekeepers' in their lives, such as parents, husbands or community leaders

Details: Washington, DC: International Center for Research on Women, 2014. 34p.

Source: Internet Resource: Accessed May 4, 2015 at: http://www.icrw.org/sites/default/files/publications/More%20Power%20pages%20Web.pdf

Year: 2014

Country: International

Keywords: Child Marriage

Shelf Number: 135497


Author: Hussain, Qusai

Title: Alcohol and Other Drug Treatment within the Context of the Criminal Justice System: A Review of the Literature

Summary: This literature review is submitted to the Victorian Department of Human Services' Drugs Policy and Services Branch, as the first part of the Forensic Workforce Training Program project and has been written by the Research, Development and Projects division at Caraniche Pty Ltd. The purpose of the literature review is two-fold. First, it provides a critical review of current best practice in forensic alcohol and other drug (AOD) treatment and secondly, it provides an analysis of the methodologies employed in developing and delivering effective training programs for AOD workers in the criminal justice system. These findings in combination with the Training Needs Analysis undertaken by the Youth Substance Abuse Service will provide the framework for the development of the Forensic Workforce Training Program. The literature review consisted of three phases, namely on-line database searches, web-based searches and specific website searches. The searches were guided by three content areas comprising: 1. current best practice principles in the provision of drug and alcohol treatment. 2. current best practice principles applied by AOD workers when working with forensic clients. 3. the nature, scope and efficacy of training programs developed for AOD workers working with forensic clients.

Details: Melbourne: Victorian Department of Human Services' Drugs Policy and Services Branch, 2015. 34p.

Source: Internet Resource: Accessed May 4, 2015 at: http://docs.health.vic.gov.au/docs/doc/49D540596D8A390CCA25789A007E9034/$FILE/fwt-litreview.pdf

Year: 2015

Country: International

Keywords: Alcohol Abuse

Shelf Number: 135502


Author: Jeffray, Calum

Title: Underground Web: The Cybercrime Challenge.

Summary: The two papers in this Special Report examine the central role that cybercrime plays in modern society and how technological developments create new opportunities for criminals to exploit. Calum Jeffray's paper, Caught in the net: the law enforcement response to international cybercrime, surveys the strategic cybercrime landscape and illustrates that, despite calls for law enforcement to 'do more' to prevent and investigate cybercrime, the agencies involved are often hampered in acting due to jurisdictional issues or the complexity of the investigations. Tobias Feakin's paper, Cryptomarkets - illicit goods in the darknet, examines the emergence of the 'darknet', where trading in illicit goods and services in online black markets has become increasingly commonplace and exacerbates the problems that law enforcement already faces - tracing and prosecuting illegal activities online.

Details: Barton, ACT: AUS: Australian Strategic Policy Institute, International Cyber Policy Centre, 2015. 16p.

Source: Internet Resource: Special Report: Accessed May 4, 2015 at: https://www.aspi.org.au/publications/underground-web-the-cybercrime-challenge/SR77_Underground_web_cybercrime.pdf

Year: 2015

Country: International

Keywords: Black Markets

Shelf Number: 135504


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Human Rights and Criminal Justice Responses to Terrorism

Summary: The United Nations Office on Drugs and Crime is mandated to provide assistance to requesting countries in the legal and criminal justice aspects of countering terrorism. Its Terrorism Prevention Branch is leading this assistance delivery, primarily by assisting countries to ratify the international legal instruments against terrorism, incorporate their provisions in national legislation and build the capacity of the national criminal justice system to implement those provisions effectively, in accordance with the rule of law, including human rights. The Counter-Terrorism Legal Training Curriculum is one of the tools developed by the Branch for transferring the knowledge and expertise needed to strengthen the capacity of national criminal justice officials to put the universal legal framework against terrorism into practice. This knowledge transfer is pursued through: - Direct training of criminal justice officials - Train-the-trainers activities - Supporting national training institutions of criminal justice officials (schools of judges and prosecutors, law enforcement academies and other relevant institutions) to develop/ incorporate counter-terrorism elements in their curricula The Curriculum consists of several modules, each dealing with specific thematic areas of the legal and criminal justice aspects of countering terrorism. Its first five modules are: - Module 1. Counter-Terrorism in the International Legal Context (under preparation) - Module 2. The Universal Legal Framework Against Terrorism (issued) - Module 3. International Cooperation in Criminal Matters: Counter-Terrorism (issued) - Module 4. Human Rights and Criminal Justice Responses to Terrorism (this issue) - Module 5. Transport related (civil aviation and maritime) Terrorism Offences (being issued)

Details: New York: UNODC, 2014. 222p.

Source: Internet Resource: Counter-Terrorism Legal Training Curriculum MODULE 4 Accessed May 13, 2015 at: http://www.unodc.org/documents/terrorism/Publications/Module_on_Human_Rights/Module_HR_and_CJ_responses_to_terrorism_ebook.pdf

Year: 2014

Country: International

Keywords: Counter-Terrorism

Shelf Number: 135623


Author: Briggs, Rachel

Title: Policy Briefing: Countering the Appeal of Extremism Online

Summary: This report was commissioned by the Danish government and has been written by The Institute for Strategic Dialogue (ISD). It draws on discussions and conclusions from three days of meetings in Copenhagen in June 2013 with a range of relevant stakeholders to discuss ways of tackling online extremism. Co-organised by the Danish government and ISD, these international meetings involved academics, practitioners, central and local government policy makers, intelligence agencies and representatives from the private technology sector. The purpose of this paper is not to summarise those discussions, but drawing on them to offer a framework and series of recommendations for the ways that governments should structure and resource their responses to online extremism. The report offers the following findings and recommendations for governments: Extremists and violent extremists are using the Internet and social media to inspire, radicalise and recruit young people to their cause, whether as passive supporters, active enthusiasts or those willing to become operational. Not enough has been done to date to tackle the use of the Internet and social media by extremists and violent extremists. Most effort has been focused on negative measures, such as take-downs and filtering. While this is important, more focus and resources need to be invested to enable the silent majority to be better equipped to see through extremist propaganda, take control of online spaces, and actively push back on extremist messages. There are three areas where government should focus its efforts: Strengthening digital literacy and critical consumption among young people i. Governments should support mainstream digital literacy and critical consumption programmes through state schools and also support provision through youth and community organisations; ii. Governments should support at arm's length projects working with at risk youth to deconstruct extremist messages Increasing counter-messaging, counter-narrative and alternative narrative activity: i. Government strategic communications need to be centralised and coordinated, either through a dedicated unit or by assigning lead status to a single unit or department ii. Governments need to be realistic about the challenges that limit their ability to play an active 'messenger' role in counter-narrative, apart from in limited circumstances. iii. Governments should make significant investments in funding non-governmental organisations able to offer credible alternatives. Building the capacity of credible messengers: i. Governments should make significant investments in building the skills and expertise of the most effective counter-messengers to build their capacity in technology, production, communications, and campaigning. ii. Governments should use their convening power to bring the private tech sector to the table as their expertise can help the voices of credible messengers. iii. Governments should fund centralised information gathering to provide economies of scale and ensure that effective counter-messengers have the information they need to work, such as analytics, audience profiling, and the sharing of good practice in alternative and counter-narratives. iv. Government must work multilaterally to pool resources in this area, taking an active role in streamlining the cross-border exchange of expertise and lessons learned in capacity building.

Details: London: Institute for Strategic Dialogue, 2014. 23p.

Source: Internet Resource: Accessed May 14, 2015 at: http://www.strategicdialogue.org/Inspire_Radicalize_Recruit.pdf

Year: 2014

Country: International

Keywords: Counter-Radicalization

Shelf Number: 135638


Author: Stevens, Alex

Title: Drug Markets and Urban Violence: Can tackling one reduce the other?

Summary: One of the most worrying aspects of the global trade in illicit drugs is the link to urban violence. This is a leading cause of death in many countries. It is also linked to other harms, such as morbidity, reductions in economic growth and the opportunity costs of investments in incarceration, police forces and private security which attempt to control violence. This Report builds on other Beckley Foundation Drug Policy Programme publications that have looked at issues of crime prevention, treatment and drug markets (Stevens, Hallam, & Trace, 2006; Stevens, Trace, & Bewley-Taylor, 2005; Wilson & Stevens, 2008). Here we look specifically at the strength of the link between drug markets and urban violence, and policies and tactics that can be used to reduce this link.

Details: Oxford, UK: The Beckley Foundation, Drug Policy Programme, 2009. 15p.

Source: Internet Resource: Report Fifteen: Accessed May 14, 2015 at: http://www.beckleyfoundation.org/pdf/report_15.pdf

Year: 2009

Country: International

Keywords: Drug Markets

Shelf Number: 135647


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Transport-related (civil aviation and maritime) Terrorism Offences

Summary: The present Counter-Terrorism Legal Module focuses on transport-related (civil aviation and maritime navigation) terrorist offences. It was prepared by the Terrorism Prevention Branch of the United Nations Office on Drugs and Crime (UNODC). Its purpose is to assist practitioners and policymakers to identify, understand, and effectively incorporate and implement a set of international legal tools into national legislation. These legal tools are found in conventions and protocols developed to combat transport-related terrorism since the 1960s. The module introduces the relevant instruments, places them in their context so they can be correctly understood, analyses their content and explains their use. Training tools and aids are interspersed with the explanatory text so that the structure, terminology and practical application of the relevant instruments will be clear. The increasing ease and availability of international travel resulted in increased risks to aviation security in the 1960s and 1970s. Violent groups seeking international publicity for their political, ideological or other goals focused on international air travel as a vulnerable target, attacks on which produced immediate and intense publicity. Continuing into the 1980s terrorist groups seized or bombed international flights, murdered passengers, crew members and persons in airports and destroyed multiple aircraft. These actions were designed to gain visibility for the causes to which the various groups were dedicated, to intimidate and to coerce compliance with those groups' demands. Maritime transportation also became a target in the 1980s. A body of international law has been developed over the decades since 1963 to deal with these threats to the travelling public and the transport industry, both with regard to aviation and maritime transportation.

Details: New York: UNODC, 2014. 151p.

Source: Internet Resource: Counter-Terrorism Legal Training Curriculum Module 5: Accessed May 14, 2015 at: http://www.unodc.org/documents/terrorism/Publications/Module_on_Transport/13-89032_Ebook_from_DM_9-9-2014.pdf

Year: 2014

Country: International

Keywords: Aviation Security

Shelf Number: 135649


Author: Population Reference Bureau

Title: Female Genital Mutilation/Cutting: Data and Trends Update 2014

Summary: An estimated 100 million to 140 million girls and women worldwide have undergone female genital mutilation/cutting (FGM/C) and more than 3 million girls are at risk for cutting each year on the African continent alone. The PRB data sheet, Female Genital Mutilation/Cutting: Data and Trends Update 2014, contains the latest information available on the practice. This update of PRB's 2010 wallchart shows the practice is still present in at least 29 developing countries, although there is some evidence that younger generations in some countries may face a slightly smaller risk. FGM/C is generally performed on girls between ages 4 and 12, although it is practiced in some cultures as early as a few days after birth or as late as just prior to marriage. Typically, traditional excisors have carried out the procedure, but in some countries the procedure has been performed by medical professionals. FGM/C poses serious physical and mental health risks for women and young girls, especially for those who have undergone extreme forms of the procedure. According to a 2006 World Health organization study, FGM/C can be linked to increased complications in childbirth and even maternal deaths. Other side effects include severe pain, hemorrhage, tetanus, infection, infertility, cysts and abscesses, urinary incontinence, and psychological and sexual problems. FGM/C is practiced in at least 28 countries in Africa and a few others in Asia and the Middle East. The 29 developing countries included on this chart are the only ones where recent data have been systematically collected. FGM/C is practiced in households at all educational levels and all social classes and occurs among many religious groups (Muslims, Christians, and animists), although no religion mandates it. Prevalence rates vary significantly from country to country (from nearly 98 percent in Somalia to less than 2 percent in Uganda and Cameroon) and even within countries. Since the early 1990s, FGM/C has gained recognition as a health and human rights issue among African governments, the international community, women's organizations, and professional associations. Global and national efforts to end FGM/C have resulted increasingly in legislation targeting excisors, medical professionals, and families who perpetuate the practice; of the 29 countries on this wallchart, 25 now have laws or decrees related to FGM/C. Read a PRB blog about Feb. 6, the International Day of Zero Tolerance for FGM/C. In a number of countries, data collected in recent years reflect lower levels of cutting among girls ages 15 to 19, giving hope that abandonment efforts are yielding results.

Details: Washington, DC: Population Reference Bureau, 2014. 11p.

Source: Internet Resource: Accessed May 18, 2015 at: http://www.prb.org/pdf14/fgm-wallchart2014.pdf

Year: 2014

Country: International

Keywords: Female Genital Mutilation

Shelf Number: 135706


Author: Hallam, Christopher

Title: The International Drug Control Regime and Access to Controlled Medicines

Summary: The World Health Organisation estimates that some 5.5 billion people around the globe inhabit countries with low to non-existent access to controlled medicines and have inadequate access to treatment for moderate to severe pain. This figure translates to over 80 per cent of the world's population. Only in a small number of wealthy countries do citizens stand a reasonable chance of gaining adequate access to pain care, though even here room for improvement remains. According to the International Narcotics Control Board, recent data indicate that more than 90 per cent of the consumption of strong opioids takes place in Australia, New Zealand, Canada, the United States and Western Europe. In poor and developing nations, meanwhile, and even in several industrialised states, pain remains largely uncontrolled. Africa is the least well served continent for access to analgesia. The situation affects numerous conditions: pain may go untreated for those with cancer and with HIV/AIDS, for women in childbirth, for numerous chronic conditions, for those in post-surgical settings, those who are wounded in armed conflicts, those who have suffered accidents, and so on. Conclusions and recommendations - The unacceptable situation with respect to access to controlled medicines is another indicator that the time is right to consider the revision of the international drug control treaties in order to achieve a better balance between the twin objectives of restricting nonmedical drug use and ensuring access for medical and scientific requirements. - While the treaties remain unreformed, the INCB should achieve a better understanding of the manner in which its concerns with restricting diversion and nonmedical use impacts upon the system's public health imperatives, in particular the provision of access to essential medicines. - With this in mind, the INCB should refrain from interfering in those areas of the system that are mandated to WHO, such as the scheduling of substances under the 1961 and 1971 conventions. - The WHO has demonstrated courage and leadership in its defence of public health priorities in its scheduling recommendations. It should continue to adopt this position, and should receive the commendation and support of Parties and NGOs in so doing. - Again, until the treaties are reformed to represent a better balance between their twin objectives, the INCB should consider utilising Article 14 of the Single Convention in relation to those states who fail to progressively establish access to essential medicines. In most cases, the Article should be invoked together with Article 14 bis, which would allow supportive technical and financial steps to be taken to assist non-compliant countries. - Funds to assist governments to comply with their obligation along the lines of Article 14 bis could come from individual states with an interest, or from a special group fund dedicated to the purpose. - NGOs in the field of palliative care and those working to reform the drug control system should cooperate to bring about change.

Details: Amsterdam: Transnational Institute; London: International Drug Policy Consortium, 2014. 16p.

Source: Internet Resource: Series on Legislative Reform of Drug Policies No. 26: Accessed May 21, 2015 at: http://www.tni.org/sites/www.tni.org/files/download/dlr26-e.pdf

Year: 2014

Country: International

Keywords: Drug Control

Shelf Number: 135739


Author: Caulkins, Jonathan P.

Title: After the Grand Fracture: Scenarios for the Collapse of the International Drug Control Regime

Summary: Key Findings - Decriminalizing the possession of amounts of marijuana suitable for personal use has minimal repercussions beyond a nation's borders. But even one country's legalization of a commercial cocaine or heroin industry would affect global markets. - International prohibitions against cocaine and heroin create asymmetries. Production and transshipment concentrate in relatively few places that bear the bulk of the negative externalities created by the illegal production and international trade. - The impact of negative externalities has led to calls for altering the United Nations treaty framework and for individual nations to legalize outside of the existing framework. - Legalization of production in one country would attract productive activities (with their associated externalities) from the remaining illicit producers. This incentivizes current producing countries to encourage others to take the first step. - Legalization of transshipment in one country would attract transportation activities from existing jurisdictions where drugs remain illegal since it would reduce the need for traffickers to assume the risk of covert shipments or armed guards. - The impact of legalized transshipment of cocaine is different for the United States and for other regions of the world. As the United States shares a large porous border with Mexico, current covert smuggling networks would continue to operate. Transshipment to Europe and Asia would take place through regular trade routes, principally containers, given the distances involved. - If a European or Asian state with large porous land borders were to legalize transshipment, it would attract the bulk of cocaine transported to their region, producing covert smuggling networks similar to those currently existing on the U.S.-Mexico border.

Details: Washington, DC: Brooking Institute, 2015. 17p.

Source: Internet Resource: Accessed May 21, 2015 at: http://www.brookings.edu/~/media/Research/Files/Papers/2015/04/global-drug-policy/Caulkinsfinal.pdf?la=en

Year: 2015

Country: International

Keywords: Criminal Networks

Shelf Number: 135752


Author: Gorbanova, Mariya

Title: Speak Up: Empowering citizens against corruption

Summary: There are many barriers that prevent individuals from speaking up. Public trust in the ability of institutions to deal with corruption is low and reporting channels are often unclear or unreliable. Laws that protect whistleblowers are poorly implemented or non-existent and citizens often do not know their rights or how to effectively exercise them. This report provides examples of how Transparency International has worked with citizens to challenge the assumption that nothing can be done about corruption. Drawing primarily on the experience of seven European Union (EU) countries (the Czech Republic, Greece, Hungary, Ireland, Latvia, Lithuania and Luxembourg) participating in a multi-country project to empower citizens to speak up against corruption and wrongdoing, we highlight how we can work effectively with individuals to break the corruption cycle.

Details: Berlin: Transparency International, 2015. 36p.

Source: Internet Resource: Accessed May 21, 2015 at: https://www.transparency.org/whatwedo/publication/speak_up_empowering_citizens_against_corruption

Year: 2015

Country: International

Keywords: Fraud and Corruption

Shelf Number: 135755


Author: Prenzler, Tim

Title: Outsourcing of Policing Tasks: Scope and Prospects

Summary: This report examines developments internationally in private security, including the role of security in crime reduction. The review also examines forms of privatised and outsourced policing, and crime prevention partnerships between government and private security. Available evidence indicates that the current downward trend in crime internationally is largely attributable to the wide-scale uptake of security services across a range of institutional, commercial and domestic settings. Rising crime rates globally, and in Australia, appear to have been turned around, and long-term downward trends have set in across numerous offence categories. Growth in the security industry has included a variety of forms of outsourced and partnership policing. There is little evidence, internationally, of any deliberate and thorough-ongoing policies of privatisation of police departments. "Privatisation" has, instead, occurred primarily through market-driven growth in security. Growth has occurred in consumption by government, as well as private sector in-house and contract security. Despite the turnaround in crime rates, crime victimisation remains at high levels in many countries, including Australia. To address this problem, the traditional separation of police and private security needs to be systematically overcome through more organised and active partnerships. There are numerous case studies available of police working closely and successfully with private security, primarily through forms of crime prevention partnerships. These often involve local government and local business associations. Governments also need to make more of opportunities to reduce crime and reduce costs by installing advanced security systems and outsourcing security where a business case can be mounted. Governments also need to facilitate the general uptake of security in commercial, institutional and residential settings. This report concludes that there are enormous opportunities for governments, police and private security to achieve a synergetic effect in crime prevention. Although police and private security operate on different principles of private and public interests, contract arrangements and partnerships can be managed in ways that meet public interest criteria and satisfy democratic principles of accountability.

Details: Crows Nest, NSW: Australian security Industry Association, 2013. 67p.

Source: Internet Resource: Accessed May 23, 2015 at: https://www.asial.com.au/documents/item/13

Year: 2013

Country: International

Keywords: Crime Prevention

Shelf Number: 135774


Author: Smit, Hans

Title: Implementing Deforestation-Free Supply Chains - Certification and Beyond

Summary: Deforestation and forest degradation result in biodiversity losses and are major sources of greenhouse gas (GHG) emissions. In an effort to delink agricultural production from deforestation, a growing number of companies and national governments are making public commitments to purchasing products which do not cause deforestation. SNV's REDD+ Energy and Agriculture Programme (REAP) published a report examining the role of agricultural certification standards in effectively halting forest conversion and explores some of the key ingredients which need to be in place in order to establish deforestation-free supply chains. Based on the findings, a toolkit is provided which can help to address identified challenges. The package consists of three components: a traceability and monitoring system, our Inclusive Business approach and the SNV Siting Tool. The toolkit is designed to assist companies and governments in going beyond certification standards in order to bring about the systemic changes needed to delink agricultural production from deforestation and forest degradation at a landscape level.

Details: Ho Chi Minh City, Vietnam: SNV REDD+ Energy and Agriculture Programme, 2015. 39p.

Source: Internet Resource: Accessed May 23, 2015 at: http://www.snvworld.org/en/redd/publications/implementing-deforestation-free-supply-chains-certification-and-beyond

Year: 2015

Country: International

Keywords: Deforestation

Shelf Number: 135776


Author: Population Reference Bureau

Title: Ending Female Genital Mutilation/Cutting: Lessons from a Decade of Progress

Summary: Over the last 20 years, significant efforts have been made at the community, national, and international levels to address the issue of female genital mutilation/cutting (FGM/C). Numerous international and national policy statements have called for an end to FGM/C, which has been recognized as a violation of girls' and women's human rights and an obstacle to gender equality. Program planners have implemented countless interventions to educate and empower communities to abandon the practice. Researchers have conducted important studies and evaluations have contributed to a better understanding of the prevalence of the practice and the types of procedures carried out, as well as the reasons communities continue to practice it. Research and experience have begun to lift the veil on the intended and unintended impacts of many of the strategies undertaken over the years. The PRB report, Ending Female Genital Mutilation/Cutting: Lessons From a Decade of Progress, pulls together the lessons learned from the last decade and crafts a roadmap for how to strengthen future programs to end the practice. By looking back, policymakers and advocates will be better able to move forward decisively to create the conditions necessary to allow women and girls around the world to achieve their full potential. In the first decade of this century progress has been made toward abandonment. Studies have looked at the physical, emotional, and mental impacts of FGM/C. Research has deepened our understanding of the diverse reasons for the continuation of the practice, providing a framework for theories about the origins and social dynamics that lead to its perpetuation. Reflecting the work of dedicated advocates, today most practicing countries have passed laws banning the practice, and prevalence is beginning to decline in some countries.

Details: Washington, DC: PRB, 2014. 24p.

Source: Internet Resource: Accessed May 23, 2015 at: http://www.prb.org/pdf14/progress-ending-fgm.pdf

Year: 2014

Country: International

Keywords: Female Genital Cutting

Shelf Number: 135777


Author: Human Rights Watch

Title: Attacks on Health: Global Report

Summary: Violence and threats against health workers and facilities, along with interference with access to health care, impedes the ability of millions of people around the world from receiving the health services they need. Targeted attacks on health undermine and sometimes destroy health systems and infrastructure, force health workers to flee areas where they are most needed, and prevent children from getting essential vaccinations. Over the past several years, there has been increasing recognition that attacks on and interference with health care violate the right to health and, when they occur during armed conflict, international humanitarian law. However, impunity for attacks too often remains the norm.

Details: New York: HRW, 2015. 24p.

Source: Internet Resource: Accessed May 23, 2015 at: https://www.hrw.org/sites/default/files/related_material/HHR%20Attacks%20on%20Hospitals%20brochure%200515%20LOWRES.pdf

Year: 2015

Country: International

Keywords: Health Care Workers

Shelf Number: 135779


Author: Khan, Kashif Jamal

Title: Cutting the link between drugs and terrorists: countering major terrorist-financing means

Summary: : This thesis focuses on the Taliban and the PKKs involvement in the opium trade. This thesis fills a gap by illustrating the extent to which terrorist organizations use drugs to raise funds in five stages of the heroin trade, including cultivation, manufacturing, shipment, sale, and consumption. These two terrorist organizations have particular strengths and weaknesses that are identified in this thesis. This thesis proposes the counter narcoterrorism solution model, which displays both the convergent and divergent stages of the opium trade. The manufacturing stage is the only stage where the products converge into countable and targetable laboratories. This model suggests that targeting the opium manufacturing process is not only cost effective, but can also reduce the Talibans as well as the PKKs illegal funds.

Details: Monterey, CA: Naval Postgraduate School, 2013. 66p.

Source: Internet Resource: Thesis: Accessed May 26, 2015 at: http://calhoun.nps.edu/bitstream/handle/10945/34687/13Jun_Khan_Er.pdf?sequence=1

Year: 2013

Country: International

Keywords: Drug Trafficking

Shelf Number: 129680


Author: Tolan, Patrick

Title: Mentoring Interventions to Affect Juvenile Delinquency and Associated Problems: A Systematic Review

Summary: Mentoring has drawn substantial interest from policymakers, intervention theorists, and those interested in identifying promising and useful evidence-based approaches to interventions for criminal justice and child welfare outcomes (Grossman & Tierney, 1998; Jekliek et al., 2002). Mentoring is one of the most commonly-used interventions to prevent, divert, and remediate youth engaged in, or thought to be at risk for, delinquent behavior, school failure, aggression, or other antisocial behavior (DuBois, Holloway, Valentine, & Cooper, 2002, DuBois, Portillo, Rhodes, Silverthorn, & Valentine, 2011). One account lists over 5000 organizations within the United States that use mentoring to promote youth wellbeing and reduce risk (MENTOR/National Mentoring Partnership, 2006). Definitions of mentoring vary, but there are common elements. For the purpose of this review, mentoring was defined by the following 4 characteristics: 1) interaction between two individuals over an extended period of time, 2) inequality of experience, knowledge, or power between the mentor and mentee (recipient), with the mentor possessing the greater share, 3) the mentee is in a position to imitate and benefit from the knowledge, skill, ability, or experience of the mentor, 4) the absence of the role inequality that typifies other helping relationships and is marked by professional training, certification, or predetermined status differences such as parent-child or teacher-student relationships. A total of 46 topic and methodologically eligible studies (out of 164 outcome reports) were identified for inclusion in the meta-analysis on delinquency and outcomes associated to delinquency: aggression, drug use, and academic achievement.

Details: Oslo: Campbell Collaboration, 2013. 148p.

Source: Internet Resource: 2013:20: Accessed May 26, 2015 at: http://www.campbellcollaboration.org/lib/project/48/

Year: 2013

Country: International

Keywords: Evidence-Based Practices

Shelf Number: 129795


Author: Baird, Theodore

Title: Understanding human smuggling as a human rights issue

Summary: Governments typically view human smuggling as an issue of law enforcement and border control. Instead, human smuggling should be viewed as a human rights issue. Policy recommendations State responses to human smuggling: 1. Improve identification of who has been victimised by violence or fraud. This should be a key priority of law enforcement when apprehending 'survival migrants' using smuggling services. 2. Improve awareness of human smuggling through training of police, lawyers, members of civil society and the public. 3. Implement and enforce legislation that can provide protection to smuggled migrants. 4. Potential migrants should be educated in countries of origin, transit, and destination to raise their awareness of the risks involved as well as in how to contact police in case they find themselves subject to violence, fraud or kidnapping. 5. Improve the number of reception areas for minors without documents.

Details: Copenhagen: Danish Institute for International Studies, 2013. 4p.

Source: Internet Resource: DIIS Policy Brief: Accessed May 26, 2015 at: http://www.diis.dk/files/media/publications/import/extra/pb2013_understanding_human_smuggling_baird_webversion_1.pdf

Year: 2013

Country: International

Keywords: Human Rights

Shelf Number: 129736


Author: Hockenhull, J.C.

Title: A systematic review of prevention and intervention strategies for populations at high risk of engaging in violent behaviour: update 2002-8

Summary: Background: It has been estimated that violence accounts for more than 1.6 million deaths worldwide each year and these fatal assaults represent only a fraction of all assaults that actually occur. The problem has widespread consequences for the individual and for the wider society in physical, psychological, social and economic terms. A wide range of pharmacological, psychosocial and organisational interventions have been developed with the aim of addressing the problem. This review was designed to examine the effectiveness of these interventions when they are developed in mental health and criminal justice populations. Objective: To update a previous review that examined the evidence base up to 2002 for a wide range of pharmacological, psychosocial and organisational interventions aimed at reducing violence, and to identify the key variables associated with a significant reduction in violence. Data sources: Nineteen bibliographic databases were searched from January 2002 to April 2008, including PsycINFO (CSA) MEDLINE (Ovid), Cumulative Index to Nursing and Allied Health Literature (CINAHL), Allied and Complementary Medicine Database (AMED), British Nursing Index/Royal College of Nursing, International Bibliography of the Social Sciences (IBSS), Education Resources Information Center (ERIC)/International ERIC, The Cochrane Library (Cochrane reviews, other reviews, clinical trials, methods studies, technology assessments, economic evaluations), Web of Science [Science Citation Index Expanded (SCIE), Social Sciences Citation Index (SSCI), Arts & Humanities Citation Index (A&HCI)]. Review methods: The assessment was carried out according to accepted procedures for conducting and reporting systematic reviews, including identification of studies, application of inclusion criteria, data extraction and appropriate analysis. Studies were included in meta-analyses (MAs) if they followed a randomised control trial (RCT) design and reported data that could be converted into odds ratios (ORs). For each MA, both a fixed-effects model and a random-effects model were fitted, and both Q statistic and I2 estimates of heterogeneity were performed. Results: A total of 198 studies were identified as meeting the inclusion criteria; of these, 51 (26%) were RCTs. Bivariate analyses exploring possible sources of variance in whether a study reported a statistically significant result or not, identified six variables with a significant association. An outcome was less likely to be positive if the primary intervention was something other than a psychological or pharmacological intervention, the study was conducted in an penal institution, the comparator was another active treatment or treatment as usual and if a between-groups design had been used. An outcome was more likely to be positive if it was conducted with people with a mental disorder. The variation attributable to these variables when added to a binary logistic regression was not large (Cox and Snell R2 = 0.12), but not insignificant given the small number of variables included. The pooled results of all included RCTs suggested a statistically significant advantage for interventions over the various comparators [OR 0.59, 95% confidence interval (CI) 0.53 to 0.65, fixed effects; OR 0.35, 95% CI 0.26 to 0.49 random effects, 40 studies]. However, there was high heterogeneity {I2 = 86, Q = 279 [degrees of freedom (df) = 39], p < 0.0001}, indicating the need for caution in interpreting the observed effect. Analysis by subgroups showed that most results followed a similar pattern, with statistically significant advantages of treatments over comparators being suggested in fixed- and/or random-effects models but in the context of large heterogeneity. Three exceptions were atypical antipsychotic drugs [OR 0.21, 95% CI 0.16 to 0.27, fixed effects; OR 0.24, 95% CI 0.14 to 0.43, random effects; 10 studies, I2 = 72.2, Q = 32.4 (df = 9), p < 0.0001], psychological interventions [OR 0.63, 95% CI 0.48 to 0.83, fixed effects; OR 0.53, 95% CI 0.31 to 0.93, random effects; nine studies, I2 = 62.1, Q = 21.1 (df = 8), p = 0.007] and cognitive behavioural therapy (CBT) as a primary intervention [OR 0.61, 95% CI 0.42 to 0.88, fixed effects; OR 0.61, 95% CI 0.37 to 0.99, random effects; seven studies, I2 = 21.6, Q = 7.65 (df = 6), p = 0.26]. Limitations: The heterogenity of the included studies inhibits both robust MA and the clear application of findings to establishing improvements in clinical practice. Conclusions: Results from this review show small-to-moderate effects for CBT, for all psychological interventions combined, and larger effects for atypical antipsychotic drugs, with relatively low heterogeneity. There is also evidence that interventions targeted at mental health populations, and particularly male groups in community settings, are well supported, as they are more likely to achieve stronger effects than interventions with the other groups. Future work should focus on improving the quality of evidence available and should address the issue of heterogenity in the literature.

Details: Health Technology Assessment, 2012. 152p.

Source: Internet Resource: Health Technology Assessment, 16 (3). pp. 1-152: Accessed May 27, 2015 at: http://www.ncbi.nlm.nih.gov/pubmedhealth/PMH0046440/

Year: 2012

Country: International

Keywords: Crime Prevention

Shelf Number: 129974


Author: Baird, Theodore

Title: Theoretical Approaches to Human Smuggling

Summary: Human smuggling is a global phenomenon which has been difficult to research. Even though there is a large and growing literature on human smuggling, the literature lacks a systematic review of the major theoretical and conceptual approaches. This literature review is organized with the purpose of clarifying and understanding the diversity of theoretical approaches used in the study of migrant smuggling. Six separate theoretical approaches are identified and discussed: 1) organizational or network approaches, partially based on criminological models; 2) mode of crossing and likelihood of capture models, including estimations of migration rates and flows; 3) migration industry and market approaches; 4) global historical comparisons; 5) human rights responses which are concerned with legal arguments; and 6) gender approaches. The review concludes with suggestions for future research.

Details: Copenhagen: Danish Institute for International Studies, 2013. 29p.

Source: Internet Resource: DIIS Working Paper 2013:10: Accessed May 28, 2015 at: http://www.diis.dk/files/media/publications/import/extra/wp2013-10_ted_baird_human_smuggling_web_1.pdf

Year: 2013

Country: International

Keywords: Human Rights Abuses

Shelf Number: 129959


Author: Rawlings, Samantha

Title: Domestic Abuse and Child Health

Summary: We examine the effects of different kinds of domestic abuse (physical violence, emotional abuse, sexual abuse and physical violence while the victim is pregnant) on health outcomes of children born to victims. We use data on approximately 0.6 million children born between 1975 and 2013 across thirty different developing countries to investigate this relationship. Comparing children of abused mothers with otherwise similar children whose mothers were not victims of abuse, we find these children are 0.4 percentage points more likely to die within thirty days, 0.9 percentage points more likely to die within a year and 1.5 percentage points more likely to die within the first five years of being born. They are also 1.8 percentage points more likely to be low birth weight and, conditional on survival, 1.1 percentage points more likely to be stunted. Our findings allow us to quantify the costs of domestic abuse beyond costs borne directly by victims (or mothers) and gain a better understanding of the child health production process in a developing country context.

Details: Bonn: University of Reading; Institute for the Study of Labor (IZA), 2014. 49p.

Source: Internet Resource: IZA Discussion Paper No. 8566 : Accessed May 29, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2514759

Year: 2014

Country: International

Keywords: Children and Violence

Shelf Number: 135797


Author: Duffy, Rosaleen

Title: Mapping Donors: Key Areas for Tackling Illegal Wildlife Trade (Africa and Asia)

Summary: The wildlife trade is rapidly becoming a major international priority for governments, NGOs and private philanthropists (for example see White House, 2014). This is evidenced in the recent increase in funding made available for wildlife trade related projects. Recent examples include: USAID has committed US$40 million, Howard G. Buffett Foundation has committed US$25 million to South Africa for rhino protection, The Clinton Global Initiative has pledged to raise US$80 million (US$10 million from US Government already) and the UK Government has identified it as a major policy, with the announcement of a L10 million fund for tackling the trade. The authors mapped the donors and projects following a review of secondary and grey literature as well as relevant websites. However, such a search can only ever be considered as indicative rather than comprehensive: the range of organisations involved in conservation initiatives is complex and extensive. Further it is difficult to disaggregate projects that deal with specific species conservation (e.g. elephant or rhino) more generally, from those that specifically tackle the illegal wildlife trade - there is some inevitable overlap. The precise figures involved are also difficult to determine because of double counting, or confidentiality regarding donations. Finally, there are a number of ongoing projects which cannot be listed; they are necessarily confidential because they are aimed at uncovering various aspects of an illegal trade. From our initial assessment it appears there are four main areas: 1. Two types of funding for demand reduction initiatives: projects and campaigns 2. Funding related to rural development/CBNRM approaches is not well recognised as an effective policy response 3. Funding related to intelligence gathering, surveillance, capacity building in crime scene management is increasing as a priority 4. Funding related to counter-insurgency/security is an increasing priority Following on from this summary of current initiatives the authors were able to identify areas of weakness or gaps. 1. Need for greater understanding of the implications for community relations of a 'crime/enforcement' approach 2. Need for greater levels of intelligence sharing across states and within states 3. Rangers often coping with poor equipment and working conditions 4. The main approach to understanding the illegal wildlife trade is as a criminal activity rather than an issue of wider forms of (under)development 5. Little or no support for communities on how to resist intimidation 6. Need for capacity building in investigation skills/crime scene management 7. Need for governance related initiatives that address corruption, especially in state agencies. 8. Little understanding of the precise dynamics of demand markets/consumer motivation 9. Lack of attention to pre-emptive efforts in demand reduction and anti-poaching 10. Patterns of funding differ substantially between and within states 11. Little attention paid to transit states/networks

Details: London: UK Department for International Development, 2014. 40p.

Source: Internet Resource: Accessed May 30, 2015 at: http://eprints.soas.ac.uk/18868/1/EoD_HD151_June2014_Mapping_Donors%20Final%20Report.pdf

Year: 2014

Country: International

Keywords: Animal Poaching

Shelf Number: 135813


Author: Malinowska-Sempruch, Kasia

Title: The Impact of Drug Policy on Women

Summary: Across the globe, the failure of the war on drugs has come at an enormous cost to women. Punitive drug laws and policies pose a heavy burden on women and, in turn, on the children for whom women are often the principal caregivers. Prohibitionist policies impede access to and use of HIV and hepatitis C prevention and care services for everyone, but women and girls virtually always face a higher risk of transmission of these infections. Men suffer from unjust incarceration for minor drug offenses, but in some places women are more likely than men to face harsh sentences for minor infractions. Treatment for drug dependence is of poor quality in many places, but women are at especially high risk of undergoing inappropriate treatment or not receiving any treatment at all. All people who use drugs face stigma and discrimination, but women are often more likely than men to be severely vilified as unfit parents and "fallen" members of society. In drug policy reform debates and movements happening around the world, the rights of women should be a central concern. Less punitive laws for minor and nonviolent drug infractions are the best single means of reducing incarceration of women and thus incarceration-related abuse. Such measures will also reduce stigma and enable women to have better access to services in the community. The Impact of Drug Policy on Women elaborates on the gender dimension of drug policy and law, with attention to the burdens that ill-conceived policies and inadequate services place on women and girls.

Details: Washington, DC: Open Society Foundations, 2015. 24p.

Source: Internet Resource: Accessed September 2, 2015 at: http://www.opensocietyfoundations.org/sites/default/files/ungass-impact-drug-policy-women-20150507.pdf

Year: 2015

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 135851


Author: Kasane Conference

Title: London Declaration on Illegal Wildlife Trade: Review of Progress

Summary: Heads of State, ministers and officials from 31 governments meeting today in Kasane reaffirmed their determination to scale up their response to the global poaching crisis, and adopted crucial new measures to help tackle the unprecedented surge in illegal wildlife trade. During the one-day meeting, governments reported on their progress since the London Conference on Illegal Wildlife Trade in February last year, when 41 countries and the EU agreed to take urgent and decisive action to combat wildlife crime, which threatens national security and sustainable development as well as populations of iconic species, such as elephants, rhinos and tigers. Key successes in the past year include increased levels of law enforcement action, especially in Africa, which have led to a rise in ivory seizures, while some countries have started to improve their domestic wildlife-related legislation. Last month, 13 tiger range countries in Asia committed to a zero poaching framework and toolkit, which could be used as a blueprint for curbing poaching worldwide.

Details: s.l.: Kasane Conference on the Illegal Wildlife Trade, 25th March 2015, 2015. 49p.

Source: Internet Resource: Accessed June 3, 2015 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/415690/review-progress-kasane-conf-150317.pdf

Year: 2015

Country: International

Keywords: Animal Poaching

Shelf Number: 135867


Author: Adams, Tani Marilena

Title: Chronic violence and non-conventional armed actors: a systemic approach

Summary: The phenomenon of "non-conventional armed violence, which refers to the hybrid forms of organised violence that emerge outside or alongside traditional armed conflict, is best understood through a more systemic understanding of violence. Many groups and individuals identified as part of the "nonconventional" phenomenon form part of a larger, self-reproducing system of chronic violence. These systems are driven by a complex combination of structural factors and behaviours, cultures, and practices that undermine human development in predictable ways. In short, chronic violence underpins the spread of the hybrid armed groups and factions that are now the focus of international attention in various regions. As a result, policymakers and practitioners must move beyond the current emphasis on normative approaches that are focused narrowly on security and justice to a broader array of strategies rooted in an understanding of the complex social forces that drive these patterns of behaviour. This requires a shift from single-issue approaches to more systemic multifocal processes; transcending the objective of violence reduction to focus on helping affected communities and groups to "thrive"; combining national-level top-down approaches with micro-level bottom-up strategies; and ensuring that the destructive dynamics of trauma are fully integrated into analysis and programming.

Details: Oslo: Norwegian Peacebuilding Resource Centre, 2014. 11p.

Source: Internet Resource: Accessed June 3, 2015 at: http://www.clingendael.nl/sites/default/files/Adams_NOREF_Chronic%20Violence_SEPT_NY%20FINAL.pdf

Year: 2014

Country: International

Keywords: Chronic Violence

Shelf Number: 135870


Author: Papademetriou, Demetrios G.

Title: Beyond Asylum: Rethinking Protection Policies to Meet Sharply Escalating Needs

Summary: With more than half of all registered refugees displaced for at least five years and forced displacement at levels unseen since World War II, there is growing recognition that the global protection system is failing both those it was designed to protect and the communities that offer refuge. Responsibility for providing protection is falling extremely unevenly on countries and communities closest to the regions of crisis. This reality undermines overall public support for the refugee system in countries of first asylum. But publics in wealthy countries in Europe and elsewhere that seemingly have "gold-standard" protection systems are also experiencing increasing "protection fatigue." A new report from the Migration Policy Institute's Transatlantic Council on Migration discusses the growing strains on the protection system before proposing a series of goals that national governments and international actors should pursue to facilitate the development of an innovative, comprehensive protection system that better meets the needs of today's refugees and host communities alike. In Beyond Asylum: Rethinking Protection Policies to Meet Sharply Escalating Needs, Transatlantic Council Convenor and MPI President Emeritus Demetrios G. Papademetriou urges policymakers to respond proactively to instability and the inevitable displacement before it becomes unmanageable-as seen with the rising flows crossing the Mediterranean in search of refuge in Europe, in Southeast Asia's Bay of Bengal and Andaman Sea, and elsewhere. Investment in sustainable livelihoods and better living conditions for both refugees and host communities in the crisis region; wider legal channels for protection and alternative ways for refugees to submit claims (such as external processing); and the development of fairer, more effective asylum adjudication, reception and return policies are all necessary elements, Papademetriou suggests. "The scale of current protection demands has made the need for policy innovations clear, even to those outside the humanitarian community, and has created an ideal opportunity to experiment," Papademetriou writes. Among the recommendations, the report urges policymakers to move beyond the traditional care-and-maintenance model of protection by finding ways to empower refugees to gain access to secure living situations and the means to support themselves as quickly as possible. Policymakers "need to consider refugees not just as victims in need of shelter, but social and economic actors with a need for individual fulfillment and opportunities, and the potential to contribute to their host communities through their skills, international networks, access to unique streams of aid and resources, and purchase of local goods and services," Papademetriou writes.

Details: Washington, DC: Migration Policy Institute, 2015. 19p.

Source: Internet Resource: Accessed June 4, 2015 at: http://reliefweb.int/sites/reliefweb.int/files/resources/TCM-Protection-CouncilStatement.pdf

Year: 2015

Country: International

Keywords: Asylum Seekers

Shelf Number: 135898


Author: Macaluso, Agnese

Title: Trapped in the City: Communities, Insecurity and Urban Life in Fragile States

Summary: Hague Institute Researcher Agnese Macaluso and Clingendael's Senior Research Fellow Ivan Briscoe coauthored a policy brief on the challenges that fast-growing cities in fragile and developing states need to face in tackling insecurity and violence. The brief builds on the expert event Big Cities: Sources of and Solutions to New Insecurities hosted by the Secretariat of the Knowledge Platform Security & Rule of Law in November 2014 at The Hague Institute for Global Justice. The meeting was intended to provide an opportunity for knowledge sharing and policy thinking on the impact of cities in fragile and conflict-affected environments, as well as to discuss possible donor responses to problems associated with urban development. A number of sessions brought together experts from different countries in the Global South, in order to discuss violence and insecurity in their urban dimension on the basis of concrete experiences. Furthermore, the discussion also sought to assess the value and impact of possible responses. Discussions benefited from the presentation of case studies from cities located in diverse geographical and cultural contexts, including Caracas, Karachi, Lagos, Nairobi and San Salvador - different in many ways, yet sharing similar social traumas and security concerns. A vital lesson that emerged from the discussion and participants' experiences is that understanding the real nature of urban insecurity requires stepping beyond the traditional analytical framework based on concepts such as legal and illegal, formal or informal, legitimate or illegitimate, and instead digging into the nuances and social adaptations undertaken in contexts of urban survival. In many urban contexts, the concept of crime is vague and difficult to define, since public institutions can be the main perpetrators of violence and gangs are relied upon to provide stability and security. The same ambiguity characterizes the most recent innovations to social problems that rapid urbanization has generated: while traditional governance approaches are often inadequate, high-tech solutions for urban dilemmas - often dependent on private sector involvement - pose new ethical and social challenges, and demand careful consideration of possible risks for the public interest. This brief builds on the insights from the seminar, and points to some of the more critical and controversial aspects of urban insecurity, above all in fragile and conflict-affected states. It explores relationship between violence, power and society in urban contexts, and aims to provide policy-relevant insights for the design of new approaches to urban governance.

Details: The Hague: The Hague Institute for Global Justice, 2015. 15p.

Source: Internet Resource: Accessed June 4, 2015 at: http://thehagueinstituteforglobaljustice.org/cp/uploads/publications/trapped-in-the-city-communities-insecurity-and-urban-life-in-fragile-states%20(2).pdf

Year: 2015

Country: International

Keywords: Gangs

Shelf Number: 135907


Author: Cheong, Damien

Title: Western Muslim Converts and Violent Extremism: Issues and Strategies

Summary: This commentary discusses Muslim converts in the West who are becoming involved in violent extremism and contends that community intervention and supportive counseling for converts could help prevent radicalism among such individuals. Islam, like many other religions, is not monolithic; "its form and expression vary from one Muslim to another and from group to group". For example, Indonesian Islam, while sharing similar tenets with say Pakistani Islam, is still different in many fundamental ways. This plurality can cause confusion in the convert, and in some cases, alienation, if the convert, while Muslim, is still excluded because he/she belongs to a different ethnic group. In fact a 2013 Oxford Analytica report identified feelings of personal emptiness and social isolation as a major causal factor of radicalization among Muslim converts. The study also argued that the resentment of "modernity, globalization and secular society"; the absence of formal education and training in Islamic doctrine and theology; and the interpretation of "Islamic ideology as a form of protest" were key push factors toward radicalization. The study found that "radicalization is usually the result of social interaction; it is less common for converts to self-radicalize in isolation. The process, which involves the convert developing a more extreme interpretation of his/her faith to legitimize or justify violence, generally takes months or years". It is for these reasons that increased psychological and community support for converts is necessary as it can enable them to become more knowledgeable about their new faith, more confident about their place in the world, and most importantly, more discerning about alternative interpretations of religious doctrine.

Details: Singapore: S. Rajaratnam School of International Studies (RSIS), 2014. 3p.

Source: Internet Resource: RSIS Commentary: Accessed June 4, 2015 at: http://www.rsis.edu.sg/rsis-publication/cens/co14242-western-muslim-converts-and-violent-extremism-issues-and-strategies/#.VXChWU9FDcs

Year: 2014

Country: International

Keywords: Extremist Groups

Shelf Number: 135911


Author: Mama Cash

Title: Who Counts? An Inclusive Vision for Ending Gender-Based Violence

Summary: In 2012, Mama Cash decided to examine how groups' struggles to end violence cut across our thematic and regional work areas. The groups we fund mobilise not only to resist gender-based violence in their communities and countries; they are also challenging the very definition of what violence is and who experiences it. This report highlights the strategies, challenges and lessons that emerged from in-depth information gathered from 27 groups Mama Cash has funded over the past three years. The report focuses on how organisations define and redefine violence by expanding commonplace (but often incomplete) understandings of what violence is and who experiences it, and it identifies effective strategies groups have used to counter and end violence. It also seeks to capture the challenges faced and lessons learned by those who seek to influence their communities, governments, and other social justice movements in their determination to advocate for the human rights of women, girls and trans people.

Details: Amsterdam: Mama Cash, 2013. 27p.

Source: Internet Resource: Accessed June 5, 2015 at: http://mamacash.org/content/uploads/2013/06/Mama-Cash-report_Who-Counts.pdf

Year: 2013

Country: International

Keywords: Abused Women

Shelf Number: 135912


Author: Narhi, Marianna

Title: The Future of Child Labour: Study of the worst forms of child labour in Bangladesh, Bolivia, India, Kenya, Peru, Tanzania and Uganda

Summary: This report is based on fieldwork carried out in three of the regions where Terre des Hommes Netherlands is active. The purpose of the research was to collect information on the worst forms of child labour by talking to stakeholders on different levels; from children, parents and employers to NGO's, police and the government. What kind of work do children do, why are they doing it, and why is it harmful to them? What is being done to eliminate child labour, what has been achieved and why does child labour prevail? What are recent shifts in child labour in these countries, and how are global trends affecting this? Running up to The Hague Global Child Labour Conference being hosted by the Dutch Ministry of Social Affairs and Employment, in close collaboration with the ILO in May 2010, Terre des Hommes is presenting some of the current statistics, trends, opinions and recommendations presiding amongst those involved with child labour in Bangladesh, Bolivia, India, Kenya, Peru, Tanzania and Uganda. Compiling this into one report makes it possible to draw parallels between regions and countries. The prevalence of child domestic labour, and the abusive and slave-like conditions under which much of it takes place, was apparent in all research areas. The connections between domestic labour and unconditional worst forms of child labour such as trafficking and prostitution are unavoidable, and add to the urgency of developing appropriate response s to the exploitation faced by millions of children in this most common of employment sectors. The commercial sexual exploitation of children remains widespread, and the role of boys is often not well understood. Urbanisation and large-scale rural to urban migration are leading to growing slums and increasing populations of invisible, unsupervised, vulnerable children. HIV/AIDS, climate change, and the global economic crisis are pushing more and more children into exploitative situations. Children often do not receive sufficient protection from their families, their communities and state protection mechanisms. Although school enrolment rates are increasing across the researched regions, many children remain without viable alternatives to working. Different cultural perspectives on child labour, and discrepancies in the approaches taken by various local, national and international actors, affect the responses to child labour and the impact these have. This report aims to contribute to the on-going discussion about how best to protect children from exploitation by collating information and viewpoints from various sources.

Details: The Hague: Terre des Hommes Netherlands, 2010. 119p.

Source: Internet Resource: Accessed June 5, 2015 at: http://www.terredeshommesnl.org/download/64

Year: 2010

Country: International

Keywords: Child Labor

Shelf Number: 129783


Author: Romanosky, Sasha

Title: Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

Summary: The State Department's Bureau of Democracy, Human Rights, and Labor (DRL), as part of its broader effort to protect and advance political and economic freedoms and human rights, champions the United States' strategy for cyberspace to advocate for fundamental freedoms of speech and association through cyberspace; empower civil society actors, human rights activists, and journalists in their use of digital media; and encourage governments to limit neither the freedom of expression nor the free flow of information. To this end, DRL funds the development of many cyber security and privacy software programs. However, there are trade-offs associated with any such investment. On one hand, security and privacy tools can provide safe, reliable, and anonymous Internet access to people who would otherwise be censored, filtered, or punished for communicating electronically. On the other hand, these tools could also be used to conceal or commit illegal activity. This report examines the portfolio of tools funded by DRL that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests. First, we note the benefits of these tools in promoting DRL's mission of Internet freedom across the world. Second, we examine their potential for, and examples of, their illicit use. Third, we consider the ability of comparable tools, not funded by the DRL, to be used for such purposes. And fourth, we examine safeguards and design and service models that could limit or restrict the use of the technologies for illicit purposes. The report concludes that DRL's support for Internet freedom tools has not made them more likely to be used for illicit purposes, relative to alternative technologies not funded by DRL.

Details: Santa Monica, CA: RAND, 2015. 84p.

Source: Internet Resource: Accessed July 9, 2015 at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR1100/RR1151/RAND_RR1151.pdf

Year: 2015

Country: International

Keywords: Cybercrime

Shelf Number: 135971


Author: Krisch, Maria

Title: Global Strategies to Reduce Violence by 50% in 30 Years. Findings from the WHO and University of Cambridge Global Violence Reduction Conference 2014

Summary: Is it possible to cut worldwide levels of interpersonal violence in half within the coming 30 years? This question was at the centre of the first Global Violence Reduction Conference 2014, jointly organised by the Violence Research Centre at the University of Cambridge and the World Health Organization. The conference lured experts out of their comfort zone, asking to reflect on big strategies to reduce violence by 50% in the next 30 years. It brought together 150 leading representatives from international organisations, academia, civil society institutions and philanthropic organisations to discuss how scientific knowledge can contribute to the advancement of this violence reduction goal. The main message of the conference was that a global violence reduction by 50% in the next 30 years is achievable if policy makers harness the power of scientific evidence on violence reduction. This report outlines important ideas presented at the conference that could help to reach this goal and groups them into six key policy recommendations: 1. TACKLE THE BIGGEST PROBLEM AREAS FIRST: FOCUS ON LOW- AND MIDDLE-INCOME COUNTRIES, HOT SPOTS AND TOP VIOLENT CITIES 2. STOP THE REINVENTION OF THE WHEEL: DISSEMINATE, ADAPT AND REPLICATE BEST PRACTICES GLOBALLY 3. HARNESS THE POWER OF BIG DATA IN VIOLENCE REDUCTION: DEVELOP DATA SCOPE, ACCESS AND STANDARDS 4. PROTECT THE MOST VULNERABLE: FOCUS ON CHILDREN, YOUTH AND WOMEN 5. INSTITUTIONAL CONTEXT MATTERS: IMPROVE LEADERSHIP, GOVERNANCE AND POLICIES FOR VIOLENCE PREVENTION 6. THE WHOLE IS BIGGER THAN THE SUM OF ITS PARTS: CREATE GLOBAL STRATEGIC ALLIANCES TO PREVENT VIOLENCE

Details: Cambridge, UK: University of Cambridge, 2015. 74p.

Source: Internet Resource: Accessed July 9, 2015 at: http://www.vrc.crim.cam.ac.uk/VRCconferences/conference/violencereductionreport

Year: 2015

Country: International

Keywords: Crime Prevention

Shelf Number: 135984


Author: Willebois, Emile Van der Does de

Title: Nonprofit Organizations and the Combatting of Terrorism Financing: A Proportionate Response

Summary: One of the ways in which terrorist organisations raise and transfer funds, is by using non-profit organisations (NPOs). Ever since the adoption of the Special Recommendation VIII on the abuse of NPOs for Terrorism Financing purposes by the FATF in 2001, countries have struggled to find a proper way to address this potential terrorism financing risk. In many important ways however, the work of NPOs deal with the conditions conducive to the spread of terrorism, so it is essential that in trying to address one aspect of the terrorist threat - terrorism financing - we do not inadvertently diminish the impact of other ways of tackling the issue. This article argues that in discussing the threat and how to address it, policy-makers need to be specific, not tainting the whole sector with the same brush. Virtually all governments already interact with the NPO sector and those avenues should be used for dealing with this issue - it is inefficient and ultimately counterproductive to devise an entirely new regulatory framework. The ultimate objective is to enhance the transparency of the sector- the people in charge of NPOs, their sources of funds and particularly the way those funds are spent. That aim serves a much wider purpose than just countering terrorism financing and touches on many aspects of civil society good governance that the sector itself and others have been debating for a long time. When devising public policy on this issue the contribution of the NPO sector to fighting terrorism be recognized and used to its full advantage. Moreover the sector's own stake in being "clean" and being so regarded by others should be acknowledged, thus making them an indispensable partner in drawing up such policies. For the same reason, self-regulation should be considered.

Details: Washington, DC: World Bank, 2010. 52p.

Source: Internet Resource: Accessed July 13, 2015 at: http://elibrary.worldbank.org/doi/pdf/10.1596/978-0-8213-8547-0

Year: 2010

Country: International

Keywords: Counter-Terrorist

Shelf Number: 135992


Author: Fahlman, Robert C.

Title: Elephant crime intelligence system assessment

Summary: This assessment concludes that individual nations as well as regional and transnational organizations now have severely limited to nonexistent capacities to effectively respond to growing threat levels. It proposes a networked intelligence-led strategy at national, regional, and transnational levels to more effectively control, reduce, and, more importantly, prevent the wholesale slaughter into extinction of the African elephant population within the next decade. It concludes by outlining the requirements for designing and implementing a long-term sustainable elephant crime intelligence system, including the required governance arrangements, and proposes the roles and functions that key organizations could play at the national, regional, and transnational levels. Currently, a robust intelligence system addressing elephant poaching and illegal trade of ivory at all phases within the intelligence process is either nonexistent or seriously limited in capacity (the key phases in the intelligence process are planning and direction; collection; evaluation; collation; analysis; reporting/dissemination/action). Therefore, the project examines the need for designing and implementing a long-term sustainable elephant crime intelligence system and governance model as well as assessing the roles and functions that key organizations could play at the national, regional, and international levels within such an intelligence system and accompanying governance model.

Details: Washington, DC: The World Bank, 2015. 73p.

Source: Internet Resource: Environment and natural resources global practice discussion paper; no. 4: Accessed July 13, 2015 at: http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2015/05/13/090224b082df9159/1_0/Rendered/PDF/Elephant0crime0ce0system0assessment.pdf

Year: 2015

Country: International

Keywords: Animal Poaching

Shelf Number: 135993


Author: Malby, Steven

Title: Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children

Summary: This Study on the effects of new information technologies on the abuse and exploitation of children was prepared pursuant to Economic and Social Council resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children, in which the Council expressed concern that increasingly rapid technological advances have created new possibilities for the criminal misuse of new information and communication technologies. The study is based primarily on open source research and the outcomes of an informal expert group meeting on ICT facilitated abuse and exploitation of children, held in Vienna from 23 to 25 September 2013. In accordance with Council resolution 2011/33, relevant information from the 2013 Comprehensive Study on Cybercrime prepared for the consideration of the open-ended intergovernmental expert group on cybercrime is also taken into account. The study is divided into four chapters and contains a glossary as an annex.

Details: New York: United Nations Office on Drugs and Crime, 2015. 76p.

Source: Internet Resource: Accessed July 13, 2015 at: https://www.unodc.org/documents/organized-crime/cybercrime/Study_on_the_Effects.pdf

Year: 2015

Country: International

Keywords: Child Protection

Shelf Number: 135996


Author: Gandilhon, Michel

Title: Chemical precursors, the unknown dimension of the world's illegal drug market

Summary: Precursor trafficking draws little attention as efforts are focused on seizures of finished products listed as narcotics. Yet, this trafficking is a reality that now touches all continents and makes use of all major global trade routes. For the services responsible for controlling chemical precursors and preventing their trafficking, the task is extremely complex because, in contrast with finished products, the production and commerce of substances involved in the production of the majority of illegal drugs is in fact perfectly legal. Furthermore, to circumvent the controls established by international conventions and regulations, dealers constantly adapt by using unclassified substances. After presenting an overview in the first section of the global situation, and in particular, the main trafficking routes, this issue will discuss the latest trends, and especially the challenges facing Europe with the appearance on the market of new precursors and pre-precursors. The third section will be dedicated to the resources employed by the international community to fight against this phenomenon.

Details: Saint Denis La Plaine Cedex: French Monitoring Centre for Drugs and Drug Addiction, 2014. 7p.

Source: Internet Resource: Drugs, International Challenges, no. 7: Accessed July 13, 2015 at: http://en.ofdt.fr/BDD/publications/docs/efdamgub.pdf

Year: 2014

Country: International

Keywords: Drug Markets

Shelf Number: 135998


Author: European Commission

Title: Mid-term review of the Cocaine Route Programme financed by the EU Instrument for Stability

Summary: The present evaluation is a review of the Cocaine Route Programme (CRP) 2009-2013 funded by the European Union (EU) Instrument for Stability (IfS), Long-term component, Global and trans-regional threats, conducted from November 2012 until June 2013. The CRP has a mandate to support law enforcement agencies and judicial authorities in third countries along the so called 'cocaine route', i.e. from the production countries in Latin America to Europe, via Central America, the Caribbean and West Africa. The overall objective is to enhance their capacity for international cooperation in the fight against international criminal networks, while fully respecting human rights. The budget of the CRP totals L34,916,9731 and has been allocated to eight self-standing projects in Africa and Latin America and the Caribbean (LAC): 1) AIRCOP I, II and III (Airport Communication Programme): to build drug-interdiction capacities via Joint Airport Interdiction Task Forces (JAITFs) at selected international airports in West Africa and Latin America and the Caribbean, and promote communication and intelligence sharing through real-time connection to Interpol's I 24/7 and the WCO CENComm. 2) AML-WA (Anti-money laundering activities in West Africa): to develop AML activities in the non-banking financial businesses and professions; to enhance Financial Intelligence Units (FIUs) in Ghana, Nigeria, Senegal and Cape Verde and promote liaison with the international community. 3) SEACOP I, II and III (Seaport Cooperation Programme): to set-up Joint Maritime Control Units (JMCU) in seaports in West Africa and develop regional intelligence and maritime cooperation. 4) WAPIS I and II (West African Police Information System): to support collection and analysis of police information in ECOWAS countries and Mauritania, increase police information exchange regionally and with the rest of the world through Interpol tools and services. 5) AMERIPOL I and II (Law Enforcement & Judicial Cooperation in Latin America): to strengthen exchange of information and intelligence between law enforcement and judicial authorities at regional level in Latin America and with West Africa and the EU. 6) GAFISUD I, II and III (Support to the fight against money laundering in Latin America): to strengthen the investigation and prosecution of money laundering in the non-banking financial sector of GAFISUD member countries (Latin America) and foster international cooperation. 7) PRELAC I and II (Prevention of the diversion of drugs precursors in the LAC region): to strengthen the capacities of national administrative control authorities to prevent the diversion of chemical precursors in 17 countries in Latin and Central America and the Caribbean. 8) CORMS I and II (Cocaine Route Monitoring and Support): to strengthen the trans-regional coordination, coherence and complementarity effect among the various CRP projects and any other relevant initiative, conducted by the EU, MS or other international organisations. The objectives of the evaluation are: (i) to provide an overall independent assessment of the CRP activities according to the five evaluation criteria endorsed by the OECD-DAC (relevance, effectiveness, efficiency, sustainability and impact), and to the European Commission (EC) specific evaluation criteria (EC added value and coherence); (ii) to verify, analyse and assess the integration and impact of cross cutting issues in the Programme, with a particular emphasis on human rights and governance aspects; (iii) to assess the overall relevance of the Programme in relation to the objectives of the IfS and the related IfS Strategy and subsequent Multiannual Indicative Programmes (MIPs). In addition, (iv) the review assesses the performance of contractors, (v) the institutional set up of the Programme and (vi) complementarity with other programmes, particularly COPOLAD ("Cooperation Programme between Latin America and the European Union on Anti-drugs policies") funded by the EU under the Development Cooperation Instrument (DCI). The review identifies key lessons and proposes practical recommendations for follow-up actions.

Details: Hemel Hempstead, Herts, UK: HTSPE Limited, 2013. 181p.

Source: Internet Resource: Accessed July 13, 2015 at: http://www.globalinitiative.net/download/drugs/global/EU%20-%20Mid%20Term%20Review%20of%20the%20Cocaine%20Route%20Programme%202013.pdf

Year: 2013

Country: International

Keywords: Cocaine

Shelf Number: 136003


Author: Tjong Tjin Tai, Eric

Title: Duties of care and diligence against cybercrime

Summary: - The present report is an exploratory investigation of whether contributory parties other than criminals and private individuals may have legal duties to help combat cybercrime. The scope is limited to four jurisdictions (The Netherlands, U.S.A., Brazil, and Czech Republic) and three specific topics of cybercrime: security of hardware and software, ransomware, and DDoS attacks. The focus is on a legal analysis, preceded by a brief factual description, and closing with tentative suggestions for improvement. - The causes and incidence of the three topics of cybercrime discussed in this research are tied up with global networks of communication, whereby purely local national government intervention may be insufficient to effectively fight cybercrime. In the relevant literature it is generally suggested that public-private partnerships would be required for combating cybercrime. - The approach of duties of care and diligence is a regulatory mechanism in which the focus is on private action with public encouragement. It relies on fostering practices that develop their own implicit standards and culture. - Specific parties such as Internet Service Providers (ISPs), software vendors, and businesses that are the victim of cybercrime are, in principle, well positioned to take actions against cybercrime. Albeit significant effort is taken by many companies, these efforts as a whole do not appear to have sufficient effect. The existing standards for action appear to be insufficiently specific. In addition, particular companies within these categories may do less than is possible, due to several causes. - ISPs in general have no legal duty to act to take preventive actions against cybercrime. They are generally exempt from liability as long as they remain passive to the content they transmit. Voluntary action by ISPs is to some extent discouraged by legal principles such as the rights to privacy and freedom of expression and the principle of net neutrality. The Netherlands has relatively detailed administrative rules regarding ISPs, compared to other jurisdictions. - Software vendors may have a limited duty to provide secure software, but their actual liability is insignificant as the result of limitation clauses. An exception is Brazil, which does have a form of product liability for software. Vendors have economic disincentives (a premium on being first to market with new functionality, and lack of user discrimination towards software security) against spending more effort for increasing software security. There is no administrative supervision for the software sector in general. - Businesses have, to some extent, a legal duty to prevent security breaches and unavailability of service through DDoS attacks. Customers have limited remedies to businesses that breach their obligations. Further action by businesses may find obstacles in a lack of security awareness or sense of urgency, limits to perceived benefits of additional security efforts, and lack of expertise.

Details: Tilberg, NETH: Tilburg University, 2015. 208p.

Source: Internet Resource: Accessed July 13, 2015 at: https://www.gccs2015.com/sites/default/files/documents/Bijlage%202%20-%20Duties%20of%20care%20and%20diligence%20against%20cybercrime%20(1).pdf

Year: 2015

Country: International

Keywords: Cyber Security

Shelf Number: 136014


Author: Leach, Fiona

Title: School-related Gender-Based Violence A global review of current issues and approaches in policy, programming and implementation responses to School-Related Gender-Based Violence (SRGBV) for the Education Sector

Summary: Gender-based violence (GBV) is a global phenomenon that knows no geographical, cultural, social, economic, ethnic, or other boundaries. It occurs across all societies and represents a brutal violation of human rights, the worst manifestation of gender-based discrimination and a major obstacle to the achievement of gender equality. It is tolerated and sustained by social institutions, including the school, the very place where we expect our children to be safe and protected. It is a serious obstacle to the right to education and learning, with implications for the ways that people understand and enact their social lives and exercise their citizenship. The extent to which children are exposed to school-related gender-based violence (SRGBV) was brought to the attention of the international community by two studies commissioned by the United Nations Secretary-General in the past decade: the Global Study on Violence against Children1 and the In-depth Study on All Forms of Violence against Women, both published in 2006. The global presence of SRGBV seriously compromises the ability of UNESCO's Member States and the international community to meet commitments towards the provision of human rights. Major international frameworks, such as the UN Declaration of Human Rights, the Convention on the Elimination of all forms of Discrimination against Women (CEDAW), and the UN 4th World Conference on Women - Beijing Platform for Action denounce violence and call for measures to protect all human beings, especially women and girls, from all forms of violence. Article 19 of the 1989 Convention on the Rights of the Child (CRC) calls on State Parties to take all appropriate measures, including through education, to protect children from all forms of violence, including sexual abuse. UN Resolution 61/143 (2007) regarding the 'Intensification of efforts to eliminate all forms of violence against women', calls upon the international community, including the United Nations system, to enhance national efforts to eliminate violence against women and girls, including through 'the sharing of guidelines, methodologies and best practices'. Until the World Report on Violence against Children was published in 2006, however, little attention was paid to the school as a forum for violence against children. Since then, it has received increasing attention in national and international agendas. The priority theme of the 57th session of the Commission on the Status of Women (CSW), planned for March 2013, is the 'Elimination and prevention of all forms of violence against women and girls', with prevention and the provision of support services to victims/survivors being the main focus. In preparation for the CSW meeting, an experts meeting on GBV was held in Bangkok in September 2012, in order to explore ways of preventing and addressing GBV through a multi-sectoral approach with a focus on legal and policy guidelines. Education has been identified as one of the priority areas for strategic intervention. However, the transformative potential of schools to empower individuals, to champion gender equality and challenge violence against women and girls depends on a school environment that is itself safe and violence free. This review of current issues and approaches in policy, programming and implementation responses to SRGBV has been commissioned by the HIV and Health Education section in the Education Sector at UNESCO to contribute to the development of comprehensive evidence-informed policy guidelines for the prevention and elimination of SRGBV in and through education. Despite the call for action and the increasing awareness among governments, civil society and the international community of the scale of SRGBV, efforts to address it have been patchy and largely ineffective. The evidence base for the global scale and nature of the problem is limited and there is little collective intelligence to date on best practice in either prevention or response, e.g. on what makes intervention successful, how to measure success and how to scale up promising initiatives. Yet, we know that SRGBV continues to be a serious barrier to educational participation, especially of girls, and casts doubt on the school as an appropriate forum for educating young people about gender equality, non-violent behaviour and sexual and reproductive health. Schools have the potential to bring about change but this cannot be effective if they are simultaneously sites of gender inequality and violence. This review seeks to advance our knowledge and learning in this field, both in terms of what we know about the phenomenon and its impact on individuals, and on how best to address it, including through education. We start the review with a brief explanation of the conceptual framework and of the problematic nature of definitions of GBV, followed by a brief note on our methodology. The substance of the review follows, first summarising the research evidence on SRGBV by region, and then outlining approaches to policy, programming and implementation, with key messages for the education sector and for UNESCO's role in the post-MDG era.

Details: Paris: UNESCO, 2014. 101p.

Source: Internet Resource: Background research paper: Accessed July 15, 2015 at: http://www.unesco.org/new/fileadmin/MULTIMEDIA/HQ/HIV-AIDS/pdf/SRGBV_UNESCO_Global_ReviewJan2014.pdf

Year: 2014

Country: International

Keywords: Gender-Based Violence

Shelf Number: 136059


Author: Flynn, Matthew

Title: Bureaucratic Capitalism and the Immigration Detention Complex

Summary: The work of post-structuralist political philosopher Giorgio Agamben (1998,2005) has had a major influence on the study of immigration detention in Europe and elsewhere. In particular, his concepts homo sacer ("bare life") and "zones of exemption" depict the growth of immigration detention practices as an expression of sovereign power through inclusive exclusion. In other words, states demonstrate their power to confer rights upon their citizens by denying those rights to others. This paper argues that post-structuralist approaches to the study of immigration detention present a number of theoretical and conceptual problems. Post-structuralist analyses focusing on discourses divorced from actors present teleological problems in terms of theory. Additionally, poststructural accounts of detention centres using concepts such as homo sacer and Banoptican (see Bigo 2007) tend to conflate human rights and citizenship rights, which does not hold up empirically because many asylum seekers and irregular migrants still have access to legal redress. In contrast to post-structural accounts, the notion of "bureaucratic capitalism" developed by sociologist Gideon Sjoberg (1999) provides an analytical framework that is both critical and non-deterministic in explaining the motives of many actors involved in detention regimes. Specifically, immigration detention can be explained by employing conceptual frameworks used to assess the corporate-state nexus; human agency; rationalization processes like specialization and division of labour; hierarchy, responsibility, and blameability; and secrecy systems. Sjoberg's meso-level theory provides critical insights into detention regimes in the United States and Europe as well as the role of private- and public-sector interests seeking rents. Moreover, focusing on the organization of detention helps reveal the causes of human rights violations as well as their possible redress

Details: Geneva, SWIT: Global Detention Project, 2015. 22p.

Source: Internet Resource: Global Detention Project Working Paper No. 9: Accessed July 15, 2015 at: http://www.globaldetentionproject.org/fileadmin/publications/Matt_Flynn_GDP_Paper_2015.pdf

Year: 2015

Country: International

Keywords: Human Rights

Shelf Number: 136065


Author: PriceWaterhouseCoopers

Title: Economic Crime: A threat to business globally

Summary: It comes as no surprise to learn that economic crime - such as fraud, IP infringement, corruption, cybercrime, or accounting fraud - continues to be a major concern for organisations of all sizes, across all regions and in virtually every sector. But, as our 2014 Global Economic Crime Survey reveals, the real story is not so much that economic crime stubbornly persists. The real story is that economic crime is threatening your business processes, eroding the integrity of your employees, and tarnishing your reputation. Which is why this year's report, one of the broadest and most comprehensive economic crime surveys we have ever conducted - with over 5,000 global respondents - is focused not only on breaking down the facts, figures, trends and regions, but also on analysing how and where it may be affecting you. So you can address the issue from both a preventive and strategic perspective. We invite you to explore the rich trove of data, trends and analysis of economic crime uncovered by our 2014 Global Economic Crime Survey - and contact us to learn more

Details: s.l.: PWC, 2015. 57p.

Source: Internet Resource: Accessed July 15, 2015 at: http://www.pwc.com/gx/en/economic-crime-survey/downloads.jhtml

Year: 2015

Country: International

Keywords: Cybercrime

Shelf Number: 136069


Author: United Nations Office on Drugs and Crime. Independent Evaluation Unit

Title: In-Depth Evaluation of the Container Control Programme

Summary: Background and Context As containerized trade supply chain security requires significant knowledge in the technical fields of profiling and customs, UNODC reached out to the leading International organization in the field of customs, the World Customs Organization (WCO), based in Brussels, Belgium. Both Organizations have been successfully partnering from the onstage of the Programme. From a pilot designed in early 2003, and carrying out its initial activities in 2004 through the development of a Joint Port Control Unit in the port of Guayaquil in Quito, and further expanding to Pakistan, the CCP was operational in 12 countries1 at the time of the current evaluation. In brief, the Programme is managed by a Senior Programme Coordinator based in UNODC HQ, in charge of the overall programme management, finances and donor relations. In addition, a Programme Manager oversees the Global coordination of the implementation on WCO side, with a focus on all training activities of the Container Control Programme (CCP). The CCP relies on a network of highly qualified technical experts posted in the Regions and Countries where CCP deploys its activities . Main Objectives of the Programme The main objectives of the Programme, as per the initial design, are the establishment of inter agency units for the profiling of containers and the promotion of improved cooperation between all stakeholders operating in the given ports to improve the security in the international containerised supply chain. Profiling is the main technique used and it is based on risk indicators assessed through the review and analysis of cargo manifests, customs declarations and all relevant information, which is to be provided by all the stakeholders operating in port structures. This information is then shared within the network of CCP countries and within the ports to increase the knowledge in container security and international transport of illicit goods. Several tools were developed as part of this Programme to capture and to manage the knowledge acquired and are used by the CCP members and partners on a daily basis. To attain these objectives, the CCP has developed a process which starts with high level meetings between UNODC and the requesting party, and they are followed by the signature of Memoranda of Understanding (MoUs) between several Law Enforcement Agencies, in which they all agree to work jointly within a Joint Port Control Unit, uniting their efforts under the leadership of a selected Agency to become first among equals. Prior to the signature of MoUs, port assessments are conducted to determine the port security level, define the present port situation, understand the needs for the JPCUs under the implementation phase and define the level of trainings which need to be envisaged for such port units to become operational and carry out the profiling autonomously. In addition to the initial, basic trainings, more complex sessions are planned and delivered along with a mentoring and monitoring system. This system is based on the provision of designated trainers to follow the Joint Port Control Units (JPCU) teams throughout time and to accompany them in their learning slope until they can themselves train additional colleagues, and when ready, provide training to neighbouring countries. Outcomes of the Programme The initially planned outcomes of the Programme, which proved through the present evaluation to have been mostly successfully met, are three and are as follows: (a) Outcome 1 : Measurable results are achieved as a product of law enforcement officials working in the newly created inter-agency Port Control Unit (PCUs) consistently applying the acquired technical skills in the targeting, selection and inspection of high risk shipping containers. (b) Outcome 2: In the selected sea and dry ports, the inter-agency Port Control Units (PCUs) and the private sector cooperate to greater effect and develop the mutual trust and understanding necessary to strengthen and protect the containerized trade supply chain. (c) Outcome 3: New tools and mechanisms for the collection, sharing and analysis of information about container crime, in particular CEN/ContainerComm and ICPO-Interpol I-24/7, are used regularly and effectively at the national, regional and/or international level, as appropriate.

Details: Vienna: UNODC, 2013. 83p.

Source: Internet Resource: GLO G80: Accessed July 20, 2015 at: https://www.unodc.org/documents/evaluation/indepth-evaluations/2013/CCP_Final_Evaluation_Report_22NOV2013_IEU.pdf

Year: 2013

Country: International

Keywords: Cargo Security

Shelf Number: 136106


Author: Finklea, Kristin

Title: Dark Web

Summary: The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policy makers. Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users' web traffic through a series of other users' computers such that the traffic cannot be traced to the original user. Some developers have created tools - such as Tor2web - that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the "Hidden Wiki," which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money. While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or "deanonymized." Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods - mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site. Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online.

Details: Washington, DC: Congressional Research Service, 2015. 18p.

Source: Internet Resource: CRS:R55101: Accessed July 20, 2015 at: https://www.fas.org/sgp/crs/misc/R44101.pdf

Year: 2015

Country: International

Keywords: Computer Crime

Shelf Number: 136120


Author: Levitt, Matthew

Title: Countering Transnational Threats: Terrorism, Narco-Trafficking, and WMD Proliferation

Summary: Countering Transnational Threats: Terrorism, Narco- Trafficking, and WMD Proliferation, features six participants in this unique series: Homeland Security Advisor Kenneth Wainstein; Drug Enforcement Administration Assistant Administrator Michael Braun; National Intelligence Officer Ted Gistaro; Commerce Undersecretary Mario Mancuso; Chairman of the National Intelligence Council Thomas Fingar; and Department of Defense Assistant Secretary Michael Vickers. This Policy Focus, like the first volume, should provide valuable insights for the Obama administration regarding the nature of the transnational threats it has inherited. The lectures cover a wide range of counterterrorism-related topics, including the threat posed by weapons of mass destruction (WMD), the growing nexus between drugs and terrorism, the current state of al-Qaeda, and the nature of the threats that the United States will likely face by the year 2025. With speakers drawn from the law enforcement, intelligence, and military communities, this series provides a window into the variety perspectives on these issues.

Details: Washington, DC: The Washington Institute for Near East Policy, 2009. 42p.

Source: Internet Resource: Policy Focus no. 92: Accessed July 22, 2015 at: https://www.washingtoninstitute.org/uploads/Documents/pubs/PolicyFocus92.pdf

Year: 2009

Country: International

Keywords: Counter-Terrorism

Shelf Number: 136124


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Combating Transnational Organized Crime Committed at Sea

Summary: The United Nations Office on Drugs and Crime (UNODC) is the guardian of the United Nations Convention against Transnational Organized Crime (UNTOC) and its supplementary Protocols, and of the United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances. The United Nations Commission on Crime Prevention and Criminal Justice (CCPCJ), in its twentieth session in 2011 considered the problem of combating transnational organized crime committed at sea. Resolution 20/5 mandates UNODC to convene an expert meeting to "facilitate the investigation and prosecution of such cases by Member States, including by identifying gaps or possible areas for harmonization, and measures to strengthen national capacity, in particular in developing countries, to more effectively combat transnational organized crime". This Issue Paper is the product of discussions held in Vienna on 12-13 November 2012 at the expert group meeting convened pursuant to resolution 20/5 of the CCPCJ. It is also based on a desk review of research carried out on the issue, with particular emphasis on existing UNODC materials concerning transnational organized crime at sea and the United Nations Convention on the Law of the Sea. Its goal is to serve as a background document to the recommendations of the expert meeting, which will be presented to the CCPCJ at its twenty-second session to be held 22-26 April 2013. The Issue Paper underscores the common and interlinked emerging crimes at sea, including piracy and armed robbery at sea, migrant smuggling and trafficking in persons, drug trafficking, organized crime within the fishing industry and oil bunkering; it identifies the applicable maritime laws and regulations and their potential gaps as well as the relevant good practices and challenges in international cooperation at the legal and operational level with respect to crimes at sea; it discusses the problems concerning the investigation and prosecution of crimes at sea, including questions such as where capacity-building is needed.

Details: Vienna: UNODC, 2013. 63p.

Source: Internet Resource: Issue Paper: Accessed July 22, 2015 at: http://www.unodc.org/documents/organized-crime/GPTOC/Issue_Paper_-_TOC_at_Sea.pdf

Year: 2013

Country: International

Keywords: Drug Trafficking

Shelf Number: 136126


Author: Chatain, Pierre-Laurent

Title: Protecting Mobile Money against Financial Crimes: Global Policy Challenges and Solutions

Summary: Mobile Money is a booming industry in an increasing number of countries worldwide. The project results from increased demand for guidance and technical assistance from governments after the 2008 publication of an exploratory paper, Integrity in Mobile Phone Financial Services, which discussed mobile money and the application of international anti-money laundering (AML) and combating the financing of terrorism (CFT) standards. For most, how to craft a regulatory regime that expands access to financial services to the poor through the development of mobile phone financial services, but compliant with AML/CFT standards remains elusive. Specific AML/CFT regulations related to mobile money have not been issued in many jurisdictions, mainly due to the lack of awareness of the risks these services can pose if the right controls are not in place. Because the international standards for AML/CFT, the Financial Action Task Force's 40 + 9 Recommendations were designed and issued well before mobile money technology and business models became prevalent, even developed countries have begun to face challenges with their regulation. The project team aims to provide practical guidance to jurisdictions and the Industry on how to draft regulations and internal guidelines that allow them to comply with AML/CFT standards with enough flexibility for mobile money to thrive. Specifically, the paper (1) takes stock of new AML/CFT regulations and practices relevant to Mobile money, (2) design guidelines for drafting AML/CFT regulations that cover mobile money and (3) propose examples of best practices for the Industry to include AML/CFT in their own business model.

Details: Washington, DC: The World Bank, 2011. 195p.

Source: Internet Resource: Accessed July 23, 2015 at: http://elibrary.worldbank.org/doi/abs/10.1596/978-0-8213-8669-9

Year: 2011

Country: International

Keywords: Financial Crime

Shelf Number: 122702


Author: Sumner, Steven A.

Title: Prevalence of Sexual Violence Against Children and Use of Social Services -- Seven Countries, 2007-2013

Summary: Sexual violence against children erodes the strong foundation that children require for leading healthy and productive lives. Globally, studies show that exposure to violence during childhood can increase vulnerability to a broad range of mental and physical health problems, ranging from depression and unwanted pregnancy to cardiovascular disease, diabetes, and sexually transmitted diseases, including human immunodeficiency virus (HIV) (1,2). Despite this, in many countries, the extent of sexual violence against children is unknown; estimates are needed to stimulate prevention and response efforts and to monitor progress. Consequently, CDC, as a member of the global public-private partnership known as Together for Girls, collaborated with Cambodia, Haiti, Kenya, Malawi, Swaziland, Tanzania, and Zimbabwe to conduct national household surveys of children and youth aged 13-24 years to measure the extent of violence against children. The lifetime prevalence of experiencing any form of sexual violence in childhood ranged from 4.4% among females in Cambodia to 37.6% among females in Swaziland, with prevalence in most countries greater than 25.0%. In most countries surveyed, the proportion of victims that received services, including health and child protective services, was 10.0%. Both prevention and response strategies for sexual violence are needed. During 2007-2013, CDC and UNICEF, in partnership with host country governments, communities, and academic institutions developed and administered Violence Against Children Surveys (VACS) in seven countries. The first VACS were administered in Swaziland in 2007; most recently, VACS were administered in Malawi in 2013. Protocols were approved by host country and CDC institutional review boards. VACS are a multistage cluster survey with national coverage, administered by host country survey workers (trained by CDC and local partners) via household, face-to-face interviews. Surveys are initiated at the request of host-country governments. Informed consent/assent is obtained from all participants, special safeguards are incorporated for confidentiality, all participants receive a referral list of available services, and any victims desiring aid are referred for social services. This report focuses on lifetime childhood sexual violence (before age 18 years) among male and female respondents aged 18-24 years. Sexual violence included unwanted touching, unwanted attempted sex, pressured/coerced sex, and forced sex. Sex was specifically defined as vaginal/anal penetration by the penis, hands, fingers, mouth, or objects, or oral penetration by the penis except in Swaziland (penetration of vagina/anus by penis only) and Malawi (oral, vaginal, or anal sex or vaginal/anal object insertion). Patterns in the prevalence of any form of childhood sexual violence differed by country (Figure). Swaziland had high reported prevalence of sexual violence among females (37.6%). Reported sexual violence among females in Zimbabwe also was high (32.5%), yet Zimbabwe had a considerably lower reported prevalence of sexual violence against males (8.9%). Haiti had high prevalence rates for both males (21.2%) and females (25.7%). Cambodia reported the lowest rates for both females (4.4%) and males (5.6%). Among respondents who reported childhood sexual violence, the proportion who also reported receiving services, including health care, legal/security aid, or counseling support, was low for both males and females (Table 1). Swaziland had the largest proportion (24.0%) of females receiving services. In a few countries, data were readily available on the proportion of children who sought services in addition to the percentage who received services. In Malawi, 9.6% of female and 5.9% of male victims sought services. In Kenya, 6.8% of females and 2.1% of males attempted to seek services. Finally, in Tanzania, 16.2% of female and 10.8% of male victims sought services. Among all victims in these countries, the proportion receiving services was no higher than 11.7% (female victims in Tanzania). Completed acts of unwanted sex (i.e., pressured or forced penetrative sex acts) generally were higher among females than males (Table 2). Approximately 17.5% of females in Swaziland reported experiencing an episode of unwanted, completed sex. The lifetime childhood prevalence of unwanted, completed sex also was high among females in Zimbabwe (13.5%), Kenya (11.8%), and Haiti (9.0%).

Details: Atlanta: Centers for Disease Control and Prevention, 2015. 8p.

Source: Internet Resource: Morbidity and Mortality Weekly Report, June 5, 2015: Accessed July 24, 2015 at: http://www.cdc.gov/mmwr/preview/mmwrhtml/mm6421a1.htm

Year: 2015

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 136152


Author: Financial Action Task Force

Title: Money laundering and terrorist financing risks and vulnerabilities associated with gold

Summary: Gold provides an alternative means for criminals to store or move their assets as regulators implement stronger anti-money laundering and counter terrorist financing measures to protect the formal financial sector from abuse. The joint FATF-Asia/Pacific Group on Money Laundering report, money laundering / terrorist financing vulnerabilities associated with gold, identifies the many features that make gold attractive to criminals to use as a vehicle for money laundering: it has a stable value, it is anonymous and easily transformable and interchangeable. The highly lucrative gold market also presents proceed-generating opportunities for criminals at each stage, from mining to retailing. Understanding what makes gold - like other precious metals and stones, such as diamonds - attractive to criminals to legitimise their assets and to generate profits is essential in identifying this sector's money laundering and terrorist financing risks. This report provides a series of case studies and red flag indicators to raise awareness of the key vulnerabilities of gold and the gold market, particularly with anti-money laundering/ countering the financing of terrorism practitioners, and companies involved in the gold industry.

Details: Paris: FATF, 2015. 42p.

Source: Internet Resource: Accessed July 29, 2015 at: http://www.fatf-gafi.org/media/fatf/documents/reports/ML-TF-risks-vulnerabilities-associated-with-gold.pdf

Year: 2015

Country: International

Keywords: Gold

Shelf Number: 136240


Author: INTERPOL Environmental Crime Programme

Title: Assessment of Law Enforcement Capacity Needs to Tackle Forest Crime

Summary: INTERPOL recognises forest crime as a significant and growing problem that is undermining government policies to sustainably manage and protect forests. Through Project Leaf, INTERPOL is working with governments to further the skills, capabilities, and capacities of their law enforcement agencies to undertake intelligence-led law enforcement to combat forest crime. INTERPOL recognises, however, that in many timber-producing countries law enforcement officers face severe difficulties, including low wages, little training and poor equipment. This report has been undertaken by INTERPOL to assess the needs of those officers in the field, and identify areas that need to be addressed to strengthen their law enforcement capacity. International mechanisms, such as REDD+, and the international donor community can play an important role in providing countries with the funding and resources they need to build the capacity of their law enforcement agencies, through supporting capacity building and training programmes.

Details: Lyon, France: INTERPOL, 2013. 24p.

Source: Internet Resource: Accessed July 30, 2015 at: http://www.interpol.int/Crime-areas/Environmental-crime/Resources

Year: 2013

Country: International

Keywords: Forests

Shelf Number: 136275


Author: Hoare, Alison

Title: Tackling Illegal Logging and the Related Trade: What Progress and Where Next?

Summary: This report is the culmination of the multi-year 'Indicators of Illegal Logging' project, in which Chatham House has sought to monitor and understand what progress is being made in global efforts to improve forest governance and address illegal logging. The first assessment, published in 2010, presented findings from 12 countries. For the second and current assessment, which is the subject of this Chatham House report, another seven countries have been added, with individual reports on all 19 countries published in 2014-15. The countries were selected on the basis of their relative importance in the world's forest sector. The nine producer countries account for about 10 per cent of global exports of wood-based products (in roundwood equivalent [RWE] volume), while the 10 processing and consumer countries account for approximately half of all global imports of wood-based products.

Details: London: The Royal Institute of International Affairs, 2015. 79p.

Source: Internet Resource: Chatham House Report: Accessed August 3, 2015 at: http://www.chathamhouse.org/sites/files/chathamhouse/field/field_document/20150715IllegalLoggingHoare.pdf

Year: 2015

Country: International

Keywords: Forests

Shelf Number: 136280


Author: Foundation SCELLES

Title: Sexual Exploitation: Prostitution and Organized Crime

Summary: Today, prostitution is a phenomenon that surpasses borders. Flows of human beings go from one country to another, from one continent to another in order to be forced to practice prostitution or to purchase sex. Women, children, and men as well, under the pressure of distress and with the hope of a better future, leave their own country and get caught in the nets of traffickers who exploit them all over the world. In Cambodia, prostitutes come from China, Vietnam, and also from Eastern Europe. Australia, considered a well-known center of Asian prostitution, has prostitutes who are citizens of countries such as Thailand, Malaysia, South Korea, and China. Canada witnesses the arrival of victims coming from Asia, Africa, the Caribbean, Latin America, and Eastern Europe. And in France, in 2011, the dismantling of more or less 40 criminal networks in Paris, Caen, Bordeaux, Strasbourg brought rescued victims from Colombia, China, Ecuador, Nigeria, and Romania (among other countries). Prostitution today also involves flows of customers, mainly men, who cross borders in order to find attractive sexual offers. Not one continent is spared: Budapest, Riga, and Kiev became sex tourism destinations in the same way that Bangkok, Goa, or Manila did. And customers take advantage of all occasions: professional seminars, sporting events... In 2011, the number of prostitution ads on a well known website in the US increased almost of 136% during the week preceding the Superbowl. And during the annual fair for marine entrepreneurs in Hamburg, prostitution offers doubled along with the hourly rates for hotel rooms... Finally, thanks to the development of new technologies, prostitution completely ignores geographical borders. Henceforth, solicitation is done by SMS through the use of cellphones. Social networks are used to promote meetings for the purpose of paid sex. The routing of victims around the world is done through the systematic use of numerical exchanges. Customers carefully analyze websites comparing prices for sexual services. Traffickers recruit their potential victims on websites created by escort girls who think they are independent.

Details: Paris: Economica, 2012. 382p.

Source: Internet Resource: Accessed August 3, 2015 at: http://www.fondationscelles.org/pdf/rapport_mondial/sexual_exploitation_prostitution_Fondation_Scelles.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 136281


Author: Global Women's Institute

Title: School-Based Interventions to Prevent Violence Against Women & Girls

Summary: Violence against women and girls (VAWG) is a human rights violation that affects millions of women worldwide. According to the most recent estimates from the World Health Organization, more than one in three women globally have experienced physical and/or sexual partner violence or sexual violence by a non-partner at some point in their lifetime. Historically, the international community has focused heavily on responding to VAWG by providing support services for survivors. In recent years, however, there has been an increase in attention to interventions that aim to prevent violence before it starts. While the evidence base is still in a relatively early stage, rigorous evaluations have been conducted that demonstrate sustainable ways to reduce VAWG. Existing reviews suggest that there are common elements to these effective interventions: 1. Collaborating with entire communities (both men and women, boys and girls) in an interactive and participatory way during all phases of the intervention; 2. Engaging communities in a culturally sensitive and relevant manner to address structural drivers of violence, such as deeply entrenched social norms that perpetuate gender inequalities; 3. Using a multi-sectoral approach that is both comprehensive and integrated; 4. Exposing participants to subject matter through multiple intervention components over a sustained period (at minimum six months); 5. Conducting rigorous evaluations using mixed-methods approaches and disseminating results widely to inform current and future prevention programs. One of the most important sectors in the efforts to prevent VAWG is that of education. The intersection of education and VAWG is particularly relevant as schools are environments where children and adolescents learn and develop social and behavioral norms. By working with the education sector at multiple levels, we are presented with a unique entry point to help shape future generations' (both boys and girls) ideas of healthy relationships and balanced power dynamics. At the highest level, policy makers can develop and enforce laws and policies that outline how education systems will work in an integrated manner with other sectors to prevent VAWG. At the institutional level, administrators can implement training curricula for teachers and students that focus on fostering gender equitable attitudes and norms. Reforms can be instituted to create a safe environment for VAWG survivors to access necessary counseling and referral services. Finally, at the community level, teachers and school administrators can work with other influential community members to hold conversations, workshops, and other activities that will strengthen community knowledge and capacity to respond to and prevent VAWG, potentially leading to broader social change. It is important to recognize that in order for schools to be sites of social and intellectual empowerment, they, themselves, must be free of violence. Too often, schools are sites where violence is perpetrated, whether as corporal punishment on behalf of a teacher, dating violence among classmates, sexual assault, or bullying, among others. Girls are particularly vulnerable to violence. As of 2012, it was estimated that approximately 60 million girls are sexually assaulted on their way to or at school every year. In some countries, this translates to a higher probability for a girl to experience sexual violence than to become literate. Within the United States, a report for the National Institute of Justice revealed that approximately 14% of female students (aged 18-25) had experienced sexual violence during her time at university. Violence against women and girls at school is a pandemic issue that must be resolved globally in order to avoid and alleviate the detrimental effects of violence on individuals and communities. Concerted efforts must focus on breaking the intergenerational cycles of violence, poor education, ill health, and poverty.

Details: Washington, DC: Global Women's Institute, The George Washington University, 2015. 24p.

Source: Internet Resource: Evidence Brief: Accessed August 3, 2015 at: https://globalwomensinstitute.gwu.edu/sites/globalwomensinstitute.gwu.edu/files/FINAL%20EDUCATION%20BRIEF%20v6_24_15%20uneditable2.pdf

Year: 2015

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 136287


Author: INTERPOL Environmental Crime Programme

Title: Project LEAF: Vessel Tracking for Analysis of Timber and Fisheries Crime

Summary: Transnational organized environmental crime accounts for an estimated US$70-213 billion annually, mostly through lost resources and revenues in developing countries. Transnational organized environmental crime is comprised primarily of the illegal harvest, removal, and trade of timber, fishery resources, mineral or petroleum resources, and other wildlife. It also includes the illegal transport and subsequent dumping of toxic and electronic waste. Most transnational organized environmental crimes take place in developing countries with the assets and profits being funnelled through networks of temporary subsidiaries and shell companies. The profits primarily flow to national and foreign individuals and into finance havens, sometimes in industrialized countries. The elusive networks provide a major enforcement and investigative challenge, comprised sometimes of 5-10 levels of subsidiaries. The trade in illegal goods is characterized by large physical volumes being transported from multiple locations and hundreds of small companies through bottlenecks to ports and processing facilities. Virtually all resources extracted or traded illegally in large volumes are being transported by maritime shipping. This provides a unique opportunity to track and unravel these networks during the transportation stage, if the vessels can be tracked. This report provides an overview of the principal methodology involved in the tracking of vessels using existing tracking systems. The report is intended solely as a case study to provide an example of analysis that may be useful to countries seeking to analyse the behaviour of vessels engaged in illicit trade of natural resources. Some of the tracking systems used for this analysis include AIS (Automatic Identification System), data collected by satellite (including the Norwegian AIS-Sat 1 satellite and ground stations), as well as LRIT (Long Range Identification and Tracking) and VMS (Vessel Monitoring System). The tracking is used to demonstrate its application with reference to maritime trafficking of fish and timber and possible cases of trafficking in other commodities. The case studies are NOT explored in full. They are used to give examples of some of the opportunities that satellite tracking provide as a research and analysis tool for intelligence and information gathering and for evaluating the potential of further investigation by national authorities, as appropriate. Ships involved in illegal activities such as timber smuggling or illegal fisheries are often involved in a wider range of other smuggling and criminal activities, including support to pirates or the trafficking of drugs, arms, or people. The methodology set out in this report is also applicable to this full range of other criminal activities by sea. A range of analysis tools are available to identify suspicious or suspect vessels, including: „h sailing origin and destination of cargo; „h use of polygons over suspicious locations to identify traffickers; „h analysis of sailing patterns; „h covert loading or unloading at open sea, also known as trans-shipment; „h flanking manoeuvers to avoid detection by land-based tracking systems; „h visits to suspected trafficking routes en route to primary destinations; and „h ship flag and identity verification issues. This information, in turn, may be seen in conjunction with other forms of intelligence in order to assist countries in on-going enforcement or intelligence analyses.

Details: Lyon, France: INTERPOL, 2013. 40p.

Source: Internet Resource: Accessed August 3, 2015 at: http://onep-intranet.onep.go.th/files/5_INTERPOL%20Vessel%20Tracking%20for%20Analysis%20of%20Timber%20and%20Fisheries%20Crime.pdf

Year: 2013

Country: International

Keywords: Forests

Shelf Number: 136298


Author: Organization for Economic Co-operation and Development (OECD)

Title: Evading the Net: Tax Crime in the Fisheries Sector

Summary: The fisheries sector is a large and thriving industry within the global economy, with strategic importance for many developed and developing countries. Worldwide, the sector has an annual value in excess of USD 217.5 billion, and over 500 million people in developing countries depend, directly or indirectly, on fisheries and aquaculture for their livelihoods. This report looks at the issue of tax crime in the fisheries sector, including frauds over taxes on profit and earnings, customs duties, VAT and social security, with examples from real cases. These include crimes that rely on features characteristic of the fisheries sector, as well as those seen in other industries. The report discusses aspects of the sector that make it vulnerable to tax crime, including a lack of transparency and difficulty in obtaining beneficial ownership information resulting from the use of offshore companies and the practice of registering vessels under flags of convenience. Strategies used by tax administrations and other authorities to prevent, detect and investigate tax offences are outlined and the report makes recommendations for steps countries can take, alone or in co-operation, to combat these crimes.

Details: Paris: OECD, 2013. 51p.

Source: Internet Resource: Accessed August 4, 2014 at: http://www.oecd.org/ctp/crime/evading-the-net-tax-crime-fisheries-sector.pdf

Year: 2013

Country: International

Keywords: Financial Crimes

Shelf Number: 136303


Author: Penal Reform International

Title: Sharia law and the death penalty.

Summary: This report is designed for non-experts who want to understand more about Sharia law and Islamic jurisprudence as it relates to the death penalty. Sharia law is used in some countries as a reason to retain capital punishment. However, there are schools of thought among Islamic scholars stating that Sharia law creates stringent conditions for the use of the death penalty and includes various opportunities to avoid or commute punishment, and that Sharia law explicitly encourages alternatives. The report begins by explaining the primary and secondary sources and schools of Sharia law. It then looks at the categories of penalties in Sharia law (Qisas crimes, Hudud crimes and Ta'zir crimes) and explains what these comprise in relation to the death penalty. The book quotes sources of Sharia law related to these offences and analyses what this means for the application of the death penalty, including how Sharia law relates to international standards on the application of the death penalty. It ends by looking at ways in which Islamic jurisprudence has changed over the centuries in various aspects of law and punishment.

Details: London: PRI, 2015. 36p.

Source: Internet Resource: Accessed August 4, 2015 at: http://www.penalreform.org/wp-content/uploads/2015/07/Sharia-law-and-the-death-penalty.pdf

Year: 2015

Country: International

Keywords: Capital Punishment

Shelf Number: 136305


Author: United Nations Office on Drugs and Crime (UNODC)

Title: UNODC Annual Report 2014

Summary: The 2014 Annual Report provides an overview of UNODC's work across the globe in assisting Member States to address the threat posed by drugs, crime and terrorism. In addition to highlighting the Office's achievements for the year, it showcases the human impact of UNODC's work through a series of success stories and the effect on the ground. The Annual Report covers a wide-range of content, including: a forward-looking strategic narrative that places UNODC's efforts within the evolving global policy landscape and sketches broad priorities for the coming few years; thematic chapters on drugs, health and trafficking; transnational organized crime; justice; corruption; terrorism; policy support and public affairs; research, trend analysis and forensics; and independent evaluation; and information on the Office's finances and funding

Details: Vienna: UNODC, 2015. 133p.

Source: Internet Resource: Accessed August 4, 2015 at: http://www.unodc.org/documents/AnnualReport2014/Annual_Report_2014_WEB.pdf

Year: 2015

Country: International

Keywords: Drug Enforcement

Shelf Number: 136306


Author: Renard, Thomas

Title: Partners in crime? The EU, its strategic partners and international organised crime

Summary: Organised crime is a major security challenge. Recognising the importance of this challenge, the European Union (EU) has acquired more competences in the area of justice and home affairs (JHA) over the last years and has become more active in the fight against organised crime, not only internally but also externally. Although the EU remains a modest player at the global level, it has become an interlocutor, and sometimes even a partner, in terms of combating various dimensions of organised crime, including drug-trafficking. This paper focuses specifically on the EU's cooperation with its strategic partners on international crime-related issues. First, it describes organised crime as a security challenge, particularly to Europe. It then reviews the EU's strategic approach to cope with this challenge, and how it is implemented. Subsequently, the paper looks at the EU's cooperation with its strategic partners against organised crime, with a view to assessing the general effectiveness of these partnerships. This paper concludes that many strategic partnerships are still under-delivering, but most of them hold large potential for further cooperation.

Details: Madrid: Fundacion para las Relaciones Internacionales y el Dialogo Exterior, European Strategic Partnerships Observatory, 2015. 32p.

Source: Internet Resource: Working Paper 5: Accessed August 5, 2015 at: http://eulacfoundation.org/en/system/files/Partners%20in%20crime%20The%20EU%2C%20its%20strategic%20partners%20and%20international%20organised%20crime.pdf

Year: 2014

Country: International

Keywords: Drug Trafficking

Shelf Number: 136332


Author: Nexus Institute

Title: Assessing the impact and effectiveness of anti-trafficking interventions in the criminal justice sector: a discussion paper on issues, obstacles and opportunities

Summary: Over the past decade, global concern about human trafficking has prompted massive investment into anti-trafficking interventions by intergovernmental organizations, states and civil society. While early interventions took place in a performance evaluation vacuum, there have been growing calls for greater transparency and accountability within the anti-trafficking sector, including through rigorous impact evaluation. Such calls are fully justified. The human rights imperatives that underpin anti-trafficking work and the significant investment of public resources demand that interventions demonstrate accountability, results and beneficial impact. However, in practice this is more complicated and there has been relatively little analysis of the practical issues and challenges that arise in efforts to evaluate anti-trafficking work. In the specialized area of criminal justice responses to trafficking, such analysis is virtually non-existent, despite the increasing attention and resources that are being directed to this aspect of the anti-trafficking response. Impact and effectiveness evaluation in the context of international development is both complicated and contested. Multiple theories and elaborate methodologies abound, and these can present a daunting impediment to those seeking practical guidance on the essential problem of determining "what works". This paper seeks to cut through some of the complexities by focusing attention on several areas that are directly implicated in measuring anti-trafficking interventions in the criminal justice sector. It is the result of a comprehensive review of relevant literature and recent evaluation reports as well as interviews with key players in the field.

Details: Nexus Institute, 2011. 35p.

Source: Internet Resource: Accessed August 5, 2015 at: https://nexushumantrafficking.files.wordpress.com/2015/03/assessing-impact-and-effectiveness-of-at-interventions-in-cj-sector-gallagher-surtees-2011.pdf

Year: 2011

Country: International

Keywords: Human Trafficking

Shelf Number: 136333


Author: del Frate, Anna Alvazzi

Title: Every Body Counts: Measuring Violent Deaths

Summary: September 2015 world leaders will meet at the UN to adopt the Sustainable Development Goals (SDGs),which will be the international development framework that will replace the current Millennium Development Goals. The seventeen proposed goals and associated targets are planned to run until 2030. Among them, Goal 16 focuses on peaceful and inclusive societies, access to justice, and accountable institutions. The inclusion of Goal 16 in the reflects the growing acceptance that issues related to peace, security, and good governance should play a role in the post-2015 development framework. This progress of a global agenda on peace and development has been possible thanks to the work of several processes, including the Geneva Declaration on Armed Violence and Development (GD), which calls for measurable reductions in the burden of armed violence that humankind faces. The Small Arms Survey has been the leading research partner of the Geneva Declaration's 'measurability pillar' since the beginning of the initiative. The Global Burden of Armed Violence reports (2008, 2011 and 2015) have used 'violent deaths' as the main indicator for measuring and monitoring the scope and impact of armed violence globally, and refined a methodology for its collection and analysis. The violent death of a human being is the most extreme consequence of armed violence, and is treated seriously in all societies. For this reason it is likely to be recorded more accurately than other violent events. As a consequence, the number of persons who die violently is frequently used as a proxy measure for insecurity in both conflict and non-conflict settings. The Global Burden of Armed Violence reports focus on lethal violence shows that 'violent deaths' is a realistic indicator for policy-making (towards goals and targets) and for the purpose of measuring the results of armed violence prevention and reduction programmes. This experience is of great value to the current discussion around targets and indicators for Goal 16.

Details: Geneva: Small Arms Survey, 2015. 4p.

Source: Internet Resource: Small Arms Survey Research Notes, No. 49: Accessed August 5, 2015 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-49.pdf

Year: 2015

Country: International

Keywords: Gun-Related Violence

Shelf Number: 136341


Author: Carapic, Jovana

Title: Violent Deaths Due to Legal Interventions

Summary: Killings during 'legal interventions' - the 'killing of civilians by law enforcement officials, or killings of law enforcement officials on duty' -accounted for an estimated 19,000 violent deaths each year during 2007-2012; which is 4 per cent of the 508,000 total violent deaths each year during that period. Such events raise questions about security policy, the role and accountability of the state and law enforcement agencies, the legitimacy of certain state actions, and potential avenues for security sector reform. The use of lethal force by law enforcement officers, including their use of firearms, may be the norm in situations where police face high levels of violence and where law enforcement agencies have adopted highly militarized tactics, however police forces operating under other circumstances seldom resort to the use of firearms. Violent Deaths due to Legal Interventions, a new Research Note by the Small Arms Survey and the Geneva Declaration on Armed Violence and Development, summarizes key findings of the research on legal interventions conducted for the 2011 and 2015 editions of the Global Burden of Armed Violence, with a view to advancing the debate on the coherence, comprehensiveness, and comparability of relevant data within and across countries.

Details: Geneva: Small Arms Survey, 2015. 4p.

Source: Internet Resource: Small Arms Survey Research Notes No. 53: Accessed August 5, 2015 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-53.pdf

Year: 2015

Country: International

Keywords: Gun-Related Violence

Shelf Number: 136342


Author: Global Initiative Against Transnational Organized Crime

Title: Organized Crime: A Cross-Cutting Threat to Sustainable Development

Summary: The international community has become increasingly aware of the extent to which organised crime serves as a spoiler of sustainable development. This realisation has been enshrined in a number of seminal reports. In 2005, the report of the United Nations (UN) Secretary-General, "In Larger Freedom," which identified the challenges preventing the achievement of the Millennium Development Goals (MDGs), highlighted organised crime as one of the principle threats to peace and security in the 21st century. The 2010 "Keeping the Promise" report of the Secretary-General recognised that in order to achieve the MDGs, there would need to be capacity to respond specifically to organised crime. The World Development Report 2011 concluded that both conflict and organised crime have the same detrimental effect on development, resulting in 20% less development performance. As such, combatting organised crime and promoting greater economic and social resilience to its most deleterious impacts has become an integral part of the 2012 "Action Agenda" of the Secretary-General, as a priority for achieving a stable world. While organised crime is not a new phenomenon, the spread, impact and forms of organised crime in the modern world are unprecedented. The effects of organised crime are being felt in fragile and developed nations alike, and in many parts of the world, organised crime creates the very conditions that allow it to thrive, resulting in a self-perpetuating cycle of insecurity and diverted development. In fragile states and in situations of peacebuilding and state consolidation, organised crime is an increasing threat. In a number of theatres, criminal groups and illicit flows have been proven to fund conflict and perpetuate violence and insecurity. It is widely recognised, for example, that illicit trafficking and organised crime played a pivotal role in reducing the credibility of the government and financing armed groups that prompted the collapse of the state in Mali in 2011. More recently in Libya, organised crime and the armed groups that perpetrate it are having a decisive impact on the country's development, undermining transitions to stability, obstructing the functioning of central state institutions, holding the democratic process hostage, disenfranchising citizens and increasing the insecurity and life chances of communities. Organised crime and related corruption have been seen to reach up to the highest levels of government and the state, impacting stability, governance, development and the rule of law. Even in what are considered strong and prospering states, organised crime has a serious corrosive effect. A number of recent studies in Africa, for example, have demonstrated that while much of the continent is admired for its active civil society and free media, there is a very real danger of internal decay as organised crime and the associated corruption undermine state institutions. Weaknesses in public and private structures can result in the diversion of resources away from critical infrastructure and governmental services, including the provision of health, education and social welfare. Poverty and inequality are associated with increases in organised crime, not least in relation to human trafficking, smuggling of counterfeit goods, the production of illicit crops, and everyday extortion and bribery. Prominent examples of these insidious relationships are visible in Central and South America; South, West and North Africa; and areas of Eastern Europe, where a combination of drug cartels, transnational gangs, money laundering entities and public entities are colluding with critical effects on human security and development. Moreover, there is a growing body of anecdotal evidence of the myriad ways organised crime negatively impacts the environment, such as by destroying biodiversity, threatening key species, or reducing the sustainability of ecosystems. In dealing with fisheries and marine ecosystems, addressing the problem of large-scale illegal fishing has become more urgent than other research priorities. In fields like sustainable forestry, a substantial proportion of development assistance is being diverted through illegal logging. Drug trafficking has also been a cause of deforestation of large portions of the Amazon and the Isthmus of Panama.

Details: Geneva, SWIT: The Initiative, 2015. 96p.

Source: Internet Resource: Accessed August 7, 2015 at: http://www.globalinitiative.net/download/global-initiative/Global%20Initiative%20-%20Organized%20Crime%20as%20a%20Cross-Cutting%20Threat%20to%20Development%20-%20January%202015.pdf

Year: 2015

Country: International

Keywords: Corruption

Shelf Number: 136348


Author: Global Initiative Against Transnational Organized Crime

Title: Results-Based Approaches to Organised Crime and Development: Input into the Post-2015 Development Agenda

Summary: The effects of organized crime are being felt in fragile, developing, middle-income and developed nations alike. Organized crime denigrates communities and societal structures, the environment and the economy, undercutting the ability to build state institutions and deliver services to the people. As a consequence, organized crime severely impacts the international community’s capacity to achieve basic social and economic development objectives and erodes long-term development potential. In recognising the significant and enduring negative impacts organized crime has on development, the adoption of the Sustainable Development Goals (SDGs) is a key opportunity to empower development actors and charge them with the mandate to mitigate the impact of organize crime on development. The adoption of the SDGs provides a discussion platform to not only sensitise development actors to the impact organized crime has on development objectives, but to also equip them with the tools and knowledge to identify when and how organized crime affects the achievement of their goals. The objective of this technical note is to enhance the capacity of development actors to recognise and respond to the negative impacts of transnational organized crime in a results-based manner. It has been prepared and released to inform the deliberations around the post-2015 agenda, in particular the work that will be done to establish indicators to monitor progress against the goals and targets once they are established. The note, however, is designed to have a much broader application and greater longevity. The analysis identified five development impact areas as the spheres in which organized crime arguably does the most damage to development. The development impact areas are: (i) Achieve sustainable livelihoods: Sustainable livelihoods are people’s ability to make a living in an economically, ecologically, and socially sustainable manner. Organized crime is a significant threat in that it increases the vulnerability of populations, limiting access to sustainable livelihood assets, and jeopardises development initiatives aimed at securing sustainable livelihoods. (ii) Maintain health and well-being for all: Organized crime affects health and well-being in a number of direct ways, including increased drug usage as a ‘spillover effect’ of drug trafficking and falsified and substandard pharmaceuticals thwarting disease eradication. In addition, indirect impacts, such as increasing levels of grand corruption related to organized crime, can result in weakened service delivery and the diversion of funds away from government health programs. (iii) Achieve equitable and sustainable economic growth: Organized crime has a multitude of negative impacts on the economy, including crowding out legitimate sources of livelihood and reducing incentives for investment and entrepreneurship. Also, related corruption can result in the diversion of governments’ resources from development sectors. Consequently, the presence of organized crime deprives states of economic growth and development opportunities and inequality is exacerbated. (iv) Protect the environment: Fauna and flora crimes directly contravene development efforts to protect, restore and promote the sustainable use of terrestrial ecosystems, sustainably manage forests, combat desertification, and halt and reverse land degradation and halt biodiversity loss. In addition, illicit, unreported, and unregulated fishing (IUU fishing) and toxic dumping threaten efforts to conserve and sustainably use the oceans, seas and marine resources for sustainable development. (v) Secure stability, governance and justice for all: The presence of organized crime significantly increases the insecurity and harm to civilian populations. The sale and trafficking of small arms and light weaponry (SALW) is especially damaging in this regards. In addition, organized crime detracts from governance and justice efforts, often accompanied by and perpetuating corruption. The note provides results-based matrices categorised into five development impact areas that identify key outcomes, outputs and indicators relating to a wide range of organized crime threats to development. Within each of the categories, matrices are defined along a framework common to organized crime interventions: prevention, protection and prosecution. In addition, recognising responding to organized crime requires a holistic response that is both broad enough to address the problem on multiple levels and specific enough to make sense in the local context, the results matrices identify relevant actors that can inform the various indicators.

Details: Geneva, SWIT: The Initiative, 2015. 80p.

Source: Internet Resource: Accessed August 7, 2015 at: http://www.globalinitiative.net/download/global-initiative/Global%20Initiative%20-%20Results%20Based%20Approaches%20to%20OC%20and%20Development%20-%20April%202015.pdf

Year: 2015

Country: International

Keywords: Illicit Trade

Shelf Number: 136349


Author: United Nations Office on Drugs and Crime (UNODC)

Title: UNODC Study on Firearms: 2015. A study on the transnational nature of and routes and modus operandi used in trafficking in firearms

Summary: The Study was developed to raise global knowledge on illicit trafficking in firearms, including its transnational nature and the routes and modus operandi used, by enhancing understanding of this phenomenon and its links to other serious crimes. The Study is the first of its kind and all Member States were invited "to participate in and contribute to it as appropriate" (para. 7, Conference resolution 6/2). It lays the foundation for further research at the international level on trafficking in firearms. One of the primary objectives was to demonstrate the importance of data collection and analysis on trafficking in firearms and, consequently, highlight the usefulness of monitoring illicit firearms trafficking flows at the national, regional and international levels. This Study demonstrates the importance of continuing efforts to enhance national systems for collection and analysis of detailed data on illicit firearms trafficking. It is a demonstration of the potential future value of improved national systems to collect data and international cooperation in collating and analysing that data.

Details: Vienna: UNODC, 2015. 160p.

Source: Internet Resource: Accessed August 8, 2015 at: https://www.unodc.org/documents/firearms-protocol/UNODC_Study_on_Firearms_WEB.pdf

Year: 2015

Country: International

Keywords: Organized Crime

Shelf Number: 136359


Author: Global Detention Project

Title: Children in Immigration Detention: Challenges of Measurement and Definition

Summary: The campaign to end the detention of children, including child migrants and asylum seekers, has generated impressive global momentum. However, there remain important gaps in this effort, including the absence of an adequate definition of the immigration detention of children and inherent problems in developing realistic statistics to measure state activities. The objective of this GDP paper is to help encourage discussion of this issue by making some preliminary proposals on a way forward, in particular by proposing the development of a methodology that would allow for careful designation of custodial arrangements focusing narrowly on the facilities used to accommodate child migrants and asylum seekers

Details: Geneva, SWIT: Global Detention Project, 2015. 9p.

Source: Internet Resource: Global Detention Project Discussion Paper: Accessed August 8, 2015 at: http://www.globaldetentionproject.org/fileadmin/publications/GDP_child_detention_discussion_paper_2015_FINAL.pdf

Year: 2015

Country: International

Keywords: Asylum Seekers

Shelf Number: 136360


Author: Institute for Foreign Policy Analysis

Title: A Comprehensive Approach to Combating Illicit Trafficking

Summary: Responsible for more than $300 billion per year in trade and comprising a wide variety of products shipped over a complex web of interlocking transport routes, illicit trafficking constitutes a major security challenge that no single country or anti-trafficking organization could possibly manage alone. Indeed, the cross-border and transnational nature of the trade, combined with its diversity and the increasing agility and technological sophistication of the traffickers involved, demands a multilateral and multidimensional response from those who hope to combat it. An effective response, moreover, will require much closer coordination between the public and private sectors than exists today, as well as sturdier partnerships between and among the many national, regional, and international agencies - including a host of intergovernmental organizations (IGOs) - now charged with responsibility for one or another dimension of the illicit trafficking challenge. Indeed, pooling the expertise and resources of all the relevant stakeholders in support of an overarching comprehensive approach that leverages their collective capabilities is arguably the only way to make As for the specifics of a comprehensive approach, it must address several underlying characteristics of the current trafficking problem that are not widely understood and remain difficult to manage. First, in addition to the multi-product and inter-regional aspects of illicit trafficking noted above, a comprehensive approach must come to grips with the way in which many legal activities - including those performed by white-collar, middle-class collaborators - are intertwined with and help to facilitate illegal activities in the trafficking realm. Second, such an approach must also understand (and target) the many linkages that exist between and among the various trafficking streams for the shipment of drugs, small arms and light weapons (SALW), chemical, biological, radiological, and nuclear (CBRN) materials, counterfeit products, laundered money, and human beings, as well as the way in which control over the transit route for one type of commodity may allow traffickers to control the flow of other goods, both legal and illegal, that pass along the same route. Third, and on a related note, the anti-trafficking community must fully expect, and prepare for the prospect, that illicit traffickers will try to shift their shipments, if at all possible, from route to route - and from one form of transport to another - in order to avoid detection and interception. Closing off one trafficking flow, therefore, may simply trigger the opening of a new route in a less carefully monitored part of the world. Further on this last point, in today's globalized economy, illicit traffickers are increasingly inclined to base their operations in remote and poorly governed areas, where they can conduct business relatively free of outside interference. They appear to be especially partial to what the head of the UN's Office on Drugs and Crime (UNODC) recently referred to as "geographic blind spots" - that is, largely forgotten areas in failed or failing states that are "out of government control, and too scary for investors and tourists," where radar, satellite, and other forms of surveillance are limited or nonexistent. Operating from such locations, traffickers can run fleets of ships, planes, and trucks loaded with a mix of products with little fear of disruption. Many of these areas, moreover, are burdened with large numbers of unemployed youth who are often all too willing to provide the traffickers with a local workforce that has few alternatives to make money, and is likely to remain compliant. Hence, in addition to better surveillance and interdiction capabilities, any serious effort to stem illicit trafficking must also include a development component aimed at easing (if not eradicating) the socio-economic and political vulnerabilities in "blind spot" territories that traffickers seek to exploit. As suggested above, yet another increasingly important dimension of illicit trafficking to bring under a comprehensive approach is the ever-expanding and more sophisticated use of technology by traffickers. Access to the latest technology, including satellite hook-ups, cell phones, and GPS equipment, is effectively what has empowered loose bands of poor, illiterate Somalis to capture ocean-going vessels operated and/or relied upon by the world's richest and most powerful countries. So, too, cyber crime has allowed traffickers in remote areas to steal the identities of people half a world away, while also facilitating money laundering via lax banks and/or corrupt officials. In the not too distant future, access by traffickers to the technical skills and equipment necessary to handle CBRN-related materials could easily promote a growth in the trade of these key components of weapons of mass destruction (WMD). Getting a better handle on the many ways in which technology is likely to be used by traffickers and their fellow travelers in the years to come, therefore, will require input from a wide array of public- and private-sector technology experts. Equally important, a public-private initiative along these lines holds the best chance of discovering how the anti-trafficking community itself can leverage technology to detect and disrupt smuggling and related crimes. There is also a need for much greater informa eater information sharing between and among anti-trafficking groups with regard to current and emerging trafficking routes, the products and services being trafficked along these routes, the number of traffickers using these routes, and the inter-relationships between and among these traffickers. Closer institutional collaboration on such matters would be particularly helpful within regions (and between adjacent regions) where illicit trafficking is well entrenched, but where intra- and inter-regional cooperation may be hampered by ethnic and sectarian rivalries, unresolved border disputes, and contrasting approaches to law enforcement. Important steps have been taken in this regard, including ongoing efforts to strengthen countersmuggling capabilities along the infamous Great Silk Road via national and IGO support for the Southeast European Cooperative Initiative (SECI) in Romania and the Central Asian Regional Information and Coordination Centre (CARICC) in Kazakhstan. Similar initiatives can and should be pursued in other regions where traffickers now thrive.

Details: Cambridge, MA: Institute for Foreign Policy Analysis, 2010. 202p.

Source: Internet Resource: Accessed August 8, 2015 at: http://www.sipri.org/research/security/transport/files/existing-good-practice/united-states-4

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 136363


Author: Kavanagh, Camino

Title: Getting Smart and Scaling Up: Responding to the Impact of Organized Crime on Governance in Developing Countries

Summary: Tackling organized crime is listed as a priority for the UK Government under its National Security Council and Strategic Defense and Security Review. It is, first, a clear domestic threat to the UK, causing economic and social costs of between L20 and L40 billion per year. It also impacts the UK's development assistance as many sources suggest that organized crime has a significantly detrimental impact on governance in many developing countries. In some states, circumstantial evidence suggests deep interdependent links between organized crime, politics, and the public sector, fostering, in some cases, a form of symbiosis between the state and criminal organizations, and in more extreme cases, both deep or transitory links between crime, terror, and militant groups. Despite these disconcerting signs, investment in academic research on the effects of organized crime on governance remains limited. There is a wide range of criminological literature, and some relevant work on the fringes of the governance and conflict field, but few, policy-oriented studies specifically examining the impact of organized crime on governance exist. The World Bank's World Development Report 2011 cited organized crime as one factor linked to post-conflict violence in fragile states and hinted at the role weak institutions and corruption play in this regard, but did not provide any detailed analysis of these links. This report presents an overview of the research team's findings and is divided into four parts: Section I presents the main Policy Summary. Section II presents the main findings and lays out five areas for targeted action as the basis of an 'organized crime-sensitive' programming framework. Section III provides donors with options for assessing when to engage on organized crime-related issues and, depending on the nature of relations between organized crime and political and governance institutions, an analysis framework to help determine what specifically within the five areas of action to focus on. The final section provides concluding remarks and a suggested programming framework, combining elements of sections II and III.

Details: New York: New York University, Center on International Cooperation, 2013, 242p.

Source: Internet Resource: Accessed August 10, 2015 at: http://cic.nyu.edu/sites/default/files/kavanagh_crime_developing_countries_report_w_annexes.pdf

Year: 2013

Country: International

Keywords: Developing Countries

Shelf Number: 131146


Author: INTERPOL. Pharmaceutical Crime Sub-Directorate

Title: Pharmaceutical Crime and Organized Criminal Groups: An analysis of the involvement of organized criminal groups in pharmaceutical crime since 2008.

Summary: Pharmaceutical crime involves the manufacture, trade and distribution of fake, stolen or illicit medicines and medical devices. It encompasses the counterfeiting and falsification of medical products, their packaging and associated documentation, as well as theft, fraud, illicit diversion, smuggling, trafficking, the illegal trade of medical products and the money laundering associated with it. We are seeing a significant increase in the manufacture, trade and distribution of counterfeit, stolen and illicit medicines and medical devices. Patients across the world put their health, even life, at risk by unknowingly consuming fake drugs or genuine drugs that have been doctored, badly stored or that have expired. Illicit drugs can contain the wrong dose of active ingredient, or none at all, or a different ingredient. They are associated with a number of dangers and, at worst, can result in heart attack, coma or death. The fight against counterfeit medicines is crucial in order to ensure the quality of products in circulation and to protect public health on a global scale. The increasing prevalence of counterfeit and illicit goods has been compounded by the rise in Internet trade, where they can be bought easily, cheaply and without a prescription. It is impossible to quantify the extent of the problem, but in some areas of Asia, Africa and Latin America counterfeit medical goods can form up to 30% of the market.

Details: Lyon, France: INTERPOL, 2014. 22p.

Source: Internet Resource: Accessed August 10, 2015 at: http://www.interpol.int/Crime-areas/Pharmaceutical-crime/Pharmaceutical-crime

Year: 2014

Country: International

Keywords: Counterfeit Goods

Shelf Number: 136384


Author: Hassan, Duenya

Title: Women of Mass Destruction: Combating Radicalization on the Web

Summary: Terrorist groups, such as Islamic State of Iraq and Syria, have invested significant resources in radicalizing Western women from Europe and North America. Women enhance terrorist capabilities by being able to generate greater media attention because their assumed gender roles do not fit the typical profile of a terrorist. These women are also more familiar with Western culture and less likely to generate suspicion because of their gender, increasing the likelihood that they can perpetrate attacks against well-defended targets. To combat the threat of radicalized Western women, this white paper proposes a two-pronged approach to counter extremist narratives. First, online government campaigns should highlight terrorist atrocities toward women and publicize defector stories of women. Such publicity will undermine popular support for radical groups and emphasize the gap between the negative reality and the positive perception some may have of such groups. Second, governments should encourage private groups to establish an international grant-making foundation dedicated to empowering moderate Muslim voices in communities and online.

Details: Williamsburg, VA: The Project on International Peace and Security, Institute for the Theory and Practice of International Relations, The College of William and Mary, 2015. 19p.

Source: Internet Resource: Brief No. 7.5: Accessed August 13, 2015 at: http://www.wm.edu/offices/itpir/pips/_documents/pips/2014-2015/PIPS.2014-2015.WhitePaper.DuenyaHassan.pdf

Year: 2015

Country: International

Keywords: Female Terrorists

Shelf Number: 136394


Author: Fleming, Paul J.

Title: Engaging Men and Boys in Advancing Women's Agency : Where We Stand and New Directions

Summary: Despite advances in gender equality, women and girls still face disadvantages and limits on their agency. Men and boys can be key stakeholders and allies to increase women's agency. This paper focuses on examining men's attitudes and behaviors related to gender equality and violence perpetration to better understand how to engage men and boys as. It uses data collected from men and women from eight countries (Bosnia, Brazil, Chile, Croatia, Democratic Republic of Congo, India, Mexico, and Rwanda) as part of the International Men and Gender Equality Survey (IMAGES). There is wide variation across countries in men's support for gender equality, equal roles for men and women, and acceptability of violence against women. Key findings of this investigation include: 1) that in most countries male perpetrators of violence are more likely to be depressed or engage in binge drinking than non-perpetrators; 2) that witnessing one's mother being abused by a partner is one of the strongest predictors of ever perpetrating violence, suggesting that efforts should focus on breaking the intergenerational transmission of norms and violence; 3) that being involved with violent fights generally is a significant predictor of ever perpetrating violence, suggesting that programs and policies reducing violence generally may also have an effect on violence specifically against women; and 4) that a majority of men is willing to intervene upon witnessing violence against a woman, and men who do not support violence against women, are not violent generally, and who are aware of laws prohibiting violence against women are more likely to intervene.

Details: Washington, DC: The World Bank, 2013. 83p.

Source: Internet Resource: Accessed August 14, 2015 at: https://openknowledge.worldbank.org/bitstream/handle/10986/16694/825340WP0Engag00Box379862B00PUBLIC0.pdf?sequence=1

Year: 2013

Country: International

Keywords: Abusive Men

Shelf Number: 136399


Author: Arango, Diana J.

Title: Interventions to Prevent or Reduce Violence Against Women and Girls : A Systematic Review of Reviews

Summary: Violence against Women and Girls (VAWG) is a pervasive global problem. It is a violation of basic human rights and a drag on development. Much of the research to-date on the topic-including a major recent World Health Organization study to produce global prevalence rates has focused on better understanding the scale and nature of the problem. The present study builds on this body or research while shifting focus to synthesizing global evidence on potential solutions. This paper, a systematic review of reviews, breaks new ground by synthesizing evidence on the effects of VAWG prevention interventions. It examines the diversity of geographical context, the types of violence addressed, and the numerous approaches that have been used to combat VAWG. Additionally the review summarizes the quality of evidence on efficacy and effectiveness in order to highlight strengths and gaps of interventions on a global scale and could serve as a point of reference for those intending to undertake future design, implementation, and evaluation of interventions. This paper finds that knowledge of intervention impacts on VAWG prevention is growing, but is still highly limited. Nonetheless, a small but growing body of rigorously tested interventions demonstrates that preventing VAWG is possible and can achieve large effect sizes. The interventions with the most positive findings used multiple, well-integrated approaches and engaged with multiple stakeholders over time. They also addressed underlying risk factors for violence, including social norms regarding gender dynamics and the acceptability of violence. These examples point to the imperative of greatly increasing investment both in innovative programming in primary prevention, as well as in high-quality experimental and quasi-experimental evaluations to guide international efforts to end VAWG.

Details: Washington, DC: The World Bank, 2014. 61p.

Source: Internet Resource: Women’s Voice and Agency Research Series 2014 No.10; Accessed August 14, 2015 at: https://openknowledge.worldbank.org/bitstream/handle/10986/21035/927130NWP0Wome00Box385382B00PUBLIC0.pdf?sequence=1

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 136401


Author: Reyes, Joel E.

Title: Transformative Resilience Guide : Gender, Violence, and Education

Summary: The Education Resilience Approaches (ERA) program is developing frameworks and tools to understand the role and impact of education in conflict- and violence-affected contexts. This guide is for researchers, evaluators, and planners supporting education policy and program development in contexts of gender-related violence. It outlines a conceptual framework to support the collection, interpretation, and use of gender- and resilience-related information. In addition, it also includes how-to advice to think through crucial issues, which may arise when assessing areas of protection for people in all levels of an education system who experience gender-related violence, as well as to promote improved educational outcome. This guide is divided into two parts, plus an initial chapter on general aspects of gender and resilience in situations of conflict and violence. Together, the parts present, respectively, core guidance on gender-related risks and assets, and the ways that schools, communities, and education systems can respond to protect education actors from gender-related violence, as well as contribute to mitigating the sources of such violence. Each chapter has a list of core principles related to its focus, along with recommended resources. In Part 1, chapters 2 and 3 provide a broad framework and specific multi-level examples of gender-related risks and assets. Most importantly, it presents a list of essential principles, tools, and resources for researchers, evaluators, and program designers as they conduct their own specific gender, violence, and education assessments. Part 2 is focused on institutional issues. Chapter 4 discusses the ways that positive interactions between schools and communities can prevent gender-based violence and foster gender equity. Chapter 5 considers the education policies, programs, institutions, and services that address the sources of gender-related risks and craft solutions for positive education outcomes. Examples of institutional practices illustrate how a transformative resilience framework and gender principles can be operationalized within the policies, programs, and budgets of education systems.

Details: Washington, DC: The World Bank, 2013. 110p.

Source: Internet Resource: Accessed August 14, 2015 at: https://openknowledge.worldbank.org/bitstream/handle/10986/18979/887700WP0GN0Gender0Box385243B00PUBLIC0.pdf?sequence=1

Year: 2013

Country: International

Keywords: Educational Programs

Shelf Number: 136402


Author: Becher, Elizabeth Wieling

Title: Narratives of Scholars in the Field of Intimate Partner Violence

Summary: Historically, divisions have existed in the field of Intimate Partner Violence, with intense and sometimes acerbic debate ensuing in the literature between scholars affiliated with a "feminist" perspective and those affiliated with a "family conflict" perspective. New scholars just entering the field lack a historical understanding of how these divisions came to be, what are the core questions at the heart of the divide and how have leaders in the field navigated these questions along their own professional journeys? This dissertation is an effort to document from a first person perspective an extensive review of the scholarly literature related to these divisions and a narrative inquiry and analysis of how six leading scholars in the field, affiliated with both perspectives describe their journey.

Details: Minneapolis, MN: University of Minnesota, 2014. 329p.

Source: Internet Resource: Dissertation: Accessed August 14, 2015 at: http://conservancy.umn.edu/handle/11299/170897

Year: 2014

Country: International

Keywords: Family Violence

Shelf Number: 136403


Author: International Centre for the Prevention of Crime (ICPC)

Title: Prevention of Drug-Related Crime: Report

Summary: The core issue on which this report focusses is the prevention of youth crime committed under the influence of drugs or to acquire drugs. To investigate this question, a comparative analysis was performed between seven national drug strategies, highlighting the differences and similarities in approaches. The report is structured in four parts. The first part presents a theoretical framework and a literature review of the three central points of this report: The links between crime and drugs; The specific situation of young people in relation to this issue; and Effective prevention programs in this area. The second part presents each of the seven national strategies identified, namely: Canada, Australia, the United States, the Netherlands, Portugal, the United Kingdom and Switzerland. The third part consists of the above mentioned comparative analysis between the seven national strategies using established criteria. Finally, the report concludes with a series of recommendations on drug-related strategies to prevent crime committed under the influence of or to acquire drugs.

Details: Montreal: ICPC, 2015. 142p.

Source: Internet Resource: Accessed August 14, 2015 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/2015/Rapport_FINAL_ENG_2015.pdf

Year: 2015

Country: International

Keywords: Drug Abuse Prevention

Shelf Number: 136422


Author: Planta, Katrin

Title: Fit for negotiation? Options and risks in the political transformation of non-conventional armed groups

Summary: Is it possible to envisage the use of political incentives as bargaining chips when negotiating with organized crime networks, youth gangs and other “non-conventional” violent actors? What types of political incentives could be provided and what challenges might they represent for democracy? What pitfalls do national and international actors willing to consider new engagement options with non-conventional actors need to consider? This report discusses the opportunities for and dilemmas of using political incentives as a means to respond to organised violence outside the conventional arena of armed conflict. It suggests refraining from “blacklisting” actors on the basis of their “criminal”, “apolitical” or “non-conflict” nature and turning instead to other possible options for engagement. While the report argues that many principles of engagement with conflict parties can be fruitfully transferred to the ambit of non-conventional armed actors, offering incentives for political conversion or reconversion must be approached with great care. This can be done by addressing the particularities of the actors in question, such as their level of social legitimacy and the coherence of their political agenda, as well as the specificities of the context in which they operate, including whether a formal peace process is under way.

Details: Oslo: Norwegian Peacebuilding Resource Centre (NOREF), 2015. 11p.

Source: Internet Resource: Accessed August 19, 2015 at: http://www.isn.ethz.ch/Digital-Library/Publications/Detail/?ots591=0c54e3b3-1e9c-be1e-2c24-a6a8c7060233&lng=en&id=192042

Year: 2015

Country: International

Keywords: Armed Violence

Shelf Number: 136489


Author: Ginkel, Bibi T. van

Title: The role of the military in the prosecution of terrorism cases before civilian courts: Legal and practical challenges

Summary: Notwithstanding the fact that civil authorities are usually involved in the investigation and prosecution of terrorist crimes, reality on the ground often leads to a different situation. Indeed, the military may be called upon to carry out law enforcement activities when embedded in situations characterised by conflict, high risk level of threat and/or a lack of local civil capacity. In this research paper, the role of the military when performing law enforcement activities in terms of collecting evidence and/or securing suspected terrorists is analysed. ICCT Research Fellows Dr. Bibi van Ginkel and Dr. Christophe Paulussen point out that past experiences, for instance from counter-piracy operations and evidence-based operations, may provide some guidance for future cases.

Details: The Hague: International Centre for Counter-Terrorism, 2015. 23p.

Source: Internet Resource: ICCT Research Paper: Accessed August 19, 2015 at: http://www.icct.nl/download/file/ICCT-Van-Ginkel-Paulussen-The-Role-Of-The-Military-In-Securing-Suspects-And-Evidence-In-The-Prosecution-Of-Terrorism-Cases-Before-Civilian-Courts.pdf

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 136491


Author: Statewatch

Title: Countering Terrorism or Constraining Civil Society? The impact of Financial Action Task Force recommendations on non-profit organisations in Central and Eastern Europe and Central Asia

Summary: The Arab uprisings that began in late 2010 galvanised 'pro-democracy- governments in the West into a reaffirmation of their commitment to supporting civil society organisations (CSOs) working under repressive and authoritarian regimes. The US State Department launched a Strategic Dialogue with Civil Society in 2011, and two years later President Obama launched the Stand with Civil Society campaign, "a global call to action to support, defend, and sustain civil society amid a rising tide of restrictions on its operations globally". The European Union (EU) established the European Endowment for Democracy and committed to "a more strategic engagement with CSOs" and the mainstreaming of CSO dialogue across "all external instruments and programmes and in all areas of cooperation". The United Nations is also committed to the "enabling environment for civil society" which it views as central to the realisation of its Millennium Development Goals. Running counter to (and part of the reason for) this recent affirmation of support for the "enabling environment" is the spread of restrictive civil society laws around the world. These laws can prohibit or impede the formation of CSOs, restrict their access to domestic and international funding and hinder their day-to-day operations. The trend toward restriction is demonstrated by reports from the International Centre for Non-profit Law (among others), which has documented the introduction of such laws in more than 50 countries, and the UN Special Rapporteur on the rights to freedom of peaceful assembly and of association. It is a trend that the Carnegie Endowment for International Peace recently described as "global", "lasting" and intimately related to "fundamental changes in international politics". Paradoxically, the changes in international politics cited by Carnegie include international counter-terrorism standards, devised by democratic states after 9/11, which provide a justification for less democratic and repressive governments to introduce restrictive laws and regulatory environments for CSOs. The standards in question, which are explained in the following section, advance the hypothesis that non-profit organisations are particularly vulnerable to abuse or exploitation by terrorist groups. Concomitant to this perceived risk is the requirement that all states ensure that they have robust laws and procedures in place to combat the "threat". This problem was first examined in detail in a report we published in 2012 entitled "Legalising Surveillance, Regulating Civil Society". In this follow-up report we revisit the report's core assumption - that these standards are a vehicle for the imposition of restrictive CSO laws - by examining their implementation in 17 countries in central and eastern Europe and central Asia.

Details: London: Statewatch, 2015. 59p.

Source: Internet Resource: Accessed August 20, 2015 at: http://www.statewatch.org/news/2015/aug/fatf-countering-terrorism-or-constraining-civil-society.pdf

Year: 2015

Country: International

Keywords: Privacy

Shelf Number: 136498


Author: Keen, David

Title: Dilemmas of counter-terror, stabilisation and statebuilding. A discussion paper

Summary: Security threats defined as stemming from 'terrorism' or 'rogue regimes' have significant public profile, and have led to responses from different branches of government. In tackling these threats - through counter-terror, stabilisation and statebuilding - a 'mainstream' approach has evolved, which involves defining conflicts in a way that designates some actors as 'spoiler(s)' (i.e. 'terrorists', 'radicalised groups', etc.) and proceeds to address such conflicts by opposing 'spoilers' in partnership with whatever allies can be found. The paper begins from the assumption that counter-terrorism, stabilisation and statebuilding approaches - while distinct from each other, and different in different contexts - are linked in important ways, and have followed a discernible pattern in recent decades as part of what we describe here as the 'mainstream' approach. This typically involves use of military force, generally combined with - or followed by - some kind of 'stabilisation' or 'statebuilding' effort. This can involve negotiating a pragmatic 'deal' with influential actors (with a willingness to overlook the limitations of allies), which reinforces those actors included in the deal while continuing to use force against 'spoilers'. However, as the recent past illustrates, this approach has not proven to have had sustainable success; here we examine the drawbacks of this position and propose alternatives to the mainstream. In this paper, David Keen and Larry Attree discuss how the international community has tried to counter terror, achieve stability, build states and foster peace around the world. It examines whether these objectives and approaches are being pursued effectively and coherently and whether there are contradictions between them. It is based on a review of relevant literature, is not exhaustive in scope, and is intended to stimulate debate among the policy actors and practitioners engaged in these approaches.

Details: London: Saferworld, 2015. 58p.

Source: Internet Resource: Accessed August 20, 2015 at: http://www.saferworld.org.uk/resources/view-resource/875-dilemmas-of-counter-terror-stabilisation-and-statebuilding

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 136504


Author: Sollund, Ragnhild

Title: Illegal wildlife trade: A case study report on the illegal wildlife trade in the United Kingdom, Norway, Colombia and Brazil

Summary: Illegal Wildlife Trade [IWT], commonly positioned alongside the illegal drugs and arms trade and human trafficking, is one of the fastest growing illegal markets worldwide. The clandestine character of the IWT trade, and weak controls and enforcement, make it difficult to measure the scale of the trade, though current estimates suggest it is worth between 6 and 20 billion dollars annually. Growing awareness of the widespread impacts of the IWT has led to increased international attention in recent years, evidenced by the role the United Nations, Interpol, Europol, EU and UK have played in bringing together global leaders and stakeholders to help eradicate the trade. Research suggests the IWT contributes to civil conflict, economic loss, poverty, climate change and negatively impacts on national security and stability, state authority and biodiversity and public health. In particular, the links between the IWT and organised crime and the demise of iconic species has stimulated current international debate. This report provides an overview of a multi-method qualitative research project on the IWT in the UK, Norway, Colombia and Brazil. It identifies common and different features of the IWT in these four locations, exploring the various motivations for why people engage in the trade, the nature of the trade and types of victimisation. An overview of the response to the trade is discussed and evaluated through SWOT analysis - identifying strengths and weaknesses, and proposing suggestions for improvements. The literature review collates the salient issues addressed in relevant academic and official literature, providing a broader context for discussing the findings. The report focuses predominantly on terrestrial fauna. Findings suggest the nature of the IWT in the UK and Norway is similar. Specifically, the type of animal victims, the cost of the trade and offender motivations are consistent. However, when the response to the trade is evaluated, variations appear. Each of the case study countries address the IWT through international convention treaties and domestic legislation and enforcement, though responses are complex and diverse and their effectiveness varies considerably. Central to these variations are levels of awareness of the serious negative consequences of the IWT, political and criminal justice system support and resources, and punishment. Additionally, the integrated role of NGOs in the enforcement process and in developing other responses in the UK contrasts starkly with the insufficient enforcement response evident in Norway, Colombia and Brazil. NGOs play an important role in the UK, Colombia and Brazil in creating awareness and preventing the trade, but are almost nonexistent as stakeholders in Norway. A common theme from interviews in the case study countries is the importance of key personnel working to prevent and respond to the trade. Experts and practitioners alike show us that an effective response is one that is intelligence led, systematic, integrated and synergistic; they cite the importance of cooperation between enforcement agencies and NGOs and the necessity for increased prioritisation of these crimes by criminal justice systems

Details: Oslo: University of Oslo and Treforst, Wales, UK: University of South Wales, 2015. 61p.

Source: Internet Resource: A study compiled as part of the EFFACE project. http://efface.eu/sites/default/files/EFFACE_Illegal%20Wildlife%20Trade_revised.pdf

Year: 2015

Country: International

Keywords: Illegal Trade

Shelf Number: 136519


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Thematic Programme on Action Against Transnational Organized Crime and Illicit Trafficking, Including Drug Trafficking

Summary: This Thematic Programme on Action Against Transnational Organized Crime provides the framework for the United Nations Office on Drugs and Crime (UNODC) work against organized crime for the period 2011-2013. It outlines the context, the problems addressed and the challenges faced in preventing and combating organized crime in a globalized world. It describes the work of UNODC to assist countries in developing strategies, policies, action plans, programmes and projects in relation to all aspects of the United Nations Convention Against Transnational Organized Crime (UNTOC) and its three Protocols, as well as the three Universal Drug Conventions."

Details: Vienna: UNODC, 2011. 119p.

Source: Internet Resource: Accessed August 24, 2015 at: www.cpahq.org

Year: 2011

Country: International

Keywords: Drug Trafficking

Shelf Number: 136538


Author: Muravska, Julia

Title: Organised crime, Corruption, and the Vulnerability of Defence and Security Forces

Summary: Corruption feeds organised crime and organised crime feeds corruption.” This is one of the key points made by Transparency International’s Defence and Security Programme (TI-DSP) in its paper ‘Organised crime, corruption, and the vulnerability of defence and security forces.’ It was also one of the main messages delivered by TI-DSP’s Director Mark Pyman at the Cambridge International Symposium on Economic Crime, during the workshop focusing on the inter-linkages between organised crime and corruption. While TI-DSP has long considered organised crime to be a major contributor to corruption in the defence and security sector, ‘Organised crime, corruption, and the vulnerability of defence and security forces.’ is the Programme’s first research foray into this field. It begins by exploring the concrete links between organised crime and corruption, and it highlights how defence and security forces can themselves become involved in organised crime. It is corruption that is often the medium by which the army and police officers that are meant to secure citizens are in fact directly criminally harming them. The paper also points to the growth of organised crime, often associated with corruption, in post-conflict countries as a result of insufficient attention being paid to these issues during the post-conflict reconstruction phase. Because of the relationship between organised crime and corruption in this contexts, ‘Organised crime, corruption, and the vulnerability of defence and security forces’ calls for these two threats to be addressed jointly – neither can be ignored when trying to reduce the other.

Details: London: Transparency International UK, 2011. 31p.

Source: Internet Resource: Accessed August 24, 2015 at: https://www.law.upenn.edu/live/files/4420-transparency-internationalorganized-crime

Year: 2011

Country: International

Keywords: Corruption

Shelf Number: 136540


Author: Fontana, Alessandra

Title: Using money laundering investigations to fight corruption in developing countries: Domestic obstacles and strategies to overcome them

Summary: Anti-money laundering systems have the potential to curb the use of proceeds of corruption and other crimes by the perpetrators. An effectively implemented anti-money laundering framework limits the channels through which illicit funds can be laundered, making crime riskier and reducing the incentives for corrupt activities. However, those who stand to benefit from corruption have strong incentives to block anti-money laundering programmes. In addition, these programmes face significant obstacles to effectiveness in most developing countries. Relevant institutions do not trust each other sufficiently to share information necessary for investigations. Countries lack qualified staff and necessary resources, and slow bureaucratic procedures are unable to keep up with the speed of financial transactions. This paper explores these and other domestic obstacles and suggests strategies to overcome them, based on an analysis of the situations in Albania and Tanzania.

Details: Bergen: Chr. Michelson Institute, Anti- Corruption Resource Centre, 2012. 61p.

Source: Internet Resource: U4 Issue: Accessed August 24, 2015 at: http://www.u4.no/publications/using-money-laundering-investigations-to-fight-corruption-in-developing-countries-domestic-obstacles-and-strategies-to-overcome-them/

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 136561


Author: Downs, Fiona

Title: Rule of law and environmental justice in the forests: The challenge of 'strong law enforcement' in corrupt conditions

Summary: Widespread illegal forest activities have contributed to deforestation, forest degradation, economic losses to nations and injustices for forest communities in many countries. Promoting rule of law, particularly through 'strengthening law enforcement', is an important part of improving forest management and ensuring justice for forest dependent communities. This includes strengthening police and the courts to better detect and punish illegal forest activities. However, available evidence has shown that strong law enforcement activities often fail to address broader systems of illegal activities and can lead to further injustices. Corruption is one reason for these failures and is the focus of this U4 Issue Paper, which draws lessons from Cameroon and Indonesia. Efforts to strengthen law enforcement in the forests need to consider how corruption may interfere with successful detection and suppression of illegal activities. If they are to be successful, programmes promoting forest law enforcement in corrupt contexts also need to be sensitive to how they are implemented, with particular focus on the rights of forest dependent communities.

Details: Bergen: Chr. Michelsen Institute, Anti-Corruption Resource Centre, 2013. 32 p.

Source: Internet Resource: U4 Issues, 2013, no. 6: Accessed August 24, 2015 at: http://www.u4.no/publications/rule-of-law-and-environmental-justice-in-the-forests-the-challenge-of-strong-law-enforcement-in-corrupt-conditions/

Year: 2013

Country: International

Keywords: Corruption

Shelf Number: 136562


Author: United Nations Institute for Disarmament Research

Title: Developing a Mechanism to Prevent Illicit Brokering in Small Arms and Light Weapons: Scope and Implications

Summary: During the past decade, the problems posed by unregulated arms brokering activities have become an issue of growing concern for governments, international organizations and civil society in the context of international efforts against the illicit trade in small arms and light weapons. An important body of research has brought the role of arms brokers in facilitating arms transfers to unlawful or illegitimate recipients to the fore of the political agenda. Despite their central role in the arms business, the activities of arms brokers are often unregulated. Arms brokers who facilitate unlawful arms transfers are aiding and abetting violators of arms embargoes, armed groups, criminal gangs and terrorists, thus fuelling insecurity and conflict in many regions of the world. A number of regional organizations such as the African Union, the Andean Community, the Economic Community of West African States, the European Union, the Organization of American States, the Organization for Security and Co-operation in Europe, and the Southern African Development Community, as well as the states parties to the Wassenaar Arrangement and the states of the Great Lakes Region and the Horn of Africa, have developed instruments and standards for the regulation of brokering activities that the respective member states are encouraged or required to adopt. Such instruments could form the basis of a global effort to curb illicit arms brokering. Partly as an effect of these regional agreements, about 40 countries throughout the world have developed specific controls on brokering activities. In the majority of national legislations, however, brokering activities remain unregulated. In addition, loopholes and inconsistencies in existing systems of control continue to be exploited by unscrupulous brokers. Following the Secretary-General's consultations with all Member States and interested regional and subregional organizations, and recognizing the need for concerted global action, in 2005 the United Nations General Assembly adopted resolution 60/81 establishing a group of governmental experts to consider further steps to enhance international cooperation in preventing, combating and eradicating illicit brokering in small arms and light weapons. This study, conducted under the auspices of the United Nations Coordinating Action on Small Arms (CASA), examines existing instruments at the national and international levels. It aims to identify common elements and options for regulation, to enhance understanding of the issue and to clarify its most complex aspects.

Details: Geneva, SWIT: UNIDIR, 2006. 219p.

Source: Internet Resource: accessed August 24, 2015 at: http://ipisresearch.be/wp-content/uploads/2015/06/ChaptersBrokeringNov06.fm_.pdf

Year: 2006

Country: International

Keywords: Illegal Arms Transfers

Shelf Number: 136568


Author: Human Rights First

Title: Disrupting the Supply Chain for Mass Atrocities. How to Stop Third-Party Enablers of Genocide and Other Crimes Against Humanity

Summary: Mass atrocities are organized crimes. Those who commit genocide and crimes against humanity depend on third parties for the goods and services-money, materiel, political support, and a host of other resources-that sustain large-scale violence against civilians. Third parties have supplied military aircraft used by the Sudan Armed Forces against civilians, refined gold and other minerals coming out of eastern Democratic Republic of the Congo, and ensured a steady flow of arms into Rwanda. Governments seeking to prevent atrocities cannot afford a narrow and uncoordinated focus on the perpetrators of such violence. Rather, an effective strategy must include identifying and pressuring third-party enablers - individuals, commercial entities, and countries - in order to interrupt the supply chains that fuel mass violence against civilians.

Details: New York: Human Rights First, 2011. 14p.

Source: Internet Resource: Briefing Paper: Accessed August 25, 2015 at: https://www.humanrightsfirst.org/wp-content/uploads/pdf/Disrupting_the_Supply_Chain-July_2011.pdf

Year: 2011

Country: International

Keywords: Genocide

Shelf Number: 136573


Author: Bruck, Tilman

Title: Comparing the Determinants of Concern about Terrorism and Crime

Summary: Both crime and terrorism impose costs onto society through the channels of fear and worry. Identifying and targeting groups which are especially affected by worries might be one way to reduce the total costs of these two types of insecurity. However, compared to the drivers of the fear of crime, the determinants of concerns regarding global terrorism are less well known. Using nationally representative survey data, we analyse and compare the individual determinants of concern about global terrorism and crime, and show that worries about terrorism are driven by similar determinants as those about crime, which could have important policy implications. We furthermore provide an insight into the structure of the determinants of concerns regarding other public and private goods.

Details: Berlin: DIW Berlin, German Institute for Economic Research, 2009. 17p.

Source: Internet Resource: Discussion Paper no. 904: http://www.diw.de/documents/publikationen/73/diw_01.c.99785.de/dp904.pdf

Year: 2009

Country: International

Keywords: Fear of Crime

Shelf Number: 136578


Author: Sharman, Jason

Title: Chasing kleptocrats' loot: Narrowing the effectiveness gap

Summary: International measures to counter the laundering of looted wealth have not had a significant impact, despite their apparent strength. Evidence, including an original case study of Papua New Guinea, suggests that only a small fraction of funds derived from corruption are intercepted. This effectiveness gap is caused principally by the laxity of banks in controlling wire transfers and the willingness of corporate service providers to supply untraceable shell companies. Current policy evaluation fails because it equates inputs with effectiveness and does not include clear measurement of results. This can be remedied by testing the ease of making suspect transactions or forming shell companies, using either audit studies or field experiments. Two such studies of shell company formation show that rules mandating sensitivity to customer corruption risk are ineffective. Such studies are cheap, practical, and suitable for use by development agencies and their partners in developing countries.

Details: Bergen: Chr. Michelsen Institute, Anti-Corruption Resource Centre, 2012. 34p.

Source: Internet Resource: U4 Issue, 2012, no. 4: Accessed August 26, 2015 at: http://www.u4.no/publications/chasing-kleptocrats-loot-narrowing-the-effectiveness-gap/

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 136583


Author: Hewlett-Packard Development Company

Title: HP Security Research: Cyber Risk Report 2015

Summary: Welcome to the HP Cyber Risk Report 2015. In this report we provide a broad view of the 2014 threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.

Details: Palo Alto, CA: Hewlett-Packard, 2015. 74p.

Source: Internet Resource: Accessed August 27, 2015 at: http://fcw.com/whitepapers/2015/05/hpsp-052815-security-research-cyber-risk-report.aspx?tc=page0

Year: 2015

Country: International

Keywords: Cyber Security

Shelf Number: 136599


Author: International Centre for Science in Drug Policy

Title: State of Evidence: Cannabis Use and Regulation

Summary: Science in Drug Policy (ICSDP) has sought to ensure that policy responses to the many problems posed by illicit drugs are informed by the best available scientific evidence. State of the Evidence: Cannabis Use and Regulation is the ICSDP's contribution to the growing global conversation on cannabis. This report should be read in tandem with Using Evidence to Talk About Cannabis, a complementary guide to having evidence-based discussions on cannabis use and regulation. The regulation of recreational cannabis markets has become an increasingly important policy issue in a number of jurisdictions. Colorado and Washington State made headlines in 2012 when they became the first jurisdictions in the world to legalize and regulate the adult use and sale of cannabis for non-medical purposes. In 2013, Uruguay became the first country to legalize and regulate recreational cannabis markets. Momentum towards regulation continued in the United States in 2014 with successful ballot initiatives in Alaska, Oregon, and the District of Columbia. Globally, the issue of cannabis regulation is front and center in a growing number of jurisdictions, including Canada, Jamaica, Italy, Spain, several Latin American countries, and a number of additional U.S. states, including California, set to vote on legalization initiatives in 2016. Unsurprisingly, given the robust global conversation around the regulation of recreational cannabis markets, claims about the impacts of cannabis use and regulation are increasingly part of the public discourse. Unfortunately, though, these claims are often unsupported by the available scientific evidence. Another reoccurring problem in the public discourse is the selective inclusion of research studies based on their support for a predetermined narrative. The intentional exclusion of studies with contradictory findings does not allow for an objective review and analysis of all the evidence. This "cherry picking" of the evidence is a routine practice that distorts public understanding. By outlining the current state of all the scientific evidence on common cannabis claims, State of the Evidence: Cannabis Use and Regulation strives to ensure that evidence, rather than rhetoric, plays a central role in policymaking around this important issue. The harms of misrepresenting the scientific evidence on cannabis should not be overlooked. Given that policy decisions are influenced by public opinion and media reports, public discourse needs to be well informed. By addressing knowledge gaps with scientific findings, the ICSDP hopes to dispel myths about cannabis use and regulation, and ensure that the scientific evidence on these topics is accurately represented. Only then can evidence- based policy decisions be made. Readers of this report will notice three repeating themes emerge through the discussion of the scientific evidence on common cannabis claims. First, many of the claims confuse correlation and causation. Although scientific evidence may find associations between two events, this does not indicate that one necessarily caused the other. Put simply, correlation does not equal causation. This is a commonly made mistake when interpreting scientific evidence in all fields, and is unsurprisingly a recurring source of confusion in the discourse on cannabis use and regulation. Second, for several of these claims, the inability to control for a range of variables ("confounders") means that in many cases, we cannot conclude that a particular outcome was caused by cannabis use or regulation. Unless scientists can remove all other possible explanations, the evidence cannot conclusively say that one specific explanation is true. Third, many of the claims cannot be made conclusively as there is insufficient evidence to support them. Findings from a single study or a small sample cannot be generalized to entire populations. This is especially pronounced for claims related to cannabis regulation, as not enough time has passed since the regulation of recreational cannabis in Colorado, Washington State, and Uruguay to examine many of the impacts of these policy changes. These three common pitfalls are important to take into account when reading media reports and advocacy materials that suggest scientists have conclusively made some finding related to cannabis use or regulation. In many cases, due to the reasons outlined above, this will actually result in a misrepresentation of the scientific evidence. State of the Evidence: Cannabis Use and Regulation is comprised of two sections: Common Claims on Cannabis Use and Common Claims on Cannabis Regulation. Common Claims on Cannabis Use presents evidence on frequently heard claims about cannabis use, including claims on the addictive potential of cannabis, cannabis as a "gateway" drug, the potency of cannabis, and the impact of cannabis use on the lungs, heart, and brain (in terms of IQ, cognitive functioning, and risk of schizophrenia). Common Claims on Cannabis Regulation presents evidence on frequently heard claims about the impacts of cannabis regulation, including the impact of regulation on cannabis availability, impaired driving, the use of cannabis, drug crime, drug tourism, and "Big Marijuana." For each claim, the relevant available scientific evidence is presented and the strength of the scientific evidence in support of the claim is determined. Readers will notice that none of the claims are strongly supported by the scientific evidence, reinforcing the significant misrepresentation of evidence on cannabis use and regulation.

Details: Toronto, ON: The Centre, 2015. 24p.

Source: Internet Resource: Accessed August 28, 2015 at: https://dl.dropboxusercontent.com/u/64663568/library/State_of_the_Evidence_Cannabis_Use_and_Regulation-international-centre-for-science-in-drug-policy.pdf

Year: 2015

Country: International

Keywords: Cannabis

Shelf Number: 136611


Author: Graham, Hannah

Title: Scottish and International Review of the Uses of Electronic Monitoring

Summary: This Review provides a bounded overview of Scottish and international evidence and experience of the uses, purposes and impact of electronic monitoring (EM). Electronic monitoring, using radio frequency (RF) technology, currently operates at a number of points in the adult criminal justice system in Scotland, which are reviewed in Section 2. EM is most often used with adults as a stand-alone measure without additional criminal justice social work supervision and support from others. Restriction of Liberty Orders (RLOs) and Home Detention Curfews (HDCs) are the two most commonly used electronic monitoring modalities, making up 53% and 45% respectively of all electronically monitored orders in Scotland (G4S, 2015). In terms of children and young people (aged under 16 years), electronically monitored movement restriction conditions are used in a relatively small proportion of cases of those supervised through Intensive Support and Monitoring Service (ISMS) orders in Scotland. Electronic monitoring is significantly cheaper than the cost of incarceration. The average unit cost for electronic monitoring in Scotland in 2013-2014 was L743 (L1,043.73) (a significant reduction from L1,940 (L2,725.21) in 2011-2012) (Scottish Government, 2015; Scottish Government, 2013b). This figure is based on total expenditure across all forms of electronic monitoring, including as part of a Drug Treatment and Testing Order (DTTO) as well as part of Movement Restriction Conditions (MRCs) imposed with children and young people by the Children's Hearings System. In 2013, the average cost per EM order per day in Scotland was estimated at L10.17 (L14.29) (Scottish Government, 2013a: 7). In terms of order completion, approximately 4 out of 5 of those made subject to EM in Scotland complete their period of monitoring (G4S, 2015). There is some evidence that breach rates are higher for those under longer periods of monitoring, among younger people and among those with more extensive criminal histories. Section 3 of this Review provides a circumscribed overview of a range of purposes and uses of electronic monitoring in different international jurisdictions, including: violent crimes; domestic abuse; sexual crimes; alcohol and drug-related crimes; vehicle theft; with people with prolific offence histories and with people suspected or convicted of terrorism. Two types of offenders are highlighted here, in discussions of the international evidence and experience regarding the uses and impact of global positioning system (GPS) tagging and tracking. In relation to sex offenders, this Review establishes the following: - Despite some emergent positive research findings of the impact of this technology during the period of monitoring, there remains a significant lack of empirical evidence to support the positive impact of GPS-based monitoring of sex offenders in terms of increasing compliance, reducing re-offending and enabling desistance and reintegration; - Where research has shown that GPS-based monitoring of sex offenders has been associated with benefits and positive impact, EM is usually integrated with other surveillance, supervision and risk management, and supports; - Where it is used on a mid- to long-term basis, GPS-based monitoring of sex offenders may be less cost-effective and less easily ethically defensible, in that it can cost more than other electronic monitoring technologies such as RF and 'standard' probation supervision, although it remains cheaper than prison, yet it may not realise significant reductions in re-offending and may have unintended consequences in the lives of monitored people. However, findings on the grounds of fiscal efficiency are mixed; some US studies state that GPS monitoring of sex offenders is cost effective. Additionally, Sections 3 and 4 of this Review of the uses, effectiveness and impact of GPS tagging and tracking with domestic abuse defendants and offenders show that: - There has been growth in the use of GPS tagging and tracking in places like the United States, Spain and Portugal, with both criminal justice and civil - in the form of EM restraining orders - pilots and initiatives specifically designed for perpetrators of domestic abuse. A considerable number of these initiatives use GPS EM at the pre-trial stage, to reduce the use of remand (imprisonment) while ensuring surveillance forms a part of tailored risk management within the granting of bail; - Limited available research from the US suggests that pre-trial GPS monitoring of domestic abuse defendants is more effective, in comparison to RF EM, in reducing violations and promoting compliance; - Professional ideology and institutional orientations affect the use and impact of GPS monitoring technology, with motivational and collaborative approaches yielding different results to punitive approaches; - Bilateral EM is becoming a feature of discussions about victim participation in the EM of domestic abuse offenders, and while victims hold a diversity of positions on this, it seems to attract mostly positive responses. The empirical evidence and criminological literature on GPS-based bilateral EM is limited and relatively new, and it is too early to make strong claims about its impact, and comparisons to RF EM, on compliance, reducing re-offending and enabling desistance after their EM order has concluded. Section 4 of this Review highlights a number of other significant findings regarding impact and effectiveness based on international evidence and experience: - Overall, the electronic monitoring programmes and approaches which are shown to reduce reoffending during and/or after the monitored period are mostly those which include other supervision and supportive factors (e.g., employment and education, social capital) associated with desistance. The effective approaches discussed here have developed on the basis of high levels of integration with supervision and support from Probation Officers and other staff and services. In other words, the more effective programmes and approaches, in Europe in particular, are those where EM is not a stand-alone measure. - The effective approaches discussed here use tailored, and in some cases quite restrictive, eligibility criteria to determine who can participate in EM programmes. This affects how the impact of EM on recidivism, desistance and reintegration should be interpreted. - A significant number of the major empirical studies conducted - mostly in North America and the United Kingdom - in the last fifteen years conclude that the efficacy of EM in reducing re-offending after it has concluded is modest or minimal. Whereas research from other countries - especially Scandinavian countries and some European countries - indicates more extensive effectiveness and positive impact. - There is currently only limited empirical literature available which focuses on the perspectives and lived experiences of monitored people regarding issues of compliance (or non-compliance), legitimacy, and desistance from crime. More research is needed. - Flexibility in the use of EM orders and conditions may foster motivation for monitored people to comply. The capacity to incentivise and reduce curfew hours and days (e.g., curfews from 7 days a week down to 5 days a week) as a form of recognition and reward for a monitored person's formal compliance in the initial stages of an order may positively affect their perceptions of the legitimacy of that order. More research on this is needed.

Details: Glasgow: Scottish Centre for Crime and Justice Research, 2015. 137p.

Source: Internet Resource: SCCJR REPORT No.8/2015: Accessed August 28, 2015 at: http://www.sccjr.ac.uk/wp-content/uploads/2015/08/Scottish-and-International-Review-of-the-Uses-of-Electronic-Monitoring-Graham-and-McIvor-2015.pdf

Year: 2015

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 136612


Author: International Detention Coalition

Title: Does Detention Deter?

Summary: This briefing paper reviews the international research literature on the effectiveness of border control policies - particularly immigration detention - in reducing irregular migration. The brief argues that detention is not only ineffective at reducing irregular migration to desired levels, but also weakens other migration management outcomes such as case resolution, departure for refused cases and integration for approved cases. Given these weaknesses, governments would be better placed prioritizing alternatives to detention. The brief further shows policy development and targeted resource allocation could improve the prospects of migrants by increasing avenues for legal migration and improving life chances in countries of origin and transit. The brief shows destination countries must consider big picture, multi-layered responses to address root causes of irregular movement and reduce the pressures on migrants to undertake risky journeys in an irregular manner.

Details: Melbourne: International Detention Coalitions, 2015. 10p.

Source: Internet Resource: Briefing Paper: Accessed August 28, 2015 at: http://idcoalition.org/detentiondatabase/does-detention-deter/

Year: 2015

Country: International

Keywords: Border Security

Shelf Number: 136615


Author: Derghougassian, Khatchik

Title: Illicit Associations in the Global Political Economy: Courtesan Politics, Arms Trafficking and International Security

Summary: The accelerated trend of globalization has transformed the traditional role of the state. According to James Mittelman and Robert Johnston, the state is engaged in a courtesan role, which consists in shifting from serving citizens to acting as tacit partners in market relations, including with globally organized criminal groups. Building on the concept of the courtesan role of the state, this study addresses: (a) the general question of direct and indirect connections of states with illicit transactions in the post-Cold War, with a special attention to arms trafficking; (b) the reaction of the United States, as the remaining unique superpower, to the behavior of states associated with global illicit transactions, especially when involving security-sensitive cases such as arms transfer; (c) the security implications of this particular feature of the global illicit economy, particularly how threats are defined in international politics in the post-Cold War unipolar world. Focusing on the Argentina venta de armas case of illicit arms transfer to the Balkans and Ecuador in the 1990s, the research explores (a) the structural conditions and the domestic roots of a state engaged in illegal transactions in the post-Cold War; (b) the superpower's reaction to policies involving illicit transactions; (c) the security consequences. Through these venues, the dissertation aims at refining the debate in IR Theory to provide a better understanding of the international security dynamics in the post-Cold War.

Details: Coral Gables, FL: University of Miami, 2010. 584p.

Source: Internet Resource: Dissertation: Accessed August 28, 2015 at: http://scholarlyrepository.miami.edu/cgi/viewcontent.cgi?article=1466&context=oa_dissertations

Year: 2010

Country: International

Keywords: Illegal Trade

Shelf Number: 136618


Author: Middelburg, M.J.

Title: Implementation of the international and regional human rights framework for the elimination of female genital mutilation

Summary: Female Genital Mutilation (FGM) is the practice of partially or totally removing the external female genitalia or otherwise injuring the female genital organs for non-medical reasons. It is often believed to be a requirement for marriage and necessary to control women's sexuality. FGM is a reproductive health and human rights concern that has devastating short-term and long-term impacts on the lives of women and girls. The procedure is risky and life-threatening for the girl both during the procedure and throughout the course of her life. FGM is considered a harmful practice and a form of violence against women Before the 1990s, the international community did not view violence against women in general and more specifically FGM as a major issue. If violence against women was recognized as an issue at all, it was seen as under the purview of national governments, not a subject of international law. Violence against women was widely viewed as a private act or a domestic matter carried out by private individuals. For this reason FGM was initially placed beyond the scope of international human rights law. This changed in the 1990s with the global movement against violence against women. Landmark events were the adoption of General Recommendation No. 14 on female circumcision (1990) and General Recommendation No. 192 on violence against women (1992) by the Committee on the Elimination of Discrimination against Women. The Committee explicitly included violence against women as a matter falling under the scope of the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) and thus under international human rights law. The World Conference on Human Rights (1993) was another landmark event. The concluding document, the Vienna Declaration and Programme of Action, expanded the international human rights agenda to include gender-based violence. It advocated the importance of "working towards the elimination of violence against women in public and private life, and the eradication of any conflicts which may arise between the rights of women and the harmful effects of certain traditional or customary practices." A few months after the conference, the General Assembly adopted the Declaration on the Elimination of Violence against Women. This was another key step, as it recognized FGM as a form of violence against women for the first time. In article 2, the declaration expressly stated that "Violence against women shall be understood to encompass, but not be limited to, the following: female genital mutilation and other traditional practices harmful to women." Although not legally binding, this declaration strengthened the growing international consensus that gender-based violence is a human rights violation.

Details: New York: UNFRA, 2014. 89p.

Source: Internet Resource: Accessed August 31, 2015 at: https://pure.uvt.nl/portal/files/5332551/Paper_UNFPA_New_York.pdf

Year: 2014

Country: International

Keywords: Female Cutting

Shelf Number: 136620


Author: Schultze-Kraft, Markus

Title: Getting high on impact: The challenge of evaluating drug policy

Summary: Key points - Impact evaluations in contested policy fields are deeply challenging. They run the risk of adding to unproductive games of contestation between proponents and critics of contested public policies. A case in point are the strategies to control and, ultimately, eliminate the supply of, and demand for, plant-based and synthetic psychoactive substances, commonly referred to as 'illicit drugs', such as cocaine heroin, cannabis and methamphetamines. - The official drug control community – the International Narcotics Control Board (INCB), the UN Commission on Narcotic Drugs (CND), the UN Office on Drugs and Crime (UNODC) and – at a national state level – the US government – and a growing number of drug policy reform groups are at loggerheads over how drug policies should best be evaluated. In the run-up to the UN General Assembly Special Session (UNGASS) on Drugs in 2016 both should make efforts to face the big challenge of devising scientifically sound approaches to evaluating the impact of drug policies. - We highlight the importance of reflecting carefully on (a) whether and, if so, how the definitions of, and perceptions on, ultimate policy goals differ or (b) whether any common ground exists between the proponents and critics of the drug policies. If commonalities can be identified in this regard, the next step is to make explicit the competing theories of change that underpin the existing and proposed policy interventions to achieve the 'agreed' ultimate goals. - Our analysis suggests that both sides are interested in protecting the health and welfare of individuals and societies and – using the language of reform advocates – in preventing and reducing the harm that drugs cause or might cause; and they are both interested – with significant differences in emphasis – in safeguarding the political stability and security of states and citizens. However, the perspectives on what form drug control should take, who should be involved in the control effort, and how control could be achieved, that is to say which policies are most effective and least harmful in terms of protecting the health and welfare of citizens and societies and mitigating threats to stability and security, differ markedly. - It is important to make explicit the assumptions underlying the theories of change on both sides as this helps direct the efforts of evaluators to the relevant literatures that might contribute to solve disputes and adjudicate between different views on the basis of the best-warranted claim. This allows for testing both theories of change against the most robust scientific evidence available, providing a platform for the design of improved and – hopefully – less contentious policies.

Details: Swansea, Wales, UK: Global Drug Policy Observatory, Swansea University, 2014. 16p.

Source: Internet Resource: Policy Brief 3: Accessed August 31, 2015 at: http://www.swansea.ac.uk/media/GDPO%20Getting%20High%20FINAL.pdf

Year: 2014

Country: International

Keywords: Drug Control

Shelf Number: 136642


Author: Nova Scotia Health Research Foundation

Title: Evidence on the Effectiveness of GPS Monitoring for Mental Health Forensic Rehabilitation Patients

Summary: „h Due to the contemporary nature of GPS monitoring, there is limited evidence available in the published literature about the use and effectiveness of electronic monitoring among mental health forensic rehabilitation patients. „h GPS monitoring was implemented among mental health forensic rehabilitation patients in the United Kingdom in 2010 and in Queensland, Australia in 2012. „h The longest operating example of the use of GPS monitoring among mental health forensic rehabilitation patients is the Buddi system in the United Kingdom. In this case, there is a correlation between the use of electronic monitoring and an increase in unescorted leave and decreased violations during leave. „h Preliminary research findings from the United Kingdom suggest that GPS monitoring deters patients from absconding and can help patients view leave as part of their treatment and progress, as well as an incentive. „h Concerns about the use of GPS monitoring among mental health forensic rehabilitation patients include the potential for increased stigmatization which may negatively impact a patient¡¦s mental health, treatment and recovery process.

Details: Halifax: Nova Scotia Health Research Foundation, 2014. 37p.

Source: Internet Resource: Accessed August 31, 2015 at: http://novascotia.ca/dhw/mental-health/documents/Evidence-Effectiveness-of-GPS-Monitoring-for-Mental-Health-Forensic-Rehabilitation-Patients-Literature-Scan-NSHRF.pdf

Year: 2014

Country: International

Keywords: Electronic Monitoring

Shelf Number: 136646


Author: Haigner, Stefan D.

Title: The Financial Flows of Terrorism and Transnational Crime

Summary: Yearly revenues from transnational criminal activity account for USD 1 to 1.6 trillion, and a wide variety of methods is employed to transfer those revenues across borders and launder it. The specific type of crime largely determines the choice of methods. Terrorists, for example, use both "legal" as well as illegal activity, in particular drug dealing, to raise funds, and largely employ the formal financial sector as well as physical cross-border transfers to move funds across borders. Money attributable to terrorism, however, accounts only for a tiny share of international proceedings from illicit activity.

Details: Berlin: EUSECON - Department of Development and Security, German Institute for Economic Research, 2012. 4p.

Source: Internet Resource: EUSECON Policy Briefing 17: Accessed September 5, 2015 at: http://www.diw.de/documents/publikationen/73/diw_01.c.399439.de/diw_eusecon_pb0017.pdf

Year: 2012

Country: International

Keywords: Financial Crimes

Shelf Number: 136663


Author: Mehlum, Halvor

Title: The Market for Extortions

Summary: We consider extortion gangs that are mafia-like in their protection of targets, but that are unlike the Mafia in their competition over targets. Does this type of organized crime pay? How are the returns to extortion affected by the number of competing extortionists and the violence they apply? Does the supply of extortions create the demand for protection that the groups live from? In order to answer such questions we analyse a model that focus on the trade-off between congestion and demand creation in the market for extortions.

Details: Helsinki: United Nations University, WIDER (World Institute for Development Economics Research), 2001. 22p.

Source: Internet Resource: Discussion Paper No. 2001/26: Accessed September 5, 2015 at: http://www.wider.unu.edu/stc/repec/pdfs/dp2001/dp2001-26.pdf

Year: 2001

Country: International

Keywords: Extortion

Shelf Number: 136678


Author: Schneider, Friedrich

Title: The Financial Flows of the Transnational Crime: Some Preliminary Empirical Results

Summary: Until 2008, the growth of the world economy was quite strong and improved the economic well-being all over the globe, but this development was also accompanied by some risks. One of them is transnational crime, which has shown a remarkable increase in the last 20 years. This raises the following two questions: (1) How is transnational crime financed, and what do we know about this financing? (2) What economic implications does transnational crime have? In this contribution question (2) will be very briefly answered, however the main focus lies on providing a more detailed answer on the financing of transnational crime (question 1). Additionally a detailed analysis of the finances of transnational crime is crucial to reduce their financial options, so that the basis of their operations is at least limited. Such an analysis is another goal of this chapter. My paper is structured as follows: section 2 provides a literature review on the kinds of transnational crime financing. Section 3 shows the infiltration of transnational crime into the economic system. In section 4 some conclusions and policy recommendations are drawn.

Details: Berlin: Economics of Security, c/o Department of International Economics, German Institute for Economic Research, 2015. 18p.

Source: Internet Resource: Economics of Security Working Paper 53: Accessed September 11, 2015 at: http://www.diw.de/documents/publikationen/73/diw_01.c.386647.de/diw_econsec0053.pdf

Year: 2011

Country: International

Keywords: Economics of Crime

Shelf Number: 136715


Author: Spanjers, Joseph

Title: Illicit Financial flows and Development Indices: 2008-2012

Summary: This June 2015 report, the latest in a series by Global Financial Integrity (GFI), highlights the outsized impact that illicit financial flows have on the world's poorest economies. The study looks at illicit financial flows from some of the world's poorest nations and compares those values to some traditional indicators of development-including GDP, total trade, foreign direct investment, public expenditures on education and health services, and total tax revenue, among others-over the period 2008-2012. The report also produces several scatter plots in which illicit flows values for all developing and emerging market nations are compared to key trade indicators and various development indices, such as human development, inequality, and poverty, to determine if correlations exist between the two. By two different measures of poverty, the study reveals a positive correlation between higher levels of poverty and larger illicit outflows. That is, countries with higher levels of illicit financial flows (relative to GDP) tend to struggle with higher levels of poverty.

Details: Washington, DC: Global Financial Integrity, 2015. 56p.

Source: Internet Resource: Accessed September 16, 2015 at: http://www.gfintegrity.org/wp-content/uploads/2015/05/Illicit-Financial-Flows-and-Development-Indices-2008-2012.pdf

Year: 2015

Country: International

Keywords: Corruption

Shelf Number: 136786


Author: Newton, Paul David

Title: Human Trafficking - How to investigate it. Training Manual for Law Enforcement Officers

Summary: This training material was prepared in order to enhance the capacity of relevant actors to address trafficking in human beings more effectively. The material is designed to be used in a flexible way. Considerable guidance and supporting material is provided for trainers, however trainers are also encouraged to use this as a foundation from which the content and delivery methods of training may be adapted to the nature and setting of the audience.

Details: Vienna: International Centre for Migration policy Development, 2015. 207p.

Source: Internet Resource: Accessed September 18, 2015 at: http://www.icmpd.org/fileadmin/ICMPD-Website/ICMPD_General/Publications/2015/Human_Trafficking_-_How_to_investigate_it.pdf

Year: 2015

Country: International

Keywords: Human Trafficking

Shelf Number: 136812


Author: Voorhout, Jill Coster van

Title: Curbing Illicit Financial Flows: The Post-2015 Agenda and International Human Rights Law

Summary: Corruption, which was identified as a cross-cutting theme in our Institute's program of work for 2013, is not only a problem in its own right but also part of the "larger" issue of illicit financial flows (IFFs). Simply put, IFFs deprive governments in both developed and developing countries of resources that might otherwise be invested in public goods such as health, agriculture, infrastructure, and education. IFFs concern both illicit money and in- and outflows of money, and corruption is both their cause and consequence. Corruption often "generates" the illicit money, which also can stem from fraud or trafficking of persons, drugs, weapons, or other illegal goods. In addition, abuse of entrusted power for private gain - as corruption is commonly defined - often lures in in- and outflows of money - for instance, when illegal money is laundered to leave via the regular financial system or when local authorities negotiate tax concessions and incentives for (foreign) investment for states, companies, or individuals. Often corruption and IFFs are mutually reinforcing, and have a negative spiraling effect on a country's economy, weakens governance, and affects the rule of law. For example, illegal money fuels the commission of further crimes and the potential for in- and outflows of capital, whether legally or illegally "earned", poses opportunities for corruption and other illegal acts. Therefore, we include corruption under the definition of IFFs but exclude the legal practice of tax avoidance (as opposed to tax evasion, which is illegal per se). A comprehensive approach is taken to IFFs at the intersection of peace, security and justice, by combining perspectives of conflict prevention, rule of law, and global governance. The result is two policy recommendations: (i) to incorporate the rule of law in the post-2015 agenda, also under draft goal 12e aimed at tackling IFFs, and (ii) to use human rights obligations and responsibilities to curb IFFs. These recommendations are made to three audiences: (a) policymakers, who work at the national and international level and through multilateral institutions such as the Organisation for Economic Co-operation and Development (OECD), the World Bank, and the International Monetary Fund (IMF), (b) business representatives, who can contribute both positively and negatively to IFFs and their control, and (c) "facilitators" of IFFS such as lawyers and accountants. Our ultimate aim with these recommendations is to encourage post-2015 funding by a coalition of public-private and state-nonstate financiers, and promote human rights obligations for states and responsibilities for businesses, including law and accountancy firms, and "facilitators" of IFFS.

Details: The Hague: The Hague Institute for Global Justice, 2014. 20p.

Source: Internet Resource: Policy Brief 8: Accessed September 21, 2015 at: http://www.globalinitiative.net/download/financial-crime/global/Hague%20Institute%20for%20Global%20Justice%20-%20Curbing%20Illicit%20Financial%20Flows%20Post%202015%20-%20May%202014.pdf

Year: 2014

Country: International

Keywords: Corruption

Shelf Number: 136840


Author: Schwartz, Matthew

Title: Strengthening the Case: Good Criminal Justice Practices to Counter Terrorism

Summary: The Global Counterterrorism Forum (GCTF) Rabat Memorandum on Good Practices for Effective Counterterrorism Practice in the Criminal Justice Sector elaborates guidance on 15 good practices that promote rule of law-based criminal justice responses to terrorism. The GCTF encourages all countries to consider the Rabat Memorandum as a source of guidance and its members and partners have been working both bilateral and multilaterally to promote its implementation national and regional contexts. In support of these efforts, the US Department of State Counterterrorism Bureau commissioned the Global Center to undertake a stocktaking of national efforts to implement rule of law-based criminal justice measures to counter terrorism in selection of countries in Africa, the Middle East, and South and Southeast Asia. This report presents the core findings of the stocktaking project. It highlights trends, challenges, and opportunities for implementing the good practices of the Rabat Memorandum and for leveraging these practices to more effectively counter terrorism while promoting and protecting human rights. As noted in the introduction of the Rabat Memorandum, compliance with international law and human rights standards in national criminal justice responses to terrorism is not isolated to the mere existence of certain legal tools, or to the skills of specialized practitioners alone. Rather, it recognizes that "states should in the first instance have a modern, fair and efficient criminal justice system that forms the basis for a robust criminal justice response to terrorism." While the Global Center's report highlights examples of a wide range of good practices being implemented in national jurisdictions, it also calls attention to diverse legal and institutional, organizational, and operational challenges that seriously undermine rule of law-based criminal justice across all countries examined. As stated in the Rabat Memorandum, criminal justice efforts to counter terrorism "must be built on a functional criminal justice system that is capable of handling ordinary criminal offenses while protecting the human rights of the accused." The findings suggest that core criminal justice sector development efforts are essential for strengthening national implementation of rule of law based criminal justice practices to counter terrorism. The report concludes with a series of cross-cutting recommendations to support the ongoing efforts of the GCTF's Criminal Justice and Rule of Law Working Group.

Details: Washington, DC: Global Center on Cooperative Security, 2015. 33p.

Source: Internet Resource: Accessed September 22, 2015 at: http://www.globalcenter.org/wp-content/uploads/2015/09/Strengthening-the-case-high-res.pdf

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 136852


Author: United Nations Office on Drugs and Crime (UNODC)

Title: The International Classification of Crime for Statistical Purposes (ICCS)

Summary: The International Classification of Crime for Statistical Purposes (ICCS) is a classification structure of criminal offences. On the basis of internationally agreed concepts and principles, the ICCS consists of a framework to assign criminal offences to hierarchical categories that have a certain degree of similarity in relation to conceptual, analytical and policy areas. The purpose of the ICCS is to enhance consistency and international comparability of crime statistics and improve analytical capabilities at both the national and international levels. The United Nations Statistical Commission, at its 46th session in March 2015, and the Commission on Crime Prevention and Criminal Justice at its 24th session in May 2015 have endorsed the ICCS as an international statistical standard for data collection, both from administrative records and survey generated data, and as an analytical tool to elicit unique information on crime drivers and factors. The two Commissions have also confirmed UNODC as the custodian of the ICCS and have confirmed the draft implementation plan for the classification at national, regional and international levels, including the creation of a technical advisory group to provide substantive advice to the maintenance of the ICCS.

Details: Vienna: UNODC, 2015. 132p.

Source: Internet Resource: Accessed September 24, 2015 at: https://www.unodc.org/documents/data-and-analysis/statistics/crime/ICCS/ICCS_final-2015-March12_FINAL.pdf

Year: 2015

Country: International

Keywords: Crime Classification

Shelf Number: 136867


Author: Chaudhry, Peggy

Title: The Impact of Plain Packaging on the Illicit Trade in Tobacco Products

Summary: The illicit trade in consumer products is a dynamic problem with a global reach. Measuring the scale of this trade and the worldwide value of illicitly-traded products is inherently difficult given the illegal nature of this activity, but most accept that it has grown significantly over the last few decades. While the loss of tax revenue is the most measurable impact of illicit trade, other negative consequences center on: harm to consumers; damage suffered by intellectual property owners and legitimate supply chain members; and profits to organized criminal groups. Packaging is a critical deterrent to the counterfeiting of consumer products. Reflecting the challenges of measuring the scale of all global illicit trade, there are no reliable statistics for calculating precisely the size of the worldwide illicit tobacco problem. Some estimates suggest that around 10 to 11% of the global cigarette market is illicit, representing over 600 billion cigarettes a year. Cigarettes can be thought of as the 'ideal smuggled product' since the product is light, extremely valuable for its size and weight, and easy to transport and conceal in shipments of other products. There are various types of illicit tobacco products and the nature of this trade varies between markets. Some markets are mainly a source of illicit products, others are transit routes, and still others are destination markets for consumption. In this report, the serious illicit trade issues affecting the UK are used as a case study. Factors spurring the growth of illicit tobacco trade include: affordability of unlawful cigarettes compared to lawful ones; huge profit incentives for illicit traders; low criminal penalties disproportionate to these profit incentives; and widespread consumer complicity. This trade is assisted by the geographic characteristics of some markets (e.g., destination countries with borders more conducive to receiving illicit product). Currently packaging that is complex or innovative acts as a deterrent to counterfeiters of tobacco products since keeping up with the evolving packaging of genuine product is an expensive and time-consuming process. Packaging is also one of the few ways smokers and law enforcement agencies can use to assess whether a product is genuine or counterfeit. Illicit traders are often nimble, adapting to changing consumer demands and the regulatory environment. They enjoy the business benefits of product diversification without the regulatory constraints faced by manufacturers of legitimate product. The organized criminal gangs often behind the illicit tobacco trade also have the ability to exploit global networks of contacts and to work closely with other criminal enterprises. Tackling the illicit trade in tobacco products requires a multi-level response including national and international collaboration between regulators, enforcement agencies, and those who operate within the legitimate product supply chain. A careful review of the relationship between plain packaging for tobacco products and illicit tobacco trade is required given the pre-existing, serious societal impacts of this illegitimate trade. In our expert opinion, plain packaging for tobacco products will worsen the illicit trade in tobacco products as it would open a number of new opportunities for illicit traders. Notably, plain packaging will allow the illicit traders to provide counterfeit cigarettes using the mandated plain packaging specified by national legislation. The advent of plain packaging may also encourage new entrants to the lucrative business of counterfeiting cigarette packs since the costs and barriers of getting into this business will be reduced; reductions in start-up costs may encourage those without the resources to manufacture an authentic-looking copy of currently available sophisticated pack designs to begin counterfeiting plain packs. The recent Australian plain packaging legislation shows why this is the case: - Plain packs will be easier to counterfeit. In Australia, each cigarette pack can be covered only in a shade of "drab brown" specified by the regulator. In addition, the law forces the use of the most commonly counterfeited pack shape - a flip top box. - Illicit traders are effectively given a blueprint of 'how to make the pack.' Pack specifications will be made available online in contrast to the current practice where design specifications and colors are deliberately kept confidential in order to deter counterfeiters. - Static packaging reduces future cost burdens for illicit traders. A uniform pack design, like the one mandated in Australia, removes the need to keep up with the manufacturers' evolving pack innovations and developments, therefore, reducing the cost burden on counterfeiters since there will be no additional investment necessary until there is a further change in the law. - Plain packaging creates economies of scale in production. Once one plain pack brand is faked, the counterfeiter can reproduce packaging of each brand on the market with minimum effort since the only difference on each pack is the 'brand and variant names' that appear only in a specified font/size. Ironically, while plain packaging makes life easier and cheaper for counterfeiters, it may make life more difficult for consumers, retailers, and law enforcement agencies to differentiate between genuine and fake packs. Those who conduct forensic investigative analysis of packs may have to resort to more resource-intensive and time-consuming tools of verification in a plain packaging environment. Complex health warnings, tax stamps, or holograms will not be an effective deterrent to counterfeiting these much simpler packs. Such 'anti-counterfeiting' markings are already easily faked and counterfeiters generally only replicate enough to 'fool the consumer.' Track and trace requirements are also not the answer as these apply only to manufacturers of genuine product (and, even then, not all of them). In addition, these requirements cannot provide the information smokers need to tell if they have bought a fake pack. Plain packaging would also provide illicit traders with new opportunities to: - Offer counterfeit branded packaging that predates the introduction of the plain packaging measure. While brand owners will be prevented from using their iconic branding, criminals will not. Smokers who want to use familiar branded packs may continue to - wrongly - assume that the branded illicit product being offered is genuine but produced in another market when it is, in fact, fake. - Maintain or increase sales other types of branded packs: 'illicit whites' and contraband genuine product. In our expert opinion, plain packaging is highly likely to aggravate the existing negative impacts of the already serious and socially damaging trade in illicit tobacco. Since illicit products are often more accessible to those underage and those from low-income groups, plain pack laws risk undermining a key objective of plain packaging: to reduce smoking by these groups. We foresee that creating a plain packaging environment will also intensify the following serious societal impacts of the illegitimate trade: - Negative impacts on governments and taxpayers. The loss of tax revenues as more smokers shift from licit to illicit product has a multiplier effect since governments have less funding for healthcare, education, and other public services. 'Cross border shopping' is also likely to increase with the search for familiar branded packs providing an added incentive to the price benefits of buying packs abroad, further reducing government tax revenue in the smoker's 'home market.' - Detrimental influences on communities and society. An array of problems arises from illicit trade that range from cultivating consumers of illicit product who disrespect the law to fostering organized crime groups. These groups often penetrate low-income communities with their cheap products and enlist vulnerable people to perform perceived 'soft crimes,' such as 'ant smuggling.' In the long run, this illicit trade may 'normalize' criminal behavior and lead the individuals involved towards other acts of criminality. - Costs to legitimate manufacturers and retailers. Increased sales of fake products shift revenues from legitimate manufacturers and jobs from the highly-skilled legitimate workforce employed at all levels of the supply chain. Legitimate retailers already lose business to those involved in illicit tobacco trade. - Additional harmful effects to smokers. Regulators and public health officials have repeatedly expressed the concern that smokers are exposed to greater health risks by consuming illicit product. - Profits made by serious criminal organizations. The profits stemming from illicit tobacco trade are often used to finance other serious criminal or terrorist activity including prostitution, human trafficking, and trading of lethal weapons. In summary, we recommend a careful appraisal be given to these unintended negative consequences before plain packaging regulations are developed. Policy makers should be aware that plain packaging will, in our expert opinion, make the illicit trade in tobacco worse and these policy makers should therefore be exceptionally careful to ensure that such regulations do not inadvertently undermine anti-illicit trade programs and initiatives.

Details: Villanova, PA: The Authors, 2012. 187p.

Source: Internet Resource: Accessed September 30, 2015 at: http://www.peggychaudhry.com/publications/Impact_on_illicit_trade.pdf

Year: 2012

Country: International

Keywords: Cigarettes

Shelf Number: 136921


Author: Broadband Commission for Digital Development

Title: Cyber Violence against Women and Girls: A world-wide wake-up call

Summary: Violence Against Women and Girls (VAWG) is already a problem of pandemic proportion; research shows that one in three women will experience some form of violence in her lifetime. Now, the new problem of cyber crime could significantly increase this staggering number, as our research suggests that 73% of women have already been exposed to or have experienced some form of online violence. With social networks still in their relative infancy, this is a problem that urgently needs to be addressed if the Net is to remain an open and empowering space for all. - The sheer volume of cyber VAWG has severe social and economic implications for women's status on the Internet. Threats of rape, death, and stalking put a premium on women's emotional bandwidth, take-up time and financial resources including legal fees, online protection services, and missed wages. Cyber VAWG can have a profoundly chilling effect on free speech and advocacy. - Women aged 18 to 24 are at a heightened risk of being exposed to every kind of cyber VAWG; they are uniquely likely to experience stalking and sexual harassment, while also not escaping the high rates of other types of harassment common to young people in general, like physical threats. - In the EU-28, 18 per cent of women have experienced a form of serious Internet violence at ages as young as 15. This corresponds to about 9 million women. - Complacency and failure to address and solve cyber VAWG could significantly impede the uptake of broadband by women everywhere; without action, an unprecedented surge of 21st century violence could run rampant if steps are not urgently taken to rein in the forms of online violence that are escalating unchecked.

Details: Geneva, SWIT: The Commission, 2015. 70p.

Source: Internet Resource: Accessed September 30, 2015 at: http://www.broadbandcommission.org/Documents/reports/bb-wg-gender-report2015.pdf

Year: 2015

Country: International

Keywords: Computer Crime

Shelf Number: 136923


Author: International Centre for the Prevention of Crime (ICPC)

Title: Crime Prevention and Community Safety: Trends and Perspectives. 4th International Report

Summary: The fourth edition of the International Report is concerned with the overarching theme of the movement of people and how cities, their new arrivals, and existing residents are adapting to this increasingly pressing global phenomenon. As always, the Report begins with a review of trends in crime and violence internationally, and in the practice of crime prevention. Four separate chapters look in more detail at issues which have significant impacts especially at the local level in all parts of the world, and at how cities in particular are responding. They examine the rapidly expanding migration of people - across borders and regions, and within countries - to cities and urban areas; the migration of indigenous peoples to urban areas; the continuing issue of human trafficking and its prevention; and the persistent and troubling problem of intimate partner violence against women. Migration and trafficking are all global problems with strong local impacts, and often closely linked. The International Report provides information and tools to help governments, local authorities, international organizations and other actors implement successful crime prevention policies in their countries, cities and communities.

Details: Montreal: ICPC, 2014. 200p.

Source: Internet Resource: Accessed October 5, 2015 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/2014/ICPC_report_4.pdf

Year: 2014

Country: International

Keywords: Crime Prevention

Shelf Number: 136949


Author: Vriniotis, Mary

Title: Victimization Surveys 101: Recommendations for Funding and Implementing a Victimization Survey

Summary: While crime and violence are major global concerns, they are notoriously difficult to study, particularly in the developing world. Many crimes are never reported to police, and in many countries certain types of violence are not illegal, in which case there are typically no administrative records to collect. To better estimate this "dark figure" of unreported crime and violence, victimization surveys are a very useful tool. Although all surveys follow some core principles, surveys that measure rare events such as crime involve a host of considerations beyond those on topics most people have experienced or those measuring public sentiment. More effort and expense are therefore required to execute these surveys successfully. Setting reasonable goals, obtaining technical assistance from experts, and knowing how to select a survey firm will help ensure a quality survey is conducted. The author consulted several experts in victimization survey design to develop guidelines for anyone planning to fund or implement this endeavor. Key decisions that should be made at the outset are discussed, and characteristics of national surveys in five countries are compared. While national victimization surveys are typically only possible when financed by their governments, international organizations and NGOs may be able to finance surveys of urban areas when a national survey is not feasible. Detailed guidelines appear in the UN Manual on Victimization Surveys referenced at the end of this document with other key resources.

Details: Washington, DC: Inter-American Development Bank, 2015. 17p.

Source: Internet Resource: IDB Technical Note; 866: Accessed October 19, 2015 at: https://publications.iadb.org/bitstream/handle/11319/7225/IDB_TN_866_Victimization%20Surveys%20101_final.pdf?sequence=1

Year: 2015

Country: International

Keywords: Crime Statistics

Shelf Number: 137000


Author: Robertson, Doone

Title: Tourism Risk Management: An Authoritative Guide to Managing Crises in Tourism

Summary: The purpose of this guide is to provide tourism industry members in Asia, the Pacific and beyond with an authoritative guide to risk management. Importantly, the generic risk management process has been adapted to the specific needs of tourism. The guide provides a practical framework within which tourism destinations can identify, analyse, evaluate, treat, monitor and review risks in the tourism context. Although the tourism risk management process has been developed for destinations, the same principles also apply to a tourism business or organization and can easily be adapted for their purposes. Throughout this guide there are two fundamental roles for tourism in risk management: the first of these is as a partner with government and community agencies in the development of multi-agency, coordinated disaster management plans, systems, procedures and processes which include the needs of tourism; the second is to develop plans and procedures appropriate to a destination and to the specific roles and responsibilities of an organization, to train personnel to those plans, and to conduct regular tests of plans, procedures and personnel with subsequent amendment and update. Although the tourism industry is not responsible for the development or implementation of community disaster management plans and arrangements, the guide recommends that destinations and tourism operators should, when possible, participate in disaster planning and management activities through appropriate local, regional or national committees. Such participation enables the importance of tourism to be drawn to the attention of disaster management agencies and promotes the need for appropriate measures to be established to protect visitors in times of crisis. Case studies of Hurricane Katrina and the Bali Bombings demonstrate how a community disaster can affect confidence in tourism and interfere with its ability to continue normal operations. While each tourist destination is unique and will have different issues to deal with, there are key areas of risk management which are common across destinations. The most obvious is a dramatic drop in visitor numbers in which the impact is felt across a whole economy. While this guide presents case studies of recent events which have had a significant impact on tourism, the focus is on solutions rather than merely documenting past difficulties. The guide also provides checklists which will assist destinations and tourism businesses to adopt current risk management processes. This guide draws on best practice from a range of sources within and outside the APEC group. Current knowledge and practical application are the objectives of the project, so that peak bodies (UNWTO, PATA, etc) can use material from this report for training and education programs. Recognizing the critical role of national governments in supporting and protecting tourist destinations, the guide also seeks to offer an authoritative guide that can be endorsed by governments.

Details: Singapore: Asia-Pacific Economic Cooperation (APEC), 2006. 98p.

Source: Internet Resource: Accessed October 19, 2015 at: http://earthcheck.org/media/7635/tourism-risk-management.pdf

Year: 2006

Country: International

Keywords: Crisis Management

Shelf Number: 137007


Author: World Health Organization

Title: Preventing Youth Violence: An Overview of the Evidence

Summary: Each year an estimated 200 000 young people aged 10-29 years are murdered, making homicide the fourth leading cause of death for this age group. Millions more sustain violence-related injuries that require emergency medical treatment, and countless others go on to develop mental health problems and adopt high-risk behaviours such as smoking and alcohol and drug abuse as a result the violence they experience. Produced with the financial support of the Jacobs Foundation, German International Cooperation, and the United States Centers for Disease Control and Prevention, Preventing youth violence: an overview of the evidence aims to help policy-makers and planners - particularly in settings with limited human and financial resources - to address youth violence using an evidence-informed approach. Twenty-one strategies to prevent youth violence are reviewed, including programmes relating to parenting, early childhood development, and social skills development, as well as policies related to the harmful use of alcohol, problem oriented policing, and urban upgrading.

Details: Geneva, SWIT: World Health Organization, 2015. 100p.

Source: Internet Resource: Accessed October 19, 2015 at: http://apps.who.int/iris/bitstream/10665/181008/1/9789241509251_eng.pdf?ua=1&ua=1

Year: 2015

Country: International

Keywords: Evidence-Based Practices

Shelf Number: 137011


Author: Nelson, Paul

Title: Violent and property crime trends: local and international comparisons

Summary: Aim: To compare crime trends in New South Wales (NSW), Australia, New Zealand, Canada, the USA, England and Wales, and Scandinavia. Method: Trend data were extracted from publications and online data repositories. Population counts were used to calculate rates from crime counts as required. Violent and property crime series were presented for the period 1995 to 2014 (where requisite data were available). Results: Rates of recorded property crime have fallen almost continuously since 2003 in all jurisdictions considered in this paper; property crime has fallen since the mid-1990s or earlier in New Zealand, Canada, and the USA, and since 2001 in NSW. Violent crime rates have also trended downwards in most jurisdictions, but over a shorter period than for property crime, for example since 2000 in Canada, 2007 in NSW, and 2010 in New Zealand. Available data suggest that these falls followed longer-term increases in both property and violent crime. The interpretation of these data is complicated by variation around these general trends (e.g. homicide vs. sexual assault) and methodological variation within and between series. Conclusion: Long-term crime data have major limitations but nonetheless show rates of recorded violent and property crime are in widespread decline. These falls began later in NSW than in most jurisdictions. The violent crime decline is a more recent phenomenon and has been less pronounced and less consistent across jurisdictions than the fall in property crime; violent crime began to fall earlier in NSW than in New Zealand.

Details: Sydney: NSW Bureau of Crime Statistics and Research, 2015. 8p.

Source: Internet Resource: Issue paper no. 109: Accessed October 20, 2015 at: http://www.bocsar.nsw.gov.au/Documents/BB/bb109.pdf

Year: 2015

Country: International

Keywords: Crime Statistics

Shelf Number: 137024


Author: United Nations Children's Fund. Office of the Special Representative of the Secretary on Violence against Children

Title: Safeguarding the rights of girls in the criminal justice system: Preventing violence, stigmatization and deprivation of liberty

Summary: Girls often face significant barriers to accessing justice, whether they are victims of crime, witnesses or alleged offenders. All too often, legislation and criminal, administrative and civil proceedings are inadequate for the safeguarding of their rights, while appropriate policies for heir protection are absent or poorly implemented. Many countries lack specialized judges, prosecutors, lawyers and other personnel qualified to work with girls, in addition to sufficient resources to provide the requisite training. The result is that institutions including the police and courts, are often poorly equipped to deal with the situation of girls and their specific vulnerabilities. Even when girls do overcome these barriers, it often transpires that, far from affording support and protection, criminal justice systems are the setting for still more violence and stigmatization: at the hands of police, criminal justice officials and, in the case of detention, prison staff and other detainees. In short, as a consequence of their age and gender, girls face a double challenge when they come in contact with criminal justice systems, a challenge rooted in discriminatory attitudes and perceptions that persist in societies around the world.

Details: New York: United Nations, 2015. 78p.

Source: Internet Resource: Accessed October 20, 2015 at: http://srsg.violenceagainstchildren.org/sites/default/files/publications_final/girls_in_detention/safeguarding_the_rights_of_girls_in_the_criminal_justice_system.pdf

Year: 2015

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 137029


Author: Global Financial Integrity

Title: Illicit Financial Flows: The Most Damaging Economic Condition Facing the Developing World

Summary: The book features five condensed and updated quantitative country studies on illicit financial flows (IFFs) from India, Mexico, Russia, the Philippines, and Brazil by GFI Chief Economist Dr. Dev Kar, as well as chapters written by GFI President Raymond Baker and Managing Director Tom Cardamone. Dr. Thomas Pogge, Leitner Professor of Philosophy and International Affairs at Yale University, writes on the human rights impact of illicit financial flows. The relationship between illicit flows and development is considered by Erik Solheim, the chair of the OECD's Development Assistance Committee.

Details: Washington, DC: Global Financial Integrity, 2015. 192p.

Source: Internet Resource: accessed October 28, 2015 at: http://www.gfintegrity.org/wp-content/uploads/2015/09/Ford-Book-Final.pdf

Year: 2015

Country: International

Keywords: Bribery

Shelf Number: 137168


Author: Filges, Trine

Title: The Impact of Detention on the Health of Asylum Seekers: A Systematic Review

Summary: BACKGROUND The last decades of the twentieth century were accompanied by an upsurge in the number of persons fleeing persecution and regional wars. Western countries have applied increasingly stringent measures to discourage those seeking asylum from entering their country. The most controversial of the measures to discourage people from seeking asylum is the decision by some Western countries to confine asylum seekers in detention facilities. In most countries, the detention of asylum seekers is an administrative procedure that is undertaken to verify the identity of individuals, process asylum claims, and/or ensure that a deportation order is carried out. A number of clinicians have expressed concern that detention increases mental health difficulties in asylum seekers, who is already a highly traumatized population, and have called for an end to such practices. This is clearly in conflict with government policies aimed at reducing the numbers of asylum seekers. OBJECTIVES - The main objective of this review is to assess evidence about the effects of detention on the mental and physical health and social functioning of asylum seekers. SEARCH STRATEGY - Relevant studies were identified through electronic searches of bibliographic databases, internet search engines and hand searching of core journals. Searches were carried out to November 2013. We searched to identify both published and unpublished literature. The searches were international in scope. Reference lists of included studies and relevant reviews were also searched. SELECTION CRITERIA - All study designs that used a well-defined control group were eligible for inclusion. Studies that utilized qualitative approaches were not included. DATA COLLECTION AND ANALYSIS - The total number of potential relevant studies constituted 11,376 hits. A total of nine studies, consisting of 12 papers, met the inclusion criteria and were critically appraised by the review authors. The final selection comprised nine studies from four different countries. Two studies reported on the same sample of asylum seekers in Australia at different time points after release. The nine studies thus analysed eight different asylum populations. Six studies (all analysing asylum seekers in Australia) could not be used in the data synthesis as they were judged to have too high risk of bias on the confounding item. Three studies were therefore included in the data synthesis. Meta-analysis was used to examine the effects of detention on post-traumatic stress disorder (PTSD), depression and anxiety while the asylum seekers were still detained. Random effects models were used to pool data across the studies using the standardised mean difference. Pooled estimates were weighted using inverse variance methods, and 95% confidence intervals were estimated. It was not possible to perform a meta-analysis after release as only one study providing data after release was included in the data synthesis. RESULTS - Two studies provided data while the asylum seekers were still detained, and one study provided data less than a year after release. The total number of participants in these three studies was 359. We performed analyses separately for these time points. All outcomes were measured such that a negative effect size favours the detained asylum seekers, i.e. when an effect size is negative the detained asylum seekers are better off than comparison groups of non-detained asylum seekers. The three studies used in the data synthesis were all non randomised studies and only one of them was judged to be of some concern on the confounding item of the risk of bias tool. Primary study effect sizes for PTSD, depression and anxiety while the asylum seekers were still detained lies in the range 0.35 to 0.99, all favouring the non-detained asylum group. The weighted average effect sizes for PTSD and anxiety are of a magnitude which may be characterised as being of clinical importance: 0.45 [95% CI 0.19, 0.71] and 0.42 [95% CI 0.18, 0.66]. The weighted average effect size for depression is of an even higher magnitude: 0.68 [95% CI 0.10, 1.26]. All effects favour the non-detained; i.e. there is an adverse effect of detention on mental health. The magnitude of the pooled estimates should however be interpreted with caution as they are based on two studies, and for depression there is some inconsistency in the magnitude of effect sizes between the two studies. One study reported outcomes (PTSD, depression and anxiety) after release and the magnitude of the effect sizes were all of clinical importance: 0.59 [95% CI 0.02, 1.17], 0.60 [95% CI 0.02, 1.17] and 0.76 [95% CI 0.17, 1.34]; all favouring the non-detained asylum seekers. AUTHORS' CONCLUSIONS - There is some evidence to suggest an independent adverse effect of detention on the mental health of asylum seekers. All studies used in the data synthesis reported adverse effects on the detained asylum seekers' mental health, measured as PTSD, depression and anxiety. The magnitude of the effect sizes lay in a clinical important range despite the fact that the comparison groups used in the primary studies faced a range of similar post-migration adversities and had a more or less similar experience of prior traumatic events as the detained asylum seekers. Thus, the current evidence suggests an independent deterioration of the mental health due to detention of a group of people who are already highly traumatised. Adverse effects on the mental health were found not only while the asylum seekers were detained, but also after release suggesting that the adverse mental health effect of detention may be prolonged, extending well beyond the point of release into the community. The conclusions should however be interpreted with caution as they are based on only three studies. More research is needed in order to fully investigate the effect of detention on mental health. While additional research is needed, the review does, however, offer support to the view that the detention of already traumatised asylum seekers may have adverse effects on their mental health.

Details: Oslo: The Campbell Collaboration, 2015. 105p.

Source: Internet Resource: Campbell Systematic Review, 11(13): Accessed October 30, 2015 at: http://www.campbellcollaboration.org/lib/project/253/

Year: 2015

Country: International

Keywords: Asylum Seekers

Shelf Number: 137175


Author: Global Commission on Drug Policy

Title: The Negative Impact of Drug Control on Public Health: The Global Crisis of Avoidable Pain

Summary: The international drug control system is stoking a global crisis of inequitable access to controlled medicines. Of the global population, an estimated 5.5 billion have poor to nonexistent access to opioid analgesics, in particular morphine, resulting in the avoidable pain and suffering of people around the world. At the last estimate, 92 percent of the world's supply of morphine was consumed by just 17 percent of the global population, that consumption primarily concentrated in the global north. Terminal cancer patients, end-stage AIDS patients, and women in labor suffering from uncontrolled pain are among the key impacted groups, with the World Health Organization (WHO) estimating that tens of millions suffer from unrelieved pain annually due to a lack of access to controlled medicines. In addition, only a fraction of people globally who inject drugs are able to access controlled medicines for treating opioid dependence. Under international drug control law and international human rights law, States have an obligation to ensure controlled medicines are made available to their populations; any restriction of access constitutes a violation of the right to health. Though a number of factors impose barriers to access, including weak healthcare systems and the lack of training of clinicians working on the ground, the international drug control system has been responsible for perpetuating the continual undersupply of controlled medicines. This scarcity is due to the prioritization, by governments and UN bodies alike, of preventing the diversion of controlled substances for illicit purposes over ensuring access for medical and scientific needs. For example, both the International Narcotics Control Board (INCB) and United Nations Office on Drugs and Crime (UNODC) have a dual obligation to maintain a balance between preventing diversion and ensuring access, yet have historically favored the former. This has translated to the national level where some governments continually emphasize a criminal justice approach to drug control, rather than a public health one, all to the detriment of providing access to controlled medicines. In some countries, overly burdensome regulations for prescribing controlled medicines, something that can be linked to the UN drug conventions, create a situation where physicians must operate in a climate of fear and legal uncertainty, real or perceived. As a result, many are afraid of prescribing controlled medicines due to the risk of prosecution, or of being charged with professional misconduct for failing to adhere to stringent regimes. What's more, this environment contributes heavily to broader societal attitudes and the stigmatization of people who use controlled substances, licit or otherwise. The INCB and UNODC have begun to take steps to rectify this gross inequity of access around the world, and WHO's increasing involvement in the issue over the past decade is a key step in the right direction. However, there is considerable work to do to amend the damage caused by decades of placing a primacy on anti-diversion measures in drug control. With an increasing number of States and UN bodies drawing attention to the lack of access to controlled medicines, we are reaching a critical juncture, particularly with the United Nations General Assembly Special Session on drugs approaching in 2016. The time for concrete action on the issue is now. A new global initiative must be explored and greater power and funds must be handed to WHO, to lead on tackling inequitable access to controlled medicines. Without action, millions of people will continue to suffer unnecessarily.

Details: Rio de Janeiro – RJ – Brasil: The Commission, 2015. 28p.

Source: Internet Resource: Accessed November 3, 2015 at: http://www.globalcommissionondrugs.org/reports/

Year: 2015

Country: International

Keywords: Drug Control

Shelf Number: 137190


Author: Gallahue, Patrick

Title: The Death Penalty for Drug Offences: Global Overview 2015. The Extreme Fringe of Global Drug Policy

Summary: This report looks at the death penalty for drugs in law and practice. It also considers critical developments on the issue. Among its findings are: >> There are at least 33 countries and territories that prescribe the death penalty for drugs in law. >> At least 10 countries have the death penalty for drugs as a mandatory sanction. >> In 2013, around 549 people were believed to have been executed for drugs. This is an estimate using figures provided by human rights monitors but it cannot be considered comprehensive and it is likely there are more executions than those recorded. >> If the estimates for China are accurate and remained constant for 2014, then there would have been at least 600 executions for drugs in 2014. The actual figure is also likely to be higher when countries like North Korea, for which there is no reliable data, are included. >> Executions for drugs took place in at least seven countries since 2010. This number is possibly higher but not by much. Very few countries in the world actually execute drug offenders with any frequency. >> As of 2015, there are believed to be almost 900 people on death row for drugs in Malaysia, Indonesia, Thailand and Pakistan, and many hundreds more in China, Iran and Vietnam. While this report notes that there still are a troubling number of governments with capital drug laws in law very few states actually execute people for drugs. The number of people killed for drug-related offences is high but only because China, Iran and Saudi Arabia are aggressive executioners. The reality is that those governments that kill for drugs are an extreme fringe of the international community. One of the major developments in recent years on the death penalty for drugs, however, is that the international community is no longer standing idly by. The death penalty for drugs is distinct from many other capital offences as drug control is not confined to the borders of a particular country. The investigation, capture and prosecution of those who are executed may require assistance from partners around the world, including agencies based in countries that are opposed to the death penalty. After all, international drug control is a collective endeavour formalised by international agreements. The 1988 Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances promotes cross-border information-sharing between national agencies, joint trainings, technical and financial assistance between a variety of States Parties. The 1988 Convention formalised transnational cooperation in drug control and essentially 'internationalised' the war on drugs. In practice, this means a border control program between Iran and Pakistan could involve European Union donors, German police trainers, French equipment and British intelligence.

Details: Harm Reduction International, 2015. 28p.

Source: Internet Resource: Accessed November 3, 2015 at: http://www.ihra.net/files/2015/10/07/DeathPenaltyDrugs_Report_2015.pdf

Year: 2015

Country: International

Keywords: Capital Punishment

Shelf Number: 137193


Author: McFarland, Charles

Title: The Hidden Data Economy: The Marketplace for Stolen Digital Information

Summary: Data is the "oil" of the digital economy. The commercial market for personal data is booming, with large databases of subscriber information driving up the enormous valuations of those companies that own it, even though many have yet to turn a profit. As the commercial value of personal data grows, cybercriminals have long since built an economy selling stolen data to anybody with a computer browser and the means to pay. In the 2013 McAfee Labs report Cybercrime Exposed: Cybercrime-as-a-Service, we demonstrated how current tools, products, and services can allow anyone to become a cybercriminal, regardless of technical ability. We followed up with the report Digital Laundry: An analysis of online currencies, and their use in cybercrime, which explained virtual currencies in detail and how they are used to convert stolen data into cash. By the time Digital Laundry was published in 2013, the publicity following the law enforcement action against the Silk Road let the world know that illegal products could easily be acquired online. Such actions have demonstrated just how much traditional crime has evolved with the help of the cyber world. Cybercrime Exposed and Digital Laundry focused on tools that aid an attack. This report will attempt to answer the question: What happens after a successful breach?

Details: Santa Clara, CA: Intel Security/McAfee, 2015. 19p.

Source: Internet Resource: Accessed November 6, 2015 at: http://www.mcafee.com/us/resources/reports/rp-hidden-data-economy.pdf

Year: 2015

Country: International

Keywords: Computer Crimes

Shelf Number: 137217


Author: Sharma, Saswot Raj

Title: Terrorist, White Collar and Organized Crime Financing Case Study and Forensic Audit

Summary: Terrorism, white collar crime and organized crime usually are inevitable fact and black truth on human civilization. They need funds for operation and all the illicit money gathered cannot be used for operation until and unless it is cleaned by the means on Money laundering. Money laundering usually occurs in three steps: Placement is the transfer of illegal activities' proceeds into financial systems without attracting the attention of financial institutions and government authorities. Money launderers accomplish this by dividing their tainted cash into small sums and executing transactions that fall beneath banks' regulatory reporting levels. Layering is the process of generating a series of transactions in order to distance the proceeds from their illegal source and to obfuscate the audit trail. Common layering techniques include outbound electronic funds transfers, usually directly or subsequently into a - bank secrecy haven,- or a jurisdiction with lax recordkeeping and reporting requirements, and withdrawals of already placed deposits in the form of highly liquid monetary instruments, such as money orders or travelers checks. Integration, the final money laundering stage, is the unnoticed reinsertion of successfully laundered, untraceable proceeds into an economy. This is accomplished through a variety of spending, investing and lending techniques and cross-border, seemingly legitimate transactions. Independent auditors have a responsibility under SAS no. 54, Illegal Acts by Clients, to be aware of the possibility that illegal acts may have occurred, indirectly affecting amounts recorded in an entity's financial statements. If an accountant believes the consequences of the money laundering have not been properly accounted for or disclosed on the financial statements, SAS 54 states that the auditor should Criminal Financing Forensic Audit 5 Saswot Raj Sharma /ICAI/ Feb 14 express a qualified or adverse opinion on the financial statements. If the client refuses to accept the auditor's modified report, the auditor should resign. Punishment: Generally internationally the punishment is usually as follows: (a) A person who finances in terrorist activities shall be punished by an imprisonment up to five years and a fine equal to the amount used in offence and where such amount is not identified up to five hundred thousand rupees. (b) A person who commits money laundering offence under Chapter-2 of the AMLA except one mentioned in Sub-Section (1) shall be punished by an imprisonment between one and four years and a fine equal to the amount used in the offence. (c) An additional punishment of ten percent shall be awarded where a public official or the chief or official of a bank, financial institution or non-financial institution is involved in the offence.

Details: Kirtipur, Nepal: Tribhuvan University, 2014. 81p.

Source: Internet Resource: Accessed November 9, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2664340

Year: 2014

Country: International

Keywords: Financial Crimes

Shelf Number: 137580


Author: Briscoe, Ivan

Title: A violent compound: competition, crime and modern conflict

Summary: A notable characteristic of several of the most intractable conflicts in the world today is the presence of more than one sort of violence. In cases such as Syria, Mali and Libya the lines between armed conflict and other forms of organised violence have blurred. Conflicts that originated in political divisions have assumed criminal dimensions. At the same time highly criminalised parts of Central America and Mexico have witnessed the coercion of the state and society by groups whose methods resemble the military strategies of an insurgency. "Non-conventional armed violence" is the term used to describe forms of organised violence that do not fit the formal classification of armed conflict as a "contested incompatibility" between two or more parties. However, violence without a clear political or ideological goal is no soft alternative to old-fashioned war. It can be as lethal as conflict, and is a notorious presence in protracted wars where both multiple factions and the state are fighting. The search for new streams of illicit revenue, connections to transnational crime, volatile ties to local communities, the collapse of vertical chains of military authority, and a certain ambivalence to official state and security institutions when these can partly be captured for shared material gain are the hallmarks of this violence wherever it flourishes. Drawing on a series of 12 NOREF reports studying six countries affected by non-conventional armed violence, as well as core areas for policy responses, this synthesis report points to the importance of understanding and addressing this violence due to the critical role it plays in perpetuating insecurity, blocking peace and causing complex emergencies. Among its recommendations, the synthesis report calls for more flexible forms of mediation and reintegration for non-conventional armed groups, the redesign of humanitarian responses, and the implementation of novel controls over illicit flows connected to violent groups.

Details: Oslo: Norwegian Peacebuilding Resource Centre (NOREF); The Hague: the Clingendael Institute, 2015. 14p.

Source: Internet Resource: Accessed November 11, 2015 at: http://www.clingendael.nl/sites/default/files/A%20violent%20compound.pdf

Year: 2015

Country: International

Keywords: Conflict Related Violence

Shelf Number: 137236


Author: Anyango Oduor, Jacinta

Title: Left out of the Bargain: Settlement in Foreign Bribery Cases and Implications for Asset Recovery

Summary: The fight against the bribery of foreign public officials is critical to the global fight against corruption overall. It entails pursuing with equal determination those who pay bribes and those who accept them. Over the past decade, there has been significant progress in battling foreign bribery, with the clear trend of many cases being resolved through settlements rather than full trials. A settlement may be defined as any procedure short of a full trial. This trend raises a number of questions that should be considered by the international community: What happens to the money associated with the settlements, and is it being returned to those most directly harmed by the corrupt practices? What are the effects of uneven transparency and varying levels of judicial review of these settlements? What is the impact of settlements on legal actions against the givers and recipients of bribes, in particular, on actions by the countries whose officials have allegedly been bribed? Using the lens of the United Nations Convention against Corruption (UNCAC), the Stolen Asset Recovery Initiative (StAR) undertook the study Left Out of the Bargain to answer these questions and provide policy makers, practitioners, and others with greater understanding of the nature of settlements and, in particular, their implications for asset recovery. The StAR Initiative hopes that this study will spur a more informed and sharper discussion on settlements and asset recovery. StAR also hopes to encourage a global and collective effort toward tackling the challenges to asset recovery posed by settlements. Left Out of the Bargain addresses the core issue of how the imposition of monetary sanctions through settlements compares to the requirements of UNCAC on the recovery and return of the proceeds of corruption. The study also examines the effect of settlements in one jurisdiction upon investigations into corruption in another: as legal practitioners, policy makers, civil society organizations, and others have asked, how might settlements affect mutual legal assistance or other forms of international cooperation in criminal matters? This study represents the outcome of extensive research covering developments through April 2013 on settlements in foreign bribery cases. It is based on publicly available resources—including reports by the Organisation for Economic Co-operation and Development Working Group on Bribery and supplemental data—as well as on information collected through discussions with practitioners and experts. Left Out of the Bargain maps the contours of settlements in foreign bribery cases in both common and civil law jurisdictions. The objective is to identify the main features of settlements and recommend best practices, informed by the UNCAC requirements for asset recovery.

Details: Washington, DC: The World Bank, 2014. 181p.

Source: Internet Resource: Accessed November 11, 2015 at: http://star.worldbank.org/star/sites/star/files/9781464800863.pdf

Year: 2014

Country: International

Keywords: Asset Forfeiture

Shelf Number: 137240


Author: Harcourt, Bernard E.

Title: Beccaria's 'On Crimes and Punishments': A Mirror on the History of the Foundations of Modern Criminal Law

Summary: Beccaria's treatise "On Crimes and Punishments" (1764) has become a placeholder for the classical school of thought in criminology, for deterrence-based public policy, for death penalty abolitionism, and for liberal ideals of legality and the rule of law. A source of inspiration for Bentham and Blackstone, an object of praise for Voltaire and the Philosophies, a target of pointed critiques by Kant and Hegel, the subject of a genealogy by Foucault, the object of derision by the Physiocrats, rehabilitated and appropriated by the Chicago School of law and economics - these ricochets and reflections on Beccaria's treatise reveal multiple dimensions of Beccaria's work and provide an outline of a history of the foundations of modern criminal law. In becoming a classic text that has been so widely and varyingly cited, though perhaps little read today, "On Crimes and Punishments" may be used as a mirror on the key projects over the past two centuries and a half in the domain of penal law and punishment theory - and this essay hopes to contribute, in a small way, to such an endeavor. In the end, we may learn as much about those who have appropriated and used Beccaria than we would about Beccaria himself - perhaps more.

Details: Chicago: University of Chicago Law School, 2013. 28p.

Source: Internet Resource: Coase-Sandor Institute for Law & Economics Working Paper No. 648: Accessed November 12, 2015 at: http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1633&context=law_and_economics

Year: 2013

Country: International

Keywords: Beccaria

Shelf Number: 137273


Author: Stephenson, Kevin M.

Title: Barriers to asset recovery : an analysis of the key barriers and recommendations for action

Summary: Theft of public assets from developing countries is an immense problem with a staggering development impact. These theft s divert valuable public resources from addressing the abject poverty and fragile infrastructure often present in these countries. Although the exact magnitude of the proceeds of corruption circulating in the global economy is impossible to ascertain, estimates demonstrate the severity and scale of the problem. An estimated $20 to $40 billion is lost to developing countries each year through corruption. What this estimate does not capture are the societal costs of corruption and the devastating impact of such crimes on victim countries. Theft of assets by corrupt officials, oft en at the highest levels of government, weakens confidence in public institutions, damages the private investment climate, and divests needed funding available for core investment in such poverty alleviation measures as public health, education, and infrastructure. The Stolen Asset Recovery Initiative (StAR) estimates that only $5 billion in stolen assets has been repatriated over the past 15 years. The huge gap between even the lowest estimates of assets stolen and those repatriated demonstrates the importance of forcefully addressing the barriers to asset recovery. International cooperation is essential. Barriers to asset recovery have been discussed in previous works, and the United Nations Convention against Corruption (UNCAC) was to be the solution to many of these barriers. Yet the lengthy process for asset recovery, the low level of activity, and the difficulties reported by practitioners suggest that many barriers are still firmly in place. This study, prepared by the StAR Initiative, builds on the experience of dozens of practitioners around the world who have hands-on experience in asset recovery and on independent analyses by staff . More than 50 practitioners with day-to-day experience in asset recovery, both from requesting jurisdictions and from the requested jurisdictions, were consulted through a series of workshops, country visits, and a thorough review of the findings of the study before publication.

Details: Washington, DC: World Bank Group, 2011. 200p.p.

Source: Internet Resource: Stolen Asset Recovery (StAR) initiative. Accessed November 12, 2015 at: http://www1.worldbank.org/finance/star_site/publications/bar_consolidated.pdf

Year: 2011

Country: International

Keywords: Asset Forfeiture

Shelf Number: 137277


Author: Spain. Ministry of Interior

Title: White Paper on Best Practices in Asset Recovery. CEART Project

Summary: The recovery of assets with a criminal origin is one of the priorities of criminal policy within the European Union, as reflected in several legal instruments on this topic that have been adopted in recent years. The CEART Project, which tries to be a small contribution to the efforts carried out by the European Union in this field, had some ambitious objectives that could not have been reached without the unconditional support of its partners: Rey Juan Carlos University, Europol and the Asset Recovery Offices from Belgium, Scotland (United Kingdom), Hungary and Poland. With the publication of this White Paper on Best Practices in Asset Recovery, a compendium of the most effective current practices in the asset recovery field, in both the European Union and United States and Canada, one of the main goals of the CEART project has been achieved. The exchange of best practices is already included as a key point in Decision 2007/845/JHA, of 6 December 2007 concerning co-operation between Asset Recovery Offices of the Member States in the field of tracing and identifying proceeds from, or other property related to crime, a regulation that represents one of the cornerstones in the field of asset recovery in the European Union. Likewise, the CEART Project has given great importance to the training of the people working in this field. Without these two key points, training and the exchange of best practices, it is difficult to improve the effectiveness of the efforts of the Member States in the tracing and identification of assets coming from crime. Both topics were already highlighted in the Communication from the Commission to the European Parliament and the Council of 20 November 2008 - Proceeds of organized crime: ensuring that "crime does not pay".

Details: Madrid: Ministry of Interior, 2012. 292p.

Source: Internet Resource: Accessed November 14, 2015 at: http://vangogh.fcjs.urjc.es/~jesus/Home_files/WBoBPiAR_CEART_2012.pdf

Year: 2012

Country: International

Keywords: Asset Forfeiture

Shelf Number: 137295


Author: Frontier Economics

Title: Estimating the Global Economic and Social Impacts of Counterfeiting and Piracy

Summary: Government efforts to stabilize the economy and stimulate economic growth, trade and employment must include the critical and pervasive role that intellectual property (IP) protection plays in driving, innovation, development and jobs. The massive infiltration of counterfeit and pirated products, or IP theft, creates an enormous drain on the global economy - crowding out billions in legitimate economic activity and facilitating an "underground economy" that deprives governments of revenues for vital public services, forces higher burdens on tax payers, dislocates hundreds of thousands of legitimate jobs and exposes consumers to dangerous and ineffective products. Reliable information on the scope, scale, costs and impacts of counterfeiting and piracy is critical for helping policymakers to better understand that the trade in fake goods is damaging their economies, threatening the health and safety of their citizens and stifling innovation and creativity. Policymakers with better information on of how counterfeiting and piracy undermine IP, innovation, economic growth and employment are better able to make the fight against IP theft a higher public policy priority and take the actions needed to prevent the damage inflicted by counterfeiting and piracy. In this regard, government efforts to strengthen IP enforcement regimes can more appropriately be considered as investments that pay tangible dividends to economic development and society. Because counterfeiters and pirates operate outside the law, estimating the extent of counterfeiting and piracy and the harm these activities cause is extremely challenging. Illegal businesses do not report information on their activities to any government agency so measuring their size must be done using indirect methods. For this reason, Business Action to Stop Counterfeiting and Piracy (BASCAP), an initiative of the International Chamber of Commerce, is commissioning experts (including Frontier for this report) to examine the issue and to develop methodologies for estimating the economic and social impacts of counterfeiting and piracy. No one report or approach will yield a complete picture or provide all the answers, but BASCAP is committed to learning from as many sources of expertise as possible.

Details: Paris: BASCAP (Business Action to Stop Counterfeiting and Piracy), 2011. 61p.

Source: Internet Resource: Accessed November 16, 2015 at: www.iccwbo.org

Year: 2011

Country: International

Keywords: Counterfeit Goods

Shelf Number: 137282


Author: Baylon, Caroline

Title: Cyber Security at Civil Nuclear Facilities: Understanding the Risks

Summary: The report finds that the trend to digitization, when combined with a lack of executive-level awareness of the risks involved, means that nuclear plant personnel may not realize the full extent of their cyber vulnerability and are thus inadequately prepared to deal with potential attacks. Specific findings include: - The conventional belief that all nuclear facilities are 'air gapped' (isolated from the public internet) is a myth. The commercial benefits of internet connectivity mean that a number of nuclear facilities now have VPN connections installed, which facility operators are sometimes unaware of. - Search engines can readily identify critical infrastructure components with such connections. - Even where facilities are air gapped, this safeguard can be breached with nothing more than a flash drive. - Supply chain vulnerabilities mean that equipment used at a nuclear facility risks compromise at any stage. - A lack of training, combined with communication breakdowns between engineers and security personnel, means that nuclear plant personnel often lack an understanding of key cyber security procedures. - Reactive rather than proactive approaches to cyber security contribute to the possibility that a nuclear facility might not know of a cyber attack until it is already substantially under way. In the light of these risks, the report outlines a blend of policy and technical measures that will be required to counter the threats and meet the challenges.

Details: London: Chatham House, 2015. 53p.

Source: Internet Resource: Accessed November 16, 2015 at: https://www.chathamhouse.org/sites/files/chathamhouse/field/field_document/20151005CyberSecurityNuclearBaylonBruntLivingstoneUpdate.pdf

Year: 2015

Country: International

Keywords: Cyber Security

Shelf Number: 137283


Author: Financial Action Task Force

Title: Emerging Terrorist Financing Risks

Summary: The Emerging Terrorist Financing Risks' report, the result of the call for further research into terrorist financing, provides an overview of the various financing mechanisms and financial management practices used by terrorists and terrorist organisations. It explores the emerging terrorist financing threats and vulnerabilities posed by foreign terrorist fighters (FTFs), fundraising through social media, new payment products and services, and the exploitation of natural resources. The terrorist financing risks identified in the FATF's 2008 Terrorist Financing report, while still evolving, are as relevant today, as they were back then. However, developments since 2008 have created new terrorist financing risks. The issue of FTFs is not a new phenomenon, but the recent scale of the issue in relation to the conflict in Syria and Iraq is disturbing. FTFs are now considered one of the main forms of material support to terrorist groups. This report sets out the funding needs, sources and methods of FTFs and the challenges associated with combatting them. New technologies have also introduced new terrorist financing vulnerabilities. The broad reach and anonymity associated with social media and new payment methods could make these attractive tools for terrorists and terrorist organisations to use in their financial activities. All terrorists and terrorist groups, particularly large terrorist organisations, will require a financial management strategy to allow them to obtain, move, store and use their assets. Understanding these financial management strategies is essential in developing effective measures counter terrorist financing. This report is not a comprehensive study but rather, aims to provide a snapshot of current terrorist financing risks to raise awareness among FATF members and the private sector. Many of the issues raised in this report require further in-depth research. The report highlights the importance of genuine private/public partnerships to enhance awareness of, and responses to, emerging terrorist financing risks. Such a partnership will facilitate the identification of FTFs and their facilitation networks. Accurate and forward-looking guidance to the private sector, will further improve their monitoring and screening processes and reporting-time on sensitive transactions which may relate to terrorist financing.

Details: Paris: FATF, 2015. 50p.

Source: Internet Resource: Accessed November 16, 2015 at: http://www.fatf-gafi.org/media/fatf/documents/reports/Emerging-Terrorist-Financing-Risks.pdf

Year: 2015

Country: International

Keywords: Money Laundering

Shelf Number: 137284


Author: McFarland, Charles

Title: Jackpot! Money Laundering through Online Gambling

Summary: The ingenuity of criminals never ceases to amaze us. Whether it's the things they steal or the way they steal them, creativity reigns. That cleverness also flows to converting their ill-gotten gains into "clean" money. Modern money laundering is said to have started during Prohibition in the United States, when the proceeds from illegal alcohol sales needed to be converted into cash flowing from a legitimate business. They took advantage of common, large cash-flow businesses with anonymous, difficult-to-trace transactions - taxi services, restaurants, laundries, foreign currency exchanges come to mind - and many seemingly legitimate fortunes were built as a result. Indeed, several prominent American families trace their financial success to the sale of alcohol during Prohibition. That same basic money-laundering model - taking advantage of accessible, high-volume businesses with anonymous, difficult-to-trace transactions - is applied today by the modern cyber-thief. In this report, we highlight one such example: the use of online gambling sites to launder dirty money. Like criminals during Prohibition, cyber-thieves employing this method depend on anonymity, access, and the river of money that typically flows through an online gambling site.

Details: Santa Clara, CA: McAfee Labs, 2014. 16p.

Source: Internet Resource: Accessed November 16, 2015 at: http://www.mcafee.com/us/resources/white-papers/wp-jackpot-money-laundering-gambling.pdf

Year: 2014

Country: International

Keywords: Cybercrimes

Shelf Number: 137764


Author: International Chamber of Commerce (ICC)

Title: Roles and Responsibilities of Intermediaries: Fighting Counterfeiting and Piracy in the Supply Chain

Summary: Millions of intermediaries are operating throughout the global supply chain and the vast majority of these players are conscientious, trustworthy and reliable partners. ICC's own membership includes millions of companies: many are brand and copyright owners; many are intermediaries; and others have no direct interest or link to the topics covered in this paper. So while this paper does not and cannot reflect the views of all ICC members, nor is it a consensus of the global business community, it has undertaken to ensure accuracy, balance and consistency with ICC's long-standing opposition to counterfeiting and piracy, intellectual property rights infringement, unfair trade, illegal commerce and corruption. For the most part, this body of work substantiates actions intermediaries are already taking independently or in collaboration with rights holders and government authorities to deal with supply chain vulnerabilities. Where these current efforts have been inadequate in protecting against IP infringements, suggestions for better or best practices are put forward. The result is a product that challenges the status quo and offers a roadmap for discussion, collaboration and resolution. We offer the findings and suggested best practices as a springboard for an ongoing dialog among trademark and copyright owners, intermediaries and governments to find solutions to the infiltration of counterfeiting and piracy into the legitimate supply chain. Our hope is that the suggested best practices will help responsible intermediaries more effectively deal with vulnerabilities in their operations and encourage intermediaries who knowingly facilitate IP infringement to stop.

Details: Paris: ICC and BASCAP, 2015. 108p.

Source: Internet Resource: Accessed November 16, 2015 at: http://www.gacg.org/Content/Upload/Documents/2015%20BASCAP%20Intermediares_HR%20(1)%20(1).pdf

Year: 2015

Country: International

Keywords: Counterfeit Goods

Shelf Number: 137197


Author: McBride, Maureen

Title: What works to reduce prejudice and discrimination? A Review of the evidence

Summary: „h This is a review of the international literature and evidence on what measures are considered to be most effective in tackling prejudice. It provides an overview of the key theoretical debates on prejudice reduction, outlines some of the most common interventions, and suggests some lessons that may influence the design of policy interventions in the future. „h The report focuses on high quality empirical studies, a mixture of interventions that were evaluated in 'real world' settings also lab-based psychological experiments. „h The report also reflects on the appropriateness and applicability of such interventions for tackling different types of prejudice in Scotland. This includes exploring some of the key lessons in relation to anti-sectarianism work.

Details: Edinburgh: Scottish Government, 2015. 50p.

Source: Internet Resource: Accessed November 16, 2015 at: http://www.gov.scot/Resource/0048/00487370.pdf

Year: 2015

Country: International

Keywords: Bias

Shelf Number: 137307


Author: ECPAT International

Title: The Commercial Sexual Exploitation of Children in the Commonwealth of Independent States: Developments, progress, challenges and recommended strategies for civil society

Summary: The Commonwealth of Independent States (CIS) is a loose association of nine states formed after the break-up of the Soviet Union in 1991. The resulting political, economic and social upheaval led to progress in some areas, such as poverty reduction. But not all children benefit equally: rural-urban disparities have resulted in the marginalisation of - and often discrimination against - some groups of children, such as Roma and other ethnic minorities, left-behind children of migrant workers and the internally displaced. Combined with consumerism, the rapid expansion of cyber-technology, increased tourism and migration and persistent gender discrimination, these inequalities create a favourable environment for Commercial Sexual Exploitation of Children (CSEC) in the region. Throughout the region poverty leads parents to push their children to earn money; criminals take advantage by recruiting and exploiting children in the sex trade. Offenders run minimal risk of punishment due to widespread lack of awareness of CSEC and easily corrupted officials. Other push factors for CSEC include sexualisation of children in the media, pervasive child abuse in homes and low levels of education. HIV infection rates are rising rapidly in the CIS, especially among young people. Despite increasing concern over CSEC, governments in CIS countries have generally made only limited efforts to address this serious violation of children's rights. Civil society groups such as ECPAT often fill the void, taking responsibility for prevention and protection efforts. In this context, a "Regional Consultation on Action to Stop the Commercial Sexual Exploitation of Children in CIS & Eastern Europe" was held in Sofia, Bulgaria on 25-27 May, 2014, bringing together child rights experts, representatives of regional organisations, young people and leaders of ECPAT member organisations. Participants formulated and agreed upon the list of priority actions to advance child protection from sexual exploitation in Eastern Europe and CIS countries elaborated in this Overview.

Details: Bangkok, Thailand: ECPAT International, 2014. 76p.

Source: Internet Resource: Accessed November 24, 2015 at: http://www.ecpat.net/sites/default/files/Regional%20CSEC%20Overview_CIS%20(English).pdf

Year: 2014

Country: International

Keywords: Child Pornography

Shelf Number: 137323


Author: Institute for Economics and Peace

Title: Global Terrorism Index: 2015. Measuring and Understanding the Impact of Terrorism

Summary: This report provides a detailed analysis of the changing trends in terrorism since 2000, for 162 countries. It investigates the changing patterns of terrorism by geographic activity, methods of attack, organisations involved and the national economic and political context. The GTI has also been compared to a range of socioeconomic indicators to determine the key underlying factors that have the closest statistical relationship to terrorism. In 2014 the total number of deaths from terrorism increased by 80 per cent when compared to the prior year. This is the largest yearly increase in the last 15 years. Since the beginning of the 21st century, there has been over a nine-fold increase in the number of deaths from terrorism, rising from 3,329 in 2000 to 32,685 in 2014. Terrorism remains highly concentrated with most of the activity occurring in just five countries - Iraq, Nigeria, Afghanistan, Pakistan and Syria. These countries accounted for 78 per cent of the lives lost in 2014. Although highly concentrated, terrorism is spreading to more countries, with the number of countries experiencing more than 500 deaths increasing from five to 11, a 120 per cent increase from the previous year. The six new countries with over 500 deaths are Somalia, Ukraine, Yemen, Central African Republic, South Sudan and Cameroon. While the majority of countries in the world did not have a death from terrorism, the total number of countries which experienced at least one death increased by eight, raising the total to 67 countries in 2014. This includes OECD countries such as Austria, Australia, Belgium, Canada and France which experienced high profile terrorist attacks last year. Also notable over the past year is the major intensification of the terrorist threat in Nigeria. The country witnessed the largest increase in terrorist deaths ever recorded by any country, increasing by over 300 per cent to 7,512 fatalities. Boko Haram, which operates mainly in Nigeria, has become the most deadly terrorist group in the world. Boko Haram pledged its allegiance to ISIL (also known as the Islamic State)as the Islamic State's West Africa Province (ISWAP) in March 2015. There was also a shift in the distribution of targets during 2014, with an 11 per cent decrease in the number of deaths of religious figures and worshipers. This was offset by a 172 per cent increase in the deaths of private citizens. The majority of deaths from terrorism do not occur in the West. Excluding September 11, only 0.5 per cent of all deaths have occurred in Western countries in the last 15 years. The West is designated as the countries where ISIL has advocated for attacks. They include the United States, Canada, Australia, and European countries. The report highlights the striking prevalence of lone wolf attacks in the West. Lone wolf attacks account for 70 per cent of all terrorist deaths in the West since 2006. Additionally, Islamic fundamentalism was not the primary driver of lone wolf attacks, with 80 per cent of deaths in the West from lone wolf attacks being attributed to a mixture of right wing extremists, nationalists, anti-government elements, other types of political extremism and supremacism.

Details: New York: Institute for Economics and Peace, 2015. 111p.

Source: Internet Resource: Accessed November 24, 2015 at: http://economicsandpeace.org/wp-content/uploads/2015/11/Global-Terrorism-Index-2015.pdf

Year: 2015

Country: International

Keywords: Extremist Groups

Shelf Number: 137333


Author: Berger, J.M.

Title: The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter

Summary: The Islamic State, known as ISIS or ISIL, has exploited social media, most notoriously Twitter, to send its propaganda and messaging out to the world and to draw in people vulnerable to radicalization. By virtue of its large number of supporters and highly organized tactics, ISIS has been able to exert an outsized impact on how the world perceives it, by disseminating images of graphic violence (including the beheading of Western journalists and aid workers and more recently, the immolation of a Jordanian air force pilot), while using social media to attract new recruits and inspire lone actor attacks. Although much ink has been spilled on the topic of ISIS activity on Twitter, very basic questions remain unanswered, including such fundamental issues as how many Twitter users support ISIS, who they are, and how many of those supporters take part in its highly organized online activities. Previous efforts to answer these questions have relied on very small segments of the overall ISIS social network. Because of the small, cellular nature of that network, the examination of particular subsets such as foreign fighters in relatively small numbers, may create misleading conclusions. The information vacuum extends to - and is particularly acute within - the sometimes heated discussion of how the West should respond to this online campaign. While there are legitimate debates about the bounds of free speech and the complex relationship between private companies and the public interest, some have argued against suspending terrorist social media accounts on the basis that suspensions are not effective at impeding extremist activity online. These arguments that are usually predicated on very small samples of potentially misleading data, when data is proffered at all. We set out to answer some of these important questions using innovative techniques to create a large, representative sample of accounts that can be clearly defined as ISIS supporters, and to attempt to define the boundaries of ISIS's online social network. The goals of the project included: - Create a demographic snapshot of ISIS supporters on Twitter using a very large and accurate sample of accounts (addressed in sections 1 and 2 of this paper). - Outline a methodology for discovering and defining relevant accounts, to serve as a basis for future research using consistent comparison data (section 3). - Create preliminary data and a path to further investigate ISIS-supporting accounts suspended by Twitter and the effects of suspensions (section 2.5). Our findings, based on a sample of 20,000 ISIS supporter accounts, include: - From September through December 2014, we estimate that at least 46,000 Twitter accounts were used by ISIS supporters, although not all of them were active at the same time. - The 46,000 figure is our most conservative estimate for this time frame. Our maximum estimate is in the neighborhood of 70,000 accounts; however, we believe the truth is closer to the low end of the range (sections 1.1, 3.5, 3.6, 3.8). - Typical ISIS supporters were located within the organization's territories in Syria and Iraq, as well as in regions contested by ISIS. Hundreds of ISIS-supporting accounts sent tweets with location metadata embedded (section 1.4). - Almost one in five ISIS supporters selected English as their primary language when using Twitter. Three quarters selected Arabic (section 1.5). - ISIS-supporting accounts had an average of about 1,000 followers each, considerably higher than an ordinary Twitter user. ISIS-supporting accounts were also considerably more active than non-supporting users (section 2). - Much of ISIS's social media success can be attributed to a relatively small group of hyperactive users, numbering between 500 and 2,000 accounts, which tweet in concentrated bursts of high volume (section 2.1). - A minimum of 1,000 ISIS-supporting accounts were suspended between September and December 2014, and we saw evidence of potentially thousands more. Accounts that tweeted most often and had the most followers were most likely to be suspended (section 2.5.1). - At the time our data collection launched in September 2014, Twitter began to suspend large numbers of ISIS-supporting accounts. While this prevented us from creating a pre-suspension dataset, we were able to gather information on how the removal of accounts affected the overall network (section 2.5.4). - Account suspensions do have concrete effects in limiting the reach and scope of ISIS activities on social media. They do not, at the current level of implementation, eliminate those activities, and cannot be expected to do this. Some critics argue suspensions are ineffective because ISIS propaganda is still available on Twitter. Any balanced evaluation of current levels of suspension activity clearly demonstrates that total interdiction is not the goal. The qualitative debate is over how suspensions affect the performance of the network and whether a different level of pressure might produce a different result (sections 2.5, 4.2). While it is possible to target suspensions in a manner that would be far more devastating to ISIS networks, we do not advise such an approach for several reasons (sections 4.1 and 4.3). - The process of suspension does create certain new risks. Most importantly, while suspensions appear to have created obstacles to supporters joining ISIS's social network, they also isolate ISIS supporters online. This could increase the speed and intensity of radicalization for those who do manage to enter the network, and hinder organic social pressures that could lead to deradicalization (section 4.3). - Further study is required to evaluate the unintended consequences of suspension campaigns and their attendant trade-offs. Fundamentally, tampering with social networks is a form of social engineering, and acknowledging this fact raises many new, difficult questions (section 4.3). - Social media companies and the U.S government must work together to devise appropriate responses to extremism on social media. Although discussions of this issue often frame government intervention as an infringement on free speech, in reality, social media companies currently regulate speech on their platforms without oversight or disclosures of how suspensions are applied (section 4.4). Approaches to the problem of extremist use of social media are most likely to succeed when they are mainstreamed into wider dialogues among the wide range of community, private, and public stakeholders.

Details: Washington, DC: Brookings Institute, Center for Middle East Policy, 2015. 68p.

Source: Internet Resource: Analysis Paper No. 20: Accessed November 27, 2015 at: http://www.brookings.edu/~/media/research/files/papers/2015/03/isis-twitter-census-berger-morgan/isis_twitter_census_berger_morgan.pdf

Year: 2015

Country: International

Keywords: Extremism

Shelf Number: 137342


Author: Fulu, E.

Title: What works to prevent violence against women and girls evidence reviews. Paper 2: Interventions to prevent violence against women and girls

Summary: Violence against women and girls (VAWG) is one of the most widespread violations of human rights worldwide, affecting one-third of all women in their lifetime. It is the leading cause of death and disability of women of all ages and has many other health consequences. VAWG is a fundamental barrier to eradicating poverty and building peace. To prevent VAWG, we need to address the underlying causes of the problem. Evidence shows that no single factor causes violence, nor is there a single pathway to perpetration. Violence emerges from the interplay of multiple interacting factors at different levels of the social 'ecology', as discussed below. These include genetic endowment, experiences of violence and abuse in childhood, relationship dynamics, household and community structures and social norms, the macro-level and global-level forces that shape prevailing norms, access to resources, gender roles and the relative power of men versus women. Interventions that have the potential to reduce rates of VAWG are, similarly, many and varied: they may target one or more risk factors and operate across single or multiple settings. 1.1 What Works global programme and evidence review This paper is the second in a series of four evidence reviews that were produced by What Works to Prevent Violence against Women and Girls (What Works). What Works is a UK Department for International Development (DFID)-funded global programme that is investing an unprecedented $25 million over five years to assist with the prevention of VAWG. It supports primary prevention efforts across Africa, Asia, and the Middle East, which seek to understand and address the underlying causes of violence in order to stop it before it starts. The papers were produced to assess the current state of research and the evidence base in order to inform the research agenda of the ensuing global program. The focus of What Works is to advance the field of primary prevention in particular, however this is understood to be closely aligned with response efforts. The papers therefore focus on prevention, although response mechanisms are also considered, particularly in Paper 3. The outline of the four papers is as follows: Paper 1: State of the field of research on violence against women and girls Paper 2: Interventions to prevent violence against women and girls. Paper 3: Response mechanisms to prevent violence against women and girls. Paper 4: Approaches to scale-up and assessing cost effectiveness of programmes to prevent violence against women and girls.

Details: Pretoria, South Africa: What Works to Prevent Violence, 2015. 67p.

Source: Internet Resource: Accessed November 28, 2015 at: http://www.whatworks.co.za/documents/publications/15-global-evidence-reviews-paper-2-interventions-to-prevent-violence-against-women-and-girls/file

Year: 2015

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 137348


Author: Holden, Jenny

Title: We Want to Learn About Good Love: Findings from a Qualitative Study Assessing the Links Between Comprehensive Sexuality Education and Violence Against Women and Girls

Summary: Comprehensive sexuality education (CSE) - including learning about relationships, gender and gender-based violence (GBV), sex, sexuality, and sexual and reproductive health and rights (SRHR) - can empower young people to make informed, autonomous decisions regarding their current and future relationships. CSE may also influence a positive shift in social norms which underpin violence against women and girls (VAWG), such as harmful notions of masculinity, and rigid gender roles and stereotypes - both in schools and the wider community. Drawing on global evidence on CSE interventions and primary and secondary research in Cambodia and Uganda1, this report explores the extent to which CSE may be a key mechanism to promote gender equality, shift harmful social norms and prevent VAWG. This report finds compelling evidence that CSE can be seen not only as part of a quality education, but also as part of a holistic approach to preventing VAWG. However, more evidence on 'what works' in changing attitudes on gender equality and reducing VAWG as part of CSE delivery is needed.

Details: London: Plan International UK and Social Development Direct, 2015. 52p.

Source: Internet Resource: Accessed November 28, 2015 at: http://www.plan-uk.org/assets/Documents/pdf/we-want-to-learn-about-good-love

Year: 2015

Country: International

Keywords: Educational Programs

Shelf Number: 137347


Author: Webster, Colin

Title: Poverty and Crime Review

Summary: This review of the literature about how and why poverty and crime influence one another, and the benefits to crime reduction of reducing poverty, looks at the implications for practical policies and strategies. Methods The review gathered and reviewed 173 of the most cited and/or important articles and monographs published mostly between 1980 and 2013 that directly or indirectly tested the poverty and crime (P‐C) link in the United States, United Kingdom and Europe. The start date 1980 reflects a growing interest in the impact of poverty on crime, coinciding with steep rises of poverty and unemployment at a time that began to see steep rises in the crime rate too. In marshalling studies about crime and poverty, various methodological and substantive blind‐spots in the criminological literature needed to be taken into account and overcome. Large national studies of poverty and crime in Britain, like studies of crime and class, are absent, despite a widespread impression that crime is prevalent among the poor and lower social classes. In Britain, neither criminal nor prison statistics control for poverty or socioeconomic status, made all the more remarkable when proxies for poverty such as employment status at arrest and conviction are taken into account, which show the majority of those arrested and imprisoned having experienced poverty. Further, changes in British Crime Survey (BCS) sampling and changes in the availability of data have made analysis of the impact of poverty on crime impossible. The overall method was to triangulate different approaches, methods and data so that the weaknesses of one might be compensated by the strengths of another. To discover what the cumulative effects of growing up poor might be on engaging in criminal activity we gathered studies that looked at processes of persistent or recurring childhood and family poverty, linked to crime, using longitudinal cohort studies. Associations, correlations and causes in poverty‐crime relationships were sort using cohort and time series data as well as cross sectional studies. As Valdez et al (2007:595) tell us, any poverty and crime link'...involves a complex interrelationship among mediating individual and community‐level variables'. Another aspect of our methods was to capture the different levels and scales of data and analysis - individual, household and neighbourhood - in poverty and crime relationships. We looked at smaller, local studies as well as national studies using aggregate data. Finally we examined quantitative and qualitative approaches to the impact of poverty on crime.

Details: York, UK: Joseph Rowntree Foundation, 2014. 47p.

Source: Internet Resource: Anti-Poverty Strategies for the UK: Accessed November 28, 2015 at: http://eprints.lancs.ac.uk/71188/1/JRF_Final_Poverty_and_Crime_Review_May_2014.pdf

Year: 2014

Country: International

Keywords: Neighborhoods and Crime

Shelf Number: 137357


Author: Weaver, Beth

Title: Families of Prisoners: A Review of the Evidence

Summary: The purpose of this paper is to increase awareness of the issues experienced by the children and families of prisoners and to provide a resource to be used in conjunction with other resources to inform the "Child and Family Impact Assessments" and subsequent support proposed by the Criminal Justice (Scotland) Bill. This paper represents a summary of research into the needs and experiences of children and families of prisoners; the impact of imprisonment on family relationships; and the role that families play in supporting the reintegration process. The literature reviewed here highlights that the impacts of imprisonment on children and families can be significant and wide ranging, including emotional, social, psychological, financial, relational, physical and developmental effects. However, the extent to which a child or family will be affected will be influenced by a myriad of factors particular to that child and their family, and the impact will vary according to the nature of the offence, pre-prison variables and other underlying difficulties, relational dynamics, care arrangements (before and during the period of incarceration), and the wider support systems and socio-structural context. Likewise the impact of imprisonment on family relationships is not straightforward and is influenced by various factors including pre-prison factors (such as the residential status of the imprisoned parent and relationship quality), which relationship is being considered (i.e. with intimate partners or parent/child), and the level and type of in-prison contact. Moreover, whilst the role and range of supports that families can provide in resettlement support is recognised as critical, such generalisations obscure the complexity and contingency of the experiences and effects of imprisonment for prisoners' families, on relationships, and their capacities to provide this support. Consequently, a number of implications for policy and practice are evident, including: - Progressing the details of the Support for Children (Impact of Parental Imprisonment) (Scotland) Bill via the Criminal Justice (Scotland) Bill; - Reducing the use of imprisonment; - Adopting a multi-disciplinary and "Whole Family" approach to all practice that takes seriously the views of the incarcerated parent, their child[ren] and their family and which identifies, assesses and builds on their needs and strengths; - Ensuring the identification, and completion of individualised and holistic assessments, of the children and families of prisoners that include factors at the level of the individual, wider family and community; - Supporting the needs of children and families of imprisoned parents through the proactive provision of timely information, practical advice, and emotional support, which may be via peer support groups; problem solving family work; and/or proactively referring such families to specialist services; - Where appropriate, supporting contact with the imprisoned family member; - Increased public and professional awareness of the prevalence of parental imprisonment and the needs and strengths of families of prisoners.

Details: Glasgow: Centre for Youth & Criminal Justice, 2015l 22p.

Source: Internet Resource: Accessed November 28, 2015 at: http://www.cycj.org.uk/wp-content/uploads/2015/11/Families-of-Prisoners-A-Review-of-The-Evidence-FINAL.pdf

Year: 2015

Country: International

Keywords: Children of Prisoners

Shelf Number: 137358


Author: INTERPOL Environmental Crime Programme

Title: Environmental Crime and its Convergence with other Serious Crimes

Summary: The capacity for INTERPOL Member Countries to effectively respond to environmental crime when it intersects with other serious1 crimes is a common theme that arises when INTERPOL engages with its members. The nature of "crime convergence" (also referred to as "threat convergence") raises a number of complexities and challenges in all phases of enforcement, from detection and disruption to the dismantling of criminal syndicates. In fact, it is one of the greatest challenges cited by officers from environment and policing agencies at regional and international investigative meetings and one that they all seek to understand and address. Key INTERPOL partners are also aware of the challenges associated with convergence, and are calling for greater understanding of crime convergence and law enforcement countermeasures. To stimulate discussion on this topic, this report provides insight into the nature of crime convergence within the context of environmental crime, where it is becoming increasingly apparent and complex. An example is seen when poly-crime syndicates traffic in a range of illicit goods in addition to environmental products. The report also examines the types of significant crimes that Member Countries have brought to INTERPOL's attention through their environmental crime investigations. The nature of crime convergence is subsequently discussed in terms of its challenges as well as the opportunities it presents to law enforcement. The report makes a number of suggestions on how agencies can better respond to convergence in transnational and national operations. In doing so, it promotes an integrated multi-disciplined and multi-agency law enforcement approach that is both strategic and operational in nature. The report concludes with a number of practical strategies for consideration by enforcement agencies.

Details: The Hague: INTERPOL, 2015. 13p.

Source: Internet Resource: Accessed November 28, 2015 at: http://www.interpol.int/Crime-areas/Environmental-crime/Resources

Year: 2015

Country: International

Keywords: Criminal Investigations

Shelf Number: 137366


Author: Bartlett, Jamie

Title: The State of the Art 2015: A literature review of social media intelligence capabilities for counter-terrorism

Summary: This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it. In particular, the context in which this research took place has changed in a number of significant ways. First, there have been continuing concerns about internet surveillance and privacy following the revelations of NSA contractor Edward Snowden. Second, and partly as a result, there have been changes in the way that people use social media, and indeed in social media companies and platforms themselves. Third, so-called Islamic State (IS) made social media a central component of their modus operandi - particularly for propagandistic purposes. Finally, the methods and software used to make sense of social media have continued to improve. Social media research has emerged as a practice, but is still not yet a coherent academic discipline or distinctive intelligence tradecraft. It is neither a distinct area of study, nor driven by a united research community. It is conducted across the public, private and academic sectors, spanning disciplines from the computer sciences and ethnography to advertising and brand management. Its aims range from understanding the topography of social networks comprising millions of individuals to the deep, textured knowledge of the social worlds of individuals and small groups. As such, techniques and approaches often reflect specific disciplinary traditions and rarely refer to those found elsewhere. Social media research is also fragmented by platform. There is already a distinct nascent discipline surrounding Twitter, driven by free access to millions of tweets, an easily available Application Programming Interface (API) and fewer concerns about privacy and intrusion. Since 2008, the corpus of work on 'Twitterology' has grown from a handful to hundreds of research papers, covering everything from topic identification to event detection and political forecasting.

Details: London: Demos, 2015. 98p.

Source: Internet Resource: Accessed December 1, 2015 at: http://www.demos.co.uk/files/State_of_the_Arts_2015.pdf?1442411063

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 137369


Author: Bartlett, Jamie

Title: Online Anonymity: Islamic State and Surveillance

Summary: This is a very short discussion paper about the way in which terrorist groups, and specifically Islamic State, use modern encryption systems to evade surveillance. It examines how the risks of online anonymity are weighed against its many social, personal and economic benefits. It sets out a small number of recommendations about how the intelligence and security services might respond to the growing availability and use of encryption services.

Details: London: Demos, 2015. 20p.

Source: Internet Resource: Accessed December 1, 2015 at: http://www.demos.co.uk/files/Islamic_State_and_Encryption.pdf?1426713922

Year: 2015

Country: International

Keywords: Encryption

Shelf Number: 137372


Author: Cockayne, James

Title: What Comes After the War on Drugs - Flexibility, Fragmentation or Principled Pluralism?

Summary: In April 2016, diplomats, experts and civil society actors from around the world will gather for three days at a rare Special Session of the United Nations General Assembly in New York, called to address the world drug problem (UNGASS 2016). In some quarters, particularly in the Western Hemisphere, UNGASS 2016 is seen as a moment to rethink global drug control strategies. In other regions, UNGASS 2016 is viewed somewhat differently, as a time to build upon and strengthen the current approach to drug policy, as set out in a current Plan of Action adopted in 2009. Throughout 2015, United Nations University (UNU) - a global think tank established by the UN General Assembly, and charged with contributing, through collaborative research, to collective efforts to resolve pressing global challenges - has been gathering stakeholders in a series of meetings at United Nations (UN) headquarters in New York, aimed at "Identifying Common Ground" ahead of UNGASS 2016. These meetings have addressed the relationship between contemporary global drug policy and public health, human rights, development and criminal justice. These meetings have been attended by delegates from more than 50 UN Member States, as well as representatives of 16 UN entities and 55 civil society and academic organizations. Drawing on these consultations, this Policy Report outlines how the global drug control system works, including recent trends; describes three major perspectives going into UNGASS 2016: Orthodoxy, Scepticism and Swing Voting; explores the likely outcome of UNGASS 2016; and makes recommendations for strengthening that outcome.

Details: Tokyo: United Nations University, 2015. 59p.

Source: Internet Resource: A Policy Report: Accessed December 1, 2015 at: http://i.unu.edu/media/unu.edu/news/72569/UNU_Drug_Policy_Online_Final.pdf

Year: 2015

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 137373


Author: Gutierrez, Eric

Title: Drugs and illicit practices: assessing their impact on development and governance

Summary: The illicit drugs trade is now so powerful that it is virtually shaping the economies, governance and social fabric of entire nations, says a new report commissioned by Christian Aid. Entitled Drugs and Illicit Practices, assessing their impact on development and governance, the report examines four countries where an increasingly active drugs trade has begun to affect development. The countries are Afghanistan, which produces opium, and Colombia, where cocaine is manufactured, together with two major transit points for narcotics, Mali, from where cocaine from South America is moved north into Western Europe, and Tajikistan, through which heroin passes en route to more lucrative markets in Russia, as well as Eastern and Western Europe. The report shows how in each case, key state functions have effectively been subverted by the scale of the trade, citing instances where drug networks have become providers of much-needed jobs and investment, drug barons have been elected to government office and criminal syndicates serve as shadow sub-contractors of state security. This report has been produced by Christian Aid to broaden the debate on drugs policies worldwide prior to a special session of the United Nations General Assembly early next year to discuss the global drugs problem. It is a collection of case studies published in the names of its independent authors, with the views expressed not necessarily endorsed by Christian Aid.

Details: London: Christian Aid, 2015. 114p.

Source: Internet Resource: Christian Aid Occasional Paper: Accessed December 1, 2015 at: http://www.christianaid.org.uk/Images/Drugs-and-illicit-practices-Eric-Gutierrez-Oct-2015.pdf

Year: 2015

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 137374


Author: Fulu, E.

Title: What works to prevent violence against women and girls evidence reviews. Paper 1: State of the field of research on violence against women and girls

Summary: This paper outlines our current knowledge base regarding the issue of VAWG and identifies where the evidence base needs to be expanded in order to inform more sophisticated interventions and make a real impact on the prevalence of VAWG globally. It highlights the implications of this knowledge for prevention interventions and points to how information can be used to drive current policies and programmes as well as future research endeavours.

Details: Pretoria, South Africa: What Works to Prevent Violence, 2015. 47p.

Source: Internet Resource: Accessed December 2, 2015 at: http://www.whatworks.co.za/documents/publications/16-global-evidence-reviews-paper-1-state-of-the-field-of-research-on-violence-against-women-and-girls/file

Year: 2015

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 137416


Author: Sude, Barbara

Title: Lessening the Risk of Refugee Radicalization. Lessons for the Middle East from Past Crises

Summary: The exodus of more than 4 million refugees from Syria since 2011 raises questions about whether Syrian refugee concentrations will become incubators for violent extremist groups. This Perspective takes a preliminary look at nine historical situations in which populations fled violent conflict or repression—in South Asia, East Africa, Central Africa, and the Middle East—several of which became associated with the rise of militant and terrorist groups, to identify the factors in the way refugee situations are managed that are most likely to contribute to radicalization, defined as the process of committing to political or religious ideologies that espouse change through violence. The authors found that factors such as overcrowding, hunger, poverty, and local crime risk refugee alienation and can increase general violence, but specific combinations of factors can be more relevant for predicting the conditions most likely to contribute to radicalization: actions of the receiving country and its citizens, the refugees' loss of personal opportunities in prolonged crises, and lack of integrated programs. In the case of Syrian refugees, the international community has the right ideas to address many of the major risk factors, but comprehensive programs, rare in the historical cases, remain difficult to implement or sustain today.

Details: Santa Monica, CA: RAND, 2015. 25p.

Source: Internet Resource: Accessed January 11, 2016 at: http://www.rand.org/content/dam/rand/pubs/perspectives/PE100/PE166/RAND_PE166.pdf

Year: 2015

Country: International

Keywords: Radical Groups

Shelf Number: 137445


Author: United Nations Office on Drugs and Crime (UNODC)

Title: The Concept of "Exploitation" in the Trafficking in Persons Protocol

Summary: Article 3(a) of the United Nations Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime (Trafficking in Persons Protocol) defines trafficking in persons as constituting three elements: (i) an "action", being recruitment, transportation, transfer, harbouring or receipt of persons; (ii) a "means" by which that action is achieved (threat or use of force or other forms of coercion, abduction, fraud, deception, abuse of power or a position of vulnerability, and the giving or receiving of payments or benefits to achieve consent of a person having control over another person); and (iii) a "purpose" (of the action/means): namely, exploitation. Exploitation is not specifically defined in the Protocol but stipulated to include, at a minimum: "the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery, servitude or the removal of organs." The definition further clarifies in Article 3(b), that consent of the victim to the intended exploitation is irrelevant when any of these 'means' have been used. All three elements (act, means and purpose) must be present to constitute 'trafficking in persons' in the Trafficking in Persons Protocol. The only exception is that when the victim is a child, the 'means' element is not part of the definition. The Protocol definition has been widely embraced by States and the international community. However, over the past decade it has become evident that questions remain about certain aspects of that definition and its practical application. This is important because to characterize certain conduct as 'trafficking' has significant and wide-ranging consequences for the alleged perpetrators of that conduct, and for the alleged victims. There may also be consequences for States - both internally in terms of constructing a national understanding of the nature and extent of the 'trafficking problem', and externally, in relation to various institutions and mechanisms that concern themselves with States' response to 'trafficking'. The potential breadth and narrowness of the definition has raised several issues to which States have taken quite different positions. Those who support a conservative or even restrictive interpretation of the concept of trafficking consider that too wide a definition may encompass practices that do not meet the high seriousness threshold expected of 'trafficking'. Those who advocate for a more expansive interpretation consider that too narrow an understanding of what is 'trafficking' may impede investigations, prosecutions and convictions related to practices that should indeed fall within this term - or indeed operate to exclude such practices altogether. Claims that 'all trafficking is slavery' and 'all forced labour is trafficking' are just two manifestations of what has been termed 'exploitation creep'. The risk that important concepts contained in the Protocol are not clearly understood and, therefore, are not consistently implemented and applied has been acknowledged by States Parties. In 2010, the Open-ended Interim Working Group on the Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, supplementing the United Nations Convention against Transnational Organized Crime (Working Group on Trafficking in Persons) recommended that UNODC prepare a series of Issue Papers "to assist criminal justice officers in penal proceedings" on several concepts identified as problematic. The first Issue Paper, on the concept of "abuse of a position of vulnerability and other 'means'" was completed and issued in 2012, along with a Guidance Note for Practitioners. The second study, which dealt with the issue of "consent" was completed and issued in 2014. That study did not lend itself to a Guidance Note but a list of 'Key Considerations" for practitioners was formulated and included as an annex to the Issue Paper. The present study focuses on the third definitional concept identified as requiring attention: the concept of "exploitation". Each study has adopted a similar methodology, with occasional refinements to reflect lessons learned. The methodology includes (i) a desk review of relevant literature including legislation and case law; (ii) a survey of States representing different regions and legal traditions through legislative and case review as well as interviews with practitioners; (iii) preparation of a draft issue paper; (iii) review of the draft issue paper and development of additional guidance at an international expert group meeting; and (v) finalization of the Issue paper and any associated guidance. This present Issue Paper is divided into five parts. Part 1 sets out introductory and background material. Part 2 provides an overview and analysis of the international legal and policy framework around exploitation with a particular focus on the Trafficking in Persons Protocol. Part 3 summarises and analyses the results of the survey conducted of national law and practice as it relates to exploitation within the definition of trafficking. Part 4 seeks to draw together the findings from the survey. The final part, Part 5, provides guidance emanated in the process of developing this paper, including through the surveys and expert interviews as well as in the expert group meeting in October 2014.

Details: Vienna: United Nations Office on Drugs and Crime, 2015. 136p.

Source: Internet Resource: Accessed January 12, 2016 at: https://ec.europa.eu/anti-trafficking/sites/antitrafficking/files/unodc_ip_exploitation_2015.pdf

Year: 2015

Country: International

Keywords: Forced Labor

Shelf Number: 137472


Author: United Nations Office on Drugs and Crime (UNODC)

Title: The role of recruitment fees and abusive and fraudulent recruitment practices of recruitment agencies in trafficking in persons

Summary: The United Nations Office on Drugs and Crime (UNODC), as the guardian of the Protocol to Prevent, Suppress and Punish Trafficking in Persons (the Trafficking in Persons Protocol), assists Member States in their efforts to effectively implement the Trafficking in Persons Protocol and to build comprehensive and effective responses to trafficking in persons. Among other work, UNODC supports Member States through the development of various research and issue papers and reports on trafficking in persons. The purpose of this work is to help improve understanding of the complex nature of the crime of trafficking in persons, with the ultimate goal to allow for better prevention of the crime, prosecution of traffickers, protection of trafficking victims, and creation of more effective partnerships and cooperation among States and between different stakeholders. The present report aims to shed light on one of the burning issues concerning trafficking in persons, namely the linkages between recruitment fees and abusive and fraudulent practices of recruitment agencies and trafficking in persons. Recruitment agencies can play a legitimate and essential role in facilitating supply and demand in labour markets, across geographies and sectors. In particular, they often facilitate the movement of workers looking for job opportunities outside their home countries. Yet, abusive recruitment practices seem to flourish in all parts of the world. Such practices seem to be closely linked with trafficking in persons. In many countries recruiters and recruitment agencies charge workers fees for recruitment services that far exceed the legal limits or that might be prohibited altogether. The indebtedness that often follows and the need to repay the debt often drives workers to accept difficult or exploitative working conditions, making them vulnerable to trafficking in persons. In addition, the role of recruitment fees and agencies in trafficking in persons can go beyond just creating vulnerabilities in workers to trafficking in persons. Recruiters and recruitment agencies might be directly involved in trafficking criminal networks aiming to exploit workers. The purpose of this paper is to examine the relationship between recruitment fees and other abusive and fraudulent practices of recruitment agencies and trafficking in persons, with a particular focus on criminal justice measures to address this relationship. While there have been numerous incidents of abusive recruitment practices and subsequent labour exploitation reported in all parts of the world, little is known about how States respond to the phenomenon and whether they use their anti-trafficking legislation to prosecute persons involved in such recruitment practices. The paper examines the State practice with a view to highlighting lessons learned and providing recommendations on how to adequately respond to the issue. Addressing the role of recruitment fees and agencies in trafficking in persons is a challenging undertaking, since the topic has not yet been thoroughly examined and globally the criminal justice responses and measures in this regard appear to be very limited. Yet, it is hoped that the report will increase knowledge and awareness of the linkages between trafficking in persons and abusive recruitment practices and shed light on the existing responses. It should be noted that the present report is complemented by the report "Regulating labour recruitment to prevent human trafficking and to foster fair migration: models, challenges and opportunities" prepared by the International Labour Organization (ILO), an outcome document of the ILO's parallel, related research. While these are two separate reports, UNODC and the ILO have developed joint recommendations stemming from both Organizations' research, which will be launched together with the respective publications of ILO and UNODC.

Details: Vienna: UNODC, 2015. 86p.

Source: Internet Resource: Accessed January 12, 2016 at: https://www.unodc.org/documents/human-trafficking/2015/15-05035_ebook-_Recruitment_Fees.Agencies.pdf

Year: 2015

Country: International

Keywords: Forced Labor

Shelf Number: 137473


Author: Mundy, Victoria

Title: Traceability Systems in the CITES Context: A review of experiences, best practices and lessons learned for the traceability of commodities of CITES-listed shark species

Summary: At its 27th meeting (AC27, Veracruz, 2014), the CITES4 Animals Committee agreed on a number of recommendations relevant to addressing the implementation challenges posed by the inclusion of five species of sharks and both species of manta ray Manta spp. in CITES Appendix II at the 16th meeting of the Conference of the Parties (CoP16, Bangkok, 2013). These recommendations, which support implementation of CITES Resolution Conf. 12.6 (Rev. CoP16) on the Conservation and management of sharks, were considered at the 65th meeting of the CITES Standing Committee (SC65, Geneva) in July 20145 and an intersessional working group was established with a mandate to consider these recommendations. The current project contributes to the fulfillment of the following recommendations agreed at AC27 (paragraph numbers refer to SC65 Doc. 46 on sharks and rays) and will support the deliberations of the Standing Committee intersessional working group on sharks: - Paragraph o) The Animals Committee requests the Standing Committee, at its 65th meeting, to consider relevant matters relating to the implementation of shark listings, including the following: o ii. Issues pertaining to chain of custody, including where in the trade chain it is considered essential to be able to identify the products in trade; - Paragraph p) Both the Standing Committee and the Animals Committee should review the requirements that have been developed for the trade in processed product types of Appendix II species such as crocodile skins, caviar etc. and consider their applicability to shark products containing Appendix II species. Specifically, this report presents the findings of a review of traceability systems that have been developed in the CITES context for the trade in processed product types of Appendix II-listed species. The report considers the experiences, lessons learned and best practices from these case studies for ensuring the traceability of products of shark species listed in CITES Appendix II, and analyses the potential for establishing an effective traceability system - along the lines of those already developed in the CITES context - for shark commodities. For a review of the market chain and other traceability systems developed for commercially exploited aquatic species, see Andre (2013) and the following report produced for the CITES Secretariat: Traceability study in shark products (Lehr et al., 2015). The case studies of focus in this report are traceability systems developed for sturgeon caviar, crocodile skins, Queen Conch Strombus gigas, and timber, and/or related developments, as appropriate. These examples were selected as case studies, in light of experience and recent progress on issues relating to traceability and the potential to provide relevant guidance for the traceability of CITES-listed shark products. The remainder of this report is structured as follows: - Section 2 provides an overview of the methods used to gather information for this report. - Section 3 provides a brief explanation of traceability and how this operates in the CITES context. - Section 4 presents the results of the review of traceability systems developed for sturgeon caviar, crocodile skins, Queen Conch and timber in the CITES context. - Section 5 assesses the use of traceability measures for commodities of CITES Appendix II-listed shark species, based on the experiences, lessons learned and best practices identified in the review of CITES systems.

Details: Cambridge, UK: TRAFFIC, 2015. 90p.

Source: Internet Resource: Accessed January 13, 2016 at: http://www.traffic.org/home/2016/1/7/new-traffic-study-throws-light-on-supply-chain-traceability.html

Year: 2015

Country: International

Keywords: Sharks

Shelf Number: 137573


Author: Liljeblad, Jonathan

Title: The Elephant and the Mouse that Roared: the prospects of international policy and local authority in the case of the convention on international species (CITES)

Summary: Prevailing U.S. government philosophy espouses the devolution of authority from federal to local levels. This trend opens the possibility of greater local involvement in policy implementation, and provides international policy-makers the opportunity to improve global policies by adding the efforts of local actors to their implementation framework. Much of international policy involves enforcement through international-to-national linkages, but devolution offers the potential to extend the implementation chain by providing national-to-local linkages. The analysis explores the nature of such linkages, using the case study on the Convention on the International Trade in Endangered Species (CITES) via its domestic analogue, the Endangered Species Act (ESA). The research finds that while the framework of CITES enforcement in the U.S. allows for a national-to-local extension in the CITES implementation chain, it also presents challenges that should be addressed by international policy-makers who consider devolution as a way of improving global policy.

Details: Los Angeles: University of Southern California, 2008. 480p.

Source: Internet Resource: Dissertation: Accessed January 14, 2016 at: http://digitallibrary.usc.edu/cdm/ref/collection/p15799coll127/id/80014

Year: 2008

Country: International

Keywords: Endangered Species

Shelf Number: 137578


Author: Marshall, Andrew

Title: What's Yours Is Mine: New Actors and New Approaches to Asset Recovery in Global Corruption Cases

Summary: This study is about recovering money stolen by corrupt politicians and officials. Asset recovery is a key element in deterring and punishing the corrupt, and the reduction of corruption is critical to development. The money can be put to better uses once recovered, and it amounts to billions. But there's another reason why this is significant for those who are primarily focused on development: among the key issues in asset recovery are greater accountability and transparency, which are also increasingly regarded as key to long-term development success. The main argument of this study is that corruption investigations and asset recovery are being tackled in new ways by new actors from the private sector, civil society, and media, and that this can help improve the prospects for justice. It would be too much to call this a revolution: it's an evolutionary process. It needs long-term support if it is to prosper as a policy choice, and it raises some issues for policymakers and those who carry out the recoveries. But if the agenda for accountability is to advance at the same pace as transparency, the prosecution of the corrupt and the return of the money they stole is critical.

Details: Washington, DC: Center for Global Development, 2013. 42p.

Source: Internet Resource: CGD Policy Paper 018: Accessed January 28, 2016 at: http://www.cgdev.org/sites/default/files/whats-yours-is-mine_0.pdf

Year: 2013

Country: International

Keywords: Asset Forfeiture

Shelf Number: 137702


Author: Briscoe, Ivan

Title: The new criminal powers: The spread of illicit links to politics across the world and how it can be tackled

Summary: Treating organized crime and corruption as a 'cancer' or a 'virus' has become shorthand in international policy circles. It is used as a diagnosis to explain how countries as diverse as Mali, Ukraine or Mexico have fallen under the influence of criminal rackets that exercise control over certain state bodies, politicians, judges, police forces or territory. However, in this web report it is argued that an approach rooted in the notion of institutional capture by an external criminal force is - despite its persuasive rhetoric - gravely mistaken. For various reasons, illicit activity has become part of the living organism of many countries' public and business affairs. It must be treated not as a foreign body, but as an integral part of governance and economic systems. It is therefore essential that policy responses are adapted to this reality. Organized crime has undergone fundamental changes in size and shape over the past two to three decades. The authors seek to explain how these changes in criminal patterns and effects have occurred, and what might be done to respond to them in a way that would emphasize the protection of democracy, good governance and human welfare.

Details: The Hague: Clingendael (Netherlands Institute of International Relations), 2016. 44p.

Source: Internet Resource: Accessed January 28, 2016 at: http://www.clingendael.nl/publication/new-criminal-powers

Year: 2016

Country: International

Keywords: Organized Crime

Shelf Number: 137706


Author: Loertscher, Seth

Title: Held Hostage: Analyses of Kidnapping Across Time and Among Jihadist Organizations.”

Summary: In March 2013, David Haines and Frederico Motka were kidnapped while traveling together near the Turkish border in Syria. The men were both foreigners and aid workers. They were held in the same prison by the same militant group. Yet they suffered sharply different fates. In May 2014, Motka was released, while four months later, Haines became the fourth Westerner to be beheaded by the Islamic State. Press accounts noted that the major difference between the men was their nationality: Motka was Italian; Haines was British. In the summer of 2014, the Islamic State began its campaign of public executions of kidnapped Westerners. Though these barbaric acts captured the world’s attention, hostage taking is not new. Nevertheless, research designed to increase our understanding of this threat is limited. As in the example provided above, most discussions regarding kidnappings rely on anecdotal evidence. A more detailed analysis of key questions regarding the role of group type, nationality of the victim, and outcome as they relate to kidnapping incidents has been lacking for want of publicly available data. In an effort to address this, the CTC presents “Held Hostage: Analyses of Kidnapping Across Time and Among Jihadist Organizations,” a report that examines trends related to the kidnapping of Westerners by jihadist groups. The report relies on a newly gathered open-source dataset of the kidnapping of Westerners from 2001–2015, which the CTC publicly releases together with this report. We believe that the report and accompanying data will be an important resource for policymakers, practitioners, and academics interested in this area.

Details: West Point, NY: Combating Terrorism Center at West Point, United States Military Academy, 2015. 53p.

Source: Internet Resource: Accessed February 1, 2016 at: https://www.ctc.usma.edu/programs-resources/hostage-project

Year: 2015

Country: International

Keywords: Hostage Taking

Shelf Number: 137712


Author: Environmental Investigation Agency

Title: Dual Extinction: The Illegal Trade in the Endangered Totoaba and its Impact on the Critically Endangered Vaquita

Summary: The vaquita and the totoaba have much in common: both are critically endangered, both are protected from international trade under CITES and both are endemic to a relatively small area of the Upper Gulf of California, Mexico. They are of a similar size, have a similar lifespan and both species are threatened with extinction by the same activity - illegal fishing. The vaquita is a small porpoise found only in the waters of the northern Gulf of California, off the coast of Mexico. In 1997, its population was estimated at 567 but by 2014 it had plummeted to just 97 animals due to fishery bycatch. Recent evidence based on acoustic monitoring suggests a 42 per cent decline in the vaquita population between 2013-14. This decline is attributed to the resurgence of an illegal fishery for totoaba, the swim bladders of which are highly sought in Hong Kong and southern mainland China. Dubbed 'aquatic cocaine' due to the high prices it fetches, the demand for dried totoaba swim bladders is threatening not just the totoaba but also the vaquita - the world's most endangered marine mammal, which is accidentally caught in the illegal nets set for totoaba.

Details: London: Washington, DC: EIA, 2016. 11p.

Source: Internet Resource: Accessed February 1, 2016 at: https://drive.google.com/viewerng/viewer?url=https://eia-international.org/wp-content/uploads/EIA-Dual-Extinction.pdf

Year: 2016

Country: International

Keywords: Endangered Species

Shelf Number: 137714


Author: Flynn, Michael

Title: Immigration Detention in the Gulf

Summary: Labour migrants are a backbone of the economies of all the member states of the Gulf Cooperation Council--Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, and the United Arab Emirates. While much has been reported on the abuses these workers often suffer, very little is known about what happens to them when they are arrested and detained. This GDP Special Report helps fill this gap. Based on a two-year investigation, this report shows that while all the Gulf states provide constitutional guarantees against arbitrary or unlawful arrest and imprisonment, they all make widespread use of forms of immigration-related detention for the purposes of punishing or deporting foreigners, often in situations that may be considered arbitrary or otherwise contrary to human rights norms.

Details: Geneva, SWIT: Global Detention Project, 2015. 96p.

Source: Internet Resource: Accessed February 1, 2016 at: http://www.globaldetentionproject.org/sites/default/files/Immigration_Detention_in_the_Gulf_GDP_Version001.pdf

Year: 2015

Country: International

Keywords: Illegal Immigrants

Shelf Number: 137725


Author: Fanusie, Yaya J.

Title: Monumental Fight: Countering the Islamic State's Antiquities Trafficking

Summary: As the nation's largest professional organization of archaeologists on the Middle East holds its annual meeting this week in Atlanta, the Foundation for Defense of Democracies (FDD) has released a new report analyzing the strategic role of antiquities trafficking in funding the terrorist group known as Islamic State (IS). The report, "Monumental Fight: Combatting Islamic State's Antiquities Trafficking," provides the most comprehensive look to date at IS's involvement in the illicit trade. The report is co-authored by former CIA intelligence analyst Yaya J. Fanusie, now director of analysis at FDD's Center on Sanctions and Illicit Finance (CSIF), and Alex Joffe, an archaeologist and historian specializing in the Middle East and contemporary international affairs. The report explains how antiquities looting evolved in the region, analyzes how it fits within IS's overall system of territorial control and governance, and identifies strategies to stem the illegal trade. Fanusie and Joffe explain that although antiquities trafficking may not provide IS as much money as other revenue streams like oil smuggling, "the importance of the antiquities trade for IS lies ... in the market's strategic and operational benefits." Excavation sites are unlikely to be targeted by coalition military strikes. Moreover, they note, looting antiquities does not alienate the local population like IS's other common practices of extortion and theft. To capitalize on this strategic resource, IS completely dominates the antiquities trade in the areas under its control, forcing civilians to be licensed by IS before they can dig for artifacts, and takes 20 percent or more of the revenue from any items sold to smugglers, the report finds. The authors note that IS also leverages its plundering for its global propaganda. The group video records choreographed destruction of pre-Islamic heritage sites in Iraq and Syria to portray itself as a defender of religious purity. The authors point out the irony of IS's antiquities trade; the group makes money through end-buyers who mainly come from the U.S. and Europe--representatives of the very societies IS has pledged to destroy. The authors explain that although the precise smuggling routes, middlemen, and buyers are difficult to uncover because of the market's opacity, a review of official trade data shows an uptick in antiques exiting the Levant since the Syrian civil war began. They argue it is likely that much of this increase comes from looted items masqueraded as legally owned artifacts.

Details: Washington, DC: Foundation for Defense of Democracies, Center on Sanctions and Illicit Finance, 2015. 22p.

Source: Internet Resource: Accessed February 2, 2016 at: http://www.defenddemocracy.org/media-hit/new-report-outlines-ways-to-combat-islamic-states-antiquities-trafficking/

Year: 2015

Country: International

Keywords: Antiquities

Shelf Number: 137732


Author: Baur-Ahrens, Andreas

Title: How Smart Is "Smart Security"? Exploring Data Subjectivity and Resistance

Summary: 'Smart security' is currently being used as an umbrella term that embraces several initiatives proposed by the aviation industry in order to enhance security procedures at airports. The idea of smarter security opposes the traditional screening framework of passenger security at airports which enacts a one-size-fits-all approach in order to detect dangerous items that might threaten flight safety and security. Recently however, the security industry claims that smart solutions could provide better security, less intrusive screening, and better cost efficiency by employing tailored security procedures based on individual data-driven risk assessment of passengers and corresponding different levels of security screening. As smart security solutions are currently still under development, this report analyses potential human rights problems connected to a broader implementation of smart security routines in a timely fashion. Constituent elements of smart security, such as computer-based sorting of individuals into risk-groups and algorithms preparing or taking decisions on passengers' mobility, can have severe consequences. Critical questions to be asked include: Who is accountable for smart security decisions? Is it possible to appeal against such decisions? How dangerous is the data-driven approach with regard to structural discrimination and equality of all passengers? We review and summarise the state of the art in the field of data-driven risk analysis and analyse eight interviews that we have conducted with representatives of European aviation associations, state authorities and the civil society. Bearing in mind the human rights implications of smart security, the report identifies six central policy gaps, issues recommendations to address them and provides a basis for a much needed public debate on smart security.

Details: Tubingen: University of Tubingen, Internationales Zentrum fur Ethik in den Wissenschaften, 2015. 49p

Source: Internet Resource: Accessed February 2, 2016 at: https://publikationen.uni-tuebingen.de/xmlui/bitstream/handle/10900/66898/How%20Smart%20Is%20Smart%20Security_IZEW_201511.pdf?sequence=1&isAllowed=y

Year: 2015

Country: International

Keywords: Airport Security

Shelf Number: 137744


Author: Center for Global Development

Title: Unintended Consequences of Anti-Money Laundering Policies for Poor Countries

Summary: Money laundering, terrorism financing and sanctions violations by individuals, banks and other financial entities are serious offenses with significant negative consequences for rich and poor countries alike. Governments have taken important steps to address these offenses. Efforts by international organizations, the US, UK and others to combat money laundering and curb illicit financial flows are a necessary step to increase the safety of the financial system and improve security, both domestically and around the world. But the policies that have been put in place to counter financial crimes may also have unintentional and costly consequences, in particular for people in poor countries. Those most affected are likely to include the families of migrant workers, small businesses that need to access working capital or trade finance, and recipients of life-saving aid in active-conflict, post-conflict or post-disaster situations. And sometimes, current policies may be self-defeating to the extent that they reduce the transparency of financial flows.

Details: Washington, DC: Center for Global Development, 2015. 100p.

Source: Internet Resource: Accessed February 4, 2016 at: http://www.cgdev.org/sites/default/files/CGD-WG-Report-Unintended-Consequences-AML-Policies-2015.pdf

Year: 2015

Country: International

Keywords: Financial Crimes

Shelf Number: 137758


Author: Grantham, David

Title: Shutting Down ISIS' Antiquities Trade

Summary: The attacks in Paris and San Bernardino, California, reminded the world that the so-called Islamic State in Iraq and Syria is at war with western civilization. The U.S. government desperately needs a more comprehensive strategy for combating this threat than simply drone warfare and piecemeal deployments of "specialized expeditionary targeting forces." And a top priority of a new, broader campaign should be the destruction of ISIS' financial networks. ISIS and Antiquities. ISIS poses a national security threat to the United States primarily because of the resources it commands. The organization boasts an impressive network of revenue streams, ranging from oil proceeds and racketeering profits to money seized from local banks. But ISIS also profits from its lucrative trade in pilfered Roman, Greek, and other antiquities found in Syria and northern Iraq. This lucrative operation presents a national security dilemma because it helps fund ISIS's international war machine. The U.S. government and international bodies have tried in the past to undermine the global trade in looted antiquities by international conventions that disallow signatory countries from participating in the theft and transportation of looted antiquities. But the illegal antiquities market remains notoriously difficult to regulate. Moreover, officials often treat the illegal antiquities trade as a victimless crime run by criminal organizations. Few acknowledge the definitive links between illegal antiquities and terrorism. The challenges of enforcement and lack of attention keeps the market for illicit antiquities strong. This Is Not a Recent Phenomenon. During World War II, Nazis looted public and private collections from across Europe. Looters reaffirmed the importance of the antiquities market by ransacking regional museums in Iraq in the wake of the First Gulf War. Between the end of the war in 1991, and 1994, eleven museums lost 3,000 artifacts and 484 manuscripts to theft. A majority have yet to be recovered. Years later, the Taliban earned a reputation as a broker of Afghan antiquities, even though it spent enormous time and energy destroying historical landmarks throughout the country. Al Qaeda was also involved in the trade. In 1999, Mohamed Atta, who piloted the plane that crashed into Tower Two of the World Trade Center, tried to sell Afghan antiquities to a German university professor. Atta "claimed that he was selling artifacts in order to purchase an airplane." The Iraqi museums looted after the U.S.-led invasion in 2003 only reiterated the national security implications surrounding unprotected antiquities. As of 2008, authorities have only recovered about 6,000 of the 15,000 items stolen. Experts fear that Al-Qaeda offshoots like ISIS are today selling some of the unaccounted for antiquities to fund their terrorist operations.

Details: Dallas, TX: National Center for Policy Analysis, 2016. 4p.

Source: Internet Resource: Issue Brief No. 185: http://www.ncpa.org/pdfs/ib185.pdf

Year: 2016

Country: International

Keywords: Antiquities

Shelf Number: 137760


Author: Rivas, Carol

Title: Advocacy Interventions to Reduce or Eliminate Violence and Promote the Physical and Psychosocial Well-being of Women Who Experience Intimate Partner Abuse: A Systematic Review

Summary: Intimate partner abuse is common worldwide, damaging the short- and long-term physical, mental, and emotional health of survivors and children. Advocacy may contribute to reducing abuse, empowering women to improve their situation by providing informal counselling and support for safety planning and increasing access to different services. Advocacy may be a stand-alone service, accepting referrals from healthcare providers, or part of a multi-component (and possibly multi-agency) intervention provided by service staff or others. OBJECTIVES To assess the effects of advocacy interventions within or outside healthcare settings in women who have experienced intimate partner abuse. SEARCH METHODS In April 2015, we searched CENTRAL, Ovid MEDLINE, EMBASE, and 10 other databases. We also searched WHO ICTRP, mRCT, and UK Clinical Research Network (UKCRN), and examined relevant websites and reference lists with forward citation tracking of included studies. For the original review we hand-searched six key journals. We also contacted first authors of eligible papers and experts in the field. SELECTION CRITERIA Randomised or quasi-randomised controlled trials comparing advocacy interventions for women with experience of intimate partner abuse versus no intervention or usual care (if advocacy was minimal and fewer than 20% of women received it). DATA COLLECTION AND ANALYSIS Two review authors independently assessed risk of bias and undertook data extraction. We contacted authors for missing information needed to calculate statistics for the review and looked for adverse events. MAIN RESULTS We included 13 trials involving 2141 participants aged 15 to 65 years, frequently having low socioeconomic status. The studies were quite heterogeneous in terms of methodology, study processes and design, including with regard to the duration of follow-up (post-intervention to three years), although this was not associated with differences in effect. The studies also had considerable clinical heterogeneity in relation to staff delivering advocacy; setting (community, shelter, antenatal, healthcare); advocacy intensity (from 30 minutes to 80 hours); and abuse severity. Three trials evaluated advocacy within multi-component interventions. Eleven measured some form of abuse (eight scales), six assessed quality of life (three scales), and six measured depression (three scales). Countries and ethnic groups varied (one or more minority ethnic groups in the USA or UK, and local populations in Hong Kong and Peru). Setting was associated with intensity and duration of advocacy. Risk of bias was high in five studies, moderate in five, and low in three. The quality of evidence (considering multiple factors such as risk of bias, study size, missing data) was moderate to low for brief advocacy and very low for intensive advocacy. Incidence of abuse Physical abuse Moderate quality pooled data from two healthcare studies (moderate risk of bias) and one community study (low risk of bias), all with 12-month follow-up data, showed no effect on physical abuse for brief (< 12 hours) advocacy interventions (standardised mean difference (SMD) 0.00, 95% confidence interval (CI) - 0.17 to 0.16; n = 558). One antenatal study (low risk of bias) showed an association between brief advocacy and reduced minor physical abuse at one year (mean difference (MD) change - 1.00, 95% CI - 1.82 to - 0.18; n = 110). An antenatal, multi-component study showed a greater likelihood of physical abuse ending (odds ratio (OR) 0.42, 95% CI 0.23 to 0.75) immediately after advocacy (number needed to treat (NNT) = 8); we cannot exclude impact from other components. Low to very low quality evidence from two intensive advocacy trials (12 hours plus duration) showed reduced severe physical abuse in women leaving a shelter at 24 months (OR 0.39, 95% CI 0.20 to 0.77; NNT = 8), but not at 12 or 36 months. Sexual abuse Meta-analysis of two studies (n = 239) showed no effect of advocacy on sexual abuse (SMD - 0.12, 95% CI - 0.37 to 0.14), agreeing with the change score (MD - 0.07, 95% CI - 0.30 to 0.16) from a third study and the OR (0.96, 95% CI 0.44 to 2.12) from a fourth antenatal, multi-component study. Emotional abuse One study in antenatal care, rated at low risk of bias, showed reduced emotional abuse at - 12-month follow-up (MD (change score) - 4.24, 95% CI - 6.42 to - 2.06; n = 110). Psychosocial health Quality of life Meta-analysis of two studies (high risk of bias) showed intensive advocacy slightly improved overall quality of life of women recruited from shelters (MD 0.23, 95% CI 0.00 to 0.46; n = 343) at 12-month follow-up, with greater improvement in perceived physical quality of life from a primary care study (high risk of bias; MD 4.90, 95% CI 0.98 to 8.82) immediately postintervention. Depression Meta-analysis of two studies in healthcare settings, one at high risk of bias and one at moderate risk, showed that fewer women developed depression (OR 0.31, 95% CI 0.15 to 0.65; n = 149; NNT = 4) with brief advocacy. One study at high risk of bias reported a slight reduction in depression in pregnant women immediately after the intervention (OR 0.51, 95% CI 0.20 to 1.29; n = 103; NNT = 8). There was no evidence that intensive advocacy reduced depression at - 12-month follow-up (MD - 0.14, 95% CI - 0.33 to 0.05; 3 studies; n = 446) or at two years (SMD − 0.12, 95% CI − 0.36 to 0.12; 1 study; n = 265). Adverse effects Two women died, one who was murdered by her partner and one who committed suicide. No evidence links either death to study participation.

Details: Oslo: Campbell Collaboration, 2016. 203p.

Source: Internet Resource: Campbell Systematic Review 2016:2: Accessed February 5, 2016: http://www.campbellcollaboration.org/lib/project/84/

Year: 2016

Country: International

Keywords: Domestic Violence

Shelf Number: 137780


Author: Financial Action Task Force

Title: Specific Risk Factors in Laundering the Proceeds of Corruption: Assistance to Reporting Institutions

Summary: 1. Laundering the Proceeds of Corruption, the first FATF Working Group on Typologies (WGTYP) effort in the area of corruption, discussed the interrelationship between corruption and money laundering, discovered the most common methods used to launder the proceeds of corruption, and highlighted the vulnerabilities leading to an increased risk of corruption-related money laundering. It listed some of the most significant grand corruption cases and created a useful historical understanding and reference point for further work in understanding the interrelationships between corruption and money laundering. Laundering the Proceeds of Corruption ultimately concluded that significant acts of corruption are fruitless without the politically exposed person (PEP) involved having a secondary capability to move and disguise the proceeds of his crime. 2. Laundering the Proceeds of Corruption identified areas in which future work could be done, including gaining an understanding of the correlation between certain risk factors and corruption. It also concluded that while effective anti-money laundering and countering the financing of terrorism (AML/CTF) systems can assist in the detection of the proceeds of corruption and prevent the perpetrators of corruption-related offences from enjoying the proceeds of corruption, historically, reporting institutions have not been effective in detecting corruption-related proceeds. This has occurred for a number of reasons, including that in a number of instances, reporting institutions have failed to engage in appropriate customer identification or otherwise failed to apply AML/CFT controls effectively. In some instances, they were actually complicit, and sometimes willfully blind, in the laundering of funds. 3. This paper is written to assist reporting institutions - those financial and non-financial institutions that have a legal obligation to file suspicious transaction reports, or otherwise engage in AML/CFT due diligence - to better analyse and better understand specific risk factors that may assist them in identifying situations posing a heightened risk of corruption-related money laundering risk. It seeks to answer the question: Are there specific types of business relationships, customers, or products which should lead a reporting institution to pay particular attention to the risk of corruption-related money laundering? As with all FATF typology projects, we seek to answer the question by looking to reported cases to see if we can detect commonalities. In addition, we draw on the industry's and academia's best thinking about risk, as reflected in the published literature, to determine what situations truly represent risk. 4. Within the FATF standards3, Recommendation 12 requires a reporting entity to have in place appropriate risk management systems to determine whether a customer or beneficial owner is a PEP. It must also take specific measures, in addition to performing normal customer due diligence measures for business relationships, with foreign PEPs: senior management approval for establishing (or continuing) business relationships, take reasonable measures to establish the source of wealth or funds, and conduct enhanced ongoing monitoring. For domestic PEPs and persons entrusted with a prominent function by an international organisation, reporting institutions are required to apply the specific enhanced due diligence (EDD) measures set out in Recommendation 12 where there is a higher-risk business relationship. This scrutiny stands at the forefront of the effort to detect and deter the laundering of proceeds of corruption and is certainly necessary. The premise behind the effort is clear: customers in these categories can pose an inherently high risk for money laundering. 5. Understanding risk within the Recommendation 12 context is important for two reasons: First, Recommendation 12 requires a reporting entity to have "appropriate" risk management systems in place to determine whether the customer or the beneficial owner is a foreign PEP, and take "reasonable measures" to determine whether a customer or beneficial owner is a domestic PEP or an individual entrusted with a prominent function by an international organisation. To gauge whether a system is "appropriate," or whether "reasonable measures" have been taken, requires an assessment of risk. Second, understanding risk is important after identifying domestic PEPs or relevant individuals from international organisations, in order to assess what level of EDD is necessary. 6. Moreover, experience teaches us that combating corruption-related money laundering must be more than simply ensuring that PEPs receive an appropriate level of scrutiny. Rather, an effective AML scheme requires an assessment of corruption-related risk and protecting against the laundering of corruption proceeds across the spectrum of customers and business relationships, regardless of whether a FATF-defined PEP is involved. 7. Such an approach acknowledges the realities of the methods of laundering the proceeds of corruption. It is a rare case (although not unheard of) for a PEP to enter a financial institution and deposit (or transfer) significant amounts of suspicious money; such action would likely create unacceptable risks to the PEP of detection by reporting institutions. Instead, as Laundering the Proceeds of Corruption noted, corrupt PEPs will take great pains to disguise the identity and the source of the funds in order to place corrupt money in the financial system without suspicion. PEPs use corporate vehicles, sophisticated gatekeepers, cash, and countries with weak money laundering controls to disguise their funds. Their corrupt transactions will often involve an intermediary of some kind, (including family members and close associates), whether within the PEP's jurisdiction or beyond. In some cases, corrupt PEPs will also try to control the mechanisms of detection and regulation within their home jurisdiction to "game the system" in order to disguise the proceeds before the money gets to another jurisdiction. In such cases, implementation of Recommendation 12 by other jurisdictions is necessary, but is not sufficient to detect and deter the movement of corrupt proceeds.

Details: Paris: FATF, 2012. 48p.

Source: Internet Resource: Accessed February 8, 2016 at: http://www.fatf-gafi.org/media/fatf/documents/reports/Specific%20Risk%20Factors%20in%20the%20Laundering%20of%20Proceeds%20of%20Corruption.pdf

Year: 2012

Country: International

Keywords: Corruption

Shelf Number: 137796


Author: Simcox, Robin

Title: The Presumption of Innocence: Difficulties in bringing Suspected Terrorists to Trial

Summary: The Presumption of Innocence, by Henry Jackson Society Research Fellow Robin Simcox, looks at the variety of reasons why the state has not always been able to try terror suspects. The main finding of the report is that, in an era of mass casualty terrorism, the notion that all such individuals can be tried in court is outdated The report demonstrates how prosecutions are just one aspect of a much broader strategy of stopping terrorism and not always necessary in order to prove the existence of a specific threat. The report goes on to call on Western governments - particularly those in Europe - to be clearer in explaining exactly why the state is forced to apply a broad series of measures in combating international terrorism. Partially based on field research undertaken at Guantanamo Bay, the report also argues that: - The majority of those detained at Guantanamo Bay will not be tried. Detention during a time of war takes place to prevent a perceived immediate threat; not as a prelude to trial for a criminal offence. - The operational counter-terrorism tactics of intelligence agencies and law enforcement can diverge significantly. Intelligence agencies' priority is disruption and prevention, not assembling information that can be used in court. - Prosecution of suspected terrorists is not always in the public interest. They risk disclosing classified information in court that hinders ongoing investigations, revealing sensitive sources, or exposing intelligence-gathering methods. - As al Qaeda often operates in ungoverned mountainous regions, the U.S. and its allies have limited access to capturing fighters based there. This has led to the increased use of armed drones and targeted killing, a tactic that will continue in the future.

Details: London: The Henry Jackson Society, 2013. 41p.

Source: Internet Resource: Accessed February 11, 2016 at: http://henryjacksonsociety.org/

Year: 2013

Country: International

Keywords: Islam

Shelf Number: 137846


Author: Simcox, Robin

Title: "We Will Conquer Your Rome": A Study of Islamic State Terror Plots in the West

Summary: The Islamic State (IS) presently controls significant amounts of land throughout Iraq and Syria. However, its ambitions are not restricted to this territory. Within days of announcing its 'Caliphat', the self-appointed 'Caliph Abu Bakr al-Baghdadi vowed that IS would eventually "conquer Rome". IS precursor groups and the individuals which have trained alongside them have displayed an interest in attacking the West for years. However, an audio message released on 21 September 2014, saw Abu Mohammed al-Adnani, an IS spokesman, attempt to ratchet up the threat. He instructed IS supporters to carry out attacks in the West - no matter how crude. There has subsequently been an increase in IS-linked plots that have emerged in the West. "We Will Conquer Your Rome:" A Study of Islamic State Terror Plots in the West by research fellow Robin Simcox studies all those that have been reported since the declaration of the 'Caliphate', and attempts to draw conclusions about any trends that may be developing. The report studies over a year's worth of Islamic State plots. It examines which countries were most commonly targeted; the age; nationality; background; terrorist training and combat experience of the perpetrators; relevance of the Internet; which sectors are most commonly targeted for attack; and assesses the extent to which the Islamic State directed, assisted or simply just inspired these plots. It concludes that since the declaration of IS's 'Caliphate', there have been, on average, over two plots related to IS that either are foiled or take place in the West every month.

Details: London: The Henry Jackson Society, 2015. 59p.

Source: Internet Resource: Accessed February 11, 2016 at: http://henryjacksonsociety.org/wp-content/uploads/2015/09/ISIS-brochure-Web.pdf

Year: 2015

Country: International

Keywords: Cyber Security

Shelf Number: 137847


Author: Ponemon Institute

Title: 2015 Cost of Data Breach Study: Global Analysis

Summary: According to the benchmark study of 314 companies spanning 10 countries, the average consolidated total cost of a data breach increased 15 percent in the last year to $3.5 million . The study also found that the cost incurred for each lost or stolen record containing sensitive and confidential information increased more than nine percent to a consolidated average of $145.

Details: Traverse City, MI: Ponemon Institute, 2015. 31p.

Source: Internet Resource: Accessed February 12, 2016 at: https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF

Year: 2015

Country: International

Keywords: Computer Crimes

Shelf Number: 137853


Author: Blanchard, Christopher M.

Title: The Islamic State and U.S. Policy

Summary: The Islamic State (IS, aka the Islamic State of Iraq and the Levant, ISIL/ISIS, or the Arabic acronym Da'esh) is a transnational Sunni Islamist insurgent and terrorist group that controls large areas of Iraq and Syria, has adherents in several other countries, and disrupts regional and international security with violence and terrorism. A series of terrorist attacks attributed to the group outside of Iraq and Syria has demonstrated IS supporters' ability to threaten societies in the Middle East, Africa, Europe, and the United States, including in countries with sophisticated and capable intelligence and security forces. The U.S.-led campaign to degrade and ultimately destroy the Islamic State organization in Iraq and Syria (IS, aka ISIL/ISIS or the Arabic acronym Da'esh) appears to be entering a new phase in early 2016, as Administration officials implement planned changes in military strategy and tactics, pursue new diplomatic and coalition building initiatives, and consider alternative proposals. The conflicts in Iraq and Syria remain focal points in this regard, but a series of terrorist attacks inspired or directed by the Islamic State have claimed hundreds of lives on four continents since November 2015, creating a more global sense of urgency about combatting the group and reversing its spread. The group has stated its intent to attack inside the United States, and the December 2015 shootings in San Bernardino, California, have been attributed to IS supporters who did not have apparent links to the organization but were praised by the group. Debate continues over whether IS elements overseas have the capability to direct, support, and/or carry out further attacks in the United States. The group's statements suggest it seeks to provoke reactions from targeted populations and spur confrontations between various Muslim sects and between Muslims and non-Muslims. The interdependent nature of the conflicts and political crises in Iraq, Syria, and other countries where IS fighters operate complicate efforts to address and eliminate the IS threat. President Obama has stated that the goals of U.S. strategy are to "degrade and ultimately defeat" the Islamic State using various means including U.S. direct military action and support for local partner forces. U.S. military operations against the group and its adherents in several countries, as well as U.S. diplomatic efforts to reconcile Syrian and Iraqi factions, are ongoing. Parallel U.S. political and security efforts in North Africa, West Africa, and South Asia also seek to mitigate local IS-related threats. This report provides background on the Islamic State organization, discussing its goals, operations, and affiliates, as well as analyzing related U.S. legislative and policy debates.

Details: Washington, DC: Congressional Research Services, 2016. 39p.

Source: Internet Resource: CRS R43612: Accessed February 17, 2016 at: https://fas.org/sgp/crs/mideast/R43612.pdf

Year: 2016

Country: International

Keywords: ISIS

Shelf Number: 137859


Author: Martin, Maria

Title: Criminalisation of Human Rights Defenders

Summary: In recent years we have witnessed the limitation of the spaces available to civil society in many countries around the world, and a deterioration of the conditions under which organisations carry out their activities. Criminalisation and other related phenomena such as stigmatisation, defamation and delegitimation of the work of people who promote and defend human rights are representative of this worrying trend. The report is the result of more than a year's research and discussion involving the author and PI staff in our offices in the field (Protection Desks) in Latin America, Sub-Saharan Africa and South East Asia, as well as in our main office in Brussels, Belgium. The author also interviewed HRDs based in the three continents mentioned and in Europe, from whom she also received written information. The report categorises and presents a typology of the various forms of criminalisation and judicial and administrative harassment suffered by HRDs; it identifies the kinds of actors who contribute to the phenomenon and deals also with its consequences, that are felt not only by criminalised HRDs but also by their families and the organisational context in which they operate. Finally, the report makes a series of recommendations aimed at HRDs, the state institutions that are responsible for their protection and other key stakeholders, in the hope that they will adopt legal and political measures - and provide accompaniment to victims - in order to react and also prevent criminalisation from occurring. This publication is of fundamental importance to PI, as it permits us to respond to a series of challenges that HRDs face as they seek to carry out their day-to-day work. It also enables us to strengthen the accompaniment we provide to HRDs, civil society organisations and rural communities across a range of aspects important to their ability to manage their security and protection. We hope that the report and the recommendations it contains will contribute to strengthening the movement for human rights across the globe.

Details: Brussels, Belgium: Protection International, 2015. 73p.

Source: Internet Resource: Accessed February 17, 2016 at: http://protectioninternational.org/wp-content/uploads/2016/01/Criminalisation_Pl_English_WebReady.pdf

Year: 2015

Country: International

Keywords: Citizen Protection

Shelf Number: 137865


Author: Islam, Asif

Title: An Exploration of the Relationship between Police presence, crime, and business in developing countries.

Summary: Economic theory predicts that a rise in police presence will reduce criminal activity. However several studies in the literature have found mixed results. This study adds to the literature by exploring the relationship between the size of the police force and crime experienced by firms. Using survey data for about 12,000 firms in a cross-section of 27 developing countries, the study finds that increasing the size of the police force is negatively associated with crime experienced by firms. The results are confirmed using a panel of firms for a subset of countries for which data are available. The study also finds that this negative relationship is stronger under certain macro-economic circumstances.

Details: Washington, DC: The World Bank, 2016. 40p.

Source: Internet Resource: Policy Research working paper; no. WPS 7560: Accessed February 17, 2016 at: http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2016/02/08/090224b08415a8c9/1_0/Rendered/PDF/An0exploration0developing0countries.pdf

Year: 2016

Country: International

Keywords: Crimes Against Businesses

Shelf Number: 137869


Author: Taylor, Peter

Title: A Review of the Social Impacts of Culture and Sport

Summary: This research, funded from the Culture and Sport Evidence (CASE) programme, reviews the current evidence base on the social impacts of sport and culture. Using a systematic review of relevant literature, this research focuses principally on four main types of social impact: (i) improved health, (ii) reduced crime, (iii) increased social capital and (iv) improved education outcomes. In addition, links to subjective wellbeing (SWB) are examined; and a category 'multiple social impacts' reports on literature where more than one social impact is considered. Sport Sport might be seen to have 'turned a corner' from the previous state which was criticised by many academics as being under-researched. The most convincing evidence concerns health benefits, which prevent or reduce physical and mental health problems and save on health care costs. There are some negative health effects from sports injuries, typically for younger people, but in comparison the positive health benefits from sport are more substantial, population-wide and particularly important to older people. There is also strong evidence that sports participation improves pro-social behaviour and reduces crime and anti-social behaviour, particularly for young men. This includes evidence of lower levels, for sports participants compared with non-participants, of recidivism, drunk driving, use of illegal drugs, crime and suspensions at school, property crime, shoplifting and juvenile crime. The main exceptions to this positive evidence are an association of sport with increased violence and illegal (NB underage) alcohol consumption. In terms of the social capital impacts from sport, there is evidence that sport is a type of 'social glue', i.e. contributing 'bonding' capital by increasing social connectedness and a sense of belonging. Positive outcomes in studies include reduced social and ethnic tensions, and more collective action and community involvement through sport, particularly volunteering. The evidence doesn't just point to positive social capital impacts from sport - for example, two studies identify cases of sports clubs reinforcing social exclusion. There is considerable evidence of the positive impact of sport and exercise on educational outcomes, although much of this evidence is from the USA. Through psychological benefits such as enhanced self-esteem and self-confidence, and cognitive benefits such as concentration and thinking skills, sport has positive effects on a number of final outcomes, including educational behaviour and attainment. There are a few contrasting studies which identify negative effects of sports participation on the educational attainment of specific groups of students. Some studies suggest that sport achieves a number of impacts simultaneously, making it a highly cost-effective intervention. Many of the links between sport and different social impacts are common, including greater physical competencies, better cognitive skills, better social skills, trust and reciprocity, and identification with social values. These help to counteract risk factors and stimulate favourable reaction to protective factors.

Details: Sheffield, UK: Sport Industry Research Centre and Centre for Regional Economic and Social Research (Sheffield Hallam University) and Business of Culture (BOC), 2015.

Source: Internet Resource: Accessed February 18, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/416279/A_review_of_the_Social_Impacts_of_Culture_and_Sport.pdf

Year: 2015

Country: International

Keywords: At-Risk Youth

Shelf Number: 137884


Author: Cho, Seo-Young

Title: Does Legalized Prostitution Increase Human Trafficking?

Summary: This paper investigates the impact of legalized prostitution on human trafficking inflows. According to economic theory, there are two opposing effects of unknown magnitude. The scale effect of legalized prostitution leads to an expansion of the prostitution market, increasing human trafficking, while the substitution effect reduces demand for trafficked women as legal prostitutes are favored over trafficked ones. Our empirical analysis for a cross-section of up to 150 countries shows that the scale effect dominates the substitution effect. On average, countries where prostitution is legal experience larger reported human trafficking inflows.

Details: Berlin: Department of Development and Security, DIW Berlin, 2012. 48p.

Source: Internet Resource: Economics of Security Working Paper; No. 71: Accessed February 18, 2016 at: http://www.diw.de/documents/publikationen/73/diw_01.c.405653.de/diw_econsec0071.pdf

Year: 2012

Country: International

Keywords: Human Trafficking

Shelf Number: 137885


Author: Cohen, Katie

Title: Who Will Be a Lone Wolf Terrorist? Mechanisms of self-radicalisation and the possibility of detecting lone offender threats on the Internet

Summary: Solo actor terrorism, also known as lone wolf terrorism, is a growing threat against civil security, partly due to the fact that Internet access makes it easier than ever to engage in study and dissemination of extremist views. A large variation regarding factors such as ideology, social background, psychopathology and personality type means there is no clear profile for lone wolf terrorists. An assessment of which individuals from a population of political extremists that will go on to commit acts of terrorism can therefore not only be based on factors such as individual experiences or personality traits. A threat assessment should rather be based on the potential perpetrator's behaviour during the time closely preceding the attack. Hence, behaviours that have been empirically proven to precede terrorist attacks and other incidents of planned violence, such as mass murder or school shootings, so called warning behaviours, can have an important role in assessing lone wolf terrorist threats. Warning behaviours often precede terrorist acts and are in their turn preceded by a radicalisation process, where an individual gradually enters a state of mind characterised by a proneness to premeditated violence with the purpose of advancing an ideology. Most lone wolf terrorists have gone through a process of self-radicalisation, wherein media has had a crucial role. Internet is indisputably the medium that has had the greatest influence on the radicalisation process during the last decade. However, while it has facilitated the process, the Internet has also created new possibilities of discovering warning behaviours prior to an actual terrorist attack. From an existing typology of eight different warning behaviours, the three that can most easily be inferred from the subject's Internet communication will be discussed in the following report: (1) Leakage, when the subject, more or less specifically and more or less intentionally, informs a third party about an intent to perpetrate a terrorist attack, (2) fixation, which expresses an extreme preoccupation with a person or cause or extensive gathering of facts about a target, and (3) identification, which comprises a self-image characterised by fantasies about being a hero or warrior and/or a strong interest in weapons and military paraphernalia, as well as a strong influence from other radical proponents of lone wolf terrorism. The aim of the following report is firstly, to shed light on different hypotheses about the psychological mechanisms behind self-radicalisation and the interaction between the individual and the environment during the radicalisation process, and secondly, to examine the possibility of using semi-automatic techniques for text analysis of the subjects Internet communication to discover warning behaviours.

Details: Stockholm: Swedish Defence Research Agency, 2012. 28p.

Source: Internet Resource: Accessed February 18, 2015 at: http://www.foi.se/en/Search/Abstract/?rNo=FOI-R--3531--SE

Year: 2012

Country: International

Keywords: Lone Wolf Terrorism

Shelf Number: 137887


Author: Buch, Ryan K.

Title: The Day of the Cyber Wolf

Summary: Terrorism has become a concern for public safety and security and can take on many appearances. However, in recent years the dilemma that presents the most substantial endangerment to public security comes from the threat of leaderless terrorists, also known as "lone wolves." Due to the rapid advancement in technology over the past few decades, societies, specifically the United States, have become dependent upon it economically and socially. Terrorist organizations, as well as the lone wolf terrorist, understand that their enemies rely on technology in order to function and have recently redirected their efforts towards cyberspace. As a result, cyber-terrorism has become one of the greatest imminent threats to national security. This literature review presents an analysis of the issues and challenges faced in dealing with modern day terrorism in the forms of lone wolf terrorism and cyber terrorism. Why has this increase in lone wolf attacks occurred? Why are lone wolf terrorists more dangerous than terrorist organizations? What threat do cyber terrorist attacks present to the world, specifically from lone wolves? Why should cyber terrorist attacks be as great a concern as physical attacks? How can both of these forms of terrorism actually have an effect on society and a government's infrastructure? Lone wolf terrorism presents a clear and imminent threat to national and international security. In light of this, the following research seeks to answer the question: Is there an imminent threat that the next major terrorist attack will come from a lone wolf cyber terrorist? An in-depth understanding of previous lone wolf terrorists and cyber terrorism, as well as the attacks that have been committed, is needed in order to combat future problems

Details: Denver, CO: Regis University, 2014. 95p.

Source: Internet Resource: Thesis: Accessed February 28, 2016 at: http://epublications.regis.edu/theses/210/

Year: 2014

Country: International

Keywords: Cyber Terrorism

Shelf Number: 137888


Author: Marlatt, Greta E.

Title: Lone Wolf Terrorism -- A Brief Bibliography

Summary: This bibliography, compiled by Greta E. Marlatt at the Naval Postgraduate School, contains a list of resources related to lone wolf terrorism. Resources include both books and periodicals. The list is organized alphabetically and links to resources are provided when available electronically. This bibliography was last updated February 2015.

Details: Monterey, CA: Naval Postgraduate School (U.S.). Dudley Knox Library, 2015. 20p.

Source: Internet Resource: Accessed February 18, 2016 at: https://www.hsdl.org/?view&did=727224

Year: 2015

Country: International

Keywords: Homeland Security

Shelf Number: 137889


Author: Lee, Walter A.

Title: Finding the Wolves in Sheep's Clothing: Ways to Distinguish and Deter Lone-Wolf Terrorists

Summary: Despite the rise in the number of attacks by lone-wolf terrorists, the lone-wolf threat has largely been neglected by academic researchers and counterterrorism practitioners. The nature of the lone-wolf terrorist has introduced new challenges to law enforcement and counterterrorism unlike the more discussed problems of international group terrorism. This thesis suggests, however, that policies created to help deter group terrorism could be useful in detecting and deterring lone-wolf terrorists. The existing policy framework for group terrorism deterrence may have great utility in the fight against lone wolves, but policy use and effectiveness requires a careful examination of the characteristics unique to lone-wolf terrorism to ensure that the deterrence policies match. This thesis uses the comparative method and examines three case studies of lone-wolf terrorism from the United States and Europe: the Fort Hood shooter of 2009 (Major Nidal Hasan), the Boston Marathon bombers, and Anders Behring Breivik of Norway. By examining the unique circumstances of each case, this thesis determines what policies were and were not effective and in need of adaption to deter the threat of lone-wolf terrorism.

Details: Monterey, CA: Naval Postgraduate School, Dudley Knox Library, 2015. 75p.

Source: Internet Resource: Theses: Accessed February 18, 2016 at: https://www.hsdl.org/?view&did=765305

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 137890


Author: Walmsley, Roy

Title: World Prison Population List. Eleventh edition

Summary: This eleventh edition of the World Prison Population List gives details of the number of prisoners held in 223 prison systems in independent countries and dependent territories. It shows the differences in the levels of imprisonment across the world and makes possible an estimate of the world prison population total. The figures include both pre-trial detainees/remand prisoners and those who have been convicted and sentenced. The information is the latest available at the end of October 2015. The data are presented in two parts. Part one, tables 1-5, sets out prison population totals, rates and trends for each individual country. Part two, tables 6-8, provides data on prison population totals, rates and trends by continent, and includes comparison of male and female prison population levels.

Details: London: Institute for Criminal Policy Research, 2015. 15p.

Source: Internet Resource: Accessed February 22, 2016 at: http://www.prisonstudies.org/sites/default/files/resources/downloads/world_prison_population_list_11th_edition.pdf

Year: 2015

Country: International

Keywords: Criminal Justice Statistics

Shelf Number: 137926


Author: Penal Reform International

Title: Institutional Culture in Detentioin: A Framework for Preventive Monitoring. 2nd ed.

Summary: This paper looks at positive culture change in places of deprivation of liberty from a human rights perspective. People deprived of their liberty are particularly vulnerable to abuse, including torture and other ill-treatment. Bodies that monitor places of detention play a significant role in preventing torture, by identifying root causes and seeking to reduce the risk of torture occurring. The culture in places of detention is one important systemic factor to be considered in torture prevention efforts. It is the second in a series of thematic papers on aspects of detention monitoring, which have so far been under-researched and received little attention. They are the result of a joint project between the APT and Penal Reform International (PRI), with financial assistance of the UK Government and the European Union.

Details: London: Penal Reform International, 2013. 24p.

Source: Internet Resource: Accessed February 22, 2016 at: http://www.apt.ch/content/files_res/thematic-paper-1_culture-in-places-of-detention-en.pdf

Year: 2013

Country: International

Keywords: Prisoner Ill-Treatment

Shelf Number: 137928


Author: Adler, Joanna R.

Title: What Works in Managing Young People who Offend? A Summary of the International Evidence

Summary: This review was commissioned by the Ministry of Justice and considers international literature concerning the management of young people who have offended. It was produced to inform youth justice policy and practice. The review focuses on the impact and delivery of youth justice supervision, programmes and interventions within the community, secure settings, and during transition into adult justice settings or into mainstream society. Approach A Rapid Evidence Assessment (REA) was conducted to assess the international evidence systematically. In line with English and Welsh youth justice sentencing, young people were taken to be 10-17 years old when considering initial intervention, programmes and supervision, and up to 21 years old when considering transitions into the adult criminal justice system and resettlement post release from custody. Evidence was considered from any country where studies were reported in English, and published between 1st January 1990 and 28th February 2014. The majority of these findings are from evaluations conducted in the United States of America and their transferability to an English and Welsh context should be considered given the different legal and sentencing frameworks, as well as economic and social contexts. Key findings Key elements of effective programmes to reduce reoffending In line with most previous reviews, effective interventions in reducing youth reoffending considered the factors set out below. - The individual's risk of reoffending: assessing the likelihood of further offending and importantly, matching services to that level of risk with a focus on those people who are assessed as having a higher risk. - The needs of the individual: focusing attention on those attributes that are predictive of reoffending and targeting them in rehabilitation and service provision. An individual's ability to respond to an intervention: maximising the young person's ability to learn from a rehabilitative programme by tailoring approaches to their learning styles, motivation, abilities and strengths. The type of programme: therapeutic programmes tend to be more effective than those that are primarily focused on punitive and control approaches. Therapeutic approaches include: skills building (e.g. Cognitive Behavioural Therapy; social skills); restorative (e.g. restitution; victim-offender mediation); counselling (e.g. for individuals, groups and families) and mentoring in some contexts. The use of multiple services: addressing a range of offending related risks and needs rather than a single factor. Case management and service brokerage can also be important. Programme implementation: quality and amount of service provided and fidelity to programme design. The wider offending context: considering family, peers and community issues.

Details: London: Ministry of Justice, 2016. 78p.

Source: Internet Resource: Ministry of Justice Analytical Series, 2016: Accessed February 23, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/498493/what-works-in-managing-young-people-who-offend.pdf

Year: 2016

Country: International

Keywords: Juvenile Offenders

Shelf Number: 137942


Author: INTERPOL. Office of Legal Affairs

Title: Countering Illicit Trade in Goods: A Guide for Policy-Makers

Summary: Illicit trade in goods is of growing concern internationally, and one of the greatest law enforcement challenges to date. It has various manifestations, involves many different actors and affects several interests at the same time. It is a high profit activity, the reason for its allure. While illicit trade has specific features, depending on the goods and the methods employed, calling for the adoption of targeted legal measures by States, one common denominator is the involvement of criminal organizations. These are often highly sophisticated, flexible structures, able to quickly adapt to market changes and grab new criminal opportunities. They resort to corruption and money laundering as the chief means of conducting their illicit trade business and re-introducing proceeds into the legal economy. They act transnationally by exploiting a global environment which encourages the free circulation of goods. This handbook presented by the INTERPOL Office of Legal Affairs is the first publication in its Legal Handbook Series. The aim of these publications is to provide a solid and thorough overview of illicit trade thereby guiding the reader through the applicable international legal frameworks and offering pioneering legal solutions. The Legal Handbook Series was developed to assist policy-makers in INTERPOL's member countries to design effective national strategies against illicit trade. Given the complexity of the problem, solutions are not easily arrived at in isolation. Working with other specialized agencies and optimizing the use of available expertise and resources has been a priority, ensuring the accuracy and relevance of the analysis. Hence this handbook is the result of close collaboration with various international organizations that have significantly contributed to it by providing their perspectives.

Details: Paris: INTERPOL, 2014. 260p.

Source: Internet Resource: Legal Handbook Series: Accessed February 25, 2016 at: www.interpol.int

Year: 2014

Country: International

Keywords: Illegal Trade

Shelf Number: 137978


Author: Vidino, Lorenzo

Title: Terrorist Chatter: Understanding what terrorists talk about

Summary: Since the early 2000s the Internet has become particularly crucial for the global jihadist movement. Nowhere has the Internet been more important in the movement's development than in the West. While dynamics differ from case to case, it is fair to state that almost all recent cases of radicalization in the West involve at least some digital footprint. Jihadists, whether structured groups or unaffiliated sympathizers, have long understood the importance of the Internet in general and social media, in particular. Zachary Chesser, one of the individuals studied in this report, fittingly describes social media as "simply the most dynamic and convenient form of media there is." As the trend is likely to increase, understanding how individuals make the leap to actual militancy is critically important. This study is based on the analysis of the online activities of seven individuals. They share several key traits. All seven were born or raised in the United States. All seven were active in online and offline jihadist scene around the same time (mid- to late 2000s and early 2010s). All seven were either convicted for terrorism- related offenses (or, in the case of two of the seven, were killed in terrorism- related incidents.) The intended usefulness of this study is not in making the case for monitoring online social media for intelligence purpose - an effort for which authorities throughout the West need little encouragement. Rather, the report is meant to provide potentially useful pointers in the field of counter- radicalization. Over the past ten years many Western countries have devised more or less extensive strategies aimed at preventing individuals from embracing radical ideas or de- radicalizing (or favoring the disengagement) of committed militants. (Canada is also in the process of establishing its own counter- radicalization strategy.) Radicalization is a highly complex and individualized process, often shaped by a poorly understood interaction of structural and personal factors. It is no surprise then that counter-radicalization initiatives are equally complex. Even among the seven subjects in this project there are only limited commonalities in terms of interests and views. While all seven subjects share a common background, based on the evidence of their online activities, their interests, views and approaches remain highly diverse. Some are focused mostly on religion; others are more interested in political issues. Some immediately adopt a jihadist mindset; others seem to undergo a long radicalizing trajectory. Given this diversity, it becomes obvious that any counter- radicalization needs to be tailored to the specifics of the case. Flexibility is the name of the game. Another key finding is that, at least in the beginning of their trajectories, the individuals studied here are all avid seekers of knowledge and information on religion. All refer to religious concepts and frames throughout their posts. Jihadism is a complex ideology that mixes religion and politics. But this study confirms the importance of its religious aspect for many of those who embrace violence - a fact some studies have dismissed. Any counter-radicalization effort, while not ignoring other aspects, should take into consideration the centrality of religious issues for those embracing jihadism. While for legal, political and cultural reasons it might be difficult to replicate in the West some of the religion-based counter- radicalization efforts adopted in countries such as Saudi Arabia or Singapore, the religious aspect should take a central role. The study also shows that those interested in religion are extremely inquisitive during the first stages of their radicalization trajectories. In the first months or even years of their posting life, in fact, these individuals constantly engage with fellow posters for sources and opinions on religious matters. They seem to be constantly searching for validation of their opinions. Over time, this openness seemed to slowly decrease, and by the end of the posting trajectory, there are only limited traces of questions. In the late stages, instead of questions, statements appear, often filled with confident pronouncements of their own knowledge. This attitude provides an enormous opportunity for counter- radicalization. It is arguable that it is in this phase that any kind of intervention might be more likely to succeed.

Details: Ottawa: The Norman Paterson School of International Affairs, Carleton University, 2015. 75p.

Source: Internet Resource: NPSIA Working Paper Series: Working Paper No. 03, 2015: Accessed February 26, 2016 at: http://carleton.ca/npsia/wp-content/uploads/No.-03-Terrorist-Chatter.pdf

Year: 2015

Country: International

Keywords: Internet

Shelf Number: 137979


Author: London School of Economics and Political Science. LSE Expert Group on the Economics of Drug Policy

Title: After the Drug Wars: report of the LSE Expert Group on the Economics of Drug Policy

Summary: The post-'war on drug' era has begun. Prohibitionist policies must now take a back seat to the new, comprehensive, people-centred set of universal goals and targets that we know as the Sustainable Development Goals (SDGs). Nation states and the global drug regulatory system must shift to principles of sustainable development that include: public health, harm reduction of consumption and supply, access to essential medicines, and scientific experimentation with strict legal regulation. To enable this transformation, nation states should drastically de-prioritise the prohibitionist goals of the past. They must implement new comprehensive development policies dealing with the root causes of problems associated with illicit drugs. The 'war on drugs' caused the international community to prioritise prohibitionist policies over sustainable development at a terrible socioeconomic cost. As the United Nations Development Programme highlights in the discussion paper excerpted in this report, 'evidence indicates that drug control policies often leave an indelible footprint on sustainable human development processes and outcomes... [and] have fuelled the marginalisation of people linked with illicit drug use or markets.' This report recognises that key reforms within the global regulatory system will come from changes at the national and local levels. It highlights that the UN drug control treaties recommend an approach grounded in the 'health and welfare' of mankind. Further, it emphasises that human rights obligations have absolute supremacy over drug control goals and as such there is sufficient interpretive scope within the treaties to experiment with social scientific policies that can further global health and welfare. The world can shift away from counterproductive and ineffective drug policies. The UN General Assembly Special Session in 2016 is a key platform for driving debate. However, the ultimate impetus lies with countries to reform their policies based on evidence and local realities. This report provides a framework for achieving this shift.

Details: London: LSE, 2016. 140p.

Source: Internet Resource: Accessed February 26, 2016 at: http://www.lse.ac.uk/IDEAS/publications/reports/pdf/LSE-IDEAS-After-the-Drug-Wars.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 137981


Author: INTERPOL. Office of Legal Affairs

Title: Countering Illicit Trade in Tobacco Products: A Guide for Policy-Makers

Summary: Illicit trade in tobacco products (ITTP) is a global occurrence, affecting all regions and countries. It holds an allure for criminals to engage in it as tobacco products are light, small, easy to transport and to conceal. Tobacco is one of the most smuggled commodities in the world, allowing offenders to amass huge profits. Further, penalties are often not sufficient to act as a deterrent. Illicit trade in tobacco products has negative and harmful consequences for countries at many levels. It affects consumers' health, reduces States' budgets, creates unfair competition for legitimate businesses, and feeds organized criminal groups who channel the profits obtained into other illegal activities. This handbook aims to offer the first comprehensive legal analysis of the international legal framework against the ITTP. It provides guidance to policy-makers and law enforcement authorities on the implementation of key international instruments in the field, with an emphasis on the new Protocol to Eliminate Illicit Trade in Tobacco Products. The ITTP holds many challenges for governments. One of the biggest is the involvement of organized criminal networks which employ increasingly sophisticated and varied methods to counterfeit and smuggle products. INTERPOL recognizes this as a growing issue threatening the security of States. A joint and coordinated effort is needed to find and implement lasting solutions to this multi-faceted problem.

Details: Lyon, France: INTERPOL Office of Legal Affairs, 2014. 290p.

Source: Internet Resource: Legal handbook Series: Accessed February 26, 2016 at: http://www.interpol.int/Crime-areas/Trafficking-in-illicit-goods-and-counterfeiting/Legal-assistance/Legal-publications

Year: 2014

Country: International

Keywords: Counterfeit Goods

Shelf Number: 137982


Author: Sander, Gen

Title: HIV, HCV, TB AND HARM REDUCTION IN PRISONS Human Rights, Minimum Standards and Monitoring at the European and International Levels

Summary: Even though prisoners do not forfeit their human rights, such as the right to health, there is an enormous gap between health and human rights standards and their effective implementation in places of detention. This is in no small part due to the severe lack of harm reduction services for those in detention globally: only seven countries now have a needle and syringe programme, and only 44 provide opioid substitution therapy, in at least one prison. This is according to a new report from Harm Reduction International, released today, 10 February 2016, which identifies some of the most important human rights and public health standards relating to HIV, HCV and TB in prisons, and the vital role of harm reduction provision in ensuring them. The report recognises that the right to health and freedom from ill treatment are inseparable, which places human rights-based prison monitors, particularly those with a preventative mandate, in a unique and critical position to consider these issues. It notes, however, that this is not yet occurring in an adequately systematic or comprehensive manner, and provides specific recommendations to the European Committee for the Prevention of Torture and Inhuman or Degrading Treatment or Punishment (CPT) and the United Nations Subcommittee on the Prevention of Torture and other Cruel, Inhuman or Degrading Treatment or Punishment (SPT). Alongside the report, HRI has published a monitoring tool to assist human rights-based prison monitoring mechanisms and other prison monitors to generate better informed, more consistent and sustained monitoring of issues relating to HIV, HCV, TB and harm reduction in prisons, and ultimately to help prevent situations and conditions that can lead to ill treatment in this context from occurring in the first place.

Details: London: Harm Reduction International, 2016. 44p.

Source: Internet Resource: Accessed March 1, 2016 at: http://www.ihra.net/files/2016/02/10/HRI_PrisonProjectReport_FINAL.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 138002


Author: de Roy van Zuijdewijn, Jeanine

Title: Lone-Actor Terrorism. Policy Paper 1: Personal Characteristics of Lone-Actor Terrorists

Summary: The aim of the Countering Lone-Actor Terrorism (CLAT) project is to understand lone-actor terrorism in a European context. The project will develop a database of lone-actor cases from across Europe. Its overall objective is to see if it is possible to discern any trends or patterns that could be translated into useful observations or recommendations for practitioners and policy-makers. This is the first of four policy papers in the CLAT series and is published by the International Centre for Counter-Terrorism - The Hague. This paper focuses on the personal characteristics of lone-actor terrorists, resulting in a number of policy recommendations. The analysis specifically outlines the importance of benchmarking and looking at different sub-groups. It further identifies the importance of trust and openness, and of multi-agency co-operation. These factors might be the basis of formulating an effective response to the challenge of lone-actor terrorism

Details: The Hague: International Centre for Counter-Terrorism, 2016.

Source: Internet Resource: Countering Lone-Actor Terrorism series No. 5: Accessed March 1, 2016 at: https://rusi.org/sites/default/files/201602_clat_policy_paper_1_v2.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138003


Author: LeBaron, Genevieve

Title: Forced labour in the global economy : beyond trafficking and slavery short course. Volume 2

Summary: There is a growing and sober awareness among international policymakers and within global civil society that human trafficking, slavery and forced labour are not anomalies perpetuated by a few 'bad apple' employers. Rather, such severe labour exploitation is an endemic feature of the contemporary global economy. This edited collection brings together some of the sharpest minds from the worlds of academia and activism to investigate and shed light on the root causes of this exploitation. Its essays analyse how business demand for forced labour manifests in certain industries, as well as how political and economic factors combine to generate a supply of workers vulnerable to abuse. Written in intelligent yet accessible prose, it represents a key resource for policy, activism and research.

Details: (S.L.): Open Democracy, 2015. 100p.

Source: Internet Resource: Accessed March 4, 2016 at: http://cadmus.eui.eu/bitstream/handle/1814/38806/BTS-2-Global-Economy.pdf?sequence=1&isAllowed=y

Year: 2015

Country: International

Keywords: Forced Labor

Shelf Number: 138037


Author: Fink, Carsten

Title: The Economic Effects of Counterfeiting and Piracy: A Review and Implications for Developing Countries

Summary: Policy makers around the world recognize the potentially harmful consequences of trademark counterfeiting and copyright piracy. Indeed, many countries have recently initiated policy reforms to strengthen the enforcement of intellectual property rights (IPR). Further, minimum standards of enforcement have been incorporated in many international treaties, especially trade agreements. This emphasis on enforcement raises basic questions about the actual impacts of IP rights infringement, which differ across the types of IPR and economic sectors. The authors review the academic literature and other studies in the public domain to evaluate what has been learned about these socioeconomic effects, with an emphasis on developing countries where possible. They also identify important gaps in our understanding of the consequences of counterfeiting and piracy and develop recommendations on how governments might collect data and conduct studies to better inform IPR enforcement policy.

Details: Washington, DC: World Bank, 2016. 46p.

Source: Internet Resource: World Bank Policy Research Working Paper No. 7586 : Accessed March 4, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2740120

Year: 2016

Country: International

Keywords: Counterfeit Goods

Shelf Number: 138046


Author: Vittori, Jodi

Title: Idealism is not enough: The role of resources in the autonomy and capability of terrorist groups

Summary: Terrorism scholars have posited that 90 percent of terrorist groups survive less than a year, and half of those which remain will not live to see the ten year-mark. This dissertation addresses the variety of means through which terrorist groups seek to acquire, move and store money, tangible and intangible resources, and how these strategies shape their autonomy in conducting operations and theoretical capabilities to engage in violent actions. The combination of a terrorist group's capability and autonomy leads to the identification of seven different categories: state-sponsored terrorist groups, franchises, popularly-supported groups, lone wolves, state-sponsoring groups, shell states and transnational corporation-like groups (TNCs). Within these groups, those with medium to high levels of both autonomy and capability are proven to have the highest average lifespan. Utilizing the Terrorism Knowledge Base database, 100 terrorist groups out of a total of 897 were examined. Each was coded according to its level of autonomy (measured as low, medium or high) and capability (measured as very low, low, medium or high) with respect to the conduct of terrorist actions; the longevity of each group was determined from the time of its first terrorist attack until the most recent one. Statistical analysis utilizing a Weibull distribution verifies that those groups with medium to high capability and autonomy do indeed achieve a longer lifespan than those with only low capabilities and/or low autonomy. Moreover, the sample indicates that the average lifespan for all terrorist groups may be much longer than what terrorism scholars have anticipated. This dissertation addresses four significant gaps in the literature on terrorism. First, it provides a typology for examining the resourcing of terrorism, as none currently exists. Second, it analyzes how the institution of terrorism resourcing has evolved over time and how new institutional variations influence groups' autonomy and capability. Third, as the above criteria correlate to the lifespan of individual terrorist groups, this dissertation explains why some outfits are more likely to survive and flourish while others are short-lived. Finally, this study develops objective criteria for measuring the capability and autonomy of terrorist organizations

Details: Denver, CO: University of Denver, 2008. 485p.

Source: Internet Resource: Dissertation: Accessed March 5, 2016 at: http://gradworks.umi.com/33/03/3303538.html

Year: 2008

Country: International

Keywords: Extremist Groups

Shelf Number: 138111


Author: Prison Reform Trust

Title: International Good Practice: Alternatives to imprisonment for women offenders

Summary: This report presents a wide range of international examples of alternatives to custody for nonviolent women offenders. It profiles a number of dynamic projects in different jurisdictions, some of which have proven to be particularly successful in reducing reoffending in women offenders. Due to both time constraints and the availability of research evidence, the report uses information from predominantly Western countries such as the United States, Canada, Australia and New Zealand. European examples are used where available and relevant. The women's prison population in England and Wales more than doubled between 1995 and 2010 and, although numbers are starting to decline somewhat, approximately 13,500 women are sent to prison each year in the UK. This is one of the highest rates of women's imprisonment in Western Europe. The human, social and financial costs are considerable. Women in prison are ten times more likely than men to harm themselves, Most women are imprisoned for short periods and they have very high reconviction rates, suggesting that for many prison is neither rehabilitative nor a deterrent. Many of the women sent to prison are mothers, compounding and prolonging the detrimental impact. According to one survey, six in ten women in prison had dependent children (on average two children.) At least a third of mothers are lone parents before imprisonment. In 2010, more than 17,000 children were separated from their mothers by imprisonment. For eight out of ten children, it's the first time they have been separated from their mums for more than a day or so. Innovative approaches are needed if these damaging impacts are to be significantly reduced. Various studies have shown that non-custodial programmes are significantly more cost-effective than imprisoning women who offender. The average annual cost of a woman's imprisonment in England and Wales today stands at L56,415 compared to a Community Order cost of L2,800 per year, and an average of L1,300 for standalone community-based services. From early intervention strategies to resettlement programmes, this report outlines a range of alternatives to imprisonment for women offenders. These include inter alia women's centres and one-stop-shops, community residential alternatives, and small units designed to accommodate women offenders. Focusing on a diverse range of alternatives emphasises the specific issues faced by women in the criminal justice systems across the world such as mental health needs, exposure to domestic and sexual abuse, drug and alcohol use, and homelessness. By addressing the factors that underlie women's offending, we are better able to generate sustainable alternatives that have the potential to significantly reduce offending. This research has been exclusively desk-based and as such makes extensive use of studies undertaken and statistics presented by academics, policy-makers, and international agencies. It focuses predominantly on non-violent adult women offenders, although some reference is made to young women offenders, older women offenders, and women sentenced for serious and violent crimes. It does not present a rigorous comparative analysis of different approaches but does include as much evaluative evidence as possible for the different initiatives. In October 2013 the United Nations Special Rapporteur on Violence against Women, its causes and consequences, presented a new report to the UN General Assembly, Pathways to, conditions and consequences of incarceration of women. It illustrates the strong link between violence against women and women's imprisonment - prior to, during and after prison. That report examines the causes, conditions and consequences of women's incarceration and is a timely and forceful reminder of why alternatives to incarceration are so badly needed. Academic experts and practitioners concur that, if they are to work for women, services and interventions must be 'gender-responsive'. Gender-responsive practice can be divided into five parts: - relational - recognising that women develop self-worth through their relationships with others and are motivated by their connections with other people - strengths-based - using each woman's individual strengths to develop empowered decisions - trauma-informed - recognising the ways in which histories of trauma and abuse impact upon a woman's involvement in the criminal justice system - holistic - providing a comprehensive model that addresses the multiple and complex needs of women offenders - culturally-informed - services recognise and respond to the diverse cultural backgrounds of women offenders. The information provided about the different programmes and services profiled in this report is organised thematically, as is evident from the chapter headings. The same service may be described under more than one heading where it provides for a range of needs or different groups. This is indicated by a cross reference at the beginning of a project. All the material is extensively referenced, enabling the reader to investigate particular projects further.

Details: London: PRT, 2015. 65p.

Source: Internet Resource: Accessed March 5, 2016 at: http://www.prisonreformtrust.org.uk/portals/0/documents/international%20good%20practice%20final.pdf

Year: 2015

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 138114


Author: Organization for Economic Co-operation and Development (OECD)

Title: Illicit Trade: Converging Criminal Networks

Summary: Illicit trade is a worldwide phenomenon. Globalisation has provided opportunities for criminal networks to expand the scope and scale of their operations, with serious negative consequences for the economy, the environment and society. Illicit trade also undermines good governance, the rule of law and citizens' trust in government, and can ultimately threaten political stability. This report provides analysis of some of the main areas of illicit trade, including trafficking in persons, wildlife, counterfeit medicines, narcotics, tobacco, alcohol and sports betting. It looks at what drives and facilitates such activity, estimates the volume of trade and amount of revenue it generates, maps the pathways of illicit goods from production to consumer, describes the shortcomings of current policies for reducing or deterring illicit trade, and suggests avenues for improvement. Understanding illicit trade It is important to clearly define and measure illicit trade, and understand the context that allows it to flourish. However, countries - and sometimes regions within countries - do not always agree on what goods can be legally traded, and there is even greater variance in the application of quality standards and the protection of intellectual property rights. These differences can make cross-country measurement of illicit trade as a whole very difficult, which is why this report takes a sectoral approach. Our increasingly interconnected economies and societies have allowed organized crime to expand alongside the exponential growth in legitimate international trade. Criminal networks exploit differences in regulatory and tax regimes to move goods and services across borders. While exact measurements can be difficult given the clandestine nature of illicit transactions, one estimate puts the profits of international organised crime as high as USD 870 billion, or 1.5% of global GDP. Calculating and tracking the money made from these activities is important as it can provide crucial information to law enforcement. More data and information sharing is needed to develop a clearer understanding of illicit trade and how to combat it. A more holistic view of the cost of illicit trade also takes into account its harmful impacts on consumers, the environment, tax revenues and jobs. Traffic in humans and narcotics, for example, also exact a very heavy social toll. Illicit trade can also be closely linked to criminal violence and terrorism. Costs in terms of law enforcement, incarceration and rehabilitation should also be taken into account. Finally, illicit trade can cause longer-term damage to the rule of law, public trust, human capital and public health, as well as deter foreign investment. Trafficking in persons According to estimates by the International Labour Organisation (ILO), 20.9 million people are forced into slavery worldwide causing immense, long-term damage to individuals, communities, and nations. Trafficked persons tend to flow from poorer regions to richer regions and from conflict regions to more stable regions. Governments need to give priority to implementing laws for preventing trafficking, protecting victims and prosecuting both traffickers and the corrupt public officials who assist them. Illicit trade in wildlife Demand for elephant ivory and rhino horn has driven dramatic growth in illegal wildlife markets in recent years due primarily to a growing consumer base in East Asia. Taken together, all forms of wildlife trafficking constitutes one of the most lucrative forms of illicit trade, and the sector has more than doubled since 2007. Monitoring and enforcement in source countries can be effective means to reduce poaching, but training and information systems are needed to build adequate capacity. Counterfeit medicines The trade in counterfeit medicine is a huge industry, generating as much as USD 200 billion a year in tangible goods alone according to OECD's study of 2005 data, which is soon to be updated. It has a direct negative impact on health, depriving users of appropriate treatment and contributing to global microbial resistance. Pharmaceutical companies also suffer a loss in revenue and reputation, and increased costs for security. Successfully combatting counterfeiting will require more extensive information sharing across agencies and nations. Finally, the development and adoption of an international public health treaty would be a significant step toward protecting patients and public health globally. Tobacco products The illicit trade in tobacco is perhaps the most widespread and most documented sector in the shadow economy. It has been estimated that 570 billion illicit cigarettes were consumed worldwide in 2011. Illicit tobacco is an important source of revenue for criminal networks, and deprives government services of excise tax revenues at the same time. To counter the illicit trade in tobacco products, governments developing a multifaceted approach, including: building partnerships, increasing data validity and reliability, launching educational and public awareness campaigns, increasing capacity-building efforts, and prioritising countering illicit tobacco products and its associated crimes. Narcotics The global narcotics trade is thought to be the single largest black market in the world, and is a source of revenue for international criminal organization. In addition to the negative impact on human health and well-being caused by the narcotics themselves, the criminal violence that accompanies all aspects of drug trafficking erodes state institutions and is often difficult to reverse. Tackling the narcotics trade effectively will require not only punitive approaches and sanctions but also state building, economic development and good governance practices. Alcohol It is estimated that billions of dollars from trafficking and illegal trade in alcoholic beverages flow through the global economy each year, distorting local economies, diminishing government and legitimate business revenues, and in some cases posing a serious health risk to consumers. It is estimated that illicit sources account for 25% of total worldwide adult alcoholic consumption. Contributing factors include the higher cost of legal products from taxes, weak laws, lack of enforcement and social acceptance of contraband in some countries. Sports manipulation The globalisation of sports has led to an increase in unregulated sports betting, which is increasingly used for money laundering and has been connected to corruption in sports (match-rigging). An internationally co-ordinated, pro-active response is needed, including initiatives targeting bettors and offenders, police action and co-operation with financial institutions. It is also important to communicate on the subject of sports integrity to all stakeholders, including the public and the media.

Details: Paris: OECD, 2015. 259p.

Source: Internet Resource: Accessed March 5, 2016 at: http://www.oecd.org/gov/risk/illicit-trade-converging-criminal-networks.pdf

Year: 2014

Country: International

Keywords: Counterfeit Medicines

Shelf Number: 138115


Author: Miklaucic, Michael

Title: Convergence: Illicit Networks and National Security in the Age of Globalization

Summary: Acceleration. Magnification. Diffusion. Entropy. Empowerment. The global environment and the international system are evolving at hypervelocity. A consensus is emerging among policymakers, scholars, and practitioners that recent sweeping developments in information technology, communication, transportation, demographics, and conflict are making global governance more challenging. Some argue these developments have transformed our international system, making it more vulnerable than ever to the predations of terrorists and This view continues to dominate mindsets within the U.S. national security community. It fails to fully appreciate the growing power of nonstate actors and adversaries, or the magnitude of the threat they pose and the harm they impose on the international system itself. It underappreciates the possibility - indeed likelihood - of the convergence, whether for convenience or growing ambition, of criminal, terrorist, and even insurgent networks. More important even than insufficient recognition of the efficacy of these adversaries is the absence of a plan to counter the threat they pose to both national security and the international state system. In short, this view does not see the big picture - the long view of the declining robustness and resilience of the global system of nation-states that has been dominant for centuries, and the unprecedented attacks on that system. The failure of that system - in which we and so many have prospered beyond belief or precedent in history - would be a catastrophic and existential loss. Global trends and developments - including dramatically increased trade volumes and velocity, the growth of cyberspace, and population growth, among others - have facilitated the growth of violent nonstate actors, the strengthening of organized crime, and the emergence of a new set of transcontinental supply chains as well as the expansion of existing illicit markets. The resourcefulness, adaptability, innovativeness, and ability of illicit networks to circumvent countermeasures make them formidable foes for national governments and international organizations alike. Their increasing convergence gives them ever-improved ability to evade official countermeasures and overcome logistical challenges as well as ever better tools for exploiting weaknesses and opportunities within the state system, and attacking that system. Since illicit actors have expanded their activities throughout the global commons, in the land, sea, air, and cyber domains, nations must devise comprehensive and multidimensional strategies and policies to combat the complex transnational threats posed by these illicit networks. This book is an attempt to map the terrain of this emerging battlespace; it describes the scope of the security threat confronting the United States and the international community from transnational criminal organizations and what is being done to combat that threat - from the strategic level with the release, in July 2011, of the U.S. Government's Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security and, in April 2011, of the Department of Defense (DOD) Counternarcotics and Global Threats Strategy - to the operational level with increased regional partnerships and dialogues. criminals. Others argue that despite this significant evolution, organized crime, transnational terrorism, and nonstate networks have been endemic if unpleasant features of human society throughout history, that they represent nothing new, and that our traditional means of countering them - primarily conventional law enforcement - are adequate. Even among those who perceive substantial differences in the contemporary manifestations of these persistent maladies, they are viewed as major nuisances not adding up to a significant national or international security threat, much less an existential threat.

Details: Washington, DC: National Defense University Press, 2013. 304p.

Source: Internet Resource: Accessed March 5, 2016 at: http://ndupress.ndu.edu/Portals/68/Documents/Books/convergence.pdf

Year: 2013

Country: International

Keywords: Criminal Networks

Shelf Number: 131162


Author: Williams, Lauren

Title: Islamic State propaganda and the mainstream media

Summary: Islamic State's use of social media to disseminate its propaganda is generally well understood. What receives far less attention is how the group also uses the Western mainstream media to spread its key messages. Islamic State tailors the production and release of its material to the needs of mainstream media outlets and to the media cycle. The danger involved in sending Western journalists to Syria and Iraq has made the media more reliant on material produced by Islamic State. The group's propaganda is often unwittingly used by the mainstream media in ways that serve Islamic State's objectives. Islamic State's propaganda effort is central to its ability to recruit new members, intimidate its opponents, and promote its legitimacy as a state. Countering that effort means more than just combatting it online and cancelling Twitter accounts. Counter-messaging efforts need to take place through the mainstream media as well as social media. The mainstream media also has a responsibility to treat Islamic State's material more critically, including by providing more contextual coverage of the conflict in Syria and Iraq, and using less sensationalist or polarising rhetoric when it discusses terrorism. The adoption of better standards and practices can help the mainstream media to limit the appeal of Islamic State propaganda in ways that do not detract from media independence and the public-s right to know.

Details: Sydney: Lowry Institute for International Policy, 2016. 24p.

Source: Internet Resource: Accessed march 5, 2016 at: http://www.lowyinstitute.org/files/islamic-state-propaganda-western-media_0.pdf

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 138119


Author: International Narcotics Control Board

Title: Report of the International Narcotics Control Board for 2015

Summary: The International Narcotics Control Board is uniquely placed to contribute to current discussions on international trends and emerging threats in drug control. It will contribute the insight and experience it has accumulated over decades of monitoring the implementation of the drug control conventions and identifying achievements, challenges and weaknesses in drug control. INCB will engage in the special session and its preparation by highlighting and clarifying the approaches and principles underlying the international system of drug control and making recommendations based upon the conventions. In its annual reports, published pursuant to the treaties, INCB has been addressing, particularly in the thematic chapters, most of the relevant aspects of the global drug problem and most of the critical points in the ongoing debate on the "right way in drug policy". Equally, the release of the present annual report of the Board for 2015, the annual report on precursors and the supplementary report on the availability of internationally controlled drugs is part of our contribution to the special session and the forthcoming policy discussions. The present report of the Board for 2015 contains a thematic chapter on the health and welfare of mankind and the international drug control system. It shows that concern for health and welfare is at the core of the international drug control system. INCB emphasizes that the system in place, when fully implemented, contributes to protecting the health and welfare of people worldwide and ensures balanced national approaches that take into account local socioeconomic and sociocultural conditions. Even with the reality of the constantly shifting contours of the drug problem, the 1961, 1971 and 1988 conventions have proved their value as the cornerstone of international cooperation in drug policy. The fact that the conventions have been almost universally ratified by States underscores that the desire to counter the world's drug problem is shared globally. States have regularly reaffirmed their commitment to working within the framework of the three international drug control conventions and the political declarations. Assessing the achievements and challenges of the current drug control system, INCB believes that the control of the international licit trade in narcotic drugs, psychotropic substances and precursors has been an undeniable success, as today no noteworthy diversion of those substances from licit to illicit channels is taking place. On the other hand, the availability and accessibility of narcotic drugs and psychotropic substances for medical purposes is not at all satisfactory at the global level. Equally, the goal of a noticeable reduction in the illicit demand for and supply of drugs has not been reached. Finally, there are numerous new challenges emerging, such as new psychoactive substances.

Details: Vienna: International Narcotics Control Board, 2016. 128p.

Source: Internet Resource: Accessed March 8, 2016 at: https://www.incb.org/documents/Publications/AnnualReports/AR2015/English/AR_2015_E.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 138127


Author: Manning, Ruth

Title: In and Out of Extremism

Summary: Quilliam's latest report In and Out of Extremism features testimonies from 10 former extremists who have now deradicalised and provides analysis on their shared experiences. Building on Maajid Nawaz's personal deradicalisation story In and Out of Islamism, this report looks at the human processes of radicalisation and deradicalisation in five former far-right extremists and five former Islamist extremists. Combining interviews and correspondence with the former extremists, with Quilliam's own expertise and experience in these processes, this report synthesises the human with the academic to provide a deeper understanding of a complex phenomenon. - In particular, this report shows factors which increase vulnerability to radicalisation, the ways in which this vulnerability is exploited by extremist groups and individuals in the radicalisation process, and the factors that prompt escalation from contemplation to action. - In and Out of Extremism finds that when political grievances are combined with personal grievances, individuals consider extremist ideologies and narratives to better understand the world or to find perceived solutions to their personal difficulties. While these ideologies and narratives appear comforting in their simplicity, the former extremists found that they seldom changed the world or improved their lives. - This report also sheds light on the factors that have intervened in the radicalisation process to prompt the individuals to consider their commitment to extremist ideologies and narratives. In and Out of Extremism finds that challenging extremist messaging is central to this intervention and that the message should be targeted for the individual, with the identity, language, and even appearance of the messenger being of central importance. - Quilliam is well-known for our contribution to the macro debate on counter-extremism strategy and policy, but this report shows our value at a micro level, providing inspiration and support in deradicalising extremists. - In policy terms, this report also considers the value of refining the teaching of critical thinking skills in schools to reduce vulnerability to radicalisation, and of improving progressive online counter-extremism efforts through the development of a greater number and variety of counter-narratives.

Details: London: Quilliam, 2015. 78p.

Source: Internet Resource: Accessed March 8, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/in-and-out-of-extremism.pdf

Year: 2015

Country: International

Keywords: Deradicalizing

Shelf Number: 138131


Author: Brennan, Mark

Title: Youth Pathways from Extremism

Summary: Recommendation Summary I. Understanding the phenomenon of youth radicalization and de-radicalization is bolstered, available, and widely disseminated and used by young people and youth stakeholders to develop new narratives and improve national/local policies and actions; 1. Empower youth as researchers. Supporting youth to lead on research projects positively contributes to their development, enhancing their skill set, and empowering them to investigate issues that can be used as a launching pad to drive change. They are much more likely to be in touch with the mechanisms and structures that facilitate and discourage extremism recruitment. 2. Research into online and other resources that have a proven history of improving outcomes for youth substance abuse, suicide, and violence in similar at risk communities (Aboriginal youth, extremist youth) to address cultural despair. 3. Research and development of a variety of virtual, graphic, and narrative superheroes that can form alternatives to extremist, colonialist, and gender-biased models of leadership. 4. Research into understanding the differential motivations of male and female youth in their involvement in extremist groups. 5. Seek both age cohort but also intergenerational resources for building and maintaining a sense of cultural stability (but not superiority) in youth at risk for extremist alliances, which goes along with building intercultural communication. Building intercultural communication may well fail if those taking part have a sense of cultural insecurity/inadequacy/despair with no remedy for that experience of cultural "emptiness". 6. Ensure that all programs and policies are shared among major UN agencies and NGOs. Coordination of consistent programming and messages across UN entities.

Details: London: Quilliam, 2015. 28p.

Source: Internet Resource: White Paper for UNESCO and the United Nations Community: Accessed March 8, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/white-paper-youth-led-pathways-from-extremism.pdf

Year: 2015

Country: International

Keywords: Deradicalization

Shelf Number: 138132


Author: Kroll

Title: The Year of Global Expansion and Enforcement: 2016 Anti-Bribery and Corruption Benchmarking Report

Summary: Kroll, the global leader in risk mitigation and response solutions, today released its 2016 Anti-Bribery and Corruption Report ("ABC Report"), produced in conjunction with the Ethisphere Institute. As reflected in the ABC Report, 40 percent of all compliance officers surveyed believe their company's bribery and corruption risks will increase in 2016. These senior-level ethics and compliance professionals cited two primary factors as contributing to these increased risks: global expansion and an ever-increasing number of third party business relationships. One in four of those surveyed expressed no confidence in the ability of their company's current controls to detect third party violations of anti-corruption laws. This percentage - 25 percent - is an alarmingly high figure given the increasing number of third party relationships involved in business activities, as well as the large percentage of enforcement actions rooted in payments facilitated through third parties. On a positive note, the degree of board and senior executive engagement regarding anti-bribery and corruption matters is increasing, with over half of respondents stating that their board of directors plays an active role in programme development, and 48 percent saying the same of their CEO. The ABC Report data reveals that companies with engaged leadership teams are more likely to believe their bribery and corruption risks will remain the same or decrease in the coming year, and they display more confidence in their ability to handle risk. The ABC Report also includes the following findings: - 54% of respondents felt their business was not appropriately prepared to comply with global bribery and corruption risks - 47% felt they did not have enough resources to support their organization's anti-corruption efforts - Only 19% felt highly confident in their controls to detect third party violations of anti-corruption laws - 29% of respondents indicated that they are more concerned with personal liability than in prior years - 47% described their company's leadership as highly engaged in anti-bribery and corruption efforts - 86% identified the Chief Financial Officer and 66% identified the Chief Compliance Officer as the internal stakeholders primarily responsible for driving programme development - 48% of respondents do not conduct third party audits, and only 34% say they are providing training to third parties.

Details: New York: Kroll, Inc., 2016. 35p.

Source: Internet Resource: Accessed March 9, 2016 at: http://info.kroll.com/2016-abc-report

Year: 2016

Country: International

Keywords: Bribes

Shelf Number: 138144


Author: Bandyopadhyay, Subhayu

Title: Terrorism, Trade and Welfare: Some Paradoxes and a Policy Conundrum

Summary: We present a standard trade model and show that terrorism can be trade inducing, starting from autarky. In addition, terrorism can be shown to be welfare augmenting for a group of nations. Finally, we present some qualitative conditions that identify when a nation's trade volume may rise (or fall) in response to a greater incidence of terrorism. Our trade and welfare results point to potential difficulties in international coordination of counterterrorism policy because of terrorism's differential impact across nations.

Details: St. Louis, MO: Federal Reserve Bank of St. Louis, 2016. 13p.

Source: Internet Resource: FRB St. Louis Working Paper No. 2016-2 : Accessed march 9, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2744529

Year: 2016

Country: International

Keywords: Terrorism

Shelf Number: 138149


Author: Bandyopadhyay, Subhayu

Title: Trade and Terrorism: A Disaggregated Approach

Summary: This paper constructs a model of trade consequences of terrorism, where firms in trading nations face different costs arising from two distinct types of terrorist risks - domestic and transnational. Using dyadic dataset in a gravity model, we test these predictions for terrorism's effects on overall trade, exports, and imports, while allowing for disaggregation by primary commodities and manufacturing goods. The latter is also decomposed by skill intensities. In general, the detrimental impact of transnational terrorism on various classes of traded commodities is twice that of domestic terrorism. As a general rule, terrorism's negative influence on trade is greater on imports than on exports. There is also a marked tendency for medium-skilled and high skilled manufacturing sectors to sustain a greater harm from terrorism than labor-intensive or low skilled manufacturing sectors.

Details: St. Louis, MO: Federal Research Bank of St. Louis, 2016. 44p.

Source: Internet Resource: FRB St. Louis Working Paper No. 2016-1 : Accessed March 9, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2737808

Year: 2016

Country: International

Keywords: International Trade

Shelf Number: 138150


Author: Stop Illegal Fishing

Title: Record of The First International Symposium on FishCRIME: 12th to 13th October 2015

Summary: On 12-13 October 2015, Cape Town, South Africa nearly 200 delegates from 31 countries participated in the inaugural International Symposium on FishCRIME. The growing realization that illegal fishing is only one aspect of the highly organised, well-financed transnational criminal activities taking place in oceans and seas around the world is leading to new ways of approaching and tackling fisheries crime. Intercepting criminal networks and prosecuting those in charge necessitates cooperation, both domestically and transnationally, between fisheries experts and the police, judiciary, customs, tax, port, security and labour authorities to gather and share information and intelligence and bring the criminals to book. The Symposium was organized by Stop Illegal Fishing and was a joint initiative with South Africa’s Department of Agriculture, Forestry and Fisheries, the Norwegian Ministry of Trade, Industry and Fisheries SIF and PescaDOLUS.

Details: Gaborone, Botswana: Stop Illegal Fishing, 2016. 48p.

Source: Internet Resource: Accessed march 9, 2016 at: http://fishcrime.info/assets/FishCRIME2015Record.pdf

Year: 2016

Country: International

Keywords: Illegal Fishing

Shelf Number: 138152


Author: Schmid, Alex P.

Title: Challenging the Narrative of the "Islamic State"

Summary: ISIS has brought terrorist propaganda to a new level, targeting its main audiences in nearly two dozen languages with up to 90,000 tweets every day. Governments have generally been at a loss as how to counter the ISIS narrative with persuasive counter-arguments to reduce its attraction for rebellious Muslim youths in Western diasporas and Muslim-majority countries. At the core of ISIS' narrative are themes familiar to most Muslims. ISIS has appropriated and instrumentalised them for its main purpose: to expand the Caliphate proclaimed in mid-2014. In this Research Paper, Dr. Alex Schmid identifies a dozen narrative themes of ISIS and discusses them from theological, historical and other angles in an attempt to show vulnerabilities and point the way towards developing convincing counter-arguments. While the potential of this approach is demonstrated, Dr. Schmid argues that a concerted and systematic approach, based on synergetic, inter-disciplinary teamwork, is required to develop successful counter-narratives and that these need to be tested on audiences with a cultural affinity to ISIS main target groups before being utilised by credible Muslim voices who wish to engage terrorist ideologues and their potential followers with rational and faith-based arguments. The Research Paper concludes with the observation that developing counter-narratives, while necessary, is not enough. It is even more necessary to develop credible alternative narratives - narratives that can give a new sense of purpose, meaning and hope to those who feel that they have no future in their and our societies.

Details: The Hague: International Centre for Counter-Terrorism, 2015. 21p.

Source: Internet Resource: ICCT Research Paper: Accessed March 10, 2016 at: http://icct.nl/wp-content/uploads/2015/06/ICCT-Schmid-Challenging-the-Narrative-of-the-Islamic-State-June2015.pdf

Year: 2015

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138159


Author: Winter, Charlie

Title: Documenting the Virtual 'Caliphate'

Summary: This report illuminates the strategic thinking behind Islamic State's propaganda machine. Building on the theoretical framework established in 'The Virtual 'Caliphate': Understanding Islamic State's Propaganda Strategy', the following analysis is based upon an exhaustive 30-day survey of Islamic State's media output. At 24 hour intervals from 17 July to 15 August 2015, the Islamic month of Shawwal, all media output from Islamic State's official outlets, from the provincial offices to the central foundations, was compiled for aggregated analysis. A total of 1146 separate events - discrete batches of propaganda - were recorded in the data collection period: a mixture of photo essays, videos, audio statements, news bulletins, posters, theological essays, and so on. After the data collection period had ended, the archive was translated and refined, as events were grouped according to their primary narrative and, if applicable, sub-narratives. Following this, the data was rigorously tested against a number of variables to determine inconsistencies and anomalies. Then, the archive was broken down into its various narrative groupings, which were qualitatively assessed both in isolation of, and respect to, each other.

Details: London: Quilliam Foundation, 2015. 52p.

Source: Internet Resource: Accessed march 10, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/2015/10/FINAL-documenting-the-virtual-caliphate.pdf

Year: 2015

Country: International

Keywords: Caliphate

Shelf Number: 138172


Author: Rafiq, Haras

Title: Caliphettes: Women and the Appeal of Islamic State

Summary: The following report discusses the appeal of the Islamic Sate 'caliphate' to women. To do this, the authors have embarked upon a close analysis of Islamic State's official propaganda and unofficial proselytisers. In the process, four promises "empowerment, deliverance, participation and piety" are identified as the organisation's key pull factors. -The promise of empowerment conveyed by Islamic State's official and unofficial propaganda encourages women to understand joining the organisation as a means to reverse the ills that they face in life outside the 'caliphate'. By joining Islamic State, the line goes, women can defiantly take charge of their lives in the same way that men can: through living in Islamic State's "caliphate" and supporting its jihad by marrying a fighter, women are led to believe that they can emancipate themselves from kufr (disbelief). - The deliverance promise focuses on the idea that, by joining Islamic State, grievances that women suffer in the West are immediately resolved. Women can be freed from daily degradations and disbelief, and are instead assimilated into a tight-knit collective sisterhood that will provide them with a network of support and friendship. Reflective of this, the ideas of redemption and deliverance tend to be directed to females by females. - The participation promise incentivizes women to join Islamic State even though their role is strictly non-military. It conveys a sense that there is more to the 'caliphate's' jihad than fighting and that, for women, there is a specific state-building role. A constant theme in Islamic State propaganda is that supporting the 'caliphate', making it grow and flourish, is the job of everyone. For women, this takes the role of providing, maintaining and educating its 'cubs', the next generation of fighters, as well as supporting their soldier spouses. - The last promise of Islamic State's women-orientated propaganda is piety, something built up the theological imperative to join the group. The alleged pristine nature of an 'Islamic existence' in the "caliphate" is a means of justifying each stress and sacrifice and also acts as a means for recruiters to exert peer pressure to push others to make hijra (migrating). - These four themes alone do not cause female supporters of Islamic State in the West to make hijra. However, when combined with the group's copious amounts of audio-visual propaganda, they play a crucial role in the rhetorical armoury of the 'caliphate's' recruiters. „-The discussion on the radicalisation of women is overly gendered and, all too often, predicated on misconceptions. In reality, when it comes to joining violent extremist causes, women are susceptible to the very same processes as men: narratives, ideology, grievances, and various push and pull factors. Reflecting this, the last part of this report delivers policy recommendations on how we must reappraise our attempts to counter the twin processes of female radicalisation and recruitment, in line with general counter-radicalisation, but using women as specific entry points. The four promises used in Islamic State propaganda, and cited in this report, are not exhaustive. There are a multitude of factors that contribute to an individual's radicalisation, of which propaganda can play an important part. As such, research into the key narratives employed by the 'caliphate' can shine an important individual's journey to jihad.

Details: London: Quilliam Foundation, 2015. 53p.

Source: Internet Resource: Accessed March 10, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/caliphettes-women-and-the-appeal-of-is.pdf

Year: 2015

Country: International

Keywords: Caliphate

Shelf Number: 138173


Author: Winter, Charlie

Title: The Virtual 'Caliphate': Understanding Islamic State's Propaganda Strategy

Summary: The following report sheds light on the strategic motivations of, and implications to, Islamic State's media operation. By analysing the organisation's propaganda output over the twelve months that followed its 'caliphate' declaration in June 2014, it has been possible to dismantle the brand into its constituent narratives and the various target audiences into their composite parts. In doing so, the report demystifies the Islamic State propaganda machine and cuts through much of the unhelpful rhetoric surrounding it. By applying Jacques Ellul's theoretical framework to Islamic State's official messaging, this paper unambiguously demonstrates that, with all its complexity and gloss, the organisation's propaganda is not singularly responsible for radicalising individuals, let alone their joining the jihadist cause abroad or carrying out attacks at home. That being said, it does catalyse the Islamist extremist's passage from tacit supporter to active member. However, this is just one of the many functions of Islamic State's propaganda - as the following report demonstrates, it is much more than a matter of inciting and intimidating. From the following pages, ten key conclusions emerge: 1. For the international audience, the use of brutality by Islamic State is a red herring. While, it serves to warn against local dissent and gratify sympathisers, on an international level, its prevalence has fatally derailed mainstream understanding of the organisation and its appeal to its many thousands of foreign recruits. 2. Islamic State's propaganda has generated a comprehensive brand, one that offers an alternate way of living. Like any mass movement, it captures the imaginations of its potential recruits by offering both immediate change and the ability to transform their future in the long term. 3. This brand is composed of six non-discrete narratives - brutality, mercy, victimhood, war, belonging and utopianism - each of which is analysed in detail separately, and relation to, each other. 4. While brutality is easily the most prominent of these narratives in the West, utopianism is by far the most important narrative for Islamic State's propagandists; it is the organisation's utopian offer that is most alluring to new recruits. Unless we understand what makes up this 'utopia', any attempt to challenge the ideas is doomed to failure. 5. By outsourcing its propaganda dissemination, Islamic State has insulated itself from government-led schemes to censor its content. Its disseminators are, most of the time, self-appointed and have no official position in the organisation, virtual or otherwise. They receive no reward for their activism other than gratification from within the Islamic State echo chamber. 6. It is not just dissemination that Islamic State has outsourced. By saturating the online jihadist marketplace of ideas with official content, it also provides an abundance of raw material for 'jihobbyists' to produce their own unofficial propaganda. In doing so, the organisation is able to constantly direct the trajectory of its online narrative from afar and without direct involvement. 7. Islamic State's propagandists constantly create bespoke propagandistic material for a range of audiences. They are not just seeking to attract new supporters and intimidate enemies, but are also working to polarise international publics, sustain their organisation's global relevance (in jihadist and non-jihadist spheres) and present their enlisters with 'evidence' to convince potential recruits to become active members. 8. There is no such thing as a 'recruiter', in the traditional sense of the word. Recruitment to the Islamic State organisation involves a range of different actors and processes. First, one must be recruited to the cause. It is only then that an individual is actually enlisted. The 'recruiter to the cause' is not the same individual as the 'enlister to the organisation'. 9. Social media has emerged as this decade's 'radical mosqu'. While radicalisation, for the most part begins offline, Islamic State, along with other groups, has nurtured a situation in which the curious are able to have direct contact with former or current fighters, hear first-hand accounts from the battlefield and swap logistical advice. In decades gone by, this was a function served by so-called 'radical mosques'. In the digital era, social media platforms are the space where this happens. Crucially, social media platforms are not the reason for radicalisation or recruitment, just as 'radical' mosques and bookshops were never the reason. 10. People are not radicalised by propaganda, nor are they recruited by it. There must always be an external human influencer to spark and sustain the radicalisation process. This could be a friend, family-member or stranger. Whatever the case, exposure to Islamic State’s propaganda alone is not the reason that someone becomes a supporter. What propaganda does do, though, is catalyse the individual's radicalisation and concentrate their already-held sympathies. If we are to effectively counter Islamic State's media strategy - something which, at the time of writing, we are certainly failing at - we must first understand it. The propaganda behemoth can and must be broken down into its constituent parts; doing so facilitates a more nuanced, considered approach to the information war on Islamic State. Unless we understand the strategy behind the organisation's media machine, misconceptions about what drives its supporters - be they potential migrants or potential domestic terrorists - will continue to flourish. It is imperative that the coalition formed to degrade and destroy Islamic State recognises that there is no 'Golden Fleece' solution to this problem. There is no one counter narrative, nor is there any one audience that needs targeting. The coalition's information war machine, though better funded and potentially more numerous, is dwarfed by that of Islamic State. Unless its information architecture is revolutionised, the international coalition will always lose the battle for ideas.

Details: London: Quilliam Foundation, 2015. 51p.

Source: Internet Resource: Accessed March 10, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/the-virtual-caliphate-understanding-islamic-states-propaganda-strategy.pdf

Year: 2015

Country: International

Keywords: Caliphate

Shelf Number: 138175


Author: Turbiville, Graham H., Jr.

Title: Private Security Infrastructure Aborad: Criminal-Terrorism Agendas and the Operational Environment

Summary: Worldwide private security organizations, ranging from unarmed security guards to "combat-capable" paramilitary groups, can act as a force multiplier to enhance security. A critical component of official and nonofficial security regimes is the role of government oversight in ensuring criminals and terrorists are unable to hijack private security organizations for their own objectives. A major problem is the ability of governments to manage or oversee these security elements, which varies significantly from country to country and region to region. In many countries, government control is almost nonexistent, creating an environment in which private security organizations are ripe for criminal or terrorist manipulation

Details: Hurlburt Field, FL: Joint Special Operations University, 2007. 66p.

Source: Internet Resource: JSOU Report 07-9: Accessed March 12, 2016 at: http://jsou.socom.mil/JSOU%20Publications/JSOU07-9turbivillePrivateSecurityAbroad_final30Nov.pdf

Year: 2007

Country: International

Keywords: Criminal Networks

Shelf Number: 138197


Author: Anderson, Wesley J.L.

Title: Disrupting Threat Finances: Using Financial Information to Disrupt Terrorist Organizations

Summary: Major Anderson provides an excellent overview of terrorist financing and expands upon how it fits into the broader construct of threat financing. He articulates the significant challenges any government faces in trying to interrupt the terrorist networks use of the global financial system. The sheer immensity of this system provides ample opportunity for terrorists to operate undetected or unhindered. He also highlights that the very international nature of the global economic system presents enormous challenges in trying to coordinate amongst the almost 200 sovereign states that comprise the current world order

Details: Hurlburt Field, FL: Joint Special Operations University, 2008. 142p.

Source: Internet Resource: JSOU Report 08-3: Accessed March 12, 2016 at: http://jsou.socom.mil/JSOU%20Publications/JSOU08-3andersonDisruptingThreatFinances_final.pdf

Year: 2009

Country: International

Keywords: Terrorism

Shelf Number: 138198


Author: Financial Action Task Force

Title: Money Laundering Risks Arising from Trafficking in Human beings and Smuggling of Migrants

Summary: Criminals are increasingly turning to the trafficking of human beings and the smuggling of migrants given the high profitability of these illegal activities. The money generated by such activities finds its way into the financial system. The FATF has carried out a study which describes the money flows related to these two distinct problems and attempts to assess their scale. The key objectives of the report are the following: - To assess the scale of the problem; - To identify different trends in trafficking in human beings/ migrant smuggling; - To identify from case studies where money laundering is occurring and what form it is taking; - To inform law enforcement agencies on the laundering of funds coming from human trafficking/ migrant smuggling; - To identify red flag indicators to assist financial institutions in their identification of money laundering from human trafficking/ migrant smuggling, and in the reporting of suspicious transaction reports; - To increase the possibility of the proceeds of human trafficking/migrant smuggling being identified and confiscated, and thereby discouraging the activity of human trafficking or migrant smuggling.

Details: Paris: FATF, 2011. 86p.

Source: Internet Resource: Accessed March 15, 2016 at: http://www.fatf-gafi.org/media/fatf/documents/reports/Trafficking%20in%20Human%20Beings%20and%20Smuggling%20of%20Migrants.pdf

Year: 2011

Country: International

Keywords: Financial Crimes

Shelf Number: 138243


Author: Kushlick, Danny

Title: The War on Drugs: Undermining Peace and Security

Summary: The global war on drugs has been fought for 50 years, without preventing the long-term trend of increasing drug production, supply and use. But beyond this failure to achieve its own stated aims, the drug war has also produced a range of serious, negative costs. Many of these costs have been identified by the United Nations Office on Drugs and Crime (UNODC) - the very UN agency that oversees the system responsible for them - and are described as the 'unintended consequences' of the war on drugs. They may have been unintended, but after more than 50 years, they can no longer be seen as unanticipated. These costs are also distinct from those relating to drug use, stemming as they do from the choice of a punitive enforcement-led approach. This briefing explores how the UN seeks to promote the security of its member states through implementing a drug control system that treats the use of certain drugs as an 'existential threat' to society. The briefing will demonstrate, however, that this approach is fatally undermining international peace and security. There is naturally overlap with other areas of the Count the Costs project, including: development, human rights, health, crime and economics.

Details: London: Count the Costs, 2016. 16p.

Source: Internet Resource: Accessed March 16, 2016 at: http://www.countthecosts.org/sites/default/files/Security-briefing.pdf

Year: 2016

Country: International

Keywords: Drug Control

Shelf Number: 138249


Author: Ubaydi, Muhammad

Title: The group that calls itself a state : understanding the evolution and challenges of the Islamic State

Summary: In an attempt to paint a more complete picture of the Islamic State (IS), this report identifies key areas where the IS has shown strength, learning, and adaptation. This report also highlights key areas of weakness, mistake, and failure. In doing so, the reader should be well aware that this product provides such an overview with the explicit understanding that there is more to learn in each of these areas. The report proceeds as follows. The first section traces the historical evolution of the group, with emphasis on the fact that well executed design and an ability to take advantage of accidents led to the creation of the IS. The second section provides a very brief and preliminary comparison of the IS to other prominent militant organizations against which the United States has fought: al-Qa'ida and the Taliban. This section is followed by a third that outlines and explores the strengths and weaknesses of the IS as a whole, noting that the IS's success comes from its ability to leverage all parts of its organization to achieve maximum gain. This section also points out that, despite this success, the fact that the IS is attempting to operate across multiple functional areas will test the group's ability to adapt over time and will ultimately expose the group's shortcomings. The fourth and final section steps back to examine, at the strategic level, some of the challenges faced and opportunities available to those combating the IS.

Details: West Point, NY: Combating Terrorism Center at West Point, 2014. 102p.

Source: Internet Resource: Accessed March 16, 2016 at: https://www.ctc.usma.edu/v2/wp-content/uploads/2014/12/CTC-The-Group-That-Calls-Itself-A-State-December20141.pdf

Year: 2014

Country: International

Keywords: Extremism

Shelf Number: 138260


Author: Jardine, Eric

Title: The Dark Web Dilemma: Tor, Anonymity and Online Policing

Summary: Online anonymity-granting systems such as The Onion Router (Tor) network can be used for both good and ill. The Dark Web is possible only because of online anonymity. The Dark Web poses a dilemma. Illegal markets, trolls and online child abuse rings proliferate due to the technology of Tor and other similar systems. However, the anonymity provided by such systems gives cover for people in repressive regimes that need the protection of technology in order to surf the Web, access censored content and otherwise exercise their genuine right to free expression. In other words, Tor is basically a neutral tool that can be used for either good or ill. Whether the technology is worth it depends upon the net effect. Unfortunately, the costs and benefits of a system like Tor are not evenly distributed globally. The ills tend to cluster in liberal countries, while the benefits tend to cluster most in repressive regimes. Shuttering anonymity networks is not a viable long-term solution, as it will probably prove ineffective and will be costly to those people that genuinely benefit from these systems. Rather than being a solely technological problem, this paper argues that the issue posed by the Dark Web, enabled by anonymity-granting technologies, is a social one. Just as peace and order are maintained in our offline lives through judicious policing, the same principle should apply online. The networks of the Dark Web need to be more actively policed, especially in liberal democratic countries. Online policing, as shown by the take down of illegal marketplaces such as Silk Road and child pedophilia rings, is actually possible, and both as effective and as expedient as offline policing. More movement in the direction of judicious online policing can minimize the socially damaging costs of anonymity-granting technologies, while still allowing the benefits of such systems. It is not the ideal solution, but it is likely the best that can be done.

Details: London: Global Commission on Internet Governance, 2015. 24p.

Source: Internet Resource: Paper Series: No. 21: Accessed March 16, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2667711

Year: 2015

Country: International

Keywords: Cyber Security

Shelf Number: 138263


Author: Shatz, Howard J.

Title: The Islamic State We Knew: Insights Before the Resurgence and Their Implications

Summary: The group calling itself the Islamic State poses a grave threat, not just to Iraq and Syria but to the region more broadly and to the United States and its global coalition partners. A deadly and adaptive foe, the Islamic State seemed to come out of nowhere in June 2014, when it conquered Mosul. However, the Islamic State of today is the direct descendant of a group that Iraq, the United States, and their partners once fought as al-Qa'ida in Iraq and then as the Islamic State of Iraq. The wealth of publicly available information about the group indicates that the Islamic State's reemergence in 2014, and especially its methods and goals, should not have come as a surprise, although the strength and scope of that reemergence were rightfully shocking. The history considered in this report provides information known by the end of 2011 about the group's origins, finances, organization, methods of establishing control over territory, and response to airpower. Now that the Islamic State has reemerged, countering it can rely, in part, on the great deal of accumulated knowledge available. Because Iraqis and coalition forces routed the group once, the group's history can inform four components of a successful strategy against the Islamic State: degrading the group's finances, eliminating its leadership and potential leadership, creating a better strategy to hold recaptured territory, and making use of airpower.

Details: Santa Monica, CA: RAND, 2015. 24p.

Source: Internet Resource: Accessed March 16, 2016 at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR1200/RR1267/RAND_RR1267.pdf

Year: 2015

Country: International

Keywords: ISIS

Shelf Number: 138326


Author: Schroeder, Matt

Title: Dribs and Drabs: The Mechanics of Small Arms Trafficking

Summary: There are over 550 million firearms in worldwide circulation. That's one firearm for every 12 people on the planet. The only question is: How do we arm the other 11? (Lord of War, 2005) This iconic line from the 2005 film Lord of War conveys widely held assumptions about international arms traffickers: that they are ambitious, well-connected, globe-trotting entrepreneurs who single-handedly arm criminals and militias throughout the world. The film's fictional protagonist, Yuri Orlov, is based on five actual arms dealers, including Russian businessman Viktor Bout, whose vast global network of shell companies and unsavoury clients earned him the moniker 'the Merchant of Death' (Gilchrist, 2005). The composite image of Bout and his peers has become the archetypal arms trafficker, the image that comes to mind whenever the illicit arms trade is discussed. Yet most arms traffickers bear little resemblance to that image. The 'merchants of death' do indeed fuel conflicts and stock the arsenals of dictators, but there is little evidence to suggest that they dominate the illicit arms trade. Most arms trafficking is less flashy, less centralized, and even more difficult to stop. The following Issue Brief analyses this side of the illicit small arms trade, which receives far less attention than the multi-ton shipments arranged by rogue brokers.

Details: Geneva, SWIT: Small Arms Survey, 2016. 16p.

Source: Internet Resource: Issue Brief: Accessed March 16, 2016 at: http://www.smallarmssurvey.org/fileadmin/docs/G-Issue-briefs/SAS-IB17-Mechanics-of-trafficking.pdf

Year: 2016

Country: International

Keywords: Firearms Trafficking

Shelf Number: 138305


Author: Physicians for Human Rights

Title: Lethal in Disguise: The Health Consequences of Crowd-Control Weapons

Summary: In recent years, there has been a rise in the number of popular protests in which people have taken to the streets to express grievances and claim their rights. In many cases, police and security forces have responded in ways that profoundly undermine the fundamental rights to freedom of peaceful assembly and freedom of expression, often leading to escalations in violence through unwarranted, inappropriate, or disproportionate uses of force. Law enforcement throughout the world is increasingly responding to popular protests with crowd-control weapons (CCWs). The proliferation of CCWs without adequate regulation, training, monitoring, and/or accountability, has led to the widespread and routine use or misuse of these weapons, resulting in injury, disability, and death. There is a significant gap in knowledge about the health effects of CCWs and an absence of meaningful international standards or guidelines around their use. As a result, the International Network of Civil Liberties Organizations (INCLO) and Physicians for Human Rights (PHR) partnered to document the health consequences of CCWs and examine their roles and limitations in protest contexts and make recommendations about their safe use. This report aims to raise awareness about the misuse and abuse of CCWs, the detrimental health effects that these weapons can have, and the impact of their use on the meaningful enjoyment of freedom of assembly and expression. We also seek to foster a global debate to develop international standards and guidelines. Ultimately, our goal is to prevent injury, disability, and death by providing information about CCWs and insisting on their safe use. The misuse of CCWs and the human rights concerns that arise from this misuse are the result of a number of factors, the most significant of which are: gaps in international standards and regulations; insufficient testing, training, and regulations; a rapidly-growing industry; and a lack of accountability. There are many flagrant examples of the misuse of CCWs, some of which are documented in case studies included in this report. In Kenya, five children and one police officer were injured in a stampede resulting from tear gas being fired directly at schoolchildren protesting the seizure of a playground. In the United States, police intervention in the Black Lives Matter protests included the indiscriminate use of tear gas, disorientation devices, acoustice devices, beanbag rounds, and rubber bullets. In Egypt, a police officer was caught on video deliberately firing pellets at protesters' upper bodies in order to maximise injury. These troubling case studies, and others, are included throughout this report to put the medical evidence into context. The report examines six kinds of CCWs used internationally: kinetic impact projectiles (KIPs), chemical irritants, water cannons, disorientation devices, acoustic weapons, and directed energy devices. The health effects of kinetic impact projectiles and chemical irritants are described in significant detail; these are the two weapon types about which there is a critical mass of data to analyse. The following systematic reviews evaluated published and grey literature released between January 1, 1990 and March 31, 2015.

Details: New York: Physicians for Human Rights and INCLO, 2016. 104p.

Source: Internet Resource: Accessed march 21, 2016 at: https://ccla.org/cclanewsite/wp-content/uploads/2016/03/WEAPONREPORT_FINAL_WEB_PAGES.pdf

Year: 2016

Country: International

Keywords: Crowd Control

Shelf Number: 138346


Author: Lum, Kristian

Title: Estimating Undocumented Homicides with Two Lists and List Dependence

Summary: Homicides tend to be hidden from public view. Perpetrators are often motivated to conceal the crime, and victims' families may be afraid to denounce the violence; concealment and the families' fear may be most acute when the perpetrators of the crime are state authorities, like the police. Consequently, lists of homicides tend to be partial, and they tend to emphasize victims with high social visibility: victims who are relatively well-known, and whose killing occurs in daylight, in urban areas, and in view of bystanders motivated to report the crime. Other killings without these aspects more frequently remain hidden from public knowledge. When two or more groups provide lists of victims of homicide, it is possible to estimate the total population of victims, including those who were not documented on any of the lists being used. The technique is called capture-recapture or multiple systems estimation (MSE; an introduction to the method is here). Intuitively, the more overlaps among the lists, the more plausible it is that the population they are drawing from is small. A standard assumption in MSE is that the lists are statistically independent (see Q13, here), i.e. that an incident being recorded on one list makes the incident no more or less likely to be recorded on the other lists. Another standard assumption is homogeneity of recording probabilities (see Q11, here), i.e. that the probability of recording patterns does not vary across the population being estimated. Heterogeneity in recording probabilities can induce list dependence (International Working Group for Disease Monitoring and Forecasting, 1995). Thus, the independence assumption is rarely true, but with three or more lists we can estimate the dependence among subsets of the lists, following the method proposed by Bishop et al. (1975). In estimates made by the Human Rights Data Analysis Group (HRDAG), we use three or more lists to take advantage of the additional lists to estimate the list dependence rates. Whether estimates produced under the assumption of independence over-or underestimate the true population size depends on correlations between inclusion in different lists. Lists are positively correlated if the appearance of an incident on one list makes it more likely that the incident appears on the other list. One mechanism through which this can occur is if the both lists are compiled using some of the same underlying data sources. Positive list correlation also occurs between lists collected by projects that share similar social constituencies, for example, lists of victims collected by police and by municipal social workers may tend to draw from communities that trust the government, while communities that do not trust the government may avoid both police and government social service projects. Lists are negatively correlated if the appearance of an incident on one list makes it less likely that the incident was recorded on the other list. This can occur if the groups gathering data tend to focus their efforts on different geographic regions or periods of time, or if one documentation group draws from one political party while another documentation group draws from a competing party. When dependence between two lists is positive, the two-list independence estimator will be biased downward, and when list dependence is negative, this estimate will be biased upward. In practice, we have found that most list dependence is positive. In this document, we propose a method to include a correction for list dependence in the two list case, producing a range of estimates. In essence, we propose performing a sensitivity analysis to the independence assumption. For the values we use in the correction, we derive list dependence measures from contextually similar projects where we believe the underlying data generating processes was similar to the data collection done by the two groups recording from our target population. That is, we select other data sets that we believe exhibit similar list dependence properties to the two lists of records from our target population. Thus, we can estimate a population total using only two lists that accounts for list dependence. This approach assumes that the list dependence in the two lists from our target population is comparable to the list dependence in other projects (and populations) where we have three or more lists.

Details: San Francisco?: Human Rights Data Analysis Group, 2015. 15p.

Source: Internet Resource: Accessed March 21, 2016 at: https://hrdag.org/wp-content/uploads/2015/07/2015-hrdag-estimating-undoc-homicides.pdf

Year: 2015

Country: International

Keywords: Crime Statistics

Shelf Number: 138348


Author: International Crisis Group

Title: Exploiting Disorder: al-Qaeda and the Islamic State

Summary: The Islamic State (IS), al-Qaeda-linked groups, Boko Haram and other extremist movements are protagonists in today's deadliest crises, complicating efforts to end them. They have exploited wars, state collapse and geopolitical upheaval in the Middle East, gained new footholds in Africa and pose an evolving threat elsewhere. Reversing their gains requires avoiding the mistakes that enabled their rise. This means distinguishing between groups with different goals; using force more judiciously; ousting militants only with a viable plan for what comes next; and looking to open lines of communication, even with hardliners. Vital, too, is to de-escalate the crises they feed off and prevent others erupting, by nudging leaders toward dialogue, inclusion and reform and reacting sensibly to terrorist attacks. Most important is that action against "violent extremism" not distract from or deepen graver threats, notably escalating major- and regional-power rivalries. The reach of "jihadists" (a term Crisis Group uses reluctantly but that groups this report covers self-identify with; a fuller explanation for its use is on page 2) has expanded dramatically over the past few years. Some movements are now powerful insurgent forces, controlling territory, supplanting the state and ruling with a calibrated mix of coercion and co-option. Little suggests they can be defeated by military means alone. Yet, they espouse, to varying degrees, goals incompatible with the nation-state system, rejected by most people in areas affected and hard to accommodate in negotiated settlements. Most appear resilient, able to adapt to shifting dynamics. The geography of crisis today means similar groups will blight many of tomorrow's wars. IS has reshaped the jihadist landscape: its strategy bloodier than that of al-Qaeda, from which it split in 2013; its declared caliphate across much of Iraq and Syria and grip on a Libyan coastal strip; thousands of foreigners and dozens of movements enlisted; its attacks in the Muslim world and the West. Fighting on multiple fronts - against Iran's allies, Sunni Arab regimes and the West - it has woven together sectarian, revolutionary and anti-imperialist threads of jihadist thought. Its leadership is mostly Iraqi but the movement is protean: millenarian and local insurgent; to some a source of protection, to others of social mobility and yet others of purpose; with strands aiming to consolidate the caliphate, take Baghdad or even Mecca, or lure the West into an apocalyptic battle. Primarily, though, its rise reflects recent Iraqi and Syrian history: Sunni exclusion and anomie after the disastrous U.S invasion; harsh treatment under Prime Minister Nouri al-Maliki; and the brutality of President Bashar al-Assad's regime and its allies. Any response must factor in IS's many faces. But mostly it needs to address Sunni suffering in the Levant and the dangerous sense of victimisation that has helped spawn across the Sunni Arab world. In part obscured by IS's rise, al-Qaeda has evolved. Its affiliates in the Maghreb, Somalia, Syria and Yemen remain potent, some stronger than ever. Some have grafted themselves onto local insurrections, displaying a degree of pragmatism, caution about killing Muslims and sensitivity to local norms. Around the Lake Chad Basin, Boko Haram, the latest in a string of revivalist movements rooted in the marginalised political economy and structural violence of northern Nigeria, has morphed from isolated sect to regional menace, though formally joining IS has changed little about it. Movements of different stripes - the largely nationalist Afghan Taliban, resurgent as foreign troops draw down from Afghanistan, and Pakistani groups including sectarian movements, tribal militants fighting the central state and Kashmir- or Afghanistan-focused elements aligned to its military establishment - comprise an evolving South Asian jihadist scene. The roots of this expansion defy generic description. Patterns of radicalisation vary from country to country, village to village, individual to individual. Autocrats, political exclusion, flawed Western interventions, failing governance, closing avenues for peaceful political expression, the distrust of the state in neglected peripheries, traditional elites' declining authority and the lack of opportunity for growing youth populations have all played their part. So, too, has the dwindling appeal of other ideologies, particularly the Muslim Brotherhood's peaceful political Islam - jihadists' main ideological competitor - diminished by President Muhammed Morsi's ouster and the subsequent crackdown in Egypt. Proselytising of intolerant strands of Islam has, in places, helped prepare the ground. The sectarian currents coursing through much of the Muslim world both are aggravated by IS and give it succour. But if roots are complex, the catalyst is clear enough. The descent of most of the 2011 Arab revolutions into chaos has opened enormous opportunity for extremists. Movements have gathered force as crises have festered and evolved, as money, weapons and fighters flow in, as violence escalates. Mounting enmity between states means regional powers worry less about extremists than about traditional rivals, leverage the fight against IS against other enemies or quietly indulge jihadists as proxies. Especially in the Middle East, jihadists' expansion is more a product of instability than its primary driver; is due more to radicalisation during crises than beforehand; and owes more to fighting between their enemies than to their own strengths. Rarely can such a movement gather force or seize territory outside a war zone or collapsed state. Geopolitics hinders a coherent response. The starting point should be to dial back the Saudi-Iranian rivalry that drives Sunni and Shia extremism, deepens crises across the region and is among the gravest threats to international peace and security today. Easing other tensions - between Turkey and Kurdish militants, for example, Turkey and Russia, conservative Arab regimes and the Muslim Brotherhood, Pakistan and India, even Russia and the West - is also essential. In Libya, Syria and Yemen, tackling jihadists requires forging new orders attractive enough to deplete their ranks and unite other forces. Of course, none of this is easy. But redoubling efforts to narrow other fault lines would be wiser than papering them over in an illusion of consensus against "violent extremism". Vital, too, is to learn from mistakes since the 9/11 (2001) attacks. Each movement, notwithstanding the links between and transnational ties of some, is distinct and locally rooted; each requires a response tailored to context. They can, however, pose similar dilemmas and provoke similar blunders. Major and regional powers and governments in areas affected should: - Disaggregate not conflate: Making enemies of non-violent Islamists, particularly the Muslim Brotherhood, prepared to accept political and religious pluralism and engage in politics is self-defeating. Also important is to distinguish movements seeking a place within the international order from those wanting to upend it. Even IS, its local branches and al-Qaeda affiliates, despite belonging to the latter category, are not monolithic. They have dedicated cores with transnational goals, but rank-and-files with diverse, mostly local motives whose loyalty can shift, and perhaps be shifted, with changing conditions. Governments should disaggregate even radical movements with an eye to ending violence, not lump others in with them looking for a fight. - Contain if no better option exists: Foreign powers should always have a viable plan for what comes next if they undertake to oust militants; the same applies to governments in their hinterlands. Today's strategy in Iraq - razing towns to defeat IS in the hope Sunni leaders in Baghdad can regain lost legitimacy through reconstruction - is unlikely either to meet Sunnis' grievances or create conditions in which they can forge a new political identity. In Libya a heavy bombardment or deployment of Western troops against IS without a wider political settlement would be a mistake, likely to deepen the chaos. In both cases, slowing military operations also carries grave risks but, without a workable alternative, is the safer option - for those contemplating going in and those in areas affected alike. - Use force more judiciously: Although force usually must be part of the response, governments have been too quick to go to war. Movements with roots in communities, tapping genuine grievances and sometimes with foreign backing are hard to extirpate, however unappealing their ideology. Wars in Somalia and Afghanistan show the shortfalls of defining enemies as terrorists or violent extremists and of combining efforts to build centralised state institutions with military action against them absent a wider political strategy that includes reconciliation. Nor can Russia's scorched-earth approach in Chechnya - even leaving aside the human cost - be replicated in areas affected today, given porous borders, collapsed states and proxy warfare. - Respect rules: Too often military action against extremists helps them recruit or leaves communities caught between their harsh rule and indiscriminate operations against them. Jihadists' ability to offer protection against predation by regimes, other militias or foreign powers is among their greatest assets, usually more central to their success than ideology. While often guilty of atrocities, they fight in conflicts in which all sides violate international humanitarian law. Recovering the rulebook must be a priority. - Curb targeted killings: Drone strikes can, in places, hinder groups' operations and ability to hit Western interests and their leaders' movements. But they feed resentment against local governments and the West. Movements weather the deaths of leaders, and the replacements that emerge are often harder-line. Foreseeing the impact of killings is hard in a reasonably stable order; doing so amid urban warfare and jihadist infighting - with al-Qaeda and others confronting IS - is impossible. Even leaving aside questions of secrecy, legality and accountability, targeted killings will not end the wars jihadists fight in or decisively weaken most movements. - Open lines of communication: Notwithstanding the difficulties, governments should be more willing to talk, even with radicals. Opportunities to engage in ways that might have de-escalated violence - with some Taliban and al-Shabaab leaders, Boko Haram and Ansar al-Sharia in Libya, for example - have been lost. The decision whether a group is irreconcilable rests with its leaders not governments. Although policy-makers can entertain no illusions about the nature of the IS and al-Qaeda top commands, opportunities to open unofficial, discreet lines of communication, through community leaders, non-state mediators or others, are usually worth pursuing, particularly on issues of humanitarian concern, where there may be shared interest. - Narrow the "countering violent extremism" (CVE) agenda: As a corrective to post-9/11 securitised policies, the CVE agenda, pioneered mostly by development actors, is valuable; so, too, are recognising the underlying conditions that can, in places, enable extremists' recruitment and shifting funds from military spending to development aid. But re-hatting as CVE activities to address "root causes", particularly those related to states' basic obligations to citizens - like education, employment or services to marginalised communities - may prove short-sighted. Casting "violent extremism", a term often ill-defined and open to misuse, as a main threat to stability risks downplaying other sources of fragility, delegitimising political grievances and stigmatising communities as potential extremists. Governments and donors must think carefully what to label CVE, further research paths of radicalisation and consult widely across the spectrum of those most affected. - Invest in conflict prevention: IS's and al-Qaeda's recent expansion injects new urgency into prevention, both during crises, to halt their radicalisation, and upstream. Any further breakdown in the belt running from West Africa to South Asia is likely to attract an extremist element - whether these movements provoke crises themselves or, more likely, profit from their escalation. Although generic prescriptions are of limited value, nudging leaders toward more inclusive and representative politics, addressing communities' grievances and measured responses to terrorist attacks usually make sense. Overall, in other words, preventing crises will do more to contain violent extremists than countering violent extremism will do to prevent crises. The past quarter-century has seen waves of jihadist violence: a first in the early 1990s, when volunteers from the anti-Soviet jihad in Afghanistan joined insurrections elsewhere; a second pioneered by al-Qaeda culminating in the 9/11 attacks; and a third sparked by the U.S. invasion of Iraq. Today's fourth wave is the most perilous yet. Partly this is thanks to IS's territorial control and ideological innovation - its tapping of both local Sunni and wider anti-establishment discontent. Mostly, though, it is dangerous because of the currents propelling it, particularly the Middle East's upheaval and fraying state-society relations there and elsewhere. World leaders' concern is well-founded: IS's attacks kill their citizens and threaten their societies' cohesion. They face enormous pressure to act. But they must do so prudently. Missteps - whether careless military action abroad; crackdowns at home; subordinating aid to counter-radicalisation; casting the net too wide; or ignoring severer threats in a rush to fight "violent extremism" - risk aggravating those deeper currents and again playing into jihadists' hands.

Details: Brussels: International Crisis Group, 2016. 62p.

Source: Internet Resource: Accessed March 22, 2016 at: http://www.crisisgroup.org/~/media/Files/exploiting-disorder-al-qaeda-and-the-islamic-state.pdf

Year: 2016

Country: International

Keywords: al-Qaeda

Shelf Number: 138368


Author: Verite

Title: Strengthening Protections Against Trafficking in Persons in Federal and Corporate Supply Chains. Research on Risk in 43 Commodities Worldwide

Summary: This report presents narratives on 43 of the world's most important primary commodities. To produce these reports for each primary commodity, a multitude of data was assembled on global production and trade patterns (principal countries of production and consumption, and export-import data for key producers, importers, and the United States), reports of forced labor and/or child labor associated with the commodity, and the names of any countries in which trafficking-related problems have been reported in association with the commodity. Using the general information assembled as a starting point, each key commodity was then researched in depth, with the findings compiled into comprehensive commodity analyses. Thus, each individual commodity report provides background on the production patterns and labor practices involved in the specific industry in question. Each report also describes the connection, if any, between the commodity and forced labor and/or child labor. When available, case studies are provided of documented instances of human trafficking in the industry. The following reports also describe the structure of the supply chain for each commodity and any links to other supply chains for which the commodity is a key input, and review any government or industry initiatives that exist to reduce human trafficking in conjunction with the commodity in question. In the case of some commodities, no cases of human trafficking have been documented. In these commodity reports, efforts were made only to describe supply chain dynamics and general labor practices, to the degree that information was available. Therefore, these reports do not constitute a definitive list of commodities tainted by human trafficking. Given data limitations, it was necessary to examine other indicators, and one key indicator of risk that was used was the incidence of child labor. Child labor can vary considerably from sector to sector, country to country, and household to household, and it is not human trafficking per se. For these purposes, however, child labor may provide an indicator of risk for forced labor, given that the drivers for both may be similar, such as demand for cheap, exploitable, unskilled labor, poverty, unequal access to education, and exclusionary social attitudes based on caste, gender, immigration status, or ethnicity. That said, description of child labor risk in the commodity reports should not be used exclusively to evaluate the risk of trafficking in a supply chain, but should instead be understood as providing additional context.

Details: Amherst, MA: Verite, 2016. 206p.

Source: Internet Resource: Accessed March 22, 2016 at: http://www.verite.org/sites/default/files/images/Verite-CommodityReports-2016%200229.pdf

Year: 2016

Country: International

Keywords: Child Labor

Shelf Number: 138377


Author: Schneider, Friedrich

Title: Estimating the Size of the Shadow Economy: Methods, Problems and Open Questions

Summary: This paper presents the various methods to estimate the size of the shadow economy, their strengths and weaknesses. The purpose of the paper is twofold. Firstly, it demonstrates that no ideal method to estimate the size and development of the shadow economy exists. Because of its flexibility, the MIMIC method used to get macro-estimates of the size of the shadow economy is discussed in greater detail. Secondly, the paper focuses on the definition and causal factors of the shadow economy as well as on a comparison of the size of the shadow economy using different estimation methods.

Details: Bonn, Germany: Institute for the Study of Labor (IZA), 2016. 41p.

Source: Internet Resource: IZA Discussion Paper No. 9820: Accessed March 23, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2353281

Year: 2016

Country: International

Keywords: Economic Crimes

Shelf Number: 138395


Author: Porporino, Frank J.

Title: Managing the Elderly in Corrections

Summary: There are few benefits to growing old. As we age, we inevitably deteriorate both physically and mentally, perhaps gradually if we are fortunate, but nonetheless steadily. Social psychological studies tell us that happiest elderly people are those who can remain active, with close connections with family and friends and other social supports, and who can still feel they are contributing in some meaningful fashion. We clearly live in an "ageist" society and none of us particularly looks forward to getting old, but old age can be negotiated more or less effectively when there is quality healthcare we can access, some level of financial stability we can enjoy, and supportive social networks we can be part of. Aging in prisons is another experience all together. Most elderly offenders will have lost touch with their families and friends, who are either dead, too old to visit, or have simply moved on with their lives. Health concerns are a daily preoccupation and fear of death, alone in a small cell, the fodder for nightmares. Opportunity to enjoy the small things in life, that become very important things as we grow older, is lost in prison; looking forward to our favorite meal, that special cup of tea, the calla lilies in our garden, or playing peek-a-boo with our grandchild. Aging in prison instead becomes an unceasing grind where one is forced to endure a boring, austere, routinized, noisy and foul smelling enclosed environment. There is no "choice" to learn to age gracefully in prison. You simply get old, quickly and mostly invisibly. The issue of managing the elderly in prisons has emerged as one of the most significant and unplanned for crises in corrections. Though it may be of most concern in developed nations, where life expectancy has steadily and significantly increased, the problem is growing quickly in developing nations where long prison sentences are becoming a matter of course. For many jurisdictions worldwide, it is an issue that has simply caught them by surprise as the aging of their prisoner population has begun to be noticed. It is clearly a situation that obliges action in accordance with numerous declarations of respect for human rights endorsed by most nations of the world. The elderly in prison, like all prisoners, have the right to be treated with respect for their humanity and inherent human dignity; to not be subjected to torture or other cruel, inhuman, or degrading treatment or punishment; to receive appropriate medical and mental healthcare; to have reasonable accommodation for their disabilities; and to be provided activities and programs to support their rehabilitation. This paper will attempt to: Outline the scope of the problem of the elderly offender in corrections; Discuss what might be causing this problem; and finally, Assess what some of the most significant consequences might be for the delivery of correctional services to this population, and what possible responses (policies, programs or services) might be helpful.

Details: Unpublished paper, 2014. 29p.

Source: Internet Resource: Accessed March 24, 2016 at: http://archive.icpa.ca/tools/download/1981/Managing_The_Elderly_in_Corrections.pdf

Year: 2014

Country: International

Keywords: Aged Offenders

Shelf Number: 138404


Author: Richards, Kelly

Title: Addressing the offending-related needs of non-violent Indigenous offenders

Summary: This brief examines the effectiveness of measures that aim to reduce non-violent offending by Indigenous people in Australia, New Zealand, Canada and the USA. Drawing on the literature available, the brief identifies examples and principles for program development and delivery that have shown potential to reduce Indigenous non-violent offending. The brief suggests that, in general terms, incorporating Indigenous culture(s) into treatment, combining cultural content with Western treatment approaches, incorporating families and communities into treatment, addressing substance abuse and trauma, and addressing the broader historical and social context in which Indigenous offending occurs, are promising approaches to reducing re-offending.

Details: Sydney: Indigenous Justice Clearinghouse, 2015. 8p.

Source: Internet Resource: Research Brief 20: Accessed March 24, 2016 at: http://www.indigenousjustice.gov.au/briefs/brief020.pdf

Year: 2015

Country: International

Keywords: Aboriginals

Shelf Number: 138405


Author: Kessels, Eelco

Title: Countering Violent Extremism and Development Assistance: Identifying Synergies, Obstacles, and Opportunities

Summary: A consensus is building that violent extremism and terrorism are both international security and development issues. It is well documented that economic and social development are better attained in the absence of violent conflict. Furthermore, although poverty does not have a direct causal relationship with violent extremism and terrorism, poorer countries are the most affected by terrorism. Beyond socioeconomic challenges, a lack of hope and future prospects, real or perceived marginalization and sociopolitical exclusion, and weak governance and rule of law are considered conducive to the spread of terrorism and challenging to sustainable development. Indeed, Sustainable Development Goal (SDG)16, one of the United Nations - supported set of targets related to international development, focuses on the promotion of peaceful and inclusive societies for sustainable development, the provision of access to justice for all, and the building of effective, accountable, and representative institutions at all levels. Moreover, violent extremism and terrorism are direct threats to development as they impact economic stability, tourism, and the human security and freedom of citizens, including their freedom from physical threat, freedom of religion, and freedom of expression. Lastly, violent extremism is increasingly part of the context in which development organizations operate, with violent extremist groups impeding, endangering, and diverting the delivery of development assistance and aid services. In certain cases, terrorism and violent extremism are the primary factors contributing to the need for continued assistance.

Details: Washington, DC: Global Center on Cooperative Security, 2016. 17p.

Source: Internet Resource; Policy Brief: Accessed March 24, 2016 at: http://www.globalcenter.org/wp-content/uploads/2016/01/Feb-2016-CVE-and-Development-policy-brief.pdf

Year: 2016

Country: International

Keywords: Development Assistance

Shelf Number: 138408


Author: Fellman, Philip V.

Title: Disrupting Terrorist Networks - A Dynamic Fitness Landscape Approach

Summary: The study of terrorist networks as well as the study of how to impede their successful functioning has been the topic of considerable attention since the odious event of the 2001 World Trade Center disaster. While serious students of terrorism were indeed engaged in the subject prior to this time, a far more general concern has arisen subsequently. Nonetheless, much of the subject remains shrouded in obscurity, not the least because of difficulties with language and the representation or translation of names, and the inherent complexity and ambiguity of the subject matter. One of the most fruitful scientific approaches to the study of terrorism has been network analysis (Krebs, 2002; Carley, 2002a; Carley and Dombroski, 2002; Butts, 2003a; Sageman, 2004, etc.) As has been argued elsewhere, this approach may be particularly useful, when properly applied, for disrupting the flow of communications (C4I) between levels of terrorist organizations (Carley, Krackhardt and Lee, 2001; Carley, 2002b; Fellman and Wright, 2003; Fellman and Strathern, 2004; Carley et al, 2003; 2004). In the present paper we examine a recent paper by Ghemawat and Levinthal, (2000) applying Stuart Kauffman's NK-Boolean fitness landscape approach to the formal mechanics of decision theory. Using their generalized NK-simulation approach, we suggest some ways in which optimal decision-making for terrorist networks might be constrained and following our earlier analysis, suggest ways in which the forced compartmentation of terrorist organizations by counter-terrorist security organizations might be more likely to impact the quality of terrorist organizations' decision-making and command execution.

Details: Unpublished Paper, 2007. 13p.

Source: Internet Resource: Accessed March 26, 2016 at: http://arxiv.org/ftp/arxiv/papers/0707/0707.4036.pdf

Year: 2007

Country: International

Keywords: Criminal Networks

Shelf Number: 138424


Author: Pieth, Mark

Title: Multistakeholder Initiatives to Combat Money Laundering and Bribery

Summary: Intensified economic globalisation has had positive and negative effects. It has left nation states struggling to deal with the negative fall-out. National regulation against abuses has, however, proven increasingly ineffective, especially since companies have the freedom to move their hazardous activities to under-regulated areas. States have stepped up cooperation and coordination on a bilateral as well as a multilateral basis: international organisations and treaties become more and more relevant to the regulation of international trade relations. However, the traditional instruments of international law are frequently considered too cumbersome and slow. Increasingly international law is created by unconventional means: 'task forces' prove to be far more expedient, since they prefer 'soft law' to treaty law. Political enforcement by peer-pressure becomes more relevant than by juridical instruments (e.g. courts and tribunals). Furthermore, regulation goes well beyond law-making by legislators and government bodies; non-state actors contribute extensively, especially in the area of regulating international trade relations.

Details: Basel: Basel Institute on Governance, 2006. 20p.

Source: Internet Resource: Working Paper Series No. 02: Accessed March 26, 2016 at: https://www.baselgovernance.org/sites/collective.localhost/files/publications/biog_working_paper_02.pdf

Year: 2006

Country: International

Keywords: Bribery

Shelf Number: 138434


Author: van Kesteren, John

Title: Criminal victimization at individual and international level: Results from the international crime victims surveys

Summary: This dissertation is based on five publications presenting results of analyses of the International Crime Victim Surveys (ICVS). The datasets of the ICVS allow analyses of data on victimization at both the individual and collective level. Analyses of data on individuals can provide insights in the key victimological issue which groups are most at risk to be criminally victimized and/or most fearful. As national victimization surveys, the ICVS is also a source of information on other attitudes and opinions of victims and nonvictims, e.g. data on the treatment by the police, reception of specialized support, opinions on sentencing or the use of prevention measures. Chapters 2 and 3 give comprehensive overviews of what the ICVS has learned us about these issues over the years. The principal aim of the ICVS has been the collection of comparable data on the prevalence of crime. A unique asset of the ICVS is that it also allows analyses of victimization across countries or regions. In total data are available about over 80 different countries from all world regions as well as about over 200 European regions at the NUTS2 level. Inter-country comparisons of prevalence rates of victimization have from the outset been the main results of the ICVS. Analyses of these rates can be used to test criminological theories about the macro sources of crime such as strain theory and criminal opportunity theory. Inter-country comparisons can also be made to analyze differences in public attitudes to policing, crime prevention or sentencing which can give guidance to the planning of policies in these areas. Selected findings are presented in the two chapters. Arguably the greatest and most unique asset of the ICVS is that its datasets allow the conduct of multi-level analyses of victimization at both individual level and at macro level (regions or countries). Three chapters in this dissertation present results of such multi-level analyses, concerning opinions on sentencing (punitivity), the links between ownership of firearms and victimization by violent crime and between migrant status and hate crime victimization. In the two latter publications in particular the analyses shed light on both the macro sources of violent crime and hate crime as on the risk factors of such victimization at the individual level and on possible interactions between the two. This general introduction will first explain the concept of multi-level analysis in social sciences in general and in victimology or criminology in particular. Based on that, we will formulate a set of research questions which can be tested using multi-level analyses. This is followed by an introduction to the ICVS project. Finally, we will give an introduction to the three themes that have been studied in a multi-level fashion, namely punitivity, firearm ownership and hate crime.

Details: Tilburg, NETH: Tilburg University, 2015. 215p.

Source: Internet Resource: Dissertation: Accessed March 26, 2016 at: https://pure.uvt.nl/ws/files/8407046/Van_Kesteren_Criminal_02_10_2015.pdf

Year: 2015

Country: International

Keywords: Crime Surveys

Shelf Number: 138435


Author: PriceWaterhouseCoopers

Title: Adjusting the Lens on Economic Crime: preparation brings opportunity back into focus

Summary: More than a third of organisations have experienced economic crime in the past 24 months, as reported by over 6,000 respondents to PwC's Global Economic Crime Survey 2016. This year's results show that the incidence of economic crime has come down, for the first time since the global financial crisis of 2008-9 (albeit marginally by 1%).​ At first glance, this could be evidence of a return on the investments in the preventative measures which organisations have been making over the past few years. But as we look at the data more closely, it is possible that this small decrease is actually masking a worrying trend: that economic crime is changing significantly, but that detection and controls programmes are not keeping up with the pace of change. What's more, the financial cost of each fraud is on the rise.​ This year's report illustrates how economic crime has evolved over the last two years, morphing into different forms depending on industrial sector and region.​ Despite this evolving threat, we have seen a decrease in the detection of criminal activity by methods within management's control, with detection through corporate controls down by 7%. What's more, one in five organisations (22%) have not carried out a single fraud risk assessment in the last 24 months. When looked at in the context of the findings in PwC's 19th Annual Global CEO Survey - where two-thirds of chief executives agreed that there are more threats to the growth of their company than ever before (a sharp increase, compared to 59% in 2015) - this points to a potentially worrying trend: that too much is being left to chance. In fact, our findings indicate that one in ten economic crimes are discovered by accident.​

Details: s.l.: PriceWaterhouseCoopers, 2016. 56p.

Source: Internet Resource: Global Economic Crime Survey 2016: Accessed March 29, 2016 at: http://www.pwc.com/gx/en/economic-crime-survey/pdf/GlobalEconomicCrimeSurvey2016.pdf

Year: 2016

Country: International

Keywords: Cybercrime

Shelf Number: 138456


Author: Phillips, Peter J.

Title: Geographic Profiling of Lone Wolf Terrorists: The Application of Economics, Game Theory and Prospect Theory

Summary: This paper presents an economic analysis of the choices made by lone wolf terrorists. Using RAND-MIPT data about the fatalities that are inflicted by different attack methods, the paper develops an analysis on a foundation of orthodox utility theory and Markowitz-Tobin approximations. This approach permits a computable opportunity set within a risk-reward or mean-variance framework. Optimal choices can be determined using the Markowitz quadratic programming technique. The framework may provide a useful foundation for an economic perspective on 'offender profiling' applied within a terrorism context. Mapping attack methods into mean-variance space provides a more definitive categorisation of the riskiness of attack methods from the terrorist's perspective and suggests the possibility of identifying the terrorist's revealed risk preference. Inferences about the unknown offender may be drawn that complement other aspects of the investigative process. One of the key challenges of law enforcement is drawing inferences about the offender's location and the location of potential targets. Superimposing a game theoretical payoff matrix over a geographic location where payoffs are partially informed by the terrorist's choices and risk preference may contribute another, economic, perspective to this part of the law enforcement process. Prospect theory may also contribute useful insights into the geographical profiling problem.

Details: Toowoomba, QLD: University of Southern Queensland - Faculty of Business, 2014. 19p.

Source: Internet Resource: Accessed March 29, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2468272

Year: 2014

Country: International

Keywords: Extremist Groups

Shelf Number: 138469


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: Tracking Anti-Corruption and Asset Recovery Commitments. A Progress Report and Recommendations for Action

Summary: At the Third High Level Forum on Aid Effectiveness in Accra, Ghana in 2008, more than 1 700 participants from governments, aid agencies and civil society organizations came together to review progress on the Paris Declaration and to define the steps forward to further improve aid effectiveness. One result was the Accra Agenda for Action, in which donor countries committed themselves to fight corruption, in particular to "take steps in their own countries to combat corruption by individuals or corporations and to track, freeze, and recover illegally acquired assets." This declaration created momentum in the international fight against corruption, addressing a facet that had hitherto been largely neglected by the international development community, but which has important repercussions worldwide. Vast sums of financial assets are stolen from developing countries and hidden in financial centers around the world - money that could provide education, food or health services to the poor. Estimates reach into the hundreds of millions of dollars, and, although, there is some disagreement about these figures, it is clear that they probably exceed the level of official development assistance by a significant margin. Those stolen assets can be returned to their lawful owners and used for development programs, sending a clear message to corrupt political leaders that OECD countries are prepared to take action against corrupt practices at home. This publication reviews the compliance of 30 OECD donor countries with the anti-corruption commitments they made in Accra. It assesses progress in combating corruption and in tracking and recovering illegal assets to inform decision-makers of progress at the Fourth High Level Forum on Aid Effectiveness, which will be held in Busan in November 2011. The report shows that four countries - Australia, Switzerland, the United Kingdom and the United States - have repatriated a total of USD $ 227 million to foreign jurisdictions between 2006 and 2009, with another two countries - France and Luxembourg - having frozen assets pending a court decision. Assets frozen total slightly over USD $ 1.2 billion. The findings of the report highlight the need to develop a concrete follow-up action plan in Busan, as most countries have not yet taken sufficient steps to translate the commitments they made in Accra into policies generating concrete results. However, positive examples show that, with strong political leadership and institutional mechanisms in place, important results can be achieved in the fight against corruption and asset recovery.

Details: OECD and the International Bank for Reconstruction and Development/The World Bank, 2011. 64p.

Source: Internet Resource: Stolen Asset Recovery Initiative: Accessed March 30, 2016 at: https://star.worldbank.org/star/sites/star/files/Anti-corruption-and-Asset-Recovery-commitments-%28Accra%29.pdf

Year: 2011

Country: International

Keywords: Asset Forfeiture

Shelf Number: 138496


Author: Adams, Samantha

Title: The governance of cybersecurity: A comparative quick scan of approaches in Canada, Estonia, Germany, the Netherlands and the UK

Summary: Society's increased dependency on networked technologies and infrastructures in nearly all sectors poses a new challenge to governments and other actors to ensure the sustainability and security of all things 'cyber'. Cybersecurity is a particularly complex field, where multiple public and private actors must work together, often across state borders, not only to address current weaknesses, but also to anticipate and prevent or pre-empt a number of different kinds of threats. This report examines how public policy and regulatory measures are used to organise such processes in five countries: Canada, Estonia, Germany, the Netherlands and the UK.

Details: Tilburg, NETH: Tilburg University, Tilburg Institute for Law, Technology, and Society, 2015. 167p.

Source: Internet Resource: Accessed March 30, 2016 at: https://pure.uvt.nl/ws/files/8719741/TILT_Cybersecurity_Report_Final.pdf

Year: 2015

Country: International

Keywords: Computer Crime

Shelf Number: 138497


Author: McAfee

Title: McAfee Labs Threats Report

Summary: Our McAfee Labs 2016 Threats Predictions Report, published in late November, has been widely read and quoted in the media. Some of the most interesting media coverage comes from The Wall Street Journal, Good Morning America, Silicon Valley Business Journal, and CXO Today. The report includes both near- and long-term views of our cyber security future. And now, as winter's storms have passed, we have published the McAfee Labs Threats Report: March 2016. In this quarterly threats report, we highlight two Key Topics: Intel Security interviewed almost 500 security professionals to understand their views and expectations about the sharing of cyber threat intelligence. We learned that awareness is very high and that 97% of those who share cyber threat intelligence see value in it. We explore how the Adwind Java-based backdoor Trojan attacks systems through increasingly clever spam campaigns, leading to a rapid increase in the number of Adwind .jar file submissions to McAfee Labs. These two Key Topics are followed by our usual set of quarterly threat statistics.

Details: Santa Clara, CA: McAfee Labs, 2016. 46p.

Source: Internet Resource: Accessed March 31, 2016 at: http://www.mcafee.com/us/resources/reports/rp-quarterly-threats-mar-2016.pdf

Year: 2015

Country: International

Keywords: Computer Crime

Shelf Number: 138504


Author: Bosworth, Mary

Title: Border Criminologies: Assessing the Changing Architecture of Crime and Punishment

Summary: There is increasing convergence between criminal and immigration law as states respond to the challenges of international migration by erecting and enforcing tougher visa and border controls. Many countries have put the criminal justice system to work in managing migration. The numbers of foreign nationals in prison or in immigration detention centres have consequently surged. This paper examines the particular perspective that criminology provides in explaining and critiquing these developments. While the field has been slow to respond to immigration detention, often clinging to a nationalist vision of the administration of justice, over the past decade scholars in the nascent field of "Border Criminologies" have begun assessing the changing architecture of crime and punishment. Their research has drawn on the traditions of applied research about state control, producing accounts of policing, imprisonment, and detention. While work still needs to be done to broaden the intellectual reach of this new subfield, this paper argues that criminology offers a rich, critical heritage as well as a set of methods through which to understand these policy developments.

Details: Geneva, SWIT: Global Detention Project, 2016. 15p.

Source: Internet Resource: Global Detention Project Working Paper No. 10: Accessed March 31, 2016 at: http://www.globaldetentionproject.org/publications/border-criminologies-assessing-changing-architecture-crime-and-punishment

Year: 2016

Country: International

Keywords: Border Security

Shelf Number: 138509


Author: Baird, Theodore

Title: Who Is Responsible for Harm in Immigration Detention? Models of Accountability for Private Corporations

Summary: This paper argues that private corporations can and should be held responsible for structural injustices that take place in immigration detention regimes in which they operate. It draws on literature from business ethics to evaluate various ethical arguments for assessing corporate responsibility, emphasising models that may lead to the prevention of harm and suffering. In particular, the paper employs a social connection model of ethics as well as evidence of detention practices in Europe, the United States, and Australia to address a number of inter-related questions: How is immigration detention harmful? Who is responsible for this harm? How can responsible institutions reduce harm? The paper concludes by arguing that in addition to corporations and states, citizens and non-citizens have obligations to share in efforts to reduce the harm of immigration-related detention.

Details: Geneva, SWIT: Global Detention Project, 2016. 24p.

Source: Internet Resource: Global Detention Project Working Paper No. 11: Accessed March 31, 2016 at: http://www.globaldetentionproject.org/publications/who-responsible-harm-immigration-detention-models-accountability-private-corporations

Year: 2016

Country: International

Keywords: Illegal Immigration

Shelf Number: 138510


Author: McSweeney, Kendra

Title: The Impact of Drug Policy on the Environment

Summary: Across the world, cultivators and traffickers of illicit drugs are wreaking ecological havoc-clearing fields from primary rainforest, piggy-backing drug smuggling with traffic in illegal hardwoods and endangered species, and laundering money in land deals that devastate protected forests. The international drug control system must share the blame for this devastation. Forty years of dogged adherence to drug crop eradication and drug interdiction policies have been instrumental in hounding drug farmers and traffickers into increasingly fragile landscapes. Although these policies have arguably done little to stem the cultivation and traffic of illicit drugs, it has done much to amplify the environmental devastation and degradation that accompanies them. Moreover, prohibitionist drug control policies keep the price of drugs high, ensuring that those involved in their traffic make good profits-profits that are speculatively laundered in the transformation of bio-and agro-diverse landscapes into cattle ranches and oil palm plantations. New research-much of it using newly available real-time satellite imagery of forest loss-is bringing into sharp focus the devastating ecological costs of conventional drug policies, and how these can profoundly undermine international policies designed to protect forests, mitigate climate change, and promote rural development. The Impact of Drug Policy on the Environment explores the environmental costs of conventional drug policies using the latest science, and provides recommendations for governments to recognize this problem, review current strategies, and explore new approaches to lessen this collateral environmental damage.

Details: New York: Open Society Foundations, 2015. 20p.

Source: Internet Resource: Accessed March 31, 2016 at: https://www.opensocietyfoundations.org/reports/impact-drug-policy-environment

Year: 2015

Country: International

Keywords: Drug Control

Shelf Number: 20


Author: Csete, Joanne

Title: Detention and Punishment in the Name of Drug Treatment

Summary: In some countries, people who use, or are alleged to use, illicit drugs may be detained involuntarily after little or no legal process, ostensibly for the purpose of receiving drug "treatment" or "rehabilitation." These detentions are variously described as compulsory treatment centers, drug rehabilitation centers, detoxification centers, or centers for social education and labor. It is far from clear that all persons detained in this manner are drug-dependent or in need of treatment. If they are, there are international standards to guide treatment of drug-dependence, but drug detention centers often subject detainees to treatment methods that are scientifically unsound, punitive, cruel, inhuman, and degrading. In March 2012, 12 UN bodies-including the Joint United Nations Programme on HIV/AIDS (UNAIDS), WHO, the UN Office on Drugs and Crime (UNODC), the International Labour Organization, and the Office of the High Commissioner of Human Rights-jointly issued a call for the closure of compulsory drug detention centers and an expansion of voluntary, scientifically and medically appropriate forms of treating drug dependence in the health system. The 2012 joint UN statement on compulsory drug rehabilitation centers was a very important step, but a declaration from UN member states condemning these institutions and calling for their closure would advance the cause of ending the abuses they represent. Detention and Punishment in the Name of Drug Treatment highlights considerations that should be brought to bear in the 2016 United Nations General Assembly Special Session (UNGASS) on the world drug problem, toward the goal of ending arbitrary detention and grave human rights abuses in the name of drug treatment.

Details: New York: Open Society Foundations, 2016. 24p.

Source: Internet Resource: Accessed March 31, 2016 at: https://www.opensocietyfoundations.org/sites/default/files/detention-and-punishment-name-drug-treatment-20160315.pdf

Year: 2016

Country: International

Keywords: Drug Abuse Treatment

Shelf Number: 138514


Author: Buxton, Julia

Title: Drug Crop Production, Poverty, and Development

Summary: The cultivation of drug crops such as opium poppy, coca, and cannabis is a vital source of economic and physical security for poor, marginalized, and vulnerable communities in the Global South. International drug control strategies that have targeted cultivators with violent state coercion and eradication strategies have fueled displacement, ecological damage, and land poverty, while exacerbating existing problems of malnutrition and infectious disease. Such approaches have proved particularly counterproductive in conflict contexts, where an assumed nexus between drug revenues and the financing of terrorism and insurgency has undermined prospects for peace and stability. At its 20th session in 1998, the UNODC recognized that alternative development (AD) approaches could and should be used to reduce reliance on illicit cultivation by fostering livelihood opportunities in the formal economy. In the period since, AD has been rolled out in cultivation zones and evolved into more complex development interventions. However, rather than reducing global drug volumes, they have displaced cultivation into new areas and generated shifts in types of drug manufacture. In sum, they are doing more harm than good. Drawing together research from the AD experience of a diversity of countries and regions, Drug Crop Production, Poverty, and Development argues that AD programs cannot succeed in a broader context of the ongoing criminalization of cultivators and cultivation; UNODC use of inappropriate metrics; and poor AD program design, monitoring, and evaluation. AD programs continue to be chronically underfunded, poorly integrated into poverty reduction and development strategies and are usually conditional upon the prior eradication of crops. Effective responses to this supply side dynamic must recognize cultivation as a problem of development and security in complex and fragile environments, with new and evidence-based policies that acknowledge the role and value of these crops in distinct cultures and contexts.

Details: New York: Open Society Foundations, 2016. 20p.

Source: Internet Resource: Accessed March 31, 2016 at: https://www.opensocietyfoundations.org/reports/drug-crop-production-poverty-and-development

Year: 2016

Country: International

Keywords: Drug Control

Shelf Number: 138515


Author: Oosterhoff, Pauline

Title: Using Participatory Statistics to Examine the Impact of Interventions to Eradicate Slavery: Lessons from the Field

Summary: This CDI Practice Paper reflects on the use of participatory statistics to assess the impact of interventions to eradicate slavery and bonded labour. It deals with: (1) the challenges of estimating changes in the magnitude of various forms of slavery; (2) the potential of combining participatory approaches with statistical principles to generate robust data for assessing impact of slavery eradication; and (3) the practical and ethical questions in relation to working with people living within a context of modern slavery. The paper draws lessons from the realities of using participatory statistics to support the evaluation of a slavery eradication programme in North India.

Details: Brighton, UK: Institute of Develoipment Studies, Centre for Development Impact, 2016. 8p.

Source: Internet Resource: Practice Paper no. 16: Accessed April 1, 2016 at: http://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/9582/CDIPracticePaper_16.pdf?sequence=5

Year: 2016

Country: International

Keywords: Bonded Labor

Shelf Number: 138519


Author: Benotman, Noman

Title: The Children of Islamic State

Summary: The future of children born and raised in Islamic State is a pertinent and pressing problem, requiring the immediate attention of the international community. There are currently 31,000 pregnant women within the 'caliphate'. As many as 50 children from the United Kingdom are growing up on jihad in Islamic State, and no prior research examines what will happen to them if they choose to return. This report attempts to fill this gap by addressing the reintegration, re-education, and rehabilitation challenges of returning or escaping children. Over the last six months, Quilliam researchers have archived, translated, and analysed propaganda released by Islamic State featuring children. This is the first database of its kind, and reveals the following: - The largest amount of Islamic State media featuring children relates to violence, comprising either of children directly participating in violence, or being exposed and normalised to violence. - Islamic State's wilayats in Iraq have released the most images showing children and teens in combat and acting as suicide bombers. - In the last six months, Islamic State propaganda depicts 12 child executioners, and one child participating in a public execution. The report highlights the following exclusive findings which pertain to the recruitment and training of child soldiers in the Islamic State: - Direct coercion into joining Islamic State generally occurs through abductions. However, Islamic State also engages in more indirect, systemic coercion where people, specifically children, are pressured to join the group out of fear. - Children can not only assist in meeting the present needs of the 'caliphate', but can continue to propagate its existence and expansion once they grow up, thus securing the long-term survival of the 'caliphate'. - The current generation of fighters sees children as better and more lethal fighters than themselves. Rather than being converted into radical ideologies, children have been indoctrinated into extreme values from birth or at a young age. - Schools and the education system are central to shaping the hearts and minds of the next generation. The indoctrination that begins in schools intensifies in training camps, where children between the ages of 10 and 15 are instructed in shari'a, desensitised to violence, and are taught specific skills to best serve the state and take up the banner of jihad. - Boys learn a rigid Islamic State curriculum, where drawing, philosophy and social studies, the 'methodology of atheism', have been removed. Instead, children churn out memorised verses of the Qur'an and attend 'Jihadi Training', which includes shooting, weaponry and martial arts. Girls, also known as the 'pearls of the caliphate', are veiled, hidden, confined to the home, and taught to look after husbands. - The prolonged exposure and desensitisation to violence that children experience affects their physical and psychological well-being, both in the short term and in the long term. Looking to the future, it is inevitable that these children will suffer from severe physical and mental trauma, as well as systematic extremist indoctrination. By coupling in-depth fieldwork with extensive research, Quilliam was able to discern not only what life for children within Islamic State is like, but the extent of the challenge of re-integration to come. Based on our findings, the report proposes a thorough assessment process for children who return or escape from Islamic State. This procedure evaluates the extent of radicalisation of the child, their degree of agency in joining Islamic State, the trauma and abuse they have suffered, and the immediate and long-term needs for ensuring effective Disarmament, Demobilisation, Reintegration, and Rehabilitation DDR(R). The recommendations detail a multi-structural support network for monitoring a child's progress.

Details: London: Quilliam, 2016. 100p.

Source: Internet Resource: Accessed April 5, 2016 at: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/the-children-of-islamic-state.pdf

Year: 2016

Country: International

Keywords: Caliphate

Shelf Number: 147741


Author: Veldhuis, Tinka M.

Title: Thinking before Leaping: The Need for More and Structural Data Analysis in Detention and Rehabilitation of Extremist Offenders

Summary: In this ICCT Research Paper, Tinka M. Veldhuis and Eelco J.A.M. Kessels argue that our current understanding of detention and rehabilitation of extremist offenders is sub-optimal, and highlight several key questions that require answering before policy interventions can be truly optimised. The authors suggest that increased and structural data analysis is essential to produce evidence-based policies that are tailored to the problem and geared to an effective solution.

Details: The Hague: International Centre for Counter-Terrorism, 2013. 14p.

Source: Internet Resource: ICCD Research Paper, 2013: Accessed April 5, 2016 at: http://www.icct.nl/download/file/Veldhuis-Kessels-Thinking-before-Leaping-February-2013.pdf

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138568


Author: Rolles, Steve

Title: The Alternative World Drug Report. 2nd edition

Summary: In April, the world will come together at the UN to discuss the future of international drug policy. It will be the first time that far-reaching drug policy reforms are meaningfully discussed at such a high level. The current enforcement-based, UN-led drug control system is coming under unparalleled scrutiny over its failure to deliver a promised "drug-free world", and for what the UN Office on Drugs and Crime (UNODC) describes as its negative "unintended consequences". It is unacceptable that despite acknowledging these negative impacts, the UNODC does not include them in its annual World Drug Report, and neither the UN nor its member states have meaningfully assessed whether these unintended consequences outweigh the intended consequences. The second edition of the Alternative World Drug Report fills this gap by detailing the full range of negative impacts caused by the drug war. It demonstrates that the current approach is creating crime, harming health, and fatally undermining all "three pillars" of the UN's work - peace and security, development, and human rights. The stark failure of the current system has meant that alternative drug policy approaches are a growing reality. This report therefore explores a range of options for reform, including decriminalisation and legal regulation, that could deliver better outcomes,. The global prohibitionist consensus has broken, and cannot be fixed. This Alternative World Drug Report is intended to help policymakers shape what succeeds it

Details: London: Transform Drug Policy Foundation, 2016. 192p.

Source: Internet Resource: Accessed April 6, 2016 at: http://www.countthecosts.org/sites/default/files/AWDR-2nd-edition.pdf

Year: 2016

Country: International

Keywords: Costs of Crime

Shelf Number: 138575


Author: Krieger, Tim

Title: Does Income Inequality Lead to Terrorism?

Summary: We analyze the effect of income inequality on terrorism for a sample of 114 countries between 1985 and 2012. We provide evidence, robust to various methodological changes (e.g., different dependent variables, instrumental-variable approaches), that higher levels of income inequality are associated with more terrorism. Consistent with relative deprivation theory, we argue that this effect is a direct consequence of frustration over the distribution of income within a society, resulting in terrorism to voice dissent and achieve a redistribution of wealth. Furthermore, we provide evidence of an indirect effect of inequality on terrorism, where inequality may also contribute to terrorism by leading to weaker institutions. Finally, we show that redistributional efforts can be effective in reducing inequality and, consequently, terrorist activity.

Details: Munich: Center for Economic Studies & Ifo Institute, 2016. 36p.

Source: Internet Resource: CESifo Working Paper No. 5821: Accessed April 6, 2016 at: http://www.cesifo-group.de/ifoHome/publications/working-papers/CESifoWP/CESifoWPdetails?wp_id=19199450

Year: 2016

Country: International

Keywords: Economics and Crime

Shelf Number: 138581


Author: Schuurman, Bart

Title: Moving Terrorism Research Forward: The Crucial Role of Primary Sources

Summary: This background note focuses on the causes and consequences of the scarcity of primary source-based research on (counter-)terrorism and reviews a trend towards the greater use of such data. It discusses the implications of the overreliance on secondary sources of data in the field of terrorism studies, highlights some interesting recent developments which show how this problem is being addressed and reflects upon the causes of this issue. Why have relatively few authors used such data? What obstacles can be identified and how might they be overcome? This background note consists of three sections. The first outlines the problem. How has the scarcity of primary sources affected the development of terrorism studies as an academic field of inquiry? The second discusses some of the causes of this problem; what makes it so difficult to obtain primary sources? It concludes with a critical discussion of some of the advantages and disadvantages involved in using such sources. The third and final part of this paper discusses the current trend towards the greater use of first hand data. It showcases several recent projects from across the globe that have used primary sources to deepen our understanding of terrorism and related forms of political violence.

Details: The Hague: International Centre for Counter-Terrorism, 2013. 13p.

Source: Internet Resource: ICCT Background Note: Accessed April 6, 2016 at: http://www.icct.nl/download/file/Schuurman-and-Eijkman-Moving-Terrorism-Research-Forward-June-2013.pdf

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138582


Author: Hofmann, David

Title: Warriors and Prophets: The Role of Charismatic Authority in the Radicalization Towards Violence and Strategic Operation of Terrorist Groups

Summary: In the past four decades, there has been increased multi-disciplinary scholarly interest in the study of charismatic authority and charismatic leadership. However, there is little systematic theoretical and empirical examination of charismatic authority and charismatic leadership in the context of terrorism, despite widespread acknowledgement of the importance of charismatic leaders in the formation, operation, and demise of terrorist groups. This dissertation seeks to re-orient and stimulate future scholarship through an in-depth theoretical and empirical analysis of the relationship between charismatic authority, the radicalization towards violence, and strategic operation of terrorist groups. The introductory chapter grounds the subsequent research by providing working definitions of core concepts, reviewing the current literature on terrorist leadership, discussing methods to improve future analyses of terrorist leadership, before ending with a brief consideration of methods, data, and research questions. Chapter 2 is a critical examination of how the current terrorism literature misuses the social-scientific concepts of charisma and charismatic authority. After examining where and how the literature has fallen short, it provides a synthesis of the available multi-disciplinary social-scientific research on charismatic authority, identifies the three common ways in which the concept of charisma is commonly misused in terrorism studies, and explores several challenges and opportunities for future research. Building upon this foundational analysis, chapter 3 contributes to future research by presenting and justifying a theoretical framework for measuring the presence of charismatic authority in terrorist groups based upon Max Weber's seminal work on legitimate domination (herrschaft) and on theoretical insights drawn from the study of charismatic leadership in new religious movements. This framework is then applied to an illustrative case study of the relationship between the presence of charismatic authority and the radicalization towards violence within the far-right terrorist group 'The Covenant, the Sword, and the Arm of the Lord'. Chapter 4 applies the same theoretical framework to a quantitative analysis of the relationship between varying levels of the presence of charismatic authority, choice in operational tactics (e.g., weapon and target choices), and results of attack outcomes (e.g., success rates, lethality) within a sample of thirty international terrorist groups. The concluding chapter provides a synthetic summary of the findings, discusses the contributions of the dissertation to the literature, makes several policy-relevant suggestions, considers study limitations, and outlines avenues for future research.

Details: Waterloo, ONT: University of Waterloo, 2015. 184p.

Source: Internet Resource: Dissertation: Accessed April 6, 2016 at: https://uwspace.uwaterloo.ca/bitstream/handle/10012/9651/Hofmann_David.pdf?sequence=1&isAllowed=y

Year: 2015

Country: International

Keywords: Extremist Groups

Shelf Number: 138583


Author: Amin, Mohammad

Title: Absent laws and missing women: can domestic violence legislation reduce female mortality ?

Summary: This study contributes to the literature on legal institutions and determinants of adult mortality. The paper explores the relationship between the presence of domestic violence legislation and women-to-men adult mortality rates. Using panel data for about 95 economies between 1990 and 2012, the analysis finds that having domestic violence legislation leads to lower women-to-men adult mortality rates. According to conservative estimations, domestic violence legislation would have saved about 33 million women between 1990 and 2012. The negative relationship between domestic violence legislation and women-to-men adult mortality rates is robust to several checks and also confirmed using the instrumental variables approach.

Details: Washington, DC: The World Bank, 2016. 37p.

Source: Internet Resource: Policy Research Working Paper no. WPS7622: Accessed April 6, 2016 at: http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2016/04/05/090224b084264e7b/1_0/Rendered/PDF/Absent0laws0an0e0female0mortality00.pdf

Year: 2016

Country: International

Keywords: Domestic Violence

Shelf Number: 138584


Author: Gartenstein-Ross, Daveed

Title: The Islamic State's Global Propaganda Strategy

Summary: This Research Paper aims to analyse in depth the global propaganda strategy of the so-called "Islamic State" (IS) by looking at the methods through which this grand strategy is carried out as well as the objectives that IS wants to achieve through it. The authors first discuss IS' growth model, explaining why global expansion and recruitment of foreign fighters are pivotal to IS success. Having in mind this critical role, the authors then explore the narratives and themes used by the group to mobilise foreign fighters and jihadists groups. Third, the paper analyses how IS deploys its narratives in those territories where it has established a foothold. Fourth, it outlines IS' direct engagement strategy and how it is used to facilitate allegiance of other jihadist groups. The final section of the paper offers a menu of policy options that stakeholders can implement to counter IS' global propaganda efforts.

Details: The Hague: International Centre for Counter-Terrorism, 2016. 84p.

Source: Internet Resource: Accessed April 6, 2016 at: http://icct.nl/wp-content/uploads/2016/03/ICCT-Gartenstein-Ross-IS-Global-Propaganda-Strategy-March2016.pdf

Year: 2016

Country: International

Keywords: Islamic State

Shelf Number: 138589


Author: Wilson, David B.

Title: Juvenile Curfew Effects on Criminal Behavior and Victimization: A Systematic Review

Summary: The evidence suggests that juvenile curfews do not reduce crime or victimization. What is this review about? Curfews restrict youth below a certain - usually 17 or 18 - from public places during nighttime. For example, the Prince George's County, Maryland, curfew ordinance restricts youth younger than 17 from public places between 10 P.M. and 5 A.M. on weekdays and between midnight and 5 A.M. on weekends. Sanctions range from a fine that increases with each offense, community service, and restrictions on a youth's driver's license. Close to three quarters of US cities have curfews, which are also used in Iceland. A juvenile curfew has common sense appeal: keep youth at home during the late night and early morning hours and you will prevent them from committing a crime or being a victim of a crime. In addition, the potential for fines or other sanctions deter youth from being out in a public place during curfew hours. Juvenile curfews have received numerous legal challenges. The constitutional basis for infringing the rights of youth rests on the assumption that they reduce juvenile crime and victimization. This review synthesizes the evidence on the effectiveness of juvenile curfews in reducing criminal behavior and victimization among youth. What are the main findings of this review? What studies are included? Included studies test the effect of an official state or local policy intended to restrict or otherwise penalize a juvenile's presence outside the home during certain times of day. This must have been a general preventive measure directed at all youth within a certain age range and not a sanction imposed on a specific youth. Twelve quantitative evaluations of the effects of curfews on youth criminal behavior or victimization are included in the review. Do curfews reduce crime and victimization? The pattern of evidence suggests that juvenile curfews are ineffective at reducing crime and victimization. The average effect on juvenile crime during curfew hours was slightly positive - that is a slight increase in crime - and close to zero for crime during all hours. Both effects were not significant. Similarly, juvenile victimization also appeared unaffected by the imposition of a curfew ordinance. However, all the studies in the review suffer from some limitations that make it difficult to draw firm conclusions. Nonetheless, the lack of any credible evidence in their favour suggests that any effect is likely to be small at best and that curfews are unlikely to be a meaningful solution to juvenile crime and disorder. Other studies have suggested curfews may be ineffective as juvenile crime is concentrated in hours before and after school, and that under-resourced police forces focus on more urgent demands than enforcing curfews. What do the results mean? Contrary to popular belief, the evidence suggests that juvenile curfews do not produce the expected benefits. The study designs used in this research make it difficult to draw clear conclusions, so more research is needed to replicate the findings. However, many of the biases likely to occur in existing studies would make it more, rather than less, likely that we would conclude curfews are effective. For example, most of these studies were conducted during a time when crime was dropping throughout the United States. Therefore, our findings suggest that either curfews don't have any effect on crime, or the effect is too small to be identified in the research available.

Details: Oslo: Campbell Collaboration, 2016. 101p.

Source: Internet Resource: Campbell Systematic Review 2016:03: Accessed April 7, 2016 at: http://www.campbellcollaboration.org/lib/?go=browse_issues&year=2016

Year: 2016

Country: International

Keywords: Delinquency Prevention

Shelf Number: 138595


Author: Fink, Naureen Chowdhury

Title: A Man's World? Exploring the Roles of Women in Countering Terrorism and Violent Extremism

Summary: In recent years, the role of women in preventing and countering violent extremism (P/CVE) has gained momentum in the international counterterrorism policy discourse. Several questions emerge when discussing the particulars of why and how women partake in both violent extremism and P/CVE efforts. For example, what are the different roles that women can undertake in a terrorist organization? Are females recruited differently than their male counterparts? What roles do they play in inciting or persuading others to join violent extremist groups? Is there a particular role for women in countering terrorism and P/CVE? Are specific policies aimed at women a necessity moving forward? How can a gender analysis be effectively integrated into P/CVE policy and programming? The collection of essays contained in this edited volume by the Global Center and Hedayah seeks to build the body of literature on women and P/CVE by drawing on examples from a number of countries and regions. The essays contain both policy-level recommendations as well as programmatic-level recommendations, and seek to answer some of the outstanding questions regarding the types of roles women might play in P/CVE efforts.

Details: London: Global Center on Cooperative Security, 2016. 100p.

Source: Internet Resource: Accessed April 7, 2016 at: http://www.globalcenter.org/wp-content/uploads/2016/04/AMansWorld_FULL.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138596


Author: Kroll

Title: Global Fraud Report: Vulnerabilities on the Rise. Annual Edition 2015/16

Summary: 768 senior executives from a broad range of industries worldwide were polled this year-and the results yielded some surprising insights. The overall picture is that fraud has continued to increase, leaving businesses feeling more vulnerable and at risk than ever before.

Details: New York: Kroll, Inc., 2015. 85p.

Source: Internet Resource: Accessed April 7, 2016 at: http://www.kroll.com/global-fraud-report

Year: 2015

Country: International

Keywords: Consumer Fraud

Shelf Number: 138599


Author: Verite

Title: An Exploratory Study on the Role of Corruption in International Labor Migration

Summary: In the 2013 white paper, "Corruption and Labor Trafficking in Global Supply Chains," Verite detailed how fraud, corruption, bribery, and other illegal practices are common features of the international recruitment of migrant workers. The myriad official approvals, documents, and associated fees - foreign worker quotas, job order attestations, exit and guest worker visas, medical certifications, police clearances, work permits etc. - required to deploy a migrant worker from one country to another mean the opportunities and incentives for employers and their recruitment agents to bribe civil servants have become a structural feature of the international labor migration process. Since recruitment agents and employers ultimately transfer most, if not all, of the upfront costs of employment to foreign migrant workers, both of these forms of recruitment-related corruption directly contribute to the excessive and illegal fee burdens frequently faced by migrant workers. In this way corruption is a significant contributing element to migrant worker vulnerability to debt bondage, human trafficking, and forced labor. Further, Verite and others have pointed out that the corrupt activities all too common in migrant worker recruitment also create potential legal risk for companies under origin and destination country laws as well as extraterritorial anti-corruption statutes such as the US Foreign Corrupt Practices Act (FCPA) and the UK Bribery Act (UKBA). Because multinationals can be liable for the acts of their foreign subsidiaries, franchisees, joint venture entities, and even suppliers that use third party employment agencies under a number of legal theories including traditional agency principles, the risk arises where corrupt payments result in a direct or indirect benefit to an employer - an improper advantage - through cheap migrant labor or the avoidance of the upfront costs of employment. Ironically, these many procedures and requirements that are so vulnerable to corruption were often put in place to protect workers and ensure regular process in the highly complex governance of international migration. The governments' responsibilities to protect the labor and human rights for migrants and to regulate a growing, dynamic private recruitment sector are not in question. Nor is the fact that legitimate private labor recruiters can play an important role in connecting workers with much-needed jobs; indeed, good recruiters are seeking to reform and reinvent the system. There is a flurry of efforts underway by governments, unions, civil society organizations, recruiters, employers, and international institutions like the ILO and IOM to reform the systems in place. Yet, even as reform efforts proceed apace, as this report outlines, "pay-to-play" kickback commissions and other corruption payments are all too common in the migration process; understanding the nature and extent of those payments is vital to reforming the process. Indeed, the lack of deep knowledge of the role of corruption in the process is a very real threat to the success of reform efforts. With new policies and procedures being proposed or enacted every month in countries around the world, it is vital that deeper understanding is achieved of the nature and extent of corruption. Corruption occurs for many reasons and eliminating controls and processes because corruption is attached to them is by no means the proper approach. Reform efforts themselves will generate unintended consequences in terms of corruption risk and new costs and threats to migrants. Hence, much humility and patience are called for as a wide range of institutions globally promote new models to protect workers.

Details: Amherst, MA: Verite, 2016. 32p.

Source: Internet Resource: Accessed April 8, 2016 at: https://www.verite.org/sites/default/files/images/Verite-Report-Intl-Labour-Recruitment_0.pdf

Year: 2016

Country: International

Keywords: Bribery

Shelf Number: 138606


Author: Katsarova, Ivana

Title: Match-fixing: Issues and policy responses

Summary: As sport has grown increasingly popular worldwide, it has become a greater target for individuals and groups of people wishing to take advantage of its lucrative aspects. A conservative Interpol estimate for the period 1 June 2012 to 31 May 2013 indicates that match-fixing - i.e. the manipulation of results of sporting contests, or elements within a game - has been reported in over 70 countries across six continents, for football alone. Globalisation has further aggravated the phenomenon, with transnational criminal organisations taking advantage of changes in regulations, and flaws in legal and judicial systems. Various sports have been affected by match-fixing, even though most cases occur in cricket, football, and tennis. Contests are not always rigged by individual players or referees; some cases involve coaches, club managers, and more unexpectedly, maintenance staff. Match-fixing is often linked to gambling, with criminal networks exploiting unregulated gambling markets, notably in Asia. In the EU, the Framework Decisions on combatting corruption and the fight against organised crime underpin the operational work carried out by Europol and Eurojust. However, their provisions are still insufficiently well enacted by EU countries. The impact of international legal instruments, such as the United Nations and Council of Europe conventions, is also limited, since their provisions are not mandatory. In this context, the International Olympic Committee, due to its political, social and sporting authority, appears as a key factor in the continuing fight against manipulation in sport.

Details: Strasbourg: European Parliamentary Research Service, 2016. 10p.

Source: Internet Resource: Briefing: Accessed April 8, 2016 at: http://www.europarl.europa.eu/RegData/etudes/BRIE/2016/580891/EPRS_BRI(2016)580891_EN.pdf at:

Year: 2016

Country: International

Keywords: Corruption

Shelf Number: 138607


Author: Financial Action Task Force

Title: Money Laundering through the Football Sector

Summary: 1. Criminals have shown adaptability in finding new channels to launder the proceeds of their illegal activities and sports is one of the many sectors that are at risk of being inflicted with criminal money. 2. With the growing economic importance of sports during the last two decades, especially football, money gradually started to exert a strong influence on the world of sports. This influx of money has positive effects, but also negative consequences. 3. In order to get a better understanding, this study identifies vulnerabilities which make the football sector attractive to criminals. These are mainly related to the structure, the financing and the culture of this sector. 4. The study analyses several cases that illustrate the use of the football sector as a vehicle for laundering the proceeds of criminal activities. After this analysis, money laundering (ML) through the football sector is revealed to be deeper and more complex than previously understood. Indeed, this analysis appears to show that there is more than anecdotal evidence indicating that a variety of money flows and / or financial transactions may increase the risk of ML through football. These are related to the ownership of football clubs or players, the transfer market, betting activities, image rights and sponsorship or advertising arrangements. Other cases show that the football sector is also used as a vehicle for perpetrating various other criminal activities such as trafficking in human beings, corruption, drugs trafficking (doping) and tax offences. 5. The ML techniques used vary from basic to complex techniques, including the use of cash, cross border transfers, tax havens, front companies, non-financial professionals and PEPs. 6. In many cases, connections with other well-known ML typologies were identified such as trade-based ML, the use of non-financial professionals and NPOs for ML purposes, ML through the security sector, the real estate sector and the gaming sector. 7. Various initiatives are taken by international and national actors in order to combat threats to the integrity of football, including ML. Looking ahead, there appear to be a number of areas that could be considered to improve the capacity to cope with the ML risks associated with the football sector.

Details: Paris: Financial Action Task Force, 2009. 41p.

Source: Internet Resource: Accessed April 8, 2016 at: http://www.fatf-gafi.org/media/fatf/documents/reports/ML%20through%20the%20Football%20Sector.pdf

Year: 2009

Country: International

Keywords: Financial Crimes

Shelf Number: 135797


Author: Koehler, Daniel

Title: Violent Radicalization Revisited: A Practice-Oriented Model

Summary: In the two years following the July 2005 attacks in London the term 'radicalization' entered the mainstream lexicon. Rarely used at all before 9/11, the term is now widely used to describe a process of individual evolution towards adopting certain ideas and sometimes the use of violence and terrorist tactics to achieve political goals. To what extent the use of violence is a necessary component of radicalization is highly debated among scholars and policy makers, which is why the differentiation between "violent" and "non-violent" radicalization has become common. In general, radicalization describes cognitive and behavioural components that may lead to a destructive or violent outcome. But only rarely have the mechanisms behind radicalization been described in a step by step process. As a result, practitioners and policy-makers generally lack a coherent understanding of what exactly happens during radicalization processes and why they can be so dangerous to societies. Indeed, it is not enough to say that "violent radicalization" is the process that turns individuals into terrorists or extremists. Instead, violent radicalization must be understood more precisely: as a process of 'de-pluralization' within an ideological framework that is incompatible with mainstream political culture and ideology.

Details: Zurich: International Relations and Security Network (ISN), 2016. 3p.

Source: Internet Resource: Accessed April 8, 2016 at: http://www.isn.ethz.ch/Digital-Library/Articles/Detail/?ots591=4888caa0-b3db-1461-98b9-e20e7b9c13d4&lng=en&id=191575

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 138609


Author: Kavanagh, Jennifer E.

Title: The Dynamics of Protracted Terror Campaigns: Domestic Politics, Terrorist Violence, and Counterterror Responses.

Summary: Existing literature does not explain why protracted terror-counterterror conflicts are sometimes characterized by escalating, tit-for-tat retaliation, but exhibit little responsive violence at other points. I argue that the expectations of local constituents and local political dynamics are primary determinants of conflict escalation and de-escalation. State and non-state constituents form expectations about the efficacy of violent and political approaches to a protracted conflict through Retrospective Projection, which combines evaluations of the past, present, and future. Demands for violence are most likely when the expected benefits of a military (militant)-based strategy exceed confidence in existing political alternatives. Demands for retaliation by local publics create incentives for state and non-state actors to use violence as a tool of Constituent Service. I evaluate the argument with extended case studies of Northern Ireland's 'Troubles' and the Second Intifada, supplemented by four qualitative cases: Sri Lanka, Chechnya, Iraq, and Pakistan. The extended case studies combine qualitative discussion and quantitative analysis using vector autoregression (VAR) to empirically describe dynamic associations between violence and political attitudes. Consistent with the argument, constituent expectations about the efficacy of violent and political alternatives influence the timing of demands for retaliation, and demands for violence determine the timing and form of armed retaliation by state and non-state actors. Demands for violence occur where military-based strategies appear more effective than political alternatives, prior to 2002 in the Second Intifada and in the 1970s during the 'Troubles,' and retaliatory violence is most likely in these same periods. Military failures and political alternatives that weaken constituent support for violence encourage de-escalation. Effective counterterror policies are those that shift the balance between expected military efficacy and political optimism, constraining violence by reducing demands for violence. There is a place for military-based counterterrorism, but the case studies underscore the benefits of strategies that encourage confidence in political alternatives. Law-enforcement counterterrorism and influence operations appear especially valuable because they erode support for violence and shape attitudes towards political compromise at the local level. Local political dynamics and constituent expectations must inform counterterror policy applied in regional protracted terror conflicts and used against transnational terrorist threats

Details: Ann Arbor, MI: University of Michigan, 2011. 430p.

Source: Internet Resource: Dissertation: Accessed April 11, 2015 at: https://deepblue.lib.umich.edu/handle/2027.42/84524

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138622


Author: Grote, Ulrike

Title: Rural Crime in Developing Countries: Theoretical Framework, Empirical Findings, Research Needs

Summary: Anecdotal evidence and selected information from the International Crime Victims Survey suggest that crime is higher in developing countries than in developed countries and that there are regionally big differences. Explanations and solutions to the persistence and prevalence of rural crime in many developing countries are needed as rural crime undermines sustainable development to a large extent and may even affect social cohesiveness in rural communities. This discussion paper therefore calls for research which helps to shed light on this phenomenon in support of improved policies. For this, representative and good-quality data is needed. It is suggested to disentangle the complex research topic and allow for a more systematic approach by focusing on a certain type of crime. Research on most of these types is very selective and scarce. As mentioned, data is almost nonexistent and evidence on individual types is largely missing. The routine activity approach is suggested as a conceptual framework for further analysis. The paper concludes that research and policy design should focus on how to reduce opportunities to commit a crime in rural areas in developing countries in order to reduce environmental and social costs of crime, promote sustainable development and improve rural livelihoods of the often deprived and poor in rural areas in developing countries.

Details: Bonn, Germany: University of Bonn - Center for Development Research (ZEF); 2016. 42p.

Source: Internet Resource: Working Paper 148: Accessed April 11, 2016 at: http://www.zef.de/uploads/tx_zefnews/zef_wp_148.pdf

Year: 2016

Country: International

Keywords: Developing Countries

Shelf Number: 138633


Author: Dobson, Rebecca

Title: From a Whisper to a Shout: A Call to End Violence Against Children in Alternative Care

Summary: The UN Convention on the Rights of the Child (UNCRC) recognises children as the subjects of rights, as well as their vulnerability and need for "special safeguards and care". Marking its 25th anniversary this year, the UNCRC is notably one of the most ratified UN conventions in history and has done much to progress the rights of children globally. And yet, in our global society with international conventions endorsing the "rights" of all, some of our most vulnerable children continue to suffer from extreme forms of violence and abuse. This report demonstrates that even when children are presumed to be in the care of society itself they are vulnerable to and at risk of violence. The UN Committee on the Rights of the Child has identified "children not living with their biological parents, but in various forms of alternative care" as one of the groups of children who are "likely to be exposed to violence". Without the fundamental protection of a caring family, these children are vulnerable to abuse and neglect. Without "suitable" quality care, they risk violence at the hands of their caregivers, families, peers and the wider community. In 2009, the UN endorsed the Guidelines for the Alternative Care of Children (the Guidelines). These set out "desirable orientations for policy and practice" to "enhance" the implementation of the UNCRC for children in alternative care. The Guidelines reiterate the right of "Every child and young person [to] live in a supportive, protective and caring environment that promotes his/her full potential". This report draws on evidence from an extensive global literature review, and assessments of the implementation of the Guidelines in 21 countries around the world. It makes bold claims about high levels of vulnerability and risk of violence facing children in alternative care, but concludes that violence is not inevitable, and with an emphasis on providing quality care it is possible to mitigate the risks of harm for all children.

Details: Innsbruck,Austria: SOS Children's Villages International; Luton, UK: University of Bedfordshire, 2014. 72p.

Source: Internet Resource: Accessed April 13, 2016 at: http://www.sos-childrensvillages.org/getmedia/345ec018-7dd1-4ad1-a387-48fdabfb7297/From-a-whisper-to-a-shout-A4-EN-WEB-final.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 138643


Author: Boniface, Pascal

Title: Sports betting and corruption: How to preserve the integrity of the sport

Summary: 2011 was a year of unprecedented mobilisation in the world of sport to defend the integrity of sport in the face of the growing threat presented by criminal organisations that manipulate matches to enrich themselves and launder dirty money through online sports betting systems. The International Olympic Committee (IOC) established itself as the spearhead of the movement at its extraordinary summit on combating corruption in sport, which was held on 1 March 2011. Two months later, FIFA promised to allocate €20 million to help combat rigged matches, particularly by creating a cooperative structure with Interpol in Singapore. UEFA and the leading sports federations also opted for proactive measures to distance sport from the risk of corruption. This general awareness comes amidst scandals, frauds, rumours and judicial investigations relating to a wide range of disciplines in many countries. The apparent increase in cases of fraud in sport, in particular those connected with betting activities, is threatening the very essence of sport. The glorious uncertainty of sport and the honesty and upright image of athletes are popular and motivational values that risk being undermined unless serious measures are taken to bring corruption to an end. In the long term, as has been seen in some Asian and Eastern European countries, sport will die if the public and sports authorities do not take action to combat fraud. By removing the "the glorious uncertainty if sport", corruption can end up killing a discipline: the public loses interest in rigged competitions, sponsors refuse to associate their image with those competitions, the media turns its back and clubs die through lack of resources. The South East Asia championships were particularly popular in the 1990s before widespread corruption and match rigging ended up emptying stadiums and chasing investors away. In April 2011, the Chinese professional championship opened amidst a serious internal crisis because a new case of corruption had led to the imprisonment of several executives of the federation, with the result that the main sponsor and the TV broadcaster refused to renew their contracts with the league, and the first matches took place in virtual obscurity. A similar thing occurred in the Balkans. The risk of modern sport falling into decay in the face of repeated scandals is genuine and must not be underestimated. The increasingly frequent presence of transnational criminal organisations in instances of corruption in sport is a major concern. Over the past two decades, these transnational criminal organisations have moved from regional, strongly family-oriented establishments to international organisations, diversified in their legal and illegal activities, and modes of operating. They have taken advantage of changes in regulations, flaws in legal and judicial systems, the opening-up of borders and the growth of free trade, all direct consequences of globalisation. They have adapted without any great difficulty to changes in political regimes, to dictatorships and democracies, without ever going under - quite the contrary, in fact, which is both unusual and particularly concerning, specifically from a strategic point of view.

Details: Paris: French Institute for International and Strategic Affairs (IRIS), 2011. 94p.

Source: Internet Resource: Accessed April 13, 2016 at: http://www.spordiinfo.ee/est/g22s355

Year: 2011

Country: International

Keywords: Corruption and Fraud

Shelf Number: 138653


Author: Pratley, Elaine Mei Lien

Title: 'Youth': victim, troublemaker or peacebuilder? Constructions of Youth-in-Conflict in United Nations and World Bank Youth Policies

Summary: Examination of how the United Nations ('UN') and World Bank construct youth affected by armed conflict and political instability (referred to as 'youth-in-conflict') in their respective youth policies reveals that the UN constructs youth-in-conflict as 'victims' requiring protection. This results in humanitarian/rights-based approaches to youth development. In contrast, the World Bank constructs youth-in-conflict as 'capital' that has potential to bring about economic growth, resulting in economics-driven policies. Such divergent identity constructions are because 'youth' and 'youth identity' are fluid concepts used in various ways by different people in different contexts. In peace and conflict studies, the dominant discourses in relation to youth-in-conflict are that youth are either 'victims' of war or 'troublemakers'. Both discourses are contested by an emerging third discourse of youth as peacebuilders, which challenges the representation of youth-in-conflict as passive victims or as negative threats. While the UN and World Bank’s respective humanitarian/development and neo-liberal economic approaches shape these divergent youth-in-conflict constructions, both institutions are also influenced by the global trends in youth-in-conflict discourses. This 'discursive' relationship means that as the UN and World Bank engage in the global youth debate and are shaped by more complete understandings of youth-in-conflict, they will also have an influential role in perpetuating or challenging dominant discourses.

Details: Wellington, NZ: Victoria University of Wellington, 2011.

Source: Internet Resource: Thesis: Accessed April 13, 2016 at: http://researcharchive.vuw.ac.nz/xmlui/handle/10063/1847

Year: 2011

Country: International

Keywords: At-risk Youth

Shelf Number: 138659


Author: Lessing, Benjamin

Title: Counterproductive Punishment: How Prison Gangs Undermine State Authority

Summary: States' efforts to provide law and order can be counterproductive: mass incarceration policies, while incapacitating and deterring individual criminals, can simultaneously strengthen collective criminal networks. Prison gangs, by promising rewards and punishments inside prison to those who anticipate incarceration, can control criminal activity on the street. A formal model reveals that common crime-reduction policies, by making incarceration more likely and sentences harsher, can increase prison gangs' power over street-level actors. Leading cases from across the Americas corroborate these predictions: periods of sharply rising incarceration, partly driven by anti-gang laws, preceded qualitative leaps in prison-gang projection of power onto the street. Prison gangs use their capacity to project power not only for criminal governance, but to orchestrate violence - or intentionally curtail it - providing them critical leverage over the state. Thus, even if increased incarceration reduces crime rates, it may do so by strengthening prison-gang power at the expense of state authority.

Details: Unpublished paper, 2015. 54p.

Source: Internet Resource: Accessed April 14, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2644812

Year: 2015

Country: International

Keywords: Inmates

Shelf Number: 138672


Author: Whitman, Shelly

Title: Understanding the Recruitment and Use of Child Soldiers as an Early Warning Indicator

Summary: Despite attempts to define early warning, a precise and comprehensive definition of what constitutes early warning is still elusive. The international community has made steps towards adopting a strategy of early warning to prevent and disrupt the outbreak of mass atrocities and violent conflict, yet it still reacts to conflict already underway. It is possible that our failure to prevent and react to conflicts is directly correlated to our failure to protect children and prevent their deliberate use and abuse in armed conflict. How can we find solutions to prevent deadly conflict and mass atrocities through improvement of our approaches to prevent the use of children as soldiers

Details: Halifax, NS: Dalhousie University, the Romeo Dallaire Child Soldiers Initiative, 2015. 32p.

Source: Internet Resource: Accessed April 14, 2016 at: http://www.childsoldiers.org/wp-content/uploads/2015/06/Early_Warning_Web_Final.pdf

Year: 2015

Country: International

Keywords: Child Protection

Shelf Number: 138676


Author: Conradi, Carl

Title: Children in Marine Piracy: Our Work in 2013

Summary: In early 2012, the Dalhousie Marine Piracy Project (DMPP) launched a broad, three-part study to explore the causes and consequences of contemporary maritime piracy. The purpose of the investigation was to identify and develop heretofore unconsidered strategies for combating piracy around the world. The socio-economic component of this survey was drafted by Dr. Shelly Whitman, Executive Director of the Dallaire Initiative. Once collated, the DMPP’s research was then validated in July 2012, at a global, three-day conference that drew together a diverse spectrum of maritime practitioners and experts. All attendant participants affirmed that piracy continues to cost the international community billions of dollars every year, despite heavy preventative investments by the security and shipping industries. As such, compelling alternatives are in exceptionally high demand. In particular, it was suggested that the specific problem of children's involvement in piratical activity could serve as a practical "entry point" into the general problem of piracy worldwide – insofar as children are of fundamental concern to all affected stakeholders. As an integral supporting partner of the DMPP conference, the Dallaire Initiative formulated a theory: if the international community were able to effectively enforce a prohibition on the use of children for criminal, piratical purposes, it would substantially contribute to the prevention of piracy as a whole. In December 2012, the Dallaire Initiative produced a first-of-its-kind report , drawing attention to the constellation of challenges surrounding the issue of child maritime piracy. Therein, it was noted that there are presently no legal instruments in place to prescribe the proper handling of captured child pirates. Likewise, naval and private security personnel currently receive no formal training to prepare for interactions with children at sea. These marked gaps are contributing to the entrenchment of an unproductive "catch-and-release" strategy – a practice that likely incentivises children's recruitment and use – as well as to children’s inappropriate incarceration alongside adults.

Details: Halifax, NS: Dalhousie University, Romeo Dallaire Child Soldiers Initiative, 2014. 30p.

Source: Internet Resource: Accessed April 14, 2016 at: http://www.childsoldiers.org/wp-content/uploads/2014/02/Piracy_Web.pdf

Year: 2014

Country: International

Keywords: Child Soldiers

Shelf Number: 138677


Author: Trotter, Chris

Title: Literature Review: Best Practice with Women Offenders

Summary: This paper examines literature on best practice with women offenders. It attempts to use the principle of systematic review although the general scarcity of material on the topic makes this difficult and we have had to source many studies with less than rigorous methodology. The review focuses on general principles of effective practice with women including, Aboriginal programs, transition and reintegration programs, offending behaviour programs, personal development programs, programs and services for young women, women with a disability and programs and services for women from culturally diverse backgrounds. In some cases, however, we were unable able to locate relevant studies which addressed good practice with these groups. Excluded from the study are drug and alcohol programs (AOD), sex offender programs, mental health services, education, employment and industries, mother and child programs and programs for women under 17 years of age. However often the literature addresses these issues along with other issues and in some cases these studies are included because they inform practice in the areas under consideration in the review. It seems clear that women have specific needs which are often different to those of men. In particular the research refers to relationship and family issues including parenting, mental health, housing and drug use. There is also some evidence that addressing the specific needs of women may help to reduce their recidivism and improve their well-being. The research is clear that, surveillance-oriented, punitive and blaming interventions, whether in prison or in the community, are ineffective and have the potential to increase recidivism. On the other hand the evidence also seems clear that rehabilitation interventions are generally effective and on average reduce recidivism by around 20%. The reductions are greater in community based than prison based interventions.

Details: Clayton, VIC, AUS: Monash University, 2016. 54p.

Source: Internet Resource: Accessed April 16, 2016 at: http://assets.justice.vic.gov.au/corrections/resources/a80ff529-6074-40c4-8881-684bf4385dbf/literature_review_best_practice_with_women_offenders.pdf

Year: 2016

Country: International

Keywords: Community-Based Programs

Shelf Number: 138699


Author: Dodwell, Brian

Title: The Caliphate's Global Workforce: An Inside Look at the Islamic State's Foreign Fighter Paper Trail

Summary: This report contains an analysis of over 4,600 unique Islamic State personnel records that were produced by the group primarily between early 2013 and late 2014. The importance of this data for understanding the Islamic State and, in particular, the foreign fighter flow, cannot be overstated. To put it simply, it is the largest cache of primary source documents produced by the Islamic State available in the open-source as of this date. These particular documents were acquired by NBC News from an Islamic State defector and subsequently provided to the CTC (and other entities). This report provides a window into the organization's global workforce, revealing information about foreign fighters' countries of origin, citizenship, points of entry into Syria, marital status, skills and previous occupations, education levels, religious knowledge, fighting role preferences in the group, and previous jihadist experience. In addition to analyzing the data at the macro-level, the report also highlights numerous anecdotes of individual fighters. Taken together, the analysis in this report reveals an organization that is attempting to vet new members, manage talent effectively within the organization, and deal with an incredibly diverse pool of recruits.

Details: West Point, NY: Combating Terrorism Center at West Point, 2016. 37p.

Source: Internet Resource: Accessed April 20, 2016 at: https://www.ctc.usma.edu/posts/the-caliphates-global-workforce-an-inside-look-at-the-islamic-states-foreign-fighter-paper-trail

Year: 2016

Country: International

Keywords: Caliphates

Shelf Number: 138704


Author: Disley, Emma

Title: Using Multi Agency Public Protection Arrangements to manage and supervise terrorist offenders: Findings from an exploratory study

Summary: Since 2000 Multi-Agency Public Protection Arrangements (MAPPA) have been used to manage violent and sexual offenders on release from prison. Under these arrangements, offenders are identified, assessed and subject to supervision and monitoring in order to protect the public. Central to MAPPA is that key agencies - including police, probation, housing, social services, education and health - are under a statutory duty to share information and cooperate. In 2009 these arrangements were extended to cover those convicted of terrorist offenders. RAND Europe conducted an exploratory study in 2011 to examine potential challenges in applying MAPPA to terrorist offenders and the readiness of those involved to do so. The research aimed to identify priorities for further attention by policymakers and researchers looking at the effectiveness of post-release supervision of terrorist offenders.

Details: Santa Monica, CA: RAND, 2016. 58p.

Source: Internet Resource: Accessed April 20, 2016 at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR441/RAND_RR441.pdf

Year: 2016

Country: International

Keywords: Offender Supervision

Shelf Number: 138705


Author: United States Agency for International Development

Title: Measuring Impact - Measuring Efforts to Combat Wildlife Crime: A Toolkit for Improving Action and Accountability

Summary: Killing protected or managed species and the illegal trade in wildlife and their related parts and products (hereafter wildlife crime, but see Box 1) are among the most severe threats to global biodiversity. Globally, hundreds of millions of individual animals belonging to hundreds of species are the targets of illegal harvesting and trade. Wildlife crime not only threatens the survival of focal species, but may also significantly alter ecosystem function and stability when one or more species are substantially depleted or even made locally extinct. High-value wildlife products are often trafficked by organized criminal syndicates and are known to finance violent non-state actors including terrorist groups and unsanctioned militias. Armed conflict can exacerbate wildlife killing and trafficking, and trafficking is frequently associated with other forms of crime such as money laundering (Loucks et al. 2009; UNODC 2012). Additionally, wildlife criminals generate insecurity in rural communities and are responsible for killing park rangers, which hurts morale and recruitment of park staff and reduces tourism and associated revenue needed for conservation and community development. For developing countries, loss of revenue from trade, taxes, and/or tourism can be significant and particularly damaging (Rosen & Smith 2010). The illegal trade in wildlife can also introduce and/or spread pathogens endemic to the exporting regions or transmitted during transit (Gomez & Aguirre 2008). This poses a major risk to human and livestock health, with implications for food security, commerce, and labor productivity (consider recent outbreaks of Ebola virus, SARS, and avian influenza). Despite focused efforts often lasting several decades, wildlife crime remains a global threat (Broad & Damania 2010; Sharma et al. 2014). The importance of wildlife crime as a threat to conservation and development has attracted the attention of governments, non-governmental organizations, research institutions, and multilateral organizations all over the world. Strategies to combat wildlife crime depend on accurate and reliable knowledge about the status of focal species and the basic attributes of illegal wildlife supply chains. However, the clandestine nature of this activity, its geographic spread, the large number of people involved, and the size of the trade make analysis of status and trends, as well as measuring progress in combating it, a challenge (Blundell & Mascia 2005; UNODC 2012). A report by the United Nations Office on Drugs and Crime report concludes that many of the available figures on wildlife crime "are the result of guesswork rather than of systematic analysis" (UNODC 2012). Global knowledge about wildlife crime remains fragmented and lacking in common standards, which hinders the design, implementation, and monitoring of strategies to combat it. USAID has a long history of investing in programs that support compliance with and enforcement of laws and regulations to protect wildlife, as well as other strategies aimed at decreasing the threats to conservation and development stemming from wildlife crime. In support of President Obama's Executive Order 13648 and the National Strategy to Combat Wildlife Trafficking, as well as associated funding and directives for USAID to increase programming on these issues, the Office of Forestry and Biodiversity in USAID's Bureau for Economic Growth, Education and Environment (E3/FAB) identified a need to adopt or develop robust indicators with which to track progress on USAID's investments in combating wildlife crime (CWC) and gauge the effectiveness of different approaches.

Details: Washington, DC: USAID, 2015. 68p.

Source: Internet Resource: Accessed April 20, 2016 at: http://pdf.usaid.gov/pdf_docs/PA00KQR6.pdf

Year: 2015

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 139090


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Trafficking in Persons for the Purpose of Organ Removal: Assessment Toolkit

Summary: The present toolkit deals with trafficking in persons for the purpose of organ removal, as defined by the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children, (Trafficking in Persons Protocol), supplementing the United Nations Convention against Transnational Organized Crime (Organized Crime Convention). Terms like 'organ trafficking', 'illegal organ trade', 'transplant tourism', 'organ purchase' and others are often used interchangeably with trafficking in persons for the purpose of organ removal, even where they would not refer to the same phenomenon. Any conduct described by such terms will only be within the scope of this toolkit, if it meets the definition provided by the Trafficking in Persons Protocol. Trafficking in persons for the purpose of organ removal is not a new phenomenon. Over the years, the crime has received significant attention from media, NGOs, academia and also from international and regional actors such as the Special Rapporteur on trafficking in persons, especially in women and children and the Special Representative and Co-ordinator for Combating Trafficking in Human Being Organisation for Security and Co-operation in Europe. The issue was also taken up at the UN Economic and Social Council and the General Assembly, which, e.g., in 2013 adopted resolutions that inter alia request UNODC to collect and analyse information on trafficking in persons for organ removal and encourage Member States to provide to UNODC evidence-based data on patterns, forms and flows of trafficking in persons, including for the purpose of the removal of organs respectively.

Details: Vienna: UNODC, 2015. 149p.

Source: Internet Resource: Accessed April 21, 2016 at: https://www.unodc.org/documents/human-trafficking/2015/UNODC_Assessment_Toolkit_TIP_for_the_Purpose_of_Organ_Removal.pdf

Year: 2015

Country: International

Keywords: Human Trafficking

Shelf Number: 139094


Author: Pascalev, A.

Title: Trafficking in human beings for the purpose of organ removal: A comprehensive literature review

Summary: Trafficking in human beings for the purpose of organ removal (THBOR) is prohibited worldwide, yet a growing number of reports indicate its increase across the globe. Many countries in and outside the European Union (EU) have implemented proper legislation against THBOR. However, information regarding the incidence of THBOR and the non-legislative response to it is practically non-existent and unavailable to judicial and law enforcement authorities in the EU member states. Transplant professionals, human rights NGOs and international organizations also have little knowledge and awareness of the crime (1). This knowledge gap hampers the development of a structured and effective action to this repugnant form of human trafficking, which brings physical and psychological harms to vulnerable individuals. The HOTT project has four objectives aimed at addressing the knowledge gaps and improving the non-legislative response to THBOR. These objectives are: - to increase knowledge about THBOR - to raise awareness among target groups - to organize an expert meeting where organ trafficking experts and competent authorities can express their views on project results - to provide recommendations to improve the non-legislative response This report contributes to the first objective: to gather information and increase knowledge about THBOR. It does so by describing the state-of-the-art of literature on the ethical aspects, causes and the actors involved in THBOR.

Details: Rotterdam, NETH: Erasmus MC University Hospital Rotterdam, Department of Internal Medicine, Section Transplantation and Nephrology, 2013. 79p.

Source: Internet Resource: Accessed April 21, 2016 at: http://hottproject.com/userfiles/HOTTProject-TraffickinginHumanBeingsforthePurposeofOrganRemoval-AComprehensiveLiteratureReview-OnlinePublication.pdf

Year: 2013

Country: International

Keywords: Human Trafficking

Shelf Number: 139093


Author: Ambagtsheer, F.

Title: Trafficking in Human Beings for the Purpose of Organ Removal: Results and Recommendations

Summary: When, in the early 1990's I began a multisided medical anthropological field research project in the transplant units, blood clinics, dialysis centers, prisons, kidney motels, safe houses, and refugee centers where underground transplants were negotiated and cobbled together by brokers for patients willing to travel to parts unknown for a back door transplant from invisible living suppliers in the global South, there was only one scientific article on the topic. That article was concerned only with the risks for the foreign recipients of South Asian kidneys. There were no concepts, categories, legal or philosophical language to identify what was going on. Consequently, the existence of human trafficking for the purpose of organ removal for illicit transplants was denied. Even as late as 2009, the joint United Nations/Council of Europe on 'Trafficking in organs, tissues and cells and trafficking in human beings for the purpose of the removal of organs' never once referred in the text of the document to human trafficking but rather to 'organ trafficking', thus unintentionally erasing the trafficked kidney sellers from any consideration or discussion. The problem was solid organs, not people, that were being trafficked and in a sense, sold While this sematic problem still exists, as it did in the Rosenbaum case discussed in this book, the dedicated and collaborative work of the EU-funded HOTT project will make it much more difficult for medical professionals, police, prosecutors and judges to ignore the vast scholarly and scientific literature on the topic, and the hard evidence produced in the first prosecutions of international organized crime syndicates pretending to be merely facilitating medical tourism rather than the illicit networks of human trafficking for human kidney sellers that they are. The extensive bibliography, original reports on the extent and consequences of human trafficking to procure organs and the case study reports and summaries, required considerable archival and field research to identify the networks, the investigations, indictments, and prosecutions of surgeons, nephrologists, transplant brokers, kidney hunters, mobile patients/kidney recipients, and trafficked kidney providers. The complexity of these international illicit networks explains their resilience. The obstacles include differences in legal jurisdictions, incompatible laws, and the immunity of complicit transplant surgeons. The first, and most successful of the prosecutions of an international human trafficking syndicate for the procurement of paid organ sellers was in Brazil in 2004, a key link in the Netcare case in South Africa described here. The Brazilian police sting, Operation Bisturi (scalpel) led to the indictment of twenty five participants, eleven of whom were eventually tried and found guilty of human trafficking of recruited kidney sellers from the slums of Recife. They were convicted for the recruitment, handling, medical pre-screening and transport of the men to private Netcare clinics in Durban and Johannesburg where their kidneys were removed and transplanted into the bodies of international patients, mostly from Israel. The case was handled efficiently by the Brazilian court's precise application of the 2000 Palermo Convention. The chief of the syndicate, Gedalya (Gaddy) Tauber, of Israel, and his Brazilian partner, Ivan Bonifacio da Silva, both retired military police officers, were given stiff sentences along with several other intermediaries that included a distinguished, middle aged woman lawyer, who hid the money in her private bank safe at the Recife branch of City Bank. One of the convicted was a kidney seller who joined the scheme and became a ruthless and dangerous kidney hunter, and the alleged head of a local death squad. Only the Brazilian doctor who conducted the blood tests escaped conviction. However, the presence of the suspects - perpetrators, intermediaries, and victims - in court room caught the attention of the ferocious Brazilian media. It was a major scandal in which Brazil was the victim and the nation was outraged that their citizens had been preyed upon and used by international transplant trafficking networks. This prosecution led to other investigations and prosecutions of domestic trafficking in humans for organs. More difficult to adjudicate are the cases where the buyers, sellers, brokers, and surgeons are from the same nation although branching out to other diasporic sites. In these instances we enter the ethical gray zone described by Primo Levi where perpetrators and victims, government officials and ordinary by-standers are partially complicit but feel helpless to extract themselves from a traffic in 'goods' (a healthy organ) rather than a traffic in 'bads' (illicit drugs and guns). The criminals could operate freely within the international legal lacuna that protected them. Moreover, human trafficking for organ procurement is often seen even by police, prosecutors, federal agents and judges as essentially a victimless crime. The judge in the Rosenbaum Sentencing based on a plea bargain, that it was a 'sorry story;, but one in which, she said, 'buyers and sellers both got something out of the deal'. What had been revealed in this first US prosecution of what the court described as three cases of illicit brokering and payment for an organ was not even the tip of the iceberg. The language of THBOR was not available to the federal prosecutors nor did US laws on human trafficking include those that are trafficked to provide 'spare' kidneys. The new term, THBOR though awkward, has given long overdue recognition of the real crime that is at stake here. Because most of the damages take place elsewhere and out of sight of the police and the courts that handle these cases, THBOR remained invisible. The complexity and the tragedy is that this form of human trafficking can save or enhance some lives at the expense of other disposable lives, sub-citizens in the global world. There are many excellent recommendations in this book, but the political will to apply them cannot be assumed. Trafficking in human beings for the purpose of organ removal is unlike other forms of human trafficking, even though the same international traffickers may also be involved in drug, small arms, and sex trafficking. Human trafficking in fresh organs is small, complicated, expensive and highly lucrative. But unlike other forms of human trafficking the good news is that it can be eradicated. The traffic is dependent on hospitals, nurses, doctors and surgeons. Without their complicity, knowingly or not, the traffic in humans for their fresh organs cannot exist. This report is the first to highlight the role and responsibilities of the medical transplant surgeons. We are dealing with a medical-surgical crime and it should be treated as such. Among the recommendations are that all persons who forfeit an organ (usually a kidney) for money within an organized international crime network are ipso facto victims, even if the person agreed to it. Another is that surgeons should be held responsible for removing and/or implanting a kidney from a trafficked person. We ask that surgeons and doctors cooperate with law enforcement and not to hide behind doctor-patient confidentiality when crimes may have been committed. Surgeons and nephrologists should inform their patients who are planning to travel abroad for an illicit transplant of the medical, ethical, and legal consequences. We ask that customs officials be required to ask those coming and leaving a country to declare whether they are traveling for the purpose of a transplant, which may or may not be legal.

Details: Lengerich: Pabst Science Publishers, 2016. 154p.

Source: Internet Resource: The HOTT Project: Accessed April 21, 2016 at: https://thbregionalimplementationinitiative.files.wordpress.com/2015/09/hott_project-book_2016.pdf

Year: 2916

Country: International

Keywords: Human Trafficking

Shelf Number: 139092


Author: Walsh, Kerryann

Title: School-based education programmes for the prevention of child sexual abuse (Review)

Summary: School-based education programmes for the prevention of child sexual abuse have been implemented on a large scale in some countries. We reviewed the evidence for the effectiveness of these programmes in the following areas: (i) children's skills in protective behaviours; (ii) children's knowledge of child sexual abuse prevention concepts; (iii) children's retention of protective behaviours over time; (iv) children's retention of knowledge over time; (v) parental or child anxiety or fear as a result of programme participation; and (vi) disclosures of past or current child sexual abuse during or after programmes. The evidence is current to September 2014. Study characteristics This review included 24 studies, conducted with a total of 5802 participants in primary (elementary) and secondary (high) schools in the United States, Canada, China, Germany, Spain, Taiwan, and Turkey. The duration of interventions ranged from a single 45-minute session to eight 20-minute sessions on consecutive days. Although a wide range of programmes were used, there were many common elements, including the teaching of safety rules, body ownership, private parts of the body, distinguishing types of touches and types of secrets, and who to tell. Programme delivery formats included film, video or DVD, theatrical plays, and multimedia presentations. Other resources used included songs, puppets, comics, and colouring books. Teaching methods used in delivery included rehearsal, practice, role-play, discussion, and feedback. Key results This review found evidence that school-based sexual abuse prevention programmes were effective in increasing participants' skills in protective behaviours and knowledge of sexual abuse prevention concepts (measured via questionnaires or vignettes). Knowledge gains (measured via questionnaires) were not significantly eroded one to six months after the intervention for either intervention or control groups. In terms of harm, there was no evidence that programmes increased or decreased children's anxiety or fear. No studies measured parental anxiety or fear. Children exposed to a child sexual abuse prevention programme had greater odds of disclosing their abuse than children who had not been exposed, however we were more uncertain about this effect when the analysis was adjusted to account for the grouping of participants in classes or schools. Studies have not yet adequately measured the long-term benefits of programmes in terms of reducing the incidence or prevalence (or both) of child sexual abuse in programme participants. Quality of the evidence The quality of the evidence for all outcomes included in the meta-analyses (combining of data) was moderate. Study quality was compromised in about half of the included studies, due to suboptimal data collection methods for study outcomes and inappropriate data analysis. Authors' conclusions: The studies included in this review show evidence of improvements in protective behaviours and knowledge among children exposed to school-based programmes, regardless of the type of programme. The results might have differed had the true ICCs or cluster-adjusted results been available. There is evidence that children's knowledge does not deteriorate over time, although this requires further research with longer-term follow-up. Programme participation does not generate increased or decreased child anxiety or fear, however there is a need for ongoing monitoring of both positive and negative short- and long-term effects. The results show that programme participation may increase the odds of disclosure, however there is a need for more programme evaluations to routinely collect such data. Further investigation of the moderators of programme effects is required along with longitudinal or data linkage studies that can assess actual prevention of child sexual abuse.

Details: Cochrane Database of Systematic Reviews, 2015. 123p.

Source: Internet Resource: Accessed April 23, 2016 at: http://onlinelibrary.wiley.com/doi/10.1002/14651858.CD004380.pub3/epdf

Year: 2015

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 138730


Author: Child Rights International Network

Title: Global Report on Status Offences

Summary: This publication gives an overview of status offences, including curfew violations, disobedience, begging, truancy and suspected gang membership with examples from around the world. It also contains a section on how to challenge curfew laws as a first step towards seeking the abolition of all status offence laws affecting children.

Details: London: CRIN, 2010. 14p.

Source: Internet Resource: Accessed April 23, 2016 at: https://www.crin.org/en/docs/Status_Offenses_doc_2_final.pdf

Year: 2010

Country: International

Keywords: Anti-Social Behavior

Shelf Number: 138778


Author: Ambagtsheer, F.

Title: Trafficking in Human Beings for the Purpose of Organ Removal: A Case Study

Summary: The present report builds upon the conclusions presented in the HOTT project's literature review, 'Trafficking in human beings for the purpose of organ removal: a comprehensive literature review'. This review concluded that a study of the current literature provides limited information and knowledge about the nature and incidence of the crime, and needs to be strengthened by other sources of information. The HOTT project's objectives are to: - increase knowledge about trafficking in human beings for the purpose of organ removal - raise awareness among target groups - improve the non-legislative response Purpose of study This case study report addresses the gaps that were already highlighted in the HOTT project's literature review. This study's purpose is to contribute to existing gaps in knowledge concerning a) the actors and their modus operandi of contemporary organ trafficking networks and b) the experiences of police and prosecution in disrupting and prosecuting the persons involved in these networks. Selection of countries and cases To acquire in-depth knowledge about the criminal networks involved in trafficking in human beings for the purpose of organ removal (THBOR), the research team collected information in the field by interviewing people worldwide who were directly involved in and affected by the events that led to prosecutions and convictions. With the financial support of the European Commission Directorate General Home Affairs, the Central Division of the National Police of the Netherlands, the Magnus Bergvalls Foundation (Sweden) and the Royal Physiographic Society (Sweden), the research team travelled to 4 countries to study 3 trafficking cases: 1. South Africa, Durban (November 2012) - Netcare case 2. Republic of Kosovo, Pristina (September 2013) - Medicus Clinic case 3. State of Israel, Tel Aviv and Jerusalem (October 2013) - Netcare and Medicus Clinic case 4. United States of America (USA), New York (March 2013) - Rosenbaum case Visiting these countries made it possible to talk to key persons and to access data that would not have been acquired through literature- or desk research. The countries and cases were selected because of common features: police and prosecution investigated international networks involving (elements of) THBOR and succeeded in gathering sufficient evidence to bring these cases to court that led to convictions of the accused, they relied on assistance from other countries and were able to demonstrate how to achieve successes and overcome obstacles in international criminal collaboration.

Details: Rotterdam: Erasmus MC University Hospital Rotterdam Department of Internal Medicine, Section Transplantation and Nephrology, 2014. 32p.

Source: Internet Resource: HOTT Project: Accessed April 23, 2016 at: http://hottproject.com/userfiles/Reports/3rdReportHOTTProject-TraffickinginHumanBeingsforthePurposeofOrganRemoval-ACaseStudyReport.pdf

Year: 2014

Country: International

Keywords: Human Trafficking

Shelf Number: 138783


Author: Ambagtsheer, F.

Title: Organ Recipients Who Paid for Kidney Transplantations Abroad: A Report

Summary: Worldwide, there is a mismatch between the increase in the number of those waiting and the increase in those identified as potential donors. Kidney transplant wait lists grow most prominently. By the end of 2013, 49.266 people were waiting for a kidney transplantation in the European Union, whilst only 19.227 transplantations were performed that year. Eurotransplant's wait list has an average waiting time of 3-5 years. About 15-30% of the patients die before receiving a kidney (3). Also in other parts of the world such as in the United States of America (USA), the number of candidates on the kidney wait list is increasing. Between 1980 and 2009 the list increased by 600%. Yet, the number of annual donors between 2004 and 2011 remained relatively stagnant at 13.000, making the gap between organ supply and demand even larger. The list in the USA now has a median wait time of over 4 years. The activity of organ transplantation worldwide is less than 10% of the global need. Furthermore there are substantial disparities in access to transplantation, not only globally, but within countries as well. Organ recipients travel across the world for transplantation, the most common being live kidney transplantation (8-13). Although travelling abroad does not imply an illegal transplant purchase, it is commonly perceived to be an illegal and/or immoral endeavour involving health risks. Several qualitative studies have been performed among patients who purchase kidneys (17-22). Some of these studies reveal that patients bring back little or no information about their operation, such as the origin of their kidney, the transplantation costs or where and by whom the transplantation was performed. The limited amount of data about transplantations abroad makes it difficult to draw firm conclusions about its scale, nature and potential illegality. Also, little knowledge exists about the motivations, experiences and characteristics of patients travelling abroad. Purpose of study The main conclusion of the HOTT project's first report, 'Trafficking in human beings for the purpose of organ removal: a comprehensive literature review' (23) (hereafter: literature review), is that a literature study provides limited information and knowledge about the nature and incidence of the crime. The underlying report aims to fulfil gaps of knowledge highlighted in the literature review by presenting the results of interviews with patients who travelled abroad for paid kidney transplantations. The purpose of this study is to describe the process of the transplantation (how, where and by whom it was facilitated) and the perspectives, experiences, behaviors and motivations of these patients. Research questions The research questions are as follows: 1. Do patients travel abroad for paid kidney transplantations? 2. How, where and by whom were their transplantations facilitated? 3. What are patients' motivations, experiences and characteristics?

Details: Rotterdam: Erasmus MC University Hospital Rotterdam Department of Internal Medicine, Section Transplantation and Nephrology, 2014. 25p.

Source: Internet Resource: HOTT Project: Accessed April 23, 2016 at: http://hottproject.com/userfiles/Reports/2ndReportHOTTproject-OrganRecipientsWhoPaidForKidneyTransplantsAbroad.pdf

Year: 2014

Country: International

Keywords: Human Trafficking

Shelf Number: 138784


Author: Child Rights International Network

Title: Discrimination and Disenfranchisement: A Global Report on Status Offences (Third Edition)

Summary: Status offences criminalise actions for only certain groups of people, most commonly because of their religion, sexuality or age. Curfews, truancy laws and vagrancy offences can penalise children just for being in public, while "disobedience" laws can transform activities that would be perfectly lawful for an adult into a criminal offence for a child. Even where a status offence does not explicitly single out children, children will often be disproportionately affected and those children with the lowest levels of resources and the least available support from home or family environments will be the most affected. Because police are given great discretion to question and investigate children's activities, especially when they are without adult supervision, disadvantaged and street children are targeted because they are forced to spend more time in public spaces and face entrenched cultural biases that equate poverty with criminality. Most importantly, regardless of their backgrounds or situations at home, status offences are a violation of all children's rights. They violate children's rights because they target what adults consider to be problematic behaviour in children but acceptable once above the age of majority. Thus, limits are placed on children's behaviour that are not tolerated by adults. The United Nations Guidelines for the Prevention of Juvenile Delinquency have spoken out against these limits, stating that status offences stigmatise, victimise, and criminalise young people. These guidelines, the UN Human Rights Council, the Committee on the Rights of the Child, and the United Nations World Report on Violence Against Children have all called for the abolition of status offences to achieve equal treatment for children and adults. CRIN first published a global report on status offences in 2009, looking at the ways that laws on curfew violations, disobedience, begging, truancy and suspected gang membership affected children around the world. Seven years later, we are publishing an updated report addressing the ways that status offences have developed, the new forms they have taken and the way that laws that do not exclusively target children can indirectly criminalise children based on their age. In this report, we also look at the way that these laws and practices have been challenged. CRIN believes that status offences are a form of age discrimination and should be eliminated. Status offences are not only unfair, they curtail the freedom children need to grow and develop. They prevent children from becoming integrated into adult society. Ultimately, then, status offences not only fail to respect children's rights, they are in conflict with children's best interests. With this in mind, it is time to call on every country to abolish status offences and protect children from harmful age discrimination.

Details: London: CRIN, 2016. 44p.

Source: Internet Resource: Accessed April 23, 2016 at: https://www.crin.org/sites/default/files/crin_status_offences_global_report_0.pdf

Year: 2016

Country: International

Keywords: Anti-social Behavior

Shelf Number: 138788


Author: Higginson, Angela

Title: Preventive Interventions to Reduce Youth Involvement in Gangs and Gang Crime in Low- and Middle-Income Countries: A Systematic Review

Summary: Youth gang membership and the crime that it generates is a serious problem in low- and middle-income countries, involving many thousands of young people and resulting in billions of dollars of crime, loss of life, and social disruption. This review assessed the evidence on preventive interventions that focus on increasing social capacity to reduce gang membership or rehabilitate gang members outside of the criminal justice system. Approach We conducted an extensive search of the published and unpublished academic literature, as well as government and non-government organization reports to identify studies assessing the effects of preventive youth gang interventions in low- and middle-income countries. We also included studies assessing the reasons for success or failure of such interventions and conducted a thematic synthesis of overarching themes identified across the studies. Results We did not identify any studies assessing the effect of preventive gang interventions in LMICs using an experimental or quasi-experimental design. Four studies evaluating the reasons for implementation success or failure were included. The limited number of studies included in the review suggests that the findings identified here should provide a direction for future research, rather than any substantive or generalizable claim to best practice. Specifically, the synthesis of reasons for implementation success or failure identified five factors that may be important for intervention design and implementation. Preventive gang interventions may be more likely to be successfully implemented when they include: - a range of program components that appeal to youth, - active engagement of youth, where their agency is embraced and leadership is offered, - programs that offer continuity of social ties outside of the gang, and - a focus on demobilization and reconciliation. Implications The lack of evidence prevents us from making any conclusions about which interventions are most effective in reducing youth involvement in gangs. To identify programs that work and those that do not researchers, practitioners and commissioners should begin to rigorously evaluate the effectiveness of preventive gang programs in the field.

Details: Campbell Systematic Reviews, 2015: 18. 177p.

Source: Internet Resource: Accessed April 23, 2016 at: http://www.campbellcollaboration.org/lib/project/297/

Year: 2015

Country: International

Keywords: Gang Violence

Shelf Number: 138794


Author: Benmelech, Efraim

Title: What Explains the Flow of Foreign Fighters to ISIS?

Summary: This paper provides the first systematic analysis of the link between economic, political, and social conditions and the global phenomenon of ISIS foreign fighters. We find that poor economic conditions do not drive participation in ISIS. In contrast, the number of ISIS foreign fighters is positively correlated with a country's GDP per capita and Human Development Index (HDI). In fact, many foreign fighters originate from countries with high levels of economic development, low income inequality, and highly developed political institutions. Other factors that explain the number of ISIS foreign fighters are the size of a country's Muslim population and its ethnic homogeneity. Although we cannot directly determine why people join ISIS, our results suggest that the flow of foreign fighters to ISIS is driven not by economic or political conditions but rather by ideology and the difficulty of assimilation into homogeneous Western countries.

Details: Cambridge, MA: National Bureau of Economic Research, 2016. 27p.

Source: Internet Resource: NBER Working Paper 22190: Accessed April 25, 2016 at: https://scholars.huji.ac.il/sites/default/files/eklor/files/w22190.pdf

Year: 2016

Country: International

Keywords: ISIS

Shelf Number: 138802


Author: Cockayne, James

Title: Strengthening mediation to deal with criminal agendas

Summary: A growing proportion of armed conflicts nowadays do not only involve political and ideological agendas but criminal ones. While armed conflict mediators have extensive experience of dealing with armed groups in various contexts of political and ideological conflicts, there is often a lack of attention towards addressing criminal agendas, making it a blind spot of mediation. In Strengthening mediation to deal with criminal agendas, James Cockayne takes an in-depth look at ways in which mediators have addressed, or not, criminal agendas, in peace processes, and the potentially spoiling effect that ignoring them may have had on those processes. Through the review of several peace processes in which criminal agendas have been directly tackled including gang truces in El Salvador and community violence reduction cases in Haiti and Brazil, Cockayne highlights how the practice of mediation can adjust to take criminal agendas into account. While mediation is by no means the only way to address and deal with such agendas, it can be a useful and complementary tool to do so. Cockayne also puts forward examples of peace processes in which criminal agendas were not taken into account and how this has contributed to spoiling those processes, for example through a return to conflict, or the empowerment of criminal agendas through disarmament, demobilisation, and reintegration processes. Cockayne also offers recommendations on ways to ensure that the fundamentals of mediation, such as preparedness, inclusive ownership, legal frameworks and impartiality, are respected despite the presence of criminal agendas.

Details: Oslo: Centre for Humanitarian Dialogue, 2013. 28p.

Source: Internet Resource: Oslo Forum Papers: Accessed April 25, 2016 at: http://www.hdcentre.org/uploads/tx_news/Strengthening-mediation-to-deal-with-criminal-agendas.pdf

Year: 2013

Country: International

Keywords: Armed Conflict

Shelf Number: 138803


Author: Yale Law School. Civil Liberties and National Security Clinic

Title: Trapped in a Black Box: Growing Terrorism Watchlisting in Everyday Policing

Summary: The report analyzes 13,000 pages of new information from a joint Freedom of Information Act (FOIA) litigation by the ACLU and the clinic, which reveals that the U.S. government has drastically expanded the use of a consolidated watchlisting system that now includes hundreds of thousands of individuals. The watchlist, referred to as the Known or Suspected Terrorist (KST) File, is part of a vast system of domestic surveillance of people whom law enforcement labels suspect based on vague and loose criteria, according to the report. The report contains new data that reveals for the first time the vast expanse of the watchlist now known as the KST File. It ballooned over 2000 percent from 2003 to 2008, growing at an average of 144 names per day to become a massive database of 272,000 entries by the end of 2008, according to the report. Today, the KST File contains hundreds of thousands of names. The names of these watchlisted individuals are disseminated to law enforcement officers nationwide through the National Crime Information Center (NCIC) database, making them vulnerable to a heightened risk of unwarranted monitoring and surveillance as well as prolonged detention and questioning, according to the report. In addition, the report reveals for the first time that the government uses a function called "silent hits" to secretly track encounters with watchlisted individuals without alerting even the frontline law enforcement officers. When an officer searches for an individual listed as a silent hit, for example during a routine traffic stop, the officer receives no hit, but an automatic notification is sent to the FBI or other source agency, according to the report. As a result, the silent hits system effectively turns frontline law enforcement officers into domestic intelligence gatherers without their knowledge. In addition to unwarranted law enforcement scrutiny, these individuals face the risk of mistaken dissemination of watchlist information to private third parties, as well as discriminations in immigration and naturalization proceedings, the report found. Despite the threat to these individuals' due process and privacy rights, they have little recourse to challenge the watchlisting procedures.

Details: New York: American Civil Liberties Union, 2016. 36p.

Source: Internet Resource: Accessed April 25, 2016 at: https://www.law.yale.edu/system/files/area/clinic/wirac_9-11_clinic_trapped_in_a_black_box.pdf

Year: 2016

Country: International

Keywords: Civil Liberties

Shelf Number: 138809


Author: Berrittella, Maria

Title: An Empirical Analysis of the Public Spending Decomposition on Organized Crime

Summary: The aim of this paper is to investigate, empirically, what components of the public spending imply a decreasing effect on the organized crime and what components create opportunities for the organized crime, discussing also the role of government efficiency. The findings show a strikingly consistent pattern. Organized crime mainly operates in the distribution of the public spending for health, housing and community amenities. There is a decreasing effect on organized crime of the public expenditure devoted to education and to create morality values, such as the expenditure for recreation, culture and religion. Finally, government efficiency in public spending is beneficial for reducing the opportunities of the organized crime.

Details: Milan: Fondazione Eni Enrico Mattei (FEEM), 2016. 25p.

Source: Internet Resource: Fondazione Eni Enrico Mattei (FEEM): Accessed April 27, 2016 at: http://ageconsearch.umn.edu/bitstream/232005/2/NDL2016-001.pdf

Year: 2016

Country: International

Keywords: Costs of Criminal Justice

Shelf Number: 138825


Author: Shrader, Elizabeth

Title: Methodologies to Measure the Gender Dimensions of Crime and Violence

Summary: The prevalence rate of violence - as measured by such indicators as domestic assault, homicide, and crime victimization - varies widely locally and worldwide, suggesting that violent behavior is modifiable and preventable. Developing standardized, accurate ways to measure and map violence across communities and countries is the first step toward developing programs to prevent it. Recent studies have used homicide rates, police statistics, and crime victimization surveys to pinpoint violent areas. Shrader argues that these useful measures of crime and violence underestimate certain types of violence (especially noneconomic violence) and key dimensions of violence (especially age and gender). A composite index based on monitoring and surveillance of homicides, crime statistics, and victimization surveys can provide invaluable "first round" snapshots of urban violence - information to monitor crime trends, warn against incipient crime waves, and indicate areas where more in-depth "second round" studies are needed to explore causality, the impact of interventions, and public opinion. But a composite index of municipally generated information about trends depends heavily on the quality of the data collected and will not explain why trends or changes occur. Other indicators are needed to strengthen surveillance and to facilitate the planning of interventions and evaluation. It would be helpful, for example, to distinguish between social, economic, and political violence, and to provide items on autopsy reports, crime statistics, and victimization surveys to gain insight into what motivates violence. Information useful for analyzing causes of violence might include: - Individual: Socioeconomic data about victims and perpetrators and information about their use of alcohol, drugs, or firearms. - Interpersonal: Whether victim and perpetrator belonged to the same family or household, had an affective relationship, were acquaintances or were strangers. - Institutional: Crime characteristics (physical injuries sustained, weapons used, value of property lost, where crime occurred); characteristics of victim and perpetrator; whether the crime was reported; per capita police and private security; presence of gangs in community; estimated number of gangs and gang members; level of gang organization (low, medium, high); and other measures of social capital. - Structural: Levels of impunity (number of convictions as a ratio of number of arrests); levels of corruption; indices of social exclusion, such as racism, gender discrimination, or area stigma; the dynamics between violence and access to (and control of) such resources as land, water, and wealth. Crime mapping, to provide visual confirmation of noted trends, might be combined with information about the relative locations of battered women's shelters, police stations, and the distribution of family violence in residential areas.

Details: Washington, DC: The World Bank, 2001. 39p.

Source: Internet Resource: World Bank Policy Research Working Paper No. 2648 : Accessed May 2, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=632716

Year: 2001

Country: International

Keywords: Crime Statistics

Shelf Number: 138846


Author: Robinson, Linda

Title: Assessment of the Politico-Military Campaign to Counter ISIL and Options for Adaptation

Summary: This report assesses the campaign against the Islamic State (ISIL), focusing on the military and political lines of effort. The capabilities and motivations of the various counter-ISIL forces on the battlefield are assessed, as well as the U.S.-led efforts to provide training, equipment, advice, and assistance, including air support. While the campaign has degraded ISIL by targeting leadership and retaking a portion of territory, achieving lasting defeat of ISIL will be elusive without local forces capable of holding territory. Successful conclusion of the campaign will require significantly increased effort on two fronts. First, more-comprehensive training, advising, and assisting will be required to create more-capable, coordinated indigenous forces of appropriate composition and enable them to regain and hold territory. Second, political agreements must be forged to resolve key drivers of conflict among Iraqis and Syrians. Without these elements, resurgent extremist violence is likely. Many factors complicate the prospects for success, including sectarian divisions in Iraq, Iranian support for Shia militias in Iraq and Syria, the Syrian civil war, and Russian intervention to support the besieged regime of Syrian President Bashar al-Assad. However, the Syrian regime also lacks sufficient competent local forces and is heavily reliant on external militia support. The government in Iraq, led by Prime Minister Haider al-Abadi, has pledged decentralization efforts to address Sunni concerns, but lacks sufficient Shia support to enact them. This report offers recommendations for a more comprehensive advisory approach, emphasizing the political line of effort, and achieving synergy between the military and political efforts. Key Findings U.S. Efforts to Bolster Counter-ISIL Forces Have Achieved Limited Results - The advisory effort was circumscribed by location, unit, and function. Lack of advisers at the operational level in Iraq and lack of support to Syrian opposition fighters limited effectiveness of indigenous forces. - The training effort was also limited: Some 20,000 Iraqi army and Peshmerga forces were trained in 18 months, including 2,000 Iraqi special operations personnel. Efforts to arm and train Sunni tribes were halting. Anti-ISIL Forces Suffer from Capability Gaps and Lack of Coordination Among Disparate Forces - Iraqi's military crumbled after the 2014 ISIL offensive due to cumulative weaknesses. - Iraq's Counter Terrorism Service carried the brunt of the fighting, suffering extensive casualties and materiel losses. - Shia militias, some of them advised and supported by Iran, were not integrated with the overall military effort. Effective command and control of the overall effort was lacking. - In Syria, most territory was retaken by the Syrian Kurdish militia, and other efforts such as the New Syrian Forces were inadequate in numbers and capability. Coordination was also lacking among Syrian forces. Detailed Political Strategies to Resolve Underlying Conflicts Were Not Developed and Not Synchronized with the Military Effort for Maximum Effect - The Iraqi government under Prime Minister Haider al-Abadi articulated proposals to address Sunni concerns, but insufficient Shia support was provided to implement them. U.S. senior-level engagement with Abadi was also limited. - No overarching Syria strategy was developed. Relying on Syrian Kurds has escalated tensions with Turkey dramatically and created concern among Syrian Arabs. Recommendations - More comprehensive advisory support from senior echelons through the brigade level to increase coordination of forces, morale, and leadership. - A long-term training and equipping effort will be required to create capable indigenous security forces that incorporate sufficient Sunnis. - The successful support to Iraq's Counter Terrorism Service provides a replicable model. - An unconventional warfare approach may regain Mosul and Raqqa from ISIL with less material damage by leveraging internal discontent and underground forces. - Syria's counter-ISIL effort cannot succeed in seizing and holding key terrain without Syrian Arabs; their support may require unified effort with the counter-Assad campaign. - Increased materiel aid to anti-Assad forces including tube-launched, optically tracked, wireless guided weapon systems and surface-to-air missiles may preserve the moderate opposition and create leverage in negotiating a transition under the Geneva terms. - The Abadi government and Shia parties should craft proposals with international support to resolve the political drivers of conflict in Iraq. Visible, high-level U.S. support to such detailed political proposals may include linkage with military support. - The United States should elevate its focus on advisory support to indigenous forces, not just eliminating ISIL leadership and resources. It should, above all, prioritize the political line of effort, backed by military measures. Syrian opposition fighters may become increasingly radicalized in the absence of greater U.S. commitment and coordination. U.S. allies have backed disparate opposition groups, increasing the fragmentation and ineffectiveness of the Syrian opposition.

Details: Santa Monica, CA: RAND, 2016. 92p.

Source: Internet Resource: Accessed May 2, 2016 at: http://www.rand.org/pubs/research_reports/RR1290.html

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 138893


Author: Verizon

Title: 2016 Data Breach Investigations Report

Summary: Our ninth Data Breach Investigations Report (DBIR) pulls together incident data from 67 contributors around the world to reveal the biggest IT security risks you'll face. This year's dataset is made up of over 100,000 incidents, of which 3,141 were confirmed data breaches. Of these, 64,199 incidents and 2,260 breaches comprise the finalized dataset that was used in the analysis and figures throughout the report. We address the reasons for culling the dataset in Victim Demographics and provide additional details when we discuss motives in Breach Trends. Of course, we would never suggest that every last security event of 2015 is in this report. We acknowledge sample bias, and provide information about our methodology as well as links to resources that we encourage you to look into to help collect and analyze incident data within your own organization, in Appendix E.

Details: New York?: Verizon, 2016. 85p.

Source: Internet Resource: Accessed May 4, 2016 at: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/

Year: 2016

Country: International

Keywords: Cyber Security

Shelf Number: 138913


Author: Interpol

Title: Against Organized Crime: Interpol Trafficking and Counterfeiting Casebook 2014

Summary: INTERPOL has launched a casebook outlining the links between illicit trade, counterfeiting and organized crime. 'Against Organized Crime: INTERPOL Trafficking and Counterfeiting Casebook 2014' is a compilation of cases from law enforcement worldwide involved in the fight against trafficking in illicit goods and counterfeiting. Through these real-life examples divided into chapters, the reference book details the strong connections between illicit trade and other crimes such as counterfeiting and smuggling, fake medicines, arms smuggling, trafficking in human beings and organs, drug trafficking, financial crimes, terrorism, environmental crime and cybercrime. "The criminal networks behind trafficking in illicit goods and counterfeiting are complex and pervasive, reaching far beyond national borders. The INTERPOL Trafficking and Counterfeiting casebook is the first publicly released study to provide comprehensive evidence of the clear connection between illicit trade and other types of organized crime," said INTERPOL Secretary General Ronald K. Noble. The casebook discusses the organized criminal networks which are often behind illicit trade, using the profits to fund other criminal endeavours. It also highlights the role INTERPOL is playing to assist law enforcement around the globe in combating these crimes through its Trafficking in Illicit Goods and Counterfeiting programme, by coordinating regional operations, bringing police together, organizing capacity building and training sessions, and awareness raising.

Details: Lyon, France: Interpol, 2014. 132p.

Source: Internet Resource: Accessed May 4, 2016 at: http://www.interpol.int/News-and-media/News/2014/N2014-057

Year: 2014

Country: International

Keywords: Counterfeiting

Shelf Number: 138918


Author: Finardi, Sergio

Title: Pinocchio Ltd.: The NRA and its corporate partners: US shipments of small arms ammunition by sea

Summary: The National Rifle Association (NRA) claims to have monitored in the last 20 years all United Nations activities that could impact Second Amendment rights. Its latest target is the Arms Trade Treaty (ATT), an international treaty to establish common international standards for the import, export, and transfer of conventional arms presently under discussion at the United Nations. The international community has been calling for the inclusion of ammunition and civilian arms within the scope of the ATT. This reasonable call is used by the NRA to claim that the ATT could restrict the lawful ownership of firearms in the United States.

Details: Chicago: TransArms Research, International Peace Information Services, 2013. 20p.

Source: Internet Resource: Accessed May 4, 2016 at: http://ipisresearch.com/publications_detail.php?id=405&lang=en

Year: 2013

Country: International

Keywords: National Rifle Association

Shelf Number: 138922


Author: Robins, Libby

Title: Mother and Baby Prison Units: An Investigative Study

Summary: During the period July through to early September 2011, as director of Family Help Trust (FHT) Christchurch and in my capacity as a Winston Churchill Fellowship recipient, I visited six female prisons in the United States of America and four in the United Kingdom. Time spent in each facility varied from two hours in Bedford Hills, New York, through to three days in Coffee Creek, Portland Oregon. In addition, I met with three researchers, (New York, Maryland and Nebraska) and four not for profit organisations (three in New York and one in Stirling, Scotland). I interviewed 25 female offenders, a mixture of currently incarcerated and previously incarcerated, and over 20 staff members between all the prison facilities. The purpose of this investigative research was to bring back information that would benefit a range of agencies including: New Zealand government policy makers, members of parliament, the New Zealand Department of Corrections, the New Zealand Women's Prison Service, researchers, Family Help Trust (FHT), Child Youth and Family (CYF), the Families Commission, the Commission for Children and all New Zealand community agencies involved with the offending population. In 2008 new legislation was passed that allowed infants to remain in two of the three New Zealand prison nurseries until they were two years old (Auckland and Christchurch). The remaining prison (Wellington) was not included in this legislation and is only able to accommodate infants until they are nine months old. Two of the self-care houses at Christchurch Women's Prison (CWP) were 'toddler proofed' and two mother and baby houses were built at Auckland's new women's facility in Wiri in 2011. These units were officially opened by the then Minister of Corrections, Hon Judith Collins, in September 2011. Key points and findings that have emerged from this investigative research are: - New Zealand has been progressive in the style of accommodation provided to mothers and their infants. This models a self-contained motel unit or a small flat or house in the community. - There was only one prison (Cornton Vale's independent living units), that allowed mothers to accompany their infants on outings outside the prison gates. In contrast, New Zealand women's prisons have made significant efforts to normalise the children's experiences as much as possible and both infants and their mothers visit community facilities beyond the wire The evidence available concerning the reductions in reoffending for mothers having benefitted from prison nurseries, when compared to mothers from the general prison population who were not able to keep their infants with them, is compelling, particularly in the United States. Nebraska Women's Facility and Bedford Hills, New York are the two prisons that stood out for their efforts to provide research evidence. It is imperative that New Zealand keeps good data on all mothers who reside and are then released from our mother and baby prison units. This data needs to include community outcomes, albeit this could be considered outside the responsibility of the Department of Corrections for those inmate mothers who are released without parole conditions. New Zealand, because of its size, is in a unique position to research the post-release outcomes for these mothers, and provide comparative research that could include a control group. Using randomisation would, in my opinion, be inappropriate, unless it was mothers who had not been able to reside in nurseries due to lack of capacity. It is important that the issue of community outcomes beyond the reach of Corrections' jurisdiction is addressed to ensure that such information is available for research purposes. In the United States there was no scope to cross-match data interstate and in the United Kingdom there was no research was currently being undertaken on this issue. The only figures I was able to obtain were prison by prison, and data collection methods varied hugely. For mothers without any family support, the concept of trained voluntary doulas (birth companions) is worth considering in New Zealand. Doulas were used comprehensively in both the United States and the United Kingdom and were highly valued by inmate mothers. International mother and baby prison nursery facilities I visited have the throughput that allows them to provide extensive childcare facilities staffed by professional early childhood educators while mothers attend programmes or work within the prison. While New Zealand¡¦s efforts to provide similar is clearly limited by a much smaller number of pregnant inmates, given the gradual rise in female incarceration in New Zealand, together with current harder line sentencing laws, some future proofing needs to be considered. Improving New Zealand prison visiting areas and making them more child friendly such as I found in Bedford Hills and Cornton Vale, would have huge benefits for improving inmate relationships with their children. While support for breastfeeding mothers in the prisons I visited was considered important, mothers being expected to return to their work duties as early as six weeks post-birth did seem out of line with breastfeeding recommendations and maternity protection. Exclusive breastfeeding is generally recommended for six months after birth, and then a continuation of breastfeeding for up to two years or longer if desired, along with suitable complimentary foods. Support for breastfeeding is essential as breastfeeding 'success' for this vulnerable population makes a significant positive contribution to maternal and infant well-being and health, both short and long-term, and to maternal bonding and secure infant attachment. While attempts to limit smoking around pregnant mothers and infants were made in both the United Kingdom and United States mother and infant units, all allowed smoking to some degree. It is of particular interest that as of 1 June 2011, when the New Zealand ban on smoking in prison came into effect, there has been no unrest or riots as might have been expected and which was a significant concern to those prisons I visited. Judges in some states in America routinely sentence a pregnant woman to 366 days in a state prison, allowing her to potentially keep her infant with her in a nursery. A sentence of less than 366 days in a city jail with no nursery will lead to an automatic separation once the infant is born. A prison nursery affords a unique opportunity for a recidivist offending pregnant woman to raise her infant in a 'safe and secure' environment away from her complex and generally violent life in the community. In addition, she receives intensive and ongoing support and parent education that will assist her to attain a secure attachment to her infant, so reducing the probability of further prison terms and her children being removed and raised by the state sector. In the absence of mother and infant alternatives to prison residential facilities, and depending on the seriousness of offending, this option is worthy of serious consideration by the New Zealand judiciary. Bedford Hills New York not only has extensive programmes for both mothers and their infants, but also mothers estranged from older children. In addition, the supported accommodation, employment assistance and general through service given by the Hour Children Charity offered an outstanding opportunity for recidivist women to reverse the probable negative trajectory for both themselves and their children. Nebraska also went to considerable effort to assist mothers estranged from their children with the five nights a month option in the prison nursery as well as the early childhood visiting facilities and playground facilities. in New Zealand, in spite of the problem of whether responsibility lies with the Department of Corrections or Child Youth and Family, the issue of support for mothers and their infants post-release needs to be addressed. This is central to whether or not prison nurseries, both now and in the future, are considered cost effective and can contribute significantly to reducing reoffending. The New Zealand government's view (then Minister of Corrections Hon Judith Collins) when the new units at Christchurch and Auckland Women's Prisons were officially opened in September 2011 was "this is money well spent if it stops the babies becoming criminals". I contend that equal effort and expenditure is essential in the community if recidivism among these mothers is to be successfully reduced. The recently published (April 2012) Commission on Women's Offending (Dame Elish Angiolini commissioned by the Scottish government) makes some important recommendations concerning the establishment of 'one stop shop' community facilities that have both residential beds and day centre programmes for low risk repeat female offenders. The purpose is to address their criminality, mental health and trauma issues as well as alcohol and drug addictions. While there are some residential centres in New Zealand they tend to have limited places and limited resources and they have a single focus e.g. drug and alcohol treatment. Such centres, so long as they catered for children as well, could provide the all-important through centre concept for mothers and their infants from the mother and baby prison units. Dame Elish Angiolini's report was in response to the doubling of the Scottish female rates of incarceration over the previous ten years, now having reached a number very similar to that found in New Zealand. It highlights that in a single year up to 30,000 children will have had a mother or father behind bars, 30 per cent of whom will develop physical and mental health problems and up to half will themselves go on to offend. The cost effectiveness of establishing residential and non-residential centres for female offenders in preference to imprisonment is obvious when compared to the cost of female prison cells in New Zealand. Such centres, together with the through care concept for mothers and their infants returning to the community from the mother and baby units in our female prisons, have the potential to reduce recidivism and ensure better outcomes for mothers, children and families.

Details: Wellington: New Zealand Winston Churchill Memorial Trust, 2012. 167p.

Source: Internet Resource: Accessed May 5, 2016 at: www.communitymatters.govt.nz

Year: 2012

Country: International

Keywords: Children of Prisoners

Shelf Number: 138933


Author: Women's Refugee Commission

Title: A Girl No More: The Changing Norms of Child Marriage in Conflict

Summary: Marriage under the age of 18 is widely considered a human rights violation, though it is legal with parental consent in many countries. It falls within the definition of gender-based violence. Married girls are at risk of intimate partner violence and exposure to sexually transmitted infections, including HIV. Marriage often means the end of a girl's education and limits her vocational opportunities. Ninety percent of early first births happen within the context of child marriage and complications during pregnancy and delivery are the second leading cause of death among 15- to 19-year-olds. Nine of the top 10 countries with the highest rates of child marriage are considered fragile states. Similarly, many countries particularly vulnerable to natural disasters have the highest child marriage prevalence. Fragility and conflict impact child-marriage decisions. However, the role they play is complex and not fully understood. The need to protect girls from rape, as well as the stigma of surviving rape; from pregnancy outside marriage; and from the influence of other communities are factors that lead to child marriage. Poverty, exacerbated in displacement, is a driver of early marriage as parents hope to secure a daughter's future or to meet basic needs. Child marriage is both exacerbated by barriers to education and an impediment to school for the girls. Additionally, marriage isolates adolescent girls from friends and programs that would help them overcome the challenges of marriage. In 2011, the Women's Refugee Commission began a project to understand how traditional practices around child marriage may change during conflict, and what factors contribute to those practices. We researched internally displaced Ugandans in Mucwini, Northern Uganda; Congolese in Nakivale Refugee Settlement in Uganda; Syrians in the Al Marj Settlement in Lebanon; and Somalis at the Kobe Refugee Camp in Ethiopia. We found that in order to reduce child-marriage practices, programmers must ensure that the basic needs of families are met during the acute phase of an emergency, and ensure that programming is designed to promote the agency and value of adolescent girls.

Details: New York: Women's Refugee Commission, 2016. 36p.

Source: Internet Resource: Accessed May 5, 2016 at: http://reliefweb.int/sites/reliefweb.int/files/resources/Changing-Norms-of-Child-Marriage-in-Conflict.pdf

Year: 2016

Country: International

Keywords: Child Marriage

Shelf Number: 138941


Author: Bagaric, Mirko

Title: Mitigating the Crime that is the Over-Imprisonment of Women: Why Orange Should Not Be the New Black

Summary: Most criminal acts are performed by men. Moreover, with only a hint of exaggeration, women never commit the most heinous types of offenses. Males commit the vast majority of murders and approximately one hundred percent of all rapes. Further, women re-offend less frequently and imprisoning women normally has a more harmful effect on their dependents than does incarcerating men. Women suffer more while in prison. Female inmates have higher rates of mental illness and are more likely to be sexually assaulted while in prison than men. A staggering high level of female offenders have also been the subject of child sexual abuse, making it more likely that they will commit crime. Yet we still have vast and expensive institutions, in the form of prisons, exclusively established for the sole purpose of imprisoning women. It is a categorical policy disfigurement that women in their hundreds of thousands are subjected to the oppressive sanction regime that should be reserved for criminals who commit the most serious of deprived acts. In this Article we propose a fundamental change to the manner in which women are dealt with by the criminal justice system. The default position is that no woman should be imprisoned. The number of female prisoners and prisons should be massively reduced. Most female inmates would not be imprisoned in the first place pursuant to a fair and efficient sentencing system. Many female inmates could be dealt with by less harmful and expensive sanctions, such as probation and fines. Implementation of these reforms would have no adverse impact on community safety. It will enhance the normative integrity of the criminal justice system and greatly reduce the fiscal burden of the sentencing system to the taxpayer. The fact that women behave differently when it comes to crime and gender difference in sentencing has been the subject of previous analysis. This Article adds to the literature because it proposes concrete reforms which will dramatically reduce women prison numbers. The approach in this Article is also novel because it extrapolates the normative and empirical rationales justifying less serve penalties for female offenders to male offenders, resulting in recommendations which will also considerably reduce male imprisonment numbers.

Details: Geelong, Australia: Deakin Law School, 2016. 47p.

Source: Internet Resource: Deakin Law School Legal Studies Research Paper Series Paper no. 16-16: Accessed May 18, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2773341

Year: 2016

Country: International

Keywords: Female Inmates

Shelf Number: 139066


Author: Global Initiative Against Transnational Organized Crime

Title: Understanding Illicit Trade: Impact of Human Trafficking and Smuggling on the Private Sector

Summary: Around the globe, an estimated 20.9 million people are in situations of so-called modern day slavery, or forced labour, at any point of time. Many of these victims are trafficked within their country or across borders. Considering this number, there is an urgent need to improve our understanding of criminal activities in the area of human trafficking and exploitation, the difficulties to track perpetrators and protect victims. The individual criminals and complex networks behind different forms of trafficking and exploitation as well as the high level of profits connected to their illicit activities stress the need to consider human trafficking and exploitation in terms of transnational organised crime. Drawn from a series of webinars hosted by the Global Initiative and Babson College in 2014-15, this report highlights emerging human trafficking challenges and identifies promising anti-trafficking initiatives from the private sector. Each chapter of the report covers one of five key areas of human trafficking: - Migrant workers in the USA and their vulnerability to labour exploitation - Online sexual exploitation of children and recent technological developments in detecting this form of crime - Human trafficking in football, particularly in the area of recruitment of young athletes - Labour exploitation and the construction industry, using the example of the kafala system in the Gulf countries to highlight flawed national regulation putting migrant works at risk of being trafficked and exploited - Responding to the global black market in illicit organs and the intrinsic role the private sector has played in enabling this illicit business Whilst each chapter clearly shows the organised criminal networks behind the different forms of trafficking and exploitation, there are significant differences in the types of crimes and their individual complexities. It is, therefore, crucial to deepen the research into each of the areas and to develop individual responses and strategies private sectors can apply to counter criminal networks across the globe. The report finds that the private sector needs to play a stronger role in ensuring ethical and fair practices, and to contribute its unique knowledge and expertise to help in the fight against human trafficking. Overall, he private sector is an increasingly important actor in enabling as well as in combating the different aspects of human trafficking.

Details: Geneva, SWIT: The Initiative, 2016. 52p.

Source: Internet Resource: Accessed May 18, 2016 at: http://www.globalinitiative.net/download/global-initiative/Understanding%20Illicit%20Trade_06.05.16(1).pdf

Year: 2016

Country: International

Keywords: Forced Labor

Shelf Number: 139069


Author: Leenaars, Jan

Title: Understanding Lone Wolves: Towards a Theoretical Framework for Comparative Analysis

Summary: Lone wolf terrorists have long been a troublesome issue for policymakers and intelligence agencies: their isolated and withdrawn nature makes it difficult to proactively gather information about their potential malicious intentions. This ICCT Report argues for the need for comparative research in order to increase our understanding of lone wolves. There is significant information available with regard to other lone actor phenomena, not directly linked to terrorism, which have been extensively researched, and can help us gain a deeper insight into particular aspects of lone wolf terrorism. This paper aims to outline an initial theoretical framework that will allow for comparisons between lone wolf terrorism and related non-terrorist lone actor phenomena, which can enable policy transfer with regard to detection, prevention and treatment.

Details: The Hague: International Centre for Counter-Terrorism, 2016.

Source: Internet Resource: Accessed May 20, 2016 at: http://icct.nl/publication/understanding-lone-wolves-towards-a-theoretical-framework-for-comparative-analysis/

Year: 2016

Country: International

Keywords: Lone Wolf Terrorism

Shelf Number: 139115


Author: Schmid, Alex P.

Title: Links between Terrorism and Migration: An Exploration

Summary: is Research Paper explores and questions some assumed causal links between terrorism on the one hand and (forced and irregular) migration on the other. The paper delves into the role that state and non-state terrorism might have in causing migration as well as analysing if and how refugees' camps and the diaspora community might be a target for radicalisation. One of the findings of the paper is how migration control for the control of terrorism is a widely used instrument; however, it might hurt bona fide migrants and legal foreign residents more than mala fide terrorists. Finally, this Research Paper offers recommendations that can go some way towards disentangling the issues of (refugee) migration and terrorism.

Details: The Hague: International Centre for Counter-Terrorism, 2016.

Source: Internet Resource: Accessed May 20, 2016 at: http://icct.nl/publication/links-between-terrorism-and-migration-an-exploration/

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 139116


Author: Hawken, Angela

Title: Offenders on the Move: Global Study on Sexual Exploitation of Children in Travel and Tourism

Summary: More children are at risk of sexual exploitation than ever before, particularly in travel and tourism, a two-year global study by ECPAT has revealed. The report, entitled Offenders on the Move: Global Study on Sexual Exploitation of Children in Travel and Tourism 2016, has found that an increase in global tourism and improved accessibility of information technology have escalated the threat of sexual exploitation in every country in the world. Children in the UK and Europe, long seen as source countries for travelling child sex offenders, have also experienced an increased risk of sexual abuse by foreign and in-country travelling offenders. The study cites more than 60 reports from around the world on regional trends and institutional responses, building one of the most comprehensive analyses of sexual exploitation of children in travel and tourism. It notes that persistent power imbalances, corporate travel culture, community-based tourism, weak child protection commitments and institutional silence have fuelled the risks posed to children by travelling offenders, whether "situational" or "preferential".

Details: Bangkok, Thailand: ECPAT International, 2016. 154p.

Source: Internet Resource: Accessed May 20, 2016 at: http://www.ecpatusa.org/wp-content/uploads/2016/05/Global-Report-Offenders-on-the-Move-Final.pdf

Year: 2016

Country: International

Keywords: Child Prostitution

Shelf Number: 139120


Author: Beaulieu, Catherine

Title: Global Study on Sexual Exploitation of Children in Travel and Tourism. Regional Report: North America

Summary: The travel and tourism industry plays an important role in the region's economies, contributing CA$84.3 billion (4.5%) to Canada's GDP; in the U.S the industry yielded around US$2.16 trillion. In 2013 Americans spent US$748 billion on domestic travel, a figure expected to reach US$903 billion by 2017. A main concern in relation to SECTT is the extensive infrastructure available (multiple lodging and transportation alternatives), providing an enabling environment for travelling child sex offenders (TCSOs), including foreign tourists and domestic travellers. Both countries "send" TCSOs, particularly to Latin America and the Caribbean, and appear to also be becoming destinations: TCSOs from Europe have been identified in both countries. Both foreign TCSOs in the region and North Americans abroad abuse positions as teachers, volunteers or humanitarian workers and engage in volun-tourism to find victims. American and Canadian offenders have victimised children in orphanages in countries as diverse as Cambodia, Haiti, Honduras, Kenya and Nepal.

Details: Bangkok, Thailand: ECPAT International, 2016. 76p.

Source: Internet Resource: Accessed May 20, 2016 at: http://www.ecpatusa.org/wp-content/uploads/2016/05/Regional-Report-North-America.pdf

Year: 2016

Country: International

Keywords: Child Prostitution

Shelf Number: 139121


Author: U.S. Government Accountability Office

Title: Female Genital Mutilation/Cutting: U.S. Assistance to Combat This Harmful Practice Abroad Is Limited

Summary: More than 200 million girls and women alive today have undergone FGM/C in the 30 countries where available data show this harmful practice is concentrated. More than 3 million girls are estimated to be at risk for FGM/C annually in Africa. FGM/C comprises all procedures that involve partial or total removal of the external female genitalia, or other injury to the female genital organs. It is rooted in the cultural traditions of many communities but has several adverse health consequences and the UN identifies it as a violation of human rights. In 2015, the UN General Assembly adopted a set of 17 Sustainable Development Goals for 2030 that included the elimination of FGM/C among its targets. UNFPA and UNICEF implement the Joint Program on FGM/C in 17 countries-the largest current international assistance effort to address FGM/C. State and USAID include FGM/C as part of their global strategy to respond to gender-based violence. GAO was asked to review State's and USAID's efforts to address FGM/C abroad. This report (1) summarizes findings from recent U.S. and UN studies about factors contributing to FGM/C and approaches to addressing this practice and (2) examines State's and USAID's current efforts to address FGM/C abroad. GAO reviewed recent UN and USAID studies on assistance efforts to address FGM/C, analyzed related strategies and policies, and interviewed State and USAID officials. GAO also analyzed information on FGM/C-related projects and activities from USAID's overseas missions, and State and USAID bureaus. GAO is making no recommendations in this report.

Details: Washington, DC: GAO, 2016. 44p.

Source: Internet Resource: GAO-16-485: Accessed May 25, 2016 at: http://www.gao.gov/assets/680/676833.pdf

Year: 2016

Country: International

Keywords: Female Cutting

Shelf Number: 139151


Author: Winter, Charlie

Title: An Integrated Approach to Islamic State Recruitment

Summary: Today, Jihadism is at once more globalised and closer to home than ever before. In seeking to explore how Islamic State has been able to attract tens of thousands of fighters from as many as 86 states across the world, the media limelight has shone brightly on stories like that of Australian Jake Bilardi, but nuanced understanding of recruitment is routinely sacrificed.

Details: Barton, ACT, AUS: Australian Strategic Policy Institute Limited, 2016. 20p.

Source: Internet Resource: Special Report: Accessed May 26, 2016 at: https://www.aspi.org.au/publications/an-integrated-approach-to-islamic-state-recruitment/SR88_IS-recruitment.pdf

Year: 2016

Country: International

Keywords: Islamic State

Shelf Number: 139221


Author: United Nations Office on Drugs and Crime (UNODC)

Title: World Wildlife Crime Report: Trafficking in protected species

Summary: Key outcomes of the research ---- Wildlife trafficking involves many distinct markets, each with its own drivers and dynamics. This report focuses on eight case studies, involving some of the largest illegal flows, with an eye to the commonalities and differences between them. ---- Some illegally traded forms of wildlife feed primarily into illegal retail markets, such as ivory; others, such as rosewood, are mainly retailed though legal outlets, despite their illegal origin. ---- Case studies show that when illegally traded wildlife is introduced into legal commercial streams, criminals have access to a much larger source of demand than they would have had on the black market alone. ---- There are millions of species for which international trade is not regulated, and certain cases reviewed for this report suggest that these species can be legally traded internationally, even when harvested or exported contrary to national law. ---- Similar to other sensitive products such as firearms, pharmaceuticals, or antiquities, protected species can be legally traded internationally if accompanied by the appropriate paperwork; permits for around 900,000 legal shipments of protected wildlife products are issued annually, and case studies show that permits acquired through forgery, fraud or corruption have been used to traffic wildlife. ---- Seizure data show that most enforcement activities to combat international wildlife trafficking take place at ports of entry, rather than in domestic markets, and thus customs agents form the front line of enforcement in many parts of the world. ---- Cases reviewed for this report indicate that informal harvesting practices can allow internationally protected wildlife to be illegally introduced into commercial streams before being legally exported. ---- Case studies suggest that some wildlife farms, captive breeding operations, or even zoos may play a role in laundering illegally acquired wildlife. ---- Some high value species reviewed for this report appear to have become the object of speculation, where price becomes detached from retail demand, complicating generalised demand reduction campaigns. ---- Volatility affects some key wildlife commodities, making it extremely difficult to calculate the criminal revenues associated with wildlife trafficking as a whole.

Details: New York: UNODC, 2016. 100p.

Source: Internet Resource: Accessed May 27, 2016 at: https://www.unodc.org/documents/data-and-analysis/wildlife/World_Wildlife_Crime_Report_2016_final.pdf

Year: 2016

Country: International

Keywords: Illegal Markets

Shelf Number: 139235


Author: Riggio, Eliana

Title: Power, Impunity and Anonymity: Understanding the forces driving the demand for sexual exploitation of children

Summary: Nearly twenty years ago, when the First World Congress against the Commercial Sexual Exploitation of Children was held in Stockholm, Sweden (August 1996), the problem of sexual exploitation of children (SEC) facing the international community was imputed to a discrete and well characterised group of offenders: profiled as being mainly men; travelling from Western to developing countries; perceived as affected by forms of psychosexual disorders, such as paedophilia; or displaying other pathologically transgressive behaviours. In the short span of only two decades, SEC has exploded to acquire planetary dimensions, with virtually no region, country or social group, age or sexual inclination being spared by a scourge now recognised as one of the most severe and widespread forms of violence against children. As noted with reference to SEC-related analysis in a report of the UN Special Rapporteur on the sale of children, child prostitution and child pornography, "the research results exemplify problems that exist in all parts of the world." Today, approaching children for illicit purposes is a highly profitable domestic and international operation, organised on the global market, progressively brokered on the Internet, and supported by powerful criminal networks and businesses. Power imbalance between vulnerable children and abusive adults, impunity and anonymity emerge as the key forces driving the demand for sexual exploitation of children in the rising globalised sex market. While the organisation of the market is global, the demand for SEC is not only international, but also local. In addition to being created by unrelenting flows of travelling perpetrators, demand continues to be generated by local offenders everywhere, as in the case of individuals frequenting commercial sex or entertainment venues where children are available on the fringes, or men buying sex services from children living on the streets in their towns. New information and communication technologies (ICT) appear to be providing unprecedented opportunities to elude controls. In parallel to a stream of people on the move to seek children for sexual exploitation in distant locations, often, circumventing travel agents by booking travel and accommodation online, offenders reach out to their victims via mobile phone and online channels, which distort identities and protect anonymity. As understanding of the demand has deepened, it has become clear that those who engage directly in sexual exploitation of children can be anyone, an indistinct group of offenders that can go largely unnoticed. No longer formed by isolated cases of paedophiles, brutal transgressors, or perpetrators that are completely unknown to the child, demand for SEC may be generated by individuals acting in the circle of trust - a professional, a parent, an educator - making investigation and prosecution even more daunting. It has also been increasingly acknowledged, particularly by civil society organisations and in academic circles, that any strategy aimed to reduce the demand for SEC must necessarily address the complexity of socio-cultural, economic, and political factors that underpin its perpetuation.

Details: Bangkok, Thailand: ECPAT International, 2016. 130p.

Source: Internet Resource: Accessed May 27, 2016 at: http://www.ecpat.org/wp-content/uploads/legacy/PowerImpunityandAnonymity.pdf

Year: 2016

Country: International

Keywords: Child Prostitution

Shelf Number: 139237


Author: Katz, Ilan

Title: Modernising Child Protection in New Zealand: Learning from system reforms in other jurisdictions

Summary: Child maltreatment and the provision of effective child care and protection services are a topical issue worldwide. Child care and protection services are focused on responding to increasing demand and pressure on the system, and improving the outcomes of children in care. To address these issues, child care and protection services have undergone recent reforms that have changed their focus, function and delivery. This report was prepared by the University of New South Wales Social Policy Research Centre and has been written specifically for the Modernising Child, Youth and Family Expert Panel. The Panel is reviewing the focus and operations of Child, Youth and Family (CYF) to achieve better outcomes for vulnerable children, young people and families. The report captures a snapshot of child care and protection services in other jurisdictions and highlights their challenges and actions taken. Other jurisdictions included in the report are Australia (New South Wales), England, the United States, Canada (Ontario) and Norway. These jurisdictions were selected as being similar to New Zealand in their basic approach to child protection. The report also includes one jurisdiction (Norway) which offers a contrasting approach. This report is based on a search of peer-reviewed and 'grey' literature.

Details: Wellington: Social Policy Evaluation and Research Unit, 2016. 57p.

Source: Internet Resource: Accessed May 31, 2016 at: http://www.superu.govt.nz/sites/default/files/Modernising%20Child%20Protection%20report.pdf

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 139243


Author: Miller, Jackson

Title: Species of Crime: Typologies and Risk Metrics for Wildlife Trafficking

Summary: The recognition of wildlife crime as a global transnational crime threat has taken on new urgency since President Obama's 2013 Executive Order on Combating Wildlife Trafficking. Meanwhile, private transportation logistics and financial services companies have independently expressed concern due to their potential exposure to wildlife and environmental transnational organized crime (TOC) activity, and also a desire to take action. A key impediment to addressing their concerns has been a lack of information on both the types of supply chain abuse that may occur and the types of wildlife criminal networks that may be operating. Such information may help refine and strengthen compliance controls to ensure that funds and services reach their intended beneficiaries. This paper begins to address this need by: 1. Outlining context; 2. Identifying red flag indicators, high-risk jurisdictions and container profiles; 3. Providing typologies with examples of wildlife TOC network activity. We intend for our research to launch a more robust examination of wildlife TOC activity. We hope our efforts may begin to bridge a critical knowledge gap by disseminating information to help African and East Asian - linked private - sector transport and payments businesses better monitor their risk. We also recommend that organizations review the US Federal Government's "Implementation Plan" for the National Strategy on Wildlife Trafficking, along with the Yearly Typologies Reports released by Asia/Pacific Group on Money Laundering.

Details: Washington, DC: C4ADS, 2015. 24p.

Source: Internet Resource: Accessed June 1, 2016 at: http://ejfphilanthropies.org/wp-content/uploads/2016/01/species-of-crim.pdf

Year: 2015

Country: International

Keywords: Criminal Networks

Shelf Number: 139269


Author: International Rhino Coalition

Title: Assessing the Risks of Rhino Horn Trade

Summary: INTRODUCTION: In April 2014 economists, conservationists, researchers, consumer state representatives and wildlife law consultants from around the world gathered in Pretoria to discuss the risks or rhino horn trade in South Africa. This report is a summary of their presentations. Topics include the impact of a legal ivory trade on Africa's elephant population, wildlife trade management in Vietnam and the work of WildAid in consumer states to name a few.

Details: Cape Town, South Africa: Conservation Action Trust, 2014. 85p.

Source: Internet Resource: A Journal of Arguments Presented at the April 2014 Conference in South Africa: Accessed June 1, 2016 at: http://conservationaction.co.za/wp-content/uploads/2014/06/Assessing-the-risks-of-the-rhino-horn-trade.pdf

Year: 2014

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 139270


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Practical Assistance Tool to assist in the implementation of the International Guidelines for Crime Prevention and Criminal Justice Responses with Respect to Trafficking in Cultural Property and Other Related Offences

Summary: Pursuant to General Assembly resolutions 66/180 and 68/186 and Economic and Social Council resolution 2010/19, draft guidelines were developed by the United Nations Office on Drugs and Crime (UNODC) in consultation with Member States and in close cooperation, as appropriate, with the United Nations Educational, Scientific and Cultural Organization (UNESCO), the International Criminal Police Organization (INTERPOL) and other competent international organizations. The International Guidelines for Crime Prevention and Criminal Justice Responses with Respect to Trafficking in Cultural Property and Other Related Offences were adopted by the General Assembly in its resolution 69/196, on 18 December 2014. The Guidelines are based on crime prevention and criminal justice aspects of protection against trafficking in cultural property, taking into consideration a review of current practices and initiatives in several countries in addressing the problem of trafficking in cultural property, as well as principles and norms arising from the analysis of the following international legal instruments: the Convention on the Means of Prohibiting and Preventing the Illicit Import, Export and Transfer of Ownership of Cultural Property; the Convention on Stolen or Illegally Exported Cultural Objects, adopted by the International Institute for the Unification of Private Law; the Convention on the Protection of the Underwater Cultural Heritage; the United Nations Convention against Transnational Organized Crime; the United Nations Convention against Corruption; the Convention for the Protection of Cultural Property in the Event of Armed Conflict6 and its First and Second Protocols; and the Protocol additional to the Geneva Conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts. As indicated in General Assembly resolution 69/196, the Guidelines are non-binding and available to Member States for their consideration in the development and strengthening of crime prevention and criminal justice policies, strategies, legislation and cooperation mechanisms to prevent and combat trafficking in cultural property and related offences in all situations. The Guidelines serve as a reference for national policymakers and as a tool for capacity-building in the area of crime prevention and criminal justice responses to trafficking in cultural property and related offences, in coordination with UNESCO and other competent international organizations, as appropriate. In its resolution 69/196, the General Assembly requested UNODC, where appropriate, in consultation with Member States, to develop a practical assistance tool to assist in the implementation of the Guidelines, taking into consideration the technical background document developed for the elaboration of the Guidelines9 and the comments made by Member States. Accordingly, the present practical assistance tool was developed with the aim of assisting States in the implementation of the Guidelines. It is designed for use by relevant national authorities, law enforcement authorities, practitioners and policymakers working in the field of cultural property. Proposals for the practical implementation of some Guidelines may also be relevant to individuals and legal persons working in the licit art market and related areas. The practical assistance tool is non-binding and is meant to be used in a manner consistent with relevant international and national law.

Details: Vienna: UNODC, 2016. 132p.

Source: Internet Resource: Accessed June 7, 2016 at: https://www.unodc.org/documents/organized-crime/trafficking_in_cultural/16-01842_ebook.pdf

Year: 2016

Country: International

Keywords: Armed Conflicts

Shelf Number: 139289


Author: Rucevska, Ivea

Title: Waste Crime -- Waste Risks: Gaps in Meeting the Global Waste Challenge

Summary: A staggering 1.3 billion tonnes of food is produced each year to feed the world's 7 billion people. Yet, according to the Food and Agriculture Organization (FAO), around US$1 trillion of that food goes to waste. With 200,000 new people added every day, the world can ill afford to waste such a massive amount of food. Global waste, however, does not stop at food. Consumers are increasingly buying products that are wrapped in plastics and paper. Much of this packaging - and eventually the products themselves - will end up in landfills. This trend has both health and environmental consequences, especially given the rapid rise of hazardous waste such as electronics. Innovative solutions to combat "e-waste" are emerging. Recovering valuable metals and other resources locked inside electronic products, for example, can reduce e-waste. Not only can recycling reduce pressure on the environment, it can also create jobs and generate income. Indeed, the global waste market sector - from collection to recycling - is estimated to be US$410 billion a year, excluding a very large informal sector. As with any large economic sector, however, there are opportunities for illegal activities at various stages of the waste chain. In the rush for profits, operators may ignore waste regulations and expose people to toxic chemicals. On a larger scale, organized crime may engage in tax fraud and money laundering. About 41.8 million metric tonnes of e-waste was generated in 2014 and partly handled informally, including illegally. This could amount to as much as USD 18.8 billion annually. Without sustainable management, monitoring and good governance of e-waste, illegal activities may only increase, undermining attempts to protect health and the environment, as well as to generate legitimate employment. The evolution of crime, even transnational organized crime, in the waste sector is a significant threat. Whether the crime is associated with direct dumping or unsafe waste management, it is creating multi-faceted consequences that must be addressed.

Details: United Nations Environment Programme and GRID-Arendal, Nairobi and Arendal, www.grida.no, 2015. 68p.

Source: Internet Resource: UNEP Rapid Response Assessment: Accessed June 7, 2016 at: http://www.unep.org/delc/Portals/119/publications/rra-wastecrime.pdf

Year: 2015

Country: International

Keywords: Electronic Waste

Shelf Number: 139301


Author: Nellemann, C.

Title: The Rise of Environmental Crime: A Growing Threat to Natural Resources, Peace, Development and Security

Summary: The slaughter of elephants and rhinos has raised awareness of the illegal trade in wildlife. We are facing mass extinctions and countries are losing iconic wildlife species. However, the scope and spectrum of this illegal trade has widened. Criminals now include in their trafficking portfolios waste, chemicals, ozone depleting substances, illegally caught seafood, timber and other forest products, as well as conflict minerals, including gold and diamonds. The growth rate of these crimes is astonishing. The report that follows reveals for the first time that this new area of criminality has diversified and skyrocketed to become the world's fourth largest crime sector in a few decades, growing at 2-3 times the pace of the global economy. INTERPOL and UNEP now estimate that natural resources worth as much as USD 91 billion to USD 258 billion annually are being stolen by criminals, depriving countries of future revenues and development opportunities. Environmental crime has impacts beyond those posed by regular criminality. It increases the fragility of an already brittle planet. The resulting vast losses to our planet rob future generations of wealth, health and wellbeing on an unprecedented scale. They also compromise our ability to achieve the Sustainable Development Goals. An additional by-product of environmental crime is that it undermines peace. It is not surprising that the UN Security Council has recognized the serious threat to security posed by environmental crime, with UN reports pointing to armed groups and potentially even terrorists sustained through the spoils of this rising criminal industry. However, an enhanced law enforcement response can help address this worrying trend. There are significant examples worldwide of cross-sectoral efforts working to crack down on environmental crime and successfully restore wildlife, forests and ecosystems. Such collaboration, sharing and joining of efforts within and across borders, whether formal or informal, is our strongest weapon in fighting environmental crime. But to meet the scale of this threat, a broad-ranging, targeted effort must be put forward so that peace and sustainable development can prevail.

Details: United Nations Environment Programme and RHIPTO Rapid Response–Norwegian Center for Global Analyses, 2016. 108P. www.rhipto.org

Source: Internet Resource: A UNEPINTERPOL Rapid Response Assessment; Accessed June 7, 2016 at: http://unep.org/documents/itw/environmental_crimes.pdf

Year: 2016

Country: International

Keywords: Conflict Minerals

Shelf Number: 139302


Author: United Nations High Commissioner for Human Rights

Title: Beyond Detention: A Global Strategy to support governments to end the detention of asylum-seekers and refugees

Summary: Putting people in detention has become a routine - rather than exceptional - response to the irregular entry or stay of asylum-seekers and migrants1 in a number of countries. Some governments view detention as a means to dissuade irregular migration to or applying for asylum in their territories. While acknowledging that irregular entry or stay may present many challenges to States, detention is not the answer. Research in fact shows that not even the most stringent detention policies deter irregular migration, and further, that there are workable alternatives to detention that can achieve governmental objectives of security, public order and the efficient processing of asylum applications. Importantly, as seeking asylum is not an unlawful act, detaining asylum-seekers for the sole reason of having entered without prior authorisation runs counter to international law. Under international law, individuals have the right to seek asylum, and if they do so, to be treated humanely and with dignity. Access to open reception arrangements and fair and efficient status determination procedures need to be part of the overall State architecture. Detention also has many negative lasting effects on individuals. It undermines their human dignity and can cause unnecessary suffering, with serious consequences for their health and wellbeing, in particular when they are detained for long periods. Detention increases anxiety, fear and frustrations and can exacerbate past traumatic experiences. It takes place, frequently, in places and in conditions that do not meet human rights standards. Detention of children is particularly serious due to the devastating effect it may have on their physical, emotional and psychological development, even if they are not separated from their families. Children should, in principle, not be detained at all. Detention removes asylum-seekers from the community, which is sometimes the goal, inhibiting opportunities to benefit from existing support networks (both formal and informal), and diminishing people's capacity to be independent, self-sufficient and fulfilled members of the community after release. All these factors are further aggravated by the uncertainty about its duration and outcome.

Details: Geneva, SWIT: UNHCR, 2014. 26p.

Source: Internet Resource: Accessed June 7, 2016 at: http://www.unhcr.org/53aa929f6.pdf

Year: 2014

Country: International

Keywords: Asylum Seekers

Shelf Number: 139306


Author: Amnesty International

Title: Sex Workers at Risk: A Research Summary on Human Rights Abuses Against Sex Workers

Summary: In recognition of the high rates of human rights abuses experienced globally by individuals who engage in adult consensual sex work, Amnesty International initiated in 2013 a global consultation for a new policy focussed on protecting sex workers from such abuses and violations. In addition to desk-based research into studies from around the world, new primary research was conducted, primarily focused on the human rights impact of criminalizing sex work: The City of Buenos Aires (Argentina); Hong Kong SAR (China); Oslo (Norway); and Papua New Guinea. This summary report provides an overview of the key research findings, highlighting the range and extent of human rights abuses and violations suffered by sex workers. It shows how sex workers face stigma and marginalization, physical and sexual violence, barriers to protection from violence and crime, extortion and coercive police measures, and obstacles to securing their rights to health and housing. The summary report also provides a brief outline of Amnesty International's policy and identifies a range of government actions it believes are necessary to best address the barriers that sex workers routinely face in realizing their rights.

Details: London: AI, 2016. 25p.

Source: Internet Resource: Accessed June 8, 2016 at: http://www.amnestyusa.org/sites/default/files/briefing_-_sex_workers_rights_-_embargoed_-_final.pdf

Year: 2016

Country: International

Keywords: Human Rights Abuses

Shelf Number: 139324


Author: Biggs, Duan

Title: Engaging local communities in tackling illegal wildlife trade: Can a 'Theory of Change' help?

Summary: Recent alarming rises in illegal wildlife trade (IWT) show that tough law enforcement is not enough to stop poachers devastating populations of iconic or endangered species. Local people must be empowered to benefit from conservation and be supported to partner with law enforcement agencies in the fight against wildlife crime. Here we present a 'Theory of Change' for understanding how community-level interventions can help in tackling IWT.

Details: London: International Institute for Environment and Development, 2015. 27p.

Source: Internet Resource: Discussion Paper: Accessed June 8, 2016 at: http://pubs.iied.org/pdfs/14656IIED.pdf

Year: 2015

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 139334


Author: Allan, Harriet

Title: Drivers of Violent Extremism: Hypotheses and Literature Review

Summary: Violent extremism is multi-factorial and extremely diverse: it cannot be predicted by one variable alone. For violent extremist movements to develop, and for individuals to join them, requires an alignment of situational, social/cultural, and individual factors. It is useful to conceptualise these factors in three levels, with situational factors working at the macro level (i.e. country or community-wide), social/cultural at the meso-level (i.e. affecting smaller communities or identity groups), and individual factors at the micro level. Interventions can also be conceptualised using a three-tier model, with development working at the macro level, countering violent extremism (CVE) at the meso-level, and law enforcement and specialist interventions at the micro level. While the effect of political factors - governance deficit, state failure, and grievances - is significant, social/psychological factors concerning group and individual identity are also recognised as important. Although the evidence is mixed, on balance the literature shows that blocked participation can create grievances which may be harnessed to promote extremist violence. Civil society may be crucial in countering extremism. However, under oppression some organisations may also be drawn to violent responses. Religion and ethnicity have been recognised as powerful expressions of individual and group identity. There is robust evidence that radicalisation is a social process and that identity is a key factor in why individuals become involved in violent movements. Psychological research is beginning to examine how identity formation can become 'maladaptive' and whether certain cognitive 'propensities' can combine to create a 'mindset' that presents a higher risk. Although most violent extremists are young men, there is little convincing research to suggest that ideals of masculinity and honour play a significant role in causing violent extremism. More generally, gender issues do not appear to be significant. Education has a minor and/or largely unsubstantiated influence, and there is little evidence that certain types of education (e.g. faith-based) increase the risk of radicalisation, and research shows that the problem of madrassa-based radicalisation has been significantly overstated. Indeed, some research suggests that religious training can be a protective factor. The findings on the relationship between education, employment, poverty and radicalisation are mixed. However, in a departure from earlier studies which identified the absence of any causal or statistical relationship between poverty and transnational terrorism, this study recognises the relevance of economic factors in the context of broad-based violent extremist groups. In conflict situations involving violent extremist groups (as opposed to terrorism directed against the West), socio-economic discrimination and marginalisation do appear to partly explain why extremist groups are able to recruit support in large numbers. However, because poverty may be a side-effect of some other cause, it is not possible to isolate it as a cause of violent extremism. In a number of contexts, extremist groups have proven able to deliver services through which they gain support and legitimacy. While the failure of the state to provide security and justice may not be a necessary factor in the development of violent extremism, failed and failing states are often breeding grounds for extremist activity. The perceived victimisation of fellow Muslims can be instrumentalised by leaders of Islamist violent extremist groups as a justification for extremist violence, although the use of a narrative of oppression to justify violence and recruit and motivate supporters is near-universal among violent extremist groups.

Details: London: Royal United Services Institute, 2015. 65p.

Source: Internet Resource: Accessed June 9, 2016 at: http://r4d.dfid.gov.uk/pdf/outputs/Misc_Gov/Drivers_of_Radicalisation_Literature_Review.pdf

Year: 2015

Country: International

Keywords: Extremist Groups

Shelf Number: 139347


Author: Mercy Corps

Title: Youth and Consequences: unemployment, Injustice and Violence

Summary: Every year, Western donors deploy vast sums of development assistance to dampen the appeal, among the world's youth, of militias, pirates and terrorists. But guided by little in the way of empirical evidence, it is an enterprise plagued by unclear payoffs and unintended consequences. At the heart of these efforts are economic development programs. Vocational training for youth, for instance, is a favorite of donors and NGOs alike. Such efforts are informed by a widely held assumption: that idle young people, lacking licit opportunities to make a living, are a ready pool of recruits for armed movements. There is just one problem with this narrative. It does not appear to be true. Mercy Corps' research contributes to a growing body of evidence that finds no relationship between joblessness and a young person's willingness to engage in, or support, political violence. Drawing on interviews and surveys with youth in Afghanistan, Colombia and Somalia, we find the principal drivers of political violence are rooted not in poverty, but in experiences of injustice: discrimination, corruption and abuse by security forces. For many youth, narratives of grievance are animated by the shortcomings of the state itself, which is weak, venal or violent. Or all three. Young people take up the gun not because they are poor, but because they are angry. In light of this, many prevailing development approaches are unlikely, in isolation, to make youth more peaceful. Indeed, they may make matters worse. Supply-side vocational training projects, not linked to meaningful employment in the marketplace, risk raising expectations that cannot be satisfied. And where programs fail to target the most marginalized - as many do - or have been manipulated by local elites, they may aggravate perceptions of unfairness. Empowering disenfranchised young people would seem to be the remedy. Yet, from a peace-building perspective, civic engagement programs yield unpredictable dividends. When not paired with meaningful governance reforms, such programs may simply stoke youth frustrations with exclusive, elder-dominated formal institutions. This may explain why we found civically engaged youth to be more supportive of armed opposition groups, not less. Confident, outspoken and politically conscious young people, it turns out, are not the types to sit quietly by when the society around them disappoints.

Details: Portland, OR: MercyCorps,2015. 20p.

Source: Internet Resource: Accessed June 9, 2016 at: https://www.mercycorps.org/sites/default/files/MercyCorps_YouthConsequencesReport_2015.pdf

Year: 2015

Country: International

Keywords: At-risk Youth

Shelf Number: 139348


Author: Baker, Jo

Title: Conditions for Women in Detention: Needs, vulnerabilities and good practices

Summary: While all human beings are vulnerable when deprived of their liberty, certain groups are at particular risk. For women, the discrimination that they face in broader society reaches deep into places of detention such as prisons, which are largely still designed and managed for men, by men. As a minority - although a growing one in many counties - detained women are often overlooked at the expense of their dignity, wellbeing and human rights. Yet, as now well established in international law, women's specific needs require different and sometimes greater attention in order for women to enjoy their rights equally to men. As particularly well established in the recently adopted UN Rules for the Treatment of Women Prisoners and Non-custodial Measures for Women Offenders (Bangkok Rules) there are concrete ways in which this must be done. This study focuses on conditions for women in detention, and works by theme, from physical conditions and provisions, to areas such as health, safety and work. For each, DIGNITY presents the level of protection that has developed for detained women in international standards, and determines whether this has been well reflected in the jurisprudence of four major UN human rights treaty bodies in the past six years (2008-13). Dignity has intertwined this review with empirical research in women's prisons in five very different countries, with emphasis on the voices of inmates themselves. During in-depth, private conversations, we have asked detained women, what matters most to you? This research was conducted in Albania, Jordan, Guatemala, the Philippines, and Zambia in 2013 and early 2014, among almost 90 detained or formerly detained women in 11 facilities, and more than 80 prison staff and others working with detained populations, from NGOs staff to lawyers and social workers.

Details: Copenhagen: Danish Institute Against Torture (DIGNITY), 2014. 131p.

Source: Internet Resource: DIGNITY Publication Series, Study No. 7: Accessed June 10, 2016 at: https://dignityinstitute.org/media/2065759/pubseriesno7_wid_final_0814.pdf

Year: 2014

Country: International

Keywords: Female Inmates

Shelf Number: 139362


Author: Ernst & Young

Title: Counterfeiting, piracy and smuggling: Growing threat to national security

Summary: The report, titled, "Counterfeiting, piracy and smuggling: Growing threat to national security", highlights the drivers of financing of terrorism and how activities such as counterfeiting, piracy and smuggling have become channel for sustaining criminal and terrorist activities. It analyzes and provides insight into the links between counterfeiting, smuggling and financing of terrorism.

Details: London: Ernst & Young, 2013. 40p.

Source: Internet Resource: Accessed June 10, 2016 at: http://www.ey.com/Publication/vwLUAssets/EY-Government-and-Public-Sector-Growing-threat-to-national-security-an-analysis/$File/EY-Counterfeiting-piracy-and-smuggling-Growing-threat-to-national-security.pdf

Year: 2013

Country: International

Keywords: Counterfeiting

Shelf Number: 139366


Author: United Nations Interregional Crime and Justice Research Institute (UNICRI)

Title: Counterfeit Medicines and Organised Crime

Summary: Counterfeit medicines are among the counterfeit products with the greatest potential for harming the health of consumers. The production of pharmaceuticals is heavily regulated in order to ensure product compliance with the highest quality and safety standards. All drugs must undergo clinical trials before being marketed in order to test their efficiency, verify their quality and exclude the potential existence of side effects on patients. These institutional and technical measures are meant to work as a safety valve to guarantee the quality of medicines. Counterfeit products do not respect any of these regulations and requirements. Despite the existence of controls, counterfeit products exist in the market, creating consequences ranging from ineffective therapeutic results to severe health problems or death. Before considering the various elements of the problem, the term "counterfeit drug" The meaning associated with "counterfeit medicines" may also incorporate other cases that -- for various reasons -- are ascribable to the adulteration/replication of a product and/or tampering of the packaging: - products containing the same active ingredients and the same excipients of the original pharmaceutical agent and that are correctly packaged and labelled but which have been illegally imported into a country; - products containing the same ingredients of the genuine medicine and with genuine packaging but which contain incorrect amounts of ingredients; - products which -- despite being identical from an external point of view and have genuine packaging -- do not contain any active ingredient; - products externally similar to the originals and with genuine packaging but that contain harmful substances instead of the correct active ingredients; - products with counterfeit packaging and correct amounts of active ingredients; - products with counterfeit packaging but with different amounts of active ingredients; - products with counterfeit packaging that contain a different active ingredient or harmful substances; - products with counterfeit packaging that do not contain active ingredients. should be defined. According to the 1992 World Health Organization (WHO) definition, a counterfeit drug is a pharmaceutical product "which is deliberately and fraudulently mislabeled with respect to identity and/or source." The WHO further clarifies that this definition applies to both branded and unbranded medicines, the so-called generics, and it includes products "with the correct ingredients or with the wrong ingredients, without active ingredients, with insufficient active ingredients or with fake packaging." This definition stresses out the adulteration, inappropriateness, illegality and by extension, the danger of these products.

Details: Turin: UNICRI, 2012. 119p.

Source: Internet Resource: Accessed June 10, 2016 at: http://www.unicri.it/topics/counterfeiting/medicines/report/Ctf_medicines_and_oc_advance_unedited2013.pdf

Year: 2012

Country: International

Keywords: Consumer Fraud

Shelf Number: 139367


Author: Hashim, Ahmed S.

Title: Cities Under Siege: Mass Casualty Urban Terrorism Assaults

Summary: Cities around the world have come under siege from a new kind of terrorism: assault by well-trained and motivated "terrorist commandos" whose primary goal is to cause as much death among civilians as possible. Such has been the case in a number of key attacks in recent years: Mumbai (2008), Nairobi (2013), and Paris (November 2015). The trio selected above for study here represent the deadliest and most extensively analysed incidents of this new type of urban terrorism. This study will address the factors behind these attacks: reasons, methods and characteristics of the attacks, the government responses, and consequences or fallout. It will also include a brief assessment of whether Singapore can be a target of a major assault by "terrorist commandos."

Details: Singapore: S. Rajaratnam School of International Studies (RSIS), 2016. 18p.

Source: Internet Resource: Policy Report: Accessed June 10, 2016 at: https://www.rsis.edu.sg/wp-content/uploads/2016/05/PR160505_Cities-under-Siege.pdf

Year: 2016

Country: International

Keywords: Terrorism

Shelf Number: 139369


Author: Khalil, James

Title: Countering Violent Extremism and Risk Reduction: A Guide to Programme Design and Evaluation

Summary: Countering violent extremism (CVE) and risk reduction (RR) provide two increasingly prominent frameworks for countering the influence of individuals and entities involved in violent extremism (VE). Widely understood to describe a range of preventative and non-coercive measures, CVE may involve, for instance, community debates on sensitive topics, media messaging, interfaith dialogues, training of state governance and security actors, and a variety of initiatives with individuals deemed to be 'at risk' of being drawn to violence, such as vocational training and mentorship programmes. While there are substantial overlaps between CVE and RR in terms of activities, and many authorities group them under the same umbrella, RR can be considered distinct because its activities more narrowly target individuals who were previously directly or indirectly involved in the production of violence, such as defectors from VE entities, or those serving sentences for terrorism-related charges. This report aims to assist policy-makers and implementers by examining approaches through which to understand the drivers of VE and the wider context in which this violence occurs. It also looks at the design of CVE and RR programmes, and outlines key issues relating to programme monitoring and evaluation. The report recommends that those involved in designing and implementing CVE and RR programmes should adopt robust classification systems for VE drivers; apply the 'results frameworks' and 'theories of change' approaches; recognise that CVE is not rebranded development programming; target 'at risk' individuals; mitigate risk without being excessively risk-averse; and explore possibilities for experimental and quasi-experimental designs.

Details: London: Royal United Services Institute for Defence and Security Studies, 2016. 45p.

Source: Internet Resource: Whitehall Report 2-16: https://rusi.org/sites/default/files/20160608_cve_and_rr.combined.online4.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 139370


Author: United Nations Environment Programme

Title: Analysis of the Environmental Impacts of Illegal Trade in Wildlife

Summary: The severity, diversity and global scale of the illegal trade in wildlife[1] and wildlife products (ITW) has been recognised at various levels of international policy making, including the UN General Assembly (UNGA), the UN Environment Assembly (UNEA), UN ECOSOC, the UN Security Council, the Commission on Crime Prevention and Criminal Justice, and most recently in the Sustainable Development Goals (SDGs), as well as various conventions, agreements and other high-level political conferences. Government leaders, the international community, and civil society have responded by defining and strengthening commitments to address ITW through a range of measures, including through the development of regional and sub-regional strategies and action plans. However, considerable gaps in the current state of knowledge about the drivers, status, and impacts of ITW hinder the effectiveness of these efforts. More robust and up-to date evidence is needed if we are to have better-informed and more effective interventions, with greater coherence at the policy and advocacy level. This analysis goes some way to addressing this need by compiling and synthesizing for the first time the evidence base on the environmental impacts of ITW across taxonomic and geographic scales. Using the best available evidence, the analysis provides a cross-section of the currently available information and thus improves the current state of knowledge of the scale and broader impacts of ITW. The most documented environmental impact directly attributed to ITW is the decline in population size of iconic target species, for example tigers, now driven to the brink of extinction as a result of growing international demand for their parts and derivatives. Poaching and illegal harvesting methods can also alter the demographic and genetic structure of species: illegal logging, for instance, has the tendency to remove the largest and most reproductively valuable trees, which consequently has negative impacts on regeneration and the gene pool of the population. The impacts of ITW on the environment go beyond the immediate detrimental effects on target species. For instance, ITW can lead to the spread of diseases and invasive species when live animals are moved across international borders. Many illegal harvest methods have limited or no selectivity and result in substantial incidental mortality of non-target species: illegal dynamite fishing, bottom trawling and use of driftnets are all prominent examples of this. The analysis also highlights the cascading ecological effects deriving from the loss of species through ITW, and the resulting deterioration of ecosystem functions and services of both global and local importance. Compelling case studies such as on the illegal production of charcoal, which has been proven to contribute to deforestation and desertification, illustrate these intertwined effects. Ultimately, the negative impacts of ITW on ecosystem functioning adversely affect rural livelihoods both in the short- and long-term, creating major barriers to indigenous peoples in sustainably managing their natural resources, undermining good governance, the rule of law and national security. It is of critical importance to strengthen the policy and institutional frameworks to combat ITW at global, regional and national levels, not only to conserve biodiversity, but also to support sustainable development. Environmental policies should provide an enabling environment for communities to be involved in wildlife governance and derive benefits from its conservation and sustainable use.

Details: Nairobi, Kenya: UNEP, 2015?. 55p.

Source: Internet Resource: Accessed June 11, 2016 at: http://www.unep.org/about/sgb/Portals/50153/UNEA/FINAL_%20UNEA2_Inf%20doc%2028.pdf

Year: 2015

Country: International

Keywords: Deforestation

Shelf Number: 139387


Author: Coolsaet, Rik

Title: 'All Radicalisation is Local': The Genesis and Drawbacks of an Elusive Concept

Summary: The concept of 'radicalisation' is now firmly entrenched at the heart of European and global counterterrorism. But 12 years after its introduction, it remains ill-defined, complex and controversial. It is thus time to assess its added value

Details: Brussels: Egmont, Royal Institute for International Relations, 2016. 48p.

Source: Internet Resource: Egmont Paper 84: Accessed June 13, 2016 at: http://egmontinstitute.be/wp-content/uploads/2016/05/ep84.pdf

Year: 2016

Country: International

Keywords: Extremism

Shelf Number: 139410


Author: Hsiang, Solomon

Title: Does Legalization Reduce Black Market Activity? Evidence from a Global Ivory Experiment and Elephant Poaching Data

Summary: Black markets are estimated to represent a fifth of global economic activity, but their response to policy is poorly understood because participants systematically hide their actions. It is widely hypothesized that relaxing trade bans in illegal goods allows legal supplies to competitively displace illegal supplies, but a richer economic theory provides more ambiguous predictions. Here we evaluate the first major global legalization experiment in an internationally banned market, where a monitoring system established before the experiment enables us to observe the behavior of illegal suppliers before and after. International trade of ivory was banned in 1989, with global elephant poaching data collected by field researchers since 2003. A one-time legal sale of ivory stocks in 2008 was designed as an experiment, but its global impact has not been evaluated. We find that international announcement of the legal ivory sale corresponds with an abrupt ~66% increase in illegal ivory production across two continents, and a possible ten-fold increase in its trend. An estimated ~71% increase in ivory smuggling out of Africa corroborates this finding, while corresponding patterns are absent from natural mortality and alternative explanatory variables. These data suggest the widely documented recent increase in elephant poaching likely originated with the legal sale. More generally, these results suggest that changes to producer costs and/or consumer demand induced by legal sales can have larger effects than displacement of illegal production in some global black markets, implying that partial legalization of banned goods does not necessarily reduce black market activity.

Details: Cambridge, MA: National Bureau of Economic Research, 2016. 51p.

Source: Internet Resource: NBER Working Paper no. 22314: Accessed June 13, 2016 at: http://www.nber.org/papers/w22314.pdf

Year: 2016

Country: International

Keywords: Animal Poaching

Shelf Number: 139411


Author: American Civil Liberties Union

Title:

Summary: In June 2010, hundreds of thousands of Canadians took to the streets of Toronto to peacefully protest the G20 Summit, which was taking place behind a fortified fence that walled off much of the city's downtown core. On the Saturday evening during the Summit weekend, a senior Toronto Police Commander sent out an order - "take back the streets." Within a span of 36 hours, over 1000 people - peaceful protesters, journalists, human rights monitors and downtown residents - were arrested and placed in detention. The title of this publication is taken from that initial police order. It is emblematic of a very concerning pattern of government conduct: the tendency to transform individuals exercising a fundamental democratic right - the right to protest - into a perceived threat that requires a forceful government response. The case studies detailed in this report, each written by a different domestic civil liberties and human rights organization, provide contemporary examples of different governments' reactions to peaceful protests. They document instances of unnecessary legal restrictions, discriminatory responses, criminalization of leaders, and unjustifiable - at times deadly - force. The nine organizations that have contributed to this publication work to defend basic democratic rights and freedoms in nine countries spread over four continents. Across the regions where our organizations operate, States are engaged in concerted efforts to roll back advances in the protection and promotion of human rights - and often, regressive measures impacting the right to protest follows in lockstep. And across the globe, social movements are pushing for change and resisting the advancement of authoritarian policies; dozens, hundreds, thousands or hundreds of thousands of individuals are marching in the roads and occupying the public space. In rural areas across the global south, there are a variety of demands, calling for access to land or resisting the exploitation of natural resources that threaten indigenous peoples' or peasants' territories. In urban settings, housing shortages or lack of basic services spark social protests and upheavals. Even in developed economies, there are disturbing tensions provoked by the contraction of the economy, globalization policies and the social and political exclusion of migrants. Students' movements all over the globe are demanding the right to education. History tells us that many of the fundamental rights we enjoy today were obtained after generations before us engaged in sustained protests in the streets: the prohibition against child labor, steps toward racial equality, women's suffrage - to name just a few - were each accomplished with the help of public expression of these demands. If freedom of expression is the grievance system of democracies, the right to protest and peaceful assembly is democracy's megaphone. It is the tool of the poor and the marginalized - those who do not have ready access to the levers of power and influence, those who need to take to the streets to make their voices heard. Unfortunately, these are also rights that are frequently violated. Our organizations have witnessed numerous instances of direct state repression during protests: mass arrests, unlawful detentions, illegal use of force and the deployment of toxic chemicals against protesters and bystanders alike. At other times the state action is less visible: the increased criminalization of protest movements, the denial of march permits, imposition of administrative hurdles and the persecution and prosecution of social leaders and protesters.

Details: New York: ACLU, 2013. 35p.

Source: Internet Resource: Accessed June 13, 2016 at: https://www.aclu.org/files/assets/global_protest_suppression_report_inclo.pdf

Year: 2013

Country: International

Keywords: Civil Rights

Shelf Number: 139432


Author: Sinclair, Georgina

Title: Identifying the Challenges, Lessons Learned, and Good Practices for Effective Policing with Communities in Fragile and Conflict-Affected States

Summary: This briefing paper summarises discussions and syndicate exercise presentation material developed by police practitioners during a five-day course entitled 'Policing with Communities in Fragile and Conflict Affected States' (FCAS), delivered by Strategic Expertise International (SEI) in association with SIPR, Police Scotland and the Stabilisation Unit in January 2016. This course formed part of a European Union Police Services Training (EUPST II) programme designed to support police officers working in EU and other international operations. The overall objective of the exercise was to increase practitioner knowledge of the connected issues, build their capabilities, understanding and skills as well as the development of key guiding principles for policing communities within FCAS as observed within this briefing paper. The outcomes were limited due to time constraints but provide initial considerations from which a framework of guiding principles could be envisaged.

Details: Dundee, UK: Scottish Institute for Policing Research, 2016. 7p.

Source: Internet Resource: SIPR Briefings, No. 17: Accessed June 28, 2016 at: http://www.sipr.ac.uk/downloads/Briefing17.pdf

Year: 2016

Country: International

Keywords: Community Policing

Shelf Number: 139438


Author: Bergenas, Johan

Title: Secure Oceans: Collaborative Policy and Technology Recommendations for the World's Largest Crime Scene

Summary: Later this year, the United States Secretary of State, John Kerry, will welcome leaders from all around the world to a conference focused on the security of our oceans. High on the agenda is safeguarding marine protected areas (MPA) and addressing the growing threat posed by illegal fishing. The Stimson Center has a long track record of identifying policy and capacity building solutions for issues that have serious implications for our environment, global economic development and U.S. and global security. In the last few years, Stimson has researched and analyzed oceans as the world's largest crime scene and identified a wide range of policy opportunities to increase ocean security, particularly focused on combating illegal fishing. We have also examined the role of technology as a tool to keep our oceans safe. Today is World Oceans Day and in anticipation of the Our Ocean Conference taking place in September, we are releasing a first set of public policy and technology recommendations. This brief report is a snapshot of a broader and evolving body of work aimed at safeguarding our oceans and combating a wide range of natural resource crimes and challenges.

Details: Washington, DC: The Stimson Center, 2016. 20p.

Source: Internet Resource: Accessed June 28, 2016 at: https://www.stimson.org/sites/default/files/file-attachments/Secure-Oceans.pdf

Year: 2016

Country: International

Keywords: Illegal Fishing

Shelf Number: 139439


Author: Lind, Jeremy

Title: Reducing Violence in a Time of Global Uncertainty: Insights from the Institute of Development Studies Addressing and Mitigating Violence Programme

Summary: Evidence Report details key insights from the Institute of Development Studies Addressing and Mitigating Violence programme, which involved detailed political analysis of dynamics of violence as well as efforts to reduce and prevent violent conflict across a number of countries and areas in sub-Saharan Africa, the Middle East and South Asia. In particular, the evidence highlighted here is from violent settings that do not neatly fit categories of 'war' or 'peace'. The findings of these studies, published as a series of open-access reports, Policy Briefings and blogs, were discussed by conflict and security experts as well as thinkers from aid and advocacy organisations at a consultative session in London in November 2015. This report uses evidence from the programme to critically reflect on policy and programming policy approaches for reducing violence. Specifically, it provides a synthesis of findings around these themes: (1) the nature of violence and how it might be changing; (2) the connectivity of actors across levels and space; and (3) the significance of identities and vulnerabilities for understanding and responding to violence. The report concludes by examining the implications of the research for the violence reduction paradigm

Details: Brighton, UK: Institute for Development Studies, 2016. 33p.

Source: Internet Resource: Addressing and Mitigating Violence, Evidence Report No. 197: Accessed June 28, 2016 at: http://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/11736/ER197_ReducingViolenceinaTimeofGlobalUncertaintyInsightsfromtheInstituteofDevelopmentStudiesAddressingandMitigatingViolenceProgramme.pdf?sequence=1

Year: 2016

Country: International

Keywords: Conflict Zones

Shelf Number: 139442


Author: Collodi, Jason

Title: Addressing and Mitigating Violence: Uptake Strategy, Year Four Update

Summary: The overarching purpose of the Addressing and Mitigating Violence (AMV) theme is to generate useful analysis to tackle policy dilemmas relating to 'newer' forms of violence and organised crime. Such a focus is becoming increasingly pertinent following the complex crises that have emerged, particularly in the Middle East, and which are dominating global foreign policy. Year four of the AMV programme showcased and built on the following sub-themes: strengthening core state functions and citizen agencies to mitigate and prevent routine forms of violence as well as organised violence and crime; improving access to livelihoods, jobs and basic services in violent contexts, including in large urban settings; and external stresses and violence mitigation in fragile contexts.

Details: Brighton, UK: Institute of Development Studies, 2016. 11p.

Source: Internet Resource: Addressing and Mitigating Violence, Evidence Report No. 186: Accessed June 28, 2016 at: http://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/10406/ER186_AddressingandMitigatingViolenceUptakeStrategyYearFourUpdate.pdf?sequence=1

Year: 2016

Country: International

Keywords: Organized Crime

Shelf Number: 139443


Author: Gupte, Jaideep

Title: Cities, Violence and Order: The Challenges and Complex Taxonomy of Security Provision in Cities of Tomorrow

Summary: How will security in cities be understood in the future? For whom will it be provided? What are the ways by which urban security provision will be governed? And, what impact will violence and order in cities have on the processes of state-building in fragile contexts in the future? These questions are uppermost in the minds of policymakers and academics. A growing body of evidence underlines the heterogeneity of security processes and outcomes, both within and between cities. Notwithstanding these recent advances, contemporary paradigms of urban development do not substantively account for the ways in which the social, political, economic and physical aspects of urban form interact and shape the mechanics of security provision in cities. There is a perceptible gap in development policy, compromising the manner in which international donors, multilateral agencies, national and sub-national policymakers respond to urban challenges today. Part of this gap is due to the separation between development theory or urban planning, and issues of fragility due to conflict and violence. These have usually been different epistemic and operational domains, to the detriment of either a comprehensive approach to analysing fragility and violence or effective approaches to security provision.

Details: Brighton, UK: Institute of Development Studies, 2016. 63p.

Source: Internet Resource: Policy Anticipation, Response and Evaluation Evidence Report No. 175: Accessed June 28, 2016 at: http://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/9560/ER175_CitiesViolenceandOrdertheChallengesandComplexTaxonomyofSecurityProvisioninCitiesofTomorrow.pdf?sequence=1

Year: 2016

Country: International

Keywords: Conflict Violence

Shelf Number: 139504


Author: International Centre for the Prevention of Crime (ICPC)

Title: Preventing Radicalization: A Systematic Review

Summary: The objectives of this study are firstly to promote a preventive approach in intervention strategies and projects when it comes to radicalisation leading to violence, and then to gather information concerning conceptualization, trends and research, as well as prevention tools (legislative and practical), especially those linked to the social prevention of this issue. This study involves a review and analysis of both scientific and grey literatures, national and international norms and legislations, and promising programmes or practices on the subject on a global scale. In order to accomplish this goal, we conducted two systematic reviews of the literature on radicalisation leading to violence, focusing on a diversity of keywords. a) The first review focused on literature linked to contextualisation of the phenomenon exclusively in western countries, mainly trends, radicalisation and recruitment contexts, factors determining this process, as well as explanatory models and radicalisation trajectories. b) The second review focused on prevention strategies, programmes and projects on radicalisation leading to violence. In this case, due to the limited number of studies on this specific subject, we considered studies without geographical limitations. For this research, we examined 483 documents.

Details: Montreal: The Centre, 2015. 147p.

Source: Internet Resource: Accessed June 28, 2016 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/2016/ICPC_Systematic_Review_-_Preventing_Radicalization_2016_1.pdf

Year: 2015

Country: International

Keywords: Extremism

Shelf Number: 139505


Author: United Nations Office on Drugs and Crime (UNODC)

Title: World Drug Report 2016

Summary: The World Drug Report 2016 comes at a decisive moment, just months after Member States, at a special session of the General Assembly, adopted a comprehensive set of operational recommendations on the world drug problem. The session was only the third in the history of the General Assembly to focus on drugs, and the resulting outcome document, entitled "Our joint commitment to effectively addressing and countering the world drug problem", provides a concrete way forward to take action on shared challenges. In the outcome document, Member States reaffirmed their commitment to addressing persistent, new and evolving challenges in line with the three international drug control conventions, which were recognized as allowing States parties sufficient flexibility to design and implement national drug policies consistent with the principle of common and shared responsibility. The operational recommendations contained in the outcome document encompass measures to address demand and supply reduction, as well as to improve access to controlled medicines while preventing their diversion; they cover human rights, youth, children, women and communities and highlight emerging challenges and the need to promote long-term, comprehensive, sustainable, development-oriented and balanced drug control policies and programmes that include alternative development. The text highlights the importance of drug abuse prevention and treatment; encourages the development, adoption and implementation of alternative or additional measures with regard to conviction or punishment; and promotes proportionate national sentencing policies, practices and guidelines for drug-related offences. Now the international community must come together to make good on its commitments. The World Drug Report 2016, which provides a comprehensive overview of major developments in drug markets, trafficking routes and the health impact of drug use, supports comprehensive, balanced and integrated rights-based approaches. This year's report offers insight into the wide-ranging impact of drugs not only on the health and well-being of individuals, but also on the people around them - families and communities. This can include such harms as HIV, as well as the threat of violence, faced in particular by women and children.

Details: New York: UNODC, 2016. 174p.

Source: Internet Resource: Accessed June 28, 2016 at: https://www.unodc.org/doc/wdr2016/WORLD_DRUG_REPORT_2016_web.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Crime

Shelf Number: 139529


Author: Bewley-Taylor, David

Title: Cannabis Regulation and the UN Drug Treaties: Strategies for Reform

Summary: As jurisdictions enact reforms creating legal access to cannabis for purposes other than exclusively "medical and scientific," tensions surrounding the existing UN drug treaties and evolving law and practice in Member States continue to grow. How might governments and the UN system address these growing tensions in ways that acknowledge the policy shifts underway and help to modernize the drug treaty regime itself, and thereby reinforce the UN pillars of human rights, development, peace and security, and the rule of law?

Details: Washington, DC: Washington Office on Latin America, 2016. 24p.

Source: Internet Resource: Briefing Paper: Accessed June 29, 2016 at: http://www.wola.org/sites/default/files/Cannabis%20Regulation%20and%20the%20UN%20Drug%20Treaties_June%202016_web_0.pdf

Year: 2016

Country: International

Keywords: Cannabis

Shelf Number: 139533


Author: Khanal, Kabi Raj

Title: Who Supports Violent Extremism in Developing Countries? Analysis of Attitudes Based on Value Surveys

Summary: What are the common characteristics among radicalized individuals, willing to justify attacks targeting civilians? Drawing on information on attitudes toward extreme violence and other characteristics of 30,787 individuals from 27 developing countries around the world, and employing a variety of econometric techniques, this paper identifies the partial correlates of extremism. The results suggest that the typical extremist who supports attacks against civilians is more likely to be young, unemployed and struggling to make ends meet, relatively uneducated, and not as religious as others, but more willing to sacrifice own life for his or her beliefs. Gender and marital status are not found to explain significantly the individual-level variation in attitudes toward extremism. Although these results may vary in magnitude and significance across countries and geographic regions, they are robust to various sensitivity analyses.

Details: Washington, DC: The World Bank, 2016. 61p.

Source: Internet Resource: Policy Research Working Paper No. 7691: Accessed July 11, 2016 at: http://www-wds.worldbank.org/external/default/WDSContentServer/WDSP/IB/2016/06/02/090224b08438a637/2_0/Rendered/PDF/Who0supports0v0sed0on0value0surveys.pdf

Year: 2016

Country: International

Keywords: Extremist

Shelf Number: 139576


Author: Law Library of Congress, Global Legal Research Center

Title: Miranda Warning Equivalents Abroad

Summary: This report contains short summaries describing warnings similar to the Miranda warning that are required in 108 jurisdictions around the globe. The summaries are divided into sections based on broad geographic categories: Americas and the Caribbean , East Asia and the Pacific, Europe and Central Asia, Middle East and North Africa, South Asia, and Sub-Saharan Africa. The warnings specified in the surveyed jurisdictions vary, but typically include the right to remain silent and the right to legal counsel. A number of countries also specify that a person who is arrested or detained has the right to be informed of the reasons for the arrest or detention or of the charges being brought. In some countries, the additional right to have these things explained in a language the detainee understands is explicitly stated. Commonwealth countries have traditionally follow ed the English Judges’ Rules developed in the early twentieth century, and some continue to do so, while m any Member States of the European Union (EU) have adopted an EU directive on the issue. Points of variance among the countries concern the timing of the warning and whether the detainee is told that the fact of remaining silent will or will not be used in legal proceedings.

Details: Washington, DC: Law Library of Congress, 2016. 70p.

Source: Internet Resource: Accessed July 11, 2016 at: https://www.loc.gov/law/help/miranda-warning-equivalents-abroad/miranda-warning-equivalents-abroad.pdf

Year: 2016

Country: International

Keywords: Miranda Warnings

Shelf Number: 139578


Author: Kustermans, Jorg

Title: Unrest in the City: What can the riots in Stockholm teach us?

Summary: The rediscovery of urban violence Paris in 2005, Athens in 2008, London in 2011. But also Antwerp in 2002 and 2012, Brussels and Stockholm in 2013. Despite the variation in context, form and intensity, many observers are concerned about the return of relatively large-scale, collective violence in the urban public space. One could easily add to this list with less iconic examples that only reached the local media, or with older or non-European cases including Vaulxen-Velin in 1971, Brixton in 1981, Gujarat in 2002, Rio de Janeiro in 2013, and Istanbul in 2013. The rediscovery of the city that has been made in several contexts in recent years goes hand-in-hand with a rediscovery of the various forms of urban violence. Urban riots - historically of varying scale, from outbursts or agitation to mutiny and revolution –are one prominent example. Not every riot comes as a surprise. Some French suburbs or British city districts have been saddled with a violent image, so that outsiders meet riots there almost with an indifferent shrug of the shoulders. We intuitively understand why a protest degenerates into violence in an authoritarian context. When riots break out in our own backyard, in neighbourhoods such as Borgerhout or Kuregem, we quickly fall back on traditional models of explanation. Some voices immediately make the link to economic under-privilege. Others are concerned about developments in a multicultural society. Yet others emphasize feelings of frustration; and others again will underline the criminal nature of the violence. The more things change, it seems, the more they stay the same.

Details: Brussels: Flemish Institute, 2014. 40p.

Source: Internet Resource: Accessed July 11, 2016 at: http://www.flemishpeaceinstitute.eu/sites/vlaamsvredesinstituut.eu/files/files/reports/report_unrest_in_the_city.pdf

Year: 2014

Country: International

Keywords: Collective Violence

Shelf Number: 139584


Author: Hofmeister, Wilhelm

Title: Trafficking in Human Beings: learning from Asian and European Experiences

Summary: Trafficking in human beings is a strong violation of basic rights and a severe transnational organized crime. But human trafficking is also a highly profitable business in both Europe and Asia. People can be trafficked for different purposes, including sexual exploitation, labour exploitation, organ smuggling and as brides/grooms. Victims of this crime are highly vulnerable and are often coerced by the traffickers through threats to harm their family members, to abuse them or to sell them. At the same, the victims are granted hardly any rights in the destination countries and cooperation with the police is limited due to fear or the fact that the police might be corrupt and involved in the crime as well. Conservative estimates by the International Labour Organization (ILO) indicate around 20.9 million persons in situations of forced labour in 2012. This does not include people being trafficked for organ removal, forced marriage or adoption. More than 50 percent of these people originated from countries in the Asia-Pacific region. The actual numbers of identified victims and convicted traffickers is only a very small percentage of this estimate. This highlights the two key challenges in combating human trafficking - victims identification and prosecution of traffickers.

Details: Singapore : Konrad-Adenauer Stiftung [and] East Asian Institute [and] European Policy Centre [and] European Union Centre in Singapore, 2014. 150p.

Source: Internet Resource: Accessed July 11, 2016 at: http://www.kas.de/wf/doc/kas_40567-1522-2-30.pdf?150227075526

Year: 2014

Country: International

Keywords: Forced Labor

Shelf Number: 139589


Author: Brian, Tara

Title: Fatal Journeys. Volume 2: Identification and tracing of dead and missing migrants

Summary: IOM reports in the latest edition of its publication Fatal Journeys Volume 2: Identification and Tracing of Dead and Missing Migrants that over 60,000 migrants are estimated to have died or gone missing on sea and land routes worldwide since 1996. According to the report released today (14 June), an estimated 5,400 migrants died or were recorded as missing in 2015. In 2016, already more than 3,400 migrants have lost their lives worldwide, this year over 80 percent of those attempting to reach Europe by sea. The true number of migrant deaths is surely greater, said Frank Laczko, Director of IOM's Global Migration Data Analysis Centre (GMDAC). Laczko explained countless deaths remain unknown as a result of migrants dying at sea or in remote areas where fatalities seldom are witnessed or recorded. "But what happens to those who die? Who are their families and will they ever know what happened?" asked Laczko. "A further tragedy to the loss of life, is the fact that many of the dead remain nameless." IOM's second global report on migrant fatalities addresses these crucial questions. The report asks what measures can and should be taken by authorities to ensure tracing and identification of those who die or go missing. Furthermore, what steps should be taken to assist the forgotten victims of these tragedies - the families left behind. Despite their urgency, these issues have been largely absent from policy discussions. Existing research into missing persons indicates the extreme psychological distress, as well as economic and social hardship a missing person has on families. IOM's report shows that this painful situation is all too common. A majority of migrant bodies are never found, and of those that are, many are never identified. In the Mediterranean Sea in 2015, bodies were recovered for fewer than half of those thought to have died. Families in Myanmar and Bangladesh tell stories of family members who have simply disappeared. Along the United States-Mexico border, the Colibri Center for Human Rights - a non-profit organization based in Arizona - has recorded some 2,700 missing persons. while national and international systems exist to trace missing persons, they have not been adapted to address missing migrants and remain largely inaccessible to migrant families. Often, local and national death registration and identification systems are neither designed nor adequate for the particular challenges arising in the context of international migration. However, it is not only the substantial challenges involved in the task that make identification rates poor. Unlike in other humanitarian or transport disasters, identification of migrants is often given low priority by States involved, and too often migrant and refugee deaths are seen as an exception to normal humanitarian practices. Compiled by IOM's Berlin-based Global Migration Data Analysis Centre and experts from around the world, Fatal Journeys aims to bring attention to this humanitarian imperative. It recommends five points for action, beginning with the recognition that investigation and identification of migrant deaths is an obligation under international law. Fatal Journeys argues for families to have access to accessible search mechanisms and to be granted the right to visit the burial place of their loved ones. All efforts should be made to identify the dead, including through the establishment of international and regional databases. Finally, Fatal Journeys recommends a global programme of research to better understand how to support families and improve identification mechanisms. In addition to issues of identification and tracing, the report presents most recent data on dead and missing migrants around the world, collected through IOM's Missing Migrants Project, which maintains the only existing global database on migrant deaths.

Details: Geneva, SWIT: International Organization for Migration, 2016. 108p.

Source: Internet Resource: Accessed July 12, 2016 at: https://publications.iom.int/books/fatal-journeys-volume-2-identification-and-tracing-dead-and-missing-migrants

Year: 2016

Country: International

Keywords: Immigrants

Shelf Number: 139617


Author: Agarbati, Giorgio

Title: Burglary risk assessment of buildings: A semi-quantitative method

Summary: In recent years the issue of urban security has assumed an increasing importance, showing a transformation whose features help to define specificity of every city. The growth of offenses, the increased crime rates, the growth of the global economic difficulties, lead up to an increase in demand for social security often addressed to the local government aspects having as its object the daily life. Even though security and police resources are the first to be cut back in the shrinking economy, the present turmoil requires even greater concentration of security and law enforcement assets to keep our property, people, and information safe. Given the situation, the need to implement new procedures based on innovative theories requires a different approach to the problem of urban security. In fact, based on a theory called "CPTED" (Crime Prevention Through Environmental Design), an evaluation method capable to estimate crime risk of the urban district in its entirety has been developing. The risk of crime for a building is related to its vulnerability (i.e. presence of security leaks) and the hazard (i.e. crime rate) in the neighbourhood. The method proposed in this study, aims at providing a rational measure for evaluating burglary vulnerability of a building. After a preliminary phase of setting up a qualitative model through existing literature and international experiences, an analysis of burglary data, collected by observing selected building parameters, has made possible a statistical survey. Openings are the basic element of the evaluation. Their characteristics, especially their relation with the surroundings, influence the decision of a burglar in performing a criminal act. However, also features related to the entire property and the neighborhood must be taken into account. Then, a list of basic indicators has been selected through a qualitative evaluation, by gathering each one in three different groups, on the basis of FEMA 452. These groups correspond to: features linked to the neighbourhood (environment around the building), characteristics of the entire property (space adjacent to the building), and area within the building (perimeter of internal areas). Quantitative study proposed has been directed towards the evaluation of the third layer of defense, in which windows represent the weakest part of the building. Logistic regression reveals how some of these indicators have a greater influence than others in the final outcome, by fixing a mathematical relation between opening and its probability to be broken. However, such an analysis represent only a part of the whole assessment method, but needed to weight out specific items. Afterwards, all the buildings collected for the survey have been evaluated through the complete procedure, that is semi-quantitative (qualitative assessment + coefficients from statistical analysis), pointing out a good relation with results. On the whole, this study aims at develop an evaluation method for new and existing houses as well as for new and existing environments, by focusing on assessing buildings vulnerability, referring to their probability to be burgled, and by giving an exact value of such a risk. Firstly, we believe it might be a useful tool to find retrofit solutions: a project manager needs to evaluate existing built environments which point out crime events, in order to design a certain number of actions capable to work out such a problem; yet, a general mapping of the city which highlights the most vulnerable areas, where in all districts, and individual buildings, is assigned a score (risk value), it represents one of the first levels of knowledge of a specific urban environment where resources should be rationally spent to deal with certain problems; moreover, the fact of estimating the probability of a building to be burgled, could be a useful knowledge for insurance companies to define their insurance premium. Finally, you might consider its use in a project phase of designing new urban planning or building project, on all spatial scale levels, in order to highlight weak points and fix them before the execution, and to make risk-based decisions on how to mitigate those risks; then, following British and Dutch examples, to award a certification to all the buildings that possess good crime-prevention features.

Details: Università Politecnica delle Marche, 2015. 195p.

Source: Internet Resource: Dissertation: Accessed July 13, 2016 at: http://www.openarchive.univpm.it/jspui/handle/123456789/1157

Year: 2015

Country: International

Keywords: Building Security

Shelf Number: 139628


Author: United States Agency for International Development

Title: Scaling Up Interventions to Prevent and Respond to Gender-Based Violence: An Analytical Report

Summary: 1 EXECUTIVE SUMMARY This report on scaling up interventions to prev ent and respond to GBV was commissioned by the United States Agency for International Development (USAID) as part of its GBV Strategy Research Agenda to identify lessons learned from scaled-up GB - interventions to inform and to improve its global prevention and response me chanisms. The information presented in th is report may be used to assist in the identification of GBV interventions that are scalable, or in designing GBV interventions with sound plans to bring them to scale and to maximize impact. Scaling up refers to "taking successful projects, programs, or policies and expanding, adapting, and sustaining them in different ways over time for greater development impact." 1 While scaling up is a common goal of international development donors and implementers a like, there is no universal ly accepted methodology that is employed. The three scale-up methodologies e xplored in this report are: expansion of scope, replication and expansion of geographic coverage. The obje ctive of this report is to assist USAID staff in identifying and selecting scalable GBV interventions across four se ctors: (1) health, (2) youth and education, (3) democracy and govern ance, and (4) economic growth. It is a product of a three-pronged research method ology: (1) a literature review, (2) key informant interviews and focus group discussions conducted in Washington, D.C. and by telephone, and (3) data collected from site visits on scaled-up GBV interven tions in India and South Africa. Eighteen scaled-up GBV interventions were analyzed in the literature re view, eight interventions, which varied by sector and type of scale-up were chosen for further in-depth analysis during the site visits. The mixed-method research design was used to develop this analytic al report in order to better understand scaled-up activities to address gender-based violence. While best practices in the develo pment context are important to know when considering any scale-up, further field research was needed to refine this knowledge in the context of GBV. The research team conducted field research on eight innovative, evalua ted and scaled-up GBV inte rventions in the health, youth development and education, democracy and governance, and economic growth sectors. The best practices in scaling up focused on three key comp onents: program actions, assessing the enabling environment and influencing factors, an d ensuring institutional capacity. The following best practice examples were selected to illustrate initiatives that provide evidence of success in contributing to the prevention of GBV: - Health: One Man Can Campaign, Soul City, and Stepping Stones in South Africa - Youth and Education: Yaari Dosti and Gender Equality Movement in Schools in India - Democracy and Governance: South Africa's Thuthuleza Care Centers (TCCs) and the International Justice Mission (IJM) in India - Economic Growth: The Intervention with Microfinance for AIDS and Gender Equity (IMAGE) in South Africa.

Details: Washington, DC: USAID, 2015. 72p.

Source: Internet Resource: Accessed July 15, 2016 at: https://www.usaid.gov/sites/default/files/documents/1865/Scaling-up-Interventions-to-Prevent-and-Respond-to-GBV.pdf

Year: 2015

Country: International

Keywords: Gender-Based Violence

Shelf Number: 139644


Author: Bowles, Warren

Title: A rights perspective on the global trade in rhino horn

Summary: Figures released recently by the South African Department of Environmental Affairs indicate that rhino are being poached in South Africa at an alarmingly high rate, meaning that they are being used like a never-ending commercial resource. It has been debated in South Africa that, if legal trade in rhino horn were to be introduced, it may be a solution to curbing rhino poaching. There are animal rights views that condemn the use and exploitation of nonhuman animals for the financial gain of human beings, one of the foremost rights views being that of Tom Regan. In his view, he proposes ways in which nonhuman animals can be perceived as more than just commercial resources. He elaborates on how nonhuman animals can be regarded as beings in their own right with a unique value that entitles them to respectful treatment and, at the very least, protection from harm and cruel treatment. Analyses and arguments made in this dissertation are not rooted in what the economic consequences of having trade in rhino horn would be. They are rooted in morality and in law to demonstrate why trade should be seen as a solution that is a last resort to curbing rhino poaching. The first chapter of this dissertation concerns itself with unpacking the central tenets and principles of Regan’s rights view in the context of how nonhuman animals can be regarded as beings rather than resources. The second chapter provides an analysis of approaches in environmental ethics that are relevant for preserving the rhino for future generations and how this could be achieved with reference to Regan’s rights view. The third chapter deals with the application of Regan’s rights view to legal and illegal trade in rhino horn. This will also include evaluation of plausible methods for securing rhino horn that are available in the event that legal trade in rhino horn is accepted as a solution to the current rhino poaching situation in South Africa.

Details: Johannesburg: University of Johannesburg, 2014. 71p.

Source: Internet Resource: Thesis: Accessed July 18, 2016 at: https://ujdigispace.uj.ac.za/handle/10210/10978

Year: 2014

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 139647


Author: Patel, Nikkita Gunvant

Title: Characterization of Illegal Wildlife Trade Networks

Summary: The legal and illegal trade in wild animals and their products is a multi-billion dollar industry that threatens the health and well-being of humans and animals alike. The management of the wildlife trade is a crisis-driven area, where decisions are made quickly, and, often, inefficiently. In particular, the regulation and control of the illegal wildlife trade is hampered by a dearth of formal quantitative analysis of the nature of the trade. This thesis represents a preliminary attempt to rectify that knowledge gap. It describes an investigation into the factors that support and promote the trade and is based upon information in two databases: CITES (the legal trade) and HealthMap (the illegal trade). The study 1) quantified the relationship between the illegal wildlife trade and several key factors thought to contribute to the illegal wildlife trade, namely road development, unemployment, and Corruption Perception Index (a score related to the perceived level of corruption); 2) measured the extent to which the product types, origins, destinations, and trade routes in the legal and the illegal wildlife trade are alike; and 3) identified locations to place resources to (a) restrict trade by causing the greatest network destabilization and (b) disseminate an educational message that would cause the greatest impact to the network. Several key factors and the legal trade were associated with the magnitude of various indices of the illegal trade at a country-level, but no generalizable findings can be asserted at this time. With regard to the best placement of regulatory resources, China was key with respect to network disruption and information dissemination targets. This thesis has begun the urgently needed analysis of the complex relationships of the illegal wildlife trade and identified specific ways to bring about change using network science. These findings offer hope for regulatory and enforcement agencies, NGOs, and governments that it will be possible to find more effective ways of combating the illegal wildlife trade and problems it brings with it.

Details: Philadelphia: University of Pennsylvania, 2015. 179p.

Source: Internet Resource: Dissertation: Accessed July 18, 2016 at: http://repository.upenn.edu/edissertations/1115/

Year: 2015

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 139650


Author: Tallis, Joshua

Title: Muddy Waters: Framing Littoral Maritime Security through the Lens of the Broken Windows Theory

Summary: This dissertation explores the growing field of study around Maritime Security. While an increasingly common sub-heading in American naval strategy documents, maritime security operations are largely framed around individual threats (i.e. counter-piracy, counter-terrorism, counter-narcotics). Here, we endeavor to explore how a seemingly disparate set of transnational issues fit into a more coherent framework to give greater theoretical substance to the notion of Maritime Security as a distinct concept. In particular, we examine, as our research question, whether the Broken Windows theory, a criminological construct of social disorganization, provides the lens through which to theorize maritime security in the littorals. By extrapolating from criminology, this dissertation engages with a small but growing impulse in studies on insurgencies, terrorism, and piracy to look beyond classic theories of security to better understand phenomena of political violence. To evaluate our research question, we begin by identifying two critical components of the Broken Windows theory, multidimensionality and context specificity. Multidimensionality refers to the web of interrelated individuals, organizations, and infrastructure upon which crime operates. Context specificity refers to the powerful influence of an individual or community's environment on behavior. These two themes, as explored in this dissertation, are brought into stark relief through an application of the Broken Windows theory. Leveraging this understanding of the theory, we explore our research question by employing process-tracing and detailed descriptions across three case studies (one primary and two illustrative) - the Caribbean Basin, the Gulf of Guinea, and the Straits of Malacca and Singapore. In so doing, we demonstrate how applying the lens that Broken Windows provides yields new and interesting perspectives on maritime security. As a consequence, this dissertation offers an example of a theoretical framework that provides greater continuity to the missions or threats frequently binned under the heading of maritime security, but infrequently associated with one another in the literature.

Details: Fife, Scotland: University of St.Andrews, 2016. 311p.

Source: Internet Resource: Dissertation: Accessed July 20, 2016 at: https://research-repository.st-andrews.ac.uk/handle/10023/9028

Year: 2016

Country: International

Keywords: Broken Windows Theory

Shelf Number: 139719


Author: Dale, Colin

Title: Review of International Evidence and Practice on Non-Pain Inducing Techniques and Systems of Restraint

Summary: In 2011, the Restraint Advisory Board (RAB), which was established to assess Minimising and Managing Physical Restraint (MMPR) for use in secure training centres (STCs) and under-18 young offender institutions (YOIs), recommended that research was commissioned: "...into the feasibility of developing a restraint system which does not incorporate pain induction techniques. The research should include assessing the applicability of restraint systems used in other sectors (within and outwith child care) that do not rely upon or permit pain induction". A review of existing evidence was commissioned in 2013 following this recommendation. The aims of the study were to: - identify, review and assess non-pain restraint techniques employed in different institutional settings across different countries (including England and Wales), and their effectiveness - assess the feasibility of implementing similar restraint techniques from other countries and settings within the under-18 secure estate in England and Wales. The research comprised a rapid evidence assessment of the relevant international research literature. This was followed by interviews with an international group of 26 practitioners, academics, trainers and managers about the use of non-pain inducing restraint techniques. The review of the existing research found only five relevant studies, none of which clearly and rigorously demonstrated the effective use of non-pain inducing techniques to control serious or volatile situations involving children and young people. These findings mirrored the conclusions of an earlier systematic review on physical interventions and seclusion in psychiatric settings following National Institute of Clinical Excellence methodology. The interviews with practitioners found that although non-pain restraint techniques were in use in various settings around the world, it was very difficult to identify approaches based on good-quality research on their impact. It was also apparent that the choice of restraint method employed varied depending on context and circumstance. As a result, the study concluded it was not possible, on the current evidence available, to identify a particular safe, more effective system of non-pain inducing restraint readily available to specifically manage volatile and serious situations within the youth secure estate in England and Wales. The study highlighted the need for more robust research in this area. 3

Details: London: Youth Justice Board for England and Wales, 2016. 35p.

Source: Internet Resource: Accessed July 20, 2016 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/521046/Non-pain_report_FINAL_22_Apr_2016.pdf

Year: 2016

Country: International

Keywords: Aggressive Behavior

Shelf Number: 139723


Author: Ives-Allison, Nicole Dorothea

Title: P Stones and Provos: Group Violence in Northern Ireland and Chicago

Summary: Although the government of the United States of America was established to protect the rights to life, liberty and the pursuit of happiness among all American citizens, this thesis argues intractable gang violence in inner-city Chicago has persistently denied these rights, in turn undermining fundamental (and foundational) American political values. Thus, gang violence can be argued to represent a threat to both civil order and state legitimacy. Yet, where comparable (and generally lower) levels of community-level violence in Northern Ireland garnered the sustained attention and direct involvement of the United Kingdom's central government, the challenge posed by gang violence has been unappreciated, if not ignored, by the American federal government. In order to mobilise the political commitment and resources needed to find a durable resolution to Chicago's long and often anarchic 'uncivil war', it is first necessary to politicise the problem and its origins. Contributing to this politicisation, this thesis explains why gang violence in Chicago has been unable to capture the political imagination of the American government in a way akin to paramilitary (specifically republican) violence in Northern Ireland. Secondly, it explains how the depoliticisation of gang violence has negatively affected response, encouraging the continued application of inadequate and largely ineffective response strategies. Finally, it makes the case that, while radical, a conditional agreement-centric peace process loosely modelled on that employed in Northern Ireland might offer the most effective strategy for restoring the sense of peace and security to inner-city Chicago lost over half a century ago.

Details: St. Andrews, Scotland: University of St. Andrews, 2015. 216p.

Source: Internet Resource: Dissertation: Accessed July 21, 2016 at: https://research-repository.st-andrews.ac.uk/handle/10023/6925

Year: 2015

Country: International

Keywords: Gang Violence

Shelf Number: 139786


Author: Hardy, Samuel Andrew

Title: Illicit trafficking, provenance research and due diligence: the state of the art

Summary: 1. Above-ground, underground and underwater cultural heritage is under threat around the world. 2. Yet, the illicit trade in cultural property is so under-researched that basic empirical evidence is unreliable or absent. 3. Still, there is sufficient evidence to demonstrate that antiquities trafficking encompasses not only petty crime and white-collar crime, but also organised crime and conflict financing. 4. Trafficking is particularly harmful in zones of physical and economic insecurity, where it worsens the insecurity, and where vulnerable persons may be directly or financially forced to participate. 5. Hence, this study indicates a need for investigation of organised crime and online trafficking, as well as the manifest need to develop an evidence-based understanding of trafficking out of the zones of crisis across the Middle East and North Africa. 6. Cultural heritage cannot be effectively protected without market transparency and due diligence

Details: London: University College London, 2016. 23p.

Source: Internet Resource: Accessed July 23, 2016 at: http://www.unesco.org/new/fileadmin/MULTIMEDIA/HQ/CLT/pdf/Hardy_2016_UNESCO_antiquities_trafficking_review_materia.pdf

Year: 2016

Country: International

Keywords: Antiquities Theft

Shelf Number: 139239


Author: Schuurman, Bart

Title: Converts and Islamist Terrorism: An Introduction

Summary: Converts to Islam represent a small percentage of the Muslim community in Western countries. Yet when it comes to Islamist extremism and terrorism, research has suggested that converts are considerably over-represented. This ICCT Policy Brief serves as an introduction to this topic by providing an overview of what is known about converts' involvement in homegrown jihadism and the foreign fighter phenomenon. Notwithstanding considerable reservations about the quantity and quality of the available data, this Policy Brief finds support for the notion of convert over-representation in these activities. This is especially so in the case of foreign fighters. What little data was found on converts' involvement in homegrown jihadism provided a more nuanced picture, emphasizing that over-representation may not be the norm in all Western countries and that it may be a relatively recent development. Numerous explanations for converts' involvement in Islamist extremism and terrorism have been provided, running the gamut from structural-level explanations to distinctly personal motives. At present, however, a comprehensive, theoretically sound and empirically grounded understanding of how and why converts become involved in Islamist militancy is absent. The Policy Brief concludes by stressing the need to develop our understanding of this important yet under-researched topic.

Details: The Hague: International Centre for Counter-Terrorism, 2016. 21p.

Source: Internet Resource: ICCT Policy Brief: Accessed July 23, 2016 at: http://icct.nl/wp-content/uploads/2016/06/ICCT-Schuurman-Grol-Flower-Converts-June-2016.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 139817


Author: Bradford, Ben

Title: Enabling and Constraining Police Power: On the Moral Regulation of Policing

Summary: In this paper we consider some of the ethical challenges inherent in the regulation of discretionary police power. Discretion is central to police policy and practice, but it also provides a level of freedom that opens up the space for injustice and inequity, and this is seen most vividly in recent debates about unfairness and racial profiling in the distribution and experience of police stops in the US and UK. How to regulate discretionary power is a challenging question, and this is especially so in the context of practices like stop-and-search/stop-and-frisk. The ability to stop people in the street and question them is central to policing as it is understood in many liberal democracies, but under conditions of unfairness and questionable efficacy - when the application of this particular police power appears unethical as well as ineffective - one can reasonably ask whether the power should be dropped or curtailed, and if curtailed, how this would work in practice.

Details: London: London School of Economics, 2015. 28p.

Source: Internet Resource: LSE Law, Society and Economy Working Papers 23/2015: Accessed July 25, 2016 at: https://www.lse.ac.uk/collections/law/wps/WPS2015-23_BradfordJackson.pdf

Year: 2015

Country: International

Keywords: Police Behavior

Shelf Number: 139848


Author: Kuperman, Mark I.

Title: Re-Thinking Maritime Risk: Linking Piracy, Global Shipping and Ports - and - what Cruise/Ferry Terminals Can Learn from Airports

Summary: This thesis addresses two issues related to maritime risk. The first concerns recognizing high-volume shipping destined for U.S. ports initially journeys through foreign waters and ports where crime, piracy and terrorism are hazards. The second issue is prioritizing maritime risk mitigation in response to multi-variable threats and vulnerabilities. This subject is compounded by limited resources and a reliance on collaborative partnerships. The thesis mainly focuses on the relationship between piracy and U.S. maritime interests since piracy has a nexus offshore and in waterways where U.S.-bound ships originate or transit. The approach is three-fold. First, the initial two chapters identify piracy as a threat which shipping encounters in global hot-spots before entering U.S. waters. Chapter 1 associates connections between piracy and terrorism, mariners' safety in regions/waterways, and challenges of eradicating piracy, with a focused study on the Straits of Malacca. Chapter 2 identifies when offshore piracy may threaten the U.S., emphasizing the Gulf of Guinea. Chapter 3 transitions back to U.S. solutions in protecting ferry and cruise passengers within confined terminal spaces. The thesis results indicate risk-related findings. Chapter 1 highlights collaborative challenges foreign nations need to overcome while trying to protect citizens and eradicate crime/piracy. Also in Chapter 1, the findings reveal piracy and terrorism in the Straits of Malacca do not appear related. Chapter 2 categorizes the types of offshore piracy that pose risk to the U.S. Chapter 3 undertakes a multi-variable analysis of inter-modal risk mitigations and suggests certain airport models may work in ferry and cruise terminals.

Details: Baltimore, MD: Johns Hopkins University, 2014. 125p.

Source: Internet Resource: Thesis: Accessed July 29, 2016 at: https://jscholarship.library.jhu.edu/handle/1774.2/37227

Year: 2014

Country: International

Keywords: Airport Security

Shelf Number: 139889


Author: Tilley, Nick

Title: Analyzing and Responding to Repeat Offending

Summary: A wide range of research converges on the following findings about criminal offenders: Some level of participation in criminal activity is normal, especially during adolescence and among males. Almost all citizens act dishonestly, commit crimes, and behave in antisocial ways at some point in their lives. Most will have committed more than one crime. Most people offend infrequently and soon age out of committing crime. Involvement in criminal behavior peaks in adolescence (ages 14–17) and then generally fades rapidly. A much smaller number of persistent and prolific offenders are responsible for a substantial proportion of all crime. Roughly half the crimes committed can be attributed to those identified as prolific offenders. Males commit far more offenses than females do, but even among female offenders, a small percentage commits a hugely disproportionate number of the offenses. That a small fraction of offenders commits a large fraction of crime may come as no surprise to most police officers. The breadth of low-levels of offending and the proportion of crime attributable to those involved in it may not be so widely understood. There are two general theories of repeat offending patterns. One theory is that some people are highly disposed to behave criminally, and this leads them to sustained criminal careers in which they offend frequently. These "lifetime persistent" offenders begin offending early and have long crime careers. They are distinguished from "adolescent limited" offenders, who start later and finish earlier, as the name suggests. Another theory suggests that one criminal act begets another. That is, involvement in one crime increases the probability of further offending. For example, someone convicted of a crime finds it more difficult to resume a law-abiding life, either because they have fewer job opportunities or because they are shunned by normally law-abiding members of the community. Therefore, they persist in criminal behavior and associate with others who are in a similar position. It might also be that the rewards of successfully committing crime reinforce the criminal behavior and make persistent offending more likely. A wide range of research converges on the following findings about criminal offenders: Some level of participation in criminal activity is normal, especially during adolescence and among males. Almost all citizens act dishonestly, commit crimes, and behave in antisocial ways at some point in their lives. Most will have committed more than one crime. Most people offend infrequently and soon age out of committing crime. Involvement in criminal behavior peaks in adolescence (ages 14-17) and then generally fades rapidly. A much smaller number of persistent and prolific offenders are responsible for a substantial proportion of all crime. Roughly half the crimes committed can be attributed to those identified as prolific offenders. Males commit far more offenses than females do, but even among female offenders, a small percentage commits a hugely disproportionate number of the offenses. That a small fraction of offenders commits a large fraction of crime may come as no surprise to most police officers. The breadth of low-levels of offending and the proportion of crime attributable to those involved in it may not be so widely understood. There are two general theories of repeat offending patterns. One theory is that some people are highly disposed to behave criminally, and this leads them to sustained criminal careers in which they offend frequently. These "lifetime persistent" offenders begin offending early and have long crime careers. They are distinguished from "adolescent limited" offenders, who start later and finish earlier, as the name suggests. Another theory suggests that one criminal act begets another. That is, involvement in one crime increases the probability of further offending. For example, someone convicted of a crime finds it more difficult to resume a law-abiding life, either because they have fewer job opportunities or because they are shunned by normally law-abiding members of the community. Therefore, they persist in criminal behavior and associate with others who are in a similar position. It might also be that the rewards of successfully committing crime reinforce the criminal behavior and make persistent offending more likely.

Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2016. 60p.

Source: Internet Resource:Problem-Solving Tools Series Problem-Oriented Guides for Police: Accessed August 1, 2016 at: http://www.popcenter.org/tools/PDFs/Analyzing_Responding_Repeat_Offending.pdf

Year: 2016

Country: International

Keywords: Habitual Offenders

Shelf Number: 139923


Author: Scott, Michael S.

Title: Identifying and Defining Policing Problems

Summary: This Problem-Solving Tools guidebook deals with the process of identifying and defining policing problems. Under the most widely adopted police problem-solving model-the SARA (Scanning, Analysis, Response, Assessment) model-the process of identifying and defining policing problems is referred to as the Scanning phase. The Scanning phase is distinct fr om the Analysis phase, which principally is about explaining the problem's causes and contributing factors; the Response phase, which is about developing, selecting, and implementing new responses to the problem; and the Assessment phase, which principally is about measuring the impact that new responses had on the problem. The advice provided in this guidebook is based primarily upon theory and practice: there is no evaluative research into what methods most accurately and efficiently identify and define policing problems.

Details: Washington, DC: U.S. Department of Justice, Office of Community-Oriented Policing, 2016. 88p.

Source: Internet Resource: Problem-Solving Tools Series Problem-Oriented Guides for Police No. 13 : Accessed August 1, 2016 at: http://ric-zai-inc.com/Publications/cops-p323-pub.pdf

Year: 2016

Country: International

Keywords: Police Response

Shelf Number: 139924


Author: Edwards, Phil

Title: Mediation, Mentoring and Peer Support to Reduce Youth Violence: A Systematic Review

Summary: Background - After road traffic collisions and suicide, violence is the greatest threat to life of young people. In England and Wales, 43 young people aged 15 - 24 years died from assault in 2012. These premature deaths are a fraction of the thousands of young people who attend hospital each year with violence - related injuries and who survive to live with scars and psychological trauma. Public health approaches that address attitudinal causes of youth violence, and that intervene early on with at - risk youth, may be effective at reducing youth violence. Objectives - To systematically review violence prevention programmes for young people involved in, or at risk of violence that include a mentoring, mediation or peer - support component. Search methods - To identify eligible studies for inclusion in the review searches were made of: 15 electronic bibliographic databases for published work; grey literature for unpublished work; trials registers for ongoing and recently completed trials; reference lists of the included studies. Selection criteria - Broad inclusion criteria were used to identify eligible studies including any interventions that included contact and interaction with a positive role model. The role model might be a peer (of similar age and/or background), a mentor (someone with more experience, skills and abilities), or a peer mediator who intervenes between youth to prevent retaliation. Study designs included randomised controlled trials (RCT), cluster randomised trials (CRT), controlled before - after (CBA) studies, cohort studies and case - con trol (CC) studies. Participants included perpetrators of violence and those at risk of violence who were aged less than 25 years. Outcomes were carrying a weapon, violence, offending, and health service use due to injury. Crime and self - reported outcomes were included. Data collection and analysis - All studies identified through the search process were imported into EPPI - Reviewer 4 software where screening, full text coding and data extraction took place. Two review authors independently conducted an initi al screening to identify all potentially relevant reports of studies. Full - text reports were obtained and assessed by each review author in EPPI - Reviewer 4 for final inclusion in the review. Disagreements were resolved by discussion with a third review aut hor. Data extracted from included studies were summarised using the 'EMMIE' framework , developed by researchers at the UCL Jill Dando Institute of Security and Crime Science: Effect size (how effective is the intervention?), Mechanism (how does the interve ntion work?), Moderators (in which contexts does the intervention work?), Implementation (what is needed to implement the intervention?), and Economics (how much might the intervention cost?). Results - Sixteen studies were identified for inclusion with ni ne evaluating mentoring interventions (2 RCTs, 3 CBA, 3 Cohort/CC, 1 economic evaluation); two evaluating mediation interventions (2 CRT); and five evaluating peer - led interventions (1 CRT, 3 CBA, 1 Cohort). Most studies were conducted in the USA, with one in the UK. Studies were heterogeneous in terms of participants, interventions and outcomes so a meta - analysis was not considered to be appropriate. Mentoring - one RCT found a reduction in numbers of fights and fight injuries after 6 months in assault injured youth (not statistically significant). An analysis of a national cohort found mentored youth were less likely t o report hurting anyone in a fight. Another RCT found no effect on reconviction rates after 2 - year period in persistent offenders. One CBA study found more re - arrests in mentored youth (statistically significant). Another CBA study found fewer criminal con tacts 6 months following release in youth offenders (statistically significant). Mediation - One RCT of mediation in a school - based violence prevention programme found violent behaviours were halved (not statistically significant). One CRT of peer - mediation in schools found no evidence for a reduction in aggressive behaviours (fighting and injuries due to fighting). Peer - support - In schools a CRT found a reduction (not statistically significant) in physically violent acts 2 years following a multi - component programme with a peer - led component. A CBA study found a reduction in aggressive behaviour when a violence prevention curriculum was administered by a teacher with a peer - leader. In a detention facility a CBA study found increased reoffending among high - ri sk youth receiving a multi - component intervention with peer - support (53% intervention vs. 29% of controls; p=0.08); there was no violence outcome.

Details: London: College of Policing, 2015. 69p.

Source: Internet Resource: What Works: Crime Reduction Systematic Review Series, No. 2: Accessed August 1, 2016 at: http://whatworks.college.police.uk/About/Systematic_Review_Series/Documents/SR2%20Youth_Violence_15Nov15.pdf

Year: 2015

Country: International

Keywords: Mediation Programs

Shelf Number: 139928


Author: Bagnall, Anne-Marie

Title: A systematic review of the effectiveness and cost-effectiveness of peer education and peer support in prisons

Summary: Background: Prisoners experience significantly worse health than the general population. This review examines the effectiveness and cost-effectiveness of peer interventions in prison settings. Methods: A mixed methods systematic review of effectiveness and cost-effectiveness studies, including qualitative and quantitative synthesis was conducted. In addition to grey literature identified and searches of websites, nineteen electronic databases were searched from 1985 to 2012. Study selection criteria were: Population: Prisoners resident in adult prisons and children resident in Young Offender Institutions (YOIs). Intervention: Peer-based interventions. Comparators: Review questions 3 and 4 compared peer and professionally led approaches. Outcomes: Prisoner health or determinants of health; organisational/process outcomes; views of prison populations. Study designs: Quantitative, qualitative and mixed method evaluations. Results: Fifty-seven studies were included in the effectiveness review and one study in the cost-effectiveness review; most were of poor methodological quality. Evidence suggested that peer education interventions are effective at reducing risky behaviours, and that peer support services are acceptable within the prison environment and have a positive effect on recipients, practically or emotionally. Consistent evidence from many, predominantly qualitative, studies, suggested that being a peer deliverer was associated with positive effects. There was little evidence on cost-effectiveness of peer-based interventions. Conclusions: There is consistent evidence from a large number of studies that being a peer worker is associated with positive health; peer support services are also an acceptable source of help within the prison environment and can have a positive effect on recipients. Research into cost-effectiveness is sparse.

Details: BMC Public Health (2015) 15:290. 30p.

Source: Internet Resource: Accessed August 1, 2016 at: http://old.biomedcentral.com/content/pdf/s12889-015-1584-x.pdf

Year: 2015

Country: International

Keywords: Correctional Programs

Shelf Number: 139929


Author: Bellamy, Alex

Title: Reducing Risk, Strengthening Resilience: Toward the Structural Prevention of Atrocity Crimes

Summary: Despite the commitment of world governments to the Responsibility to Protect (R2P) principle in 2005 to prevent genocide, war crimes, ethnic cleansing, and crimes against humanity (atrocity crimes), it has proven difficult to make the prevention of atrocity crimes a lived reality. It has been common to separate prevention into two components: operational prevention, aimed at preventing violence that is imminent, and structural prevention, aimed at reducing or mitigating the underlying risks of violent conflict ahead of time. Over the past decade, steady progress has been made on developing the operational prevention of atrocity crimes. However, somewhat less progress has been made on structural prevention, largely because this important work upstream from atrocity crimes does not receive the world attention of the crimes themselves. Also, the work of structural prevention is integrated with a range of additional program areas and processes, including governance and the rule of law, peacebuilding, and human rights. Despite the lack of attention and broader, more comprehensive program processes, the work of structural prevention is absolutely essential to truly preventing atrocity crimes. Over a number of years, the Stanley Foundation has supported fresh thinking and policy dialogue on structural prevention. This policy analysis brief attempts to synthesize the key conclusions from this work, and importantly, articulates ways to translate theories of structural prevention into practice.

Details: Muscatine, IA: Stanley Foundation, 2016. 31p.

Source: Internet Resource: Policy Analysis Brief: Accessed August 2, 2016 at: http://www.stanleyfoundation.org/publications/pab/Risk-Resilience-BellamyPAB416.pdf

Year: 2016

Country: International

Keywords: Atrocity Crimes

Shelf Number: 139939


Author: Australia. Parliament. Joint Standing Committee on Foreign Affairs, Defence and Trade

Title: A World Without the Death Penalty: Australia's Advocacy for the Abolition of the Death Penalty

Summary: There is no place for the death penalty in the modern world. State execution is a barbaric act that demeans the State that carries it out. The death penalty is cruel and inhumane, and is inevitably associated with miscarriages of justice, the inadvertent execution of innocents, and the disproportionate execution of the poor and ethnic and religious minorities. Not only does an eye for an eye leave the world blind, but the deliberate destruction of human life as a response to crime is an affront to the 'right to life', enshrined under international human rights law. The world has come a long way towards ceasing the practice of capital punishment. Amnesty International tells us that in 1977 only 16 countries had abolished the death penalty. Since that year, Amnesty and many others have campaigned vigorously for an end to capital punishment, and by 2015 140 countries had abolished it law or in practice. However, there is no room for complacency. There are still 56 countries that actively retain the death penalty, including some that execute hundreds of people each year. Disturbingly, the year 2015 saw the highest number of executions recorded worldwide since 1989. It also saw the appalling executions of Australians Andrew Chan and Myuran Sukumaran in Indonesia for drug trafficking, despite impassioned appeals from many Australians and sympathetic Indonesians. Thankfully this spike in executions was counterbalanced by four countries abolishing the death penalty for all crimes. This was the highest number to join the abolitionist list in a single year for almost a decade. Half of the countries in the world have now abolished capital punishment completely. Australia has long supported abolition, and is an active advocate on the world stage. As a nation, we can be proud of our advocacy and our support for the United Nations' work on abolition. But Australia can do more. Evidence received in the course of this inquiry offered many ideas for invigorating Australia's advocacy; from multilateral and bilateral strategies, to an increase in funding for civil society organisations, especially those in retentionist countries. Witnesses also offered useful suggestions for improving Australia's messaging around our opposition to capital punishment. In light of evidence received, this report makes recommendations that go towards focussing Australia's international advocacy and dedicating additional resources to this work. Specifically, the report recommends the Australian Government develop, fund and implement a whole-of-government strategy that focusses our efforts on retentionist countries in the Indo-Pacific region, as well as our ally the United States of America. The recommendations propose overarching goals for the strategy, as well as concrete actions to focus Australia's efforts. The inquiry also facilitated an energetic discussion on the issue of drug trafficking and law enforcement, with many witnesses concerned about the number of people executed for drug-related crimes, particularly in Asia and the Middle East. As such, the report makes recommendations aimed at strengthening the safeguards currently in place to prevent exposing people to the death penalty as a result of police-to-police cooperation on transnational crime.

Details: Canberra; Australian Parliament, 2016. 204p.

Source: Internet Resource: Accessed August 2, 2016 at: http://www.aph.gov.au/Parliamentary_Business/Committees/Joint/Foreign_Affairs_Defence_and_Trade/Death_Penalty/Report

Year: 2016

Country: International

Keywords: Capital Punishment

Shelf Number: 139940


Author: Rios, Viridiana

Title: The impact of crime and violence on economic sector diversity

Summary: Literature has focused attention on identifying whether crime and violence impact growth via changes in economic factor accumulation, i.e. reducing labor supply or increasing capital costs. Yet, much little is known as to how crime and violence may affect how economic factors are allocated. Using a unique dataset created with a text-analysis algorithm of web content, this paper traces a decade of economic activity at the subnational level to show that increases in criminal presence and violent crime reduce economic diversification, increase sector concentration, and diminish economic complexity. An increase of 9.8% in the number of criminal organizations is enough to eliminate one economic sector. Similar effects can be felt if homicides rates increase by more than 22.5%, or if gang-related violence increases by 5.4%. By addressing the impact that crime has on the diversification of production factors, this paper takes current literature one step forward: It goes from exploring the effects of crime in the demand/supply of production factors, to analyzing its effects on economic composition.

Details: Unpublished paper, 2016. 27p.

Source: Internet Resource: Accessed August 2, 2016 at: http://scholar.harvard.edu/files/vrios/files/riosv_crimesectordiversitydec212015.pdf

Year: 2016

Country: International

Keywords: Economics of Crime

Shelf Number: 139946


Author: Halchin, L. Elaine

Title: The 2016 Olympic Games: Health, Security, Environmental and Doping Issues

Summary: Issues affecting the safety and security of athletes and spectators at the 2016 Olympic Games, which begins August 5 in Rio de Janeiro, Brazil, are reviewed in this report from the Congressional Research Service. Concerns addressed in the CRS report include the Zika virus outbreak, domestic crime, the threat of terrorism, environmental hazards, and more.

Details: Washington, DC: Congressional Research Service, 2016. 38p.

Source: Internet Resource: CRS Report R44575: Accessed August 3, 2016 at: http://www.fas.org/sgp/crs/row/R44575.pdf

Year: 2016

Country: International

Keywords: Athletes

Shelf Number: 139955


Author: Rogers, Douglas B.

Title: Organizing Crime: Towards a Theory of the Criminal Firm

Summary: This dissertation investigates the industrial organization of criminal enterprise. We argue that differences in contestability across criminal industries crucially shape how producers in these industries organize. In more contestable criminal industries, producers use organizational hierarchy to enforce collusion and preserve their returns. However, hierarchy creates scope for boss self-dealing and so is costly. In less contestable criminal industries, where producers' benefit from colluding is smaller, this cost exceeds organizational hierarchy's benefit. Here producers organize "flatly" instead. To examine this hypothesis we explore history's most infamous criminal organizations: the Sicilian Mafia and Caribbean pirates. It also investigates the problem of external costs within a violent criminal industry. These costs arise when the activities of one criminal enterprise result in increased pressure by the state on other criminal enterprises. Since the costs of violent crime are borne in part by other criminal enterprises, each criminal enterprise engages in a suboptimally high degree of criminal activity from the perspective of the industry as a whole, driving profitability towards zero. In order to internalize the costs of violence, and thus sustain criminal activity, criminals establish collusive inter-firm institutions designed to regulate the overall amount of criminal activity. These institutions, however, once established, increase profitability in the industry and thus elicit competition amongst the cartel members, increasing the amount of criminal activity. Thus, criminal industries facing problems of external costs exhibit a cycle of regulated and unregulated violent activity. To test this hypothesis, I examine inter-firm institutions, known as commissions, in La Cosa Nostra1. Finally, a laboratory experiment was conducted to examine the performance of a market for protection in the absence of external enforcement. The focus of the experiment is whether subjects given the power to protect or predate, designated as "elites," form a cartel and charge a monopoly price to a set of subjects we label "peasants", or whether these elites compete as separate entities and charge peasants a competitive price. The price of protective services is measured by the amount of tribute transferred by peasants to a particular elite. Since we endow elites with superior ability in the use of force, they may also utilize involuntary transfers, La Cosa Nostra is commonly referred to as the Sicilian Mafia. which incur deadweight losses, to transfer resources. Thus, the subjects are motivated to devise a voluntary means of transfer through tribute within our environment. A baseline treatment was run where there was only a single provider of protection to establish a benchmark comparison. In building the design design, several different literatures were drawn upon, which discuss the viability of a private market for protection. This debate is particularly salient to discussions of protection services in developing countries.

Details: Fairfax, VA: George Mason University, 2011. 103p.

Source: Internet Resource: Dissertation: Accessed August 3, 2016 at: http://mars.gmu.edu/bitstream/handle/1920/6380/Rogers_dissertation_2011.pdf?sequence=1&isAllowed=y

Year: 2011

Country: International

Keywords: Criminal Networks

Shelf Number: 139958


Author: Chaudhuri, Eliana Riggio

Title: Thematic Report: Unrecognised Sexual Abuse and Exploitation of Children in Child, Early and Forced Marriage

Summary: When girls attain sexual maturity, their vulnerability to sexual violence rises, along with parental apprehension about their safety. Especially in traditional and poor communities where girls' roles are often expected to be that of mothers and wives, puberty may coincide with school dropout and early marriage. Parents who marry their children before they reach legal age are typically motivated by predetermined social and sexual norms, low value attached to daughters, poverty or humanitarian crises. Confronted with social pressure and family hardship, they may seek in marriage a form of protection to shield their he implications of CEFM for human and social development have been placed in sharper focus in recent years, with concern especially growing for the violation of sexual and reproductive rights suffered by underage child brides and mothers, who are more prone to experiencing maternal and child mortality and malnutrition, as well as sexually transmitted diseases, including HIV and AIDS. As its significant ramifications for the survival, adequate growth and healthy development of children have been increasingly appreciated, more limited attention has been paid to the violation of the entire range of child rights to ascertain how prematurely entering a marital union increases overall vulnerability. To contribute to filling persisting gaps in knowledge and awareness, ECPAT International and Plan International have endeavoured to investigate the impact of child marriage on child protection, analysing, in particular, the various forms that sexual abuse and exploitation of children take in the context of such a universally revered social institution. Sexual violence suffered in early marriage is arguably one of the most severe levels of violation experienced by victims of a set of other rights infringements. Deciding if, when and whom to marry is one of the most important life choices a person can make. It is also a fundamental human right. International law recognises that CEFM is a harmful practice and a serious human rights violation. While child marriage is outlawed in most countries of the world, legal provisions are widely unknown, ignored or unenforced. As efforts have been progressively mounting to address sexist gender norms and behaviours, encourage school education, especially for girls, build national birth and marriage registration systems and strengthen law enforcement mechanisms to ensure that marriage is entered into only by consenting adults, there is still a need to understand in further depth the effects of marriage on children's safety, balanced development and emotional wellbeing. This thematic report aims to contribute to deepening the appreciation of the interconnections linking CEFM to sexual abuse and exploitation of children, also of a commercial nature. It proposes a conceptual framework through which to analytically examine the various forms children from of sexual violence being perpetrated in the context of early marriage. CEFM is an important constituent in the continuum of harm affecting adolescent girls. It forces girls to live in sexually threatening environments, engage in premature regular sexual activity, and often become victims of physical, psychological, emotional and sexual abuse by their husbands and his family members. In addition to serious reproductive and sexual health consequences, such as unwanted pregnancies and higher exposure to sexually transmitted infections, girl children suffer deep psychological trauma, even displaying symptoms of child sexual abuse and post- traumatic stress. Multiple pregnancies, restricted access to education and income generation opportunities, enforced social seclusion, early widowhood and abandonment are common consequences of child marriage, trapping survivors in a cycle of sexual exploitation and violence that may continue for the rest of their lives.

Details: Bangkok: ECPAT International, 2015. 108p.

Source: Internet Resource: Accessed August 3, 2016 at: http://www.ecpat.org/wp-content/uploads/2016/04/Child%20Marriage_ENG.pdf

Year: 2015

Country: International

Keywords: Child Marriage

Shelf Number: 139962


Author: Sethi, Dinesh

Title: European report on preventing child maltreatment

Summary: Child maltreatment is a leading cause of health inequality, with the socioeconomically disadvantaged more at risk. It worsens inequity and perpetuates social injustice because of its far-reaching health and development consequences. In spite of child maltreatment being a priority in most countries in the WHO European Region, few have devoted adequate resources and attention to its prevention. this report outlines the high burden of child maltreatment, its causes and consequences and the cost−effectiveness of prevention programmes. It makes compelling arguments for increased investment in prevention and for mainstreaming prevention objectives into other areas of health and social policy, reflecting the whole-of-society approach promoted by Health 2020 and the need for increased intersectoral working and coordination. the report offers policy-makers a preventive approach based on strong evidence and shared experience to support them in responding to increased demands from the public to tackle child maltreatment. Prevention programmes that stop maltreatment from occurring in the first place and reduce children's exposure to adversity have wide-ranging public health and societal benefits.

Details: Copenhagen: World Health Organization, Regional Office for Europe, 2013. 130p.

Source: Internet Resource: Accessed August 4, 2016 at: http://www.euro.who.int/__data/assets/pdf_file/0019/217018/European-Report-on-Preventing-Child-Maltreatment.pdf

Year: 2013

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 130005


Author: Robertson, Robyn D.

Title: Female Drunk Drivers: A Qualitative Study. History and Experiences in the System

Summary: While males constitute a significant portion of the impaired driving problem, there is evidence of a growing number of DWI arrests among females, and incremental increases among female drivers testing positive for alcohol in fatal crashes in some jurisdictions in the U.S. This suggests that women are an important part of the problem and warrant attention. Although an examination of female self-report data on drinking and driving not provide an accurate or complete picture of female drunk drivers today; nor does it identify effective programs and interventions specific to this population. What is known is that there are important differences between male and female DWI offenders. To summarize: > Many female drunk drivers have substance abuse issues which they tend to develop later in life than male counterparts. > A majority of these women are likely to be single, separated, divorced, or be living with a partner with an alcohol problem. > Female offenders tend to be older than males and have higher levels of education but lower paying jobs. > Female DWI offenders have significantly higher co-morbidity relative to males. > Several factors contribute to their alcohol use including a family history of alcoholism, history of abuse or trauma, mental health issues, and relationship problems. Little is known about effective programs and interventions for convicted female drunk drivers, although data suggest that they account for 15- 25% of DWI offenders in traditional drunk driving programs such as alcohol monitoring and DWI Courts. Available research mainly focuses on treatment effectiveness among substance abusing females. Features of effective programming include provision of childcare and transportation options in conjunction with access to treatment, customized treatment to meet individual risks and needs, individual counseling, and women- only programs or women-only group therapy. shows it has remained stable at 10-20% , and crash data from the Fatality Analysis Reporting System (FARS) reveals incremental changes in drinking and driving among females in the past three decades (12% in the 1980s to 14% in the 2000s), there has been a dramatic increase in the number of women arrested for drunk driving in just the past decade. To illustrate, the number of female DWI arrests has risen nationally by 28.8% between 1998 and 2007. A majority of the available research examines male drunk driving offenders. Women account for a much smaller proportion of the problem (approximately 20%), making it difficult to conduct meaningful research about this population. Moreover, much of this research is outdated. Hence, it does not provide an accurate or complete picture of female drunk drivers today; nor does it identify effective programs and interventions specific to this population. What is known is that there are important differences between male and female DWI offenders. To summarize: Many female drunk drivers have substance abuse issues which they tend to develop later in life than male counterparts. A majority of these women are likely to be single, separated, divorced, or be living with a partner with an alcohol problem. Female offenders tend to be older than males and have higher levels of education but lower paying jobs. Female DWI offenders have significantly higher co-morbidity relative to males. Several factors contribute to their alcohol use including a family history of alcoholism, history of abuse or trauma, mental health issues, and relationship problems. Little is known about effective programs and interventions for convicted female drunk drivers, although data suggest that they account for 15- 25% of DWI offenders in traditional drunk driving programs such as alcohol monitoring and DWI Courts. Available research mainly focuses on treatment effectiveness among substance abusing females. Features of effective programming include provision of childcare and transportation options in conjunction with access to treatment, customized treatment to meet individual risks and needs, individual counseling, and women- only programs or women-only group therapy.

Details: Ottawa: Traffic Injury Research Foundation (TIRF), 2013. 143p.

Source: Internet Resource: Accessed August 4, 2016 at: http://www.tirf.ca/publications/PDF_publications/2013%20Female%20Drunk%20Drivers%20-%20A%20Qualitative%20Study.pdf

Year: 2013

Country: International

Keywords: Driving Under the Influence

Shelf Number: 130003


Author: Cooper, Adam

Title: Prevention, Disengagement and Suppression: A Systematic review of the literature on strategies for addressing young people's involvement in gangs

Summary: Despite the fact that gang research has a long history , there is limited evidence that attempts to intervene or prevent young people from joining gang s have been successful. The limits in the evidence are partly due to the fact that few good quality evaluations have been carried out, and therefore it is difficult to draw definitive conclu sions based on sound science. In other words, because we don't have the sound science, programmes might be doing well, or they might be doing badly - we just don't know. The lack of evidence is also due to the nature of the gang problem: gangs are by-products of communities suffering from multiple social problems, such as poor education and unemployment. These are complex problems, and solutions to these problems are always going to need to be complex. Solv ing the problem of gangs is therefore not simple: multi-focus, complex programmes are needed. Because the causes and the solutions are complex, understanding them scientifically is also much more complex than it would be if they were simple. Nonetheless, there have been attempts to address gang s, in different cities around the world, and we do have some evidence from these attempts. Interv entions to alleviate the problem of young people's involvement in gangs are usually classified a s prevention, disengagement or suppression. Preventative measures aim to stop young pe ople from getting involved in gangs in the first place. Disengagement interventions help you ng people already involved in gangs, to withdraw from them. Suppression operations attempt t o use law enforcement strategies to deal with high-profile individual gangsters, and to keep gang activity to a minimum (Lafontaine, Ferguson, & Wormith, 2005; Klein & Maxson, 2006). Rec ent evidence suggests that effective programmes usually combine prevention, disengagement and suppression, and are uniquely tailored to specific communities and the specific age groups of young people involved (Spergel, 1995).

Details: Cape Town: Child, Youth Family & Social Development, Human Sciences Research Council, 2008. 45p.

Source: Internet Resource: Accessed August 5, 2016 at: http://comunidadesegura.org.br/files/active/0/HSRC_gang_prevention_strategies.pdf

Year: 2008

Country: International

Keywords: Gang Suppression

Shelf Number: 130026


Author: von Kistowski, Kristin

Title: Port State Performance: Putting Illegal, Unreported and Unregulated Fishing on the Radar

Summary: Illegal, unreported and unregulated (IUU) fishing is notorious for undermining efforts to manage fisheries sustainably and has detrimental environmental, social and economic consequences. Pew's Port State Performance research focuses on the role that port States play in abating IUU fishing by assessing how effectively they are implementing port State measures. As the situation stands, the system of port State measures lacks transparency, accountability and global reach, and is thus failing to close loopholes exploited by IUU operators and to keep IUU fish out of ports (flothmann et al. 2010). Without effective management of fish stocks, the outlook for global fisheries is bleak. Unscrupulous owners and operators of fishing vessels around the world continue to undermine fisheries management by disregarding regulations designed to conserve the marine environment. Just the unlawful aspects, namely illegal and unreported fishing, account for catches equivalent to approximately one-fifth of the global reported fish catch. In response to the consistent failure of many flag States to control IUU vessels on the high seas, the international community initiated an additional approach to tackling IUU fishing: port State measures. By adopting restrictive measures in ports where IUU catch is landed, port States can prevent IUU fish from entering international trade and finding their way into key markets. accordingly, national, regional and global initiatives have been focusing over the past decade on the adoption and implementation of increasingly stringent port State measures to combat IUU fishing. this has culminated in the negotiation of the agreement on Port State measures to Prevent, Deter and eliminate Illegal, Unreported and Unregulated fishing (PSMA), which was approved by the United nations food and agriculture organization (FAO) in November 2009. Once the PSMA enters into force, it will be the first legally binding international treaty designed solely to combat IUU fishing. The Pew Environment Group has undertaken the first comprehensive evaluation of the effectiveness of current port State measures and the implementation challenges that port States face. The study also assesses the central role that regional fisheries management organisations (RFMOs) play in the process. The research focuses on port State measures directed specifically at vessels on the IUU vessel lists adopted by RFMOs - vessels that have been found to engage in or support IUU fishing. Imposing sanctions on these vessels at port aims at rendering their operations less profitable and lucrative. This study reviews the IUU vessel lists of the following eight RFMO: (1) Commission for the Conservation of Antarctic Marine Living Resources (CCAMLR), (2) Inter-American Tropical Tuna Commission (IATTC), (3) International Commission for the Conservation of Atlantic Tunas (ICCAT), (4) Indian Ocean Tuna Commission (IOTC), (5) Northwest Atlantic Fisheries Organisation (NAFO), (6) North East Atlantic Fisheries Commission (NEAFC), (7) South East Atlantic Fisheries Organisation (SEAFO), and (8) Western and Central Pacific Fisheries Commission (WCPFC). The research consolidates six years of data on the movement of 178 IUU-listed vessels, tracking their port visits globally from January 2004 to December 2009. a single list of IUU vessels was compiled by combining the eight RFMOs' IUU vessel lists and supplemented with additional vessel identification information. Movement data on these IUU-listed vessels was obtained from commercial databases maintained by Lloyd's register - Fairplay (Sea-web), Lloyd's Marine Intelligence Unit (MIU) and shipspotting.com. This data set was supplemented with information from port logs, national fisheries authorities and RFMO secretariats.

Details: Philadelphia: Pew Charitable Trusts, 2010. 38p.

Source: Internet Resource: Accessed August 5, 2016 at: http://www.pewtrusts.org/~/media/post-launch-images/2015/04/2015_april_pew_port-state-performance--putting-iuu-on-radar(1).pdf

Year: 2010

Country: International

Keywords: Illegal Fishing

Shelf Number: 130028


Author: Turner, Mandy

Title: The Impact of Armed Violence on Poverty and Development. Full Report of the Armed Violence and Poverty Initiative

Summary: This study examines the extent to which armed violence and small arms and light weapons (SALW) possession and usage, impoverishes individuals, groups, societies and states in various armed violence situations. The objective of the study is not only to advance and clarify understandings and knowledge in this area, which has been largely neglected in policy and research, but also to inform programme design and evaluation. In addition, it offers suggestions on how donors and agencies working in the field of armed violence/SALW and development can work better together to alleviate poverty.

Details: Bradford, UK: University of Bradford, Centre for International Cooperation and Security, 2005. 99p.

Source: Internet Resource: Accessed August 6, 2016 at: https://bradscholars.brad.ac.uk/bitstream/handle/10454/1006/AVPI_Synthesis_Report.pdf?sequence=1

Year: 2005

Country: International

Keywords: Armed Violence

Shelf Number: 140020


Author: World Health Organization

Title: INSPIRE: Seven Strategies for Ending Violence Against Children

Summary: Globally, hundreds of millions of children - up to one billion - have experienced physical, sexual or psychological violence in the past year. INSPIRE: seven strategies for ending violence against children identifies a select group of strategies that have shown success in reducing violence against children. They are: implementation and enforcement of laws; norms and values; safe environments; parent and caregiver support; income and economic strengthening; response and support services; and education and life skills. INSPIRE is WHO's main contribution to the newly established Global Partnership to End Violence Against Children.

Details: Geneva, SWIT: WHO, 2016. 108p.

Source: Internet Resource: Accessed August 6, 2016 at: http://apps.who.int/iris/bitstream/10665/207717/1/9789241565356-eng.pdf?ua=1

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 140021


Author: DLA Piper

Title: Empty Threat 2015: Does the Law Combat Illegal Wildlife Trade? A review of legislative and judicial approaches in fifteen jurisdictions

Summary: EMPTY THREAT 2015: DOES THE LAW COMBAT ILLEGAL WILDLIFE TRADE? EXECUTIVE SUMMARY By Project Leaders and General Editors DLA Piper Richard Obank, Partner & Location Head Andrew Schatz, Associate Allan Flick, Solicitor Amy Heading, Pro Bono Manager & Counsel Staś Kuźmierkiewicz, Pro Bono Associate Emma Brookes, Pro Bono Trainee In 1975, the Convention on International Trade in Endangered Species of Wild Fauna and Flora (" CITES ") entered into force through ratification or accession by ten countries. Today, 181 countries are Contracting Parties to CITES, and yet illegal trade in wildlife has continued to proliferate to the point where it ranks behind only trafficking in drugs, guns and human beings in the value of illegal trade. Almost all of the 181 Contracting Parties have some form of principal domestic legislation implementing CITES and setting out offences relating to the illegal trade in wildlife which are subject to prose cution through their respective domestic judicial processes. Many Contracting Parties also have ancillary legislation that can be used to prosecute illegal trade in wildlife. Examples include legislation with respect to money laundering, illegal use of wea pons and anti-corruption legislation. Numerous factors are cited as drivers of the proliferation of the illegal trade in wildlife, including wealth, poverty, corruption, and cultural demands. Strong principal and ancillary legislation and enforcement thr ough an effective judicial process act as deterrents to this criminal activity. By contrast, weak or limited legislation enforced on a haphazard basis by a judiciary with limited experience or capacity to prosecute not only fails to deter, but creates an e nvironment where those engaging in such activities are emboldened. Notwithstanding the number of Contracting Parties to CITES, much work still needs to be done to strengthen legislation around the world and improve prosecutorial and judicial capacity and p rocess. DLA Piper was engaged by The Royal Foundation of the Duke and Duchess of Cambridge and Prince Harry (" The Royal Foundation "), on behalf of the United for Wildlife partnership, to review and evaluate the legislation and judicial processes with resp ect to illegal trade in wildlife in fifteen jurisdictions: Angola, Cambodia, The Republic of the Congo (" Congo "), Gabon, Indonesia, Laos, Mongolia, Mozambique, Myanmar, Namibia, Pakistan, South Africa, Sri Lanka, Zambia, and Zimbabwe. A team of 80 lawyers from 25 DLA Piper offices around the world reviewed and analysed the relevant principal and ancillary legislation, and domestic prosecutorial and judicial processes, using this information to produce a report for each country. This report follows on our initial eleven - country report, published in 2014, for the following jurisdictions: Botswana, Cameroon, China, Democratic Republic of Congo (" DRC "), Kenya, Malaysia, the Philippines, Tanzania, Thailand, Uganda and Vietnam. Following an executive summary, each country report includes an overview of the principal legislation on the illegal trade in wildlife. This is generally the domestic legislation implementing CITES, but may also include other wildlife, environment, and natural resources legislation. The reports then discusses the criminal penalties (fines and imprisonment) associated with illegal trade in wildlife, with an emphasis on whether such penalties cause the crime to be considered a "serious crime" within the meaning ascribed by the United Nations Office of Drugs and Crime (" UNODC "). The reports also review relevant ancillary legislation that can be used to prosecute crimes associated with the illegal trade in wildlife. Each report then assesses the local judicial process and capacity to enforce th e domestic principal or ancillary legislation. Where information is available, the reports also assess relevant enforcement actions taken under the principal and ancillary legislation. The reports then conclude with observations and recommendations based on the findings of each country team. The only consistent theme in the country reports is that significant work needs to be done in each country in order to effectively tackle the illegal wildlife trade. With few exceptions, weaknesses exist in the princip al legislation of each of the countries analysed. These include significant loopholes, variations on provincial implementation of national laws, inadequate penalties, and in some cases, extremely antiquated legislation or legislation which is expressly con trary to the country's obligations under CITES. Substantial differences exist across the countries analysed, in terms of the severity of penalties for violating local law. Several reports discuss limitations regarding lack of capacity, including insufficie nt numbers of park rangers, poorly funded and understaffed enforcement agencies (detectives, police, prosecutors), and limited prosecutorial power or experience. Each report identifies issues with judicial procedure and capacity. All of these countries face a number of competing priorities, such as poverty eradication, improving education, violent crime, military or civil strife, and terrorism. In some cases, a lack of political willpower has led to insufficient enforcement action.

Details: London: DLA Piper, 2016. 498p.

Source: Internet Resource: Accessed August 6, 2016 at: https://www.dlapiper.com/~/media/Files/News/2015/05/IllegalWildlifeTradeReport2015.pdf

Year: 2016

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 140023


Author: Cameron, Genevieve

Title: Child Sexual Exploitation: A study of international comparisons

Summary: The issue of Child Sexual Exploitation (CSE) has been the focus of intense discussion, debate and intervention in the UK in recent years. At a summit in March 2015, the Prime Minister described CSE as a 'national threat', and announced that child sexual abuse will be given the same priority by the police as serious and organised crime. A number of high profile cases of CSE have all received national attention, with a series of inquiries, reports and research into what went wrong in local and national systems, how the abuse could have been prevented, and how victims could be better supported in future. This report presents a rapid desk review of international comparisons of CSE, aiming to explore: How is Child Sexual Exploitation defined in selected countries? To what extent is there consistency in the response of public agencies around the world? What can the UK learn from experience elsewhere?

Details: Nottingham, UK: Virtual Staff College, 2015.

Source: Internet Resource: Accessed August 6, 2016 at: http://www.virtualstaffcollege.co.uk/wp-content/uploads/CSE_main_final_publish_1.0.pdf

Year: 2015

Country: International

Keywords: Child Pornography

Shelf Number: 140024


Author: Inter-American Commission on Human Rights

Title: Violence against Lesbian, Gay, Bisexual, Trans and Intersex Persons in the Americas

Summary: The Inter-American Commission on Human Rights today is publishing a regional report on the violence perpetrated against lesbian, gay, bisexual, trans, and intersex (LGBTI) persons or those perceived as LGBTI; persons with non-normative sexual orientations or gender identities and expressions; or those whose bodies differ from the socially accepted male or female standard. Some countries in the region have made significant progress in recognizing the rights of LGBTI persons, but there are still high rates of violence in all countries of the region. As the many testimonies included in the report show, this violence tends to be extremely brutal and cruel. Moreover, the everyday violence that affects LGBTI persons is often invisible, as it is not reported to the authorities or covered by the media. The report focuses on violence against LGBTI persons as a complex and multifaceted social phenomenon and not just as an isolated incident or individual act. For example, violence against intersex persons is based on prejudice toward body diversity and specifically toward those whose bodies differ from what is considered male or female. The violence suffered by intersex persons for the most part is different from that suffered by lesbian, gay, bisexual, and trans (LGBT) persons. Many acts of violence against LGBT persons - often known as hate crimes -are better understood as part of the concept of violence based on prejudice toward non-normative sexualities and identities. Different sexual orientations and identities challenge fundamental heteronormative notions about sex, sexuality, and gender. In this sense, violence and sexual violence against LGBT persons are used to punish and denigrate those who do not fit into these concepts because of their sexual orientation or gender identity or expression. This violence also has a symbolic impact, as it sends a message of terror to the entire LGBT community. The report addresses the varied forms of violence against each of these population groups. According to the Registry of Violence against LGBT Persons, which the IACHR maintained for a 15-month period in 2013 and 2014, gay men and trans women account for the majority of the victims of killings and acts of police abuse. Lesbian women and bisexual persons are particularly affected by intrafamily violence and sexual violence. Trans women, for their part, are the group most affected by police violence, especially in the context of sex work. In the vast majority of cases, they are caught up in a cycle of violence, discrimination, and criminalization which tends to begin at a very early age, because of the exclusion and violence they suffer in their homes, educational centers, and communities; this is reinforced by the lack of legal recognition of their gender identity in most countries of the region. Meanwhile, the violence that affects intersex persons is very different. Intersex children are often forced to undergo surgical operations and procedures that, for the most part, are not medically necessary, for the sole purpose of changing their genitals to look more like those of a boy or a girl. These surgeries, which are irreversible in nature, tend to be done without their consent - on newborn babies or very young children—and can cause enormous harm to intersex persons, including chronic pain, loss of genital sensitivity, sterilization, trauma, and reduced ability or inability to feel sexual pleasure. The report also analyzes how the situation of violence faced by LGBTI persons intersects with other factors such as ethnicity, race, sex, gender, migration situation, status as a human rights defender, and poverty. These groups can suffer an unending cycle of violence and discrimination caused by impunity and lack of access to justice. For example, there is a strong link between poverty, exclusion, and violence. LGBT persons who live in poverty are more vulnerable to police profiling and harassment, and therefore to higher rates of criminalization and incarceration. Likewise, LGBT young people generally have limited access to housing, which increases their risk of becoming victims of violence.

Details: Washington, DC: Inter-American Commission on Human Rights, 2015. 284p.

Source: Internet Resource: Accessed August 26, 2016 at: http://www.oas.org/en/iachr/reports/pdfs/ViolenceLGBTIPersons.pdf

Year: 2015

Country: International

Keywords: Bias-Related Crime

Shelf Number: 140038


Author: London School of Hygiene and Tropical Medicine

Title: Labour Exploitation, Trafficking and Migrant Health: Multi-country Findings on Health Risks and Consequences of Migrant and Trafficked Workers

Summary: Global assessments suggest that a substantial proportion of labour migrants ends up in situations of extreme exploitation, some of whom are identified as victims of human trafficking. Because large numbers of migrant workers fall into a "grey area" between trafficking (as defined by international and national law) and exploitative labour situations, there is good reason to explore the differences and similarities between the health needs of those who have been identified as trafficked compared to other migrants working in the same labour sector who have not. It is urgent to understand present-day occupational health and safety risks, forms of abuse and exploitation in different sectors and common hazardous working and living conditions to improve prevention and response strategies. This is among the first studies to explore and compare the influence of occupational and other risk exposures on people's health and well-being and compare the experiences of migrant workers and victims of trafficking across sectors and regions. Our multiregion qualitative study on exploitation and harm experienced by individuals in the textile sector in Argentina, and artisanal gold-mining in Peru and construction sector in Kazakhstan, found important commonalities in the health hazards and financial, social and legal challenges across sectors and regions. In total, we interviewed 71 people; of these, 18 were formally identified victims of trafficking and 53 were migrant workers. Our research found that many of the abuses reported by victims of trafficking were also reported by numerous migrant workers who were not identified as victims of trafficking. Policymakers and programme staff need to look more carefully at what is happening to the larger population of people working in unregulated, informal sectors, because there are many similarities in the harm experienced by migrant workers and that experienced by identified victims of trafficking. We hope that future interventions will aim to include the larger populations of those who are in need of assistance. By making this broader investment, we will simultaneously protect against the most extreme abuses that we call modern slavery or human trafficking.

Details: Geneva: International Organization for Migration, 2015. 184p.

Source: Internet Resource: Accessed August 26, 2016 at: https://publications.iom.int/system/files/pdf/labour_exploitation_trafficking_en.pdf

Year: 2015

Country: International

Keywords: Forced Labor

Shelf Number: 140042


Author: Bud, Thomas

Title: The Rise of Body-Worn Camera Programs in Canada and the United States: An Extension of the Surveillant Assemblage

Summary: This thesis examines the extent to which body-worn cameras programs in Canada and the U.S. befit the notion of counter-law. The research is theoretically based on Ericson's (2007a) framework of counter-law and the surveillant assemblage. The results indicate that body-worn camera programs can be considered an extension of the existing surveillant assemblage. In the U.S., numerous legislative amendments exempted body-worn cameras from certain legal requirements and thus facilitated their integration into existing surveillance networks. In Canada, legal amendments were not enacted through counter-law; nevertheless, the broadness and inconsistency of existing legislation allowed body-worn camera programs to become part of the surveillant assemblage. This thesis also contributes to refinements of counter-law I and the surveillant assemblage by analyzing variations in how these concepts apply to localized contexts of uncertainty.

Details: Windsor, ONT: University of Windsor, 2016. 73p.

Source: Internet Resource: Thesis: Accessed August 26, 2016 at: http://scholar.uwindsor.ca/etd/5722/

Year: 2016

Country: International

Keywords: Body-Worn Cameras

Shelf Number: 140048


Author: Human Rights Watch

Title: Extreme Measures: Abuses against Children Detained as National Security Threats

Summary: Conflict-related violence and the rise of extremist armed groups such as the Islamic State and Boko Haram has also brought an increase in the detention of children perceived to be "security threats." In countries embroiled in civil strife or armed conflict, children are apprehended and detained without charge for months or even years on suspicion of, or involvement in, violent activity, or due to links to non-state armed groups. Many are subjected to torture, and an unknown number have died in custody. This multi-country report looks at the detention of children perceived as a threat to national security in Afghanistan, the Democratic Republic of Congo, Iraq, Israel/Palestine, Nigeria, Syria, and by the United States. Human Rights Watch urges governments to immediately end all use of detention without charge for children, transfer children associated with armed groups to child protection authorities for rehabilitation, and ensure that children charged with a recognizable criminal offense are treated in accordance with international juvenile justice standards.

Details: New York: HRW, 2016. 45p.

Source: Internet Resource: Accessed August 27, 2016 at: https://www.hrw.org/sites/default/files/report_pdf/crd_detained0716web_1.pdf

Year: 2016

Country: International

Keywords: Child Protection

Shelf Number: 140056


Author: Lessing, Benjamin

Title: How to Build a Criminal Empire from Behind Bars: Prison Gangs and Projection of Power*

Summary: Providing law and order is a core state function; the very attempt, however, can be counterproductive. Punishment incapacitates and deters individuals, presumably reducing crime, but can also empower destructive collective forces. Prison gangs, their ranks swelled by mass incarceration, transform the core of the coercive apparatus into a headquarters for organizing and taxing streetlevel criminal activity, supplanting state authority in communities, and orchestrating mass violence and protest. Drawing on a formal model, fieldwork, and case studies from the US and Latin America, I show how gangs use control over prison life, plus the state-provided threat of incarceration, to project power. The model predicts that common state responses-crackdowns and harsher sentencing- can strengthen prison gangs' leverage over outside actors, consistent with the observed expansion of prison gangs during mass-incarceration initiatives. These gang-strengthening effects of incarceration can have increasing returns, implying a point beyond which additional punishment erodes state authority.

Details: Bonn, Germany: IZA, 2014. 49p.

Source: Internet Resource: Accessed August 29, 2016 at: http://www.iza.org/conference_files/riskonomics2014/lessing_b9947.pdf

Year: 2014

Country: International

Keywords: Gangs

Shelf Number: 140067


Author: Sangero, Boaz

Title: Safety from False Convictions

Summary: This book provides readers with an exploration of ways to reduce the rate of false convictions in the criminal justice system. The criminal justice system should be seen as a Safety-Critical System, specifically a system that deals with matters of life and death, where any error is likely to cause grave harm to both the individual and society. Implementing safety in criminal law is necessary, both morally and economically. Incorporating into the criminal justice system a modern safety theory that is commonly accepted in other areas, such as space, aviation, engineering, and transportation, is an idea that was developed jointly by myself and Dr. Mordechai Halpert and presented mainly in the coauthored article "A Safety Doctrine for the Criminal Justice System." This is the starting point of the book. The book expands the preliminary proposition and engages in the application of the modern safety theory and methods in the criminal justice system. Thus, for example, the book demonstrates how the fundamentally important Identify-Analyze-Control method can and should be implemented in the system, using Nancy Leveson's STAMP's model ("System-Theoretic Accident Model and Processes"). This is the first book that proposes a general theory of safety for the criminal justice system. It provides specific safety rules for certain types of criminal evidence and criminal law procedures.

Details: Ramat Gan, Israel: The Author, 2016. 256p.

Source: Internet Resource: Accessed August 29, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2816292

Year: 2016

Country: International

Keywords: Criminal Law

Shelf Number: 140077


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Resource Guide on Good Practices in the Investigation of Match-Fixing

Summary: Following on from the partnership signed last year at the 13th United Nations Congress on Crime Prevention and Criminal Justice, UNODC and the International Centre for Sport Security (ICSS) have today unveiled a new resource guide that will help law enforcement and sports organizations better detect and investigate match-fixing and cases of sports-results manipulation. Over 40 international integrity experts contributed their knowledge to the development of the resource guide. These include officials from FIFA, the International Olympic Committee, INTERPOL, the European Commission, Hong Kong Jockey Club, World Snooker, Council of Europe, Ministries of Justice from France and the Republic of Korea, and EUROPOL. Speaking at the launch of the resource guide, John Brandolino, UNODC Director for Treaty Affairs, said: "The problem of match-fixing is such that it undermines integrity in sport with the significant illicit profits it generates allowing organized crime and corruption to thrive. In addition, the investigative skills of both law enforcement agencies and sports organizations around the world which are needed to identify and apprehend those responsible, are relatively underdeveloped." Delivering remarks on behalf of Mohammed Hanzab, President of ICSS, Emanuel Medeiros, its CEO for Europe, while highlighting the expert contributions in the development of the guide, mentioned that this handbook provides a comprehensive range of case studies, investigation techniques and approaches to combat match-fixing as well as providing valuable guidance on how to disrupt the international organized crime syndicates that now operate in sport. Themes covered in the guide include: co-operation between law enforcement and sport investigators; sources of information, allegations, intelligence and evidence; evidence and interviewing; why match-fixing is an International Issue; application of existing legal instruments, such as the UN Conventions against Corruption and Transnational Organized Crime; relationship between investigators and prosecutors in a criminal or sporting case; and alternative and complimentary approaches to combat match-fixing.

Details: New York: UNODC, 2016. 116p.

Source: Internet Resource: Accessed August 30, 2016 at: http://www.unodc.org/documents/corruption/Publications/2016/V1602591-RESOURCE_GUIDE_ON_GOOD_PRACTICES_IN_THE_INVESTIGATION_OF_MATCH-FIXING.pdf

Year: 2016

Country: International

Keywords: Corruption

Shelf Number: 140078


Author: Gerome, Rebecca

Title: Preventing Gender-Based Violence through Arms Control: Tools and guidelines to implement the Arms Trade Treaty and UN Programme of Action

Summary: Our latest report provides tools and guidelines for effective implementation of the Arms Trade Treaty and the UN Programme of Action on small arms and light weapons provisions related to gender-based violence. Based on interviews, research, and primary documents, it offers an overview of current practices in export licensing, including applications and documentations, risk assessments, information sharing, monitoring, and transparency. Analysising current practice, the report then offers guidelines for assessing the risk of GBV and suggests resources for export officials on this question.

Details: New York: Reaching Critical Will, a programme of the Women's International League for Peace and Freedom, 2016. 68p.

Source: Internet Resource: Accessed August 30, 2016 at: http://www.reachingcriticalwill.org/images/documents/Publications/preventing-gbv.pdf

Year: 2016

Country: International

Keywords: Arms Control

Shelf Number: 140091


Author: Suhr, Brigitte

Title: Funding the Fight Against Modern Slavery: Mapping Private Funds in the Anti-Slavery and Anti-Trafficking Sector: 2012-2014

Summary: Modern slavery condemns tens of millions of men, women, boys and girls to lives filled with violence, exploitation and abuse. Unscrupulous criminals prey upon the most vulnerable and marginalised people to generate illegal and unconscionable profits - up to $150 billion each year, according to the ILO. Between 20.9 million and 35.8 million people live in slavery-like conditions today. Around one in four people enslaved in the world are children. However, in recent years, a growing number of anti-slavery and anti-trafficking projects have begun to turn the tide. People have been liberated from servitude. Children at-risk of slavery have begun schooling.2 Lives have been transformed, communities renewed. Funding is absolutely critical to these efforts. Committed donors who share our vision for change are integral partners in the fight against modern slavery. This study sought to quantify the scale, focus and geographic location of private funding for antislavery initiatives, as well as identify promising trends and funding gaps that need to be addressed.

Details: London: The Freedom Fund and Humanity United, 2016. 32p.

Source: Internet Resource: Accessed August 30, 2016 at: http://freedomfund.org/wp-content/uploads/Donor-Mapping-Report-for-web-FINAL-30March16-1.pdf

Year: 2016

Country: International

Keywords: Forced Labor

Shelf Number: 140103


Author: Bodine-Baron, Elizabeth

Title: Examining ISIS Support and Opposition Networks on Twitter

Summary: The Islamic State in Iraq and Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers, and recruit new fighters. Though much less heralded, ISIS opponents have also taken to Twitter to castigate the ISIS message. This report draws on publicly available Twitter data to examine this ongoing debate about ISIS on Arabic Twitter and to better understand the networks of ISIS supporters and opponents on Twitter. To support the counter-messaging effort and to more deeply understand ISIS supporters and opponents, this study uses a mixed-methods analytic approach to identify and characterize in detail both ISIS support and opposition networks on Twitter. This analytic approach draws on community detection algorithms that help detect interactive communities of Twitter users, lexical analysis that can identify key themes and content for large data sets, and social network analysis.

Details: Santa Monica, CA: RAND, 2016. 80p.

Source: Internet Resource: Accessed September 2, 2016 at: http://www.rand.org/pubs/research_reports/RR1328.html

Year: 2016

Country: International

Keywords: ISIS

Shelf Number: 140129


Author: World Wildlife Fund

Title: Illegal Fishing: Which fish species are at highest risk from illegal and unreported fishing?

Summary: New analysis by World Wildlife Fund (WWF) finds that over 85 percent of global fish stocks can be considered at significant risk of Illegal, Unreported, and Unregulated (IUU) fishing. This evaluation is based on the most recent comprehensive estimates of IUU fishing and includes the worlds' major commercial stocks or species groups, such as all those that are regularly assessed by the United Nations Food and Agriculture Organization (FAO). Based on WWF's findings, the majority of the stocks, 54 percent, are categorized as at high risk of IUU, with an additional 32 perent judged to be at moderate risk. Of the 567 stocks that were assessed, the findings show that 485 stocks fall into these two categories. More than half of the world's most overexploited stocks are at the highest risk of IUU fishing. Examining IUU risk by location, the WWF analysis shows that in more than one-third of the world's ocean basins as designated by the FAO, all of these stocks were at high or moderate risk of IUU fishing. The U.S. imports more than 100 different wild-caught species, which represent more than 400 diverse wild-caught products. In October 2015, the U.S. National Ocean Council (NOC) Working Group on IUU Fishing and Seafood Fraud released a list of species it identified as "at risk" of IUU fishing. While there is some alignment between the species the NOC identified as "at risk" of IUU fishing and the species identified in this study, the WWF analysis demonstrates that IUU fishing is pervasive across species and regions. An effective solution to ending IUU imports into the United States must ultimately address all species entering the U.S. market.

Details: Washington, DC: WWF, 2015. 95p.

Source: Internet Resource: Accessed September 3, 2016 at: http://assets.worldwildlife.org/publications/834/files/original/Fish_Species_at_Highest_Risk_from_IUU_Fishing_WWF_FINAL.pdf?1446130921

Year: 2015

Country: International

Keywords: Fishing Industry

Shelf Number: 140136


Author: United Nations High Commissioner for Human Rights

Title: 25 Years of Fighting the Sale and Sexual Exploitation of Children: Addressing New Challenges

Summary: The last 25 years have witnessed a momentous rise in the knowledge of and awareness given to children victim of sale and sexual exploitation. Yet, significant changes have not taken place, and existing initiatives remain at the legislative or policy level without any effective implementation. This year will mark the twentieth anniversary of the first World Congress against Commercial Sexual Exploitation of Children held in Stockholm in 1996. This ground-breaking event was followed by two more congresses in Yokohama in 2001 and in Rio de Janeiro in 2008. Unfortunately, the numerous political commitments made by participating States have remained mostly unfulfilled. There is thus an urgent need for a common strong political will to move forward towards implementation through effective and sustained allocation of the necessary resources. At the international level, there is potential for concrete action with the multiplication of cooperation initiatives such as the Virtual Global Taskforce, the Global Alliance against Child Sexual Abuse Online and the #WePROTECT Children Online Initiative. Though they focus on the sale and sexual exploitation of children online, they could still impact these crimes in the real world. I aim to work specifically on reaching an effective cooperation between these initiatives in order to achieve a better protection of children and prevention of crimes. Since its creation, the mandate of the Special Rapporteur has been underfunded and has operated without a specific budget from the Human Rights Council. This constraint has limited its scope of action. It is essential to seize the opportunity of the renewal of the mandate in 2017 to provide it with sufficient funds, to effectively enable the mandate to maximise its potential. Furthermore, the renewal of the mandate would also be the occasion to recognise the evolutions in terminology in this field and thus modify the name of the mandate of the Special Rapporteur to make it child rights compliant. In September 2015, the international community adopted the Agenda for Sustainable Development, which will guide the work of many stakeholders towards a world free of poverty by 2030. The Agenda has set among its targets the eradication of abuse, exploitation, trafficking and all forms of violence against children by 2030. The international community has thus given itself a clear deadline. We can only hope that ongoing efforts at the international and national levels, including from non-governmental actors, combined with effective political resolve from world leaders and the allocation of necessary resources by States, will finally lead to the eradication of the sale and sexual exploitation of children worldwide. The mandate can make a contribution to what is most important, namely a change of the hearts and the minds of all people in order to give children their due: respect of their human rights. They are vulnerable and underrepresented and thus need more, not less human rights.

Details: Geneva: United Nations, 2016. 38p.

Source: Internet Resource: Accessed September 3, 2016 at: http://www.ohchr.org/Documents/Issues/Children/SR/25YearsMandate.pdf

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 140138


Author: International Organization for Migration

Title: Dangerous journeys -- International migration increasingly unsafe in 2016

Summary: On 19 September 2016, leaders from around the world will meet at the United Nations in New York to discuss how to address "large movements of refugees and migrants". 1 One of the issues for discussion will be how to ensure that migration is "orderly, safe, regular and responsible", 2 as the number of migrant deaths around the world continues to rise significantly. Worldwide, IOM's Missing Migrants Project has recorded 28 per cent more migrant deaths during the first half of 2016 compared with the same period in 2015 . This data briefing, produced by the International Organization for Migration’s (IOM) Global Migration Data Analysis Centre in Berlin, takes an in-depth look at the available global figures for migrant deaths and disappearances during the first half of 2016. In the first six months of 2016, more than 3,700 people went missing or lost their lives during migration around the world. This is a 28 per cent increase compared to the same time period in 2015, and a 52 per cent increase for the same time period in 2014. This dramatic change can be attributed to a higher number of recorded migrant fatalities in the Mediterranean Sea, North Africa, the Middle East and the Horn of Africa. The number of people who went missing or died during migration in other regions of the world is comparable with the same period in 2015, with some differences - including a reduction in the recorded number of deaths by drowning in the Caribbean and South-East Asia.

Details: Geneva: IOM's Global Migration Data Analysis Centre (GMDAC), 2016. 10p.

Source: Internet Resource: Data Briefing Series No. 4: Accessed September 3, 2016 at: https://publications.iom.int/system/files/gmdac_data_briefing_series_issue4.pdf

Year: 2016

Country: International

Keywords: Immigrants

Shelf Number: 140139


Author: Achilli, Luigi

Title: The Smuggler: Hero or Felon?

Summary: The general public and the media have had fun fantasising about the motives and interests that push migrants to embark on dangerous journeys across the sea. Smuggling is often understood through a simplification of both the clandestine traveller and the smuggler: a process of abstraction that overlooks any ambiguities and nuances. While researchers have abundantly studied the profile of the migrant, they had been less interested in the other key actor of the clandestine migration: the smuggler. Who is the smuggler? How does s/he operate? Why do migrants place their lives in the smuggler’s hands? The goal of this paper is to attend to the complexity of the phenomenon by looking at human smuggling across the Adriatic Sea. In light of the need to elaborate an adequate policy response to this phenomenon, a better understanding of smuggling is pivotal in ensuring the security of the receiving state and that of the migrant. With this task in mind, this paper problematizes the figure of the smugglers beyond overly simplistic generalizations and representations. In so doing, this paper argues that a truly effective answer to human smuggling would require the EU and its state members to concentrate on reducing “demand” rather than curbing “supply.”

Details: Florence, Italy: Migration Policy Centre, Robert Schuman Centre for Advanced Studies - European University Institute, 2015. 12p.

Source: Internet Resource: Policy Brief: Accessed September 7, 2016 at: http://cadmus.eui.eu/bitstream/handle/1814/36296/MPC_2015_10_PB.pdf?sequence=1

Year: 2015

Country: International

Keywords: Human Smuggling

Shelf Number: 140222


Author: Ponemon Institute

Title: 2016 Cost of Data Breach Study: Global Analysis

Summary: IBM and Ponemon Institute are pleased to release the 2016 Cost of Data Breach Study: Global Analysis. According to our research, the average total cost of a data breach for the 383 companies participating in this research increased from $3.79 to $4 million . The average cost paid for each lost or stolen record containing sensitive and confidential information increased from $154 in 2015 to $158 in this year's study. In addition to cost data, our global study looks at the likelihood of a company having one or more data breach occurrences in the next 24 months. We estimate a 26 percent probability of a material data breach involving 10,000 lost or stolen records. According to this year's findings, organizations in Brazil and South Africa are most likely to have a material data breach involving 10,000 or more records. In contrast, organizations in Germany and Australia are least likely to experience a material data breach. In this year's study, 383 companies located in the following 12 countries participated: United States, United Kingdom, Germany, Australia, France, Brazil, Japan, Italy, India, the Arabian region (United Arab Emirates and Saudi Arabia), Canada and, for the first time, South Africa. All participating organizations experienced a data breach ranging from approximately 3,000 to slightly more than 101,500 compromised records . We define a compromised record as one that identifies the individual whose information has been lost or stolen in a data breach. Seven global megatrends in the cost of data breach research Over the many years studying the data breach experience of 2,013 organizations in every industry, the research has revealed the following seven megatrends. 1. Since first conducting this research, the cost of a data breach has not fluctuated significantly. This suggests that it is a permanent cost organizations need to be prepared to deal with and incorporate in their data protection strategies. 2. The biggest financial consequence to organizations that experienced a data breach is lost business. Following a data breach, organizations need to take steps to retain customers' trust to reduce the long-term financial impact. 3. Most data breaches continue to be caused by criminal and malicious attacks. These breaches also take the most time to detect and contain. As a result, they have the highest cost per record. 4. Organizations recognize that the longer it takes to detect and contain a data breach the more costly it becomes to resolve. Over the years, detection and escalation costs in our research have increased. This suggests investments are being made in technologies and in-house expertise to reduce the time to detect and contain. 5. Regulated industries, such as healthcare and financial services, have the most costly data breaches because of fines and the higher than average rate of lost business and customers. 6. Improvements in data governance programs will reduce the cost of data breach. Incident response plans, appointment of a CISO, employee training and awareness programs and a business continuity management strategy continue to result in cost savings. 7. Investments in certain data loss prevention controls and activities such as encryption and endpoint security solutions are important for preventing data breaches. This year's study revealed a reduction in the cost when companies participated in threat sharing and deployed data loss prevention technologies.

Details: Traverse City, MI: Ponemon Institute, 2016. 32p.

Source: Internet Resource: Accessed September 7, 2016 at: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=SEL03094WWEN

Year: 2016

Country: International

Keywords: Computer Crimes

Shelf Number: 140233


Author: World Economic Forum

Title: State of the Illicit Economy: Briefing Papers

Summary: While the state of the global economy continues to fluctuate, its illegitimate counterpart, the illicit economy, has seen unprecedented growth. As such, it has etched its way into all aspects of society, and is cause for serious global concern. From healthcare to infrastructure to the arts, the illicit economy does not affect just one aspect of society, but all of them: business, government, civil society and individuals. It is a disruptor of social order to the greatest extent. A call to action must be made. The illicit economy is formed from the proceeds of illicit trade which is, in turn, largely rooted in organized crime. Whether it is human trafficking, arms trafficking, the illegal wildlife trade, counterfeiting or money laundering, these activities are incredibly lucrative and fuel the magnitude of the illicit economy. Our Global Agenda Council on Illicit Trade 2012-2014 estimated the shadow economy to be worth $650 billion. More current research projects that the cost to the global economy of counterfeiting alone could reach USD 1.77 Trillion in 2015. With technological advancements and the international nature of trade in the world today, this value is expected to continue to rise. Illicit trade operates on a vast scale and unprecedented pace, making it increasingly challenging to tackle. There are multiple initiatives and organizations, as well as public and private initiatives, dedicated to combating one or several aspects of illicit trade, but this is not a fight that can be won unilaterally. To achieve success, a global and multidisciplinary approach is needed in which the knowledge, expertise and experiences of various actors can be tapped into and shared. As an international institute for public-private partnership, the World Economic Forum provides a neutral platform for parties to come together and discuss the issue of illicit trade. The aim is to foster structured dialogue between business, civil society and government so that common methods and solutions of tackling this trade can be found. Through multidisciplinary cooperation and joint action, results can be achieved. We can disrupt the proliferation of illicit trade, whether it is by simply raising awareness of the problem within affected communities, or by finding ways of detecting and preventing crimes that contribute to ruining the economy. The World Economic Forum's Meta-Council on the Illicit Economy aims to take this principle of public-private cooperation forward. By engaging leading experts in the field, the Meta-Council will try to find viable multi-stakeholder solutions to limiting this criminal activity. This paper on the State of the Illicit Economy is the first step in the process. It sets out the parameters within which illicit trade operates, the contributing factors to illicit trade, the role that various societal sectors can play in the fight against it, and the types of solutions needed to combat it.

Details: Geneva, SWIT: World Economic Forum, 2015. 20p.

Source: Internet Resource: Accessed September 8, 2016 at: http://www3.weforum.org/docs/WEF_State_of_the_Illicit_Economy_2015_2.pdf

Year: 2015

Country: International

Keywords: Counterfeiting

Shelf Number: 140237


Author: Tuan Do, Anh

Title: Measuring the effectiveness of the enforcement of organised wildlife trade crime : a comparative assessment between Vietnam and England and Wales

Summary: In recent decades, the public has become increasingly aware that the many beautiful and varied forms of endangered wildlife species are an irreplaceable part of the natural system of the earth that must be protected for this and the next generations to come. Today, this is of more concern than ever because of the rapid rate of wildlife extinction around 27 thousand wildlife species being disappeared yearly. At this rate, one third to two thirds of all wildlife species are expected to be lost during the second half of the present century which would be equal to the total past extinctions. Meanwhile, there is much evidence to affirm that, next to habitat destruction, illegal trade offers the greatest threat to world's rarest wildlife species. Each year, about 350 million wildlife species of fauna and flora are traded on average, irrespective of international law enforcement efforts. Vietnam and England and Wales are CITES country members, both have made a lot of attempts to protect endangered wildlife species, laws relating to crime and also powers provided to law enforcement agencies have been made however they are still in danger and need both countries to do more.

Details: Bristol, UK: Bristol law School, University of the West of England, 2010. 420p.

Source: Internet Resource: Dissertation: Accessed September 8, 2016 at: http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.525193

Year: 2010

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 140241


Author: Ross, Hana

Title: Controlling Illicit Tobacco Trade: International Experience

Summary: This report presents a series of case studies on the efforts of various governments to address illicit trade in tobacco. The countries for the case studies were selected based on meeting the following set of criteria: an explicit, and in many cases a comprehensive, effort to deal with tobacco tax evasion and tax avoidance; the size of the tobacco market (both licit and illicit); the availability of data The case studies illustrate a variety of approaches implemented over time, demonstrate their varying degree of effectiveness, and consider factors modifying the success rate. Each case study begins with an initial assessment of the degree of the problem and then follows the chronological path each government took to deal with the problem. To the extent that the data is available, the case studies demonstrate the impact of each distinct set of policies on a set of outcomes, including the degree of penetration of illicit products and tobacco use prevalence. In many cases, these illicit tobacco trade measures were not adopted in isolation, but were part of a comprehensive set of strategies to reduce tobacco use. Thus, it is often not possible to separate the impact of policies addressing illicit tobacco trade from other public health measures such as increases in tobacco taxes and/or changes in tobacco tax structure. The summary table at the end of the report provides a quick overview of measures to reduce illicit tobacco trade adopted by the countries included in the case studies. Even though the list of measures included in the summary table is not comprehensive, it captures the most common interventions adopted or considered by many governments. The last section summarizes the lessons learned and proposes the most effective approach to reducing illicit tobacco trade.

Details: Cape Town, South Africa: Economics of Tobacco Control Project, University of Cape Town, 2015. 49p.

Source: Internet Resource: Draft: Accessed September 8, 2016 at: http://tobacconomics.org/wp-content/uploads/2016/01/Ross_International_Experience_8-06-15.pdf

Year: 2015

Country: International

Keywords: Illegal Tobacco Trade

Shelf Number: 140244


Author: Mercy Corps

Title: Gifts and Graft: How Boko Haram Uses Financial Services for Recruitment and Support

Summary: In April 2016, Mercy Corps published a study titled "'Motivations and Empty Promises': Voices of Former Boko Haram Combatants and Nigerian Youth," exploring the reasons youth join Boko Haram. In that initial study, we uncovered a number of factors driving support for and recruitment to Boko Haram, including governance grievances and inequality. With support from the Ford Foundation, we conducted this follow-up study to examine in greater depth how inequality drives recruitment, and particularly how Boko Haram uses financial incentives to lure people into the group. We also explored the broader landscape of financial opportunities and barriers to accessing them, with the aim of informing smart policies and programming that address youth needs and help to prevent future participation in violence. Key Findings 1. Boko Haram's financial services provide more than money: they offer the promise of protection and opportunity. Many respondents who accepted financial support and cooperated with the group's demands did so under a protection scheme from Boko Haram. In other cases, community members' desire to improve their financial standing made them receptive to recruitment tactics. 2. Communities see Boko Haram's financial services as more accessible than existing alternatives. Many respondents reported they did not know of viable alternatives to access cash or credit that would allow them to pursue their economic ambitions. They reported that government-provided economic support was not accessible without political connections or bribes. 3. Boko Haram's financial services are used both for recruitment and to gain community support. Respondents reported that Boko Haram used financial support to increase recruitment, achieve tactical aims through local business connections, and broaden popular support. 4. The conditions of Boko Haram's financial support are fluid and unpredictable. While many recipients knew the conditions of their financial assistance at the outset, others did not. Demands could come at any time and without warning and be ideological, tactical, or financial in nature. Recommendations A Increase the quality, availability, and diversity of financial services, particularly to youth with small, informal businesses. In addition to engaging with youth to discuss their financial options and needs, government and private sector financial service providers should expand their products for informal businesses, including micro loans that comply with Islamic financing. A Improve the transparency and accessibility of government-led economic programs. Respondents perceive that government economic development programs are available only to an elite few with money and connections. These programs should be more transparent and accessible for underserved populations and reinforce continued efforts to reduce corruption and address underlying governance grievances. A Expand the role of civil society in developing the Northeast's economic sector. Civil society's role in advocating for equitable economic development and government accountability is crucial to ensuring growth is inclusive and government programs are increasingly transparent.

Details: Portland, OR: Mercy Corps, 2016. 14p.

Source: Internet Resource: Accessed September 8, 2016 at: https://d2zyf8ayvg1369.cloudfront.net/sites/default/files/Gifts_and_Graft_Mercy_Corps_Sept_2016.pdf

Year: 2016

Country: International

Keywords: Financing of Terrorism

Shelf Number: 140246


Author: Zizumbo-Colunga, Daniel

Title: Crime, Corruption and Societal Support for Vigilante Justice: Ten Years of Evidence in Review

Summary: Main Findings: - In 2014, support for vigilante justice reached a 10-year high - Suriname, Ecuador, and El Salvador are the countries in which vigilante justice is the most accepted - Brazil, Bahamas, Uruguay, and Venezuela are the countries in which vigilante justice is the least accepted - Variations in societal support within the countries of the Americas are linked to the prevalence of crime and police corruption

Details: Nashville, TN: Vanderbilt University, 2015. 13p.

Source: Internet Resource: AmericasBarometer Insights: 2015 Number 120: Accessed September 8, 2016 at: http://www.vanderbilt.edu/lapop/insights/IO920en.pdf

Year: 2015

Country: International

Keywords: Police Corruption

Shelf Number: 140247


Author: Goda, Thomas

Title: Absolute Inequality and Violent Property Crime

Summary: Rational choice models argue that income inequality leads to a higher expected utility of crime and thus generates incentives to engage in illegal activities. Yet, the results of empirical studies do not provide strong support for this theory; in fact, Neumayer provides apparently strong evidence that income inequality is not a significant determinant of violent property crime rates when a representative sample is used and country specific fixed effects are controlled for. An important limitation of this and other empirical studies on the subject is that they only consider proportional income differences, even though in rational choice models absolute difference in legal and illegal incomes determine the expected utility of crime. Using the same methodology and data as Neumayer, but using absolute inequality measures rather than proportional ones, this paper finds that absolute income inequality is a statistically significant determinant of robbery and violent theft rates. This result is robust to changes in sample size and to different absolute inequality measures, which not only implies that inequality is an important correlate of violent property crime rates but also suggests that absolute measures are preferable when the impact of inequality on property crime is studied.

Details: Colombia: Center for Research in Economics and Finance (CIEF), 2016. 22p.

Source: Internet Resource: Center for Research in Economics and Finance (CIEF), Working Papers, No. 16-26: Accessed September 8, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2827788

Year: 2016

Country: International

Keywords: Inequality

Shelf Number: 147907


Author: United Nations Children's Fund - UNICEF

Title: Uprooted: The Growing Crisis for Refugee and Migrant Children

Summary: Around the world, nearly 50 million children have migrated across borders or been forcibly displaced. This report presents - for the first time - comprehensive, global data about these children - where they are born, where they move and some of the dangers they face along the way. The report sheds light on the truly global nature of childhood migration and displacement, highlighting challenges faced by child migrants and refugees in every region.

Details: New York: UNICEF, 2016. 134p.

Source: Internet Resource: Accessed September 8, 2016 at: http://www.unicef.org/publications/files/Uprooted_growing_crisis_for_refugee_and_migrant_children.pdf

Year: 2016

Country: International

Keywords: Child Migrants

Shelf Number: 140249


Author: Ferrara, Emilio

Title: Visualizing Criminal Networks Reconstructed from Mobile Phone Records

Summary: In the fight against the racketeering and terrorism, knowledge about the structure and the organization of criminal networks is of fundamental importance for both the investigations and the development of efficient strategies to prevent and restrain crimes. Intelligence agencies exploit information obtained from the analysis of large amounts of heterogeneous data deriving from various informative sources including the records of phone traffic, the social networks, surveillance data, interview data, experiential police data, and police intelligence files, to acquire knowledge about criminal networks and initiate accurate and destabilizing actions. In this context, visual representation techniques coordinate the exploration of the structure of the network together with the metrics of social network analysis. Nevertheless, the utility of visualization tools may become limited when the dimension and the complexity of the system under analysis grow beyond certain terms. In this paper we show how we employ some interactive visualization techniques to represent criminal and terrorist networks reconstructed from phone traffic data, namely foci, fisheye and geo-mapping network layouts. These methods allow the exploration of the network through animated transitions among visualization models and local enlargement techniques in order to improve the comprehension of interesting areas. By combining the features of the various visualization models it is possible to gain substantial enhancements with respect to classic visualization models, often unreadable in those cases of great complexity of the network.

Details: Unpublished paper, 2014. 6p.

Source: Internet Resource: Accessed September 8, 2016 at: http://ceur-ws.org/Vol-1210/datawiz2014_03.pdf

Year: 2014

Country: International

Keywords: Criminal Networks

Shelf Number: 140350


Author: Baird, Theodore

Title: Defining Human Smuggling in Migration Research: An Appraisal and Critique

Summary: The terms migrant smuggling and human trafficking are often used synonymously in public discussions and the media, but are distinct categories in international law and academic research. This article provides a critical discussion of the representation of human smuggling in academic research, by demonstrating that the current definition of human smuggling has been un-critically applied from international law in the formulation and implementation of research designs. It traces the development of the concept of human smuggling in academic research through an evaluation of three periods: 1) Pre-Palermo and early Palermo days: 1990s-2003, 2) post-Palermo: 2001-present, and 3) conceptual re-visions: 2007-present. It demonstrates that although the definition of human smuggling has gone through shifting categorizations, much of the research on human smuggling has been conducted within the categories defined by law and policy, rather than critically attending to how these categories have arisen as forms of social control. Based on this evaluation, the article argues for a critique of the category of human smuggling through innovative research designs and improved criticism of the causes, effects, and use of the concept. The article concludes with notes towards a research agenda for critical human smuggling studies, for research beyond the legal categories in order to understand 'human smuggling' as a category of social control in diverse contexts.

Details: San Domenico di Fiesole (FI) - Italy: European University Institute, 2016. 19p.

Source: Internet Resource:Robert Schuman Centre for Advanced Studies, Migration Policy Centre, RSCAS 2016/30: Accessed September 8, 2016 at: http://cadmus.eui.eu/bitstream/handle/1814/41508/RSCAS_2016_30.pdf?sequence=1&isAllowed=y

Year: 2016

Country: International

Keywords: Human Smuggling

Shelf Number: 149251


Author: Veldhuis, Tinka M.

Title: Designing Rehabilitation and Reintegration Programmes for Violent Extremist Offenders: A Realist Approach

Summary: In this Research Paper, ICCT - The Hague Research Fellow Tinka Veldhuis makes an argument for a Realist approach to rehabilitation and reintegration programmes for inmates with a terrorist or extremist background. Accordingly, within the Realist framework, it is stressed that the outcomes of rehabilitation programmes should be understood as a product of the policy mechanisms and the context in which they are implemented. To maximise the likelihood of success it is important to make explicit the underlying assumptions about how the intervention should, given the unique context, contribute to achieving its objectives. This paper endeavours to highlight some of the key questions that need to be answered before and during the implementation of rehabilitation policies.

Details: The Hague: International Centre for Counter-Terrorism, 2012. 23p.

Source: Internet Resource: ICCT Research Paper: Accessed September 13, 2016 at: https://www.icct.nl/download/file/ICCT-Veldhuis-Designing-Rehabilitation-Reintegration-Programmes-March-2012.pdf

Year: 2012

Country: International

Keywords: Extremists

Shelf Number: 140257


Author: Jetter, Michael

Title: Good Girl, Bad Boy: Corrupt Behavior in Professional Tennis

Summary: This paper identifies matches on the male and female professional tennis tours in which one player faces a high payoff from being "on the bubble" of direct entry into one of the lucrative Grand Slam tournaments, while their opposition does not. Analyzing over 378,000 matches provides strong evidence for corrupt behavior on the men's tour, as bubble players are substantially more likely to beat better ranked opponents when a win is desperately needed. However, we find no such evidence on the women's tour. These results prevail throughout a series of extensions and robustness checks, highlighting gender differences regarding corrupt and unethical behavior, but also concerning collusion. We especially find evidence for collusion once monetary incentives are further increased. Finally, the market for sports betting does not seem to be aware of this phenomenon, suggesting a market imperfection and further confirming our suspicion of irregular activities in men's tennis.

Details: Bonn, Germany: Institute for the Study of Labor, 2015. 35p.

Source: Internet Resource: IZA Discussion Paper No. 8824: Accessed September 14, 2016 at: http://ftp.iza.org/dp8824.pdf

Year: 2015

Country: International

Keywords: Athletics

Shelf Number: 147865


Author: Liang, Christina Schori

Title: The Criminal-Jihadist: Insights into Modern Terrorist Financing

Summary: Terrorism is proving to be an enduring global security threat. Since the late 1990s terrorist groups have become more lethal, networked, and technologically savvy. The world is currently dealing with two global terrorist groups - al-Qaeda and IS - that have recruited affiliates across the globe. In 2014 the lives lost due to terrorism around the world increased by 80 per cent compared to the previous year. Several terrorist groups currently have the ability to control land and hold entire cities hostage. The growing power of terrorist groups is linked to their ability to generate revenue from numerous criminal activities with almost complete impunity. Without funding, terrorist groups can neither function nor carry out attacks. To strip terrorists of their power, world leaders and the international community must work together to combat related crime and to implement and enforce global mechanisms for preventing terrorist financing. This paper provides a snapshot of how modern terrorist groups finance their organisations and operations. It will identify the key issues that are driving the growing nexus of terrorism and organised crime. The paper will also explore the various working relationships between terrorist and criminal groups, outlining under what conditions and to what extent they cooperate. This will help to identify existing and potentially new countermeasures to dry up terrorist funding, and to dismantle and destroy terrorist-criminal networks in the future.

Details: Geneva: Geneva Centre for Security Policy, 2016. 12p.

Source: Internet Resource: Strategic Security Analysis, no. 10: Accessed September 14, 2016 at: http://www.gcsp.ch/News-Knowledge/Publications/The-Criminal-Jihadist-Insights-into-Modern-Terrorist-Financing

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 147742


Author: Bromberg, Lev

Title: Sanctions Imposed for Insider Trading in Australia, , Canada (Ontario), Hong Kong, Singapore, New Zealand, the United Kingdom and the United States: An Empirical Study

Summary: This working paper presents the results of a detailed comparative empirical study of sanctions imposed for insider trading in Australia, Canada (Ontario), Hong Kong, Singapore, New Zealand, the United Kingdom, and the United States. Insider trading is considered to be a serious form of misconduct and has in some cases resulted in defendants receiving lengthy custodial sentences and significant monetary sanctions. The comparative study is based on a dataset of a significant size, scope and comprehensiveness, encompassing nearly 700 individuals and companies, as well as approximately 1400 sanctions imposed for the contravention of insider trading provisions in the seven jurisdictions. The study provides a detailed analysis of the insider trading enforcement landscape across a range of common law jurisdictions over an extended period by examining custodial sentences, banning orders and various pecuniary sanctions imposed for insider trading during the seven year period from 1 January 2009 to 31 December 2015

Details: Melbourne: University of Melbourne - Law School; Centre for International Finance and Regulation (CIFR), 2016. 51p.

Source: Internet Resource: CIFR Paper No. 117/2016 : Accessed September 15, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2817172

Year: 2016

Country: International

Keywords: Financial Crime

Shelf Number: 147881


Author: Sebastian, Sofia

Title: Atrocity Prevention through Dialogue: Challenges in Dealing with Violent Extremist Organizations

Summary: Dialogue with violent extremist groups is a controversial practice, even when used to prevent widespread violence or atrocities. Humanitarian dialogue may serve as a crisis-mitigation instrument, offering short-term relief and civilian protection. When the risk of atrocities is remote, political dialogue can be used for structural or upstream prevention aimed at conflict resolution or addressing community grievances. Though dialogue as a peacebuilding tool has potential in any stage of a conflict, it is ideally undertaken before widespread violence occurs. However, the conditions for successful atrocity prevention through dialogue with violent extremist groups are rarely in place. Summary Various forms of dialogue have traditionally been a central mechanism in the toolbox for atrocity prevention. The utility of this noncoercive peacebuilding practice merits reconsideration as violent extremist organizations (VEOs) increasingly embrace mass violence as a means to advance their objectives. If atrocities are imminent or ongoing, dialogue may serve as a crisis-mitigation instrument, with the potential of offering short-term humanitarian relief and civilian protection. When the risk of atrocities is remote, political dialogue can be used for structural or upstream prevention aimed at conflict resolution or addressing community grievances. Despite the broadening recognition of the need to engage extremist groups through dialogue when possible, controversy continues to surround this practice. The conditions for successful atrocity prevention through dialogue with VEOs are rarely in place. Those pursuing dialogue need to gradually build trust, conduct a thorough actor mapping, and reflect on their own role and preparedness to engage. Engaging extremists presents significant risks as well, including extremists' manipulation of the dialogue to buy time for planning atrocity campaigns. Efforts to engage VEOs directly through dialogue have been inconsistent and are handled with the utmost discretion. Restrictive legislative frameworks may limit the ability to exploit opportunities for atrocity prevention through dialogue with these groups.

Details: Washington, DC: United States Institute of Peace, 2016. 12p.

Source: Internet Resource: Accessed September 15, 2016 at: http://www.usip.org/sites/default/files/SR390-Atrocity-Prevention-through-Dialogue.pdf

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 147891


Author: Millar, Alistair

Title: Blue Sky II: Taking UN Counterterrorism Efforts in The Next Decade From Plans to Action

Summary: This report includes a critical analysis of the outcomes of deliberations around the 2016 review of the UN Global Counter-Terrorism Strategy and reflects on implementation efforts going forward. The study is informed by research on current threats and organizational responses; interviews and consultations with UN officials, member state representatives, academics, and practitioners through bilateral discussions; small-group events; and a tailored survey open to governments, UN officials, and civil society.

Details: Washington, DC: Global center on Cooperative Security, 2016. 40p.

Source: Internet Resource: Accessed September 16, 2016 at: http://www.globalcenter.org/wp-content/uploads/2016/09/Blue-Sky-III_low-res.pdf

Year: 2016

Country: International

Keywords: Counterterrorism

Shelf Number: 147860


Author: Friends of the Earth Netherlands

Title: Commodity Crimes: Illicit Land Grabs, Illegal Palm Oil, and Endangered Orangutans

Summary: Two of the world's leading distributors of palm oil, a staple ingredient in many consumer food and personal care products and an important feedstock for biofuels in Europe, are obtaining the commodity from illegal sources - growers who are clearing vast areas of rain forests, including sensitive orangutan habitat and protected forest reserves, in violation of the law, the criteria of the Roundtable on Sustainable Palm Oil (RSPO) and their financiers' investment policies. Our investigation used satellite imagery, trade data and on-the-ground reporting to uncover how, at the other end of a long chain of culpability, unwitting consumers are being sold products that are killing orangutans and destroying some of the world's last forested lands. Friends of the Earth has alerted the companies involved about the problems detailed in this report. We have also alerted financiers to their role in land grabbing previously. Their comments are summarized in this report. The chain extends thousands of miles, through many actors: - The producer, Bumitama Agri Ltd, one of the largest owners of palm oil plantations in Indonesia. - The palm oil industry's "sustainability" association, the Roundtable on Sustainable Palm Oil, which does little to prevent illegal activity and has proven ineffective at providing comprehensive protections for the environment and human rights. - The traders, such as Wilmar International who distribute palm oil to a global market which is expected to more than double by 2030 - a serious and growing threat to human rights and tropical forests. - The financiers and investors - including HSBC, Rabobank, Deutsche Bank as well as the largest pension funds in the Netherlands and Sweden - who provide the needed capital for Bumitama's key shareholders like IOI and clients like Wilmar. All three companies are violating not only voluntary standards like RSPO and the financiers' own Environment, Social and Governance (ESG) policies, but also national legislation. Bumitama Agri Ltd, (BUMI.SI) is headquartered in Jakarta, Indonesia and operates through a number of subsidiaries. Bumitama controls over 200,000 hectares of plantation land bank in Central Kalimantan, West Kalimantan and Riau, Indonesia. Since 1990, development of palm plantations by Bumitama and others has cleared about 16,000 square kilometers of forested land in Kalimantan. The company has been a member of the Roundtable on Sustainable Palm Oil since 2007, and sells to global palm oil traders including IOI Corp. of Malaysia and Wilmar International of Singapore. This investigation specifically documents that: - Bumitama has knowingly destroyed forest that is the home for endangered orangutans. In April 2013, in response to a complaint filed at the RSPO, Bumitama promised it would not clear land near forest reserves in West Kalimantan until studies were completed to appraise the land's ecological importance. These reserves host one of the largest, and last, populations of the Central Bornean orangutan in the region. However, satellite imagery shows that hundreds of hectares of peatland and forests in the area were cleared between May and September 2013. So while Bumitama was negotiating with the RSPO to address the complaint, the company continued to clear land, despite its pledge to stop the cutting. - Bumitama's actions are unpermitted. The plantation in West Kalimantan that is managed by Bumitama was cleared in violation of national laws, without permits or proper approval of the Ministry of Forestry and the Environmental Monitoring Agency. This land bank consists of at least 7,000 hectares of "ghost estates" - plantations that lack valid permits. Selling palm oil from unpermitted plantations is illegal. - Bumitama's investors knowingly or unknowingly purchased shares of an illegal operation. Prospective investors were informed through Bumitama's prospectus in April 2012 that Bumitama's expansion plans included preferential rights to manage and harvest from a plantation that was operating illegally, without the required licenses for its operation and management, and that the Hariyanto family - the majority owner of Bumitama Agri - would bear the liability risk while the permits were sorted out. Despite this admission of illegality, all the shares were sold. - After gaining control over thousands of hectares of unpermitted plantation landbank Bumitama continued the illegal production of palm oil without the necessary permits and engaged in further illegal land grabbing and clearing. Wilmar International and IOI Corp. bought shares of Bumitama despite their likely knowledge of the illegal landgrab. Before Bumitama's public offering in April 2012, IOI Corp. became one of Bumitama's controlling shareholders, with a current stake of 31 percent of the company. At the same time, Wilmar bought between 0.9 percent and 4.3 percent of shares of Bumitama's stock. This makes IOI and Wilmar not just purchasers of the palm oil illegally produced by Bumitama, but significant investors in its illegal operations. - The RSPO provides greenwash for the industry's illegal, unethical and environmentally harmful practices. The Bumitama Group, IOI Corp. and Wilmar International are all members of the Roundtable on Sustainable Palm Oil. They have been involved in several illegal landgrabs in Kalimantan over the past five years, but the RSPO has been unable to prevent this, nor has it taken any effective enforcement action. The revelations about Bumitama Agri in this report illustrate how palm plantation companies and commodity traders use the lack of legal enforcement, complicated transfers of land and assets, and inter-company agreements to take illegal control over land, regardless of its legal status, traditional use or ecological importance. The report also highlights the role of financiers, including banks and equity investors, in Bumitama Agri, IOI and Wilmar, and on the kind and amount of money invested in these companies, their Environmental, Social and Governance (ESG) Policies and the responses investors gave to inquiries by Friends of the Earth on this case. The bottom line is that the current system of producing palm oil as a global commodity is unjust and unsustainable and all actors involved should take immediate action to address this.

Details: Amsterdam: The Friends, 2013. 28p.

Source: Internet Resource: Accessed September 17, 2016 at: https://milieudefensie.nl/publicaties/rapporten/comodity-crimes.-illicit-land-grabs-illegal-palm-oil-and-endangered-orangutans

Year: 2013

Country: International

Keywords: Environmental Crimes

Shelf Number: 147930


Author: InSight Crime

Title: Elites and Organized Crime: Introduction, Methodology, and Conceptual Framework

Summary: Organized crime and the violence associated with it is the preeminent problem in Latin America and the Caribbean today. The region is currently home to six of the most violent countries in the world that are not at war. Four of those countries are in Central America, where we centered our research. Public opinion polls also consistently show that crime and insecurity are at the top of the region’s concerns. Governments and multilaterals have channeled vast resources towards dealing with this prosperity, and turning them into tools for wielding power. And it is changing the dynamics of international affairs, politics and elite relations in these countries. However, the analysis of organized crime has not kept pace with these developments. Indeed, the idea for this study came from scanning governmental and nongovernmental reports on organized crime and realizing that too often it is characterized as separate from, rather than integrated with, the communities in which it operates. In the traditional conception, criminal economies are considered to be parallel, not essential, to the lives of those who live where they operate. The protagonists are identified as gang members, thugs and hoodlums; rarely as bankers, politicians and security forces personnel. Governments rarely look inward at their own history, their geography, or their failing institutions to find out why organized crime is thriving in their country. They blame what they see as outsiders -- frequently foreigners -- or those on the margins, particular the poor. There are Italian, Russian, Colombian and increasingly Mexican mafias that are considered to be somehow distinct and ruthless because of their upbringing, their culture, or their ethnicity. The result is a distorted view of who the criminals are and how they gained such a solid foothold in the region. Traditional assessments have little concept of organized crime’s activities and businesses, the role it plays and how it is integrated into the economy, politics and social life of communities. These assessments have yet to measure how crime impacts governance and democracy, from local community associations to the national vote. And they struggle to conceptualize the role crime plays in the formation of the state, from both an economic perspective and a security perspective. What’s more, most assessments focus on two aspects of the government’s efforts against organized crime: its ability to reform or beef up its judicial system or security forces; and its ability to implement social and economic programs to keep potential recruits from joining organized criminal gangs. The emphasis of these assessments is greatly influenced by the principal ways in which they view crime, i.e., as the result of a “failed” state or a “failed” economy. This view leads to a false choice, one in which governments, multilaterals, foundations and others must decide between “good guys” and “bad guys” in a zero-sum game. This is a dangerous way to frame the issue, as it cuts off huge portions of society, politics and the business sector who, whether they like it or not, must operate within or around organized criminal activities. It also ignores the West’s own history, in which pirates, bootleggers and others played important roles in the construction of social, economic and political structures. issue, and international aid and humanitarian organizations have shifted their mandates to better confront its effects. The problem is as broad as it is deep. It touches all aspects of society, politics and business in these countries. Organized crime is undermining democracy and distorting economies. It is fueling small gangs and international criminal syndicates that use their money and weapons to co-opt or subvert the security forces. It is penetrating the state, breaking apart the institutions that were established to protect citizens and promote In our study, we are seeking to expand the notion of how organized crime works. We see it as something that is integrated into society, into the development of a country’s economy, its governance structures, and social groups. Organized crime does not penetrate as much as it blends in with the various parts of the community, the political class and the business moguls. This includes the “elite,” i.e., decision-makers, influencers, political operators, and those who control capital and the means of production. By expanding who we include in our study, we can see the whole picture, one that is not restricted to a zero-sum game of cops and robbers, but considers more nuanced and little-understood factors to identify why this phenomenon is so hard to eliminate, and what we can do to foster a society that does not reward criminal activity, especially activities that rely on violence. Specifically, we are interested in exploring three areas that deserve more attention: organized crime’s interaction with economic development, governance, and social and cultural dynamics.

Details: InsightCrime.org, 2016. 51p.

Source: Internet Resource: Accessed September 17, 2016 at: http://www.insightcrime.org/images/PDFs/2016/Introduction_Section_Elites_Organized_Crime

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 140327


Author: Forest Trends

Title: Consumer Goods and Deforestation:

Summary: As global populations increase and more people around the world rise out of poverty, the demand for agricultural products such as meat, rice, and palm oil will continue to rise. Increases in the efficiencies and productivity of food production around the world have helped to reduce the prevalence of hunger and improve the nutrition status of millions in recent decades. These successes, however, could be undermined by illegal practices that cause negative environmental or social impacts—impacts which could ultimately threaten longterm food security. In recent years, it has become apparent that the most significant threat to the world’s remaining forests is conversion for commercial agriculture and other non-forest use. Agriculture alone accounts for over 70 percent of all deforestation across tropical and sub-tropical countries, along with other smaller drivers, such as mining, infrastructure, urban expansion, and remaining activities (Hosonuma et al. 2012)—all in response to unprecedented demands from a growing population on forestlands for food, fuel, and fiber. In August 2014, for example, the Government of Indonesia announced plans to clear 14 Mha of forests by 2020 to provide more space for infrastructure, energy, and food supply despite ambitious emissions reduction targets (Jakarta Post 2014). While economic development and food security is a clear priority for many of the countries with the world’s remaining tropical forests, inclusive and sustainable growth needs to be nested within strong social and environmental safeguards, a strong sense of rule of law, and clarity on the land rights of indigenous and local communities who have lived in, cultivated, and held customary rights to these forests for generations. As the world seeks affordable solutions to enhancing development and prosperity for billions, land for agriculture must be acquired legally, sensibly, and sustainably. Instead, we are operating with a flawed model. It is increasingly clear that much of the land conversion for large-scale agricultural projects is currently being undertaken in violation of some of the producer countries’ most basic laws and regulations and incurring high social and environmental costs: non-compliance with processes related to the issuance of rights to convert forests, within permitting processes, during the clearing of forestland, and/or in the implementation of social safeguards. This study has sought to estimate for the first time the proportion of recent tropical deforestation that is the result of illegal clearing for commercial agriculture and how much of this was driven by overseas demand. In addition, the study estimates for the first time the scale of primary tropical wood products now being traded globally and originating from forest conversion, as opposed to selective logging. Forest Trends has been involved in national and international policy initiatives aiming to combat the trade in illegally sourced wood products for close to 15 years, witnessing firsthand the exciting and dramatic changes that have taken place in both producer and consumer nations. Producer countries—particularly those engaging in Forest Law Enforcement, Governance and Trade Voluntary Partnership Agreements (FLEGT VPAs)—are clarifying regulatory frameworks that improve their ability to demonstrate the legality of wood products to their public and discerning buyers. Demand-side measures in consumer nations have been shown to support the enforcement of producer countries’ own laws and regulations. The results of this report suggest that there are tremendous opportunities to draw lessons from the significant initiatives that have been developed to combat the trade in illegally sourced timber while promoting the trade in legally sourced timber. These include the development of standards, importing trade legislation (such as the EU Timber Regulation or the 2008 amendments to the US Lacey Act), public procurement policies, and voluntary private sector purchasing policies and investment standards. However, there has been limited analysis to date of how similar mechanisms could leverage credible legal compliance for land conversion, support for more rational and sustainable land use policies and laws, and how they could increase transparency in the implementation of laws and regulations benefiting both public and private interests.

Details: Washington, DC: Forest Trends, 2014. 158p.

Source: Internet Resource: Accessed September 17, 2016 at: http://www.forest-trends.org/documents/files/doc_4718.pdf

Year: 2014

Country: International

Keywords: Deforestation

Shelf Number: 140340


Author: Hewitt, Daphne

Title: Identifying Illegality in Timber from Forest Conversion: A Review of Legality Definitions

Summary: FLEGT Voluntary Partnership Agreements (VPAs) aim to verify and license legal timber for export to the EU in order to create a 'market access' incentive for legal operators and countries that wish to improve forest law enforcement and governance standards. Licensing is based on a Legality Assurance System (LAS), which is underpinned by a national Legality Definition. Beginning a credible domestic stakeholder process to identify appropriate laws and detailed verifiers for compliance are necessary pre-requisites to formal bilateral negotiations with the EU. VPAs were primarily conceived of with selective logging in production forests in mind, but recent data suggests that conversion timber (timber produced when land is cleared for other uses) is increasingly important in tropical production, and in some countries may represent a significant majority of wood production. In addition, agricultural conversion is now acknowledged as the most significant cause of deforestation and is closely associated with land/tenure conflicts with local communities. Assessing the legality of conversion timber requires that compliance with both the process of permit allocation and all relevant management requirements be examined. On this basis, in the countries reviewed in detail by Forest Trends, a significant majority of the conversion timber produced appears to be illegal. This paper therefore reviews the Legality Definitions of the six counties engaged in VPA implementation, with a view to determining the potential that they offer for identifying illegality in wood sourced from conversion of forest to non-forest uses.

Details: Washington, DC: Forest Trends, 2013. 29p.

Source: Internet Resource: Accessed September 17, 2016 at: http://www.forest-trends.org/documents/files/doc_4150.pdf

Year: 2013

Country: International

Keywords: Deforestation

Shelf Number: 140342


Author: Hoff, Suzanne

Title: Engaging the Private Sector to End Human Trafficking: A Resource Guide for NGOs

Summary: Anti-trafficking non-governmental organisations (NGOs) and networks have so far not focused much on engaging the private sector on its role in trafficking in human beings (THB). Because the legal definition of human trafficking has historically been restricted to exploitation in the sex industry, anti-trafficking action has, until recently, been largely tackled and framed in the context of women's rights, debates on sex work and within criminal law. This changed in 2000 when the UN Palermo Protocol2 extended the definition of human trafficking to include all forms of forced labour and slavery-like practices in all economic sectors. This has made labour law and relevant stakeholders such as trade unions central to this issue, and has merged debates on human trafficking and forced labour. The EU Anti-trafficking Directive from 2011 reaffirmed this. The legacy of human trafficking being regarded as a problem that is exclusive to the sex industry is still apparent. The majority of the cases identified and registered still relate to exploitation in the sex industry, even though it is known that labour exploitation occurs in many different sectors. More awareness and attention is needed for all forms of human trafficking, which is often still framed as only a criminal justice issue, whilst the relevance of labour rights is underreported. This is also perpetuated by the fact that anti-trafficking organisations - and indeed other stakeholders such as service providers, municipalities and government institutions - have developed collaborative and well-functioning multi-stakeholder networks specifically dealing with prevention and direct support for trafficked persons. Anti-trafficking NGOs, such as members of the European anti-trafficking network La Strada International (LSI), often provide services for trafficked people, such as shelter, medical and legal advice, as well as advocacy directed at states to ensure improved legislation for the rights of trafficked people. Their networks include law enforcement, judiciaries, criminal law experts, social services (women's shelters, psychologists) or immigration officials and organisations that directly deal with the identification, support, court cases, return and reintegration of trafficked persons. The framing of human trafficking in these networks and practices therefore naturally refers to the focus of these stakeholders and relevant laws. The extension of human trafficking so that it is generally understood to include labour exploitation in sectors other than the sex industry has meant that the private sector has become seen as a more important stakeholder in anti-trafficking work. This has now been recognised by all relevant organisations dealing with the fight against human trafficking, as the above quote by the UN Special Rapporteur on trafficking in persons indicates. Anti-trafficking NGOs have also started to acknowledge the need to engage the private sector. First, as increasing requests for assistance are received for those exploited in different labour sectors; and second, as they are being confronted with cases in which the private sector plays a role in the exploitation of people. One example of this is the tree workers case in the Czech Republic, where at least 2,000 workers, mainly from Vietnam, but also from Romania, Bulgaria, Hungary, Slovakia and the Ukraine, have been forced to work under very harsh conditions during 2009 and 2010 in the state forest of the Czech Republic, recruited and employed by legal agencies. In the framework of the NGOs & Co project, LSI carried out a survey in 2013, among 27 European anti-trafficking NGOs, including LSI members, assessing their overall level of engagement with the private sector, as well as the perceived obstacles, enablers and lessons learned in partnering with businesses. This assessment revealed that, although 80% of the respondent NGOs have experience in targeting the private sector and claim to see the private sector as one of their key target groups, less than half of the participants in the survey recognised the importance of such work in their Strategic Plans, and only 11% (3 out of 27 organisations) have a specific staff person dedicated to engaging with the private sector. In short, there is little capacity for engagement or indeed knowledge of the different strategies of private sector engagement applied in other civil society networks.

Details: Amsterdam: SOMO; LaStrada, 2015. 146p.

Source: Internet Resource: Accessed September 17, 2016 at: http://lastradainternational.org/lsidocs/3227-Resource%20Guide%20Egnaging%20the%20Private%20Sector%20to%20End%20Human%20Trafficking.pdf

Year: 2015

Country: International

Keywords: Forced Labor

Shelf Number: 147952


Author: Small Arms Survey

Title: Reducing Illicit Arms Flows and the New Development Agenda

Summary: A significant reduction in the trafficking of illicit arms is one of the targets being proposed as part of 17 Sustainable Development Goals (SDGs), the new development framework to come into effect after the Millennium Development Goals (MDGs). Of the SDGs, Goal 16 focuses on peaceful and inclusive societies, access to justice, and accountable institutions. Such a goal represents a significant step towards recognizing how violence prevention and reduction are essential for development. The proposed inclusion of target 16.4 in the new development agenda also reflects the widespread recognition of the importance of arms control in promoting sustainable development. The development of clear targets and indicators, which is core to the SDG negotiations, will make it possible to determine how well states fulfill their commitments. The measurability of these targets will be a crucial and guiding factor. One key challenge facing the measurement of progress towards target 16.4 is the very limited availability of information on the quantities, types, and value of illicit arms in global circulation; and greater investment is needed to fill this knowledge gap. A new Research Note, Reducing Illicit Arms Flows and the New Development Agenda, proposes several ways to tackle the issue of measuring illicit arms flows. The Research Note offers a range of indicators that could help counter the data challenge and be useful for monitoring results at the national level. Selected indicators are of particular relevance for monitoring target 16.4 in the SDG framework

Details: Geneva, SWIT: Small Arms Survey, 2015. 4p.

Source: Internet Resource: Small Arms Survey Research Notes, no. 50: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-50.pdf

Year: 2015

Country: International

Keywords: Armed Violence

Shelf Number: 140373


Author: Bakker, Edwin

Title: Lone-Actor Terrorism: Definitional Workshop

Summary: The aim of the Countering Lone-Actor Terrorism (CLAT) project is to understand lone-actor terrorism in a European context. The project will develop a database of lone-actor cases from across Europe. Its overall objective is to see if it is possible to discern any trends or patterns that could be translated into useful observations or recommendations for practitioners and policy-makers. During the first workshop of the CLAT Consortium, held in The Hague in January 2015, several academics and professionals were invited to help to define lone-actor terrorism (LAT). The aim of this two-day meeting was to arrive at a working definition of LAT that will be used when collecting cases for the database.

Details: London: Royal United Services Institute for Defence and Security Studies, 2015. 19p.

Source: Internet Resource: Countering Lone-Actor Terrorism Series: No. 2: Accessed September 20, 2016 at: https://rusi.org/sites/default/files/201512_clat_definitional_workshop.pdf

Year: 2015

Country: International

Keywords: Lone Wolf Terrorism

Shelf Number: 145621


Author: Brack, Duncan

Title: Ending Global Deforestation: Policy Options for Consumer Countries

Summary: Over the last decade, governments in timber-producing and timber-consuming countries have implemented a range of policies and measures aimed at improving forest governance and reducing illegal logging. One important category of measures has been attempts to exclude illegal (and sometimes unsustainable) timber products from international trade through the use of regulatory measures such as public procurement policy, licensing systems, and legal and company due diligence requirements. Yet illegal logging and the international trade in illegal timber is not the most important cause of deforestation. Clearance of forests (legal or illegal) for agriculture, often for export, is far more significant. The purpose of this report is to examine the potential applicability of the consumer-country measures used to exclude illegal timber to illegal or unsustainable agricultural products associated with deforestation: specifically, palm oil, soy, beef and leather and cocoa. The study primarily considers options open to the European Union (which is the main global importer of these commodities), but in principle they are open to other consumer-country governments too.

Details: London: Chatham House; Washington, DC: Forest Trends, 2013. 89p.

Source: Internet Resource: Accessed September 20, 2016 at: https://www.chathamhouse.org/sites/files/chathamhouse/public/Research/Energy,%20Environment%20and%20Development/0913pr_deforestation.pdf

Year: 2013

Country: International

Keywords: Deforestation

Shelf Number: 145605


Author: Bromberg, Megan

Title: Mapping the Illicit Mineral Trade: Identifying the Illicit Supply Chain for Diamonds, Gold, and Tantalum Across Contexts

Summary: The illicit mineral trade is a global issue that affects all countries, as illicit or conflict minerals continue to unwittingly end up in our jewelry, phones, and laptops. Whether these minerals come from unregulated mines that use child labor and harm the environment, fund the insurgencies of armed groups, or are smuggled into neighboring countries by corrupt government officials, the illicit mineral trade is dependent on the exploitation of poverty and those who rely on the mining to survive.

Details: Washington, DC: American University, 2016. 100p.

Source: Internet Resource: Accessed September 20, 2016 at: http://www.american.edu/sis/practica/upload/Mapping-the-Illicit-Mineral-Trade.pdf

Year: 2016

Country: International

Keywords: Conflict Minerals

Shelf Number: 145610


Author: Gill, Martin

Title: Retail Loss Prevention in Perspective

Summary: There is a new report out today which provides a view of the state of loss prevention from those who are in charge of it. Leading loss prevention managers have contributed to this report. It shows that while organised crime is perceived to be a more significant problem now than in the past, the aggravating factor appears to be a strong view that the police are ever more neglectful of retailers. This problem is stoked by other trends such as a tendency to have fewer staff available on the shop floor (and thus less oversight of it); the speed with which retailers make moves in the market to gain a competitive edge without the time to assess the loss/security implications; and the growing practice of opening stores in difficult geographical areas. Against this background, margins in retailing were generally seen to be tight and it was becoming increasingly more difficult to get support for spending on loss prevention measures, although there were some notable successes. Those interviewed generally (but not exclusively) felt they were doing a good job although for most there was room for improvement. Most felt they were supported by the Board but again there was often room for improvement here, and part of the difficulty was that loss prevention was typically distanced from the Board. Moreover, while most were judged at least in part (although often in large part) on loss figures it was noted that this was not something over which they had complete control. Resources were seen as tight and this was sometimes a limitation interviewees said they had to work within. It was seen as difficult to compare performance because figures on shrink were deemed unreliable; it certainly complicated comparisons. Some retailers are moving to 'Total Loss', and this is creating a slight change in focus. Guards were seen to have a use in responding to problems and in providing a visible deterrent but some pointed to lower losses even when guards were taken out of stores. Likewise CCTV was sometimes seen as an essential part of a strategy but others pointed to out of date technology and cameras not being used to their full potential even when present. EAS was sometimes seen as effective against opportunists in particular but also as a poor relation to RFID although for the most part the jury was out on this when assessed in terms of theft prevention rather than stock management. In short, all security measures were seen as good by some and not by others. That said, the favoured crime prevention tool was most often staff; offering both a visible presence and an opportunity to prevent thefts and intervene when necessary. Going forward there is likely to be a greater use of data and linking different databases to inform loss prevention approaches. There were mixed views of both civil recovery schemes and the usefulness of crime partnerships. It was not so much that when done well they were not both praised, they were. Rather it was the case that often practice did not match the potential to influence loss reduction. This was the cause of some anxiety and highlights areas where there are opportunities for improvement. Those working in loss prevention claimed to generate ideas and insights from each other, and there was willingness to work with others potentially pooling resources where appropriate, to improve the loss prevention lot. While some lamented that loss prevention has not raised its game sufficiently others saw potential via greater use of data and intelligence, better use of technologies, more effective engagement from front line staff and via - in certain circumstances - sharing resources to increase their future impact.

Details: Tunbridge Wells, UK: Perpetuity Research & Consultancy International, 2016. 45p.

Source: Available at the Rutgers Criminal Justice Library

Year: 2016

Country: International

Keywords: Crime Prevention

Shelf Number: 145577


Author: KPMG

Title: Global Anti-Money Laundering Survey: 2014

Summary: KPMG launched its online survey in November 2013. The survey was distributed to AML and compliance professionals in the top 1,000 global banks, according to the 2013 edition of The Banker Magazine, as well as to KPMG's AML contacts in over 40 countries. The overarching aims of this year's global AML survey include: - Identifying emerging trends, opportunities and threats; - Capturing industry perceptions on regulation, cost, and effectiveness; and - Benchmarking AML efforts in the financial services industry. In addition to the topics covered in our previous surveys, the 2014 survey also asked respondents to consider money laundering in relation to the following: - Trade Finance - FATCA andTax Evasion - Insurance Sector - Asset Management Sector

Details: London: KPMG, 2014. 56p.

Source: Internet Resource: Accessed September 21, 2016 at: https://www.kpmg.com/KY/en/IssuesAndInsights/ArticlesPublications/PublishingImages/global-anti-money-laundering-survey-v3.pdf

Year: 2014

Country: International

Keywords: Financial Crimes

Shelf Number: 145588


Author: Small Arms Survey

Title: Gender-Based Violence Interventions: Opportunities for Innovation. Gap Analysis

Summary: The Humanitarian Innovation Fund (HIF) commissioned the Small Arms Survey in 2015 to produce the first ever Gap Analysis of specific challenges in GBV humanitarian programming through the lens of humanitarian innovation. This report offers fresh guidance on tangible innovation areas for those working to improve GBV interventions globally to enhance effectiveness and accelerate impact. The in-depth research has generated a series of clearly defined, accessible, and impactful Innovation Challenges to address the gaps in GBV programming, and in doing so, aims to engage new actors and new partners from different arenas to overcome the enduring GBV challenges.

Details: Geneva, SWIT: Small Arms Survey, 2016. 69p.

Source: Internet Resource: Accessed September 22, 2016 at: http://www.elrha.org/wp-content/uploads/2015/11/GBV_report_23_08.pdf

Year: 2016

Country: International

Keywords: Gender-Based Violence

Shelf Number: 140408


Author: LaFontaine, Peter

Title: Elephant vs. Mouse: An investigation of the ivory trade on Craigslist

Summary: As perhaps the major online platform for classified advertisements, Craigslist.org has made a name for itself as a site where buyers can find just about anything - whether that's a used bicycle, rare book, or, as this report will show, an expensive ivory carving or elephant hide boots. We wanted to better understand the scope and scale of the ivory trade on Craigslist; if the site was currently a venue for trade in ivory and elephant parts, it could also be a potential partner in the fight to reverse the tide of poaching.

Details: Yarmouth Port, MA: International Fund for Animal Welfare, 2015

Source: Internet Resource: Accessed September 22, 2016 at: http://www.ifaw.org/sites/default/files/IFAW-craigslist-ivory-report-2015.pdf

Year: 2015

Country: International

Keywords: Elephants

Shelf Number: 144862


Author: McAfee

Title: McAfee Labs Threats Report: September 2016

Summary: In the McAfee Labs Threats Report: September 2016 we discuss three key topics: We analyze survey data from a primary research study to gain a deeper understanding of the entities behind data theft, the types of data being stolen, and the ways in which it gets outside of organizations. We investigate Q1/Q2 ransomware attacks on hospitals and discover that they were successful targeted attacks, though relatively unsophisticated. We define machine learning and discuss its practical application in cybersecurity.

Details: Santa Clara, CA: McAfee, 2016. 50p.

Source: Internet Resource: Accessed September 24, 2016 at: http://www.mcafee.com/us/resources/reports/rp-quarterly-threats-sep-2016.pdf

Year: 2016

Country: International

Keywords: Computer Crime

Shelf Number: 140447


Author: Global Initiative Against Transnational Organized Crime

Title: Protecting Politics: Deterring the Influence of Organized Crime on Local Democracy

Summary: Local democracy encompasses formal and informal sub-national institutions that respond to citizens' needs. At the centre of local democratic practice are open governments, which provide people with space to promote participation, deliberation and a focus on public interests. However, local state fragility undermines democracy. Organized crime increasingly exploits such weaknesses in order to protect its illicit businesses, as political corruption is an ideal avenue preferred by organized criminal groups. This report examines the interlinkages between organized crime networks and political actors at the local level. It also analyses policy responses (particularly decentralization policies) that have—intentionally or unintentionally- enabled or prevented organized crime engagement in political corruption at the local level. Case studies from Afghanistan, Colombia and Niger illustrate how illicit networks relate to local levels of government and decentralization processes.

Details: Stockholm, Sweden: International Institute for Democracy and Electoral Assistance; Geneva, SWIT: Global Initiative against Transnational Organized Crime, 2016. 71p.

Source: Internet Resource: Accessed September 26, 2016 at: http://globalinitiative.net/wp-content/uploads/2016/09/protecting-politics-deterring-the-influence-of-organized-crime-on-local-democracy-pdf.pdf

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 140460


Author: Global Initiative Against Transnational Organized Crime

Title: Protecting Politics: Deterring the Influence of Organized Crime on Public Service Delivery

Summary: Public service delivery is one of the main tasks citizens expect from their governments. Democracy is a political system that should improve service delivery as it offers the building blocks for equitable resource distribution and sustainable development. Indeed, in the frameworks of the 2030 Agenda for Sustainable Development, the democratic principles of transparency and accountability play a key role in the achievement of the Sustainable Development Goals. However, in many contexts, public service delivery is fraught with corrupt practices, leading to less accountable and less effective public services that are not adequately reaching those they are intended to serve. Particularly in fragile and conflict affected states, corrupt practices can sometimes be linked to organized crime. These illicit groups and networks increasingly form parallel structures that compete with the state to provide services, either in open conflict with the state, or sometimes working with the explicit or tacit agreement of the authorities. In other cases, however, organized crime does not become a service provider but instead hinders the state's provision of services by leeching off state resources through corruption in public contracts. In all of these cases, organized crime perpetuates poverty and inequality, while threatening economic growth and, by extension, democracy itself. Furthermore, organized crime challenges the state's legitimacy by profiling itself as a viable provider of services to the population, while the state's capacity to provide services is undermined. Citizens are consequently left with hollow democratic state institutions that are not capable of delivering better lives for them. Growing discontent with politics, as reflected in a number of public perceptions surveys and massive protests around the world, are important wake-up calls to implement serious strategies to prevent and mitigate political corruption linked to organized crime. The International Institute for Democracy and Electoral Assistance (International IDEA) and the Global Initiative against Transnational Organized Crime (GI) are therefore committed to supporting countries around the world in addressing the threat that organized crime poses to their democracies. Understanding how organized crime challenges the state's legitimacy as public service provider is therefore one important contribution to these efforts. That is why, in 2011, International IDEA launched the Protecting Politics project, conducting research and providing policy support to tackle the nexus between organized crime and political actors. Most importantly, in 2015 International IDEA joined forces with GI to explore the linkages between organized crime and public service delivery. This report summarizes these findings, drawing on case studies from Afghanistan, Colombia and Somalia to analyse in detail how organized crime has become a viable service provider in some localities in these countries, and how it has captured legitimacy from the state in the process. This report complements three other papers that examine how organized crime affects political parties, elections and local democracy, respectively. Together, these four reports provide a unique and detailed overview of democratic systems' capacity to deal with complex security threats such as organized crime.

Details: Stockholm, Sweden: International Institute for Democracy and Electoral Assistance; Geneva, SWIT: Global Initiative against Transnational Organized Crime, 2016. 65p.

Source: Internet Resource: Accessed September 26, 2016 at: http://www.idea.int/publications/protecting-politics-organized-crime-public-service-delivery/loader.cfm?csModule=security/getfile&pageID=80689

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 140461


Author: International NGO Council on Violence Against Children

Title: Creating a Non-Violent Juvenile Justice System

Summary: During the past decades, the international community has developed sound normative standards to protect the rights of children involved with the justice system. The Convention on the Rights of the Child and other legal instruments call for a specialized child-sensitive juvenile justice system that places the respect for the dignity and the best interest of the child at the center of legislation, policy and practice, while promoting children's sense of worth and long lasting reintegration in society. The governance gap between these important international standards and implementation efforts on the ground is, however, wide. Countless children across regions continue to see their rights neglected by laws and institutions and endure harsh and retributive punishments that stigmatize and marginalize them further. Children who are homeless and poor, who have fled home as a result of violence or neglect; as well as, those that suffer from mental health illness and substance abuse find themselves at special risk. Appropriate crime prevention efforts, support to parents and legal guardians to ensure a safe family environment, and education and work opportunities for children who are old enough to have access to an employment, are often lacking. The criminal justice system ends up being used as a substitute to weak or non-existent child protection systems. And imprisonment and recidivism become a pattern for children who are left with very few opportunities to re-shape their future. In order to reverse this serious situation and reduce the risk of violence against children, their involvement with the criminal justice system must be prevented. The development of a strong and cohesive child protection system should be a first priority and the current standards on the rights of the child in the juvenile justice system should be effectively implemented so that criminalization and punishment of children can be avoided, diversion and restorative justice solutions can be given a genuine chance of succeeding, and the development of children's fullest potential be effectively promoted.

Details: International NGO Council on Violence Against Children. 2013. 56p.

Source: Internet Resource: Accessed September 27, 2016 at: http://www.childhelplineinternational.org/media/80443/inco_-_juvenile_justice.pdf

Year: 2013

Country: International

Keywords: Juvenile Justice Policy

Shelf Number: 140474


Author: Lieblich, Eliav

Title: The Case Against Police Militarization

Summary: The police and the military are different. That much is common ground. Yet, in recent times the police have become increasingly militarized. Unsurprisingly, many find this process alarming and disconcerting, and call for its reversal. However, while most of the objections to police militarization are framed in instrumental arguments, these are unable to capture the fundamental problem with militarization. This Article remedies this shortcoming, by developing a novel and principled argument against police militarization. Contrary to arguments that are preoccupied with the consequences of militarization, we argue that militarization undermines our basic understanding of the nature of the liberal state. Consequently, the real problem with police militarization is not that it brings about more violence or abuse of authority - though that may very well happen - but that it is based on a presumption of the citizen as a threat, while the liberal order is based on precisely the opposite presumption. A presumption of threat, we argue, assumes that citizens, usually from marginalized communities, pose a threat of such caliber that might require the use of extreme violence. Viewed through the prism of the presumption of threat, the problem of police militarization becomes apparent. Perceived as threatening, the policed community is subjected to militarized forces, and thus effectively marked as an enemy. This mark, in turn, leads to the policed community's exclusion from the body politic. Crucially, the pervasiveness of police militarization has led to its normalization, thus exacerbating its exclusionary effect. Indeed, whereas the domestic deployment of militaries has always been reserved for exceptional times, the process of police militarization has normalized what was once exceptional.

Details: Unpublished paper, 2016. 74p.

Source: Internet Resource: Accessed September 28, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2840715

Year: 2016

Country: International

Keywords: Civil Rights

Shelf Number: 146108


Author: Potgieter, Thean

Title: Maritime security in the Indian Ocean: strategic setting and features

Summary: For millennia the peoples living around the Indian Ocean have benefited from its rich trade, while the interaction resulting from these maritime exploits, whether of a cultural and religious nature, or of conquest and slavery, invariable influenced their lives fundamentally. These traditional patterns of trade and communication changed drastically when first the Portuguese and then other European powers began sailing around the Cape of Good Hope to establish trade links and empires in the East. Initially Africa was little affected by European maritime activity as the focus was on trade with the East. Africa's primary value was to provide refuge and provisions along a long and often hazardous route. The formidable warships of the European naval powers were rapidly able to establish dominance in the Indian Ocean and projected their influence to the furthest corners of region. Naval forces were crucial for the establishment of national interests and for countering the activities of other European nations. Over the centuries, the British in particular, because of their effective utilisation of sea power, were able to create a large Indian Ocean empire. During the course of the 19th century, European navies also played an important role in maintaining good order at sea, eradicating piracy and countering slavery. The decolonisation process after the Second World War ended British hegemony in the Indian Ocean. The subsequent Cold War was again marked by superpower rivalry in the region, enhancing the region's global strategic value. When this period came to an end, Indian Ocean countries to a certain extent rediscovered some of the economic, social and cultural facets that made the ocean the bridge between Africa, Asia and Australasia. However, regional interaction and cohesion still leave much to be desired. Indian Ocean security is now no longer the domain of colonial states or superpowers, but has become multifaceted and dynamic. New role players such as India and China have become major powers, and new national alliances are changing the scene. But current global realities have introduced maritime security problems as non-state actors are influencing security in the area directly and fundamentally. This is a serious development since the rich Indian Ocean maritime trade, which includes much of the world's energy trade, is crucial to the global economy. It seems that many of the lessons of centuries gone by are again being learned - rather than doing battle, navies have to project power and play a diplomatic role to maintain good order at sea. Maritime security is a broad, somewhat amorphous area of focus, and the relevant literature covers everything from physical safety and security measures to port security, terrorism and more. A coherent definition is therefore difficult to determine, but, for the purpose of this paper, maritime security deals with the prevention of illicit activities in the maritime domain. It could be linked directly to the national security efforts of a specific country, or it could cover regional and international efforts to enforce maritime security. This paper centres on the strategic value of the Indian Ocean and the relevant maritime security characteristics and threats. Particular attention is given to issues relevant to Africa. The paper concludes with possible solutions and highlights the importance of international and regional cooperation.

Details: Pretoria, South Africa: Institute for Security Studies, 2012. 24p.

Source: Internet Resource: Paper no. 236: Accessed September 29, 2016 at: https://www.issafrica.org/uploads/Paper236.pdf

Year: 2012

Country: International

Keywords: Maritime Crime

Shelf Number: 140516


Author: Finkenbinder, Karen

Title: Fostering a Police Reform Paradigm

Summary: Of all the myriad of lessons learned in recent conflicts, the importance of police forces, to counter insurgencies and maintain security, is well-recognized. The police may be civilian, military or combination of types of police. Numerous articles, studies, and books have been published about all aspects of police reform but this monograph takes a different approach. It combines the theoretical with the applied and provides practical and historical applications of police reform. The authors have diverse experiences - Ms. Finkenbinder, a career in municipal and state policing before moving into academia; Professor Millen, a retired Army officer and PKSOI Security Sector Reform analyst, and Colonel Lowe, a senior military police officer with 23 years of experience as a teacher, staff officer and commander. Combined, they have more than sixty years of experience teaching, mentoring and reforming police. Precisely, because of this, they understand that police reform is more than a checklist of outputs. It requires a paradigm shift from being focused on policing tasks to one that understands the rational and moral foundation of police forces and how they fit into society. Police reform needs to know the distinction between the Rule of Law and Rule by Law and how the latter can be used to perpetuate evil in the name of the state. Police reform needs a blueprint for building stabile police organizations and that blueprint is doctrine. But, none of it matters without the practical application involved in hiring the right people for the right tasks. The authors have tried to balance the philosophical, doctrinal and practical considerations to encourage a police reform paradigm - one that is based upon human rights, yet respectful of cultural differences.

Details: Carlisle Barracks, PA: U.S. Army War College Press, 2013. 71p.

Source: Internet Resource: PKSOI Papers, Accessed September 30, 2016 at: https://www.pksoi.org/document_repository/doc_lib/PKSOI_Paper_Fostering_a_Police_Reform_Paradigm_(18-Jun-13).pdf

Year: 2013

Country: International

Keywords: Police Legitimacy

Shelf Number: 140533


Author: Cockayne, James

Title: Hidden Power: The Strategic Logic of Organized Crime: Sicily, New York and the Caribbean, 1859- 1968, and Mexico and the Sahel.

Summary: Criminologists have long recognized that some groups govern criminal markets. Strategists and political scientists, however, downplay the role organized crime plays in domestic and international politics - though the United Nations Security Council, World Bank and White House have warned that role may be growing. The assumption has been that states and insurgents exist in a political 'upperworld' while organized crime exists in a separate, profit-driven 'underworld'. We consequently lack a framework for understanding the strategic logic of organized crime: how it uses force, and other means, to compete, cooperate and collaborate with states and other political organizations for governmental power. This dissertation develops such a framework, drawing on strategic theory, criminology, and economic and management theory. It applies the framework to the emergence, development and movement of mafias in Sicily, New York, and the Caribbean between 1859 and 1968. Using unpublished judicial, intelligence and diplomatic material, mafia memoires, and published secondary sources, the dissertation reveals mafias becoming autonomous strategic actors in both domestic and international politics. They deliberately influenced elections, organized domestic insurgency and transnational armed attacks, attempted regime change, and formed governmental joint ventures with ruling groups. Mafias played important and unappreciated military and political roles during the Second World War, the Bay of Pigs and the Cuban Missile Crisis. Based on this historical analysis, the dissertation identifies six ways criminal groups position themselves in the 'market for government'. These positioning strategies help explain the emergence and behaviours of mafias, warlords and gang rulers; political-criminal alliances; acts of terrorism by criminal groups; and criminal sponsorship of new political structures ('blue ocean' strategy). The final section applies these concepts to two contemporary cases - Mexico and the Sahel - and considers the overall implications for strategic theory, efforts to combat organized crime and the management of criminal spoilers in peace processes.

Details: London: King's College London, 2015. 376p.

Source: Internet Resource: Dissertation: Accessed October 6, 2016 at: https://kclpure.kcl.ac.uk/portal/files/44634722/2015_Cockayne_James_1018212_ethesis.pdf

Year: 2015

Country: International

Keywords: Criminal Networks

Shelf Number: 140599


Author: Oboler, Andre

Title: Measuring the Hate: The State of Antisemitism in Social Media

Summary: On January 9th 2015 four French Jews were killed in an attack on the Hypercacher kosher supermarket in Paris, which was targeted following the attack on the offices of Charlie Hebdo and an aborted attack on a Jewish center which left a police woman dead. On February 15th Dan Uzan, a community security volunteer, was killed outside the Great Synagogue in Copenhagen, Denmark. In Israel there were a multitude of fatal knife attacks on Jewish targets. The far right is gaining in popularity, particularly in parts of Europe, while antisemitism from parts of the Muslim and Arab world inspire self-radicalisation and violent extremism. These are just some of the results of rising antisemitism in 2015, and highlight the need for urgent action. Through the Internet, antisemitic content and messages spread across national borders, feeding not only anti-Jewish hate, but violent extremism more generally. Removing the online incitement which leads to knife attacks in Israel is part and parcel of tackling the larger problem of online incitement which has also led to a dramatic increase in attacks on refugees in Germany. Responding to the rising social media incitement and very real consequences, German prosecutors opening an investigation into the possibility of criminal liability of senior Facebook executives in late 2015. Following this move an agreement was reached between the German Government, Facebook, Google and Twitter to see content that violated German law removed within 24 hours. Facebook has since gone further and announced a project to tackle online hate in Europe. As 2016 starts it is clear we have reached a point where the status quo is no longer acceptable. Social media platforms are being clearly told by governments around the world that if they don't do better to combating incitement, hate and the use of their systems by violent extremists, government will look to legislate to impose increased regulation. Social media platforms are starting to respond, but some are doing so more effectively than others. As governments increase their efforts to tackle threats in social media, antisemitism remains a core part of the wider fight against hate speech, incitement and violent extremism. It is an area where international efforts are well established, and where experts have been working on the problem since it was first raised at the Global Forum for Combating Antisemitism in 2008. Through its Working Group on Antisemitism on the Internet and in the Media, the Global Forum for Combating Antisemitism has continued to work steadily on this problem and released a major report of recommendations and a review of work to date in 2013, and an interim version of this report in 2015. This report represents the latest research and a major step forward in efforts to tackle online antisemitism. It also lights a path for tackling other forms of online hate and incitement. Hate in social media is explored empirically, both with respect to its relative prevalence across the major platforms, and with respect to the nature of the antisemitic content. Most significantly, the rate of removal of antisemitic hate speech is reported on by social media platform and by antisemitic category over the last 10 months. The report is based on a sample totalling 2024 antisemitic items all from either Facebook, YouTube or Twitter. The categories the hate were classified into were: incitement to violence (5%), including general statements advocating death to the Jews; Holocaust denial (12%); traditional antisemitism (49%), such as conspiracy theories and racial slurs; and New Antisemitism (34%), being antisemitism related to the State of Israel as per the Working Definition of Antisemitism. The results in this report indicate significant variation in the way antisemitism is treated both between companies and also within a single company across the four categories of antisemitism. Positive responses by the platforms remain far lower than a concerned public or the governments who represent them would expect.

Details: Caulfield South, Vic, AUS: Global Forum for Combating Antisemitism, 2016. 63p.

Source: Internet Resource: Accessed October 11, 2016 at: http://mfa.gov.il/MFA/ForeignPolicy/AntiSemitism/Documents/Measuring-the-Hate.pdf

Year: 2016

Country: International

Keywords: Antisemitism

Shelf Number: 145409


Author: Bartels, Lorana

Title: Literature Review on Intensive Supervision Orders: A Report Prepared for the Act Justice and Community Safety Directorate

Summary: This report presents a literature review in relation to intensive supervision orders (variously defined) in six countries, as follows: - Intensive Supervision Orders in New Zealand; - Conditional Sentences of Imprisonment in Canada; - Various forms of Intensive Supervision Probation in the United States; - Intensive Alternatives to Custody in England/Wales; - Intensive Supervision with Electronic Monitoring in Sweden; and - Correctional Supervision in South Africa. Each section presents an overview of the sentencing option, including the conditions to which it is subject (eg, electronic monitoring, substance abuse treatment, curfews, community service) and whether these are imposed on a mandatory or optional basis. Information on limits on the availability of the option (eg, by sentence length or offence type) is also considered. The report then presents evidence on the 'effectiveness' of each sentencing option. Due to the variety of information available, evidence of effectiveness is considered to include: - data on the use of the order, including the conditions imposed, and any impacts on the use of imprisonment; - reconviction and breach analyses; - cost-benefit analyses; - evidence of decreases in anti-social behaviour (eg, drug use) and/or increases in prosocial behaviour (eg, engagement with employment); and - research on the attitudes of a range of stakeholders, including offenders, victims, correctional officers, judicial officers and members of the public. The report presents a brief description of the electronic monitoring technology used, before examining the evidence on cost-effectiveness, reductions in reoffending and the perceptions of offenders and others affected by electronic monitoring, especially victims and those living with the offender. This section then explores some of the key practical and ethical challenges that may arise from this technology, including: workload implications; false reports; risk to the public; the challenges of involving the private sector in the delivery of community corrections; the risk of net-widening; and the offender's loss of privacy and risk of stigmatisation. The limitations of the research are acknowledged and future directions in research, technological advances and good practice principles are considered. The report concludes with summary of key findings and some observations on future directions.

Details: Canberra: University of Canberra, 2014. 89p.

Source: Internet Resource: Accessed October 11, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2669069

Year: 2014

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 145087


Author: Institute for Economics and Peace

Title: The Economic Cost of Violence Containment: A Comprehensive Assessment of the Global Cost of Violence

Summary: One of the major challenges in developing policies aimed at increasing peace is the difficulty of being able to accurately gauge the benefits that result from peace. Recognising this, the Institute for Economics and Peace (IEP) has developed a new and ground breaking methodology to estimate the cost of violence to the global economy, including calculations for 152 countries that detail the costs of thirteen different types of violence. This deeper insight into the breakdown of national costs of violence allows for better targeting of development assistance and also enables national governments to more accurately assess the costs associated with violence and the likely benefits that would flow from improvements in peace. In developing this methodology IEP uses the concept of 'violence containment' spending. IEP defines violence containment spending as economic activity that is related to the consequences or prevention of violence where the violence is directed against people or property. This approach uses ten indicators from the Global Peace Index (GPI) and three additional key areas of expenditure to place an economic value on 13 different dimensions. This process has been developed to enable relative comparisons between countries at different levels of economic development. GDP per capita has been used to scale the cost of violence containment for each country. In both the U.S. and the U.K. a number of robust analyses have been conducted on the cost of various types of violence and have been used as the basis for the scaling. This study is highly conservative as there are many items that have not been counted simply because accurate data could not be obtained. Future estimates will attempt to capture these items and therefore are expected to be higher. The economic impact of violence containment to the world economy in 2012 was estimated to be $9.46 trillion or 11 percent of Gross World Product (GWP).* This figure is comprised of $4.73 trillion of direct and indirect costs as well as an additional $4.73 trillion in additional economic activity that would flow from the reinvestment of these costs into more fruitful economic activities. Were the world to reduce its expenditure on violence by fifteen percent it would be enough to provide the necessary money for the European Stability Fund, repay Greece's debt and cover the increase in funding required to achieve the United Nation's Millennium Development Goals. One of the easier items to count is military expenditure, thus it is nearly fully included in the study. Military spending constitutes 51 percent of the total accounted expenditure on violence containment. However, the approach excludes many other forms of violence containment due to a lack of available data. If other forms of violence were included in the overall estimate, it is expected that military spending would drop considerably as a proportion of total violence containment expenditure. It is important to highlight that the world's direct expenditure on the military is more than 12 times the world's expenditure on foreign aid, as measured by Official Development Assistance (ODA). The economic impact of homicides represents the next most significant cost at $1.43 trillion dollars or 15 percent of the total impact. The third largest contributor is spending on internal security officers and police, accounting for around 14 percent of the total, or $1.3 trillion dollars of the economic impact. The longer-term research project for IEP aims to categorise and count many of these relevant areas of expenditure. Some examples of items that have been excluded are: The significant costs related to property crimes, motor vehicle theft, arson, household burglary and larceny/ theft, as well as rape/sexual assault Many of the preventative measures, such as insurance premiums or the costs to businesses of surveillance equipment and lost management time The direct costs of domestic violence in terms of lost wages, emotional costs and recovery costs. While expenditures on containing and dealing with the consequences of violence are important and a necessary public good, the less a nation spends on violence-related functions, the more resources can be allocated to other more productive areas of economic activity. Simply put, economic expenditure on containing violence is economically efficient when it effectively prevents violence for the least amount of outlay. However, money that is diverted to surplus violence containment, or money that is spent on inefficient programs, has the potential to constrain a nation's economic growth. Importantly, many societies that have lower levels of violence and crime also have lower violence containment spending. These societies reap a peace dividend.

Details: Sydney: Institute for Economics and Peace, 2015. 36p.

Source: Internet Resource: Accessed October 11, 2016 at: http://economicsandpeace.org/wp-content/uploads/2015/06/The-Economic-Cost-of-Violence-Containment.pdf

Year: 2015

Country: International

Keywords: Costs of Crime

Shelf Number: 145412


Author: Euromonitor International,

Title: The Global Retail Theft Barometer 2012-2013

Summary: Objective The objective of this report is to understand the rate of shrinkage in 16 countries, as well as the leading causes and methods of prevention. Two main data points are provided: - Average rate of shrinkage (in % terms) for retailing as a whole for each of the 16 countries. - Reasons for shrink: % share of shoplifting, employee theft, vendor or supplier fraud and administrative and non-crime losses of total shrink in each country. In addition to the aforementioned data points, insights per country include qualitative analysis on best methods of loss prevention, most stolen items and impact of shrinkage/loss on retailers in the country. Methodology Euromonitor International conducted in-depth trade interviews with Loss Prevention managers of leading retailers in each of the 16 countries, covering a questionnaire focussing on the aforementioned data and qualitative points (e.g. providing an estimate of total national shrinkage losses). The retailers were chosen based on their rank within the Passport retailing database (Euromonitor International's syndicated database), aiming to cover companies within the top 15 retailers where possible, in order to discuss shrinkage on a national level. Furthermore, Euromonitor International conducted an online survey of retailers across the researched countries, and responses were leveraged for further insights. Where available, completed questionnaires from the survey were used to supplement the information from the trade interviews, in order create country shrinkage estimates for each market. A total of 157 companies in 16 countries were interviewed and surveyed for this study. These companies generated approximately 18% (US$1,500 billion USD) in 2012 of total retail value sales in the 16 countries combined. Euromonitor's team of researchers and consultants analysed the quantitative and qualitative information achieved through the methodology ultimately selected in order to understand 2012 trends in shrinkage and loss prevention in the selected geography/ scope. Reported Data - All results are reported on a national basis. - All shrinkage figures in this report are based on average selling (retail) prices. - Values in the report are given in US Dollars. Retail Industry Overview The qualitative and quantitative analysis in the country report sections "Industry Overview" are drawn from Passport, Euromonitor International`s syndicated research database, which is updated annually across 80 different countries.

Details: Thorofare, NJ: Checkpoint Systems, 2013. 148p.

Source: Internet Resource: Accessed October 11, 2016 at: http://www.odesus.gr/images/nea/eidhseis/2013/GRTB-2012-13-Eng.pdf

Year: 2013

Country: International

Keywords: Loss Prevention

Shelf Number: 140659


Author: Ponemon Institute

Title: Closing Security Gaps to Protect Corporate Data: A Study of US and European Organizations

Summary: Closing Security Gaps to Protect Corporate Data: A Study of US and European Organizations sponsored by Varonis, was conducted to determine the security gaps within organizations that can lead to data breaches and security incidents such as ransomware. The study surveyed a total of 3,027 employees in US and European organizations (United Kingdom, Germany and France), including 1,371 individuals (hereafter referred to as end users) who work in such areas as sales, finance and accounting, corporate IT, and business operations, and 1,656 individuals who work in IT and IT security (hereafter referred to as IT). This report includes Key Findings, Conclusions, Methods, and an Appendix with detailed survey questions and results.

Details: Traverse City, MI: Ponemon Institute, 2016. 26p.

Source: Internet Resource: Accessed October 12, 2016 at: https://info.varonis.com/hubfs/docs/research_reports/Varonis_Ponemon_2016_Report.pdf

Year: 2016

Country: International

Keywords: Computer Security

Shelf Number: 147899


Author: Parkes, Jenny

Title: A Rigorous Review of Global Research Evidence on Policy

Summary: This rigorous literature review was commissioned by UNICEF, with the aim of examining research evidence on approaches to addressing school-related gender-based violence (SRGBV). While the scope of the review was global, an emphasis was placed on research in low- and middle-income countries. The review addressed the following questions: 1. What does research evidence tell us about the kinds of policies and practices being used to address SRGBV, and in what contexts, around the world? What concepts and ideas underpin these interventions, and what are the implications for addressing SRGBV? 2. What is the evidence on how interventions on SRGBV engage with education policy processes at and across national, district and local levels, and with contextual features, including political, economic and social conditions? 3. How can research evidence and data-gathering tools be used effectively to inform policy and practice on SRGBV across a range of settings? The conceptual approach taken viewed SRGBV as multi-dimensional, including physical, sexual and psychological acts of violence that are underpinned by norms, stereotypes and inequalities and shaped by institutions.

Details: London: University College London, Institute of Education, 2016. 80p.

Source: Internet Resource: Accessed October 13, 2016 at: http://www.unicef.org/education/files/SRGBV_review_FINAL_V1_web_version.pdf

Year: 2016

Country: International

Keywords: Gender-Related Violence

Shelf Number: 145893


Author: Hillier, Bill

Title: An evidence based approach to crime and urban design: Or, can we have vitality, sustainability and security all at once?

Summary: It is generally agreed that a key priority in the design of cities is, insofar as it is possible, to make life difficult for the criminal. But is that really possible? Different crimes, after all, are facilitated by very different kinds of spaces: picking pockets is easier in crowded high streets, street robbery is easier when victims come one at a time, burglary is helped by secluded access, and so on. In inhibiting one crime, it seems, we might be in danger of facilitating another. Even so, the sense that some environments are safe and others dangerous is persistent, and inspection of crime maps will, as often as not, confirm that people's fears are not misplaced. So is it possible to make environments generally safer? Strangely, although it is now widely believed that it is, there are two quite different schools of thought about how it should be done. The first is traceable to Jane Jacobs book 'The Death and Life of the Great American Cities' in 1962, and advocates open and permeable mixed use environments, in which strangers passing through spaces, as well as inhabitants occupying them, form part of an 'eyes on the street' natural policing mechanism which inhibits crime. The second, traceable to Oscar Newman's book Defensible Space in 1972, argues that having too many people in spaces creates exactly the anonymity that criminals need to access their victims, and so dilutes the ability of residents to police their own environment. Crime can then be expected to be less in low density, single use environments with restricted access to strangers, where inhabitants can recognise strangers as intruders and challenge them. We could call these the 'open' and 'closed' solutions, and note that each in its way seems to be based on one kind of commonsense intuition, and each proposes a quite precise mechanism for maximizing the social control of crime through design. Yet each seems to imply design and planning solutions which are in many ways the opposite of each other. The problem is further complicated by sustainability. To minimise energy consumption, we are said to need denser environments, which are easier to move about in under personal power, and with more mixing of uses to make facilities more easily accessible. This implies permeable environments in which you can easily go in any direction without too long a detour. From this point of view, the way we expanded towns in the later part of the twentieth century, with large areas of hierarchically ordered cul de sacs in relatively closed-off areas, made trips longer and so more car dependent. So if it were criminogenically neutral, the open solution would be preferable. But its critics say it is not. The open solution, they argue, will facilitate crime and so create a new dimension of unsustainability. So what does the evidence say? The fact is that on the major strategic design and planning questions it says precious little. The points at issue were recently summarised by Stephen Town and Randall O'Toole (Town & O'Toole 2005) in a table of six points where the 'open' position, which they say is preferred by Zelinka & Brennan in their book 'new urbanist' book 'Safescape' (Zelimka & Brennan 2001), is contrasted to the closed 'defensible space' position, which has dominated most thinking until quite recently.

Details: London: Bartlett School of Graduate Studies, University College London, 2008. 28p.

Source: Internet Resource: Accessed October 13, 2016 at: http://spacesyntax.com/wp-content/uploads/2011/11/Hillier-Sahbaz_An-evidence-based-approach_010408.pdf

Year: 2008

Country: International

Keywords: Crime Prevention

Shelf Number: 145537


Author: Smith, Lucy Olivia

Title: The Costs of Illegal Wildlife Trade: Elephant and Rhino. A study in the framework of the EFFACE research project

Summary: African elephants and rhino are facing an uncertain future, placed at risk in the short term by increasing demands for ivory and rhino horn and in the long term by habitat loss, degradation and fragmentation from expanding human settlements. It is the short term threat of poaching, however, that puts elephant and rhino at immediate risk of extinction in the wild. Since 2007, illegal poaching has risen precipitously year after year to meet the insatiable market demand of mainly Asian consumers. The high value of ivory, and particularly rhino horn, have established these items as lucrative black market commodities, which has led to the trade becoming highly organised and professionalised. Historically, both elephants and rhino became nearly extinct because of unsustainable hunting. The mass slaughter and near elimination of both species during the twentieth century led to concerted rehabilitation missions. In the 1960's an international coordinated effort called "operation rhino" involved the re-population of white rhino to southern Africa using just a few individuals. For elephants, unregulated poaching and hunting led to the introduction of important protection measures in the late 1980s with a 1989 Convention on International Trade in Endangered Species (CITES) ban on commercial trade of ivory and the inclusion of elephants on the International Union for the Conservation of Nature (IUCN) Red List as "vulnerable." Elephant poaching levels are also the highest in over 25 years. Both elephants and rhino are currently listed in Appendix I of CITES meaning that commercial trade in wild-caught specimens is illegal. As a result of these efforts, elephant and rhino populations experienced a decade of low levels of poaching (from 1995 to 2007) that saw their populations begin to rehabilitate. This brief period, however, came to an end in 2007 when poaching levels escalated dramatically and continued to increase on an annual basis. For rhino in particular, the poaching rate over time exhibits the magnitude of growing demand with an average of only fourteen poached rhino individuals per year between 1990 and 2007 increasing to over a thousand in 2014. Poaching for ivory and particularly rhino horn is driven by the high value these products have on the black market. According to the wildlife trade monitoring network TRAFFIC, the street price of Rhino horn is $100,000/kg compared to the price in 1990 which at the time was estimated at $250-500/kg, with a single horn weighing between 1-3kg, depending on the age and species. Thus, the poached value of a rhino individual ranges between $100,000 - $300,000. The price of ivory has tripled in the last three years in China. Uncarved ivory is worth $2,100 per kilo and an elephant on average has 10 kilos per tusk, thus the black market revenue of one poached elephant is approximately $21,000. Demand from consumers is not abating and parallels the purchasing power of Asia's rising middle class which finds rhino and ivory to be symbolic of prestige and wealth. However, what is fundamentally new is the surge in demand of rhino horn from Vietnam stemming from a rumour around 2008 when a Vietnamese politician claimed to be treated for cancer with rhino horn. Contrary to popular belief, rhino horn is not a common ingredient of traditional Chinese medicine and its use now is distinctly a new trend tied to increased wealth and its perceived medicinal qualities. The number of multimillionaires in Vietnam has grown 150% in the last five years. At the same time, cancer rates in Vietnam are increasing 20-30 % annually with an estimated 150,000 new cases each year making for a long waiting list for radiation therapy and lack of capacity to deal with cancer in conventional facilities. Scientifically rhino horn is composed of carotene and is the same chemical composition as a human finger nail, thus making the trade not only unsustainable but scientifically misguided. On the other hand, ivory has been traded throughout history, but demand from Asian countries particularly Vietnam (for rhino horn) over the last decade has led to a resurgence in poaching pushing many African elephant populations towards extinction.

Details: Berlin: Ecologic Institute, 2015. 35p.

Source: Internet Resource: Accessed October 13, 2016 at: http://efface.eu/sites/default/files/EFFACE%20D3.2c%20-%20Quantitative%20and%20monetary%20analysis%20of%20Elephant%20and%20Rhino%20hunting.pdf

Year: 2015

Country: International

Keywords: Animal Poaching

Shelf Number: 145536


Author: Milton, Daniel

Title: Communication Breakdown: Unraveling the Islamic State's Media Efforts

Summary: This report breaks down the Islamic State's media activities through a two-fold approach. First, it examines a small number of declassified documents captured from the group's predecessors to provide a baseline understanding its present-day media structure and operations. Second, through an examination of over 9,000 Islamic State official media products, this report offers detailed insight into what the group is saying and what a study of its propaganda can tell us about its strengths, weaknesses, and struggles. A number of findings emerge from these analyses. First, the Islamic State's media network is adaptive and complex. Second, the group publishes products on a variety of themes, only one of which has to do with the violence for which the group is so well-known. Third, the frequency of the group's products has declined significantly since its high-point in the summer of 2015. Fourth, the Islamic State's provincial media bureaus are not all equal in terms of their production content. Finally, although advances have been made in limiting the group's media activities, there is still more than can be done to limit the group's outreach efforts.

Details: West Point, NY: Combating Terrorism Center at West Point, 2016. 63p.

Source: Internet Resource: Accessed October 13, 2016 at: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/10/ISMedia_Online.pdf

Year: 2016

Country: International

Keywords: ISIS

Shelf Number: 145442


Author: Laros, Jeroen F.J.

Title: Metrics and Visualisation for Crime Analysis and Genomics

Summary: Informally speaking, Data Mining [67] is the process of extracting previously unknown and interesting patterns from data. In general this is accomplished using different techniques, each shedding light on different angles of the data. Due to the explosion of data and the development of processing power, Data Mining has become more and more important in data analysis. It can be viewed as a subdomain of Artificial Intelligence (AI [61]), with a large statistical component [4, 28]. Amongst the patterns that can be found by the usage of Data Mining techniques, we can identify Associations. Examples of this can be found in market basket analysis. One of the (trivial) examples would be that tobacco and cigarette paper are often sold together. A more intricate example is that certain types of tobacco (light, medium, heavy) are correlated with different types of cigarette paper. This so-called Association Mining is an important branch of Data Mining. Other patterns that are frequently sought are Sequential patterns. Sequential patterns are patterns in sets of (time)sequences. These patterns can be used to identify trends and to anticipate behaviour of individuals. Associations and Sequential patterns will play a major role in this thesis. Once patterns have been identified, we often need a visualisation of them to make the discovered information insightful. This visualisation can be in the form of graphs, charts and pictures or even interactive simulations. Data Mining is commonly used in application domains such as marketing and fraud detection, but recently the focus also shifts towards other (more delicate) application domains, like pharmaceutics and law enforcement. In this thesis we focus on the application domains law enforcement and sequence analysis. In law enforcement, we have all the prerequisites needed for Data Mining: a plethora of data, lots of categories, temporal aspects and more. There is, however, a reluctance when it comes to using the outcome of an analysis. When used with care, Data Mining can be a valuable tool in law enforcement. It is not unthinkable, for example, that results obtained by Data Mining techniques can be used when a criminal is arrested. Based on patterns, this particular criminal could have a higher risk of carrying a weapon, or an syringe, for example. In law enforcement, this kind of information is called tactical data. After the Data Mining step, statistics is usually employed to see how significant the found patterns are. In most cases, this can be done with standard statistics. When dealing with temporal sequences though, and lots of missing or uncertain data, this becomes exceedingly harder.

Details: Leiden: University of Leiden, 2009.

Source: Internet Resource: Thesis: Accessed October 13, 2016 at: https://openaccess.leidenuniv.nl/bitstream/handle/1887/14533/thesis.pdf?sequence=2

Year: 2009

Country: International

Keywords: Crime Analysis

Shelf Number: 144935


Author: di Bella, Enrico

Title: A multivariate analysis of the space syntax output for the definition of strata in street security surveys

Summary: Although the connection between crime and urban layout is generally evident, surveys inquiring that relationship are often facing two different problems: areas with high criminality are often inhabited by partially elusive populations (being stowaways) and the urban structure (e.g. length and width of streets) quickly changes even after a few corners. In this work a combination of two techniques well known in their specific field is proposed to define a simple two-stages sampling design. Space Syntax is a set of measurements which are done on the topographic maps of a town with the division of all the roads into segments, called axes. Using multivariate techniques, these axes can be classified on the basis of a homogeneity criterion obtaining the strata for a two-stages sampling design.

Details: Genova, Italy: Università degli Studi di Genova , 2013. 40p.

Source: Internet Resource: DEP Series of Economic Working Papers no. 5: Accessed October 14, 2016 at: http://www.dep.unige.it/RePEc/gea/wpaper/dwpo-5-sep2011.pdf

Year: 2013

Country: International

Keywords: CPTED

Shelf Number: 144801


Author: Kaufman, Keith

Title: Risk profiles for institutional child sexual abuse: a literature review

Summary: The Royal Commission commissioned this literature review to synthesise international evidence regarding risk and protective factors related to child sexual abuse in institutional contexts. Risk and protective factors are considered in relation to three primary review areas of institutional child sexual abuse: victims, perpetrators and institutional settings. Literature review methodology The methodology for this review was built on the Royal Commission's broad definition of institutional child sexual abuse as provided in its terms of reference which includes but is not limited to schools, sporting clubs, children's services, foster care, residential care facilities, religious organisations, and government organisations. The first step in the review process was to identify a wide range of relevant search terms. The authors developed a preliminary list of search terms and circulated it among experts in the United States (US), the United Kingdom (UK) and Australia to solicit additional terms. A similar process was conducted to identify databases that would yield the most relevant articles for this review. After feedback, the authors developed final lists of search terms and databases for use in this literature review. Simultaneous, independent literature reviews of each of five identified areas were conducted using the final search terms. These reviews were conducted by the authors' project team, the Australian Institute of Family Studies (Australia), the National Child Advocacy Center (US), the National Sexual Violence Resource Center (US) and the National Society for the Prevention of Cruelty to Children (UK). The reviews focused on scientific research literature as well as 'grey literature' such as reports, inquiries, evaluations and dissertations. Pertinent documents identified in the reviews were also closely examined for references to literature that could be included in this project. The project team created brief summaries of each pertinent article, which were used by the authors to craft the various sections of the literature review. Article summaries were also used to develop critiques for each section and recommendations for future directions related to each sub-topic, as well as to create an overall review. Royal Commission staff members reviewed the draft review document and made suggestions for revisions, which were made by the primary authors. The nature of the reviewed literature This review yielded more than 400 relevant documents, primarily comprising research studies from professional journals. The literature was not only distributed across the three key review areas of victim, perpetrator and institution, but also further divided across six specific types of institutional setting including faith-based settings; early childhood education, care and schools; healthcare; out-of-home care; sport; and public inquiries and case reviews. The identified documents are best described as a series of related literature with limited integration. In particular, the documents specific to victim, perpetrator and institution are quite distinct, with little overlap and minimal cross-referencing. Additionally, articles describing child sexual abuse in various types of institutional setting are also highly 'siloed'. The separate nature of these research sub-areas is an important dimension for understanding the strengths and weaknesses of the available literature on child sexual abuse in institutions. Findings The following section highlights the big-picture findings regarding risk and protective factors pertinent to victims, perpetrators and institutions, as well as the role of prevention of institutional child sexual abuse.

Details: Sydney: Royal Commission into Institutional Responses to Child Sexual Abuse, 2016. 133p.

Source: Internet Resource: Accessed October 14, 2016 at: http://www.childabuseroyalcommission.gov.au/getattachment/399a6b99-aa14-449e-bf6d-2d5d5beb773f/Risk-profiles-for-institutional-child-sexual-abuse

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 144808


Author: Briscoe, Ivan

Title: Protecting Politics: Deterring the Influence of Organized Crime on Elections

Summary: Elections are essential elements of democratic systems. Unfortunately, abuse and manipulation (including voter intimidation, vote buying or ballot stuffing) can distort these processes. However, little attention has been paid to an intrinsic part of this threat: the conditions and opportunities for criminal interference in the electoral process. Most worrying, few scholars have examined the underlying conditions that make elections vulnerable to organized criminal involvement. This report addresses these gaps in knowledge by analysing the vulnerabilities of electoral processes to illicit interference (above all by organized crime). It suggests how national and international authorities might better protect these crucial and coveted elements of the democratic process. Case studies from Georgia, Mali and Mexico illustrate these challenges and provide insights into potential ways to prevent and mitigate the effects of organized crime on elections.

Details: Stockholm, Sweden: International Institute for Democracy and Electoral Assistance; The Hague: Clingendael, 2016. 76p.

Source: Internet Resource: Accessed October 14, 2016 at: http://www.idea.int/publications/protecting-politics-organized-crime-elections/index.cfm?css=new2013

Year: 2016

Country: International

Keywords: Elections

Shelf Number: 144810


Author: Pink, Grant

Title: Law Enforcement Responses to Transnational Environmental Crime: Practical Considerations and Suggested Improvements Arising from an International Analysis

Summary: his paper considers the issue of law enforcement responses to transnational environmental crime with a particular focus on the role of environmental regulatory agencies. More specifically, it identifies and analyses the various operational and policy factors which inform and shape responses to transnational environmental crime. The aim of this paper is to furnish environmental regulatory agencies with information, options, and strategies so they can more effectively detect, deter, and disrupt this form of transnational crime. The paper outlines the different roles and functions of police agencies, customs and port authorities, and environmental regulatory agencies in terms of their efforts in the fight against transnational environmental crime. It also compares the use of administrative, civil, and criminal law enforcement responses by these response agencies.

Details: Canberra: Transnational Environmental Crime Project, Department of International Relations, Australian National University, 2013. 33p.

Source: Internet Resource: Working Paper 5/2013: Accessed October 15, 2016 at: http://ir.bellschool.anu.edu.au/sites/default/files/uploads/2016-09/tec_working_paper_5-2013.pdf

Year: 2013

Country: International

Keywords: Environmental Crime

Shelf Number: 130009


Author: LexisNexis

Title: Dark Chocolate: Understanding Human Trafficking Risks in the Chocolate Supply Chain; We Have a Choice White Paper

Summary: Using a licensed collection of the most influential news sources from more than 120 countries, the LexisNexis Human Trafficking Awareness Index measures media coverage of human trafficking to highlight key trends at national and global levels. The Index is intended to support the work of campaigners and other organisations in understanding perceptions of human trafficking in its various forms. This report was developed in partnership with STOP THE TRAFFIK as part of this Rule of Law initiative. STOP THE TRAFFIK (www.stopthetraffik.org) is a global campaign organisation working to prevent human trafficking. For further information on the LexisNexis Human Trafficking Awareness Index please visit www. nexis.co.uk/humantrafficking or email nexisinfo@lexisnexis.co.uk. This report focuses on the 476 English language articles identified in the Nexis Human Trafficking Awareness Index, since the launch of the Index in May 2010 until May 2013, directly relating to human trafficking and the global cocoa supply chain. Representing a tiny fraction of the articles within the Nexis database they nonetheless provide deep insight into this issue. A significant proportion of the licensed content is not available on the open web and it is all structured and enriched to make analysis easy. We examine the link between chocolate and human trafficking by analysing: - media coverage of the largest companies in the industry and implications for supply chain professionals; - how Non-Governmental Organisations drive media awareness and influence key initiatives for change; - the role of certification and how organisations can incorporate it into their broader supply chain risk management.

Details: Cambridge, UK: LexisNexis, 2014. 36p.

Source: Internet Resource: Accessed October 17, 2016 at: http://www.nexis.co.uk/pdf/Dark_Chocolate.pdf

Year: 2014

Country: International

Keywords: Child Labor

Shelf Number: 145093


Author: Nordbrand, Sara

Title: Out of control. E-waste trade flows from the EU to developing countries

Summary: When it comes to the burden of e-waste, several developing countries in Asia and Africa that lack proper systems for recycling and disposal are experiencing increasing problems; firstly because consumption of electronics is increasing most within these countries at present, and secondly because e-waste is exported from the rich world to developing nations that lack the capacity and regulations to handle this waste in a responsible manner. During rudimentary recovery by informal recyclers in countries such as China, India, Ghana and Nigeria workers are exposed to hazardous chemicals and material when products are broken apart in order to extract valuable components and metals. A study published in 2007 showed that children in the Chinese recycling town Guiyu had much higher blood lead levels than children living in a settlement where recycling of electronics did not take place. Other health problems that have been reported include diseases and problems related to skin, stomach, respiratory tract and other organs. E-waste contains a variety of hazardous metals and organic compounds. The content of electronics collected in the EU will become less problematic over the next few years when the effects of the Restriction of Hazardous Substances Directive (RoHS) will be fully developed, which makes the producers phase out some of the most hazardous substances. However, the restrictions of RoHS only apply to products put on the market after 1 July 2006. Moreover, risks related to some of the other content are still poorly documented. More than 200 chemicals compounds are included in a single mobile phone, for example, and all possible effects of the content on humans and the environment have not been fully studied. Exports of WEEE to developing countries are banned according to EC legislation (the Waste Shipment Regulation). New EC legislation also requires that the cost of properly disposing of electronic products must be picked up by the producers of the waste (the WEEE Directive). Over the last few years, several electronics companies have increased their efforts to phase out hazardous materials, spurred by legislative and consumer demands. Creative minds at several electronics companies have been set in motion in order to produce more ecofriendly products that are easier to recycle and handle when they reach their end-of-life. On the market as a whole there is still room for improvement, though. Regarding e-waste collection in general, the average annual collection rate within the EU is about five kilos per person, while it is expected that each inhabitant generates 15 kg of e-waste annually. Within the EU as a whole, it is estimated that 25% of the medium-sized appliances and 40% of the larger appliances are collected and treated. The rest, the remaining 60% to 75%, represents what Greenpeace International calls “the hidden flow”. No one currently knows the scale of the EU’s e-waste exports to developing countries, but there is evidence that it does occur. Some experts fear that these exports will increase as an unanticipated result of EU’s environmentally sound directives. The trade in second-hand electronics generates both positive and negative effects. The final disposal and treatment of the products will take place in countries where proper disposal and treatment systems are lacking and brands and retailers are not required to take back products nor pay the actual costs. National statistics in different EU countries, showing shipments of electronics that have been declared as actual products and not waste, indicate that parts of the exported electronic goods might be waste or second-hand products with unknown additional lifetime. In this context, countries in Africa and the Middle East seem to be important recipients. Due to the low number of port inspections in the EU as a whole, Customs are not aware of the age and the quality of these exported products. Custom officials in many EU member states point out that they lack resources necessary to learn about the contents of shipments leaving their countries. In general narcotics, alcohol, tobacco and financial crimes are issues of priority, not illegal shipments of waste.

Details: Stockholm: SwedWatch, 2009. 46p.

Source: Internet Resource: Accessed October 17, 2016 at: http://www.ima.kth.se/utb/MJ1501/pdf/Ewaste09.pdf

Year: 2009

Country: International

Keywords: Electronic Waste

Shelf Number: 140770


Author: Nakao, Keisuke

Title: Transnational Policing: Preemption and Deterrence against Elusive Perpetrators

Summary: Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy's three advantages: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, the delegation may cause inefficiency if Defender has limited information about Proxy's choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g., Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs in Colombia and Mexico); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each's own domain (Interpol, Budapest Convention).

Details: Unpublished paper, 2016. 32p.

Source: Internet Resource: Accessed October 17, 2016 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2808474

Year: 2016

Country: International

Keywords: Cybercrime

Shelf Number: 144872


Author: Defence for Children International

Title: "From legislation to action: Trends in juvenile justice systems across 15 countries"

Summary: Since the adoption of the UN Convention on the Rights of the Child (CRC) in 1989, the global progress made in terms of juvenile justice has been very uneven. In the General Comment No.10 on Children's Rights in Juvenile Justice (2007), the Committee on the Rights of the Child acknowledges that "many State parties still have a long way to go in achieving full compliance with the CRC, e.g. in the areas of procedural rights, the development and implementation of measures for dealing with children in conflict with the law without resorting to judicial proceedings, and the use of deprivation on liberty only as a measure of last resort."1 With growing concern the global movement of Defence for Children International (DCI) has developed research, monitoring, advocacy, and awareness raising activities at national and international level to respond to these problems. This publication, developed in collaboration with 15 of DCI's national sections across Africa, Europe, Latin America, the Middle East and North America, provides a preliminary mapping of trends in juvenile justice in 2007. In order to draw attention to the continued shortcomings, and to effectively update and sharpen its advocacy and research objectives, and those of other key stakeholders, DCI saw the necessity of identifying the latest global trends in the implementation and/or neglect of international standards on juvenile justice. The organisation and analysis of information in this study are guided by the Committee on the Rights of the Child's General Comment No.10 on Children's Rights in Juvenile Justice 2 . DCI national sections were asked to gather quantitative and qualitative data on several aspects of the juvenile justice system that were highlighted in the General Comment. Each chapter opens with a short introduction to the topic, followed by an overview of the information collected by DCI's national sections, and a short analysis of the findings. Where possible, individual case studies are highlighted, together with examples of DCI's programme activities and staff experiences in particular countries. Chapter I provides an Introduction to the report, including its background and objectives, and the methodology used to gather information. Chapter II examines the Administration of Juvenile Justice in each participating country. In particular it considers whether the appropriate legal provisions, procedures and institutions are in place for an effective and fair juvenile justice system, and whether these are in compliance with international standards. Chapter III considers the issue of Minimum Age of Criminal Responsibility (MACR), particularly the trends in the increase and decrease of MACR in certain countries. Chapter IV explores the policies and programmes in place for the Prevention of Juvenile Delinquency. In particular, it looks at whether the participating countries have concrete prevention programmes in place, and who the target groups of these programmes are. Chapters V and VI explore the situation once children are sentenced: deprivation of liberty, and alternative measures to the deprivation of liberty. In particular, it explores the conditions of detention for children in conflict with the law, with special attention to their vulnerability to sexual, physical and other forms of abuse.

Details: Geneva: Defence for Children International, 2007. 64p.

Source: Internet Resource: Accessed October 17, 2016 at: http://www.defenceforchildren.org/wp-content/uploads/2010/04/DCI-JJ-Report-2007-FINAL-VERSION-with-cover.pdf

Year: 2007

Country: International

Keywords: Juvenile Justice Administration

Shelf Number: 114585


Author: Defence for Children International

Title: Reducing violence against children, with special focus on sexual exploitation of children and child sex tourism in 30 countries in Africa, Asia, Europe, Latin America and the Middle East

Summary: Violence against children is a grave human rights violation. The human, social and economic costs of denying children their right to protection are huge and unacceptable. Universal and regional legal instruments set clear and attainable standards to protect children from sexual violence and exploitation. The United Nations Convention on the Rights of the Child requires States to provide measures protecting children against neglect, abuse and sexual exploitation, and to provide child victims with special help to recover and reintegrate into society. In the past ten years, the full range and scale of (sexual) violence against children worldwide has become increasingly visible.1 Violence against children, including gender based violence, sexual violence and exploitation, are pervasive violations of children's rights which remain widespread. To reduce violence against children, with special focus on sexual exploitation of children and child sex tourism, the specific objective is to ensure a greater, more effective Civil Society response. Furthermore, the programme will provide evidence based global guidance to combat sexual exploitation of children in Travel and Tourism. In this programme, Defence for Children - ECPAT The Netherlands works to combat violence against children, with a special focus on sexual exploitation and child sex tourism, in 30 countries, in Africa, Asia, Europe and Latin America. In every country, or set of countries, the programme will be adjusted to the specific problems the country faces and the related specific needs of children.

Details: Geneva, SWIT: Defence for Children, 2014. 54p.

Source: Internet Resource: Accessed October 19, 2016 at: http://www.defenceforchildren.org/wp-content/uploads/2014/12/DCINetherlands_Programme2014.pdf

Year: 2014

Country: International

Keywords: Child Sex Tourism

Shelf Number: 145382


Author: International Centre for the Prevention of Crime (ICPC)

Title: Crime Prevention and Community Safety: Cities and the New Urban Agenda. 5th International Report

Summary: The fifth edition of the International Report on Crime Prevention and Community Safety develops, from the urban perspective, various topics relevant to the current context in cities. As with previous editions of the Report, the first chapter is a constant of ICPC's International Reports, reviewing major trends in crime and in its prevention. The following two chapters address the relationship between the urban setting and the prevention of crime through two distinct lenses: the first gives a general overview of the issues and major trends facing cities; the second, in contrast, offers a comparative perspective, particularly in relation to national-local relationships in the Latin American context. The final three chapters address three fundamental topics on the prevention of urban crime: public transport, the prevention of drug-related crime, and the prevention of violent radicalization.

Details: Ottawa: ICPC, 2016. 204p.

Source: Internet Resource: Accessed October 19, 2016 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/International_Report/CIPC_5th-IR_EN_17oct_Final.pdf

Year: 2016

Country: International

Keywords: Crime Prevention

Shelf Number: 145994


Author: Global Initiative Against Transnational Organized Crime

Title: Understanding and Responding to the Role of Human Smugglers in Migration

Summary: A lack of nuance in examining and responding to what are generally termed "human smugglers", "facilitators", "traffickers", "organized crime", the distinctions between them, and their role in facilitating large scale migration is undercutting the response to illegal migration. It has resulted in policy choices that have proven counterproductive not only to the goals of safe and orderly migration, but also to promoting stability, good governance, adherence to human rights and ensuring long-term development. Of particular detriment, flawed policy has created stagnant and concentrated pools of people easily exploited by highly organized and exploitative smugglers and traffickers. This brief argues for a more structured understanding of the spectrum of the smuggling industry, and the importance of drawing a distinction between smuggling and trafficking. While the smuggling industry has become a significant vector in facilitating large scale migration, those working in it may range from altruistic actors who offer a critical lifeline and serve as a resilience or protection mechanism in situations of fragility, inequality and conflict where legitimate alternatives are absent or restricted. In other cases, however, those in the smuggling industry can form part of exploitative organized crime networks associated with violence, extortion, forced labor and other forms of abuse, including being used as a source of terror or a "means of war" by armed groups. The brief concludes that law enforcement action and criminal justice penalties should be targeted at the most damaging end of the spectrum, where routes are controlled by pre-existing transnational organized crime groups and/or where there are practices of abuse, violence and extortion. Law enforcement responses to community based "smugglers" will require significant resources, yield few successes, and cause political alienation. Designing the appropriate targeted responses against the full spectrum of smugglers, and where law enforcement is only one strategy, is critical to successfully prevent, mitigate or combat unsought impacts and prevent further destabilization in transit countries. Successful targeted responses by both governments, the UN Security Council and the wider migration management platform should include: Substantially strengthen the timely information, data and analysis available to the Security Council on the drivers (including root causes), changing smuggling routes, bottlenecks and on the nexus of migration, trafficking, organized crime and conflict, including the role of armed groups and/or state actors Strongly enhance the capacity of member states and the UN to more effectively monitor the entire smuggling chain from origin through transit countries to end-destinations. This is in contrast to current information that focuses on data collected by border control agencies and police in destination countries. Such a system should focus more clearly on places where there is a build-up of migrants and seek to ensure their wider dispersal. Through enhanced information capacity strengthen the full spectrum of proactive tools and policies available to countries and the Security Council to design appropriate measures to respond to smuggling and associated migration, including their link to conflict and insecurity. Such proactive interventions can only be designed on a better understanding of entire emigrant routes and the role of "smugglers" in different places, particular in those zones where there is a build-up of migrants.

Details: Geneva, SWIT: The Global Initiative, 2016. 20p.

Source: Internet Resource: Accessed October 20, 2016 at: http://globalinitiative.net/wp-content/uploads/2016/09/global-initiative-rhipto-human-smugglers-in-migration-sept-2016-web.pdf

Year: 2016

Country: International

Keywords: Human Smuggling

Shelf Number: 140808


Author: Steelman, Burle G.

Title: Examining World-Systems and Income Inequality Effects on Incarceration Rates: A Cross-National Study

Summary: Numerous studies find a positive relationship between income inequality and incarceration rates within countries. Other scholars note inequality, as an explanatory variable for differences in incarceration rates, lacks statistical significance. I confirm the positive relationship between increased inequality and increased incarceration rates in initial analyses, but find when tested with additional explanatory variables, income inequality loses its significance as a predictor of incarceration rates. In this study, I examine this relationship to provide additional context for the circumstances under which inequality influences incarceration rates, and when other factors attenuate the effect of inequality. Not only do I control for crime rates, using homicide rates, but include a control for drug offense rates not noted in earlier studies. Given the paucity of research regarding world-systems theory and criminological outcomes, I examine the role of position in the world-system on incarceration rates and other cogent variables. Results indicate no direct relationship between world systems position (WSP) and incarceration rates but indicate strong relationships between WSP and homicide rates and drug offense rates. This cross-national study examines correlates of rates of incarceration for 77 countries from 1994 through 2008. I provide a description of trends in incarceration rates, inequality, wealth, democracy, urbanization, homicide rates, drug offense rates, and other societal measures over the past 15 years. Global trends are broken down comparatively by region.

Details: Norman, OK: University of Oklahoma, 2016. 115p.

Source: Internet Resource: Dissertation: Accessed October 20, 2016 at: https://shareok.org/bitstream/handle/11244/41709/2016_Steelman_Burle_Dissertation_Examining_World_Systems_and_Income-Inequality_Effects_on_Incarceration_Rates_A_Cross-National_Study.pdf?sequence=2

Year: 2016

Country: International

Keywords: Imprisonment Rates

Shelf Number: 144832


Author: Schmid, Alex P.

Title: Radicalisation, De-radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review

Summary: The 'radicalisation', 'de-radicalisation' and 'counter-radicalisation' are used widely, but the search for what exactly 'radicalisation' is, what causes it and how to 'de-radicalise' those who are considered radicals, violent extremists or terrorists has so far been a frustrating experience. The popularity of the concept of 'radicalisation' stands in no direct relationship to its actual explanatory power regarding the root causes of terrorism. In Europe, it was brought into the academic discussion after the bomb attacks in Madrid (2004) and London (2005) by policymakers who coined the term 'violent radicalisation'. It has become a political shibboleth despite its lack of precision. Historical Roots and Definitions Based on an in-depth literature review, this paper seeks to explore key terms and the discourses surrounding them in greater detail. Much of the literature on radicalisation focuses on Islamist extremism and jihadist terrorism and this is also reflected in this Research Paper. Looking at the historical roots of radicalism, the subject is a relative one and has often been a force of progress. As such, its derivative, 'radicalisation' is not necessarily a synonym for terrorism. The paper proposes a distinction between radicalism and extremism. While both stand at some distance from mainstream political thinking, the first tends to be open-minded, while the second manifests a closed mind and a distinct willingness to use violence against civilians. A re-conceptualisation of radicalisation is proposed after a discussion of numerous academic and governmental definitions of radicalisation. The Two Sides of Radicalisation The paper also seeks to differentiate between terrorism and other forms of political violence - some worse and some less unacceptable than terrorism itself. It acknowledges that there are certain forms of violent resistance to political oppression that, while illegal under certain national laws, are accepted under international humanitarian law. For analytical purposes, political violence should be situated in the broader spectrum of political action - persuasive politics, pressure politics and violent politics - by those holding state power as well as non-state militant actors. With this in mind it should also be recognised that radicalisation is not necessarily a one-sided phenomenon, it is equally important to examine the role of state actors and their potential for radicalisation. The use of torture techniques and extra-judicial renditions in recent years, has been a drastic departure from democratic rule of law procedures and international human rights standards. These are indicative of the fact that in a polarised political situation not only non-state actors but also state actors can radicalise. Drivers of Radicalisation An exploration of the literature also confirms the pitfalls of profiling those individuals 'likely' to become terrorists. The current propensity to focus in the search for causes of radicalisation on 'vulnerable' young people has produced inconclusive results. The number of push and pull factors that can lead to radicalisation on this micro-level is very large - the same is true for the factors which can impact on de-radicalisation and disengagement. However, in the literature most findings are derived from small samples and few case studies, making comparison and generalisations problematic, and findings provisional. The paper pleads to look for roots of radicalisation beyond this micro-level and include a focus on the meso-level - the radical milieu - and the macro-level - the radicalisation of public opinion and party politics - to gain a better understanding of the dynamic processes driving escalation. The paper synthesises what we think we know about radicalisation and identifies those areas where our knowledge is 'thin'. Conclusions When it comes to de-radicalisation/dis-engagement and counter-radicalisation the paper concludes that it is difficult to identify what works and what does not work in general, or what is even counter-productive. Local context matters very much and academics and policy makers alike are increasingly recognising this fact. At this stage we still lack rigorous evaluations that allow us to determine the relative merits of various policies with a high degree of certainty. The lack of clarity and consensus with regard to many key concepts (terrorism, radicalisation, extremism, etc.) - ill-defined and yet taken for granted – still present an obstacle that needs to be overcome. The paper concludes with a set of findings and recommendations and identifies two major gaps in current counter-radicalisation efforts - one referring to the role of the media and the Internet and the other to the role of counter-narratives to those of jihadist terrorists. It identifies credibility and legitimacy as core ingredients of any political narrative hoping to catch the imagination of people at home and abroad. They are key resources in counter-radicalisation and counter-terrorism. Governments need not be perfect before they can effectively engage in successful de-radicalisation and counter-radicalisation efforts. However, they have, in the eyes of domestic and foreign publics, to be markedly better than extremist parties and terrorist organisations.

Details: The Hague: International Centre for Counter-Terrorism (ICCT), 2013. 97p.

Source: Internet Resource: ICCT Research Paper March 2013: Accessed October 21, 2016 at: https://www.icct.nl/download/file/ICCT-Schmid-Radicalisation-De-Radicalisation-Counter-Radicalisation-March-2013.pdf

Year: 2013

Country: International

Keywords: Counter-Radicalization

Shelf Number: 130117


Author: World Health Organization

Title: Preventing violence and reducing its impact: how development agencies can help

Summary: This document makes the case for increased attention by international development agencies to violence prevention, and aims to stimulate dialogue on the role of international development agencies in the prevention of violence globally. Approaches to prevent violence concentrate on identifying ways to keep people from committing acts of violence. Interventions may eliminate or reduce the underlying risk factors and reinforce protective factors. Prevention strategies are conceived and implemented with reference to the interaction of risk factors among people at different stages of the life cycle and in relation to causes at the levels of the individual, family, community, and society. Based on a review by WHO, including content analysis of 22 development agency web sites, this document provides a preliminary stocktaking of the priority accorded to violence prevention – as defined here – within international development programming. It focuses on interpersonal and self-directed violence, since many more people lose their lives, are injured, and suffer other negative health consequences through interpersonal and self-directed violence than through collective violence. Chapter I, “How violence harms development”, describes violence as a global challenge and a leading cause of death and disability worldwide. Violence disproportionately affects low- and middle-income countries, where its economic and social impacts are severe. Every day, more than 4000 people, over 90% of them in low- and middle-income countries, die because of violence. Of those killed, approximately 2300 die by their own hand and over 1500 because of injuries inflicted by another person. Much violence is not reported at all, so millions suffer untold and unaddressed harm. The chapter briefly reviews some of the health, social, and economic consequences of violence for individuals, communities, and countries, including: • Health consequences for individuals and for health systems • Economic consequences including lost opportunities, reduced productivity, and inequitable growth patterns • Reduced progress towards gender equality • Security and safety concerns as an obstacle to development • Obstacles to achieving Millennium Development Goals. Chapter II, "Preventing violence: a great advance", begins with a discussion of the impact of the 2002 World report on violence and health, the first comprehensive global review. One of the principal contributions of the World report was to make a strong case for a public health approach, a systematic process that concentrates on identifying ways to keep people from committing acts of violence, eliminating or reducing underlying risk factors, and reinforcing protective factors. It also emphasizes working with and learning from other sectors and disciplines to build sustained, intersectoral responses. Potential partner sectors with valuable contributions to make include education, employment, housing, justice, safety and security, social action, sports and recreation, trade and industry, and welfare. In many countries, these sectors have both public and private (i.e. for-profit) components, as well as civil society and non-governmental organizations. Successful examples of intersectoral approaches in Colombia and South Africa are discussed. Chapter III, "Violence and the current development agenda: what is missing?", points out that, despite increased understanding of violence as a barrier to development and growing knowledge about how to tackle it, violence prevention suffers from a combination of institutional fragmentation, weak national planning, and low political status. It also has a low priority (outside of peacekeeping and conflict resolution) within the international development agenda, including the national agencies responsible for official development assistance (ODA). Content analysis of ODA agency web sites and documents from 22 countries shows that ODA agencies tend to give the highest prominence to collective violence, followed by violence against women (particularly in the context of war), violence against children and, much less prominently, youth violence. Perhaps the most arresting feature of this analysis is what the agencies do not address, compared to the actual impact of various forms of violence. Whereas suicide accounts for 54% of all deaths directly due to violence, homicide for 35%, and collective violence 11%, ODA agency web sites and documents accord the greatest prominence to collective violence, limited prominence to homicide, and almost none to suicide. Least prominent is abuse of elders – a serious gap given that, globally, an estimated one in 20 elderly people experience abuse. Another clear gap is visible along gender lines: although males are victims of nearly 80% of all homicides, 60% of suicides, and 80% of violence-related injuries, limited attention is paid to preventing male suicide or male-to-male interpersonal violence. Intersectoral approaches receive little attention, and programming tends to concentrate on one sector at a time. Finally, there is little reference to evidence-based approaches, support for data collection or research into violence. Chapter IV, "Strengthened agenda: strategies that work", suggests that while much is right with the current agenda of ODA agencies, significant potential benefits are being missed and important gaps need to be filled. The benefits can be realized and the gaps filled by re-focusing or expanding current priorities, by adding new funding to neglected violence prevention areas, and by efforts to expand the evidence base. Based on the analysis in the preceding chapter, a strengthened agenda would: Expand programming to include types of violence and groups at high risk of victimization or perpetration that are currently inadequately addressed in programming. Among other issues, a strengthened agenda would increase attention to interpersonal violence among youth and young adult males, self-directed violence, and violence against elderly people. Utilize sectoral entry points that are not currently supported. For example, it seems likely that municipal governments, antenatal health clinics, schools, faith-based organizations, trade unions, business associations, and many other entry points could be brought into prevention efforts, depending on the forms of violence to be tackled and the factors contributing to them. Development agencies have experience of working with or through such organizations or services, and should be able to assess which of them – in any given location – would have comparative advantages to offer. Increase support for data collection and for research on violence prevention, in particular evaluation research to provide for scaling-up of proven practices. More evidence makes for better programming and more powerful advocacy. The strengthened agenda would encourage collaboration in implementing and evaluating pilot interventions in developing countries – ideally as part of a coordinated, well-funded initiative – as a way of building support for evidence-based approaches at national level. Support efforts that take into account commonalities in risk factors and interventions that simultaneously address different types of violence. Different types of violence share common risk factors, and often occur together; one may cause the other, and they have common consequences. A strengthened agenda would, first, prioritize the following 10 scientifically credible prevention strategies that address common underlying risk factors and so have the potential to simultaneously decrease different forms of violence: 1. Increase safe, stable, and nurturing relationships between children and their parents and caregivers 2. Reduce availability and misuse of alcohol 3. Reduce access to lethal means 4. Improve life skills and enhance opportunities for children and youth 5. Promote gender equality and empower women 6. Change cultural norms that support violence 7. Improve criminal justice systems 8. Improve social welfare systems 9. Reduce social distance between conflicting groups 10. Reduce economic inequality and concentrated poverty. Second, it would prioritize the following four strategies for reducing the consequences of violence: 1. Engage the health sector in violence prevention 2. Provide mental health and social services for victims of violence 3. Improve emergency response to injuries from violence 4. Reduce recidivism among perpetrators. Chapter V, "Strengthened agenda: making it happen", provides guidance on the institutional foundations necessary to implement violence prevention at national level, and suggests ways to integrate evidence-based violence prevention within international development priorities. In conclusion, a strengthened ODA violence prevention agenda would do much to reduce violence in countries around the world. This would in turn lead to further investments in violence prevention as part of ODA, and the gains for health, security, and growth would justify still further investments. Experience, in both industrialized and developing countries, shows that there are real benefits to be gained from crosscutting, inter-sectoral approaches that target different factors and sub-populations in a coordinated way, using evidence-based interventions.

Details: Geneva: WHO, Violence Prevention Alliance Secretariat, 2008. 60p.

Source: Internet Resource: Accessed October 21, 2016 at: http://apps.who.int/iris/bitstream/10665/43876/1/9789241596589_eng.pdf

Year: 2008

Country: International

Keywords: Evidence-Based Programs

Shelf Number: 111685


Author: Hayes, Ceri

Title: Tackling Gender-Based Violence with Technology: Case Studies of Mobile and Internet Technology Interventions in Developing Contexts

Summary: STATT, a Hong-Kong-based network of practitioners working on global development and security issues, has been running Afghanistan's first toll-free family support hotline since January 2013, with support from the Government of Canada. One of the main objectives of this project is to provide support for victims and survivors of gender-based violence. Gender-based and violence against women are often used interchangeably, because most violence is perpetrated by men against women. For the purposes of this paper, we use gender-based violence (GBV). While the majority of organisations featured in this report are primarily focused on tackling violence against women, although some have also provided support and advice to a minority of male survivors of violence. A growing body of literature supports STATT's experience that technology-based solutions can have a positive impact in addressing GBV, but also points to a number of challenges associated with the use of such interventions. The organisation commissioned this report to contribute to the available literature and deepen understanding of how organisations working in conflict-affected and fragile contexts are using mobile and internet technology to prevent or respond to gender-based violence. Specifically, STATT wished to explore, through the collection and analysis of a series of case studies, key lessons learned around the: s%FFECTIVENESSANDIMPACTOFTHESENEWTECHNOLOGIESINTHEPREVENTIONANDRESPONSETO gender-based violence; s#OSTS lNANCIALBACKINGFOR SUSTAINABILITYANDSCALABILITYOFSUCHPROJECTS s2ELATIONSHIPBETWEENTHETECHNOLOGYAND@TRADITIONALWORKTOTACKLEGENDER BASED violence; s#HALLENGESANDADVANTAGESASSOCIATEDWITHUSINGTHESETECHNOLOGIESININTERVENTIONSTO address gender-based violence. The resulting report is organised in five sections: introduction, methodology, overview, case studies, and main findings and recommendations. The overview sets out the main findings from an initial literature review; the section on case studies outlines the approaches and learning from seven technology-based solutions developed and implemented in very different contexts in Africa, Asia and Latin America; and the final section analyses and reflects on the implications of the learning from the literature review and case studies for further work in this area. It is hoped that policymakers, practitioners and advocates of high quality and responsive GBV initiatives will find the results presented in this report relevant to their work.

Details: s.l.: STATT, 2016. 34p[.

Source: Internet Resource: Accessed October 24, 2016 at: http://hirondelleusa.org/wp-content/uploads/2014/09/STATT-Tackling-GBV-with-Technology.pdf

Year: 2016

Country: International

Keywords: Gender-Based Violence

Shelf Number: 140824


Author: de Boer, John

Title: The Crime-Conflict "Nexus": State of the Evidence

Summary: This study sets out to review the state of evidence on the connection between organized crime and violent conflict. Its purpose is to stimulate dialogue among policy actors, researchers and funders of research about the current state of knowledge, the policy implications of existing evidence, and key gaps in our understanding. Drawing from larger studies, it points to the most important hypotheses about the nature of the connection between crime and violent conflict (including reference to terrorism) and describes the implications of this "crime-conflict nexus" on conflict dynamics, conflict resolution and peace-building today. The authors recognize that the term "nexus" can conflate issues and cause a lack of clarity. The term, however, has been kept as it also reflects the current state of knowledge on the relationship between crime and conflict which remains rather confused and compartmentalized. The purpose of this study, therefore, is to interrogate the nature of this "nexus" and provide a more nuanced understanding of its meaning and implications. The paper is organized into three sections. The first section highlights the evolving nature of the various concepts, definitions and theories that have sought to describe and analyze the crime-conflict "nexus" over the past several decades. In doing so, this section documents how the state of knowledge has expanded, leading to a more nuanced and complex understanding over the years. At the same time, this section also illustrates the compartmentalized nature of existing knowledge that is often confined to particular academic disciplines and limited by narrowly defined concepts. The second section focuses on the implications of existing evidence on the strategies, motives and methods of conflict parties in contexts of violent conflict and post-conflict peace-building. This includes highlighting important hypotheses related to how the crime-conflict "nexus" influences conflict onset, intensity and duration. This section also examines the significance of the "nexus" for mediation efforts between conflict parties and countering terrorism. Finally, this section introduces what we know about the impact of organized crime in post-conflict contexts with an eye to assessing the implications for peace-building and peacekeeping. The third and final section concludes the study by suggesting a number of important knowledge gaps that should be filled as a priority from a policy perspective. There are obviously more gaps than this paper can cover, the ones selected here are those where the lack of knowledge may result in fundamental misjudgments or obstacles to effective policy.

Details: Tokyo: United Nations University, Centre for Policy Research, 2015. 26p.

Source: Internet Resource: Occasional Paper 5: Accessed October 24 2016 at: http://collections.unu.edu/eserv/UNU:3134/unu_cpr_crime_conflict_nexus.pdf

Year: 2015

Country: International

Keywords: Conflict Violence

Shelf Number: 140827


Author: Anderholt, Charlotte

Title: Female Participation in Formed Police Units: A Report on the Integration of Women in Formed Police Units of Peacekeeping Operations

Summary: This report examines the obstacles that continue to hamper the integration of women into Formed Police Units (FPUs) of Peacekeeping Operations in accordance with the principles of United Nations (UN) Resolution 1325. To address this topic the study (1) briefly establishes the emerging importance of police units to peacekeeping operations, (2) outlines the key principles of UN Resolution 1325, (3) discusses the need for diversity, especially gender diversity, in police units, (4) discusses the core obstacles to integrating women into police units, (5) offers accounts of the major UN peacekeeping missions that utilized Formed Police Units (FPUs) or their predecessor organizations, and (6) concludes with summary recommendations for improving the integration of women into FPUs. It is important to clarify that while there is a literature on women in peacekeeping, there are no systematic studies that address the question of women in FPUs. Because of this lack of data, the report compares the experience of gender integration in municipal police forces in the United States with accounts of FPUs or related UN police units and their experience with gender integration. In addition, the narrow question of women in FPUs cannot be separated from the larger question of the unique vulnerability of women and girls in conflict environments and the equally unique role women and girls play in peacekeeping and post-conflict reconstruction of civil society. These themes will be discussed as warranted throughout the study. Finally, there is only now a clearly emerging sense of the definition and purpose of an FPU. The first FPUs were deployed to Kosovo under the UNMIK mission, and to East Timor (UNTAET) in 1999. FPUs are designed to be rapidly deployable, more heavily armed than regular UN police units (UNPOL, formerly CIVPOL), and more capable of independent operations. In short, FPUs are intended to respond to a wide range of contingencies spanning the spectrum of peace operations, but especially to be able to operate in high-risk environments. What differentiates an FPU from a standard UNPOL unit is that police in FPUs are recruited from a single-member state, and have trained together to operate as a coherent unit. Whereas UNPOL members are recruited individually and often deployed to UN missions as single members, by mandate FPUs cannot be deployed except as a full 120-140 person unit or in the smallest functional subset as a team of 10-12 officers. As a consequence of the increased operational effectiveness achieved through the particular recruitment and training model of FPUs they have generally been used for three high-risk mission-types. First, FPUs are considered a specialty force for managing public order. Examples of specific public order missions include riot control, crowd management at public assemblies, and the assurance of general public safety during potentially tense events like elections. Indeed, the core of the FPU mission can be thought of as assisting, “citizens to exercise their fundamental rights without any disturbance or unjustified hindrance and to prevent assemblies from threatening or actually harming public safety.†The second key FPU mission is the protection of UN personnel. This has included evacuations of personnel in extreme situations (post-election Cote d’Ivoire) and convoy protection (Congo). In addition, VIP and general facilities protection (prisons, warehouses, IDP camps, UN compounds) fall under this mission-rubric.3 Finally, FPUs are designed to assist local and UNPOL police with particularly high-risk operations. Such missions include high-visibility patrols (with local police, UNPOL or military peacekeepers) as in Congo, Haiti and Darfur; high-risk arrests; anti-organized crime work or SWAT and hostage negotiation operations. It is also important to note that FPUs distinguish themselves not just by this mission-set, but because they are able to perform the above while maintaining a strict code of respect for human rights law.

Details: Carlisle, PA: Peacekeeping & Stability Operations Institute The United States Army War College, 2012. 70p.

Source: PKSOI Papers: Internet Resource: Accessed October 26, 2016 at: www.dtic.mil

Year: 2012

Country: International

Keywords: Female Police

Shelf Number: 146011


Author: Boonpala, Panudda

Title: Unbearable to the Human Heart: Child Trafficking and Action to Eliminate It.

Summary: The trafficking of human beings is unacceptable under any circumstances, but the trafficking of vulnerable children and young people is a violation of their rights to protection from exploitation, to play, to an education and to health, and to family life. The trafficking of children is not new; it has existed for many years and continues to grow across all continents and all cultures. Today, however, there is a new, strong will to take action to combat trafficking and to bring it to a speedy end. Child trafficking is emerging as a global issue; nearly all countries are affected by this criminal violation of children’s rights. For some countries, the trafficking of children occurs within national boundaries and remains an essentially national issue. For many, it crosses borders and regions. The victims, mostly separated from their families and communities, end up in prostitution and other exploitative forms of work, such as agriculture, mining, manufacturing, fishing, begging and domestic service. They are vulnerable to abuse and exploitation and traumatized by this accumulation of denied rights. As this report shows, child trafficking is a highly complex phenomenon with no simple answers. While more is known about the problem today, there remains a knowledge gap both in the analysis of the problem and in finding effective solutions. The denial of fundamental principles and rights at work has been a constant concern for the International Labour Organization. The organization has been promoting considerations of social justice and social progress with relentless determination. The ILO has also stood resolutely against the dangerous proposition that human labour should be valued merely as a commodity. The organization forcefully acts against forced labour, of adults and children alike. The ILO Convention on the Worst of Forms of Child Labour (182) adopted in 1999 identifies the trafficking of children as a practice similar to slavery. The Convention calls for countries to take immediate action to secure the prohibition and elimination of all worst forms of child labour. By the end of March 2002, 117 member countries had ratified Convention No. 182. The ILO’s International Programme on the Elimination of Child Labour (IPEC) implements technical cooperation programmes to support participating countries in combating child trafficking. From 1993 to 1995, such programmes operated in only a few Asian countries. Following the first World Congress against Commercial Sexual Exploitation of Children in Stockholm in 1996, IPEC expanded its activities to combat trafficking in children worldwide, covering some 30 countries in Asia, Africa and Latin America, with scope for broader participation — including in other regions — in the future. Three IPEC participating countries — the United Republic of Tanzania, Nepal and El Salvador – have adopted time-bound programmes to end the worst forms of child labour, including child trafficking and children in prostitution. This was made possible thanks to donor contributions from Germany, Denmark, Japan, Spain, the United Kingdom and the United States. Global experience in combating child trafficking is relatively young. Much remains to be understood about the problem and possible solutions. In this context, the sharing of information, experience and knowledge is crucial. It is for this purpose that the present report has been prepared. It aims to bring together the major elements of what is known about the problem of child trafficking around the world. It also presents some positive experiences in combating this highly complex problem, so that we all can learn and benefit from these experiences in planning future action. The problem is huge in scope, multi-faceted and sensitive, both culturally and politically. Tackling this kind of complex issue is possible — as demonstrated in this report — when countries are committed to addressing the problem as a matter of urgency and when the international community is willing to join them and support them in: • strengthening multi-sectoral alliances to combat child trafficking within countries and across borders, • undertaking time-bound measures, programmes and plans — that is, setting specific goals and deadlines — to combat child trafficking and other worst forms of child labour; and linking this with the national development effort, particularly a poverty reduction strategy and the provision of quality education and skills training; • broadening collaboration at bilateral, regional and international levels, including in fundamental areas such as data collection, planning, evaluation, capacity building and information sharing; and • mobilizing international support for action to combat trafficking in children and maintaining children’s rights on the international agenda. Based on the experience accumulated by many agencies and actors, we should be confident that good results can be achieved towards ending trafficking. It is urgent to act: the lives and future of millions of children depend on our individual and collective resolve.

Details: Geneva, SWIT: International Labour Office, International Programme on the Elimination of Child labour (IPEC), 2002. 97p.

Source: Internet Resource: Accessed October 31, 2016 at: http://www.unicef.org/violencestudy/pdf/2002_traff_unbearable_en.pdf

Year: 2002

Country: International

Keywords: Child Sexual Exploitation

Shelf Number: 135097


Author: Vigurs, Carol

Title: Police Initial Responses to Domestic Abuse: A systematic review

Summary: Domestic abuse is a serious and widespread problem within the UK. The Crime Survey for England and Wales (CSEW) estimates that around two million adults experienced some form of domestic abuse in the year 2014/15, with women (27%) more likely than men (13%) to have been victimised since age 16 (ONS, 2016). While many incidents of domestic abuse will go unreported to the police, for victims seeking criminal justice intervention the police are usually the first agency of contact. In 2014/15, the police service in England and Wales received, on average, over 100 domestic abuse related calls an hour and domestic abuse related crime represented 10 per cent of all recorded crime (HMIC, 2015). This demand on the police service is, initially at least, likely to increase in coming years following the introduction in December 2015 of a new offence of ‘coercive and controlling behaviour’. For the first time, abusers who continually subject victims to behaviour designed to intimidate and control them can face up to five years imprisonment. While previously there was no specific criminal offence of domestic abuse, this new offence recognises that “a repeated pattern of abuse can be more injurious and harmful than a single incident of violence†(Home Office, 2015: 3) and is intended to provide better protection for victims and hold more perpetrators to account for their behaviour. It is vital therefore, that officers who are first on scene at domestic related incidents know what actions open to them are most likely to be effective. The police have several choices following a call for service in relation to domestic abuse. First, there is the option of attending the incident or not. If both parties are present at the scene, the responding officer can then choose to separate the parties by requesting one party leaves voluntarily. If there are grounds to do so, the officer also has the option of making an arrest. Other actions a first response officer could take include offering advice and making referrals to partner agencies. This systematic review seeks to assess the evidence of effectiveness of different first response strategies to domestic violence evaluated in the international literature. The review uses systematic review methods to determine the effectiveness of different interventions as measured by criminal justice related outcomes (for example: official records of rearrests; reconvictions) or victim related outcomes (satisfaction with service; reported re-abuse).

Details: UK: College of Policing, 2016. 80p.

Source: Internet Resource: Accessed November 2, 2016 at: http://whatworks.college.police.uk/Research/Documents/Police_initial_responses_domestic_abuse.pdf

Year: 2016

Country: International

Keywords: Domestic Violence

Shelf Number: 140997


Author: Fisher, Herrick

Title: Opportunities Provision for Preventing Youth Gang Involvement for Children and Young People (7-16)

Summary: Research has shown that youth who join gangs are more likely to be involved in delinquency and crime, particularly serious and violent offences, compared to non-gang youth and non-gang delinquent youth. Opportunities provision is a commonly used gang prevention strategy based on anomie and strain theories and the belief that giving youth educational and employment opportunities, such as tutoring or job training and placement, will reduce gang involvement. This systematic review found no randomised controlled trials or quasi-randomised controlled trials of the effectiveness of opportunities provision for gang prevention. There is an urgent need for rigorous primary evaluations of gang prevention and intervention programmes to justify current programme funding and guide future interventions.

Details: Oslo: Campbell Collaboration, 2008. 35p.

Source: Internet Resource: Campbell Systematic Reviews 2008:8: Accessed November 3, 2016 at: https://www.campbellcollaboration.org/library/opportunities-provision-for-preventing-youth-gang-involvement-for-children-and-young-people-7-16-a-systematic-review.html

Year: 2008

Country: International

Keywords: Gang Prevention

Shelf Number: 131724


Author: World Health Organization

Title: Guns, knives and pesticides: reducing access to lethal means

Summary: Evidence suggests that limiting access to firearms, knives and pesticides saves lives, prevents injuries and reduces costs to society. Homicide and suicide claim 600 000 and 844 000 human lives respectively, each year worldwide. This comes at a terrible cost to society - psychological and financial - and inhibits progress towards all eight of the United Nations' Millennium Development Goals. This carnage could be significantly reduced, however, by limiting access to three of the most lethal means of violence: firearms, sharp objects (such as knives) and pesticides. Firearms: Jurisdictions with restrictive firearms legislation and lower firearms ownership tend to have lower levels of gun violence. Measures include bans, licensing schemes, minimum ages for buyers, background checks and safe storage requirements. Such measures have been successfully implemented in countries such as Austria and Brazil and in a number of states in the United States of America. Introducing national legislation can be complicated, but much can be done at local level. Stiffer enforcement, amnesties and improved security for state supplies of firearms are some of the other promising approaches. Multifaceted strategies are also needed to reduce demand for guns - diverting vulnerable youth from gang membership, for instance. Sharp objects: As well as control measures, governments need broad strategies to reduce socioeconomic factors underlying the violent use of these weapons. Less evidence is available on the impacts of efforts to reduce violence associated with sharp objects than for firearms. Until now concerned authorities have focused on similar measures to those used for the control of guns. In the United Kingdom these have included legislative reforms (bans on flick knives, minimum ages for purchasers etc.), stiffer enforcement ("stop-and-search" initiatives) and amnesties; however, their impact is not yet clear. Pesticides: Safer storage, bans and replacement by less toxic pesticides could prevent many of the estimated 370 000 suicides caused by ingestion of pesticides every year. Members of agricultural communities in low- and middle-income countries are heavily over-represented in the suicide death toll related to pesticides. Controlling access to pesticides is not only critical in reducing self-directed violence, it is key to preventing unintentional poisoning and terrorism. International conventions attempt to manage hazardous substances; however, many highly toxic pesticides are still widely used. Studies indicate that bans must be accompanied by evaluations of agricultural needs and replacement with low-risk alternatives for pest control. Further research is needed, particularly in low- and middle-income countries. The development of robust injury-data collection systems and further studies are required to deepen our understanding of the impacts of measures to reduce access to lethal means, especially in low- and middle-income countries.

Details: Geneva: WHO, 2009. 20p.

Source: Internet Resource: Series of briefings on violence prevention: Accessed November 3, 2016 at: http://apps.who.int/iris/bitstream/10665/44060/1/9789241597739_eng.pdf

Year: 2009

Country: International

Keywords: Gun-Related Violence

Shelf Number: 145399


Author: McAuliffe, M.L., ed.

Title: Migrant Smuggling Data and Research: A Global Review of the Emerging Evidence Base

Summary: Migrant Smuggling Data and Research: A global review of the emerging evidence base presents a unique review of what is being collected and what can be done to further build the evidence base on migrant smuggling globally. The report is the result of a collaboration between the International Organization for Migration and researchers from a range of backgrounds and academic disciplines, and supported by the Government of Turkey. The report shows that important research has been undertaken on the transnational crime aspects of migrant smuggling, including on routes, smuggling organization (such as criminal networking and facilitation), smuggler profiles and fees/payment. Likewise, there is an emerging academic literature on migrant smuggling, particularly the economic and social processes involved in smuggling, which has largely been based on small-scale qualitative research, mostly undertaken by early career researchers. Contributions from private research companies, as well as investigative journalists, have provided useful insights in some regions, helping to shed light on smuggling practices. There remains, however, sizeable gaps in migration policy research and data, particularly in relation to migration patterns and processes linked to migrant smuggling, including its impact on migrants (particularly vulnerability, abuse and exploitation), as well as its impact on irregular migration flows (such as increasing scale, diversity and changes in geography). Addressing these systemic and regional gaps in data and research would help deepen understanding of the smuggling phenomenon, and provide further insights into how responses can be formulated that better protect migrants while enhancing States’ abilities to manage orderly migration.

Details: Geneva, SWIT: International Organization for Migration, 2016. 340p.

Source: Internet Resource: Accessed November 3, 2016 at: https://publications.iom.int/books/migrant-smuggling-data-and-research-global-review-emerging-evidence-base

Year: 2016

Country: International

Keywords: Human Smuggling

Shelf Number: 145000


Author: United Nations High Commissioner for Human Rights

Title: Death Penalty and the Victims

Summary: This book includes perspectives from a broad range of victims. While some of them are family members of the crime victims, others are victims of the human rights violations in application of the death penalty, of its brutality and traumatic effects. Victims’ perspectives, taken holistically, make a compelling case against the death penalty. When it comes to the death penalty, almost everyone loses. Victims' family members mostly end up frustrated. If they are against the death penalty and the death penalty is imposed on the perpetrator, the cycle of violence is continuing instead of being broken. If they want revenge, just a few can get it, and often, only after many years. Meanwhile, the expectation of the execution prevents closure and moving forward.The convicted persons may be considered victims if the criminal response of the justice system violates their human rights, through wrongful convictions, unequal and discriminatory application of justice, lack of a due process, imposing the death penalty for crimes that do not meet the “most serious crimes†threshold or to the categories of perpetrators that should be protected from the death penalty (minors, persons with mental or intellectual disabilities, pregnant women). Long delays, conditions on a death row and the application of the death penalty may amount to torture, or at least inhuman and degrading treatment. Third parties are the "hidden victims" of the death penalty. When compared to other forms of punishment, the death penalty disproportionality affects mental health and well-being of family members of the convicted person (especially children and primary care-takers), as well as third persons included in criminal proceedings or executions (such as prosecutors, judges, lawyer and executioners). Finally, the state's right to execute violates the right to life and negatively reflects on human rights of its citizens in general.The perspectives of the victims on the death penalty as reflected in this book are likely to provoke tough discussions and polemics. This may be a welcome challenge. There is a strong and empirically proven correlation between the evidence-based discussion on the death penalty and moving away from it.

Details: New York: UN, 2016. 335p.

Source: Internet Resource: Accessed November 3, 2016 at: http://www.ohchr.org/EN/newyork/Documents/Death-Penalty-and-the-Victims-WEB.pdf

Year: 2016

Country: International

Keywords: Capital Punishment

Shelf Number: 144999


Author: United Nations High Commissioner for Human Rights

Title: Moving Away from the Death Penalty: Arguments, Trends and Perspectives

Summary: Today, more than four out of five countries have either abolished the death penalty or do not practice it. Globally, there is a firm trend towards abolition, with progress in all regions of the world. Member States representing a variety of legal systems, traditions, cultures and religious backgrounds have taken a position in favour of abolition of the death penalty. Some States that opposed the abolition of the death penalty in the recent past have moved to abolish it; others have imposed a moratorium on its use. The application of the death penalty appears to be confined to an ever-narrowing minority of countries. Those remaining States cite a number of reasons for retaining the death penalty, including what they see as its deterrent effect; that it is consistent with public opinion; that it is equally applied against all perpetrators; and that there are sufficient judicial safeguards to ensure defendants are not wrongfully convicted. Over the past two years, the Office of the High Commissioner for Human Rights has convened a series of important panel discussions on the death penalty, seeking to address these issues. The events drew on the experiences of government officials, academic experts and civil society from various regions which, in recent years, have made progress towards abolition or the imposition of a moratorium. They covered key aspects of the issue, including data on wrongful convictions and the disproportionate targeting of marginalized groups of people. This publication brings together the contributions of the panel members as well as other experts on this subject. Taken as a whole, they make a compelling case for moving away from the death penalty

Details: New York: UN, 2014. 109p.

Source: Internet Resource: Accessed November 3, 2016 at: http://www.ohchr.org/Lists/MeetingsNY/Attachments/52/Moving-Away-from-the-Death-Penalty.pdf

Year: 2014

Country: International

Keywords: Capital Punishment

Shelf Number: 144996


Author: Matfess, Hilary, ed.

Title: Beyond Convergence: World Without Order

Summary: The world order built upon the Peace of Westphalia is faltering. State fragility or failure are endemic, with no fewer than one-third of the states in the United Nations earning a "high warning" -- or worse -- in the Fragile States Index, and an equal number suffering a decline in sustainability over the past decade. State weakness invites a range of illicit actors, including international terrorists, globally networked insurgents, and transnational criminal organizations (TCOs). The presence and operations of these entities keep states weak and incapable of effective governance, and limit the possibility of fruitful partnerships with the United States and its allies. Illicit organizations and their networks fuel corruption, eroding state legitimacy among the governed, and sowing doubt that the state is a genuine guardian of the public interest. These networks can penetrate the state, leading to state capture, and even criminal sovereignty. A growing number of weak and corrupt states is creating gaping holes in the global rule-based system of states that we depend on for our security and prosperity. Indeed, the chapters of this book suggest the emergence of a highly adaptive and parasitic alternative ecosystem, based on criminal commerce and extreme violence, with little regard for what we commonly conceive of as the public interest or the public good. The last 10 years have seen unprecedented growth in interactivity between and among a wide range of illicit networks, as well as the emergence of hybrid organizations that use methods characteristic of both terrorist and criminal groups. In a convergence of interests, terrorist organizations collaborate with cartels, and trafficking organizations collude with insurgents. International terrorist organizations, such as al-Qaeda and Hezbollah, engage energetically in transnational crime to raise funds for their operations. Prominent criminal organizations like Los Zetas in Mexico and D-Company in Pakistan have adopted the symbolic violence of terrorists—the propaganda of the deed—to secure their “turf.†And networked insurgents, such as the Islamic State of Iraq and the Levant (ISIL), the Revolutionary Armed Forces of Colombia (FARC), and the Liberation Tigers of Tamil Eelam (LTTE), have adopted the techniques of both crime and terror. An Emerging Criminal Ecosystem The unimpeded trajectory of these trends -- convergence, hybridization, and state capture -- poses substantial risks to the national security interests of the United States, and threatens international security. Illicit networked organizations are challenging the fundamental principles of sovereignty that undergird the international system. Fragile and failing states are both prey to such organizations, which feed on them like parasites, and Petri dishes for them, incapable of supporting effective security partnerships. The Westphalian, rule-based system of sovereign polities itself is at risk of fraying, as fewer and fewer capable states survive to meet these challenges, and populations around the world lose faith in the Westphalian paradigm. The emergence of an alternative ecosystem of crime and violence threatens us all and much of the progress we have seen in recent centuries. This dark underworld weakens national sovereignty and erodes international partnerships. We should not take for granted the long-term durability of the Westphalian system. It was preceded by millennia of much less benign forms of governance, and alternative futures are imaginable. This book describes "convergence" (the interactivity and hybridization of diverse illicit networks), the emergence of new networks and new domains or "battlespaces," and the threat illicit networks pose to national and international security. It examines dystopian visions of a world in which these trajectories go indefinitely unimpeded, and concludes by discussing possible countermeasures to be explored. While some recognize the growing threat to the global system of governance that these new phenomena impose, others are skeptical. According to the conventional wisdom, TCOs and international terrorist organizations are unlikely candidates for partnership. Such analysis suggests that criminals are motivated by the pursuit of wealth in defiance of law, morality, or ideology. They typically prefer to remain undetected, and have little interest in the violence committed by, or risks taken by, international terrorists. Already pursued by law enforcement, criminals are not keen to receive the attention of the Central Intelligence Agency or SEAL Team Six. International terrorists and insurgents, on the other hand, are politically motivated; driven by ideological, religious, or nationalistic motives; and repelled by the vulgar materialism and greed of criminals. They have no desire to get on the radar of the Drug Enforcement Administration (DEA), or other national or international law enforcement agencies. This logic is understandable, and may have prevailed in previous times, but the evidence of extensive interconnectivity -- if not explicit partnership -- between TCOs, international terrorists, and globally networked insurgents is compelling. Recent research undertaken by the Combating Terrorism Center at West Point reveals that, "criminals and terrorists are largely subsumed (98 percent) in a single network as opposed to operating in numerous smaller networks."4 In its Performance Budget Congressional Submission for FY 2014, the DEA stated that by "the end of the first quarter of FY 2013, 25 of the 67 organizations on the Attorney Generals Consolidated Priority Organization Target (CPOT) List are associated with terrorist organizations." According to a more recent DEA statement, roughly half of the Department of State's 59 officially designated foreign terrorist organizations have been linked to the global drug trade. The six degrees of separation that may have once divided people is a relic of the past—today, international terrorists, insurgents, and criminals are merely a click away from each other. It might be argued that terrorism, insurgency, and organized crime have existed since time immemorial, and that their modern iterations represent nothing new. Such an argument naively discounts modern enablers such as information and communication technology, transportation advances, and the unprecedented volumes of money generated in illicit markets. These are game changers. They permit illicit actors to avail themselves of lethal technology, military-grade weaponry, real-time information, and professional services of the highest quality, including legal, accounting, technological, security, and paramilitary services. Cartels and gangs, as well as terrorists and some insurgents, can now out-man, outspend, and outgun the governments of the countries where they reside. They can communicate across the globe in real time, using widely available and inexpensive technology. The November 2008 Mumbai terrorist attackers used satellite phones, internet communications, and global positioning systems, under the direction of Pakistan-based handlers to carry out an atrocious binge of murder and terror. The string of ISIL attacks across Europe in 2015 and 2016 further illustrates the global consequences of this technological acceleration. International travel has never been easier or cheaper than it is today, and would-be terrorists, traffickers, launderers, and even assassins can fly nearly undetected from continent to continent, in the sea of traveling humanity. Though it is clear that this connectivity is widespread and threatens global security, the details of the agreements or arrangements between terrorist, insurgent, and transnational criminal organizations remain murky. A partial exception to this is in instances where both organizations wish for new relationships to be known, such as the 1998 merger of Ayman al-Zawahiri's Egyptian Islamic Jihad organization with Osama bin Laden’s al-Qaeda.8 Other relationships, such as between the FARC and al-Qaeda in the Islamic Maghreb (AQIM), are opaque as neither organization has an interest in revealing the relationship. It is unclear in the majority of cases what kinds of partnerships these are, and we are often unable to discern whether such instances of cooperation are one-time affairs or longer-term arrangements. This lack of information handicaps our response and threatens global security. The purposeful opacity of illicit organizations presents a vexing challenge to mapping and understanding these actors. Operating by intention outside the vision of regulators or researchers, their activities and revenues are hidden. So how do we determine the magnitude of their operations, or the harm they inflict? How do we know the value of their transactions? We extrapolate from extremely inexact evidence, such as seizures, arrests, convictions, and the associated testimony of witnesses, often themselves members of such organizations and motivated to dissemble. Analysts still rely on the nearly 20-year-old "International Monetary Fund (IMF) consensus range," of "$1 to $3 trillion" or "two to five percent" of global product. In 1998, Michel Camdessus, then managing director of the IMF, provided that estimate of the amount of money laundered annually across the globe. Given what we know about global trafficking in drugs, persons, weapons, counterfeits, and other contraband it seems unlikely that the value of illicit trade has decreased over the past 20 years. Even at a “mere†two to five percent of global product, Camdessus described the magnitude of the problem as “almost beyond imagination….â€9 Less difficult, but still challenging and far more visceral to calculate, is the cost of global terrorism in human lives. At publication, the most recent estimates suggest that 2014 saw an increase of 35 percent in the number of terrorist attacks globally, with total fatalities rising to nearly 33,000 by some counts; 2015 is likely to mark another increase, as ISIL continues its brutal global campaign, and Boko Haram terrorizes the Lake Chad Basin.10 This does not take into account nonfatal injuries, the destruction of families and communities, and the economic costs. These cannot be monetized, but few would deny that the opportunity cost of the "global war on terror" (GWOT) has been huge. A 2008 estimate by Nobel Laureate Joseph Stiglitz and Linda J. Bilmes put the long-term costs of the Iraq War at $3 trillion. The Cost of War Project puts the total economic cost of America's post-9/11 campaigns at $4.4 trillion through FY 2014.12 These two sets of costs -- the global illicit market plus the costs associated with the GWOT -- comprise a staggering portion of global product, and give a plausible indication of the magnitude of the emerging alternative ecosystem. Consider the drag on global productivity and development if so much of human activity is dedicated to transnational crime and terrorism. Adding to this, the cost of networked insurgencies in countries such as Afghanistan, Colombia, Sri Lanka, and South Sudan, suggests that an unconscionable proportion of global resources is being expended by efforts to undermine the well-being of citizens worldwide. Imagine what might be accomplished for all mankind if those resources were available for more constructive investment. Net Systemic Costs Not only do these networks divert economic resources globally, but they also reduce the capacity of states to govern, rendering them incapable of effectively governing their territory or borders, let alone exercising a monopoly of the legitimate use of force, or providing other vital public services. The net systemic harm is imposed at four levels: the inability of states to govern their populations and territories, which creates seedbeds for international terrorism, networked insurgency, and transnational crime, causing immense human suffering; the regional spillover effect from state fragility and instability, that sometimes penetrates key U.S. allies and partners; the growing feral regions that serve as launch pads for attacks against U.S. national security interests worldwide, as well as potentially direct attacks on the homeland, as occurred on September 11, 2001; and the cost associated with the decline of the global, rule-based system and the shrinking Westphalian domain. A cursory examination of a few key states shows the toll illicit networks take on our national security interests. Though Mexico's death rate has subsided somewhat over the past two years, the wars between the narcotics cartels and state authorities, and between the cartels themselves, are thought to have caused as many as 130,000 deaths between 2007 and 2013, or over 20,000 per year. Mexican cartels today work hand-in-hand with the criminal gangs of Central America's Northern Triangle -- comprised of El Salvador, Honduras, and Guatemala -- resulting in some of the highest homicide rates in the world. El Salvador's official forensic unit estimated the homicide rate in 2014 at nearly 70 per 100,000. Despite their collaborative intentions, these countries are under such duress that their security partnership contributions cannot yet inspire confidence. Indeed, in 2014, nearly 70,000 unaccompanied children from Central America and Mexico made their way through Mexico to the United States to escape the tormented lands of their births. Another key security partner, Nigeria is the most populous African state with the largest economy, and a major oil producer. Nigeria could and should play a stabilizing role throughout the continent. In fact, Nigerian forces were critical in staunching the civil wars that hemorrhaged West Africa in the 1990s through the 2000s. Yet today, Nigeria is hobbled by the burgeoning Boko Haram insurgency in the north, and resurgent gang insurgency in the Niger Delta. Moreover, the Boko Haram scourge has bled into the neighboring countries of the Lake Chad Basin. The once-hopeful suppositions that Iraq and Afghanistan could act as U.S. security partners now seem to be wishful thinking. Despite the investment of hundreds of billions of dollars to bolster the capacity of these two potential partners, effective collaboration seems extremely unlikely for the foreseeable future. Afghanistan today struggles to survive the attacks of al-Qaeda, the Taliban and Haqqani networks, and more recently ISIL. Though the Government of Afghanistan welcomes U.S. engagement, its effectiveness as a security partner remains questionable. Similarly, Iraq struggles to survive as an autonomous state, depending on Kurdish and Shia nonstate militias in its fight with ISIL. Afghanistan and Iraq may continue to act as incubators for terrorist groups planning attacks against the United States well into the future. Though the nature or extent of the connections between these terrorist and criminal organizations is not transparent, what is clear is that when they desire to interact, they are able to do so. Joint training, learning, and sharing of experience are certainly likely, if not yet joint operations. While states unwillingly and unwittingly act as safe havens for destabilizing global actors, even more troubling are instances in which there is clear collusion between such groups and elements of sovereign states. For example, Iran's Quds Force, a special forces unit of the Islamic Revolutionary Guards Corps, has been both directly engaged in terrorist acts around the world, and is supportive of other terrorist organizations. Ominously, in 2011, an attempt by the Quds Force to collaborate with the Los Zetas cartel to assassinate the Saudi Arabian ambassador to the United States was intercepted. That this effort was interdicted by the vigilant DEA is extremely fortunate -- at that particular moment in time, with the combustible tension between Iran and Saudi Arabia, and between Sunni and Shia throughout the Islamic world, the consequences of the intended assassination are difficult to imagine. One need only consider the consequences of the assassination of Archduke Ferdinand in Sarajevo just a century ago to put this into perspective. This effort by the Quds Force to conspire with Los Zetas, now fully documented in U.S. case law, demonstrates beyond a reasonable doubt the potential collusion of sovereign states and terrorist organizations with criminal organizations. This type of collusion is not limited to the Middle East. As Douglas Farah has written, Venezuela has utilized the state's diplomatic tools to support criminal and terrorist activity. North Korea has long been known as a hub of illicit activity, allegedly including smuggling, counterfeit trade, production of controlled substances, illegal weapons trafficking, and money laundering. Pyongyang's infamous Bureau 39 is thought to generate between $500 million and $1 billion per year from such illicit activities.

Details: Washington, DC: Center for Complex Operations, Institute for National Strategic Studies, National Defense University, 2016. 402p.

Source: Internet Resource: Accessed November 3, 2016 at: http://cco.ndu.edu/Portals/96/Documents/books/Beyond%20Convergence/BEYOND%20CONVERGENCE%20%20World%20Without%20Order%20.pdf?ver=2016-10-25-125406-170

Year: 2016

Country: International

Keywords: Counterfeit Trade

Shelf Number: 144992


Author: Widmer, Mireille

Title: Monitoring Trends in Violent Deaths

Summary: In the framework of the 2030 Agenda for Sustainable Development, the Small Arms Survey is pleased to announce a new series of reports designed to support global efforts to reach targets under Sustainable Development Goal 16 (SDG16). To promote the sharing of information and encourage collaboration in this context, the Survey is also providing online access to its updated database on violent deaths and corresponding interactive maps. Under SDG16, Target 16.1 commits all states to '[s]ignificantly reduce all forms of violence and related death rates everywhere'. Monitoring Trends in Violent Deaths, the first in a new series of SDG16 reports, establishes a global baseline of violent deaths for Target 16.1, with the aim of helping states to gauge changes in the incidence of violent deaths—a composite indicator comprising data on homicide and direct conflict deaths. Key findings of this report include the following: In 2010–15, an average of 535,000 people died violently every year. This global estimate is higher than the ones for the periods 2004–09 and 2007–12. A growing number of people are dying in conflict: while an annual average of 70,000 deaths were recorded in 2007–12, the figure rose to 90,000 in 2010–15. The armed conflicts in Afghanistan, Iraq, and Syria are responsible for a large proportion of these deaths. The global homicide rate is continuing its decrease, but not enough to offset the increase in conflict deaths in 2010–15. The vast majority (83 per cent) of victims of fatal armed violence lose their lives outside of conflict zones. Direct conflict deaths account for the remaining 17 per cent. The global distribution of violence is becoming increasingly unequal: fewer countries are registering high violent death rates (above 20 per 100,000 population), but their average violent death rates are on the rise. In absolute numbers, more lives were lost to violence in 2015 in large countries that were not experiencing conflict, such as Brazil and India, than in war-torn Syria. The analysis relies on new data from the Small Arms Survey's database on violent deaths. The new data—which includes figures on firearm homicides and female homicide victims—extends through the end of 2015 or the latest available year. The updated database on violent deaths and corresponding interactive maps can be consulted on the Small Arms Survey's website.

Details: Geneva, SWIT: Small Arms Survey, 2016.

Source: Internet Resource: Research Notes, no. 59: Accessed November 7, 2016 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-59.pdf

Year: 2016

Country: International

Keywords: Conflict-Related Violence

Shelf Number: 145311


Author: Widmer, Mireille

Title: Firearms and Violent Deaths

Summary: The 2030 Agenda for Sustainable Development explicitly links firearms, violence, and sustainable development (UNGA, 2015). Sustainable Development Goal (SDG) 16 includes global commitments to significantly reduce "all forms of violence and related death rates" (Target 16.1) as well as illicit arms flows (Target 16.4) by 2030. In addition, the Inter-Agency and Expert Group on SDG Indicators recommends that states provide data on violence-related deaths disaggregated by instrument of violence, among other factors. Measures that target the use, possession, and transfer of firearms - such as dedicated legislation, transfer controls, amnesties, or crackdowns on illicit possession - can help to reduce violent deaths in both conflict and non-conflict settings. Such measures can also assist in curbing non-lethal outcomes, such as the rate of firearm-related injuries, disability, and psychological trauma, on which comprehensive national data is scarce (Alvazzi del Frate and De Martino, 2013). This Research Note analyses trends in firearm-related violent deaths. It presents estimates based on data in the Small Arms Survey's database on violent deaths, which currently covers countries around the world from 2004 to 1 August 2016 and includes both conflict deaths and homicide data sets (Small Arms Survey, n.d.; see Box 1). The Note updates data published in the Global Burden of Armed Violence 2015 (Geneva Declaration Secretariat, 2015a). It finds that: Globally, firearms were used in an estimated 46 per cent of all violent deaths in 2010-15. Specifically, they were used in 50 per cent of homicides and 32 per cent of conflict deaths. The use of firearms in lethal violence is particularly prevalent in the Americas, as well as Southern Africa and Southern Europe. In most regions, the proportion of violent deaths that involved firearms was fairly stable from 2007-12 to 2010-15, although averages decreased in the Caribbean and increased in Southern Africa. National time-series data reveals differing patterns in Albania and Croatia. In Albania, firearm and non-firearm violent deaths have risen and fallen in parallel, suggesting that they are both influenced by common factors. In Croatia, the rate of firearm homicide decreased by 70 per cent between 2006 and 2013, independently of the rate of non-firearm homicide, which remained relatively stable. Efforts are required

Details: Geneva, SWIT: Small Arms Survey, 2016. 8p.

Source: Internet Resource: Research Notes No. 60: Accessed November 7, 2016 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-60.pdf

Year: 2016

Country: International

Keywords: Conflict-Related Violence

Shelf Number: 145310


Author: Ferradi, Houda

Title: When Organized Crime Applies Academic Results A Forensic Analysis of an In-Card Listening Device

Summary: This paper describes the forensic analysis of what the authors believe to be the most sophisticated smart card fraud encountered to date. In 2010, Murdoch et al. described a man-in-the-middle attack against EMV cards. demonstrated the attack using a general purpose FPGA board, noting that "miniaturization is mostly a mechanical challenge, and well within the expertise of criminal gangs". This indeed happened in 2011, when about 40 sophisticated card forgeries surfaced in the field. These forgeries are remarkable in that they embed two chips wired top-to-tail. The first chip is clipped from a genuine stolen card. The second chip plays the role of the man-in-the-middle and communicates directly with the point of sale (PoS) terminal. The entire assembly is embedded in the plastic body of yet another stolen card. The forensic analysis relied on X-ray chip imaging, side-channel analysis, protocol analysis, and microscopic optical inspections.

Details: Unpublished paper, 2015. 20p.

Source: Internet Resource: Accessed November 8, 2016 at: https://eprint.iacr.org/2015/963.pdf

Year: 2015

Country: International

Keywords: Credit Card Fraud

Shelf Number: 145387


Author: Bjelopera, Jerome P.

Title: The Terrorist Screening Database and Preventing Terrorist Travel

Summary: After the terrorist attacks of September 11, 2001, the federal government developed a unified regimen to identify and list known or suspected terrorists. The regimen has received repeated congressional attention, and this report briefly discusses for congressional policymakers how the U.S. government fashions and uses the Terrorist Screening Database (TSDB) to achieve such an end. It also discusses how the federal government engages in two travel-related screening processes—visa screening and air passenger screening. Both processes involve subsets of the Terrorist Screening Database. The Terrorist Screening Database (TSDB) The TSDB lies at the heart of federal efforts to identify and share information among U.S. law enforcement about identified people who may pose terrorism-related threats to the United States. It is managed by the Terrorist Screening Center (TSC), a multi-agency organization created by presidential directive in 2003 and administered by the Federal Bureau of Investigation (FBI). The TSDB includes biographic identifiers for those known either to have or be suspected of having ties to terrorism. In some instances it also includes biometric information on such people. It stores hundreds of thousands of unique identities. Portions of the TSDB are exported to data systems in federal agencies that perform screening activities such as background checks, reviewing the records of passport and visa applicants, official encounters with travelers at U.S. border crossings, and air passenger screening. Foreign Nationals Traveling to the United States Two broad classes of foreign nationals are issued visas under the Immigration and Nationality Act (INA): immigrants and non-immigrants. Many visitors, however, enter the United States without visas through the Visa Waiver Program (VWP). Under the VWP, foreign nationals from 38 countries with agreements with the United States—including most countries in the European Union—do not need visas to enter the United States for short-term business or tourism and are instead vetted using biographic information to authenticate and screen individuals. Screening Aliens Department of State (DOS) consular officers check the background of all visa applicants in “lookout†databases that draw on TSDB information and other counterterrorism information such as the material housed in the National Counterterrorism Center’s Terrorist Identities Datamart Environment. DOS specifically uses the Consular Lookout and Support System (CLASS) database, which surpassed 42.5 million records in 2012. Aliens entering through the VWP have been vetted through the Electronic System for Travel Authorization (ESTA), which checks them against the TSDB. In addition, before an international flight bound for the United States departs from a foreign airport, Customs and Border Protection (CBP) officers screen the passenger manifest. CBP inspectors also perform background checks and admissibility reviews at the ports of entry that draw on information from the TSDB. Screening at the Transportation Security Administration The Transportation Security Administration (TSA) has initiated a number of risk-based screening initiatives to focus its resources and apply directed measures based on intelligence-driven assessments of security risk. A cornerstone of TSA’s risk-based initiatives is the PreCheck program. PreCheck is TSA’s latest version of a trusted traveler program that has been modeled after CBP programs. Under the PreCheck regimen, participants are vetted through a background check process (including screening against terrorist watchlist information). At selected airports, they are processed through expedited screening lanes, where they can keep shoes on and keep liquids and laptops inside carry-on bags. All passengers flying to or from U.S. airports are vetted using the TSA’s Secure Flight program. Secure Flight involves information from the TSDB housed in the No Fly List, Selectee List, and Expanded Selectee List to vet passenger name records. The No Fly List includes identities of individuals who may present a threat to civil aviation and national security. Listed individuals are not allowed to board a commercial aircraft flying into, out of, over, or within U.S. airspace; this also includes point-to-point international flights operated by U.S. carriers. The Selectee List includes individuals who must undergo additional security screening before being allowed to board a commercial aircraft. The Expanded Selectee List was created as an extra security measure in response to a failed attempt to trigger an explosive by a foreign terrorist onboard a U.S.-bound flight on December 25, 2009. It screens against all TSDB records that include a person’s first and last name and date of birth that are not already on the No Fly or Selectee lists.

Details: Washington, DC: Congressional Research Services, 2016. 25p.

Source: Internet Resource: CRS Report R44678: Accessed November 8, 2016 at: http://www.fas.org/sgp/crs/terror/R44678.pdf

Year: 2016

Country: International

Keywords: Airport Security

Shelf Number: 146283


Author: Vezina, Pierre-Louis

Title: Illegal Trade in Natural Resources: Evidence from missing exports

Summary: Countries restrict the export of natural resources to lower domestic prices, stimulate downstream industries, earn rents on international markets, or on environmental grounds. This paper provides empirical evidence of evasion of such export barriers. Using tools from the illicit trade literature, I show that exports of minerals, metals, or wood products are more likely to be missing from the exporter's statistics if they face export barriers such as prohibitions or taxes. Furthermore, I show that this relationship is significantly higher in countries with high levels of corruption and bribes at customs. The results have implications for the design of trade policies and environmental protection.

Details: Oxford, UK: Oxford Centre for the Analysis of Resource Rich Economies, University of Oxford, 2015. 22p.

Source: Internet Resource: Accessed November 8, 2016 at: http://www.oxcarre.ox.ac.uk/files/OxCarreRP2014139.pdf

Year: 2015

Country: International

Keywords: Environmental Crime

Shelf Number: 141044


Author: Leach, Steven

Title: Preventing Violence: Community-based Approaches to Early Warning and Early Response

Summary: Community-based early warning and early response (EWER) systems are locally-rooted initiatives designed to prevent violence and transform conflict through an inclusive, participatory process, built on a foundation of consensus. While the form and function of community-based approaches to EWER are context specific, there are some common themes and learning outcomes, which anyone interested in community-based approaches to EWER will want to consider. Listed below are key points related to the four themes of set-up and structure, indicators, monitoring and response. Set-up and Structure - Top-down models are more common than bottom-up models; both have been effective in different contexts and both come with different challenges. - Inclusion of all stakeholders, including minority and marginalized groups, is essential. • Legitimacy and effectiveness rely on wide community support, as well as the support of the authorities. - Context sensitivity: all EWER systems will be shaped by the community in which they develop and may not be directly replicable in other contexts. - External parties can strengthen local capacities and aid in process design, but the process must be led and owned by the community. Indicators - Both qualitative and quantitative indicators are important. Past emphasis on quantitative indicators has detracted from the value of qualitative indicators for community-level monitoring. - Indicators of immediate risks of escalation tend to be prioritized, yet indicators identifying the structural and underlying causes of conflict are essential for long-term violence prevention and conflict transformation. - Indicators can be based on factors that contribute to conflict escalation, but also on community practices that contribute to peace and social cohesion. • Good indicators are specific to the local context, up-to-date, developed in a participatory and inclusive way, and gender-sensitive. - The list of indicators should avoid being overly ambitious to lessen the risk of exceeding capacities to monitor and respond. Monitoring - The selection of monitors should reflect the diversity of the community. • Verification of information is an important function of EWER systems in order to ensure EWER reports are credible and to counter the negative effects of false or inflammatory information. - Information collected should be analyzed in a participatory manner and reports should be made widely available. - New technologies can facilitate communication, but the questions of "if", "where" and "how" they can be useful in a specific context should be considerd before integrating them into an EWER system. - Transparency is essential to avoid suspicion from members of the community, government, or security forces. Response - Response capacities should shape the overall design of the system. A gap between a system's ability to warn and its ability to deliver responses can undermine its credibility and the support it receives. - Community-based direct response to conflict favors interests-based and transformational approaches over power- or rights-based approaches. - Community-based approaches are consensus-based, build on existing local capacities, and are carried out by members of the community. - Communities need a network of established relationships in order to mobilize external actors to respond to situations that are beyond their capacity to manage. - Regular communication and reporting can help to foster constructive, collaborative relationships with external actors.

Details: Zurich: Center for Security Studies, 2016. 40p.

Source: Internet Resource: Accessed November 10, 2016 at: http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/MediationResources-2016-08.pdf

Year: 2016

Country: International

Keywords: Community-Based Programs

Shelf Number: 146966


Author: Clifton, Kyle Leann

Title: Curbing Illegal Wildlife Trade: The Role of Social Network Analysis

Summary: Conservation of biodiversity is complex. Most conservation challenges involve diverse interested parties, each with varying motivations, interests, power, and legitimacy. Managing conservation, then, requires not only ecological expertise, but also a sharp understanding of essential aspects of human societies, such as negotiation of power, governance, values, roles, and responsibilities. The social sciences provide a rich body of knowledge on the interactions of social and ecological systems and about political and economic drivers of conservation challenges. Their perspectives, methodologies and approaches can help us understand cause and effect, and design interventions that confront the true root of the human challenges we face in conservation. One such challenge, international illegal trade in wildlife, has extremely harmful and financially costly implications for people and biodiversity: it is a contributing factor in the extinction of species through unregulated harvest; it can result in the expansion of invasive species; it is a source of some veterinary and zoonotic diseases; and it has been linked to other illicit markets and terror networks. Current methods to curb illegal wildlife trade at all stages—source, intermediary, and destination—are often problematic, ineffective, not systematic, and there is a pervasive lack of commitment and accountability. To effectively confront this ever-growing challenge will require exploration and application of an additional set of tools. Social Network Analysis (SNA) is a tool from the social sciences with the potential to significantly augment current efforts to curb the illegal trade in wildlife, through highlighting the role and power of social networks at various scales in shaping resource management decisions. SNA, which is the study of interaction among social actors, aims to determine the pattern of connections, the conditions under which these patterns emerge, and their consequences. This can be used to describe how information or goods flow, the positions of actors within networks, and for visualizing networks. This tool can be used to map and quantitatively and qualitatively measure characteristics and strength of social ties within illegal wildlife trade networks: data that, especially given the local-to-global nature of trafficking, has the potential to provide information to tailor intervention type and specific strategies to curb the trade. SNA methods can also measure change within a network, which can facilitate adaptability and improvement of broader intervention efforts.

Details: Washington, DC: International Union for the Conservation of Nature, IUCN Social Science for Conservation Fellowship Programme, 2016. 25p.

Source: Internet Resource: Working Paper 5: Accessed November 11, 2016 at: https://www.iucn.org/sites/dev/files/pdf_final_wildlife_crime.pdf

Year: 2016

Country: International

Keywords: Illegal Trade

Shelf Number: 141100


Author: Clague, Chris

Title: The Illicit Trade Environment Index

Summary: The nature of illicit trade makes its size hard to determine. Enabled by varying combinations of corruption, incompetence and indifference, it defies all but the broadest estimates. Yet, there's sufficient anecdotal evidence to suggest that the volume of counterfeit and mis-declared goods, drugs, weapons and other types of illicit trade moving across borders has been increasing and will continue to do so. History has shown that illicit trade tends to follow the same routes as its licit counterpart. As the Asian region continues to integrate through agreements like the Trans-Pacific Partnership, the Regional Comprehensive Economic Partnership, and the ASEAN Economic Community, there will be opportunities for more trade of both types. There is widespread agreement on the factors that together can create an environment where illicit trade flourishes. The Economist Intelligence Unit created the Illicit Trade Environment Index to score 17 economies in Asia on the extent to which they enable illicit trade. Economies with the best environment are those taking the most action on the issue while economies that do little score worst. Key findings from the research are: l Australia (85.2 out of 100) tops the overall rankings, with New Zealand (81.8) and Hong Kong (81.4) not far behind. l Although it scores well on customs environment, Singapore (69.8) does worse than might be expected overall, mainly due to low scores in the transparency and trade category. The bottom half of the rankings is comprised mainly of developing economies, with Myanmar (10.8), Laos (12.9), and Cambodia (23.9) performing the worst. China (61.6) scores better than its reputation would suggest on the strength of improving intellectual property protection and increasing transparency. While there have been encouraging signs that more is being done to combat illicit trade, many economies in the region - not all of them developing - clearly have more to do in this area. The Illicit Trade Environment Index and this paper are meant to stimulate discussion in these economies and elsewhere.

Details: London: The Economist, Intelligence Unit, 2016. 21p.

Source: Internet Resource: Accessed November 11, 2016 at: http://illicittradeindex.eiu.com/ECC%20Illicit%20trade%20paper%20V9_Oct12.pdf

Year: 2016

Country: International

Keywords: Illegal Trade

Shelf Number: 146682


Author: Jacobsen, Rasmus Hojbjerg

Title: Hands-on Guide to Cost-Benefit-Analysis of Crime Prevention Efforts

Summary: When a policy maker or an administrator decides on how many and which of a number of proposed policy measures to implement an important piece of information is whether the effort is “worthwhileâ€. The precise meaning of the word “worthwhile†will depend on the context. In some cases, the question of whether a policy measure is worthwhile will be decided on a purely qualitative basis given the results of the policy measure. In other – and perhaps most – cases some sort of money evaluation will be attached to the results, and a total effect in money terms will be used to evaluate the results. This manual is concerned with the latter case. Given the large degree of competition between various projects for public funds, a compelling case for a specific project can be made if a well carried out cost-benefit-analysis shows a resulting surplus. While this criterion is obviously not the only one used, it could be an important factor when preparing policy makers to make decisions about a specific project. The basic idea behind cost-benefit-analysis is simple: calculate all benefits and all the costs associated with a specific effort, subtract the costs from the benefits while carefully addressing the time profile, and use the resulting number as an indicator for the economic profitability of the project. If the result is positive, the project produces an economic surplus, and if it is negative the project leads to an economic loss. Although this principle is simple the actual calculation is, however, in most cases somewhat more cumbersome, since the costs and benefits of a given effort can be difficult to determine. This is true for a number of reasons. First, it can be hard to decide whether the outcome for a group of participants is in fact a consequence of program participation or whether part of the outcome would have occurred anyway, in which case the resulting outcome cannot be fully attributed to the program. Second, although outcome is perhaps only measured in terms of relatively few variables, the outcomes of other, not measured, variables can also be expected to be influenced by the policy measure. In order to fully capture the program effect the outcome of these unmeasured variables also needs to be assessed. Third, there may be a selection of specific types of individuals into the projects looked at, such that the results obtained are only a good predictor of the program’s profitability for this specific group and not for a more general population. Fourth, the cost measure used should only include the extra costs incurred to run this project and not costs that would have been incurred in any case – a distinction that in some cases can be hard to make. Given these difficulties it is clear that the basis for any good cost-benefit-analysis is the available data for the costs and benefits. This manual is not a comprehensive guide to cost-benefit analysis, nor does it include a theoretical background for the analysis. For such detailed descriptions the reader is referred elsewhere. The present manual is rather a hands-on guide to administrators or external consultants who want to carry out a cost-benefit-analysis of crime prevention programs in Europe. Hopefully, this rather brief manual will also serve as an inspiration such that more cost-benefit-analyses will be carried out in the future. The remainder of the manual is structured as follows: Chapter 2 describes a number of ways to construct measures for the effects of a given project. Chapter 3 in a similar fashion shows how to calculate the costs of a project. Chapter 4 collects the information from the two previous chapters and describes the details the calculations involved in the cost-benefit-analysis. Chapter 5 concludes and discusses some of the pitfalls of the method. The appendices contain a number of tables with an overview of (i) the elements to be included in the costbenefit analysis, and (ii) cost-benefit analyses already carried out which can serve as inspiration.

Details: Copenhagen: Centre for Economic and Business Research, Copenhagen Business School, 2013. 42p.

Source: Internet Resource: Accessed November 12, 2016 at: http://openarchive.cbs.dk/bitstream/handle/10398/8878/Rasmus_Hoejbjerg_Jacobsen.pdf?sequence=1

Year: 2013

Country: International

Keywords: Cost-Benefit Analysis

Shelf Number: 130124


Author: Euromonitor International,

Title: The Global Retail Theft Barometer: 2014-2015

Summary: The GRTB "Global Retail Theft Barometer" is a study on the cost of shrinkage for the global retail industry. Apart from providing shrinkage trends at the global and regional levels, this year's report also provides country level trends for 11 select countries, out of the 24 countries covered in the research. The objective of this report is to understand shrinkage rates in four key regions, covering 24 countries, as well as the reasons for shrinkage and steps taken to prevent such loss. Key data points provided are as follows: - Average rate of shrinkage (in percentage terms) for the retail industry - Reasons for shrinkage: % internal theft, external theft, vendor theft, and administrative factors - Popular loss prevention solutions Qualitative insights into reasons for shrinkage, adoption of loss prevention solutions and approach towards loss prevention have also been provided. Prepared by The Smart Cube (TSC), presented with Ernie Deyle, and funded by an independent grant from Checkpoint Systems, Inc., the report is the world's most comprehensive survey of retail crime and loss. All figures in the report relate to the twelve months, ending December 2014.

Details: Thorofare, NJ: Checkpoint Systems, 2015. 135p.

Source: Internet Resource: Accessed November 14, 2016 at: http://www.odesus.gr/images/nea/eidhseis/2015/3.Global-Retail-Theft-Barometer-2015/GRTB%202015_web.pdf

Year: 2015

Country: International

Keywords: Loss Prevention

Shelf Number: 146673


Author: Levald, Andres

Title: CPTED Manual for police officers

Summary: The main purpose of the CPTED manual is to compose a practical CPTED handbook specifically for police officers who are taking part in the planning processes, and also for other officials who are responsible for ensuring a safe living environment. The main target group is police officers, and the aim is to write a handbook that helps police officers to understand the main principles of CPTED and which gives them practical knowledge of how to be involved in planning processes. For other officials and key stakeholders the manual will provide an insight of how and when police officers should be involved in planning processes and what expertise knowledge police officers can give when it comes to planning.

Details: Tallinn, Estonia: Politsei- ja Piirivalveamet, 2016. 77p.

Source: Internet Resource: Accessed November 14, 2016 at: http://eucpn.org/sites/default/files/content/download/files/cpted_manual_for_police_officers.pdf

Year: 2016

Country: International

Keywords: CPTED

Shelf Number: 145390


Author: Gorawantschy, Beatrice

Title: Countering Daesh Extremism: European and Asian Responses

Summary: Since June 2014, eliminating the global threat of Daesh has been a concern throughout the world. As Daesh continues to expand its presence to more countries and claims responsibility for an increased number of attacks, the need for a shared counter-extremism strategy that includes significant internal and international cooperation, coupled with confidence-building tools, has become more apparent. The measures to be implemented must also include robust stabilization and combine diplomatic, political, security, and information-sharing activities. Daesh's approach of recruiting geographically dispersed fighters along with inciting lone-wolf attacks has become a pressing concern for European and Asian countries. As the nexus of extremism and terrorism is constantly evolving, counter-extremism strategies should focus on the root causes by countering Daesh's methods as well as the factors that contribute to Daesh's growth. The battle against Daesh recruitment can only be won by addressing local grievances along with engaging religious and community leaders. Since young people in particular are being recruited by Daesh, youth empowerment and community engagement programmes can play a big role in countering the propaganda of Daesh. Media literacy and religious literacy programmes need to be organized and counter-extremism policies must take into account the latest developments in imagery and technology. In addition, the facilitation networks of foreign terrorist fighters need to be interdicted. In order to meet the multifaceted challenge of Daesh extremism, a multilayered and cooperative approach is required, ranging from legally binding instruments and intelligence sharing to multilateral institutions and regional frameworks. De-radicalization, rehabilitation, and re-integration programmes should be an important part of the counter-extremism strategy. It must be stressed that a "one size fits all" approach will not be effective, and that any rehabilitation programme must be tailored to the individual country's conditions and cultures. There is no silver bullet to defeat every extremist group, but through nesting their efforts within a global framework rather than conducting them as an independent undertaking, countries can increase their chances of tackling this threat successfully. Countries in Asia and Europe have not only committed to the global coalition in addressing the threat of Daesh but are also taking numerous steps to counter its ambition and claims to legitimacy. Europe has seen various attacks in Paris, Nice and Brussels over the past year. Daesh has also made gradual inroads into Asia by founding a Malay-speaking combat unit in Syria, affiliating with local extremist groups, re-activating old Al-Qaeda-linked networks and carrying out attacks in countries like Indonesia and Bangladesh. It has therefore become imperative to bring together experts from both regions to discuss these commonly faced challenges and to find a joint strategy to counter Daesh extremism.

Details: Singapore: Konrad Adenauer Stiftung and International Centre for Political Violence and Terrorism Research S. Rajaratnam School of International Studies, 2016. 270p.

Source: Internet Resource: Panorama Insight Into Asian and European Affairs: Accessed November 16, 2016 at: http://www.kas.de/wf/doc/kas_46739-544-2-30.pdf?161028042843

Year: 2016

Country: International

Keywords: Extremism

Shelf Number: 141170


Author: Human Rights Watch

Title: Dignity Debased: Forced Anal Examinations in Homosexuality Prosecutions

Summary: In at least eight countries in which consensual same-sex conduct is criminalized, law enforcement officials working in tandem with medical personnel subject men and transgender women who are arrested on homosexuality-related charges to forced anal examinations, with the purported objective of finding "proof" of homosexual conduct. These examinations, based on long-discredited 19th century science, often involve doctors or other medical personnel forcibly inserting their fingers, and sometimes other objects, into the anus of the accused in order to determine the tone of the anal sphincter or the shape of the anus. The overwhelming weight of medical and scientific opinion holds that it is impossible to use these exams to determine whether a person has regularly engaged in same-sex conduct. Forced anal examinations are a form of cruel, degrading, and inhuman treatment that can rise to the level of torture. They violate the Convention against Torture, the International Covenant on Civil and Political Rights, and the African Convention on Human and Peoples’ Rights. As the UN Committee against Torture has emphasized, they "have no medical justification and cannot be consented to fully." Medical personnel who agree to conduct forced anal exams do so in violation of international principles of medical ethics. Dignity Debased is based on interviews with 32 men and transgender women who underwent forced anal examinations, compiles evidence of the use of forced anal exams in eight countries: Cameroon, Egypt, Kenya, Lebanon, Tunisia, Turkmenistan, Uganda, and Zambia. The report recommends that all states ban forced anal examinations, and that international and domestic human rights and health institutions vigorously and vociferously oppose their use.

Details: New York: HRW, 2016. 90p.

Source: Internet Resource: Accessed November 16, 2016 at: https://www.hrw.org/sites/default/files/report_pdf/globallgbtanalexams0716web.pdf

Year: 2016

Country: International

Keywords: Homosexuality

Shelf Number: 141179


Author: Macaluso, Agnese

Title: From Countering to Preventing Radicalization Through Education: Limits and Opportunities

Summary: In recent years, Western societies in particular are witnessing an unprecedented emphasis on the need to find sustainable and effective strategies to tackle radicalization. This has led to an increase of interventions within the framework of education. Studies have shown that the relationship between education and radicalization is ambivalent, and there is no evidence that access to education may decrease the risk of radicalization. The limited understanding of radicalization processes has so far led to ineffective and even detrimental policies. Interventions mainly at the level of secondary and higher education have primarily sought to identify early signs of radicalization and to target vulnerable individuals, who often belong to the same religious or ethnic groups. These approaches have weakened social cohesion by demonizing certain communities and underscoring stereotypes. This paper argues that schools should not be a space to enforce counter racialization measures and promote a specific set of values and beliefs, but rather the opposite. Relying on evidence identified by research in the fields of education and peacebuilding, the paper argues that schools should be a forum in which values are questioned and openly discussed, in which critical thinking and the exchange of different ideas and perspectives are encouraged. Because education is paramount to shape values and behavior and to favor identity formation, this paper also advises shifting the focus of such preventive policies from secondary to primary education.

Details: The Hague: The Hague Institute for Global Justice, 2016. 17p.

Source: Internet Resource: Accessed November 16, 2016 at: http://www.thehagueinstituteforglobaljustice.org/wp-content/uploads/2016/10/Countering-Preventing-Radicalization-Education.pdf

Year: 2016

Country: International

Keywords: Educational Programs

Shelf Number: 141181


Author: Mendez, Juan E.

Title: Seeing into Solitary: A Review of the Laws and Policies of Certain Nations Regarding Solitary Confinement of Detainees

Summary: The report, Seeing into Solitary: A Review of the Laws and Policies of Certain Nations Regarding Solitary Confinement of Detainees was the subject of a UN event on October 17 featuring speakers from the ACLU, National Religious Campaign Against Torture, and Vance Center for International Justice, among others. The report includes within its scope 35 jurisdictions, including eight U.S. states (California, Colorado, Florida, Illinois, Maine, New York, Pennsylvania, and Texas) and twenty-six countries, including the U.S. federal prison system and immigration detention system. Seeing into Solitary builds on a prior groundbreaking report by Mendez, presented to the UN in 2011, that for the first time declared that solitary confinement may amount to cruel, inhuman, or degrading treatment and in some cases torture, and may thus, under certain conditions, be prohibited under international law. In that 2011 report, Mendez further called for a categorical ban on subjecting juveniles and people with mental illness to solitary confinement, and to end the practice of prolonged and indefinite solitary confinement. The 2016 report contains six substantive areas of focus: - the ostensible purposes of solitary confinement across jurisdictions, - how the practice is authorized, - whether and how its imposition can be challenged or appealed legally, - what limits are in place, - regulations pertaining to physical conditions such as the use of restraints, and - general trends or developments toward reform. Purpose The report found that seven of the thirty-five jurisdictions analyzed allow for solitary confinement to be used only for disciplinary purposes, one of which is the U.S. state of Colorado. It further found that solitary confinement is often imposed in response to remarkably minor offenses. According to research from the Vera Institute of Justice cited in the report, 85 percent of people held in solitary confinement in Illinois' state prison system were sent there "as punishment for minor infractions, such as abusive language." Mendez has long opposed the use of even short-term solitary for punishment, as opposed to safety reasons. The other thirty-two jurisdictions claim other justifications, usually in addition to discipline, for using solitary confinement. The most common, according to the report, are for "protection of vulnerable people," to maintain security, or"as a method of prison administration and managing cell space." However, consideration of specific policies, many from the United States, prove that these justifications are similarly disproportionate or arbitrary. In both the U.S. immigration detention and federal prison systems, for example, people can be held in solitary confinement for the sole reason that they will be released, removed, or transferred within 24 hours. Also under U.S. federal law, people can be held in solitary confinement if they are HIV-positive and there is "reliable evidence" that they may "pose a health risk" to others. In California, people may be subject to isolation just because they are "a relative or associate of a staff member." In Pennsylvania, people may be subject to solitary confinement, against their will and consent, because they are "at a high risk of sexual victimization" if there exists no "alternative means of separation from the likely abuser." Also in Pennsylvania, people may be subject to solitary confinement simply because "there is no other appropriate bed space."

Details: Vienna: Office of the United Nations High Commissioner for Human Rights (OHCHR), 2016. 87p.

Source: Internet Resource: Accessed November 16, 2016 at: http://www.weil.com/~/media/files/pdfs/2016/un_special_report_solitary_confinement.pdf

Year: 2016

Country: International

Keywords: Immigrant Detention

Shelf Number: 144849


Author: McKenzie, David

Title: Eliciting Illegal migration rates through list randomization

Summary: Most migration surveys do not ask about the legal status of migrants due to concerns about the sensitivity of this question List randomization is a technique that has been used in a number of other social science applications to elicit sensitive information This paper trials this technique by adding it to surveys conducted in Ethiopia, Mexico, Morocco, and the Philippines It shows how, in principal, this can be used both to give an estimate of the over rate of illegal migration in the population being surveyed, as well as to determine illegal migration rates for subgroups such as more or less educated households The results suggest that there is some useful information in this method: higher rates of illegal migration in countries where illegal migration is thought to be more prevalent and households who say they have a migrant are more likely to report having an illegal migrant Nevertheless, some of the other findings also suggest some possible inconsistencies or noise in the conclusions obtained using this method The authors suggest directions for future attempts to implement this approach in migration surveys

Details: London: Centre for Research and Analysis of Migration, Department of Economics, University College London, 2013. 17p.

Source: Internet Resource: CReAM Discussion Paper Series, no. 10/13: Accessed November 17, 2016 at: http://www.cream-migration.org/publ_uploads/CDP_10_13.pdf

Year: 2013

Country: International

Keywords: Illegal Immigrants

Shelf Number: 144853


Author: Rassler, Don

Title: Remotely Piloted Innovation: Terrorism, Drones and Supportive Technology

Summary: In mid-August 2016, the Shiite militant group Hezbollah reportedly dropped two small bombs from what is believed to have been a modified, commercially available drone that it was flying over rebel positions in Syria. While terrorist groups have long had a fascination with drones and experimented with their use, the incident was a first for a terror group, and it potentially represents the leading edge of a wave of similar incidents that could follow in the months, years and decades ahead. Much has been made of the threat of terror use of drones (also known as "uninhabited aircraft systems," or UASs), but little empirical and historical work has been done to support our understanding of this phenomenon and its evolution. This report seeks to address this gap by providing a review of, and framework to situate, cases in which terrorist entities have either shown a substantive interest in drones or have used them. It evaluates both individual use cases and the activity of groups that have used drones frequently enough to constitute their having a "program." These cases are then complemented by a review of the creative ways that private citizens have used drones, in order to provide decision-makers with a firmer baseline of both demonstrated terror capability and what lies within the immediate realm of possibility, given what has already been achieved by others. This report also includes an overview of new technologies that are likely to further complicate the scope of this developing threat.

Details: West Point, NY: Combating Terrorism Center at West Point, United States Military Academy, 2016. 77p.

Source: Internet Resource: Accessed November 21, 2016 at: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/10/Drones-Report.pdf

Year: 2016

Country: International

Keywords: Drones

Shelf Number: 147851


Author: Control Arms Campaign

Title: The AK-47: the world's favourite killing mahine

Summary: Kalashnikov assault rifles are the most widespread military weapons in the world. It is estimated that there are between 50 and 70 million of them spread across the world’s five continents. They are used daily by soldiers, fighters, and gang members to inflict untold suffering in many countries. The spread of these weapons continues largely unchecked by governments, threatening the lives and safety of millions as weapons fall into irresponsible hands. More than ever, the Kalashnikov rifle is the weapon of choice for many armies, militias, armed gangs, law enforcement officials, rebels, and other private actors who abuse fundamental human rights and operate beyond the international humanitarian law parameters laid down by the Geneva Conventions and other relevant international law. Although the United Nations and its member states have taken concrete action to limit the proliferation of nuclear, biological, and chemical weapons of mass destruction through international treaties and monitoring organisations, the number one tool used for killing and injuring civilians today is small arms, including the assault rifle, which is reaching more countries than ever before. On 26 June 2006, the UN Review Conference on the Illicit Trade in Small Arms and Light Weapons begins in New York. At this conference, governments have an opportunity to agree effective and comprehensive controls to prevent the proliferation and misuse of small arms and light weapons, including assault rifles like the AK-47. In October 2006, at the UN General Assembly, governments should agree to negotiate a new global Arms Trade Treaty (ATT) to regulate international transfers of all conventional arms, including military assault rifles.

Details: s.l.: Control Arms.org: 2006. 18p.

Source: Internet Resource: Control Arms Briefing Note: Accessed November 21, 2016 at: https://www.oxfamamerica.org/static/oa3/files/ak-47-worlds-favourite-killing-machine.pdf

Year: 2006

Country: International

Keywords: Arms Control

Shelf Number: 147878


Author: De Genova, Nicholas

Title: Detention, Deportation, and Waiting: Toward a Theory of Migrant Detainability

Summary: The global expansion of deportation regimes has spurred an analogous expansion of migrant detention. Arguably even more than the onerous punitive power of deportation, detention imposes the sovereign power of a state on to the lives of non-citizens in a manner that transmutes their status into de facto legal non-personhood. That is to say, with detention, the condition of deportable migrants culminates in summary (and sometimes indefinite) incarceration on the basis of little more than their sheer existential predicament as “undesirable†non-citizens, often with little or no recourse to any form of legal remedy or appeal, and frequently no semblance to due process. Castigated to a station outside the law, their detention leaves them at the mercy of the caprices of authorities. The author argues that to adequately comprehend the productivity of this power to detain migrants, we must have recourse to a concept of detainability, the possibility of being detained. The paper situates the analysis of immigration detention in the framework of contemporary critical theory, interrogating the economy of different conditionalities and contingencies that undergird various degrees by which distinct categories of migrants are subjected to detention power.

Details: Geneva, SWIT: Global Detention Project, 2016. 10p.

Source: Internet Resource: https://www.globaldetentionproject.org/detention-deportation-waiting-toward-theory-migrant-detainability-gdp-working-paper-no-18

Year: 2016

Country: International

Keywords: Deportation

Shelf Number: 147936


Author: Munoz, Claudia

Title: Is Infiltrating Migrant Prisons the Most Effective Way to Challenge Detention Regimes? The Case of the National Immigrant Youth Alliance

Summary: Since 2011, members of the National Immigrant Youth Alliance have repeatedly "infiltrated" immigration detention centers in the United States. This paper describes these infiltrations by undocumented immigrants and what we can learn from them. The stories, told from the perspective of the infiltrators, reveal details that non-profit organizations and activist scholars have struggled to illuminate, something that only the detained and liberated can show: the lived experience of detention. The authors argue that these stories demonstrate that civil disobedience, a strategy often ignored by allies and advocates of undocumented immigrants, can be an effective tool to counter growing detention and deportation systems.

Details: Geneva, SWIT: Global Detention Project, 2016.

Source: Internet Resource: Working Paper no. 17: Accessed December 2, 2016 at: https://www.globaldetentionproject.org/infiltrating-migrant-prisons-effective-way-challenge-detention-regimes-case-national-immigrant-youth-alliance

Year: 2016

Country: International

Keywords: Civil Disobedience

Shelf Number: 140268


Author: Green, Shannon N.

Title: Turning Point: A New Comprehensive Strategy for Countering Violent Extremism

Summary: The United States lost nearly 3,000 lives in the devastating terrorist attacks of September 11, 2001. On that day, a problem that had been slowly festering and barely noticed in the West broke onto the world stage in a forceful and heart-wrenching way. Those events and many that would follow have prompted trillions of dollars to be poured into military, law enforcement, and intelligence operations. Yet the problem of violent extremism has grown more severe and urgent. Despite the many efforts to extinguish the flames of violence, new and powerful extremist movements have taken root. Terrorist groups around the world have used technology, the media, religious schools and mosques, and word of mouth to sell their twisted ideologies, justify their violence, and convince too many recruits that glory can be found in the mass murder of innocent civilians. The spread of extremist ideologies and increasingly frequent terrorist attacks are stoking anxiety and fear across the globe. According to a survey conducted by the Commission, people are willing to try just about anything to stop the bloodshed: from military action to stronger border controls and mandatory identification cards to relinquishing privacy and accepting constraints on speech. The increasing potency and reach of terrorist groups—and a sense that governments’ response to the threat has been inadequate—is creating deep political divisions and fueling support for populist solutions. There are no easy solutions to this problem. Neither troops nor police nor economic sanctions alone can address this threat. We cannot close our borders and hope that the problem goes away. And we cannot abandon our commitment to human rights and freedom of expression in an attempt to quell violent extremism. Diminishing the appeal of extremist ideologies will require a long-term, generational struggle. The United States and its allies must combat extremists' hostile and apocalyptic world view with the same level of commitment that we apply to dealing with its violent manifestations. We urgently need a new comprehensive strategy for countering violent extremism—one that is resolute, rests in soft and hard power, and galvanizes key allies and partners from government, civil society, and the private sector.

Details: Washington, DC: Center for Strategic & International Studies, 2016. 90p.

Source: Internet Resource: Accessed December 2, 2016 at: https://www.csis.org/features/turning-point

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 147863


Author: Fay, Emily Victoria

Title: Trading in antiquities on eBay: the changing face of the illicit trade in antiquities

Summary: The sale of ancient objects on eBay is presented to buyers as legitimate and ethical. However the antiquities trade is a grey market, where both licit and illicit objects are sold (Bowman, 2008). An unknown percentage of illicit antiquities have entered the market as a consequence of archaeological looting. However, antiquities are fungible by nature, meaning that it is very difficult for buyers to differentiate the licit from the illicit. This thesis is based on the premise that the antiquities trade causes harm through the destruction of archaeological knowledge, and therefore there is a necessity to reduce the size of the market. Using Sutton's market reduction approach, the study sets out to collect empirical data on the market from eBay. The thesis considers three main research questions: First, is the current regulatory framework for the sale of antiquities adequate? Second, what is the scale and scope of the market on eBay for antiquities? Third, what are the routine features of the operation of this market? The thesis adopts routine activity theory to investigate the structural elements of the antiquities market, outlining the actors involved in the market, the reasons why antiquities make "suitable targets", and exploring the range of 'capable guardians' who may play a formal or informal role in the surveillance of this market. The data indicates eBay has expanded the size and reach of the antiquities trade, enabling amateurised actors to trade on a global scale. However, the online "frame" (Goffman, 1969) of eBay auctions creates additional challenges through the separation of goods and actors and the fluidity of identity in cyberspace. The thesis ends with an examination of the distal and proximal nodes of governance in online environments and the ideological, definitional, evidentiary, legislative and structural challenges to addressing the illicit antiquities trade at the market end.

Details: Keele, UK: Keele University, 2013. 436p.

Source: Internet Resource: Dissertation: Accessed December 5, 2016 at: http://eprints.keele.ac.uk/197/1/Fay%20PhD%202013.pdf

Year: 2013

Country: International

Keywords: Antiques

Shelf Number: 140279


Author: Environmental Investigation Agency

Title: Time for Action: End the criminality and corruption fuelling wildlife crime

Summary: In February 2014, senior representatives of 41 countries and the European Union adopted the London Declaration on Illegal Wildlife Trade, committing to tackle this multi-billion dollar transnational crime. Similar commitments were reiterated a year later in the Kasane Statement and the second follow-on conference is due to take place on November 17-18, 2016 in Hanoi, where it is likely that a third international statement will be adopted.1 While the London Declaration symbolises the growing political momentum to discuss illegal wildlife trade, many of its commitments have yet to be translated into meaningful action. Indeed, almost all of the London Declaration commitments have been made elsewhere in the past. Meanwhile, the current scale of poaching and illegal wildlife trade is alarming, with trafficking in many species reaching unprecedented levels. In 2014, drawing on more than three decades of experience in tackling wildlife and forest crime, EIA embarked on an evaluation of the significant challenges, best-practice and progress made (although not necessarily directly attributable to the London Declaration) by some of the key countries which adopted it. These were namely Botswana, China, Kenya, Laos, Malawi, Mozambique, Nepal, Tanzania, Uganda, the UK, the US and Vietnam. Countries which did not initially adopt the Declaration but which nevertheless play an important role in illegal wildlife trade such as India, South Africa and Thailand (hereafter all 15 are collectively referred to as ‘IWT countries’). As a part of its evaluation, EIA developed a set of “indicators of implementation†to use as independent benchmarks. This was produced prior to the publication of the Indicator Framework for Wildlife and Forest Crime by the International Consortium on Combating Wildlife Crime (ICCWC), a collaborative effort of five inter-governmental organisations.2 There is, however, some cross-over in the two sets of indicators and EIA believes the ICCWC indicators are a valuable tool to assess the effectiveness of law enforcement responses to wildlife crime. The methodology used by EIA involved extensive desk-based research of publicly available information and outreach to key stakeholders, where possible. EIA also monitored trade levels of key species with a focus on tigers and other Asian big cats, elephants, rhinos, pangolins, helmeted hornbill and totoaba. Thousands of records of seizures, arrests and prosecutions have been analysed to produce seven interactive maps on wildlife trade, available on our website: https://eia-international.org/ 3 This report summarises the key findings of our preliminary assessment and reiterates recommendations which should be made a priority for time-bound implementation. Our assessment indicates that the basic legislation and institutional framework to combat wildlife crime does exist, although there remain critical gaps in the response of key governments. There is no time to waste – the international community is well aware of the actions needed to end the illegal wildlife trade and now is the time for action.

Details: London: EIA, 2016. 50p.

Source: Internet Resource: Accessed December 7, 2016 at: https://eia-international.org/wp-content/uploads/EIA-Time-for-Action-FINAL-1.pdf

Year: 2016

Country: International

Keywords: Illegal Wildlife Trade

Shelf Number: 140330


Author: Ludwig, Markus

Title: Economic Shocks in the Fisheries Sector and Maritime Piracy

Summary: For a panel of 109 coastal countries we show that negative economic shocks in the fisheries sector are associated with an increase in maritime piracy. Our identification strategy uses the variation in the phytoplankton abundance off the individual countries' coasts, measured by satellite data, as a source of such shocks. We find that plankton abundance is positively related to fish catches but negatively associated with the incidence of piracy, onset and the absolute number of pirate attacks. Our instrumental variable estimates indicate that a one percent increase in fish catches reduces the risk of piracy occurring by one percentage point.

Details: Munich: Munich Personal RePEc Archive, 2014. 38p.

Source: Internet Resource: MPRA Paper No. 56959: Accessed December 7, 2016 at: https://mpra.ub.uni-muenchen.de/56959/1/MPRA_paper_56959.pdf

Year: 2014

Country: International

Keywords: Fishing Industry

Shelf Number: 140343


Author: Great Britain. House of Commons. Home Affairs Committee

Title: Female genital mutilation: abuse unchecked

Summary: Background to this report 1. Our predecessor Committee published two reports on female genital mutilation (FGM) towards the end of the last Parliament. Its over-riding conclusion in July 2014 was that “FGM is a severe form of gender-based violence, and where it is carried out on a girl, it is an extreme form of child abuse. Everyone who has a responsibility for safeguarding children must view FGM in this way. While welcoming action taken by the Government and the impressive work undertaken by campaigners, the follow-up report, published in March 2015, concluded that insufficient progress had been made in tackling this pernicious problem, particularly in relation to prosecutions. We therefore decided it was right to revisit this issue to assess whether further positive developments had taken place. 2. In July 2016 we hosted a roundtable discussion on FGM that brought together survivors, grassroots organisations, clinicians, representatives from the criminal justice system and educationalists. In recent years the profile of FGM has risen significantly across Parliament, the media and the public, largely as a result of the tireless efforts by campaigners and public servants including those who attended the roundtable.2 We would like to thank all those who contributed to the discussion as well as those who attended the event as invited guests in the audience. The roundtable informed an evidence session with Karen Bradley MP, the then Minister for Preventing Abuse, Exploitation and Crime, on 12 July 2016. The nature, scale and geographical spread of FGM 3. The World Health Organization (WHO) defines female genital mutilation as “all procedures involving the partial or total removal of the external female genitalia or other injury to the female genital organs for non-medical reasonsâ€. There are four main types: • Type 1 (clitoridectomy), which involves partial or total removal of the clitoris and, in rare cases, only the prepuce; • Type 2 (excision), which involves partial or total removal of the clitoris and the labia minora, with or without excision of the labia majora; • Type 3 (infibulation), which involves narrowing of the vaginal opening through the creation of a covering seal, which is formed by cutting and repositioning the inner or outer labia, with or without removal of the clitoris; and • Type 4 (other), which comprises all other harmful procedures to the female genitalia for non-medical purposes, such as pricking, piercing or incision of the clitoris and/or the labia; stretching of the clitoris and/or labia; and cauterisation or burning of the clitoris and surrounding tissues. International bodies such as the United Nations and the WHO are unanimous that FGM has no health benefits and leads to short- and long-term physical and psychological harm. In the short term, FGM can result in severe pain, excessive bleeding, fever, urinary problems and even death. Longer-term effects include menstrual problems, difficulties in childbirth, sexual problems and psychological trauma. 4. FGM is practised in more than 29 African countries and by certain ethnic groups in the southern part of the Arabian Peninsula and along the Persian Gulf. It is concentrated in the Horn of Africa but it is also highly prevalent in other countries in North, East and West Africa. The WHO has also reported FGM in India, Indonesia, Iraq, Kurdistan, Israel, Malaysia and the United Arab Emirates. It has been estimated that more than 200 million women worldwide have been subjected to FGM and three million girls are believed to be at risk each year. The map below shows the percentage of women and girls aged 15 to 49 years who have been subjected to FGM in countries where it is most prevalent.

Details: London: House of Commons, 2016. 34p. Government Response, 24p.

Source: Internet Resource: Ninth Report of Session 2016-17: Accessed December 9, 2016 at: http://www.publications.parliament.uk/pa/cm201617/cmselect/cmhaff/390/390.pdf

Year: 2016

Country: International

Keywords: Female Cuttling

Shelf Number: 140372


Author: Desmarais, France

Title: Countering Illicit Traffic in Cultural Goods: The Global Challenge of Protecting the World's Heritage

Summary: Cultural objects disappear every day, whether stolen from a museum or removed from an archaeological site, to embark on the well-beaten track of illicit antiquities. A track we have yet to map clearly. The need to understand that journey, to establish the routes, to identify the culprits, and to ultimately locate these sought-after objects, gave rise to the launch of the first International Observatory on Illicit Traffic in Cultural Goods by the International Council of Museums (ICOM). This transdisciplinary publication concludes the initial phase of the Observatory project, by providing articles signed by researchers and academics, museum and heritage professionals, archaeologists, legal advisors, curators, and journalists. It includes case studies on looting in specific countries, with the primary aim of eliciting the nature of the antiquities trade, the sources of the traffic, and solutions at hand.

Details: Paris: ICOM, 2015. 215p.

Source: Internet Resource: Accessed December 10, 2016 at: http://icom.museum/fileadmin/user_upload/pdf/publications/Book_observatory_illicit_traffic_version_issuu.pdf

Year: 2015

Country: International

Keywords: Antiquities Theft

Shelf Number: 140409


Author: Ingram, Haroro J.

Title: A "Linkage-Based" Approach to Combating Militant Islamist Propaganda: A Two-Tiered Framework for Practitioners

Summary: This Policy Brief outlines a "linkage-based" approach to combating militant Islamist propaganda tailored for practitioners. It argues for a two-tiered approach to counter-terrorism strategic communications that addresses a spectrum of target audience motivations: antis, curious, engaged, tacit supporters and active supporters. The first tier undermines the key arguments at the heart of militant Islamist narratives and offers alternative narratives. This approach is designed to dismantle the "systems of meaning" at the heart of militant Islamist propaganda via the deployment of pragmatic- and identity-choice messages tailored to dissolve the linkages violent extremists draw between themselves and solutions and their enemies and crisis. The second tier uses strategies of network disruption and disengagement strategies to catalyse behavioural changes in target audiences away from joining or acting on behalf of violent extremist groups like al Qaeda or so-called Islamic State (IS). These tiers are mutually reinforcing: the first degrades the appeal of violent extremist messaging in an effort to constrict those who may become engaged in or even supporters of violent extremists while the second disturbs the trajectory of individuals from tacit to active supporters. The framework is designed to not only assist practitioners with synchronising campaign planning and message design but provides a way to categorise messaging and facilitate metric collection for better informed decision-making.

Details: The Hague: International Centre for Counter-Terrorism, 2016. 21p.

Source: Internet Resource: ICCT Policy Brief: Accessed December 13, 2016 at: https://icct.nl/wp-content/uploads/2016/11/ICCT-Ingram-A-Linkage-Based-Approach-Nov2016.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 146040


Author: Wright, Elisson M.

Title: Analysis of International Funding to Tackle Illegal Wildlife Trade

Summary: Poaching and illegal wildlife trafficking are reaching unprecedented levels, robbing the livelihoods of local communities and eroding the global commons. In response, the Global Environment Facility (GEF) has launched a major effort to help tackle the supply, trade, and demand for wildlife products. Importantly, the project is not only about stopping the slaughter of animals in the forests and savannas of Africa; it also aims at reducing the demand in Asia. The $131 million GEF-funded program includes 19 countries in Africa and Asia. It is expected to leverage $704 million in additional financing over seven years. The national projects aim to promote wildlife conservation, wildlife crime prevention, and sustainable development in order to reduce adverse impacts to known threatened species. Additionally, a global coordination grant from the GEF will strengthen cooperation and facilitate knowledge exchange between national governments, development-agency partners, and leading practitioners. This program is part of the wider effort by the international donor community to combat illegal wildlife trade. Numerous international financial institutions, governments, nongovernmental organizations, and foundations have launched strategies, programs, and projects to address this serious problem. But while there is a growing momentum from the international community to combat the problem, reliable information on donor funding has been lacking. This important new report, Analysis of International Funding to Tackle Illegal Wildlife Trade, fills an important gap in our understanding of the collective response. The analysis will not only provide a better understanding and coordination of the contributions of the international community, it should ultimately assist those on the ground protecting the wildlife and the livelihoods of local communities. I want to congratulate the World Bank for leading this work, and all the partners who contributed to providing such a comprehensive overview of the investments of the international community to tackle this wildlife crisis.

Details: Washington, DC: The World Bank, 2016. 50p.

Source: Internet Resource: Accessed December 13, 2016 at: http://documents.worldbank.org/curated/en/695451479221164739/pdf/110267-WP-Illegal-Wildlife-Trade-OUO-9.pdf

Year: 2016

Country: International

Keywords: Animal Poaching

Shelf Number: 140421


Author: Whiteside, Craig

Title: Lighting the Path: the Evolution of the Islamic State Media Enterprise (2003-2016)

Summary: The media products of the revolutionary movement known as the Islamic State (also IS, ISIL, ISIS, Daesh) have received a significant amount of attention from analysts and journalists alike. While extremely helpful, most of this effort is focused at performing content analysis of fairly recent products. As part of the Counter-Terrorism Strategic Communication (CTSC) project's effort to better understand propaganda messaging in the 21st century, the author of this Research Paper examined primary documents and other media published by the Islamic State movement during its entire existence in order to develop a history of the media department since 2003. The framework for analysis focused on the interaction between key media leaders, the ever-expanding structure and institutions, and the process of innovation used to experiment with different media techniques in different phases of the group's evolution. Based on this history, the paper presents six observations about the media department and its role in the larger movement – in the hopes that this knowledge will be helpful in efforts to combat this particular group and its inevitable imitators in the future.

Details: The Hague: International Centre for Counter-Terrorism, 2016. 36p.

Source: Internet Resource: ICCT Research paper: Accessed December 14, 2016 at: https://icct.nl/wp-content/uploads/2016/11/ICCT-Whiteside-Lighting-the-Path-the-Evolution-of-the-Islamic-State-Media-Enterprise-2003-2016-Nov2016.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 144914


Author: Small Arms Survey

Title: A Gendered Analysis of Violent Deaths

Summary: Does the risk of violent death differ for men and women in conflict and non-conflict settings, and across regions and countries? Does it change over the course of a person’s life? And are women targeted because they are women? In other words, is such violence gender-based? Through the 2030 Agenda for Sustainable Development, the international community has committed to reducing all forms of violence and related deaths (Target 16.1), and to eliminating violence against women and girls (Target 5.2). It has also undertaken to ensure the safety of public spaces (Target 11.7) (UNGA, 2015). Achieving these targets requires a detailed mapping of patterns and risk factors for lethal violence. The collection and analysis of data related to the Sustainable Development Goals (SDGs) is still in its infancy, but some broad trends and patterns can be identified nevertheless. This Research Note is the third in a series that presents the latest information from the Small Arms Survey's database on violent deaths (Small Arms Survey, n.d.; see Box 1). The first Note in the series examines broad trends in lethal violence, noting that while the global homicide rate has decreased slowly but steadily since 2004, conflict deaths have almost tripled in recent years, constituting 17 per cent of all the violent deaths in 2010–15 (Widmer and Pavesi, 2016a). The second report analyses the use of firearms as instruments of violence (Widmer and Pavesi, 2016b), while this third instalment in the series analyses available information on violent deaths, disaggregated by sex. It finds that: Globally, men and boys accounted for 84 per cent of the people who died violently in 2010–15; on average during that period, 64,000 women and girls—the remaining 16 per cent—were killed violently every year. The sub-regions with the highest violent death rates for women include Central America, the Caribbean, and South America. In sub-regions with low overall violent death rates, such as Western Europe, Eastern Asia, and Australia/New Zealand, the proportion of women who die violently is often above the global average. In the Afghan and Syrian conflicts, the proportion of women killed has been steadily increasing at least since sex-disaggregated data became available. In industrialized countries, the general decrease in homicide rates entailed a decline in the killing of women, but rates of domestic and intimate partner violence have proven particularly difficult to reduce. In 2015 or the latest year for which data is available, as many or more women than men suffered violent deaths in eight countries characterized by high income and low violence levels: Austria, Germany, Hong Kong, Japan, Luxembourg, New Zealand, Slovenia, and Switzerland.

Details: Geneva, SWIT: Small Arms Survey, 2016. 8p.

Source: Internet Resource: Research Note: Accessed December 14, 2016 at: http://www.smallarmssurvey.org/fileadmin/docs/H-Research_Notes/SAS-Research-Note-63.pdf

Year: 2016

Country: International

Keywords: Conflict-Related Violence

Shelf Number: 147374


Author: Dodwell, Brian

Title: Then and Now: Comparing the Flow of Foreign Fighters to AQI and the Islamic State

Summary: Using two different sets of data derived from internal, bureaucratic documents produced by the Islamic State (and its predecessor group) during two distinct periods of time (2006-2007 and 2011-2014), this report evaluates how the make-up, scale, and scope of the Iraq- and Syria-bound foreign fighter problem has changed over the last decade. It does so across three dimensions. First, it outlines the similarities and differences that exist in the backgrounds of the foreign fighters who joined the Islamic State during separate blocks of time. Second, it provides insight into the local travel and flow of foreign fighters across time as well as the mobilization infrastructure that the Islamic State had in place to facilitate the travel of recruits into Syria or Iraq. Third, it details changes in the preferences of foreign fighters, as reflected by the roles they wanted to fill within the organization.

Details: West Point, NY: Combating Terrorism Center at West Point, United States Military Academy, 2016. 38p.

Source: Internet Resource: Accessed December 14, 2016 at: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/12/Then-and-Now.pdf

Year: 2016

Country: International

Keywords: ISIS

Shelf Number: 144885


Author: Gagliardone, Iginio

Title: Countering Online Hate Speech

Summary: Hate speech online is situated at the intersection of multiple tensions: it is the expression of conflicts between different groups within and across societies; it is a vivid example of how technologies with a transformative potential such as the Internet bring with them both opportunities and challenges; and it implies complex balancing between fundamental rights and principles, including freedom of expression and the defence of human dignity. As the UN agency with a specific mandate to foster freedom of expression, and its corollaries, press freedom and freedom of information, UNESCO is actively working to promote mutual knowledge and understanding of peoples, through all means of mass communication, including the Internet in general, and social networking platforms in particular. The roots of the research presented in this current publication lie in UNESCO’s fulfilment of Resolution 52 of its 37th General Conference in November 2013, as agreed by the Organization’s 195 Member States. This resolution called for a comprehensive and consultative multistakeholder study, within the mandate of UNESCO, on Internet-related issues of access to information and knowledge, freedom of expression, privacy, and the ethical dimensions of the Information Society. The research into hate speech served as a contribution towards the wider study.1 The present report provides a global overview of the dynamics characterizing hate speech online and some of the measures that have been adopted to counteract and mitigate it, highlighting good practices that have emerged at the local and global levels. While the study offers a comprehensive analysis of the international, regional and national normative frameworks developed to address hate speech online, and their repercussions for freedom of expression, it places particular emphasis on social and non-regulatory mechanisms that can help to counter the production, dissemination and impact of hateful messages online. The findings of this study can be grouped around four main tensions: definition, jurisdiction, comprehension, and intervention. ◠Definition. Hate speech is a broad and contested term. Multilateral treaties such as the International Covenant on Civil and Political Rights (ICCPR) have sought to define its contours. Multi-stakeholders processes (e.g. the Rabat Plan of Action) have been initiated to bring greater clarity and suggest mechanisms to identify hateful messages. And yet, hate speech continues largely to be used in everyday discourse as a generic term, mixing concrete threats to individuals’ and groups’ security with cases in which people may be simply venting their anger against authority. Internet intermediaries – organizations that mediate online communication such as Facebook, Twitter, and Google – have advanced their own definitions of hate speech that bind users to a set of rules and allow companies to limit certain forms of expression. National and regional bodies have sought to promote understandings of the term that are more rooted in local traditions. Against this backdrop, the possibility of reaching a universally shared definition seems unlikely, a shared interest to avoid violence and protect human dignity has made debates on hate speech a moment for different stakeholders to come together in original ways and seek locally relevant solutions. ◠Jurisdiction. The Internet’s speed and reach makes it difficult for governments to enforce national legislation in the virtual world. Issues around hate speech online bring into clear relief the emergence of private spaces for expression that serve a public function (e.g. Facebook, Twitter), and the challenges that these spaces pose for regulators. Despite initial resistance, and following public pressure, some of the companies owning these spaces have become more responsive towards tackling the problem of hate speech online, although they have not (yet) been fully incorporated into global debates (e.g. the Rabat Plan of Action) about how to identify and respond to hate speech. ◠Comprehension. The character of hate speech online and its relation to offline speech and action are poorly understood. These topics are widely talked about – by politicians, activists and academics – but the debates tend to be removed from systematic empirical evidence. The character of perceived hate speech and its possible consequences has led to placing much emphasis on the solutions to the problem and on how they should be grounded in international human rights norms. Yet this very focus has also limited deeper attempts to understand the causes underlying the phenomenon and the dynamics through which certain types of content emerge, diffuse and lead – or not – to actual discrimination, hostility or violence. This study offers various examples of research aimed at mapping the emergence and diffusion of speech online, but also highlights the lack of studies examining the links between hate speech online and other social phenomena, ranging from access to education to rising inequalities.

Details: Paris: United Nations Educational, Scientific and Cultural Organization (UNESCO), 2015. 73p.

Source: Internet Resource: Accessed December 14, 2016 at: http://unesdoc.unesco.org/images/0023/002332/233231e.pdf

Year: 2015

Country: International

Keywords: Computer Crimes

Shelf Number: 144890


Author: United States Institute of Peace

Title: The Jihadi Threat: ISIS, Al Qaeda, and Beyond

Summary: The West failed to predict the emergence of al-Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate — and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strategies, the future scenarios, and policy considerations. This report reflects their analysis and diverse views. his report is a collaboration by 20 experts on the Middle East, Islamic extremism, and jihadism who held a series of conferences between August and November 2016. "The Jihadi Threat" reflects the broad — and often diverse — views of the coauthors. Not every one agreed on all points, but the variety of ï¬ndings, trend lines, and scenarios for the future covers the best thinking about the evolution of the Islamic State, al-Qaeda, and their affiliates. The United States Institute of Peace was the primary sponsor of this initiative, with the backing of the Woodrow Wilson International Center for Scholars. Fifteen other think tanks and universities were represented in the Working Group on Extremism. The goal was always to reflect the widest expertise and the full spectrum of views.

Details: Washington, DC: United States Institute of Peace, 2016. 48p.

Source: Internet Resource: Accessed December 14, 2016 at: http://www.usip.org/sites/default/files/The-Jihadi-Threat-ISIS-Al-Qaeda-and-Beyond.pdf

Year: 2016

Country: International

Keywords: al Qaeda

Shelf Number: 146146


Author: Berger, J.M.

Title: Making CVE Work: A Focused Approach Based on Process Disruption

Summary: One of the biggest barriers to designing a comprehensive Countering Violent Extremism (CVE) programme is defining its scope. This paper argues for a narrow approach, focusing on disengagement and the disruption of recruitment. The author develops a simplified model of radicalisation and the concurrent terrorist recruitment process, proposing concrete themes for disruptive intervention and messaging. After analysing case studies of disengagement, the author offers recommendations for specific action to accomplish CVE goals by disrupting recruitment processes and deploying targeted messaging within the framework of the correlated models.

Details: The Hague: International Centre for Counter-Terrorism, 2016. 40p.

Source: Internet Resource: ICCT Research Paper: Accessed December 15, 2016 at: https://www.icct.nl/wp-content/uploads/2016/05/J.-M.-Berger-Making-CVE-Work-A-Focused-Approach-Based-on-Process-Disruption-.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 146161


Author: Ahmadi, Belquis

Title: Afghan Women and Violent Extremism: Colluding, Perpetrating, or Preventing?

Summary: Summary • Women’s role in violent extremism has too often been simplified to a binary: either victim of the choices of men or deviant anomaly. • Women play a diverse range of roles in violent extremism in Afghanistan—as they do around the world—not only as peacebuilders but also as recruiters, sympathizers, perpetrators, and preventers. • Roles and motivations vary, but what is clear is that the construct of disempowered victims simply does not hold true for all women involved. • Women’s roles in violent extremism and the underlying reasons behind those roles need to be fully understood and appropriately reflected in policy and practice. • Women’s rights and place in society are central to the narratives of violent extremist groups, and these narratives are the terrain on which women in Afghanistan fight to establish their rights. • Women have the potential, whether through their own involvement or as family members of those who are involved, to counter radicalization dynamics. • Countering violent extremism (CVE) and preventing violent extremism (PVE) programming needs to include women as specific target groups, be engendered more generally, and address the underlying issues of women’s status and agency.

Details: Washington, DC: United States Institute of peace, 2016. 16p.

Source: Internet Resource: Special Report 396: Accessed December 16, 2016 at: http://www.usip.org/sites/default/files/SR396-Afghan-Women-and-Violent-Extremism.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 146123


Author: Schatz, Eberhard

Title: Drug consumption rooms: Evidence and practice

Summary: For the past 10 to 20 years, drug consumption rooms (DCRs) have become an integrated part of the drug treatment and harm reduction strategy in a variety of countries in Western Europe, North America and Australia. However, they have not yet been established in the majority of countries worldwide. This briefing paper provides a short summary of the background, history and objectives of DCRs, and analyses available evidence regarding their impact. The second part of the briefing paper consists of an overview of the various DCRs in different countries, with a particular focus on the concepts used to develop these facilities with regard to the local political, cultural and social situation of each country.

Details: London: International Drug Policy Consortium, 2012. 23p.

Source: Internet Resource: IDPC Briefing Paper: http://www.drugsandalcohol.ie/17898/1/IDPC-Briefing-Paper_Drug-consumption-rooms.pdf

Year: 2012

Country: International

Keywords: Drug Consumption Facilities

Shelf Number: 146135


Author: Lefas, Melissa

Title: Rehabilitating Juvenile Violent Extremist Offenders in Detention: Advancing a Juvenile Justice Approach

Summary: Juvenile justice standards and norms are the foundational basis for detaining, rehabilitating, and reintegrating juvenile violent extremist offenders (JVEOs). Children in conflict with the law are recognized as a distinct class of offender in the criminal justice process on account of their mental, intellectual, and physical maturity. International juvenile justice standards and norms accordingly prioritize rehabilitative measures and extend special oversight and protection to incarcerated children, given their particular vulnerabilities and risk of abuse in custodial environments. Principles call for juveniles to be housed and treated separately from adults and to use incarceration as a measure of last resort. The standards should be upheld for all children, regardless of the nature or severity of their offense. Within this class, JVEOs, like adult violent extremist offenders (VEOs), are a special-needs offender category who make up a heterogeneous group; their pathways to criminality vary widely, as do the severity of their crimes. Societal bias, sensationalism, and exceptionalism often associated with terrorism and violent extremism-related offenders compound the risk of maltreatment for JVEOs. For this reason, authorities should pay special attention to ensure protections for juveniles extend to JVEOs and take steps towards their rehabilitation and reintegration. JVEOs include youth who engage in terrorism and related crimes across a broad spectrum of ideological agendas. Though underlying drivers may be similar to those of adults, they also differ on account of age. A child’s relative immaturity of judgment, diminished sense of self-control, and propensity to act impulsively without a full understanding of the consequences distinguishes juvenile from adult offenders. Terrorist groups have actively targeted youth for recruitment.10 The severity of JVEOs' crimes also vary. Although the terms "violent" and "extremist" appear in the designation, JVEOs may not have partaken in any violent act nor have they necessarily been radicalized. For instance, the transfer of funds or serving as a courier for a terrorist group are non-violent crimes which a JVEO may be convicted of. Other JVEOs may be motivated by financial rewards or were forced to join a violent extremist organization and have not necessarily been radicalized. Juveniles perpetrating terrorism-related crimes are often characterized by a duality of circumstance: they are both victimizers and victims. This policy brief provides guidance for authorities around the world responsible for JVEOs being held in post-conviction detention, either in a juvenile detention facility or prison. Consistent with due regard to the dignity and rights of the child, JVEOs subject to correctional measures should be treated effectively, fairly, and humanely. Management practices must take into account the special needs of JVEOs in the design and implementation of juvenile rehabilitation and reintegration interventions. This responsibility falls most heavily on the various actors in the prison and juvenile justice system.

Details: Washington, DC: Global Center on Cooperative Security; The Hague: International Centre for Counter-Terrorism, 2016. 12p.

Source: Internet Resource: Policy Brief, 2016: Accessed December 16, 2016 at: http://www.globalcenter.org/wp-content/uploads/2016/12/16Dec6_JVEO_Policy-Brief_FINAL.pdf

Year: 2016

Country: International

Keywords: Extremism

Shelf Number: 140498


Author: Lefas, Melissa

Title: Delivering Justice: Views from Supreme Courts on Countering Terrorism

Summary: Supreme court justices play an important role in strengthening state capacities to bring terrorists to justice within the framework of human rights and the rule of law. As final arbiters, justices seated at the highest courts of law are the nation’s safeguards of the rule of law and human rights, especially when the executive and legislative branches favor national security over these individual rights. The report synthesizes the discussions held with supreme court justices over the course of an 18-month program in the Euro-Med region (Europe, the Middle East, and North Africa), implemented in partnership with UN Counter-Terrorism Committee Executive Directorate (CTED) and funded by the European Commission. The program aimed to create a sustainable, nonpolitical forum for supreme court-level and senior judicial officials to discuss, among equals, questions of law arising from terrorism-related cases and to share strategies, frameworks, and good practices for handling these cases over the course of five consultations. The final component of the program brought the First Presidents of the Cassation Courts of Lebanon and Tunisia, as well as other supreme court justices, to discuss their views on how the international community should respond to the threat of terrorism in an open briefing before CTED at the UN headquarters, held in March 2016. The report is organized around priority issue areas raised by the justices over the course of the program and includes case studies, best practices, and legal commentary on possible resolutions to the common challenges they face in the adjudication of terrorism cases. It further describes a series of international and regional initiatives to support the judiciary, reflecting on the value of interjudicial exchanges in this domain.

Details: Washington, DC: Global Center on Cooperative Security, 2016. 44p.

Source: Internet Resource: Accessed December 16, 2016 at: http://www.globalcenter.org/wp-content/uploads/2016/12/2016-December-Delivering-Justice.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 140500


Author: Brooker, Stephen

Title: Challenges to Providing Mental Health Care in Immigration Detention

Summary: The global expansion of immigration detention systems creates an imperative for the mental health community to develop specialized models and practices of care. The harmful psychological effects of immigration detention and repeated findings that this practice results in breaches of human rights principles create a complex care setting. The authors employ lessons learned from their professional experiences in Australia, findings in specialized literature, and testimony from health workers and detainees to argue that immigration detention exhibits the qualities of an invalidating environment, wherein responses to a person’s emotional experiences are often inappropriate or inconsistent. In such settings the communication of emotional distress is generally ignored or responded to negatively with increasingly harsh responses that fail to address the cause of the distress. An invalidating environment promotes emotional and behavioural dysregulation, which is consistent with the experiences of many people held in immigration detention. Work by mental health professionals provides an important framework for understanding the corrosive nature of immigration detention and suggests a range of clinical approaches that may be adapted to assist in developing resilience to such settings.

Details: Geneva, SWIT: Global Detention Project, 2016. 24p.

Source: Internet Resource: Global Detention Project Working Paper No. 19: Accessed December 16, 2016 at: https://www.globaldetentionproject.org/challenges-to-providing-mental-health-care-in-immigration-detention-global-detention-project-working-paper-no-19

Year: 2016

Country: International

Keywords: Illegal Immigrants

Shelf Number: 140502


Author: Starling, Boris

Title: The Tide Effect: How the world is changing its mind on cannabis legalisation

Summary: The people of California have just voted to legalise cannabis – a decision which will have immense repercussions both in America and around the world, while efforts are already underway in Canada to legally regulate the cannabis market. The Tide Effect argues strongly that the UK should follow suit, and that the legalisation of cannabis here is both overdue and imperative. The eight main points outlined in The Tide Effect are: 1. The government strategy is based around three main pillars: reducing demand, restricting supply and building recovery. All three are failing. 2. Regulation is substantially more desirable than simple decriminalisation or unregulated legalisation, because only regulation addresses all four key issues: ensuring that the product meets acceptable standards of quality and purity; removing criminal gangs from the equation as far as possible; raising revenue for the Treasury through point-of-sale taxation; and best protecting public health. 3. The entire language used to address cannabis-related issues needs to change. Language poses a barrier every bit as formidable as legislation does. The opponents of legalisation have long been able to reinforce their position by using the words of public fear – ‘illegal,’ ‘criminal’, ‘dangerous’, and so on. Only by using the language of public health, consumer rights and harm reduction, the same language used about alcohol and tobacco, can we move towards regulation. 4. The scale of a legalised industry will be huge. The US market is estimated to be worth $25bn by the time of the next election in 2020. A similarly regulated UK market could be worth around £7bn per annum. 5. Legally regulating cannabis will allow long-term studies of its health effects not currently possible. The effects of both tobacco and alcohol are well understood because of the amount of scientific scrutiny brought to bear on them. 6. Many shifts in public policy are prompted, or at least prodded, by an emotional response on the part of the public. Greater efforts must be made to show that the cannabis issue also has a human aspect to which many people respond. 7. Any campaign to legalise cannabis must be multifaceted, involving public support, media analysis and political engagement. 8. Responsibility for cannabis policy should be moved primarily to the department for Health, while the role of the Home Office should change from enforcement of prohibition to enforcement of regulation and licensing

Details: London: Adam Smith Research Trust, 2016. 60p.

Source: Internet Resource: Accessed December 16, 2016 at: https://static1.squarespace.com/static/56eddde762cd9413e151ac92/t/582eecc6e3df2844237ca6dc/1479470281332/The+Tide+Effect+WEB+VERSION.pdf

Year: 2016

Country: International

Keywords: Cannabis

Shelf Number: 140509


Author: Kleinschmit, Daniela

Title: Illegal logging and related timber trade: dimensions, drivers, impacts and responses

Summary: This report entitled "Illegal Logging and Related Timber Trade: Dimensions, Drivers, Impacts and Responses" presents the results of the fifth global scientific assessment undertaken by the GFEP initiative. The report set out to gain deeper understanding of the meaning of illegal logging and related timber trade, its scale, drivers and consequences. It provides a structured synthesis of available scientific and expert knowledge on illegal logging and associated timber trade while adding to existing studies and reports by sharing new insights, including a criminology perspective and new information about timber and timber product trade flows as well as exploring future policy options and governance responses. This assessment report and the accompanying policy brief provide an authoritative source of information for policymakers and stakeholders involved in the fight against illegal logging and associated timber trade, in order to support effective action in tackling this pressing global problem.

Details: Vienna: International Union of Forest Research Organizations (IUFRO), 2016. 148p.

Source: Internet Resource: Accessed IUFRO World Series Volume 35: Accessed December 20, 2016 at: http://www.illegal-logging.info/sites/files/chlogging/IUFRO_illegallogging.pdf

Year: 2016

Country: International

Keywords: Forests

Shelf Number: 146000


Author: Carling, Jorgen

Title: Beyond Definitions: Global migration and the smuggling–trafficking nexus

Summary: This discussion paper explores the rise of mixed, irregular migration with particular focus on the role of smuggling and trafficking in both facilitating that movement and influencing its impact. It explains the current migration context followed by a discussion and analysis of the smuggling-trafficking nexus. Emerging characteristics of irregular migration suggest that changing realities are challenging the limits of existing terminology and understanding around these activities. Current legal concepts and structures are struggling - and sometimes completely unable - to capture the complexity of what is happening. Migrants are facing increased risks in terms of greater vulnerability and less protection, not least through a shrinking of the asylum space. Understanding migrant smuggling and human trafficking as part of a wider phenomenon within classic economic dynamics of supply and demand is critical to developing migration policy that is not diverted by misuse of terminology and that maintains an appropriate focus on the rights of migrants and corresponding obligations of States. An understanding of how and why smuggling and trafficking occur also lays bare the costs to the modern liberal State of waging 'war' against an enemy that can only ever be defeated through the continuous deployment of massive force and denial of basic rights. The paper brings together the insights of three experts who have worked as practitioners and researchers on mixed migration, smuggling and trafficking within diverse geographical and disciplinary perspectives.

Details: Nairobi: Regional Mixed Migration Secretariat, 2015. 12p.

Source: Internet Resource: RMMS Discussion Paper, 2: Accessed December 21, 2016 at: http://file.prio.no/Publication_files/Prio/Carling%20et%20al%202015%20-%20Beyond%20definitions.pdf

Year: 2015

Country: International

Keywords: Human Smuggling

Shelf Number: 146007


Author: Freeman, Marilyn

Title: Parental Child Abduction: The Long-Term Effects

Summary: This small-scale qualitative study was undertaken to investigate the lived experiences of those who were abducted many years earlier. The aim was to learn whether, and how, in the views of the participants, these abductions had affected their lives, and whether such effects had continued long-term. The study is based on personal interviews undertaken by the principal investigator with 34 participants including three sets of abducted children and one set of an abducted child and non-abducted sibling. The interviews took place principally in England and the USA in 2011–2012, with an opportunity for updating by email provided in 2014. The study found that a high proportion of the participants reported suffering very significant effects from their abductions in terms of their mental health, and that these effects were ongoing into their adult lives very many years after the abduction. These findings tend, therefore, to support those from earlier studies about the long-lasting effects of abduction which are emphasised in this project by the direct reporting of the abducted children, as adults, long after the event. The study concludes that, as the effects of abducted can be seriously negative and long-lasting, more must be done to protect children against abduction and its effects. Recommendations are made relating to the prevention of abduction, reunification when abduction occurs, and support for abducted children and their families including where the abducted child is not found, or is not returned to the State of habitual residence, as well as when the child is reunified with the left-behind family.

Details: Bushey Heats, Herts, UK: International Centre for Family Law and Practice, 2014. 40p.

Source: Internet Resource: Accessed December 21, 2016 at: http://www.famlawandpractice.com/researchers/longtermeffects.pdf

Year: 2014

Country: International

Keywords: Child Abduction

Shelf Number: 147764


Author: International NGO Council on Violence Against Children

Title: 10 Years On: Global Progress & Delay in Ending Violence Against Children - The Rhetoric & the Reality

Summary: The International NGO Council on Violence Against Children formed in 2007, to support strong and effective follow-up to the UN Study on Violence against Children. Now, as the Sustainable Development Goals adopt the call to end all violence against children and the Global Partnership to End Violence Against Children take up the mantle of pursuing this goal, the NGO Council publishes its fourth and final report: a warts and all account of the progress made and the work that lies ahead to end violence against children. In the ten years since the Study was published, we have made great strides in learning about the violence that affects children around the world and we have seen great advances in combating some of those forms of violence. Yet for many children, violence is an ever present fact of life. Where progress has been made, it remains tainted by its limitations: the rates at which children are subjected to female genital mutilation are falling rapidly, but because of population increases, the number of women and girls who have experienced this form of violence are actually increasing. The number of countries that have legally prohibited all forms of corporal punishment of children has tripled since the Study was published, yet an estimated one billion children still experience physical violence in the home on a regular basis. Children in detention are among the most vulnerable to violence, and while detention rates in many of the world's juvenile justice systems have fallen sharply over the last decade, we are seeing the detention of children in immigration systems increasing and taking on new forms. Perhaps worse still, many of the most severe forms of violence children experience remain legal, whether in the 14 States that still allow the death penalty for children, the 22 countries that still legally permit certain forms of female genital mutilation, or the 93 that allow girls to marry before the age of 18. The Violence Study set 2009 as a deadline to legally prohibit all of these practices, but we are still far from this goal. The persistence of violence against children is a challenge to us all: why have we not been able to achieve change quickly enough? The contributions from key global experts on violence against children point to some hard truths about our failings, but also to the way ahead. We have failed to effectively challenge the social acceptance of so many forms of violence and struggled to achieve the legal prohibition of all forms of violence that is a necessary basis for eliminating these practices. If we are to realise goal 16.2 of the SDGs to end all forms of violence against children by 2030, we must learn these lessons of our efforts so far.

Details: s.l.: The Council, 2016. 44p.

Source: Internet Resource: Accessed December 22, 2016 at: http://www.wvi.org/sites/default/files/Int_NGO_Council_VAC_Report2016.pdf

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 147788


Author: Grace, Anita

Title: Organized Urban Violence: An Examination of the Threat of Organized Armed Groups to Urban Environments

Summary: This research contributes to the assessment of urban violence by developing a category of urban violence, namely organized urban violence (OUV), defined as that which is generated by urban non-state organized armed groups (OAGs) who exert territorial and social control in urban areas. Through detailed examination of academic and policy literature, this thesis explores the types of non-state OAGs involved in urban violence – such as private security companies (PSCs), vigilantes, gangs, and organized crime groups – their characteristics and their impacts on urban environments. The category of OUV is further developed through two case studies: Rio de Janeiro, Brazil and Cape Town, South Africa – cities which have a proliferation of urban non-state OAGs and high levels of urban violence.

Details: Ottawa: Saint Paul University, 2011. 158p.

Source: Internet Resource: Thesis: Accessed December 23, 2016 at: https://www.ruor.uottawa.ca/handle/10393/20009

Year: 2011

Country: International

Keywords: Gang-Related Violence

Shelf Number: 147787


Author: United Nations Office of Drugs and Crime

Title: Global Report on Trafficking in Persons: 2016

Summary: The 2016 UNODC Global Report on Trafficking in Persons is the third of its kind mandated by the General Assembly through the 2010 United Nations Global Plan of Action to Combat Trafficking in Persons. It covers 136 countries and provides an overview of patterns and flows of trafficking in persons at global, regional and national levels, based primarily on trafficking cases detected between 2012 and 2014. As UNODC has been systematically collecting data on trafficking in persons for more than a decade, trend information is presented for a broad range of indicators. The thematic chapter of the 2016 edition of the Global Report looks at how migrants and refugees can be vulnerable to trafficking in persons, en route or at destination. It also analyses the particular condition of people escaping war, conflict and persecution. Most countries have passed legislation that criminalizes trafficking in persons as a specific offence; many have done so recently. The Global Report shows that there is a relation between how long a country has had proper trafficking legislation on its books, and how many convictions it reports. Countries with longer-standing legislation record, on average, more convictions. That said, the overall criminal justice response to trafficking in persons, which has historically been very weak, has not improved significantly.

Details: New York: UNODC, 2016. 126p.

Source: Internet Resource: Accessed December 23, 2016 at: http://www.unodc.org/documents/data-and-analysis/glotip/2016_Global_Report_on_Trafficking_in_Persons.pdf

Year: 2016

Country: International

Keywords: Human Smuggling

Shelf Number: 144837


Author: Klausen, Jytte

Title: Finding Online Extremists in Social Networks

Summary: Online extremists in social networks pose a new form of threat to the general public. These extremists range from cyberbullies who harass innocent users to terrorist organizations such as the Islamic State of Iraq and Syria (ISIS) that use social networks to recruit and incite violence. Currently social networks suspend the accounts of such extremists in response to user complaints. The challenge is that these extremist users simply create new accounts and continue their activities. In this work we present a new set of operational capabilities to deal with the threat posed by online extremists in social networks. Using data from several hundred thousand extremist accounts on Twitter, we develop a behavioral model for these users, in particular what their accounts look like and who they connect with. This model is used to identify new extremist accounts by predicting if they will be suspended for extremist activity. We also use this model to track existing extremist users as they create new accounts by identifying if two accounts belong to the same user. Finally, we present a model for searching the social network to efficiently find suspended users' new accounts based on a variant of the classic Polya's urn setup. We find a simple characterization of the optimal search policy for this model under fairly general conditions. Our urn model and main theoretical results generalize easily to search problems in other fields.

Details: Unpublished paper, 2016. 49p.

Source: Internet Resource: Accessed December 23, 2016 at: https://pdfs.semanticscholar.org/3a42/19deb22b90f807cec920ade6470a7bd44c3b.pdf

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 147812


Author: Agreste, Santa

Title: Network Structure and Resilience of Mafia Syndicates

Summary: In this paper we present the results of the study of Sicilian Mafia organization by using Social Network Analysis. The study investigates the network structure of a Mafia organization, describing its evolution and highlighting its plasticity to interventions targeting membership and its resilience to disruption caused by police operations. We analyze two different datasets about Mafia gangs built by examining different digital trails and judicial documents spanning a period of ten years: the former dataset includes the phone contacts among suspected individuals, the latter is constituted by the relationships among individuals actively involved in various criminal offenses. Our report illustrates the limits of traditional investigation methods like tapping: criminals high up in the organization hierarchy do not occupy the most central positions in the criminal network, and oftentimes do not appear in the reconstructed criminal network at all. However, we also suggest possible strategies of intervention, as we show that although criminal networks (i.e., the network encoding mobsters and crime relationships) are extremely resilient to different kind of attacks, contact networks (i.e., the network reporting suspects and reciprocated phone calls) are much more vulnerable and their analysis can yield extremely valuable insights.

Details: Unpublished paper, 2015. 22p.

Source: Internet Resource: Accessed December 23, 2016 at: https://arxiv.org/pdf/1509.01608v1.pdf

Year: 2015

Country: International

Keywords: Criminal Networks

Shelf Number: 147811


Author: International Alert

Title: The New Deal's Peacebuilding and Statebuilding Goals and Organised Crime

Summary: Organised crime is frequently listed as one driver and manifestation of the contemporary forms of violence discussed above that is increasing (although it must be emphasised that crime and violence are not always necessarily linked). Therefore, we have chosen to focus on the impact that organised criminality has on political and social instability, particularly its potential to exacerbate conflict drivers and perpetuate fragility. Recent research has provided convincing evidence that this problem is worsening, in part because ‘globalization has reduced the costs of criminal risk arbitrage, leading to a convergence of zones of crime, corruption and weak rule of law’.16 Of course, the country-specific dynamics of how criminal violence and organised crime affects the social infrastructure of a country, and thereby its fragility, depends on the market and the strength of the institutions in any given context. However, broadly speaking, settings with institutional fragmentation, weak interpersonal ties, high inequality and a poorly functioning state tend to appeal to criminal actors, who see opportunities within these socio-political gaps.17 Many fragile states already suffer from some, if not all, of the above. Thus, organised crime has the potential to further contribute to fragility by intervening in what are often fraught relationships between state and society, as well as between citizens themselves. At the same time, the characteristics and occurrence of criminal violence in states not classified as fragile mean that the notion of fragility as a result of absent or illegitimate statehood also needs to be re-examined.

Details: London: International Alert, 2013. 40p.

Source: Internet Resource: Accessed December 23, 2016 at: http://www.international-alert.org/sites/default/files/DVC_PSGsOrganisedCrime_EN_2013.pdf

Year: 2013

Country: International

Keywords: Organized Crime

Shelf Number: 131636


Author: Marshall, Ineke Haen

Title: Youth Victimization and Reporting to Police: First Results from the Third Round of the International Self-Report Delinquency Study (ISRD3)

Summary: The young are often considered our greatest resource; children are viewed as human capital that society depends on for continued growth and sustainability. Children also deserve special protection against violence (United Nations 1990; Council of Europe 2012). That is why we are willing to invest a lot in improving youth policies, building better educational systems, stronger families, and happier communities. Children are also the cause of great worries among parents, educators, police and other adults, particularly during the teenage years, which are times of turmoil and transition, when youth rebel against adults, get involved in risky behavior, and start experimenting with illegal behavior. Young people are also quite vulnerable to being exploited and victimized, not only by strangers, but also by their peers, their parents, or other trusted adults. This report provides some international evidence about their experiences. The third round of the International Self-Report Delinquency (ISRD3) project asks children from 7th, 8th and 9th grade (12-16 year olds) in over 30 countries about their experiences as victims of crime and as offenders; it also asks about their everyday lives and attitudes. In this report we present the first findings for the 15 countries for which preliminary comparative data are available. Thus, this first findings report is based on the participation of more than 38,000 young people in cities or regions of Belgium, Bosnia-Herzegovina, Croatia, the Czech Republic, Denmark, Estonia, Finland, Germany, Italy, Kosovo, Lithuania, Serbia, Switzerland, Ukraine and Venezuela. Each country organized its own fieldwork and translation, following a joint research protocol. The surveys were completed in schools, either online or through paper and pencil questionnaires. For more information on the methodology, see Table 1 below. The survey should not be considered representative of the whole population of young people in these countries but instead of 7th to 9th grade students in those cities or regions in which the data were collected. The selection of countries included in this primary report reflect the practical sequence of data collection rather than any substantial consideration regarding which countries are of interest to compare. In incorporating questions about offending, the survey combines the methods of self-report delinquency surveys and of victimization surveys. The primary goal of the ISRD project is the analysis of risk factors of juvenile delinquency in a manner that enables us to factor in national differences and contextual sources of influence. Secondarily, the project produces information that gives local stakeholders information about the specific patterns of youth crime in their areas. In addition to these goals, the project enables the comparison of delinquency patterns in various areas and cities. In this primary report, we focus on the third set of findings, planning to undertake more detailed risk factor analyses when more countries are in the dataset.

Details: Boston: Northeastern University, 2015. 24p.

Source: Internet Resource: ISRD3 Technical Report Series #3: Accessed January 25, 2017 at: http://www.northeastern.edu/isrd/wp-content/uploads/2016/01/ISRD3_TechRep_03.pdf

Year: 2015

Country: International

Keywords: Criminal Justice Statistics

Shelf Number: 147804


Author: Ralby, Ian M.

Title: Downstream Oil Theft: Global Modalities, Trends, and Remedies

Summary: At peak prices, tapping a Mexican pipeline of refined oil for only seven minutes could earn a cartel $90,000. In 2012 alone, hydrocarbons fraud cost the European Union €4 billion in lost revenues. In Nigeria, 30 percent of all hydrocarbons products are smuggled into neighboring states. An estimated 660,000 cars in Morocco and Tunisia run all year long on fuel smuggled from Algeria. In its first year, a fuel marking and vehicle tracking program in Uganda reduced the amount of adulterated fuel from 29 percent to as little as 1 percent. But at the same time, the regulators who test the state’s fuel marking program routinely steal 22 liters per truckload, amounting to 1.2 million liters per year at one border crossing alone. Theft, fraud, smuggling, laundering, corruption. Hydrocarbons crime, in all its forms, has become a significant threat not only to local and regional prosperity but also to global stability and security. Combating this pervasive criminal activity is made only more difficult by the reality that many of those in a position to curb hydrocarbons crime are the ones benefiting from it. This is the first major study of refined oil theft around the globe, and while Part I provides only a limited snapshot of the problem, it offers useful insight into the modalities of theft, the culprits responsible, the stakeholders who suffer, and the approaches that could change the illicit dynamics. Part I examines the contours of illicit hydrocarbons activity in ten case studies: Mexico, Nigeria, Ghana, Morocco, Uganda, Mozambique, Thailand, Azerbaijan, Turkey, and the European Union (including the United Kingdom). The modalities of theft across these geographically and contextually disparate cases range from low-level tapping, siphoning, adulteration, and smuggling to extremely sophisticated maritime operations involving extensive networks of actors to brazenly corrupt dynamics in which states lose billions of dollars per year while their officials profit from those losses. Illicit activity is highest in states where oil is refined, but the most common determinant of oil theft is a significant price discrepancy between one state and its neighbor. Other factors in neighboring states— instability, currency imbalances, and lack of border controls—also impact the extent to which a state experiences downstream illicit activity. Areas where there are few fuel distribution centers are particularly ripe for organized criminal groups to fill the void. At the same time, security forces, regulatory authorities, company insiders, terminal workers, and officials at every level are all potential participants in illicit hydrocarbons schemes that rob governments of revenue and enrich the individuals involved. Some mitigation efforts—most notably fuel marking and vehicle tracking—have proved extremely useful in efforts to stem illicit activity and regain lost tax revenue. But others, including closing borders, have had little, if any, effect. This report is divided into three parts. The first focuses on the culprits, modalities, and amounts of downstream illicit hydrocarbons activity. It details each of the case studies and examines the forms of hydrocarbons crime, highlighting who benefits, who suffers, and, to the extent possible, how much is being lost by governments in the process. Part II draws on the details of the case studies to analyze trends in the global illicit market. Part III then focuses on the various stakeholders and their reasons and opportunities for mitigation, and provides concrete recommendations about what might be done. Fuel is vital to human life, and everyone wants a discount. Across the globe, people are willing to break the law in order to pursue that discount. The global scourge of illicit downstream hydrocarbons activity remains relatively invisible. This study, in shining a light on it, constitutes the first step toward effectively addressing this pervasive, yet unrecognized threat to global security, stability, and prosperity.

Details: Washington, DC: Atlantic Council, Global Energy Center, 2017. 116p.

Source: Internet Resource: Accessed January 25, 2017 at: http://www.atlanticcouncil.org/images/publications/Downstream_Oil_Theft_web_0106.pdf

Year: 2017

Country: International

Keywords: Natural Resources

Shelf Number: 147797


Author: Mehra, Tanya

Title: Foreign Terrorist Fighters: Trends, Dynamics and Policy Responses

Summary: This paper, which was developed for the Global Counterterrorism Forum's Foreign Terrorist Fighters Working Group, takes stock of the current trends and dynamics related to the FTF phenomenon and identifies some of the gaps that still need to be addressed. The distinction between home-grown terrorists and (returning) FTFs is fading, the difference between ISIL/Da’esh inspired or directed terrorist attacks is becoming more fluid and the nexus between terrorism and crime is more prominent, which clearly indicates that terrorism can manifest itself in many different ways. The involvement of returning FTFs in some terrorist attacks is a stark reminder of the potential threat returning FTFs pose. The data also indicate a demographic change with a more prominent role of female FTFs and children being recruited and used in hostilities or involved in terrorist attacks. The current trends underline the need for a comprehensive, tailored and multidisciplinary approach including the involvement of stakeholders at the local level to adequately address the evolving aspects of the FTF phenomenon.

Details: The Hague: International Centre for Counter-Terrorism, (ICCT), 2016. 33p.

Source: Internet Resource: ICCT Policy Brief: Accessed January 26, 2017 at: https://icct.nl/wp-content/uploads/2016/12/ICCT-Mehra-FTF-Dec2016-1.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145432


Author: Collin, Matthew

Title: The Impact of Anti-Money Laundering Regulation on Payment Flows: Evidence from SWIFT Data

Summary: Regulatory pressure on international banks to fight money laundering (ML) and terrorist financing (TF) increased substantially in the past decade. At the same time there has been a rise in the number of complaints of banks denying transactions or closing the accounts of customers either based in high risk countries or attempting to send money there, a process known as de-risking. In this paper, we investigate the impact of an increase in regulatory risk, driven by the inclusion of countries on an internationally-recognized list of high risk jurisdictions, on subsequent cross-border payments. We find countries that have been added to a high risk greylist face up to a 10% decline in the number of cross border payments received from other jurisdictions, but no change in the number sent. We also find that a greylisted country is more likely to see a decline in payments from other countries with weak AML/CFT institutions. We find limited evidence that these effects manifest in cross border trade or other flows. Given that countries that are placed on these lists tend to be poorer on average, these impacts are likely to be more strongly felt in developing countries.

Details: Washington, DC: Center for Global Development, 2016. 52p.

Source: Internet Resource: Working Paper 445: Accessed January 27, 2017 at: http://www.cgdev.org/sites/default/files/impact-anti-money-laundering-SWIFT-data.pdf

Year: 2016

Country: International

Keywords: Financial Crime

Shelf Number: 145092


Author: Global Initiative Against Transnational Organized Crime

Title: Development Responses to Organized Crime: new agendas, new opportunities

Summary: There are a number of signifcant policy processes advancing that are changing the way that development actors will engage with organized crime programming. The adoption of the 2030 Agenda for Sustainable Development (ASD2030) by the General Assembly on the 25 September 2015 places the issue of organized crime firmly within the realm and mandate of development actors. The shifts in the rules for recording development assistance contributions under the revised Financing for Development framework and the clarification of the ODA rules will make it easier for development actors to engage in programming directly related to tackling organized crime, mitigating its impact and building the resilience of communities to criminal flows. In addition, as preparation for the 2016 United Nations General Assembly Special Session on Drugs (UNGASS) intensifies, this will shine a spotlight on the debates around what are the appropriate responses to transnational organized crime, and how we achieve balanced, integrated approach that can include both criminal justice, security and development responses. The Development Dialogue is a process that the Global Initiative has facilitated since early 2013, and it is clear that a lot of ground has been covered since those initial discussions, in which development actors were only beginning to come to terms with organized crime, and the evidence base was still largely yet to be determined. A number of the most pressing challenges which the international community and individual states are grappling with have highlighted the importance: illicit migration, but also debates around reducing the harm from drug trafficking, or protecting key species from extinction for example. This conference is the fourth meeting of the Development Dialogue: the first was held in the Hague in April 2013, the second in Berlin in November 2014, and the third in Oslo in March 2015.1 In each meeting, the hosting country partnered with the Global Initiative to use the discussion to learn from thematic and regional specialist, and to raise awareness and catalyze the debate internally. In a small way, this has contributed to the growing momentum around the debate, and has provided policymakers an opportunity to benchmark and compare approaches. This meeting brought together some 50 policymakers, experts and development practitioners at the HMS President facility in London, offered by the UK Ministry of Defense, and co-hosted between the Global Initiative and the UK’s Department for International Development. Representatives from twelve separate UK Government departments participated in the meeting, highlighting how wide the debate has become, and the ever-increasing need to build bridges between different departments, build a common language and create whole of government approaches. The meeting was held under the Chatham House rule. The debate has unquestionably progressed. The ASD2030 outcome shows us is that there is no longer a question that development actors have a role to play in countering organized crime – this was less clear when the Development Dialogue process began – but the challenge remains complex, without simple solutions. Debating the complexity, discarding simple solutions, innovating new response and seeking ways to measure progress are the key things on the agenda now, and there is a hope that the Development Dialogue can continue to add value to that process.

Details: Geneva, SWIT: Global Initiative Against Organized Crime, 2015. 29p.

Source: Internet Resource: A Conference Report: Accessed January 27, 2017 at: http://globalinitiative.net/wp-content/uploads/2015/11/2015-Crime.pdf

Year: 2015

Country: International

Keywords: Drug Trafficking

Shelf Number: 144927


Author: Keatinge, Tom

Title: Lone-Actor and Small Cell Terrorist Attacks: A New Front in Counter-Terrorist Finance?

Summary: As the threat from lone-actor and small cell terrorism evolves, this paper examines the financing of both disrupted and successful plots since 2000 in Great Britain, France and Australia. These plots often require minimal amounts of funding, making proactive identification through financial means challenging. Nonetheless, this paper highlights a number of key themes that warrant further investigation, showing the potentially disruptive role that financial intelligence can play. Efforts to disrupt the funding of Daesh have taken up a significant amount of the time and resources of policymakers, law enforcement and the military. These efforts have also involved mobilising the private sector, particularly banks, oil companies and antiquities dealers. However, little attention has been paid to understanding and addressing the financing associated with the plots (whether successful, failed or disrupted) of lone actors and small cells that have acted beyond Daesh-controlled territory. This paper seeks to provide insight into the financing connected with a sample of 63 lone-actor and small cell terrorist plots in Great Britain and France since 2000, including those that are religiously inspired, right wing, nationalist, and single issue. The aim is to inform thinking and raise awareness among those charged with tackling this threat. The report also draws on a similar study by Australia's financial intelligence unit, AUSTRAC, thereby providing an overview of lone-actor and small cell terrorist finance from the perspective of three countries, each with individual and distinct experiences. What is clear from both studies is that the simplicity and spontaneity of these attacks, particularly those attempted by a lone assailant as opposed to a dyad or triad, means that assailants are often able to make use of their own funding resources, offering limited opportunities for traditional counter-terrorist financing (CTF) approaches to reveal financial indications of plans prior to their execution. Despite this challenge, the research conducted for this paper has highlighted a number of key themes that it is hoped can contribute to the approaches taken by law enforcement and security authorities as they adapt their CTF response to the evolving threat posed by such terrorists: While there has been an undoubted need to focus on disrupting the significant financing accrued by Daesh over the past two years, a comprehensive CTF strategy should not lose sight of the fact that lone actors and small cells operating at home present a considerably more immediate threat to citizens than Daesh, given that the latter mainly operates in Iraq and Syria. Although it has traditionally been the case in many countries that terrorist financing has been addressed separately from broader financial crime, the increasing intersection of lone actors and small cells with low-level criminality suggests that this separation needs to be reconsidered. Investigations need to at least acknowledge this emerging connection and create dedicated inter-agency links to combat it. Attacks undertaken with knives have certainly resulted in casualties; however, the use of firearms (particularly automatic weapons) has resulted in casualties on a far greater scale. As such, increased focus should be placed on identifying and disrupting financial flows related to the trade in illicit firearms. Information about the financial tools employed by lone actors and small cells must be more widely disseminated to raise awareness among those agencies and actors = in both the public and private sectors - who are less familiar with terrorist financing techniques. These might include certain types of retailer, payday lenders and student loan companies, as well as online payment systems that may increasingly be the target of terrorist-related fraud. Closer monitoring of the welfare system is also advised, in light of cases identified where benefits were used to fund terrorist plots. The financial patterns of lone actors and small cell operators are often indistinguishable from legitimate financial behaviour, and proactive identification of these individuals through financial reporting remains challenging. National financial intelligence units must therefore act as a critical bridge between national security and law enforcement agencies (that identify subjects of interest via non-financial means) and the private sector, to allow financial institutions to conduct more targeted monitoring.

Details: London: Royal United Services Institute for Defence and Security Studies, 2017. 36p.

Source: Internet Resource: Occasional Paper: Accessed January 30, 2017 at: https://rusi.org/sites/default/files/201701_op_lone-actor_and_small_cell_terrorist_attacks.1.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145541


Author: Global Initiative Against Transnational Organized Crime

Title: Development Responses to Organized Crime: An analysis and programme framework

Summary: With the approval of the Sustainable Development Goals 2030, development actors are increasingly both recognising the need and being called upon to respond to the challenges of organised crime and its impact. But there remains a significant lacuna on what the implications are for how development programming should be delivered. This framework is an attempt to shift to a situation where development actors are proactively acknowledging and addressing crime and criminal actors in their work. This framework provides a three-step exercise, which attempts to move beyond traditional approaches by offering • a means for policy-focused analysis, • a structure through which responses can be prioritised using the nature of the impact and harm caused as the primary lens of analysis, and • a set of programmatic responses that are sensitive to opportunities and entry points for engagement.

Details: Geneva, SWIT: The Global Initiative against Transnational Organized Crime, 2016. 45p.

Source: Internet Resource: Accessed January 30, 2017 at: http://globalinitiative.net/wp-content/uploads/2016/04/Global-Initiative-Assessment-and-Programmign-Tool-for-Organized-Crime-and-Development-April-2016.pdf

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 147338


Author: Nasser Saidi Associates

Title: Taxation, Illicit Trade in Tobacco Products and Finance of Terrorism

Summary: This White Paper addresses two important issues relevant to imposing and increasing excise taxes on tobacco: (a) the need to avoid sudden, large tax hikes that would lead to an increase in illicit trade and (b) as a result provide financing to organised crime groups (OCGs) and terrorist organisations operating in or out of the Middle East region. The vastness of the illicit trade network is evident in the fact that trade in illicit (and untaxed) tobacco recently became the fourth-largest global tobacco business by volume, just behind British American Tobacco, Philip Morris International and Japan Tobacco International. The GCC countries currently have relatively low illicit penetration rates, but are wedged between the tobacco industry’s established smuggling centres. Tariff and tax induced price differentials along with the lack of secure borders within the Middle East are a major driver of illicit trade. We find that an increase in ad-valorem taxes could lead to a massive spread (of more than USD 1 million per container) in cigarette prices between the lowest and highest markets across the region: a definite incentive for a surge in illicit trade.

Details: a.l.: Nasser Saidi & Associates, 2015. 15p.

Source: Internet Resource: Accessed January 30, 2017 at: http://www.thecre.com/ccsf/wp-content/uploads/2015/11/Tax-Illicit-Trade-and-Terrorism-June-2015-Final-English-Version.pdf

Year: 2015

Country: International

Keywords: Illicit Trade

Shelf Number: 140763


Author: Hansen, Randall

Title: Constrained by its Roots: How the Origins of the Global Asylum System Limit Contemporary Protection

Summary: Territorial asylum—the principle that a refugee must reach the territory of a host country in order to lodge a protection claim—has evolved as the principal mechanism for providing humanitarian protection. However, the refugee regime was designed to cope with regular, manageable outflows, not mass displacement. With unprecedented global displacement, with 65.3 million displaced persons in 2015, the territorial asylum system is overwhelmed. And fewer than 1 percent of displaced people in need of protection are resettled annually. Making access to protection contingent upon access to territory has been criticized as at best inefficient, and at worst deadly. It creates powerful incentives for asylum seekers to undertake dangerous, illegal journeys, often at the hands of smugglers, which come at high human and financial costs. But efforts to decouple access to territory from access to protection—either by processing applications in countries of first asylum or at consulates, or by resettling people directly from countries of first asylum—have remained small in scale. This Transatlantic Council on Migration report considers whether there are viable alternatives to territorial asylum, and explores how they might be implemented. Among the solutions proposed by the author: expanding resettlement, increasing financial responsibility sharing, and concentrating resources where most refugees can be found: in the Global South.

Details: Washington, DC: Immigration Policy Institute, 2017.

Source: Internet Resource: Accessed February 1, 2017 at: http://www.migrationpolicy.org/research/constrained-its-roots-how-origins-global-asylum-system-limit-contemporary-protection

Year: 2017

Country: International

Keywords: Asylum Seekers

Shelf Number: 140779


Author: Cordesman, Anthony H.

Title: The Uncertain Trends in the Metrics of Terrorism

Summary: The global trends in terrorism present some of the most complex problems for analysis in U.S. national security. The Burke Chair at CSIS has updated a survey of such trends that highlights a wide range of developments since 1970, as well as more recent trends in 2015 and 2016. The analysis includes both broad trends as presented in the U.S. State Department Country Reports on Terrorism and START data base, and key trend metrics from other sources and NGOs. The analysis provides a wide range of different metrics for measuring the patterns in global and regional terrorism, the impact of Islamic extremism, and how terrorism varies by region.

Details: Washington, DC: CSIS (Center for Strategic & International Studies, 2016. 353p.

Source: Internet Resource: Accessed February 6, 2017 at: https://csis-prod.s3.amazonaws.com/s3fs-public/publication/161129_Trends_Metrics_Terrorism_Updated.pdf

Year: 2016

Country: International

Keywords: Counter- Terrorism

Shelf Number: 140831


Author: Dawson, Lorne L.

Title: Sketch of a Social Ecology Model for Explaining Homegrown Terrorist Radicalisation

Summary: The study of homegrown jihadi terrorist radicalisation has veered from early efforts to theorise what was happening, which were often insufficiently grounded in empirical evidence, to a reticence to theorise much at all, given the perceived complexity of the phenomenon. Yet knowledge acquisition and mobilisation in this relatively new field remains acutely dependent on how we conceptualise what is happening and integrate our findings. This Research Note provides an initial argument for the merits of adopting a fairly straightforward ecological approach to organising and extending our grasp of the social and social psychological factors influencing the career of potential jihadists.

Details: The Hague: The International Centre for Counter-Terrorism, 2017. 15p.

Source: Internet Resource: ICCT Research Note 8(1): Accessed February 7, 2017 at: https://icct.nl/wp-content/uploads/2017/01/ICCT-Dawson-Social-Ecology-Model-of-Radicalisation-Jan2017-2.pdf

Year: 2017

Country: International

Keywords: Jihadist Terrorists

Shelf Number: 140849


Author: World Customs Organization

Title: Illicit Trade Report 2013

Summary: The 2013 edition of the WCO Illicit Trade Report continues a new paradigm set last year, where the results of the work undertaken by the global Customs community to fight cross-border crime are being released to the general public. The toxic and corrosive nature of illicit trade and organized transnational crime harms economic growth and job creation, challenges the rule of law, robs governments of needed revenue and threatens human rights and quality of life, and thus requires a strong, internationally coordinated response. This Report focuses on five major areas addressed by Customs enforcement on a daily basis: environmental crime and illegal trade in natural resources; intellectual property infringements and trade in substances that pose a threat to public health and safety; smuggling and counterfeiting of excisable goods, such as tobacco and alcohol, as well as illicit financial flows; trade in illegal drugs; and illegal trade in dangerous and prohibited goods. The Report Sections address these areas using a common methodology: Customs seizures recorded in the WCO Customs Enforcement Network are analysed to develop trends and patterns concerning the aforementioned areas of enforcement. The Report also contains information on the results of international enforcement programmes, projects and operations conducted in 2013 that were organized and coordinated by the WCO, its international partners and its Member administrations in the five enforcement areas covered in the Report. We are particularly pleased to note that in 2013 more WCO Members reported their seizures to the CEN than in 2012. While much work still needs to be done, this is an important step towards shedding more light on the parallel and underground economy, and it serves as tangible proof of the commitment of the global enforcement community to address these challenges. Knowing the importance of high-quality information for policymakers, the WCO will continue working with its Members to improve the quality of seizure data, and increase its input into CEN. More complete information will allow the WCO and the Regional Intelligence Liaison Offices to provide a better service to the global Customs community. This Report will contribute to the WCO's growing pool of knowledge that will support analysis of, and actions against illicit trade. Given that the current year has been designated as the WCO Year of Communication, we are delighted to be able to share with you the valuable information contained in this Report.

Details: Brussels: World Customs Organization, 2014. 116p.

Source: Internet Resource: http://www.wcoomd.org/~/media/wco/public/global/pdf/topics/enforcement-and-compliance/activities-and-programmes/illicit-trade-report/illicit-2013-_-en_lr2.pdf?db=web

Year: 2014

Country: International

Keywords: Counterfeiting of Goods

Shelf Number: 146008


Author: Open Society Foundations

Title: Improving Pretrial Justice: The Roles of Lawyers and Paralegals

Summary: On any given day, some three million people are held in pretrial detention around the world. Countless millions are unnecessarily arrested and detained by law enforcement agencies annually. Those in pretrial detention are often held in conditions and subject to treatment that is far worse than that experienced by sentenced prisoners. Pretrial detainees—who have not been tried or found guilty—can languish behind bars for years. Some detainees may literally be lost in the system. Early intervention by lawyers and paralegals can have a positive impact on pretrial justice in general and pretrial detention in particular. Examples from across the globe show that early intervention schemes can reduce the use of pretrial detention, improve the performance of criminal justice personnel, lead to more rational and effective decision-making, and increase accountability and respect for the rule of law. Lawyers and paralegals have a central role to play in advising, assisting, and representing individuals at the pretrial stage of the criminal process. Ensuring legal assistance is available at the earliest possible time allows for the most effective use of resources, as cases are dealt with at the front end of the criminal justice system. Helping to ensure that appropriate decisions regarding pretrial detention and release are made early on can reduce the use of pretrial detention. This does not just benefit the individual suspect: there are wider benefits for the administration of justice and the efficiency and effectiveness of the criminal justice system as a whole. Early intervention can play a key role in educating the public about their rights, and improving transparency, accountability, and confidence in the criminal justice system. International law requires the provision of state funding for legal advice and representation where this is in the interests of justice and the suspect or defendant does not have sufficient means to pay for it. Legal assistance at the early stages of the criminal process is not only an important right for individuals but, when effectively implemented, also produces significant benefits for criminal justice systems and for social integration: it can save money and resources, reduce the use of pretrial detention, encourage diversion from formal criminal justice processes, reduce torture and corruption, improve the functioning of the criminal justice system, and increase transparency and foster confidence in the rule of law. Fortunately, there are replicable models—from developed and developing countries alike—of effective early intervention schemes involving lawyers and paralegals. Recommendations for governments: • Make available sufficient resources to comply with international and national obligations for the provision of legal advice and assistance at the early stages of the criminal process, in particular for those who do not have sufficient means to pay for it. • Develop structures and mechanisms to make the right to legal advice and assistance practical and effective. In particular, establish a legal aid institution that is independent of government and responsible for making the right to legal advice and assistance practical and effective—particularly at the early stages of the criminal process. • Review and update existing laws and procedures concerning: the right to legal advice and assistance at the early stages of the criminal process; access by lawyers and paralegals to police stations, police interviews, and pretrial detention and prison facilities; the recording of police interviews of suspects and witnesses; representation by paralegals where appropriate; the circumstances in which a defendant should be entitled to pretrial release; maximum periods of detention in police custody and pretrial detention; the maximum length of criminal proceedings and maximum number of adjournments; diversion from formal criminal proceedings; and mechanisms for enforcing them. • Ensure that reliable statistical information is routinely collected on critical aspects of the criminal justice system, including: the number of and reasons for arrests, the numbers of people charged and the nature of the charges, the numbers of people in pretrial detention, the length of detention, and the number of people receiving legal advice and representation. Recommendations for legal aid management organizations, NGOs, and professional legal bodies: • Seek to ensure that governments implement the recommendations set out above. • Identify existing mechanisms and resources for providing legal advice and assistance to suspects and defendants, especially at the early stages of the criminal process, including at police stations. Work with existing stakeholders, including bar associations, NGOs, the judiciary, and other criminal justice personnel, to identify the interventions that are most needed and how they may best be provided. • Map existing and potential sources of funding for the provision of legal advice and assistance and seek to match them with schemes designed to have the greatest impact on pretrial detention and pretrial justice generally. • Recognize the range of functions that can be performed through lawyer and paralegal schemes, including: advice, assistance, and representation to individuals; education and training for suspects, defendants, prisoners, communities, and criminal justice personnel; reform of systems, processes, and criminal justice policies. Consider which functions are likely to be the most effective given the local context. • Consider establishing pilot schemes to test the most appropriate structures and mechanisms for providing legal advice and assistance, with a view to evaluating the costs and demonstrating the financial and other benefits. • Document and disseminate promising practices and information about the financial and other benefits of early intervention by lawyers and paralegals.

Details: New York: Open Society Foundations, 2012. 109p.

Source: Internet Resource: Accessed February 8, 2017 at: http://eprints.uwe.ac.uk/16820/1/improving-pretrial-justice-20120416.pdf

Year: 2012

Country: International

Keywords: Bail

Shelf Number: 144945


Author: Open Society Foundations

Title: Pretrial Detention and Health: Unintended Consequences, Deadly Results. Literature Review and Recommendations for Health Professionals

Summary: The excessive use of pretrial detention leads to overcrowded, unhygienic, chaotic, and violent environments where pretrial detainees—who have not been convicted—are at risk of contracting disease. Pretrial holding facilities, which include police lock-ups not designed for large numbers or extended stays, often force detainees to live in filthy, teeming conditions without access to fresh air, minimal sanitation facilities, health services, or adequate food. In the worst cases, detainees die from these conditions and associated disease, and surviving detainees sleep with the corpses. Some pretrial detention centers are so bad that innocent people plead guilty just to be transferred to prisons where the conditions might be better. For many pretrial detainees, being locked away in detention centers where tuberculosis, hepatitis C, and HIV are easily contracted can be a death sentence. This paper reports on a review of published and grey literature on health conditions and health services in pretrial detention in developing and transitional countries. This paper takes as its point of departure that the negative health impacts of excessive pretrial detention are an important reason to pursue pretrial justice reform. Problems identified in the literature are linked both to inadequate health services and to the health impact of cruel, inhuman, and degrading treatment of detainees and failure of the state to ensure humane living conditions and protection from violence. Together these constitute pervasive and often heinous human rights abuses among people, not convicted of any crime, who are entirely in the control of the state.

Details: New York: Open Society Foundations, 2011. 88p.

Source: Internet Resource: Accessed February 8, 2017 at: https://www.opensocietyfoundations.org/sites/default/files/ptd-health-20111103.pdf

Year: 2011

Country: International

Keywords: Inmate Deaths

Shelf Number: 123311


Author: Lallerstedt, Karl

Title: How leading companies are affected by counterfeiting and IP infringement. A study of the NASDAQ OMX 30 Stockholm Index

Summary: Illicit trade in counterfeit goods arguably constitutes the single biggest black market, larger than the global narcotics trade. Despite its enormous scale, it remains relatively under-prioritised by lawmakers, enforcement agencies and researchers. An acute lack of data is a key factor behind its low level of political prioritisation. Customs seizure statistics alone do not reflect the larger complexity of the problem. This study aims to fill some of the information gap, by providing an insight into how leading Swedish companies are affected by counterfeiting and intellectual property infringement. Of the participating companies listed on the NASDAQ OMX 30 Stockholm index whose core activities could be subject to counterfeiting and intellectual property theft: – 93 percent suffered from counterfeiting and piracy, or lost patent licensing revenues due to such activities – When including design rights infringement as well, 100 percent of companies were affected – 80 percent suffered from patent infringements – 75 percent of companies subjected to counterfeiting stated that counterfeiting of their products implied risks to human health and safety – Companies confirmed that organised crime and terrorist groups profit on the trade in counterfeits of their products – 73 percent stated that counterfeiting and IP theft had increased in the past 5 years – 80 percent stated that counterfeiting will increase in the next 5 years – China was identified as the largest source of counterfeit products by all companies – 80 percent of companies stated that the government is not doing enough and should do more to combat counterfeiting and IP theft Key policy recommendations: – IP related issues should be given more political attention, and be elevated to a higher political level. – Customs authorities in Sweden and other EU countries should have sufficient knowledge and competence to counter IPR infringement effectively. Goods in transit suspected of IPR infringement should be possible to seize. – Sweden should participate in the EU Policy Cycle for Organised and Serious International Crime’s working group on combating counterfeit goods. – EU, USA and Japan should further coordinate their efforts in enhancing protection of IPR.

Details: Stockholm, Sweden: Confederation of Swedish Enterprise, 2015. 51p.

Source: Internet Resource: Accessed February 10, 2017 at: https://www.svensktnaringsliv.se/migration_catalog/Rapporter_och_opinionsmaterial/Rapporter/omx30_english_webbpdf_617515.html/BINARY/OMX30_English_webb.pdf

Year: 2015

Country: International

Keywords: Black Markets

Shelf Number: 140866


Author: Global Commission on Drug Policy

Title: Advancing Drug Policy Reform: A New Approach to Decriminalization

Summary: Every year, hundreds of millions of people around the world use illicit drugs. Many do so for enjoyment, some to relieve pain, while others use for traditional, cultural or religious reasons. Despite the fact that drug use is both widespread and non-violent, the predominant approach of governments around the world is to criminalize those who use and/or possess drugs. Such policies are enacted with the false hope that, combined with efforts targeting the production and supply of drugs, the drug market and use can be eliminated. The harms created through implementing punitive drug laws cannot be overstated when it comes to both their severity and scope. On a daily basis, human rights abuses - from the death penalty and extrajudicial killings, to inhuman and coerced drug treatment - are committed around the world in the name of drug control, while strict drug laws have escalated public health crises in the form of HIV and hepatitis C epidemics. Furthermore, in a number of countries drug laws have caused severe prison overcrowding. These extensive damages wrought by a punitive approach to drugs and drug use fundamentally undermine the principle of human dignity and the rule of law, fracturing the relationship between States and their populations. In order to begin mitigating these widespread harms, governments must as a matter of urgency decriminalize the possession of drugs for personal use. Decriminalization is typically understood as the removal of a criminal record for drug possession for personal use offenses, with the optional imposition of civil penalties such as fines or administrative sanctions, or no penalty at all. Though some governments have already taken this approach, only a small number have implemented policies that have brought about positive outcomes for people who use drugs and society as a whole. What's more, these governments typically rely on penalizing people with civil sanctions. This approach does not go far enough. The Commission believes that for the principle of human dignity and the rule of law to be firmly upheld, there must be no penalty whatsoever imposed for low-level possession and/or consumption offenses. Beyond decriminalizing the possession of drugs for personal use, governments must implement alternatives to punishment for many low-level actors in the drug trade, including those who engage in social supply, drug couriers, and cultivators of illicit crops. Many of these people engage in the trade non-violently and may do so to alleviate their severe socio-economic marginalization. Punishing these groups is unjust and only serves to heighten their vulnerability. Ultimately, no longer criminalizing people who use drugs and addressing low-level actors with proportionate responses should be considered as a step toward bringing illicit drug markets under control through sensible regulation. Only then can the societal destruction caused by drug prohibition be properly mitigated. Drug use is, and always has been, a reality in all of our societies. For too long governments have waged a misguided war against the drug market and people who use drugs, handing down sanctions that are disproportionate, unjust and wholly unnecessary. The evidence of just how harmful punitive drug laws are is irrefutable. Governments can no longer ignore the need for a new approach.

Details: Geneva, SWIT: The Commission, 2016. 44p.

Source: Internet Resource: Accessed February 13, 2017 at: http://www.globalcommissionondrugs.org/wp-content/uploads/2016/11/GCDP-Report-2016-ENGLISH.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 145125


Author: Fransas, Anne

Title: Maritime safety and security : Literature review

Summary: The increased numbers of maritime security problems during the last decades have forced international societies to organize closer co-operation and create better plans to response to the problem. Security Research and Innovation Forum, ESRIF has assessed scenarios in the future, in 2030. These scenarios embraced a range of risks, from natural to man-made incidents. ESRIF has stated that capabilities and capacities have to be mobilized to deliver equipment and services to deal with these risks. (ESRIF, 2009.) Finnish security committee has highlighted the need to shift the focus of preparedness proactively to active participation and the identification of threats and disorders as early as possible and to convey the situational picture quickly. Maritime safety is widely studied and for example maritime safety risks are rather well known and analyzed. In contrast, maritime security issues are not studied as much, and security threats in the maritime industry are not defined and analyzed systematically, with the exception of threats caused by terrorists and piracy. This report presents the latest relevant research results and studies related to the maritime safety and security issues, which form the basis and theoretical background for the whole research. In this report, both maritime safety and security issues will be discussed, but the primary focus is on maritime security issues. The purpose of the report is to study current maritime security issues. The research question of this literature study can be defined as follows: How comprehensive safety concept of maritime transport can be defined?

Details: Kotka: Finland: Kymenlaakso University of Applied Sciences, 2012. 45p.

Source: International Resource: Series B Research and Reports. No 77: Accessed February 13, 2017 at: http://www.theseus.fi/bitstream/handle/10024/46235/B77_raportti_2.pdf?sequence=3

Year: 2012

Country: International

Keywords: Maritime Crime

Shelf Number: 140914


Author: Boesten, Jelke

Title: On Ending Sexual Violence, or Civilising War

Summary: This paper uses the Global Summit to End Sexual Violence in Conflict, held in London in June 2014, as a window into the current wave of calls for action against wartime rape. The recent political attention to address sexual violence in conflict builds on decades of scholarly research, feminist activism, and more recently, the adoption of feminist goals in UN gender and security work. This paper asks if the feminist work done to unpack and unsettle gender binaries that foment sexual violence in war and in peace is not undone by the singular focus on rape-in-war. With the knowledge that rape in war tends to reproduce and naturalise the inequalities that fed into conflict in the first place, how should we understand a focus on eradicating sexual violence in war spearheaded by countries that regularly engage in postcolonial wars? What does this say about the framing of contemporary war, and attitudes towards sexual violence? More specifically, to what extent can one usefully make war 'more civilised' (US Secretary of State John Kerry's words) by addressing one specific aspect? The paper builds on case study research in Peru which looks at how the state deals with rape in war and peace, as well as the broader literature in the field of gender, peace and security.

Details: London: King's International Development Institute, King's College London, 2015. 18p.

Source: Internet Resource: International Development Institute Working Paper 2015-02: Accessed February 13, 2017 at: http://www.kcl.ac.uk/sspp/departments/idi/Research/Boesten-IDI-Working-Paper-2015-02.pdf

Year: 2015

Country: International

Keywords: Conflict Related Violence

Shelf Number: 145999


Author: Patel, Sophia

Title: The Sultanate of Women: Exploring female roles in perpetrating and preventing violent extremism

Summary: This paper examines the appeal of Islamic State (IS) to Western women and explores how women can be employed in countering violent extremism (CVE) structures to prevent further involvement. It aims to deliver a comprehensive analysis for academics, policymakers and practitioners working in CVE program and policy design and implementation in order to bridge the gap between community development work and security and intelligence. Two case studies of Australian women - Zehra Duman (a.k.a. Umm Abdullatif al-Australi) and Zaynab Sharrouf (a.k.a. Umm Hafs) - illustrate the appeal as well as the contradictions. A series of recommendations suggests changes to existing CVE structures and their approaches to integrating, women.

Details: Barton, ACT, Australia: Australian Strategic Policy Institute. 2017. 48p.

Source: Internet Resource: Accessed February 15, 2017 at: https://www.aspi.org.au/publications/the-sultanate-of-women-exploring-female-roles-in-perpetrating-and-preventing-violent-extremism/SR100_Sultanate-of-women_v2.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145767


Author: Rabasa, Angel

Title: Counternetwork: Countering the Expansion of Transnational Criminal Networks

Summary: In July 2011, President Barack Obama promulgated the Strategy to Combat Transnational Organized Crime. In the letter presenting the strategy, the president stated that the expanding size, scope, and influence of transnational organized crime and its impact on U.S. and international security and governance represent one of the most significant challenges of the 21st century. Through an analysis of transnational criminal networks originating in South America, this report develops a more refined understanding of the operational characteristics of these networks; the strategic alliances that they have established with state and other nonstate actors; and the multiple threats that they pose to U.S. interests and to the stability of the countries where they operate. It identifies U.S. government policies and programs to counter these networks; the roles of the Department of Defense, the geographic combatant commands, component commands, and task forces; and examines how U.S. Army assets and capabilities can contribute to U.S. government efforts to counter these networks. The report also recommends reconsidering the way in which nontraditional national security threats are classified; updating statutory authorities; providing adequate budgets for the counternetwork mission; and improving interagency coordination. Key Findings Countering Transnational Organized Crime Is a New Mission for the Department of Defense Success in counternarcotics has been traditionally measured by the amount of illicit drugs interdicted. However, even if drug flow reduction goals are met, the drug trafficking infrastructure would still be in place. Countering transnational criminal networks requires identifying the critical nodes in the criminal organizations and determining where operations can achieve the greatest effect. Gaps in authorities may create difficulties in military abilities to participate in this effort. Destabilizing Effects of Transnational Criminal Networks These criminal organizations take root in supply areas and transportation nodes while usurping the host nations' basic functioning capacity. Over time, the illicit economy grows and nonstate actors provide an increasing range of social goods and fill the security and political vacuum that emerges from the gradual erosion of state power, legitimacy, and capacity. The U.S. Army Could Play a Role in Combating Transnational Criminal Networks Combating transnational criminal organizations is an endeavor in which the Army could help develop interagency and multinational strategies to more effectively counter these organizations and then assist with planning to implement those strategies. Such initiatives would constitute a valuable expansion from the Army's current efforts to build partner capacity, perform network analysis, and support detection and monitoring. Recommendations The U.S. government could bring authorities and policy guidance in line with the strategy to combat transnational organized crime. Interagency efforts to combat these networks could be improved, roles could be better defined, and joint doctrine could be developed. The Army could take several steps to clarify its role in countering criminal networks, including participating in strategy development, increasing support to network analysis efforts, and working with partner nations and militaries to help them strengthen border control.

Details: Santa Monica, CA: RAND< 2017. 215p.

Source: Internet Resource: Accessed February 15, 2017 at: http://www.rand.org/pubs/research_reports/RR1481.html

Year: 2017

Country: International

Keywords: Border Security

Shelf Number: 145102


Author: Daly, Sarah Zukerman

Title: Wartime Networks and the Social Logic of Crime

Summary: Failure of ex-combatants to reintegrate into legal, civilian life is a source of disorder around the world. Leading explanations for such failure focus on individualistic decisions based on economic or psychological factors. Yet, ex-combatants are embedded in networks that persist following demobilization. We contrast an individual to a social logic of ex-combatant criminality, combining administrative data from Colombia with original survey data that accounts for the challenges of studying sensitive subjects. The results show that conflict networks predominate in explaining criminality while individual factors do not. Further analysis suggests that commanders enter into crime first, recruiting rank-and-file from their networks. As criminal behavior pervades a network, peer relations drive individual crime while peer and commander relations drive gang-related crime through norms, status-seeking, and social pressure. These results provide some of the first evidence of how wartime networks evolve following demobilization, with important implications for understanding reintegration and social stability.

Details: Unpublished paper, 2016. 49p.

Source: Internet Resource: Accessed February 15, 2017 at: http://sarahzukermandaly.com/wp-content/uploads/2016/09/colombia_main_submit.pdf

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 145319


Author: Shaw, Mark

Title: Governing Safer Cities: Strategies for a Globalised World. A Framework to Guide Urban Policy-Makers and Practioners

Summary: The security challenges of individual cities are increasingly a result of the intersection between local vulnerabilities and illicit flows from across national borders. States as a whole are affected by the destabilising effects of these flows of illicit commodities and the associated challenges of organised crime, corruption and terrorism. These phenomena are undercutting good governance and the rule of law, threatening security, development and peoples' life chances. But with two-thirds of the current world population expected to reside in cities by 2030, these challenges are and will continue to be particularly acute in cities across the globe. As the UNODC Global Study on Homicide (2011 and 2013) has shown, many urban areas have higher rates of homicide - a useful proxy for levels of violence more generally - than the national average; cities being the source of both greater levels of risk as well as opportunities for crime prevention and responses. The 2030 Agenda for Sustainable Development (Goal 16) recognises that reducing conflict, crime, violence, discrimination, and ensuring the rule of law, inclusion and good governance, are key elements of people's well-being and essential for securing sustainable development. The 2030 Agenda also explicitly highlights the promotion of safe, inclusive and resilient cities (Goal 11). This must be achieved through equitable development, safeguarded by fair, humane and effective crime prevention and criminal justice systems as a central component of the rule of law. The Sustainable Development Goals and the New Urban Agenda adopted during Habitat III in Quito, provide a new impetus to the work of countries and the international community at large to develop inclusive, safe, resilient and sustainable cities. Although a considerable amount of research has already been carried out in this area, there is a need to clarify how global illicit flows and organised crime impact on local communities, particularly given their rapid evolution in the current context. Building on the work that has already been done in the field of crime prevention and urban safety, as well as drawing from detailed case studies from a number of cities across the world, and the input of a globally representative group of experts, this framework provides policymakers and practitioners with a new approach to safety in cities, taking into account how transnational organised crime and illicit flows exploit and exacerbate local vulnerabilities. It recognises that while many of the responsibilities for providing citizens with security lie with national governments, city administrations do have a key role to play in identifying crime risks and vulnerabilities and ensuring that safety and security policies are tailored to meet local needs, including by involving communities and other relevant non-state actors.

Details: Vienna: United national Office on Drugs and Crime, 2017. 52p.

Source: Internet Resource: Accessed February 16, 2017 at: https://www.unodc.org/documents/justice-and-prison-reform/SaferCities.pdf

Year: 2016

Country: International

Keywords: Crime Prevention

Shelf Number: 146281


Author: Bog, Martin

Title: 12-step programs for reducing illicit drug use

Summary: Illicit drug abuse has serious and far-reaching implications for the abuser, their family members, friends, and society as a whole. Preferred intervention programs are those that effectively reduce illicit drug use and its negative consequences, and are cost-effective as well. Current evidence shows that overall, 12-step programs are just as effective as alternative, psychosocial interventions. The costs of programs are, therefore, an important consideration. However, the strength of the studies is weak and further evidence regarding the effectiveness of 12-step programs is needed. What did the review study? Illicit drug abuse is a globally recognised problem leading to high human, social and economic costs. The 12-step program, modelled on the approach of Alcoholics Anonymous and adopted by Narcotics Anonymous and others, aims for complete abstinence. The 12-step approach is used both by self-help groups and for professional treatment called Twelve Step Facilitation (TSF). This review examines the effectiveness of 12- step programs in reducing the use of illicit drugs. Secondary outcomes considered are on criminal behaviour, prostitution, psychiatric symptoms, social functioning, employment status, homelessness, and treatment retention. What studies are included? Included studies assess 12-step interventions for participants with illicit drug dependence using randomized controlled trials and quasiexperimental studies. Study populations are participants who have used one or more types of illicit drugs, regardless of gender and ethnic background.

Details: Oslo: Campbell Collaboration, Social Welfare Coordinating Group, 2017. 152p.

Source: Internet Resource: A Campbell Systematic Review 2017:2: Accessed February 17, 2017 at: https://campbellcollaboration.org/library/item/442-12-step-programs-for-reducing-abuse-of-illicit-drugs-protocol-for-a-systematic-review.html

Year: 2017

Country: International

Keywords: Drug Abuse Treatment

Shelf Number: 141068


Author: UN Women

Title: Female Genital Mutilation/Cutting and Violence Against Women and Girls: Strengthening the policy linkages between different forms of violence

Summary: Violence against women and girls (VAWG) manifests in different forms. These include intimate partner violence, non-partner sexual violence, sexual exploitation and trafficking, and harmful practices such as female genital mutilation/cutting (FGM/C) and child, early and forced marriage, among others. Programmes to end harmful practices and programmes to end intimate partner violence and non-partner sexual violence are often planned and implemented separately, despite all being rooted in gender inequality and gender-based discrimination against women and girls. While this is intended so that programmes can be tailored accordingly, it can result in isolation of initiatives that would otherwise benefit from sharing of knowledge and good practices and from strategic, coordinated efforts. This policy note explores policy and programming interlinkages and considers entry points in the areas of (i) national legislation, (ii) prevention strategies, (iii) response for survivors, and (iv) data and evidence, for increased coordination and collaboration to advance the objectives of ending FGM/C and other forms of VAWG, in particular intimate partner violence and non-partner sexual violence. The note builds on the background paper "Finding convergence in policy frameworks: A background paper on the policy links between gender, violence against women and girls, and female genital mutilation/cutting". This policy note is intended for multiple audiences, including those directly involved in policy development, planning and implementing initiatives, those providing technical support, and advocates for ending all forms of VAWG, including FGM/C. This work is the result of a collaboration of UN Women with the UNFPA–UNICEF Joint Programme on FGM/C.

Details: New York: UN Women, 2017. 20p.

Source: Internet Resource: Policy Note: http://www.unwomen.org/-/media/headquarters/attachments/sections/library/publications/2017/policy-note-female-genital-mutilation-cutting-and-violence-against-women-and-girls-en.pdf?vs=905

Year: 2017

Country: International

Keywords: Female Cutting

Shelf Number: 145745


Author: Centre for Justice Innovation

Title: Problem-solving Courts: An Evidence Review

Summary: Problem-solving courts put judges at the centre of rehabilitation. Generally operating out of existing courts, problem-solving courts yoke together the authority of the court and the services necessary to reduce reoffending and improve outcomes. This paper reviews the research on problem-solving courts and finds that, when used correctly, they can reduce reoffending and cut costs. Coming at a time when both the Lord Chancellor and the Lord Chief Justice have expressed an interest in problem-solving, this review is designed to inform the development of government policy and, more importantly, to help shape the practice developed within pilots in England and Wales. What does the evidence tell us? There are many different kinds of problem-solving courts, each specialising in tackling a different need, type of crime, or even a different area. Looking at the evidence for different forms of court, we found: Drug courts: The evidence on adult drug courts is strong. It suggests that they are effective at reducing substance misuse and reoffending. They are particularly effective with offenders who present a higher risk of reoffending. However, the evidence on juvenile drug courts is negative. It suggests they have either minimal or harmful impacts on young offenders. Family drug and alcohol courts: The evidence on family drug and alcohol courts (and the related family treatment courts) is good. It suggests that they are effective in tackling parental substance misuse and can reduce the number of children permanently removed from their families. Mental health courts: The evidence on mental health courts is good. High-quality international evidence suggests that mental health courts are likely to reduce reoffending, although they may not directly impact offenders’ mental health. Domestic violence courts: The evidence on the impact of problem-solving domestic violence courts on outcomes for victims,such as victim safety and satisfaction, is good. The evidence on their ability to reduce the frequency and seriousness of a perpetrator reoffending is promising. This is encouraging when set against the lack of other effective options for reducing reoffending by perpetrators of domestic violence. Community courts: The international evidence that community courts reduce reoffending and improve compliance with court orders is promising. However, the evidence of their impact in England and Wales is mixed (though drawing conclusions from a single pilot site is difficult). We also looked at evidence on effective ways of working with women and young adults in the justice system. While problem-solving courts working with these groups are a new idea and little direct evidence is available on their effectiveness, the evidence suggests that there is potential for courts for these groups to improve outcomes if they draw from existing good practice. Why do problem-solving courts work? As well as looking at whether problem-solving courts work, we also looked at research which seeks to understand how they work. We found two main themes: Procedural fairness: evidence shows that perception of fair treatment leads to better compliance with court orders. Effective judicial monitoring is strongly associated with effectiveness. It relies on clear communication and certainty.

Details: London: The Centre, 2016. 46p.

Source: Internet Resource: Accessed February 17, 2017 at: http://justiceinnovation.org/portfolio/problem-solving-courts-an-evidence-review/

Year: 2016

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 146967


Author: Waard, Jaap de

Title: The crime drop in The Netherlands and other industrialized countries: Trends and possible explanations

Summary: Crime in the Netherlands has been decreasing significantly since 2002, in terms of both property crime and violent crime. The sense of security has also become substantially greater. This observed decrease in crime also been seen in a large number of other industrialized countries. The question now is how this decrease in crime can be explained. On the basis of the available national and international knowledge, a number of explanations that have previously been given are described. Introduction An attempt will be made in this memorandum to answer the following questions. (1). Has the level of crime decreased? Where and to what extent has this decrease occurred? To which types of offences does this relate? On the basis of which sources, statistical and otherwise, can we make statements about this? (2). Why has crime decreased? What plausible explanations can be given? Various different hypotheses set out in the available literature will be assessed. (3). Special attention is given to the so-called security hypothesis. That is based on the fact that the increase and quality of the application of large-scale security measures, such as immobilizers, break-in prevention measures, private security and measures to limit opportunity, have been the significant driving force behind the observed decrease in crime, both nationally and internationally. (4). Finally, a number of main conclusions will be presented.

Details: The Hague: Dutch Ministry of Security and Justice, Directorate for Law Enforcement and Crime Control, 2015. 48p.

Source: Internet Resource: Accessed February 17, 2017 at: https://www.researchgate.net/profile/Jaap_De_Waard/publication/287759866_The_crime_drop_in_The_Netherlands_and_other_industrialized_countries_Trends_and_possible_explanations/links/567922db08aeaf87ed8afad6.pdf?origin=publication_detail

Year: 2015

Country: International

Keywords: Crime Drop

Shelf Number: 141087


Author: Tanner-Smith, Emily E.

Title: Adolescent Substance Use Treatment Effectiveness: A Systematic Review and Meta-Analysis

Summary: Objectives. This meta-analysis quantitatively synthesized findings from the most current evidence base of adolescent substance use treatment effectiveness research. The objectives of the meta-analysis were to examine the effects of substance use treatment programs on adolescents’ subsequent substance use; and to explore variability in these effects across key features of the adolescent populations and treatment programs. To address these objectives, we synthesized results from randomized and controlled quasi-experimental design studies that reported on the effects of substance use treatment programs located in the United States or Canada. Search methods. We conducted a comprehensive and systematic literature search to identify all relevant studies (published or unpublished) that met our prespecified eligibility criteria, and the literature search is current through December 2014. We searched several electronic databases, supplemented with searches of websites, research registers, reference lists, and hand-searches of key journals and conference proceedings. Data collection and analysis. Standard systematic review practices were used for data collection and analysis. Titles, abstracts, and full-text reports were screened independently by two researchers; a third author resolved any disagreements about eligibility for inclusion. Studies eligible for inclusion were independently coded by two researchers, and a third author resolved any coding disagreements. All data extraction followed a standardized coding protocol, with data entered directly into a FileMaker Pro database. Random-effects meta-regression models with robust variance estimates were used to estimate overall mean effect sizes and explore variability in effects across study characteristics. Contour-enhanced funnel plots were used to assess for publication bias in the posttest effect sizes; there was no clear asymmetry in the funnel plot, thus providing some reassurances against the possibility of publication or small study bias. Results. An extensive literature search located 61 eligible experimental or quasi-experimental studies reporting 95 treatment-comparison group pairs. Many of the comparison groups received another type of active treatment. The first analysis examined 506 effect sizes for the posttreatment substance use outcomes of adolescents receiving different types of treatment relative to the respective comparison groups. Overall, assertive continuing care, behavioral therapy, cognitive-behavioral therapy (CBT), motivational enhancement therapy (MET), and family therapy had the strongest evidence of effectiveness. Generic practice as usual conditions, which typically involved referral to standard community services, were consistently the least effective conditions. There was mixed and/or sparse evidence for other treatment types (e.g., group/mixed counseling, MET/CBT, multiservice packages). A second analysis examined 380 pretest–posttest effect sizes indexing changes in substance use for each of the treatment arms in these studies. The results from this analysis indicated that adolescents in almost all types of treatment showed reductions in substance use. The largest reductions were observed for MET/CBT, family therapy, and CBT programs. There was no evidence that other treatment characteristics or participant characteristics were associated with pretest–posttest changes in substance use. Conclusions. Most substance use treatment programs were beneficial in helping adolescents reduce their substance use when those treatment programs provide tailored treatment services beyond standard community services. Family therapy and CBT programs showed particular promise of effectiveness, and no program types showed evidence of harmful effects. Implications for guidelines. Juvenile drug courts should refer youth to substance treatment programs that use family therapy, MET, or CBT treatment modalities. Ideally, these programs should follow standardized treatment manuals or protocols. Juvenile drug courts should avoid referring youth to standard community services, stand-alone self-help treatment, or generic counseling programs that do not incorporate family therapy, MET, and/or CBT components.

Details: Nashville, TN: Peabody Institute, Vanderbilt University, 2016. 76p.

Source: Internet Resource: Accessed February 20, 2017 at: https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250440.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 141111


Author: Saltman, Erin Marie

Title: Youth Innovation Labs: A Model for Preventing and Countering Violent Extremism

Summary: The following publication discusses the development, implementation and evaluation of Youth Innovation Labs conducted by the Youth Civil Activism Network (YouthCAN). Youth Innovation Labs are immersive, activist-led events that provide a space for innovation, cocreation and learning while giving participants the contacts, tools and resources needed to develop counter-narrative campaigns for preventing and countering violent extremism. Why do we need Youth Innovation Labs? Over the last few years global attention has been paid to violent extremist organisations like ISIS, Boko Haram and a range of far-right groups. As a reaction, in 2015 there was an uprising of young voices convening on the topic of peacebuilding, discussing how young people can be supported in their efforts in preventing and countering violent extremism (PVE and CVE).  Youth summits, supported by governments and international bodies, took place in different parts of the world, engaging a wide range of young activists. The majority of these events reached similar conclusions about the need to actively involve young people in PVE and CVE. These events spanned regions, ethnicities, ideologies, gender and faiths to amplify the voices of young people.

Details: London: Institute for Strategic Dialogue, 2016. 44p.

Source: Internet Resource: Accessed February 20, 2017 at: http://www.strategicdialogue.org/wp-content/uploads/2016/07/YouthCAN-Labs.pdf

Year: 2016

Country: International

Keywords: Counter-Extremism

Shelf Number: 141127


Author: Barrett, Richard

Title: The Islamic State

Summary: The self-styled Islamic State is an accident of history, emerging from multiple social, political and economic tensions in the Middle East and beyond. It has challenged the territorial divisions imposed on the region following the collapse of the Ottoman Empire by carving out for itself a large area of territory. But ultimately, its impact will flow as much from its challenge to established concepts of government, national sovereignty, and national identity. The Islamic State is most notable for the violence with which it asserts control, but its ruthless tactics will likely prevent the group from ruling effectively and building broader support beyond the front line fighters who protect its security and the authoritarian killers who patrol its streets. The Islamic State is a highly visible but clandestine organization. Despite the vast amount of publicity and analysis it has generated since 2011, verifiable facts concerning its leadership and structure remain few and far between. The picture is obscured by the misleading propaganda of the State itself and by the questionable accounts of people who claim to be familiar with it. It is a movement that has accelerated fast along the path from terrorism through insurgency towards proto-statehood, but it is also one that for all its bravado seems fearful that it could just as quickly be forced back underground. As a result, this paper relies on the group's own publications, the observations of defectors, and analysis by others who take an interest in its progress, despite the paucity of information. Nonetheless, The Soufan Group believes that enough is available to draw a useful picture of the evolution of the State, its structure and its operations, even though it may lack clarity and detail. The paper refers throughout to the organization as The Islamic State, being the name it uses to describe itself. The only alternative would be to call it by its Arabic acronym, commonly transliterated as Da'ish or Daesh (al Dawla al Islamiya fi al Iraq wa al Sham). Clearly, the use of its full name does not imply any endorsement or recognition of its self-description.

Details: New York: Soufan Group, 2014.

Source: Internet Resource: Accessed February 22, 2017 at: http://soufangroup.com/wp-content/uploads/2014/10/TSG-The-Islamic-State-Nov14.pdf

Year: 2014

Country: International

Keywords: Extremist Groups

Shelf Number: 141177


Author: Kowalczyk-Hoyer, Barbara

Title: Top Secret: Countries Keep Financial Crime Fighting Data to Themselves

Summary: Financial systems depend on trust from citizens and businesses to function. A vital part of this trust is the belief that banks are not holding funds on behalf of corrupt individuals and organisations, criminals, or terrorists. In recent years, the financial sector has provided ample reason to question this belief. The majority of large-scale corruption scandals, from Ukraine to Brazil, have featured banks transferring or managing funds for the perpetrators and their associates. An analysis of 200 cases of grand corruption by Global Witness has identified 140 banks involved in handling a total of at least US$56 billion in corrupt proceeds. Following the Petrobras corruption scandal in Brazil, for example, Switzerland’s attorney general froze US$400 million held at more than 30 Swiss banks with suspected ties to the case3 . Corruption and money laundering (ML) – the act of disguising the origin of illegal and corrupt proceeds – undermine the basic rule of law, weaken democratic institutions and damage economies and societies. In 2013 alone, developing countries lost an estimated US$ 1.1 trillion to Illicit Financial Flows – illegal movements of money from one country to another. Effective anti-money laundering measures, in both developed and developing countries, are essential to end these illicit flows. Experience in recent years has time and again shown that the financial sector cannot be relied upon to police itself when it comes to dirty money in the system, requiring strong consistent and effective anti-money laundering (AML) supervision by authorities. Just like health and safety inspectors in restaurants, national financial supervisors have the power to visit and inspect banks (on-site monitoring), identify and record failings in their systems, and impose sanctions where necessary. Prosecutors also have the power to investigate and prosecute money laundering cases, including requesting information across borders, and judges have the power to sanction individuals and corporate entities found guilty of crimes. Public scrutiny is essential for the accountability of these mechanisms, but this report shows that in countries hosting major financial centres, data on anti-money laundering prevention and enforcement is treated as if it were Top Secret. Just one in three basic anti-money laundering indicators drawn from internationally accepted guidelines is available to the public and up to date across 12 countries hosting major financial centres, including the U.S., the U.K., Germany, Switzerland and Luxembourg. This low level of public data availability is a major obstacle to any independent monitoring of the effectiveness of anti-money laundering by civil society and the media.

Details: Berlin: Transparency International, 2017. 41p.

Source: Internet Resource: Accessed February 22, 2017 at: https://financialtransparency.org/wp-content/uploads/2017/02/Top-Secret-financial-data-report.pdf

Year: 2017

Country: International

Keywords: Financial Crimes

Shelf Number: 144841


Author: Litman, Todd

Title: Safer Than You Think! Revising the transit safety narrative

Summary: Public transportation is overall safe (low crash risk) and secure (low crime risk). Transit travel has about a tenth the traffic casualty (death or injury) rates as automobile travel, and residents of transit-oriented communities have about a fifth the per capita traffic fatality rate as do residents of automobile-oriented communities. Transit also tends to have lower crime rates than automobile travel, large cities with high transit ridership tend to have lower crime rates than more automobile-oriented cities, and transit service improvements can further increase security by increasing surveillance and improving impoverished people’s economic opportunities. Despite its overall safety and security, many people consider transit dangerous and so are reluctant to use it or support transit service expansions in their communities. Various factors contribute to this excessive fear, including the nature of public transit travel, heavy media coverage of transit-related crashes and crimes, and conventional traffic safety messages which emphasize risks rather than safety. Public officials and transit agencies can help create a new transit safety narrative by developing better risk evaluation tools, better communicating public transit’s overall safety and health benefits, and providing better guidance concerning how transit users and communities can enhance safety and security.

Details: Victoria, Canada: Victoria Transport Policy Institute, 2013. 54p.

Source: Internet Resource: Accessed February 22, 2017 at: http://www.vtpi.org/safer.pdf

Year: 2013

Country: International

Keywords: Mass Transit

Shelf Number: 147426


Author: Pells, Kirrily

Title: Experiences of Peer Bullying among Adolescents and Associated Effects on Young Adult Outcomes: Longitudinal Evidence from Ethiopia, India, Peru and Viet Nam

Summary: Globally it is estimated that more than one in three students between the ages of 13 and 15 are regularly bullied by peers. Being bullied has been found to have a significant impact on children's physical and mental health, psychosocial well-being and educational performance, with lasting effects into adulthood on health, well-being and lifetime earnings. Most research, including cross-cultural comparative work, has focused on high-income countries, identifying a range of predictors and effects associated with being bullied. Far less is known about bullying in low- and middle-income countries. This paper is a contribution to the UNICEF Multi-Country Study on the Drivers of Violence Affecting Children, which analyses how structural factors interact to affect everyday violence in children’s homes, schools and communities. The results of the multi-country study intend to inform national strategies for violence prevention. We use longitudinal data from the Young Lives study of childhood poverty to address three core questions: Which children are bullied and how at age 15? What is associated with certain groups of children being bullied? Are there long-term associations between being bullied at age 15 with psychosocial indicators (self-efficacy, self-esteem, parent relations and peer relations) at age 19? Key findings: • Indirect bullying, such as measures to humiliate and socially exclude others, is the most prevalent type of bullying experienced at age 15 across three of the four countries, ranging from 15 per cent of children in Ethiopia to 28 per cent in India. • Verbal bullying is also prevalent, affecting a third of children in Peru and a quarter in India. •Physical bullying is the least prevalent form and lower than the other types, with the exception of India where the rate of children experiencing physical bullying is similar to other types of bullying. •Boys are at greater risk than girls of being physically and verbally bullied and girls are more likely to be bullied indirectly. •Poorer children are consistently more likely to be bullied in India and experience some types of bullying (physical, social exclusion and attacks on property) in Viet Nam than their less poor peers.

Details: Florence, Italy: United Nations Children's Fund (UNICEF), Office of Research, (Innocenti) 2016. 63p.

Source: Internet Resource: Discussion Paper 2016-03: Accessed February 23, 2017 at: https://www.unicef-irc.org/publications/pdf/IDP_2016_03.pdf

Year: 2016

Country: International

Keywords: Bullying

Shelf Number: 144854


Author: Charosky, Hernan

Title: Transnational Criminal Networks and The Public Sector: Findings and Recommendations About Permeable Borders

Summary: The aim of this document is to collect, present and assess points of juncture between Transnational Criminal Networks ("TCNs") and the public sector in a wide sense (political institutions, public administration and security agencies, public service agents), and propose recommendations. These points of juncture are heterogeneous and refer to different kinds of public sector entities and different levels of government: from the way in which parliaments work -in some of the cases referred here, in the interest of TCNs- to the informal agreements between municipal authorities and TCN bosses -from a blind eye to their activities to the active commitment of local police agents in criminal activities.

Details: Bogota, Colombia: Vortex Foundation, 2014. 35p.

Source: Internet Resource: Vortex Working Paper no. 14: Accessed February 23, 2017 at: http://media.wix.com/ugd/522e46_eaee567619174b9485011f83e5898a5c.pdf

Year: 2014

Country: International

Keywords: Criminal Cartels

Shelf Number: 144856


Author: Grange, Mariette

Title: When Is Immigration Detention Lawful? The Monitoring Practices of UN Human Rights Mechanisms

Summary: his Global Detention Project Working Paper details how the banalisation of immigration detention is contested by international human rights mechanisms. Since the creation of the United Nations, the global human rights regime has provided a framework for the protection of all people, including those living in foreign countries. This paper assesses how national sovereignty and access to territory is mitigated by the universal nature and applicability of human rights and refugee protection standards. The authors comprehensively describe the normative framework governing immigration detention established in core international treaties and discuss how human rights bodies apply this framework when reviewing states' policies and practices. Their assessment of the impact and implementation of fundamental norms reveals gaps in the international protection regime and highlights how states' responses to this regime have shaped contemporary immigration detention systems.

Details: Geneva, SWIT: Global Detention Project, 2017. 24p.

Source: Internet Resource: Global Detention Project Working Paper No. 21: Accessed February 24, 2017 at: https://www.globaldetentionproject.org/when-is-immigration-detention-lawful-monitoring-practices-of-un-human-rights-mechanisms

Year: 2017

Country: International

Keywords: Human Rights

Shelf Number: 141214


Author: Sieber, Niklas

Title: Fighting Corruption in the Road Transport Sector: Lessons for Developing Countries

Summary: Corruption is a huge challenge for the transportation sector. It causes economic losses, leads to deteriorating infrastructure and reduced quality of transport services. The new Technical Document #10 “Fighting corruption in the road transport sector†explains what corruption is, and why it is so detrimental for economy and society. It gives hints how corruption in the transport sector may be detected, and what can be done to prevent corruption in the transport sector. This concerns not only the public and private sector, but the civil society in general which may play a crucial role in “blowing the whistle†on corruption. Donors and international organisations are also offered advice on how to support the fight against corruption as a part of the cooperation with developing countries. The document is available for download here.

Details: Berlin: The Federal Ministry for Economic Cooperation and Development (BMZ), 2012. 70p.

Source: Internet Resource: http://www.sutp.org/files/contents/documents/resources/B_Technical-Documents/GIZ_SUTP_TD10_Fighting-Corruption-in-the-Road-Transport-Sector_EN.pdf

Year: 2012

Country: International

Keywords: Fraud and Corruption

Shelf Number: 114216


Author: Muggah, Robert

Title: Filling the Accountability Gap: Principles and practices for implementing body cameras for law enforcement

Summary: New technologies are revolutionizing the way governments provide services, including law enforcement. Around the world, police departments are investing in predictive analytics, digital forensics, data mining systems and crime mapping platforms to improve the effectiveness and efficiency of their work. They are also experimenting with mobile technologies to strengthen communication and outreach. One such device - on-officer recording systems, or body-worn cameras (BWC) - is catching on. Police are experimenting with "cop cams" in dozens of cities across North America and Western Europe while sparking debate and some controversy in the process. There are also small-scale pilots using open source and mobile phone-operated BWCs in Latin America and South Africa. There is growing awareness of their effectiveness. The introduction of BWCs has the potential to transform policing. If implemented with appropriate checks and balances, BWCs can potentially improve oversight over police officers and strengthen their accountability to citizens. Many civil liberties groups are already advocating for cameras due to their ability to check the abuse of power by police while also helping to protect them (and citizens) against false accusations. What is more, cumulative data harvested by such devices can improve the targeting of crime prevention efforts as well as overall law enforcement performance. With safeguards in place, citizens, too, will benefit from these technologies since the use of cameras changes the nature of police-civilian interaction, most often for the better Of course, there are also risks associated with cop cams. This is particularly the case if broader policy and institutional questions related to the deployment of the technology are not adequately thought through. On the one hand, if deployed inappropriately and without proper oversight, body cameras can violate citizens' rights to privacy.4 Body cameras used without restrictions are tantamount to pervasive surveillance. They can be used invasively since police routinely enter citizens' homes and often encounter individuals in extreme situations. On the other, the use of body cameras without adequate consideration of how such tools will be implemented can lead to cost overruns (especially in relation to storing and redacting data) and, ultimately, the rejection of the tool itself. Guidance on the best practices of cop cams is urgently needed. Note too that the other end of the spectrum - complete officer discretion over when to activate a camera - has been shown to increase, not decrease, both officer use of force and assaults on police. This Strategic Note sets out some of the opportunities and challenges associated BWCs. It builds on several years of experience of the IgarapeInstitute in testing body cameras in Brazil and South Africa, as well as consultations with dozens of specialists in law enforcement and civil liberties communities. It focuses especially on key political and institutional questions regarding the management of these new tools. The first section highlights the emergence of new technologies in law enforcement and, in particular, the rise of cop cams. Section two underlines some of the controversies - both operational and ethical - associated with these technologies. The third section presents a shortlist of emerging principles for institutionalizing cop cams, as well as practices that flow from them. The note is not exhaustive; it is a first pass over a complex and rapidly-evolving public policy area.

Details: Rio de Janeiro, Brasil: Igarapé Institute, 2016. 23p.

Source: Internet Resource: Strategic Note 23: Accessed February 28, 2017 at: https://igarape.org.br/wp-content/uploads/2016/11/AE-24_Filling-the-accountability-gap-body-worn-cameras-14-11.pdf

Year: 2016

Country: International

Keywords: Body-Worn Cameras

Shelf Number: 145580


Author: Lopez Guevara, Estefania

Title: Introduction to Trafficking and Laundering of Children

Summary: Trafficking in human beings is generally referred to as the 21st century's slavery, and it has been asserted that human trafficking is more common now than at any time in history (Snyman, 2005). The Global Report on Trafficking in Persons, published by the UN Office on Drugs and Crime (UNODC) in November 2014, found victims from 152 nationalities in 124 countries. Additionally, in some regions child trafficking is a major concern; for instance, in Africa and the Middle East children constitute 62 per cent of detected trafficked victims (UNODC, 2014). Currently, children are trafficked for prostitution, forced labor and early marriage: "In African countries, the poverty existing in households, the absence of social protection, the high profits earned by traffickers, and the low conviction rates for offences against the traffic, have caused child trafficking to persist" (Mbakogu, 2014). In 2006, the Trafficking in Persons Report published by the U.S. Department of State revealed that human trafficking is the third market generating profits for organized crime, behind only drugs and guns trafficking. It is estimated that an amount close to USD $9.5 billion is generated annually through trafficking. Bearing in mind the relevance of this criminal market, this document is an introduction to the humans trafficking market, providing an overview of this contemporary trafficking. Additionally, attention is focused on the specific trafficking of children happening in the African countries of Democratic Republic of the Congo (DRC), Nigeria, Benin, Cameroon and Ethiopia.

Details: Bogota, Colombia: Vortex Foundation, 2017. 18p.

Source: Internet Resource: The Global Observatory of Transnational Criminal Networks Research Paper No. 6. VORTEX Working Papers No. 20: Accessed February 28, 2017 at: http://media.wix.com/ugd/522e46_f3c830fccdbe49409089792bd2299f18.pdf

Year: 2017

Country: International

Keywords: Child Prostitution

Shelf Number: 141252


Author: Rope, Olivia

Title: Women in Detention: Putting the UN Bangkok Rules on women prisoners into practice

Summary: This training resource has been designed to support stakeholders to put the UN Bangkok Rules on women offenders and prisoners into practice. It draws on global good practice and research findings to provide practical guidance, using exercises and case studies. At the end of the ten modules, you will have the tools and knowledge to design gender-sensitive policies and practices for women offenders and prisoners and apply them in your professional role. The Workbook includes: 10 modules, with clear learning objectives brainstorming to develop new ideas exercises to check your understanding case studies to help you apply international standards good practices to inspire new thinking and provide solutions additional resources to delve deeper into specific topics end-of-module quizzes to assess your understanding. While the Workbook has been designed as a self-learning tool, it can also be used as part of group training sessions. It is designed for prison staff, policy‑makers, healthcare practitioners, representatives of intergovernmental and non-governmental organisations, and other interested stakeholders.

Details: London: Penal Reform International, 2017. 188p.

Source: Internet Resource: Accessed March 2, 2017 at: https://cdn.penalreform.org/wp-content/uploads/2017/02/PRI_BR_Workbook_WEB_lowres-1.pdf

Year: 2017

Country: International

Keywords: Bangkok Rules

Shelf Number: 141294


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Handbook on the Management of Violent Extremist Prisoners and the Prevention of Radicalization to Violence in Prisons

Summary: This Handbook is one of a series of tools developed by UNODC to support Member States in the implementation of the rule of law and the development of criminal justice reform. It is designed to be used by prison managers and prison staff, in particular, but will also be relevant for other actors involved in the criminal justice system, such as policymakers, legislators and members of non-governmental organizations. It can be used in a variety of contexts, both as a reference document and as the basis for staff training. While some elements of the Handbook may not be achievable immediately in some jurisdictions, particularly in post-conflict situations, the Handbook provides national authorities with guidelines for the development of policies and protocols that meet international standards and good practice. This Handbook constitutes the first technical guidance tool to addresses the manifestation of radicalization to violence and violent extremism in prison settings at the level of the United Nations. It provides practical guidance on: • The management of violent extremist prisoners (prisoners who have embraced violent extremism) • Preventing the progression to violent extremism in prisons (prisoners who may be vulnerable to radicalization to violence) • Interventions aimed at disengaging violent extremist prisoners from violence and at facilitating their social reintegration upon release. Within these parts, the Handbook covers key prison management policies and mechanisms, such as the need for: overall prison conditions to be in line with international minimum standards; effective assessment and classification systems; physical, procedural and dynamic security; professional prison staff training; fair, humane and non-discriminatory treatment; preventing corruption; various categories of disengagement interventions involving experts from different disciplines; and social reintegration and post-release support. Overall, the Handbook advocates an approach aimed at strengthening these key components of prison management. Not only is such an approach explicitly called for in the international good practice documents, it also provides value by creating sustainable benefits for the entire prison system. The following considerations summarize the key principles underlying all recommendations made in the Handbook: • Adherence to fundamental rights, international standards, and good prison practice: It is crucial that any efforts in prison to address violent extremism must not lead to undermining human rights to which all persons, including violent extremist prisoners, are entitled. Under international human rights law, no exceptions or restrictions are permissible to the prohibition of torture or other cruel, inhuman or degrading treatment. Equally relevant is the protection of the right to hold an opinion and to have or adopt a religion or belief of one’s choice,1 although certain manifestations may be subject to limitations, if strictly necessary and provided by law (e.g. for the protection of public order or the respect of others’ rights). At the same time, Member States should prohibit by law any propaganda for war and any advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence. • Relevance of overall prison conditions and prison management: Guidance on the management of violent extremist prisoners and the prevention of radicalization to violence in prisons must ensure that any proposed intervention is closely embedded in broader prison reform efforts. Stand-alone disengagement interventions, which are implemented in isolation of the broader prison context are unlikely to yield positive results, in particular if the latter fails to adhere to international standards and norms. Vulnerability to radicalization to violence is exacerbated in prisons that are overcrowded, understaffed, fail to provide basic services to prisoners, or are otherwise managed in a disorderly manner. • The importance of definitions and differentiation: This Handbook reiterates that prisoner radicalization, far from being a new phenomenon, is a very old issue which is not in itself a threat to the prison administration or society if not connected to violence. Not all radicalization is negative or a precursor to violent extremism. Only a very small number of radicals actually become violent extremists. Definitions and differentiation are important, therefore, when dealing with the sensitive topic of (violent) extremism and radicalization (to violence), in particular in order to differentiate between thought and action. • Specific challenges posed by violent extremist prisoners: The above notwithstanding, prison managers should not forget that while both violent extremists and other criminals may employ violence to attain specific goals, most violent extremists are motivated by ideological, religious, or political gain, and believe that they are fighting for a cause. This can have a significant impact on the way violent extremist prisoners should be managed, as this Handbook will set out. The focus of this Handbook is on adult male and female violent extremist prisoners. The specific issue of children alleged as, accused of, or recognized as having committed violent extremist offences will be dealt with in a separate UNODC publication, recognizing the different legal regime applicable to children deprived of their liberty. Collective disengagement from violent extremism is also not covered in this Handbook, as its focus is on the individual prisoner and interventions aimed at individual disengagement from violence. Groups may also abandon their use of violent methods, but the reasons for them doing so are not necessarily the same as when an individual disengages from violence.

Details: New York: UNODC, 2016. 160p.

Source: Internet Resource: Criminal Justice Handbook Series; Accessed March 2, 2017 at: https://www.unodc.org/pdf/criminal_justice/Handbook_on_VEPs.pdf

Year: 2016

Country: International

Keywords: Correctional Administration

Shelf Number: 141300


Author: Price, Megan

Title: Setting the Aperture Wider: A Synthesis of Research and Policy Advice on Security Pluralism in Tunis, Nairobi and Beirut

Summary: In contexts of security pluralism, an array of actors assert claims on the use of force, operating simultaneously and with varying relationships to the state. In such contexts, security providers may acquire legitimacy by proving more effective and efficient, proximate and relevant to local populations, and are often cheaper than state alternatives. Yet, plural security actors are frequently associated with human rights violations, perverse interface with the state, difficulty in providing security equitably in contexts of diversity, and an almost ineluctable tendency toward net production of insecurity over time. Donors have few policy or practical tools with which to engage meaningfully in contexts of plural security provision. Since directly engaging plural security providers would mean upsetting relationships with state partners, conferring legitimacy on groups with unpalatable goals or tactics, or tacitly endorsing violence as a path to political privilege, donors prefer to focus on official security agencies and state oversight. Plural Security Insights and its partners have developed the research project outlined here to address that dearth of relevant policy and programming advice. Comparative research was conducted in three urban contexts: Beirut, Nairobi, and Tunis. Key findings include: • Where security is highly fragmented, powerful actors are able to organise security arrangements that benefit them, and public oversight is difficult to assert. Security as a ‘public good’ cannot be assumed as an operational starting point. • Security assistance interventions in contexts of security pluralism should promote public oversight, standards of practice and divisions of labour for all providers. Supporting one type of provider inevitably privileges some groups and interests over others. • Intermediate steps between relational and rules-based arrangements for security provision may be preferable to conventional approaches that focus exclusively on building the capacity of state institutions. • Efforts to foster stronger, safer communities should pay equal attention to the social determinants of security that maintain order and foster resilience, by encouraging social cohesion, addressing exclusion and ensuring adequate public service provision. The transition from a relational to a rules-based system will require a new repertoire of security assistance strategies and methods. Actions might include: • Tackle the most pernicious aspects of security pluralism, especially exclusion and the lack of accountability, through means such as increasing civic space and strengthening mechanisms for asserting public oversight of all security providers. • Identify and invest in intermediate steps to move from relational to rules-based security systems, including SSR interventions that address the panorama of security providers, and the development of popular oversight mechanisms and functional divisions of labour amongst security providers. • Address the social determinants of security through efforts to strengthen inclusive notions of the public good, and design policies to expand access to public services that reduce citizens’ reliance on fickle, exploitive or divisive private actors.

Details: The Hague: Plural Security Insights, Clingendael Conflict Research Unit, 2016. 36p.

Source: Internet Resource: Accessed March 3, 2017 at: http://pluralsecurityinsights.org/wp-content/uploads/2016/07/160707_PSI_Policy-brief_Synthesis-Report.pdf

Year: 2016

Country: International

Keywords: Citizen Security

Shelf Number: 144433


Author: McPherson, Ella

Title: ICTs and Human Rights Practice

Summary: In 2010, the UN Special Rapporteur on extrajudicial, summary, or arbitrary executions, Christof Heyns, received a horrifying video from the UK’s Channel 4 that seemed to document the summary execution of Tamil prisoners by Sri Lankan soldiers. This anonymous video, shot on a mobile phone, was an extended version of a video that Heyns' predecessor, Philip Alston, had previously evaluated. If true, the video would be evidence of a grave violation of the right to life – evidence that could not have existed prior to the advent of video-enabled mobile phones. After receiving the first, shorter version of the video, Alston wrote the Sri Lankan government indicating that the footage warranted an independent investigation. In response, the Sri Lankan government claimed the video had been fabricated, citing analysis it commissioned from audio, video, ballistics, and forensic pathology experts. In turn, Alston also engaged experts, who instead found that the contents of the video indicated authenticity. Heyns gave the extended video to the same experts for review; by examining the footage for indications of editing and the details of the incidents recorded, these experts again concluded that the video depicted real executions. Heyns then reported these findings to the United Nations Human Rights Council, calling on the Sri Lankan Government to investigate the executions. This pioneering case, which demonstrated both the potential of information and communication technologies (ICTs) for expanding the documentation of human rights violations and the problem of verification this expansion poses, was an impetus for this report. ICTs are unsettling human rights practices across the board, including the key practices of preventing human rights violations, fact-finding cases of violations, and advocating for the amelioration of individual cases as well as for the promotion of a broader culture of human rights. Given the pace of innovation in the development and use of ICTs, our understanding of their impact on human rights often lags. Understanding this impact is crucial not just because of the opportunities ICTs create for human rights – which we can think of as affordances, or what ICTs allow their users to do. It is also crucial – due to the 'double-edged' nature of technology – because of the risks. Information and communication technology is a catchall category that refers to the hardware and software that facilitate the production, storage, transmission, and reception of digital information. The aim of this report, targeted at both practitioners and researchers, is to provide a snapshot of current initiatives and trends at the intersection of ICTs and human rights practices. Based on a review of primary materials documenting these initiatives and trends as well as on interviews with human rights defenders (HRDs), this report examines three key human rights practices in turn. In prevention, the use of ICTs includes their deployment to protect HRDs, to deter violations through police body-worn cameras, and for conflict prevention and early warning systems. These three uses address hotspots of right to life violations. They also create new security and privacy risks. In fact-finding, ICTs support both spontaneous and solicited civilian witnessing. ICTs facilitate fact-finders’ evaluation of human rights information for evidence – but they also complicate it because of the volume and verification challenges of social media information. Although generating robust evidence is a requirement of all human rights fact-finding, it is particularly relevant for cases involving the violation of the right to life, as one of the major challenges in this area is perpetrators’ refutation of allegations of violations. In terms of advocacy, ICTs provide new opportunities for reaching publics and advocacy targets. Because of social media’s particular characteristics and cultures, however, their use may jeopardize the visibility of particular categories of human rights information as well as the reputations of human rights organizations. Looking at opportunities and risks for human rights practices in the field is key for understanding how using ICTs can impact work to secure the right to life and other human rights. These opportunities and risks are not, however, distributed evenly. Their distribution is inflected by digital divides with respect to access to ICTs as well as with respect to digital literacy, or knowledge about how to use ICTs. These digital divides, as well as the nature of the opportunities and risks that the use of ICTs generates, are in turn influenced by ICTs' political economy, namely the power relations in which the use of particular ICTs are embedded. The conclusion of this report recommends that academics and practitioners take an approach to understanding ICTs and human rights practice that encompasses these aspects as a way to foreground the human rights concerns of redressing power abuses and enabling pluralism in the research, design, and deployment of these ICTs.

Details: Cambridge, UK: University of Cambridge, Centre of Governance and Human Rights, 2015. 57p.

Source: Internet Resource: Accessed March 3, 2017 at: http://www.cghr.polis.cam.ac.uk/research-themes/human-rights-in-the-digital-age-1/ICTS_and_Human_Rights_Practice

Year: 2015

Country: International

Keywords: Arbitrary Executions

Shelf Number: 141319


Author: Heissner, Stefan

Title: Caliphate in Decline: An Estimate of Islamic State's Financial Fortunes

Summary: About this Study • The so-called Islamic State has often been described as the richest terrorist organization in the world. • This estimate of Islamic State revenues for the years 2014–2016 results from a collaboration between EY and the International Centre for the Study of Radicalisation (ICSR), King's College London. It is based on a systematic review of open source information about the finances of Islamic State in its core territory in Syria and Iraq. Key Findings • Estimates vary widely. It remains impossible to say exactly how much money Islamic State has at its disposal. • The group's most significant sources of revenue are closely tied to its territory. They are: (1) taxes and fees; (2) oil; and (3) looting, confiscations, and fines. We have found no hard evidence that foreign donations continue to be significant. Similarly, revenues from the sale of antiquities and kidnap for ransom, while difficult to quantify, are unlikely to have been major sources of income. • In the years since 2014, Islamic State’s annual revenue has more than halved: from up to $1.9b in 2014 to a maximum of $870m in 2016. There are no signs yet that the group has created significant new funding streams that would make up for recent losses. With current trends continuing, the Islamic State’s "business model" will soon fail. Assessment • Evaluating Islamic State finances through traditional approaches towards "countering terrorist finance" leads to serious misconceptions. Islamic State is fundamentally different because of the large territory it controls and the unique opportunities this offers for generating income. • Conversely, its reliance on population and territory helps to explain the group's current financial troubles. According to figures provided by the Global Coalition, by November 2016 Islamic State had lost 62 per cent of its mid-2014 "peak" territory in Iraq, and 30 per cent in Syria. From a revenue perspective, this means fewer people and businesses to tax and less control over natural resources such as oil fields. Prospects • There are good reasons to believe that Islamic State revenues will further decline. In particular, capturing Mosul, the Caliphate's "commercial capital", will have a significant detrimental effect on Islamic State finances. • Nevertheless, Islamic State, and its Al-Qaeda in Iraq (AQI) predecessor, have repeatedly demonstrated that financial and military setbacks can be overcome. • Moreover, the decline in revenues may not have an immediate effect on the group’s ability to carry out terrorist attacks outside its territory. While hurting Islamic State finances puts pressure on the organization and its state-building project, wider efforts will continue to be necessary to ultimately defeat it.

Details: London: The International Centre for the Study of Radicalisation (ICSR), King's College London: 2017. 20p.

Source: Internet Resource: Accessed March 4, 2017 at: http://icsr.info/wp-content/uploads/2017/02/ICSR-Report-Caliphate-in-Decline-An-Estimate-of-Islamic-States-Financial-Fortunes.pdf

Year: 2017

Country: International

Keywords: Caliphate

Shelf Number: 141335


Author: Schmid, Alex P.

Title: Public Opinion Survey Data to Measure Sympathy and Support for Islamist Terrorism: A Look at Muslim Opinions on Al Qaeda and IS

Summary: This Research Paper seeks to explore what 'sympathy' and 'support' actually mean when it comes to terrorism. The text addresses some of the problems of public opinion surveys, includes a conceptual discussion and then continues with the presentation of data from public opinion surveys. It notes that opinion polls can be helpful in gauging (verbal) support for terrorism but also finds that the questions asked in opinion polls are generally lacking precision while the answers are often influenced by political pressures. When translating (generally low) percentages of sympathy and support for al Qaeda and so-called Islamic State in various countries into actual population figures, it emerges that there is a sizeable radical milieu in both Muslim-majority countries and in Western Muslim diasporas, held together by the world wide web of the internet. While large majorities of Muslims in most countries have no love for jihadist extremists, there are more than enough breeding grounds for terrorism. The Research Paper concludes that better instruments for measuring sympathy and support for jihadist terrorism are needed to inform counter-terrorist strategies

Details: The Hague: The International Centre for Counter-Terrorism, 2017. 34p.

Source: Internet Resource: ICCT Research Paper: Accessed March 4, 2017 at: https://icct.nl/wp-content/uploads/2017/02/ICCT-Schmid-Muslim-Opinion-Polls-Jan2017-1.pdf

Year: 2017

Country: International

Keywords: al Qaeda

Shelf Number: 141336


Author: Jetter, Michael

Title: Terror Per Capita

Summary: Usually, studies analyzing terrorism focus on the total number of casualties or attacks in a given county. However, per capita rates of terrorism are more likely to matter for individual welfare. Analyzing 214 countries from 1970 - 2014, we show that three stylized findings are overturned in terms of sign, magnitude, and statistical significance when investigating terror per capita. Democracy, previously associated with more casualties, emerges as a marginally negative predictor of terror per capita. A larger share of Muslims in society is, if anything, associated with less terrorism. Similar conclusions apply to language fractionalization.

Details: Munich, Germany: CESifo, 2017. 20p.

Source: Internet Resource: CESifo Working Paper No. 6335: Accessed March 4, 2017 at: https://ideas.repec.org/p/ces/ceswps/_6335.html

Year: 2017

Country: International

Keywords: Islam

Shelf Number: 141338


Author: U.S. Department of Justice. Office of Justice Programs. Office of Sex Offender Sentencing, Monitoring, Apprehending, Registering, and Tracking (SMART)

Title: Global Survey of Sex Offender Registration and Notification Systems

Summary: Sex offender registration and notification systems have proliferated around the world over the last twenty years. After the United States' first national-level sex offender registration law was passed in 1994, 29 additional countries have enacted sex offender registration laws. A handful of these systems are more analogous to what would be considered a CHRI (criminal history record information) database as opposed to a 'registry', but are included in this overview for the sake of thoroughness. The following countries have laws governing sex offender registration systems at the national and/or provincial level: Argentina, Australia, Bahamas, Canada, Chile, Cyprus, France, Germany, India, the Republic of Ireland, Jamaica, Kenya, Maldives, Malta, New Zealand, Nigeria, Portugal, South Africa, South Korea, Spain, Taiwan, Trinidad & Tobago, United Kingdom and Commonwealth Nations (Bermuda, Gibraltar, Guernsey, Isle of Man, Jersey, and the Pitcairn Islands), and the United States. The following countries have considered or are considering sex offender registration and notification laws, but such laws have not yet passed: Austria, Barbados, Belgium, Belize, Cayman Islands, Fiji, Finland, Hong Kong, Israel, Malaysia, Poland, Samoa, St. Lucia, Switzerland, United Arab Emirates, and Zimbabwe. What follows in this SMART Summary is a brief snapshot of the sex offender registration and notification laws in each of the countries that have enacted such provisions, sequenced in chronological order of the first country in a continent or region to implement such laws. Statutory references, where available, are provided. In addition, the footnotes contain additional references which might assist the reader in finding out more detailed information about the countries' sex offender registration and notification provisions. As this is a rapidly developing area of the law, and many statutes have not been officially translated into English, the reader is encouraged to check for the current versions of any nation's provisions and consult official translations, rather than relying solely on this SMART Summary.

Details: Washington, DC: U.S. Department of Justice, 2016. 32p.

Source: Internet Resource: SMART Summary: Accessed march 4, 2017 at: https://smart.gov/pdfs/global-survey-2016-final.pdf

Year: 2016

Country: International

Keywords: Sex Offender Notification Systems

Shelf Number: 141339


Author: Rueppel, Patrick

Title: Countering Violent Extremism and Terrorism in Asia and Europe

Summary: Countering violent extremism and terrorism has been a top priority of governments in Asia and Europe for many years. Terrorist cells posed a severe threat to home security, even before the emergence of Daesh. However, as a consequence of Asian and European citizens joining Daesh, terrorists have been able to establish networks among fighters from both regions. It has thus become imperative that governments from Asia and Europe enhance their collaboration and coordination in all dimensions of counter-terrorism efforts.

Details: Singapore: Konrad Adenauer Stiftung, 2017. 13p.

Source: Internet Resource: Policy Paper, no. 4: Accessed March 6, 2017 at: http://www.kas.de/wf/doc/kas_48006-1522-2-30.pdf?170301114252

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145585


Author: Willis, Matthew

Title: Supported Housing for Prisoners Returning to the Community: A Review of the Literature

Summary: Commissioned by Corrections Victoria to inform its future strategies for delivering housing support strategies to people leaving the prison system, this report presents a literature that builds on two earlier reviews conducted in 2010 and 2013. Those earlier reviews identified a range of models and approaches to delivering housing support that represented the key elements of good and promising practice. In the period since 2013 new literature has become available that builds on this evidence base, reasserting some of the earlier findings, adding clarity to others, and expanding into new considerations. Several recent studies have reinforced the need to provide housing assistance for people leaving prison. Interviews with police detainees showed that nearly one quarter had been homeless or experiencing housing stress in the month before being arrested. A study by the Australian Housing and Urban Research Institute emphasised the role of demographic factors in contributing to homelessness, with 42 percent of homeless people across Australia being found in just 10 percent of Australian regions. The demographic factors that contribute to homelessness tend to be the same as those that contribute to engagement with the criminal justice system and there are substantial cross-overs between homeless and correctional populations. A number of other recent studies have highlighted the value of meeting the need for housing support. Studies conducted in the United Kingdom (UK) have shown that the costs of even resource intensive housing assistance are substantially less the cost of imprisonment and harms resulting from reoffending. Other studies have reinforced earlier findings on the association between housing stability and reductions in recidivism, with former prisoners in stable housing much less likely to reoffend than those in circumstances of homelessness or unstable accommodation. While research has shown all program elements used in aftercare programs for ex-prisoners have the potential to be effective, including housing components together with aftercare support enhanced ex-prisoner's chances of successfully reintegrating with the community. Consistent with the risk principle of correctional programming, housingrelated services produced the most effective outcomes, in terms of reduced offending and order revocations, for medium- and high-risk offenders. Despite the demonstrated needs and value of providing housing assistance to released prisoners, recent evidence points to the likelihood of community resistance to establishing transitional or other support housing. A United States (US) survey of attitudes towards re-entry initiatives found a moderate degree of public support for the provision of housing assistance to offenders. This support diminished rapidly when the assistance was intended for serious or repeat offenders, or when the hypothetical notion of a housing facility being established in the respondent's own neighbourhood was raised. The study found very little public support for transitional housing for violent and sex offenders. Models of housing support identified in the literature included models with differing degrees of control or choice by clients. Custodial housing applications are most applicable for people with severe mental illness who require strict controls, limited or absent choice, and housing that is tied directly to treatment. The terms supportive housing and supported housing tend to be used interchangeably in the literature. Attempts to establish different definitions of the terms have tended to place supportive housing in the realm of rehabilitation, with clients being allowed increasing degrees of control and choice as they transition through different levels of supervision. Conversely, supported housing tends to be used more for approaches focused on recovery in which clients live independently and exercise choice in regard to the range of flexible and individualised supported services available to them. However, not only is the terminology often used interchangeably, different models are not considered mutually exclusive, and some programs will often a blend of supportive and supported housing, sometimes including emergency crisis accommodation and transitional housing in their mix of services. Evaluations of supportive and supported housing programs have shown they have a potential to deliver positive outcomes for clients, including physical and financial security, greater social inclusion, greater feelings of stability and control and increased well-being. These evaluations and related discussions of housing models emphasise their application to psychiatric populations and care should be taken in assessing the applicability of any given approach to other vulnerable populations, including offenders. In Australia, two dominant models of supportive housing have emerged. The Common Ground model is based on congregated housing with onsite support and social services. It has been implemented through an alliance of housing providers across five states, including Victoria. Scattered-site housing models utilise geographically dispersed accommodation with clients receiving support services through outreach from allied organisations. Neither of these models should be considered as fixed or rigid, with many different approaches and designs being implemented within these broad models. One of the characterising features of both models is the flexible and individualised support provided to clients. The nature and intensity of the support can vary widely across programs and between individuals, but the most effective models appear to be those that allow clients to determine the services they receive. One of the important areas of development in the recent literature is the emergence of difference financial models, including social impact investment approaches. Often aligned with strategies such as Justice Reinvestment, social impact investments have taken forms such as Social Impact Bonds and Payment by Results methods. Each of these strategies aims to deliver social reforms and interventions without substantial up-front costs or risks to government, through investment arrangements with commercial or philanthropic organisations. Social impact investments potentially represent a way for government to deliver costly housing initiatives without impacting on other areas of need or government expenditure. A range of different housing support models are in place across Australia, each aiming to provide stable and secure accommodation for offender clients at high risk of experiencing homelessness or housing instability. In many ways the Australian implementations have similarities with those implemented in the US and UK, even though the elements and approaches vary between programs and locations. Quite different approaches are in place in some European countries, resulting from the different ways offenders are managed in those countries. Practices in countries such as Germany and the Netherlands emphasise rehabilitation and normalisation, aiming to have the experiences of life in prison parallel those in the community as much as possible. People leaving prison in those countries have typically had substantial opportunities to maintain family relationships and maintain or secure accommodation well before they are released. There remains little clear evidence of the application or effectiveness of different housing models and approaches to vulnerable groups within correctional populations. The evidence shows that sex offenders, particularly sexually violent offenders with strict limitations on their residence and movements are at heightened risk of homelessness on release from prison. International experience shows that attempts to establish housing options for sexually violent offenders are likely to meet with substantial resistance from communities as well as local authorities. Little attention appears to have been paid in the literature to the housing support needs of Indigenous Australians. Overall, a review of the recent literature on supported housing for correctional populations highlights the importance of flexible and individually oriented approaches to delivering housing assistance. Good practice in housing support focuses on individual needs and the provision of appropriate degrees and types of individual choice and control. Holistic and integrated wraparound services delivered through collaborative, multi-agency approaches that span the range of individual support and treatment needs remain an integral part of good practice housing support interventions.

Details: Canberra: Australian Institute of Criminology, 2016. 41p.

Source: Internet Resource: Accessed March 6, 2017 at: http://assets.justice.vic.gov.au/corrections/resources/19acadf4-576b-4fd8-9158-b3c3248a6c77/literature_review_prisoner_housing_model.pdf

Year: 2016

Country: International

Keywords: Housing

Shelf Number: 141353


Author: Winter, Charlie

Title: War by Suicide: A Statistical Analysis of the Islamic State’s Martyrdom Industry

Summary: This Research Paper explores the so-called Islamic State's use of suicide tactics over the course of 12 months – from 1 December 2015 to 30 November 2016. It uses an exhaustive sample of the group's suicide operation reports as a window into the tactical and strategic underpinnings of its martyrdom industry. After first establishing what precisely is meant by the term 'suicide tactics' in the context of the Islamic State (IS), the 923 suicide operations that were individually reported in the group's official propaganda between December 2015 and November 2016 are statistically evaluated, allowing for an exploration of when, how and where IS used suicide tactics over the period in question, as well as who its suicide operatives were. The paper demonstrates that IS’s present approach towards suicide bucks past trends. Instead of predominantly being carried out by foreigners against civilian targets, as was the case in Iraq in the 2000s, its suicide attacks are now primarily perpetrated by local operatives against military targets. This reflects a new phase of operationalisation for suicide warfare; a tactical shift with strategic implications that will change the insurgent and terrorist landscape for years to come.

Details: The Hague: International Centre for Counter-Terrorism, 2017. 34p.

Source: Internet Resource: ICCT Research Paper: Accessed March 9, 2017 at: https://icct.nl/wp-content/uploads/2017/02/ICCT-Winter-War-by-Suicide-Feb2017.pdf

Year: 2017

Country: International

Keywords: ISIS

Shelf Number: 144385


Author: Equality Now

Title: The World's Shame: The Global Rape Epidemic. How Laws Around the World are Failing to Protect Women and Girls from Sexual Violence

Summary: Around the world, rape and sexual abuse are everyday violent occurrences -- affecting close to a billion women and girls over their lifetimes. However, despite the pervasiveness of these crimes, laws are insufficient, inconsistent, not systematically enforced and, sometimes, promote violence. Since Equality Now's founding in 1992, we have worked with survivors of rape and sexual assault to help them get justice and to push for measures to bring an end to this unacceptable crime. This report looks at how laws around the world are still failing to protect women and girls from sexual violence. According to the World Health Organisation (WHO), 35 per cent of women worldwide have experienced either physical and/or sexual intimate partner violence or non-partner sexual violence. According to UNICEF, around 120 million girls worldwide, just over 1 in 10, have experienced "forced intercourse or other forced sexual acts" at some point in their lives. Everyone reading this report is likely to have either survived, or to know someone who has experienced, some form of sexual violence. By any measure, gender-based violence, including sexual violence, is being inflicted on women and girls in epidemic proportions. If it were a medical disease, sexual violence would have the serious attention and the funding to address it, from governments and independent donors alike. Sexual violence is inflicted on men and boys as well as on women and girls. However, since many laws contain explicit discrimination against women and girls and since perpetrators of rape are almost exclusively male and the vast proportion of survivors of sexual violence women and girls, this report is largely written from that perspective. We wanted also to underscore the predominantly gendered nature of rape - that is of male sexual violence against women – to highlight how this violence and discrimination not only influences the way laws are written and carried out, but how sexual violence against women and girls is a form of discrimination itself that needs to be addressed if sexual violence against women and girls is to be eradicated. Globally, governments have committed and recommitted to ending all forms of violence against women and girls, including sexual violence. In September 2015, the UN General Assembly adopted Transforming our world: the 2030 Agenda for Sustainable Development("Agenda 2030"). This includes to "Achieve gender equality and empower all women and girls" (Goal 5), "eliminate all forms of violence against all women and girls in the public and private spheres" (Target 5.2), and "[e]nsure equal opportunity and reduce inequalities of outcome, including by eliminating discriminatory laws, policies and practices…." (Target 10.3). This is a welcome spotlight on the human rights violations which continue to affect countless women, girls, their families and communities and a promise to re-double efforts to end them. However, promises are easy to make. Now is the time to join efforts between government, business and civil society to grasp this focus and together make meaningful change to promote equality and truly make violence against women and girls unacceptable. A concerted and serious approach would make a huge difference for women and girls today and lay the foundation for a future where we can all thrive. The findings and analysis in this report are a reflection of information and trends emerging from our review of surveys on sexual violence laws submitted by members of the legal profession in 82 jurisdictions (including within 73 UN member states)1 around the world. Under the auspices of UN Women, in 2012 expert civil society groups and others provided guidance on drafting, advocating for, implementing and monitoring legislation on sexual assault. UN Women's Virtual Knowledge Centre established general guidelines about what this legislation should and should not contain to give the most protections to women and girls. This report positions the information received from our surveys against these UN Women benchmarks.

Details: New York: Equality Now, 2017. 68p.

Source: Internet Resource: Accessed March 10, 2017 at: http://www.equalitynow.org/sites/default/files/EqualityNowRapeLawReport2017_Single%20Pages.pdf

Year: 2017

Country: International

Keywords: Rape

Shelf Number: 14448


Author: Barzegar, Abbas

Title: Civic Approaches to Confronting Violent Extremism: Sector Recommendations and Best Practices

Summary: Given the continued rise of transnational and domestic terrorism, countering the appeal of extremist ideologies and organizations is increasingly becoming a top policy priority for governments around the world. Crucial to challenging extremist ideology and violence is the role of civil society organizations that are operating in this highly contested ideational and social space. After years of unfruitful government-led strategic communications campaigns, policymakers are now focusing on empowering credible voices at the grassroots level to expand their communications reach among individuals and communities vulnerable to the appeal of violent extremism. Yet, while U.S. and European governments shift towards prioritizing a surrogate strategy for combatting extremist propaganda, there is very little understanding of the efficacy of counter-ideological civil society initiatives already operating in this space. As concerns about violent extremism grow, there is a troubling knowledge gap between those operating at the grassroots, community level and in government and law enforcement agencies. This report aims to fill that gap by highlighting best practices and identifying areas of vulnerability in CSO and private sector campaigns against extremism. We have convened major non-governmental, civil society groups and private sector actors operating in the anti-extremist violence and propaganda space to identify and scope current best practices and expertise in the areas of (a) building resilience amongst communities to deflect the rise of extremism and (b) developing counter-narratives, alternative narratives and strategic communications. The closed-door workshops and follow up interviews helped to map the sector, facilitating clarity regarding best practices, shared challenges, and sector and policy-specific recommendations. The findings outline successful ideological efforts to counter extremist ideology, while identifying current gaps, potential future developments, and opportunities for collaboration across regions and sectors. The enclosed organizational profiles and findings outline a range of counter-ideological programs, projects and activities operating across both Europe and the US. Technological platforms have become a crucial space for both extremist and alternative messaging, operating in between civil society, extremists and governments. This report also includes input from industry stakeholders operating in this space, as they play a crucial role in negotiating how content is accessed and delivered in the global public sphere. By way of conclusion, specific sector and policy recommendations are offered to move towards a holistic, civil society-led, multi-sector approach to confronting violent extremism.

Details: London: Institute for Security Dialogue, 2016. 60p.

Source: Internet Resource: Accessed March 10, 2017 at: http://tcv.gsu.edu/files/2016/09/Civic-Approaches-Sept-8-2016-Digital-Release.pdf

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 144453


Author: Ingram, Haroro J.

Title: A Brief History of Propaganda During Conflict: Lessons for Counter-Terrorism Strategic Communications

Summary: There is a tendency in scholarly and strategic-policy fields to see the propaganda produced by groups like Islamic State and Al-Qaeda as historically unheralded. As evidence, slickly produced communiques and a penchant for using social media are typically highlighted. This narrow perspective, in placing the current phenomenon into an historical and thematic vacuum, infers that history has little to offer contemporary efforts to understand and confront extremist propaganda. This Research Paper explores the history of propaganda during conflict and draws out key lessons for improving counter-terrorism strategic communications. For millennia the evolution of propaganda strategies during conflict has been driven by three fundamental factors: developments in communication technology, advancements in military technology and strategy, and the shifting relationship between the political elite and the populace. This rich history offers vital lessons for contextualising and improving current (and future) efforts. Overall, history suggests that a strategic communications campaign during conflict is more likely to succeed if it based on a multifaceted approach characterised by the deployment of a diversity of messages that leverage a variety of target audience motivations, uses all pertinent means of communication (not just the latest), and synchronises this messaging with strategic-policy/politico-military actions.

Details: The Hague: The International Centre for Counter-Terrorism , 2016. 47p.

Source: Internet Resource: ICCT Research Paper: Accessed March 13, 2017 at: https://www.icct.nl/wp-content/uploads/2016/06/ICCT-Haroro-Ingram-Brief-History-Propaganda-June-2016-LATEST.pdf

Year: 2016

Country: International

Keywords: Communications

Shelf Number: 144459


Author: Burniske, Jessica S.

Title: Pilot Empirical Survey Study on the Impact of Counterterrorism Measures on Humanitarian Action & Comment on the Study

Summary: To help determine the measurable impact of counterterrorism laws on humanitarian action, the Counterterrorism and Humanitarian Engagement (CHE) Project at the Harvard Law School Program on International Law and Armed Conflict collected data from humanitarian actors demonstrating the impact (or lack thereof) of counterterrorism laws and regulations on humanitarian organizations and their work. The Pilot Empirical Survey Study on the Impact of Counterterrorism Measures on Humanitarian Action (by Jessica S. Burniske and Naz K. Modirzadeh, March 2017) captures the resulting initial attempt at a pilot empirical study in this domain. Modirzadeh wrote a Comment on the Study (March 2017). That Comment raises considerations for states and donors, for humanitarian organizations, and for researchers.

Details: Cambridge, MA: Harvard Law School Program on International Law and Armed Conflict, 2017. 86p.

Source: Internet Resource: Accessed March 15, 2017 at: http://blogs.harvard.edu/pilac/files/2017/03/Pilot-Empirical-Survey-Study-and-Comment-2017.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 144471


Author: Saltman, Erin Marie

Title: 'Till Martyrdom Do Us Part': Gender and the ISIS Phenomenon

Summary: Although often assumed to be passive agents, women have played significant roles in a number of contemporary terrorist organizations. Violent extremist groups across the political and ideological spectrum have utilised female forces for a range of activities including logistics, recruitment, political safeguarding, operations, suicide bombing and combat. However, the recent unprecedented surge in female recruits to the terrorist organization Islamic State (ISIS) has brought this phenomenon into sharp focus. For many there remain misperceptions and misunderstandings concerning the role women play within these violent networks, often paired with engendered responses to the radicalisation of women. By analysing how terrorist organisations choose to utilise women, we are able to better understand the decision-making processes of terrorists and the inner-workings of the organization itself. The number of Western foreign fighters and migrants to ISIS is estimated to be up to 4,000, with over 550 women within this figure. This unprecedented number of Western male foreign terrorist fighters is paralleled by an equally unprecedented number of women traveling to support ISIS. Questions are now being posed as to how and why females are being recruited en masse, what role they play for ISIS, and what tools will best work to counter this new threat. Yet very little work has been done to not only answer these questions but to build sustainable preventative measures. This report attempts to shed light on these questions as the second publication within ISD's Women and Extremism (WaE) programme. The first WaE report, Becoming Mulan? Female Western Migrants to ISIS, addressed some of the reasons for Western females traveling to ISIS-territory and exposed key elements of the reality for females upon arrival ISIS-controlled territory. This report aims to expand upon previous research by giving depth to understanding who is being radicalized, why these women decide to depart for Syria and how we can better stop these processes. There are three primary sections to this report. The first maps the primary push and pull factors which prime women and lead them down a path of violent radicalisation to the point at which they decide they must make hijra (migrate) to join ISIS. These factors disprove the one-dimensional label for these women, who are often referred to simply as 'jihadi brides'. The second section of this report gives indepth profiles of 7 English-speaking females who have successfully journeyed to join ISIS and are now resident in the so-called Islamic State. These profiles show the diversity among female recruits and expose everything from their driving motivations, worldviews and subsequent roles under ISIS control. The final section of this report looks at counter-extremism work in the space of prevention and de-radicalisation, showing how various Western governments are operating within this space and analysing where better infrastructure is needed to address the topic of gender within processes of radicalisation.

Details: London: Institute for Strategic Dialogue, 2015. 80p.

Source: Internet Resource: Accessed March 15, 2017 at: http://www.strategicdialogue.org/wp-content/uploads/2016/02/Till_Martyrdom_Do_Us_Part_Gender_and_the_ISIS_Phenomenon.pdf

Year: 2015

Country: International

Keywords: Extremist Groups

Shelf Number: 144473


Author: United Nations Educational, Scientific and Cultural Organization

Title: Global Guidance on Addressing School-Related Gender-Based Violence

Summary: More than 246 million children are subjected to gender-based violence in or around schools every year. This is a violation of their human rights, and a form of gender-discrimination that has far-reaching physical, psychological and educational consequences. Until school-related gender-based violence is eliminated in and around schools across the world, many of the ambitious targets set by the global community through the Sustainable Development Goals (SDGs), to provide safe and supportive learning environments, to end violence against children in all settings and to achieve gender equality and eliminate violence against women and girls, will not be realized. That is where this Global Guidance on Addressing School-Related Gender-Based Violence comes in. The result of the combined expertise and leadership of UNESCO, UN Women and other partners, this Guidance will help us stand a better chance of supporting countries to end this global issue. The Global Guidance provides key information to governments, policy-makers, teachers, practitioners and civil society who wish to take concrete action against school-related gender-based violence. It introduces approaches, methodologies, tools and resources that have shown positive results in preventing and responding to school-related gender-based violence. We are confident that this will contribute to further promote the generation of knowledge, evidence and standards of response against this pervasive problem. With the Global Guidance in hand, this is a key moment for all of us to ensure that school-related gender-based violence does not remain a barrier to achieving the SDGs.

Details: Paris: UNESCO; New York: UN Women, 2016. 126p.

Source: Internet Resource: Accessed March 17, 2017 at: http://www.unwomen.org/-/media/headquarters/attachments/sections/library/publications/2016/school-related-gender-based-violence-guidance-en.pdf?vs=3954

Year: 2016

Country: International

Keywords: Gender-Related Violence

Shelf Number: 144488


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Handbook on Effective Prosecution Responses to Violence against Women and Girls

Summary: Violence against women and girls is a widespread and serious violation of human rights that has severe physical, psychological, emotional and social consequences. The process of bringing a complaint into the criminal justice system can be a difficult and traumatizing experience for many victims for different reasons. Gender bias and discrimination fuel myths around such violence which shape the criminal justice response to these crimes. Many victims never report their victimization or they have been filtered out of the criminal justice system, resulting in low charge and conviction rates. A victim’s decision to report gender-based violence and continue within the criminal justice system is one of the most important factors affecting the prosecution of cases. The way in which the criminal justice professionals initially respond to victims is critical in determining whether a victim chooses to participate in further legal action, or abandons it because she has experienced secondary victimization1 or harsh treatment by the criminal justice system. Prosecutors play a critical role in the criminal justice response to violence against women and girls. While prosecutors face different duties and tasks depending on their State’s legal system, they generally represent the authority of the State in bringing a criminal case against the accused perpetrator, ensuring the application of the law during the criminal proceedings. Prosecuting gender-based violent crime can be challenging. Often there are a number of evidentiary challenges, due to the private nature of the violence. The police investigation may be substandard. Victims may be uncooperative, and withdraw or recant their complaints. Judges or juries may employ gender bias or common myths surrounding violence against women and girls when examining the credibility of the victim and the facts of the case. The goals of prosecution are to protect the victims while holding perpetrators accountable for their actions, and communicate a strong message to the community that violence against women and girls will not be tolerated. The rule of law is undermined when impunity characterizes the criminal justice response to violence against women and girls. Prosecutors handling these cases have the difficult task of balancing the imperative of victim safety with their traditional goal of presenting the case for the State according to the rule of law and the attendant duty to ensure that a person accused of a crime receives a fair trial. In some situations, participating in a prosecution may endanger a woman’s physical or emotional well-being. Prosecutors should apply fair and consistent procedures and strengthen links and cooperation with other institutions and agencies to ensure victim safety and offender accountability. It is the prosecutor’s actions that ensure a credible criminal justice system for female victims of violence thereby contributing to their trust in the system. In December 2010, the United Nations General Assembly adopted the updated Model Strategies and Practical Measures on the Elimination of Violence against Women in the Field of Crime Prevention and Criminal Justice2 which provide a comprehensive policy framework to assist States in developing responses and carrying out actions to eliminate violence against women and to promote equality between men and women within the criminal justice system. The updated Model Strategies and Practical Measures provide a series of broad recommendations for countries organized around the following themes: criminal law; criminal procedure; police, prosecutors and other criminal justice officials; sentencing and corrections; victim support and assistance; health and social services; training; research and evaluation; crime prevention measures; and international cooperation. Drawing upon the recommendations and guidance contained in the updated Model Strategies and Practical Measures, the United Nations Office on Drugs and Crime (UNODC), in cooperation with the Thailand Institute of Justice, has drafted this Handbook with a view to assisting prosecutors in their duty to uphold the rule of law, firmly protecting human rights and serving their community with impartiality and fairness in cases involving violence against women and girls. Recognizing that prosecutors work in different legal systems, this Handbook is meant to be a resource to build on for individual prosecutors and prosecution services. Given the sheer diversity of prosecution structures and approaches, the Handbook will restrict itself to covering the general prosecutorial powers and functions. This includes: (a) deciding whether or not to initiate or continue criminal proceedings in cases of violence against women and girls; (b) directing or supervising investigations; (c) dealing with victims; (d) presenting cases before the courts; (e) deciding on alternatives to prosecution; and (f) playing a role in sentencing. At the outset of the Handbook, it should be stressed that it includes information on aspects and requirements that may not fall within the role and functions of prosecutors in all national jurisdictions and legal systems, especially as regards interviewing and preparing the victim for trial, plea bargaining or the use of experts witnesses. The Handbook is divided into three parts. • Part One discusses current reflections, theories and research on violence against women and girls, the importance of the criminal justice response and some of the common misconceptions and myths surrounding sexual and gender-based violence. • Part Two focuses on the role of a prosecutor in cases involving violence against women and girls. This part covers dealing with victims, role in investigations and the relationship with police, the decision to prosecute, the selection of charges, pretrial considerations such as release pending trial and no contact orders, evidentiary issues, trial considerations, role in sentencing and post-conviction, and restorative justice concerns. • Part Three explores some of the institutional approaches that a prosecution agency can consider to ensure an effective response to violence against women and girls.

Details: New York: UNODC, 2014. 192p.

Source: Internet Resource: Criminal Justice Handbook Series: Accessed march 17, 2017 at: http://www.unodc.org/documents/justice-and-prison-reform/Handbook_on_effective_prosecution_responses_to_violence_against_women_and_girls.pdf

Year: 2014

Country: International

Keywords: Criminal Prosecution

Shelf Number: 144489


Author: Jacobson, Jessica

Title: Prison: Evidence of its use and over-use from around the world

Summary: This report looks at patterns of imprisonment in ten contrasting jurisdictions across all five continents of the world, namely: • Kenya and South Africa in Africa • Brazil and the United States in the Americas • India and Thailand in Asia • England and Wales, Hungary and the Netherlands in Europe • Australia in Oceania Over the course of the report, we present a brief history of imprisonment in each of the ten countries, and consider what lessons might be learnt for reducing use of custody worldwide.

Details: London: Institute for Criminal Policy Research, 2017. 48p.

Source: Internet Resource: Accessed March 18, 2017 at: http://www.prisonstudies.org/sites/default/files/resources/downloads/global_imprisonment_web2c.pdf

Year: 2017

Country: International

Keywords: Correctional Institutions

Shelf Number: 144498


Author: United Nations Office on Drugs and Crime (UNODC)

Title: The non-medical use of prescription drugs Policy direction issues

Summary: The growing non-medical use of prescription drugs is a global health concern. Such usage can be defined as the taking of prescription drugs, whether obtained by prescription or otherwise, other than in the manner or for the reasons or time period prescribed, or by a person for whom the drug was not prescribed. The real scale of the problem is unknown, due partly to lack of data on the non-medical use of prescription drugs, and partly to the existence of many gaps in the monitoring of their legal use for medical purposes as prescribed by health-care professionals (which creates opportunities for the diversion of these drugs to people to whom they were not prescribed). Most studies on and monitoring instruments for substance abuse pertain to the use of illegal drugs, or alcohol and tobacco. However, the non-medical use of prescription drugs is a unique category of substance use in number of ways and requires attention at different levels. Advances in the pharmaceutical industry have led to the production of powerful psychoactive medications, which when prescribed appropriately and taken in the manner intended, improve the quality of life of those with specific medical conditions, such as acute pain, palliative care, epilepsy, dependence on opioids and acute anxiety. However, when used inappropriately, these medications can have serious consequences for health and can lead to dependence. In recognition of the problems that may be caused by the inappropriate use of such medication, their use has been regulated by three major drug control treaties: • The Single Convention on Narcotic Drugs of 1961 as amended by the 1972 Protocol, which was aimed at combating the use of illicit drugs by coordinated international action. • The Convention on Psychotropic Substances of 1971, which established an international system of control for the use of psychotropic substances. • The United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (adopted in 1988), which includes legislative and administrative measures against drug trafficking, including provisions against money-laundering and the diversion of precursor chemicals. The overall aims of these treaties are to ensure the availability of these medications for medical and scientific purposes, and to prevent their diversion into illicit channels. The most common types of prescription medication used in a non-medical context include the following: (a) opioids, such as hydrocodone, oxycodone, propoxyphene, hydromorphone, meperidine, and fentanyl; (b) other central nervous system depressants, including both barbiturates, such as pentobarbital sodium, and benzodiazepines, such as diazepam and alprazolam; and (c) central nervous stimulants, including amphetamines such as dextroamphetamine, and amphetamine-like stimulants, such as methylphenidate. Increased non-medical use creates a greater demand for prescription medications, leading to new sources of diversion from medical to non-medical use or to the production of counterfeit drugs (United States, Office of National Drug Control Policy, 2008). In its 2006 report, the International Narcotics Control Board (INCB) noted that medications containing narcotic or psychotropic drugs are becoming the drugs of choice for many users, and that drug traffickers are responding to the demand through increased diversion and the production of counterfeit drugs. Prescription drugs can be obtained for non-medical purposes by various means. These include: • Obtaining prescriptions or prescription drugs from family and friends • Over prescribing by physicians • Multiple prescriptions through a doctor • Forged prescriptions • Illegal online pharmacies • Theft and burglary (from hospitals, residences, pharmacies) • Unscrupulous physicians selling drugs This paper responds to the Political Declaration of the Commission on Narcotic Drugs issued in 2009, in which Member States of the United Nations vowed: "…to tackle the world drug problem and actively promote a society free of drug abuse in order to ensure that all people can live in health, dignity and peace, with security and prosperity." (Political Declaration, paragraph 1). This paper is also a result of the drug-related resolution 53/4 of 2010 adopted by the Economic and Social Council (ECOSOC) and the Commission on Narcotic Drugs (CND), resolution that states: "… stressing the importance of promoting adequate availability of internationally controlled licit drugs for medical and scientific purposes while preventing their diversion and abuse, …" .

Details: Vienna: UNODC, 2011. 96p.96p.

Source: Internet Resource: Discussion Paper: Accessed March 21, 2017 at: https://www.unodc.org/documents/drug-prevention-and-treatment/nonmedical-use-prescription-drugs.pdf

Year: 2011

Country: International

Keywords: Counterfeit Drugs

Shelf Number: 144537


Author: Human Rights Watch

Title: Protecting Schools from Military Use Law, Policy, and Military Doctrine

Summary: The 101-page report, "Protecting Schools from Military Use: Law, Policy, and Military Doctrine," contains examples of law and practice from 40 countries, from Afghanistan to Yemen, instituting some level of protection for schools or universities from military use. Many of the examples come from countries currently or recently involved in armed conflict, indicating that governments and armed forces are recognizing the negative consequences of military use of schools and have found practical solutions to deter such use. Examples of these measures can be found throughout the world, in legislation, court decisions, and military policies and doctrine. Governments should adopt and follow protections for schools.

Details: New York: HRW, 2017. 114p.

Source: Internet Resource: Accessed March 23, 2017 at: https://www.hrw.org/sites/default/files/report_pdf/crdsafeschools0317_web_0.pdf

Year: 2017

Country: International

Keywords: Human Rights Abuses

Shelf Number: 144568


Author: Hoyle, Carolyn

Title: Becoming Mulan? Female Western Migrants to ISIS

Summary: Launching ISD’s Women and Extremism (WAE) programme, this report focuses on those women that have travelled from the West to ISIS held territory in support of the terrorist organisation. The first in a series of reports, this research draws on our database of known female migrants to ISIS and analyses their reasons for joining the group, the threat they pose and how to stem the flow of women joining ISIS.

Details: London: Institute for Strategic Dialogue, 2015. 48p.

Source: Internet Resource: Accessed March 24, 2017 at: http://www.strategicdialogue.org/wp-content/uploads/2016/02/ISDJ2969_Becoming_Mulan_01.15_WEB.pdf

Year: 2015

Country: International

Keywords: Female Migrants

Shelf Number: 144583


Author: Kroll

Title: Anti-bribery and Corruption Benchmarking Report - 2017. Beyond Regulatory Enforcement: The Rise of Reputational Risk

Summary: Based on a survey of compliance professionals, combined with analysis of Ethisphere's data on the World's Most Ethical Companies and insights from Kroll's globally recognized experts in the field of anti-bribery and corruption, key themes from this year's Report include: The Rise of Reputational Risk 35 percent of all risk and compliance professionals surveyed expect their organization's risk to increase. General reputational concerns went from being the least likely reason for a third party to fail a company's vetting standards to now being the most likely reason — a stunning change in just one year. ABC Programs: Ongoing Challenges, New Lines of Defense 40 percent of respondents cite third party violations as the top risk to their organization's anti-bribery and corruption program in 2017. Monitoring: The Evolving Role of Compliance Post-Onboarding The importance of ongoing monitoring was highlighted this year, as more than half (55 percent) of respondents report that they identified legal, ethical, or compliance issues with a third party after due diligence had been conducted. M&A: A Deeper Look M&A activity increased by 5 percent since last year, but respondents indicate that they do not conduct the same level of data collection for the third parties of their transaction targets as they do for their organization's own third parties, despite applicable regulatory guidance.

Details: New York: Kroll, Inc., 2017. 40p.

Source: Internet Resource: Accessed March 27, 2017 at: http://www.kroll.com/en-us/abc-report-confirmation?utm_source=email&utm_campaign=abc_report&utm_medium=subscriber_email

Year: 2017

Country: International

Keywords: Bribery

Shelf Number: 144587


Author: Felbab-Brown, Vanda

Title: Water Theft and Water Smuggling: Growing Problem of Tempest in a Teapot?

Summary: Fresh water is vital for human survival and health, the production of food and energy, industrial activity, and the functioning of the entire global economy, as well as for the survival of other animals, plants, and natural ecosystems. Water scarcity, whatever its cause—natural catastrophes, pollution, poor water management, or theft—can have grave consequences. In this paper, Vanda Felbab-Brown examines the highly controversial and emerging topics of water theft and smuggling, and the policy failures that give rise to problematic illegal water markets around the world. The topic is highly controversial because there is no common definition as to what constitutes water theft and smuggling, or, for that matter, whether such phenomena exist at all. Increasingly, newspaper articles around the world, particularly in countries experiencing intense drought and water shortages, are highlighting water theft as a growing problem. Yet water experts, water-focused nongovernmental organizations (NGOs), governments, and communities do not agree whether there is any such a thing as water theft. There are two broad schools of thought about the use of and access to water. One school defines water as a basic human right, and often opposes the pricing of water, particularly increases in prices. Another school of thought sees water as a commodity to which value needs to be assigned,[1] contending that, like electricity, it needs to be priced properly to maintain its sustainability and efficient use. According to this premise, the concept of water theft is valid—theft being the appropriation of water without the required payment, or in violation of existing rules. The first school of thought, however, is deeply uncomfortable with the concepts and language of water theft and smuggling. While this school does see the unauthorized taking of water from a neighbor’s tank as theft, it questions whether the unauthorized taking of water from a public source or the commons, such as river, can be called "theft," particularly if such behavior is driven by need. Rather, punitive enforcement of regulations against unauthorized use of water from common or public sources can constitute the denial of a human right. Thus, legislation and regulations concerning water use can be politically divisive and explosive, since these opposite views can be strongly held even within the same polity.

Details: Washington, DC: Foreign Policy at Brookings, 2017. 52p.

Source: Internet Resource: Accessed March 27, 2017 at: https://www.brookings.edu/wp-content/uploads/2017/03/fp_201703_water_theft_smuggling.pdf

Year: 2017

Country: International

Keywords: Environmental Crime

Shelf Number: 144588


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Handbook on police accountability, oversight and integrity

Summary: For the purposes of the present Handbook, accountability is defined as a system of internal and external checks and balances aimed at ensuring that police carry out their duties properly and are held responsible if they fail to do so. Such a system is meant to uphold police integrity and deter misconduct and to restore or enhance public confidence in policing. Police integrity refers to normative and other safeguards that keep police from misusing their powers and abusing their rights and privileges. For the police to be able to take responsibility for actions and wrongdoings, they need to receive proper direction. They also need to be well-prepared and equipped to carry out their functions in a professional way, and need to be assured of proper working conditions. Line managers must supervise their staff, and police actions and operations need to be reviewed and evaluated. Moreover, effective accountability requires a proper complaints system that is easily accessible to the public and that can effectively investigate allegations and recommend disciplinary sanctions or refer cases for criminal prosecution. It should also be able to make recommendations that target the underlying causes of misconduct. Effective police accountability involves many different actors representing the different layers of modern-day democracies, including government representatives, the parliament, the judiciary, civil society actors and independent oversight bodies such as national human rights institutions. Primarily, it involves the police themselves. Key elements of an effective police accountability system include: " Legislation (in line with international human rights law) specifying the functions and powers of the police " Practical instructions based on the legislation that reflect both the spirit and the letter of the law " Opportunities for the public to voice their concerns " Policies that set priorities on how to deploy police capacity " Adequate police training, both basic and ongoing " Equipment that is adequate for prescribed police functions " Proper reporting procedures and facilities " Adequate supervision that supports officers in carrying out their duties professionally and reporting these correctly " A working culture that promotes transparency and evaluation " Monitoring of police actions and operations by both police leadership and external organs " Complaints procedures, both for making complaints to the police directly and to independent bodies " Fair and effective procedures and policies on how to deal with misconduct, including both disciplinary and criminal codes, adequate investigative capacity, procedures for punishment and appeal procedures " An independent body to oversee such procedures " Scrutiny and oversight involving feedback to the police in order to improve future activities and prevent future wrongdoings " Evaluation and complaints procedures that contribute to the development of new policies, procedures and instructions " Reliable statistics on police performance, related both to effectiveness in dealing with crime and public order, as well as to their integrity and public confidence " Procedures for overseeing the feedback, evaluation and complaints procedures and statistics

Details: Vienna: UNODC, 2011. 150p.

Source: Internet Resource: Criminal Justice Handbook Series: Accessed March 28, 2017 at: https://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/PoliceAccountability_Oversight_and_Integrity_10-57991_Ebook.pdf

Year: 2011

Country: International

Keywords: Police Accountability

Shelf Number: 144595


Author: Pawlak, Patryk

Title: Cybersecurity and cybercrime: Building more resilient and prosperous transatlantic societies

Summary: Internet-based platforms are increasingly used for delivery of services, basic governance functions or communication. As such, open and secure access to the Internet constitutes a significant element in generating growth, prosperity and citizens' empowerment on both sides of the Atlantic. However, this potential is increasingly undermined by digital risks and vulnerabilities in cyberspace: online fraud, attacks on critical infrastructure or the use of new technologies by terrorist networks. According to several studies, Europe and the United States can still reap tremendous benefits from digitisation but, in order to secure the potential gains, they need to strengthen transatlantic cooperation in building more resilient systems and societies, as well as deliver on their commitment to enhancing ties between regulatory, law enforcement, policy and civil society actors. This briefing forms part of a broader research project on the perspectives on transatlantic cooperation in the US election year, requested by the Chair of the European Parliament's delegation for relations with the United States.

Details: Brussels: European Parliamentary Research Service, 2016. 12p.

Source: Internet Resource: Briefing: Perspectives on transatlantic cooperation: Accessed march 28, 2017 at: http://www.europarl.europa.eu/RegData/etudes/BRIE/2016/586612/EPRS_BRI(2016)586612_EN.pdf

Year: 2016

Country: International

Keywords: Cybercrimes

Shelf Number: 144605


Author: Cruz, Jose Miguel

Title: Rethinking the Leaf? Support for Marijuana Legalization in Uruguay, the United States and El Salvador.

Summary: What are the factors associated with approval for marijuana legalization? In the last three years, Uruguay and the states of Colorado and Washington in the U.S. have legalized the production, commercialization, and consumption of recreational marijuana. Such measures have opened a significant debate about legalization. Although the path of legalization and regulation have been different in Uruguay and the United States, these cases provide an excellent opportunity to explore the relationship between drug policy implementation and public opinion support for marijuana legalization in two very different contexts. Using data from the 2014 AmericasBarometer surveys conducted in Uruguay and the United States, this paper examines citizen views towards marijuana regulation and the political factors associated with the approval to legalization. It shows that although levels of public support on marijuana legalization are different in the United States and Uruguay, there are some similarities in the political variables related to approval of legalization of marijuana in both countries.

Details: Paper presented at the 9th Conference of the International Society for the Study of Drug Policy (ISSDP). Ghent, Belgium. May 19-22, 2015. 23p.

Source: Internet Resource: Accessed March 28, 2017 at: http://lamri.fiu.edu/research/rethinking-the-leaf/rethinking-the-leaf.pdf

Year: 2015

Country: International

Keywords: Drug Legalization

Shelf Number: 144611


Author: Maternowska, M. Catherine

Title: The Multi-Country Study on the Drivers of Violence Affecting Children

Summary: Vulnerability to violence evolves in complex socio-economic and cultural contexts. This locally driven research analyses how institutional, community, interpersonal and individual factors interact to affect violence in children's lives. It also begins to identify pathways to better inform national prevention strategies. The study places age and gender at its center, focusing on girls and boys at different stages of the life course, from the very young to older adolescents. A cornerstone of the study is to link quality research, translating it into evidence, and turning evidence into effective and meaningful interventions. This snapshot provides insights to the complexities that surround violence. Understanding and responding to the political as well as community contexts in which violence occurs builds more meaningful responses. Country teams are now preparing to move to the field and test best approaches to violence prevention based on evidence and using data to drive change.

Details: Florence, Italy: UNICEF, 2016. 10p.

Source: Internet Resource: Accessed March 29, 2017 at: https://www.unicef-irc.org/publications/pdf/MCSDVAC11_merged.pdf

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 144613


Author: Huisman, J.

Title: Countering WEEE Illegal Trade (CWIT) Summary Report, Market Assessment, Legal Analysis, Crime Analysis and Recommendations Roadmap

Summary: The research undertaken by the Countering WEEE Illegal Trade (CWIT) project found that in Europe, only 35% (3.3 million tons) of all the e-waste discarded in 2012, ended up in the officially reported amounts of collection and recycling systems. The other 65% (6.15 million tons) was either: • exported (1.5 million tons), • recycled under non-compliant conditions in Europe (3.15 million tons), • scavenged for valuable parts (750,000 tons) • or simply thrown in waste bins (750,000 tons). 1.3 million tons departed the EU in undocumented exports. These shipments are likely to be classified as illegal, where they do not adhere to the guidelines for differentiating used equipment from waste, such as the appropriate packaging of the items. Since the main economic driver behind these shipments is reuse and repair and not the dumping of e-waste; of this volume, an estimated 30% is e-waste. This finding matches extrapolated data from IMPEL on export ban violations, indicating 250,000 tons as a minimum and and 700,000 tons as a maximum of illegal e-waste shipments. Interestingly, some ten times that amount (4.65 million tons) is wrongfully mismanaged or illegally traded within Europe itself. The widespread scavenging of both products and components and the theft of valuable components such as circuit boards and precious metals from e-waste, means that there is a serious economic loss of materials and resources directed to compliant e-waste processors in Europe. Better guidelines and formal definitions are required to help authorities distinguish used, non-waste electronic and electrical equipment (such as equipment coming out of use or in post-use storage destined for collection or disposal) from WEEE. Penalties must be harmonised to simplify enforcement in trans-border cases. Organised crime is involved in illegal waste supply chains in some Member States. However, suspicions of the involvement of organised crime in WEEE are not corroborated by current information. Increased intelligence will lead to a more comprehensive understanding of the issue. Importantly, case analysis of illegal activities outlines that vulnerabilities exist throughout the entire WEEE supply chain (e.g. collection, consolidation, brokering, transport, and treatment). Offences include: inappropriate treatment, violations of WEEE trade regulations, theft, lack of required licenses/permits, smuggling, and false load declarations. To address vulnerabilities more coherent multi-stakeholder cooperation is essential. For this purpose a recommendation roadmap with short, medium, and long term recommendations has been developed. These recommendations aim to reduce illegal trade through specific actions for individual stakeholders; to improve national and international cooperation to combat illegal WEEE trade, actions such as: • Increasing involvement, and improving awareness of users in the early stages of the e-waste chain; • An EU-wide ban on cash transactions in the scrap metal trade; • Mandatory treatment of WEEE according to approved standards, and dedicated mandatory reporting of treatment and de-pollution results; • Better targeting, more upstream inspection, and national monitoring; • An Operational Intelligence Management System (OIMS) to support intelligence-led enforcement and identify the risks associated with organised crime groups; • A National Environmental Security Task Force (NEST), formed by different authorities and partners, to enable a law enforcement response that is collaborative and coordinated at national, regional, and international level; and • Dedicated training of judges and prosecutors.

Details: Lyon, France: Interpol, 2015. 84p.

Source: Internet Resource: Accessed March 29, 2017 at: http://www.cwitproject.eu/wp-content/uploads/2015/09/CWIT-Final-Report.pdf

Year: 2015

Country: International

Keywords: Electronic Waste

Shelf Number: 144627


Author: Clarke, Colin P.

Title: Financial Futures of the Islamic State of Iraq and the Levant: Findings from a RAND Corporation Workshop

Summary: In June 2016, RAND held a small workshop on Islamic State of Iraq and the Levant (ISIL) finances. Participants in the workshop included professionals with expertise in the Middle East, ISIL, counterterrorism, and economics. This report describes the likely evolution of ISIL finances under three specific scenarios: a continuation of the current campaign, a negotiated settlement in Syria and political accommodation in Iraq, and military victory without negotiated settlement or political accommodation. The discussion of potential consequences for ISIL across these three contrasting scenarios offered a number of implications for the counter-ISIL effort. These included taking actions to counter specific means of raising money within ISIL territory, using financial information to damage the group, degrading its ability to raise money across its territory, and ensuring that it does not shift to raising money from beyond its territory.

Details: Santa Monica, CA: RAND, 2017. 54p.

Source: Internet Resource: Accessed March 31, 2017 at: http://www.rand.org/pubs/conf_proceedings/CF361.html

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 144647


Author: Duke Law International Human Rights Clinic

Title: Tightening the Purse Strings: What Countering Terrorism Financing Costs Gender Equality and Security

Summary: In the aftermath of the events of September 11, 2001, the international community brought a new focus and urgency to prioritizing countering terrorism financing (CTF), including through domestic criminalization, expanded legal powers to sanction proscribed individuals and entities, mandatory counter-terrorism clauses in donor funding and partnership agreements, and new reporting requirements for financial institutions that in turn led banks to develop their own increasingly risk-averse controls. The United States (U.S.) government (USG) assumed a prominent role globally, not only in setting international standards on countering terrorism financing, but also through the extraterritorial reach of U.S. financial laws and regulations. As part of this shift, stakeholders traditionally more on the sidelines in developing and implementing national security policies—such as the inter-governmental Financial Action Task Force (FATF), governmental finance ministries, and private financial institutions—took on a much greater role. Banking institutions were in many ways deputized to police these new standards, a position many did not necessarily welcome given the high compliance costs and risks of government enforcement actions if controls failed. In many contexts, civil society became the direct and indirect target of these rules to counter terrorism financing, losing critical access to resources, as well as the ability to fully use banking facilities, because of a regulatory assumption— much refuted, and since revised—that the sector was "particularly vulnerable" to terrorist financing abuse. While by no means alone in bearing the brunt of this legal and regulatory environment, the specific profile of women's rights organizing and organizations has meant that they experience these rules in a number of adverse and often gender-specific ways. On the frontlines of promoting and protecting human rights and critical to ensuring the success and sustainability of peace processes, women's rights advocates and feminist movements mobilize to cause long-lasting social change in their communities. Yet while governments are required to ensure them a safe and enabling environment, precarious security conditions marked by threats from both State and non-State actors, as well as an acute funding crisis, are increasingly the norm. Highly reliant on foreign funding and often in receipt of short-term or project-based funding, women’s rights organizations have little financial resilience, are nascent or newly-established, are relatively small and often operate at the grassroots level, and already often face some degree of financial exclusion. Women's rights organizations challenging the status quo by promoting gender equality frequently find themselves at odds with, and targeted by, their own governments, including by those that criminalize such legitimate activities as "terrorism." To be able to continue their essential work in promoting gender equality, peace, and human rights, such groups may have to operate below the radar, with the security and confidentiality of their beneficiaries of paramount concern. Ensuring the ability of this work to continue is instrumental in creating long-lasting social change and peace, in a world where human rights and stability are under growing threat. The ways in which countering terrorism financing rules have been designed and implemented take little to no account of these features of women’s rights organizations and the environments in which they operate. In practice, legal and regulatory frameworks to counter terrorism financing often restrict transnational financial flows (e.g., from Western donors to grassroots groups); involve heavy compliance requirements; cause delays in, or block receipt of, funds; favor established and often international organizations; call for detailed information on civil society's activities, including in some cases beneficiaries; and decrease the risk appetite of donors and banks. The full extent of these impacts, however, is unknown as regulatory authorities, donors, and financial institutions do not often collect or share relevant information on impacts or explicitly provide reasons for limiting resources and financial access, while civil society actors typically under-report incidents out of reputational or enforcement concerns or due to low levels of knowledge regarding countering terrorism financing measures. In particular, the gender and human rights implications of these countering terrorism financing policies have to date escaped scrutiny. There has, instead, been a tendency to treat civil society organizations and their activities as homogenous and to diagnose problems with—and then devise solutions to— countering terrorism financing regimes that overlook, and may in some cases, deepen adverse impacts. Tightening the Purse Strings: What Countering Terrorism Financing Costs Gender Equality and Security represents the culmination of research, interviews, surveys, and statistical analysis carried out by the International Human Rights Clinic (IHRC) at Duke University School of Law and the Women Peacemakers Program (WPP) to begin to fill these gaps in understanding how responses to terrorism and violent extremism may, in practice, undermine gender equality. In particular, this Report analyzes these measures from an international human rights law perspective, assessing the extent to which countering terrorism financing measures comply with a host of international law obligations, such as prohibitions on both direct and indirect discrimination on the basis of sex and gender and guaranteeing freedom of association, assembly, and expression, including in ensuring access to resources. From applying this gender and human rights perspective, it is clear that women's rights and their defenders across the globe are frequently squeezed between terrorism and violent extremism on the one hand, and counter-terrorism or preventing and countering violent extremism (P/CVE) on the other. In the survey of grassroots women's organizations undertaken for this Report, 86.67 percent of respondents classified their organization's work—including in areas such as peacebuilding and conflict resolution—as contributing to combatting terrorism and violent extremism. Yet, 90 percent said that counter-terrorism measures had an adverse impact on work for peace, women's rights, and gender equality generally.

Details: Durham, NC: Duke Law International Human Rights Clinic, 2017. 89p.

Source: Internet Resource: Accessed March 31, 2017 at: https://law.duke.edu/sites/default/files/humanrights/tighteningpursestrings.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 144648


Author: Australian Strategic Policy Institute

Title: Counterterrorism Yearbook 2017

Summary: his yearbook looks at those areas around the world where terrorism and counterterrorism (CT) are in greatest focus. Each chapter examines CT developments in 2016, including the terrorist threat being faced and how governments and others have approached CT through both policy and operations. Countries and regions covered include Australia, Indonesia, Southeast Asia, South Asia, the Middle East, Europe, Turkey, UK, USA, Canada, Africa, Russia and China. Through this first Counterterrorism Yearbook, in what will be an annual publication, we aim to promote understanding and contribute to shared knowledge of CT. The authors of individual pieces are Anthony Bergin, Jacinta Carroll, Colin Clarke, Michael Clarke, Virginia Comolli, Greg Fealy, Fadi Hakura, Peter Jennings, Shashank Joshi, Lydia Khalil, Joseph Chinyong Liow, Olga Oliker, Raffaello Pantucci, Thomas Renard, Vern White, Susilo Bambang Yudhoyono.

Details: Barton, ACT, Australia: Australian Strategic Policy Institiute: ASPI, 2017. 152p.

Source: Internet Resource: Accessed April 1, 2017 at: https://www.aspi.org.au/publications/counterterrorism-yearbook-2017/ASPI-Counterterrorism-YB2017.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 144681


Author: McAndrews, James

Title: The Case for Cash

Summary: Cash is an extremely useful social contrivance. Two possible drawbacks of high-denomination cash have recently been discussed by Kenneth Rogoff in his book The Curse of Cash, and echoed by other economists. They are the extensive use of high-denomination cash by criminals and others engaged in illicit and corrupt activities, and the role that cash plays in avoiding deeply negative nominal interest rates imposed on bank accounts. Rogoff and others call for a phaseout of high-denomination cash over a long time. The use of cash in crime, I argue, is preferable to the alternative, and there are limits to the benefits of deeply negative nominal interest rates. There are no adequate alternatives to cash for poor and unbanked people. Consequently, the current high-denomination cash in the United States

Details: Tokyo: Asian Development Bank Institute, 2017. 20p.

Source: Internet Resource: ADBI Working Paper Series no. 679: Accessed April 1, 2017 at: https://www.adb.org/sites/default/files/publication/231516/adbi-wp679.pdf

Year: 2017

Country: International

Keywords: Crime Prevention

Shelf Number: 144691


Author: Ralby, Ian M.

Title: Downstream Oil Theft: Implications and Next Steps

Summary: On January 13, 2017, the Atlantic Council launched a major study on downstream oil theft at its inaugural Global Energy Forum in Abu Dhabi, United Arab Emirates. Downstream Oil Theft: Implications and Next Steps draws on the launch event to examine the implications of the study's findings and to suggest tangible next steps in both further investigating this global scourge and beginning to confront it effectively

Details: Washington, DC: Atlantic Council, 2017. 16p.

Source: Internet Resource: Accessed April 3, 2017 at: http://www.atlanticcouncil.org/images/publications/Implications_and_Next_Steps_RW_0316.pdf

Year: 2017

Country: International

Keywords: Natural Resources

Shelf Number: 144704


Author: Farnham, Nicholas

Title: Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

Summary: The purpose of this paper is to explore how a copycat effect - established within the field of suicide studies - may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible 'copycat effect' in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD), this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

Details: The Hague: International Centre for Counter-Terrorism, 2017. 34p.

Source: Internet Resource: ICCT Research Paper: Accessed April 6, 2017 at: https://icct.nl/wp-content/uploads/2017/03/ICCT-Farnham-Liem-Copycat-Effects-in-Terrorist-Suicide-Attacks-March-2017-1.pdf

Year: 2017

Country: International

Keywords: Copycat Effect

Shelf Number: 144735


Author: May, Channing

Title: Transnational Crime and the Developing World

Summary: his March 2017 report from Global Financial Integrity, "Transnational Crime and the Developing World," finds that globally the business of transnational crime is valued at an average of $1.6 trillion to $2.2 trillion annually. The study evaluates the overall size of criminal markets in 11 categories: the trafficking of drugs, arms, humans, human organs, and cultural property; counterfeiting, illegal wildlife crime, illegal fishing, illegal logging, illegal mining, and crude oil theft. The combination of high profits and low risks for perpetrators of transnational crime and the support of a global shadow financial system perpetuate and drive these abuses. The report also emphasizes how transnational crime undermines economies, societies, and governments in developing countries. National and global policy efforts that focus on curtailing the money are needed to more successfully combat these crimes and the illicit networks perpetrating them. Primary Findings Transnational crime is a business, and business is very good. Money is the primary motivation for these illegal activities. Of the 11 illicit activities studied, counterfeiting ($923 billion to $1.13 trillion) and drug trafficking ($426 billion to $652 billion) have the highest and second-highest values, respectively; illegal logging is the most valuable natural resource crime ($52 billion to $157 billion). The ranges demonstrate the serious magnitude of and threat posed by global transnational crime. The revenues generated from the 11 crimes covered in this report not only line the pockets of the perpetrators but also finance violence, corruption, and other abuses. Very rarely do the revenues from transnational crime have any long-term benefit to citizens, communities, or economies of developing countries. Instead, the crimes undermine local and national economies, destroy the environment, and jeopardize the health and well-being of the public. The report rankings for the illicit markets examined are: Counterfeiting $923 billion to $1.13 trillion Drug Trafficking --$426 billion to $652 billion Illegal Logging $52 billion to $157 billion Human Trafficking -- $150.2 billion Illegal Mining -- $12 billion to $48 billion IUU Fishing -- $15.5 billion to $36.4 billion Illegal Wildlife Trade -- $5 billion to $23 billion Crude Oil Theft -- $5.2 billion to $11.9 billion Small Arms & Light Weapons Trafficking -- $1.7 billion to $3.5 billion Organ Trafficking -- $840 million to $1.7 Total --$1.6 trillion to $2.2 trillion Policy Recommendations Transnational crime will continue to grow until the paradigm of high profits and low risks is challenged. In addition to current efforts to fight these crimes, this report calls on governments, experts, the private sector, and civil society groups to seek to address the global shadow financial system by promoting greater financial transparency. This will help cutoff the money flows and the profits, and it will increase the ability to bring these criminals to justice and defeat their illicit transnational networks. GFI recommends several steps governments and other regulatory bodies can take to increase the levels of detection and interdiction of the proceeds of transnational crime: Require that corporations registering and doing business within a country declare the name(s) of the entity's true, ultimate beneficial owner(s) Flag financial and trade transactions involving individuals and corporations in "secrecy jurisdictions" as high-risk and require extra documentation Scrutinize import and export invoices for signs of misinvoicing, which may indicate technical and/or physical smuggling Use world market price databases such as GFTradeTM to estimate the risk of misinvoicing for the declared values and investigate suspicious transactions Share more information between agencies and departments on the illicit markets and actors that exist within a country"s border

Details: Washington, DC: Global Financial Integrity, 2017. 166p.

Source: Internet Resource: Accessed April 7, 2017 at: http://www.gfintegrity.org/wp-content/uploads/2017/03/Transnational_Crime-final.pdf

Year: 2017

Country: International

Keywords: Criminal Networks

Shelf Number: 144741


Author: Castillo, Juan Camilo

Title: The Resilience of Illegal Markets

Summary: Why are illegal markets so resilient? Literature on the political economy of enforcement points to weak state capacity, ineffective enforcement technology, or electoral incentives for forbearance-none of which characterize prohibition efforts such as the U.S. war on drugs. We propose instead that governments face a tradeoff between prohibition and low violence. Using a model in which policy affects dynamic interaction among traffickers, we show that reducing the supply of an illegal good can increase profits through higher prices-and higher profits drive violence among traffickers, who invest more in fighting over an increasingly valuable prize. Jailing or killing traffickers makes them short-sighted and splinters their criminal organizations-both of which increase violence. While previous models of illegal markets focus either on supply reduction or on violence, we consider both together, revealing why prohibition is self-limiting: the government achieves one enforcement goal only at the cost of another.

Details: Unpublished paper, 2016. 49p.

Source: Internet Resource: Accessed April 7, 2017 at: http://dorothykronick.com/wp-content/uploads/DrugWarfare.pdf

Year: 2016

Country: International

Keywords: Drug Trafficking

Shelf Number: 144743


Author: Ramirez-Mendoza, Sergio Luis

Title: The crisis of civil-military relations in Mexico during the war against drugs: comparative reflections on accountability and legal reform in the modern democratic era

Summary: This research is focused on the current crisis that is taking place between Mexico's civil society and the armed forces in the context of the "war against drugs". In 2006 the federal government initiated a security strategy focused on the militarization of the enforcement against organised criminal groups that specialise in drug-trafficking. At the same time the number of civilian complaints for human rights abuses attributed to military personnel increased exponentially. Ten years later, the same policies are in force and the soldiers keep being accused of severe human rights violations. The aim of this project is to develop a theoretical framework that will provide the elements needed to reform the current Mexican legal frameworks and military institutions, in order to improve the relationship between the armed forces and civil society. To develop new theory, this research addresses the social background of the conflict and analyses contemporary concepts and frameworks that shape the topic of civil-military relations both at a domestic and international level. Subsequently, the cases of the German post-WWII military institutional reforms and the emergency legal regime in Northern Ireland during the 1960s and 70s are studied and analysed. This provides the elements to do a legal comparison with the current Mexican legal codes and institutions. The result produces the theory needed to develop reforms that have the potential to shape a new civil-military relations paradigm in Mexico.

Details: Durham, UK: Durham University, 2017. 316p.

Source: Internet Resource: Dissertation: Accessed April 7, 2017 at: http://etheses.dur.ac.uk/11977/1/PhD_Sergio_Luis_Ramirez_Mendoza.pdf?DDD19+

Year: 2017

Country: International

Keywords: Drug Cartels

Shelf Number: 144746


Author: Raffo Lopez, Leonardo

Title: Law enforcement and drug trafficking networks: a simple model

Summary: This article presents a theoretical model to explain the performance of illicit drug markets. The analytical framework is based on the oligopoly model of Poret and Tejedo (2006), but the latter is extended in a crucial respect: the influence of drug trafficking networks in the illicit drug markets is considered. The proposed model indicates that Poret and Tejedo were correct: the aggregate quantity of drugs sold is negatively affected by the intensity of the law enforcement policies applied and positively affected by the number of traffickers in the market. We also determined that the individual and aggregate sales in the market are positively affected by the network's average density. Our model is useful for explaining the failure of the war against drugs to halt the reproduction and expansion of illegal activities at a global level during the three past decades.

Details: Cali, Colombia: Universidad del Valle, Facultad de Ciencias Sociales y Economicas, 2015. 32p.

Source: Internet Resource: Working Paper no. 162: Accessed April 8, 2017 at: http://lacer.lacea.org/bitstream/handle/123456789/53019/lacea2015_drug_trafficking_networks.pdf?sequence=1

Year: 2015

Country: International

Keywords: Drug Enforcement

Shelf Number: 144749


Author: Moura, Giovane Cesar Moreira

Title: Internet Bad Neighborhoods

Summary: A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it occurs in most places, but it tends to be concentrated in certain areas. In the real world, high crime areas are usually labeled as "bad neighborhoods". The goal of this dissertation is to investigate Bad Neighborhoods on the Internet. The idea behind the Internet Bad Neighborhood concept is that the probability of a host in behaving badly increases if its neighboring hosts (i.e., hosts within the same subnetwork) also behave badly. This idea, in turn, can be exploited to improve current Internet security solutions, since it provides an indirect approach to predict new sources of attacks (neighboring hosts of malicious ones). In this context, the main contribution of this dissertation is to present the first systematic and multifaceted study on the concentration of malicious hosts on the Internet. We have organized our study according to two main research questions. In the first research question, we have focused on the intrinsic characteristics of the Internet Bad Neighborhoods, whereas in the second research question we have focused on how Bad Neighborhood blacklists can be employed to better protect networks against attacks. The approach employed to answer both questions consists in monitoring and analyzing network data (traces, blacklists, etc.) obtained from various real world production networks. One of the most important findings of this dissertation is the verification that Internet Bad Neighborhoods are a real phenomenon, which can be observed not only as network prefixes (e.g., /24, in CIDR notation), but also at different and coarser aggregation levels, such as Internet Service Providers (ISPs) and countries. For example, we found that 20 ISPs (out of 42,201 observed in our data sets) concentrated almost half of all spamming IP addresses. In addition, a single ISP was found having 62% of its IP addresses involved with spam. This suggests that ISP-based Bad Neighborhood security mechanisms can be employed when evaluating e-mail from unknown sources. This dissertation also shows that Bad Neighborhoods are mostly application specific and that they might be located in neighborhoods one would not immediately expect. For example, we found that phishing Bad Neighborhoods are mostly located in the United States and other developed nations - since these nations hosts the majority of data centers and cloud computing providers - while spam comes from mostly Southern Asia. This implies that Bad Neighborhood based security tools should be application-tailored. Another finding of this dissertation is that Internet Bad Neighborhoods are much less stealthy than individual hosts, since they are more likely to strike again a target previously attacked. We found that, in a one-week period, nearly 50% of the individual IP addresses attack only once a particular target, while up to 90% of the Bad Neighborhoods attacked more than once. Consequently, this implies that historical data of Bad Neighborhoods attacks can potentially be successfully employed to predict future attacks. Overall, we have put the Internet Bad Neighborhoods under scrutiny from the point of view of the network administrator. We expect that the findings provided in this dissertation can serve as a guide for the design of new algorithms and solutions to better secure networks.

Details: Twente, NETH: University of Twente, 2013. 245p.

Source: Internet Resource: Dissertation: Accessed April 11, 2017 at: http://doc.utwente.nl/84507/1/thesis_G_Moura.pdf

Year: 2013

Country: International

Keywords: Computer Crime

Shelf Number: 144779


Author: Asian Development Bank

Title: Handbook on Anti-Money Laundering and Combating the Financing of Terrorism for Nonbank Financial Institutions

Summary: The handbook provides guidance to nonbank financial institutions (NBFIs) on how to manage risks related to money laundering and the financing of terrorism and is intended to assist NBFIs in developing and implementing policies and procedures to combat money laundering and the financing of terrorism. The information contained in the handbook should be adapted to reflect the nature of activities, products, and services offered by individual NBFIs as there is no "one size fits all" approach to the management of risk.

Details: Mandaluyong City, Philippines: Asian Development Bank, 2017. 96p.

Source: Internet Resource: Accessed April 11, 2017 at: https://www.adb.org/sites/default/files/publication/184373/handbook-aml.pdf

Year: 2017

Country: International

Keywords: Anti-Corruption

Shelf Number: 144786


Author: Schomerus, Mareike

Title: Countering violent extremism: Topic guide

Summary: Definitions and concepts There is no consensus on what violent extremism is and how best to prevent or counter it. The term 'violent extremism' has become a catch-all for a number of phenomena, and there is considerable variation in how terminology is used. Radicalism, terrorism, and violent extremism are often used interchangeably, even though they describe different processes. The term violent extremism conflates belief and use of force. Critics also see the use of 'extremist' as always politically motivated: it can be used to denounce those that threaten the political status quo. Its use to describe primarily Islamist groups has obscured the fact that extremist beliefs and support for violence are found across different cultures, religions, and political situations. More attention is now being paid to, for example, right-wing or left-wing violent extremism. The breadth of definitions and debate may offer an opportunity for more creative policy and programme engagement. However, it can also encourage ad hoc policymaking. What we know about violent extremism Rigorous empirical research that would allow conclusive statements on violent extremism is rare, so extremist violence tends to be explained through untested theories. Political interests may also inform an explanation or definition. Causes of violent extremism are often divided into 'push' and 'pull' factors. This overlooks links between them, however, and can lead to over-generalisation. 'Individual' and 'community' factors are more useful categories - though still interconnected. Factors at the individual level include:  Personal relationships: These are important in spreading or reinforcing extremist ideas, and a radicalising peer group can provide a sense of belonging.  Beliefs, values and convictions: Extremist beliefs can be religious, spiritual, moral, or political and tend to express the conviction that a group, a way of life, or a political system needs to be challenged or destroyed. The perception of being denied recognition at a collective and personal level is considered critical.  Manipulation: Manipulation by extremist groups happens in a complex interplay of identity formation and other enabling factors. Whether there is a causal relationship between access to information (including to social media) and extremism is under-researched. This also challenges counter-approaches that use media strategies.  Trauma and humiliation: How emotions of humiliation and betrayal result in the reproduction of violence is a topic in urgent need of research. Factors at the community level include:  History and narratives: Legacies of oppression, subjugation, and interference by dominant powers matter. Sharing an oppression narrative with a community can create a sense of belonging in a marginalised situation.  Rejection of an external system: Externally imposed or international systems that are associated with injustice and humiliation can create resistance that can turn violent.  Governance: Poor/unjust governance can promote acceptance of an extremist group. Failure of a government to deliver services may enable violent extremists to establish safe havens.  Business and crime: Commercial interests can drive violent behaviour. Some extremist groups act as credit institutions where no others are available.  Marginalisation and lack of choices: Violence can be seen as a way of gaining more choices, an audible political voice, or a stronger economic position. Those who join violent extremist groups come from diverse backgrounds and arrive via different paths. Violent extremism is not the consequence of a long-term political or religious 'maturation'. There is no straightforward link between violent extremism and religious faith or specific practices. Many of those radicalising have only a faint grasp of the holy texts of the religion they are purportedly defending. This highlights that a belief - which can be a strong driver of violence - is not to be equated with a religious faith based on the interpretation of scriptures. A large-scale public opinion survey in Pakistan found neither religious practice nor support for political Islam was related to support for violent extremist groups. A direct link between education and specific attitudes has not been established: lack of education does not cause extremist views. Neither radicalisation nor state collapse necessarily leads to violent extremism. Some scholars argue that in a situation of collapse it is in fact more difficult for extremist ideologies to gain traction. Violent extremism involves local, regional and international dimensions, so strategies to tackle it are needed at different levels.

Details: Birmingham, UK: GSDRC, University of Birmingham, 2017. 37p.

Source: Internet Resource: Accessed April 12, 2017 at: http://www.gsdrc.org/wp-content/uploads/2017/03/CVE.pdf

Year: 2017

Country: International

Keywords: Extremist Groups

Shelf Number: 144892


Author: NetNames

Title: The Risks of the Online Counterfeit Economy: A NetNames Report

Summary: GLOBALIZATION IS GOOD FOR (FAKE) BUSINESS The collision of globalization and the booming online economy has created an ideal environment for counterfeiters, allowing them to sell goods directly to customers worldwide with virtually no barriers to entry, low overheads, easier distribution and fewer risks of being caught. Meanwhile, the growth of international brands has provided the perfect environment to target and take counterfeit versions to market, with consumers worldwide now using the web to hunt down big names at small prices. THE WORLD IS A FRAUDSTER'S SHOP WINDOW The online economy offers many new opportunities for counterfeiters to further their reach, profitability and anonymity. From unpoliced auction sites, online marketplaces and rogue websites, to illicit sales via social media and fraudulent mobile apps, counterfeiters now have more tools at their disposal than ever before. Meanwhile, fraudsters can also target brands and consumers with a new range of digital weapons, such as phishing, cybersquatting, traffic diversion and other forms of online fraud. FMCGS ARE MOST TARGETED By value, today's largest counterfeit markets are pharmaceuticals ($200 billion), electronics ($169 billion) and food ($49 billion). That said, tobacco products are the fake items most frequently seized by the authorities, while apparel and accessories make up the lion's share of the value of all counterfeit shipments globally IN HARM'S WAY: CONSUMERS, BRANDS AND ECONOMIES The global counterfeiting boom poses many risks, from endangering consumer safety and diverting funds to organized crime, to harming industry innovation and eroding customer trust. However, the economic damage reigns supreme: counterfeiting costs G20 governments over $125 billion every year, approximately $24 billion of which is directly borne by taxpayers. COUNTERFEITING COSTS JOBS With legitimate sales being squeezed by fake goods, legal businesses are able to support fewer staff. As a result, counterfeiting is estimated to have destroyed around 2.5 million jobs worldwide. The US is the worst affected nation, seeing 750,000 jobs extinguished by fakes. Meanwhile, Germany (107,500), the UK (72,000), Italy (31,000) and France (26,300) are all estimated to be seeing total job losses that run into five figures or more, based on the size of their counterfeiting markets. BAD THINGS COME IN SMALL PACKAGES With direct access to consumers worldwide, counterfeiters have been able to reduce mass shipments of fake goods to local distributors, instead opting for more frequent, but smaller consignments sent by mail. Unfortunately, this makes intercepting deliveries more difficult, as authorities struggle to check skyrocketing numbers of international shipments.

Details: London: Digital Citizens Alliance, 2016. 36p.

Source: Internet Resource: Accessed April 13, 2017 at: https://www.netnames.com/assets/shared/whitepaper/pdf/The-Online-Counterfeit-Economy-web-FINAL.pdf

Year: 2016

Country: International

Keywords: Consumer Fraud

Shelf Number: 144901


Author: NetNames

Title: Counting the Costs of Counterfeiting: A NetNames Report

Summary: Today, the ease and reach of digital commerce presents extraordinary opportunities and serious threats to businesses, brands and consumers alike. The collision of counterfeiting, globalization and the fast-growing digital world has created a perfect storm, allowing the supply and demand for fake goods to converge. EXTRAORDINARY GROWTH In an environment where counterfeiting is as profitable as illegal drugs, but remains far less risky for criminals, we are seeing explosive growth. Expanding by over 15% every year, counterfeiting now costs more than 2% of total global economic output, or around $1.8 trillion per year. There is little doubt as to the crucial role played by the digital world in this meteoric rise, with a 15% increase in sales of counterfeit goods online last year. The internet has made counterfeiting a shifting problem that is difficult to combat. Rogue websites, online auctions and digital piracy all give counterfeiters lucrative and anonymous channels for their activities. PHARMA WORST AFFECTED While counterfeiting is a major challenge for every industry, pharma is the worst affected sector by any metric. Counterfeiters have claimed around a third of the entire market - worth some $200 billion - and are implicated in the deaths of up to one million people each year due to toxic or ineffective drugs. ENTER THE DRAGON: THE ROLE OF CHINA The United States, Europe and Australasia - the largest markets for fake goods - are all attempting to harmonize and intensify their multi-pronged strategy to combat counterfeiting and digital piracy. However, the tidal wave of counterfeit and grey-market goods from China shows little sign of being stemmed, remaining responsible for 70% of worldwide seizures. While global companies depend on Chinese manufacturing, this same ecosystem provides a haven of cheap labor and raw materials for counterfeiters. COST AND CONVENIENCE DRIVE CONSUMERS TO COUNTERFEITS Consumers remain largely innocent victims in this struggle, with 90% seeing counterfeiting as morally wrong. However, the demand for branded goods and the desire to find lower prices online mean that 28 consumers unknowingly buy fake goods for every person that does so intentionally. When consumers do deliberately consume counterfeit and pirated goods, cost and convenience are the major factors in their decision: 19% purchase fake products when the original is too expensive, while 22% will turn to digital piracy when there is no legal alternative. THE HEAVY TOLL ON BRANDS Counterfeiting creates a heavy financial burden for brands – eroding profitability, market share and outside investment. While fake goods destroy around 10% of top-line revenues, they also force brands to make further investments in combatting the problem, and leave them less able to invest in future innovations. Even more insidious are the risks to both brand reputations and customers. Online, reputations can be instantly damaged in front of a global audience: 78% of consumers would shun a brand if they found themselves on a bogus website, even though the company itself was not negligent. Meanwhile, the risks to customers are not just financial, but also physical. G20 countries now see an estimated 3,000 deaths annually due to counterfeit consumer goods alone. NEW TECHNOLOGIES CREATE NEW RISKS Counterfeiters will continue to exploit the potential of new technologies and the digital world to further their reach, profitability and anonymity. The rise of mobile and social is fragmenting the online landscape - exposing brands not just to counterfeiting, but also to evolving threats such as phishing, cybersquatting, traffic diversion and other forms of online fraud. ACTION IS ESSENTIAL New technologies will also be critical to the fight against counterfeiting, with RFID, digital authentication and new generic top-level domains (gTLDs) all allowing brands to strengthen their posture against fraudsters. In particular, given the skyrocketing risks from the combination of digital channels and fake goods, a proactive and effective online anti-counterfeiting strategy is now essential for every brand to safeguard customers, revenues and reputation.

Details: London: Digital Citizens Alliance, 2015. 44p.

Source: Internet Resource: Accessed April 13, 2017 at: https://www.netnames.com/assets/shared/whitepaper/pdf/NetNames-Counterfeiting-Report-A4-2015.pdf

Year: 2015

Country: International

Keywords: Consumer Fraud

Shelf Number: 144902


Author: United Nations Special Representative of the Secretary-General on Violence Against Children

Title: Ending the Torment: Tackling Bullying from the Schoolyard to Cyberspace

Summary: This publication seeks to bring together key elements of the rich global expertise on the issue of bullying in order to share information, ideas and examples of best practice with all those who are interested in tackling such a scourge. It offers a complement to the United Nations Secretary-General's Study on Violence against Children and will hopefully provide further impetus to the drive by countries throughout the world to understand and better prevent the bullying of children and young people in all its ugly manifestations. As on all issues that affect children, it is essential that their ideas and views are sought and heard. The perceptions, experience and recommendations of children are of fundamental importance in tackling any issue of concern to them and their ideas are an important part of this publication. Their views and perspectives feature particularly in the chapter on UNICEF's U-Report. The U-Report is an electronic platform that reaches two million children, the majority in Africa, seeking their views and offering them an opportunity to widely share their experiences. But we also hear their voices in articles from other authors. The key themes of this publication focus on the areas that need to be developed and strengthened in order to prevent bullying and to effectively mitigate its harm. Providing information on, and raising awareness of, the insidious and damaging nature of bullying, as well as providing guidance on coping with its negative impacts are an important part of addressing the issue: so too are efforts to enable children to take action themselves to combat the problem. Their empowerment must be at the heart of any holistic approach to bullying. Chapter 1 of this publication therefore looks at these issues and draws on expertise from different perspectives and regions. From Greece, George Moschos looks at respecting children's rights and promoting a participatory culture of peace and respect in schools. Maria Luisa Sotomayor brings us the responses from the U-Report and considers new approaches to participation and the use of ICTs. And finally, Anne Lindboe and Anders Cameron, from Norway, consider the role of independent human rights institutions in preventing and responding to violence and in particular bullying. In Chapter 2, the publication moves into a consideration of legislation and public policies with the first article by Brian O'Neill, from Ireland, examining a national multi-facetted approach to the prevention of bullying and cyberbullying. The second article, by Eric Debarbieux, considers the school climate in Europe, and France in particular, and looks at the ways in which changing perceptions can lead to a change in public policies. Kirrily Pells, Maria Jose, Ogando Portela and Patricia Espinoza draw on evidence from a number of countries to understand the structural drivers of bullying: these include poverty and inequity. Christophe Cornu and Yongfeng Liu look at the importance of an inclusive and equitable education for all learners in an environment free from discrimination and violence based on sexual orientation and gender identity/ expression and how this can be supported by governments. And finally, Bernard Gerbaka and Fares BouMitri introduce a new topic with a look at the role of the medical community in addressing bullying. Chapter 3 looks at the essential field of school interventions. In this section Dan Olweus, a pioneer in the field and creator of the Olweus Bullying Prevention Program, and Susan Limber, consider the building blocks for an effective bullying prevention and response model. Then Sanna Herkama and Christina Salmivalli look at the success of the KiVa anti-bullying programme in Finland, which uses a whole-school approach. Julie Swanson and Katharina Anton-Erxleben, from the USA, give an important and strong gender perspective on bullying and school-related gender-based violence. And finally in this section Ersilia Menesini and Annalaura Nocenti look at tailoring different prevention approaches to the national context in Italy. Chapter 4 examines the importance of data, without which we cannot understand or assess the extent of the problem. Dominic Richardson and Chii Fen Hiu lead off this section with a review of existing data and a look at what is needed to develop a solid response on prevention. This is followed by an article in which Sonia Livingstone, Mariya Stoilova and Anthony Kelly examine the evidence for the claim that new media bring new problems, arguing in conclusion that bullying and cyberbullying are inextricably linked in complex and challenging ways. Patrick Burton takes a look at data on bullying and cyberbullying in southern Africa, while Michael Dunne, Thu Ba Pham, Ha Hai Thi Le and Jiandong Sun, consider the impact of bullying and severe educational stress and the challenges faced in East Asian schools. Maha Almuneef presents a review of bullying in the Arab region, suggesting future policy development directions, and finally in this section, Robertas Povilaitis analyses experiences of projects in Lithuania while the International Child Helpline presents interesting case studies and data. The contributors to this publication represent all regions, their expertise ranges across a number of different fields, and their research examines different aspects of bullying and cyberbullying. Further information on the authors is included later in the publication. This publication has sought to identify issues to which we should be giving greater visibility and prominence, new facets of the problem that should be shared, concerns that should addressed, and examples of good practices that can stimulate and boost action by governments, policy makers, teachers and children themselves in the fight against bullying.

Details: New York: Office of the Special Representative of the Secretary-General on Violence against Children, 2016. 174p.

Source: Internet Resource: Accessed April 14, 2017 at: http://srsg.violenceagainstchildren.org/sites/default/files/2016/End%20bullying/bullyingreport.pdf

Year: 2016

Country: International

Keywords: Bullying

Shelf Number: 144904


Author: Heywood, Max

Title: Tainted Treasures: Money Laundering Risks in Luxury Markets

Summary: From Ukraine to Tunisia and Brazil , large-scale cases of grand corruption in recent years have involved the acquisition of luxury property, vehicles and goods. This report examines the risk of luxury goods and assets being used to launder the proceeds of corruption, including in the art world and the marketplaces for super-yachts, precious stones and jewels, high-end apparel and accessories, and real estate. In theory, businesses operating in the luxury sector should be well placed to prevent money laundering, as they are highly aware of the reputational risks to their brands and often seek to establish long-term relationships with their customers, which should make it easy to carry out due diligence. However, the available data suggests that compliance by high-value retailers with due diligence and reporting obligations is remarkably low. For instance, across jurisdictions luxury sector suppliers seldom act on any concerns about possible money laundering by filing suspicious activity reports (SARs). Legislation and policy to prevent money laundering in the luxury sector also have weaknesses. Based on an assessment of existing sources such as regulatory reports and sector-specific studies, this scoping report finds that, while there is some variation across countries, current levels of oversight and enforcement by authorities are limited in leading luxury markets including China, France, Germany, Italy, Japan, the UK and the US. Several characteristics of the luxury sector itself indicate heightened risks of money laundering. Some high-value goods such as jewellery, precious stones, art and luxury accessories are easily transportable. Others, such as luxury real estate and super-yachts have been associated with the use of anonymous shell companies or intermediaries to purchase and manage these assets, which are significant red flags. To these risks are added the traditions of discretion and confidentiality, which are present across virtually all luxury sectors, and represent a major money laundering risk. From fixing the gaps in international standards and national legislation to increasing the number of suspicious reports being submitted to authorities by luxury sector businesses, much remains to be done to reduce the scope for individuals using the proceeds of corruption to acquire and enjoy high-value goods and property, and to use these assets as a vehicle for laundering their ill-gotten gains.

Details: Berlin: Transparency International, 2017. 33p.

Source: Internet Resource: Accessed April 17, 2017 at: https://financialtransparency.org/wp-content/uploads/2017/04/2017_TaintedTreasures_EN.pdf

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 144985


Author: Count the Costs

Title: The War on Drugs: Undermining international development and security, increasing conflict. The War on Drugs: Are we paying too high a price?

Summary: Attempts to control global drug production and supply took their current form with the 1961 UN single convention on drugs. Whilst this international agreement was promoted with public health goals, it took a prohibitionist approach, based on police and military enforcement intended to suppress production and supply, and punish users. However, prohibiting a commodity for which there is high demand inevitably creates profit opportunities for criminal entrepreneurs, pushing production, supply and consumption into an illicit parallel economy. The negative effects invariably fall hardest on the poorest and most marginalised, including indigenous populations and ethnic minorities, young people and women. The same corrosive consequences historically seen in drug producing regions are now increasingly replicated in drug transit regions as traffickers trans-ship drugs through the Caribbean, Central America, Central Asia and West Africa. Evidence from around the globe shows that enforcement at best displaces illicit markets and transit routes to new areas, and at worst actually increases the violence and harm it is intended to stop. In short, the inevitable result of drug markets being entirely controlled by organised criminal profiteers is to lock vulnerable producing or transit regions into multi-dimensional underdevelopment, where existing problems are exacerbated, and governance further undermined.

Details: London: Transform Drug Policy Foundation, 2017. 12p.

Source: Internet Resource: Accessed April 17, 2017 at: http://www.countthecosts.org/sites/default/files/Development_and_security_briefing.pdf

Year: 2017

Country: International

Keywords: Costs of Criminal Justice

Shelf Number: 144990


Author: Speckhard, Anne

Title: Psychosocial Drivers, Prevention and Sequelae of Engaging in Torture

Summary: Torture resorted to as a method to extract information believed to be of an urgent security relevance to the state not only harms prisoners, but also leads to adverse conditions in the perpetrator. This paper presents a model of the psychosocial drivers as well as the psychosocial sequelae of torture upon perpetrators, factors derived from a review of existing literature and the authors' interviews with detainees who were tortured and with military and nonmilitary personnel who have tortured. The model predicts the following factors contribute to the likelihood of committing torture: (a) an "us versus them" mentality with language and training that dehumanizes the enemy; (b) a particularly egregious enemy who engages in atrocities; (c) beliefs that torture may elicit "ticking bomb" type or other valuable, actionable information to protect others; (d) annihilating a threat to the existing order; (e) psychological numbing and dissociation as a result of cumulative battlefield traumas; (f) extreme anger and a desire for revenge over the deaths of comrades; (g) poor training to avoid torture (h) selection and training for blind obedience; (i) ambiguous orders and failure to clearly define proscribed behaviors constituting torture; (j) authority figures ordering torture; (k) group pressure to engage in torture; (l) situational dynamics that place prisoners in positions of being helpless and distant while potential torturers are placed in unchecked power positions with; (m) poor supervision, or actual disavowal, by supervisors that torture is occurring; (n) group dynamics that allow for diffusion of blame; and strong unit loyalty and group cohesion; along with (o) punishments for failing to engage in torture, including exclusion from the group upon whom one relies for self- preservation and security. Just as the authors identify the factors that are predictive of those individuals and situations that are most likely to give rise to torture, they also identify the psychosocial sequelae of engaging in torture. These include intrusive thoughts and flashbacks, avoidance of reminders/triggers, social alienation/isolation, self-condemnation with guilt and shame, fears of retaliation and retribution, anger, nightmares and sleep disturbances, high arousal states with the inability to concentrate or sleep well, dissociative personality splinters, suicidal thoughts and behaviors and drug and alcohol abuse to forget and painful emotional states upon remembering. Lastly, the authors identify the practices that can be put in place to protect individuals, particularly military and paramilitary personnel, from crossing the line into perpetrating abuse, atrocities, and torture upon those placed in their custody. This includes but is not limited to carrying out beatings, sleep deprivation, inducing hypothermia, waterboarding, rectal feedings, and other harsh treatment of prisoners.

Details: Washington, DC: International Center for the Study of Violent Extremism, 2017.

Source: Internet Resource: Accessed April 17, 2017 at: http://www.icsve.org/research-reports/psychosocial-drivers-prevention-and-sequelae-of-engaging-in-torture/

Year: 2017

Country: International

Keywords: Extremists

Shelf Number: 145049


Author: Martini, Maira

Title: Doors Wide Open: Corruption and Real Estate in Four Key Markets

Summary: The real estate market has long provided a way for individuals to secretly launder or invest stolen money and other illicitly gained funds. Not only do expensive apartments in New York, London or Paris raise the social status of their owners and enhance their luxurious lifestyles, but they are also an easy and convenient place to hide hundreds of millions of dollars from criminal investigators, tax authorities or others tracking criminal behaviour and the proceeds of crime. In many such cases, property is purchased through anonymous shell companies or trusts without undergoing proper due diligence by the professionals involved in the deal. The ease with which such anonymous companies or trusts can acquire property and launder money is directly related to the insufficient rules and enforcement practices in attractive markets. The countries analysed in this study - Australia, Canada, the United Kingdom and the United States - have committed in different forums, such as through the FATF and the Group of 20 (G20), to do more to prevent and curb money laundering and terrorist-financing, including by regulating gatekeepers, such as real estate agents, lawyers and accountants, who may act as facilitators in transactions that can enable money laundering. This report identifies the main problems related to real estate and money laundering in these four countries and finds that, despite international commitments, current rules and practices are inadequate to mitigate the risks and detect money laundering in the real estate sector.

Details: Berlin: Transparency International, 2017. 40p.

Source: Internet Resource: Accessed April 18, 2017 at: https://www.transparency.org/whatwedo/publication/doors_wide_open_corruption_and_real_estate_in_four_key_markets

Year: 2017

Country: International

Keywords: Fraud and Corruption

Shelf Number: 145053


Author: American University. Washington College of Law. Center for Human Rights and Humanitarian Law

Title: Protecting Children against Torture in Detention: Global Solutions for a Global Problem

Summary: It is my pleasure to introduce the publication "Protecting Children Deprived of Liberty From Torture: Reflections on the Special Rapporteur on Torture's 2015 Thematic Report," which expands upon a key thematic priority explored by the Special Rapporteurship on Torture in 2015. This volume asks a wide variety of stakeholders and thought-leaders to reflect on the report on children deprived of liberty (A/HRC/28/68, available in Annex I) issued by Professor Juan Mendez during his Rapporteurship on Torture at the United Nations (UN). This publication provides additional data and analyses on the myriad of critical issues raised in the report. The publication is an effort of the Anti-Torture Initiative (ATI), a project of the Center for Human Rights & Humanitarian Law (the Center) at American University Washington College of Law to support the mandate of the United Nations Special Rapporteur on torture and other cruel, inhuman and degrading treatment or punishment (SRT), a position that Professor Juan Mendez held from November 2010 to October 2016. The Center created the ATI in 2012 as part of its mission to develop new tools and strategies for the creative advancement of international human rights norms. During the time of Professor Mendez's mandate, the ATI expanded the strategies used by the SRT in furtherance of its mandate by supporting, monitoring, and assessing implementation of his recommendations, and providing a multi-dynamic model for effective and comprehensive country-specific and thematic follow-up, in areas such as the torture and ill-treatment of children deprived of liberty. In the aftermath of Professor Mendez's mandate, the ATI has continued its role as a foremost player in the global movement against torture, by continuing to work closely with partners from international agencies, regional organizations, governments and policy-makers, and actors from civil society and academia, in an effort to have a positive impact on the landscape of efforts to fight and prevent torture worldwide, in particular when it affects the most vulnerable and marginalized persons worldwide, such as children deprived of liberty. The 2015 report that serves as the basis for this publication came at a timely moment of growing attention to the plight of the more than one million children who are estimated to be deprived of liberty around the world. The report makes a critical contribution by framing abuses and violence commonly perpetrated against children in various guises of deprivation of liberty as torture and other ill-treatment under international law, and by analyzing the unique vulnerability of children to, and concomitant heighted obligation of States to protect children from, such acts. The report analyzes practices within juvenile, criminal justice systems, and administrative, notably immigration, detention, as well as practices in health- and social-care institutions, and the situation of children in armed conflict. It addresses existing gaps in law and policy that facilitate torture and ill-treatment against children deprived of their liberty worldwide. Constrained as it is by an UN-imposed word limit, the report is meant to be a starting-point for discussion, which the articles in this volume pick up. Following its presentation to the UN Human Rights Council in March 2015, the report generated a considerable amount of interest and discussion on a range of issues explored therein. This volume seeks to contribute to and continue this discussion by creating space to elaborate on the report and the essential legal, policy, and advocacy issues raised in a variety of contexts of deprivation of liberty of children around the world. The publication chronicles part of the robust response by practitioners, advocates, and policy-makers to the cross-cutting issues explored by the report. Section I of this volume provides a broad overview of the problem of children deprived of liberty worldwide, and delves into several key questions of law and policy at the intersection of the torture and other ill-treatment and children's rights frameworks, including the potential of the report as a tool for advocacy to promote the recognition and protection of the rights of children in the context of deprivation of liberty; the unique vulnerability of children to torture and other ill-treatment; the challenge of translating standards into practice; the question of access to justice for children deprived of liberty; the role of the Council of Europe in addressing the deprivation of liberty of children; and avenues for meaningful participation of children and adolescents in the recommendations of United Nations human rights bodies in the context of deprivation of liberty. Section II addresses the unique challenges posed by the deprivation of liberty of children in conflict with the law in juvenile and criminal justice systems, featuring a call for the end of child detention as a form of punishment. It also includes a commentary on the UN Model Strategies and Practical Measures on the Elimination of Violence against Children in the Field of Crime Prevention and Criminal Justice systems. It also analyzes the placement of children in solitary confinement, early diversion, monitoring mechanisms, and models of psychosocial intervention for children deprived of liberty. Section III delves into the situation of migrant, asylum-seeking, and refugee children, and their deprivation of liberty in these contexts. It further refers to the situation of children, including children with disabilities, in institutions and orphanages, as well as the situation of children in armed conflict, child soldiers, and the detention of children on grounds of "national security."

Details: Washington, DC: Center for Human Rights & Humanitarian Law, American University, Washington College of Law, 2017. 442p.

Source: Internet Resource: Accessed April 20, 2017 at: http://antitorture.org/wp-content/uploads/2017/03/Protecting_Children_From_Torture_in_Detention.pdf

Year: 2017

Country: International

Keywords: Child Protection

Shelf Number: 145060


Author: Schultze-Kraft, Markus

Title: Organised Crime, Violence and Development. Topic guide

Summary: It is increasingly recognised in the international aid community that organised crime hinders inclusive and sustainable development in many ways. Today's universe of organised criminal activities and of the individuals, groups and networks involved in them is virtually infinite. Spanning the whole globe, organised criminal operations range from illegal protection economies and extortion rackets to cybercrime, oil theft, money laundering, counterfeiting, maritime piracy and the trafficking and/or smuggling of illicit drugs, humans, firearms and wildlife. In 2009, the UN Office on Drugs and Crime (UNODC) estimated that transnational organised crime generated $ 870 billion, the equivalent of 1.5% of global gross domestic product (GDP). All criminal proceeds worldwide amounted to an estimated 3.6% of global GDP, equivalent to about $2.1 trillion. Organised crime is not an "alien", external threat. Criminal operations are planned, designed and implemented by mafia bosses, drug kingpins, paramilitary and insurgent commanders, warlords and gang leaders ‒ but also by, and with, politicians, military and police officers, civil servants, investment bankers and accountants, among representatives of many other professions. Organised crime promotes "non-development" across four distinct dimensions:  Economic: Huge proceeds from illicit and criminal activities are siphoned away from the legitimate economy, and lawful markets are distorted.  Political and governance: Organised crime alters the political economy of developing countries, as illegal- criminal interests that span the public-private divide and involve non-state and state actors transform economic, political and social institutions.  Social: The social cohesion of communities and societies is fractured as criminal subcultures emerge and replace traditional values and norms.  (Human) security: The security of both citizens and states is endangered by organised crime. Organised crime is sometimes associated with violence, even with warlike forms of violence. But there is no strong correlation between organised criminal activities and violence. Measures of stability and relatively low levels of violence can be compatible with huge high-value criminal operations, such as transnational drug trafficking and oil theft on an industrial scale. Such "stability" in crime-permeated environments may be due to the existence of state or elitesponsored protection rackets and effective corruption rings. But it may also arise from other types of (local) governance arrangements and agreements involving both criminal organisations and legitimate political, economic and social groups. Conventional law enforcement and security approaches to tackling organised crime are insufficient, and at times also unrealistic and counterproductive. Such approaches are not useful where states do not have sufficient law enforcement capacity and do not hold the monopoly on the use of force. Things are complicated further because in such settings the rule of law is weak or non-existent, corruption and human rights violations are rife, and political and social institutions, both formal and informal, are not separated by the membrane of legality from organised criminal activities. Wider society --affected by rampant inequalities in income and well-being --may not even consider such activities illegitimate. The evidence shows that conventional law enforcement and security approaches can have unintended consequences for security, governance, social cohesion and so on, including by boosting violence and disrupting the fragile political equilibrium between criminal organisations and state agents

Details: Birmingham, UK: GSDRC, International Development Department, College of Social Sciences University of Birmingham, 2016. 33p.

Source: Internet Resource: Accessed April 21, 2017 at: http://www.gsdrc.org/wp-content/uploads/2016/08/Org_crime_violence_dev.pdf

Year: 2016

Country: International

Keywords: Drug Trafficking

Shelf Number: 145137


Author: Idris, Iffat

Title: Youth unemployment and violence: Rapid Literature Review

Summary: This literature review looks at the evidence for a causal link between youth unemployment and violence in stable developing countries, focusing on crime, gang violence and domestic violence. It also looks at the effectiveness of donor programming to address this issue, and identifies areas where further research is needed. Perceived link between youth unemployment and violence The literature shows a strong acceptance of the assumption that youth unemployment is a factor leading to violence - both criminality and youth participation in political violence and armed groups. The hypothesis is that, without jobs, young people are prone to violence and pose a threat to society. This is thought to be particularly the case in countries with a high proportion of young people - 'youth bulges'. A search for empirical evidence to back up this hypothesis reveals two critical points: 1) a lack of consistency about terminology and definitions; and 2) a lack of data. Youth is defined differently in different countries/regions and by different agencies: whereas the UN defines youth as the age group from 15 to 24 years old, it can include someone as young as 12 or as old as 35. There also tends to be an assumption that youth in the context of unemployment and violence refers only to young males, not females. Moreover, there is ambiguity about whether it is unemployment or under-employment and the quality of work young people have that is relevant. Finding accurate, up-to-date, comprehensive, gender and age-disaggregated data on youth in developing countries is a major challenge. This is arguably even more the case in relation to unemployment and violence than in 'traditional' development sectors such as education and health.

Details: Birmingham, UK: GSDRC, University of Birmingham, 2016. 42p.

Source: Internet Resource: Accessed April 22, 2017 at: https://assets.publishing.service.gov.uk/media/58c8019640f0b67ec500018c/YouthUnemployment_Violence.pdf

Year: 2016

Country: International

Keywords: Developing Countries

Shelf Number: 145147


Author: United Nations. Secretary General

Title: Special measures for protection from sexual exploitation and abuse: a new approach.

Summary: The present report presents the Secretary-General's strategy to improve the Organization's system-wide approach to preventing and responding to sexual exploitation and abuse. The strategy focuses on four main areas of action: putting victims first; ending impunity; engaging civil society and external partners; and improving strategic communications for education and transparency. Pursuant to General Assembly resolutions 57/306 and 70/286, the report also provides data on allegations of sexual exploitation and abuse across the United Nations system and by non-United Nations international forces authorized by a Security Council mandate. The data cover the period from 1 January to 31 December 2016. The proposed actions by the General Assembly are set out in section VIII of the present report. Information on the related estimated resource requirements and the funding arrangements thereof is set out in the addendum to the present report (A/71/818/Add.1). The estimated resource requirements within the current budget periods will be absorbed within existing approved resources and consequently will not give rise to additional resource requirements under the approved programme budget for the biennium 2016-2017 or the budgets for peacekeeping operations for the financial period 2017/18.

Details: Vienna: United Nations, 2017. 82p.

Source: Internet Resource: Accessed April 22, 2017 at: http://reliefweb.int/sites/reliefweb.int/files/resources/SG%27s%20Report%20on%20Special%20measures%20for%20protection%20from%20SEA%20-%20a%20new%20approach%20-E.pdf

Year: 2017

Country: International

Keywords: Sexual Abuse

Shelf Number: 145150


Author: Silbernagl, Tina

Title: Systemic Prevention of Youth Violence - a handbook to design and plan comprehensive violence prevention measures

Summary: Poverty, the lack of future prospects and social, economical and political marginalization shape the daily lives of many young people and are important structural causes for violence. Overall, young people’s frustration too often results in a propensity for violence and unsafe behavior. As a consequence children and young people become not only victims but also perpetrators of violence. However, young people are also key agents for peace, security and sustainable development and the frame-conditions for their inclusion are created through the development of capacities of state and non-state actors. Youth violence is a complex phenomenon that cannot be addressed and sustainably prevented from a singular perspective. Effective strategies have to follow a systemic approach. This entails to think and act in networks and bring together stakeholders from diverse sectors and administrative levels with the aim to address the context-specific causes of youth violence. The handbook supports the planning, implementation and monitoring of systemic measures to prevent youth violence. Thus, it supports the inclusion of actors from the relevant sectors on all administrative levels. The young individual is perceived as being in the centre of a complex system of actors, who all impact on his/her behavior. Thus, the actors influencing the environment of young people - parents, teachers, the police and social workers, staff of municipal authorities and national ministries – are activated as partners and target groups of the planned violence prevention measure. By systematically utilizing the handbook, a systemic approach to preventing youth violence can be designed and the positive potential of young people be enhanced.

Details: Eschborn: German Agency for International Cooperation, GIZ, 2011. 84p.

Source: Internet Resource: Accessed April 28, 2017 at: http://www.saferspaces.org.za/uploads/files/GIZ-Systemic-Prevention-Youth-Violence-handbook_english_32.pdf

Year: 2011

Country: International

Keywords: Crime Prevention

Shelf Number: 145178


Author: Federal Ministry for Economic Cooperation and Development (Germany)

Title: Employment Promotion in Contexts of Conflict, Fragility and Violence: Opportunities and Challenges for Peacebuilding

Summary: Engaging in contexts of conflict, fragility and violence is highly relevant to development cooperation. Over 1.5 billion people live in countries that are affected by the consequences of conflict, fragility and violence. Fragile and conflict-affected states lagged behind in achieving the United Nations Millennium Development Goals and fragility is likely to be the main obstacle to the implementation of the United Nations Sustainable Development Goals (Kaplan, 2015). Directing development cooperation towards resolving conflict, fragility and violence as well as working according to certain principles in order not to aggravate the situation and to obtain envisaged development objectives are key for engagement in fragile states. This paper presents evidence that links employment promotion to conflict, fragility and violence, drawing on literature and practices in the field of employment promotion in these contexts. The aim of the paper is to reveal the peacebuilding-potential of employment promotion in overcoming fragility and conflict on the one hand (working on conflict, fragility and violence) and the particular challenges for employment approaches in these settings on the other hand (context-sensitivity / working in conflict, fragility and violence).

Details: Bonn: Federal Ministry for Economic Cooperation and Development (BMZ); Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ), 2017. 72p.

Source: Internet Resource: Accessed April 28, 2017 at: http://www2.giz.de/wbf/4tDx9kw63gma/giz2015-0712en-employment-conflict-fragility-violence.pdf

Year: 2017

Country: International

Keywords: Employment

Shelf Number: 145180


Author: Loureiro, Andre Oliveira Ferreira

Title: Essays on crime, hysteresis, poverty and conditional cash transfers

Summary: This thesis encompasses three essays around criminal behaviour with the first one analysing the impact of programmes aimed at poverty reduction, the second one developing a theoretical model of hysteresis in crime, and the third one empirically investigating the hysteresis hypothesis in crime rates. In the first chapter I investigate the impact of conditional cash transfers (CCT) on crime rates by analysing the Brazilian Bolsa Familia, the largest CCT programme in the world, in a panel data between 2001 and 2008. The related existing economic literature analysing general welfare programmes usually ignores the crucial endogeneity involved in the relationship between crime rates and social welfare policies through poverty, since poorer regions are focused in the distribution of resources. I use the existing temporal heterogeneity in the implementation of the programme across the states to identify the causal impact of CCT programmes on poverty and criminality. The guidelines of the Brazilian programme established that the amount of resources available for each state should be based on the poverty levels in the 2000 Census. However, due to reasons unrelated to poverty levels and crime rates, some states were able to implement the programme to a greater extent more quickly than others. States that reached the level of cash transfer expenditures proposed by the guidelines of the programme more promptly had a more significant reduction in poverty rates. Similar but less robust results are found for crime rates as robbery, theft and kidnapping, while no significant effects were found for homicide and murder, indicating a weak or non-existent relationship between conditional cash transfers and crime. I also develop, to my knowledge, the first theoretical model to explicitly account for hysteresis - a situation where positive exogenous variations in the relevant economic variables have a different effect from negative variations - in both criminal behaviour and crime rates in order to fill the gap between the theoretical predictions and the empirical evidence about the efficiency of policies in reducing crime rates. The majority of the theoretical analyses predict a sharp decrease in crime rates when there are significant improvements in the economic conditions or an increase in the probability of punishment. However, the existing empirical studies have found lower than expected effects on crime rates from variations in variables related to those factors. One important consequence of hysteresis is that the effect on an outcome variable from positive exogenous variations in the determining variables has a different magnitude from negative variations. For example, if hysteresis is present in the criminal behaviour and part of the police force in a city are dismissed in a given year, resulting in an escalation in crime, a reversal of the policy in the following year by readmitting all sacked police officers in an attempt to restore the original crime levels will result in lower crime rates, but higher than the original ones,

Details: Edinburgh: University of Edinburgh, 2013. 153p.

Source: Internet Resource: Dissertation: Accessed April 28, 2017 at: https://www.era.lib.ed.ac.uk/handle/1842/7913

Year: 2013

Country: International

Keywords: Conditional Cash Transfers

Shelf Number: 145189


Author: Marcus, Rachel

Title: Poverty and violations of children's right to protection in low- and middle-income countries: A review of the evidence

Summary: Why do up to 1.5 billion children suffer physical violence every year? Why do up to 2251 million children suffer sexual violence every year? Why are 14.2 million girls every year married off to start adult lives in adolescence or before?2 Why are considerable numbers of young children left alone for long hours without competent adult supervision? Historically, in studies of violence against children in Organisation for Economic Co-operation and Development (OECD) countries, explanations emphasised the role of individual psychological factors. The pendulum swung in the 1960s to highlight structural forces contributing to the abuse and neglect of children, in particular poverty and unemployment. In more recent years, understanding of the factors underlying violations of children's right to protection has drawn on an ecological model that emphasises factors at several levels: individual, family, household, community and broader society (Frederick and Goddard, 2007). The international child protection community generally sees three broad sets of factors as underlying many child protection violations: sociocultural norms, weak protective structures and poverty or deprivation. However, within this community there are divergences of opinion concerning the extent to which poverty is a significant underlying or risk factor. Interviews with child protection and poverty specialists and an electronic survey conducted for this research programme revealed a notable split. The majority considered poverty an important and often-neglected factor underpinning many child protection violations, but a significant number of respondents highlighted the fact that abuse, exploitation and neglect of children occurs across all socioeconomic groups, and thus felt economic deprivation played a more minor role. Perspectives varied considerably across different types of violation, with most respondents feeling that economic deprivation was a critical factor in early marriage, inadequate care and sexual exploitation, but relatively fewer convinced it was an important factor underpinning corporal punishment or sexual abuse. The electronic survey, like the majority of the literature examined for this review, focuses on children's vulnerability to protection violations, not whether poverty increases the risk of perpetrating abuse. Broadly, these perspectives concur with insights from the literature examined for this study. Despite increased recognition of the importance of effective joined-up child protection systems (e.g. World Vision, 2011; Wulcyzn et al., 2010), state agencies charged with child protection in most low- and middle-income countries are severely underfunded (Everychild, 2010b; Holmes and Jones, 2009). At the same time, there is a global move towards strengthening social protection - much of which has a partial focus on children in poverty, and thus is directing resources towards realising children's survival and development rights. In this context, there is growing interest in exploring the potential and limitations of social protection, human development and other anti-poverty programmes to reduce violations of children's protection rights - and of action to protect children's rights to promote better anti-poverty and human development outcomes. As a contribution to emerging practice and debate in this area, the Overseas Development Institute (ODI) and the Oak Foundation are undertaking a two-year programme of work to explore the potential for greater linkages between child protection and anti-poverty work in low- and middle-income countries. This report - the first output of the programme - has two main objectives: 1. To examine how far and in what ways poverty contributes to violations of children's rights to protection in four key areas - child marriage, sexual and physical violence against children and inadequate care of children - and thus to clarify the significance of poverty as an underlying or risk factor for these different violations of children's protection rights; and 2. To assess the strength of evidence concerning the relationship between poverty and child marriage, sexual and physical violence against children and inadequate care of children, and thus to identify knowledge gaps. It reviews evidence from low- and middle-income countries on the linkages between poverty and child marriage, sexual and physical violence against children and inadequate care of children. It also draws selectively on evidence from OECD countries in areas where the low- and middle-income country literature is sparse, or to highlight differences related to income and institutional capacity. It is intended as a detailed resource on the issues explored. Key findings are summarised in a short background note (Marcus, 2013). Other components of this programme include an adapted systematic review of the extent to which child protection policies and programmes involve attention to anti-poverty issues, and the contribution of antipoverty components to effective action on specific child protection issues (Marcus and Page, 2013); an electronic survey of practitioners and key informant interviews; and fieldwork exploring the relationship between poverty and violation of children's protection rights in Ethiopia, Uganda, and Vietnam. The programme is also exploring the potential for and different ways of promoting greater synergies between analysts and practitioners with anti-poverty and child protection foci.

Details: London: Overseas Development Institute, 2014. 97p.

Source: Internet Resource: Accessed May 1, 2017 at: https://www.odi.org/sites/odi.org.uk/files/odi-assets/publications-opinion-files/9309.pdf

Year: 2014

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 145223


Author: Dewey, Matias

Title: Porous borders: The Study of Illegal Markets from a Sociological Perspective

Summary: State concerns about crime and security issues have strongly affected conceptions of economic action outside the law, a traditional field of research in sociology. This increasing encroachment by policy-related concerns on the intellectual framework of the discipline has led, on one hand, to an almost exclusive focus on criminal organizations in the analyses of illegal economic activity. On the other hand, it has led to the downplaying of the importance of classic topics of sociological reflection, such as the embeddedness of action, the moral dimension of illegal products, or the relationship between social change and the spread of illegal exchanges. This short paper problematizes economic action outside the law by taking legal definitions and their effects seriously. It begins with the problem of naturalizing state definitions. This is followed by a discussion of the illegality of illegal markets, which illustrates sociological contributions. Finally, three dimensions of the study of illegal markets are suggested. Overall, the paper lays out a research program for this field of sociological inquiry.

Details: Cologne: Max Planck Institute for the Study of Societies, Cologne, 2016. 18p.

Source: Internet Resource: MPIfG Discussion Paper 16/2: Accessed May 1, 2017 at: http://www.mpifg.de/pu/mpifg_dp/dp16-2.pdf

Year: 2016

Country: International

Keywords: Border Security

Shelf Number: 145228


Author: Mayntz, Renate

Title: Illegal markets: Boundaries and Interfaces between Legality and Illegality

Summary: In sociology generally, the infringement of legal norms is not treated as a special kind of norm violation, the sociology of law being an obvious exception. The study of illegal markets therefore faces the challenge of distinguishing illegality from legality, and relating both to legitimacy. There is no conceptual ambiguity about the distinction between legal and illegal if legality is formally defined. In practice, (formal) legality and (social) legitimacy can diverge: there is both legitimate illegal action and illegitimate legal action. Illegal markets are a special kind of illegal social system, constituted by market transactions. Illegal markets are empirically related to organized crime, mafia and even terrorist organizations, and they interact both with legal markets and the forces of state order. Where legal and illegal action systems are not separated by clear social boundaries, they are connected by what has come to be called "interfaces": actors moving between a legal and an illegal world, actions that are illegal but perceived as legitimate or the other way around, and a gray zone of actions that are neither clearly legal nor illegal, and neither clearly legitimate nor illegitimate. Interfaces facilitate interaction between legal and illegal action systems, but they are also sources of tension and can lead to institutional change.

Details: Cologne: Max Planck Institute for the Study of Societies (MPIfG), Cologne, 2016. 17p.

Source: Internet Resource: MPIfG Discussion Paper 16/4: Accessed May 1, 2017 at: https://www.econstor.eu/bitstream/10419/129799/1/852493150.pdf

Year: 2016

Country: International

Keywords: Illegal Markets

Shelf Number: 145229


Author: Reurink, Arjan

Title: Financial fraud: A literature review

Summary: This paper describes the empirical universe of financial fraud as it has been documented in the academic literature. More specifically, it describes the different forms of fraudulent behavior in the context of financial market activities, the prevalence and consequences of such behavior as identified by previous research, and the economic and market structures that scholars believe facilitate it. To structure the discussion, a conceptual distinction is made between three types of financial fraud: financial statement fraud, financial scams, and fraudulent financial mis-selling. What emerges is a picture of financial fraud as a complex phenomenon that can take very different forms, depending on the market segments in which it occurs, the financial instruments it pertains to, and the actors involved. Moreover, the findings of the literature review highlight a number of recent developments that scholars think have facilitated the occurrence of financial fraud, including: (1) the development of new fundamental conflicts of interest and perverse incentive structures in the financial industry; (2) an influx of unsophisticated, gullible participants in the financial marketplace; (3) the increasing complexity involved in financial market transactions as a result of rapid technological, legal, and financial innovation and an ever-widening menu of financial products; (4) an increase in the use of justified secrecy in the form of strict confidentiality rules around banking and legal services and the use of off-balance-sheet constructions and shell companies located in secrecy jurisdictions.

Details: Cologne: Max Planck Institute for the Study of Societies, Cologne, 2016. 100p.

Source: Internet Resource: MPIfG Discussion Paper 16/5: Accessed May 2, 2017 at: http://www.mpi-fg-koeln.mpg.de/pu/mpifg_dp/dp16-5.pdf

Year: 2016

Country: International

Keywords: Economics and Crime

Shelf Number: 145232


Author: Loi, Valerio

Title: Tendencies in World Imprisonment for Drug Related Crime

Summary: The latest estimates on the world prison population indicate that 10.35 million people are incarcerated worldwide, according to calculations presented in February 2016. The assertion this figure can be correlated to the effects and outcomes of the global drug prohibition regime is the starting point of this chapter, which will try to give an overview of to what extent the use of criminal law has contributed to this figure on a global scale. Drug control policies with a strong emphasis on criminal law became a global reality particularly after the adoption of the 1988 UN Convention against Illicit Traffic in Narcotic Drugs and Psychoactive Substances, which requires countries to suppress the illicit production, supply and consumption of drugs through criminal law. As an indirect result, it can be one of the main causes of imprisonments worldwide, as many countries have adopted legislation with prison sentences for all drugs related offences after signing this treaty. This emphasis on criminal law to deal with the drugs market has provoked thirty three countries to prescribe the death penalty for drug offences. And last but certainly not least, hundreds of thousands of people are locked up without any trial for lengthy periods of time in the name of drug treatment. The 2014 UNODC "World crime trends and emerging issues and responses in the field of crime prevention and criminal justice", of April 2014, shows the global trend on drug offences remains on the increase: drug trafficking grew by 11%, while offences related to drug possession increased over 18%, in the period 2003-2012. It is of high relevance to stress that most legislations do not distinguish between possessions of and traffic in drugs, possibly altering these figures even more towards the latter. Although exact figures lack, the 2014 World Drug Report indicates that, "worldwide, the large majority of drug use offences are associated with cannabis"; an indication that a large share of penal prosecutions globally is geared towards the cannabis market. Meanwhile, policy debates in different parts of the world reflect certain recognition of both the ineffectiveness of the current penal focus, especially for non-violent offences, such as possession for personal use and use, but sometimes including small scale traffic; and the degree of injustice being done to certain vulnerable population groups, such as single mothers, and people imprisoned abroad. This has lead in some countries to legislative reform and changing practice in the criminal justice system. Questioning the exclusive penal model is no longer taboo, and the need to restore the balance between punishment and care is long overdue. The following chapter will basically focus on the impact of the present drug laws enforcement in the world's prison systems. It won't be a mere recount of the share of detainees for drug crimes within the overall inmates' population, as far as data for that is available, according to geographical macro-regions. While assessing the main trends, we want to highlight the challenges and possible reform proposals of the present prison systems.

Details: El Colectivo de Estudios Drogas y Derecho (CEDD), 2016. 33p.

Source: Internet Resource: Accessed May 2, 2017 at: http://www.drogasyderecho.org/pses/restoi.pdf

Year: 2016

Country: International

Keywords: Drug Control

Shelf Number: 145234


Author: Dalberg Global Development Advisors

Title: Not for Sale: Halting the illegal trade of CITES species from World Heritage Sites

Summary: WWF's report Halting the illegal trade of CITES species from World Heritage Sites, finds that poaching occurs in almost 30% of World Heritage Sites where one third of the world's remaining wild tigers and 40% of all African animals live. These unique sites are also the last refuge for some critically endangered species such as Javan rhinos in Indonesia and vaquitas in Mexico.

Details: Geneva, SWIT: Dalberg, 2017. 52p.

Source: Internet Resource: Accessed May 2, 2017 at: https://wwf.fi/mediabank/9712.pdf

Year: 2017

Country: International

Keywords: Endangered Species

Shelf Number: 145245


Author: Nett, Katharina

Title: Insurgency, Terrorism and Organised Crime in a Warming Climate: Analysing the Links Between Climate Change and Non-State Armed Groups

Summary: Over the past ten years, both our understanding and awareness of the links between climate change and security have increased tremendously. Today the UN, the EU, the G7 and an increasing number of states have classified climate change as a threat to global and/or national security. However, the links between climate change, conflict and fragility are not simple and linear. The increasing impacts of climate change do not automatically lead to more fragility and conflict. Rather, climate change acts as a threat multiplier. It interacts and converges with other existing risks and pressures in a given context and can increase the likelihood of fragility or violent conflict. Taking the state of play on the links between climate change and fragility as a starting point, the report Insurgency, Terrorism and Organised Crime in a Warming Climate addresses the question of how the impacts of climate change are a contributing factor in the rise and growth of non-state armed groups. Four case studies that span the whole spectrum of non-state armed groups and patterns of violence, conflict and fragility explore in depth the specific role non-state armed groups play in the complex dynamics of climate change and fragility and try to identify how climate change acts as a risks multiplier in regards to non-state armed groups.

Details: Berlin: Adelphi, 2016. 68p.

Source: Internet Resource: Accessed May 2, 2017 at: https://www.adelphi.de/en/publication/insurgency-terrorism-and-organised-crime-warming-climate

Year: 2016

Country: International

Keywords: Armed Groups

Shelf Number: 145244


Author: Mace, Robyn R.

Title: Illicit Pesticides, Organized Crime and Supply Chain Integrity

Summary: Crime prevention and criminal justice issues affect all aspects of development, including its economic, social and environmental dimensions, as well as its sustainability. In the United Nations Salvador Declaration of April 2010, Member States underlined the necessity to strengthen national crime prevention and criminal justice systems, policies and practices in combating emerging forms of crime, such as those having a significant impact on the environment, and other related serious crimes. The United Nations Interregional Crime and Justice Research Institute (UNICRI) considers environmental crime and its links with other serious crimes a clear and serious threat for sustainable development, global stability and security. Since 1991, the Institute has dealt with crimes against the environment and related emerging threats through applied research, awareness, and capacity-building initiatives. In its Resolution 2012/19 entitled "Strengthening international cooperation in combating transnational organized crime in all its forms and manifestations", the Economic and Social Council "Invites the United Nations Interregional Crime and Justice Research Institute […] to continue to conduct, in consultation with Member States and in cooperation with other competent international entities, research on different forms of transnational organized crime", including crimes against the environment. In addition in 2013, in the European Parliament Report (2012/2117(INI)) "on organized crime, corruption and money laundering: recommendations on action and initiatives", explicit reference is made to the work of the Institute in this field, as recommendation 51 states: "The European Parliament [...] recommends joint action to prevent and combat illegal environment-related activities connected to or resulting from organized mafia-style criminal activities, also by strengthening European bodies, such as Europol and Eurojust, and international ones, such as Interpol and UNICRI [...]." In this framework, UNICRI is developing a programme aimed at enhancing an international strategy to counter serious and organized groups involved in crimes having an adverse impact on the environment, including in the trafficking of illicit pesticides. Illicit pesticides represent a lucrative activity for organized crime and a concrete threat to security, development, health and the environment, and consequently require urgent response from the national and regional authorities, as well as the international community and the United Nations. The present research paper aims at deepening the general knowledge on current trends related to illicit pesticides, identifying the actors and organized crime groups (OCGs) and networks involvement and their modus operandi, and understanding the supply chain vulnerabilities. The findings of this research paper have been discussed during an Expert Workshop with the objective of identifying good practices for detecting, investigating and prosecuting illicit pesticides related activities and, ultimately, improving capacities in countering illicit pesticides. Inputs and outcomes formulated during and after the meeting have been included in the present paper. The ultimate results of this analysis are to design a roadmap for actions outlining the follow-up activities to be implemented, to disseminate best practices, to reinforce dialogue and cooperation among stakeholders, and to enhance national and international capabilities to combat international illicit trafficking of pesticides. This policy paper is divided into four sections. The first presents an overview of the risks and impacts of illicit pesticide use on human health, livestock and food supplies, the environment, and the international agricultural trade. The second section presents data and information on actors and agents, modus operandi, observed trends, product flows and a regional profiles of the pesticides market. This section also considers trade, agricultural and food supply chain characteristics, security vulnerabilities, and protection and defense measures against organized crime groups and networks that have infiltrated international agrochemicals and pesticide markets. The third section summarizes key regulatory issues, identifies obstacles and indicates concrete actions to prevent and combat the importation, sale and use of illicit pesticides, as well as the role of the actors involved in the control and securitization of the market. The final section concludes with the role of UNICRI in addressing the issues of illicit pesticides, in particular in facilitating research, raising stakeholders' awareness, delivering training and technical assistance programmes, supporting in capacity building activities and reinforcing national and international cooperatio

Details: Torino, Italy: United Nations Interregional Crime and Justice Research Institute (UNICRI), 2016. 84p.

Source: Internet Resource: Accessed May 3, 2017 at: http://www.unicri.it/in_focus/files/The_problem_of_illicit_pesticides_low_res1.pdf

Year: 2016

Country: International

Keywords: Crime Prevention

Shelf Number: 145248


Author: International Institute for Strategic Studies

Title: Climate Change, Violence and Young People: Report for Unicef UK

Summary: This Unicef UK commissioned report, co-authored by the Institute for Strategic Studies (IISS), a world-leading authority on global security, and International Alert, one of the worlds leading peacebuilding organisations, adds to a growing body of research which emphasises the role of climate change and environmental stress as a 'threat multiplier' in terms of stability and security. The report finds that regions where large youth populations will be present in the coming decades currently have low resilience to the impacts of climate change and generally experience poor governance and social and political instability. The worsening effects of climate change, combined with growing social, economic and political pressures as a result of rapidly-expanding populations, will place additional strain on governments and social systems that are already over-burdened - potentially triggering, or exacerbating, social unrest, instability and even conflict.

Details: London: IISS, 2015. 36p.

Source: Internet Resource: Accessed May 3, 2017 at: https://downloads.unicef.org.uk/wp-content/uploads/2015/01/IISS-UNICEF-report_FINAL.pdf?_ga=2.253999745.889170539.1493821501-1438843313.1493818709

Year: 2015

Country: International

Keywords: Climate Change

Shelf Number: 145250


Author: Andro, Armelle

Title: Female genital mutilation around the world

Summary: Where in the world is female genital cutting still practiced? Has female genital mutilation (FGM) become less common with continuing efforts to eradicate the practice, or has it persisted? Drawing on the most recent surveys, Armelle Andro and Marie Lesclingand offer an overview of the situation and trends in FGM around the world, and recall the consequences of genital mutilation for women's sexual and reproductive health.

Details: Paris: French Institute for Demographic Studies (INED), 2017. 4p.

Source: Internet Resource: Accessed May 3, 2017 at: https://www.ined.fr/fichier/s_rubrique/26419/543.population.societies.2017.april.en.pdf

Year: 2017

Country: International

Keywords: Female Cutting

Shelf Number: 145255


Author: Dammert, Ana C.

Title: Effects of Public Policy on Child Labor: Knowledge, Gaps, and Implications for Program Design

Summary: While progress has been made over the past decade, there is still much to learn about the effects of public policy on the labor participation of many children in developing countries. Policy instruments can be used to address or affect child labor, even if they are implemented to achieve other objectives. From a theoretical point of view, however, the impact of these policies on child labor is undetermined. This paper discusses the evidence generated by rigorous evaluations on the impact on child labor of labor market programs, conditional and unconditional transfers, and microcredit, among other social programs and interventions. The study finds that although transfer programs generally tend to reduce child labor, other policies risk increasing child labor, especially if they affect households' productive opportunities. The findings also point to knowledge gaps that should be addressed in future evaluations.

Details: Washington, DC : World Bank, Development Research Group, Impact Evaluation Team, 2017. 39p.

Source: Internet Resource: Policy Research Working Paper 7999; Accessed May 3, 2017 at: http://documents.worldbank.org/curated/en/108841488913017526/pdf/WPS7999.pdf

Year: 2017

Country: International

Keywords: Child Labor

Shelf Number: 145256


Author: Burhan, Nik Ahmad Sufian

Title: Intellectual Giftedness for Leadership: How Robust is the Crime Reducing Effect of Intellectual Class?

Summary: This paper aims to reassess Burhan et al.'s (2014, Intelligence, 47, 12–22) findings on the impact of intelligence (IQ) on the crime rates at a cross-country level. People who belong to the intellectual group, characterized by IQ at the 95th percentile of a normal distribution were found to have a tremendous impact in terms of crime rate reduction, compared to those with average ability (50th percentile IQ). This was proven using the ordinary least squares (OLS). Other than that, people of non-intellectual class (5th percentile IQ) were found to be least important in reducing crime. However, in their study, many independent variables were stated as not significantly related to the crime rates, which contradicts with other literature. It is questionable if the presence of serious outliers in the samples causes the objectionable finding. In this study, we analyzed the impact of IQ classes on the rate of eight different types of crimes, namely homicide, rape, kidnapping, robbery, assault, burglary, property crimes, and vehicle theft. Analysis was carried out using the Tukey's Bisquare robust M-estimator that mitigates the effects of outliers in the samples. In conclusion, we have proved that those from the intellectual class have more significant role than people of average ability and non-intellectual class in reducing the crime rates. Thus, educational policies for the gifted are recommended in order for them to become active participants of the future transformation of their societies, by enhancing functionality and quality of the institutions across nations, and thereby, reducing crimes.

Details: Munich: Munich Personal RePEc Archive, 2017. 32p.

Source: Internet Resource: MPRA_paper_77467; Accessed May 4, 2017 at: https://mpra.ub.uni-muenchen.de/77467/1/MPRA_paper_77467.pdf

Year: 2017

Country: International

Keywords: Crime Prevention

Shelf Number: 145307


Author: Dreher, Axel

Title: The Effect of Migration on Terror - Made at Home or Imported from Abroad?

Summary: We investigate whether the stock of foreigners residing in a country leads to a larger number of terrorist attacks on that country. Our instrument for the stock of foreigners relies on the interaction of two sets of variables. Variation across host-origin-dyads results from structural characteristics between the country of origin and the host, while variation over time makes use of changes in push and pull factors between host and origin countries resulting from natural disasters. Controlling for the levels of these variables themselves and fixed effects for dyads and years, the interaction provides a powerful and excludable instrument. Using data for 20 OECD host countries and 187 countries of origin over the 1980-2010 period we show that the probability of a terrorist attack increases with a larger number of foreigners living in a country. However, this scale effect is not larger than the effect domestic populations have on domestic terror. We find some evidence that terror is systematically imported from countries with large Muslim populations. A larger number of attacks against foreigners in the host country increases the risk of terror from foreigners there. We find that host country policies relating to integration and the rights of foreigners are key to fight terror - stricter policies that exclude foreigners already living in a country increase the risk of terror. High-skilled migrants are associated with a significantly lower risk of terror compared to low-skilled ones, while there is no significant difference between male and female migrants.

Details: Munich: Center for Economic Studies, 2017. 43p.

Source: Internet Resource: CESifo Working Paper Series: Accessed May 4, 2017 at: http://EconPapers.repec.org/RePEc:ces:ceswps:_6441

Year: 2017

Country: International

Keywords: Migration and Crime

Shelf Number: 145310


Author: Overton, Iain, ed.

Title: Understanding the Rising Cult of the Suicide Bomber

Summary: The sharp rise in the number of suicide bombings over the last few years is incontestable. 1982 - the year of the Hezbollah attack on the Tyre headquarters of the Israeli army - is often cited as the beginning of the 'modern age' of suicide bombings, but the relatively limited activities of the 80s and 90s cannot compare with the current scope of the problem. Before 2000, no year saw more than 22 suicide attacks worldwide. In 2015, there were at least 600. Over the last five years of AOAV's Explosive Weapons Monitoring Project (EWMP), which records data on explosive weapon usage worldwide according t0 English-language news sources, suicide bombings have consistently caused high levels of civilian harm. In total, 1,191 incidents were recorded across the 2011-2015 period, resulting in 31,589 civilian deaths and injuries. This is an average of 27 civilians killed or injured per incident. Of the ten worst incidents recorded by AOAV over the five-year period, five were suicide bombings - a figure only matched by airstrikes. In the same period, AOAV also recorded a worrisome overall trend of rising civilian deaths and injuries from suicide bombings, as well as ever-greater numbers of countries affected. In 2015, for example, suicide bombings were recorded in 21 countries - the highest number ever recorded by AOAV or by other datasets. Indeed, both 2015 and 2016 saw a considerable uptick in the overall lethality of suicide bombings. This was in spite of similar incident numbers to previous years. Suicide strikes in 2015 resulted in an average of 36 civilian deaths and injuries per incident, markedly higher than the five-year average of 28. In 2016 that figure has risen to 38. This rise can largely be attributed to an intensification of high-profile suicide bombings launched by Boko Haram and IS, but also by other armed groups involved in conflicts in Syria and Yemen, such as Jabhat al-Nusra and al-Qaeda in the Arabia Peninsula (AQAP). In spite of the clear differences in scale and objectives between the 1980s and the post-9/11 world, this is largely not reflected in modern scholarship. Most studies on suicide bombings - even those emerging after the 11 September 2001 attacks and the Iraqi insurgency of the mid-2000s - focus on the relatively small-scale nationalist campaigns of the 80s and 90s. This is probably largely because of the comparatively large amounts of available data on these campaigns (such as the relatively comprehensive information on Palestinian suicide bombings, for example). Much of this scholarship into the drivers of suicide attacks has also focused at the individual level, ambitiously, searching for the magical last piece of the puzzle that will explain 'what makes a suicide bombe''. The overwhelming majority suicide bombers in recent years are, with a few exceptions, internationalist Islamists of a Salafi-Jihadist persuasion (or, more accurately, those who carry out bombings on behalf of such organisations). This should not be taken to mean that suicide bombing is a problem somehow 'stemming from Islam', unique to Islamists, or even particularly characteristic of Islamist political movements as a whole. What it does mean, is that these groups - rather than nationalist movements - should be the centre of current research, as well as policy and military discussions on reducing the current impact of suicide bombing. Another concern regarding recent scholarship is that most has focused on finding a single underlying cause for all uses of suicide bombing worldwide. Suicide bombing is a tactic that can be used in many different ways and for many different strategic objectives. It obviously emerges under specific conditions - but this does not mean its use will be limited to those conditions. The suicide bombing that killed Rajiv Gandhi in 1991 shares no more with a huge market truck bombing in 2015 Baghdad than the means of activation method. This report sets out to address the main factors that contribute significantly in creating the cult of suicide bombers in armed Salafi-Jihadi groups. Our research found that suicide bombers of Salafi-Jihadi groups blow themselves up for a combination of reasons. Firstly, the concept of martyrdom propagated by Salafi-Jihadi groups seems to appeal to many who have personal and individual desires pertaining to elevation of status. Such desires are often rooted in a sense of inferiority, whether it is socio-economic or social, and is often caused by (perceived or real) discrimination. The act is often justified as a defence of Islam, which gives the bomber both a sense of fulfilling a purpose and hero status among their peers. Religion often serves as the binding force, and usually becomes a factor towards the end of an individual's radicalisation process. These more 'ideological' motivations are, in general, most predominantly found in foreign fighter suicide bombers. Secondly, some bombers are merely motivated by the logic of the battlefield or by personal experience. For example, many Syrian suicide bombers have spent time as political prisoners or witnessed deaths caused by airstrikes, which may give them enough grievances to exert revenge. Suicide bombings might also be motivated by more pragmatic reasons, for example as a means to protect one's home community.Thirdly, the deterioration of conflict in Syria and Iraq, as well as the sectarian climate that has been developed as a result of these conflicts, has polarised the Muslim population and has undoubtedly eradicated some of the neutral positions in each conflict. This has paved the ground for more suicide attacks in the short run but also for jihadi sympathisation in the long run.

Details: London: Action on Armed Violence, 2017. 144p.

Source: Internet Resource: Accessed May 4, 2017 at: https://aoav.org.uk/wp-content/uploads/2017/05/Understanding-the-rising-cult-of-the-suicide-bomber.pdf

Year: 2017

Country: International

Keywords: Islam

Shelf Number: 145312


Author: Smith, Cindy J.

Title: Ensuring Supply Chain Security: The role of anti-counterfeiting technologies

Summary: The goal of this project was to analyze the effects of anti-counterfeiting technologies on national strategies aimed at increasing governments' and citizens' security, while ensuring that only legitimate products are present in the legal supply chain. The report presents the findings of research conducted on a self-selected sample of 18 providers of anti-counterfeiting technologies. They agreed to participate in the study to provide examples of technology solutions developed to support governments in increasing security in various areas, including the control of the legitimate supply chain of products and the security of identity documents and banknotes. Data collection methods included gathering information from providers on their systems/products. However, the number of examples and the level of details vary significantly for many reasons, including confidentiality issues deriving from non-disclosure agreements signed with their governmental counterparts. The research is based on the premise that counterfeiting is a complex phenomenon, impacting society at varying levels, and providing organized crime with increasing possibilities to obtain financial resources and diversify its illicit and licit activities. In the case of counterfeit products, for example, economic losses for legitimate producers are just one of the many consequences created by this crime. The health and safety of citizens are put at risk by the circulation of products, such as falsified medicines, fake toys and fraudulent food and beverages. Furthermore, the counterfeiting of excisable products creates considerable economic losses for governments in terms of a lower level of taxes and revenues collected. Additionally, criminal organizations remain active in more traditional types of counterfeiting, such as counterfeiting of identity documents and banknotes. Several technological solutions exist to support countries in responding to these criminal activities and the report includes their description.

Details: Turin, Italy: United Nations Interregional Crime and Justice Research Institute (UNICRI), 2016. 86p.

Source: Internet Resource: Accessed May 5, 2017 at: http://www.unicri.it/topics/counterfeiting/anticounterfeiting_technologies/Ensuring_supply_chain_security_report.pdf

Year: 2016

Country: International

Keywords: Anti-Counterfeiting

Shelf Number: 145324


Author: United Nations Interregional Crime and Justice Research Institute (UNICRI)

Title: New Energy for Urban Security: Improving Urban Security Through Green Environmental Design

Summary: The joint UNICRI-MIT Senseable City Lab Report is a manual for a green and digitally enhanced environmental design that addresses issues related to cities. It provides an index of strategies, which have a direct or indirect impact on a city's image making it appear as a safer and more secure environment. Each section of the report identifies a particular urban challenge that needs to be addressed through environmental design, providing a set of guidelines that are both green and digitally enhanced to provide solutions to these challenges, and concludes with a list of actual or potential projects that deploy, in part, the proposed guidelines, demonstrating their prospective effectiveness. The Report analyses the inter-dependencies that exist between ecology, green urban design and security of both the citizen and the urban environment in general. The analysis commences by setting out CPTED theory, which, although currently adopted by municipalities, is not geared toward taking into account advances in technology and the ecological and the environmental impacts on urban life. The Report proposes a third generation of CPTED, designed to take into account the rapid development resulting from new technologies and the digital age - all of which signal revolutionising how we approach urban safety and security. Third-generation CPTED, as presented in the Report, envisages a green and sustainable approach to enhance the living standards of urbanites, as well as to improve the image of cities as user-friendly, safe, and secure. It focuses on a particular sort of spatial democracy and transparency, characterized by the use of solid infrastructures and solutions, along with situated technologies. Moreover, building on the potential of online social networks, third-generation CPTED aims to create a sense of belonging and membership to a greater community by soliciting citizen engagement and participation in improving urban living conditions. The revision of existing CPTED theory, i.e. the third generation CPTED - as set out in the report - proposes that the physical make-up of a city is designed according to the following recommendations: Integrating a sufficient amount of public spaces into the fabric of the city to provide appropriate settings for collective activities and gatherings; Integrating sufficient green spaces of various scales, including street vegetation, vertical green facades, green roofs, public gardens, and neighbourhood and city-scale parks; Fostering new developments that target mixed and balanced communities in terms of income level, social status, ethnicity, demographics, and tenure; Supporting new developments and revitalization projects that aim to create new spaces, or re-structure existing neighbourhoods as mixed-use instead of single-use; Optimizing the urban removal chain in terms of sewage management and garbage collection, taking into account technologies and cultural practices regarding recycling and grey water treatment; Enhancing natural surveillance by providing sufficient street lighting at night, securing the required level of occupation and usage at all times; Ensuring that no place in the city is a terrain-vague, i.e. a place with no institutional supervision; Promoting revitalization and redevelopment projects that focus on grey or brown sites - sites previously accommodating hazardous industries, or sites that are devastated by natural disasters or violent conflicts, or sites that have been previously occupied and are currently vacant due to economic or socio-cultural reasons; Providing sufficient and effective public transportation infrastructure that not only contributes to the well-being of citizens, but also traffic reduction, which has a direct impact on the psychological well-being of citizens; Allocating sufficient financial resources to the regular maintenance of civic spaces, including streetscapes and urban facades; Allocating sufficient financial and human resources for providing public education, particularly for the young urban population; Providing efficient regulations for the construction sector in terms of monitoring the structural integrity, energy efficiency, and quality of building proposals; Providing financial support and the macro and microeconomic infrastructure to assist the low-income urban population in home-ownership. The Report concludes by exploring the potential application of the proposed programme to crime prevention and the enhancement of the perception of safety in urban areas, which is identified as the third-generation of CPTED.

Details: Torin, Italy: UNICRI, 2011. 67p.

Source: Internet Resource: Accessed May 5, 2017 at: http://www.unicri.it/news/files/2011-04-01_110414_CRA_Urban_Security_sm.pdf

Year: 2011

Country: International

Keywords: CPTED

Shelf Number: 145325


Author: Schouwstra, Robert

Title: Strengthening the security and Integrity of the Precious Metals Supply Chain

Summary: In its resolution 2013/38 entitled "Combating transnational organized crime and its possible links to illicit trafficking in precious metals," the Economic and Social Council calls upon the United Nations Interregional Crime and Justice Research Institute (UNICRI) to conduct a comprehensive study on the possible links between transnational organized crime, other criminal activities and illicit trafficking in precious metals. UNICRI has developed a programme to promote an international strategy to combat illicit trafficking in precious metals, in which the comprehensive study requested in ECOSOC resolution 2013/38 is the major component of an Assessment Phase to be followed by an Operational Phase. An Expert Meeting on "Promoting an international strategy to combat illicit trafficking in precious metals," organised by UNICRI in September 2015 in Turin (Italy), allowed the collection of experts' views on the issues and challenges that needed to be addressed and emphasized in the study. The present technical report aims at giving a comprehensive overview of the current trends related to precious metals trafficking, in particular it focuses on the precious metals supply chain, the different threats and challenges hanging over this market - including the involvement of organised crime groups and associated criminal activities - as well as the regulatory frameworks and initiatives in place to guarantee the integrity of the supply chain. The knowledge acquired throughout this report is used to identify the strengths, weaknesses, opportunities and threats to address the challenges. A series of recommendations concerning the implementation of an international strategy to prevent and combat illicit trafficking in precious metals are included in the assessment. The report is intended to address the following research questions and sub-questions: - What is the extent of illicit trafficking in precious metals? - Is illicit trafficking in precious metals linked to transnational organized crime and other associated criminal activities? - Is illicit trafficking in precious metals linked to terrorist activities? - What are the vulnerabilities of the precious metals supply chain? - How can illicit trafficking in precious metals be prevented and countered? - What are the strengths and weaknesses of existing initiatives?

Details: Torino - Italy: United Nations Interregional Crime and Justice Research Institute (UNICRI), 2016. 123p.

Source: Internet Resource: Accessed May 6, 2017 at: http://files.unicri.it/PM_draft_onlinev.pdf

Year: 2016

Country: International

Keywords: Illicit Trafficking

Shelf Number: 145328


Author: Hamilton, Carolyn

Title: Children and Count-Terrorism

Summary: Terrorism is not a new phenomenon. However, it has acquired new dimensions in the twenty-first century. Terrorist groups have become more structured, and are now often transnational; the majority of the latest terrorist attacks are religiously motivated; and terrorist acts have become increasingly brutal, particularly in terms of civilian casualties. The ever-evolving character of terrorism, together with the sense of anxiety that such a phenomenon creates in the community, has prompted States to adopt counter-terrorism policies and measures to tackle the issue. Children are increasingly affected and victimised by terrorism, but at the same time, the last few years have shown them to be increasingly engaged in terrorist related activity. International policy and law-making has struggled to keep up with the rapid changes, and the rights of children affected by terrorism and counter-terrorism have not entered into mainstream discourse, and have been largely overlooked. The overall objective of this report is to shed light on the particular vulnerability of children and juveniles in the context of counter-terrorism, and to increase the capacity of governments to integrate existing international juvenile justice and child protection standards into their national counter-terrorism frameworks. The report examines the position of children in international law as perpetrators and victims of terrorism. It also explores radicalisation, de-radicalisation and counter-radicalisation by analysing counter-terrorism laws and practices of two case study countries. Finally, the report provides a number of generally applicable recommendations that will allow governments to strengthen their capacity to integrate international child rights standards into domestic counter-terrorism frameworks.

Details: Torino, Italy: United Nations Interregional Crime and Justice Research Institute (UNICRI), 2016. 81p.

Source: Internet Resource: Accessed May 6, 2017 at: http://www.unicri.it/in_focus/files/Children_counter_terrorism.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145337


Author: Booker, Francesca

Title: First line of defence? A review of evidence on the effectiveness of engaging communities to tackle illegal wildlife trade

Summary: Illegal wildlife trade (IWT) in wild species and products is at the top of the international conservation agenda. But it is not just a concern for conservationists - it also has implications for economic and social development, and security. The level of international concern about IWT is reflected by the level of investment that has been made in tackling it - more than US$1.3 billion since 2010 (Wright et al. 2016). It is well recognised that tackling IWT requires a multi-pronged approach and that, beyond reducing demand for illegal products and increasing anti IWT law enforcement along the entire wildlife value chain, a third critical strategy is engaging local communities in conservation. By virtue of their proximity to and knowledge of wildlife, local people are well placed to participate in or support poaching and IWT. The same characteristics mean, however, that they are equally well placed to detect, report on, and help prevent it - if the appropriate incentives are in place. But community engagement has received far less attention and investment than law enforcement or demand reduction to date. Only about 15 per cent of the US$1.3 billion has been allocated to initiatives intended to support sustainable use and alternative livelihoods. Part of the problem is that there is no blueprint approach. While global and regional policy commitments to engaging communities abound, details of how these should be implemented and how they impact IWT remain vague. This report attempts to take a first step in addressing that vagueness. It does so by reviewing existing evidence on the effectiveness of different approaches to engaging communities in efforts to tackle IWT. Through a literature review and through submissions to IIED's Conservation, Crime and Communities (CCC) database (www.communitiesforwildlife.iied.org), we identified 49 different examples of community-based initiatives for tackling illegal wildlife trade from Africa (25 initiatives), Asia (18 initiatives) and Latin America (6 initiatives). The most common approach to community engagement in the 49 initiatives was direct involvement in anti-poaching activities - as guards/rangers or informants. Another common approach was the introduction of alternative livelihoods (both wildlife and non-wildlife based). Wildlife tourism development was the most common form of livelihood support activities deployed specifically to engage poachers in one case, but more commonly used to generate conservation incentives for the broader community. Human wildlife conflict mitigation was also employed in over 20 per cent of the initiatives. Very few (four) initiatives involved community members benefiting from sustainable harvesting and legal trade as a conservation incentive. Of the 49 initiatives identified, only 26 (53 per cent) reported on their effectiveness (either in terms of reducing poaching or maintaining or increasing wildlife populations), although a further six noted that the initiatives were at too early a stage in their development to report on effectiveness. For the 26 that reported on effectiveness, 19 (73 per cent) reported that they were effective - although in four cases effectiveness was partial (it varied over time or was site specific); two were not effective; and five were unclear (either they did not provide an assessment of the community engagement component of a broader anti-IWT initiative, or they showed contradictory results). Of the 26 initiatives with a reported impact on poaching/wildlife numbers, only seven (8 per cent of the total dataset) provided details of how this impact had been assessed - including through interviews with local community members, through analysis of records on reported poaching incidents, and through visual assessments. Of these seven, four found that illegal activities (poaching, logging, illegal plant collection) had declined and one found no change; one found that target populations had increased and one found no change.

Details: London: IIED, 2017. 60p.

Source: Internet Resource: Accessed May 8, 2017 at: http://pubs.iied.org/pdfs/17591IIED.pdf

Year: 2017

Country: International

Keywords: Community Engagement

Shelf Number: 145348


Author: Lemieux, Pierre

Title: The Underground Economy: Causes, Extent, Approaches

Summary: The underground economy (or illegal economy) covers market production of goods and services, legal and illegal, which are sold or purchased illegally. It is composed of both the irregular economy, where legal goods and services are produced and exchanged under illegal conditions, and (productive) black markets, the preserve of goods and services that are illegal but satisfy all the parties involved. History presents us with a large number of prohibition and taxation events that gave rise to contraband. However, smuggling and other forms of underground markets are not only a historical phenomenon, but an everyday fixture of contemporary economies: drugs, alcohol, fuel, tobacco, etc. One should not think of the underground economy as only black markets or smuggling on irregular markets. The irregular economy mainly includes otherwise legal services sold "under the table" like labour services sold to businesses or individuals (in residential construction and renovation, for example). […] To deal with the underground economy, four public policy approaches are possible.

Details: Montreal: Montreal Economic Institute, 2007. 36p.

Source: Internet Resource: Accessed May 8, 2017 at: http://www.iedm.org/files/cdr_nov07_en.pdf

Year: 2007

Country: International

Keywords: Financial Crimes

Shelf Number: 145350


Author: Bouzid, Bechir N.

Title: Dynamic relationship between corruption and youth unemployment : empirical evidences from a system GMM approach

Summary: This paper addresses the causal relationship between corruption and youth unemployment from two different perspectives. The discussion starts by asking how the corruption practices within government institutions that encourage the payment of bribes to access the job opportunities contribute to reducing the efficiency of the resources (labor force) allocations. The resources are diverted from the most productive economic sectors toward those (usually less efficient economic sectors) where self-motivated officials have more discretionary power in selecting the candidates who are less qualified for the job. The challenge is to examine how bribed bureaucrats are more concerned by their own personal interests at the expense of national welfare when positively reacting to the highest bribe payers. Second question addressed is why the resulting mismatching between supply and demand in the labor market tends to sustain its underlying causes (i.e., bribes) by giving more incentive to new agents and economic actors to adopt these practices. Using a system GMM approach that simultaneously account for the dynamic effect between perceived bribery among officials and the youth unemployment rates, the paper finds that, after controlling for various macroeconomic and institutional factors, the development of corruption practices tend to increase the unemployment rate among youth and educated job seekers which in turn contribute to sustain those unlawful practices by forcing the latter to bribe rent seeking government officials in order to secure a job.

Details: Washington, DC: World Bank, Compensation and Performance Unit, 2016. 21p.

Source: Internet Resource; Policy Research Working Paper no. 7842: Accessed May 8, 2017 at: http://elibrary.worldbank.org/doi/abs/10.1596/1813-9450-7842#

Year: 2016

Country: International

Keywords: Bribery

Shelf Number: 145384


Author: Chodkowski, William

Title: Narcotrafficking in the Americas: An issue of National Security

Summary: - Narcotrafficking, in the Western Hemisphere especially, is a threat to America's national security. - The illicit narcotics trade has negative financial and health implications domestically, and undermines rule-of-law, governance, and development internationally. - Despite financial and political motivations that distinguish drug trafficking organizations from insurgency, there is an increasing global nexus between crime and terrorism. - Enforcement and interdiction strategies can help control supply in the short-term, but will not single-handedly contain the problem over the long-run. - Policymakers should channel economic motivations to bilaterally or multilaterally engage Latin American governments in order to build institutions.

Details: Washington, DC: American Security Project, 2013. 21p.

Source: Internet Resource: Accessed May 9, 2017 at: https://americansecurityproject.org/ASP%20Reports/Ref%200107%20-%20Narcotrafficking%20in%20the%20Americas.pdf

Year: 2013

Country: International

Keywords: Drug Control Policy

Shelf Number: 131382


Author: Beckett, Charlie

Title: Fanning the Flames: Reporting Terror in a Networked World

Summary: Terrorism is a brutal and violent practice, but it is also a media phenomenon. Terror is vital news: a dramatic, important story that the public needs to know about and understand. But terrorism also relies on such publicity to disrupt society, provoke fear, and demonstrate power. This problematic relationship predates digital technology. In 1999, American historian Walter Laqueur wrote: It has been said that journalists are terrorists' best friends, because they are willing to give terrorist operations maximum exposure. This is not to say that journalists as a group are sympathetic to terrorists, although it may appear so. It simply means that violence is news, whereas peace and harmony are not. The terrorists need the media, and the media find in terrorism all the ingredients of an exciting story. So what is the responsibility of journalists, who supply the oxygen of publicity? Journalism that reports, analyzes, and comments upon terror faces a challenge in creating narratives that are accurate, intelligible, and socially responsible. Many of the issues journalists face also relate to wider journalism practices, especially around breaking news and conflict journalism. In the last few years, this problem has become more acute and more complicated technically, practically, and ethically with the acceleration of the news cycle and the advent of social media. News events are amplified by social media, which often host the "first draft" of terror coverage. These platforms are specifically targeted by terrorists and referenced by journalists. Yet these companies often have only a short history of dealing with the political and commercial pressures many newsrooms have lived with for decades. The fear is that reporting of terror is becoming too sensationalist and simplistic in the digitally driven rush and that the role of professional journalism has been constrained and diminished. In February 2016, when the White House sought help to counterterror groups, it invited executives from Facebook, Google, Twitter, Instagram, Snapchat, Tumblr, and Microsoft to come up with ideas to halt the use of the internet by extremists.

Details: New York: Tow Center for Digital Journalism, Columbia Journalism School, 2016. 68p.

Source: Internet Resource: Accessed May 12, 2017 at: http://cjrarchive.org/img/posts/Reporting%20on%20Terror%20in%20a%20Networked%20World%20%28Beckett%29.pdf

Year: 2016

Country: International

Keywords: Extremists

Shelf Number: 145447


Author: Hart, Rachel

Title: An Analysis of Global Homicide Patterns

Summary: Homicide rates, like all other crimes, historically suffer from underreporting biases and datasets lacking a wide enough range of countries. However, the UNODC's Global Study on Homicide have made strides in complete data collections as well as analyzing homicide patterns globally. This paper takes advantage of this dataset and information source to perform a cross-country, fixed-effects regression analysis in order to determine the kinds of factors that give the best explanatory power over global homicide rates. While this paper does not succeed in a complete representation of homicide rate determinants, the fixed effects regressions do find that variables related to inequality and instability - income inequality, organized crime, and democracy - prove better explanations than other variables.

Details: Berkeley: University of California, Berkeley, 2015. 32p.

Source: Internet Resource: Accessed May 12, 2017 at: https://www.econ.berkeley.edu/sites/default/files/HART-Honors%20Thesis.pdf

Year: 2015

Country: International

Keywords: Crime Statistics

Shelf Number: 145448


Author: Goldman, Zachary K.

Title: Terrorist Use of Virtual Currencies: Containing the Potential Threat

Summary: This paper explores the risk that virtual currencies (VCs) may become involved in the financing of terrorism at a significant scale. VCs and associated technologies hold great promise for low cost, high speed, verified transactions that can unite counterparties around the world. For this reason they could appear appealing to terrorist groups (as they are at present to cybercriminals). Currently, however, there is no more than anecdotal evidence that terrorist groups have used virtual currencies to support themselves. Terrorists in the Gaza Strip have used virtual currencies to fund operations, and Islamic State in Iraq and Syria (ISIS) members and supporters have been particularly receptive to the new technology, with recorded uses in Indonesia and the United States. Most terrorist funding now occurs through traditional methods such as the hawala system, an often informal and cash-based money transfer mechanism, and established financial channels. If VCs become sufficiently liquid and easily convertible, however, and if terrorist groups in places such as sub-Saharan Africa, Yemen, and the Horn of Africa obtain the kinds of technical infrastructure needed to support VC activity, then the threat may become more significant. The task of the law enforcement, intelligence, regulatory, and financial services communities, therefore, must be to prevent terrorist groups from using VCs at scale. The use of VCs by "lone wolf" terrorists - a much bigger potential threat because of the small scales of funding needed to execute an attack - represents the kind of problem in intelligence and digital forensics that law enforcement agencies are well equipped to handle, even if they tax existing resources. Attacking terrorists' use of virtual currency at scale is a challenging task for many stakeholders. New financial technology firms often lack the resources to comply effectively with oversight obligations, while regulators have tended to devote few resources to non-bank institutions. At the same time, different countries have adopted varying approaches to the regulation of virtual currencies, posing an enforcement challenge in a globalized field that requires a unified response. Finally, the privileging of prevention over management of illicit finance risk in the compliance world has created an incentive structure for banks that does not, ironically, push them toward innovative approaches to countering terrorist financing, including via virtual currencies. The counterterrorist financing community should adopt three guiding principles that will provide the foundation for policies aimed at countering both the new virtual currency threat and the broader illicit finance danger. First, policy leaders should prioritize the countering of terrorist financing over other kinds of financial crime. Second, the policy and regulatory posture should be oriented toward rewarding and incentivizing innovation. Third, policymakers should emphasize and create a practical basis for strengthening coordination between the public and private sectors on terrorist financing. These approaches form the foundation of an effective response to existing and emerging terrorist financing threats and will balance the burden of regulatory compliance with the policy need to support innovative new virtual currency technologies.

Details: Washington, DC: Center for a New American Security (CNAS), 2017. 56p.

Source: Internet Resource: Accessed May 12, 2017 at: http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/CNAS-Report-TerroristFinancing-Final.pdf

Year: 2017

Country: International

Keywords: Cybercrime

Shelf Number: 145453


Author: Wazir, Burhan

Title: Fear and the Ballot Box: How Political and Media Responses to Terrorism Influence Elections

Summary: Cities like New York, Madrid, London, Paris, and Mumbai have long been home to protests, riots, and wars. As recent terrorist attacks have shown, cities can also turn into theaters of violence and high-profile targets of terrorist actions. These events exert pressure on both the media - who must quickly report on the incidents while providing accuracy, context, and analysis - and politicians, who are bound to enact new laws and security measures. And now, as social media has become pervasive, citizens across the world are active participants in the media when these acts occur, not just a passively consuming audience. The purpose of this paper is to examine how actions taken by politicians and members of the media have shaped recent elections in the wake of acts of terrorism and how the growth of social media platforms and web-based news has become part of the picture. One disturbing aspect of the current fight against terrorism is the disintegration of previously defined margins separating times of war from times of peace and civilians from combatants. While civilians have previously been frequently killed in wars - the bombing of Dresden in 1945 is just one example - they are usually nominally protected. Terrorism, on the other hand, deliberately exhibits no prohibition against the intentional targeting of civilians. The evolving, real-time nature of a terrorist attack also has an undeniable effect on the media, which finds itself acting as both filter and participant in the face of such violence, especially in an era when social media platforms have become a dominant new source of information for audience and journalist alike - and indeed sometimes even the attackers themselves. In the following report, I will examine four key elections - those which took place in Israel in 1996, the United States and Spain in 2004, and India in 2009 -to explore the relationship between terrorism and how it is portrayed in the media. Three of these elections took place in the wake of unique terror incidents: the 2008 siege of Mumbai, carried out by terrorists from Lashkar-e-Taiba; the 2004 Madrid bombings, which bore the hallmarks of Al-Qaeda; and the assassination of Yitzhak Rabin in 1995, which was conducted by an Israeli extremist disillusioned with the recently signed Oslo Accords. The fourth case, the 2004 election in the United States, was fought around the theme of security - the first American presidential election held since the 9/11 terrorist attacks, in the midst of the wars in Iraq and Afghanistan. The release of a videotaped statement directed at the American public by Al-Qaeda's Osama bin Laden - known as an "October surprise" in US political shorthand - left an indelible impression on the election.

Details: New York: Tow Center for Digital Journalism, Columbia Journalism School, 2016. 48p.

Source: Internet Resource: Accessed May 12, 2017 at: http://cjrarchive.org/img/posts/Political%20and%20Media%20Responses%20to%20Terrorism%20%28Wazir%29.pdf

Year: 2016

Country: International

Keywords: Journalism

Shelf Number: 145456


Author: Lawrenson, Tim

Title: Cyberattacks -- The Significance of the Threat and the Resulting Impact on Strategic Security

Summary: Cyberspace is now so intrinsic to a modern state's economy that it is vital to protect it as part of that state's national security. However certain features of cyberspace make it an increasingly attractive attack domain. Despite some rather hysterical press headlines, this analysis shows that cybercrime is the principal threat, rather than cyberterror or cyberwarfare; albeit the growing scale of state-sponsored cybercrime is a concern because it carries an inherent risk of escalation into cyber (or conventional) warfare. A comprehensive, layered cyber-security strategy is needed to overcome some of the more problematic attractions of cyberspace as an attack domain. This strategy must improve actual system security as well as enhancing people's confidence in the resilience of the cyberenabled world.

Details: London: Royal College of Defence Studies, 2011. 34p.

Source: Internet Resource: Seaford House Paper: Accessed May 12, 2017 at: http://www.da.mod.uk/Publications/category/91/cyber-attacks-the-significance-of-the-threat-and-the-resulting-impact-on-strategic-security-15753

Year: 2011

Country: International

Keywords: Cybercrime

Shelf Number: 131353


Author: Hammond, Paul

Title: Piracy. When does a successful criminal business model become a political priority to defeat?

Summary: Piracy is not an ectopic phenomenon, rather one where states are forced to address the challenge either collectively or individually. Thus, piracy should be viewed as a microcosm of transnational crime. Its ability to function as a cogent business model relies on five interconnected factors: relative political and economic instability, illicit financial gain, lacing deterrence and security, vulnerable shipping practises and ineffective legal implementation. These factors dispel the assertion that poverty is the leading catalyst of piracy alone; instead examining why certain populations embrace piracy rather than other criminal ventures. It is in fact the coalescence of poverty with high risk factors as a consequence of operating in the maritime environment, all of which determine the allure and viability of piracy. Fundamentally, piratical symptoms are a consequence of a failing state or region, and its existence can be used as a clear indicator of a fractured civil society. The business model for piracy differs from other crimes due to the array of factors. Prevalently, piracy remains a land-based activity extended to the maritime domain, and can be targeted with correct application of resources and political perseverance. This is a classic 'wicked problem', requiring a comprehensive approach, but with a propensity to change.

Details: London: Defence Academy of the United Kingdom, 2012. 57p.

Source: Internet Resource: Seaford House Paper: Accessed May 12, 2017 at: http://www.da.mod.uk/Publications/category/90/piracy-when-does-a-successful-criminal-business-model-become-a-political-priority-to-defeat-14677

Year: 2012

Country: International

Keywords: Maritime Crime

Shelf Number: 131355


Author: Human Security Report Project (Simon Fraser University)

Title: Human Security Report 2013: The Decline in Global Violence: Evidence, Explanation, and Contestation

Summary: During the past decade, an increasing number of studies have made the case that levels of violence around the world have declined. Few have made much impact outside the research community-Steven Pinker's The Better Angels of Our Nature: Why Violence Has Declined is a major exception. Published in 2011, Better Angels' central argument-one made over some 700 densely argued pages of text, supported by 70 pages of footnotes-is that there has been an extraordinary but little-recognized, long-term worldwide reduction in all forms of violence-one that stretches back at least to 10,000 BCE. Better Angels has received high praise for its extraordinary scope, its originality, and the breadth and depth of its scholarship. It is engagingly written, powerfully argued, and its claims are supported by a mass of statistical evidence. It has also generated considerable skepticism and in some cases outright hostility. Part I of this Report discusses the central theses of Better Angels and examines the major claims of its critics. Part II presents updated statistics on armed conflicts around the world since the end of World War II, plus post-Cold War trends in assaults on civilians and conflicts that do not involve governments.

Details: Vancouver, Canada: Human Security Report Project, 2014. 127p.

Source: Internet Resource: Accessed May 13, 2017 at: https://www.files.ethz.ch/isn/178122/HSRP_Report_2013_140226_Web.pdf

Year: 2014

Country: International

Keywords: Armed Conflict

Shelf Number: 145152


Author: Hedges, Simon, ed.

Title: Monitoring Elephant Populations and Assessing Threats: A manual for researchers, managers and conservationists

Summary: This peer-reviewed manual presents a conceptually-unified and statistically rigorous approach to monitoring elephant populations. The authors, who between them have many decades of experience in statistics, wildlife monitoring and elephant conservation work in Asia and Africa, present an array of methods for estimating elephant population size and distribution and for monitoring threats. The manual contains a pair of chapters for each of the major methods covered, with the first of the pair covering the underlying theory and the second covering practical field methods and recommendations. However, the practical chapters have been written so as to be as 'standalone' as possible; in other words, it should be possible to read a practical chapter and gain a good idea of how to use a particular method in the field without necessarily reading the entire theoretical chapter. This manual represents, therefore, a practical tool that will help address current elephant population monitoring needs and which will be of use to wildlife managers, conservationists and elephant researchers.

Details: Hyderabad, India: Universities Press (India) Private Limited, 2012. 345p.

Source: Internet Resource: Accessed May 13, 2017 at: https://www.fws.gov/international/pdf/Monitoring_Elephant_Populations_and_Assessing_Threats_to_press_version.pdf

Year: 2012

Country: International

Keywords: Elephants

Shelf Number: 145463


Author: Zeiger, Sara

Title: Expanding Research on Countering Violent Extremism

Summary: This edited volume contains a selection of essays and contributions derived from the presentations made at the International Countering Violent Extremism (CVE) Research Conference 2015, which was held in Abu Dhabi, United Arab Emirates from 6-8 December 2015. The Conference was hosted by Hedayah, Edith Cowan University and New York University Institute Abu Dhabi. Other sponsors and organizers included the European Commission, Rabdan Academy, TRENDS Research & Advisory, Swansea University, CT-MORSE, People Against Violent Extremism (PaVE), the International Centre for Counter-Terrorism-the Hague (ICCT), the Global Center on Cooperative Security (GCCS), the Institute for Security Studies (ISS), and the Royal United Services Institute (RUSI). The purpose of this edited volume is to further enhance the field of CVE research through a series of short research papers. The volume covers research on four topics: 1) the design and methodology necessary for program and research related to CVE; 2) local push and pull factors in four contexts (Tunisia, Syria, Somalia and Kenya); 3) the results and impact from relevant CVE programs across three contexts (Pakistan, Afghanistan and Nigeria); and 4) research and recommendations regarding countering the narratives of Daesh, Al Qaeda and Al-Shabaab. The edited volume then concludes with a number of program and policy recommendations for a variety of actors that can be applicable for CVE research.

Details: Abu Dhabi, United Arab Emirates, Hedayah Center; and Joondalup, Western Australia, Edith Cowan University, 2016. 174p.

Source: Internet Resource: Accessed May 13, 2017 at: http://www.hedayahcenter.org/Admin/Content/File-410201685227.pdf

Year: 2016

Country: International

Keywords: Counter-Extremism

Shelf Number: 145468


Author: Aziani, Alberto

Title: Shrinking businesses and expanding graveyards: how fluctuations in the value of cocaine markets influence the recourse to lethal violence

Summary: Many scholars have investigated the escalation of violence associated with drug trafficking. Despite the plethora of literature, limited attention has been paid to the consequences of fluctuations in the value of markets. This study addresses this lacuna in extant research by proposing an original estimate of the gross value added of cocaine markets in 151 countries between the period 1998-2013, taking into consideration both national and international dimensions of cocaine trafficking through recourse to a flow/network approach. In conjunction with this, the fluctuation of the gross value added of the cocaine market is examined in terms of an etiological factor in the upsurge of interpersonal lethal violence. The analysis demonstrates how expansions and contractions of the gross value added in cocaine markets are significant determinants of the level of violence within the respective countries that constitute the global cocaine network. Finally, through mobilising innovative methods for estimating drug law enforcement actions, the study problematizes extant methods for disrupting drug trafficking on the basis that they may, paradoxically, engender cycles of violence.

Details: Milan: UNIVERSITA CATTOLICA DEL SACRO CUORE, 2016. 287p.

Source: Internet Resource: Dissertation: Accessed May 13, 2017 at: https://tesionline.unicatt.it/bitstream/10280/17473/1/Alberto%20Aziani%20_%20PhD%20Thesis.pdf

Year: 2016

Country: International

Keywords: Cocaine

Shelf Number: 145472


Author: Fenstermacher, Laurie

Title: Countering Violent Extremism: Scientific Methods and Strategies

Summary: It has now been five years since the events of the "Arab Spring," and initial optimism about lasting democratic reforms and an era of lessened tensions has been replaced by fear and skepticism. Many countries are now experiencing greater instability and violence than before. The vestiges of Al Qaeda in Iraq have morphed into the Islamic State of Iraq and al-Sham (or the Levant)-ISIS or ISIL, sweeping through Iraq and Syria and leaving behind much death and destruction. The growth of violent extremism initiated by Al Qaeda and its radical interpretation of the Islamic ideology is continuing. ISIL's deft manipulation of social media to compel and mobilize individuals to act out violently is both remarkable and frightening. Research reveals important factors to consider as well as questions to ask when developing policies and strategies to counter violent extremism (CVE): 1. Are the CVE goals achievable? 2. Do we have the right balance between security and development/stabilization? Do we have the right balance between strategies to take violent extremists off the streets and those aimed at preventing extremists from becoming violent in the first place? 3. Do we understand why some strategies have failed to deliver significant reductions in extremist violence? Do we understand the potential unintended consequences of strategies (e.g., use of targeted killings, treatment in prison, etc.)? 4. Are we failing in execution of strategies-by not partnering enough or following when we should lead/leading when we should follow? Have we implemented strategies through smart partnerships-"whole of government" partnerships, partnerships with other countries, partnerships with the private sector, partnering with organizations and communities, etc.? 5. Are we failing to communicate effectively? Do we really seek to understand those with whom we are communicating? Should others be doing the communicating at times? Are our actions consistent with our words? Like most utopian movements, ISIL is riding the winds of change. It will be increasingly difficult for them to recruit new members as the focus shifts from expansion/change to maintenance/status quo. Consequently, the best solution to countering ISIL may be to take an approach that will minimize the potential for unintended outcomes. A "whack a mole" strategy may result in further metastasis of violent extremism. It is imperative to avoid unwittingly serving as the "common enemy" and thus igniting a much larger, sectarian conflict. Queen Rania recently said, "What the extremists want is to divide our world along fault lines of religion and culture...this is about all of us coming together to defend our way of life." Likewise, keeping the conversation at the "binary,"

Details: Washington, DC: U.S. Air Force, 2015. 202p.

Source: Internet Resource: Accessed May 15, 2017 at: https://info.publicintelligence.net/ARL-CounteringViolentExtremism.pdf

Year: 2015

Country: International

Keywords: al Qaeda

Shelf Number: 145473


Author: Willmer, Stephen

Title: Battling the Bogeyman Lessons from History on Fighting Piracy

Summary: This paper assesses how the Romans, Spanish and British conducted sustained campaigns against what they saw as piracy and with what success. It then reviews these in the context of current anti-piracy policies and operations in the Horn of Africa to identify any relevant lessons.

Details: London: Royal College of Defence Studies, 2009. 44p.

Source: Internet Resource: Seaford House Paper: Accessed May 15, 2017 at: http://www.da.mod.uk/Publications/category/93/battling-the-bogeyman-lessons-from-history-on-fighting-piracy-18719

Year: 2009

Country: International

Keywords: Maritime Crime

Shelf Number: 145481


Author: International Centre for Missing & Exploited Chidlren

Title: Child Pornography: Model Legislation & Global Review. 7th edition

Summary: Since this report was first released by the International Centre for Missing & Exploited Children (ICMEC) in April 2006, ICMEC has continued to update its research into the child pornography legislation currently in place in the nations of the world to gain a better understanding of existing legislation and to gauge where the issue stands on national political agendas.1 In particular, we are looking to see if national legislation: (1) exists with specific regard to child pornography; (2) provides a definition of child pornography; (3) criminalizes computer‐facilitated offenses; (4) criminalizes the knowing possession of child pornography, regardless of the intent to distribute; and (5) requires Internet Service Providers (ISPs) to report suspected child pornography to law enforcement or to some other mandated agency. In the summer of 2009, ICMEC conducted a thorough update of our research on existing child pornography legislation, expanding our review beyond the 187 Interpol member countries to include 196 countries. Our work included independent research as well as direct contact with Embassies in Washington, D.C. to ensure the accuracy of the report. A new review of the 196 countries began in the Spring of 2011. The process remained much the same; reviewing the existing legislation of each country in search of laws specifically focused on child pornography offenses and verifying the information through the Embassies in Washington, D.C., U.N. Permanent Missions in New York, and in‐country law enforcement contacts. However, the 7th edition report also contains several new sections including expanded information on online grooming, information on the new EU Directive on combating the sexual abuse and sexual exploitation of children and child pornography, a review of data retention and preservation policies, and a discussion of implementation. Results The 1st edition, published in 2006, returned shocking results: -- only 27 had legislation sufficient to combat child pornography offenses (5 countries met all of the criteria set forth above and 22 countries met all but the last criteria, pertaining to ISP reporting); and -- 95 Countries had no legislation at all that specifically addresses child pornography. Of the remaining 62 Countries that did have legislation specifically addressing child pornography:-- 54 Countries did not define child pornography in national legislation;-- 27 Countries did not provide for computer‐facilitated offenses; and-- 41 Countries did not criminalize possession of child pornography, regardless of the intent to distribute. The 6th edition, published in late 2010, revealed progress. Of the 196 countries reviewed:-- 45 Countries had legislation sufficient to combat child pornography offenses (8 countries met all of the criteria set forth above and 37 countries met all but the last criteria, pertaining to ISP reporting); and-- 89 Countries still had no legislation at all that specifically addresses child pornography. Of the remaining 62 countries that did have legislation specifically addressing child pornography:-- 52 did not define child pornography in national legislation;-- 18 did not provide for computer‐facilitated offenses; and-- 33 did not criminalize the knowing possession of child pornography, regardless of the intent to distribute. Forward movement continues to be visible in this edition, though much remains to be done. Our updated research shows that of the 196 countries reviewed:-- 69 Countries have legislation sufficient to combat child pornography offenses (11 countries met all of the criteria set forth above and 58 countries meet all but the last criteria, pertaining to ISP reporting); and-- 53 Countries still have no legislation at all that specifically addresses child pornography. Of the remaining 74 countries that do have legislation specifically addressing child pornography:-- 60 do not define child pornography in national legislation;-- 21 do not provide for computer‐facilitated offenses; and-- 47 do not criminalize the knowing possession of child pornography, regardless of the intent to distribute.

Details: Alexandria, VA: The Centre, 2012. 52p.

Source: Internet Resource: Accessed May 16, 2017 at: http://www.icmec.org/wp-content/uploads/2015/10/7th-Edition-EN.pdf

Year: 2012

Country: International

Keywords: Child Pornography

Shelf Number: 131374


Author: Fair Trials International

Title: The Disappearing Trial: Towards a rights-based approach to trial waiver systems

Summary: The trial is the archetype of criminal justice. It has captured the public imagination. Just think of the dominance of courtroom drama in film, TV and literature: the intense personal drama of the trial for the defendant, whose life hangs in the balance. The public drama of the trial: after the shadowlands of police custody, the evidence and the actions of police and prosecutors are exposed to the bright light of scrutiny. The public sees the rule of law in action, witnesses real time the search for truth and justice. But the trial is starting to disappear. In many parts of the world, trials are being replaced by legal regimes that encourage suspects to admit guilt and waive their right to a full trial. Of the 90 countries studied by Fair Trials and Freshfields, 66 now have these kinds of formal "trial waiver" systems in place. In 1990, the number was just 19. Once introduced, trial waivers can quickly dominate. In Georgia, for example, 12.7% of cases were resolved through its plea bargaining system in 2005, increasing massively to 87.8% of cases by 2012.

Details: London: Fair Trials, 2017. 88p.

Source: Internet Resource: Accessed May 17, 2017 at: https://www.fairtrials.org/wp-content/uploads/2017/04/Report-The-Disappearing-Trial.pdf

Year: 2017

Country: International

Keywords: Jury Trials

Shelf Number: 145503


Author: Amnesty International

Title: Human Rights Defenders Under Threat: A Shrinking Space for Civil Society

Summary: While the world's powerful are increasingly using toxic narratives of fear and division casting collective blame for social ills onto minority groups, those who dare to make a stand against injustice and defend human rights are under attack. This report is part of Amnesty International's Global Campaign: Brave, launched to combat measures by the powerful to threaten and attack HRDs and shrink the space in which civil society operates. It provides an overview of the dangers HRDs face and calls on those in power to take immediate measures to ensure that human rights defenders are recognized, protected and equipped to conduct their work without fear of attack in a safe environment.

Details: London: AI, 2017. 46p.

Source: Internet Resource: accessed May 17, 2017 at: https://www.amnesty.org/en/documents/act30/6011/2017/en/#

Year: 2017

Country: International

Keywords: Human Rights Abuses

Shelf Number: 145559


Author: Carroll, Aengus

Title: State-Sponsored Homophobia 2017: A World Survey of Sexual Orientation Laws: Criminalisation, Protection and Recognition

Summary: On reviewing this 12th edition of State Sponsored Homophobia, the ancient Arabic phrase, later to be adopted by everyone, comes to mind: 'knowledge itself is power'. This report offers a compilation of useful, credible data to human rights defenders, civil society organisations, governments, UN and regional agencies, media, and allies of our communities in the fight for a more just and inclusive society. The data is compiled with the express purpose of supplying precise detail and current sources. As such, a single tool may be used for different purposes: this information can be useful to support advocacy and change processes in societies where sexual orientation intersects with other issues; institutions can take stock of human rights violations faced by LGBQ people worldwide and accelerate efforts to end these atrocities; media and allies can find precise references to the actual content of laws, and then report and raise awareness of where this information leads. Since the launch of our first edition in 2006, State Sponsored Homophobia has become increasingly richer in its content and more detailed. It it a unique document: it bridges the world of technical black-letter law provisions, tracks progress in global and regional human rights settings, and offers insight (and abundant sources) into the social conditions that LGBQ people lived in and experienced over the past year. In this edition, the theme of Protection of our Communities underpins the short essays and entries on countries. There is, therefore, significant attention paid to the concept of persecution and the necessity to fee, as well as to barriers to the founding, establishment and/or registration of sexual orientation-related NGOs, along with a new category about countries which have banned so-called 'conversion therapy'. As we witness threats to civil society spaces in countries traditionally known for their openness, and new pieces of legislation being adopted in more repressive societies, this is a much needed discussion. In times when basic democratic principles and even notions of respect for human rights, solidarity, and the rule of law are under threat, we witness everyday how the gains made by the broader human rights movement are never set in stone, and must be fought for and protected continuously. The number of laws that safeguard our rights to express a different sexual-orientation (decriminalisation), protect us from violence and hatred, or that recognise us as human beings who need relationship, have expanded greatly over the years. This is why the value of having non-anecdotal information on how the situation facing our communities is evolving across the world can't be overstated. Comparative overviews like the one of State Sponsored Homophobia offer human rights defenders valuable learning on other States: how rights are denied or upheld, what scapegoating looks like, and how our issues become ideological battlefields in political spaces.

Details: Geneva: International Lesbian, Gay, Bisexual, Trans and Intersex Association, 2017. 196p.

Source: Internet Resource: http://ilga.org/what-we-do/state-sponsored-homophobia-report/

Year: 2017

Country: International

Keywords: Hate Crimes

Shelf Number: 145560


Author: Khalema, N. Ernest

Title: A review of crime risk factors and community-based prevention strategies for Somali-Canadians in Edmonton, Alberta

Summary: This report offers a Critical Discourse Analysis (CDA) of the literature on risk and protective factors associated with crime and migration in Canada, the United States of America, Australia, and several of the European Union countries. The report reviews the discourse linking crime and ethno-cultural groups in the above countries; policy and practice reactions by governments, social institutions (i.e. media), and service providers; and proposed community-based crime prevention strategies. Upon reviewing over two hundred articles from refereed and non-refereed publications, the research embarked on an enormous process of thematically analyzing cross-national texts linking crime and migration. The arduous process tackled issues of language, definition of terms, and country-specific contextual issues as diverse discourses emerged. As a result, we identified four major overarching themes: The Political Economy of Migration, Migrants, and Criminality; Country Specific Research on Risk Factors and Protective Factors of Crime, Discourses on Criminality, "Race" and (In)security, and Media Public Discourse on "Migrant" Criminality. The report concludes with a discussion of recommendations reactions, and implications to Somali-Canadian communities in Edmonton.

Details: Calgary, Alberta, Canada: Centre for Criminology and Justice Research Department of Justice Studies - Mount Royal University, 2012. 146p.

Source: Internet Resource: Accessed May 17, 2017 at: http://crcconsulting.ca/wp-content/uploads/2013/07/A-review-of-crime-risk-factors-and-community-based-prevention-strategies-for-somali-canadians-in-edmonton-alberta.pdf

Year: 2012

Country: International

Keywords: Community-Based Crime Prevention

Shelf Number: 131211


Author: International Labour Office (ILO), Special Action Programme to Combat Forced Labour

Title: Caught at Sea: Forced Labour and Trafficking in Fisheries

Summary: This report examines recent literature and consolidates existing knowledge about forced labour and human trafficking in the fisheries, with the focus on fishing vessels engaged in commercial marine fisheries. It considers institutional and legal frameworks as well as multi-stakeholder initiatives that have the potential to affect the safety, living and working conditions of fishers. It also echoes the discussions of a consultation on forced labour and human trafficking in the fishing sector, held by the ILO in September 2012 and which identified some key priorities for a global action programme.

Details: Geneva: ILO, 2013. 100p.

Source: Internet Resource: Accessed May 17, 2017 at: http://www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/publication/wcms_214472.pdf

Year: 2013

Country: International

Keywords: Fishing Industry

Shelf Number: 131252


Author: Levi, Michael

Title: Drug Law Enforcement and Financial Investigation Strategies

Summary: Since the 1980s, there has been a major push in rhetoric and institution-building, emphasizing the centrality of attacking the financial lifeblood of drug trafficking networks and organised economic crimes. Much progress has been made in legislation and the creation of financial intelligence units. However, there are volumes of commentary and legal analysis, but almost nowhere in the world is there any systematic analysis of law enforcement or criminal justice inputs or outputs, let alone of outcomes in terms of reduced crimes of any kind or reduced harms arising from the 'organised' nature of crime. Much depends on how plausible it is that the sources of funds can be represented as being licit when saving or investing: but a global, well-advertised set of financial intermediaries exist upon whom to experiment, and expectations of being reported following failed attempts may be quite low. Judging from the continued involvement of major banks in negligently or actively facilitating a variety of suspected illicit activities, and the relative impunity of institutions that are 'too big to be prosecuted', normal risk perceptions of relevant parts of financial institutions are not nearly high enough to deter all serious noncompliance to AML regulation, though without increasing perceived and/or actual detection risks and reducing elapsed time to action, raising sanctions alone may not work. This report makes no claim to be offering a certain route to success, but is offering an overview of some better and some false steps that have been undertaken in the field of drug law enforcement and financial investigation strategies.

Details: London: International Drug Policy Consortium, 2013. 20p.

Source: Internet Resource: Modernising Drug Law Enforcement Report 5: Accessed May 18, 2017 at: https://www.tni.org/files/MDLE-5-drug-law-enforcement-financial-investigation-strategies_0.pdf

Year: 2013

Country: International

Keywords: Drug Enforcement

Shelf Number: 131377


Author: Comolli, Virginia

Title: Drug Markets, Security and Foreign Aid

Summary: Through the delivery of aid, some countries have tried to export their preferred drug control policies and have leveraged the recipients’ need for aid to influence their policy approach. The approaches adopted in many aid agreements seem to be insulated from the advances in the global debate about alternative drug policies and harm reduction and remains heavily focused on law enforcement. Counter-narcotics aid can become a tool to divert attention from ineffective domestic strategies, and to refocus international attention towards the challenges faced by drug producer and transit countries. Even if aid projects benefitting drug law enforcement were continuously effective, it would not prevent a shift or adaptation of the drug market, and it would not decrease demand in consumer countries.

Details: London: International Drug Policy Consortium, 2013. 20p.

Source: Internet Resource: Modernising Drug Law Enforcement Report 6: Accessed May 19, 2017 at: https://dl.dropboxusercontent.com/u/64663568/library/MDLE-6-Drug-markets-security-and-foreign-aid.pdf

Year: 2013

Country: International

Keywords: Drug Enforcement

Shelf Number: 131375


Author: Waggoner, Kimberlee G.

Title: What Can State Talk Tell Us About Punitiveness? A Comparison of Responses to Political Mass Shootings in The United States and Norway

Summary: Highlighting the culturally contingent nature of state reactions to crime, the present work focuses on state talk issued by the U.S. and Norwegian governments in the aftermath of politically motivated mass shootings. The research is guided by the question: how does state talk-conditioned by economic, political, and cultural forces-facilitate or constrain punitive responses to political mass shootings? Here, the focus is on the January 8th 2011 shooting of U.S. representative Gabrielle Giffords and her constituents and the July 22nd 2011 bombing of a government building and shooting of a youth political camp in Norway. These two cases illustrate how state talk can either help to escalate or moderate responses to horrific events. Situating state discourse in the context of American exceptionalism in the case of the United States and Scandinavian Exceptionalism in the case of Norway, the present study argues that state talk reflects and reinforces both the United States notably precarious and competitive social order and Norway's comparatively less volatile and more cooperative social order. Analysis of both more and less incendiary government talk and the cultural factors that uphold the tone and content of such state talk is needed to better understand the role of government rhetoric in shaping responses to tragedy. The present work, relying on qualitative content analysis, examines government press releases, speech transcripts, and op-eds posted to government websites. Here, themes thought to constrain or facilitate punitive responses, derived from criminological literature, were applied to the state talk data. This approach reveals the divergent ways in which states talk about tragedy across cultures. I then link divergent state talk findings to politics and social life after January 8th and July 22nd to paint a picture of the dissimilar effects of state talk. In conclusion, I discuss policy considerations in light of these findings and future avenues of research.

Details: Norfolk, VA: Old Dominion University, 2016. 169p.

Source: Internet Resource: Dissertation: Accessed May 19, 2017 at: http://digitalcommons.odu.edu/cgi/viewcontent.cgi?article=1009&context=sociology_criminaljustice_etds

Year: 2016

Country: International

Keywords: Gun-Related Violence

Shelf Number: 145569


Author: Hughes, Christine

Title: Legislative Wins, Broken Promises: Gaps in implementation of laws on violence against women and girls

Summary: his multi-country research report examines the problem of implementation gaps - government failures to fulfill their legislative obligations to address and prevent violence against women and girls. It presents a comparative analysis of shortfalls between government commitments as laid out in laws, and the realities for survivors of violence as they try to access services and justice. Drawing also on positive examples, lessons are shared about what can be done to improve the implementation of laws, and how civil society organizations can more effectively hold governments to account, so that laws can have a greater impact on ending violence against women and girls.

Details: Oxford, UK: Oxfam, 2017. 60p.

Source: Internet Resource: Accessed May 19, 2017 at: https://www.oxfam.org/sites/www.oxfam.org/files/file_attachments/rr-legislative-wins-broken-promises-vawg-080317-en.pdf

Year: 2017

Country: International

Keywords: Gender-Based Violence

Shelf Number: 145638


Author: Meleagrou-Hitchens, Alexander

Title: Research Perspectives on Online Radicalisation: A Literature Review, 2006-2016

Summary: This literature review seeks to recalibrate our understanding of online radicalisation, hiw it is conceptualised within the literature and the extent to which the policy debate has advanced in response to technological and legal developments.

Details: Dublin: VOX-Pol Network of Excellence, 2017. 98p.

Source: Internet Resource: Accessed May 19, 2017 at: http://icsr.info/wp-content/uploads/2017/05/ResearchPerspectivesonOnlineRadicalisation.pdf

Year: 2017

Country: International

Keywords: Online Radicalization

Shelf Number: 145639


Author: Boyd, Katharine A.

Title: Ecology of Terrorism: Cross-National Comparison of Terrorist Attacks

Summary: The term terrorism is used to describe a large range of behaviors conducted by a wide variety of groups. Terrorist groups differ in ideology, size, financial support, group longevity, and the number of alliances with other terrorist groups. Relatedly, terrorist groups conduct different number of attacks with varying intents to cause fatalities using diverse forms of violence. This study uses ecological theory to contextualize terrorist violence as a product of terrorist group traits in relation to the environmental context. It is hypothesized that terrorist violence is associated with group traits in relation to the varying political, social, and religious contexts of the countries in which groups operate. Using longitudinal multilevel modeling this study analyzes how terrorist group traits, country characteristics, and exposure to counterterrorism tactics, influence terrorist violence (e.g. number of attacks, fatalities, targets, mode of attack, location of attack) over time. This study uses counterterrorism and group-level data from the Big Allied and Dangerous (BAAD1, 2) datasets, attack data from the Global Terrorism Database (GTD), country data from multiple public datasets, and counterterrorism and terrorist group data originally collected from open-sources. The results show that each form of violence has a unique set of predictor variables and the results of moderation hypotheses show that group ideologies are associated with different trajectories over time, that group traits condition the effect of counterterrorism, and country characteristics moderation how different terrorist groups conduct violence. This work is among the first to evaluate moderation hypotheses and is one of few studies on terrorism to use advanced statistical methods to evaluate these relationship over time and cross-nationally. The study contributes to the literature on terrorism with relevant policy implications, and contributing to the development of ecological theory and its application to political and religiously motivated violence.

Details: New York: City University of New York, 2014. 266p.

Source: Internet Resource: Dissertation: Accessed May 20, 2017 at: http://academicworks.cuny.edu/cgi/viewcontent.cgi?article=1174&context=gc_etds

Year: 2014

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145660


Author: Ahn, R.

Title: Sex Trafficking of Women and Girls in Eight Metropolitan Areas around the World: Case Studies Viewed through a Public Health Lens.

Summary: This report presents the principal findings from eight case studies of sex trafficking of women and girls in metropolitan areas of five countries.  New York City and Los Angeles, United States --  London, England --  Manila, Philippines --  Mumbai and Kolkata, India --  Rio de Janeiro and Salvador, Brazil Our research team conducted these case studies between October 2008 and October 2009. Collectively, these case studies were designed to: (a) examine the issue of sex trafficking through an integrative, public-health lens; (b) identify current, local health-system responses to sex trafficking; and (c) determine the potential role of local health systems in addressing sex trafficking, alone and alongside other anti-trafficking stakeholders, in affected communities.

Details: Boston, MA: Massachusetts General Hospital, 2010. 212p.

Source: Internet Resource: Accessed May 22, 2017 at: http://www.massgeneral.org/emergencymedicineglobalhealth/assets/IES.pdf

Year: 2010

Country: International

Keywords: Human Trafficking

Shelf Number: 145665


Author: Feldstein, Michelle

Title: Into the Fold: Evaluating Different Countries' Programs to De-Radicalize Islamist Extremists and Islamist Terrorists

Summary: Countries all over the world, including Saudi Arabia, Yemen, Bangladesh, Egypt, Malaysia, Singapore, Denmark, the Netherlands, Norway, and others currently run or have run programs intended to de-radicalize Islamist extremists or Islamist terrorists. Many countries, including Yemen, Singapore, and Denmark, initiated these programs following the devastating terrorist attacks of September 11th, 2001. Although all de-radicalization programs share the common goal of re-integrating former Islamist extremists or Islamist terrorists back into society, each country's efforts have emphasized different approaches more than others, and have had varying degrees of success. This paper first explores whether the presence or absence of certain factors that may be conducive to success, such as political stability, have contributed to less Islamist terrorist attacks in each country. The second chapter, using the same characteristics that may be conducive to success, examines how a state's level of repression affects that country's level of success in de-radicalizing Islamist extremists and Islamist terrorists. Thirdly, this paper evaluates how religious characteristics, including a state's official religion, affect whether states focus their de-radicalization efforts more on religious reeducation or on social re-integration. The first chapter reveals that as the success ranking of each country's de-radicalization program increases, so too does the number of Islamist terrorist attacks, revealing a strong relationship. For the second chapter, as a country's level of state repression increases, the success ranking of de-radicalization programs increase, although there is not a strong relationship. Lastly, the third chapter reveals that the greater the percentage of Muslims per total population a country has, the more a country's de-radicalization efforts focus on religious re-education; countries with official religions are less likely to focus their de-radicalization efforts on religious re-education; and countries with greater restrictions on adherents of the majority religion who do not align with the state's religious interpretation are less likely to focus on religious re-education. However, all 3 relationships are not strong. Although de-radicalization of Islamist extremists and Islamist terrorists-as a practice and concept-is still in its infancy, this paper can guide policymakers considering such programs to determine a mix of approaches appropriate to their own country context.

Details: Baltimore, MD: Johns Hopkins University, 2015. 124p.

Source: Internet Resource: Thesis: Accessed May 23, 2017 at: https://jscholarship.library.jhu.edu/bitstream/handle/1774.2/38083/FELDSTEIN-THESIS-2015.pdf

Year: 2014

Country: International

Keywords: De-radicalization

Shelf Number: 145667


Author: Denoeux, Guilain

Title: Guide to the Drivers of Violent Extremism

Summary: This publication explores the drivers of violent extremism (VE), with special reference to the Muslim world in the past three decades. This publication's primary objectives are to summarize what we know, and what we do not know, about the drivers of violent Islamist extremism (VIE) ; to pinpoint recurrent drivers across a wide variety of countries, so as to clue the analyst confronted with a particular situation to some of the potentially relevant dynamics and factors; and to identify some of the most common misconceptions or pitfalls in the study of VIE, so as to avoid potentially counterproductive approaches when designing development assistance programs with a counter-extremism component. This Guide does not discuss programmatic implications -- which, for reasons of space, will be developed in a separate, stand-alone document. The Guide developed out of a comprehensive literature review. While it did not involve significant new data collection, it endeavored to take into account existing data in books, articles, surveys and policy reports. Much of what is known about VIE is based on the experience of countries in the Middle East and North Africa (MENA). South Asia also represents a significant source of relevant information. By contrast, much less is known about VIE in sub-Saharan Africa -- which, in comparison to the MENA and South Asia regions, has been relatively sheltered from it. Inevitably, therefore, this document reflects the imbalance that exists in sources and expertise. In addition, some countries are able to produce dependable information about the identity of violent extremists active in their midst, while others are not. Consequently, it is difficult to infer from existing data reliable generalizations (across countries and regions) about the profile of the populations drawn to VIE. For instance, Israeli, Palestinian and Western sources contain a wealth of information about the socioeconomic, professional and educational background of suicide bombers active in the Israeli-Palestinian theater. That information has tended to suggest that the suicide bombers in question have not been poor individuals with little education. However, researchers are hard pressed to find a similarly rich data pool about the background of suicide bombers in Afghanistan and Pakistan.

Details: Washington, DC: USAID, 2009. 108p.

Source: Internet Resource: Accessed May 23, 2017 at: http://pdf.usaid.gov/pdf_docs/Pnadt978.pdf

Year: 2009

Country: International

Keywords: Extremist Groups

Shelf Number: 145668


Author: El-Said, Hamed

Title: De-Radicalising Islamists: Programmes and their Impact on Muslim Majority States

Summary: Violent extremism remains a major threat to global security. The global nature of the phenomenon is reflected in its un-selective character. Capitals from Oslo to Cairo, Riyadh to Kuala Lumpur, and London to Washington have had to deal with the consequences. No region, or even country, can claim to be entirely immune from the problem. Recent developments, such al-Qaeda's attempt (via Omar Farouk Abdulmuttalab) to blow up an airliner bound for Detroit in December 2009, and bombs sent from Yemen to Chicago in October 2010, suggest that violent extremist groups and individuals remain more determined, sophisticated, unpredictable, and hard to identify. Counter-terrorism is therefore likely to remain an important policy preoccupation and gain further significance in international relations in the short to medium terms. The continuation of conflicts in Afghanistan and Iraq, the deterioration of the situation in Yemen and Somalia, and the volatile nature of the Middle-East peace process all contribute to the persistence of extremism. But so too do other, less obvious factors, and the understanding of this has generated considerable interest in new approaches initiated by several Muslim-majority states to counter the phenomenon of violent extremism. This report is part of a larger project funded by the Norwegian Ministry of Foreign Affairs and will be published by Routledge in early 2012. The Report examines the approaches of eight Muslim-majority states known to have developed 'soft' strategies to counter this problem, and demonstrates how all of these countries have developed varied approaches, strategies and processes. For example, some focus more on countering and preventing further radicalisation in their societies (what we refer to in this report as 'counter-radicalisation strategy'). Countries that fall in this category include Morocco and Bangladesh. Others, such as Yemen and Egypt, focus more on rehabilitating and counselling those who have already become radicalised (De-radicalisation). Some have developed well-structured official programmes (Saudi Arabia), while others rely more on individual initiatives (Jordan). Finally, some have experienced collective de-radicalisation, whereby a group of former radicals decide to take a collective decision to denounce violence, admit their mistake and rejoin society. Such collective de-radicalisation can, and has taken place inside prisons (e.g. Islamic Jihad and Jihad Organisation in Egypt in 1997 and 2007, respectively) and outside prisons (e.g. the Algerian Islamic Salvation Army in 1997). By studying the counter-radicalisation and de-radicalisation policies implemented in our eight Muslim-majority states, the report identifies certain key factors which can be considered as conducive to successful de-radicalisation programmes. These include the following: the role of popular support combined with a committed, charismatic, political leadership; the role of families; the role of civil society; and the role and quality of the clerics and scholars involved. The political and developmental strength of the state is also important, as is the relationship between national counter-radicalisation and de-radicalisation efforts on the one hand, and external factors and interventions on the other. Finally, no single formula can deal with all cases of violent extremism, even within a single region. Counter-radicalisation and de-radicalisation efforts must take account of the culture, mores, traditions, history, and rules and regulations of each country

Details: London: International Centre for the Study of Radicalisation and Political Violence, 2012. 52p.

Source: Internet Resource: Accessed May 23, 2017 at: http://icsr.info/wp-content/uploads/2012/10/1328200569ElSaidDeradicalisation1.pdf

Year: 2012

Country: International

Keywords: De-radicalization

Shelf Number: 145744


Author: Ginkel, Bibi T. van

Title: Engaging Civil Society in Countering Violent Extremism: Experiences with the UN Global Counter-Terrorism Strategy

Summary: In this ICCT Research Paper Dr. Bibi van Ginkel takes an in depth look at how multi‐lateral institutions, engage with civil society to counter violent extremism. Dr.van Ginkel argues that civil society can play a crucial role in preventing and countering violent extremism in numerous ways - by working on development programs, through their work in conflict transformation, in providing a platform to raise political grievances and to facilitate dialogue, or through their work in empowering victims and survivors of terrorism. The paper finds that over the last decade there has been a more intensive coordination of activities between the UN and other multi‐lateral organisations and civil society but the question remains whether the implementation as well as the drafting of these policies will live up to their potential effectiveness. This paper gauges how effective these measures have been and what more there is to do. The final section concludes with a series of policy recommendations

Details: The Hague: International Centre for Counter-Terrorism, 2012. 14p.

Source: Internet Resource: ICCT Research Paper: Accessed May 24, 2017 at: https://www.icct.nl/download/file/ICCT-Van-Ginkel-Civil-Society-in-CVE-August-2012.pdf

Year: 2012

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145749


Author: Vigurs, Carol

Title: The Impact of Domestic Violence perpetrator Programmes on Victim and Criminal Justice Outcomes: A Systematic Review of Reviews of Research Evidence

Summary: Systematic reviews draw together all of the available evidence in a particular area. Where a number of systematic reviews already exist relating to a similar topic, it is possible to synthesis the findings contained in those systematic reviews in what is known as a 'review of reviews'. A systematic map of criminal justice interventions for domestic violence identified that a number of systematic reviews have already been published in relation to programmes aimed at perpetrators of domestic violence. It wasn't necessary therefore, to carry out a new systematic review in this area so instead, the evidence contained within these existing systematic reviews was examined and synthesised in a review of reviews. The review of reviews found that the evidence relating to domestic violence perpetrator programmes was inconclusive in terms of whether they were effective or not. There was evidence however, to suggest that programmes that paid attention to a person's readiness and motivation to change had some positive effects. In order to look more closely at what impact motivation enhancing techniques really had on domestic violence perpetrators, an in-depth review of primary studies on motivational enhancement was carried out. The results showed that motivation enhancing interventions, used as adjuncts to perpetrator programmes helped to reduce domestic violence recidivism.

Details: London: UK College of Policing, 2016. 87p.

Source: Internet Resource: WHAT WORKS: CRIME REDUCTION SYSTEMATIC REVIEW SERIESL Accessed May 24, 2017 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Pages/DA_perp_prog.aspx

Year: 145754

Country: International

Keywords: Abusive Men

Shelf Number: 2016


Author: Vigurs, Carol

Title: A Systematic Review of Motivational Approaches as a Pre-Treatment Intervention for Domestic Violence Perpetrator Programmes

Summary: What is the focus of the intervention? Motivational Interviewing (MI) or Motivational Enhancement Therapy (MET) is a non-judgemental, empathic and optimistic counselling style that has been used with offenders who have been ordered by a court to attend a standard domestic violence perpetrator programme. MI/MET is designed to overcome resistance, hostility or denial by the offender at the time of referral to these programmes, and can be used when the offender is in custody or the community, while on bail or on probation. MI/MET is undertaken by the offender prior to another standard perpetrator intervention such as cognitive behavioural therapy. Underpinning the MI/MET approach is a belief that the journey to permanent change in behaviour goes through several stages: early stages of pre-contemplation and contemplation; preparation for change; readiness to take action; and, finally, a maintenance stage. MI/MET is designed to help domestic abuse offenders develop their own personal desire for change through use of a therapeutic style that is non-judgemental, empathic and optimistic. This narrative is based on a systematic review of 7 studies using victim reported and official measures of reoffending, such as rearrests, as the outcome. EFFECT How effective is it? Overall, the evidence suggests that Motivational Interviewing/Motivational Enhancement Therapy has reduced rates of victim-reported reoffending. The effect size within the review, from 3 studies, showed that lower levels of reoffending were reported by victims of offenders who received MI/MET and attended a standard domestic violence perpetrator programme than by victims where the offender did not receive MI/MET. The authors stated that while the effect size was small, it did show a significant reduction in victim reported reoffending. The two studies that reported official measures of reoffending, such as rearrests and breaches of conditions, showed that MI/MET had no significant effect on these measures. However, the control groups may not have been comparable as they measured different kinds of official reports, including those not related specifically to domestic violence.

Details: London: College of Policing, 2015. 101p.

Source: Internet Resource: WHAT WORKS: CRIME REDUCTION SYSTEMATIC REVIEW SERIES, no. 4: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Documents/Motivational_intervewing.pdf

Year: 2015

Country: International

Keywords: Abusive Men

Shelf Number: 145759


Author: Medina, Leandro

Title: Shadow Economies around the World: New Results for 158 Countries over 1991-2015

Summary: Using the MIMIC method, this paper is a first attempt to estimate the size of the shadow economy of 158 countries over the period 1991 up to 2015. In addition to performing a variety of robustness tests, this paper explicitly addresses endogeneity concerns to the use of GDP as cause and indicator, by using the light intensity approach as an indicator variable as proxy for the size of the economy. Results suggest that the average size of the shadow economy of these 158 countries over 1991-2015 is 32.5% of official GDP, which was 34.82% in 1991 and decreased to 30.66% in 2015.

Details: Munich: CESifo (Center for Economic Studies and Ifo Institute for Economic Research), 2017. 30p.

Source: Internet Resource: CESifo Working Paper Series No. 6430: Accessed May 24, 2017 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2965972

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 145762


Author: Verite

Title: Strengthening Protections Against Trafficking in Persons in Federal and Corporate Supply Chains: Research on Risk in 43 Commodities Worldwide

Summary: More than twenty million men, women and children around the world are currently believed to be victims of human trafficking, a global criminal industry estimated to be worth $150.2 billion annually. As defined in the US Department of State's 2014 Trafficking in Persons Report (TIP Report), the terms "trafficking in persons" and "human trafficking" refer broadly to "the act of recruiting, harboring, transporting, providing, or obtaining a person for compelled labor or commercial sex acts through the use of force, fraud, or coercion," irrespective of whether the person has been moved from one location to another. Trafficking in persons includes practices such as coerced sex work by adults or children, forced labor, bonded labor or debt bondage, involuntary domestic servitude, forced child labor, and the recruitment and use of child soldiers. Many different factors indicate that an individual may be in a situation of trafficking. Among the most clear-cut indicators are the experience of coercive or deceptive recruitment, restricted freedom of movement, retention of identity documents by employers, withholding of wages, debt bondage, abusive working and living conditions, forced overtime, isolation, and physical or sexual violence. The United States Government is broadly committed to combating trafficking in persons, as guided by the Trafficking Victims Protection Act (TVPA) of 2000, and the UN Palermo Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, Supplementing the United Nations Convention Against Transnational Organized Crime. In September 2012, the United States took an unprecedented step in the fight against human trafficking with the release of a presidential executive order (EO) entitled "Strengthening Protections Against Trafficking in Persons in Federal Contracts." In issuing this EO, the White House acknowledged that "as the largest single purchaser of goods and services in the world, the US Government has a responsibility to combat human trafficking at home and abroad, and to ensure American tax dollars do not contribute to this affront to human dignity." The EO prohibits human trafficking activities not just by federal prime contractors, but also by their employees, subcontractors, and subcontractor employees. Subsequent amendments to the Federal Acquisition Regulation (FAR) and the Defense Acquisition Regulations System (DFARS) in the wake of the EO will affect a broad range of federal contracts, and will require scrutiny by prime contractors of subcontractor labor practices to a degree that has not previously been commonplace. Top level contractors will now need to look actively at the labor practices of their subcontractors and suppliers, and to consider the labor involved in production of inputs even at the lowest tiers of their supply chains.

Details: Amherst, MA: Verite, 2017. 355p.

Source: Internet Resource: Accessed May 25, 2017 at: https://www.verite.org/wp-content/uploads/2017/04/EO-and-Commodity-Reports-Combined-FINAL-2017.pdf

Year: 2017

Country: International

Keywords: Child Labor

Shelf Number: 145793


Author: Coyne, Christopher J.

Title: Four Decades and Counting: The Continued Failure of the War on Drugs

Summary: Private individuals and policymakers often utilize prohibition as a means of controlling the sale, manufacture, and consumption of particular goods. While the Eighteenth Amendment, which was passed and subsequently repealed in the early 20th century, is often regarded as the first major prohibition in the United States, it certainly was not the last. The War on Drugs, begun under President Richard Nixon, continues to utilize policies of prohibition to achieve a variety of objectives. Proponents of drug prohibition claim that such policies reduce drug-related crime, decrease drug-related disease and overdose, and are an effective means of disrupting and dismantling organized criminal enterprises. We analyze the theoretical underpinnings of these claims, using tools and insights from economics, and explore the economics of prohibition and the veracity of proponent claims by analyzing data on overdose deaths, crime, and cartels. Moreover, we offer additional insights through an analysis of U.S. international drug policy utilizing data from U.S. drug policy in Afghanistan. While others have examined the effect of prohibition on domestic outcomes, few have asked how these programs impact foreign policy outcomes. We conclude that prohibition is not only ineffective, but counterproductive, at achieving the goals of policymakers both domestically and abroad. Given the insights from economics and the available data, we find that the domestic War on Drugs has contributed to an increase in drug overdoses and fostered and sustained the creation of powerful drug cartels. Internationally, we find that prohibition not only fails in its own right, but also actively undermines the goals of the Global War on Terror.

Details: Washington, DC: Cato Institute, 2017. 28p.

Source: Internet Resource: Policy Analysis No. 811: Accessed May 25, 2017 at: https://object.cato.org/sites/cato.org/files/pubs/pdf/pa-811-updated.pdf

Year: 2017

Country: International

Keywords: Drug Enforcement

Shelf Number: 145797


Author: Genkin, Michael

Title: How Do Terrorist Cells Self-Assemble: Insights from an Agent-Based Model of Radicalization

Summary: Since the 9/11 attacks, there has been a steady increase in the incidence of self-starter terrorist plots in both Western Europe and the United States. Past studies of self-starter terrorism focused on how persons come to acquire radical beliefs but take the additional step for granted - the transformation of isolated radical individuals into cells or networks that produce violent collective action. To better understand this search and assembly aspect of radicalization we constructed an agent-based computational model of radicalization and then validated its predictions with empirical data. Our work yielded three distinct contributions: 1) we operationalized radicalization with precise network measures and distinguished between four types of radicalization scenarios; 2) we characterized the factors that contribute to radicalization as well as deradicalization; 3) we extended radicalization theory by identifying specific network mechanisms such as occlusion, encapsulation, and magnet-rewiring by which radicals self-organize. Our findings may allow us to distinguish the conditions that lead to small transient cells from conditions that lead to large long-lasting terrorist organizations.

Details: Unpublished paper, 2011. 47p.

Source: Internet Resource: Accessed May 25, 2017 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1031521

Year: 2011

Country: International

Keywords: Deradicalization

Shelf Number: 145798


Author: Webb, Emma

Title: Spotting the Signs: Identifying Vulnerability to Radicalisation Among Students

Summary: A new report from The Henry Jackson Society, Spotting The Signs: Identifying Vulnerability To Radicalisation Among Students, investigates students who have travelled from the United Kingdom to join terrorist organisations in Syria and Iraq. Those who have fought or trained abroad have been disproportionately involved in the most serious Islamist terrorist offences in the UK. Many individuals who have travelled had recent connections to higher education. The provisions in the Counter-Terrorism and Security Act 2015 which introduced a statutory duty for public bodies. But since then only one student has been referred to the Channel Vulnerability Assessment Framework. The report examines the cases of 29 students who travelled or attempted to travel to Islamist groups in Syria and Iraq. The report indicates that a high proportion of students had face-to-face contact with other extremists. In a significant number of cases, behaviour indicative of potential vulnerability to radicalisation was noticed among many of the students profiled, as was the sudden appearance of behaviour associated with increasing religious observance and expression of extreme political views.

Details: London: Henry Jackson Society, 2017. 94p.

Source: Internet Resource: Accessed May 25, 2017 at: http://henryjacksonsociety.org/wp-content/uploads/2017/04/Student-Fighters-Project.pdf

Year: 2017

Country: International

Keywords: Extremist Groups

Shelf Number: 145799


Author: FishWise

Title: Trafficked: Human Rights Abuses in the Seafood Industry

Summary: It is important for companies to focus on social responsibility in supply chains, especially human rights, in order to demonstrate a real commitment to people, planet, and profit. Documentation of human trafficking and forced labor in seafood supply chains has been growing with increasing media attention, nongovernmental organization (NGO) investigations, and government reports. Discussions of environmental sustainability within the seafood industry are now commonplace, but efforts to improve human rights in the industry are nascent and just beginning to gain the momentum necessary to catalyze real change. In the last five years, seafood companies have created sustainable seafood sourcing policies, and are now working to meet the commitments within them. Human and labor rights are often not incorporated into these policies for seafood, as the historical focus of such efforts has been on industries such as coffee, minerals, and textiles. The seafood industry is not free of these concerns however, and the time is ripe for companies to expand their sustainable seafood policies to address these issues. This is appropriate because environmental sustainability and human rights issues do not operate independently. Vessels and companies operating illegally often commit environmental and social crimes in tandem. Eliminating human rights abuses in seafood supply chains is not an easy task. Challenges include corruption, exemptions within international standards for fishing vessels, lack of transparency via the use of flags of convenience and transhipment, the globalized nature of the supply chain, lack of enforcement, incomplete traceability, and the prevalence of illegal fishing. Amidst these challenges there are also opportunities. Brand value, shareholder opinion, and corporate social responsibility can benefit from companies addressing this issue in an honest and transparent manner. After improvements have been made, companies can actively promote the associated success stories, such as social and fair trade compliance, engagement in fishery improvements, and support for entrepreneurial ventures in the developing world. An important step toward mitigating, and eventually eliminating these risks is to ensure comprehensive traceability systems are in place throughout the supply chain. Additionally, companies need to create policies to ensure specific attention is paid to address human rights in seafood supply chains. Conducting a risk assessment, seeking certification, and creating fishery improvement projects to address deficiencies can help companies improve and meet their commitments. Engaging with countries to ratify and implement relevant legislation, eliminating illegal fishing globally, and contributing financially to international efforts to aid victims of trafficking will also enable progress. Lastly, communicating success stories and transparent self-reporting will inform consumers and stakeholders of the problem and ensure they are aware of companies' progress towards eliminating modern slavery and illegal fishing. This white paper aims to: 1) serve as a resource for seafood businesses seeking to prevent and eliminate human rights abuses in their supply chains and 2) improve the knowledge base and coordination of NGOs and other groups working on human and labor rights within the industry. It provides an overview of human rights issues in seafood supply chains, and then explores how more than fifty international and regional government programs, certification systems, NGOs, companies, and industry groups are working on human and labor rights. Companies can review the recommended next steps in this report to address human rights within their own businesses

Details: Santa Cruz, CA: FishWise, 2013. 55p.

Source: Internet Resource: Accessed May 26, 2017 at: https://www.fishwise.org/images/pdfs/fishwise_human_rights_seafood_white_paper_nov_2013.pdf

Year: 2013

Country: International

Keywords: Fishing Industry

Shelf Number: 145801


Author: United Nations Educational, Scientific and Cultural Organization

Title: Preventing violent extremism through education: A guide for policy-makers

Summary: Over the past years, the number of reported attacks perpetrated by violent extremist groups has risen. As we witness tragedies on all continents, we understand that violent extremism knows no boundaries and affects every society. Young people are, however, most at risk. They are the main targets of recruitment strategies and fall victim to extremist violence. This phenomenon alerts us to the risk of losing a generation of youth to despair and disengagement. In the face of such threats, there is no single solution. Security responses are important, but not sufficient, and will not tackle the many underlying conditions that breed violent extremism and drive youth to join violent extremist groups. We need soft power, such as education. In particular, we need relevant, inclusive and equitable quality education. This is the sine qua non to effective action and requires countries to simultaneously implement short, medium and long-term responses. To assist countries in their efforts, UNESCO has developed this publication Preventing violent extremism through education: A guide for policy-makers. The Guide also responds to the decision of UNESCO's Executive Board at its 197th session (197 EX/Dec46) through which Member States acknowledged the importance of preventing violent extremism through education and requested that UNESCO assist them in this endeavour. Together with the Teachers' Guide on the Prevention of Violent Extremism produced by UNESCO, this Guide offers technical guidance for education professionals (policy-makers, teachers and various education stakeholders) on how to address the concrete challenges posed by violent extremism within each society. The Guide particularly aims to help policy-makers within ministries of education to prioritize, plan and implement effective preventive actions.

Details: Paris: UNESCO, 2017. 72p.

Source: Internet Resource: Accessed May 26, 2017 at: http://unesdoc.unesco.org/images/0024/002477/247764e.pdf

Year: 2017

Country: International

Keywords: Crime Prevention

Shelf Number: 145803


Author: FishWise

Title: Trafficked II: An Updated Summary of Human Rights Abuses in the Seafood Industry

Summary: Media outlets are increasingly covering human rights abuses in seafood supply chains all over the world. Unfortunately, many seafood companies who have worked hard to create environmentally sustainable seafood sourcing policies remain unaware that human rights abuses are occurring, most likely in their own supply chains. These companies have made a commitment to provide their customers with environmentally sustainable seafood products, a commitment that could be undermined by these human rights abuses. Trafficking and forced labor, among other abuses, have been documented in several supply chains of popular seafood items in the United States. In such supply chains human rights abuses are not the only concern - often fishing interests that commit social crimes against their workers are also committing environmental crimes. The time has come for companies to take responsibility for both environmental sustainability and social aspects of their seafood supply chains. This can reduce the risk of negative attention as documented human rights abuses continue to grab headlines and also provide opportunities to improve brand value with consumers. This is the second release of a white paper that aims to serve as a resource for seafood businesses seeking to prevent and eliminate such human rights abuses. It provides an overview of both human rights issues in seafood supply chains and the major challenges to reform, including corruption, lack of transparency, lack of enforcement, and the prevalence of illegal fishing. It explores how more than fifty international and regional government programs, certification systems, NGOs, companies, and industry groups are working on human and labor rights. Companies can use the recommended steps in this report to address human rights in an honest and transparent manner. This report can also serve as a tool to help conservation NGOs and human rights experts join forces to improve human rights in the seafood industry. Human rights experts have traditionally focused their work on industries such as coffee, minerals and textiles and are not familiar with the seafood industry. Many ocean conservation groups lack this expertise, but have extensive knowledge of the seafood industry. This paper explores ways to connect these two important allies. This revised version includes: - An updated summary of media stories and reports on human rights abuses in seafood supply chains that have been released since November 2013. - The results of an online survey of the following stakeholder groups: NGOs, the seafood industry, and seafood consumers. - Additional groups working on human rights that could serve as resources on these issues.

Details: Santa Cruz, CA: FishWise, 2014. 69p.

Source: Internet Resource: Accessed May 26, 2017 at: https://www.fishwise.org/images/pdfs/Trafficked_II_FishWise_2014.pdf

Year: 2014

Country: International

Keywords: Fishing Industry

Shelf Number: 145804


Author: Ligtvoet, Willem

Title: Water, Climate and Conflict: Security Risks on the Increase?

Summary: This briefing note explores the multidimensional relationship between water, climate change, human security and political conflict. The relationship between human security and water- and climate-related stressors such as floods, droughts and reduced food availability is quite straightforward. The relationships between water, climate and political conflict, however, are complex and depend strongly on political, economic, societal and cultural contexts. Water and climate conditions in the world are expected to change dramatically due to population growth, further economic development and climate change. It is projected that these developments will lead to increased water stress affecting conflict risks at local, national and river-basin levels. Also, the implementation of mitigation policies may unintentionally aggravate water stress and competition.

Details: The Hague: Clingendael, 2017. 12p.

Source: Internet Resource: Planetary Security Initiative: Accessed May 26, 2017 at: https://www.clingendael.nl/sites/default/files/Briefing_Note_PSI_Water_climate_and_conflict.pdf

Year: 2017

Country: International

Keywords: Socioeconomic Conditions and Crime

Shelf Number: 145809


Author: Internal Displacement Monitoring Centre

Title: Global Report on Internal Displacement, 2017

Summary: In April 2017, diplomats and donors met in Brussels to support the future of the Syrian people and their neighbours. The conference was overshadowed by a horrific chemical attack on civilians in Idlib, Syria. As people were dying in harrowing circumstances, the leaders in Brussels had scheduled discussing the return of refugees to the country. The contrast between those plans and the reality on the ground could not have been starker. By the end of 2016, more than half of Syria's 22 million people had fled the violence of the past six years. People continue to flee daily, and many remain displaced within the country. These days Syrians can only move so far. The country's international borders were effectively closed in 2015-2016, leaving hundreds of thousands internally displaced near crossing points into neighbouring countries. As the conflict evolves some are returning to their homes. But we do not know if this is because the situation in their area of origin has improved, or because it was unsustainable in their place of refuge. The plight of refugees returning elsewhere, as in Afghanistan and Somalia, is also a cause for concern as the number of refugees worldwide continues to rise and global interest in returns increases. The risk that unprepared, involuntary or premature returns will cause more internal displacement in the future cannot be underestimated. This year, IDMC's Global Report on Internal Displacement (GRID) examines the connections between internal and cross-border displacement. It shows that people unable to find safety by fleeing within their own country eventually embark on dangerous journeys across borders in search of refuge and a better life. It also indicates that refugees and migrants who return or are deported back to conditions similar to those that led to their flight risk becoming displaced again. This will only add to the country's existing number of internally displaced people (IDPs). Given the current attention to these issues, and that patterns and trajectories vary significantly from one country to another, a much stronger evidence base is needed. This year's GRID continues to publish estimates and analysis of people internally displaced by conflict, violence and disasters in a single report. Many more people were displaced once again by disasters than conflict, showing that disaster risk reduction remains a core priority of our times. In addition to large scale and sudden-onset events, slowly developing food security crises triggered by drought and exacerbated by existing vulnerabilities and protracted conflict also continue to affect millions of people. A significant number of new internal displacements in 2016 had multiple causes.

Details: Geneva, SWIT: IDMC, 2017. 125p.

Source: Internet Resource: Accessed May 27, 2017 at: http://internal-displacement.org/global-report/grid2017/#download

Year: 2017

Country: International

Keywords: Internal Displacement

Shelf Number: 145824


Author: Mahler, Annegret

Title: Conflict Prevention through Natural Resource Management? A Comparative Study

Summary: Natural resources are often held responsible for intrastate conflicts. As a consequence, both national and international measures to avoid the detrimental impact of resource endowments have increasingly been discussed and implemented in resource‐rich countries. These measures include stabilization funds, subregional development programs, revenue‐sharing regimes, and transparency initiatives. However, comparative empirical studies of the actual impact of these measures, particularly regarding their contribution to conflict prevention, are scarce. This paper contributes to the filling of this gap: combining a medium‐N sample of oil‐ dependent countries and three in‐depth case studies (Algeria, Nigeria, and Venezuela), we evaluate different instruments of resource management and their effects on conflict risk fac‐ tors. On the one hand, the findings do not show any systematic connection between the countermeasures and a reduction in resource‐related risks; on the other, the paper highlights common causal factors for the lack of implementation of resource‐related countermeasures.

Details: Hamburg, Germany: GIGA German Institute of Global and Area Studies, 2011. 34p.

Source: Internet Resource: GIGA Working Paper No. 158: Accessed May 27, 2017 at: https://www.giga-hamburg.de/en/system/files/publications/wp158_maehler-shabafrouz-struever.pdf

Year: 2011

Country: International

Keywords: Conflict-Related Violence

Shelf Number: 145833


Author: Penal Reform International

Title: Global Prison Trends 2017

Summary: Global Prison Trends 2017 is the third edition in our annual Global Prison Trends series, which identifies the topical developments and challenges in criminal justice and prison policy and practice. It is published in collaboration with the Thailand Institute of Justice, and features a foreword by HRH Princess Bajrakitiyabha Mahidol, UNODC Regional Goodwill Ambassador on the Rule of Law in Southeast Asia and the Pacific, and the President of the Thailand Institute of Justice. Global Prison Trends 2017 explores: Trends in the use of imprisonment, such as pre-trial detention and life imprisonment Prison populations, such as the specific needs of women, foreign nationals and elderly prisoners Developments and challenges in prison management, including security issues and violence, prison labour, and violent extremism in prison The role of technology in the criminal justice system, such as e-learning and video visitation Prison alternatives, including the use of electronic monitoring and community service orders A Special Focus section looks at the Sustainable Development Goals (SDGs) in relation to criminal justice, using examples from a range of countries to highlight specific issues and summarising why criminal justice and criminal justice reform must play a part in achieving the goals set out in the 2030 Agenda.

Details: London: PRI, 2017. 64p.

Source: Internet Resource: Accessed June 2, 2017 at: https://cdn.penalreform.org/wp-content/uploads/2017/05/Global_Prison_Trends-2017-Full-Report-1.pdf

Year: 2017

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 145844


Author: Penal Reform International

Title: Global Prison Trends 2016

Summary: This is the second annual edition in our Global Prison Trends series, describing key global trends in the use and practice of imprisonment and the pressing challenges facing states that wish to organise their penitentiary systems in accordance with international norms and standards. Topics include for example: developments in international criminal justice policy; notable changes to policy at the national level; prison population trends; prison management issues (eg. security and violence, radicalisation, corrections in fragile and conflict states, corruption) and new technologies. The 2016 also has a new section on the provision of food in prisons, with some representative data on food expenditure. Significant international developments and recent research projects are highlighted throughout. The report also includes a Special Focus pull-out section -= Prison staff: Overworked and underpaid? Working in a prison requires specific skills, but prison staff can be poorly paid, under‑trained and experience high levels of work‑related stress and violence. This special feature provides a global perspective on prison staff recruitment, pay and conditions, professional training, and issues relating to their health, safety and well‑being

Details: London: PRI, 2016. 52p.

Source: Internet Resource: Accessed June 2, 2017 at: https://cdn.penalreform.org/wp-content/uploads/2016/05/Global_prison_trends_report_2016.pdf

Year: 2016

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 145899


Author: Foster, Jon

Title: Anytime, Anyplace, Anywhere? Addressing physical availability of alcohol in Australia and the UK

Summary: Australia and the United Kingdom (UK) have observed an enormous increase in the availability of alcohol since the 1980s. There has been huge growth in the number and types of places at which alcohol can be purchased, and in the times of the day and week transactions can take place. Over this period, there has also been a substantial increase in alcohol purchases for consumption off-premises, a shift partly driven by the increasing cost ratio of on- versus off-premise drinks. The on-premises trade has responded by shifting business models. Some adjustments, such as increased food offerings, are likely to place downward pressure on rates of harm. However, the greater competition can also push up rates of harm, as marginal operators compete with bulk and cheap promotions. The net result seems to have been relatively stable per capita consumption, but an increased awareness of harms associated with drinking. The political response to increasing public concern has focused predominantly on late-night violence and the broad notion of community amenity. Cracking down on drink driving was an earlier manifestation of this kind of response to visible problems involving a large number of ambulance attendances and emergency department presentations. Pressure on the political system has produced a variety of policies targeting the temporal availability of alcohol. The high profile of alcohol-related street violence in Australia in particular, has driven restrictions on the sale of particular products or in certain forms late at night. Both Australia and the UK have initiatives attempting to address the cumulative impact of licensed businesses to maintain community amenity. The UK has also produced schemes such as 'reducing the strength' to encourage voluntary restrictions on particular products. Political will for meaningful reform has regularly been limited by the enormous power and sophisticated lobby of the alcohol and hospitality industries. Much of the policy debate in Australia has surrounded the late night trade of alcohol. With debate focusing on events at 4am, it has remained peripheral to the great majority of Australians who are in bed at that time. Similarly, progress on cumulative and community impact has been largely ineffective. Policies have focused on whether and where further licences will be issued rather than reducing the number of licences, which has not been an issue which governments have been willing to consider. The breadth of harm associated with alcohol demands targeted measures and consideration of alcohol policy across a variety of domains. The multifaceted nature of domestic violence and chronic disease, for example, mean policies addressing alcohol's role in these issues are both challenging to develop and sometimes overlooked. A recurrent surprise has been that a relatively strong measure aimed at visible problems on the street - for instance, drink driving - unexpectedly has an effect in reducing rates of domestic violence.

Details: London and Canberra: Institute of Alcohol Studies and the Foundation for Alcohol Research and Education, 2017. 88p.

Source: Internet Resource: Accessed June 2, 2017 at: www.ias.org.uk/

Year: 2017

Country: International

Keywords: Alcohol Abuse

Shelf Number: 145902


Author: Idris, Iffat

Title: Women and countering violent extremism

Summary: There is no consensus on the definition of countering violent extremism (CVE), in part because there is no consensus on the definition of violent extremism (Glazzard & Zeuthen, 2016; Striegher, 2015). The UN Secretary-General's Plan of Action on Preventing Violent Extremism (UN, 2015) does not provide one because consensus could not be reached due to the political sensitivities involved. A working definition cited in Foreign Affairs that encompasses the key concepts is: 'the use of non-coercive means to dissuade individuals or groups from mobilizing towards violence and to mitigate recruitment, support, facilitation or engagement in ideologically motivated terrorism by non-state actors in furtherance of political objectives'. The idea underpinning CVE is that violent extremists should not be fought exclusively with intelligence, police, and military means, but the structural causes of violent extremism must also be tackled (Frazer & Nunlist, 2015). Prevention is a major aspect of CVE, aiming to get at the root causes and factors that contribute to extremism and terrorism, by engaging with individuals, communities and others. 'It is not enough to counter violent extremism - we need to prevent it' (UNESCO2). This review looks at the role that women can play in CVE, lessons from programmes on women and CVE, donor policy guidance and programming approaches, and networks supporting women and CVE. Note that 'women' refers to women and girls: this is consistent with concepts of gender equality, gender violence, and so on, which all encompass both women and girls. (Moreover perceptions of when womanhood starts vary across cultures, with some considering puberty as the point at which a girl becomes a woman.) The available literature largely comprised of government and donor agency reports, think-tank papers and grey literature. Note that some literature refers to just women and CVE, and some to women and preventing/countering violent extremism (P/CVE). For each source, the review uses the term (CVE or P/CVE) used in that source.

Details: Birmingham, UK: GSDRC, University of Birmingham, 2017. 36p.

Source: Internet Resource: Helpdesk Research Report: Accessed June 2, 2017 at: http://www.gsdrc.org/wp-content/uploads/2017/05/HDR_1408.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145907


Author: Jaitman, Laura

Title: Evaluation of Slum Upgrading Programs: Literature Review and Methodological Approaches

Summary: This technical note analyzes the methodologies used to evaluate neighborhood upgrading programs, describes their results, and suggests approaches for future evaluations. Local and central governments are increasingly utilizing slum or neighborhood upgrading programs to deal with the multiple problems of urban poverty. These programs employ a methodology of integral interventions, combining of both infrastructure works and social services targeted to specific neighborhoods. Due to this variety of interventions the assessment of their impact is complicated and requires a comprehensive approach. This document analyzes the methods used in the evaluation of a number of upgrading programs either looking at individual interventions or their combined outcomes. It proposes a methodological approach for their assessment based on three categories of outcomes: housing, neighborhood, and individual. For each type of outcome, the authors present a literature review of common interventions and their evaluation results. The document also suggests relevant indicators for evaluating slum upgrading programs according to these three types of outcomes, and finally, it presents methodological issues to take into consideration when designing the evaluations of integral programs.

Details: Washington, DC: Inter-American Development Bank, 2013. 78p.

Source: Internet Resource: No. IDB-TN-604: Accessed June 5, 2017 at: http://services.iadb.org/wmsfiles/products/Publications/38339263.pdf

Year: 2013

Country: International

Keywords: Poverty

Shelf Number: 145911


Author: Knudsen, Rita Augestad

Title: Radicalization and foreign fighters in the Kosovo context: An analysis of international media coverage of the phenomena

Summary: Since 2014, the high proportion of foreign fighters from Kosovo and challenges related to radicalization have been extensively covered by international English-language print and online media. In May 2016, a much-discussed New York Times article summed up the situation in dramatic terms: Kosovo, it claimed, had been 'turned into fertile ground for ISIS'. Both before and after this high point in international media attention, many articles have offered their interpretations of violent Islamist/jihadi radicalization and foreign fighters in the Kosovo context. These media versions have sparked domestic debate and begun to impact international policy towards the country. Despite taking up issues that are real and serious, much of the reporting seems to have been guided by skewed assumptions and superficial understandings. This working paper takes a critical look at the written coverage of issues of jihadi radicalization and foreign fighters from Kosovo, identifying key themes, assumptions, and areas where the press seems to have missed certain points. The paper is based on an extensive survey of written English-language media coverage retrieved online, secondary NGO/grey and academic literature, as well as some 50 original interviews with experts, frontline practitioners, policymakers and donors conducted in Prishtina, Brussels, or via Skype. While not attempting to provide a full picture, the paper identifies points on which the international media coverage seems to have got matters wrong, and areas where the evidence calls for greater nuancing. These include the number of foreign fighters, the reasons for radicalization and why people have travelled to Syria, as well as the government's response.

Details: Oslo: Norwegian Institute of International Affairs 2017. 22p.

Source: Internet Resource: NUPI Working Paper 875: Accessed June 5, 2017 at: https://brage.bibsys.no/xmlui/bitstream/handle/11250/2442205/NUPI_Working_Paper_875_Knudsen.pdf?sequence=2

Year: 2017

Country: International

Keywords: ISIS

Shelf Number: 145921


Author: Bondokji, Neven

Title: Understanding Radicalisation: A Literature Review of Models and Drivers

Summary: Interest in the drivers of, and models to explain, the processes of radicalisation has increased exponentially since the terrorist attacks of 11 September 2001. Attention has focused on the West Asia North Africa (WANA) region due to the expansion and reach of armed radical groups, manifesting in acts of violence both domestically and aboard. Within the radicalisation debate, scholars and practitioners have wrestled to understand the ideologies that inspire the members of self-described 'Islamic' armed groups and other causal drivers, be they social, economic, or reactionary. While this has contributed to a diversity of literature on violent radicalism, terrorism, and extremism, there is little academic consensus let alone empirical studies to validate existing theories. This paper seeks to synthesise current knowledge on the drivers of radicalisation. It examines literature on radicalisation in the WANA region, Western states, Central Asia, and Africa. Because the aim is to understand these phenomena in relation to those joining Daesh (also known as ISIS, IS, ISIL), al-Nusra (generally considered al-Qaeda's Syrian branch), and their affiliates, the analysis focuses on radicalisation at the level of the individual, not radical organisations. The paper is divided into six sections. The first defines radicalisation. The second and third sections discuss the typologies of radicals and extant radicalisation models with particular emphasis on the factors that affect individuals. The fourth section examines the literature on political, socio-economic, social, and cultural drivers of radicalisation. It then identifies knowledge gaps and weaknesses in the existing literature, and makes suggestions on the development of a more reliable empirical evidence base on violent radicalisation. The principal findings are that radicalisation is a personal process that starts with grievances and perceived injustices concerning political or social contexts, the subsequent identity crisis and, lastly, the search for purpose that follows. Moreover, radicalisation should be understood in the context of 'push' and 'pull' factors. Such factors include those of a political, economic, and ideological nature, as well as psycho-social drivers, such as a search for adventure, status, and belonging. Radicalisation also develops within supporting social environments that include family influence and narratives of victimhood. These insights are important for the development of targeted and workable policy interventions to counter the growth of violent extremism. However greater empirical evidence is necessary, particularly geared towards capturing the family dynamics at work in the radicalisation process, the role of women and female preachers, the causal relations between single factors, and driver confluence. The key challenge is limited access to radical individuals and those who have participated in violence. Until this can be overcome, a comprehensive understanding of their motives will be difficult, thus limiting the development of effective policies and programs to counter violent extremism.

Details: Amman, Jordan: WANA Institute, Royal Scientific Society, 2016. 30p.

Source: Internet Resource: Accessed June 6, 2017 at: http://wanainstitute.org/sites/default/files/publications/Understanding%20Radicalisation%20-%20A%20Literature%20Review%20of%20Models%20and%20Drivers_0.pdf

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 145934


Author: Williams, Aled

Title: The resource bites back: Entry-points for addressing corruption in wildlife crime

Summary: Corruption has recently risen up the global wildlife conservation agenda with a series of international agreements highlighting the role of corruption in facilitating wildlife crime. Though there are notable exceptions, there is still a weak treatment in the literature of the problems of, and solutions to, wildlife crime from an anti-corruption perspective. Identifying and promoting effective interventions that get to the heart of the corruption problems associated with wildlife crime is a shared responsibility across the wildlife conservation, anti-corruption, anti-illicit trade, and anti-organized crime communities. As well as reviewing existing empirical literature to explore the types and characteristics of corruption associated with wildlife crime, this U4 Issue identifies entry-points for addressing corruption in wildlife crime based on recent anti-corruption effectiveness literature. Building credible corruption risk assessment and corruption risk management procedures is important for improving wildlife conservation programming. This will enable generation of detailed analyses of corruption risk factors at programmatic level, the recording of baseline data on corruption prevalence, and the production of detailed plans on how best to mitigate and manage identified corruption risks.

Details: Bergen: Chr. Michelsen Institute (U4 Issue 2016:2) 29p.

Source: Internet Resource: Accessed June 6, 2017 at: http://www.u4.no/publications/the-resource-bites-back-entry-points-for-addressing-corruption-in-wildlife-crime/

Year: 2016

Country: International

Keywords: Animal Poaching

Shelf Number: 145939


Author: United States Agency for International Development

Title: The Development Response to Violent Extremism and Insurgency: Putting Principles into Practice

Summary: This policy on The Development Response to Violent Extremism and Insurgency is the first of its kind produced by USAID. Its purpose is to provide a policy framework that USAID can use to improve the effectiveness of its development tools in responding to violent extremism and insurgency, as well as its capacity to interact constructively with its interagency and other partners in these challenging environments. The policy will also help USAID focus more tightly on capacity building and sustainability which are critical to our long-term security and development goals. The policy defines terms necessary for a shared understanding within USAID of these challenges and differentiates at a general level between a development response to violent extremism and a development response to insurgency. At the same time, it acknowledges that each situation is different and that these terms and the development response will need to be defined and understood in their particular context and guided by U.S. foreign policy. Building on a growing knowledge base, the policy identifies those factors, or drivers, that can favor the rise of violent extremism or insurgency as well as those that can influence the radicalization of individuals. Broadly speaking, these include structural "push" factors, including high levels of social marginalization and fragmentation; poorly governed or ungoverned areas; government repression and human rights violations; endemic corruption and elite impunity; and cultural threat perceptions. Simultaneously, "pull" factors that have a direct influence on individual level radicalization and recruitment include access to material resources, social status and respect from peers; a sense of belonging, adventure, and self--esteem or personal empowerment that individuals and groups that have long viewed themselves as victimized and marginalized can derive from the feeling that they are making history; and the prospect of achieving glory and fame. The policy identifies what USAID has learned strategically and programmatically about the role of development assistance to counter these drivers and affect a country's development. In the context of the U.S. Global Development Policy and the Quadrennial Diplomacy and Development Review (QDDR) on enhancing civilian power, the policy identifies ways that USAID can work with its interagency partners and amplify the development voice within the USG. It also emphasizes the importance of local partnership with committed stakeholders and enhanced engagement with bilateral counterparts and multilateral institutions. The policy affirms the importance of the development discipline to, and USAID's distinct and critical role in, addressing these critical national security and development challenges. This includes USAID's focus on sustainability and building ownership and capacity at all levels. If applied correctly, a development response can serve as an effective tool to address these issues.

Details: Washington, DC: USAID, 2011. 23p.

Source: Internet Resource: Accessed June 6, 2016 at: http://pdf.usaid.gov/pdf_docs/Pdacs400.pdf

Year: 2011

Country: International

Keywords: Extremist Groups

Shelf Number: 145940


Author: Romaniuk, Peter

Title: Does CVE Work? Lessons Learned from the Global Effort to Counter Violent Extremism

Summary: As a field of policy and practice, countering violent extremism (CVE) has emerged rapidly in recent years and represents the most significant development in counterterrorism over that time. Ideologically driven violent extremists are a primary threat to national and human security in the developed and developing worlds, suggesting that, in some form or other, CVE will remain on the counterterrorism agenda in the short and medium terms. CVE stands at something of a fulcrum point. There is enough experience in "doing CVE" to expect that data about its effects and effectiveness can be gathered and analyzed; in turn, such analyses ought to inform future developments if policy is to be evidence based. This report advances this objective by asking, "Does CVE work?" It responds in four ways. First, in light of the common observation that CVE lacks coherence as a field, this report offers a brief primer on CVE, providing a definition, a typology of CVE measures, and an ideal-type policy cycle. Regularizing understanding of the field is a necessary step in improving outcomes and enhancing the ability to determine what works. Second, this report reviews publicly available evaluation research on CVE to derive lessons from CVE efforts. On the basis of the data on hand, these lessons pertain to initial efforts by governments to engage communities for the purpose of CVE. They are know your audience; avoid stigmatizing communities; send clear messages (e.g., so that "soft power" CVE measures are not conflated with or impacted by more traditional counterterrorism tools); and engage broadly and partner strategically. In part, practitioners learned these lessons through evaluation; but other mechanisms of policy learning, especially professional contacts, were likely more important. Third, this report finds that governments have begun to integrate knowledge from their initial forays into the CVE space. A cluster of governments have completed the "CVE policy cycle" formally or informally, and this report distinguishes "first wave" and "second wave" CVE initiatives on this basis. Second-wave measures converge around a series of refined initiatives at the community level, alongside a stronger focus on individual-level interventions. Also, second-wave programs are more likely to target those most at risk of committing extremist violence and not simply those that may be sympathetic to extremist ideas-a welcome development. Yet, second-wave programs present a range of challenges; and this report recommends that practitioners-governments and nongovernmental organizations (NGOs)-develop ways to institutionalize policy learning on CVE, including through committing to evaluation research. In particular, development of horizontal networks for NGO CVE practitioners should be a priority. Fourth, this report surveys the state of play regarding the process of evaluating CVE measures. In a broadly defined field, there is some diversity within the modest body of completed, publicly available evaluation research. Practitioners increasingly exhibit an awareness of the importance of evaluation, and as a result, long-standing rhetorical support for CVE evaluation is beginning to translate into practice. Ideally, future evaluation research will be publicly available to facilitate comparison and analysis. In sum, this report reflects critically on a field that has risen to prominence in a manner disproportional to its achievements. Practitioners in government and NGOs, among others, should use it to inform their understanding of CVE and guide their responses in a systematic and evidence-based fashion. The record offers some pointers for more effective programming going forward but commends moderate expectations overall. Among this report's key findings: 1. More precision and specificity are needed when defining CVE and classifying and evaluating CVE programming. 2. Contextualized assessments and stakeholder consultations are critical to effective programming but remain underutilized. Ongoing investments in gathering and analyzing data need to be sustained and increased. 3. Community engagement on CVE can yield negative unintended consequences. To succeed, it requires integrative, broad-based state-civil society relationships in which governments and NGOs engage broadly and partner strategically. 4. Networks among CVE-relevant NGO partners need more investment and nurturing. NGOs face several barriers in self-initiating CVE measures, including resource constraints and knowledge gaps, and peer-to-peer contacts on this issue are underdeveloped. 5. On evaluation, although there is an absence of an elegant, agreed-on set of metrics, practitioners should build measurement opportunities into programming cycles. As much as possible, future evaluation research should be publicly available to facilitate comparison and analysis. 6. CVE has emerged very quickly but is maturing, and it will be here in some form for the foreseeable future. Resources allocated to CVE are modest compared to other, more traditional counterterrorism tools, such as military force and law enforcement. Experience with CVE commends moderate expectations. For CVE to be sustainable and effective, practitioners should integrate past lessons into current and future programming.

Details: Goshen, Indiana: Global Center on Cooperative Security, 2015. 50p.

Source: Internet Resource: Accessed June 6, 2017 at: http://www.globalcenter.org/wp-content/uploads/2015/09/Does-CVE-Work_2015.pdf

Year: 2015

Country: International

Keywords: Counter-Extremism

Shelf Number: 145941


Author: UNICEF

Title: A Child is a child: Protecting children on the move from violence, abuse and exploitation

Summary: Millions of children are on the move across international borders - fleeing violence and conflict, disaster or poverty, in pursuit of a better life. Hundreds of thousands move on their own. When they encounter few opportunities to move legally, children resort to dangerous routes and engage smugglers to help them cross borders. Serious gaps in the laws, policies and services meant to protect children on the move further leave them bereft of protection and care. Deprived, unprotected, and often alone, children on the move can become easy prey for traffickers and others who abuse and exploit them. Alarming numbers of children are moving alone Many children move alone and face particularly grave risks. In parts of the world, the number of children moving on their own has skyrocketed. On the dangerous Central Mediterranean Sea passage from North Africa to Europe, 92 per cent of children who arrived in Italy in 2016 and the first two months of 2017 were unaccompanied, up from 75 per cent in 2015. At least 300,000 unaccompanied and separated children moving across borders were registered in 80 countries in 2015-2016 0- a near five-fold increase from 66,000 in 2010-2011. The total number of unaccompanied and separated children on the move worldwide is likely much higher. Specific reasons motivate children to undertake journeys alone. Many seek to reunite with family members already abroad. Others pursue their families' aspirations for this generation to have a better life. Perceptions of the potential benefits of children moving, especially to certain destinations, filter through social networks. Other factors include family breakdown, domestic violence, child marriage and forced conscription. Without safe and legal pathways, children's journeys are rife with risk and exploitation Whatever their motivation, children often find few opportunities to move legally. Family reunification, humanitarian visas, refugee resettlement spots, and work or study visas are out of reach for most. But barriers to legal migration do not stop people from moving, they only push them underground. Wherever families and children desperate to move encounter barriers, smuggling in human beings thrives. Smugglers range from people helping others in need for a fee to organized criminal networks that deliver children into hazardous and exploitative situations. Once children and families place their fates in the hands of smugglers, the transaction can readily take a turn towards abuse or exploitation - especially when children and families incur debts to pay smugglers' fees. Europol estimates that 20 per cent of suspected smugglers on their radar have ties to human trafficking - they help children cross borders, only to sell them into exploitation, sometimes akin to contemporary forms of slavery. Some routes are particularly rife with risks. In a recent International Organization for Migration survey, over three-quarters of 1,600 children aged 14-17 who arrived in Italy via the Central Mediterranean route reported experiences such as being held against their will or being forced to work without pay at some point during their journeys - indications that they may have been trafficked or otherwise exploited. Traffickers and other exploiters thrive especially where state institutions are weak, where organized crime abounds, and also where migrants become stuck and desperate.

Details: New York: United Nations Children's Fund (UNICEF), 2017. 64p.

Source: Internet Resource: Accessed June 7, 2017 at: https://www.unicef.org/publications/files/UNICEF_A_child_is_a_child_May_2017_EN.pdf

Year: 2017

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 145948


Author: Veenkamp, Ivo

Title: Countering Violent Extremism: Program and policy approaches relating to youth through education, families and communities

Summary: The focus of international and national strategies for countering terrorism in the past decade has shifted from using hard security measures alone to combat terrorism, to a more multi-sectoral, comprehensive approach, which also includes more preventive strategies known as countering violent extremism (CVE). For example, multilateral organizations such as the United Nations are focusing on CVE through Pillar 1 of the UN Global Counter-Terrorism Strategy, which addresses "conditions conducive" to the spread of terrorism. This relatively new approach is also apparent through the formation of the Global Counter-Terrorism Forum (GCTF) as a multilateral platform for addressing counter-terrorism issues, and the subsequent establishment of Hedayah, the International Center of Excellence for Countering Violent Extremism, as the first institution to solely focus its efforts in long-term, preventive measures to foster resilience against violent extremism and terrorism. The CVE programs and policies that are emerging both out of the UN, the GCTF, Hedayah and the broader international community are based on an established basic methodology that 1) identifies push and pull factors that lead to recruitment or radicalization into violent extremism, and 2) designs interventions that specifically eliminate these root causes. This paper explores the international framework supporting the development and implementation of targeted interventions, specifically to minimize youth recruitment and radicalization into violent extremism through two program areas: 1) CVE through formal educational institutions, 2) building community resilience through families and communities. This paper also describes the recent work by Hedayah and other international bodies in these two program areas, and recommends potential next steps and ways forward to make these programs more effective.

Details: Unpublished paper, 2014. 13p.

Source: Internet Resource: Accessed June 7, 2017 at: http://s3.amazonaws.com/inee-assets/resources/D._INEE_Round_Table_Background_Reading__FINAL_Veenkamp_Zeiger_Youth_CVE_NATO_ARW.pdf

Year: 2014

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145951


Author: Tanko, Laszlo

Title: The Democratic Imperative Explaining the choice of crime fighting approaches in highly affected states

Summary: Violence and crime has been the plight of man since the dawn of times, and continues to be a major obstacle on the road to development but also a significant indicator of grave anomalies within societies. In modern times, fueled by technological advances, crime continues to exert a major toll on societies in every corner of the world; however, it is those countries that are already under considerable economic, political, and social pressure that exhibit the highest levels of violence. In the reportedly successful effort to bring about a lasting reduction of crime, these countries have largely employed criminal justice methods and elements, such as increased policing and incarceration. Many scholars and actors argued for crime reduction using a more comprehensive approach brought about under the concept of human security (HS), since over-reliance on the measures of the criminal justice system (CJS) were seen as overly punitive and damaging. There were quite a few governmental developmental initiatives aimed at reducing crime; these were, however, abandoned for speedy, tougher responses. The aim of this research was to analyze crime fighting strategies and measures in the case studies, and see why a more punitive approach was overly favored to the expense of a more integrated response. Regarding the lack of sufficient background knowledge, there has been considerable difficulties in fusing this largely criminological problem with the field of development. However, the paper thus aimed to contribute to extend the interdisciplinary reach of developmental studies. The research used the rate of homicide per 100,000 people as the indicator to measure crime. In order to bring about the aforementioned goal, the paper at-hand focused on the most violent states, and analyzed those countries which have reached a significant drop in homicide since 1995: El Salvador, Colombia, and South Africa. The empirical analysis consisted in the contrasting of the breadth of CJS policies on the one hand and HS programs on the other. Three main indicators were used for each of the approaches: conviction rates, figures of incarceration, and the size of the police force for the former, and rehabilitation programs, youth projects, and the reach of community policing for the latter. Due to linguistic and geographical constraints, only secondary sources, both qualitative and quantitative were employed.

Details: Copenhagen:Aalborg University, 2015. 77p.

Source: Internet Resource: Thesis: Accessed June 7, 2017 at: http://projekter.aau.dk/projekter/files/212925886/Laszlo_Tanko_The_Democratic_Imperative_Explaining_the_choice_of_crime_fighting_approaches_in_highly_affected_states.pdf

Year: 2015

Country: International

Keywords: Homicides

Shelf Number: 145953


Author: Jones, Seth G.

Title: Rolling Back the Islamic State

Summary: In 2014, the Islamic State conducted a blitzkrieg into Iraqi cities, such as Mosul, and seized significant chunks of territory in Syria and Iraq. Its leader, Abu Bakr al-Baghdadi, declared a pan-Islamic caliphate and eventually expanded the group to include eight formal provinces; more than a dozen informal provinces; and tens of thousands of inspired individuals across Asia, the Middle East, Africa, Europe, and North America. This report examines the Islamic State and offers a global strategy to roll the group and its movement back. It assesses key countries where the Islamic State has controlled territory: Iraq, Syria, Libya, Nigeria, Egypt, and Afghanistan. It also analyzes the group's global efforts to spread its ideology; move money, material, and people; secure resources; and conduct attacks. The report should be of interest to policymakers, academics, and general audiences that want to learn more about the Islamic State and strategies to counter the group.

Details: Santa Monica, CA: RAND, 2017. 297p.

Source: Internet Resource: Accessed June 8, 2017 at: http://www.rand.org/content/dam/rand/pubs/research_reports/RR1900/RR1912/RAND_RR1912.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 145989


Author: Davis, John S., II

Title: Stateless Attribution: Toward International Accountability in Cyberspace

Summary: The public attribution of a malicious cyber incident consists of identifying the responsible party behind the activity. A cyber attribution finding is a necessary prerequisite for holding actors accountable for malicious activity. Recently, several cyber incidents with geopolitical implications and the attribution findings associated with those incidents have received high-profile press coverage. Many segments of the general public disputed and questioned the credibility of the declared attributions. This report reviews the state of cyber attribution and examines alternative options for producing standardized and transparent attribution that may overcome concerns about credibility. In particular, this exploratory work considers the value of an independent, global organization whose mission consists of investigating and publicly attributing major cyber attacks. Key Findings Cyber Attribution Efforts Lack Uniformity and Credibility Analysis of recent cases indicates that the practice of attribution has been diffuse and discordant, with no standard methodology used in the investigations to assess evidence, nor a universal confidence metric for reaching a finding. In several cases, investigations were performed but no formal attribution finding was made public by the investigative entity or victim. Further, public statements of attribution have been met with suspicion, confusion, and a request for greater transparency about the investigation and the evidential basis. Challenges in Cyber Attribution The first challenge concerns the difficulty of reaching a cyber attribution finding. Technical, political, and all-source indicators are all tools used in determining attribution, and usually are used in some combination. A second cyber attribution challenge concerns the issue of persuasively communicating a finding to an intended audience. Credibility hinges on several factors: strong evidence, demonstration of the requisite knowledge and skills for reaching a correct conclusion, a track record of accuracy and precision, a reputation for objective and unbiased analysis, and a transparent methodology that includes an independent review process. Effective cyber attribution investigations will reflect these considerations and achieve credibility in the eyes of the of the target audience. Recommendations In light of the aforementioned challenges and insights, the authors propose and explore the nature of an international organization for cyber attribution, which this report refers to as the Global Cyber Attribution Consortium (the Consortium). This broad team of international experts would provide independent investigation of major cyber incidents for the purpose of attribution. Membership should include representatives from two sectors: (1) technical experts from cybersecurity and information technology companies, as well as academia, and (2) cyberspace policy experts, legal scholars, and international policy experts from a diversity of academia and research organizations. A credible and transparent attribution organization should not include the formal representation of nation-states, to avoid an appearance of bias and to protect transparency. The Consortium would work with victims or their advocates upon their request and with their cooperation to investigate cyber incidents using a diverse set of methodologies and would publish its findings for public review. In addition to providing a credible and transparent judgment of attribution, the Consortium's investigations would help standardize diffuse methodological approaches, naming conventions, and confidence metrics that would advance shared understanding in cyberspace and promote global cybersecurity. The international community could use the Consortium's findings to bolster network defenses, thwart future attacks, and pursue follow-on enforcement actions to hold the perpetrator(s) accountable.

Details: Santa Monica, CA: RAND, 2017. 64p.

Source: Internet Resource: Accessed June 9, 2017 at: http://www.rand.org/pubs/research_reports/RR2081.html

Year: 2017

Country: International

Keywords: Cybercrime

Shelf Number: 145991


Author: Williams, Aled

Title: At the extremes: Corruption in natural resource management revisited

Summary: Natural resource sectors are undergoing profound changes. Resources are being extracted in more remote locations within corruption-prone developing countries than was previously the case; there is an increased proliferation of actors involved in resource extraction; and a marked shift towards renewable energy, conservation and climate change projects in developing countries. Formulating generic anti-corruption policy prescriptions for the wide range of heavily contextualised corruption challenges natural resource sectors face is unlikely to help. This U4 Brief offers instead modest advice for advancing solutions through development cooperation, with a focus on analytical methods, project management approaches, and tracking evidence for effectiveness.

Details: Bergen: Chr. Michelsen Institute (U4 Issue 2016:4), 2016. 6p.

Source: Internet Resource: Accessed June 9, 2017 at: http://www.u4.no/publications/at-the-extremes-corruption-in-natural-resource-management-revisited/

Year: 2016

Country: International

Keywords: Corruption

Shelf Number: 145993


Author: Dean, Christopher

Title: Addressing Violent Extremism in Prisons and Probation: Principles for Effective Programs and Interventions

Summary: There is considerable international interest in programs that seek to rehabilitate and reintegrate violent extremist offenders (VEOs) and prevent prisoners from becoming radicalized. There are a number of reasons for this interest, including the high social and political impact of terrorism, ongoing concerns about prisons and prisoners being especially vulnerable to radicalization to violent extremism, accounts of VEOs who initially became interested in extremism while in prison, and the increasing numbers of incarcerated VEOs in certain states, many of whom will at some point be released into wider society. Identifying and designing so-called deradicalization or disengagement programs-or perhaps more appropriately risk reduction programs-that are proven to be impactful and understanding why remains a considerable challenge. So-called what-works principles underlying programs to prevent other forms of offending behavior have been established in the criminological and forensic psychological literature over recent decades. The key what-works principles are risk, need, and responsivity. In summary, programs should (1) target those who are deemed of higher risk of reoffending and of committing serious harm (risk principle), (2) target factors that directly contribute to offending (need principle), and (3) be delivered in a way and style that maximizes learning for individuals (responsivity principle). Programs that are in accord with all three principles have been found to be more effective than those that do not. This policy brief provides a unique practitioners' perspective on the application of so-called what-works principles, which underlie programs to prevent a variety of forms of offending behavior, to programs and interventions that aim to address violent extremism in prisons and probation. It presents a set of transparent working principles to improve the design and delivery of these programs that can hopefully be examined and tested over time to help refine our knowledge and understanding to prevent violent extremists from reoffending.

Details: Washington, DC: Global Center on Cooperative Security, 2016. 12p.

Source: Internet Resource: Policy Brief, 2016: Accessed june 10, 2017 at: http://www.globalcenter.org/wp-content/uploads/2016/09/16Sep_Dean_Addressing-Violent-Extremism-in-Prisons-and-Probation_FINAL.pdf

Year: 2016

Country: International

Keywords: Counter-Radicalization

Shelf Number: 146025


Author: Persson, Amanda

Title: Slavery: part of history or present problem? A bachelor thesis regarding the issues of contemporary slavery, with a special interest in how contemporary slavery is dealt with in the UK.

Summary: This bachelor thesis deals with the existence and the issues of contemporary slavery. Contemporary slavery is a term that includes the types of slavery that are present in modern society. For the last 20 years the term slavery has been reinvented in different ways and is now used by many large organisations such as the UN and the ILO, however it is not as discussed or acknowledged in most European countries. Due to this it is a very new and rather unresearched problem. Therefore, this Bachelor Thesis aims to examine contemporary slavery, and to ascertain what contemporary slavery is and how it needs to be dealt with. The thesis will be focused on an international, European and national level to bring a broad view of the issue. This means there is a UN focus, a EU and CoE focus as well as a UK focus, as the UK is exemplary in how contemporary slavery can be apprehended and dealt with on a national level. The thesis has three main areas that will be thoroughly examined to determine what contemporary slavery is and how it should be dealt with. First there is a conceptual analysis of the term contemporary slavery, to determine what the concept of contemporary slaver entails and includes. I come to the conclusion that the term contemporary slavery in its original setting, as created by the UN, is supposed to be very broad term to include all types of modern slavery. Secondly comes a historical overview of the issue in UK and the actual existence of contemporary slavery in the UK at present, where I conclude that the issue of slavery is more or less the same as it has always been but with a brand new label. Thirdly and lastly there is an overview of the legislations on UN, EU/CoE and UK level, where it is my assessment that both the UN and the UK are trying to handle the contemporary slavery in their own ways. It is my belief that the UK with its new Modern Slavery Act of 2015 really is doing splendidly in trying to apprehend the problems with contemporary slavery. In conclusion I find that the contemporary slavery is much more present issue in our modern society than most people believe and that the western-world needs to start trying their utmost in wiping out this awful injustice.

Details: Lund, Sweden: Lund University, Faculty of Law, 2015. 37p.

Source: Internet Resource: Thesis: Accessed June 10, 2017 at: https://lup.lub.lu.se/student-papers/search/publication/5431371

Year: 2015

Country: International

Keywords: Human Trafficking

Shelf Number: 146037


Author: Jewell, Lisa

Title: Models and Structures of Corrections and Police Training and Research Activities in Canadian and International Jurisdictions

Summary: This paper provides an overview of various models of training and research employed in the fields of policing and corrections. Jurisdictions, both within Canada and internationally (i.e., United States, United Kingdom, Ireland, and Australia), were scanned to determine current models of practice. In particular, information was sought about the governance structures of given training models; the timing, approach, and providers of basic/recruit training; and the nature of in-service/advanced training for mid-career professionals. With respect to research models, governance structures were examined, as well as specific areas of research focus, including whether there was any interrelationship between research and training. There are several instances where policing and corrections fall under the same ministry (at least in Canada); however, there was little indication of any coordination across police and corrections training and research, even within these ministries. Given this lack of overlap, the policing and corrections fields were examined independently. Further, it was necessary to separately consider training models in corrections for each of the following common professional groups: correctional officers, youth workers, and probation and parole officers. Given the breadth of information covered by this review, it primarily relied upon publically available documents identified through an Internet search. Therefore, the absence of certain characteristics with respect to a given jurisdiction's approach to police or corrections training and research does not necessarily mean these characteristics have not, in fact, been incorporated in their training or research models. A search of peer review and grey literature was used to enhance the information obtained from each jurisdiction.

Details: Saskatoon, SK: Centre for Forensic Behavioural Science and Justice Studies, University of Saskatchewan, 2013. 83p.

Source: Internet Resource: Accessed June 12, 2017 at: https://www.usask.ca/cfbsjs/research/pdf/research_reports/Models%20of%20Corrections%20and%20Police%20Training%20and%20Research%20March%2028-13.pdf

Year: 2013

Country: International

Keywords: Correctional Officer Training

Shelf Number: 146067


Author: Johns Hopkins School of Advanced International Studies

Title: Culture in Crisis: Preserving Cultural Heritage in Conflict Zones

Summary: There is nothing new about the looting and destruction of cultural property. The Roman Emperor Titus looted and then razed the Jewish temple in Jerusalem, Napoleon shipped art taken during his conquests back to the Louvre, the Nazis and Soviets emptied museums and private collections, their fellow Americans have looted Native American sites. Even in peacetime, monuments like the Elgin marbles and the Pergamon Altar have found their way into foreign hands, often claiming to provide protection. The monuments and works of art that remain intact and in place from prior civilizations are only those that happened to survive. Twenty-first-century technology has, however, changed the scale and quality of the looting and destruction. When the Islamic State took over a large part of Syria and Iraq in 2014, it organized a massive effort to loot artifacts that could be transported and destroyed what it could of the rest. The objective was two-fold: to demonstrate disdain for the culture that preceded Islam and to enrich the Islamic State's financial resources. Modern technology, including high explosives and earth-moving equipment, and global transportation networks made this possible on a scale not previously attempted. Many thousands of sites were looted and their artifacts sold into a world market, major monuments were destroyed, and many millions of dollars flowed into Islamic State coffers. This appalling contemporary evolution of an age-old practice has attracted a good deal of public attention in the United States, Europe, and beyond. The 2001 Taliban destruction of the Bamian Buddhas and the looting of the Baghdad Museum after the 2004 invasion had sensitized Europeans and Americans, but they were still unprepared for the systematic, high-profile destruction that the Islamic State indulges in. The desire to "do something" was immediate and compelling. What to do is far less clear. That was the issue the Antiquities Coalition raised in December 2015 with six master's students at the Johns Hopkins School of Advanced International Studies (SAIS) enrolled in a practicum on "cultural racketeering and cleansing." Antiquities Coalition wanted to know about best practices for law and law enforcement in the fight against the illicit antiquities trade, including what is done that works for nature conservation and historical preservation. Could easements or buying land be used to protect archaeological sites? How does the Convention on International Trade in Endangered Species (CITES) compare with the UNESCO Convention on the Means of Prohibiting and Preventing the Import, Export, and Transfer of Ownership of Cultural Property? How can the UNESCO Convention be improved and strengthened? For those of us who live and work in the U.S., American government policy is an area of particular concern. Through the use of bilateral agreements, the U.S. has imposed import restrictions on archaeological material from 16 countries, in an effort to reduce the incentive for pillage by discouraging trade in undocumented cultural objects. What effect have these memoranda of understanding had on the antiquities market? On imports into the U.S.? The U.S. has not designated a lead agency for combatting the illicit antiquities trade. Duties currently fall variously to the Departments of Homeland Security, Justice, State, Treasury, and others. How can the government develop an internal reporting structure to better address interagency coordination - especially as antiquities trafficking relates to terrorist financing? International peacekeeping forces, whether through the United Nations or other intergovernmental organizations like NATO, could do more to protect cultural resources in times of instability. Have archaeological sites, museums, or other heritage sites ever been included in a peacekeeping mandate? Are there parallels for the protection of natural resources or even similar economic resources? What is the process for inclusion? The SAIS students divvied up these issues and worked through the spring 2016 semester to elucidate them, with guidance from their Antiquities Coalition "client." This small volume contains the results of their work, which was presented both to the Antiquities Coalition and publicly at SAIS in April 2016. We plan some further work in spring 2017 on these and related issues, in a practicum devoted to the broader issue of "Dealing With Extremists." The already ongoing implosion of the Islamic State and its control of territory should not lull us into forgetting the cultural destruction it has wrought. We should do what we can to beef up efforts to counter cultural racketeering and cleansing. The trade will continue with objects already looted and no doubt grow with the next insurgent onslaught. "Never Again" is a motto all too often observed in the breach. There will be a next time. We need to be ready for it.

Details: Washington, DC: Johns Hopkins University; and The Antiquities Coalition, 2017. 150p.

Source: Internet Resource: Accessed June 14, 2017 at: http://media.wix.com/ugd/b976eb_fd1b6c924a3f4743897d6990327e99d1.pdf

Year: 2017

Country: International

Keywords: Antiquities

Shelf Number: 146167


Author: Higginson, Angela

Title: Youth gang violence and preventative measures in low- and middle-income countries: A systematic review (Part II)

Summary: Background Youth gang membership and the crime that it generates is a serious problem in lowa-nd middle-income countries, involving many thousands of young people and resulting in billions of dollars of crime, loss of life, and social disruption. This review assessed the evidence on preventive interventions that focus on increasing social capacity to reduce gang membership or rehabilitate gang members outside of the criminal justice system. Approach We conducted an extensive search of the published and unpublished academic literature, as well as government and non-government organization reports to identify studies assessing the effects of preventive youth gang interventions in low- and middle-income countries. We also included studies assessing the reasons for success or failure of such interventions and conducted a thematic synthesis of overarching themes identified across the studies. Results We did not identify any studies assessing the effect of preventive gang interventions in LMICs using an experimental or quasi-experimental design. Four studies evaluating the reasons for implementation success or failure were included. The limited number of studies included in the review suggests that the findings identified here should provide a direction for future research, rather than any substantive or generalizable claim to best practice. Specifically, the synthesis of reasons for implementation success or failure identified five factors that may be important for intervention design and implementation. Preventive gang interventions may be more likely to be successfully implemented when they include: - a range of program components that appeal to youth, - active engagement of youth, where their agency is embraced and leadership is offered, - programs that offer continuity of social ties outside of the gang, and -a focus on demobilization and reconciliation. Implications The lack of evidence prevents us from making any conclusions about which interventions are most effective in reducing youth involvement in gangs. To identify programs that work and those that do not researchers, practitioners and commissioners should begin to rigorously evaluate the effectiveness of preventive gang programs in the field.

Details: London: International Initiative for Impact Evaluation, 2016. 223p.

Source: Internet Resource: Systematic Review 30: Accessed June 16, 2017 at: http://www.3ieimpact.org/media/filer_public/2016/09/16/sr30-youth-gang-related-violence-part2.pdf

Year: 2016

Country: International

Keywords: Gang Violence

Shelf Number: 146192


Author: Lind, Jeremy

Title: Understanding and Tackling Violence Outside of Armed Conflict Settings

Summary: Understanding and tackling violence that occurs outside of armed conflict settings is essential to improving the well-being of some of the world's poorest communities. Whilst advances have been made in terms of designing policies that address violence in fragile or conflict-affected countries, progress has been slower in relation to dealing with violence happening outside of these settings. New forms of violence, such as organised crime and political instability, often arise in states which have undergone rapid economic growth and social transformation. These forms of violence are difficult to address because they are part of the very structures and processes that drive and shape development. Fresh approaches are required. They need to be driven by communities, civil society and young people, as well as the state and international donors. They must also be underpinned by a better understanding of how violence affects the poor and what works in terms of interventions.

Details: Brighton, UK: Institute of Development Studies, 2013. 4p.

Source: Policy Briefing Issue 37: Accessed June 16, 2017 at: https://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/2653/PB%2337_TacklingViolence_Web.pdf?sequence=1&utm_source=idswebsite&utm_medium=download&utm_campaign=opendocs

Year: 2013

Country: International

Keywords: Developing Countries

Shelf Number: 146199


Author: Bovarnick, Silvie

Title: Direct Work with Sexually Exploited or At Risk Children and Young People: A Rapid Evidence Assessment

Summary: This review is intended to provide Barnardo's with an overview of what 'direct work' with young people entails in the context of CSE. Part one explores the nature, types and contexts of direct work and gives an overview of the range of risks and vulnerabilities that direct work typically addresses. Part two focuses on the journey of direct work with young people in greater detail and outlines six core elements of direct interventions: 1. Engagement and relationship building 2. Support and stability 3. Providing advocacy 4. Reducing risks and building resilience 5. Addressing underlying issues 6. Enabling growth and moving on The discussion of each component is informed by what we know from research evidence to work in direct interventions with young people. We also give some practice examples to illustrate effective models of direct work. Part three provides a brief summary of the key features that underpin effective direct work with young people. Direct work with young people can entail a variety of activities with the general goal of 'enabling young people to live constructively and to develop and grow' (Aldgate and Simmonds 1988; Robson 2010). It can be undertaken one-to-one or involve group work and may take place in a project or clinic, a school or a young person's home. The majority of direct work involves face-to-face interaction between a young person and a worker but it can be conducted via SKYPE or other forms of virtual media. Duration of work may vary from a few weeks to a year or more. Much direct work with young people focuses on experiences of trauma, disruption, rejection and abandonment in their lives (Simmonds 1988; Scott and Skidmore 2006). At the therapeutic end of social work, there is a tradition of working with young people on their life histories in order to help them work through their feelings and understand the issues that may result from their life experiences. Such work often addresses trauma and attachment issues and may include working with a parent or foster carer as well as with the child. The majority of direct work is referral-based, with referrals coming from another agency, schools, parents/carers or through self-referral. Depending how much information is available at the point of referral, direct work typically starts with a comprehensive needs and risk (and occasionally a resilience) assessment (e.g. ASSETPlus; YJB 2014). There is usually a longer or shorter period of relationship building involving some informal contact. Following this engagement period, direct work is usually based on a verbal or written agreement between a young person, the service, and any others involved, that maps out a programme of work tailored to the young person's specific needs. Interventions can comprise psychosocial education and prevention work, safety work, advocacy and recovery/therapeutic work - with different kinds of input sometimes provided by different agencies or by different professionals. For instance, youth workers may deliver socio-educative direct work in informal settings while structured, therapeutic work is more often undertaken by mental health or counselling services

Details: London: Barnardo's, 2017. 59p.

Source: Internet Resource: Accessed June 16, 2017 at: http://www.barnardos.org.uk/work_with_exploitated_or_at_risk_rea.pdf

Year: 2017

Country: International

Keywords: At-risk Youth

Shelf Number: 146205


Author: Bullock, Karen

Title: The Police Service, Diversity and Organisational Outcomes: A Report of a Systematic Review

Summary: The recruitment to police forces of Black and Minority Ethnic (BME) persons as police officers and police staff is widely regarded as a means of improving police/public relations. Guided by the acronym 'EMMIE', this Systematic Review set out to (i) examine the evidence that BME recruitment is Effective in respect of having beneficial effects on arrest rates, crime rates, and public satisfaction with police; (ii) identify the key Mechanisms through which BME recruitment is expected to render these benefits and the conditions that Moderate the effectiveness of such recruitment; and (iii) summarise information relevant to the Implementation and Economic costs of BME recruitment. Following a systematic search of the published and unpublished literature, eleven studies were identified that satisfied our inclusion criteria. Seven studies related to crime rates and arrests, and four studies related to public satisfaction. All of the studies reported research done in the USA and some were dated. The heterogeneity of the studies and the reported outcome measures precluded a meta-analysis. Based on the available evidence it is difficult to determine the effectiveness of BME recruitment either on crime or on public satisfaction but it is possible to say that the testimony of the included studies suggests that BME recruitment does not worsen arrest or crime rates or negatively influence public satisfaction with police. The included studies did not include high-quality economic evaluations of BME recruitment. The implications of our findings, and suggestions for future research, are discussed.

Details: London: College of Policing, What Works Centre for Crime Reduction, 2017. 82p.

Source: Internet Resource: WHAT WORKS: CRIME REDUCTION SYSTEMATIC REVIEW SERIES, no. 12: Accessed June 16, 2017 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Documents/Diversity_SR.pdf

Year: 2017

Country: International

Keywords: Diversity in Policing

Shelf Number: 146215


Author: Orton, Kyle

Title: Foreign Terrorist Attacks By The Islamic State, 2002-2016

Summary: Terrorist attacks by the Islamic State (IS) around the world have, since IS established its "caliphate" in Iraq and Syria in June 2014, become an increasingly regular feature of the international news landscape. But IS began its efforts to conduct foreign attacks before that, with several plots discovered earlier in 2014, and a trail of violence in Europe and beyond back to 2002, when IS had entered Iraq and the United States had not. IS's attacks fall into several categories in relation to the strength of their connection to the organisation headquartered in Raqqa. Some attacks are wholly controlled by IS: conceived by IS's leaders and carried out by operatives trained in its statelet, operating with IS funding, under its express, specific instructions, and maintaining regular contact to the "centre". At the other end of the spectrum are individuals who act wholly alone, inspired by IS's calls for Westerners and others to attack the citizens of states not under IS's rule. Between these two is a spectrum. This report documents 152 attacks and evidence is available to categorize 145 of these attacks. 106 attacks (73%) were linked directly to the IS organisation, 17 attacks (12%) were carried out by small cells or larger networks of operatives loyal to IS's ideology and strategic programme as expressed by its caliph and spokesmen, and just 22 attacks (15%) were conducted by lone, "inspired" individuals - the much-feared "lone wolves". Many recent attacks in the West and other countries that appear to be the work of individuals are increasingly often transpiring, on examination, to be guided by IS's foreign intelligence service, Amn al-Kharji. This body, which at one time helped IS expand by infiltrating and subverting areas of Iraq and Syria before IS formally conquered them, now operates an online apparatus, through encrypted messaging software and other means, to train and guide loyalists, allowing IS to reach into its enemies' societies to carry out acts of terrorism by remote control. It is crucial in devising counter-terrorism strategies to understand that these attacks are the work of a determined foreign adversary, rather than self-radicalized loners, not least because one of the premises built into the current anti-IS policy is that the fall of its caliphate will diminish its external reach. The political developments inside Iraq and Syria give little reason to believe this is true. The ground war and IS's foreign appeal are now largely separate phenomena. IS will be able to operate its online infrastructure and maintain a global support base long after its statelet is destroyed.

Details: London: Henry Jackson Society, 2017. 56p.

Source: Internet Resource: Accessed June 16, 2017 at: http://henryjacksonsociety.org/wp-content/uploads/2017/03/FINAL-Foreign-Terrorist-Attacks-Paper.pdf

Year: 2017

Country: International

Keywords: Lone Wolf Terrorism

Shelf Number: 146216


Author: Blitza, Dimitra

Title: Criminal Records and Immigration: Comparing the United States and the European Union

Summary: As the revolution in information technology has made individual criminal history records more comprehensive, efficient and retrievable, an individual's criminal history has become increasingly significant, triggering a broad and severe range of collateral consequences. There is no better example of this phenomenon than immigration law and policy, where developments in data storage and retrieval converge with opposition to immigration, especially to immigrants who bear a criminal stigma. In debates in the United States over immigration reforms, even those politicians and legislators who advocate more liberal immigration policies generally concede the desirability of excluding those with serious criminal records from eligibility for new benefits or status. In the European Union, by contrast, although a criminal record may impact an individual's ability to travel to or reside in a European Union country, it is not as readily dispositive of immigration outcomes. As immigration policy evolves on both sides of the Atlantic, a key question for policymakers is about whether we screen for criminal records in order to protect the public safety or as a way to mark those with criminal records as somehow less deserving of immigration rights and benefits. This article details and compares the ways that the United States and the European Union use criminal records (including both conviction records and, in the U.S., some arrest records) for immigration purposes. The article also outlines guidance for policymakers in both jurisdictions.

Details: New York: New York University School of Law, 2015. 41p.

Source: Internet Resource: NYU School of Law, Public Law Research Paper No. 15-59: Accessed June 17, 2017 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2700688

Year: 2015

Country: International

Keywords: Criminal Records

Shelf Number: 146228


Author: Zeiger, Sara

Title: Disengagement and De-radicalization

Summary: The contents of this brief are based on the discussions that occurred from 3-4 November at an expert workshop on Research Trends in Countering Violent Extremism hosted by Hedayah in Abu Dhabi, United Arab Emirates. The purpose of this 2-day expert roundtable was to bring together 20-25 researchers, policymakers and practitioners in a closed discussion of the current trends in CVE research. The goals at the meeting were to 1) address the current research outcomes in countering violent extremism; 2) determine the critical gaps in research on CVE; 3) identify the new and emerging threats of violent extremism; and 4) establish a recommended research agenda for Hedayah and CVE researchers in the coming 2 years. In preparation for the meeting, Hedayah worked with Curtin University to map the existing CVE literature and assess the CVE research landscape across four themes: 1) social media and CVE, 2) education and CVE, 3) narratives of victims, survivors and formers for CVE, and 4) Disengagement and De-radicalization.11 Meeting attendees utilized this literature review as a baseline for the discussions. Participants were also invited to prepare short research proposals prior to the meeting for review and discussion by other participants. In addition to the discussions that occurred at the expert workshop on Research Trends in Countering Violent Extremism, this brief also draws from findings of the literature review conducted by Hedayah and Curtin University, the research proposals that were submitted by the participants, and independent research conducted by the author

Details: Abu Dhabi, United Arab Emirates: Hedayah Center, 2014. 6p.

Source: Internet Resource: CVE Research Brief 1: Accessed June 17, 2017 at: http://www.hedayahcenter.org/Admin/Content/File-23201693446.pdf

Year: 2014

Country: International

Keywords: De-radicalization

Shelf Number: 146239


Author: Amnesty International

Title: Death Sentences and Executions 2016

Summary: Amnesty International recorded more than 1,000 executions around the world in 2016. While this figure represented a reduction from 2015 - a year in which the organization logged a historical spike - more than 3,000 death sentences were imposed in 2016, an increase on the figure recorded for the previous year. Two countries - Benin and Nauru - abolished the death penalty for all crimes, while Guinea abolished it for ordinary crimes. In the Middle East and North Africa, the number of executions recorded decreased by 28%, but Iran and Saudi Arabia remained among the world's top executioners. In Asia-Pacific, the number of known executions decreased, mostly due to a significant reduction in Pakistan. China was once again the world's lead executioner but figures remained classified as a state secret. The number of recorded death sentences in the Asia-Pacific region rose significantly, while new information which came to light in China, Malaysia and Viet Nam painted an alarming picture of the extensive resort to the death penalty in these countries. In Sub-Saharan Africa, there were fewer executions recorded; however the number of death sentences logged rose by 145%, largely due to a steep rise in Nigeria. The USA remained the only country to carry out executions in the Americas region, for the 8th consecutive year. However, the number of executions and death sentences continued to decrease. Two Caribbean countries - Antigua and Barbuda and Bahamas - commuted their last remaining death sentences. In Europe and Central Asia, Belarus resumed executions after a 17-month hiatus. Belarus and Kazakhstan were the only two countries in the region to use the death penalty. Amnesty International opposes the death penalty in all cases without exception, regardless of the nature or the circumstances of the crime; guilt, innocence or other characteristics of the individual; or the method used by the state to carry out the execution.

Details: London: AE, 2017. 54p.

Source: Internet Resource: Accessed June 17, 2017 at: https://www.amnesty.org/en/latest/research/2016/04/death-sentences-executions-2015/

Year: 2017

Country: International

Keywords: Capital Punishment

Shelf Number: 146241


Author: Higginson, Angela

Title: Youth gang violence and preventative measures in low- and middle-income countries: A systematic review (Part I)

Summary: Youth gang membership is well documented throughout low- and middle-income countries, and youth gang members are increasingly associated with delinquency, violent crime and trafficking. They are also frequently the victims of these offences, often in disproportionate numbers compared to non-gang youth. Yet youth gangs can also provide a form of social capital, a sense of belonging and purpose to disenfranchised youth. Extensive research, primarily from high-income countries, has categorized five domains of risk and protective factors for youth gang involvement, drawn from the realm of developmental psychology. These domains are: Individual, Peer, Family, School, and Community. Youth gang membership is seen as the culmination of interrelated structural and process factors, which in combination with negative life events may increase the attractiveness of gang membership. This review aimed to identify the factors associated with young people joining gangs, and to identify and quantify the differences between gang-involved and non-gang-involved youth. Understanding these associations is essential to reduce the levels of gang membership and the incidence of related violence. Objectives This review addresses two key objectives: (1) to synthesise the published and unpublished empirical evidence on the factors associated with membership of youth gangs in low- and middle-income countries; (2) to assess the relative strength of the different factors across the domains of individual, family, school, peer group and community.

Details: London: International Initiative for Impact Evaluation, 2016. 151p.

Source: Internet Resource: Systematic Review 29: Accessed June 17, 2017 at: http://www.3ieimpact.org/media/filer_public/2016/09/15/sr29-youth-gang-related-violence-part1.pdf

Year: 2016

Country: International

Keywords: Gang Violence

Shelf Number: 146254


Author: Herbert, Sian

Title: Targeting groups at risk of extremism through security and justice programming

Summary: What evidence is there that security and justice programming (by DFID or other donors) targets specific groups (populations and victims) at risk of extremism and how has the impact been measured? Contents 1. Overview 2. Countering violent extremism practitioners 3. General approaches to countering violent extremism 4. Targeting of groups at risk in countering violent extremism 5. Examples of donor approaches 6. References

Details: Birmingham, UK: GSDRC, University of Birmingham, 2014. 11p.

Source: Internet Resource: Accessed June 19, 2017 at: http://www.gsdrc.org/docs/open/hdq1166.pdf

Year: 2014

Country: International

Keywords: Counter-Extremism

Shelf Number: 146273


Author: Beres, Melanie

Title: Preventing adolescent relationship abuse and promoting healthy relationships

Summary: Key messages Violence and abuse in adolescent relationships are serious problems in New Zealand and internationally. These issues do not receive the same level of attention as violence in adult relationships. Adolescence is a key time to intervene and to support young people to build healthy relationship skills. Psychological and emotional abuse are the most common forms of violence. These are sometimes left out of intervention and prevention programmes. More focus on issues of power and control, including emotional and psychological abuse are warranted. Gender transformative approaches that challenge dominant gender norms are key to successful prevention programmes. International evidence about successful and unsuccessful programmes is available and should be used to guide development and implementation of prevention and intervention strategies. Indigenous programmes also need to be developed that are grounded in Te Ao Maori. Intervention and prevention programmes must be developed in collaboration with members of communities within which the programmes are implemented, including ethnic minority and LGBTIQ communities. Successful programmes engage with community members and understand their needs and perspectives. Well-trained and skilled facilitators are just as important as programme content. Strong and knowledgeable facilitators are needed to be able to work from an evidence-base, and still tailor the work they do to the different groups they work with. Workforce capacity building is needed to grow and support more people to develop these skills. School-based curricula are important, but it is also important to think more broadly about developing community-based programmes.

Details: Auckland, NZ: New Zealand Family Violence Clearinghouse, 2017. 22p.

Source: Internet Resource: Issues Paper 12: Accessed June 20, 2017 at: https://nzfvc.org.nz/issues-paper-12-preventing-adolescent-relationship-abuse

Year: 2017

Country: International

Keywords: Adolescents

Shelf Number: 146311


Author: Glazzard, Andrew

Title: Losing the Plot: Narrative, Counter-Narrative and Violent Extremism

Summary: Counter-terrorist practitioners and policy makers appear to be very interested in narrative. They often describe the worldview of violent Islamist groups and movements as the 'jihadi narrative', while their efforts to confront terrorist propaganda are usually labelled as 'counter-narrative' or 'alternative narrative'. However, while the counter-narrative approach has gained widespread acceptance in governments, think-tanks and civil society organisations, it is built on very shaky theoretical and empirical foundations. Some valuable theoretical contributions to the study of violent extremist narrative have been made by psychologists in particular, but there is one discipline which is conspicuous by its absence from the field: literary studies. This paper makes a case for the value of studying violent extremist narratives as narratives in the literary sense. By employing the tools and techniques of literary criticism, violent extremist communication can be revealed as not only potentially persuasive, but also creative and aesthetically appealing: terrorists inspire their followers, they don't merely persuade them. Understanding the creative sources of this inspiration is vital if counter-narrative is to succeed in presenting an alternative to the propaganda of violent extremist groups.

Details: The Hague: International Centre for Counter-Terrorism, 2017. 20p.

Source: Internet Resource: ICCT Research Paper: Accessed June 20, 2017 at: https://icct.nl/wp-content/uploads/2017/05/ICCT-Glazzard-Losing-the-Plot-May-2017.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 146315


Author: CNDH Mexico

Title: Going Straight: Criminal Spoilers, Gang Truces and Negotiated Transitions to Lawful Order

Summary: Key research questions This paper considers the role of negotiation in contexts where crime and conflict intersect. It examines negotiations between State actors and more traditional armed groups with criminal agendas as well as non-traditional negotiations involving State actors and criminal gangs (e.g. gang truces). The paper produces insights on the conditions that facilitate and spoil negotiated agreements where criminal agendas are involved and provides options for negotiators and mediators to consider when dealing with criminal agendas. It seeks to address the following set of questions: - How do criminal agendas impact negotiations aimed at bringing an end to violence and/or conflict? - How does the presence of criminal agendas impact the inducement strategies in these contexts? What factors and impediments do mediators need to be cognizant of when developing inducement strategies when criminal agendas are present? - What conditions and support structures should be in place to ensure success in negotiating an end to violence and conflict when criminal agendas are present? - What is the role (or should be the role) of international actors in fostering successful negotiations that bring about an end to violence and conflict where criminal agendas are present? Key recommendations The paper argues that armed groups with criminal agendas are a specific kind of "greedy spoiler" that take as much as they can from the negotiations processes, including through stealthily subverting them from the inside. While short-term inducement strategies might be successful in inducing such criminal spoilers to transition to the lawful order, the paper argues that reintegrating them will require a process of social construction and normative change ("socialization"). To do so, it puts forward four parallel programming strategies: - Building and keeping community support: the controversial nature of negotiations with armed groups possessing criminal agendas highlights the need to manage the community's understanding and expectations of the process through sequenced and inclusive trust-building and localized interventions that rely on the influence of insider mediators. Providing credible security guarantees and safe space for actors participating in negotiations and managing community perceptions through strategic messaging is also paramount. - Targeted socio-economic programming: from cognitive behavioral therapy (CBT) to vocational training, mentoring school-based programmes, family-based programmes, and after-care programming, evidence points to a series of intervention packages that can prove to be a high value-for-money strategy, especially when they are combined with careful data gathering and monitoring. - Deterrence and truth-telling: while coercion is not a sufficient solution, evidence shows that it is a necessary component of larger socialization efforts and most likely to succeed when combined with amnesties and negotiated settlements. - A coherent and capable institutional framework: successful socialization efforts are usually characterized by coherent and capable institutional frameworks, such as multi-stakeholder steering groups, which create legitimacy and help build trust among groups with criminal agendas and communities.

Details: Tokyo: United Nations University Centre for Policy Research, 2017. 22p.

Source: Internet Resource: Crime-Conflict Nexus Series: No 5: Accessed June 20, 2017 at: https://i.unu.edu/media/cpr.unu.edu/post/2475/Going-Straight-Criminal-Spoilers-Gang-Truces-and-Negotiated-Transitions-to-Lawful-Order.pdf

Year: 2017

Country: International

Keywords: Crime-Conflict Nexus

Shelf Number: 146317


Author: Felbab-Brown, Vanda

Title: The Hellish Road to Good Intentions: How to Break Political-Criminal Alliances in Contexts of Transition

Summary: In "The Hellish Road to Good Intentions," a detailed report published by the United Nations University Centre for Policy Research's Crime-Conflict Nexus Series in April 2017, Vanda Felbab-Brown provides policy prescriptions for how to act against illicit economies and organized crime during conflict and in the post-conflict phase, challenging much of the existing conventional wisdom on that matter. Acting against illicit economies and against predatory criminality need to be understood as profoundly political efforts, not as merely technical interventions and assistance to strengthen institutions and civil society. They are projects in reorganizing local political arrangements. Although illicit economies and organized crime pose many threats to states and societies, they can also reinforce regime survival; and laissez faire policies toward the illicit economies and criminal groups can in some circumstances mitigate conflict. Inappropriate measures toward illegal economies and organized crime, with wrong sequencing, prioritization, and emphasis - such as suppressing labor-intensive illicit economies which are providing plentiful jobs to otherwise impoverished populations; or cracking down on transactional crimes instead of predatory crimes - can compound conflict dynamics, complicate transitions from war to peace, and weaken state-building efforts. The need to differentiate labor-intensive and non-labor-intensive illicit economies and transactional crimes from predatory crimes is a central theme of this analysis. The international community in its anti-crime suppression efforts often focuses on transactional crimes like illegal drug cultivation and trafficking for a variety of reasons, including their transnational aspect and international visibility. Yet in the absence of legal livelihoods being provided, such as, for the poppy drug farmers in Afghanistan and Burma, suppression of the illegal activity often complicates conflict mitigation policies. This is particularly the case in the context of labor-intensive illicit economies. Under such circumstances, the sponsorship of illicit economies provides armed actors, such as insurgent groups, with political capital. Meanwhile, predatory criminality, less visible abroad and at least in the short-term localized in its impacts, tends to delegitimize governments and political systems that cannot control it. Especially in post-conflict or regime transition settings, it often discredits the new political order and can fuel conflict dynamics. It can thus also critically jeopardize international state-building and reconstruction assistance efforts. Yet the international community has paid far less attention to combatting predatory criminality in post-conflict countries and in some cases, such as in Afghanistan, severely magnified its deleterious effects by embracing and empowering powerbrokers deeply implicated in such predatory criminality. The report provides a detailed set of recommendations, including: Taking advantage of early windows of opportunity; Prioritizing disrupting the dangerous networks, such as those with the greatest links to international terrorist groups with global reach, those that are most rapacious and detrimental to society and the development of an equitable state, and those that most concentrate rents from illicit economies to a narrow clique; Limiting the role of warlords and their militias and criminal powerbrokers; Adopting a prioritized sequential approach against predatory criminality, pernicious powerbrokers, and corruption; Strengthening institutions and supporting civil society; Prioritizing measures against predatory criminality and non-labor-intensive illicit economies; Improving governance and reducing corruption; Cultivating robust local knowledge and intelligence; Emphasizing sustained engagement and oversight; Conditioning economic aid with sustainability in mind; Sticking to redlines and being specific about conditionality; and Thinking through second and third order effects.

Details: Tokyo: United Nations University Centre for Policy Research, 2017. 9p.

Source: Internet Resource: Crime-Conflict Nexus Series: No 7: Accessed June 20, 2017 at: https://www.brookings.edu/wp-content/uploads/2017/05/the-hellish-road-to-good-intentions-how-to-break-political-criminal-alliances-in-contexts-of-transition.pdf

Year: 2017

Country: International

Keywords: Crime-Conflict Nexus

Shelf Number: 146318


Author: Vidino, Lorenzo

Title: Fear Thy Neighbor: Radicalization and Jihadist Attacks in the West

Summary: "What is coming is tougher and worse for the worshippers of the Cross and their helpers", the so-called Islamic State declared in its statement taking credit for the May 22, 2017 bombing of a crowded Manchester, England arena. Among the victims were scores of children and their parents - callously derided in the IS claim as "polytheists" and "Crusaders" attending "a profligate concert". Seven children perished, including an eight-year-old girl. It is worthwhile to recall that only a few years ago the end of terrorism was being heralded with the killing of bin Laden and advent of the Arab Spring. As one pundit then reassuringly pleaded, "So, can we all take a deep breath, stop cowering in fear of an impending caliphate, and put [the] problem of Islamic terrorism in perspective?". Today, there is indeed a very different perspective on this ongoing and, as some analysts believe, worsening threat: shaped not only by this most recent tragedy but by the events of the past two years that have seen a succession of attacks linked to IS convulse the West. Within the span of four weeks last summer, for instance, persons pledging or professing some allegiance to the IS were responsible for four terrorist incidents in three European countries that claimed the lives of more than 120 persons. It is too soon to tell whether the Manchester attack will prove to be a harbinger of another summer of tragedy and terrorism. But we now fortunately have a better understanding of this campaign along with an ability to anticipate the future evolution of the jihadist terrorist threat to the West as a result of the publication of Fear Thy Neighbor. Written by Lorenzo Vidino, Francesco Marone and Eva Entenmann, this report sheds important light on the historical record and characteristics of jihadist attacks against the West between 2014 and 2017. Among the study's most revealing findings is the United States' own prominence in this pantheon of Islamist terrorist attacks in the West as the country targeted most frequently after France - and with the second highest number of casualties. The report also incisively assesses the role of women and persons with criminal backgrounds in this campaign; the involvement of converts; and, most importantly the exact nature and dimensions of the ties between the attackers and the IS. The emergence of "radicalization hubs" in abetting or facilitating these heinous acts of violence is perhaps this work's single most important conclusion. Fear Thy Neighbor is an invaluable resource that will be of great use to scholars, students, governmental agencies, non-governmental and community organizations, and the media. It presents a sober and compelling depiction of this threat and the measures needed to counter it.

Details: Milano, IT, Ledizioni LediPublishing, 2017. 108p.

Source: Internet Resource: Accessed June 21, 2017 at: https://icct.nl/wp-content/uploads/2017/06/FearThyNeighbor-RadicalizationandJihadistAttacksintheWest.pdf

Year: 2017

Country: International

Keywords: Counter-Radicalization

Shelf Number: 146333


Author: National Intelligence Council

Title: Global Implications of Illegal, Unreported, and Unregulated (IUU) Fishing

Summary: Global fisheries face an existential threat in the decades ahead from surging worldwide demand, declining ocean health, and continued illegal, unreported, and unregulated (IUU) fishing. IUU fishing also harms legitimate fishing activities and livelihoods, jeopardizes food and economic security, benefits transnational crime, distorts markets, contributes to human trafficking, and undermines ongoing efforts to implement sustainable fisheries policies. It can also heighten tensions within and between countries and encourage piracy. The illicit nature of IUU fishing means that the size of the problem and its negative consequences, can only be roughly estimated.

Details: Washington, DC: The Council, 2016. 21p.

Source: Internet Resource: Accessed June 21, 2017 at: https://fas.org/irp/nic/fishing.pdf

Year: 2016

Country: International

Keywords: Fishing Industry

Shelf Number: 146337


Author: Hayes, Ben

Title: The impact of international counter-terrorism on civil society organisations: Understanding the role of the Financial Action Task Force

Summary: This report examines the impact of international counterterrorism frameworks on the work of civil society organisations. In particular, it explains the role of the Financial Action Task Force in setting international standards that affect the way in which civil society organisations are regulated by nation-states, their access to financial services, and their obligations to avoid proscribed organisations and other entities deemed to pose a 'terrorism' risk. The introduction to the report frames these developments in the context of the 'shrinking space' of civil society organisations. This narrative describes a new generation of restrictions and attacks on the legitimacy and actions of non-profits and social justice organisations. Chapter two introduces the counterterrorism frameworks that have most affected civil society. This includes UN Security Council measures on combating terrorism, the new international CVE (Countering Violent Extremism) agenda, the FATF's counterterrorist financing requirements, and the EU's development and implementation of these measures. Chapter three examines the worldwide proliferation of restrictive civil society laws and their relationship to the FATF's recommendations on the regulation of the non-profit sector. It draws on existing research showing how these have been used as a vehicle for the imposition of restrictive legislation across the globe, and augments this discourse with new evidence, examples and case studies. It also considers the prospects for reform, and the potential for the FATF to engage proactively in preventing further restrictions. Chapter four addresses a relatively newer phenomenon: the financial exclusion of civil society organisations and resulting from the 'due diligence' obligations mandated by the FATF. Driven by ever-tighter demands on financial institutions to scrutinise their customers for links to terrorism, crime and corruption - and underscored by substantial fines for failures due diligence - banks and intermediaries are cutting ties with non-profits and refusing to process "suspicious" cross-border transactions. This is a process that economists have termed 'de-risking'. While more research is needed, examples show how financial exclusion can fundamentally compromise the ability of affected non-profits to implement their programmes and fulfil their mandates. Chapter five examines the impact of terrorist 'blacklisting' and sanctions regimes more widely on activities such as peacebuilding and the provision of humanitarian assistance. It shows how the rigid interpretation of states' obligations by the FATF is exacerbating what have become often intractable problems for conflict resolutions organisations and NGOs working at close proximity to conflict zones or 'suspect communities'. The report draws three main conclusions. First, without fundamental reform to the FATF's non-profit sector recommendations, the proliferation and legitimisation of restrictive counterterrorism laws is likely to continue unabated. Second, the FATF is undermining international law by directly promoting laws that contravene states' human rights obligations, even where the draft laws have been criticised by UN mandate holders. Third, a rights-based approach to financial services in which the onus is on the banks and regulators to service non-profits and process transactions is the only way to address this particular problem of de-risking. The report makes 11 recommendations to civil society organisations, national and regional parliamentary committees, national governments and the FATF. It also encourages civil society organisations concerned about the developments described in this report to join the international coalition of organisations established to engage with the FATF and create and 'enabling environment' for civil society.

Details: Berlin: Bread for the World - Protestant Development Service Protestant Agency for Diakonie and Development, 52p.

Source: Internet Resource: Analysis 68: Accessed June 24, 2017 at: https://www.brot-fuer-die-welt.de/fileadmin/mediapool/2_Downloads/Fachinformationen/Analyse/Analysis_68_The_impact_of_international_counterterrorism_on_CSOs.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 146364


Author: Overton, Iain, ed.

Title: Addressing the Threat Posed by IEDS: National, Regional and Global Initiatives

Summary: This report seeks to respond to the threat posed by IEDs (Improvised Explosive Devices) by investigating the C-IED (Counter-IED) initiatives that are being conducted around the world. We specifically focus on three of the most-impacted regions: the Middle East, North Africa and the Sahel. The paper also identifies Afghanistan, Kenya, Somalia and Pakistan as four additional countries that are highly impacted by IEDs and therefore warrant examination. The research was conducted over ten months and examined 39 countries in total. 227 actors engaged in C-IED throughout the regions are included in the report, whilst over 300 were examined globally in total during the course of this research. This makes this report the largest study of C-IED actors in these regions. Our research finds that C-IED initiatives vary greatly from country to country. Not only were the typical 'destroy the device', 'train the force' and 'attack the network' approaches found, but efforts that fall under the banner of counterterrorism, demining and Explosive Ordinance Disposal (EOD) featured as well. Such efforts have the ability to greatly reduce IED usage, as well as serving to disrupt the networks that use them, and consequently were essential to incorporate. As part of this research, questionnaires were sent out to actors within the C-IED field. Phone interviews were also conducted in order to understand the role of the various actors in the field and the situation in the countries in which they operate. Through the responses received, key challenges to C-IED operations were identified. These include inadequate resources, lack of awareness, lack of victim assistance programmes, and a general resistance to information sharing. The IED threat and C-IED work in these regions were examined country-by-country. The national, bilateral, regional, and international C-IED initiatives that the state was involved in, or that were seen to be operating in the state, were assessed, as well as the NGOs and private actors working on such operations in the countries. The research conducted on C-IED capacity in the Middle East showed that, whilst many of the states had received training focused on military and law enforcement, many were under-resourced. This effectively means that many states lack the equipment to adequately tackle their respective IED threat. For less-impacted states in the region, border security was understandably a top priority. Efforts to implement better border security often focused on a person-centric approach, which left customs vulnerable and allowed dual-use materials (such as fertiliser) to end up more easily in IEDs. Similarly, North Africa's C-IED efforts predominantly focused on military-based initiatives, whilst also leaving countries too under-resourced to carry out C-IED effectively. Unlike many other regions, there were some initiatives working on psychological victim assistance, an area of C-IED which often remains ignored. Other preventative measures such as terrorism financing and investigations were found to need more assistance in North Africa. Countries in the Sahel region seem to be heavily reliant on external assistance from other nation states, international actors and NGOs. However, Sahelian states also, in general, seem to embrace support and utilise resources that other regions did not. For example, they were more welcoming of assistance from neighbour states and better at integrating C-IED strategies into communities than countries in the other regions examined. The last group of nations examined included highly impacted states. Some of these nations have been impacted by IEDs for a long time, such as Pakistan and Afghanistan. Cooperation is essential between these states to prevent the use of the weapons in both countries. Knowing this, Afghanistan has been a strong advocate for cooperative techniques to tackle IED harm, not just in relation to the national problem but also on the international stage. In Kenya and Somalia, as in Afghanistan and Pakistan, the IED threat is one that needs a trans-border cooperative effort as the threat chiefly stems from al-Shabaab cells in both states. However, it is clear that Kenya has far greater capacity to combat IEDs on their side of border. Kenya also provides assistance to Somalia through the African Union's military mission in Somalia, AMISOM. After examining the various countries and regions, this report explores some of the leading regional C-IED initiatives, including regional military efforts (such as the Multinational Joint Task Force) as well as data collection and information sharing efforts. Regional efforts also sought to build regional capacity through training and cooperation. This section draws upon some of the initiatives already partially explored within the nationally focused section. Lastly, this report reflects on the C-IED progress made on the global stage. Emphasis is initially placed on UN initiatives due to the recent successes of these programmes. Other initiatives of importance are also reflected upon to reveal the steps taken to generate a more rounded approach, highlighting the success of some of these initiatives, as well as emphasising where challenges remain. Information sharing is identified as one such area. In conclusion, there are still many challenges that need to be addressed in the battle to combat the rising tide of IEDs. These include the provision of resources and equipment, victim assistance and information sharing. The report, to support this need, highlights past successes that might give insight on how to best meet these challenges. The paper also draws on the expertise of influential C-IED actors, and notes that many see greater information sharing as an important leap to be taken, as has been acknowledged throughout the report. The conclusion also recognises passages of progress where C-IED initiatives are building on lessons learnt to reinvigorate C-IED efforts internationally.

Details: London: Action on Armed Violence, 2017. 65p.

Source: Internet Resource: Accessed June 24, 2017 at: https://aoav.org.uk/wp-content/uploads/2017/04/Addressing-the-threat-posed-by-IEDs.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 146365


Author: Scalabrini Migration Study Centers

Title: International Migration Policy Report: Responsibility Sharing for Large Movements of Refugees and Migrants in Need of Protection

Summary: The 2017 International Migration Policy Report is the first in an expected series of annual reports on international migration policy and refugee protection by the global network of think tanks or study centers founded by the Congregation of the Missionaries of St. Charles - Scalabrinians. These institutions are members of the Scalabrini International Migration Network (SIMN). The Scalabrini migration study centers consist of the Center for Migration Studies of New York (CMS) in the United States, the Scalabrini Migration Center (SMC) in the Philippines, the Scalabrini Institute for Human Mobility in Africa (SIHMA) in South Africa, the Centro de Estudios Migratorios Latinoamericanos (CEMLA) in Argentina, the Centro de Estudios Migratorios (CEM) in Brazil, the Centre d'Information et d'Etudes sur les Migrations Internationales (CIEMI) in France, and the Centro Studi Emigrazione Roma (CSER) in Italy. The purpose of these reports will be to focus on pressing global migration and refugee protection challenges in all parts of the world and to offer policy suggestions to address them. The inaugural issue will focus on global responsibility sharing for large movements of refugees and migrants, a timely issue given the recent adoption of the New York Declaration on the Large Movement of Refugees and Migrants at the United Nations. This report also considers some of the issues which should be addressed during the deliberations on the Global Compact on Responsibility Sharing for Refugees and the Global Compact on Safe, Orderly, and Regular Migration. In his address to the members of the diplomatic corps accredited to the Holy See in January of 2016, His Holiness Pope Francis spoke of the connectedness between nations and how the global migration crisis can be solved only through the collaboration of the entire international community. "As things presently stand," the Holy Father said, "there is no place for autonomous solutions pursued by individual states, since the consequences of the decisions made by each inevitably have repercussions on the entire international community. Indeed, migrations, more than ever before, will play a pivotal role in the future of our world, and our response can only be the fruit of a common effort respectful of human dignity and the rights of persons." The 2017 International Migration Policy Report by the Scalabrini migration study centers explores the degree to which nations make "common effort" to address large movements of migrants and refugees around the world and recommends how they can collaborate more effectively. The papers in this volume are produced by Scalabrini study centers in Buenos Aires, Argentina; Cape Town, South Africa; Manila, Philippines; New York City, United States; Paris, France; Rome, Italy; and Sao Paulo, Brazil. They highlight and analyze large movements of refugees and migrants in their parts of the world: Africa, Asia, Europe, Latin America, and North America. They offer comprehensive policy responses to each of these movements, consistent with the protection of human rights and Catholic teaching. In his paper, Rohingyas: The People For Whom No One Is Responsible, Graziano Battistellia, c.s., executive director of SMC in Quezon City, Philippines, examines the plight of the Rohingya minority ethnic group in Myanmar, which has been persecuted over several decades by the Myanmar government and other actors. The paper provides a historic overview of the conflict in the region between the Rakhine and the Rohingya in Rahkine State, the long-standing patterns of discrimination against the Rohingya, and recent outflows of Rohingya from the region. It also critiques the global response to the outflows and the neglect which drives it. Finally, the author identifies the issues both in Rakhine State and internationally that should be addressed and offers policy suggestions to this ongoing humanitarian crisis based on a responsibility sharing model. Sergio Carciotto and Aquilina Mawadza of SIHMA in Cape Town, South Africa, address the humanitarian situation in South Sudan in their paper, South Sudan: A Young Country Divided by Civil War. The refugee crisis generated by the civil war is one of the most challenging on the African continent, according to the authors, with more than 1.6 million internally displaced and close to one million Sudanese refugees in neighboring countries, such as Ethiopia, Kenya, Uganda, the Democratic Republic of Congo, and the Central African Republic. More than 70 percent of the refugees are children. The authors trace the history of the conflict, which began in December 2013, examine the refugee population it has produced, analyze the regional and international response to the humanitarian crisis, and offer recommendations for action and the need for responsibility sharing among the global community. In their paper, Politics and Responsibility Sharing in Facing the Migration Crisis in Europe, Luca Marin of CIEMI in Paris, Fr. Aldo Skoda Pashkja, executive director, and Carola Perillo, research director, of the CSER of Rome, and Mattia Vitiello, researcher of the Institute for Research on Population and Social Policies in Rome, look at the crisis in responsibility sharing in Europe which led hundreds of thousands of refugees from the Middle East and Africa to enter Europe in 2015 and 2016. The authors give an overview of the situation of refugees in the European Union (EU), the patterns of migration leading to Europe, the political response from the EU, and recommendations for action. The EU provides the structure for responsibility sharing which, the authors point out, is not being utilized. Security is one reason behind this lack of cooperation, but a fear of being overwhelmed by the number of arrivals and changes to the composition of their countries and the European continent is another. The authors also discuss the need for effective integration policies to address these concerns. Turning to the Americas, similar patterns of migration emerge. In their article, The Challenges of Migration Trends and Shared Responsibility in Latin America and the Caribbean, Jorge Martinez of CEMLA in Buenos Aires, and Ernesto Rodriguez Chavez of CEM in SAo Paulo, look at Latin American and Caribbean migration trends, the forces behind them, and how nations have responded to these migration patterns. The authors point to poverty, endemic violence in Central America and parts of South America, and natural disasters as forces pushing migrants in the hemisphere and suggest that current international instruments, if honored, could help alleviate the situation. These include the New York Declaration on the Large Movements of Refugees and Migrants, the Montevideo Consensus on Population and Development, and the Agenda 2030 and its Sustainable Development Goals, among others. Looking at North America, Kevin Appleby, senior director for International Migration Policy for SIMN and CMS, writes about large refugee and migrant populations arriving at the US border and how the US and Mexico, along with other nations in the region, have responded to them. Appleby examines the flow of unaccompanied minors and families from the Northern Triangle of Central America - Honduras, El Salvador, and Guatemala - which began in earnest in 2014 and how the policy deployed by the United States and Mexico to deter the flow has failed. He offers recommendations to shift the US policy from one of deterrence to protection. The paper, entitled Knocking on the Door: Vulnerable Populations at the US-Mexico Border, also looks at the large number of Cubans fleeing persecution in their homeland and Haitians fleeing persecution and natural disasters in Haiti. Populations from Africa, Asia, and the Near East have also arrived at the US-Mexico border in large numbers. Appleby points out that the groups at the US-Mexico border are seeking asylum in the United States, not looking to enter the country illegally. Each of the papers in this volume analyzes a regional migration crisis and discusses how it should be addressed through regional and international arrangements. It is hoped that these studies will lead to a formula or a set of model policies and responses that can be usefully employed in situations of displacement throughout the world.

Details: New York: Center for Migration Studies of New York. 2017. 104p.

Source: Internet Resource: Accessed June 24, 2017 at: http://cmsny.org/wp-content/uploads/2017/06/International-Migration-Policy-Report-2017-6.3.pdf

Year: 2017

Country: International

Keywords: Asylum Seekers

Shelf Number: 146366


Author: Dowd, Caitriona

Title: How Does Work Feature in Literature on Youth Participation in Violence?

Summary: The evidence review considers the role of 'work' broadly, seeking to go beyond restricted definitions of waged and formal sector employment or underemployment. It considers the role of formal and informal work, different forms of work, and the various potential roles - both positive and negative - that work may play in youth participation in violence. The study will also employ a broad definition of 'violence' - considering youth participation in organised, mass-mobilised conflicts; 'radicalised' or 'extremist' violent groups; less formal, criminal violence; and, where relevant, interpersonal violence. The deliberately broad definition of violence facilitates a focused analysis of the evidence and research surrounding the role of work in youth engagement in all forms of violence that constitute a disengagement from a peaceful social order, recognising the interlinkages between multiple and varied outward manifestations of violence (for example, criminal, economic, political and interpersonal violence). The study explores the evidence for the role of work in youth violence participation at the intersection of multiple forms of work, multiple forms of violence, and multiple forms of participation, mapping gaps in existing research and evidence, and opportunities for further research and analysis. Attention will be concentrated on research and evidence produced after 2010, building on the work of Cramer (2010) on unemployment and violence.

Details: Institute of Development Studies, 2017. 30p.

Source: Internet Resource: IDS Working Paper; Volume 2017, No. 485: https://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/12931/Wp485%20Online.pdf?sequence=1&isAllowed=y

Year: 2017

Country: International

Keywords: At-Risk Youth

Shelf Number: 146371


Author: Scherlofsky, Kimberly C.

Title: The Effectiveness of Alcohol and Drug Treatment among the Incarcerated Population: A United States and European Union Perspective with a

Summary: Many current laws call for the swift punishment of drug and alcohol offenders. While consequences should follow those that violate the law, the question of whether or not a simple prison term is the best option for an alcohol or drug offender must be raised. While an offender must be held accountable, does this necessarily mean incarceration is the only option? Treatment facilities for drug and alcohol use are widely available in correctional institutions and in various forms of delivery. Many inmates have the opportunity to partake in these programs. The researcher feels that the issue at hand is not merely one of availability, but rather one of quality. How effective is the treatment that the correctional system provides? From October 2011 to December 2012, the researcher traveled to ten correctional institutions throughout the state of Mississippi and the country of Austria. At each institution the researcher was given the opportunity to meet and speak with current participants of drug and alcohol treatment. Participation was voluntary and questionnaires were distributed to all who wished to take part. Following completion of the questionnaires, group discussions were held and personal testimonies were obtained. In addition to the inmates, informal discussions took place with the program administrators and when available, correctional officers, administrative staff and prison wardens. The goal was to obtain a total view of the drug and alcohol treatment. A total of 403 questionnaires were collected. Broken down into four themes, this study plans to demonstrate how certain various elements of incarceration can be interpreted and how this insight can lead to better development and implementation of alcohol and drug treatment. By examining prison systems and prison cultures, alcohol and drug use in society and in prison and lastly, the treatment options available, the way in which these elements interconnect becomes clear. Moreover, a special consideration is made for inmates experiencing co-occurring disorders and also female populations, as these two correctional classifications include additional components that can further hamper treatment. The researcher sets out not to prove or disprove that drug and alcohol treatment is an effective remedy to substance abuse. The goal is not to question one particular method of treatment or to determine how to remedy one specific substance problem. Rather, the goal of this dissertation is to examine drug and alcohol treatment as a whole. Comparison will be made between the United States and the European Union, with a special emphasis on the state of Mississippi and the country of Austria, in order to reveal what aspects of treatment are shared and what each system could learn from the other. Using the gathered data and review of previous literature, the researcher aims to find a decisive and cohesive idea of just how effective alcohol and drug treatment within the correction setting is and more importantly, how effective it could be.

Details: Wien: Universitat Wien, 2013. 232p.

Source: Internet Resource: Dissertation: Accessed June 29, 2017 at: http://othes.univie.ac.at/26331/1/2013-02-11_0804305.pdf

Year: 2013

Country: International

Keywords: Drug Abuse Treatment

Shelf Number: 146454


Author: Baumann, Florian

Title: Hide or Show? Endogenous Observability of Private Precautions Against Crime When Property Value is Private Information

Summary: This paper analyzes a contest in which defenders move first, have private information about the value of the objects they are trying to protect, and determine the observability of their defense efforts. The equilibrium consistent with the intuitive criterion depends on the distribution of defender types, the magnitude of the difference between defender types, and the asymmetry between defender and aggressor regarding the valuation of the objects at stake in the contest. Our setting captures key characteristics of the interaction between households and thieves, focusing on the classic distinction between observable and unobservable private precautions against crime. An analysis of welfare implications determines that a setting in which information about the value of the protected objects is private results in a better outcome than a complete-information scenario.

Details: Dusseldorf: Dusseldorf University Press, 2013. 46p.

Source: Internet Resource: Discussion Paper No. 115: Accessed June 29, 2017 at: http://www.dice.hhu.de/fileadmin/redaktion/Fakultaeten/Wirtschaftswissenschaftliche_Fakultaet/DICE/Discussion_Paper/115_Baumann_Denter_Friehe_01.pdf

Year: 2013

Country: International

Keywords: Crime Prevention

Shelf Number: 146462


Author: Higginson, Angela

Title: Policing Interventions for Targeting Interpersonal Violence in Developing Countries: A Systematic Review

Summary: Developing countries are particularly affected by violent crime, with interpersonal violence a leading cause of death and disability. In addition, violent crime has been found to suppress social and economic development in developing countries and fear of violence alone hampers growth. Violent crime is a complex problem with multiple interacting causes, and interventions aimed at reducing its incidence vary widely. These interventions can be broadly separated according to the societal sector in which they are implemented, and the underlying theory of the intervention process. Criminal violence may be addressed by multiple sectors within the justice system, however the largest and arguably the most important sector addressing interpersonal violent crime is policing. This review has two key objectives. The first objective is to review the evidence on the effectiveness of policing interventions in reducing interpersonal violent crime in developing countries, and whether effectiveness differs according to intervention type and across different populations. The second objective is to assess the reasons that policing interventions addressing interpersonal violent crime may fail or succeed in developing countries. The systematic search identified 2,765 records. After extensive screening, 54 documents were found to relate to policing interventions targeting violence in developing countries. After excluding documents that did not evaluate either the effectiveness or the implementation of interventions, 5 studies were included in the review of intervention effectiveness and 37 studies were included in the narrative review of reasons for intervention success or failure. The review located studies across Africa, Asia and Latin America; however the majority of studies report on interventions from Latin America. The interventions that were evaluated took place in 13 developing countries: Brazil, Colombia, Chile, Honduras, Guatemala, Uruguay, Jamaica, South Africa, Nigeria, India, Indonesia, Thailand and Pakistan. Seven key policing interventions were identified in the evaluation literature: gender-based interventions (n=7); policing partnerships (n=4); training and education strategies (n=6); community-oriented policing (n=13); police-enforced bans and crackdowns (n=3); visible policing and increased police contact (n=2); crime observatories (n=2).

Details: London: International Initiative for Impact Evaluation (3ie), 2015. 142p.

Source: Internet Resource: Accessed June 29, 2017 at: http://www.3ieimpact.org/media/filer_public/2015/10/01/policing_interventions_review.pdf

Year: 2015

Country: International

Keywords: Family Violence

Shelf Number: 146467


Author: Turley, Ruth

Title: Slum upgrading strategies and their effects on health and socio-economic outcomes: a systematic review

Summary: Low and middle income countries (LMIC) are home to over 90% of the one billion people living in slums. Urban slums describe parts of cities where living conditions are exceptionally poor. The slums lack basic services and often have many people crowded into small living spaces. Slums can provide shelter and proximity to jobs, and communities are often social and supportive. However, poor living conditions and health are closely related, and illnesses such as diarrhoea, malaria, cholera and respiratory diseases are common. Slum upgrading basically involves improving the physical environment, for example the water supply, sanitation, waste collection, electricity, drainage, road paving and street lighting. Additional strategies may be included to improve access to health, education and social services, increase residents' income and secure legal rights to the land. We found five main studies with suitable methods for examining the effect of slum upgrading on health, quality of life and social wellbeing (for example poverty). Nine supporting studies were also included, which used methods that could indicate associations between interventions and outcomes but could not assess whether interventions caused the effect. Only one main study had a low risk of bias, with the rest having a mixed or high risk of bias. The majority of supporting studies had a high risk of bias, meaning their methods had several limitations that made the study results unreliable. In addition, the studies measured different interventions and outcomes, making it difficult to compare results. Overall, there was limited but consistent evidence to suggest that slum upgrading may reduce diarrhoea in slum dwellers and their water-related expenses. There were mixed results for whether slum upgrading reduced parasitic infections, general measures of communicable diseases, financial poverty and unemployment outcomes. There was very little information on other health or social outcomes, or which types of interventions were most beneficial. Some of the studies asked slum dwellers for their views and their experiences of slum upgrading interventions. They suggested a number of reasons why facilities were not used as intended and which may have reduced the benefits. Future research, with improved study designs and common outcome measures, is needed to determine how best to improve the conditions of existing slums and to offer the most benefit to the health, quality of life and social wellbeing of slum dwellers.

Details: London: International Initiative for Impact Evaluation (3ie), 2013. 184p.

Source: Internet Resource: 3ie Systematic Review 13. Accessed June 29, 2017 at: http://www.3ieimpact.org/media/filer_public/2016/07/12/sr13-slum-upgrading-strategies-review.pdf

Year: 2013

Country: International

Keywords: Poverty

Shelf Number: 146468


Author: Coren, Esther

Title: Services for street-connected children and young people in low-and middle-income countries: A thematic synthesis

Summary: The review did not find any studies that reported evaluations of programmes in low and middle income countries, even though many relevant programmes exist. The studies that were found from high income countries were of low to moderate quality and it was difficult to compare the studies as while many of them measured similar things (eg drug and alcohol use), they measured the outcomes in different ways that were not comparable. Each study compared a new therapeutic intervention with existing services offered in drop in or shelter service centres, so all the participants were using services. None of the studies compared young people who were using services with young people who were not using them. The interventions being evaluated consisted of time limited therapeutically based programmes which did not prove to overall be more effective than standard shelter or drop-in services for most outcomes and in most studies. Results were not consistent across the studies but the "new " programmes being evaluated did not prove to be better at helping the street connected children and young people than the usual services. There were favourable changes from baseline in outcomes for most particpants in therapy interventions and also in standard services. This may partly be because those young people using the services are already involved with the support on offer and want to change their lives. An important issue to understand therefore is how services promote themselves to young people and what factors make young people want to take up services that are available. The authors included 11 studies evaluating 12 interventions from high income countries. They did not find any sufficiently robust evaluations conducted in low and middle income countries (LMICs) despite the existence of many relevant programmes. Study quality overall was low to moderate and there was great variation in the measurement used by studies, making comparison difficult. Participants were drop-in and shelter based. There was considerable heterogeneity between studies and equity data were inconsistently reported. No study measured the primary outcome of reintegration or reported on adverse effects. The review discussion section included consideration of the relevance of the findings for LMIC settings.

Details: London: London: International Initiative for Impact Evaluation (3ie), 64p.

Source: Internet Resource: Systematic Review 12: http://www.3ieimpact.org/media/filer_public/2016/07/12/sr12-street-children-review.pdf

Year: 2014

Country: International

Keywords: Runaways

Shelf Number: 146476


Author: Kantor Center

Title: Antisemitism Worldwide 2016

Summary: The report is based on the ongoing Kantor Center for the study of Contemporary European Jewry and the Moshe Kantor Database team's work, and on the various reports and data sent to us by contact persons in about 40 countries - a network we established during more than 20 years of activity. It should be noted that The Kantor Center and database is the only center, in Israel and abroad, that monitors and analyzes the events and expressions worldwide, according to the same criteria, over such a long period of time that make a multi-year comparison possible. Despite the work of the team and the network we cannot say that all the relevant data on antisemitic manifestations has reached us, because in many countries monitoring is not consistent or systematic, and because - as all monitoring agencies agree - only a fraction of all manifestations is reported to authorities. The data and numbers presented herein on violent antisemitic cases are the result of a specific monitoring and analysis system developed by the Kantor Center team, using specific criteria: proven antisemitic motivation; counting a multi-event as one case; and no exaggeration or diminishing the severity of the situation. As a result, differences might occur between our numbers and those released by other monitoring communities and institutes. Most of the other various monitoring communities and agencies present numbers of all types of antisemitic manifestations put together, violent, verbal and visual.

Details: Brussels: European Jewish Congress, 2017.

Source: Internet Resource: Accessed June 30, 2017 at: http://www.eurojewcong.org/docs/kantor_center_antisemitism_report_2016.pdf

Year: 2017

Country: International

Keywords: Antisemitism

Shelf Number: 146477


Author: International Center for Research on Women

Title: Economic Impacts of Child Marriage: Global Synthesis Report

Summary: The international community is increasingly aware of the negative impacts of child marriage on a wide range of development outcomes. Ending child marriage is now part of the Sustainable Development Goals. Yet investments to end the practice remain limited across the globe and more could be done. In order to inspire greater commitments towards ending child marriage, this study demonstrates the negative impacts of the practice and their associated economic costs. The study looks at five domains of impacts: (i) fertility and population growth; (ii) health, nutrition, and violence; (iii) educational attainment and learning; (iv) labor force participation and earnings; and (v) participation, decision-making, and investments. Economic costs associated with the impacts are estimated for several of the impacts. When taken together across countries, the costs of child marriage are very high. They suggest that investing to end child marriage is not only the right thing to do, but also makes sense economically.

Details: Washington, D.C.: World Bank Group, 2017. 99p.

Source: Internet Resource: Accessed July 1, 2017 at; http://documents.worldbank.org/curated/en/530891498511398503/pdf/116829-WP-P151842-PUBLIC-EICM-Global-Conference-Edition-June-27.pdf

Year: 2017

Country: International

Keywords: Child Marriage

Shelf Number: 146486


Author: International Conflict and Security Consulting Ltd.

Title: Stabilising Areas Affected by Criminalised Violence Conflict: A Guide for Analysis and Stabilisation Strategy

Summary: This Guide is based on our work over the last decade in helping governments and companies address situations where crime is a defining characteristic of violent conflict, or affects the conflict dynamics to a considerable extent - and where stabilisation efforts have to integrate measures that address both grievance and greed. These situations span those that fall within the scope of armed violence (for example, in certain parts of Jamaica and Mexico), to those where ideologically- driven armed groups are actively engaged in criminal activities or cooperate with organised criminal groups (for example, in Colombia, Nigeria, North Caucasus and Myanmar). Over the last decade, we have seen more violent conflicts become criminalised and there is an element of criminalisation in most current internal armed conflicts. The need to address the criminal dimension of violent conflicts, we believe, will continue to feature prominently in the work of peacebuilding practitioners and consultants. The Guide is the first INCAS in Practice Series publication for 2014 and part of our commitment to promote debate on good consulting practice in the conflict and security field.

Details: London: Urban Guru Publishing, 2014.

Source: Internet Resource: Incas in Practice Series, No. 01/14; Accessed July 1, 2017 at: www.ecasconsulting.com

Year: 2014

Country: International

Keywords: Conflict-Related Violence

Shelf Number: 146498


Author: Salcedo-Albaran, Eduardo

Title: Transnational Trafficking of Organs, Tissues and Cells

Summary: The aim of this document is to inform about the criminal networks participating in traffic of organs, tissues and cells (OTCs). The document has four parts: (i) A description of organ trafficking as an organized crime activity, (ii) an explanation of the main actors involved in transnational criminal networks trafficking OTC, (iii) a description of the usual operation these networks, and (iv) recent and relevant cases related to OTC trafficking.

Details: Bogota: VORTEX Foundation, 2017. 18p.

Source: Internet Resource: The Global Observatory of Transnational Criminal Networks - Research Paper No. 13. VORTEX Working Papers No. 27; Accessed July 5, 2017 at: http://docs.wixstatic.com/ugd/522e46_768142f9934742e19635e73e0e571d12.pdf

Year: 2017

Country: International

Keywords: Organ Trafficking

Shelf Number: 146502


Author: Salcedo-Albaran, Eduardo

Title: Introduction to the International Trafficking of Organs

Summary: The purpose of this paper is to introduce the social, economic and politic background of the countries involved in international networks of organ, tissues and cells trafficking, as well as some characteristics of this illegal activity. The first part of this document is focused on the general background characteristics of the criminal market of organs trafficking. The second part covers the main supplier countries by region. The third part includes conclusions about the criminal market.

Details: Bogota: VORTEX Foundation, 2017. 20p.

Source: Internet Resource: The Global Observatory of Transnational Criminal Networks - Research Paper No. 12. VORTEX Working Papers No. 26: Accessed July 5, 2017 at: http://docs.wixstatic.com/ugd/522e46_d04ebcfa9f854cc092f4bf8c05e52937.pdf

Year: 2017

Country: International

Keywords: Criminal Markets

Shelf Number: 146503


Author: Hubschle, Annette Michaela

Title: The Groenewald Criminal Network: Background, legislative loopholes and recommendations

Summary: This paper provides a brief perspective of the Groenewald gang in the broader wildlife crime context before assessing whether the case presents an exception or a common trend. In a second step, the legislative and institutional loopholes are discussed. The paper also assesses whether regulators are aware of the scheme and what measures have been taken to address this. Finally, an assessment is made whether "gray" nodes (legal players who participate in illegal activities) are dealt within the most expedient manner and what lessons could be learned from the model

Details: Bogota: VORTEX Foundations, 2017. 21p.

Source: Internet Resource: The Global Observatory of Transnational Criminal Networks - Research Paper No. 11. VORTEX Working Papers No. 25: Accessed July 5, 2017 at:

Year: 2017

Country: International

Keywords: Animal Poaching

Shelf Number: 146504


Author: Goga, Khalil

Title: The Rhino Horn Trafficking Network of the Groenewald Gang

Summary: This document presents the model of a criminal network engaged in poaching and trafficking of rhino horn. After the exposition of the methodology and the most relevant concepts related to Social Network Analysis, the third part of the document includes information about the present case and the sources consulted for elaborating the model. In the fourth part the results informing about the characteristics of the criminal network are presented: (i) The types of agents, (ii) the types of interactions established, (iii) the agents with the highest capacity to arbitrate information in the network and (iv) the agents with the highest concentration of direct interactions. In the fifth part, conclusions are discussed.

Details: Bogota: VORTEX Foundation, 2017. 30p.

Source: Internet Resource: The Global Observatory of Transnational Criminal Networks - Research Paper No. 10. VORTEX Working Papers No. 24: Accessed July 6, 2017 at: http://docs.wixstatic.com/ugd/522e46_cd24e4a30ac542d1a68338f22779dfb5.pdf

Year: 2017

Country: International

Keywords: Animal Poaching

Shelf Number: 256505


Author: Ambagtsheer, F.

Title: Organ Trade

Summary: Organ trade constitutes the sale and purchase of organs for financial or material gain. Although prohibited since the 1980s, an increasing number of reports indicate its proliferation across the globe. Yet, many knowledge gaps exist on organ trade, in particular on the demand -and facilitation side of the trade. This thesis addresses the following aims: 1 Provide insight into the scale of patients who buy organs for transplantation and describe why, where, how and from whom they purchased organs 2 Acquire knowledge and understanding of the experiences, attitudes, behaviors and needs of transplant professionals who treat patients before and/or after they buy organs 3 Examine the modus operandi of those who facilitate illegal transplantations and study the investigation and prosecution of organ trade networks 4 Assess the possible implications of a punitive, legislative approach 5 Propose alternative strategies that may deter organ trade more effectively Adopting a multidisciplinary approach, the objective is not only to acquire a better empirical understanding of organ trade, but to use this knowledge to explore and encourage strategies that may eliminate 0 or regulate - the trade more effectively with lesser risk of harms.

Details: Rotterdam: Erasmus University, 2017. 220p.

Source: Internet Resource: Accessed July 27, 2017 at: https://repub.eur.nl/pub/99988

Year: 2017

Country: International

Keywords: Human Trafficking

Shelf Number: 146580


Author: Wilson, David B.

Title: Effectiveness of Restorative Justice Principles in Juvenile Justice: A Meta-Analysis

Summary: The restorative justice theoretical framework views crime as a violation of people and relationships. These violations in turn create an obligation to make things right. Restorative justice aims to reestablish the balance that has been offset as a result of a crime by involving the primary stakeholders (i.e. victim, offender, and the affected community) in the decision-making process of how best to restore this balance. The focus is on healing as opposed to punishment. Other important principles of restorative justice include offender accountability for wrongdoing, respect for all participants, and the centrality of the victim throughout the process. A fundamental component of restorative justice programs is some form of dialog or interaction between the offender and the victim or a victim surrogate, with some programs extending participation to family and community members. Examples of programs include Victim-Offender Mediation, Family Group Conferencing, and Sentencing Circles. Furthermore, some routine practices of the juvenile justice system such as restitution are consistent with restorative justice principles, and some programs incorporate some aspect of the framework, such as teen courts. Several programs for juvenile and adult offenders have been created and implemented within various justice and non-justice settings. These programs have also been tested over the past several decades, producing a substantial body of evidence. The objective of this study was to systematically review and statistically synthesize all available research that, at a minimum, compared participants in a restorative justice program to participants processed in a more traditional way using meta-analytic methods. Ideally, these studies would include research designs with random assignment to condition groups, as this provides the most credible evidence of program effectiveness. Our systematic search identified 99 publications, both published and unpublished, reporting on the results of 84 evaluations nested within the 60 unique research projects or studies. From these studies, we extracted results related to delinquency, non-delinquency, and victim outcomes for the youth and victims participating in these programs. Overall, the results evaluating restorative justice programs and practices showed a moderate reduction in future delinquent behavior relative to more traditional juvenile court processing. However, these results were smaller for the more credible random assignment studies, raising concerns about the robustness of this overall result. Promising findings in terms of delinquency outcomes for the youth were seen for victim-offender conferencing, family group conferencing, arbitration/mediation programs, and circle sentencing programs. However, in all cases the evidence is equivocal with lower effects for random assignment studies and high variability in findings across studies. The effects for restitution, teen courts, impact panels, and reparative boards are less encouraging, suggesting that these may not be effective programs. In contrast, cautioning and diversion programs had the largest reductions in delinquency, suggesting that this approach may be effective for low-risk and first-time youthful offenders. Promising findings were seen for many of the non-delinquency outcomes for the youth, although some uncertainty remains about these outcomes given the small number of studies and variability across studies. Still, youth participating in restorative justice programs had a greater perception of fairness. The results also suggest that restorative justice youth are more satisfied with the restorative justice programs and have somewhat less supportive attitudes toward delinquency. Similarly, victims reported improved perceptions of fairness, greater satisfaction, improved attitudes toward the juvenile, are more willing to forgive the offender, and are more likely to feel that the outcome was just. The bottom line for restorative justice programs and practices is that the evidence is promising, suggesting possible but still uncertain benefits for the youth participants in terms of reduced future delinquent behavior and other non-delinquent outcomes. Victim participants in these programs, however, do appear to experience a number of benefits and are more satisfied with these programs than traditional approaches to juvenile justice. Additional high quality research of these programs is clearly warranted given these promising but uncertain findings.

Details: Fairfax, VA: George Mason University, Department of Criminology, Law and Society, 2017. 145p.

Source: Internet Resource: Accessed July 27, 2017 at: https://www.ncjrs.gov/pdffiles1/ojjdp/grants/250872.pdf

Year: 2017

Country: International

Keywords: Juvenile Court Processing

Shelf Number: 146582


Author: Environmental Investigation Agency (EIA)

Title: The Shuidong Connection: Exposing the global hub of the illegal ivory trade

Summary: Surprising many, and putting other countries to shame, China has taken significant steps to close its legal domestic ivory market in the past year. This is a positive move by a country with one of the biggest ivory markets and demonstrates leadership and pragmatism. However, there remain serious questions on the lack of enforcement in China, and abroad, against Chinese nationals deeply involved in the illegal ivory trade, who continue to operate with complete impunity. Following on from leads gathered in Tanzania in 2014, the Environmental Investigation Agency (EIA) began investigating neighbouring Mozambique, a country whose elephant population has been devastated by poaching and the illegal ivory trade. What followed was beyond anything EIA could have anticipated. The investigation in Mozambique revealed a Chinese-led criminal syndicate which for over two decades has been trafficking ivory from Africa to Shuidong, its hometown in southern China. According to this syndicate, it is just one of about 10 to 20 similar groups originating from Shuidong. Their criminal exploits reveal how their small hometown has become, and remains, the world's largest hub for ivory trafficking: the group claims up to 80 per cent of tusks from poached elephants in Africa pass through Shuidong. Over the course of more than a year, discussions with the traffickers gave an unprecedented insight into the methods used to source, ship and sell raw tusks, and to manage profits. They provided fascinating detail on the significance of Shuidong in global illegal ivory flows. Since supplanting Chinese gangs from Fujian as the main raw ivory traffickers more than a decade ago, the Shuidong syndicates have remained untouched by any enforcement action in China or abroad. Although some ivory shipments have been intercepted, the only loss is financial and the groups have developed various mechanisms for limiting this risk. By being flexible and adaptable, the Shuidong syndicate is relentless in its pursuit of profit from wildlife crime. With the profitability of tusks from East Africa falling, the Shuidong smugglers have moved into more profitable forest elephant ivory and pangolin scales. When enforcement improved in Tanzania, they shifted to neighbouring Mozambique. Their relentless criminal activities continue to be a major factor in the ongoing slaughter of elephants and other wildlife across Africa. Without enforcement action against organised criminal networks, elephants and other wildlife will continue to be threatened by the illegal wildlife trade. The Shuidong syndicates in China and Africa need to be investigated and prosecuted urgently. Continued inaction against groups such as these, undermines China's announcement to close its legal domestic ivory market and will render it futile in the fight against elephant poaching. Specific policy and enforcement recommendations are included at the end of this report.

Details: London: EIA, 2017. 24p.

Source: Internet Resource: Accessed July 29, 2017 at: https://eia-international.org/wp-content/uploads/EIA-The-Shuidong-Connection-FINAL-1.pdf

Year: 2017

Country: International

Keywords: Animal Poaching

Shelf Number: 146593


Author: Haenlein, Cathy

Title: Below the Surface: How Illegal, Unreported and Unregulated Fishing Threatens our Security

Summary: Illegal, unreported and unregulated (IUU) fishing is conventionally treated by governments worldwide as the result of technical regulatory infringements. As such, it is often deemed a matter for industry regulators and dismissed as a trivial issue insofar as it relates to national security. This diagnosis is flawed. Certainly, IUU fishing is often small in scale and conducted by artisanal fishers out of ignorance of laws, or opportunism. Yet there is also evidence that much of today's IUU fishing activity takes place on an organised, systematic scale across multiple jurisdictions. Testament to this are the volumes involved. Although numerous difficulties affect such calculations, global losses to IUU fishing have been estimated at some $10-23.5 billion annually - equivalent to 11-26 million tonnes of fish per year. The result is the plunder of the world's oceans, threatening not only marine ecosystems, but also the security of human populations. Large-scale IUU fishing endangers food security, threatens livelihoods, undermines the rule of law and deprives states of revenues. It also intersects with other crimes, further amplifying the threat to security. Yet research on these security dimensions is limited and fragmented; our understanding of their dynamics remains partial. Policy and practical responses, meanwhile, remain ill-suited, failing to keep pace with the complexity of the threat posed. Recommendations This paper makes the following recommendations for governments, NGOs and international agencies looking to address the security dimensions of large-scale IUU fishing: 1. Recognise large-scale IUU fishing as transnational organised crime. There is a critical need for policymakers and practitioners to treat high-volume IUU fishing as more than a fisheries management problem. Large-scale IUU fishing is transnational organised crime and must be recognised and treated as such. A paradigm shift is needed in the way we view and respond to the phenomenon, to ensure that responses are commensurate with the scale, complexity and diversity of the threat faced. 2. Recognise large-scale IUU fishing as 'convergence crime'. Awareness that large-scale IUU fishing commonly occurs in conjunction with other crime types must increase. Policymakers must adapt to a more sophisticated operating reality, with front line investigators trained to recognise not just IUU fishing, but also crimes such as human trafficking and corruption. Broader responses must draw on expertise associated with all crime types involved, in an integrated, multi-agency approach. 3. Strengthen domestic legislation. States must strengthen fisheries legislation and harmonise all other relevant laws, such that penalties and the likelihood of their application create real deterrence. Domestic criminalisation must meet the criteria - a four-year minimum custodial sentence - for large-scale IUU fishing to qualify as serious crime under the UN Convention Against Transnational Organized Crime (UNTOC). 4. Strengthen international responses. International-level reform is required to ensure that IUU fishing is recognised under UNTOC, conferring binding obligations on 179 states to cooperate on law enforcement action. Global bodies must also clarify roles and responsibilities, address overlapping mandates and deepen cooperative arrangements. 5. Strengthen monitoring and enforcement. Capacity building to interdict those engaged in large-scale IUU fishing and associated crimes must be provided. To further facilitate monitoring and enforcement, vessels above a certain size and/or operating beyond the jurisdiction of flag states must be required to have International Maritime Organization numbers - as must their owners. 6. Bolster information sharing. Overlaps between IUU fishing and other crimes challenge the common separation of national fisheries management and policing agencies. Flexibility is needed to match perpetrators' shifting portfolios, as is stronger collaboration between coast guards, customs, immigration, anti-narcotics, fisheries management and financial crime agencies, as well as international organisations. 7. Expand regional approaches and partnerships. Promising initiatives already underway must be more fully resourced and prioritised. Innovative regional and multisectoral approaches, such as FISH-i Africa, should be expanded, scaled up and replicated as models in other, particularly financially constrained, locations. 8. Bolster efforts to prevent fish laundering. More states must be persuaded to ratify the Food and Agriculture Organization's Agreement on Port State Measures to Prevent, Deter and Eliminate IUU Fishing, to ensure that no port is used as a shelter for non-compliance. Implementation of the Agreement must also be supported through sustained capacity building in developing coastal and small-island states. 9. Expand multilateral initiatives. In light of its organised and poly-threat nature, the priority assigned to large-scale IUU fishing under multilateral maritime security initiatives should increase. Defence and security-focused programmes that prioritise maritime security but exclude IUU fishing should be expanded to include it. 10. Follow the money. Financial investigation tools should be used to reveal ownership information, uncover money laundering and tax fraud, and make strategic arrests of the true beneficiaries of high-volume IUU fishing. To enable this, legislative reform in many jurisdictions to provide for IUU fishing as a predicate offence to money laundering is crucial. 11. Prosecute under alternative legislation. Crime convergence provides options to arrest and prosecute perpetrators using laws other than those relating to fisheries. For example, prosecution of large-scale IUU operators under economic crimes legislation may increase the prospects for imposing substantial penalties where associated crimes carry weightier sentences. 12. End use of flags of convenience. To bolster enforcement, the exploitation of flags of convenience must be ended. This could be achieved by encouraging flag-of-convenience states to close registries, by requiring coastal states not to issue licences to flag-of-convenience vessels, and by pursuing action by regional fisheries management organisations and international bodies.

Details: London: Royal United Services Institute for Defence and Security Studies (RUSI), 2017. 56p.

Source: Internet Resource: Occasional Papers: Accessed July 29, 2017 at: https://rusi.org/sites/default/files/201707_rusi_below_the_surface_haenlein.pdf

Year: 2017

Country: International

Keywords: Fishing Industry

Shelf Number: 146595


Author: Belur, Jyoti

Title: A Systemic Review of the Effectiveness of the Electronic Monitoring of Offenders

Summary: Electronic monitoring (EM) involves placing a tag around the ankle or wrist of an individual or suspect which, in combination with a receiving device, can verify their whereabouts to establish remotely whether the individual is violating a set of pre-established conditions determined by the courts. These might be restrictions in terms of the areas where the individual should not be or in terms of a curfew meaning they have to remain in a fixed location (their house for example) during certain hours in a day. The ability to monitor an offender's whereabouts means that the offender can be released into the community rather than serving time in a prison. EM devices use either radio frequency or GPS technology to send information in real time or with a delay. It can be applied at any stage in the criminal justice process- either before trial, or as early release from prison, or even as an alternative to prison. Adults as well as juveniles, can be monitored. What did the systematic review tell us about the impact of electronic monitoring on reducing crime? Overall when taken together, studies showed that there was a reduction in (re)offending by those on EM as compared to those who were not, but this was not statistically significant. EM seems to be effective for sex offenders as it showed a statistically significant reduction in reoffending for this group. It also had a statistically significant effect on reducing reoffending in offenders who were put on EM instead of being sent to prison, as compared to those who were sent to prison. We think this might be because prison can expose individuals to other criminals and bad influences, whereas monitoring allows them to remain within the confines of their home environment. How does electronic monitoring reduce crime? EM increases the risk of being caught (re)offending because it allows the authorities to be alerted if the individual is either not at a specified location when they are expected to be (such as at home overnight), or if they have entered an exclusion zone (such as a playground). Offenders on location tracking devices or GPS may also be linked to, or indeed cleared, of crimes if their device shows that they were either present at or absent from, a crime scene when the crime was committed. Monitoring may also increase the effort required to offend as they need to remove or damage the tag, which is difficult to do. How do you implement electronic monitoring to ensure the best impact? Our review identified a number of implementation challenges. These included technological issues such as equipment malfunction, loss of signal or power and battery failure. EM programmes require good communication and co-ordination between a number of agencies like the courts, prisons, probation service, the police, and private monitoring companies. Most importantly, unless the response to a breach is prompt and swift, participants have little incentive to respect their curfew times and other conditions. What about cost-effectiveness? While there was not enough information to conduct a cost-benefit analysis, our review identified a lot of information regarding the costs of various monitoring programmes and the potential savings that they may make when compared to imprisonment. We can say that the use of radio frequency technology for monitoring is less expensive as compared to using GPS technology. Active monitoring, in real time for 24 hours a day, is more expensive than passive monitoring when the data is uploaded once a day to monitor participants. Overall we can say it is less expensive when compared to prison but more expensive than traditional supervision or probation. .

Details: London: UCL Department of Security and Crime Science, University College London, 2017. 90p.

Source: Internet Resource: What Works: Crime Reduction Systematic Review Series: Accessed July 29, 2017 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Documents/Electronic_monitoring_SR.pdf

Year: 2017

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 146612


Author: Steinbach, Rebecca

Title: Speed Cameras to Reduce Speeding Traffic and Road Traffic Injuries

Summary: Background Exceeding the speed limit is one of the most common criminal offenses committed in the UK and can engender tremendous social harm. Speed limits on roads regulate traffic speeds by establishing a safe upper limit on vehicle speeds. Measures aimed at enforcing traffic speed limits include the use of speed cameras. Objectives To update and expand a Cochrane systematic review of traffic speed enforcement cameras. Search strategy We searched the following electronic databases: OVID Transport database (1988 to June 2015); National Police Library (to June 2015), Cochrane Injuries Group Specialised Register (to 16/03/2015), Cochrane Library CENTRAL database (to 16/03/2015); Ovid MEDLINE(R), Ovid MEDLINE(R) In-Process & Other Non-Indexed Citations, Ovid MEDLINE(R) Daily and Ovid OLDMEDLINE(R) (1946 to 16th March 2015); Embase Classic+Embase (OvidSP) (1947 to 16th March 2015); ISI WOS: SCI-EXPANDED (1970) & CPCI-S (1990) to 16th March 2015); PROQUEST (to 12/06/2015); EBSCO (to 12/06/2015); Web of Knowledge (to 12/06/2015); Heritage (to 12/06/2015). Selection criteria Randomised controlled trials, interrupted time series and controlled before-after studies that assessed the impact of speed cameras on traffic speeding, road crashes, crashes causing injury and fatalities, were eligible for inclusion. Data collection and analysis We independently screened studies for inclusion, extracted data from full text reports, assessed methodological quality; we reported study authors' outcomes and calculated standardised results based on the information available in each study. Main results In this updated systematic review an additional 16 evaluations met the inclusion criteria and were added to the 35 studies in the previous Cochrane review. Across both newly and previously identified studies, the implementation of speed camera programmes was associated with a reduction in average speed of 7% (95% CI 0-13%), in percentage of vehicles exceeding the speed limit of 57% (95% CI 50-64%), in crashes of 19% (95% CI 14-24%), in injury crashes of 18% (95% CI 13-23%) and in severe or fatal crashes of 21% (95% CI 13-29%). There was little evidence that the effect of interventions differed by type of speed camera, whether overt or covert, fixed or mobile, or that effects differed in urban and rural areas. However, there was some evidence to suggest that fixed cameras had a slightly greater effect on all road traffic crashes and those resulting in fatalities or severe injuries, than mobile cameras. Authors' conclusions This review provides evidence that speed cameras are an effective intervention for reducing speeding behaviour, and can help combat some of the negative consequences of speeding such as fatalities and injury crashes. Considering continuing increases in traffic volumes, speed cameras appear to be a worthwhile intervention to protect public safety.

Details: London: Cochrane Injuries Group, London School of Hygiene & Tropical Medicine, 2016. 66p.

Source: Internet Resource: Accessed July 29, 2017 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Documents/Speed_Cameras_SR.pdf

Year: 2016

Country: International

Keywords: Public Safety

Shelf Number: 146613


Author: Schucan-Bird, Karen

Title: Criminal Justice Interventions with Perpetrators or Victims of Domestic Violence: A Systematic Map of the Empirical Literature

Summary: ​Systematic mapping is a technique used to systematically identify and describe all of the available evidence in a particular area. A systematic map demonstrates the scope and nature of the evidence in an area and can help to identify research trends. Systematic mapping also enables the identification of gaps in the evidence base and can highlight possibilities for future, narrower review questions or where further research is needed. This map systematically identifies and describes the existing empirical evidence on criminal justice interventions in domestic violence. There is a growing body of evidence evaluating criminal justice agencies and their intervention in domestic violence. This map pulls that body of evidence together. The map shows that there is evidence on a wide range of domestic violence interventions. It also reveals a dramatic shift in research focus since the 1990s with an upsurge in research relating to perpetrator programmes. In addition, the map identifies areas where there are significant gaps in the evidence base, such as victim focussed interventions. To better understand the evidence around perpetrator programmes, a more in-depth review was undertaken using the evidence identified in this map.

Details: London: EPPI-Centre, Social Science Research Unit (SSRU), UCL-Institute of Education, 107p.

Source: Internet Resource: What Works: Crime Reduction Systematic Review Series: Accessed July 29, 2017 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Documents/CJ_interventions_map.pdf

Year: 2017

Country: International

Keywords: Domestic Violence

Shelf Number: 146614


Author: Sidebottom, Aiden

Title: A Systematic Review of Tagging as a Method to Reduce Theft in Retail Environments

Summary: Retailers routinely use security tags as a form of situational measure to reduce theft. Guided by the acronym EMMIE, this paper set out to 1) examine the evidence that tags are Effective at reducing theft, 2) identify the Mechanisms through which tags are expected to reduce theft and the conditions that Moderate tag effectiveness, and 3) summarise information relevant to the Implementation and Economic costs of tagging. Following a systematic search of the published and unpublished literature, and through consultation with four retailers, we identified fifty studies that met our inclusion criteria. Eight studies reporting quantitative data were assessed in relation to the effectiveness of tags, but heterogeneity in the type of tag and the reported outcome measures precluded a meta-analysis. Based on the available evidence it is difficult to determine the effectiveness of tags as a theft reduction measure, albeit there is suggestive evidence that more visible tags outperform less visible tags. The three identified mechanisms through which tags might plausibly reduce theft - increase the risks, reduce the rewards, increase the effort - were found to vary by tag type, and their activation dependent on five broad categories of moderator: retail store and staff, customers (including shoplifters), tag type, product type, and the involvement of the police and wider criminal justice system. Implementation challenges related to staffing issues and tagging strategy. Finally, although estimates are available on the costs of product tagging, our literature searches identified no high-quality published economic evaluations of tagging. The implications of our findings and suggestions for future research are discussed..

Details: London: What Works Centre for Crime Reduction, University College London, 2017. 61p.

Source: Internet Resource: What Works Crime Reduction systematic Review Series: Accessed July 29, 2017 at: http://library.college.police.uk/docs/college-of-policing/Retail-tagging-SR-2017.pdf

Year: 2017

Country: International

Keywords: Loss Prevention

Shelf Number: 146615


Author: Severinsen, Chrissy

Title: Female offending and youth justice interventions: A review of literature

Summary: Crime rates are trending downwards in Aotearoa New Zealand. This includes apprehension rates for children and young people, which have remained steady or decreased over the last 20 years (Ministry of Justice, 2015). Within the youth apprehension statistics, females comprise a minority of youth offenders. In Aotearoa New Zealand, one in five young offenders is female (Ministry of Justice, 2015; Statistics NZ, 2016). The apprehension rate for all offences for females is decreasing, and for violent offences has fallen sharply in recent years (Statistics NZ, 2016). International research also shows that females commit less serious crimes, are involved in crime over shorter periods of time, and present lower risk of harm to others (Arnull & Eagle, 2009 (UK); Best, 2013 (NZ); Leve et al., 2015 (US); Sharpe & Gelsthorpe, 2009 (UK)). It has been argued that female offending forms a response to emotional and relational issues, and that a high proportion of offending females are victims of abuse or trauma. However, the lower numbers of young female offenders has meant that political and academic attention has focused on males, and the particular needs of females have not been well-considered in youth justice systems (Arnull & Eagle, 2009 (UK); Criminal Justice Joint Inspection [CJJI](UK), 2014; Fitzgerald et al., 2012 (Australia)). There is also relatively little published research in New Zealand detailing profiles of young female offenders, or of effective gender-responsive interventions and strategies (Best, 2013 (NZ); Lynch, 2014 (NZ)). However, Swift's (2011; 2014a (NZ)) recent examination of young women's violent and anti-social behaviour in the Tasman Policing District of New Zealand, highlights the role that wider risk factors play in contributing to this and suggests community responses. Worldwide, juvenile justice systems have developed primarily in response to male offending (Arnull & Eagle, 2009 (UK); CJJI, 2014 (UK); Sharpe & Gelsthorpe, 2009 (UK)). It has been suggested that interventions designed to meet the needs of males may not be effective in meeting the needs of females (Arnull & Eagle, 2009 (UK)). A growing body of literature now advocates for the need to respond to differing and specific needs of offending females, in order to be effective (Arnull & Eagle, 2009 (UK); Best, 2013 (NZ); Walker et al., 2016 (US)). This literature review examines national and international literature on offending by young females and intervention programmes considered to be effective with females. Databases including Scopus, Academic Search Premier, and Google Scholar were searched using a combination and variations of the terms 'females', 'offending', 'intervention', 'programme', 'gender', 'responsive', 'juvenile', 'justice', 'delinquency', 'crime', 'female', 'young', 'women', and 'youth'. The resulting literature was reviewed and refined to those which covered the characteristics and profiles of young female offenders, or the characteristics and effectiveness of practice and interventions with females, including gender-specific practice. The review begins with a discussion of young women's pathways into offending, focusing on familial, contextual and individual risk factors that increase the likelihood of offending. It also considers protective factors which may reduce the likelihood of offending by reducing risk exposure, and it explores key differences between males and females who offend. This literature suggests while that females and males share many risk factors for offending, it remains unclear regarding the reasons for the gender gap in offending rates. Some authors emphasise that females experience a greater number of risks and as such have higher rates of mental illness, abuse and victimisation, and family conflict but it is not clear why this does not translate into equal or higher rates of offending (Fagan et al., 2007(US); Fagan & Lindsey, 2014 (US); Walker et al., 2016 (US)). Females are also recognised as having higher levels of welfare need, specifically related to the prevalence of and their vulnerability to abuse and victimisation (CJJI, 2014 (UK)). There appear to be a set of complex interactions between risk and protective factors; it is not possible to identify one explanatory factor or group of factors that predict female entry into, continuation of, and desistance from offending (Arnull & Eagle, 2009). Nonetheless, there are increasing calls to account for differences between young female offenders and both young male and adult women offenders, in addition to recognising the heterogeneity within the young female offending population (Arnull & Eagle, 2009 (UK); van der Put, et al., 2014 (Netherlands). Secondly, the review discusses current responses to females' offending, in particular gender-responsive interventions, and characteristics of effective practice are explored. Offending by young females has received very little study in comparison to males, leaving little guiding theory or evidence regarding the most effective interventions (Leve et al., 2015 (US)). There is some evidence about interventions that are effective more generally in youth justice, but no clear patterns regarding the types of programmes that are most effective by gender (Fagan & Lindsey, 2014(US)). While gender-specific programmes have increased in popularity, there is still a very small evidence base regarding justice interventions that work for females (Arnull & Eagle, 2009 UK); Leve et al., 2015 (US); Zahn et al. 2009(US)). Some research argues that interventions which focus on background needs young people who offend have, such as elevated family and neighbourhood risks, challenges in participating in mainstream education and problematic peer relationships are valuable for both females and males (Arnull & Eagle, 2009 (UK)). The review presents core components which characterise best practice in gender-responsive youth justice systems. These include acknowledging the links between trauma and females' offending, community-based programmes and diversion mechanisms, and support for young females as they transition into adulthood.

Details: Wellington, NZ: Massey University, 2016. 79p.

Source: Internet Resource: Technical Report 24: Accessed July 31, 2017 at: http://www.youthsay.co.nz/massey/fms/Resilience/Documents/Female%20offending%20literature%20review.pdf

Year: 2016

Country: International

Keywords: Delinquency Prevention

Shelf Number: 146630


Author: Staines, Jo

Title: Risk, Adverse Influence and Criminalisation: Understanding the over-representation of looked after children in the youth justice system

Summary: This paper presents a systematic review and narrative synthesis of the international literature on looked after children and young people's involvement in the youth justice system. It includes both published and 'grey' literature, and focuses on specific key areas of research relevant to looked after children's involvement in the youth justice system: risk and protective factors prior to entry to care; relationships, interventions and experiences during care periods; transitions out of care; and the policies and practices within both the care and youth justice systems that increase or reduce the chances of a looked after child becoming involved in the youth justice system. 1.1 Methodology Relevant literature was identified through searching the following databases: Social Care Online (Social Care Institute for Excellence), Social Sciences Citation Index, PsycINFO, Social Services Abstracts, EThoS, Child Welfare Information Gateway, Child Development & Adolescent Studies, British Education Index, Educational Resources Information Centre and Zetoc. Other databases that include 'grey' literature were searched, including the NSPCC Library, CommunityCareInform and the Youth Justice Board's Effective Practice Library; reports from relevant organisations were also included. Hand-searching, journal browsing, citation tracking, websites and personal contacts with authors were used to supplement the core database searches. To be included in the review, the literature needed to be available in English and be focused primarily on children and young people aged 10-18, or studies of young people who had previously been looked after; the review aimed to be inclusive in terms of ethnicity, gender, disability, sexual orientation, age, and religion/faith. The review includes empirical research, both qualitative and quantitative, and policy documents and guidance that enabled the identification of effective and/or innovative services and interventions. The literature search excluded children and young people admitted to mental health residential facilities, as these are a distinct group of children and young people with particular needs and characteristics. Research based on very small samples, with fewer than five participants, was also excluded due to the limited generalisability of such small-scale studies.

Details: London: Prison Reform Trust, 2016. 50p.

Source: Internet Resource: Accessed August 4, 2017 at: http://www.prisonreformtrust.org.uk/Portals/0/Documents/risk_adverse_influence_criminalisation_lit_review_lo.pdf

Year: 2016

Country: International

Keywords: Foster Care

Shelf Number: 146722


Author: Child Rights International Network

Title: Rights, Remedies & Representation: Global Report on Access to Justice for Children

Summary: Access to justice is a human right, but it is also what makes other rights a reality. For children's rights to be more than a promise, there must be a way for those rights to be enforced. Access to justice for children means that children, or their appropriate advocates where applicable, must be able to use and trust the legal system to protect their human rights. The legal system must provide children the means to obtain a quick, effective and fair response to protect their rights; the means to prevent and solve disputes; mechanisms to control the abuse of power; and all of this must be available through a transparent, efficient, accountable and affordable process. The importance of access to justice applies equally to children and adults, yet childrens rights in this area have long been neglected and ignored. This report is the result of a research project scrutinising how the legal systems of 197 countries empower children to realise their rights or perpetuate the rights violations that they should combat. With the support of hundreds of lawyers and NGOs from around the world, we have published a report for every country on earth setting out the status of the UN Convention on the Rights of the Child in national law; how the law treats children involved in legal proceedings; the legal means available to challenge violations of children's rights; and the practical considerations when challenging violations using the legal system. This research shows the way that national legal systems can be used to challenge violations of children's rights and the ways that children can use the law to assert their own rights. It identifies where the law falls short and where legal systems are designed in ways that make it difficult or impossible to combat abuses of children's rights. We have documented the good, the bad, the effective, the ineffective, the radical and the revolutionary ways that children can access justice around the world and now we want to use this information to promote their rights. It is not just governments that have a role to play in improving access to justice for children; myriad individuals and entities have an impact, from courts, national human rights institutions, the UN and regional bodies to civil society, parents and other legal representatives, lawyers, the media, and donors. We hope this project will guide governments on how to improve children's access to courts and other complaints mechanisms to enforce their rights, and encourage the UN and regional bodies to address children's access to justice in a more systematic way throughout their work. We hope it will inspire NGOs and children's advocates to consider stronger and more strategic forms of advocacy, and encourage lawyers to assist children and their representatives with seeking redress through the legal system.

Details: London: CRIN, 2016. 44p.

Source: Internet Resource: Accessed August 5, 2017 at: https://www.crin.org/sites/default/files/crin_a2j_global_report_final_1.pdf

Year: 2016

Country: International

Keywords: Child Advocacy

Shelf Number: 146732


Author: Haider, Huma

Title: Breaking the Cycle of Violence: Applying Conflict Sensitivity to Transitional Justice

Summary: Transitional justice processes may seek to address the legacies of mass violence and prevent future conflicts. However, the author of this paper believes that such processes are not only political, but that they can inadvertently exacerbate conflict by increasing social tensions and divisions. So, what can be done? The text's author suggests that one answer may be for transitional justice initiatives to adopt conflict sensitivity as a tool, an approach used by aid actors to understand the unintended consequences of their work

Details: Bern, SWIT: Swiss Peace, 2017. 44p.

Source: Internet Resource: Working Paper: Accessed August 7, 2017 at: http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/Swisspeace-Working-Paper_1702.pdf

Year: 2017

Country: International

Keywords: Reconciliation

Shelf Number: 146751


Author: McAfee

Title: Tilting the Playing Field: How Misaligned Incentives Work Against Cybersecurity

Summary: Cybercriminals have the advantage. This has been true since the internet was commercialized 20 years ago. The incentives for cybercrime have made it a big business and a dynamic marketplace. Defenders are hard pressed to keep up. Misaligned incentives explain much of this - both within organizations and between attackers and defenders in cyberspace. Misaligned incentives between attackers and defenders mean that the decentralized market in which cybercriminals operate makes them adapt and innovate faster and more efficiently than defenders, whose incentives are shaped by bureaucracies and top-down decision making. Some of the advantage cybercriminals have over defenders is due to technology - we now all know that the internet was never designed to be secure. Some is due to policy. There are countries that tolerate, shelter, and maybe even encourage cybercrime. Governments and companies know they are at a disadvantage, but they are playing catch-up. Managing the risk posed by cyberthreats has become a priority, but the best criminals still seem able to stay ahead, even as companies allocate more resources to cybersecurity. This does not mean cybercrime will always win. It does mean that companies and governments will need to rethink how they measure, reward and incentivize defense. Markets send signals by creating prices and rewards, creating incentives for action. The cybercrime market is efficient, and the incentives for cybercriminals are clear and compelling. The same is not true for defenders. Criminals flourish in this market, but most defenders work in bureaucracies. In most companies, cybersecurity is the responsibility of a diverse range of groups and individuals using different (and sometimes conflicting) metrics for success. Incentives are not only misaligned between attackers and defenders, but within companies. To examine this misalignment of incentives, we conducted a survey of 800 respondents from companies ranging in size from 500 employees to more than 5,000 across five major industry sectors, including finance, healthcare, and the public sector. Our survey targeted respondents with executive level responsibility for cybersecurity, as well as operators that have technical and implementation responsibilities for cybersecurity. The results provide insight into how each group views cyber risk in making decisions about an organization's cyber-risk management strategy. Better calibrating the misaligned incentives we uncovered may yield a more coherent and effective cybersecurity posture for companies worldwide.

Details: Santa Clara, CA: McAfee Security, Center for Strategic and International Studies, 2017. 34p.

Source: Internet Resource: Accessed August 7, 2017 at: https://www.mcafee.com/us/resources/reports/rp-misaligned-tilting-playing-field.pdf

Year: 2017

Country: International

Keywords: Computer Crime

Shelf Number: 146755


Author: GreeneWorks

Title: Engaging Men and Boys to End The Practice of Child Marriage

Summary: Engaging Men and Boys to End the Practice of Child Marriage explores how unequal gender norms uphold this practice and through program examples identifies the ways men and boys are helping to prevent child marriage and mitigate its consequences. Community norms around gender and age inequality, the low value of girls and women, and acceptance of patriarchy and male sexual entitlement to females lie at the root of child marriage. Ending this custom requires communities to collectively dismantle these discriminatory norms and replace them with new, equitable norms. The programs and approaches highlighted in this review have worked with men, boys, and their communities to shift their attitudes and behavior to encourage gender equality and discourage child marriage.

Details: Washington, DC: GreenWorks, 2015. 23p.

Source: Internet Resource: Accessed August 8, 2017 at: http://promundoglobal.org/wp-content/uploads/2015/04/Engaging-Men-and-Boys-to-End-the-Practice-of-Child-Marriage1.pdf

Year: 2015

Country: International

Keywords:

Shelf Number: 146777


Author: McGrath, Siobhan

Title: Addressing the demand side in and through supply chains: Mapping the field of initiatives around human trafficking forced labour and slavery

Summary: This working paper presents the first piece of data collection and analysis from WP9 'Globalised Production of Goods,' part of the overall DemandAT project. The paper offers a preliminary analysis of an inventory of initiatives around human trafficking and supply chains. We first consider how demand may be understood in the context of supply chains in relation to concerns around trafficking, forced labour and/or slavery (TFLS). We further begin to map the field of interventions at the TFLS-supply chain nexus. We analyse the range of actors involved, the forms that the initiatives take in terms of the mechanisms by which they would operate, and the scope of initiatives both in terms of industry and geography. The field of initiatives at the TFLS-supply chain nexus is seen to be growing quickly, and exhibits a high degree of variegation.

Details: Vienna, Austria: DemandAT, 2017. 38p.

Source: Internet Resource: DemandAT Working Paper No. 8: Accessed August 8, 2017 at: http://www.demandat.eu/sites/default/files/DemandAT_WP8_McGrathMieres_SupplyChains_Final.pdf

Year: 2017

Country: International

Keywords: Forced Labor

Shelf Number: 146780


Author: Cyrus, Norbert

Title: Learning from Demand-Side Campaigns against Trafficking in Human Beings: Evaluation as Knowledge-Generator and Project-Improver

Summary: Demand-side campaigns seek to influence the spending patterns of persons and organisations or to encourage the reporting of seemingly suspicious occurrences to helplines or the police. Although considerable funds are devoted to such campaigns, little is known about their effectiveness, mainly due to the lack of or insufficient evaluation. However, examples of critical internal evaluation show that evaluative insights are possible, particularly with projects designed with a view to their evaluability. Theoretical analysis of campaign types indicates that awareness-raising helps no one unless it leads to action, that the reduction of exploitation is a more logical primary aim than the reduction of trafficking for the purpose of exploitation, and that campaigns usually rely on complementary measures for their effectiveness. The interpretation of fragmented information in a theoretically structured way leads to additional conclusions. Campaigns often take on the guise of a big funnel, with several hundreds of thousands of people being targeted initially, yet filtering down to only a handful with the opportunity and motivation to behave as recommended at the end. Also, messages designed to attract attention can all-too-easily be misunderstood and have unintended and harmful side-effects for the public’s perception of victims and perpetrators. As a consequence, it seems promising to turn to more narrowly focused behaviour-change campaigns, to design them with a view to their evaluability and to evaluate them through a learning-oriented approach. Exemplary external evaluations with increased resources, as well as low-budget internal evaluations with the selective sharing of results, could increase our knowledge of what really works and what does not.

Details: Vienna, Austria: DemandAT, 2017. 62p.

Source: Internet Resource: DemandAT Working Paper no. 9: Accessed August 8, 2017 at: http://www.demandat.eu/sites/default/files/DemandAT_WP9_Cyrus-Vogel_Campaigns_June%202017.pdf

Year: 2017

Country: International

Keywords: Human Trafficking

Shelf Number: 146781


Author: Mieres, Fabiola

Title: Globalised Production of Goods: Project report

Summary: This report gathers the experience and presents the emerging results of research conducted by academics at Durham University's Geography Department on 'Globalised Production of Goods,' their contribution to thet DemandAT project. Data collection and preliminary analysis were carried out by Fabiola Mieres, PhD during the period November 2014-November 2016 and supervised by Siobhan McGrath, PhD. The overall aim of the research is to analyse existing and proposed initiatives to address trafficking, forced labour and/or (contemporary) slavery (which we term TFLS) in supply chains. The report is structured around the two key forms of data collection we conducted: first, the identification and mapping of 97 initiatives in the nascent field of governance over TFLS in and through supply chains (the TFLS-supply chain nexus). The dataset shows the variegated forms that this governance takes. Its construction further served as a source from which to choose case studies for further analysis by locating a group of initiatives in particular sectors. Second, we discuss the three case studies: electronics in Malaysia, construction in Qatar, and agriculture in the United States. Finally, preliminary conclusions are drawn with some indicators of potential areas for future research.

Details: Vienna, Australia: DemandAT, 2017. 74p.

Source: Internet Resource: DemandAT WP 9 Case Study: Accessed August 8, 2017 at: http://www.demandat.eu/sites/default/files/DemandAT_Globalised_Production_of_Goods_ProjectReport.pdf

Year: 2017

Country: International

Keywords: Forced Labor

Shelf Number: 146782


Author: Ostergren, Petra

Title: From Zero-Tolerance to Full Integration: Rethinking Prostitution Policies

Summary: This tenth DemandAT working paper by Petra Ostergren from Lund University develops a typology for prostitution policy regimes. Based on an inductive methodological approach, it presents a typology of three general prostitution policy models (or regimes), as repressive, restrictive or integrative. The intention of such a tripartite typology is that it can serve as a tool for assessing, evaluating and comparing prostitution policies, even in cases where they seem to contain contradictory or incoherent elements. Besides using the prostitution policy typology for analytical purposes, it can also serve as a tool for developing context-sensitive measures against violence, exploitation and trafficking in human beings in the sex work sector.

Details: Vienna, Austria: DemandAT, 2017. 42p.

Source: Internet Resource: DemandAT Working Paper no. 10: Accessed August 8, 2017 at: http://www.demandat.eu/sites/default/files/DemandAT_WP10_ProstitutionPoliciesTypology_June2017_0.pdf

Year: 2017

Country: International

Keywords: Human Trafficking

Shelf Number: 146783


Author: Lando, Henrik

Title: The Effect of Type-1 Error on Deterrence

Summary: A common view in the law and economics literature holds that equal increases in type-1 and type-2 error lower deterrence by the same amount. We demonstrate that this view is generally incorrect both when the court's error concerns the assessment of the alleged offender's act (mistake of act) and when it concerns the identity of the offender (mistake of identity). As for mistakes of act, the common view ignores that the two types of error are conventionally defined as court errors, i.e. as conditional on adjudication, and that abiding by the law reduces the probability of adjudication. This means that type-1 error exerts a lesser effect on deterrence than type-2 error. Moreover, we demonstrate that type-1 error may lead a potential offender to over-comply with the law, both when choice is binary and when it is continuous. This holds whether or not errors are defined as conditional on adjudication. As for mistakes of identity, we formalize the view that the potential offender may be falsely convicted of a crime committed by someone else whether or not he himself acts lawfully, and that type-1 error, whether or not it is defined as conditional on adjudication, therefore does not exert any direct effect on deterrence.

Details: Unpublished paper, 2016. 18p.

Source: Internet Resource: FSU College of Law, Public Law Research Paper No. 687: Accessed August 16, 2017 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=244.

Year: 2016

Country: International

Keywords: Deterrence

Shelf Number: 146784


Author: Smith, Zak

Title: Net Loss: The Killing of Marine Mammals in Foreign Fisheries

Summary: Few realize it, but nearly every foreign fish product sold in the United States enters the U.S. market in violation of federal law. From the cod and haddock that go into the fish sticks enjoyed by children to the sea bass served at fine restaurants, if it was imported, it probably entered this country illegally. The reason is simple: The Marine Mammal Protection Act (MMPA) requires that all imported fish or fish products be accompanied by proof that the technology used to land the catch does not kill or seriously injure whales, dolphins, and other marine mammals in excess of U.S. standards. Collecting dust for more than 40 years, this measure has never been enforced by the federal government, with predictable results: Foreign fisheries fail to invest in measures limiting harm to whales and dolphins; U.S. fisheries, which do make these investments, are placed at a disadvantage; and Americans unwittingly consume foreign fish or fish products caught using techniques that needlessly kill a multitude of marine mammals each year.

Details: New York: Natural Resources Defense Council, 2014. 48p.

Source: Internet Resource: Accessed August 22, 2017 at: https://www.nrdc.org/sites/default/files/mammals-foreign-fisheries-report.pdf

Year: 2014

Country: International

Keywords: Fishing Industry

Shelf Number: 131759


Author: Pawlak, Piotr

Title: Hidden Violence: prevention and responding to sexual exploitation and sexual abuse of adolescent boys. Case Studies and Directions for Action

Summary: This document provides a literature review on the issue of sexual exploitation of adolescent boys. National-level surveys have shown that boys experience sexual violence and sexual exploitation at rates lower than girls - but at rates that deserve greater attention than what they have been receiving. After the literature review, this publication presents experiences from 11 pilot projects that included research and the development of training and sensitization materials to service providers who work with child survivors of sexual abuse.

Details: Washington, DC: Promundo, 2012. 60p.

Source: Internet Resource: Accessed August 22, 2017 at: https://resourcecentre.savethechildren.net/node/8567/pdf/hidden_violence_-_preventing_and_responding_to_sexual_exploitation_and_sexual_abuse_of_adolescent_boys.pdf

Year: 2012

Country: International

Keywords: Adolescents

Shelf Number: 131731


Author: Newman, Jennifer

Title: Human-directed dog aggression; A systematic review

Summary: Human-directed dog aggression is a worldwide issue with major public health and animal welfare implications. Consequences for the target of aggression range from fear and minor injury, to life threatening injury and death, and for the dog impaired freedoms, restricted interactions and ultimately euthanasia. The systematic review undertaken here aimed to identify and assimilate all robust evidence regarding factors that affect the risk of human-directed dog aggression. Such information is vital for the development of sound preventive strategies. Multiple electronic literature databases were interrogated in order to identify all evidence for risk factors of human-directed dog aggression. The search strategy was designed to minimise the risk of publication and language biases, specificity was sacrificed for sensitivity. The threshold for acceptance of evidence was predetermined at a moderate level; any study that provided evidence with a low risk of confounding and bias and a moderate probability that any relationship identified was causal would reach the final review. Appraisal examined methodological quality, study design, selection process, measurement of outcome and exposures, and type and quality of analysis. All stages of appraisal were undertaken blind to the study findings. On assimilating the evidence identified, no robust evidence for any risk factors of human-directed dog aggression was identified. Eight studies provided a moderate level of somewhat conflicting evidence. Amongst those studies appraised as failing to reach the moderate level of acceptable evidence, the majority were excluded as a result of multiple limitations. It is vital that future research is undertaken to a high methodological standard in order that it provides robust evidence for the effect of any risk factor identified.

Details: Liverpool: University of Liverpool, 2012. 184p.

Source: Internet Resource: Thesis: Accessed August 23, 2017 at: https://livrepository.liverpool.ac.uk/7753/1/NewmanJen_June2012_7753.pdf

Year: 2012

Country: International

Keywords: Aggressive Animals

Shelf Number: 146883


Author: Ker, Katharine

Title: Interventions in the alcohol server setting for preventing injuries (Review)

Summary: Background Injuries are a significant public health burden and alcohol intoxication is recognised as a risk factor for injuries. There is increasing attention on supply-side interventions, which aim to modify the environment and context within which alcohol is supplied and consumed. Objectives To quantify the effectiveness of interventions implemented in the server setting for reducing injuries. Search strategy We searched the Cochrane Injuries Group Specialised Register (September 2004), Cochrane Central Register of Controlled Trials (The Cochrane Library Issue 3, 2004), MEDLINE (January 1966 to September 2004), EMBASE (1980 to 2004, wk 36), other specialised databases and reference lists of articles. We also contacted experts in the field. Selection criteria Randomised controlled trials (RCTs) and non-randomised controlled studies (NRS) of the effectiveness of interventions administered in the server setting which attempted to modify the conditions under which alcohol is served and consumed, to facilitate sensible alcohol consumption and reduce the occurrence of alcohol-related harm. Data collection and analysis Two authors independently screened search results and assessed the full texts of potentially relevant studies for inclusion. Data were extracted and methodological quality was examined. Due to variability in the intervention types investigated, a pooled analysis was not appropriate. Main results Twenty studies met the inclusion criteria. Overall methodological quality was poor. Five studies used an injury outcome measure; only one of these studies was randomised. The studies were grouped into broad categories according to intervention type. One NRS investigated server training and estimated a reduction of 23% in single vehicle night-time crashes in the experimental area (controlled for crashes in the control area). Another NRS examined the impact of a drink driving service, and reported a reduction in injury road crashes of 15% in the experimental area, with no change in the control; no difference was found for fatal crashes. One NRS investigating the impact of a policy intervention, reported that pre-intervention the serious assault rate in the experimental area was 52% higher than the rate in the control area. After intervention, the serious assault rate in the experimental area was 37% lower than in the control. The only RCT targeting the server setting environment with an injury outcome compared toughened glassware (experimental) to annealed glassware (control) on number of bar staff injuries; a greater number of injuries were detected in the experimental group (relative risk 1.72, 95% CI 1.15 to 2.59). A NRS investigating the impact of a intervention aiming to reduce crime experienced by drinking premises; found alower rate ofallcrimein theexperimental premises (rateratio 4.6, 95% CI 1.7 to 12, P = 0.01), no difference was found for injury (rate ratio 1.1. 95% CI 0.1 to 10, P = 0.093). The effectiveness of the interventions on patron alcohol consumption is inconclusive. One randomised trial found a statistically significant reduction in observed severe aggression exhibited by patrons. There is some indication of improved server behaviour but it is difficult to predict what effect this might have on injury risk. Authors' conclusions Thereis no reliableevidencethatinterventionsin thealcoholserversetting areeffectivein reducing injury.Compliancewith interventions appears to be a problem; hence mandated interventions may be more likely to show an effect. Randomised controlled trials, with adequate allocation concealment and blinding are required to improve the evidence base. Further well conducted non-randomised trials are also needed, when random allocation is not feasible.

Details: Cochrane Review, 2008. 48p.

Source: Internet Resource: Accessed August 25, 2017 at: http://alcoholresearchuk.org/downloads/finalReports/AERC_FinalReport_0034.pdf

Year: 2006

Country: International

Keywords: Alcohol Abuse

Shelf Number: 131972


Author: Oliver, Regina M.

Title: Teacher classroom management practices: effects on disruptive or aggressive student behavior

Summary: Disruptive behavior in schools has been a source of concern for school systems for several years. Indeed, the single most common request for assistance from teachers is related to behavior and classroom management (Rose & Gallup, 2005). Classrooms with frequent disruptive behaviors have less academic engaged time, and the students in disruptive classrooms tend to have lower grades and do poorer on standardized tests (Shinn, Ramsey, Walker, Stieber, & O‟Neill, 1987). Furthermore, attempts to control disruptive behaviors cost considerable teacher time at the expense of academic instruction. Effective classroom management focuses on preventive rather than reactive procedures and establishes a positive classroom environment in which the teacher focuses on students who behave appropriately (Lewis & Sugai, 1999). Rules and routines are powerful preventative components to classroom organization and management plans because they establish the behavioral context of the classroom by specifying what is expected, what will be reinforced, and what will be retaught if inappropriate behavior occurs (Colvin, Kameenui, & Sugai, 1993). This prevents problem behavior by giving students specific, appropriate behaviors to engage in. Monitoring student behavior allows the teacher to acknowledge students who are engaging in appropriate behavior and prevent misbehavior from escalating (Colvin et al., 1993). Research on classroom management has typically focused on the identification of individual practices that have some level of evidence to support their adoption within classrooms. These practices are then combined under the assumption that, if individual practices are effective, combining these practices into a package will be equally, if not more, effective. Textbooks are written and policies and guidelines are disseminated to school personnel based on these assumptions. Without research that examines classroom management as an efficient package of effective practices, a significant gap in our current knowledge base still exists. Understanding the components that make up the most effective and efficient classroom management system as well as identifying the effects teachers and administrators can expect from implementing effective classroom management strategies represent some of these gaps. A meta-analysis of classroom management which identifies more and less effective approaches to universal, whole-class, classroom management as a set of practices is needed to provide the field with clear research-based standards. This review examines the effects of teachers' universal classroom management practices in reducing disruptive, aggressive, and inappropriate behaviors. The specific research questions addressed are: Do teacher's universal classroom management practices reduce problem behavior in classrooms with students in kindergarten through 12th grade? What components make up the most effective and efficient classroom management programs? Do differences in effectiveness exist between grade levels? Do differences in classroom management components exist between grade levels? Does treatment fidelity affect the outcomes observed? These questions were addressed through a systematic review of the classroom management literature and a meta-analysis of the effects of classroom management on disruptive or aggressive student behavior.

Details: Oslo: Campbell Collaboration, 2011. 56p.

Source: Internet Resource: Campbell Systematic Review, 2011:4: Accessed At https://www.campbellcollaboration.org/media/k2/attachments/Oliver_Classroom_Management_Review.pdf

Year: 2011

Country: International

Keywords: Aggression

Shelf Number: 146898


Author: Simic, Olivera

Title: Distinguishing between exploitative and non-exploitative sex involving UN peacekeepers: the wrongs of "zero tolerance"

Summary: The links between the presence of peacekeepers and the sexual exploitation and abuse of women have been documented across peace support operations (PSOs). This expert analysis critically analyses the United Nations secretary general's Bulletin on Special Measures for Protection from Sexual Exploitation and Sexual Abuse, which was promulgated in 2003 to address the problem of sexual exploitation and abuse in the context of PSOs. The expert analysis is concerned with the broad definition of sexual exploitation provided by the bulletin, which includes most sexual relationships and prostitution. The expert analysis concludes that the bulletin’s definition of sexual exploitation is overinclusive in its "strong discouragement" of sexual relationships and prohibition of prostitution regardless of consent, age and fair remuneration. It argues that, as currently formulated, the bulletin undermines women's agency and sexual autonomy, and blurs important distinctions between consensual sex and sexual offences. The bulletin thus relies on and perpetuates negative gender stereotypes and imperial hierarchies and, consequently, encourages stigma and discrimination. It casts women as victims and peacekeepers as sexual predators who cannot treat women as equals.

Details: Norwegian Peacebuilding Resource Centre (NOREF), 2013. 4p.

Source: Internet Resource: Accessed August 25, 2017 at:

Year: 2013

Country: International

Keywords: Peacekeepers

Shelf Number: 131708


Author: Demant, Jakob

Title: What Did They Do? A qualitative review of the content of alcohol and drug prevention programmes targeting adolescents

Summary: As a group, adolescents exhibit a high rate of use of alcohol and illicit drugs, and a very broad range of preventative interventions have been employed to target this problem. A correspondingly large number of studies have been carried out to test the effects of such interventions. However, the impact studies rarely describe the actual content of the interventions in detail. Consequently, less is known about what was actually done in the prevention programmes than about their effects. This study is designed as a review focused on grouping the qualitatively different content components of the various approaches into a number of categories. This is achieved through a systematic review of literature from Western countries on the topic of school-based interventions and prevention initiatives targeting young people aged 12-20 and their consumption of alcohol and other drugs. We employ a modified version of the narrative synthesis approach described (Rodgers et al., 2009). The initial database used for the study consisted of 897 peer-reviewed academic articles published between January 2010 and December 2014 and retrieved from the databases Web of Science, PubMed, Sociological Abstracts and PsycINFO. This number was reduced to 33 studies through the elimination of irrelevant papers. Five categories of intervention were identified: 'Information-based or testing-based primary prevention approaches', 'Primary prevention approaches incorporating skill-training components', 'Universal or primary prevention approaches that include family components', 'Targeted approaches incorporating skill-training components', and 'Approaches incorporating digital features'. Only four studies were identified that employed any form of targeting or profiling of the subjects prior to the delivery of the prevention intervention or initiative. It is suggested that the skewness found in the categorisation towards primary prevention skill-training approaches should be addressed, given the very diverse consumption patterns found among adolescents in any given age group.

Details: Copenhagen: Rockwool Foundation, 2016. 23p.

Source: Internet Resource: Study Paper 115: Accessed August 28, 2017 at: http://www.rockwoolfonden.dk/app/uploads/2016/12/Study-paper-115-med-forside-Final_WEB.pdf

Year: 2016

Country: International

Keywords: Adolescents

Shelf Number: 146903


Author: Andersen, Lars Hojsgaard

Title: Assortative Mating and the Intergenerational Transmission of Delinquency

Summary: Research on the intergenerational transmission of delinquency tends to emphasize the strong association between fathers' involvement with the criminal justice system and sons' behavioral (i.e. delinquent) response. But the father-son association in delinquency is, however, not the only mechanism through which delinquency may travel across generations. Even though female rates of delinquency are generally low (even for women who experienced parental contact with the criminal justice system when they were girls) women could transmit delinquency across generations through their choice of partner. This paper uses administrative data on three generations in Denmark to show that assortative mating - the nonrandom selection of partners with similar characteristics - indeed make women just as likely as men to transmit delinquency across generations.

Details: Copenhagen: ROCKWOOL Foundation Research Unit, 2017. 31p.

Source: Internet Resource: Study Paper 119: Accessed August 28, 2017 at: http://www.rockwoolfonden.dk/app/uploads/2017/06/STUDY-PAPER-119-assortative-mating-WEB-1.pdf

Year: 2017

Country: International

Keywords: Antisocial Behavior

Shelf Number: 146904


Author: Andersen, Lars Hojsgaard

Title: The Impact of Paternal Incarceration on Boys' Delinquency: A New Method for Adjusting for Model-Driven Bias

Summary: Existing research is likely to have underestimated the mediating role of confounders, such as abilities, for the association between the delinquency of fathers and sons. Measures of sons' delinquency are often dichotomous, indicating whether a son experiences incarceration, for example, and scholars of criminology often apply nonlinear probability models to analyze such outcomes. But in so doing, we show, scholars involuntarily make their estimates vulnerable to model-driven bias. In this paper, we introduce to scholars of criminology a recent advance in the modeling of nonlinear probability models, the "KHB method", which corrects for model-driven bias. We use data from the NLSY97 to illustrate that existing strategies for estimating the impact of paternal incarceration on son's delinquency when mediating factors are taken into account produce biased estimates, and we use high quality registry data from Denmark to show that this is true even in administrative data and across length of incarceration. We also present and discuss the relationship between delinquency and abilities among sons, by paternal incarceration experience and by country, thereby adding to the burgeoning research on uneven consequences of paternal incarceration for children.

Details: Copenhagen: ROCKWOOL Foundation Research Unit, 2017. 33p.

Source: Internet Resource: Study Paper No. 120: Accessed August 28, 2017 at: http://www.rockwoolfonden.dk/app/uploads/2017/06/STUDY-PAPER-120-the-impact-of-paternal-incarceration-WEB.pdf

Year: 2017

Country: International

Keywords: At-risk Youth

Shelf Number: 146905


Author: McDougall, Cynthia

Title: Benefit-Cost Analyses of Sentencing

Summary: Sentencing policies are most frequently designed by policy-makers and implemented by the courts with the aim of punishing, deterring and rehabilitating offenders in order to reduce future re-offending. However many sentencing decisions are made without knowledge of the effectiveness of sentences in achieving their objectives, or the costs and benefits of the different sentencing alternatives. The following systematic review was conducted in order to address these questions and to review the existing evidence on the costs and benefits of different sentencing options. Results from costeffectiveness studies were retained to provide supporting information. Objective The objective of the review was to identify and assess the quality of studies of the costs and benefits of different sentencing options. Search Strategy Pre-screening and hand-searching of published and available unpublished literature was completed by two independent reviewers. The structured searches were carried out on studies published between 1980-2001, using nine electronic databases and by consulting experts in the field. Selection Criteria Studies were included in the review if they contained information on the costs and benefits of sentencing options. Due to the small number of benefit-cost studies found, cost-effectiveness study outcomes were also retained. Data collection and analysis Results from nine benefit-cost studies and eleven cost-effectiveness studies are reported in narrative and tabular form. Benefit-cost ratios are presented alongside benefit-cost outcome measures. The quality of studies is reported using the Maryland Scientific Scale (Sherman, Farrington, Welsh & Mackenzie, 2002) and a Benefit-Cost Validity Scale - Revised (Cohen & McDougall, 2008, Appendix 1). Main results The review found only nine studies providing costs and benefits information. Six of these studies were assessed as providing a 'valid' or 'comprehensive' benefit-cost analysis, acceptable on the Benefit-Cost Validity Scale - Revised, covering a range of different sentences. Two studies of In-prison Sex Offender Treatment were found to be cost-beneficial, in addition to an Intensive Supervision program and a Youth Wilderness Program, though the two latter interventions are less well-supported by the wider research evidence. Diversion from imprisonment to drug treatment was assessed by its authors to be cost-beneficial; and imprisonment for high risk offenders was considered to be cost-beneficial, though not for less prolific offenders or for drug offenders. The three studies which provided only a ‘partial’ benefit-cost analysis examined effectiveness of probation vs. prison, prisoners released early compared to those serving a full term, and house arrest with electronic monitoring. Reviewer's comments Due to the small number of studies uncovered by the review and, in some cases, poor methodologies, it has not been possible to draw firm conclusions from the individual studies in order to make comparisons between studies on the benefit-cost of particular sentencing options. Tentative conclusions are drawn, where supporting evidence is available, and the authors recommend improved quality of research design and the development of standardized methodologies for assessing the costs and benefits of criminal justice interventions.

Details: Oslo: Campbell Collaboration, 2008. 90p.

Source: Internet Resource: Campbell Systematic Review 2008:10: Accessed August 28, 2017 at: https://www.campbellcollaboration.org/media/k2/attachments/1041_R.pdf

Year: 2008

Country: International

Keywords: Cost-Benefit Analysis

Shelf Number: 146908


Author: Allen, Elizabeth

Title: The Illicit Trade in Tobacco Products and How to Tackle It. Second Edition

Summary: The second edition of this publication aims to raise awareness of the growing and evolving nature of the illicit trade in tobacco products. It is a compilation of facts and views from a wide range of sources, including respected academics, private sector consultants, journalists, international enforcement organizations, government revenue authorities and industry. It defines the different aspects of illicit trade and provides information on ways of measuring its size. It analyzes the nature of the problem, its causes and consequences, and offers authorities best practice guidance on implementing anti-illicit trade strategies. Examples and case studies are used to provide evidence of good practice and global efforts to tackle this serious problem.1 What is the Illicit Trade in Tobacco Products? Illicit trade manifests itself in two major ways: illicit imports and illicit domestic production. Illicit imports include counterfeit and genuine products, and increasingly, "cheap" or "illicit whites." These are brands produced legally in one country specifically for smuggling into another country where they have no legal market. Studies and experience show that the illicit trade in tobacco products is a global phenomenon, covering all continents, including high and low income countries alike. Cigarettes, being highly taxed, easy to transport, and possessing a lucrative risk to reward ratio, are among the most illegally trafficked goods in the world. According to Euromonitor International, "Illicit trade in cigarettes is the biggest illegal trade in a legal product in terms of value and second only to illegal drugs in terms of revenue generated by smugglers." Size and Measurement The overall consensus is that the global illicit trade in tobacco products is unacceptably large. Data published by Euromonitor International for 2012 suggest that one in ten cigarettes smoked around the world is illegal, representing about 600 billion cigarettes a year and resulting in annual government revenue losses of between US$40-$50 billion. Most governments do not attempt to measure the problem on a regular basis and remain unaware of the many negative effects the illicit tobacco trade can have on their economy and society. Without a robust means of measuring the extent of the problem, it is difficult for authorities to assess the effectiveness of strategies to combat it. Global Nature and Dynamics In recent years, the dynamics of illicit trade have evolved rapidly and present a continuous challenge for policymakers and enforcers. The explosive growth in "illicit white" cigarettes, made specifically for smuggling, has continued worldwide. There has been an expansion in distribution networks used by criminal organizations for the illicit trade in a wide range of products including tobacco and narcotics as well as human trafficking. Criminologists, enforcement authorities, and the Organisation for Economic Co-operation and Development (OECD) report that illicit trade in tobacco products has become a major security challenge in different environments around the world and is used increasingly to fund terrorism. The Impact on Society Illicit trade has a huge impact on the economic and social fabric of society. In addition to the lost revenue which undermines the tax base of economies, it obstructs economic development, undermines government health policy objectives such as youth access prevention and the rule of law. It supports corrupt practices, funds organized crime and terrorism and encourages the expansion of criminal activity. It undermines investment in manufacturing, innovation, trade and distribution by legitimate industry and negatively impacts employment. Societies where illicit cigarettes make up a significant proportion of total consumption, are seeing growing normalization of illicit products. This is especially true in areas of economic deprivation. Some believe that increasing taxation on tobacco products is the most effective method of reducing consumption. But tax hikes frequently lead to legitimate and taxed tobacco consumption being substituted by illicit and untaxed product, which is more affordable to the smoker. Causes and Facilitators How to Combat the Problem In developing comprehensive anti-illicit trade policies, governments need to pay particular attention to the involvement and effective coordination of all relevant government agencies (e.g. Customs, Police, Ministries of Finance, Health, Justice, Trade and local authorities) to ensure alignment and commitment to achieving the same goals. In addition, enforcement authorities need to be allocated adequate resources and encouraged to work closely with the other domestic stakeholders to combat the problem. Exchange of information with authorities in other countries and international enforcement organizations must be the norm. At the same time, legislation should be based on balanced policies with deterrent penalties administered by an efficient functioning judiciary. Public awareness needs to be strengthened and citizens must be provided with information on the implications of purchasing illicit products, such as unwittingly supporting organized crime and terrorism. Article 15 of the FCTC Protocol to Eliminate Illicit Trade in Tobacco Products (ITP) The critical importance of tackling the illicit tobacco trade on a global scale is recognized in the WHO FCTC whose governing body negotiated an Illicit Trade Protocol with over 170 governments. The new Protocol introduces more detailed binding obligations aimed at curbing the illicit trade in tobacco products. In particular, it sets out international guidance for national action on supply chain security, offenses and enforcement and international cooperation.

Details: Brussels: International Tax and Investment Center, 2012. 52p.

Source: Internet Resource: Accessed August 30, 2017 at: http://www.iticnet.org/images/AIT/English-TheIllicitTradeinTobaccoProductsandHowtoTackleIt.pdf

Year: 2012

Country: International

Keywords: Cigarettes

Shelf Number: 146940


Author: U.S. Chamber of Commerce

Title: Measuring the Magnitude of Global Counterfeiting: Creation of a Contemporary Global Measure of Physical Counterfeiting

Summary: Counterfeiting today represents a tremendous and ever increasing global threat. Counterfeit products- from goods and merchandise, tobacco products and industrial parts to currency and medicines - circulate across the globe. Yet these products cause real damage to consumers, industries and economies. First and foremost, counterfeit goods jeopardize consumers and pose a serious safety risk: fake toys contain hazardous and prohibited chemicals and detachable small parts; brake pads made of compressed grass; counterfeit microchips for civilian aircrafts; all these and many more may and tragically already have led to injuries and deaths. Counterfeit products also result in detrimental effects on economies due to decreased innovation, loss of revenue and taxation, and higher employment rate. Disturbingly, a growing body of evidence draws a clear link between physical counterfeiting and terrorist groups which exploit the easy-made money and high profit margin to fund terror activities around the world. The continuous growth of the global counterfeiting industry is a major cause for concern. Fueled by the proliferation of internet use and social media platforms, the magnitude of global physical counterfeiting is estimated to have increased considerably since the beginning of this century. One prominent example for this increase is reflected in the OECD's studies on global counterfeiting. In its first study from 2008 - The Economic Impact of Counterfeiting and Piracy - the OECD estimated that global trade of counterfeit goods accounted for 1.9% of world trade in 2007, or 250 billion USD. In its recently published study of 2016 - Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact - the OECD now estimates that global trade-related counterfeiting accounts for 2.5% of world trade, or 461 billion USD. A key finding from these two OECD studies is that global counterfeiting has grown both organically with a growth rate of 0.6% (of its estimated share of world trade), and, since world trade has in itself increased constantly since 2009, also grown in its overall dollar figure. In this context, the US Chamber's Measuring the Magnitude of Global Counterfeiting study seeks to make a contribution to this growing body of literature and complement the OECD's work in two ways: 1. The study provides a deep-dive analysis of trade-related physical counterfeiting on a comparative level, and; 2. It provides a breakdown of the share of the global rate of physical counterfeiting (as both a percentage and with a USD figure) for the 38 economies included in the 2016 U.S. Chamber of Commerce's GIPC International IP Index (fourth edition published in February 2016) based on new modeling of an economy's propensity for counterfeiting, including factors such as broader levels of IP enforcement and estimated rates of corruption. The study makes the following key findings: 1. China alone is estimated to be the source for more than 70% of global physical trade-related counterfeiting, amounting to more than 285 billion USD. Physical counterfeiting accounts for the equivalent of 12.5% of China's exports of goods and over 1.5% of its GDP. China and Hong Kong together are estimated as the source for 86% of global physical counterfeiting, which translates into 396.5 billion USD worth of counterfeit goods each year. 2. Despite China and Hong Kong's dominant share of global counterfeiting, a considerable amount of physical counterfeiting activity as share of world trade can be attributed to other economies as well. Indeed, the level of counterfeiting activity attributed to some economies is substantial and bears significant economic and public health implications, both locally and internationally. 3. In addition to the modeled estimates of rates of global physical counterfeiting and percentage attributed to each economy, this report has also examined the value of seized counterfeit goods in the 38 economies sampled and the World Customs Organization (WCO). The value of counterfeit goods seized and reported by customs authorities today from our sample of 38 economies ($5.2 billion) represents slightly less than 2.5% of the global measure of physical counterfeiting of $461 billion dollars. This suggests that though customs authorities' activities yield results and their efforts are highly laudable, the extent of their successes still represents "a drop in an ocean." This does not mean to say that economies should not continue to step up efforts to combat counterfeiting. Recent actions taken by economies include enhancing customs authorities' scope of action, strengthening IP protection, introducing targeted measures aimed at deterring counterfeiting, and joining international trade and enforcement initiatives. Taken together, these steps are expected to increase economies' ability to limit counterfeiting activities both domestically and globally over time. 4. Our analysis of seizure data from customs authorities shows that the dearth of seizure data is acute. Of the 38 economies examined in this study, only a third of the customs authorities publish data. Moreover, only a small proportion of these publish reliable, consistent, and detailed seizure statistics. Additionally, the data are often focused on intermittent seizures of varying scope and so do not necessarily reflect systematic efforts against counterfeiting.

Details: Washington, DC: U.S. Chamber of Commerce, Global Intellectual Property Center, 2016. 40p.

Source: Internet Resource: Accessed August 30, 2017 at: http://www.theglobalipcenter.com/wp-content/themes/gipc/map-index/assets/pdf/2016/GlobalCounterfeiting_Report.pdf

Year: 2016

Country: International

Keywords: Counterfeit Products

Shelf Number: 146943


Author: Cordesman, Anthony H.

Title: Global Trends in Terrorism: 1970-2016

Summary: Terrorism has become one of the dominating national security threats of the 21st century. It is also one of the most complex - mixing the actions of states, extremists, and other non-state actors in a wide range of threats and types of conflicts. Terrorists range from individuals carrying out scattered terrorist acts, to international terrorist networks of non-state actors, to state terrorism including the use of conventional forces and poison gas to terrorize portions of a civil population. Terrorism has also become a key aspect of civil war, insurgency/counterinsurgency, and asymmetric warfare, as well as ideological, ethnic, and religious warfare. There is no easy way to categorize the resulting patterns of violence, to measure their rise, or to set national security priorities. For more than a decade, the U.S. has focused on the threat of terrorism in Afghanistan and Iraq, but it has dealt increasingly with the expansion of the threat into North Africa, other parts of the Middle East, Sub-Saharan Africa, and the rest of the world. Key warfighting threats like the Islamic State and its affiliates, and the Taliban and Haqqani Network, are only a comparatively small part of the rising threat in the Middle East and North Africa (MENA), Sub-Saharan Africa, and South Asia. It is clear from the current trends in other regions that the threat of religious extremism may soon expand rapidly into the rest of Asia, and there are many other causes of terrorism in Africa, Europe, Latin America, the United States. Terrorism is often heavily driven by ideology, but it also is often a reaction to major shifts in population, ethnic and sectarian tensions, failed and corrupt governance, and the failure to broadly develop a given economy and offer employment and a future. No area is immune to the threat, and internal instability can drive terrorism anywhere in the world. The Burke Chair at CSIS has prepared a this report to provide a graphic overview of these trends from 1970 to the end of 2016. Each section first traces the patterns since 1970, and then focuses on the period from 2011-2016 - the years since the sudden rise of massive political instability and extremism in the MENA region. Finally. it covers global, regional, and key national trends and compares different estimates and sources for 2015 and 2016. The report draws primarily on reporting in the START database, but uses other reporting from sources like EU/Europol, IHS Jane's, and the IEP to illustrate different estimates, different perspectives, and the uncertainties in the data. The Contents of the Report The report shows key trends largely in graphic and metric form. It does not attempt to provide the supporting narrative that is critical to fully understanding these trends, nor to list all the many qualifications made by the sources used regarding the limits of their models and data. These are areas where the reader must consult the original sources directly - along with a wide range of narrative material and other sources - to fully understand the trends that are displayed. Even so, the report is necessarily complex. The report does show that there is value in looking at global trends, but makes it clear that many key trends are largely regional, and must be examined on a regional basis. It also provides key country-by-country breaks out to show that the driving factors shaping the nature of terrorism in any given case are usually national. International networks certainly play a key role, as do factors like religion and culture, but the forms terrorism take normally differ sharply even between neighboring countries. The report also must be detailed to highlight the differences and uncertainties in much of the data. There often are sharp differences in the most basic summary data, even between two highly respected sources like START and IHS Jane's. These differences do not reflect failures in the analytic efforts of the sources shown. They reflect differences that are inevitable in their need to rely on open source material, the lack of any clear definition of terrorism, the problems in measuring and displaying uncertainty, and the need to guess and extrapolate where key data are missing.

Details: Washington, DC: Center for Strategic and International Studies, 2017. 351p.

Source: Internet Resource: Working Draft: Accessed August 30. 2017 at: https://csis-prod.s3.amazonaws.com/s3fs-public/publication/170810_terrorism_trends_2016_report.pdf?20ItBY0su_GEhfyAoCYkS9bszjcOqX7i

Year: 2017

Country: International

Keywords: Counter-terrorism

Shelf Number: 146951


Author: Warner, Jason

Title: Exploding Stereotypes: The Unexpected Operational Characteristics of Boko Haram's Suicide Bombers

Summary: Introduction Since 2009, the Islamist group known as Boko Haram (formally known as Jama'atu Ahlis Sunna Lidda'awati wal-Jihad, or more recently, the Islamic State's West Africa Province [ISWAP]) has ushered in a wave of violence across the Lake Chad Basin region of West Africa, at the intersection of Nigeria, Niger, Chad, and Cameroon. Among other tactics that it has employed during its reign of terror, the group has been noted for its use of suicide bombers. While the prevalence of suicide bombings has been duly recognized, little remains known about the broader arc of their existence and efficacy: What strategic and operational trends underlie Boko Haram's use of suicide bombers, and how effective have they been at achieving their objectives? Just who are Boko Haram's suicide bombers? Where are they deployed, what do they target, and how do diferent bomber demographics difer in their actions? More broadly, what does Boko Haram's use of suicide bombers reveal about the past, present, and future of the terrorist group? Methodology Drawing on analysis of an original dataset of all Boko Haram suicide bombings from their first deployment in April 2011 to June 2017, this report presents the fullest picture available to date that tracks and analyzes Boko Haram's use of suicide bombers. To do so, we investigate two main phenomena from our dataset: operational trends of bombers (longitudinal trends, lethality, injuries, geography, and targeting trends) and demographic trends of bombers (gender, age, and recruitment). From these trends, we assert that it is possible to categorize Boko Haram's suicide bombing eforts into four distinct historical phases. In light of our understanding of the group's past and present operational and demographic trends, we conclude by suggesting how the group might act in the future and how counter-terrorism efforts might best address its likely incarnations. Overall Findings In the main, we argue that Boko Haram's operational profile is noteworthy in that, despite the attention the group garners for its deployment of suicide bombers, it shows itself to be less effective than otherwise expected in using them. Concurrently, we argue that Boko Haram's demographic profile is unique in that it created novel uses for women and children in its suicide bombing efforts, rendering it distinctive among extant and historical terrorist groups. Our dataset reveals that from April 11, 2011, to June 30, 2017, Boko Haram deployed 434 bombers to 247 diferent targets during 238 suicide-bombing attacks. At least 56% of these bombers were women, and at least 81 bombers were specifically identified as children or teenagers. A more comprehensive overview follows.

Details: West Point, NY: Combating Terrorism Center at West Point, 2017. 53p.

Source: Internet Resource: Accessed August 30, 2017 at: https://ctc.usma.edu/v2/wp-content/uploads/2017/08/Exploding-Stereotypes-1.pdf

Year: 2017

Country: International

Keywords: Boko Haram

Shelf Number: 146957


Author: Gywat, Oliver

Title: Counterfeit Products: New risks in global value chains

Summary: Such profitability has seen counterfeiting expand from its traditional core markets of luxury goods and art in recent years. It is now present, for example, in the automotive, chemicals, consumer electronics, foods and beverages, agricultural products and pharmaceuticals industries. For businesses in these sectors, its presence causes concern over loss of revenue and reputation as well as loss of consumer trust. The purchase of a counterfeit product may seem like a good bargain, particularly as the fall-out from the 2008 financial crisis continues to constrain household budgets. Yet counterfeits pose real risks to consumers, whether or not they are aware that the product is a fake. For example, counterfeiters routinely ignore health and safety regulations, which results in many counterfeits being 'laced' with unsuitable, and often harmful, substances to cut production costs. Counterfeits also have negative consequences for workers, public finances and the environment. But the most worrying, and most widely underestimated, aspect of counterfeiting is the pace at which it is evolving. The impact of a globalized economy, digitalisation and investment by international organised crime groups is rapidly enhancing the production and organizational quality of counterfeiting. In many cases, this has led to anti counterfeiting technology being bypassed and elaborate initiatives - such as the establishment of an entire fake company - to pass products off as legitimate. Recent cases have shown that counterfeiters quickly adopt any new fabrication and packaging technologies that assist their illicit activities. In future this might include, for example, 3D printing and other advanced, computer-controlled manufacturing techniques, which in principle allows for the production of fake goods directly in the targeted markets, avoiding risky imports through customs. The increasing sophistication of counterfeiters means that their products are no longer limited to cheap imitations sold on the black market. Given new opportunities provided by globalisation and outsourcing, counterfeits are now infiltrating distribution chains, masquerading as authentic products to wholesalers and retailers. Counterfeits are also entering official supply chains as intermediate products, for example as parts of automobiles or aircraft. The difficulty for distributors and manufacturers in identifying fakes exposes them to liability claims where the offending products cause harm to consumers, costly product recalls and expensive lawsuits. To respond effectively to the threat posed by counterfeiting, governments, regulators and the private sector must work together. Regulation must be applied more consistently at a regional and global level and be cognizant of where loopholes may lie in order to close them. Governments must similarly address counterfeiting on a broader basis, with an emphasis on raising public awareness, protecting intellectual property (IP) rights and customs enforcement. Businesses must prioritize the fight against counterfeiting as a board level issue. They should look to increase their internal resilience around IP and supply chain management, and consider new technology to identify fakes. Greater understanding of a firm's market and customers will also be helpful in these efforts, as will collaboration with industry peers and authorities at a national and international level. Finally, companies should assess their insurance coverage to clarify the extent to which risks posed by counterfeits are covered. They can then take appropriate action, drawing upon the risk engineering and safety expertise of insurance providers where necessary.

Details: Zurich: Zurich Insurance Company, 2014. 36p.

Source: Internet Resource: Risk Nexus: Accessed August 31, 2017 at: https://www.zurich.com/_/media/dbe/corporate/knowledge/docs/risk-nexus-november-2014-counterfeit-products.pdf?la=en&hash=C99A131C66D6F711815CCA715C2C1EACC2D54255

Year: 2014

Country: International

Keywords: Counterfeit Programs

Shelf Number: 146960


Author: Zurich Insurance Company

Title: Supply chain integrity: protecting companies' blind spots

Summary: Most companies are exposed to supply chain risk. Often problems affecting supply chains are accidental, like the result of a fire at a supplier's plant, or due to a natural catastrophe. But when a supply chain is affected by fraud, such as deliberate tampering or the production of counterfeits, the risks quickly become much more complex: injury or even death can result. Compromised supply chains can destroy a carefully-cultivated brand, hurt trust, hit profits and land senior executives in jail. Zurich Insurance Group and SICPA, a Switzerland-based company specializing in global security solutions, believe companies can increase their ability to safeguard against deliberate supply-chain 'infiltration,' such as that caused by counterfeit or tampered products. In a detailed study, they offer numerous recommendations and examples gathered in interviews with government and industry experts, enforcement specialists, risk managers and executives at large corporations. Greed often the motive Greed is often a key motive behind supply chain infiltrations; perpetrators may want to make money with shoddy, defective or counterfeit products. Supply chain infiltration can mean producing counterfeit goods that look like established brands but don’t work like them or put unsuspecting consumers at risk - counterfeit medicines, for example, or even fire extinguishers. Zurich highlighted in an earlier Risk Nexus publication, 'Counterfeit products: new risks in global value chains,' that we are currently witnessing an 'arms race' pitting counterfeiters against brand owners. In fact, organized crime groups in some cases apply highly sophisticated methods to produce and distribute counterfeit or tampered products, contributing to the exceptional growth of this type of fraud over recent years. One key vulnerability identified in this study arises from 'blind spots' in complex supply chains. The study also notes that problems may often be found in emerging markets: in China, for example, in 2008, several companies were found to be selling dairy products containing melamine, an industrial chemical. The products included milk and infant formula, which were not only consumed locally but sold abroad, too. The usual analytical tests don't spot melamine, which can make milk appear to have a higher protein content. It can also cause kidney failure, resulting in death. The adulteration was possible using an astonishing level of technical sophistication. The sophistication was at such a high level that, if it had not been for a mass poisoning due to the use of melamine, no one likely would have noticed that the milk was watered down and the apparent protein content 'boosted' by adding the chemical. While problems affecting parts of the supply chain are often associated with developing countries, they can also affect markets in places where people accept food safety as a given. The study cites, for example, a well-publicized case in Western Europe involving companies, some whose brands are household names, which bought beef from trusted suppliers. These companies were unaware that their meat suppliers had switched from producing the meat in-house, and were now sourcing it from third-parties. Some of the so-called 'beef' supplied by these sub-suppliers turned out to be horsemeat. When criminals are involved in such activities, they often operate boldly. Often such crimes are so sophisticated that detecting them and determining their extent requires expert assistance. Keeping abreast of complex supply chain risks To counter these risks, the study recommends that companies map their supply chain from the level of raw materials all the way through to the endconsumer and analyze the related risk exposures in detail. Zeroing in on the flow of intermediate and finished products in the supply chain, companies should also examine their product security strategy. Analyzing 'blind spots' in the supply chain helps to develop strategies to increase the resilience of a company in the event that an infiltration incident occurs. The study offers a set of points of focus, areas that companies can include in tailoring a supply-chain risk strategy best suited to their individual needs. Supply chain visibility requires mapping a company's network to really know who a company's suppliers and distributors are, and how supply streams create critical risk exposures and interdependences. This process also assumes that top executives are in charge of global strategic risk management. Advanced data analytics, or ‘big data’ can be used to visualize key delivery routes, simplify distribution networks, and enhance supply chain security by simplifying product traceability and recalls. Managing ‘traditional’ supply chain risk exposures is also part of the process. Standard ways to do this include looking for weak points, such as placing too much reliance on a single supplier. Once all suppliers and sub-suppliers have been identified, these need to be monitored, and binding standards have to be enforced – in these efforts, some companies work with external companies specialized in fraud detection and protecting against such risks. Risks in the logistics chain also need to be addressed: logistics hubs increase risk exposures. This is especially true in free-trade zones, which may offer criminals easy inroads into supply chains. Some bodies are active in helping to mitigate these risks, which can also be associated with terrorists: the World Customs Organization (WCO) has adopted standards that include those aimed at increasing global supply chain security. Protecting intellectual property rights in the relevant markets is required to take legal action against counterfeiters. However, especially small and medium-sized companies often fail to take the necessary precautions to protect intellectual property when doing international business. Keeping close contact with consumers is another way to spot problems and learn where they might arise; customer hotlines, a dedicated email address and social media can help. Companies must also respond quickly and credibly when a problem arises. Especially when a problem puts consumers at risk, the way a supply chain crisis is handled could literally make or break a company.

Details: Zurich: Zurich Insurance Co., 2015. 38p.

Source: Internet Resource: Risk Nexus: Accessed September 1, 2017 at: https://www.sicpa.com/sites/default/files/news/files/risk-nexus-supply-chain-integrity-november-2015.pdf

Year: 2015

Country: International

Keywords: Consumer Fraud

Shelf Number: 146990


Author: Organisation for Economic Co-operation and Development

Title: Mapping the Real Routes of Trade in Fake Goods

Summary: Trade in counterfeit and pirated goods is a vital threat for modern, innovation-driven economies, a worldwide phenomenon that grows in scope and magnitude. Counterfeiters ship infringing products via complex routes, with many intermediary points, which poses a substantial challenge to efficient enforcement. This study looks at the issue of the complex routes of trade in counterfeit pirated goods. Using a set of statistical filters, it identifies key producing economies and key transit points. The analysis is done for ten main sectors for which counterfeiting is the key threat. The results will facilitate tailoring policy responses to strengthen governance frameworks to tackle this risk, depending on the profile of a given economy that is known as a source of counterfeit goods in international trade.

Details: Paris: OECD, 2017. 159p.

Source: Internet Resource: Accessed September 1, 2017 at: https://euipo.europa.eu/tunnel-web/secure/webdav/guest/document_library/observatory/documents/reports/Mapping_the_Real_Routes_of_Trade_in_Fake_Goods_en.pdf

Year: 2017

Country: International

Keywords: Counterfeit Products

Shelf Number: 147000


Author: Schmucker, Martin

Title: Sexual offender treatment for reducing recidivism among convicted sex offenders: a systematic review and meta-analysis

Summary: Treatment of sexual offenders reduces reoffending, but more research needed to identify effective interventions Treatment can reduce reoffending (recidivism) rates of sexual offenders. But the results of individual studies are too heterogeneous to draw a conclusion on the general effectiveness of sex offender treatment. What is this review about? Sexual offender treatment programs to reduce reoffending have been implemented in many countries as part of a strategy in managing this offender group. However, there are still controversies regarding their effectiveness. This review integrates findings from six experimental and 21 quasi-experimental studies that compare groups of treated sexual offenders with equivalent control groups. These studies tested whether treated sexual offenders differed from the control groups in sexual and other reoffending. What are the main findings of this review? What studies are included? Included studies compare official recidivism rates of treated sexual offenders with a comparable group of sexual offenders that have not been subjected to the respective treatment. Quasiexperimental studies were included only if they applied sound matching procedures, where the incidental assignment would not introduce bias, or where they were statistically controlled for potential biases. The treatment had to explicitly aim at reducing recidivism rates. The review summarizes 27 studies containing 29 eligible comparisons of a treated group and a control group, containing data for 4,939 treated and 5,448 untreated sexual offenders. The studies come from seven different countries, but more than half of the studies have been carried out in North America. All eligible comparisons evaluated psychosocial treatment (mainly cognitive behavioral programs). No studies on pharmacological/hormonal treatment were found which meet the inclusion criteria. Does treatment of sexual offenders reduce recidivism? On average, there is a significant reduction in recidivism rates in the treated groups. The odds to sexually reoffend were 1.41 lower for treated compared to control groups. This equals a sexual recidivism rate of 10.1 percent for treated offenders compared to 13.7 percent without treatment. The mean rates for general recidivism were higher, but showed a similar reduction of roughly a quarter due to treatment. The results from the individual studies were very heterogeneous, that is individual study features had a strong impact on the outcomes. Methodological quality did not significantly influence effect sizes. Cognitive-behavioral as well as studies with small samples, medium to high risk offenders, more individualized treatment, and good descriptive validity revealed better effects. There was no significant difference between various settings. We found significant effects for treatment in the community and in forensic hospitals, but there is not yet sufficient evidence to draw conclusions regarding the effectiveness of sex offender treatment in prisons.

Details: Oslo: Campbell Collaboration, 2017. 78p.

Source: Internet Resource: Accessed September 1, 2017 at: https://www.campbellcollaboration.org/media/k2/attachments/0050_CCJG_Schmucker_-_Sexual_offender_treatment.pdf

Year: 2017

Country: International

Keywords: Recidivism

Shelf Number: 147001


Author: Hug, Erin C.

Title: The Role of Isolation in Radicalization: How Important Is It?

Summary: This thesis will provide readers an in-depth analysis of three well-known terrorists in order to highlight the role isolation played in their radicalization process. This thesis researched Timothy McVeigh, responsible for the 1995 Oklahoma City bombings; Anders Behring Breivik, responsible for the 2011 massacres in Oslo and Utya, Norway; and Omar Hammami, an American-born individual believed to have been involved in numerous terrorist attacks throughout Somalia on behalf of al-Shabaab. The research evaluated both international and domestic terrorists with differing ideologies, and these individuals were found to represent a broad spectrum. The thesis specifically evaluated whether or not each individual experienced social, emotional, or perceived isolation at any point throughout his radicalization process. It was determined that isolation does play a very multifaceted role in both the initial involvement and initial engagement phases of radicalization. By better understanding the contributing factors of radicalization, homeland security officials may be better positioned to effectively intervene, prevent, or deter radicalization.

Details: Monterey, CA: Naval Postgraduate School, 2013. 138p.

Source: Internet Resource: Thesis: Accessed September 2, 2017 at: https://calhoun.nps.edu/handle/10945/38949

Year: 2013

Country: International

Keywords: Counter-Terrorism

Shelf Number: 147022


Author: Celermajer, Danielle

Title: International Review: Current Approaches to Human Rights Training in the Law Enforcement and Security Sectors

Summary: This report has two aims: (1) to provide a critical overview of existing human rights training developed for security forces and (2) to develop some principles for how actors involved in funding, developing and delivering training could make it more effective. Despite the extensive investment of resources and effort in human rights training across the world, there is, surprisingly, no comprehensive database of training. Nor has there been a broad and robust debate about the principles and practices of effective training. As such, this report is intended to act as a catalyst for collecting and compiling training resources. It is also intends to invite actors from international organisations, non-government organisations, national human rights institutions and the training sections of security organisations to enter a critical and sustained conversation. This conversation should focus on two questions: What are we doing when we train for human rights? And, what types of practices and principles ought to guide our work? The research for this report was conducted in the course of undertaking a larger project on the prevention of torture in the security sector: Enhancing Human Rights Protections in the Security Sector in the Asia Pacific. The aim of this larger project was to identify more effective approaches to preventing torture, with a particular focus on strategies to develop the capacities of personnel in security agencies to address and prevent such practices. In the course of conducting research on torture, we arrived at the view that the type of human capacity building that would be most effective needed to go beyond education and training, as these have been traditionally understood. Nevertheless, historically, capacity building in the field of human rights has been largely taken the form of education and training. Accordingly, as part of the process of devising our own approach, we felt that it was important to examine and analyse existing human rights training material and approaches that has been developed internationally for the security sector. Once we began to examine and critically analyse the material that we collected, however, it became apparent that there was a need to attend to human rights training for the security sector as a distinct stand-alone research topic. On the one hand, our research indicated that the provision of human rights education and training for security personnel has become a widespread trend internationally; on the other, we found a dearth of discussion about the quality of this material, its impact or the politics of the training field. Human rights training resources and program have been and continue to be funded and developed and delivered by a range of international organisations, civil society organisations and in-house training institutes, and human rights training constitutes a frequently recommended form of action to states in relation to compliance with their human rights obligations. Unfortunately, the statistics on funding for human rights projects that focus on training and education in the security sector that would be required to draw conclusions about the extent of the effort are unavailable and as such, we cannot accurately calculate how widespread such training programs are, nor the level and proportion of resources that is invested in them. Nevertheless, we do know, both from our initial review of the material and from the place that training and education plays in the work of human rights organisations, that they are, and are increasingly, assumed to be amongst the basic strategies for protection and promoting human rights. For example, training for law enforcement and military personnel forms one of the articles of the Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT) 2 and accordingly frequently appears amongst the recommendations of the concluding observations of the CAT Committee in response to periodic reports.

Details: Sydney: University of Sydney, 2015. 44p.

Source: Internet Resource: Accessed September 2, 2017 at: http://sydney.edu.au/arts/research/ehrp/downloads/EHRP_International_Training_Review.pdf

Year: 2015

Country: International

Keywords: Human Rights

Shelf Number: 147027


Author: Samuel, Thomas Koruth

Title: Reaching the Youth: Countering the terrorist narrative

Summary: Youths are full of potential and will determine the future. Extremists, terrorists and all who prey upon the youth have always understood this well. However, while there are numerous debates, conferences and concept papers among the authorities, academic circles, civil society and people in general on the meaning, parameters and extent of this premise, I would argue that terrorists and extremists are far ahead in realising this truth, developing methods and techniques to capitalise on this potential, and they will without doubt ride the 'coat tails' of these youth in shaping the future according to their vision. Where does that leave us? This study hopes to look into the dynamics between the youth and the terrorist, the push and pull factors and the subsequent consequences, the narrative of the terrorists that make such a relationship possible and the possible counternarrative. It must be clearly stated at the onset however, that this study is very much a work in progress. There still remains a great need to do further quantitative and qualitative work in this particular area, a more in-depth study at the ground level and a more extensive survey of the literature currently available. In short, this study is just the beginning.

Details: Lampur, Malaysia: The Southeast Asia Regional Centre for Counter-Terrorism (SEARCCT), 2012. 89p.

Source: Internet Resource: Accessed September 2, 2017 at: http://www.searcct.gov.my/images/PDF_My/publication/Reaching_the_Youth_Countering_The_Terrorist_Narrative.pdf

Year: 2012

Country: International

Keywords: Counter-Terrorism

Shelf Number: 147031


Author: Ross, Hana

Title: Approaches for Controlling Illicit Tobacco Trade - Nine Countries and the European Union

Summary: An estimated 11.6% of the world cigarette market is illicit, representing more than 650 billion cigarettes a year and $40.5 billion in lost revenue (1). Illicit tobacco trade refers to any practice related to distributing, selling, or buying tobacco products that is prohibited by law, including tax evasion (sale of tobacco products without payment of applicable taxes), counterfeiting, disguising the origin of products, and smuggling (2). Illicit trade undermines tobacco prevention and control initiatives by increasing the accessibility and affordability of tobacco products, and reduces government tax revenue streams (2). The World Health Organization (WHO) Protocol to Eliminate Illicit Trade in Tobacco Products, signed by 54 countries, provides tools for addressing illicit trade through a package of regulatory and governing principles (2). As of May 2015, only eight countries had ratified or acceded to the illicit trade protocol, with an additional 32 needed for it to become international law (i.e., legally binding) (3). Data from multiple international sources were analyzed to evaluate the 10 most commonly used approaches for addressing illicit trade and to summarize differences in implementation across select countries and the European Union (EU). Although the WHO illicit trade protocol defines shared global standards for addressing illicit trade, countries are guided by their own legal and enforcement frameworks, leading to a diversity of approaches employed across countries. Continued adoption of the methods outlined in the WHO illicit trade protocol might improve the global capacity to reduce illicit trade in tobacco products. Data on approaches for addressing illicit trade were obtained from a combination of sources from individual countries, including literature searches, reports by international agencies and nongovernmental organizations, industry documents, online data sources by agencies that oversee enforcement, and interviews with in-country experts.* The following 10 most commonly identified approaches were evaluated: 1) licensing, 2) product markers, 3) national recordkeeping, 4) track-and-trace systems, 5) enforcement, 6) export tax, 7) tax harmonization, 8) agreements with tobacco industry, 9) promotion of public awareness, and 10) coordination among agencies. The status of these approaches was assessed in nine countries (Brazil, Canada, Hungary, Italy, Malaysia, Romania, Spain, Turkey, and the United Kingdom [UK]), and EU. These countries were selected based on data availability and participation in the WHO Framework Convention on Tobacco Control (FCTC). EU is described separately from its member states because current approaches used by individual member states may differ from the central EU action plan. Approaches were assessed as of January 2015.

Details: Atlanta: Centers for Disease Control and Prevention, 2015. 6p.

Source: Internet Resource: Accessed September 9, 2017 at: https://www.cdc.gov/mmwr/preview/mmwrhtml/mm6420a3.htm

Year: 2015

Country: International

Keywords: Illegal Tobacco Trade

Shelf Number: 147164


Author: Framework Convention Alliance

Title: The use of technology to combat the illicit tobacco trade

Summary: A number of industries face a growing trend: new requirements to identify a consumer product in trade, to verify its authenticity and to trace it. The tobacco sector has joined these industries. The Framework Convention on Tobacco Control, a World Health Organization treaty, identifies elimination of illicit trade in tobacco products as a key element of global tobacco control. The treaty requires in Article 15.2(b) that Parties should "consider, as appropriate, developing a practical tracking and tracing regime that would further secure the distribution system and assist in the investigation of illicit trade." Negotiations have begun on a supplementary treaty, or protocol, for combating illicit tobacco trade. In the context of the Article 15.2(b) requirement, this paper is intended to provide a reference source on existing systems. A tracking system allows authorities to monitor the movement of tobacco products. Tracing helps authorities pinpoint where tobacco was diverted into illegal channels. During the negotiations on the FCTC and the protocol, we have noticed many misconceptions about tracking and tracing. Sometimes systems were described as tracking and tracing but they did not allow totally, or in part, the monitoring of tobacco products at the international level. The purpose of this paper is to clarify the concepts, to describe the current use of technology to combat illicit tobacco trade and to identify merits and limitations of these practices. This paper describes the use of codes and markings on tobacco packaging and tax stamps to allow a better monitoring of the tobacco trade. It also gives an overview of coding technologies that are used, or are in development, in the tobacco industry and other sectors.

Details: Geneva, SWIT: FCTC, 2008?. 6

Source: Internet Resource: Accessed September 9, 2017 at: www.fctc.org

Year: 20080

Country: International

Keywords: Illegal Tobacco Trade

Shelf Number: 147165


Author: Manning, Matthew

Title: Economic Analysis: A Brief Guide for Crime Prevention Practitioners

Summary: Resources are always limited and decisions have to be made as to how to allocate them. In the context of crime prevention, economic analysis is about how limited resources have been used and might be better used to yield improved social outcomes. Economists have devised a range of techniques to assess the returns on resource usage in the private, public and voluntary sector. An extended document laying out the foundations of economic analysis and some forms it can take is available from Manning et al. (2015). Expert advice will be needed for all but the most basic analysis, and so the aim of this brief paper is to make you an intelligent consumer of such work, to alert you to the basic ideas, and to describe some options for the forms economic analysis can take and the uses to which it can be put. The key question is always that of determining how and where more might be got for the same or less investment. All uses of resources involve 'opportunity costs'. Opportunity costs comprise those uses to which resources could otherwise be put. Resources could be put to cars, buildings, staff or technology. Buildings might be used for one purpose or another. Volunteer time on a project could be put to earning a salary, to leisure or to some other voluntary activity. Police resources could be spent on patrol, efforts at detection, fostering neighbourhood watch or efforts to catch people speeding or some combination of these. And so on. Economic analysis is about helping you to make informed, evidence-based choices that will yield the best return. What goes into estimating both the costs and benefits of a given activity is crucial to economic analysis, and putting numbers to costs and benefits can be challenging. Analysing the significance of findings and working out their implications, especially when there are winners and losers, is tricky conceptually and practically. This work requires the use of models that will be unfamiliar to the layperson. There are many traps for the unwary, which is again why advice is needed to make sure that assumptions are valid and techniques sound. Ideally, the aim is to move towards 'Pareto efficiency,' a condition where no further changes in allocation will yield an advantage to one person that is not offset by making anyone else worse off. This is easier said than done! Indeed, where implemented policies affect diverse populations, Pareto efficiency will often be impossible to achieve in practice. Improvements, however, (Pareto) will be possible to achieve and from an economic perspective, an intervention is said to be "KaldorHicks" efficient if there are net social benefits. That is, if benefits are experienced by some sections of society and those benefits exceed any costs experienced by others. It is on this latter criterion that many forms of Economic Analysis (e.g. Cost Benefit Analysis, see below) are based.

Details: London: College of Policing, 2015. 14p.

Source: Internet Resource: Accessed September 9, 2017 at: http://whatworks.college.police.uk/Research/Documents/Economic_Analysis_brief-FINAL.pdf

Year: 2015

Country: International

Keywords: Cost-Benefit Analysis

Shelf Number: 147177


Author: Vilalta, Carlos

Title: Global Trends and Projections of Homicidal Violence: 2000 to 2030

Summary: There are marked differences in the evolution of intentional homicide in different regions of the world. While global homicide rates are at historic lows, there are regions where homicidal violence is persistent and shows no sign of decreasing. This Homicide Dispatch explores these regional variations, identifying the countries that are driving past and present trends. The Dispatch also offers short-term projections of homicide in the coming years. It finds that while homicide rates are decreasing (Africa, Asia, Europe and North America) or stable (Oceania), they nevertheless continue increasing in Latin America. Specifically, Central America and the Caribbean are the main drivers of upward trends. Future projections show that homicides may become rare events in most parts of the world even as they increase in Latin America.

Details: Rio de Janeiro: Igarape Institute, 2015. 16p.

Source: Internet Resource: Accessed September 9, 2017 at: https://igarape.org.br/en/homicide-dispatch-2/

Year: 2015

Country: International

Keywords: Crime Statistics

Shelf Number: 147195


Author: Organisation for Economic Co-operation and Development

Title: Effective Means of Investigation and Prosecution of Corruption: Proceedings of the Seminar

Summary: The expert seminar "Effective Means of Investigation and Prosecution of Corruption" took place from 20 to 22 October 2010 in Bucharest, Romania. This seminar was organised as part of the work programme of the Anti-Corruption Network for Eastern Europe and Central Asia (ACN) of the Organisation for Economic Co-operation and Development (OECD). It was organised by the ACN Secretariat and hosted by the National Anticorruption Directorate (DNA). ACN is a global relations initiative of the OECD Working Group on Bribery. ACN aims to support anticorruption reforms, promote exchange of experience and elaboration of best practices in fighting corruption in Eastern Europe and Central Asia. ACN operates through general meetings, thematic and analytical activities and sub-regional initiatives. The seminar was hosted by the National Anticorruption Directorate (DNA), the specialized anticorruption prosecution agency of Romania, set up in 2002 and, at present, integrated in the Prosecutor's Office attached to the High Court of Cassation and Justice. DNA focuses on high and medium level corruption cases and concentrates specialization, training and technical resources in this area. 145 prosecutors, 170 judicial police officers, 55 specialists, as well as 200 auxiliary, administrative and economic personnel are employed by the DNA. During the last 5 years, more than 2700 defendants have been sent to trial and approximately 650 defendants are already convicted with final decisions. Half of the convicted persons are public officials with leading, control or decision positions. The Istanbul Anti-Corruption Action Plan is the main ongoing sub-regional initiative of the ACN. It focuses on reviews of legal and institutional framework to fight corruption, implementation of recommendations and monitoring of their implementation in participating countries through a "peer review". Since the second round of monitoring under the Istanbul Action Plan equally important as monitoring are a series of "peer learning" activities, mainly training seminars, for practitioners. Since 2001, the ACN has already carried out several thematic and analytical activities in selected areas of anti-corruption reforms. A project on criminalisation of corruption started in 2005 and resulted in a publication "Corruption: A Glossary of International Standards in Criminal Law" and two expert seminars - on International Anti-Corruption Standards in Kiev, Ukraine in February 2005 and Criminalisation of Corruption: Liability of Legal Persons for Corruption, Confiscation of the Tools and Proceeds of Corruption and Mutual Legal Assistance in Corruption-Related Cases in Almaty, Kazakhstan in March 2007. For more information on ACN activities, see the ACN web site www.oecd.org/corrruption/acn. The aim of this expert seminar was to encourage sharing of experience and good practice on investigation and prosecution of corruption and encourage networking of practitioners: investigators, prosecutors and specialised anti-corruption units investigating and prosecuting corruption crimes. The seminar covered the following issues: methods of detection and investigation and prosecution of corruption crimes, experience in investigation of high level corruption, foreign bribery and corruption in health sector, role of independence and specialisation of police and prosecutors and asset tracing, forfeiture and confiscation in corruption cases

Details: Paris: OECD, 2010. 132p.

Source: Internet Resource: Accessed September 11, 2017 at: http://www.oecd.org/corruption/acn/47588859.pdf

Year: 2010

Country: International

Keywords: Asset Forfeiture

Shelf Number: 147204


Author: Alliance for Child Protection in Humanitarian Action

Title: Toolkit on Unaccompanied and Separated Children

Summary: This toolkit includes the following: Key international instruments and guidelines relating to UASC Child-specific human rights instruments - United Nations Convention on the Rights of the Child (CRC), 1989 - Optional Protocol to the CRC on the Involvement of Children in Armed Conflict, 2000 - Optional Protocol to the CRC on the Sale of Children, Child Prostitution and Child Pornography, 2000 - Optional Protocol to the CRC on a Communications Procedure, 2011 - Rome Statute of the International Criminal Court, 1998 - Convention Concerning the Prohibition and Immediate Action for the Elimination of the Worst Forms of Child Labour (International Labour Organization (ILO) Convention No. 182), 1999 - Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, and the Protocol against the Smuggling of Migrants by Land, Sea and Air, supplementing the United Nations Convention against Transnational Organized Crime (Anti-Trafficking Protocol), 2000 - The Hague Conference on Private International Law - Convention for the Protection of Minors, 1961 - Convention on the Civil Aspects of International Child Abduction, 1980 - Convention on Protection of Children and Cooperation in Respect of Inter-country Adoption, 1993, and its Recommendation Concerning the Application to Refugee Children and Other Internationally Displaced Children, 1994 - Convention on Jurisdiction, Applicable Law, Recognition, Enforcement and Cooperation in Respect of Parental Responsibility and Measures for the Protection of Children, 1996 - Rules for the Protection of Juveniles Deprived of their Liberty, 1990

Details: s.l.: The Alliance, 2017. 250p.

Source: Internet Resource: Accessed September 11, 2017 at: https://childprotectionallianceblog.files.wordpress.com/2017/04/tools-web-2017-0322.pdf

Year: 2017

Country: International

Keywords: Child Protection

Shelf Number: 147220


Author: Frydman, Lisa

Title: Beacon of Hope or Failure of Protection: U.S. Treatment of Asylum Claims Based on Persecution by Organized Gangs

Summary: In the past six years, disturbing trends have emerged within two intertwined areas of asylum law - the interpretation of "particular social group" and the adjudication of asylum claims by individuals fleeing persecution by gangs.

Details: Westlaw, 2012. 87p.

Source: Internet Resource: Accessed September 12, 2017 at: https://cgrs.uchastings.edu/sites/default/files/October%202012%20Immigration%20Briefings.pdf

Year: 2012

Country: International

Keywords: Asylum Seekers

Shelf Number: 147221


Author: Schneider, Friedrich

Title: Restricting or Abolishing Cash: An Effective Instrument for Fighting the Shadow Economy, Crime and Terrorism?

Summary: This paper has four goals: First, the use of cash as a possible driving factor of the shadow economy is investigated. Second, the use of cash in crime, here especially in corruption, is also econometrically investigated. The influence is somewhat larger than on the shadow economy, but it is certainly not a decisive factor for bribery activities. Some figures about organized crime are also shown; the importance of cash is diminishing. Third, some remarks about terrorism are made and here a cash limit doesn't prevent terrorism. Fourth, some remarks are made about the restriction or abolishment of cash on civil liberties, with the result that this will extremely limit them. The conclusion of this paper is that cash has a minor influence on the shadow economy, crime and terrorism, but potentially a major influence on civil liberties.

Details: Paper presented at International Cash Conference 2017 - War on Cash: Is there a Future for Cash? 25 - 27 April 2017, Island of Mainau, Germany. 39p.

Source: Internet Resource: Accessed September 13, 2017 at: https://www.econstor.eu/bitstream/10419/162914/1/Schneider.pdf

Year: 2017

Country: International

Keywords: Bribery

Shelf Number: 147226


Author: VienEast

Title: An Investigation into Oil Smuggling and Revenue Generation by Islamic State

Summary: Oil sales have represented a considerable proportion of IS's income, amounting to around 45% (other key sources including taxes and private donations). However, the major destination for oil products appears not to be external but rather a 'captive market' inside Syria and Iraq, i.e. the local population, other rebel groups, and the Assad regime. Various local observers allege IS and Turkish intelligence coordination prior to summer 2015 on matters including border security, weapons/equipment supplies and recruit replacement. However, IS does not engage directly in external oil sales but instead sells all surplus oil 'at the pump' to private traders, only some of whom engage in small-scale 'jerry-can' smuggling. There is no current evidence to implicate senior-level public officials in Turkey in the illegal oil trade from Syria. Smuggling into Turkey is instead undertaken in small volumes by career smugglers making relatively negligible profits. Such official complicity as has been observed involves local Turkish officials 'turning a blind eye' in the local economic interest. Smuggling routes connecting IS areas and Turkey represent complex supply lines involving multiple actors often transporting legal dual-purpose items usable in bomb-making or else vital in maintaining combat readiness. Similarly, the Syrian war economy is a complex symbiotic web; blanket actions such as blockades are in fact liable to drive inflated prices and local dependence on IS, as well as having a broader negative humanitarian impact. Since summer 2015 contacts inside Turkey have noted a significant increase in border and internal security, apparently as a result of a hostile shift in official policy to IS for domestic security and strategic geopolitical reasons. Kurdish YPG gains have also denied IS access to the Turkish border save a closely monitored, and diminishing, 70km stretch along the Azaz Corridor. IS has access to ten major oil fields across Syria and Iraq but overall oil quality is poor and production hampered by airstrikes, natural depletion and a lack of technical capacity. The organisation's sole access to advanced refining is via trade with the Assad regime, with refined products prioritised for its own strategic needs. Low global oil prices and increased border security further compound motivation for smuggling to external markets. Claims by the Russian Defence Ministry regarding large-scale oil smuggling by IS with Turkish state collaboration are comprehensively rejected and discredited. The claims are refutable on various levels. The claims are consistent with earlier 'misinformation' tactics by the Kremlin, apparently intended to discredit Turkey whilst screening Moscow's own actions in Syria. Russian airstrikes against IS oil assets appear intended firstly to deny FSA rebels oil supplies, rather than to hit IS oil sales, based on the calculation that it would still retain enough oil and income to maintain an effective 'second front' against the core rebel opposition. Meanwhile, airstrikes enable Moscow to showcase its anti-IS credentials, especially vis-a-vis Turkey, while serving as a 'warning' both to backers of IS and the Free Syrian Army ('FSA'). Both the Russia-Assad alliance and Turkey presently have shared parallel interests in maintaining IS as a disruptive force against the Kurdish PKK-YPG and FSA respectively. That IS retains its status as a 'second-tier' foe to most primary actors involved, including Gulf Arab states, appears to be one of the main reasons for IS's continued survival and sustained offensive capacity.

Details: London: ViennEast, 2016. 23p.

Source: Internet Resource: Accessed September 13, 2017 at: http://www.vienneast.com/uploads/7/1/2/6/71267015/is_smuggling_investigation.pdf

Year: 2016

Country: International

Keywords: Illegal Trade

Shelf Number: 147230


Author: United Nations Children's Fund

Title: Harrowing Journeys: Children and youth on the move across the Mediterranean Sea, at risk of trafficking and exploitation

Summary: Young migrants and refugees set out to escape harm or secure better futures - and face staggering risks in the process. For 17-year-old Mohammad, who travelled through Libya to seek asylum in Italy, violence and persecution back home meant the choice was clear: "We risked our lives to come here," he says, "we crossed a sea. We knew it is not safe, so we sacrificed. We do it, or we die." For children and youth on the move via the Mediterranean Sea routes to Europe, the journey is marked by high levels of abuse, trafficking and exploitation. Some are more vulnerable than others: those travelling alone, those with low levels of education and those undertaking longer journeys. Most vulnerable of all are those who, like Mohammad, come from sub-Saharan Africa. These findings come from a new UNICEF and International Organization for Migration (IOM) analysis of the journeys of some 11,000 migrant and refugee children (adolescents aged 14-17) and youth (18-24), as recorded in their responses to the Displacement Tracking Matrix Flow Monitoring Surveys conducted by IOM along the Central and Eastern Mediterranean routes to Europe in 2016 and 2017. The analysis reveals that while adolescents and youth are at greater risk than adults on both routes, the Central Mediterranean route to Italy is singularly dangerous. It takes most young migrants and refugees through Libya, where they contend with pervasive lawlessness and violence and are often detained, by state authorities and others. On both routes, additional years of education and travelling in a group, whether with family or not, afford young migrants and refugees a measure of protection. But where they come from outweighs either of these factors. An adolescent boy from subSaharan Africa, who has secondary education and travels in a group along the Central Mediterranean route, faces a 73 per cent risk of being exploited. If he came from another region, the risk would drop to 38 per cent. Anecdotal reports and qualitative research from the Mediterranean region and elsewhere suggest that racism underlies this difference. Countless testimonies from young migrants and refugees from sub-Saharan Africa make clear that they are treated more harshly and targeted for exploitation because of the colour of their skin. The story that emerges from the data confirms the tragic reality that adolescents and youth are prepared to pay a high price for a chance at a better life. Those interviewed in the surveys are among millions on the move worldwide, as recent decades have seen high levels of displacement, across borders and within countries. Many flee brutal conflicts or violence, while others move in search of prospects for better education or livelihoods. With regular migration pathways barred for most, those seeking to make their way across borders often place their fates in the hands of smugglers. This alone leaves them dependent and vulnerable. They risk life and limb as they travel through harsh environments - and suffer appalling abuse and exploitation if they fall into the hands of traffickers, armed groups or other predators. As the world continues to grapple with the reality of migration and displacement, the findings from this report underscore the urgent need for action. To protect the most vulnerable among those on the move, UNICEF and IOM call for a multi-pronged strategy that addresses the interplay of factors that expose migrant and refugee children and youth to risk - or help keep them safe. Such a strategy includes expanding safe and regular migration channels to dampen the demand for smugglers, while fighting trafficking and exploitation. To enhance the resilience and protect the rights of children and youth, it entails investing in education and other basic services, coordinating child protection efforts across countries, and fighting racism and xenophobia in the countries migrants and refugees travel through and the ones in which they seek to make their lives.

Details: New York: UNICEF, 2017. 64p.

Source: Internet Resource: Accessed September 13, 2017 at: https://www.unicef.org/publications/files/Harrowing_Journeys_Children_and_youth_on_the_move_across_the_Mediterranean.pdf

Year: 2017

Country: International

Keywords: Asylum Seekers

Shelf Number: 147236


Author: Piccone, Ted

Title: Democracy and Violent Crime

Summary: In preparation for the Community of Democracies' Democracy and Security Dialogue, Brookings Institution researchers analyzed the relationship between democracy and violent crime from 2000-14. Without controlling for other variables, we found that countries with low homicide rates tend to be strong autocracies and strong democracies, whereas democratically weaker regimes are more likely to have higher levels of homicide. This paper is organized as follows. First, we outline the extant literature on democracy and crime before detailing how we conceptualize and measure these two variables. Second, we analyze the relationship between these two variables. We conclude with a discussion of our results. This paper conducts a bivariate analysis of the relationship between democracy and crime, specifically homicide rates. The following analysis compares levels of democracy and homicide rates in 83 countries during the years 2000 through 2014. These 83 countries were chosen because they were the only ones with sufficient reliable data available, as discussed below. Overall, Europe, North America, Latin America, and parts of Asia are well represented in our sample and the rest of the world is underrepresented.

Details: Washington, DC: Brookings Institute, 2017. 20p.

Source: Internet Resource: Democracy and Security Dialogue Working Paper Series: Accessed September 14, 2017 at: https://www.brookings.edu/wp-content/uploads/2017/09/fp_20170905_democracy_crime_working_paper.pdf

Year: 2017

Country: International

Keywords: Crime Rates

Shelf Number: 147242


Author: Cahill, Desmond

Title: Child Sexual Abuse in the Catholic Church: An Interpretive Review of the Literature and Public Inquiry Reports

Summary: This research, conducted by staff of RMIT University in Melbourne, has been essentially a desk study. It was designed to review the literature concerning child sexual abuse in the Catholic Church in Australia and elsewhere. It included 26 key international and Australian inquiry reports. It may best be described as a multidisciplinary review of the literature within the academic parameters of the social sciences and applied humanities, which is also both theologically informed and pastorally aware. There is an uneasy interface between spirituality, theology, canon law, civil law, criminology, history and the social sciences. The Catholic Church, which claims to be 'an expert in humanity', has objectives that are both this-worldly and ultra-worldly. Both lead researchers, as resigned and married priests, have been theologically trained to a high level in pontifical universities in Rome, and both have worked in pastoral roles as ministering priests. As well, they brought to the task high level knowledge of psychology, sociology, education, canon law, and public policy, as well of research and evaluative techniques (see their bio-data at the beginning of this report). It should be noted that many prior studies have not been informed by a deep appreciation of the nuances of Catholic theological and canon law thinking, nor by an appreciation of the various Catholic cultures and their complexities in each country. It was critical that the research team understood in great depth the workings not only of the Australian Church, but also of the Apostolic See in Rome where both had studied at post-graduate level. Two principal research questions have guided this study: What individual dispositional attributes and Catholic Church organisational policies, practices, processes and attitudes have pre-disposed, influenced and facilitated individual priests and religious in their perpetration of sexual and physical abuse against children? (Chapters Eight and Nine). How have the theological frameworks, organisational structures, governance processes, and institutional cultures contributed to the sexual abuse of children by priests and religious and the inadequate responses of the Holy See , the Catholic bishops, the leaders of religious institutes, and other responsible Church personnel? (Chapters Nine and Ten).

Details: Melbourne: Centre for Global Research, School of Global, Urban and Social Studies,, RMIT University, 2017. 384p.

Source: Internet Resource: Accessed September 14, 2017 at: https://www.rmit.edu.au/content/dam/rmit/documents/news/church-abuse/child-sex-abuse-and-the-catholic-church.pdf

Year: 2017

Country: International

Keywords: Catholic Church

Shelf Number: 147251


Author: Lachenal, Cecile

Title: Women's Political Representation as Key to Implementing Domestic Violence Laws: An Analysis of Ghana and Mexico

Summary: Since the 1990s, over one hundred countries have passed domestic violence legislation in response to calls from the international community to that effect. Mexico and Ghana are two such countries. Having passed these laws, however, Mexico and Ghana have taken quite divergent paths during implementation. Mexico's protective services for survivors of domestic violence are far more comprehensive than those in Ghana. 72 shelters have been established where survivors can access coordinated legal, medical, psychological, training and financial support. In addition, both state and non-state actors work together to deliver these services with funding from the government and international sources. Ghana, on the other hand, has only set up two shelters and while some support services are provided, they are not always available. Furthermore, Ghana relies very heavily on international donor agencies for funding to execute its domestic violence programmes. This presents a challenge because donor agencies focus more heavily on advocacy work than on service provision. With a focus on the delivery of protection services, this paper explores the factors that shaped the contrasting outcomes of the implementation of domestic violence legislation in Ghana and Mexico. We argue that differing levels of gender institutionalisation in the two countries explain these divergent outcomes. We explain gender institutionalisation as the ability of female politicians to fully operationalise women's human rights. Countries that have high levels of gender institutionalisation go beyond passing bills to ensure implementation. Such governments demonstrate the political commitment required to put in place the institutional and financial frameworks that make the implementation of social legislation possible. Mexico, we argue, has higher levels of gender institutionalisation than Ghana. The Mexican government has set up a number of institutions with a specific focus on addressing domestic violence issues from a human rights perspective. Ghana, on the other hand, has established fewer institutions. Mexico also has the added advantage of providing state funds to these institutions which enables them implement the national law on domestic violence. Levels of gender institutionalisation, we argue, depend primarily on the proportion of female parliamentary representatives in each country; with Mexico demonstrating a much higher level of symbolic and substantive female representation in parliament than Ghana. In 2007, when the domestic violence law was passed, 23.2% of parliamentarians in Mexico were women. Beyond this symbolic representation, female parliamentarians have also ensured substantive representation of women's interests in legislative processes. This is evident in two ways. First, these women entered into a pact in which they agreed to vote in favour of laws that benefited women, regardless of their personal political persuasions. Secondly, they worked in collaboration with the Gender Equality Commission to push for gender budgeting to be introduced into government systems. This led to the allocation of state funds to the various institutions that had been put in charge of implementing the domestic violence law. Ghana, on the other hand, has far fewer female representatives in parliament. In percentage terms, the number has hovered around 10% since the return to democratic rule in 1992. These women have been unable to translate their presence in parliament into substantive gains for Ghanaian women so far as domestic violence issues are concerned. Based on our findings about the Mexican experience, we make three recommendations for Ghana and other countries interested in implementing domestic violence laws. First, we argue for the development of policies and programmes to ensure increased representation of women in parliament. Second, we advocate for civil society organisations to work with female parliamentarians to improve the substantive representation of women's issues in parliament. Finally, we recommend gender budgeting be integrated into government systems at national and regional levels

Details: Mexico: Fundar, Centre of Analysis and Research, 2017. 31p.

Source: Internet Resource: Comparative Evidence Paper: Accessed September 14, 2017 at: http://fundar.org.mx/mexico/pdf/CEPwomens.pdf

Year: 2017

Country: International

Keywords: Domestic Violence

Shelf Number: 147252


Author: Chicago Council on Global Affairs

Title: Reducing Urban Violence and Improving Youth Outcomes in the Americas

Summary: The world today has the largest population of young people in history, yet tragically, far too many of these youth are unlikely to live past the age of 30. Worldwide, youth aged 15 to 29 make up more than 40 percent of all homicides, while millions more fall victim to nonfatal violent crimes. Three organizations - the Chicago Council on Global Affairs, the University of Chicago Urban Labs, and the World Bank - convened approximately 30 leaders in Chicago from Argentina, Brazil, Colombia, Jamaica, and other Latin American and Caribbean countries and the United States working on the front lines of urban youth violence prevention. They discussed promising ways to strengthen urban public safety and improve the lives of youth in cities throughout the Americas. The action tour explored the importance of local context and the built environment to foster safer neighborhoods, how big data can shape safer cities, how to scale programs that work, and how to engage older youth. Participants also examined how violence prevention fits into a resilient cities agenda and what twenty-first century policing and security should look like. Participants identified several themes crucial to informing their existing efforts and shaping future initiatives, including: Create cross-sector partnerships. Cross-sector partnerships are vital to building sustainable violence-prevention programs. Tailor ideas to local contexts. Leaders need to tailor promising ideas to the local context, history, culture, and political system of each city, while also harnessing the power of best practices that transcend context. Maintain long-term continuity. Leaders must be mindful that programs can take many years to produce results. Develop detailed frameworks for community policing. Leaders interested in supporting community policing programs need detailed frameworks to guide them and their law enforcement partners. Fully engage the youth being served. It is essential to involve youth in all facets of urban violence prevention, from program design and research design to implementation. Participants agreed that relationships across different cities that often struggle with similar challenges can provide a framework for collaboration and sharing of best practices. Such relationships can help policymakers and practitioners move beyond ad hoc, local initiatives to truly begin to make widespread, sustainable progress and help any global city grappling with these issues. This report serves as a summary of their findings.

Details: Chicago: The Council, 2016. 16p.

Source: Internet Resource: Action Tour Report: Accessed September 14, 2017 at: https://www.thechicagocouncil.org/sites/default/files/reducing-urban-violence_161207.pdf

Year: 2016

Country: International

Keywords: Homicides

Shelf Number: 147261


Author: St. Hilaire, Ricardo A.

Title: How to End Impunity for Antiquities Traffickers: Assemble a Cultural Heritage Crimes Prosecution Team

Summary: n just the last decade, the Department of Homeland Security (DHS) has recovered and returned more than 7,500 illicit artifacts to thirty countries, as part of its fight against the global traffic in cultural heritage. Restituting this stolen property has done much to foster international diplomacy. However, by prioritizing forfeitures and repatriations over investigations and indictments, this "seize and send" policy has failed to hold criminals accountable in courts of law, or staunch what is now a worldwide illegal industry. The rare attempted prosecutions by U.S. Attorneys with the Department of Justice (DOJ) - who conduct most of the trial work for the federal government (including DHS) - have typically yielded minor convictions and light punishments. Too few traffickers have been successfully prosecuted, convicted, or imprisoned. These failures have failed to deter looters and traffickers, whose illicit activities in the United States continue to fund crime, conflict, and terrorism around the globe. Known criminals remain in business and the U.S. antiquities market remains open to contraband. To take real action against this illicit trade, the U.S. government must refocus its policy, and end impunity for antiquities traffickers. Only felony convictions and meaningful sentences will provide both specific and general deterrence against future crimes. Thankfully, the DOJ is in a unique position to take a leadership role on this critical issue, and it could do so with a minimum investment of resources. In fact, the DOJ already has a roadmap with its Environmental Crimes Section (ECS), whose prosecutions of wildlife traffickers offer a tried and tested model. A similar office of Cultural Heritage Crimes (CHC) Prosecutors could also be established. Such a unit would focus on disrupting and dismantling antiquities trafficking infrastructures by breaking supply, transportation, conservation, distribution, marketing, and sales networks. It would also serve as a resource for law enforcement and prosecutors at the local, state, and federal levels. CHC Prosecutors would do much to shut down criminals' access to the largest art market in the world - the American market - which makes up 43% of the global market. Even appointing a single dedicated federal attorney, focused on antiquities trafficking on a daily basis, would be a "force multiplier”"for investigations and prosecutions across the country. A team of attorneys would have an even greater impact. This policy brief explains why CHC Prosecutors are needed and how such a unit could be created, making the DOJ a global law enforcement leader in the fight against the destruction, looting, and trafficking of our world heritage.

Details: Washington, DC: Antiquities Coalition, 2016. 13p.

Source: Internet Resource: Policy Brief No. 1: Accessed September 15, 2017 at: http://thinktank.theantiquitiescoalition.org/wp-content/uploads/2015/10/Policy-Brief-1Nov.17-2016.pdf

Year: 2016

Country: International

Keywords: Antiquities

Shelf Number: 147331


Author: Rothfield, Lawrence

Title: How Can We Fund the Fight Against Antiquities Looting and Trafficking? A "Pollution" Tax on the Antiquities Trade

Summary: Almost every nation has laws against looting, smuggling, and trafficking in antiquities, supplemented by international bans and bilateral interdictions. Yet the playing field remains badly tilted against the site guards, customs officials, antiquities police, and prosecutors charged with enforcing these laws, in large part because enforcers lack the financial resources needed to do their job. To supplement and give teeth to the strict but ineffectual legal regime now in place, economic thinking, and basic public policy research suggests it would be helpful to institute a "pollution tax" on antiquities purchased by residents of "market" countries. Such taxes - imposed on such transactions in goods like tobacco, gas, coal, etc. - are designed to internalize the social costs of economic activities so that the polluting industry either takes measures to clean itself up or pays the government to prevent or mitigate the harm the industry causes. An antiquities tax, tailored to fall more heavily on antiquities with weaker provenance or extremely high prices, and channeled into an antiquities-protection "Superfund" (as was done to clean up toxic chemical sites) or via existing governmental agencies, could provide a sustainable funding stream to pay for more robust monitoring and enforcement efforts against the illicit market and for better site security. Such a tax is likely to face substantial resistance from both dealers and archaeologists, but it is suggested that the concerns of both sides could be dealt with through sustained discussion and negotiation.

Details: Washington, DC: Antiquities Coalition, 2016. 14p.

Source: Internet Resource: Policy Brief, No. 2: Accessed September 15, 2017 at: http://thinktank.theantiquitiescoalition.org/wp-content/uploads/2015/10/Policy-Brief-2-December-2016-.pdf

Year: 2016

Country: International

Keywords: Antiquities

Shelf Number: 147332


Author: Brodie, Neil

Title: How to Control the Internet Market in Antiquities? The Need for Regulation and Monitoring

Summary: Illicit antiquities, some pilfered from war zones where jihadist groups operate, are increasingly finding their way online where they are being snapped up by unknowing buyers and further driving the rampant plunder of archaeological sites. These internet sales are spurring a vicious cycle: increasing demand for antiquities, which drives the looting, producing a greater supply of artifacts, which further increases demand. While global auction sales of art and antiquities declined in 2015 - falling as much as 11 percent -online sales skyrocketed by 24 percent, reaching a staggering $3.27 billion dollars. According to Forbes, "This suggests that the art market may not be 1 cooling, exactly, but instead shifting to a new sales model, e-commerce." How can an online buyer guarantee that a potential purchase is not stolen property, a "blood antiquity," or a modern forgery? The best protection is to demand evidence of how the object reached the market in the first place. However, as in more traditional sales, most antiquities on the internet lack any such documentation. Online shoppers therefore have limited means of knowing what they are buying or from whom. This is a particularly serious concern given the industrial scale looting now taking place in Iraq and Syria, which the United Nations Security Council warns is financing Daesh (commonly known as ISIS, ISIL, or Islamic State), al Qaeda, and their affiliates. Despite the clear implications for both cultural preservation and national security, so far public policy has completely failed to regulate the online antiquities trade. This is particularly true in the United States, which remains the world's largest art market and a major center for the internet market in antiquities. American inaction has 3 made it impossible to combat the problem globally, and moreover, is in great contrast to positive steps taken by other "demand" nations like Germany. This paper offers practical solutions to help better protect good faith consumers from purchasing looted or fake antiquities - while also protecting online businesses from facilitating criminal behavior. After briefly reviewing what is known of the organization and operation of the internet market in antiquities, it considers some possible cooperative responses aimed at educating consumers and introducing workable regulation. These responses draw upon the German example, as well as recent criminological thinking about what might constitute effective regulation. Finally, the paper makes seven policy recommendations, which while geared towards the American market, are applicable to any country where antiquities are bought and sold online.

Details: Washington, DC: Antiquities Coalition, 2017. 16p.

Source: Internet Resource: Policy Brief No. 3: Accessed September 15, 2017 at: http://thinktank.theantiquitiescoalition.org/wp-content/uploads/2017/07/Policy-Brief-3-2017-07-20.pdf

Year: 2017

Country: International

Keywords: Antiquities

Shelf Number: 147333


Author: Global Witness

Title: Defenders of the Earth: Global killings of land and environmental defenders in 2016

Summary: Earlier this year, US legislators in North Dakota debated a proposed bill that would allow drivers to run over and kill an environmental protester without facing jail. The bill was the latest chilling indication of a worldwide phenomenon which Global Witness is determined to help end: the increasing suppression of environmental and land rights activism which, in many countries, means the murder of those brave enough to raise their voice. The data, analysis and human stories in this report demonstrate that the world is now more dangerous than ever for a group of people we should celebrate: those community activists, NGO staff and indigenous leaders on the front line of the struggle for our planet's future. In 2016, at least 200 land and environmental defenders were murdered - the deadliest year on record. Not only is this trend growing, it's spreading - killings were dispersed across 24 countries, compared to 16 in 2015. With many killings unreported, and even less investigated, it is likely that the true number is actually far higher. This tide of violence is driven by an intensifying fight for land and natural resources, as mining, logging, hydro-electric and agricultural companies trample on people and the environment in their pursuit of profit. As more and more extractive projects were imposed on communities, many of those who dared to speak out and defend their rights were brutally silenced. This report tells the stories of these activists and the threats they've faced. It highlights the courage of their communities as they stand up to the might of multinationals, paramilitaries and even their own governments in the most dangerous countries on Earth to be a defender.

Details: London: Global Witness, 2017. 60p.

Source: Internet Resource: Accessed September 15, 2017 at: https://www.globalwitness.org/en/campaigns/environmental-activists/defenders-earth/

Year: 2017

Country: International

Keywords: Environmental Crime

Shelf Number: 147344


Author: Laczko, Frank

Title: Fatal Journeys, Volume 3, Part 1. Improving Data on Missing Migrants

Summary: Since 2014, more than 22,500 migrant deaths and disappearances have been recorded by the International Organization for Migration globally. The real figure could be much higher, but many deaths are never recorded. Fatal Journeys Volume 3 - Part 1 provides a global review of existing data sources, and illustrates the need for improvements in the ways that data on missing migrants are collected, analysed and communicated. The report highlights three key ways in which to improve the collection, sharing and reporting of data on missing migrants. First, a growing number of innovative sources of data on missing migrants, such as "big data", could be used to improve data on migrant fatalities. Second, much more could be done to gather data to increase identification rates, such as developing intra-regional mechanisms to share data more effectively. Third, improving data on missing migrants also requires more thought and improved practice in the use and communication of such data. Improving information and reporting on who these missing migrants are, where they come from, and above all, when they are most at risk, is crucial to building a holistic response to reduce the number of migrant deaths.

Details: Geneva, SWIT: International Organization for Migration, Global Migration Data Analysis Centre, 2017. 136p.

Source: Internet Resource: Accessed September 16, 2017 at: https://publications.iom.int/books/fatal-journeys-volume-3-part-1-improving-data-missing-migrants

Year: 2017

Country: International

Keywords: Illegal Immigration

Shelf Number: 147358


Author: Ligon, Gina Scott

Title: The Jihadi Industry: Assessing the Organizational, Leadership, and Cyber Profiles

Summary: The Leadership of the Extreme and Dangerous for Innovative Results (LEADIR) project, funded by DHS S&T OUP since 2010, uses a longitudinal, industrial and organizational (I/O) psychology approach to assess organizational features in relation to their capacity for innovative and violent performance. The scope of the present effort is to use the LEADIR database and an internal strategic organizational approach to gain insight into 10 different violent extremist organizations (VEO) with a foothold in the current "Jihadi Industry." In addition, a VRIO analysis was performed to assess each VEO's unique set of strategic resources (e.g., cyber infrastructure) and capabilities (e.g., attack innovation) that provide a competitive advantage among their industry peers. When examining 10 VEOs in the Jihadi Industry, what are the features that differentiate them? This report, commissioned by the National Consortium for the Study of Terrorism and Responses to Terrorism (START), seeks to address this question by examining a sample of 10 active jihadi organizations through December 31, 2015. Drawing on longitudinal data analytics, organizational science literature, and computer science techniques, this report provides a picture of key organizations operating in the Jihadi Industry. The report's main findings indicate that leadership, organizational structure, and innovation vary across the Jihadi Industry, which has implications for how government resources should be allocated for monitoring and analysis. In addition, the findings highlight the need for additional research to determine advanced indicator and warning signals of which groups will emerge as the most strategically differentiated and capable of malevolent innovation in coming years.

Details: College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism, 2017. 63p.

Source: Internet Resource: Accessed September 16, 2017 at: https://www.start.umd.edu/pubs/START_CSTAB_JihadiIndustryAssessingOrganizationalLeadershipCyberProfiles_July2017.pdf

Year: 2017

Country: International

Keywords: Extremist Groups

Shelf Number: 147366


Author: Sampson, Robyn

Title: Embodied borders : Biopolitics, knowledge mobilisation and alternatives to immigration detention.

Summary: This thesis makes a contribution to the field of border studies through a detailed analysis of one form of contemporary bordering: alternatives to immigration detention. The dissertation establishes the nature and extent of alternatives to detention and uses these findings to engage with debates regarding the role of expert knowledge in policy making processes and the nature of the exception in the governance of borders. The thesis makes three main contributions to the field. Firstly, I undertook an international study of alternatives to detention, including in-depth field work in eight countries, in collaboration with the International Detention Coalition. I used this data to develop a new model on alternatives to detention called the Community Assessment and Placement model ("CAP model"). The CAP model has been presented to over 50 governments since publication in 2011. This provided the basis to analyse the contexts and mechanisms by which research contributes to the development of policy. While my work largely confirms the explanations offered by the theories of knowledge mobilisation and diffusion of innovations, I argue that the use of research for 'enlightenment' (or 'galvanisation') has been underestimated as an important precursor to substantive change in the area of migration policy. Finally, I engage with theories of exception to propose a new concept - embodied borders - to encapsulate the (re)location and (re)negotiation of state borders at the site of the migrant body. I argue bordering policies, while exclusionary, do not result in a homogenous form of exception produced by sovereign authority alone. Rather, bordering involves dynamic and responsive forms of differentiation being lawfully produced and enacted in specific contexts by multiple actors. The exceptional nature of contemporary borders is thus both confirmed and renegotiated to account for alternatives to detention that blend exclusionary and inclusionary mechanisms according to the individual and their case

Details: Bundoora: La Trobe University, 2013. 576p.

Source: Internet Resource: Dissertation: Accessed September 20, 2017 at: http://arrow.latrobe.edu.au:8080/vital/access/manager/Repository/latrobe:37795;jsessionid=8A3491FAA3B7F3ECB05C15F1BBD32B74

Year: 2013

Country: International

Keywords: Alternatives to Detention

Shelf Number: 147412


Author: Conlon, Deirdre

Title: Spatial Control: Geographical Approaches to the Study of Immigration Detention

Summary: his Global Detention Project Working Paper surveys research on immigration detention conducted using geographical methods, highlighting how geography's conceptualization of detention as a form of spatial control offers tools to scholars and activists working to contest this form of immigration control. The authors organize their review around three core themes: im/mobilities, scaled analyses, and borders/bordering. They argue that geographical approaches to the study of detention have helped generate a critical orientation that can disrupt the spread of detention across and within a widening array of places and social groups.

Details: Geneva, SWIT: Global Detention Project, 2017. 20p.

Source: Internet Resource: Global Detention Project Working Paper No. 24: Accessed September 20, 2017 at: https://www.globaldetentionproject.org/spatial-control-geographical-approaches-to-the-study-of-immigration-detention-global-detention-project-working-paper-no-24

Year: 2017

Country: International

Keywords: Illegal Immigrants

Shelf Number: 147414


Author: Haenlein, Cathy

Title: Follow the Money: Using Financial Investigation to Combat Wildlife Crime

Summary: ALL OVER THE world, for every animal or plant specimen taken illegally from the wild, money changes hands. It does so behind domestic pet storefronts, via online marketplaces, in ports, at ranger stations and often under the eyes of corrupt officials. Wildlife crime is not simply a crime against wildlife: it is organised financial crime conducted on an industrial and transnational scale for profit. As global efforts to address the wildlife crime crisis have expanded, the financial dimensions of this destructive crime have been overlooked. Instead, responses have typically comprised targeted anti-poaching and anti-trafficking measures, the promotion of sustainable livelihoods, and initiatives to reduce demand for wildlife products. These measures are crucial and have at times yielded positive outcomes in particular locations. Yet until the responses deployed include a significant financial crime-related element to undermine perpetrators' profit-seeking motivation, this low-risk, high-reward crime will continue to thrive largely unimpeded. For other crime types, financial investigation is viewed as central to identifying not only the individual criminal but also their network of facilitators. Yet where wildlife crime is concerned, financial investigation is not employed on anything approaching a systematic basis. This paper argues that there is an urgent need for those charged with disrupting wildlife crime to add a financial dimension to their approach. The paper refers primarily - but not exclusively - to East Africa, and is the final output of a year-long project researching wildlife-linked illicit financial flows in Kenya, Tanzania and Uganda. In East Africa and across the supply chain, this paper advocates for greater use of financial tools to disrupt the accomplices, facilitators and support networks of those engaged in this crime. The paper makes the following recommendations to reach this objective, focusing specifically on the changes required to respond to the financial motives of those involved.

Details: London: Royal United Services Institute for Defence and Security Studies (RUSI), 2017. 44p.

Source: Internet Resource: Occasional Paper: Accessed September 20, 2017 at: https://rusi.org/sites/default/files/201709_rusi_follow_the_money_haenlein.keatinge.pdf

Year: 2017

Country: International

Keywords: Environmental Crime

Shelf Number: 147420


Author: Shortland, Anja

Title: Closing the Gap: Assessing Responses to Terrorist-Related Kidnap-for-Ransom

Summary: GOVERNMENTS CONTINUE TO be concerned about kidnapping as a source of terrorist finance. A host of international commitments, underpinned by UN Security Council Resolutions and domestic laws, forbids the commercial resolution of terrorist-related kidnappings and prevents governments from making concessions to terrorists. Yet, it is also common knowledge that, in practice, the UN ban lacks the support of key signatories, who prioritise the immediate preservation of life over their counterterrorism commitments. The authors argue that the current approach increases the returns from kidnapping for groups designated as terrorist organisations by the UN (hereafter 'designated terrorists') and increases the terrorist threat to citizens of all states. This paper highlights the negative unintended consequences of the status quo: a partially applied ban, where some governments make concessions to terrorists. When some governments negotiate on behalf of their citizens, kidnapper expectations and ransoms escalate. Terrorists abuse hostages whose governments refuse to negotiate in order to raise the pressure on countries which do. Because of the official ban, government negotiations are conducted in secret. This makes it more difficult to share information that might assist negotiation strategies, help track the money and identify the perpetrators after ransoms are paid. This paper outlines three different options which would help to 'close the gap' between the commitments of some governments and their actions in response to the kidnapping of their citizens by designated terrorists. - The first option requires a global, rigorously applied and scrupulously monitored commitment to prevent any concessions to terrorist organisations. This would eliminate hostage-taking as a source of terrorist finance, although terrorists might still kidnap for propaganda purposes. However, the paper shows that the international community remains polarised and is not ready to commit to enforcing such a ban. - A second option is that governments exit from the market for hostage negotiations and decriminalise private resolutions of terrorist hostage incidents. The insurance sector already offers effective solutions for the prevention and resolution of criminal kidnappings. These solutions would become available for those exposed to the risk of terrorist kidnap. - A third option would be a new policy framework modelled on existing private sector solutions. Private entities would be allowed to make financial concessions, but governments would create effective (multilateral) institutions to monitor and minimise such payments. The main aim of the paper is to precipitate an open, honest and inclusive policy debate on this intractable problem. In the long run, terrorist financing through kidnapping should be eliminated by adopting the first option. However, the authors argue that the unsatisfactory status quo can be immediately improved by shifting responsibility for ransoming from governments to the private sector. Eventually, public opinion may shift in favour of a genuine 'no concessions' policy. This would be greatly encouraged by efforts to collect evidence that supports the development of a clear policy narrative linking ransom payments to subsequent terrorist attacks.

Details: London: Royal United Services Institute for Defence and Security Studies (RUSI), 2017. 32p.

Source: Internet Resource: Occasional Paper: Accessed September 20, 2017 at: https://rusi.org/sites/default/files/201709_rusi_closing_the_gap_shortland_and_keatinge_web.1.pdf

Year: 2017

Country: International

Keywords: Kidnapping

Shelf Number: 147422


Author: Whalan, Jeni

Title: Dealing with Disgrace: Addressing Sexual Exploitation and Abuse in UN Peacekeeping

Summary: UN peacekeeping has survived many crises throughout its history, but none has provoked such distinctive disgrace as peacekeepers committing sexual violence against those they are meant to protect. Two decades of incremental reform have not stopped sexual abuse by peacekeepers, and determined rhetoric has not translated into effective action. Against this backdrop, the UN Security Council broke its relative silence on this issue by adopting Resolution 2272 in March 2016. This report analyzes Resolution 2272's approach to preventing sexual exploitation and abuse in UN peacekeeping and examines the key debates and controversies that have accompanied it. It identifies nine implementation requirements flowing from the resolution and makes twenty-one recommendations for delivering them, including: Appointing an independent, impartial ombudsperson with a mandate to review and oversee UN actions on sexual exploitation and abuse in peacekeeping; Streamlining the UN's cumbersome reporting processes and resourcing to enable easier reporting and more timely action; Improving the trauma-sensitivity of investigations and responses to sexual exploitation and abuse; Addressing underreporting and institutional opacity by substantially strengthening whistle-blower protections and establishing partnerships with local and international civil society organizations; and Requesting reporting on allegations of sexual exploitation and abuse against non-UN forces operating under a Security Council mandate.

Details: New York: International Peace Institute, August 2017. 36p.

Source: Internet Resource: Accessed September 23, 2017 at: https://www.ipinst.org/wp-content/uploads/2017/08/IPI-Rpt-Dealing-with-Disgrace2.pdf

Year: 2017

Country: International

Keywords: Crime Victims

Shelf Number: 147429


Author: Nobert, Megan

Title: Addressing Sexual Violence in Humanitarian Organisations: Good Practices for Improved Prevention Measures, Policies, and Procedures

Summary: Report the Abuse (RTA), the first global NGO to solely address sexual violence against humanitarian aid workers, has created the first good practices tool to assist humanitarian organisations in their efforts to improve how they address this problem. As the issue has gained more exposure, humanitarian organisations across the globe have increasingly asked for guidance. This good practices tool, as well as other guidelines and information created by RTA, forms the foundational basis for improved prevention measures, policies, and procedures to address sexual violence against humanitarian aid workers. Any discussion on this issue must start with why it happens, and to that end RTA's good practices tool begins by examining the most significant risk factor for sexual violence in humanitarian workplaces: organisational culture. Cultures that encourage constructive feedback, address misconduct issues, and provide the information and resources necessary for sexual violence issues to be addressed in a professional and survivorcentred manner are less likely to experience such incidents. Organisational culture not only underpins why sexual violence incidents occur, but why survivors so rarely report incidents. It is the core change that humanitarian organisations must be working towards - emphasising zero tolerance for sexual violence incidents of any nature. Zero tolerance must start with implementing strong and repetitious prevention measures: including simple and clear messaging about how sexual violence will not be tolerated, combined with appropriate, sensitive, and frequent trainings on the topic. Backed by strong leadership, these measures have the potential to significantly reduce the number of sexual violence incidents that might occur in humanitarian workplaces. Of course any prevention measure, in addition to being understood by all members of staff, must also be supported by policies and procedures that underline both prevention and response. Comprehensive, holistic, accessible, and survivor-centred policies on sexual violence in humanitarian workplaces serve an essential function: clarifying what is sexual violence, how to report incidents when they occur, and the consequences for perpetrators. The development of such policies must take into account feedback from staff members, in particular national staff, and evaluate the trust they have in the organisation's structure and mechanisms; this allows for the creation of an M&E system to start evaluating how humanitarian organisations are doing to address the issue. There is a myriad of ways to guarantee staff members fully understand what is acceptable behaviour: starting from recruitment through to the regular signing of a Code of Conduct. Ensuring that the language used in policies on sexual violence is accessible and understood by everyone in the organisation - from the cleaner to the Executive Director - can be a daunting task; however it is necessary for all members of staff to understand their rights to a safe and healthy workplace, as well as how they must contribute to the creation of one. It is important to remember that the first people a survivor encounters post-sexual violence can have a strong impact on their entire recovery process, good or bad. Therein lies the significance of developed and operational procedures, the final piece to creating safe and healthy workplaces for all humanitarian aid workers, and the real demonstration that all prevention measures and policies put in place by the organisation function professionally, impartially, and in a survivor-centred manner. Procedures start with functional and accessible reporting processes that result in transparent, professional, and impartial investigations; they end with accountability for both survivors and perpetrators. Where possible this should involve local justice mechanisms, bearing in mind that in many of the locations where humanitarian operations are undertaken this may not be a reality. In all circumstances though, the priorities must be the support and care of survivors, and the creation of an environment where impunity is not allowed to thrive. Given the importance of an organisation's culture in preventing incidents of sexual violence, it should be clear that different roles within humanitarian organisations could be vital to addressing this issue. To further assist humanitarian aid workers at all different levels, we have provided some analysis of how different roles can and must contribute to the creation of safe and healthy humanitarian workplaces, and we actively encourage the empowerment of individuals within such roles to address this problem. Finally, as part of our continuing efforts to provide support and guidance, for all of the sections noted within this short summary, a series of recommendations has been provided. These recommendations should help to guide implementation of the good practices tool, and in particular assist in the development of M&E measures to determine progress on the issue. However, humanitarian organisations are also encouraged to expand on the ideas outlined within this tool and use it as a starting or foundational block. The publication of the good practices tool, and other guidance and information created by RTA, should not be seen as the end of work on the issue. This is the starting point, from which we hope others will take up our call to action. Addressing sexual violence against humanitarian aid workers is necessary, and it must happen now, not tomorrow. It is a real and grave issue that needs to be tackled by all humanitarian organisations, for the benefit of all humanitarian aid workers.

Details: Swit: Report the Abuse, 2017. 63p.

Source: Internet Resource: Accessed September 25, 2017 at: https://reliefweb.int/sites/reliefweb.int/files/resources/RTA%20Addressing%20Sexual%20Violence%20in%20Humanitarian%20Organisations%20-%20Good%20Practices%20for%20Improved%20Prevention%20Measures%2C%20Policies%2C%20and%20Procedures.pdf

Year: 2017

Country: International

Keywords: Humanitarian Aid Workers

Shelf Number: 147443


Author: Radford, Lorraine

Title: Preventing and Responding to Child Sexual Abuse and Exploitation: Evidence review

Summary: This briefing is a summary of an independent review of evidence commissioned by the United Nations Children's Fund (UNICEF) to inform guidance for professionals, policy makers and field workers on effective strategies to prevent and respond to child sexual abuse and exploitation. The review involved desk-based research into a wide and varied range of literature on the extent, nature and consequences of child sexual abuse and exploitation and responses made to this in high-, medium- and low-income countries of the world. We included research published in English language peer-reviewed journals, 'grey literature', legal instruments and resolutions, policy documents, progress reports and guidance documents from 2000 to 2014. We built on a bibliography compiled by UNICEF (Reza 2012), supplemented by searches of 17 electronic research databases, websites, contents of key journals and grey literature, and articles referenced in papers read. 'Sexual abuse' is defined in Article 18 of the Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse (Lanzarote Convention) (Council of Europe 2007a) as: (a) engaging in sexual activities with a child who, according to the relevant provisions of national law, has not reached the legal age for sexual activities (this does not apply to consensual sexual activities between minors), and (b) engaging in sexual activities with a child where use is made of coercion, force or threats; or abuse is made of a recognised position of trust, authority or influence over the child, including within the family; or abuse is made of a particularly vulnerable situation of the child, notably because of a mental or physical disability or a situation of dependence. Child sexual abuse becomes sexual exploitation when a second party benefits monetarily through sexual activity involving a child. It includes harmful acts such as sexual solicitation and prostitution of a child or adolescent.

Details: Report prepared for UNICEF, 2015. 167p.

Source: Internet Resource: Accessed September 27, 2017 at: https://core.ac.uk/download/pdf/42138011.pdf

Year: 2015

Country: International

Keywords: Child Pornography

Shelf Number: 147465


Author: Rao, Sumedh

Title: Community policing in fragile and conflict-affected states

Summary: Community policing is the idea of policing in partnership with community, and the strategy for implementing this partnership. Beyond this rudimentary definition, there is no common agreement on what community policing entails. Experience of various forms of community policing in different fragile and conflict-affected states (FCAS) have had mixed results - there have been some benefits, though the programmes have not been as transformative as hoped, and existing police culture and community relations have often been the critical impediment. Case studies from Afghanistan, Kenya and Sierra Leone identify benefits from community policing (though the contents of these programmes varied). These include: State legitimacy can be strengthened through police-community exchange. Trust can be built through community policing and undermined through police militarisation. Valuable intelligence insights can be provided from the community members to the police. Police can educate and inform the public about specific dangers. These case studies also identify challenges and lessons learned: An existing lack of accountability in the police force culture. An existing suspicion and mistrust of the police force. A blurring of lines between illegitimate vigilantism and legitimate policing acts. Senior managers do not (or cannot) take community policing seriously, at least in comparison to other needs. Community-police exchange members are not fully representative of the community.

Details: Birmingham, UK: GSDRC, University of Birmingham,2013. 10p.

Source: Internet Resource: Helpdesk Research Report 997: Accessed September 27, 2017 at: http://www.gsdrc.org/docs/open/hdq997.pdf

Year: 2013

Country: International

Keywords: Community Policing

Shelf Number: 147468


Author: Stabilisation Unit

Title: Policing the Context: Principles and guidance to inform international policing assistance

Summary: The Stabilisation Unit (SU) is an integrated civil-military operational unit which reports to the Foreign and Commonwealth Office (FCO), Department for International Development (DFID), and the Ministry of Defence (MOD). It is designed to be agile, responsive and well-equipped to operate in high threat environments. It combines in-house staff expertise with the ability to draw on a larger pool of civilian expertise for specialised, longer term or larger scale taskings. It ensures lessons from practical experience are captured as best practice and used to improve future delivery by Her Majesty's Government (HMG). International Policing is a critical component of the BSOS and the SU hosts serving police officers alongside other members of staff who have an expert knowledge of policing issues in Fragile & Conflict Affected States (FCAS). The police element within the SU mainstreams non-operational UK policing capability into wider HMG conflict and stabilisation programming by providing:  The gateway to international policing for government, police and all domestic and international partners  The communication hub for non-operational international policing activities  Strategic advice on international policing issues  Development of UK international policing capacity and capability  Development of UK contributions to bilateral & multilateral assistance programmes  Guidance in relation to overseas police deployments  Sourcing of appropriately skilled and experienced officers from across the UK for deployments to countries to support specific stabilisation activity  Management of the International Police Assistance Board (IPAB), a multi-agency coordinating body for international police activity  Co-ordination of the IPAB referral process that considers proposed international activity by UK police officers

Details: The Unit, 2014. 57p.

Source: Internet Resource: What Works Series: Accessed September 27, 2017 at: sclr.stabilisationunit.gov.uk

Year: 2014

Country: International

Keywords: Police Reform

Shelf Number: 147469


Author: International Labour Organization

Title: Global Estimates of Child Labour: Results and Trends, 2012-2016

Summary: Child labour remains endemic and its elimination requires both economic and social reform as well as the active cooperation of all those active cooperation of governments, workers' and employers' organizations, enterprises, international organizations, and civil society at large. The current report, the fifth edition of the ILO's quadrennial report series on global estimates of child labour, charts how far we have come and how far we still have to go to honour this commitment to ending child labour. It describes the scale and key characteristics of child labour in the world today, as well as changes in the global child labour situation over time. It also discusses key policy priorities in the campaign to reach the 2025 target. The report, and the global estimation exercise that underpins it, forms part of a broader inter-agency effort under Alliance 8.7 to measure and monitor progress towards target 8.7 of the Sustainable Development Goals.

Details: Geneva: ILO, 2017. 64p.

Source: Internet Resource: Accessed September 27, 2017 at: http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575499.pdf

Year: 2017

Country: International

Keywords: Child Labor

Shelf Number: 147474


Author: International Labour Organization

Title: Global Estimates of Modern Slavery: Forced Labour and Forced Marriage

Summary: The 2017 Global Estimates of Modern Slavery focus on two main issues: forced labour and forced marriage. The estimate of forced labour comprises forced labour in the private economy, forced sexual exploitation of adults and commercial sexual exploitation of children, and state-imposed forced labour. The estimates herein are the result of a collaborative effort between the International Labour Organization (ILO) and the Walk Free Foundation, in partnership with the International Organization for Migration (IOM). They benefited from inputs provided by other UN agencies, in particular the Office of the High Commissioner for Human Rights (OHCHR). In the context of this report, modern slavery covers a set of specific legal concepts including forced labour, debt bondage, forced marriage, other slavery and slavery like practices, and human trafficking. Although modern slavery is not defined in law, it is used as an umbrella term that focuses attention on commonalities across these legal concepts. Essentially, it refers to situations of exploitation that a person cannot refuse or leave because of threats, violence, coercion, deception, and/or abuse of power.

Details: Geneva: ILO, 2017. 68p.

Source: Internet Resource: Accessed September 27, 2017 at: http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575479.pdf

Year: 2017

Country: International

Keywords: Child Sexual Exploitation

Shelf Number: 147475


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Good practices for the protection of witnesses in criminal proceedings involving organized crime

Summary: Witness protection programs are considered a key tool in the dismantling of human trafficking networks as well as combating other forms of organized crime. The United Nations Convention against Transnational Organized Crime and its associated Protocols against Human Trafficking and Smuggling of Migrants call upon states to take measures to protect victims and witnesses from threats, intimidation, corruption or bodily injury. The good practices identified in the manual include: early identification of vulnerable and intimidated witnesses; management of witnesses by the police; protection of witness identity during court testimony; and, if necessary, permanent relocation and re-identification. The UNODC Good Practices on Witness Protection is available to policymakers, legislators, legal practitioners, senior law enforcement and justice officials around the world. The aim to help States apply these practical measures into their legal systems and operational procedures.

Details: Vienna: UNODC, 2008. 124p.

Source: Internet Resource: Accessed September 27, 2017 at: https://www.unodc.org/documents/organized-crime/Witness-protection-manual-Feb08.pdf

Year: 2008

Country: International

Keywords: Human Smuggling

Shelf Number: 147480


Author: Schmid, Alex P.

Title: Moderate Muslims and Islamist Terrorism: Between Denial and Resistance

Summary: Since President Trump attempted to ban Muslims from certain countries from entering the United States, the question which Muslims are 'moderate Muslims' and which are potential 'radical Islamist terrorists' has gained new relevance. While some Muslim leaders deny any connection between their religion and terrorism, it is undeniable that many terrorists claim to act in the name of Islam. This Research Paper first seeks to determine where the world's 1.6 billion Muslims stand in relation to terrorism, distinguishing between Jihadist Muslims, Islamist Muslims, Conservative Muslims and Pluralist Muslims. It then looks at which criteria would allow us to distinguish between 'moderates' and other Muslims. Subsequently, the focus is on the role of moderation in Islam itself, whereby attention is given to the Global Movement of Moderates which originated in Malaysia. While some leading Muslim scholars stress that moderation is a central value in Islam, many Muslims nevertheless do not like to be called 'moderates' for fear of being seen as pro-Western. A further section of this Research Paper looks at how Islamist extremists view moderate Muslims. This is followed by a section that focuses on moderate Muslims voicing their opposition to Islamist terrorism - something often overlooked by Western media. The concluding section raises the thorny question whether moderation is rooted in Islam itself or comes from outside and the author pleads for humanism to be the middle ground for moderates of all faiths and political persuasions.

Details: The Hague: International Centre for Counter-Terrorism, 2017. 28p.

Source: Internet Resource: ICCT Research Paper: Accessed September 29, 2017 at: https://icct.nl/wp-content/uploads/2017/08/ICCT-Schmid-Moderate-Muslims-and-Islamist-Terrorism-Aug-2017-1.pdf

Year: 2017

Country: International

Keywords: Extremists

Shelf Number: 147498


Author: Kessels, Eelco

Title: Correcting the Course: Advancing Juvenile Justice Principles for Children Convicted of Violent Extremist Offenses

Summary: Children have always been among the most vulnerable victims of violence and, at times, some of its brutal purveyors. They have played various roles in furthering violent extremism and participating in acts of violence, ranging from inciting propaganda online to carrying out deadly attacks. Rather than exceptionalizing these children, their treatment under the criminal justice system should be grounded in juvenile justice standards. To advance the work of the Global Counterterrorism Forum (GCTF), the government of Australia commissioned the Global Center and the International Centre for Counter-Terrorism - The Hague (ICCT) to prepare a report and accompanying policy brief putting forward guiding principles, recommendations, and considerations for the detention, rehabilitation, and reintegration of juveniles convicted of terrorism and violent extremism offenses. Together, they advance a juvenile justice approach for authorities responsible for their care and support the notion that national security interests and juvenile justice imperatives are compatible and mutually reinforcing in preventing and countering violent extremism. Responding to a call from the GCTF Neuchatel Memorandum on Good Practices for Juvenile Justice in a Counterterrorism Context to collect and collate information on children engaged in terrorism-related activity, the report takes stock of theory, policies, and practice globally. The recommendations draw from international juvenile justice standards, the emerging body of principles and practices in the detention of adult violent extremist offenders, and the national experiences in demobilizing and reintegrating child combatants and members of organized criminal groups.

Details: Washington, DC: Global Center on Cooperative Security; The Hague: International Centre for Counter-Terrorism, 2017. 45p.

Source: Internet Resource: Accessed September 29, 2017 at: http://www.globalcenter.org/wp-content/uploads/2017/09/Correcting-the-Course_Global-Center_ICCT.pdf

Year: 2017

Country: International

Keywords: Child Combatants

Shelf Number: 147499


Author: Zerzan, Andrew

Title: Policing Financial Services: Surveying the Anti-Money Laundering Regulatory Regime

Summary: The anti-money laundering and combating the financing of terrorism international (AML/CFT) standards were created over twenty years ago by the world's biggest economies. Since then, the standards have become increasingly implemented globally. They have established a regulatory regime in which many different public institutions play a role. The majority of these public institutions are not traditionally involved in crime fighting or counter-terrorism so certain challenges exist, especially for those in developing countries. For instance, the AML/CFT rules dictate how people of all types can connect - or not connect - to the financial sector. The paper provides an overview of what the standards mean for public institutions and highlights challenges that have surfaced to date. The intended audience is the development community so that it is better informed in its efforts to improve the application and revision of the standards, which is currently underway. High-level findings: The regime that countries must put in place is complex and there are many interdependencies. The effectiveness of the system relies highly on ensuring that all key elements are in place. If one part of the system is missing, it is likely to greatly hinder effectiveness of the rest. Interaction between the standard setter and developing countries, especially the poorest, is very little. There has been some improvement in dialogue via intermediary organizations but a direct link has not been established. This will have an impact on how the standards are written as well as their effectiveness in these countries. Interpretation of the standards has prompted countries to create regulatory frameworks that are highly data-driven. This means that effectiveness hinges greatly on a country's ability to both collect data from a great number of sources as well as analyze it. Whether this is the right approach for developing countries with low capacity needs to be assessed.

Details: London: GSMA, 2011. 33p.

Source: Internet Resource: Accessed September 30, 2017 at: http://www.t.gsma.com/mobilefordevelopment/wp-content/uploads/2012/06/policingfinancialservicessurveyingtheantimoneylaunderingregulatoryregime2011.pdf

Year: 2011

Country: International

Keywords: Counter-Terrorism

Shelf Number: 147516


Author: Inter-American Commission on Human Rights

Title: Measures to Reduce Pretrial Detention

Summary: For the last two decades, the Inter-American Commission on Human Rights (hereinafter "the IACHR" or "the Commission") has noted that the arbitrary and illegal application of pretrial detention is a chronic problem in the region. The IACHR recalls that for this regime to be compatible with international standards, pretrial detention must be based on consideration of the right to the presumption of innocence and must take into account the exceptional nature of this measure; moreover, it should be applied in keeping with the criteria of legality, necessity, and proportionality. The deprivation of liberty of the person accused should have a procedural aspect, and, accordingly, can only be based on its legitimate aims, namely to ensure that the accused will not obstruct the development of the procedure or elude the action of justice. Similarly, the IACHR recalls that the provisions that exclude the possibility of noncustodial measures in light of the seriousness of the act or the expected sentence are contrary to the applicable standards. 2. In its Report on the Use of Pretrial Detention in the Americas, issued December 30, 2013, the IACHR concluded that the non-exceptional use of pretrial detention is one of the most serious and widespread problems faced by the member States of the Organization of American States (OAS) when it comes to respecting and ensuring the rights of persons deprived of liberty. The excessive use of pretrial detention is one of the clearest signs of the failure of the administration of justice and constitutes an unacceptable structural problem in a democratic society that respects the right of every person to the presumption of innocence. In that report, the Commission incorporated a series of recommendations to the States – legislative, administrative, and judicial - to make the use of pretrial detention as a precautionary criminal justice measure compatible with their international obligations in respect of human rights. 3. The purpose of this study is to follow up on the 2013 report on pretrial detention by analyzing the main gains and challenges regarding the use of this measure by the States. The recommendations with respect to which the IACHR will focus on in its follow-up were selected based on considering that the efforts made to carry them out reflect with greater clarity the accomplishments and difficulties that have arisen in the use of pretrial detention in the region. In addition, the IACHR considers that analyzing the follow-up to these recommendations is most useful for the States to better understand the matter, and, therefore, for them to have an additional instrument for adopting state policies aimed at reducing pretrial detention in the Americas. In particular, the recommendations examined in this follow-up report address the following: (a) general measures regarding state policies; (b) eradicating pretrial detention as an anticipated penalty or a tool for social control; (c) public defender services; (d) the use of alternatives to pretrial detention; and (e) celerity in the procedures and correcting the procedural delay. Considering that the IACHR's first report on pretrial attention was issued on December 30, 2013, the period covered in this analysis runs from January 2014 to April 2017. 4. This report also provides more detailed standards with respect to the adoption of specific measures that seek to reduce the use of pretrial detention in keeping with the relevant international standards, such as periodic review of the pretrial detention regime; actions to guarantee that hearings are held; hearings in prisons; oral hearings on the admissibility of pretrial detention a; use of alternatives to pretrial detention; electronic monitoring mechanisms for criminal matters; restoratives justice programs in criminal matters; and drug courts. The IACHR notes that this study places emphasis on applying alternative measures, which are procedural measures or options that allow the accused to be free while the criminal trial is ongoing. The report notes the need to incorporate a gender perspective, applying alternative measures for women, considering the discriminatory sociocultural patterns and stereotypes that expose women, in particular, to human rights violations. The report also aims to go forward in implementing a differentiated approach to address the specific needs for respect and guarantee of their rights of a variety of at-risk and vulnerable persons and groups in the context of deprivation of liberty, including persons of African descent, indigenous persons, LGBTI and older persons, and persons with disabilities. 5. Considering the purpose of this report, the following are the main issues addressed, each of which is covered in an individual chapter: (a) main gains and challenges, more than three years after the publication of the Report on the Use of Pretrial Detention in the Americas; (b) alternatives measures to pretrial detention; (c) other measures aimed at reducing the use of pretrial detention; and (d) women and other persons belonging to groups at special risk. The principal contents of these chapters will be described briefly in the following paragraphs.

Details: Washington, DC: Organization of American States, 2017. 162p.

Source: Internet Resource: Accessed October 2, 2017 at: http://www.oas.org/en/iachr/reports/pdfs/PretrialDetention.pdf

Year: 2017

Country: International

Keywords: Human Rights Abuses

Shelf Number: 147522


Author: Rosen, Liana

Title: The State Department's Trafficking in Persons Report: Scope, Aid Restrictions, and Methodology

Summary: The State Department's annual release of the Trafficking in Persons report (commonly referred to as the TIP Report) has been closely monitored by Congress, foreign governments, the media, advocacy groups, and other foreign policy observers. The 109th Congress first mandated the report's publication in the Trafficking Victims Protection Act of 2000 (TVPA; Div. A of the Victims of Trafficking and Violence Protection Act of 2000, P.L. 106-386). Over time, the number of countries covered by the TIP Report has grown, peaking at 188 countries, including the United States. In the 2017 TIP Report, the State Department categorized 187 countries. Countries were placed into one of several lists (or tiers) based on their respective governments' level of effort to address human trafficking between April 1, 2016, and March 31, 2017. An additional category of special cases included three countries that were not assigned a tier ranking because of ongoing political instability (Libya, Somalia, and Yemen). Its champions describe the TIP Report as a keystone measure of government efforts to address and ultimately eliminate human trafficking. Some U.S. officials refer to the report as a crucial tool of diplomatic engagement that has encouraged foreign governments to elevate their own antitrafficking efforts. Its detractors question the TIP Report's credibility as a true measure of antitrafficking efforts, suggesting at times that political factors distort its country assessments. Some foreign governments perceive the report as a form of U.S. interference in their domestic affairs. Continued congressional interest in the TIP Report and its country rankings has resulted in several key modifications to the process. Such modifications have included the creation of the special watch list, limiting the length of time a country may remain on a subset of the special watch list, expanding the list of criteria for determining whether countries are taking serious and sustained efforts to eliminate trafficking, establishing a list of governments that recruit and use child soldiers, and prohibiting the least cooperative countries on antitrafficking matters from participating in authorized trade negotiations. These modifications were often included as part of broader legislative efforts to reauthorize the TVPA, whose current authorization for appropriations expires at the end of FY2017.

Details: Washington, DC: Congressional Research Service, 2017. 37p.

Source: Internet Resource: CRS Report R44953: Accessed October 4, 2017 at: https://fas.org/sgp/crs/row/R44953.pdf

Year: 2017

Country: International

Keywords: Child Soldiers

Shelf Number: 147548


Author: United Nations Office on Drugs and Crime (UNODC)

Title: The Drug Problem and Organized Crime, Illicit Financial Flows, Corruption and Terrorism

Summary: Organized crime groups have widened their portfolio of illicit activities. New crime areas such as cybercrime and environmental crime have emerged. Fewer groups are exclusively dedicated to drug trafficking, while more are also operating in other illicit sectors. Almost two thirds of drug trafficking groups operating in countries in the European Union are involved in more than one crime area, according to research by the European Police Office (Europol), and that figure has been rising for years. Drug trafficking groups in Europe are frequently also involved in the counterfeiting of goods, trafficking in human beings, smuggling of migrants and trafficking in weapons. Continued importance of drugs to organized crime groups In 2014, transnational organized crime groups across the globe were estimated to have generated between approximately one fifth and one third of their revenues from drug sales. Europol identified some 5,000 international organized crime groups operating in countries of the European Union in 2017, and estimated that more than one third were involved in drug trafficking. This makes drug trafficking more widespread across organized crime than organized property crime, smuggling of migrants, trafficking in human beings, excise fraud or any other illicit activity. Drug trafficking no longer the preserve of large criminal groups Groups with a strong hierarchical structure, such as those in Mexico and Japan, and to some extent in the Russian Federation, continue to be involved in the drug trade. Hierarchical, top-down organizations are still the most widespread type of organized crime group in Europe, according to Europol. However, there is evidence that looser, horizontal networks are becoming increasingly significant. In 2017, Europol estimated that such networks accounted for 30-40 per cent of organized crime groups operating in countries in the European Union. Technology's role in creating relatively low-risk drug markets The mobile communications revolution has offered new opportunities to traffickers. They no longer need personal contact with clients; instead, low-level "runners" can collect cash and dealers can let the customer know where to collect their drugs using messages sent over encrypted networks. The darknet allows users to buy drugs with a cryptocurrency, such as bitcoin, and have their purchases delivered to them in a concealed manner. Typical buyers are recreational users of cannabis, "ecstasy", cocaine, hallucinogens and NPS. They are less likely to order heroin or methamphetamine. Although the darknet accounts for only a small percentage of drug sales, the market has been growing rapidly in recent years. About 30 per cent of cocaine proceeds contributes to illicit financial flows About 30 per cent of the proceeds of cocaine sales at the global level was laundered abroad in 2009, according to a model developed by UNODC. A 2016 study based on interviews with drug crime convicts in Italy came to a similar conclusion, suggesting that roughly one third of the money spent by cocaine users was being laundered across borders. Drug money can make countries poorer In the short term, an inflow of drug money can boost investment and local gross domestic product. But the long-term effects tend to be negative, particularly when drug-related proceeds comprise a sizeable portion of the total economy of a community or a country. In this scenario, drug money has the potential to inflate property prices, distort export figures, create unfair competition, reinforce skewed income and wealth distributions and increase corruption. In the process, legitimate businesses, without access to illicit funds, may be squeezed out of the market and new legitimate investments may not take place. The rise of an illicit economy helps to weaken the rule of law and facilitates corruption, which in turn reinforces the illicit drug sector. Studies suggest that an injection of laundered money, including from illicit drug activities, is associated with reductions in overall annual economic growth rates, particularly in smaller and less developed countries. One estimate, based on a study of 17 countries of the Organization for Economic Cooperation and Development, suggests that a $1 billion increase in money-laundering could reduce overall economic growth by between 0.03 and 0.06 percentage points.

Details: UNODC, 2017. 48p.

Source: Internet Resource: Accessed October 4, 2017 at:

Year: 2017

Country: International

Keywords: Drug Markets

Shelf Number: 147553


Author: Interpol

Title: Pharmaceutical Crime on the Darknet: A study of illicit online marketplaces

Summary: Pharmaceutical crime poses a grave danger to public health. Falsified medicines undermine people's faith in the health care system, while also threatening the lives of the most vulnerable members of society: the sick and frail. In this regard, the Internet has become a catalyst for illicit online pharmacies, marketing falsified medicines to the public. Today, several online market places on Darknets can operate with virtual impunity from law enforcement control. These market places, such as Silk Road and Evolution Marketplace, offer prescription medicines for sale to the public. Before it was shut down in November 2014, the most commonly advertised drug on Silk Road 2.0, formerly the largest Darknet market place, was prescription medicines. Among the prescription medicines, the most commonly advertised therapeutic category was "Relaxants", where the main medicine type advertised was benzodiazepine. Today, Evolution is one of the biggest Darknet marketplaces and similar to Silk Road 2.0, prescription medicines together with cannabis are the most advertised products. For Evolution, the most commonly advertised therapeutic categories were "Stimulants", "Relaxants" and "Other" types of medication. The Darknet is changing the nature of cybercrime, by providing anonymity to criminals - both in terms of online access, through anonymizing software such as P2P or Tor, and in terms of online payment, through crypto-currencies such as Bitcoin. In order to combat this criminality and threat to public health, law enforcement agencies need to develop their own cybercrime units that will have the appropriate knowledge and equipment to efficiently investigate cybercrime on the Darknet. To this end, the INTERPOL Global Complex for Innovation (IGCI) was created to support member countries. The presence of pharmaceutical crime on the Darknet is a truly global problem, with shipments being sent across the world between source, transit and destination countries. Therefore, international cooperation and interagency cooperation needs to be further developed to effectively intercept shipments and conduct back-tracking investigations in order to protect public health.

Details: Lyon, France: Interpol, 2015. 24p.

Source: Internet Resource: Accessed October 5, 2017 at: https://www.gwern.net/docs/sr/2015-interpol-pharmaceuticals.pdf

Year: 2015

Country: International

Keywords: Cybercrime

Shelf Number: 147586


Author: Gentilini, Ugo

Title: Entering the City: Emerging Evidence and Practices with Safety Nets in Urban Areas

Summary: Most safety net programs in low and middle-income countries have hitherto been conceived for rural areas. Yet as the global urban population increases and poverty urbanizes, it becomes of utmost importance to understand how to make safety nets work in urban settings. This paper discusses the process of urbanization, the peculiar features of urban poverty, and emerging experiences with urban safety net programs in dozens of countries. It does so by reviewing multidisciplinary literature, examining household survey data, and presenting a compilation of case studies from a 'first generation' of programs. The paper finds that urban areas pose fundamentally different sets of opportunities and challenges for social protection, and that safety net programs are at the very beginning of a process of urban adaptation. The mixed-performance and preliminary nature of the experiences suggest to put a premium on learning and evidence-generation. This might include revisiting some key design choices and better connecting safety nets to spatial, economic and social services agendas compelling to urban areas.

Details: Washington, DC: World Bank Group, 2015. 190p.

Source: Internet Resource: Social Protection & Labor Discussion Paper no. 1504: Accessed October 7, 2017 at: http://pubdocs.worldbank.org/en/5841448382581833/Entering-the-City-Emerging-Evidence-and-Practices-with-Safety-Nets-in-Urban-Areas.pdf

Year: 2015

Country: International

Keywords: Poverty

Shelf Number: 147607


Author: Lafleur, Jarret M.

Title: The Perfect Heist: Recipes from Around the World

Summary: Of the many facets of the criminal world, few have captured society's fascination as has that of high stakes robbery. The combination of meticulousness, cunning, and audacity required to execute a real-life Ocean's Eleven may be uncommon among criminals, but fortunately it is common enough to extract a wealth of lessons for the protection of high-value assets. To assist in informing the analyses and decisions of security professionals, this paper surveys 23 sophisticated and high-value heists that have occurred or been attempted around the world, particularly over the past three decades. The results, compiled in a Heist Methods and Characteristics Database, have been analyzed qualitatively and quantitatively, with the goals of both identifying common characteristics and characterizing the range and diversity of criminal methods used. The analysis is focused in seven areas: (1) Defeated Security Measures and Devices, (2) Deception Methods, (3) Timing and Target Selection, (4) Weapons Employed, (5) Resources and Risk Acceptance, (6) Insiders, and (7) Failures and Mistakes.

Details: Livermore, CA: Sandia National Laboratories, 2015. 107p.

Source: Internet Resource: Accessed October 12, 2017 at: https://www.osti.gov/scitech/servlets/purl/1367046

Year: 2015

Country: International

Keywords: National Security

Shelf Number: 147669


Author: Lieber, Paul

Title: Reconceptualizing Radicalized Groups and Their Messages

Summary: In this new JSOU Press occasional paper Dr. Paul Lieber and Dr. Yael Lieber explore alternative approaches for Special Operations Forces (SOF) to engage with radicalized groups through comprehensive engagement in the narrative space to defeat the effects of ISIS in the psychological and sociological aspects of the human domain. Rethinking this problem from a joint social psychology-notably realistic conflict theory (RCT)-and social network analysis approach can yield unprecedented insights on the inner workings of radicalized groups and their penchant for political violence. The authors explore conflict theory through the lens of the Robbers' Cave experiment conducted by Muzafer Sherif. The authors posit that in general, radicalization, and hopefully de-radicalization, may be said to follow a similar process whereby groups that are culturally, religiously, and/or racially diverse perceive each other as in competition for scarce resources such as employment, housing, education, and benefits--in-groups and out-groups. This paper continues with an analysis of the roles that are essential to promulgating and sustaining message influence within an in-group social network—group communication norms. Within these pages are tremendous insights, relevant to the SOF community, on ways to rethink counter-radicalization efforts.

Details: MacDill Air Force Base, FL: Joint Special Operations University, 2017. 16p.

Source: Internet Resource: Occasional Paper: Accessed October 13, 2017 at: http://jsou.libguides.com/ld.php?content_id=36503943

Year: 2017

Country: International

Keywords: Counter-Radicalization

Shelf Number: 147674


Author: International Centre for the Prevention of Crime (ICPC)

Title: National Prevention Strategies for Youth Violence: An International Comparative Study

Summary: This international comparative study, funded by the Ministry of Public Safety of Canada, maps and analyzes different national strategies for youth violence prevention in six countries, including South Africa, Canada, Colombia, the United States, France and Norway. These countries have been selected on the basis of their income considering in particular that this may reveal important differences when it comes to connecting all the actors involved. Thus, four countries with high-income were selected compared to two countries with middle income. This report is divided into four parts. The first part has three objectives: a) conduct a literature review on youth and violence; b) describe the comparison means and; c) describe the methodology used. The second part concerns the monographic description of each country's violence prevention strategy. The third part deals with the comparison of these strategies in the light of the notions of interface and comparison means. Finally, in the fourth part, conclusions of the study are presented as well as the recommendations. The objective of this study is therefore to identify how coordination, the qualitative dimensions of such coordination (collaboration, leadership and participation) and information management are ensured in the implementation of prevention policies.

Details: Montreal: The Centre, 2017. 182p.

Source: Internet Resource: Accessed October 19, 2017 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/2017/National_Prevention_Strategies_for_Youth_Violence_Final.pdf

Year: 2017

Country: International

Keywords: At-Risk Youth

Shelf Number: 147730


Author: Finkenbinder, Karen

Title: Social Capital, Policing and the Rule-of-Law: Keys to Stabilization

Summary: Social Capital, Policing and Rule-of-Law: Keys to Stabilization reflects a breadth of U.S. Army War College Strategy Research papers in which students tackled tough issues. The danger in compiling student papers is that an anthology can become a set of isolated, disconnected, anecdotal experiences. We have tried to select those that best describe the essentials of stability tasks and activities and the role they play in our success, failure, or combination thereof, in current and future operations. Stabilization is a process in which personnel identify and mitigate underlying sources of instability to establish the conditions for long-term stability. While long-term development requires stability, stability does not require long-term development. Therefore, stability tasks focus on identifying and targeting the root causes of instability and by building the capacity of local institutions. Stability, ultimately, aims to create conditions such that the local populance regard the overall situations as legitimate, acceptable, and predictable. These conditions consist of: the level of violence; the functioning of governmental, economic, and societal institutions; and the general adherence to local laws, rules, and norms of behavior. Sources of instability manifest themselves locally. First, instability stems from the decreased support for the government, a result of the government failing to meet the expectation of the locals. Second, instability grows from increased support for anti-government elements, a situation that usually occurs when locals see spoilers as those helping to solve the priority grievance(s). Lastly, instability stems from the undermining of the normal functioning of society when the emphasis must be on a return to the established norms. Stability tasks and activities are not things that we have only been doing in Iraq and Afghanistan. There is a long-time recognition that we have been doing this "other stuff" for a long time. But the term(s) keep changing. Professor Bill Flavin, the Chief of Doctrine, Concepts, Education and Training (DCET) at PKSOI and one of the Army's foremost experts in stability operations, has been keeping track of the various terms used to describe stability tasks and activities over the past fifty years. This list includes terms such as: attenuated conflict, nation building, marginal military operations, indirect war, lower-level war, brush fire war, low intensity conflict, constrained operations, and ambiguous war. But the essential message has not changed. That being: there is something, other than offense and defense, that the military always winds up doing. We may not know what to call it, but we know it when we see it. But because we do not know what to call it - we often try to hide it under the rug and keep tripping over it. Only then do we deal with it. But in the interim, we have lost the competencies required to do it well. My fear, and others, is that as we become leaner, we will forget how painful it was to trip over the rug and, once again, lose our hard-earned competencies in the stability arena.

Details: Carlisle, PA: U.S. Army War College, 2013. 314p.

Source: Internet Resource: PKSOI Papers: Accessed October 21, 2017 at: http://publications.armywarcollege.edu/pubs/1284.pdf

Year: 2013

Country: International

Keywords: Policing

Shelf Number: 147837


Author: Coyne, John

Title: People smugglers globally, 2017

Summary: By its very nature, any treatment of irregular migration, asylum seekers, human trafficking and people smuggling is highly controversial. To avoid unnecessary controversy, this report focuses on the organisation and business models of the globe's people-smuggling organisations, but the authors have maintained an explorative outlook. This report has drawn together the work of authors from multiple disciplines to explore the global phenomenon that is people smuggling. While it's expansive in its breadth and depth of coverage, it isn't meant to be the definitive source on the subject. Rather, it has been developed to provide readers with a clear, concise and obtainable understanding of the issue and its complexity. The multidisciplinary approach means that each of the chapters explores a different geographical region or issue with a different methodological approach (ethnographic, explorative, legal). Understandably, such an approach exposes and brings together the many disconnects and inconsistencies in knowledge in this area of study. One particularly challenging dimension for this global body of research was dealing with the plethora of legal and non-legal terms used in public discourse on refugees and people smugglers. The report is an exercise in applied research and analysis with a clear policy focus. While its analytical focus is global, its conclusions and recommendations have been made with Australian policymakers in mind.

Details: Barton, ACT: Australian Strategy Policy Institute, 2017. 90p.

Source: Internet Resource: Accessed October 27, 2017 at: http://globalinitiative.net/wp-content/uploads/2017/10/people-smuggling-internals-for-john.pdf

Year: 2017

Country: International

Keywords: Asylum Seekers

Shelf Number: 147831


Author: Welch, Sarah E.

Title: Promised Land or Fool's Paradise? : a Comparison of International Wildlife Crime and United States Drug Crime

Summary: Wildlife crimes include poaching and smuggling of endangered species across borders. Internationally, they are governed by the Convention on International Trade in Endangered Species (CITES). Drug crimes include possession and distribution of certain controlled substances. As the world's first- and fourth-largest black markets, respectively, the crimes share many characteristics. Yet their legal structures treat them in markedly different ways. While United States drug laws are criticized as over-enforced and unnecessarily punitive, wildlife crime laws are criticized as underenforced and insufficiently punitive. Wildlife criminal law features unusually innovative partial legalization approaches but trends toward increased criminalization, while drug crime is non-innovative but trends toward decriminalization. Both have racially or ethnically disparate effects, but the conversations proceed in starkly different ways. The wildlife crime literature views drug crime laws and enforcement as the Promised Land, but drug crime literature holds it out as only a fool's paradise. This paper compares the market structures, legal structures, and policy debates of international wildlife crime and United States drug crime in an effort to place the bodies of law in conversation, test the comparisons drawn by wildlife crime literature, and inform each area from the other's best features.

Details: Chicago: University of Chicago law School, Chicago Unbound, 2017. 18p.

Source: Internet Resource: International Immersion Program Papers: Accessed November 2, 2017 at: http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1068&context=international_immersion_program_papers

Year: 2017

Country: International

Keywords: Animal Poaching

Shelf Number: 147965


Author: United Nations Office on Drugs and Crime (UNODC)

Title: State Regulation Concerning Civilian Private Security Services and the Contribution to Crime Prevention and Community Safety

Summary: The growth of civilian private security services and the broadened scope of their activities in many countries require appropriate mechanisms for regulation and oversight to ensure compliance with national and international rules and regulations. While there are currently no specific United Nations instruments, standards or norms addressing civilian private security services, there is a wide range of standards relevant to the security sector, for example standards relating to the State's responsibility to prevent crime, protect human rights and govern the use of force, detention and arrest, as well as those relating to the relationship between the private sector and human rights and the protection of the rights of workers. These should be consulted and adhered to when developing regulatory systems for civilian private security services. Experience shows that civilian private security services present States with a resource, which, if properly regulated, can contribute significantly to reducing crime and enhancing community safety, in particular through partnerships and information-sharing with public police. Professional codes of conduct and legislation need to direct and control the sharing of information between public and private security actors. The civilian private security services sector encompasses a wide range of activities, and regulation should extend to as many of these as is practicable to avoid loopholes, ensure accountability and maximize the contribution of private security to crime prevention and community safety. The authorizations and limitations of the civilian private security sector should be set out in relevant legislation. If private security workers have special powers or the right to carry weapons, this should be made explicit and regulated as applicable. Areas where private security entities are not expected to operate should be identified in the legislation. A licensing system for operatives and providers is the cornerstone of an effective regulatory system. Accepted best practice is for licensing to apply to both, so that standards can be raised both in companies and among individual licence holders. Operatives and providers should also be mandated to comply with an appropriate code of conduct as one of the conditions of their licence. Companies should have documented and formalized standard operating procedures relating to the way security services are provided, including the secure storage of client information and documentation and reporting of all incidents of concern, including any instance where an employee detains somebody or uses force. The safety and working conditions of civilian private security operatives require specific attention. Even if there is general regulation protecting operatives, the unique challenges of the civilian private security sector may necessitate specialized regulations. Any civilian private security operatives or providers who breach regulations should be held to account, and there should be appropriate mechanisms in place for the receipt and investigation of complaints by any person against civilian private security companies and staff. Complaints should be investigated impartially by appropriate bodies and, where guilt is established, the body should have powers to sanction operatives and providers. The procedures for making complaints should be adequately publicized. It should also be made clear what complaints the regulator will deal with. The most serious complaints may need to be dealt with separately by the criminal justice system. To minimize the risk of corruption with regard to private security services, including their contracting processes, it is vital that States put in place appropriate standards and processes in line with the United Nations Convention against Corruption. Appropriate training for civilian private security staff is vital in order to raise the standards of the civilian private security sector. States therefore need to ensure that appropriate training standards are established for the sector and consider how these standards are developed and delivered, whether by State or non-State actors or by civilian private security bodies subject to further regulatory controls.

Details: Vienna: UNODC, 2014. 110p.

Source: Internet Resource: Criminal Justice Handbook Series: Accessed November 3, 2017 at: https://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf

Year: 2014

Country: International

Keywords: Crime Prevention

Shelf Number: 148015


Author: Lindon, Giles

Title: Deaths in police custody: A review of the international evidence

Summary: This report provides a summary of the published research literature and administrative data on deaths in or following police custody, and apparent suicides following police custody, to support the independent review chaired by the Rt Hon. Dame Elish Angiolini DBE QC, which was announced in July 2015. The review's terms of reference include: - reviewing the processes and procedures surrounding deaths in police custody in England and Wales; and - identifying why investigations following such deaths have, according to the then Home Secretary, "fallen short of many families' needs". This report provides a review of statistics and research to answer five key questions. - What are the extent and trends in deaths in or following police custody, and apparent suicides following police custody, in England and Wales? - What are the extent and trends of such deaths in comparable Western countries? - What are the main causes of deaths in police custody, and suicides following police custody, in England and Wales? - What research evidence is there for procedures or 'good practice' to prevent or reduce deaths in or following police custody? - What evidence is there of 'good practice' for the running and management of investigations into deaths in or following police custody?

Details: London: HM Treasury; Home Office, 2017. 80p.

Source: Internet Resource: Research Report 95: Accessed November 3, 2017 at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/655202/deaths-in-police-custody-review-international-evidence-horr95.pdf

Year: 2017

Country: International

Keywords: Deaths in Custody

Shelf Number: 148020


Author: Garis, Len, ed.

Title: Designing Out Crime

Summary: The book Eliminating Crime (Cohen et al., 2014) focused on seven strategies the police could employ to reduce crime. Despite our confidence in the importance of those strategies and the ability of police to execute them, we are aware that the police alone cannot make crime go away. Crime prevention is a societal matter that relies on a commitment from the entire criminal justice system plus the community at large to be successful. Furthermore, policing is expensive. Ironically, it is even more so when criminals are caught, because the rest of the criminal justice system is likely to be engaged. To say that responding to crime is expensive is a significant understatement. Governments in Canada, for example, collectively spend over $8 billion a year on police services to fight crime. That is just the beginning: overall, Canada spends over $20 billion a year on its criminal justice system (Story and Yalkin, 2013). Compounding this is the observation that total criminal justice expenditures climbed by more than 23 per cent from 2002 to 2012. As Story and Yalkin note, this growth occurred despite overall crime rates having fallen by the same percentage during that period. Moreover, there is every indication that the cost of responding to crime, at least in terms of policing, will continue to increase unless we start doing things differently (Leuprecht, 2014; Kempa, 2014: RCMP, 2015; Home Offi ce, 2015). We also need to be aware that the cost of crime involves more than just that attributed to the criminal justice system. There are costs to business, insurance costs, health care and social service costs, and losses to individuals in terms of missed work days, pain and suffering, legal costs, and important quality of life losses (see Cohen, 2000). There are also societal and individual costs associated with the fear of crime (Dolan and Peasgood, 2006). Overall, the cost to victims is exorbitant. For example, focusing on the economic impact of spousal violence in Canada for 2009, a recent Department of Justice Canada study estimated the total social and economic cost at $7.4 billion. More significantly, at least 80 per cent of that cost was picked up by victims (Zhang et al, 2012). Reducing the cost of crime will remain challenging because we keep changing how the criminal justice system responds to crime. Not long ago, the police investigation of a drug traffi cking case involved nine steps - now it requires at least 65 (Malm et al., 2007). Similarly, dealing with an impaired driver used to take about one hour of a police officer's time. Now it takes an officer at least four hours. A domestic assault case which used to take less than an hour to process now takes at least 10 hours. Much of this change has come from our demand that police officers work in ways that facilitate more rigourous prosecution requirements and that provide for greater accountability. It also comes from added officer health and safety concerns, improved operational sophistication, and increased oversight issues. Undoubtedly, these sometimes important and necessary changes have consumed much of the criminal justice cost savings that might otherwise have come with the recent decline in crime. Regardless, our view is that if we are to arrest the rising cost of crime, efforts must be made to further reduce the volume of crime and the accompanying impact on victims. We need to find a way where we need fewer police, fewer court officials, fewer correctional workers, and fewer of any other worker who makes a living from the criminal justice system. We say this because the single largest cost of our criminal justice system is the salaries and benefits for people working in the system. Given the increased complexities of responding to crime in the 21st century, we should not expect the cost per criminal incident to decline soon. The only way to reduce the cost of crime significantly is to reduce our need to respond to crime, and that comes about by further reducing the incidence of crime. Various actors within the criminal justice system and elsewhere have been trying for decades to reduce crime through one strategy or another. Some of these strategies have emphasized improving social and living conditions; creating more and better access to educational and job opportunities for marginalized groups; reducing relative poverty; and, introducing initiatives to help individuals escape from environments believed to support criminogenic or crime-causing conditions. Other strategies have focused on hardening targets (for example, using security systems, product alarms, card chips and automotive immobilizers) to make committing crime more difficult for offenders. Yet others have led to designing buildings and living spaces to make potential crime spots less attractive to offenders. Still other strategies involve having citizens become more involved as guardians of their homes and neighbourhoods though such efforts as Block Watch, Neighbourhood Watch, and Crime Free Multihousing. Some have focused on using surveillance technology such as CCTV and other camera systems, to deter offenders. Other strategies have focused on early intervention with at-risk youth while others have focused on people already caught up in the criminal justice system who have significant predispositions toward criminality (for example, substance abusers or habitual offenders). The list goes on, with all strategies having the goal of either getting to the supposed root causes of crime, or creating conditions where crime is less likely to recur or happen in the first instance. Despite the obvious importance of crime prevention, its history has not been particularly impressive. The topic of crime prevention is not a popular area of study for criminologists and schools of criminal justice. A review of course offerings at these schools, a scan of journal articles and books in the field, or a look at criminal justice conference proceedings over the past decades will show that crime prevention is one of the least studied areas in the field of criminology and criminal justice. Its treatment by the criminal justice system is not much better. As we have noted, there has been a range of initiatives aimed at crime prevention. Few can argue, however, that the issue has been pursued with any sustained vigour.

Details: Abbotsford, BC: University of the Fraser Valley, Centre For Public Safety And Criminal Justice Research, 2016. 114p.

Source: Internet Resource: Accessed November 3, 2017 at: https://cjr.ufv.ca/wp-content/uploads/2016/11/Designing-Out-Crime.pdf

Year: 2016

Country: International

Keywords: Costs of Crime

Shelf Number: 148024


Author: Boemcken, Marc von, ed.

Title: Commercial Security and Development: Findings from Timor-Leste, Liberia and Peru

Summary: Commercial security affects a number of development-related factors, such as the capacity of states to govern, overall feelings of public safety, economic growth and social welfare. Findings from field research in Timor-Leste, Liberia and Peru indicate that the relation between commercial security and development is highly ambivalent. Security markets can foster economic growth and ease the burden on the back of the public security sector. Nevertheless, weak regulation of commercial security practices has created problems. These include low-level conflicts between public and private security providers over policing authorities in particular surroundings. Moreover, a trend toward the corporatization of private guarding has engendered extremely exploitative labor relations in the security industry. In the worst case, security firms may even commit frequent human rights abuses, thereby directly undermining any wider sense of security in society. From a development-policy perspective, these findings are all the more pertinent, since international development organizations themselves are often the largest customers of security companies.

Details: Bonn, Germany: Bonn International Center for Conversion, 2011. 80p.

Source: Internet Resource: Brief 45: Accessed November 4, 2017 at: https://www.bicc.de/uploads/tx_bicctools/brief45.pdf

Year: 2011

Country: International

Keywords: Commercial Security

Shelf Number: 148032


Author: Behnk, Sascha

Title: Partners in Crime: Diffusion of Responsibility in Antisocial Behaviors

Summary: Using a series of sender-receiver games, we find that two senders acting together are willing to behave more antisocially towards the receiver than single senders. This result is robust in two contexts: when antisocial messages are dishonest and when they are honest but unfavorable. Our results suggest that diffusion of responsibility is the primary reason for the increased antisocial behavior as our experimental design eliminates competing explanations. With a partner in crime, senders think that behaving antisocially is more acceptable and experience less guilt. Importantly, we identify a crucial condition for the increased antisocial behavior by groups: the partner in crime must actively participate in the decision-making. Our results have important implications for institutional design and promoting prosocial behaviors.

Details: Bonn, Germany: Institute of abor Economics (IZA), 2017. 70p.

Source: Internet Resource: IZA DP No. 11031: Accessed November 4, 2017 at: http://ftp.iza.org/dp11031.pdf

Year: 2017

Country: International

Keywords: Antisocial Behavior

Shelf Number: 148035


Author: Anders, Jackie

Title: Keeping kids in school and out of court: a study of education - youth justice collaboration in the US, Scotland and Denmark

Summary: A good education is essential for positive youth development and transition to adulthood. Young people who complete secondary school have better outcomes in terms of employment, health and welfare than those who leave school early. Education is also a powerful protective factor against involvement in crime, by assisting young people to develop the skills they need to succeed as adults and helping them to develop strong social and interpersonal bonds with peers and supportive adults. The Center for Juvenile Justice Reform at Georgetown University, one of the organisations I visited, summarises the impact of education on crime in its recent briefing on education and interagency collaboration: "education is effective in reducing youth's involvement in crime because it provides not only academic remediation, but also social services, recreational programs, and mentoring opportunities. When youth are equipped with the necessary supports, resources, and skills to become productive members of the society, the risk of delinquency and recidivism decreases" (Farn and Adams, 2016, p. 6). Sadly, too many young people who struggle in school - often due to a combination of learning, behavioural and social welfare issues - do not get the support they need to succeed, and drift, or in some cases are pushed, out of the school system. Many of these young people wind up in trouble with police, and fill our courts, our youth detention centres, and – as adults - our prisons. The close correlation between school-related issues - such as low achievement, disruptive behaviour, poor attendance and truancy – and involvement in offending has been well-established through research. This link is also apparent in Victorian statistics, which show that 62% of the 176 young people in detention in October 2015 had previously been suspended or expelled from school (Youth Parole Board 2016), and that only 6% of adults entering Victorian prisons have completed secondary education (Corrections Victoria, 2011). The prevalence of school disengagement among young people in the youth justice system was recognised as a pressing issue by Judge Peter Couzens, the (now former) President of the Victorian Children’s Court in 2013. His keen interest in this issue led to the establishment in August 2014 of the Education Justice Initiative (EJI), a collaborative project of the Melbourne Children's Court and Department of Education and Training, managed by Parkville College, the secondary school delivering academic and vocational education to students in all secure settings in Victoria. The EJI involves education consultants working directly at the court, to provide information, advice and advocacy for young people to address education issues and help them reconnect to school or training. EJI also acts as a resource for youth justice workers, legal practitioners and the court, providing advice on options for youth and processes and policies within the education system.

Details: Acton ACT, AUS: Winston Churchill Memorial Trust of Australia, 2016. 57p.

Source: Internet Resource: Accessed November 8, 2017 at: http://apo.org.au/system/files/75102/apo-nid75102-61066.pdf

Year: 2016

Country: International

Keywords: School Crime

Shelf Number: 148077


Author: Wyatt, Tanya

Title: Global Illicit Wildlife Product Trafficking: Actors, Activities, and Assessment

Summary: Since the trafficking of wildlife is now recognized as a highly profitable illicit market, it is important to investigate what activities are funded through the sales of these wildlife and wildlife products. One particular concern is that wildlife trafficking profits fund terrorist activities. This case study explores this possibility by assessing the major players involved in the rhinoceros horn and elephant ivory illicit markets and then analyzes whether these groups have the capability, opportunity and motivation to further diversify their funding sources into trafficking of radiological and nuclear (RN) materials.

Details: Baltimore, MD: National Consortium for the Study of Terrorism and Responses to Terrorism, 2014. 18p.

Source: Internet Resource: Accessed November 8, 2017 at: https://www.researchgate.net/publication/280946252_Global_Illicit_Wildlife_Product_Trafficking_Actors_Activities_and_Assessment

Year: 2014

Country: International

Keywords: Illicit Markets

Shelf Number: 148083


Author: Avis, William Robert

Title: Criminal networks and illicit wildlife trade

Summary: What is the current state of the evidence regarding criminal networks and the illicit wildlife trade in the East and Southern Africa region? This help desk review provides an overview of academic, policy and practitioner literature that examines the illicit wildlife trade and criminal networks. Whilst there exists' a broad consensus that illegal wildlife trade is a pressing and growing concern, there is much debate as to what this trade entails and who the key actors are. It is important to highlight that illicit wildlife trade involves a broad range of actions, receiving different levels of attention from various academic, policy and practitioner communities. This being said there is increasing agreement on the stages involved in the illicit wildlife trade and the nature of the criminal networks involved. Key Findings Studies of the illicit wildlife trade and the criminal networks involved, often involve certain assumptions. These require further critical analysis to explore the complex dynamics of the illicit wildlife trade. It is a diverse and fluid phenomenon, confounding attempts to characterise it as a singular trade that can be tackled by a common approach. The illicit wildlife trade is not exclusively a problem of extracting high-value wildlife products to generate profits for organised criminal networks. The trade may also be part of local livelihood strategies in poor and marginalised communities. Illicit trading networks defy neat categorisations of legal‒illicit, state‒society, public‒private and formal‒informal. Rather, they span a range of relationships and links which are difficult to capture using singular and unproblematic definitions. The illicit wildlife trade involves a number of broad stages or elements. Providing a breakdown of these enables a greater sense of how criminal networks are formed of different actors up and down the supply chain. The logistics of wildlife trafficking are complex and highly variable across Africa, but there are commonly three distinct phases - poaching, trafficking, and retail. Each of these stages is increasingly professionalised anddominated by criminal and corruption networks. The illicit wildlife trade is trans-boundary and involves cross-border criminal syndicates. In the era of global free trade, the ease of communication and movement of goods and money facilitate the operations of groups involved in illicit trade. Driven by perceptions of low risk and high profit, indications have emerged of the illicit wildlife trade attracting greater interest from organised crime groups. These criminal syndicates are moving poached or illicitly harvested wildlife with the help of the same techniques and networks used for illicit trafficking in persons, weapons, drugs etc. The sourcing of wildlife is often undertaken by local groups including pastoralist communities, artisanal or subsistence hunters and even militias and terrorist groups.

Details: Brighton, UK: Institute of Development Studies, 2017. 16p.

Source: Internet Resource: K4D Helpdesk Report 150: Accessed November 8, 2017 at: https://assets.publishing.service.gov.uk/media/5975df3ded915d59ba00000a/150-Illicit-Wildlife-Trade.pdf

Year: 2017

Country: International

Keywords: Animal Poaching

Shelf Number: 148085


Author: Barone, Raffaella

Title: Crime, Money Laundering, and Credit Markets: Can Usury Exist at the Zero Lower Bound?

Summary: In advanced economies, the recent collapse of interest rates to the Zero Lower Bound (ZLB) has triggered a series of research questions on how to navigate the new zero interest credit environment. Focusing on illegal markets, it is possible to explain why usury still remains widespread after the legal nominal interest rate has fallen to zero. If the lender is a criminal agent with money-laundering aims, the ZLB isn't an obstacle to design and implement usury contracts. Using a dynamic model of usury for a loan having a variable interest rate and the value of the borrowing firm itself as collateral it is possible to show that notwithstanding the ZLB the criminal actor can be able achieve the money laundering purpose by expropriating the borrower of his/her collateral.

Details: Milan, Italy: BAFFI CAREFIN Centre, Bocconi University, 2017, 2017. 19p.

Source: Internet Resource: BAFFI CAREFIN Centre Research Paper No. 61: Accessed November 9, 2017 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3053818

Year: 2017

Country: International

Keywords: Financial Crimes

Shelf Number: 148087


Author: Batt, Chris

Title: Enhancing the Detection, Investigation and Disruption of Illicit Financial Flows from Wildlife Crime

Summary: Wildlife crime poses a serious threat to thousands of species of plants and animals, which in some cases are being pushed to the brink of extinction. It is a global issue affecting almost every jurisdiction, either as a source, transit or destination for illegal wildlife products. This report indicates the scale of the problem both regionally and globally, provides a range of case studies, key findings, recommendations and Good Practices that may assist jurisdictions to detect, investigate and disrupt of illicit financial flows from wildlife crime. Of the 45 jurisdictions that responded to the survey, principal findings of the research included: 86% of jurisdictions reported that they are affected by wildlife crime; however, 71% of jurisdictions do not regard wildlife crime to be a significant money laundering threat in their jurisdiction. Only 26% of jurisdictions reported conducting any financial investigation into wildlife crimes, including financial investigations related to the predicate offence, asset forfeiture, or in pursuit of money laundering charges. Inadequate legal frameworks and institutional arrangements create challenges for jurisdictions to 'follow the money'. 79% of jurisdictions reported that they do not include the financial intelligence unit (FIU) in a multi-agency approach to combat wildlife crime. Of the wildlife crime cases reported in this study, only 11% were successfully prosecuted, only 7% received prison penalties, and only 1% resulted in serious prison penalties. Alternative offences are rarely used to pursue wildlife crimes; and money laundering offences in particular are noticeably absent. Only 1% of wildlife crime cases were reported to have involved money laundering investigation, charges or prosecutions. The majority of wildlife crime cases appear to start and end with the seizure of wildlife contraband, with only 11% of jurisdictions reporting that they have conducted further investigations into the wider criminal network beyond the poacher or courier. International cooperation amongst law enforcement agencies is not a common practice to combat wildlife trafficking. Asset forfeiture is under-utilised in wildlife crime cases.

Details: Asia/Pacific Group on Money Laundering and United Nations Office on Drugs and Crime, 2017. 53p.

Source: Internet Resource: Accessed November 10, 2017 at: https://www.unodc.org/documents/southeastasiaandpacific//Publications/2017/FINAL_-_UNODC_APG_Wildlife_Crime_report.pdf

Year: 2017

Country: International

Keywords: Financial Crimes

Shelf Number: 148129


Author: United Nations Children's Fund

Title: A Familiar Face: Violence in the lives of children and adolescents

Summary: This report presents the most current data on four specific forms of violence - violent discipline and exposure to domestic abuse during early childhood; violence at school; violent deaths among adolescents; and sexual violence in childhood and adolescence. The statistics reveal that children experience violence across all stages of childhood, in diverse settings, and often at the hands of the trusted individuals with whom they interact daily. The report concludes with specific national actions and strategies that UNICEF has embraced to prevent and respond to violence against children

Details: New York: UNICEF, 2017. 96p.

Source: Internet Resource: Accessed November 10, 2017 at: https://www.unicef.org/publications/files/Violence_in_the_lives_of_children_and_adolescents.pdf

Year: 2017

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 148132


Author: International Labour Organization

Title: Child labour in the primary production of sugarcane

Summary: Sugar is the largest and one of the most complex agricultural commodities in the world. While the sugarcane industry generates significant levels of rural employment, supporting some 100 million livelihoods, intense competition, weather fluctuations and price volatility make it difficult for smallholders to cover their production costs, which may increase the likelihood of child labour and other decent work deficits and constrain investment in sustainable production practices. This report, researched and written by Ergon for the ILO's Fundamental Principles and Rights at Work Branch, surveys the sector globally to identify the key labour challenges, with a focus on child labour. It also makes recommendations for the ILO to use as a tool to engage with businesses and other partners in the sugarcane sector, with child labour as a starting point. These recommendations will be used to make greater progress in the elimination of child labour and the realization of other fundamental rights at work.

Details: Geneva: ILO, 2017. 76 p.

Source: Internet Resource: Accessed November 13, 2017 at: http://ergonassociates.net/wp-content/uploads/2017/11/CLP_Sugarcane-Report_20171019_WEB.pdf?x74739

Year: 2017

Country: International

Keywords: Child Labor

Shelf Number: 148141


Author: Correctional Service Canada

Title: 2016 International Survey of Correctional Services: Corrections in Transformation

Summary: In 2015, the Correctional Service of Canada (CSC) conducted an international survey with the objective of gaining a better understanding of the challenges other nations encounter in their correctional organizations and the best practices being applied to address them. Responses from 24 organizations revealed themes related to infrastructure, resources, technology, and offender health and mental health as significant challenges. These identified challenges provided indications of where international correctional organizations are facing difficulties; however, further details would have provided greater insight into these difficulties and the responses organizations have made to address them. Thus, the 2016 survey was designed to increase our knowledge of the issues and transformation plans being used to address these challenges as well as the best practices learned through actions undertaken to deal with them. Purpose CSC conducted an international consultation with several correctional organizations around the world to gain a better understanding of not only the challenges various nations encounter in their correctional organizations, but also the strategies implemented to address these challenges. The international consultation was completed in collaboration with CSC's Intergovernmental Relations Division (IGR) and representatives from the International Corrections and Prisons Association (ICPA). Overview The following is a summary of the responses received for the International Survey of Correctional Services. The survey was developed by staff at CSC's Research Branch and Strategic Policy and Planning. It was available in English and French and could be completed online or on paper. The structure of the survey included both multiple choice and open-ended questions. Core problematic areas in correctional practices were identified and questions specific to each area were developed. The survey was organized into four key parts: Part I: Physical Infrastructure; Part II: Technology; Part III: Offender Health; Part IV: Offender Rehabilitation The target sample was approximately 170 correctional organizations affiliated with ICPA and IGR. Respondents were able to respond to the survey between July 28th and September 14th, 2016. Although 19 correctional organizations responded, results are based on 18 correctional organizations representing agencies in 12 as one submission was removed from the analyses due to data quality issues (see Appendix A for a list of participating countries). Regarding the characteristics of participating organizations, the majority of organizations were at the Federal/National level of government (53%), followed closely by organizations at the State/Regional (41%) and Local/Municipal (6%) levels. The offender population supervised by organizations was evenly split between only those with custodial sentences (47%) and those with both custodial and non-custodial sentences (53%). Notably, no organizations indicated that they only supervise those with non-custodial sentences. The results of this report are organized according to each key area assessed. The qualitative results examine the challenges and associated transformation plans for each sub-area are examined. Subsequently, the qualitative themes associated with the issues leading to transformation, the ongoing transformation projects that have occurred in the past year, as well as any best practices garnered throughout the transformation process are discussed. A summary of findings is provided at the end of the document.

Details: Ottawa: Correctional Service Canada, 2016. 15p.

Source: Internet Resource: 2016 No. SR-16-04 Accessed November 13, 2017 at: http://www.csc-scc.gc.ca/research/092/005008-3009-en.pdf

Year: 2016

Country: International

Keywords: Correctional Administration

Shelf Number: 148140


Author: Engel, Christoph

Title: Low Self-Control As a Source of Crime: A Meta-Study

Summary: Self-control theory is one of the best studied criminological paradigms. Since Gottfredson and Hirschi published their General Theory in 1990 the theory has been tested on more than a million subjects. This meta-study systematizes the evidence, reporting 717 results from 102 different publications that cover 966,364 original data points. The paper develops a methodology that makes it possible to standardize findings although the original papers have used widely varying statistical procedures, and have generated findings of very different precision. Overall, the theory is overwhelmingly supported, but the effect is relatively small, and is sensitive to adding a host of moderating variables.

Details: Bonn, Germany: Max Planck Institute for Research on Collective Goods, 2012. 43p.

Source: Internet Resource: MPI Collective Goods Preprint, No. 2012/4: Accessed November 16, 2017 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2012381

Year: 2012

Country: International

Keywords: General Theory of Crime

Shelf Number: 148200


Author: Feindouno. Sosso

Title: Internal Violence Index: a composite and quantitative measure of internal violence and crime in developing countries

Summary: We have created a new index, the Internal Violence Index (IVI), which aims to compare the amount of violence at the country level for 130 developing countries. The IVI is a composite indicator composed of four clusters - internal armed conflict, criminality, terrorism, and political violence. It is based on quantitative variables only, in contrast to the existing subjective indicators of fragility.

Details: Fondation pour les études et recherches sur le développement international, 2016. 28p.

Source: Internet Resource: Working Paper No. 151: Accessed November 16, 2017 at: http://www.ferdi.fr/sites/www.ferdi.fr/files/idi/wp151_ferdi_goujon_feindouno_wagner.pdf

Year: 2016

Country: International

Keywords: Political Violence

Shelf Number: 148204


Author: Messick, Richard E.

Title: Curbing Fraud, Corruption, and Collusion in the Roads Sector

Summary: Because an extensive, well maintained network of roads is essential for economic development, road construction and maintenance projects have been a mainstay of the World Bank's lending portfolio since its founding. This long experience in the roads sector is reflected in favorable project evaluations. The Bank's Independent Evaluation Group reports that roads and other transport projects consistently score higher on measures of outcomes, institutional development, and sustainability than non-transport projects and the Bank's Quality Assurance Group has found that roads projects are well-supervised. At the same time, roads projects around the globe remain plagued by fraud, corruption, and collusion. A Transparency International poll ranked construction as the industry most prone to corruption and a survey of international firms revealed that companies in the construction industry were more likely than firms in any other sector to have lost a contract because of bribery. World Bank-financed projects are not immune. Roughly one-fourth of the 500 plus projects with a Bank-funded roads component approved over the past decade drew one or more allegations of fraud, corruption, or collusion; to date, the Bank's Integrity Vice Presidency (INT) has confirmed allegations in 25 projects resulting in 29 cases of misconduct under Bank rules. The most common forms of wrongdoing in these 29 cases are collusion among firms bidding on a project and fraud and corruption in the execution of the resulting contract. The Bank has controls to reduce these forms of misconduct—procurement process reviews, financial audits, and field supervision - and evidence suggests that losses in Bank-financed programs are less than in those not subject to Bank oversight. Nonetheless, for the developing countries of the world, any loss on a road project, whether funded by the World Bank or not, is unacceptable. This report explores how the World Bank and developing nations can reduce losses from collusion in procurement and fraud and corruption in contract execution, drawing on what INT has learned from its investigations of Bank-funded roads projects, investigations and reports by borrowing country governments, and the experience of developed countries. The aim is twofold: (a) to provide input into the World Bank's review of its policies and processes as part of the ongoing reform of its business model, and (b) to inform a broader dialogue on ways to prevent collusion in procurement, and fraud and corruption in contract execution in all roads projects - no matter the funding source. The report begins with a review of the findings in 29 cases of misconduct in World Bank-funded projects. It follows with an analysis of the incidence of collusion in procurement in non-Bank projects and estimates of its impact on project price. It then examines measures developed countries have taken to attack collusion and suggests how they can be adapted to the environment in developing countries. Some steps will be the same regardless of the country context. A country should have laws penalizing bid rigging, market division, and other forms of collusive behavior along with the commitment and capacity to enforce them. Other steps will depend upon the market conditions and other country-specific circumstances and risks.

Details: Washington, DC: The World Bank, 2011. 51p.

Source: Internet Resource: Accessed November 17, 2017 at: http://siteresources.worldbank.org/INTDOII/Resources/Roads_Paper_Final.pdf

Year: 2011

Country: International

Keywords: Cartels

Shelf Number: 148213


Author: Financial Action Task Force

Title: Money Laundering Through the Physical Transportation of Cash

Summary: Despite the increasing prevalence of non-cash payment methods in developed economies, cash remains an important means of settlement across the globe, with an estimated USD 4 trillion in circulation and between 46% and 82% of all transactions in all countries being conducted in cash. Similarly, cash is still widely used in the criminal economy and it remains the raw material of most criminal activity. In many cases, even when the proceeds of a crime are initially generated in electronic form (such as the theft of funds from a bank account), criminals choose to withdraw the funds from a bank account in cash, transport it to another country, and pay it into another account in order to break an audit trail. The physical transportation of cash across an international border is one of the oldest and most basic forms of money laundering, but this report shows that it is still widespread today. There are no fully reliable estimates for the amount of cash laundered in this way, but the figure would seem to be between hundreds of billions and a trillion US dollars per year. The majority of countries surveyed during the compilation of this report were of the opinion that cash smuggling is an increasing problem. Physical transportation of cash as a method of money laundering is not restricted to a particular type of crime. Although many jurisdictions report the use of this typology by drug trafficking organisations, it is also linked to the illegal trafficking of other commodities, such as alcohol and tobacco, and it is also used widely by criminals involved in other activity including tax fraud, weapons and arms smuggling, organised immigration crime and the financing of terrorism. There are no cash smuggling methods more associated to one form of criminality than another, and no guarantee that criminals committing the same type of crime will move their proceeds in the same way and by the same route. Instead, the methods used to physically transport criminal cash are dependent on a decision making process undertaken by the criminal. This process begins with the criminal deciding what the purpose of the cash movement is (for example, to break the audit trail, to pay a supplier, to bank it in another jurisdiction etc.). This will dictate the ultimate destination, which will in turn inform the method used, and ultimately the route chosen. At all stages, influences such as risk, familiarity, simplicity and the demands of partners will affect the decisions made. Understanding the decision making process can assist in developing control techniques by authorities tasked with combatting the problem. Once the cash has been moved to its destination and used for its intended purpose it will eventually enter the legitimate financial system and will be recycled by banks and other financial institutions. Countries that use their own unique currency have the opportunity to monitor the repatriation of their currency from overseas, and while this is by no means straightforward, proper analysis can in some cases identify high risk routes, money laundering networks and drive national programs to raise awareness of risk.

Details: Paris: FATF/OECD and MENAFATF, 2016. 108p.

Source: Internet Resource: Accessed November 18, 2017 at: http://www.fatf-gafi.org/media/fatf/documents/reports/money-laundering-through-transportation-cash.pdf

Year: 2015

Country: International

Keywords: Financial Crimes

Shelf Number: 148162


Author: Know Violence in Childhood

Title: Ending Violence in Childhood. Global Report 2017

Summary: For a large proportion of the world's population, life is better than it was 30 years ago. Incomes have risen significantly. Life expectancy has increased. Fewer people are living in extreme poverty. Fewer mothers die in childbirth. The global community has also moved in many directions to make the world a more peaceful place for all. And yet, at least three out of every four of the world's children - 1.7 billion - had experienced some form of inter-personal violence, cruelty or abuse in their daily lives in a previous year, regardless of whether they lived in rich countries or poor, in the global North or the global South. It is unfortunate that a culture of silence surrounds violence. As a result, violence against children is still largely invisible in the development discourse. Violence violates the dignity and rights of children, and robs them of the joys of childhood. Childhood violence also disrupts the formation of capabilities, and imposes huge financial and human costs on individuals and societies. The tide is however turning. The 1989 United Nations Convention on the Rights of the Child, ratified by all but one of the UN member states, has been the inspiration for national governments and others to end violence against children. With ending violence being a clearly articulated priority of the Sustainable Development Goals, we have a unique opportunity to break the cycle of violence, especially for children and women who bear the brunt of it. This Report has marshalled global evidence to show how collaboration and learning across geographies, disciplines and sectors can unite academics, policy makers and practitioners to end childhood violence. The Report finds large gaps in global knowledge and evidence related to different dimensions of childhood violence. It therefore calls for much greater investment in data, research and evaluation to break the silence around violence and to promote public action across the world. Defining and measuring childhood violence is not easy. The Report makes a beginning by using estimated prevalence rates to develop a global picture of violence in childhood. It calls for States to invest in strengthening data systems to report on all forms of violence experienced by children across ages and settings. This Report also calls for global and local actions to promote child rights and prevent violence. It advocates a shift away from seeing violence as a series of discrete episodes towards recognizing that it is a thread running through the everyday lives of children everywhere.

Details: New Delhi: Know Violence in Childhood, 2017. 158p.

Source: Internet Resource: Accessed November 20, 2017 at: http://globalreport.knowviolenceinchildhood.org/

Year: 2017

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 148271


Author: King, Benjamin

Title: From Replica to Real: An Introduction to Firearms Conversions

Summary: While national firearms regulations often restrict the types of firearms civilians may legally own, such regulations do not necessarily eliminate demand. Prohibitions on handguns in particular have led some parties to devise new means to acquire these or comparable firearms. One common method involves mechanically altering an accessible replica firearm to function in a similar way as a restricted firearm. This process is generally known as a firearms conversion, and has been observed worldwide. This Issue Brief offers an overview of illicit firearms conversion. Firearms conversion poses a challenge to current efforts to control small arms as it enables individuals to manufacture a functioning firearm, unfettered by government regulations. Firearms conversion is also a product of the same control efforts in that the more difficult it is to obtain real weapons, the greater the appeal of a converted firearm. To combat the proliferation of converted firearms therefore calls for an understanding of why and how such weapons are produced. Significant findings in this Issue Brief include the following: Blank-firing handguns are the most commonly converted replicas worldwide, but many other types of replica firearms are also highly convertible. Although conversion is possible for most replica firearms, certain models are more appealing because of their design, the materials used in their construction, and the ease with which it is possible to circumvent the barriers that manufacturers put in place to prevent conversion. Demand for converted firearms is influenced by: the ease of access to conventional firearms; legal restrictions; the high cost of pistols; and the fact that replicas are untraceable, which appeals to criminal elements. Globally, law-enforcement agencies frequently confiscate large numbers of replica firearms and often express concern about their possible conversion. Firearms conversion is a global practice. While European nations report the problem most frequently, converted weapons appear in many countries, including most recently in several African countries. The Issue Brief begins with a brief discussion on terminology. Since 'conversion' is used in several contexts in relation to firearms, there is a need to clarify the term. The Brief then discusses several types of replica firearms used in conversions and explains their unique features. The Issue Brief presents data on the global proliferation of converted firearms, but in view of the challenges in compiling such data, it presents information on actual conversions and seizures of replicas, in which concerns about their potential conversion were mentioned. National records, open source searches, and interviews with law-enforcement agencies provided the data presented in this section. Finally, the Issue Brief examines the motivations for conversion as well as the impact of current small arms control efforts on shaping that demand.

Details: Geneva: Small Arms Survey, 2015. 12p.

Source: Internet Resource: Issue Brief No. 10: Accessed November 28, 2017 at: http://www.smallarmssurvey.org/fileadmin/docs/G-Issue-briefs/SAS-IB10-From-Replica-to-Real.pdf

Year: 2015

Country: International

Keywords: Firearms

Shelf Number: 148522


Author: White, Stephen

Title: Police Primacy

Summary: Initially prompted by a query on a discussion forum for the International Network to Promote Rule of Law (INPROL), this research memorandum addresses the topic of police primacy. The original query pointed out that although the concept of police primacy is considered an objective in many police reform processes, there is little research on the term and no common understanding of what it means. Research and interviews conducted as a response to the initial query and in preparation for this paper confirm the assertion that no standard definition of police primacy exists and that the term is used to describe a number of different concepts. These definitions often relate to internal security and public safety arrangements where police have a monopoly on public order and law enforcement. Most commonly, these definitions refer to broad situations where, for example, international actors aim to enable indigenous police to be at the forefront of rule of law and security interventions. Research thus indicates that the term "police primacy" encompasses more than one definition and is dependent on the context in which it is used. On occasions, it means that a prime (or priority) objective of its implementation is the reform of police organization. On other occasions, it is used to propose that policing developments be a central strand of some bigger, universal reform such as peacebuilding and political settlement. On yet other occasions, it may mean that the police will take the lead in operations such as counterterrorism; or it may be used to mean primacy of the law, as, for example, when a society is emerging from a period of military control during which criminal law and policing were relegated to a lower status than they typically enjoy. This ambiguity highlights the relevance and importance of seeking an answer to the question "What is police primacy?" Because it is a phrase commonly used by military commanders, diplomats, security sector reform experts, and others who operate in difficult and dangerous scenarios, this is no mere academic debate. Those who call for police primacy as a solution to major problems, those who plan for it, and those who are responsible for delivering it must understand exactly what the term implies and embraces in a specific context. Those impacted by it and those charged with evaluating it must also commence from a mutually understood starting point. Policing and the relationships between police institutions and civil society are of vital importance to peace and stability around the globe. There are reports of police officers, the most visible representatives of the state for most citizens, being injured or killed in politically motivated attacks from China to Ukraine, Nigeria to Iraq, and Bahrain to Egypt. In Northern Ireland, attempted murders of police continue to blight the peace process. These cases highlight the difficulties faced by those who design, lead, and implement police primacy reforms and strategies in conflict and post-conflict situations. However, as this research memorandum demonstrates, the alternative to police primacy - military-led responses devoid of policing expertise and lacking a central vision of police primacy - often lead to even greater problems in the long term. A key recommendation in this memorandum is to accept the fact that the term "police primacy" has at least two main strands and to move beyond this notion by focusing on what the real goal is in a given situation and how it can best be achieved. The common theme running through all the work in this area is, undoubtedly, police reform. The focus therefore should be on the most effective means to manage and deliver strategic change within police institutions. This research memorandum examines several police interventions and change programs. In doing so, it seeks to demonstrate that, whenever and wherever police reform is attempted in order to establish police primacy (thereby strengthening the rule of law), certain major challenges and common obstacles are likely to arise. This paper highlights some critical success factors that, if addressed at the outset, may increase the chances of success. A key implication flowing from the notion of police primacy as defined here is that in most, if not all, police reform programs the aim is to elevate the police to a level of proficiency that enables them to take a prime role in delivering public safety and fighting crime and counterterrorism while gaining the trust of all citizens. This in turn implies that the police institutions must be reformed in such a way as to meet international standards in terms of modern, democratic, and professional policing. If strategic change is required, best practices in change management techniques and delivery are needed. This research memorandum highlights what can go wrong in such reforms and offers suggestions about how to avoid some obstacles and to minimize some problems. A sensible starting point is an agreed-on vision of what "good policing" looks like - bearing in mind that in each cultural, social, and political context, various degrees of emphasis may be required. Following this, attention is paid to who and what types of organizations conduct police primacy efforts, after which observations and conclusions are offered about what can go wrong and how to improve the prospects for success. Case studies of police primacy in action are presented to reinforce the key points made in this memorandum. Finally, overall conclusions and recommendations are proposed.

Details: s.l.: International Network to Promote the Rule of Law (INPROL), 2014. 67p.

Source: Internet Resource: Research Memorandum: Accessed November 28, 2017 at: https://www.inprol.org/publications/13324/police-primacy

Year: 2014

Country: International

Keywords: Police Legitimacy

Shelf Number: 148523


Author: Chae, Sophia

Title: The Global State of Evidence on Interventions to Prevent Child Marriage

Summary: Child marriage, defined as marriage before age 18, is a violation of human rights. Every year, 15 million girls are married as children-equating to one girl marrying every two seconds. Although many countries impose laws setting 18 as the minimum age of marriage, the practice of child marriage remains widespread. Globally, 720 million women alive today were married before turning 18, with one-third married before age 15. Child marriage is prevalent but varies widely in sub-Saharan Africa (range: 5-76%) and South Asia (range: 4-52%). In subSaharan Africa, around 4 in 10 girls marry by age 18. Although the prevalence of child marriage is lower in South Asia, its larger population size produces a higher absolute number of married girls. As a result, two in five married girls live in South Asia, and one in three live in India. Many social and economic factors fuel the harmful practice of child marriage. Poverty, one of the most common drivers, pushes families to use marriage as an economic strategy to free up limited resources for the rest of the family. In contexts where the exchange of bridewealth or dowry is practiced, families may be financially motivated to marry their daughters early, and where virginity is strongly valued, parents may marry their daughters early to ensure that they remain virgins until marriage. Girls who become pregnant out of wedlock may be viewed as bringing shame and dishonor to the family. Moreover, a lack of viable alternatives could lead girls to marry early, particularly if they are not working or in school. Child marriage marks the end of childhood and adolescence, forcing girls to assume adult roles and responsibilities even though they are not physically and emotionally ready to do so. This harmful practice can have severe repercussions for girls, their children, and their communities. Childbearing is often expected to take place soon after marriage, putting girls at risk of suffering complications or even dying during pregnancy and childbirth because their bodies are not yet fully developed. Consequently, children born to adolescent mothers experience poorer health outcomes and higher mortality rates than children born to older mothers. In addition, girls who marry before age 18 experience elevated rates of intimate partner violence compared to their peers who marry as adults (29% vs. 20%, respectively). Not only does child marriage produce negative consequences for girls and their children, but it also has negative effects for their families, communities, and societies. The economic impact of child marriage is significant. For example, global GDP could be $4 trillion higher for the period 2014 to 2030 if child marriage was eliminated. Thus, child marriage perpetuates the cycle of poverty that exists in low- and middle-income countries

Details: New York: GIRL Center for Innovation, Research, and Learning, Population Council, 2017. 19p.

Source: Internet Resource: GIRL Center Research Brief, No. 1: Accessed December 4, 2017 at" https://www.girlsnotbrides.org/wp-content/uploads/2017/11/2017PGY_GIRLCenterResearchBrief_01.pdf

Year: 2017

Country: International

Keywords: Child Marriage

Shelf Number: 148694


Author: Laczko, Frank

Title: Fatal Journeys. Volume 3 PART 2: Improving Data on Missing Migrants

Summary: This is the third in the International Organization for Migration's (IOM) series of global reports documenting the number of lives lost during migration. The publication of this report is particularly timely, as the 192 UN Member States prepare to discuss the adoption of a global compact for safe, orderly and regular migration. A key indicator of unsafe migration is the number of migrants who perish each year during their journeys. Sadly, there seem to be few signs that this number is decreasing. Since the beginning of 2014, IOM has recorded the deaths and disappearances of nearly 25,000 migrants. IOM has also calculated that at least 60,000 migrants have died since the year 2000. The Mediterranean crossing, which has claimed the lives of 15,000 migrants since it first made headlines in October 2013, is just one example of the many migration routes that see numerous fatalities each year. However, the true number of migrant fatalities is unknown, as not all deaths and disappearances are reported. In many remote regions of the world, bodies may never be found, and many migrants may never be identified. Each nameless death represents a family missing a loved one. In addition to providing a global analysis of trends, this year's report focuses on how to improve the data on missing migrants. Although data collection has improved over the last three years, there are many gaps in our knowledge about missing migrants. Basic information such as the sex or the age of the migrant who is reported dead or missing is often lacking. The number of bodies that are retrieved and identified still remains very low. There are many potential sources of data and approaches that could be taken to improve data on missing migrants. The challenge is not simply a lack of data, but the unwillingness of some authorities to collect them, as well as deficiencies in resources and know-how.

Details: Geneva, SWIT: International Organization for Migration, 2017. 146p.

Source: Internet Resource: accessed December 5, 2017 at: https://publications.iom.int/system/files/pdf/fatal_journeys_3_part2.pdf

Year: 2017

Country: International

Keywords: Immigration

Shelf Number: 148699


Author: Global Initiative Against Transnational Organized Crime

Title: Unexplored Wars: When military assets are used to fight organised crime

Summary: Tackling organised crime is hard, perhaps one of the most complicated challenges for states in the evolving global order. Both within and outside of their territories, it requires a coordinated approach across multiple areas of government responsibility. And it also often involves the military. But the use of military assets in the fight against organised crime - and the process in which a choice is made to use the military over other options - is surprisingly undocumented and under analysed. It deserves a much more thorough examination, including discussing what the implications and consequences of the use of what might be termed "war talk" against organised crime can be. Two current examples highlight how it can be easy to conflate militarised style responses (think of the shooting of drug dealers in the Philippines) in some places with the deployment of military forces in others (the deployment of warships in the fight against human smuggling in the Mediterranean). While there are interconnections between militarisation and the use of the military, these are issues that deserve a separate examination in their own right, and with far greater nuance to the distinctions. What is common between militarised responses and the deployment of military style assets, however, is political rhetoric that situates that process as a 'war on crime'. A detailed examination of an array of such cases suggests that the political rhetoric that accompanies the deployment of military assets in a crime-fighting role may be as, if not more, damaging in the longer term then the militarised response itself. Most importantly for military planners, it may lock military forces into a long-term crime fighting roles for which they are ill-prepared and which may, beyond the first joyous greetings on their arrival, may have less positive long-term consequences: it may create a costly dependency and stymie alternatives; it can undermine the efficacy of civilian security and justice institutions, and unnecessarily taint military actors in the eyes of the local population. Organised crime too, with its access to multiple resources and its tendency to seek out protectors in the security apparatus is likely to make military forces, depending on the nature of the deployment, vulnerable to corruption. These are serious considerations for both policymakers and military leadership to consider when contemplating engaging military assets against illicit economies, or declaring a war on crime. In the worst case scenario, the costs for militaries that value their legitimacy at home and abroad may be high.

Details: Geneva, SWIT: The Initiative, 2017. 10p.

Source: Internet Resource: Policy Note: Accessed December 6, 2017 at: http://globalinitiative.net/wp-content/uploads/2017/10/tgiatoc-policy-note-war-on-crime-1879-web.pdf

Year: 2017

Country: International

Keywords: Illicit Economies

Shelf Number: 148730


Author: Carli, Vivien

Title: Assessing CCTV as an effective safety and management tool for crime-solving, prevention and reduction

Summary: The implementation and use of video surveillance (Closed Circuit Television technology) in societies across the globe has stimulated major debate on a handful of topics. This report aims to surface and synthesize those issues through an investigative and comparative analysis. The report will provide the reader with a variety of discussions, based on an objective analysis of available publications throughout the world. It addresses the history of CCTV and the main debates surrounding effectiveness and utility, it further evaluates the concept of the rise of surveillance societies and the protection of individual rights, and promotes further discussion and analysis through policy recommendations.

Details: Montreal: International Centre for the Prevention of Crime, 2008. 19p.

Source: Internet Resource: Accessed December 6, 2017 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/Assessing_CCTV_as_an_effective_safety_and_management_tool_ANG.pdf

Year: 2008

Country: International

Keywords: CCTV

Shelf Number: 148743


Author: Global Initiative Against Transnational Organized Crime

Title: Transnational Organized Crime and the Impact on the Private Sector: The Hidden Battalions

Summary: his paper is based on a detailed review of the scale and nature of organised crime's infiltration of the private sector. These findings are a 'call to arms' for the international private and public sectors to transform their co-operation and teamwork. We have adopted a practical definition of organized crime as that which is carried out by a group of people, suspected of serious criminal offences, over a prolonged period, motivated by profit or power. In our analysis of six major private sector industries, six specific forms of organised crime stood out as either having material impact on the private sector, or using the private sector as facilitators. Money laundering is the process of making dirty money look clean. One estimate puts it at 2% of global GDP - c.$1.5 trillion. Money-laundering is an 'enabling crime', facilitating organized crime (as well as terrorism) with social and economic costs. Asset misappropriation refers to stealing from businesses. For example, cargo thefts cost as much as $30 billion in losses each year worldwide. Counterfeiting and contraband, whilst thought of as being a consumer goods crime, is rife in a broad range of sectors, in particular technology products and pharmaceuticals, to devastating effect. It is estimated by OECD at $461billion, or 2.5% of world trade. Fraud and extortion remain strongly present in the financial, construction and real estate industries. In construction extortion could account for of 20-30 per cent of lost project value. Human trafficking. High volume, low skilled labour enterprises such as construction and building, have the highest penetration of trafficking incidence in the private sector. Cyber Crime. Hacking attacks cost the average American firm $15.4 million per year over. In 2015 68,000 URLs containing child sexual exploitation and abuse (CSEA) images were hosted online on 1,991 domains. The reputational impact means major tech companies apply significant collaborative resources to weeding out criminal, terrorist and CSEA activity. Finding#1: The Scale and Impact of Crime in the Private Sector is Truly Staggering. A conservative estimate of the value of organized crime was $3.6-$4.8 trillion, in 2015/2016, 7% of global GDP. The broader impact of organized crime is difficult to assess as it is multi-dimensional, and shared across the private, public sector, and society itself. The impact on the private sector only - in terms of revenue loss - is estimated at c$130 billion. The Institute of Economics and Peace (IEP) calculated the financial cost of terrorism at over $52 billion in 2014. A conservative estimate of total transnational organized crime is $870 billion a year. This is more than six times the amount of official development assistance and close to 7% of the world's exports of merchandise Finding #2 Private sectors are either facilitators or targets. Crimes are either done 'to' private sector organisations, or 'through' them. Sectors are either the targets of fraud or asset theft themselves, particularly in construction, consumer goods ($460 billion counterfeit goods), and financial card fraud, or they facilitate crime unwittingly, through use of technology networks by fraudsters to target victims, e.g. the real estate sector laundering dirty funds or the transport industry moving illicit goods. Regulation varies between the 'victim' and 'enabling' industries. Laws are in place to criminalise the use of the private sector for technology or money laundering crime. The victim industries, however, often are reliant on existing laws around theft, or copyright infringement, which are not tailored to the activities of TOC groups and tend to have lower penalties for infringement. Finding #3 Organized crime's impact on the private sector is growing not shrinking. Counterfeit goods have risen from $250 billion to $461 billion in the last 8 years. Asset theft in the transport and logistics theft rose by over 90% 2015 to 2016. There is a sense that regulation is not working: money laundering seizures equated to 0.2% of all laundered funds in one study; and after the dark web's Silk Road was taken down, many sites sprung up to take on and indeed grow the trade. Finding #4 Direct impact of Crime Disproportionately felt in the global south. Sweatshops flourish in South Asia; trafficking of labour and sex workers originates predominantly in Africa, Asia and Eastern Europe; corruption in natural resources damages production in Africa and the Caucasus; technology fraud is driven from eastern and southern Europe, West Africa and the Middle East. Whereas in developed economies counterfeit drugs may comprise less than 0.2 percent of the market developing markets are often beset by 30% fakes, as a UNODC report showed for anti-malarial drugs in Africa. Globalization is increasing the 'attack surface' for TOC groups. The abuse of the often weaker regulatory regimes in the Global South by TOC groups further increases the risk for the private sector operating in these areas. Finding #5 Responses re confrontational rather than collaborative. There are very few examples of successful public and private sector co-operation against TOC groups. Private sector organisations complain that communication with the law enforcement sector is one-way and that the regulatory reporting burden, designed to combat crime, can act as a deterrent to co-operation. Tangible results have been seen when industries take the lead on disrupting the work of TOC groups, such as TAPA the Transported Asset Protection Association

Details: Geneva, SWIT: The Global Initiative, 2017. 84p.

Source: Internet Resource: accessed December 7, 2017 at: http://globalinitiative.net/wp-content/uploads/2017/12/gitoc_tocprivatesector_web-1.pdf

Year: 2017

Country: International

Keywords: Cargo Theft

Shelf Number: 148755


Author: McEvoy, Claire

Title: Global Violent Deaths 2017: Time to Decide

Summary: Global Violent Deaths 2017: Time to Decide, a new report from the Small Arms Survey, shows that while the global conflict death rate dropped, the global homicide rate increased for the first time since 2004. Although this does not necessarily indicate a new trend, it does signal growing insecurity in non-conflict areas. Of the five countries with the highest death rates in 2016-Syria, El Salvador, Venezuela, Honduras, and Afghanistan-only two had active armed conflicts. The study also elaborates scenarios for the future based on current trends, to assess the number of people that could be saved if states implement effective violence reduction initiatives in support of Agenda 2030, as opposed to more negative outcomes if trends worsen. If prevailing trends remain unchanged, the annual number of violent deaths is likely to increase to 630,000 by 2030. On the contrary, if states commit themselves to effectively address conflict and armed violence, the number of annual deaths could be lowered to 408,000 by 2030-even considering the population increase. In total, over the next twelve years, approximately 1.35 million lives could be saved. Within the Agenda 2030 framework and its 17 Sustainable Development Goals, states have an unprecedented opportunity to save lives. It's time to decide.

Details: Geneva: Small Arms Survey, 2017. 104p.

Source: Internet Resource: Accessed December 7, 2017 at: http://www.smallarmssurvey.org/fileadmin/docs/U-Reports/SAS-Report-GVD2017.pdf

Year: 2017

Country: International

Keywords: Conflict Related Violence

Shelf Number: 148756


Author: Dantinne, Michael

Title: Transnational study on the link between the possession of a firearm and the rate of homicides by firearms

Summary: The aim of this article is to examine the link between the rate of homicides by firearms, the possession of a firearm and the severity of legislation with regard to firearms. The construction of our research as well as the different variables selected are based on elements taken from reference works on the subject of mortality by a firearm referred to in scientific literature. Method The statistical design of the study has an ecological approach based on a number of countries (N=52), not including the USA. It integrates a set of confounding variables (economic, social, demographic and criminogenic) through bivariate correlations and multiple regressions with the aim of examining the presence of a significant link between the rate of homicides by firearms (dependent variable), the possession of firearms and the severity of legislation. Results The results observed seem to indicate no significant link between our dependent variable and our variables of interest. However, the different analyses repeatedly underlined the presence of a strong link between one of our confounding variables, the infant mortality rate and the rate of homicides by firearm in the countries included in our sample. Conclusion Much more than the possession of firearms or the severity of legislation, it seems that child mortality is one of the most important predictors in understanding the variations in the rates of homicides by firearm between countries, thus paving the way towards greater attention to the socio-economic conditions in the apprehension of criminal phenomena linked to firearms but also to reorientation of the policies applied in this area.

Details: University of Liege in Belgium, 2017. 24p.

Source: Internet Resource: Accessed December 7, 2017 at: https://ssaa.org.au/assets/news-resources/research/Transnational_study_on_the_link_between_the_possession_of_a_firearm_and_the_rate_of_homicides_by_firearms.pdf

Year: 2017

Country: International

Keywords: Firearms

Shelf Number: 148757


Author: Hart, Roger

Title: Placing Children's Voices at the Heart of Organizations That Serve Them: Lessons from governance with children who have experienced commercial sexual exploitation

Summary: The purpose of this publication is to synthesise current thinking on how to best enable the voices of children who have been the subject of exploitation to have roles in the decisionmaking and governance of organisations that are designed to support and advocate for them. It focuses in particular on the child survivors of commercial sexual exploitation, but also draws from the experiences of organisations working with other vulnerable children. One of the most profound and transformative dimensions of the United Nations Convention on the Rights of the Child (CRC) is its recognition that all children should know that they are citizens, that they have rights, and that they should have opportunities to speak out about and be involved in decisions about the conditions that affect them according to the maximum of their capacities. This includes the right to have a voice in the running of programs and services that are intended for them, and the right to be heard in administrative proceedings affecting them. These goals are a challenge to any organisation working directly with children because they greatly increase the degree to which children need to be heard and taken into account beyond that which is typical for any society. But the right to be listened to, have one's opinions taken into account is particularly important for children who are having, or have had, their rights severely violated. It has strong implications not only for enabling their perspectives to be heard in order to improve conditions for children like themselves, but also for their own protection and recovery from such violations. In practice, exercising the rights of children to have their voices heard raises questions about when and how best to account for the views of a child of CSE to ensure that the process remains authentic and does not lead to further traumatization. In addressing these questions, we take a multi-level approach that includes all organisational scales from the local to the global. This is based on an observation that we, and other scholars and practitioners have made, that while there is a great deal of high profile involvement of children in global events, it is first and foremost at the local level where we need to establish the conditions for children to be free to voice their feelings and concerns. This is important for two reasons. First, all affected children need to be able to be heard, not just a select few. Second, authentic participation in local groups is foundational to any kind of representative voices of children and youth at national, regional and international levels.

Details: Bangkok, Thailand: ECPAT, 2016. 38p.

Source: Internet Resource: Accessed December 7, 2017 at: http://www.ecpat.org/wp-content/uploads/2017/01/PLACING-THE-PERSPECTIVES-OF-CHILDREN-at-the-HEART_Thematic-Report.pdf

Year: 2016

Country: International

Keywords: Child Pornography

Shelf Number: 148760


Author: Boske, Leigh B.

Title: Port and Supply-Chain Security Initiatives in the United States and Abroad

Summary: Between 1990 and 2004, the value of U.S. international trade increased from $889 billion to nearly $2.2 trillion. Roughly two-thirds of this total value of trade passed through U.S. freight gateways (primarily ports) to and from countries other than Canada and Mexico. The top 50 U.S. ports accounted for about 90 percent of all maritime cargo tonnage; and 25 U.S. ports accounted for 98 percent of all container shipments. In 2004 alone, the liner shipping industry transported $1.5 billion worth of containerized goods, through U.S. ports, every day. All told, roughly 10 million loaded cargo containers entered the U.S. in 2004. Given universal recognition that cargo containers may be used to smuggle chemical, biological, radiological, or nuclear weapons, it is understandable that assuring container security has become a priority to governments and the international trade community alike to prevent incidents of mass destruction and major disruptions to the world economy. Mike Toddington, Executive Director of the International Association of Airport and Seaport Police, has noted that public officials must walk a fine line in devising methods that simultaneously secure ports and facilitate trade. Promoting both security and trade facilitation requires the examination of global supply chains. Cargo container movements, between points of origin and their ultimate destinations, are characterized by complex interactions among multiple actors, industries, regulatory agencies, modes of transportation, operating systems and legal frameworks. On behalf of the Congressional Research Service, the Lyndon B. Johnson School of Public Affairs at the University of Texas at Austin, conducted research during the 2005-06 academic year to examine the various institutional, legal and policy arrangements that have been put into place in the U.S. and abroad to enhance worldwide port and supply chain security.

Details: Austin: Lyndon B. Johnson School of Public Affairs, University of Texas at Austin, 2006. 238p.

Source: Internet Resource: Accessed December 7, 2017 at: https://repositories.lib.utexas.edu/bitstream/handle/2152/44002/prp_150-port_and_supply-chain_security_initiatives_in_the_united_states-2006.pdf?sequence=4&isAllowed=y

Year: 2006

Country: International

Keywords: Cargo Security

Shelf Number: 148761


Author: Holtom, Paul

Title: Trade Update 2017: Out of the Shadows

Summary: The Small Arms Survey's Trade Update 2017: Out of the Shadows provides an overview of the international trade in small arms and light weapons in 2014, identifies the world's top and major exporters of small arms and light weapons, and assesses changes in trade patterns from 2013 to 2014. The Update also presents the 2017 edition of the Small Arms Trade Transparency Barometer, which scores key exporters from the most to the least transparent. The main findings include the following: In 2014, the top exporters of small arms (those with annual exports of at least USD 100 million), in descending order, were: the United States, Italy, Brazil, Germany, South Korea, Austria, Turkey, the Russian Federation, the Czech Republic, Belgium, Croatia, Israel, Spain, Switzerland, and Japan. Brazil exported more than USD 500 million worth of small arms for the first time during 2001-14. In 2014, the top importers of small arms (those with annual imports of at least USD 100 million), in descending order, were: the United States, Canada, Indonesia, Saudi Arabia, Germany, Australia, Iraq, France, the Netherlands, and the United Kingdom. The United States remains the world's largest importer, but the value of its imports declined for the first time since 2001, from USD 2.5 billion in 2013 to USD 2.2 billion in 2014. The international small arms trade was worth at least USD 6 billion in 2014. Ammunition accounted for 38 per cent of global transfers. The value of 'military firearm' shipments increased by 49 per cent between 2013 and 2014, from USD 475 million to USD 708 million. In contrast, the value of the trade in pistols and revolvers declined by 16 per cent, from USD 1 billion to USD 845 million. The 2017 edition of the Small Arms Trade Transparency Barometer identifies Germany, Switzerland, the Netherlands, and Serbia as the most transparent top and major small arms exporters. Iran, Israel, North Korea, Saudi Arabia, and the United Arab Emirates (UAE) are the least transparent major exporters. The average score in the 2017 Barometer is 11.33 out of 25 points. The areas that have seen the most improvement over the past year are: comprehensiveness (+17 per cent), access and consistency (+12 per cent), licences denied (+11 per cent), and clarity (+4 per cent). In their first ATT annual reports, Austria, Costa Rica, the Dominican Republic, and Liberia-none of which had reported small arms transfers to the UN Register-provided information on small arms transfers, thus increasing overall transparency on international small arms transfers. Although Iran, North Korea, and the UAE rarely, if ever, recorded small arms exports worth USD 10 million or more in Comtrade, Survey research indicates that they are major small arms exporters. It is more difficult to determine the status of Saudi Arabia, which appears to be a significant re-exporter of small arms.

Details: Geneva, SWIT: Small Arms Survey, 2017. 90p.

Source: Internet Resource: Accessed December 7, 2017 at: http://www.smallarmssurvey.org/fileadmin/docs/S-Trade-Update/SAS-Trade-Update-2017.pdf

Year: 2017

Country: International

Keywords: Illegal Trade

Shelf Number: 148762


Author: Global Commission on Drug Policy

Title: The World Drug Perception Problem: Countering Prejudices about People Who Use Drugs

Summary: Previous reports by the Global Commission on Drug Policy have shown how the potential harms of drugs for people and communities are exacerbated by repressive drug control policies at local, national and international levels. The present report, while fully acknowledging the negative impact that problematic drug use often has on people's lives, focuses on how current perceptions of drugs and people who use them feed into and off prohibitionist policies. Indeed, drug policy reforms have sometimes been difficult to carry out, design or implement because current policies and responses are often based on perceptions and passionate beliefs, and what should be factual discussions - such as the efficiency of harm reduction - are frequently treated as moral debates. The present report aims to analyze the most common perceptions and fears, contrast them with available evidence on drugs and the people who use them, and on that basis recommend changes that can be enacted to support reforms toward more effective drug policies. DRUGS, ADDICTION, AND THE AIM OF TREATMENT Drugs are often presented as unnatural contaminants, pushed into a society from the outside or by deviant forces, and many people fear them. In reality, taking substances to alter one’s mind seems to be a universal impulse, seen in almost all cultures around the world and across history (though the substances used vary). Furthermore, while there are certainly risks involved in all drug use, the legal status of a drug rarely corresponds to the potential harms of that drug. In addition, the potential harms of a substance are increased when it is produced, obtained and consumed illegally. It is also widely believed that drug addiction is the result of someone simply taking a drug casually for pleasure, then becoming accidentally "hooked" on the chemical substances within the drug and thereafter “enslaved.” However, this is based on a misunderstanding of addiction. Drug use is relatively common and, in 2016, an estimated quarter of a billion people used currently illegal drugs, while about 11.6% of these are considered to suffer problematic drug use or addiction. The most common pattern of use of psychoactive substances is episodic and non-problematic. Addiction is often believed to be permanent and irreversible. If recovery is deemed possible, abstinence is generally perceived as the primary - and often only - goal of treatment. However, the primary goal of treatment should be to allow a person to attain, as far as possible, physical and mental health. From this perspective, abstinence is not necessarily the best objective for treatment for a particular person, nor even perhaps his or her aim. Even when it is, many people with problematic drug use only achieve abstinence after several attempts. A large range of options is therefore needed to allow for doctors and their patients to freely decide on the appropriate treatment. Options include psychosocial support, substitution therapy, and heroin-assisted treatment. There is strong evidence for the effectiveness of these treatments. In addition, many scientifically proven methods prevent many of the harms caused by drug use - foremost those caused by failed repressive policies – without aiming for abstinence. These harm reduction interventions include needle and syringe programs, safe injection facilities, provision of opioid-overdose antagonists, and drug checking. PERCEPTIONS SURROUNDING PEOPLE WHO USE DRUGS When considering the reasons why someone might take drugs, psychological and moral explanations generally prevail, primarily the assumption that the person is "weak" or “immoral.” Thus, the general public often sees problematic drug use as an individual problem and not one that society needs to deal with. Another common stereotype of people who use drugs is that of people living on the margins of society, who are not equal members of it or entitled to the same rights as others. These perceptions and stereotypes contrast with what experts consider to be the primary reasons for consuming drugs. These include youthful experimentation, pursuit of pleasure, socializing, enhancing performance, and self-medication to manage moods and physical pain. Another widespread perception is that people who use drugs, and particularly people with problematic drug use, engage in criminal activities. But the vast majority of those who use drugs are not committing any crime other than the contravention of drug laws. Individuals with problematic drug use often cannot afford the drugs they need without resorting to crime themselves. In addition, people who use drugs are often forced out of the mainstream and into marginalized subcultures where crime is rife. Once they have a criminal record, they find it much harder to find employment, thus making the illegal market and criminal activity among their only means of survival. PORTRAYALS IN THE MEDIA AND AMONG THE GENERAL PUBLIC The perceptions discussed in the report are largely influenced by the media, which portray the effects of drugs as overwhelmingly negative. Two narratives of drugs and people who use them have been dominant: one links drugs and crime, the other suggests that the devastating consequences of drug use on an individual are inevitable. Public opinion and media portrayals reinforce one another, and they contribute to and perpetuate the stigma associated with drugs and drug use. Commonly encountered terms such as "junkie," "drug abuser", and "crackhead" are alienating, and designate people who use drugs as "others" - morally flawed and inferior individuals. Such stigma and discrimination, combined with the criminalization of drug use, are directly related to the violation of the human rights of people who use drugs in many countries. Therefore, in order to change how drug consumption is considered and how people who use drugs are treated, we need to shift our perceptions, and the first step is to change how we speak. THE LINK BETWEEN PERCEPTIONS OF DRUGS, THOSE WHO USE THEM, AND DRUG CONTROL POLICIES The link between the perception of drugs, the people who use them, and drug policy constitutes a vicious cycle. Under a prohibitionist regime, a person who uses drugs is engaging in an act that is illegal, which increases stigma. This makes it even easier to discriminate against people who use drugs, and enables policies that treat people who use drugs as sub-humans, non-citizens, and scapegoats for wider societal problems. First, the fear of drugs has translated into messages for prevention that promote complete abstinence and state that all drugs are equally bad. However, providing information which is incomplete and often even incorrect lessens any chance of trust between the authorities and young people. A better way forward would be to offer honest information, encourage moderation in youthful experimentation, and provide knowledge on safer practices. Second, drug use is perceived as a moral issue, considered a public wrong, and is therefore criminalized, even though drug consumption itself is a non-violent act, and poses potential physical harm only to the person who engages in it. Yet in many countries the death penalty is applied to some non-violent drug offenses, placing them de facto on a similar moral ground to murder and other most serious crimes. A change of perceptions and policies is already underway in some countries. Leadership and information have played a critical role in showing that the public can support more pragmatic and evidence-based drug policies when it has been given credible information. It has been possible to persuade people concerned about public order and security that alternative drug policies can be more effective at reducing drug-related harms for users, their immediate environment, and society as a whole.

Details: Geneva, SWIT: The Commission, 2017. 44p.

Source: Internet Resource: Accessed January 17, 2018 at: http://www.globalcommissionondrugs.org/wp-content/uploads/2018/01/GCDP-Report-2017_Perceptions-ENGLISH.pdf

Year: 2017

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 148846


Author: International Federation of Red Cross and Red Crescent Societies

Title: Effective law and policy on gender equality and protection from sexual and gender-based violence in disasters - Global study

Summary: This report aims to help fill a gap in knowledge on the effectiveness of national laws, policies and institutional frameworks in supporting gender equality in disaster risk management (DRM) and in preventing and responding to sexual and gender-based violence (SGBV) in disasters. More specifically, it contributes to the implementation of two resolutions of the 32nd International Conference of the Red Cross and Red Crescent in 2015. These were Resolution 3 on 'Sexual and gender-based violence: Joint action on prevention and response', and Resolution 6 on 'Strengthening legal frameworks for disaster response, risk reduction and first aid. Based on global research and three country case studies - in Ecuador, Nepal and Zimbabwe - the report considers national laws and the experiences of disaster-affected communities as to their effectiveness in protecting against SGBV and ensuring gender equality in humanitarian response. Taking a broader look at DRM laws and gender, based on international comparative research, the report concludes that States should look to include mandates for gender-sensitive DRM, SGBV protection, and a minimum representation of 30% women in all DRM system institutions, and to have this outlined in their DRM laws. The report also offers a set of recommendations to governments and the IFRC, national societies and other humanitarian organisations.

Details: Geneva: International Federation of Red Cross and Red Crescent Societies, 2017. 80p. 3 country reports.

Source: Internet Resource: Accessed January 19, 2018 at: http://media.ifrc.org/ifrc/wp-content/uploads/sites/5/2017/10/Gender-SGBV-Report_-Global-report.pdf

Year: 2017

Country: International

Keywords: Disasters

Shelf Number: 148885


Author: Quadara, Antonia

Title: The effects of pornography on children and young people: An evidence scan

Summary: In 2016, the Australian Institute of Family Studies (AIFS) was engaged to review what the available research evidence tells us about the impact exposure to and consumption of online pornography has on children and young people. The increasing availability of pornography online has raised concerns about the impacts it may have on children and young people's: knowledge of, and attitudes to, sex; sexual behaviours and practices; attitudes and behaviours regarding gender equality; behaviours and practices within their own intimate, sexual or romantic relationships; and risk of experiencing or perpetrating sexual violence. The purpose of this project was not to duplicate the considerable work undertaken by other researchers working on these issues (e.g., Flood, 2009; Flood & Hamilton, 2003a, 2003b; Sabina, Wolak, & Finkelhor, 2008; Wolak, Mitchell, & Finkelhor, 2007; Ybarra & Mitchell, 2005). Rather, the purpose was to synthesise recent research and current approaches/interventions across this range of domains to inform future initiatives to reduce the negative impacts of pornography on children and young people. Approach Between August and October 2016, the research team reviewed the available research regarding: the effects of pornography on children and young people in relation to the issues listed above; and current approaches and interventions that have been developed to address the negative effects of pornography and support respectful relationships. Research undertaken in Australia, New Zealand, the UK, the USA, Ireland, Scandinavia and Canada was prioritised. To varying degrees, the international contexts listed here share some similarities with Australia, such as political and legislative systems. However, the implications of the research are not fully transferable. The literature was then synthesised to: draw conclusions about the key effects of pornography on children and young people and how this relationship between pornography and associated impacts is best understood; identify factors that might help explain or mediate the relationship between exposure to pornography and other "sexualising" materials and the impact on children and young people (i.e., risk and protective factors); and identify promising approaches to addressing this issue with children and young people, including key learnings.

Details: Melbourne: Australian Institute of Family Studies, 2017. 62p.

Source: Internet Resource: Accessed January 20, 2018 at: https://aifs.gov.au/sites/default/files/publication-documents/rr_the_effects_of_pornography_on_children_and_young_people_1.pdf

Year: 2017

Country: International

Keywords: Child Welfare

Shelf Number: 148896


Author: Kleinfeld, Rachel

Title: Reducing All Violent Deaths, Everywhere: Why the Data Must Improve

Summary: The new Sustainable Development Goals (SDGs) include a target to "Significantly reduce all forms of violence and related deaths everywhere." Given the vast decline in violence since the Middle Ages, particularly since the end of the Cold War, this ambitious target is achievable. But policymakers know the least about the countries receiving the most aid. To ensure that aid and policy are effective, current data gaps and deficiencies must be fully understood and improved. Equally important, the target must include indicators that capture all the main types of violence, not just homicide. The Data Problem - Current statistics are marred by problems that make them incomparable across countries. Policymaking that ignores flawed data may focus on less effective goals or assume programs are working when, in fact, violence is being hidden through statistical manipulation. - Policymakers know the least about the countries receiving the most aid. Among the top ten British aid recipients, four have reported no homicide statistics or have had only one data point in twenty-seven years. Eight of the top ten U.S. aid recipients have no reported homicide statistics for the past four years. Egypt, Iraq, and Jordan have no reported homicide statistics since the Arab Awakening. - Failure to accurately count different types of violence obscures possible relationships among them. For instance, these include connections between the end of civil war and rising homicide, between state brutality and increased insurgency, and possible connections between state repression and homicide. The Way Forward - A global violence dataset that accounts for "all violent deaths everywhere" should include four disaggregated types of data: homicides, deaths among armed groups in conflict, deaths of unarmed civilians perpetrated by state or nonstate actors, and deaths caused by on-duty government security forces. - The international community needs accurate data across these categories to know which programs and policies actually reduce violence, rather than simply alter the form violence takes. - If the international community does not explicitly include state repression and terrorist killings in the SDG 16.1 target, it opens a loophole to politicizing numbers through reclassification and the use of state violence to try to reduce homicide and rebellion. - International actors should press for a comprehensive set of indicators for SDG 16.1, which currently only include homicides. - Data reporting and collection could be improved by investing in independent observatories, standardization of definitions and methodologies, and other crucial steps. - These decisions are not technical, but political. Statistical manipulation is inevitable and occurs in countries from the United States to Russia. Impartial, trained, and internationally funded violence observatories can assist in gaining accurate statistics so resources can target the most effective place and programs.

Details: Washington, DC: Carnegie Endowment for International Peace, 2017. 34p.

Source: Internet Resource: Accessed January 22, 2018 at: http://carnegieendowment.org/files/CP_297_Kleinfeld_Crime_Final_Web.pdf

Year: 2017

Country: International

Keywords: Crime Statistics

Shelf Number: 148900


Author: Bigio, Jamille

Title: Countering Sexual Violence in Conflict

Summary: The victims of today's armed conflicts are more likely to be civilians than soldiers. Armies and armed groups often subject noncombatants-particularly women and children-to conflict-related sexual violence, such as rape, sexual slavery, and forced marriage. Despite international recognition of this devastating abuse as a crime against humanity, sexual violence continues to plague conflicts from the Democratic Republic of Congo (DRC) to Syria. This practice has also proliferated among extremist groups, including Boko Haram in Nigeria and the self-proclaimed Islamic State in Iraq and Syria. Additionally, sexual violence has tarnished the operations of peacekeepers charged with protecting civilians, thereby undermining the integrity and effectiveness of international peacekeeping institutions across the globe. Sexual violence in conflict is not simply a gross violation of human rights-it is also a security challenge. Such violence has consequences that increase the costs of armed conflict, rendering its management more difficult. Wartime rape fuels displacement, weakens governance, and destabilizes communities, thereby inhibiting postconflict reconciliation and imperiling long-term stability. When committed by troops, it can represent a lack of discipline associated with weak command and control, which makes military units less effective in advancing their mission. Yet current security-sector efforts to address sexual violence in conflict are inadequate, plagued by insufficient training for peacekeepers, limited accountability through national and international judicial systems, and resource gaps. Combating conflict-related sexual violence merits a higher place on the U.S. foreign policy agenda. Although the U.S. government has taken modest steps to address sexual violence in conflict under successive Republican and Democratic administrations, more action is needed. To counter such violence, the Donald J. Trump administration should require training on conflict-related sexual violence in U.S. security cooperation efforts; expand the number of women serving in militaries, police, and peacekeeping forces around the world; increase accountability for the crime of sexual violence; and undermine terrorist financing streams raised through the abduction of women and children. These steps will help the United States and its allies respond effectively to the security threat posed by conflict-related sexual violence and advance U.S. interests in peace and stability

Details: New York: Council on Foreign Relations, 2017. 47p.

Source: Internet Resource: Accessed January 23, 2017 at: https://www.cfr.org/sites/default/files/report_pdf/Discussion_Paper_Bigio_Vogelstein_Sexual_Violence_Conflict_OR_1.pdf

Year: 2017

Country: International

Keywords: Conflict-Related Sexual Violence

Shelf Number: 148912


Author: UN-Habitat

Title: Streets as Tools for Urban Transformation in Slums: A Street-Led Approach to Citywide Slum Upgrading

Summary: Historically, governments have implemented slum upgrading projects and programmes of varying scale and scope. Despite the wealth of experience and knowledge, the growth of slums and the multiplication of informal settlements are only getting worse, particularly in parts of Asia, Sub-Saharan Africa and Latin America. The UN-Habitat publication Streets as Tools for Urban Transformation in Slums: A Street-Led Approach to Citywide Slum Upgrading advocates for a shift from piecemeal project-based upgrading to a programme-scale approach. It promotes an approach to slum upgrading that does not consider slums as islands of poverty and informality, but as deprived neighbourhoods that are an integral part of the overall city system which are spatially segregated and disconnected due to an absence of streets and open spaces. Taking advantage of streets as the natural conduits that connect slums with the city, the report suggests a fundamental shift towards the opening of streets as the driving force for citywide slum upgrading.

Details: Nairobi, Kenya: UN Habitat, 2014. 97p.

Source: Internet Resource: Accessed January 23, 2018 at: http://www.citiesalliance.org/sites/citiesalliance.org/files/publications/UN-Habitat_Street-led%20Citywide%20Slum%20Upgrading_2014.pdf

Year: 2014

Country: International

Keywords: Neighborhoods and Crime

Shelf Number: 148914


Author: Heinrich, Sarah

Title: The Global Trafficking of Pangolins: A comprehensive summary of seizures and trafficking routes from 2010-2015

Summary: Pangolins are currently the most heavily trafficked wild mammals in the world. Their meat is considered a delicacy, and has been attributed to have a medicinal/tonic value, their scales are used in traditional medicines, and pangolin skins are processed into leather products. All eight species are listed as threatened on The IUCN Red List of Threatened SpeciesTM. An estimated one million pangolins have been trafficked in the period 2000-2013, however, there is little understanding of the trafficking routes used to transport pangolins globally. In this report, the illegal pangolin trade from 2010-2015 was investigated, focusing on the global trade routes used to traffic pangolins and their derivatives. A total of 1270 seizure incidents were collated, which included at least 20 749 kg and an additional 7154 individual pangolin body parts, 55 251 kg and an additional 5613 individual pangolin scales, and 44 475 kg and an additional 46 760 individual whole pangolins. This excluded a total of 7.6% of all incidents where no quantitative information was available. A subset of these data (excluding domestic trade) was used to study international trafficking routes. An average of 33 countries and territories were involved in international pangolin trafficking per year. Notably, an average of 27 new trade routes were identified each year, highlighting that wildlife trafficking occurs through a highly mobile trade network with constantly shifting trade routes. The seizure incidents involved 67 countries and territories across six continents; demonstrating the global nature of pangolin trafficking, which is not limited to Asian and African range countries. China and the United States of America (US) were identified as the most common destinations for international pangolin trafficking during the six-year period. China was the main destination for large-quantity shipments of scales (here defined as shipments involving ≥1000 kg of scales) and whole animals (here defined as shipments involving ≥500 pangolins), while the US was the main destination for large-quantity shipments of body parts (here defined as shipments involving ≥100 body parts). Europe was identified as an important transit hub, mostly for African pangolins (and their parts and derivatives) being transported to Asia. Germany, France and Belgium were particularly prominent. An exception was the Netherlands, which was reported as a destination for large-quantity shipments of body parts and scales from China and Uganda respectively, as well as a common destination for shipments from China. However, most international trafficking of pangolins (and their parts and derivatives) occurred within Asia, both in terms of number of incidents and quantity. Of the top ten countries and territories involved in the most trafficking incidents, seven were in Asia, namely China, Viet Nam, Malaysia, Hong Kong SAR, Thailand, Lao PDR, and Indonesia. The remaining three were the US, Nigeria, and Germany. Body parts (including a variety of raw derivatives or processed commodities, such as skins, trophies, leather products, and medicinals) were significantly more likely to be from an Asian pangolin species relative to other commodities in trade and species origins, but the transport mode for body part shipments was largely unreported. The analysis of large-quantity shipments indicated that 80% of the trade in body parts was from China and Viet Nam and destined almost exclusively for the US, with the exception of one case, where the Netherlands was the reported destination. Trafficking of scales was significantly more likely to be of African origin and to be transported by air, relative to other transport modes and origins. Analysis of large-quantity shipments involving scales indicated that 55% of these shipments were of African origin, namely from Cameroon, Nigeria, Sierra Leone, and Uganda. The number of large-quantity shipments of scales, as well as the weight of such shipments, increased significantly through time, as did the number of incidents involving African pangolin species. China was the main destination for the large-quantity shipments of scales, but other destinations for these shipments were Hong Kong SAR, the Netherlands, and Viet Nam. Whole animals were significantly more likely to be transported by land, relative to the other transport modes and commodities, and large-quantity shipments involving whole animals were exclusively traded within Asia. Of these large-quantity shipments, Indonesia and Malaysia were the most common origin countries, although Malaysia was also identified as an important destination and transit country. Other destinations for large-quantity shipments of whole pangolins included China, Singapore, Thailand, and Viet Nam.

Details: Selangor, Malaysia: TRAFFIC. Southeast Asia Regional Office, 2017. 49p.

Source: Internet Resource: Accessed January 25, 2018 at: http://static1.1.sqspcdn.com/static/f/157301/27779360/1513337200303/global-pangolin-assessment.pdf?token=QYTxsEfmbE42wuwYhxwmnr53YkY%3D

Year: 2017

Country: International

Keywords: Illegal Trade

Shelf Number: 148924


Author: Alava, Seraphin

Title: Youth and Violent Extremism on Social Media: Mapping the Research

Summary: Does social media lead vulnerable individuals to resort to violence? Many people believe it does. And they respond with online censorship, surveillance and counter-speech. But what do we really know about the Internet as a cause, and what do we know about the impact of these reactions? All over the world, governments and Internet companies are making decisions on the basis of assumptions about the causes and remedies to violent attacks. The challenge is to have analysis and responses firmly grounded. The need is for a policy that is constructed on the basis of facts and evidence, and not founded on hunches - or driven by panic and fearmongering. It is in this context that UNESCO has commissioned the study titled Youth and Violent Extremism on Social Media - Mapping the Research. This work provides a global mapping of research (mainly during 2012-16) about the assumed roles played by social media in violent radicalization processes, especially when they affect youth and women. The research responds to the belief that the Internet at large is an active vector for violent radicalization that facilitates the proliferation of violent extremist ideologies. Indeed, much research shows that protagonists are indeed heavily spread throughout the Internet. There is a growing body of knowledge about how terrorists use cyberspace. Less clear, however, is the impact of this use, and even more opaque is the extent to which counter measures are helping to promote peaceful alternatives. While Internet may play a facilitating role, it is not established that there is a causative link between it and radicalization towards extremism, violent radicalization, or the commission of actual acts of extremist violence. Section 1 introduces the Report, its objectives and its structure. Thereafter, definitions are discussed in Section 2. Sections 3, 4, and 5. Based on a bibliometric and scientific study of research conducted in Europe, North America, Latin America, the Caribbean, the Arab world, parts of Africa and Asia on the links between the use of social media and the phenomena of radicalization, the Report analyzes more than 550 studies published in scientific literature and "grey literature", covering outputs in English (260), French (196) and Arabic (96). It shows that very little research has focused on the effective role of the use of social media in violent radicalization. Although many articles deal with electronic strategies and the use of the Internet and online social media for recruitment, there are very few empirical studies that describe and examine the real effects of these strategies on youth, and they rarely examine gender aspects. Section 6. The Report examines the specificities of online prevention initiatives: counter/ alternative narratives and media information literacy (MIL). Several formal and informal MIL initiatives have been implemented around the world according to MIL as a pedagogical practice with a specific set of skills that can respond to narratives of anger and revenge. These initiatives also aim at creating digital counter-narratives that reflect youth perceptions of itself and others, especially in terms of countering injustice, experiences of discrimination, corruption and abuse by security forces. Other programs target youth directly, for their own empowerment primarily, on the premise that MIL can positively participate in the marginalization of violent extremism if not its containment. Section 7. The current state of evidence on the link between Internet, social media and violent radicalization is very limited and still inconclusive, and particularly in the field of information and communication sciences as compared to other disciplines (history, sociology, psychology). Most of the reviewed studies remain predominantly descriptive and whenever empirical data is drawn, most studies are of low methodological quality, small-scale and rely on limited data sets. As a result, they fail to provide evidence on the drivers of interest to extremist sites, engagement in social media on these issues, the reasons for influence of content and the external and internal correlated factors, as well as the trajectories of youth who come to perpetrate violent acts. This being said, some evidence also suggests that Internet and social media may play a role in the violent radicalization process, mainly through the dissemination of information and propaganda, as well as the reinforcement, identification and engagement of a (self)-selected audience that is interested in radical and violent messages. Sections 8. In this section, analysis of the effects of social media on the violent radicalization shows that there is a small amount of qualitative data on the subject, in contrast with the literature on the empowerment of young people on the secure use of the Internet. While there is an increase of the the 'grey' literature, the academic field is more under-researched and under-theorized. Moreover, several studies lack important methodological measures such as case studies, small data sets (small-scale corpus, limited data sets, instantaneous analyses). The exact roles and processes through which Internet and social media contribute to the process of radicalization still need to be explored. However, there is insufficient evidence to conclude that there is a causal link between extremist propaganda or recruitment on social networks and the violent radicalization of young people. The synthesis of evidence shows, at its best, that social media is an environment that facilitates violent radicalization, rather than driving it. Section 9. This section offers recommendations that can be useful for various stakeholders. Violent radicalization of youth needs to be taken as a complex process, in which social media are not separated from other communication platforms, and from various offline factors. While reception of online radicalization efforts is still under-researched, the activities and uses of social media by terrorists are well known. Research confirms that many of these uses are meant to foster fear among Internet users in general, in addition to ambitions to recruit or incite individuals to join their cause and engage in violence. Attempts to prevent Internet dimensions of the violent radicalization of youth do not have proven efficacy, but on the other hand it is clear that they can damage online freedoms, especially freedom of expression, freedom of information, privacy and the right to association. More explicitly theorized and evidence-based results are needed concerning both radicalization processes online and the outcomes of online prevention and policy measures.

Details: Paris: UNESCO, 2017. 167p.

Source: Internet Resource: Accessed January 25, 2018 at: http://unesdoc.unesco.org/images/0026/002603/260382e.pdf

Year: 2017

Country: International

Keywords: Extremism

Shelf Number: 148925


Author: Ferguson, Kate

Title: Countering violent extremism through media and communication strategies: A review of the evidence

Summary: This report presents the analysis of a corpus of academic and grey literature relevant to a key challenge facing our society. How can media and communications be used to counter identity-based violence (IBV) or Violent Extremism (VE)? Part I focuses on "Counter-Narratives", looking at the evidence relating to strategic policy communication strategies and counter-propaganda techniques. This reflects literature from policymakers, think-tanks, and civil society initiatives rather than the academic literature base. Key findings include the following: - Current literature and policy concerned with countering propaganda is dominated by the language of 'counter-narratives' but a common understanding of this relatively new lexicon has yet to emerge. - There is little hard evidence that proves interaction with VE content leads to participation in VE activities. - The hypothesis that VE narratives or the real life threat of VE can be countered by an alternative set of communications is an assumption that remains unproven. These findings challenge claims that responding to propaganda strategies by firing back with "counter-narratives" can be effective. Part II looks at "Alternative Approaches" to the use of the media to counter violent extremism, drawing on insights from the "media development" and "media assistance" sectors, and research into whether mass media and new communication interventions can inhibit identity-based violence in certain crisis situations. Key findings include the following: - The theoretical foundations for these alternative approaches are supported by a stronger and more established research base, drawn from the multi-disciplinary fields of development, peace building, and social cohesion. - Media projects have less impact if seen to be linked to a political agenda. - A growing evidence base suggests that radio and television drama addressing issues of identity, reconciliation and tolerance have a positive an impact on public attitudes and behaviour. - Media assistance can ensure that local and domestic media can respond appropriately to VE narratives. - There is an emerging evidence base regarding the potential for rapid reaction media and communication strategies in situations where there is a threat of IBV. These findings suggest that alternative media strategies can help. But the trust and credibility of information providers is crucial. The final section "Reflections" concludes that the research landscape is fragmented and disconnected. but suggests several professional/practitioner sectors and academic disciplines could shed light on potentially effective media and communication CVE strategies. More needs to be done to draw the threads together to learn lessons and to identify and prioritise gaps in our knowledge and understanding.

Details: Cambridge, UK: Partnership for Conflict, Crime and Security Research University of East Anglia, 2016. 42p.

Source: Internet Resource: Accessed January 25, 2018 at: http://www.paccsresearch.org.uk/wp-content/uploads/2016/03/Countering-Violent-Extremism-Through-Media-and-Communication-Strategies-.pdf

Year: 2016

Country: International

Keywords: Extremism

Shelf Number: 148926


Author: Pate, Matthew

Title: Chronic Public Inebriation

Summary: This guide begins by describing the problem of chronic public inebriation and reviewing factors that increase its risks. It then identifies a series of questions to help you analyze your local chronic public inebriation problem. Finally, it reviews responses to the problem and what is known about these from evaluative research and police practice. What This Guide Does and Does Not Cover - The problem of chronic public inebriation takes many forms and has numerous negative social consequences. While chronic inebriation occurs in many different settings, such as the home, workplace, and bars, this guide focuses on chronic inebriation in outdoor public spaces, with a particular emphasis on chronic inebriation among those who spend a good portion of their daily lives on the street. As used in this guide, "chronic inebriation," "chronic inebriate," or "alcoholic" refer to individuals whose lives are dominated by the use or abuse of alcoholic beverages such that they have substantially withdrawn from conventional society. Multiple sources confirm the frequently conjoined issues of mental illness, homelessness, alcoholism and other substance abuse. See Bahr (1973), Finn (1985), Finn and Sullivan (1987), Snow and Anderson (1993), and Wiseman (1979). According to the World Health Organization, a person is alcohol dependent if he or she has three or more of the following six manifestations, occurring together for at least one month or repeatedly within one year: compulsion to drink, lack of control, withdrawal state, tolerance, salience, and persistent use (WHO 1992). The city of San Diego, California, employs a simple measure to classify an individual as a "chronic inebriate." Their criterion is whether the individual in question has been admitted five or more times to the city's sobering center within a 30-day period. Chronic public inebriation is but one aspect of the larger set of problems related to alcohol abuse and street disorder. This guide is limited to addressing the particular harms created by chronic public inebriation.

Details: Washington, DC: U.S. Department of Justice, Office of Community Oriented Policing Services, 2012. 61p.

Source: Internet Resource: Problem-Specific Guides Series Problem-Oriented Guides for Police: Guide No. 68: Accessed January 29, 2018 at: https://ric-zai-inc.com/Publications/cops-p250-pub.pdf

Year: 2012

Country: International

Keywords: Alcohol Related Crime, Disorder

Shelf Number: 130309


Author: Interpol

Title: Motor Vehicle Crime in Global Perspective. Analytical Report

Summary: The existence of transnational organized crime groups active in motor vehicle crime is acknowledged by the majority (89.8%) of member countries that replied to the questionnaire. Another majority of 82% of the member countries that replied to the questionnaire have special units in place that deal with motor vehicle crime or take part in regularly organized operations that focus on motor vehicle crime. There is no accurate standard, model or metric available to measure organized crime. At best, calculated estimates can be made using statistics, economic trade models and known financial flows in combination with seizures, arrests and convictions of perpetrators. Similarly, there are no comparable statistics available on the economic damage caused by Motor Vehicle Crime. Indications and estimations are made using statistics provided by insurance companies that supply vehiclerelated insurance policies. INTERPOL's Stolen Motor Vehicle database, in combination with the automated search facility, is a tool already in place to develop and standardize statistics with regard to transnational motor vehicle crime. Stakeholders that are affected by motor vehicle crime are car manufacturers, the vehicle owner, law enforcement agencies, registration authorities, insurance companies, legislative bodies, justice departments and vehicle related business such as rental companies and scrap yards. Legislation and the enforcement of laws with regard to, for example, vehicle-related insurance, technical status of the vehicle and import/export procedures varies greatly in different countries. This negatively influences international cooperation with regard to transnational motor vehicle crime. Targeted stolen vehicles can be divided into two categories. The majority is readily available and of a common car make and model (quantity). The second category of vehicles (quality) are those that are extra lucrative (Sport Utility Vehicles and luxury cars, for example) that are sometimes targeted especially. A majority of 59% of the member countries that replied to the questionnaire state that some level of violence is used in the theft of a motor vehicle with a wide range of violence levels. The modus operandi with regard to motor vehicle crime in South American countries seem to involve more violence and the use of psychotropic substance compared to other regions. A majority of 87.7% of member countries report that stolen vehicles as a whole or in parts are taken to their bordering countries. At present, there is no in-depth analysis on routes and the flux of routes available. A shared language and ethnicity as well as the homogeneous structure of organized crime groups are important factors to consider in the (facilitated) movement of illicit goods in general, and stolen motor vehicles in particular. Transnational organized Motor Vehicle Crime is often linked to other crime areas such as corruption, terrorism, robbery, trafficking in human beings, drug trafficking and the illicit trade in weapons.

Details: Paris: Interpol, 2014. 28p.

Source: Internet Resource: Accessed January 31, 2018 at: https://www.interpol.int/Crime-areas/Vehicle-crime/Vehicle-crime

Year: 2014

Country: International

Keywords: Automobile Theft

Shelf Number: 148930


Author: Lynch, Erin E.

Title: 'Scripting the Street': Exploring Geographies of Crime in Popular Films

Summary: This study contends that the spaces where crime occurs in films are not neutral; they are layered with maps of meaning that we construct somewhere between the imagined and the lived. Given that popular cultural representations both shape and reflect our understandings of crime and space, a study examining where crime occurs in films was warranted but previously unrealized in the criminological literature. This study addresses this gap in the literature by considering how geographies of crime are characterized in a sample of ten recent popular crime films. Applying a qualitative content analysis approach, this study foregrounds the onscreen spaces where crimes occur in an attempt to expose and denaturalize the meanings around crime that are embedded in these backgrounds. Particular regard is given here to the twinning of crime and urbanity, the aesthetics of insecurity, and the gendering of geographies of crime. This study reveals the continued depiction of the city as both locus and location for crime. However, this research also shows how these films play against geographic type, subverting the imagery of "safe havens" - such as broad daylight, overt security measures, and idealized domesticity– to disorient the viewer and signal the sprawl of insecurity into everyday life. While this sprawling insecurity allows for the emergence of the man-of-action hero, women in these films are generally reduced to the background, serving as embodiments of the threatened domestic and as sexual scenery. Building off this backgrounding of women, this study forwards the concept of the body as a distinct geography of crime. These findings point to the value of investigating the "reel" geographies of crime and suggest that further research in this area is needed.

Details: Ottawa: University of Ottawa, Department of Criminology, 2013. 150p.

Source: Internet Resource: Thesis: Accessed January 31, 2018 at: https://ruor.uottawa.ca/bitstream/10393/26275/1/Lynch_Erin_2013_thesis.pdf

Year: 2013

Country: International

Keywords: Crime and Place

Shelf Number: 148938


Author: Allen, Rob

Title: Roadmap for the Development of Prison-based Rehabilitation Programmes

Summary: While many view a prison sentence as the locking up of an offender, true justice cannot be confined to punishment. Rather, it extends to rehabilitating offenders, reducing future risks of crime, and building a peaceful and more inclusive society. It is for this reason that international standards stipulate that imprisonment should not be limited to the deprivation of liberty. Rather, it should include opportunities for prisoners to obtain the knowledge and skills that can assist them in their successful reintegration upon release, with a view to avoiding future offending. The United Nations Standard Minimum Rules for the Treatment of Prisoners (the Nelson Mandela Rules) call for the provision of rehabilitation programmes in prisons that foster the willingness and ability of prisoners to lead law-abiding and self-supporting lives upon release. But how can this be achieved? As the guardian of the Nelson Mandela Rules, UNODC has published a new handbook to provide a series of practical steps for prison administrators in order to assist them in developing high-quality and sustainable rehabilitation programmes that meet international standards and norms. UNODC's new manual - The Roadmap for the Development of Prison-based Rehabilitation Programmes - lists four main reasons for prison systems to invest in education, training and work programmes for prisoners: First, giving prisoners opportunities to learn new skills and to build work experience will help them to stay away from crime when they leave prison, thus contributing to public safety; Second, the provision of constructive activities in prisons assists in rendering life in prison more similar to life outside - referred as the principle of "normalization", which is important to facilitate a prisoners' social reintegration into the community upon release; Third, education, vocational training and work programmes in prisons support order, safety and security in prison facilities, as prisoners involved in constructive activities are less likely to engage in disruptive behaviour; and Lastly, remuneration schemes related to work programmes enable prisoners to support themselves and their families, while equally producing revenues for prison administrations to maintain such programmes and to support the improvement of prison conditions. Most importantly, the handbook includes evidence from empirical studies showing the effectiveness of such programmes. A recent large-scale study conducted in the US confirmed a clear linkage between the provision of education programmes and vocational training in prisons on the one hand, and the reduction of recidivism and improvement of future job prospects on the other. Prisoners who participate in correctional educational programmes had a 43 per cent lower odds of returning to prison than those who did not; their employment after release was 13 per cent higher; and they were 28 per cent more likely to be employed after release from prison than those who did not receive such training. Yet, in many prison systems, most prisoners still do not have the opportunity to learn or work. Even in many high-income countries, prison systems struggle with providing education, vocational training and work on a scale that would be required to benefit the prison population at large. Among the 640,000 person prison population in the EU, there is a significant proportion of low-skilled individuals, and less than a quarter of prisoners participate in education and training in most EU countries. In lower income countries, the extent of prisoners' involvement in constructive activities is often much smaller. There is, however, a growing recognition of the importance of rehabilitation programmes in prisons and strong political will to enhance such programmes across the globe. When Member States, policy-makers and experts gathered at the 13th United Nations Congress on Crime Prevention and Criminal Justice in Doha, Qatar in 2015, discussions were held about the most important priorities for action over the following five years. The Doha Declaration resulting from the Crime Congress reaffirmed the commitment of Member States to implement and enhance policies for prisoners that focus on education, work, medical care, rehabilitation, social reintegration and the prevention of recidivism.

Details: Vienna: United Nations Office on Drugs and Crime, 2017. 76p.

Source: Internet Resource: Criminal Justice Handbook Series: Accessed January 31, 2018 at: https://www.unodc.org/documents/justice-and-prison-reform/17-05452_ebook.pdf

Year: 2017

Country: International

Keywords: Correctional Administration

Shelf Number: 148942


Author: Contreras-Hermosilla, Arnoldo

Title: Law Compliance in the Forestry Sector: An Overview

Summary: The problem of illegal logging and forest crimes is global and serious. Reliable statistics are scarce, but as much as 15 percent of global timber trade is estimated to involve illegalities and corrupt practices. Illegal logging in public lands worldwide is estimated to cause annual losses in assets and revenue in excess of US$10 billion. In addition to the loss of revenue to governments and inefficiency of resource use, illegal logging directly threatens ecosystems and biodiversity in protected areas and parks across the world. This paper looks at available evidence on the magnitude and impacts of illegal logging, the vulnerabilities of the forest sector, and proposes a strategy for combating forest crime. This strategy involves: (i) an assessment of the governance situation of the country, (ii) streamlining the forest policy framework, and (iii) focusing operational activities for forest law enforcement around a prevention, detection and suppression framework.

Details: Washington, DC: World Bank, 2002. 47p.

Source: Internet Resource: Working Paper: Accessed January 31, 2018 at: http://documents.worldbank.org/curated/en/232581468763471728/pdf/286170Law0Forestry0WBI0WP.pdf

Year: 2002

Country: International

Keywords: Forests

Shelf Number: 148948


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Handbook on Children Recruited and Exploited by Terrorist and Violent Extremist Groups: The Role of the Justice System

Summary: In the past few years, the international community has been increasingly confronted with the recruitment and exploitation of children by terrorist and violent extremist groups. Numerous reports have shed some light on the extent of this disturbing phenomenon. Estimates indicate that, since 2009, about 8,000 children have been recruited and used by Boko Haram in Nigeria. According to a report of the United Nations High Commissioner for Human Rights, some boys have been forced to attack their own families to demonstrate loyalty to Boko Haram, while girls have been forced to marry, clean, cook and carry equipment and weapons. The Office of the United Nations High Commissioner for Human Rights received consistent reports that some boys and girls were increasingly being used as human shields and to detonate bombs. In May 2015, for example, a girl about 12 years old was used to detonate a bomb at a bus station in Damaturu, Yobe State, killing seven people. Similar incidents were reported in Cameroon and the Niger. During attacks by Boko Haram, abducted boys were used to identify those who refused to join the group, as well as unmarried women and girls. In 2015 alone, the United Nations verified 274 cases of children having been recruited by Islamic State in Iraq and the Levant (ISIL) in the Syrian Arab Republic. The United Nations verified the existence of centres in rural Aleppo, Dayr al-Zawr and rural Raqqah that provided military training to at least 124 boys between 10 and 15 years of age. Verification of the use of children as foreign fighters has increased significantly, with 18 cases involving children as young as 7 years of age. The use of children as child executioners was reported and appeared in video footage. In Iraq, in two incidents in June and September 2015, more than 1,000 children were reportedly abducted by ISIL from Mosul district. While the lack of access to areas in conflict undercuts the possibility to gather precise data, it is known that recruited children were used to act as spies and scouts, to transport military supplies and equipment, to conduct patrols, to man checkpoints, to videotape attacks for propaganda purposes and to plant explosive devices, as well as to actively engage in attacks or combat situations. These figures are likely to be significant underestimates because of the limited opportunities to gain access and monitor violations against children. Child recruitment is also perpetrated by Al-Shabaab in Kenya and Somalia,5 by the Movement for Unity and Jihad in West Africa, Ansar Eddine and Al-Qaida in the Islamic Maghreb in Mali and neighbouring countries and by the Abu Sayyaf Group in the Philippines, to name a few. Owing to the expanding reach and propaganda of terrorist and violent extremist groups, child recruitment and exploitation are in no way limited to conflict-ridden areas. More and more children are travelling from their State of residence to areas controlled by terrorist and violent extremist groups, in order to join them. They may travel with their families or by themselves, and obtaining comprehensive data on their participation in hostilities is often difficult. In the case of ISIL, for instance, information often becomes available only after the children's death, when they are eulogized as martyrs and their country of origin is revealed. Data collected for more than one year, during the period 2015-2016, concerned 89 children who died in hostilities. They included not only nationals of Iraq and the Syrian Arab Republic, but also nationals of Australia, France, Lebanon, Libya, Morocco, Nigeria, Saudi Arabia, the Sudan, Tajikistan, Tunisia, the United Kingdom of Great Britain and Northern Ireland, and Yemen. These figures do not include children taken to ISIL territory by their families. Finally, children may also be recruited to support the groups, or even carry out attacks, in countries that are not experiencing armed conflict.

Details: Vienna: UNODC, 2017. 160p.

Source: Internet Resource: Accessed February 1, 2018 at: https://www.unodc.org/documents/justice-and-prison-reform/Child-Victims/Handbook_on_Children_Recruited_and_Exploited_by_Terrorist_and_Violent_Extremist_Groups_the_Role_of_the_Justice_System.E.pdf

Year: 2017

Country: International

Keywords: Child Exploitation

Shelf Number: 148961


Author: Economist Intelligence Unit

Title: Safe Cities Index 2017: Security in a rapidly urbanising world

Summary: In many respects it's the very success of cities, in their role as global social and economic hubs, that makes them more vulnerable. As rural residents head for the city in developing countries-which for purposes here we define as non-OECD countries, with the exception of Singapore-and wealthy global capitals draw in international talent, vast demographic shifts are creating cities with previously unimagined population sizes. In 2016, there were 31 megacities-cities with more than 10m inhabitants. This is projected to rise to 41 by 2030. And size matters. While cities generate economic activity, the security challenges they face expand and intensify as their populations rise. These include growing pressure on housing supply (prompting the spread of slums) and services such as healthcare, transport, and water and power infrastructure. Man-made risks are also growing. As tragic recent events in European cities such as London, Paris and Barcelona have demonstrated, high profile, wealthy urban centres are becoming targets for terrorist activities. And as income divides widen, growing inequalities can create tensions that contribute to violent outbursts such as the 2011 London riots. Meanwhile, another major shift has come to the fore: the rapid deployment of digital technologies in pursuit of the so-called "smart city". The technologies no doubt bring benefits. As part of Internet of Things (IoT) technologies, sensors collect and wirelessly transmit data from physical objects, delivering new insights into city operations and permitting remote and more efficient management of infrastructure and services. Connecting apartments and office buildings to the electricity grid via smart meters, for example, delivers energy efficiency and cost savings. And with the spread of closed-circuit televisions (CCTVs) and webcams around cities, technologies such as artificial intelligence and data analytics can greatly enhance the capabilities of law enforcement agencies to combat urban crime and terrorism. Yet the rush to embrace smart city technologies also creates vulnerabilities if investments in digital technologies are not accompanied by commensurate investments in cyber security. Wealthy cities are making investments, albeit to varying degrees, but security often comes lower on the list of spending priorities for cities with already stretched finances. The consequences of neglecting cyber security could be dire. For example, if hackers were to shut down the power supply, an entire city would be left in chaos. This prospect is something city officials now need to plan against. Cities are also defined by the complex, interlinked nature of their systems and infrastructure. This complexity has a bearing on safety. For example, experts are uncovering links between the quality of housing and the health of citizens. And while terrorist attacks are what make headlines, traffic accidents are a greater day-to-day danger for urban residents. Natural forces are also coming in to play as climate change poses new risks to cities, with extreme weather events becoming an even greater threat, as illustrated by the devastation Hurricane Harvey just delivered to Houston, Texas. The 2017 Safe Cities Index retains the four categories of security from the 2015 version- digital, health, infrastructure and physical. However, we have added six new indicators and expanded the index to cover 60 cities, up from 50 in 2015.

Details: London: The Economist, 2017. 44p.

Source: Internet Resource: Accessed February 2, 2018 at: https://dkf1ato8y5dsg.cloudfront.net/uploads/5/82/safe-cities-index-eng-web.pdf

Year: 2017

Country: International

Keywords: Cities

Shelf Number: 148969


Author: Wodon, Quentin

Title: Ending Child Marriage: Child Marriage Laws and their Limitations

Summary: Child marriage is defined as a formal or informal union before the age of 18. The practice affects mostly girls. While child marriage is especially prevalent in low and lower-middle income countries, it is also observed in other countries. It endangers the life trajectories of girls in multiple ways. Child brides are at greater risk of experiencing a range of poor health outcomes, having children at younger ages when they are not yet ready to do so, dropping out of school, earning less over their lifetimes and living in poverty compared to their peers who marry at later ages. Child brides may also be more likely to experience intimate partner violence, have restricted physical mobility, and limited decisionmaking ability. Most fundamentally, child brides may be disempowered in ways that deprive them of their basic rights to health, education and safety. These dynamics affect not only the girls themselves, but also their children and households, as well as communities and entire societies. Child marriage is widely considered as a violation of human rights and a form of violence against girls. The elimination of child marriage by 2030 is a target under the Sustainable Development Goals (SDGs). Yet investments to end the practice are limited, and worldwide the incidence of child marriage has been declining too slowly over time to achieve the SDG target. Furthermore, in many countries, it remains legal to marry a girl before she turns 18, and even in countries where marriage before 18 is in principle illegal, too many girls continue to marry early. This brief summarizes findings from research undertaken by Save the Children and the World Bank on the lack of legal protection against child marriage for girls and marriages that take place below the national minimum age of marriage . The analysis suggests that many countries still do not effectively legally protect girls against child marriage, but also that legal reforms are not sufficient to end the practice as many girls marry illegally in countries where legal protections are in place. While protecting girls in the law against child marriage is an important first step, additional interventions are needed to prevent child marriage.

Details: Washington, DC: World Bank, 2017. 12p.

Source: Internet Resource: accessed February 2, 2018 at: http://wbl.worldbank.org/~/media/WBG/WBL/Documents/Reports/2017/WBL2017_Child_Marriage_Laws.pdf

Year: 2017

Country: International

Keywords: Child Marriage

Shelf Number: 148971


Author: Interpol

Title: Operation Opson VI: Targeting Counterfeit and Substandard Foodstuff and Beverage: December 2016 - March 2017

Summary: KEY ELEMENTS  65 countries and 20 private partners, from 22 EU Member States (MS) and 43 non-EU countries, participated in Operation OPSON VI. This represents the largest number of participating countries, especially for non EU countries, since the beginning of OPSON in 2011. 57 countries took part in OPSON V.  In total, 13,407.60 tonnes, 26,336,305.3 litres and 11,118,832 units of either counterfeit or substandard food and beverages have been seized during the four month operational phase of OPSON VI. The total value of these illicit goods amounts to 235,681,849.87 EUR.  Participating countries reported more than 50,128 inspections and checks, and 13,711 persons arrested or investigated. They opened 6,282 administrative and criminal cases. Investigations started in the framework of OPSON VI led to the dismantling of seven organised crime groups, reported as such by the countries and involved in the production of illegal food, other goods smuggling and other criminal activities.  In terms of product range, the levels of seizure within OPSON VI differ significantly compared with OPSON V. The highest quantity of seized products is alcohol whereas the first category of seized products in OPSON V was condiments (e.g. vegetable oil, spices, and sauces). Enforcement actions during OPSON VI led to the closure of at least 183 illegal alcohol factories and to the seizures of production materials, ranging from special bottling machines to counterfeit excise stamps, caps, labels or bottle security rings. The second category of seized goods is meat with almost 5,146 tonnes removed from the markets.  The reported infringements are, in most cases, related to deceiving consumers (27%, of which 1% are IPR violations), food safety (22%) and fiscal infringements (19%).  Besides the seizures of food and beverages, the participating countries reported important seizures of tobacco, coca leaves (in Peru), pharmaceuticals and cannabis (in Djibouti) which were discovered in the course of OPSON VI.  The debriefing meeting was hosted by the Irish authorities in Dublin on 2 - 3 October 2017.

Details: The Hague: INTERPOL, 2017. 52p.

Source: Internet Resource: Accessed February 2, 2018 at: https://www.europol.europa.eu/publications-documents/operation-opson-vi-targeting-counterfeit-and-substandard-foodstuff-and-beverage

Year: 2017

Country: International

Keywords: Consumer Protection

Shelf Number: 148974


Author: Economist Intelligence Unit

Title: Safe Cities Index 2015: Assessing urban security in the digital age

Summary: Cities are already home to a majority of people on the planet. The current level of urbanisation ranges from 82% of the population in North America to 40% in Africa. But all regions are expected to follow this trend towards greater urbanisation over the next three decades. Lagos, the most populous city Nigeria, is predicted to double in size in the next 15 years. However, cities should not take continued population growth for granted. As the UN's latest World Urbanisation Prospects study points out, some cities have experienced population decline because of, among other things, low fertility rates, economic contraction and natural disasters. The population of Seoul, the capital of South Korea, has shrunk by 800,000 since 1990. Likewise, the safety of cities can ebb and flow. New York recorded a record high of 2,245 homicides in 1990, equating to six murders per day. Since then the population has grown by over 1m people, while homicide rates have fallen. The murder rate in 2013 stood at 335, a historic low, moving New York below Chicago-a city with under one-third of New York's population. As some threats recede, others mature. The frequency of terrorism and natural disasters has changed the nature of urban safety: power, communications and transport systems must be robust and able to withstand new external shocks. Meanwhile, new risks emerge. Cyber risk has accompanied the advent of the digital age. Urban safety is therefore a critical issue that is set to become even more important over time. Securing public safety means addressing a wide-and evolving-range of risks. The Safe Cities Index aims to capture this complexity. The Index tracks the relative safety of a city across four categories: digital security, health security, infrastructure safety and personal safety. The Index's key findings include the following. l Tokyo tops the overall ranking. The world's most populous city is also the safest in the Index. The Japanese capital performs most strongly in the digital security category, three points ahead of Singapore in second place. Meanwhile, Jakarta is at the bottom of the list of 50 cities in the Index. The Indonesian capital only rises out of the bottom five places in the health security category (44). l Safety is closely linked to wealth and economic development. Unsurprisingly, a division emerges in the Index between cities in developed markets, which tend to fall into the top half of the overall list, and cities in developing markets, which appear in the bottom half. Significant gaps in safety exist along these lines within regions. Rich Asian cities (Tokyo, Singapore and Osaka) occupy the top three positions in the Index, while poorer neighbours (Ho Chi Minh City and Jakarta) fill two of the bottom three positions. l However, wealth and ample resources are no guarantee of urban safety. Four of the five Middle Eastern cities in the Index are considered high-income, but only one makes it into the top half of the Index: at 25 Abu Dhabi is 21 places above Riyadh at number 46. Similar divides between cities of comparable economic status exist elsewhere. Seoul is 23 positions below Tokyo in the overall ranking (and 46 places separate the two on digital security). l US cities perform most strongly in the digital security category, while Europe struggles. New York is the only US city to make it into the top ten of the overall index (at 10). However, it is third for digital security, with three of the four other US cities in the Index (Los Angeles, San Francisco and Chicago) joining it in the top ten. Meanwhile, European cities perform relatively poorly. London, at 16, is the highest-ranking European entry in the digital security index; Rome is the lowest, at 35. l Leaders in digital security must not overlook real-world risks. Los Angeles falls from 6th place in digital security to 23rd for personal safety. San Francisco suffers a similar drop, falling from 8th to 21st. For these cities-both home to high-tech industries-a focus on technology and cyber security does not seem to be matched by success in combating physical crime. Urban safety initiatives need to straddle the digital and physical realms as the divide between them blurs. l Technology is now on the frontline of urban safety, alongside people. Data are being used to tackle crime, monitor infrastructure and limit the spread of disease. As some cities pursue smarter methods of preventing- rather than simply reacting to-these diverse security threats, a lack of data in emerging markets could exacerbate the urban safety divide between rich and poor. Nonetheless, investment in traditional safety methods, such as bolstering police visibility, continues to deliver positive results from Spain to South Africa. l Collaboration on safety is critical in a complex urban environment. Now that a growing number of essential systems are interconnected, city experts stress the need to bring together representatives from government, business and the community before threats to safety and security strike. Some cities have appointed an official to co-ordinate this citywide resilience. With the evolution of online threats transcending geographical boundaries, such co-ordination will increasingly be called for between cities. l Being statistically safe is not the same as feeling safe. Out of the 50 cities, only Zurich and Mexico City get the same rank in the overall index as they do in the indicator that measures the perception of safety among their citizens. Urban citizens in the US, for instance, tend to feel less safe than they should, based on their city's position in the Index. The challenge for city leaders is to translate progress on safety into changing public perceptions. But cities also aspire to be attractive places to live in. So smart solutions, such as intelligent lighting, should be pursued over ubiquitous cameras or gated communities.

Details: London: The Economist, 2015. 42p.

Source: Internet Resource: Accessed February 5, 2018 at: https://dkf1ato8y5dsg.cloudfront.net/uploads/5/82/eiu-safe-cities-index-2015-white-paper-1.pdf

Year: 2015

Country: International

Keywords: Cities

Shelf Number: 148988


Author: Parsons, Chelsea

Title: Beyond Our Borders: How Weak U.S. Gun Laws Contribute to Violent Crime Abroad

Summary: From the earliest days of his presidential campaign, a constant refrain from Donald Trump has been the need to protect the United States from foreign threats, particularly violent crime that he falsely asserts is committed at high rates by immigrants to this country. The Trump administration's protectionist, isolationist, nativist, and racist immigration policy is founded on the scurrilous notion that the United States needs to close the borders and restrict immigration to the country as a way to protect against the entry of violent crime. However, often overlooked in this debate is the degree to which exportation of violence goes in the other direction-that is to say, from the United States to other countries-and, in particular, the substantial U.S. role in providing guns that are used in lethal violence in other nations. From 2014 to 2016, across 15 countries in North America, Central America, and the Caribbean, 50,133 guns that originated in the United States were recovered as part of criminal investigations. Put another way, during this span, U.S.-sourced guns were used to commit crimes in nearby countries approximately once every 31 minutes. Certainly, many of these U.S.-sourced crime guns were legally exported and were not diverted for criminal use until they crossed the border. The United States is a major manufacturer and a leading exporter of firearms, legally exporting an average of 298,000 guns each year. However, many of the same gaps and weaknesses in U.S. gun laws that contribute to illegal gun trafficking domestically likewise contribute to the illegal trafficking of guns from the United States to nearby nations. This report discusses the scope of the problem of U.S. guns being trafficked abroad and used in the commission of violent crimes in other nations. For example, in 2015, a trafficking ring bought more than 100 guns via straw purchases in the Rio Grande Valley of the United States and smuggled them to Mexico. At least 14 of these firearms were recovered in Mexico. In addition, this report identifies a number of policy solutions that would help to reduce the flow of crime guns abroad and begin to minimize the U.S. role in arming lethal violence in nearby countries. These recommendations include: Instituting universal background checks for gun purchases; Making gun trafficking and straw purchasing federal crimes; Requiring the reporting of multiple sales of long guns; Increasing access to international gun trafficking data; Rejecting efforts that weaken firearm export oversight. The United States has a moral obligation to mitigate its role in arming lethal violence abroad. While there are many factors unique to each nation that affect rates of violent crime, there is more the United States could do to reduce the risks posed by U.S.-sourced guns that cross the border and are used in crime in nearby countries.

Details: Washington, DC: Center for American Progress, 2018. 24p.

Source: Internet Resource: Accessed February 6, 2018 at: https://cdn.americanprogress.org/content/uploads/2018/01/31115010/012918_BeyondOurBorders-report-51.pdf

Year: 2018

Country: International

Keywords: Gun Control

Shelf Number: 148995


Author: Longchamp, Olivier

Title: Trading in corruption: Evidence and mitigation measures for corruption in the trading of oil and minerals

Summary: Between 2011 and 2013, sales of government oil from the ten biggest producers in sub-Saharan Africa accounted for 56% of these countries' total public revenues. Despite their importance, however, such sales have received little political or academic attention until recently. Corruption risks associated with this phase of the commodity value chain are high due to the volumes of the financial transactions, the high degree of interaction with public authorities, the opacity of both the sales themselves and the actors involved, and a lack of regulation. Several case examples show that these risks are not merely theoretical. We summarise the state of research on this subject, paying special attention to buyers, whose responsibilities have been little discussed. We offer a typology of corruption risks in first sale trades of oil and minerals, and analyse existing measures to tackle them.

Details: Bergen: Chr. Michelsen Institute, U4 Anti-Corruption Research Centre, 2017. 52p.

Source: Internet Resource: U4 Issue No. 6: Accessed February 6, 2018 at: https://www.publiceye.ch/fileadmin/files/documents/Rohstoffe/U4-Issue-2017-06-v4-full.pdf

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 149000


Author: Kroll

Title: Global Fraud & Risk Report: Forging New Paths in Times of Uncertainty. 10th Annual Edition

Summary: Businesses saw a significant rise in fraud and risk incidents during 2016. Although companies have taken significant strides toward building resiliency, more is needed. We have expanded the scope of this year's Report - it's now the annual Kroll Fraud & Risk Report, breaking out specific cyber and security threats to better reflect the growing challenges that our clients are facing around the world. The 2017/2018 Kroll Global Fraud & Risk Report, based on a survey commissioned by Kroll and carried out by Forrester Consulting, shares the experiences of executives worldwide. As in prior years, the Kroll Report includes detailed analyses for fraud-, cyber-, and security-related incidents by major industries and by regions We believe you will find the knowledge and insight contained in this year's Kroll Report to be valuable in your organization's efforts to anticipate, detect, mitigate, and respond to current and emerging risks. Key survey findings include: All-time high incidence levels. Businesses reported all-time high levels of fraud (84%), cyber (86%), and security (70%) incidents. Information increasingly targeted. For the first time in the Kroll Report's 10-year history, information theft, loss, or attack was the most prevalent type of fraud experienced (29%). Greater concerns over potential risk exposure. More than ever, executives say their companies are vulnerable to fraud, cyber, and security risks.

Details: Kroll, 2018. 47p.

Source: Internet Resource: accessed February 6, 2018 at: http://www.hippogriff.tech/docs/Kroll%20Global%20Fraud%20Risk%20Report%202017-18.pdf

Year: 2018

Country: International

Keywords: Crimes Against Business

Shelf Number: 149011


Author: Eisner, Manuel

Title: How to Reduce Homicide by 50% in the Next 30 Years

Summary: Is it possible to cut worldwide levels of interpersonal violence in half within the coming 30 years? This question was at the centre of the first Global Violence Reduction Conference 2014, jointly organised by the Violence Research Centre at the University of Cambridge and the World Health Organization. The conference lured experts out of their comfort zone, asking to reflect on big strategies to reduce violence by 50% in the next 30 years. It brought together 150 leading representatives from international organisations, academia, civil society institutions and philanthropic organisations to discuss how scientific knowledge can contribute to the advancement of this violence reduction goal. The main message of the conference was that a global violence reduction by 50% in the next 30 years is achievable if policy makers harness the power of scientific evidence on violence reduction. This report outlines important ideas presented at the conference that could help to reach this goal and groups them into six key policy recommendations: 1. TACKLE THE BIGGEST PROBLEM AREAS FIRST: FOCUS ON LOW- AND MIDDLE-INCOME COUNTRIES, HOT SPOTS AND TOP VIOLENT CITIES 2. STOP THE REINVENTION OF THE WHEEL: DISSEMINATE, ADAPT AND REPLICATE BEST PRACTICES GLOBALLY 3. HARNESS THE POWER OF BIG DATA IN VIOLENCE REDUCTION: DEVELOP DATA SCOPE, ACCESS AND STANDARDS 4. PROTECT THE MOST VULNERABLE: FOCUS ON CHILDREN, YOUTH AND WOMEN 5. INSTITUTIONAL CONTEXT MATTERS: IMPROVE LEADERSHIP, GOVERNANCE AND POLICIES FOR VIOLENCE PREVENTION 6. THE WHOLE IS BIGGER THAN THE SUM OF ITS PARTS: CREATE GLOBAL STRATEGIC ALLIANCES TO PREVENT VIOLENCE

Details: Rio de Janeiro: Igarape Institute, 2015. 25p.

Source: Internet Resource: Homicide Dispatch 1: Accessed February 7, 2018 at: https://docs.google.com/viewer?url=https://igarape.org.br/wp-content/uploads/2015/07/Homicide-Dispatch_1_EN.pdf

Year: 2015

Country: International

Keywords: Homicides

Shelf Number: 149021


Author: Bronsther, Jacob

Title: Two Theories of Deterrent Punishment

Summary: This Article assumes that state punishment, to be worth the cost of its administration, must deter crime to some sufficient degree. But it also assumes a moral principle: We must not sacrifice individuals as a means of mitigating harms or threats for which they have no responsibility. How can we hold both assumptions and justify state punishment? For deterrent punishment seems to violate the principle, as the state inflicts suffering upon an offender as a prudential warning to would-be offenders, for whom he has no responsibility. Existing theories of criminal justice have been unable to resolve this problem. In searching for a solution, this Article conceives of the criminal law as a system of protections, which all citizens rely upon for their assured liberty. The effectiveness of these protections depends, ultimately, on the self-application of criminal legal norms by people within the jurisdiction. Can we rely upon the legal protection against car theft? It depends on how much intent there is within the jurisdiction to steal cars. This Article argues that an offender's settled commitment to violate a criminal law - in combination with the criminal commitments of other offenders - creates the present "criminality" within a jurisdiction. Criminality diminishes the reliability of the criminal law as a guide to the incursions of other people. It chills the exercise of our rights, forces us to take expensive precautions, and/or subjects us to unreasonable risks of harm. Deterrent punishment, which aims to decrease the amount of criminality in society, is thereby permissible in two possible ways. It involves forcing an offender either (a) to repair the damage caused by his past criminality contributions or (b) to mitigate the ongoing threat of criminality, for which he has partial responsibility. Neither option involves "sacrificing" offenders to scare off people with whom they have no relationship. This conception of the criminal wrong, as a wrong against the wider society in the form of a contribution to criminality, reduces the role of the victim in the criminal process. This Article considers, however, the possibility of state liability as a co-defendant for the civil damages of crime victims.

Details: London: London School of Economics & Political Science (LSE) - Department of Law, 2017. 43p.

Source: Internet Resource: Accessed February 8, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3029564

Year: 2017

Country: International

Keywords: Criminal Law

Shelf Number: 149027


Author: Verizon

Title: 2017 Data Breach Investigations Report

Summary: The 2017 DBIR reveals what's really happening in cyber security. This year's report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. That means you get a detailed insight into the cyber security threats you face. Read the report and discover: The biggest cyber security threats in your sector and what you can do to mitigate them. Who's behind the attacks and how they're getting in. What motivates the cybercriminals. How nine incident patterns can help you predict what the cybercriminals will do next. No system is 100% secure. But understanding the threats you face will help you improve your security. Cybercriminals are using all the information they can get hold of to up their game - you should too.

Details: Verizon, 2017. 76p.

Source: Internet Resource: Accessed February 9, 2018 at: https://www.ictsecuritymagazine.com/wp-content/uploads/2017-Data-Breach-Investigations-Report.pdf

Year: 2017

Country: International

Keywords: Cyber Security

Shelf Number: 149077


Author: Broadhurst, Roderic

Title: Cyber Terrorism: Research Review. Research Report of the Australian National University Cybercrime Observatory for the Korean Institute of Criminology

Summary: This review of cyber-terrorism outlines the main trends and challenges presented by the convergence of the exceptional reach, speed and scale of the Internet and the political ambitions of violent extremists. Chapters on cyber weapons, critical infrastructure, attribution, Internet of Things, recruitment and propaganda, financing, legislation and counter measures, and cyberwar. Each chapter provides a brief summary of a key aspect of the cyber terror phenomenon, an analysis of emerging trends or perspectives, and other relevant information or examples identified during the research. At the end of each chapter a brief annotated bibliography is included to assist future research and give readers more information about the sources used. The report has drawn on a broad range of sources including government documents (e.g. law enforcement and security agencies), web/blog posts, academic articles, information security websites and online news articles about cyber terrorism. The final chapter concludes with a discussion on the likelihood of a cyber terrorist attack. At present a sophisticated large-scale cyber terrorist attack with a kinetic element appears to be unlikely. However, this may change in the next five years because of the increasing capacity of many nation states (including proxy actors) to undertake offensive measures in the cyber domain. Moreover, one notes the increasing risk that sophisticated weaponised software may enter the 'wild' and into the criminal underworld, and potentially into the hands of capable violent extremists. A serious cyber terrorist kinetic event (for example, the interruption of power supply or transport services with death or injury as one of the outcomes) is therefore currently unlikely, but high volume/low value or impact events are on the rise (e.g. the routine use of ransomware to finance a terrorist group, the distribution of deceptive or 'fake' news, and the mounting of distributed denial of service [DDoS] attacks to undermine confidence in e-commerce). The risk of a cyber terrorism attack should therefore not be understated as an emerging threat, and consequently, preventative and response capabilities should be maintained and advanced. Contemporary society, in short, is coming to realise that violent extremism, albeit relatively rare, is the 'new normal'. Though it may be difficult to predict each specific event, we can be reasonably certain that at some future point, they will occur.

Details: Canberra: Australian National University, 2017. 129p.

Source: Internet Resource: Accessed February 9, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2984101

Year: 2017

Country: International

Keywords: Critical Infrastructure

Shelf Number: 149086


Author: World Health Organization

Title: Global Plan of Action to strengthen the role of the health system within a national multisectoral response to address interpersonal violence, in particular against women and girls, and against children

Summary: In May 2014, the Sixty-seventh World Health Assembly adopted resolution WHA67.15 on "Strengthening the role of the health system in addressing violence, in particular against women and girls, and against children". It requests the Director-General "to develop, with the full participation of Member States, and in consultation with United Nations organizations, and other relevant stakeholders focusing on the role of the health system, as appropriate, a draft global plan of action to strengthen the role of the health system within a national multisectoral response to address interpersonal violence, in particular against women and girls, and against children, building on existing relevant WHO work". The scope of the global plan of action is guided by resolution WHA67.15. The plan focuses on violence against women and girls, and against children, while also addressing common actions relevant to all types of interpersonal violence. It also addresses interpersonal violence against women and girls, and against children, in situations of humanitarian emergencies and post-conflict settings, recognizing that such violence is exacerbated in these settings.

Details: Geneva, SWIT: WHO, 2016. 76p.

Source: Internet Resource: Accessed February 12, 2018 at: http://apps.who.int/iris/bitstream/10665/252276/1/9789241511537-eng.pdf?ua=1

Year: 2016

Country: International

Keywords: Battered Women

Shelf Number: 149088


Author: Gavrielides, Theo

Title: Youth Radicalisation, Restorative Justice and the Good Lives Model: Comparative learnings from seven countries

Summary: The Youth Empowerment and Innovation Project (YEIP) is a 3-year Erasmus+ funded programme that aims to design a youth-led, positive policy prevention framework for tackling and preventing the marginalisation and violent radicalisation among young people in Europe. The project started in March 2017. Led by young people and coordinated by Dr. Theo Gavrielides (Founder and Director of The IARS International Institute), YEIP is delivered in partnership with 18 partners from seven EU countries to construct and test innovative, policy intervention models founded on the principles of restorative justice, positive psychology and the Good Lives Model (GLM). YEIP is implemented through the construction and field validation of tools (YEIP PREVENT model/ interventions, toolkit, training) in 4 environments (schools, universities, prisons, online) in the 7 participating EU member states of Greece, Cyprus, the UK, Sweden, Portugal, Italy and Romania. YEIP was created in response to a current social need to have more effective youth policies that can enhance young people’s social inclusion and minimize the risk of radicalization with greater 'buy in' from youth themselves. The YEIP innovative policy intervention will generate a set of actions that will help address this need at the local, national and European levels. This measure is founded upon restorative justice and the Good Lives Model (GLM), which assumes that we are goal-influenced and all seek certain 'goods' in our lives, not 'material', but qualitative, all likely to increase or improve our psychological well-being (Ward, Mann and Gannon 2007). This approach is aligned with the underlying philosophy of 2014 EC report on youth workers, which asks for a more coordinated effort in supporting young people with fewer opportunities by tapping into their talents and not by further marginalising them. YEIP aims to lay the foundations for systemic change at the national level and EU levels. The ultimate objective is for the project to help implement the EU Youth Strategy's objective of preventing the factors that can lead to young people's social exclusion and radicalisation. The project is also in line with the EU's Counter-Terrorism Strategy of 2005 (revised in 2008 and 2014). The success of this youth-led project will demonstrate to European citizens the leadership and determination of EC institutions in rooting out the reasons that lead to young peoples' marginalisation and radicalisation, firming up in this way trust and confidence.

Details: London: IARS Publications, 2018. 136p.

Source: Internet Resource: Accessed February 12, 2018 at: file:///C:/Users/pschultze/Downloads/YEIP_EXECUTIVE_SUMMARIES%20(1).pdf

Year: 2018

Country: International

Keywords: At-Risk Youth

Shelf Number: 149094


Author: Caripis, Lisa

Title: Combatting Corruption in Mining Approvals: Assessing the Risks in 18 Resource-Rich Countries

Summary: Transparent and accountable mining can contribute to sustainable development. This begins with corruption-free approvals - the very first link in the mining value chain when decisions are made about whether, where, and under what circumstances to permit mining, including who is awarded licences or contracts. Transparency International has assessed the risks that can lead to corruption in 18 resource-rich countries to identify the warning signals as early as possible. This report demonstrates where and how corruption can get a foothold in mining approvals processes before ground is even broken. It presents examples from a range of diverse countries and identities important roles for government, the mining industry and civil society to identify, prevent and mitigate these risks.

Details: Berlin: Transparency International, 2017. 104p.

Source: Internet Resource: Accessed February 13, 2018 at: https://www.transparency.org/_view/publication/8093

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 149115


Author: Ridley, Rachel N.

Title: Overcoming Failure: How Extremist Organizations Leverage Setbacks with Powerful Propaganda

Summary: Extremist and terrorist organizations such as ISIS, Hamas, and Hezbollah have maintained a strong presence in and throughout the Middle East and North Africa region over the course of the last few decades. Political victories and military conquests help these groups sustain their presence in Arab society; however, each group's ability to both recruit and maintain societal support through its publication and circulation of propaganda also have an impressionable impact as well. Although propaganda and recruitment tactics of extremist organizations have been widely researched and analyzed, very little exists on groups response to failures. In an attempt to fill this gap, we analyze the social and print media of three prominent regional extremist organizations to examine how these groups respond to operational and military failures and when they respond. We chose a research question to incisively focus on the response to military and operational failures. We have chosen to examine and compare the responses of three organizations: ISIS, Hamas, and Hezbollah's military wing.1 The selection of these three organizations was a strategic decision, as we believe the examination of each will not only give us adequate propaganda and media materials to analyze, but will also allow us to discern whether or not a trend exists within these organizations. Because of ISIS’ robust online media presence, we will primarily address this group and its responses to failures. To identify trends in extremist response to failures, we will briefly examine Hamas and Hezbollah's historical use of propaganda in response to failures in order to establish a comparative base for analysis and from which to develop a trend.

Details: Washington, DC: Institute for Middle East Studies, The Elliott School of International Affairs, The George Washington University, 2017. 64p.

Source: Internet Resource: IMES Capstone Paper Series: Accessed February 13, 2018 at: https://imes.elliott.gwu.edu/sites/imes.elliott.gwu.edu/files/downloads/Ridley%20and%20Rowan%20Social%20Media.pdf

Year: 2017

Country: International

Keywords: Extremist Groups

Shelf Number: 149121


Author: Walmsley, Roy

Title: World Female Imprisonment List (fourth edition)

Summary: More than 714,000 women and girls are held in penal institutions throughout the world, according to the fourth edition of the World Female Imprisonment List, researched and compiled by Roy Walmsley and published by the Institute for Criminal Policy Research at Birkbeck, University of London. The analysis indicates that female prison population levels have grown much faster than male prison population levels since around the year 2000, with the number of women and girls in prison increasing by more than 50% while the male population has increased by around 20%. For almost all countries across the globe, the List provides information on the total numbers of women and girls in prison, the percentage of the total prison population they comprise and the number of imprisoned women and girls per 100,000 of the national population. It also includes information about trends in female imprisonment. It shows that more than 200,000 imprisoned women and girls are in the USA (about 211,870) and more than 100,000 are in China (107,131 plus an unknown number in pre-trial and 'administrative detention'). The next highest totals are in the Russian Federation (48,478), Brazil (about 44,700), Thailand (41,119), India (17,834), Philippines (12,658), Vietnam (11,644), Indonesia (11,465), Mexico (10,832), Myanmar (9,807) and Turkey (9,708). In the two years since the previous edition of this List was published, the female prison population numbers in Brazil, Indonesia, Philippines and Turkey have risen sharply; by contrast, they have fallen substantially in Mexico, the Russian Federation, Thailand and Vietnam. Women and girls make up 7% of the global prison population. In African countries the proportion of women and girls in the total prison population, at 3%, is much lower than elsewhere. In the Americas women and girls make up 8% of the total prison population (6% if the US figures are excluded), in Asia 7%, in Europe 6% (5% excluding Russia) and in Oceania 7%. The countries with the highest proportions of female prisoners are Hong Kong-China (21%), Laos (18%), Macau-China (15%), Qatar (15%), Kuwait (14%), Thailand (13%), Myanmar (12%), the United Arab Emirates (12%) and South Sudan (11%).* The number of women and girls in prison worldwide has increased by more than 50% since about the year 2000. This cannot be explained in terms of the growth in national population levels: United Nations figures for the world population indicate that this rose only by 21% in about the same period. The female prison population has risen in all continents since 2000. In Africa the rise has been somewhat less than the increase in the general population of the continent and in Europe the increase in prisoner numbers has been similar to the general population increase. By contrast, rises in the female prison population in the Americas, in Asia and in Oceania have been respectively about three, four and five times the increases in the general population of those continents. The number of women and girls in prison has risen particularly sharply in some countries since around 2000; notably in: · El Salvador - now ten times the 2000 level · Cambodia - now more than six times the 2000 level · Indonesia - now more than six times the 2000 level · Guatemala - now five times the 2001 level · Brazil - now 4.5 times the 2000 level. Comparison of the latest figures with those that were available two years ago suggests that the worldwide female prison population may be still be increasing at a faster rate than the worldwide male prison population. Two years ago the increases since 2000 were 50% for female prisoners and 18% for male prisoners; they are now about 53% and 20% respectively.

Details: London: International Centre for Prison Studies, 2017. 13p.

Source: Internet Resource: accessed February 14, 2018 at: http://www.prisonstudies.org/sites/default/files/resources/downloads/world_female_prison_4th_edn_v4_web.pdf

Year: 2017

Country: International

Keywords: Female Inmates

Shelf Number: 149126


Author: Alvarez Marsal Corporate Performance Improvement LLP

Title: Causes and Control of Illicit Tobacco

Summary: The debate about the adverse health effects of tobacco is over and the health impacts are well understood. However, the debate about the relationship between high and increasing taxes on tobacco, illicit trade, organised crime and enforcement has many protagonists and is not over. This is an important issue given the broad and adverse impacts of illicit activity, ranging from lost tax revenue, to undermining health objectives, to the funding of organised crime and terrorist activities. Intergovernmental organisations such as the World Customs Organization (WCO), the World Health Organization (WHO), the Organisation for Economic Co-operation and Development (OECD) and the Financial Action Task Force (FATF) and international organisations such as Europol and INTERPOL are rightly focused on this issue. It is critically important that global alignment is established around the Based on analysis of a representative sample of 28 countries, including the world's major cigarette markets (excluding China), and on analysis of all U.S. states where data are available, affordability, measured as the proportion of disposable income required to purchase cigarettes, emerges as a principal driver of illicit trade in tobacco. Both the multicountry analysis and the pan-U.S. state analysis revealed a strong correlation between affordability and the size of illicit trade as a proportion of total consumption. By analogy, an analysis conducted on alcoholic beverages, arguably the closest product category to tobacco, also shows a strong relationship between illicit alcohol consumption and alcohol affordability. Tobacco affordability itself is determined by a combination of retail pricing and disposable income. Alvarez & Marsal's (A&M)'s analysis shows that while disposable income changes have played a real role, particularly during the economic crisis, the principal driver of affordability declines has been retail price increases, with increases in taxation being the main driver of the extent and pace of retail price increases. We conclude therefore that tobacco tax increases have been a key driver of growth in the illicit tobacco trade. Furthermore, analysis of the dynamics of tax and price increases indicate that (a) countries that experience sudden affordability Relationship Between Tobacco Tax Policy and Illicit Trade declines, usually caused by substantial tax-induced retail price increases, and/or (b) countries that are in close geographical proximity and have easy access to lower-priced alternative product from other countries, are more susceptible to growth in illicit trade. This is evidenced by many countries, for example, Latvia, which has relatively high illicit consumption despite having relatively good affordability, but which borders lower-priced Russia and Belarus; Brazil which is impacted by easy access to illicit supply from Paraguay; and more recently by the impact of the November 2015 excise duty increase in Malaysia. The analysis also demonstrates the importance of enforcement in controlling illicit trade. We have created a composite index comprising the degree of regulatory enforcement and the effectiveness of the criminal justice system country by country. The analysis shows that in countries where enforcement is strong, the scale of illicit trade can be controlled even where taxation is at higher levels. Conversely, where enforcement is weak, the scale of illicit trade can be high even in lower tax countries. Moreover, an examination of countries with broadly similar levels of affordability shows that the scale of illicit trade is greater in countries with weaker enforcement and smaller in countries with stronger enforcement causes of the problem and around the solutions.

Details: s.l.: Alvarez & Marsal, 32p.

Source: Internet Resource: Accessed February 14, 2018 at: https://www.alvarezandmarsal.com/sites/default/files/am_jti-smokingsummary_finalweb.pdf

Year: 2017

Country: International

Keywords: Illegal Cigarettes

Shelf Number: 149128


Author: Valdebenito, Sara

Title: School-based interventions for reducing disciplinary school exclusion: a systematic review

Summary: This Campbell systematic review examines the impact of interventions to reduce exclusion from school. School exclusion, also known as suspension in some countries, is a disciplinary sanction imposed by a responsible school authority, in reaction to students' misbehaviour. Exclusion entails the removal of pupils from regular teaching for a period during which they are not allowed to be present in the classroom (in-school) or on school premises (out-of-school). In some extreme cases the student is not allowed to come back to the same school (expulsion). The review summarises findings from 37 reports covering nine different types of intervention. Most studies were from the USA, and the remainder from the UK. What are the main results? Included studies evaluated school-based interventions or school-supported interventions to reduce the rates of exclusion. Interventions were implemented in mainstream schools and targeted school-aged children from four to 18, irrespective of nationality or social background. Only randomised controlled trials are included. The evidence base covers 37 studies. Thirty-three studies were from the USA, three from the UK, and for one study the country was not clear. School-based interventions cause a small and significant drop in exclusion rates during the first six months after intervention (on average), but this effect is not sustained. Interventions seemed to be more effective at reducing some types of exclusion such as expulsion and in-school exclusion. Four intervention types - enhancement of academic skills, counselling, mentoring/ monitoring, and skills training for teachers - had significant desirable effects on exclusion. However, the number of studies in each case is low, so this result needs to be treated with caution. There is no impact of the interventions on antisocial behaviour. Variations in effect sizes are not explained by participants' characteristics, the theoretical basis of the interventions, or the quality of the intervention. Independent evaluator teams reported lower effect sizes than research teams who were also involved in the design and/or delivery of the intervention. Background - Schools are important institutions of formal social control (Maimon, Antonaccio, & French, 2012). They are, apart from families, the primary social system in which individuals are socialised to follow specific codes of conduct. Violating these codes of conduct may result in some form of punishment. School punishment is normally accepted by families and students as a consequence of transgression, and in that sense school is often the place where children are first introduced to discipline, justice, or injustice (Whitford & Levine-Donnerstein, 2014). A wide range of punishments may be used in schools, from verbal reprimands to more serious actions such as detention, fixed term exclusion or even permanent exclusion from the mainstream education system. It must be said that in some way, these school sanctions resemble the penal system and its array of alternatives to punish those that break the law. School exclusion, also known as suspension in some countries, is defined as a disciplinary sanction imposed by a responsible school authority, in reaction to students' misbehaviour. Exclusion entails the removal of pupils from regular teaching for a period during which they are not allowed to be present in the classroom or, in more serious cases, on school premises. Based on the previous definition, this review uses school exclusion and school suspension as synonyms, unless the contrary is explicitly stated. Most of the available research has found that exclusion correlates with subsequent negative sequels on developmental outcomes. Exclusion or suspension of students is associated with failure within the academic curriculum, aggravated antisocial behaviour, and an increased likelihood of involvement with punitive social control institutions (i.e., the Juvenile Justice System). In the long-term, opportunities for training and employment seem to be considerably reduced for those who have repeatedly been excluded. In addition to these negative correlated outcomes, previous evidence suggest that the exclusion of students involves a high economic cost for taxpayers and society. Research from the last 20 years has concluded quite consistently that this disciplinary measure disproportionally targets males, ethnic minorities, those who come from disadvantaged economic backgrounds, and those presenting special educational needs. In other words, suspension affects the most vulnerable children in schools. Different programmes have attempted to reduce the prevalence of exclusion. Although some of them have shown promising results, so far, no comprehensive systematic review has examined these programmes’ overall effectiveness. Objectives - The main goal of the present research is to systematically examine the available evidence for the effectiveness of different types of school-based interventions aimed at reducing disciplinary school exclusion. Secondary goals include comparing different approaches and identifying those that could potentially demonstrate larger and more significant effects. The research questions underlying this project are as follows: Do school-based programmes reduce the use of exclusionary sanctions in schools? Are some school-based approaches more effective than others in reducing exclusionary sanctions? Do participants' characteristics (e.g., age, gender, ethnicity) affect the impact of school-based programmes on exclusionary sanctions in schools? Do characteristics of the interventions, implementation, and methodology affect the impact of school-based programmes on exclusionary sanctions in schools?

Details: Oslo: Campbell Collaborative, Crime and Justice Coordinating Group. 2018. 219p.

Source: Internet Resource: A Campbell Systematic Review 2018:1: Accessed February 14, 2018 at: https://www.campbellcollaboration.org/library/reducing-school-exclusion-school-based-interventions.html

Year: 2018

Country: International

Keywords: Antisocial Behavior

Shelf Number: 149144


Author: Cook, James A.

Title: Beating the red gold rush: copper theft and homeland security

Summary: This thesis is a comparative case study comparing and contrasting the efforts of three countries (United Kingdom, France, Italy) in their fight to reduce copper wire theft incidents within their nations. The ultimate goal of the research is to highlight the significant threat posed to critical infrastructure from copper thieves and to offer best practice recommendations to policymakers within the United States in response, based on the experiences of the three targeted nations. An analysis of the data reveals that the United Kingdom has had the most success in the reduction of reported copper wire theft incidents primarily due to its multi-faceted approach to the problem, which includes heavy regulation of the scrap recycling industry, centralized law enforcement operations, and enhanced criminal statutes.

Details: Monterey, CA: Naval Postgraduate School, 2015. 133p.

Source: Internet Resource: Thesis: Accessed February 14, 2018 at: https://calhoun.nps.edu/handle/10945/47925

Year: 2015

Country: International

Keywords: Copper Theft

Shelf Number: 149152


Author: Hosch, Gilles

Title: Seafood traceability for fisheries compliance: Country-level support for catch documentation schemes

Summary: This document explores ways in which individual countries in seafood supply chains can, in their capacities as coastal, flag, port, processing or end-market states, contribute to maximizing the effectiveness of catch documentation schemes. The focus is on the traceability of seafood consignments, but the authors also explore other important compliance mechanisms that lie beyond traceability and that support the effective implementation of catch documentation schemes at the country level. The document explains which traceability mechanisms are built into catch documentation schemes, and which additional support mechanisms must be provided by individual countries along seafood supply chains. The study finds that traditional fisheries monitoring, inspection and sanctioning mechanisms are of primary importance with regard to flag, coastal and end-market states, whereas effective country-level traceability mechanisms are of particular importance in port and processing states. The text is segmented into three parts: - The first part - Chapters 1 to 3 - introduces the study and the methodology used, and describes the functioning of catch documentation schemes. - The second part - Chapter 4 - provides findings with regard to country-level support mechanisms for catch documentation schemes for each state type participating in seafood supply chains. - The third part - Chapter 5 - provides conclusions, recommendations and policy guidance on the basis of the findings in the second part.

Details: Rome: Food and Agriculture Organization of the United Nations, 2018. 114p.

Source: Internet Resource: Accessed February 20, 2018 at: http://www.fao.org/3/a-i8183e.pdf

Year: 2018

Country: International

Keywords: Fishing Industry

Shelf Number: 149184


Author: Tilley, Nick

Title: Engineering a Safer Society

Summary: Evidence Female mechanic being concentrated on work-based policing continues to be an important area of discussion among police organisations across the world, and parallels are often drawn with medicine as a means to describe how a profession can be enhanced through a commitment to evidence based techniques. The use of the medical analogy in policing does not have everybody convinced, however, and there are those who argue that rather than molecules, bacteria and disease, we are dealing with the complexity of human behaviour, meaning simple cause and effect may always be difficult to establish. In this Research Focus Professors Nick Tilley and Gloria Laycock of the Jill Dando Institute at University College London extend this thinking and suggest that a better professional parallel might be drawn with engineering. Arguing that a process of evidence based trial and error might be more effective in policing than the experimental testing of narrow hypotheses,

Details: Manly NSW: Australian Institute of Police management (AIPM), 2016. 6p.

Source: Internet Resource; Public Safety Leadership: Research Focus Volume 4, no. 2: Accessed February 21, 2018 at: http://www.aipm.gov.au/wp-content/uploads/2016/08/Research-Focus-Vol-4-Iss-2-Engineering.pdf

Year: 2016

Country: International

Keywords: Evidence-Based Policing

Shelf Number: 149197


Author: Perkins, Derek

Title: Interventions for perpetrators of online child sexual exploitation: a scoping review and gap analysis

Summary: Technology has become a primary medium for child sexual abuse and exploitation. Like offline behaviour, technology-facilitated abuse and exploitation can take many forms, such as the recording of the sexual assault of a child or communicating with a child via mobile devices. Online and offline spaces are not always clearly distinguishable: abuse and exploitation can start in one space and move to the other. In this report, we describe sexually abusive activities towards a child or young person as 'online child sexual abuse' (OCSA) - or, where there are gains beyond sexual gratification, 'online child sexual exploitation' (OCSE) - if they are carried out via technology. Various interventions for perpetrators of OCSA and OCSE are available, ranging from one-toone sessions to manualised treatment groups. Little is known about the effectiveness of existing interventions, and whether there are gaps in the current intervention response. To improve knowledge of treatment in these areas, this scoping review obtained information from three sources: - online searches - a literature review and enquiries to service providers in relation to existing interventions - an online survey of experts and stakeholders - in-depth interviews drawn from the survey participants. These yielded information about the different interventions currently provided for perpetrators of OCSA/E, their effectiveness (where known), gaps within current interventions, and forthcoming challenges in the field. Key messages from the research Lack of evaluation and research Law enforcement, offender management and child protection services have had to be responsive to the urgent and growing issue of OCSA/E, despite limited evidence on the underlying psychological models of OCSA/E behaviour. Responding to need has, understandably, outrun the collection of scientific evidence, and there has been a lack of systematic evaluation of interventions' effectiveness. Sense of being overwhelmed Whilst professionals involved in this area felt strongly about the positive impact of their work, they also communicated a sense of feeling overwhelmed with regard to the high numbers of OCSA/E perpetrators, the lack of funding available for their services, and the need for specific training for professionals involved in this area. Need to increase knowledge generation and exchange Professionals expressed a desire for enhanced knowledge generation and exchange, especially with regard to increasing the empirical knowledge base on the risks and needs presented by the perpetrators of OCSA/E, and the lack of professional tools to assist with decision-making regarding risk and treatment. Enhance existing intervention response Interventions for perpetrators of OCSA/E remain limited and are largely similar in their client focus, scope and funding approach. They predominantly focus on psychoeducation and addressing psychological markers of offending behaviour, are provided for adult males known to the criminal justice system, and are paid for by the client or as part of court-ordered or mandatory interventions. Early intervention focus The scoping review also identified a demand for a shift towards preventative approaches - to increase public awareness and targeted at young people through educational resources. Sex education, including internet safety and pornography use, was highlighted by professionals as needing to be an integral part of the school curriculum. Professionals also discussed the implications of providing interventions for OCSA/E perpetrators not known to the criminal justice system, and for non-offending individuals who may be concerned about their sexual interest. Characteristics of existing interventions Online offending has become a focus in interventions provided for people with a sexual conviction and their victims. This scoping review identified 48 services or agencies that contribute to interventions for OCSA/E offending by providing interventions themselves, commissioning or conducting relevant research, and providing knowledge exchange events for professionals. This included eight UK-based services that directly provide interventions for perpetrators of OCSA/E. Most interventions are focused on adult male perpetrators (predominantly those known to the criminal justice system), with limited support provided for adolescents, female perpetrators, or the perpetrator's support network such as family members or friends. The reviewed intervention services typically provide psychological assessments and individual or group treatment. A key difference between UK and some international providers is the ability of the latter to work with perpetrators without the requirement for statutory disclosure to the criminal justice system on matters that would require disclosure in the UK (for example in respect of specific information on past unprosecuted offences). Quality control in relation to the provided interventions is variable. The empirical research on which they are based is not always up to date or specific to the offender subgroup. Service evaluations mainly comprise qualitative feedback from service users rather than more multifaceted pre-post treatment assessments. Implications from the research The scoping review highlighted a number of areas for future development and professional practice: - Intervene earlier and more broadly. This includes offence-prevention strategies such as public education about the nature of OCSA/E and their legal classification, enhancing service provisions for nonoffending individuals attracted to children, and reducing access to sexually exploitative material of children and young people. - Enhance the treatment response for (known) offenders. This may include expanding the existing client target group, increasing accessibility of services and increasing staff support. It may also include staying up to date on emergent issues in the field, such as new opportunities for OCSA/E arising with novel technologies. - Generate and share knowledge. This may include OCSA/E-specific training for professionals working in the field, support for research engagement, and knowledge exchange and collaboration between professionals and partner agencies. A key research need is to conduct systematic intervention evaluations.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 54p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 5: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%205%20-%20Interventions%20for%20perpetrators%20of%20online%20CSE.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149208


Author: Walker, Kate

Title: Characteristics and perspectives of adults who have sexually exploited children: Scoping research

Summary: There is a lack of information about individuals who perpetrate child sexual exploitation (CSE) offences. This report describes one of three research projects commissioned by the Centre of expertise on child sexual abuse to build an evidence base about this population. The projects' aims were to: ‣ investigate the characteristics of those who commit CSE ‣ identify the nature and dynamics of their behaviours, their motivations and the way they target and exploit their victims. The report will be of interest to frontline practitioners, service providers, commissioners of services, policy makers, researchers and academics. Method Notes from police intelligence briefings with 27 perpetrators of CSE were analysed, using content analysis to extract demographic information about CSE perpetrators. Additionally, interviews were undertaken with 18 adults who had sexually offended against children; using the current (2017) Government definition of CSE for England, these 18 adults were classified as either CSE perpetrators (n = 11) or Non-CSE perpetrators (n = 7). Inductive thematic analysis was used to analyse the interview data, to identify common themes that captured the characteristics and motivations of CSE perpetrators. Key findings and gaps in research knowledge ‣ There has been little research to date that has specifically examined the characteristics, context and motivations of CSE perpetrators. ‣ It is difficult to identify CSE perpetrators, since most sexual offences are not specific to CSE and individuals who have committed CSE offences have not been categorised as such in the criminal justice system process. This makes it difficult to conduct research with this group. ‣ Adults in this sample who had committed CSE offences had experienced dysfunctional lives. They evidenced individual internal characteristics, such as mental health problems, low self-esteem and antisocial attributes. ‣ Many excessively used adult pornography and/or images that depicted children. ‣ Negative external influences were also present in their relationships and environments. These included chaotic intimate relationships, poor relationships with family members and peers, and violence and abusive relationships at home and school. ‣ Individuals believed that their offending was associated with a culmination of all the dysfunctional and negative experiences in their lives, including both internal and external influences. ‣ Individuals justified and 'explained' their offending behaviours, which enabled them to continue to offend. ‣ Motivation for offending was described as sexual gratification in this exploratory sample. ‣ An ecological framework can be used to understand the complexity and interplay between the individual, relationships, social, cultural and environmental factors associated with CSE. ‣ There are gaps in research knowledge as to whether the factors identified as associated with CSE perpetration are variable risk markers or fixed risk markers and whether these are casual risk factors that could be targeted in interventions. ‣ Little is known about the role and relevance of protective factors which can potentially mitigate perpetration. Implications and recommendations This is a difficult group to research, as they are largely 'hidden' in criminal justice system processes. A complex range of factors are associated with the commission of CSE, which means that there is no simple way of preventing individuals from perpetrating this type of offending. However, the evidence is still limited and we do not have a clear picture of the range of factors that lead to CSE offending, particularly across the wide range of offences that meet the definition of CSE. More research is therefore needed: for example, with a larger, national sample of individuals who have sexually exploited children and a wider range of CSE offences than has been captured in this exploratory study

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 36p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 3: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%203%20-%20Characteristics%20and%20perspectives%20of%20adults%20who%20have%20sexually%20exploited%20children.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149209


Author: Walker, Kate

Title: Characteristics and motivations of perpetrators of child sexual exploitation: A rapid evidence assessment of research

Summary: There is a lack of information about individuals who perpetrate child sexual exploitation (CSE) offences. This report describes one of three research projects to build an evidence base about this population. The project's aims were to: ‣ investigate the characteristics of those who commit CSE ‣ identify the nature and dynamics of their behaviours, their motivations and the way they target and exploit their victims. The report will be of interest to frontline practitioners, service providers, commissioners of services, policy makers, researchers and academics. Method A rapid review was conducted, finding 50 studies/reports where the offences met the definition of CSE and information could be extracted about perpetrators' characteristics, behaviours, motivations and methods of targeting/exploiting their victims. Key findings and gaps in research knowledge ‣ The majority of studies were conducted in the UK (19) and USA (18), with four conducted in Canada, three in New Zealand, two in France and one in each of Australia, Mexico, Germany and Sweden. It is important to note that some of these studies reviewed and/or combined the findings from a number of published studies, so each study's findings were not necessarily specific to its country of origin. ‣ The majority (37) of studies were of offenders who have committed exclusively online CSE offences, with only 10 examining non-online CSE offences and three covering both online and 'offline' offences; very limited knowledge was obtained regarding other types of CSE, such as CSE perpetrated within groups and gangs; offences such as human trafficking for, or resulting in, sexual exploitation; and the purchasing of sexual contact. This limits the extent to which the review's findings and observations can be generalised. ‣ Across the studies there were many methodological limitations such as inconsistencies in the definition of CSE, comparisons between groups of sexual offenders only (with a lack of other offender or non-offender control groups), lack of typical or normative data comparisons, and reliance on correlational data. These limit the potential to draw conclusions about causal influences. ‣ Perpetrators were generally identified as male, white and aged between 18 and 85 years (with the average age in individual studies ranging from 30 to 46 years); a high proportion were employed, with a large number of these in professional jobs. ‣ Mental health characteristics and psychological characteristics (personality traits) were examined only in relation to online CSE offences, and no research examined them in relation to other forms of CSE, e.g. CSE perpetrated in gangs or groups. ‣ In relation to online CSE, owing to methodological challenges and insufficient research it is impossible to isolate specific mental health or psychological characteristics that have a causal relationship with this type of offence. However, factors such as depression, anxiety, stress and suicidal ideation are most likely to be relevant. ‣ The evidence is weaker for psychological characteristics being associated with CSE; however, some attachment styles (e.g. not securely attached, fearful attachment) were associated with this group, and the formation of relationships appeared to be problematic. ‣ There was limited research that identified the motivations of CSE perpetrators; the studies that did so were generally those looking to develop typologies and categories of online offenders. The two key motivations found were sexual and financial. ‣ There was no research that specifically identified the way that perpetrators targeted/ exploited their victims, beyond explaining the context within which the exploitation occurred (i.e. online exploitation, gangs or trafficking/commercial dealings). It may be that such information could be located within the literature on victim-survivors, but including and analysing research on victim-survivors was beyond the scope of the current review. Implications and recommendations There is very little reliable information about the characteristics of individuals who perpetrate CSE offences, particularly those who do not commit offences in or using online environments. This significantly limits our ability to identify potential offenders and situations to target and design prevention strategies. More research is required to fully understand the characteristics and motivations of CSE perpetrators. That research will need to: ‣ have consistency and clarity regarding the definition of this type of offending and the different contexts within which it occurs ‣ use methodological research designs that allow differences and causal pathways to be reliably identified - for example, including appropriate non-offender control groups, longitudinal methods and large sample sizes (although this may be unrealistic, as studies are generally based on small, convicted samples by necessity)

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 40p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 2: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%202%20-%20Characteristics%20and%20motivations%20of%20perpetrators%20of%20CSE.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149210


Author: Hackett, Simon

Title: Young people who engage in child sexual exploitation behaviours: An exploratory study

Summary: Despite increasing awareness of child sexual exploitation (CSE) across the UK in recent years, there remain gaps in current knowledge and understanding - including in relation to young people who perpetrate acts of CSE. In contrast to the wider research base for harmful sexual behaviour (HSB) in childhood and adolescence, which has developed significantly in recent years, there is little in the literature specifically on the topic of young people who engage in sexually exploitative behaviours. This report describes one of three research projects commissioned by the Centre of expertise on child sexual abuse to build an evidence base about perpetrators of CSE. The project aimed to investigate: - the backgrounds of young people identifi ed for CSE concerns as perpetrators - the nature and range of their sexual behaviours - the range of victims targeted - other off ending behaviours displayed by the young people. Method Anonymised data was obtained from electronic records held by a police-led, multiagency initiative which focuses on CSE and on missing children. Consisting of 14 cases, the data are a convenience and non-probability sample which represent a significant minority of the cases becoming known to this 'CSE team' over a 24- month period where an alleged perpetrator was under the age of 18 at the point of their harmful or exploitative sexual behaviours. This study therefore drew only on existing secondary data already available to the CSE team; it was beyond the study's scope to conduct interviews with professionals involved in the cases, or with the young people and their families directly. The electronic records contained considerable and detailed information compiled by a wide range of agencies over a substantial period of time. Key fi ndings Because of the small sample size and the reliance on official case records which may be partial and limited, the following findings should be regarded as at best indicative. - All young people in the sample were male and white British. - Their current age ranged between 14 and 21 years old, with the overwhelming majority aged over 16; this is an older sample than many reported in the literature on HSB. Their age at the point when concerning sexual behaviours fi rst emerged ranged from 7 to 18 years old; in contrast to other demographic studies of young people with HSB, which have indicated substantial early-onset trajectories, only one case indicated a pattern of pre-adolescent sexual behaviour problems. - Experiences of adversity were found in the developmental histories of 10 of the 14 young people. The most commonly reported factor was domestic violence, followed by physical and sexual abuse and neglect. Previous studies of young people with HSB have reported higher rates of previous victimisation. - Twelve of the young people had longstanding non-sexual off ending histories: theft, burglary, criminal damage and general antisocial behaviours were extensive and pervasive. All the young people appear to fi t the 'generalist' category of HSB off ender, whose sexual off ending appears to be more directed towards peers as part of a broader catalogue of deviance and non-sexual off ending trajectories. - A model proposed by Ward and Siegert (2002) describes fi ve primary developmental pathways leading into sexually abusive behaviours. Many of the young people in the sample appear to fi t into the antisocial thinking pathway, where an underlying propensity towards general deviance and antisocial behaviour becomes sexualised during puberty. - In all cases, the concerns about young people's sexual behaviours related to a young person off ending alone or to pairs of young people whose behaviours appeared interlinked and inter-infl uenced. There were no 'gang-related' or larger group incidents of HSB or CSE. - Whilst all 14 young people had targeted female victims, only one was known to have sexually off ended against a male (in addition to multiple female victims). HSB towards teenage peers was preceded in only three cases by sexual abuse of prepubescent children. Previous research into young people's HSB has identifi ed signifi cant proportions of male victims and victims aged 10 or below. - The young people were typically involved in multiple and in some cases escalating harmful sexual behaviours: nine engaged in exploitative or harmful sexual behaviours online or using social media, accompanied in most cases by contact sexual exploitation or sexual abuse. There was not strong evidence of a clear progression from online to offl ine HSB: it was just as likely for offl ine HSB to precede online behaviours. Implications and recommendations The impression gained from this pilot study is of young people who engage in CSE behaviours as a generally very deviant group whose sexual and non-sexual behaviours are disinhibited, chaotic and non-boundaried. The small scale of this study, and the use of data from one team with a particular focus and operating model, limits the conclusions that can be drawn; nevertheless, the study's tentative findings should be investigated in more detail. In some of the cases examined, it was possible to see a progression from sexual assaults or sexually abusive behaviour without overt elements of exchange towards more 'CSEtype' behaviours over time. It may be that CSE-type behaviours in adolescence, much more so than more general HSB, are more strongly related to general deviance than a history of sexual victimisation; if so, this has significant implications for both intervention approaches and prevention activities. However, it was difficult to separate the young people's behaviours meaningfully and neatly into categories of CSE and HSB. Whilst all cases fitted widely used definitions of HSB, the extent to which they are accompanied by overt elements of exchange (as would fit the definition of CSE) was much less clear in many cases. The sexual behaviours of all the young people in the sample required disruption, management and intervention - but it is unclear whether that should be undertaken by a CSE team or an HSB team. This perhaps reflects the present inadequacy of using distinct sets of language and concepts (CSE and HSB) and service frameworks to respond to the problem of transgressive sexual behaviour in adolescence.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 24p.

Source: Internet Resource: Child sexual exploitation perpetrators research programme, report 1: Accessed February 22, 2018 at: https://www.csacentre.org.uk/csa-centre-prod/assets/File/CSE%20perpetrators%201%20-%20Young%20people%20who%20engage%20in%20CSE%20behaviours.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149211


Author: Radford, Lorraine

Title: A review of international survey methodology on child sexual abuse and child sexual exploitation

Summary: This review was commissioned by the Centre of expertise on child sexual abuse to inform its work on improving data currently collected in England and Wales. Unlike previous reviews which have looked at findings on prevalence rates within and across different countries, this study looked at differences in self-report survey methodologies to research rates of victimisation and perpetration. The aims of the review were to: - identify methodologically different surveys undertaken in countries outside England and Wales that specifically focus on, or include, child sexual abuse (CSA) - identify questions used in surveys to assess the scale and nature of CSA - including any questions regarding child sexual exploitation (CSE), and those exploring abuse or grooming that takes place online - and comment on their relative effectiveness - explore the survey methods used, and identify what worked well in achieving a good response rate - explore the sampling strategies used, including any use of booster samples to reach underrepresented or identified vulnerable groups - identify questions, survey methods and sampling strategies used to explore potential and actual perpetration of CSA - discuss what identified good practice would be replicable in the UK context, and to what extent this would allow comparisons to be made across countries.

Details: Ilford, Esssex, UK: Centre of Expertise on Child Sexual Abuse, 2018. 66p.

Source: Internet Resource: Accessed February 22, 2018 at: https://www.csacentre.org.uk/research-publications/scale-and-nature-of-child-sexual-abuse-and-exploitation/a-review-of-international-survey-methodology-on-child-sexual-abuse-and-child-sexual-exploitation/

Year: 2018

Country: International

Keywords: Child Grooming

Shelf Number: 149212


Author: Asongu, Simplice

Title: The Murder Epidemic: A Global Comparative Study

Summary: We build on literature from policy and academic circles to assess if Latin America is leading when it comes to persistence in homicides. The focus is on a global sample of 163 countries for the period 2010 to 2015. The empirical evidence is based on Generalised Method of Moments. The following main finding is established. The region with the highest evidence of persistence in homicides is sub-Saharan Africa (SSA), followed by Latin America, the Middle East and North Africa (MENA) and then by Europe & Central Asia (ECA). In order to increase room for policy implications, the dataset is decomposed into income levels, religious domination, land-lockedness and legal origins. From the conditioning information set, the following factors account for persistence in global homicides: crime, political instability and weapons import positively affect homicides whereas the number of "security and police officers" has the opposite effect.

Details: Forthcoming paper, 2017. 23p.

Source: Internet Resource: Accessed February 22, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3109974

Year: 2017

Country: International

Keywords: Crime Statistics

Shelf Number: 149215


Author: Reiter, Keramet

Title: The International Persistence and Resilience of Solitary Confinement

Summary: Drawing on a combination of legal analysis and fieldwork conducted with prisoners and administrators in both Denmark and the United States, this article interrogates how solitary confinement has been defined and constrained - or not - in the context of U.S., European, and international law over time. Solitary confinement has been pervasive in prisons across the world, since the first prisons opened. And solitary confinement has been surprisingly predictable over its long history, producing instances of extreme and de-humanizing brutality, inspiring ongoing debates about just how psychologically detrimental the practice is, and persistently resisting critiques based on evidence of brutality and psychological damage. The pervasiveness and predictability of solitary confinement suggests substantial limitations inherent in the newest barrage of critiques leveled by courts, scholars, international human rights bodies, and professional associations against the practice. Indeed, many critiques of solitary confinement have failed because they have promoted reformist rather than non-reformist (or abolition) agendas - a distinction articulated by Mathiesen (1974/2014).

Details: Onati Socio-Legal Series, Vol. 8, No. 2, 2018. 20p.

Source: Internet Resource: Accessed February 23, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3098835

Year: 2018

Country: International

Keywords: Human Rights

Shelf Number: 149229


Author: May-Chahal, Corinne

Title: Rapid Evidence Assessment: Rapid Evidence Assessment Characteristics And Vulnerabilities Of Victims Of Online Facilitated Child Sexual Abuse And Exploitation

Summary: This report considers the evidence about children's characteristics, vulnerabilities and resilience to online-facilitated child sexual abuse (CSA). Online-facilitated CSA refers to the process of establishing/building a relationship with a child either in person or using the Internet or other digital technologies to facilitate either online or offline sexual contact with that child. The report has been commissioned by the Inquiry into Child Sexual Abuse (IICSA or 'the Inquiry'). The aim of 'the Inquiry' is to investigate whether public bodies and other non-state institutions have taken seriously their responsibility to protect children from sexual abuse in England and Wales, and to make meaningful recommendations for change, to help ensure that children now and in the future are better protected from sexual abuse. The Inquiry has launched 13 investigations into a broad range of institutions. One of the investigations focuses on the institutional responses to child sexual abuse and exploitation facilitated by the Internet. This is referred to as the internet investigation. The internet investigation is exploring the nature and extent of the use of the internet and other digital communications technology to facilitate child sexual abuse. This report answers the primary question: what is known about the characteristics, vulnerabilities and on- and offline behaviour of victims of online-facilitated child sexual abuse and exploitation?

Details: Lancaster, UK: Lancaster University, 2018. 114p.

Source: Internet Resource: Accessed February 28, 2018 at: https://www.iicsa.org.uk/document/rapid-evidence-assessment-characteristics-and-vulnerabilities-victims-online-facilitated

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149280


Author: Foley, Sean

Title: Sex, Drugs, and Bitcoin: How Much Illegal Activity Is Financed Through Cryptocurrencies?

Summary: Cryptocurrencies are among the largest unregulated markets in the world. We find that approximately one-quarter of bitcoin users and one-half of bitcoin transactions are associated with illegal activity. Around $72 billion of illegal activity per year involves bitcoin, which is close to the scale of the US and European markets for illegal drugs. The illegal share of bitcoin activity declines with mainstream interest in bitcoin and with the emergence of more opaque cryptocurrencies. The techniques developed in this paper have applications in cryptocurrency surveillance. Our findings suggest that cryptocurrencies are transforming the way black markets operate by enabling "black e-commerce."

Details: Unpublished paper, 2018. 58p.

Source: Internet Resource: Accessed February 28, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3102645

Year: 2018

Country: International

Keywords: Bitcoin

Shelf Number: 149283


Author: Outhwaite, Willow

Title: Eastward Bound: Analysis of CITES-listed listed flora and fauna exports from Africa to East and Southeast Asia 2006 to 2015.

Summary: Many people would be surprised to learn that 975 different taxa listed in the Convention of International Trade in Endangered Species of Wild Fauna and Flora (CITES) were exported from Africa to Asia: and some of those traded in the largest quantities were species that have received relatively little attention within CITES. Trade was reported involving 40 of 54 African countries and from one disputed territory and all 17 Asian countries/territories in this study, although the quantities, species and commodities traded varied enormously. Animals and plants from Africa were derived from a variety of sources, and trade in commodities from captive/artificially-propagated sources made up a significant proportion. However, a total of 498 taxa were exported from wild or ranched sources demonstrating the ongoing importance of sustainable management. The aim of this report is to shine a light on the legal trade of CITES-listed species from Africa to Asia, to illustrate the diversity of trade and highlight significant changes that have occurred over the most recent decade where data are available (2006 to 2015). A brief analysis of available data for 2016 and 2017 was conducted to identify emerging patterns. Trade data submitted by exporting and importing countries are stored in the publicly accessible UN Environment World Conservation Monitoring Centre CITES Trade Database. Data for the period 2006 to 2015 were used for this analysis, encompassing all species of plants and animals listed in Appendix I or II. A number of caveats are recognised with this approach, but the results demonstrate the diversity of trade and highlight species, commodities and countries which dominate the trade. CITES trade data reveal the diverse nature of the trade in CITES-listed plants and animals from Africa to East and Southeast Asia (hereafter "Asia"): a trade that involves most African countries, all such Asian countries/territories and nearly 1,000 different taxa. Interestingly, African countries had unique trade patterns in terms of the different taxa they exported to Asia: only 18% of all taxa were exported by more than one African country. Reptiles dominated trade in live individuals, skins and meat: the most common species being Leopard Tortoise Stigmochelys pardalis and Nile Crocodile Crocodylus niloticus. The sub-regional profiles and country case studies (Appendix 1) in this report demonstrate the incredible diversity of trade, from live plants (Madagascar), scorpions (Togo) and eels (Morocco and Tunisia), to hippo teeth (United Republic of Tanzania), timber products (Republic of the Congo) and seal skins (Namibia). The results of this analysis lead to recommendations aimed at improving use of trade data for decision making, and sharing of data among stakeholders.

Details: Cambridge, UK: TRAFFIC International, 2018. 160p.

Source: Internet Resource: Accessed March 9, 2018 at: http://static1.1.sqspcdn.com/static/f/157301/27848324/1520244219633/TRAFFIC-Africa-Asia-report.pdf?token=KfHEVFaPkMRrjaR9D9v0qH4Ty08%3D

Year: 2018

Country: International

Keywords: Endangered Species

Shelf Number: 149410


Author: Kundnani, Arun

Title: The globalisation of countering violent extremism policies: Undermining human rights, instrumentalising civil society

Summary: The globalisation of Countering Violent Extremism (CVE) policies is the most significant development in counterterrorism policy in the last decade. What began as a rhetorical commitment from a handful of agencies has developed into a plethora of policies, deployed from Finland to the Philippines. In 2016, even the singer Bono adopted the language of CVE, stating before the US Senate Committee on Appropriations that the US should deploy "a Marshall Plan to head off the rise of violent extremism in North Africa, the Middle East, and the Sahel." Today, the terms 'radicalisation', 'extremism' and 'violent extremism' are bandied about with such frequency and abandon that they have become synonymous with terrorism itself, despite their quite different meanings, and the lack of clarity as to how these concepts relate to one another. Under the CVE banner, policy-makers at national and international levels have carried out engagement and outreach; capacity building and development aid; education and training; messaging and public relations campaigns; surveillance partnerships between policing and non-policing agencies; and targeted ideological interventions on individuals. CVE policies have significantly widened the range of methods used by governments for countering terrorism and shifted their target from terrorist organisation to religious ideology and identity. Through the development of CVE, the war on terror has given itself a new vocabulary and a wider set of partnering agencies, from educators to artists. What unites these policies is that they aim to reduce violent extremism by using methods beyond the use of military force and the coercion available under criminal law; they usually also aim to prevent the emergence of violent extremism before it has fully emerged in a region, community, or an individual, by addressing the underlying factors that give rise to it. Supporters of CVE policies see them as complementing more conventional, reactive counter-terrorism methods, offering the possibility of a long-term and holistic solution to terrorism. The forms these policies take vary from one context to another but the core ideas and principles are highly consistent - even as their implementation may be inconsistent - and have proven amenable to globalisation. In this report we provide a critical account of the emergence of CVE policies and analyze their subsequent institutionalisation within three international bodies: the European Union, the United Nations, and the Global Counterterrorism Forum. While these frameworks were shaped primarily by western states, their international diffusion raises the prospect, as Steven Hawkins, Executive Director of Amnesty International USA put it, of repressive governments "taking advantage of 'CVE-mania'" and "using international funding to violate human rights in the absence of appropriate safeguards". It is important to stress, however, that these violations and abuses are every bit as present in Western states themselves. As such the problem as we see it is not simply one of democratic states exporting coercive policies to less democratic ones, but rather one of supranational organisations - including those with human rights mandates at their core - legitimising these problematic approaches by adopting them uncritically. We are also concerned that the CVE framework has broken free of its national bounds just as those states in which the policies originated are coming to terms with the return of another kind of violent extremism. With the far right in or close to power in key liberal democratic states, the professed liberalism that sought to shape globalisation in its own image is itself under great strain, and struggling to contend with the political ascendancy of right-wing populism and authoritarianism in many parts of the world. In Western democracies and beyond, this has led to demands for public policies that combat not just the (withering) appeal of ISIS, but which aim to counter violent extremists of every stripe. The subsequent ascendancy of violent extremists and white supremacists in the USA and Europe has created something of a crisis of legitimacy for CVE policies, which are for obvious reasons unattractive to the Far Right when they target anything other than 'Muslim extremism'. These political dynamics have fractured the international consensus on combatting violent extremism that emerged after ISIS declared it had established a 'Caliphate' in 2014, a consensus built largely on the back of the second Obama administration's enthusiasm and support for CVE. The Trump administration's withdrawal of support for ostensibly 'holistic' CVE policies - both domestic and international - coupled with abject political inertia when it comes to the violent extremism perpetrated or promoted by other populist or authoritarian leaders thus offers a much-needed opportunity for critical reflection on the paradigm as a whole. With the UN now calling for all of its member states to devise and implement national Action Plans, there is an urgent need for policymakers to reflect on whether CVE policies and practices that are anchored in a failed 'war on terror', which by any objective measure has only increased politically-motivated violence and extremism, are fit for purpose. This report begins by examining the origins and proliferation of CVE policies and the problems that have accompanied and continue to surround their development and implementation. We then examine CVE policy and practice across the three aforementioned international bodies. The final sections contain conclusions and recommendations stemming from our research, including a framework we have developed to analyze the legitimacy of national CVE policies through their impact on fundamental rights and democratic and pluralist aspirations.

Details: Amsterdam: Transnational Institute (TNI), 2018. 48p.

Source: Internet Resource: Accessed March 12, 2018 at: https://www.tni.org/files/publication-downloads/the_globalisation_of_countering_violent_extremism_policies.pdf

Year: 2018

Country: International

Keywords: Counter-Radicalization

Shelf Number: 149421


Author: PriceWaterhouseCoopers

Title: Pulling fraud out of the shadows: Global Economic Crime and Fraud Survey 1028

Summary: PwC's 2018 Global Economic Crime and Fraud Survey finds that 49% of global organisations say they've experienced economic crime in the past two years. But what about the other 51%? Have they avoided falling victim - or simply don't know about it? Since fraud hides in the shadows, one of the most powerful weapons in a fraudster's armoury is a lack of awareness within organisations. It's time for all businesses to recognise the true nature of the threat: not as just a nuisance or cost of doing business, but a shadow industry with tentacles in every country, sector and function

Details: s.l.: PWC, 2018. 29p.

Source: Internet Resource: Accessed March 12, 2018 at: https://www.pwc.com/gx/en/services/advisory/forensics/economic-crime-survey.html

Year: 2018

Country: International

Keywords: Corruption and Fraud

Shelf Number: 149430


Author: Institute for Economics and Peace

Title: Global Terrorism Index 2017: Measuring and understanding the impact of terrorism

Summary: This is the fifth edition of the Global Terrorism Index (GTI). The report provides a comprehensive summary of the key global trends and patterns in terrorism over the last 17 years in covering the period from the beginning of 2000 to the end of 2016. The GTI is produced by the Institute for Economics & Peace (IEP) and is based on data from the Global Terrorism Database (GTD). Data for the GTD is collected and collated by the National Consortium for the Study of Terrorism and Responses to Terrorism (START); a Department of Homeland Security Centre of Excellence led by the University of Maryland. The GTD is considered to be the most comprehensive global dataset on terrorist activity and has now codified over 170,000 terrorist incidents. The 2017 GTI report highlights a turning point in the fight against radical Islamist extremism. The main positive finding shows a global decline in the number of deaths from terrorist attacks to 25,673 people, which is a 22 per cent improvement from the peak in 2014. Terrorism has fallen significantly in the epicentres of Syria, Pakistan, Afghanistan and Nigeria, which are four of the five countries most affected by terrorism. The ten countries with the largest improvements experienced 7,348 fewer deaths while the 10 countries with the largest deteriorations experienced only 1,389 terrorism deaths. This highlights the strength of the positive trend with the number of people killed by terrorism decreasing for the second successive year. The largest improvement occurred in Nigeria where terrorism deaths attributed to Boko Haram decreased by 80 per cent in 2016. However, counteracting this, was the number of terrorism deaths attributed to ISIL, which increased by 49 per cent in 2016. The majority of these deaths occurred in Iraq, which accounted for 40 per cent of the increase. ISIL has suffered major battlefield defeats and in sign of its desperation has increased the number of suicide attacks and terrorist attacks on civilians. The group has now been pushed out of most of Iraq and at time of writing no longer controls any major urban centres in the country. However, while the global numbers of deaths and attacks improved in 2016, other trends are disturbing. More countries experienced at least one death from terrorism. This is more than at any time in the past 17 years and reflects an increase from 65 countries in 2015 to 77 in 2016. Two out of every three countries in the Index, or 106 nations, experienced at least one terrorist attack. This is an increase from 95 attacks in the prior year and resulted in the overall global GTI score deteriorating by four per cent since 2015. Aside from the increase in terrorism in Iraq, which is related to ISIL's tactics to delay its defeat, the next largest increases were much smaller. These smaller increases occurred in South Sudan, Turkey, Ethiopia and the Democratic Republic of Congo although it should be noted that the majority of Turkey's terrorism is not related to ISIL. The major battlefield defeats of ISIL in Iraq and Syria in the 18 months prior to June 2017 signalled the beginning of the end of the group's long term territorial ambitions and military strength. As the group has lost territory, it has also suffered a significant loss of revenue, which is estimated to have declined threefold between 2015 and 2016. This decline in revenue is likely to continue throughout the remainder of 2017 and into 2018. Due to its territorial losses, the group has a dramatically smaller revenue base from tax collections with much of its oil deposits also either lost or destroyed. As its battlefield losses have intensified, many foreign and domestic fighters have deserted and sought to return to their countries of origin. These developments fundamentally undermine the group's ability to recruit based on its existing marketing strategy and brand, which has been partly centred on an image of invincibility. More troubling, is the potential for many hardened fighters and leaders to leave Iraq and Syria to join new radical permutations of ISIL or existing ISIL affiliates in other countries. This has contributed to a continuation of last year's trend of an expansion of ISIL expanded activities into other countries. However while the number of countries that suffered an ISIL directed attack increased from 11 in 2015 to 15 in 2016, six fewer countries suffered an attack from an ISIL affiliated group. The major challenge facing post-conflict Iraq will be whether the government can build a more inclusive society and address the grievances that have fuelled sectarian violence and terrorist activity. There still remain large supplies of small arms and weapons as well as many former combatants and radicalised individuals. The decline of Boko Haram following interventions from the Multinational Joint Task Force has contributed to an 80 per cent fall in the number of deaths caused by the group in 2016. Consequently there were substantial improvements in the GTI ranking of Nigeria, Cameroon, Niger and Chad. This coincided with the splintering of the group into three separate groups although Nigeria will likely continue to face challenges as 13 separate groups undertook attacks in 2016. This includes attacks in the Niger Delta, as well as by Fulani extremists in the Middle Belt. The picture in Afghanistan is more complex. While the Taliban reduced their use of terrorist tactics in 2016, especially against civilians, the group stepped up their conventional armed conflict with the government. The Taliban was responsible for nearly 18,000 battle-related deaths in 2016, which is nearly 700 more than in 2015. This is the most since the war commenced in 2001. Consequently, the group expanded its direct territorial control and as of April 2017 controlled at least 11 per cent of the country and contested at least 29 per cent of Afghanistan's 398 districts. In Europe and other developed countries, ISIL's activity was the main driver for a continuation of a negative trend. The year 2016 was the most deadly for terrorism for OECD member countries since 1988; although this analysis excludes the September 11 attacks. However, ISIL's diminishing capacity has coincided with positive trends in the first half of 2017 with the number of deaths dropping to 82 compared to 265 deaths in 2016; although this analysis excludes Turkey and Israel. Since 2014, 75 per cent of terrorist deaths in OECD countries have been ISIL directed or inspired. Associated with this trend was a change in terrorist tactics used in OECD countries. Since 2014, there has been a general shift towards simpler attacks against non-traditional and softer civilian targets. ISIL inspired attacks also increased to 68 in 2016 from 32 in 2015. A greater number of attacks were foiled by security services with half of the attacks using bombs and explosives thwarted. Two years ago, only a third of these types of attacks were foiled by security services. These more sophisticated types of attacks involve more people and planning, and therefore are more likely to be detected. Less sophisticated attacks that can be executed at lower cost can be more difficult to detect. It should be noted the 2016 levels of terrorism in OECD counties is not without precedence. Since 1970 there have been nearly 10,000 deaths from terrorism in OECD countries, excluding Turkey and Israel, with 58 per cent of these deaths occurring prior to 2000. ISIL is only the fourth most deadly group and accounts for 4.7 per cent of terrorist deaths in OECD countries since 1970. Separatist groups such as Irish separatists (IRA) and Basque nationalists (ETA) have killed over 2,450 people since 1970, accounting for 26 per cent of the total deaths from terrorism since 1970. The 2017 report highlights how terrorism remains unevenly spread throughout the world. Central America and the Caribbean continues to be the least affected region. There were only 12 deaths recorded in 2016, which accounts for less than 0.4 per cent of all terrorism deaths. Meanwhile, 94 per cent of all terrorist deaths are located in the Middle-East and North Africa, sub-Saharan Africa and South Asia. When examining the drivers of terrorism the presence of armed conflict, political violence by governments, political exclusion and group grievances remain critical factors. The analysis finds that 99 per cent of all deaths over the last 17 years has been in countries that are either in conflict or have high levels of political terror. Political terror involves extrajudicial killings, torture and imprisonment without trial. This shows that the great majority of terrorism is used as a tactic within an armed conflict or against repressive political regimes. It also demonstrates the risks of political crackdowns and counterterrorism actions that can exacerbate existing grievances and the drivers of extremism and terrorism. Both Egypt and Turkey recorded substantially higher levels of terrorism following government crackdowns. The global economic impact of terrorism in 2016 was slightly lower than 2015 although it still cost the global economy US$84 billion. While this is a significant number in its own right, it is important to note that the economic impact of terrorism is small compared to other major forms of violence. This amount is only one per cent of the total global economic impact of violence, which reached $14.3 trillion in 2016. However, the figures for terrorism are conservative as they do not account for the indirect impacts on business, investment and the costs associated with security agencies in countering terrorism. As a result, terrorism is one of the few categories of violence where the costs associated with containment likely exceed its consequential costs. However, while the economic impact of terrorism is small it is still critical to contain it as it has the potential to spread quickly and with major social ramifications.

Details: New York: Institute for Economics & Peace, 2018. 120p.

Source: Internet Resource: Accessed March 12, 2018 at: http://visionofhumanity.org/app/uploads/2017/11/Global-Terrorism-Index-2017.pdf

Year: 2018

Country: International

Keywords: Extremist Groups

Shelf Number: 149443


Author: Barker, Cat

Title: Oversight of intelligence agencies: a comparison of the 'Five Eyes' nations

Summary: Executive summary - Australia, Canada, New Zealand, the United Kingdom and the United States each have some combination of parliamentary/congressional, independent and judicial oversight of their intelligence agencies, in addition to accountability through the executive branch. However, there are differences in the nature and scope of each of those components. - The six agencies comprising the Australian intelligence community are overseen by a parliamentary committee that examines their administration and expenditure and an independent Inspector-General of Intelligence and Security, who examines the legality and propriety of their activities. Most of the agencies' activities and powers are authorised by the responsible ministers. A review completed in June 2017 recommended that the remits of the committee and the Inspector-General be expanded to include four additional agencies, and that the Inspector-General's resources be significantly increased. - Canada has passed legislation creating a committee of parliamentarians to review the policy, administration, finance and operations of Canada's national security and intelligence community. At present, only two agencies are subject to dedicated independent expert review for lawfulness. Canada's national police force, which has responsibility for investigating security offences, is subject to independent expert review. However, this review is limited to handling public complaints about police officer conduct and, with the consent of the Public Safety Minister, undertaking public interest studies of specified activities. A Bill has been introduced that would create a single expert review body mandated to investigate complaints made in relation to the activities of three agencies and to examine the lawfulness, reasonableness and necessity of all national security and intelligence activities undertaken in the federal government. The Bill also proposes the creation of an Intelligence Commissioner to give final approval to certain activities undertaken by Canada's signals intelligence and security intelligence agencies. - New Zealand's Intelligence and Security Act 2017 replaces the four acts that previously applied to the two intelligence and security agencies and their oversight bodies, and implements recommendations from the first periodic review of the agencies. The agencies are overseen by a parliamentary committee, which scrutinises their policies, administration and expenditure, and an independent Inspector-General of Intelligence and Security who ensures that the agencies act with propriety and operate lawfully and effectively. Intelligence warrants may be issued by a responsible minister either solely, or jointly with a Commissioner of Intelligence Warrants. - In the United Kingdom, the main focus of the Intelligence and Security Committee is to oversee the expenditure, administration, policies and (with some limitations) operations of the three key intelligence agencies, though it has scope to examine the work of other intelligence, security and law enforcement agencies too. The Investigatory Powers Commissioner provides independent oversight of the use of intrusive powers by the three key intelligence agencies. The Commissioner, along with several judicial commissioners, is required to keep under review the exercise by public bodies of various statutory functions, and may be directed by the Prime Minister to review any other functions of the three key intelligence agencies. Legislation has been passed under which warrants, currently issued by ministers, will only come into force after being reviewed by a judicial commissioner. The Investigatory Powers Tribunal investigates complaints about public bodies' use of investigatory powers. - The United States intelligence community comprises 17 executive branch entities. Congressional oversight of the intelligence community is spread across several committees, including specialised committees on intelligence in the House and the Senate. While each has some limits on what it may examine, taken collectively the committees have the ability to inquire into all of the intelligence-related activities of the US Government. The Executive Office of the President houses several key mechanisms for overseeing the intelligence community, including the President's Intelligence Advisory Board and the Privacy and Civil Liberties Oversight Board. These are augmented by a network of Inspectors General and legal counsels. In addition to Inspectors General attached to specific agencies and departments, the Inspector General of the Intelligence Community conducts audits, inspections and investigations of cross-cutting programs and activities. The federal judiciary examines a wide range of intelligence activities under a number of laws, including the Constitution. Most notably, the Foreign Intelligence Surveillance Court reviews applications for warrants related to the collection of foreign intelligence by the US Government. - Despite differences in the approach taken, each of the five countries has developed a framework that includes a system of checks and balances that spans the various branches of government, and which aims to ensure that agencies are accountable for both their administration and expenditure and the legality and propriety of their activities. - The intelligence communities have evolved to meet new challenges as they arise, and will continue to do so. It will be important for the oversight arrangements to keep pace with such changes.

Details: Canberra: Australia Department of Parliamentary Services, 2017. 55p.

Source: Internet Resource: Research Paper Series, 2017-18: Accessed March 13, 2018 at: http://parlinfo.aph.gov.au/parlInfo/download/library/prspub/5689436/upload_binary/5689436.pdf

Year: 2017

Country: International

Keywords: Intelligence Gathering

Shelf Number: 149444


Author: Perkins, Chloe

Title: Personal security alarms for the prevention of assaults on healthcare workers: A systematic review

Summary: The Crime Survey of England and Wales (2014-2015) found health and social care associate professionals to be the occupational group most at risk of violence after those working in protective services, such as police officers. Over six per cent of health and social care professionals, which include most nurses, suffered one or more incident of violence at work in 2015-6. Personal security alarms comprise one measure to try to reduce violence against healthcare staff. A 2003 report from the National Audit Office identified a variety of security measures in place across NHS trusts. Panic alarm systems were used in 85% of trusts and were therefore, selected as the focus of this review. A Health & Safety Commission report outlined three types of alarm system all of which would be eligible for inclusion in the review: Panic button systems are part of an internal alert system, which often comprise hardwired buttons placed in locations where there is a high risk of violence or linked portable attack devices. Their activation triggers an alarm on a monitoring console. Personal security alarms range from simple 'shriek' devices, designed to shock or disorientate an attacker to give victims time to get away, to a component in a monitored system (as above). Complex personal alarm systems include personal alarms linked to fixed detection systems e.g. by radio or infra-red. Components may include panic buttons (linked to switch board and/or police) and portable personal devices (linked to central system with location information). Alarms are seldom the sole means used to try to prevent violence against staff in healthcare settings. The contexts in which alarms are employed differ widely in terms, for example, of the other violence prevention methods in use, clinical specialism, whether lone working is a factor, and the population served. This review targeted all studies that examined the use of any personal alarm interventions that were implemented to address the risks of violence and assault. The focus was primarily on studies relevant to NHS or healthcare setting, although evaluations of alarms used in other occupational settings were not excluded.

Details: London: UCL Department of Security and Crime Science, 2018? 41p.

Source: Internet Resource: Accessed March 15, 2018 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Pages/Personal-security.aspx

Year: 2018

Country: International

Keywords: Assaults

Shelf Number: 149480


Author: Amnesty International

Title: Body Politics: Criminalization of sexuality and reproduction

Summary: There is a long history of states criminalizing sexuality and reproductive decisions relating to health. Unfortunately, despite increasing attention paid to the protection of human rights in the last few decades, the criminalization fever shows no signs of cooling. In some areas this trend appears to have gained renewed strength. Throughout much of the Americas, for example, women and health professionals can be punished for seeking, obtaining or providing abortion services. In certain states in Africa, opportunistic politicians have pumped life into antiquated statutes or passed new laws punishing same-sex activity with dire penalties. Notably, this rush to criminalization is not limited to developing or least developed states. The last few years has also seen a rise in women in the USA being jailed for otherwise legal acts conducted during pregnancy, and in many rich and poor states alike, individuals can still be prosecuted for transmission of HIV. Criminalization of sexual and reproductive health-related activity, in particular, stands as a significant impediment to the realization of human rights, particularly the right to health. Although such criminalization is justified by some as a "public health" measure, in most cases it exacerbates the underlying public health concern by driving risk behaviour underground and preventing the provision of effective health services; contributing to preventable illness and death. Criminalization of consensual reproductive and sexual behaviours also violates autonomy, which is the foundation on which an individual's ability to realise their right to health is built. In addition to implicating human rights adversely, criminalization of sexuality and reproductive decisions engenders stigmatization, discrimination and even violence against people engaged in (or suspected of engaging in) the prohibited behaviour, which can further place the health of vulnerable people at risk. Indeed, the individuals facing punishment tend to be members of poor, marginalized and vulnerable groups, as opposed to wealthy individuals engaging in the same behaviour. Moreover, such criminalization affects not just those against whom the law is directed, but negatively impacts the rights of entire populations by giving states power to interfere with individuals' private decision-making and forcing people to conform to strict sexual and gender norms. Using the force of state machinery to achieve illegitimate aims relating to the public morality can further lead to an environment generally permissive of arbitrary arrests and detention, harassment, stigmatization, discrimination and violence. Such use of power also weakens respect for the rule of law. Unfortunately, all too often criminalization of sexual and reproductive decisions and behaviours can be a means to gain political support from voters, especially when the targets of such punitive regulation are politically disenfranchised or socially marginalized. It is therefore crucial to highlight the depth and extent of this problem and to empower activists worldwide to challenge laws directly or indirectly criminalizing sexual and reproductive decisions and behaviours. Amnesty International's Primer and Toolkit - Body Politics: Criminalization of sexuality and reproduction - is a timely, meaningful and welcome contribution that can enable activists to both comprehend and challenge illegitimate criminalization of sexuality and reproductive decisions. It is vital to understand the extent to which criminalization has permeated states today and the damage which is done by such measures masquerading as legitimate public health or public morality initiatives. This Primer details the major areas of concern and the harm which both direct and indirect criminalization inflict on an individual's human rights and the health of society as a whole. It is not enough, however, to simply understand the problem of criminalization of sexuality and reproductive decisions; steps must also be taken to challenge it. The Toolkit provides concrete campaigning techniques such as mapping stakeholder participation and power, identifying advocacy targets, and building capacity. The Training Manual can be used to build understanding and capacity around these issues for a range of audiences and activists.

Details: London: AI, 2018. 220p.

Source: Internet Resource: Accessed March 16, 2018 at: https://www.amnesty.org/download/Documents/POL4077632018ENGLISH.PDF

Year: 2018

Country: International

Keywords: Abortion

Shelf Number: 149485


Author: Buller, Ana Maria

Title: A Mixed-Method Review of Cash Transfers and Intimate Partner Violence in Low and Middle-Income Countries

Summary: There is increasing evidence that cash transfer (CT) programs decrease intimate partner violence (IPV); however, little is known about how CTs achieve this impact. We conducted a mixed method review of studies in low- and middle-income countries. Fourteen quantitative and nine qualitative studies met our inclusion criteria, of which eleven and six respectively demonstrated evidence that CTs decrease IPV. We found little support for increases in IPV, with only two studies showing overall mixed or adverse impacts. Drawing on these studies, as well as related bodies of evidence, we developed a program theory proposing three pathways through which CT could impact IPV: 1) Economic security and emotional wellbeing, 2) intra-household conflict, and 3) women's empowerment. The economic security and wellbeing pathway hypothesizes decreases in IPV, while the other two pathways have ambiguous effects depending on program design features and behavioural responses to program components. Future studies should improve IPV measurement, empirical analysis of program mechanisms, and fill regional gaps. Program framing and complementary activities, including those with the ability to shift intra-household power relations are likely to be important design features for understanding how to maximize and leverage the impact of CTs for reducing IPV, and mitigating potential adverse impacts.

Details: Florence: UNICEF Office of Research, 2018. 44p.

Source: Internet Resource: nnocenti Working Papers no. 2018-02, Accessed March 16, 2018 at: https://www.unicef-irc.org/publications/pdf/CT%20%20IPV_Review_Innocenti%20WP%202018-02.pdf

Year: 2018

Country: International

Keywords: Cash Transfers

Shelf Number: 149489


Author: Interpol

Title: Towards a Global Indicator on Unidentified Victims in Child Sexual Exploitation Material: Technical Report

Summary: This report presents the results of a two-part analysis of the multi-country data set contained in the International Child Sexual Exploitation (ICSE) Database housed at INTERPOL and of consultations with law enforcement personnel in relation to the identification of victims and offenders pictured in Child Sexual Abuse Material (CSAM) and Child Sexual Exploitation Material (CSEM) seized by law enforcement around the world. It forms one component of a larger programme of the ICSE Database enhancement activities financed by the European Union and carried out between 2016 and 2018 under the title International Child Sexual Exploitation (ICSE) database Connectivity and Awareness Raising Enhancements (I-CARE) Project. A ground-breaking cooperation between INTERPOL and ECPAT International, the study is broader in country coverage and possibly in other dimensions than any other previously analysed and publicly reported on. It responds to widespread recognition of the scarcity of reliable data and research on CSAM and CSEM to inform evidence-based policy and programmes to tackle the issue and protect children from online sexual exploitation and abuse across the world. It highlights the urgent need to develop representative international baselines of empirical data on the victimisation of children depicted in CSAM and CSEM, and to enhance the response by law enforcement agencies around the world to this problem. The analysis has been subject to a number of legal, institutional and ethical conditions, which have been duly and carefully considered, and which have been addressed in the exercise. Taken together, a comprehensive perspective on the overall database contents, and a mix of quantitative and qualitative findings from a selected sample of observations, has produced a broad range of findings, whose statistical validity has been confirmed by an expert reviewer. The study provides insight based on visual analysis of images and videos into the profile of unidentified child victims and their abusers, including age, gender, and type and severity of abuse, and further presents the results of analysis of case-related metadata for cases recorded as both identified and unidentified in the ICSE Database. It highlights the multi-faceted challenges presented to the law enforcement and child protection community by rapid evolutions in the means available for online child exploitation and abuse as a distinct subset of child sexual abuse and exploitation, and the increasingly complex role played by youth-produced sexual content in this landscape. Through analysis of confirmed and suspected locations of abuse as recorded in the ICSE Database, the study also considers the relationship between resource allocation for victim identification and rates of identification worldwide. The study acknowledges that there are qualitative limitations inherent in the multi-country and multi-user data set of the ICSE Database, but also highlights the unique nature of the data set resulting from this diverse user base. This in turn underlines the distinctive position and potential of the ICSE Database for further technological evolutions, country connections, and as a tool in victim identification efforts, and reinforces the usefulness the ICSE Database for further research and as focal point for future efforts to build a global indicator.

Details: Bangkok: ECPAT, 2018. 104p.

Source: Internet Resource: Accessed March 16, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/02/Technical-Report-TOWARDS-A-GLOBAL-INDICATOR-ON-UNIDENTIFIED-VICTIMS-IN-CHILD-SEXUAL-EXPLOITATION-MATERIAL.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149496


Author: Bowers, Kate J.

Title: Spatial displacement and diffusion of benefits among geographically focused policing initiatives

Summary: What happens to surrounding neighborhoods when more police are put in high crime areas? Do criminals just move to nearby neighborhoods or do the crime-fighting benefits spread? A systematic review of international research finds that increasing police presence in problem areas not only reduces crime in those areas, but can also lead to less crime in nearby areas. A common criticism of focused policing efforts (such as hotspots policing, 'crackdowns', or problem-oriented policing) is that it does not address the root causes of crime; criminals just move to another neighborhood. This is known as 'crime displacement'. Criminal activity can in fact shift in a number of different ways. It can move from one neighborhood to another, the time of day crime occurs can change, different targets may be chosen, how the crime is commited may change (e.g. breaking windows versus picking locks). There can be changes in the type of offences committed and in the people engaging in crime (new offenders replace old). In theory, these kinds of changes in criminal activity can cancel out the benefits of increased police efforts in problem areas. It has also been argued, however, that increasing police presence in one area can have positive effects for nearby areas. There can be a 'bonus effect' of a reduction in crime in nearby neighborhoods. It is important to consider both negative and positive side effects of focused policing when deciding on policing strategies. This review includes 44 studies. The majority of the studies are from the USA (30) but studies from the United Kingdom (10) Sweden (3) and Australia (1) are also included. Each study evaluates a focused policing intervention which was limited to a physical area (smaller than a city/region), uses some quantitative measure of crime, and reports original research findings. The studies evaluate a broad range of interventions implemented in different contexts, including Problem-Orientated Policing (12), Police Crackdowns (10), Police Patrols (7), Community-oriented policing (5) and Hotspot policing (4). This review focuses on two primary outcomes: the effect of focused policing on crime levels in the target neighborhood; and the effect of focused policing on nearby neighborhoods. A meta-analysis of sixteen studies to examine the effect on the target neighborhood shows that focused policing reduces crime in the target neighborhood. The evidence also indicates that when focused policing is implemented, crime levels change in nearby areas more than would be expected if there was no focused policing in the target neighbourhood. The weight of the evidence shows that crime is reduced in these areas. This suggests that focused policing is more likely to result in a spread of crime control benefit than simply moving criminals to the closest neighbourhood.

Details: Oslo: Campbell Collaboration, 2011. 147p.

Source: Internet Resource: Campbell Systematic Reviews, 2011:3: Accessed March 19, 2018 at: https://www.campbellcollaboration.org/library/geographically-focused-policing.html

Year: 2011

Country: International

Keywords: Crime Displacement

Shelf Number: 149524


Author: Environmental Investigation Agency (EIA)

Title: Forests: A Tale of Two Laws

Summary: It is rare that two pieces of landmark environmental legislation on two continents are simultaneously strengthened, broadened in scope and significantly harmonised without any changes to the underlying legal texts. This report explores new legal analysis by the Environmental Investigation Agency (EIA) that outlines existing but previously unrecognised risks and liabilities under the USA's Lacey Act in relation to the EU Timber Regulation (EUTR). Over the past year, EIA has both identified and explored the previously unrealised fact that the US Lacey Act prohibits timber which has been sold in violation of any foreign law protecting plants and that the EUTR is such a 'foreign law'. In turn, EIA analysis concludes that placing wood on the EU market in violation of the EUTR is a predicate offense under Lacey and that wood sold in violation of the EUTR is, by definition, contraband under US law. Further, because the Lacey Act regulates all products containing wood, any product containing wood that was placed on the EU market in violation of the EUTR is contraband under Lacey. The insight has significant implications, extending legal and/or commercial risks and liabilities to virtually all actors in the entire supply chain of any type of product incorporating timber traded from the EU to the US. As this briefing describes, these liabilities now extend to companies not even regulated by either the EUTR or Lacey, resulting in the intent of these laws - embedding Due Diligence and Due Care into company procurement decisions - being more likely to be applied by a far larger source of timber demand in both markets. The newly recognised reciprocity between Lacey and EUTR presents historic opportunities and incentives to remove or reduce the impact of weaknesses in both, making them more powerful incentives for timber traders and manufacturers using wood to screen out high-risk and illegal timber. The need to reinforce the EUTR certainly exists. In 2016, EIA exposed widespread violations of the EUTR by companies supplying high-grade teak to Europe's superyacht and megayacht industries. While this promoted widespread albeit belated enforcement, the process also revealed persistent failures to implement the law in key member states, weaknesses in the law itself and the limited will or ability of the private sector in the EU to avoid wood placed in violation of EUTR. These failings in turn resulted in considerable volumes of wood recognised to have been placed in violation of the EUTR not being prevented from entering into and passing through the EU supply chain unhindered. As a result, in 2017 EIA submitted detailed information to US Lacey Act enforcement officials regarding superyachts imported into the US from two UK companies. While presenting opportunities for enhanced enforcement and the maintenance of the rule of law, the legitimate interests of EU and US companies that use wood but are not regulated by the EUTR need to be suitably protected through the provision of timely information on EUTR enforcement. This briefing makes recommendations regarding how to do this without undermining the legal opportunities this new interpretation of existing laws creates.

Details: London: EIA, 2018. 20p;

Source: Internet Resource: Accessed March 26, 2018 at: https://drive.google.com/viewerng/viewer?url=https://eia-international.org/wp-content/uploads/A-Tale-of-Two-Laws-FINAL.pdf

Year: 2018

Country: International

Keywords: Deforestation

Shelf Number: 149563


Author: Van Der Lijn, Jair

Title: Multilateral peace operations and the challenges of organized crime

Summary: Multilateral peace operations are increasingly confronting a set of interrelated and mutually reinforcing security challenges that are relatively new to them, that do not respect borders, and that have causes and effects which cut right across the international security, peacebuilding and development agendas. As a result, the New Geopolitics of Peace Operations III: Non‑Traditional Security Challenges initiative seeks to enhance understanding about peace operations and non-traditional security challenges such as terrorism and violent extremism, irregular migration, piracy, organized crime and environmental degradation. As a part of this initiative, this SIPRI Background Paper explores the 'non-traditional' security challenges that organized crime presents to multilateral peace operations. The challenges of organized crime may be of direct or indirect relevance to multilateral peace operations. Directly, it may behave as a spoiler or evade peace processes. Indirectly, it may decrease the effectiveness of peace operations, particularly long term, contributing to the continued fragility of countries and their peace processes in its role as partner. Based on this understanding, this SIPRI Background Paper explores the role that peace operations play in preventing and combating organized crime, particularly in weak or collapsed states.

Details: Solna, Sweden: Stockholm International Peace Research Institute, 2018. 16p.

Source: Internet Resource: SIPRI Background Paper: Accessed March 26, 2018 at: https://www.sipri.org/sites/default/files/2018-02/bp_1802_pko_ngp_iii_no._2_1.pdf

Year: 2018

Country: International

Keywords: Environmental Crimes

Shelf Number: 149564


Author: Gramckow, Heike P.

Title: Addressing the Enforcement Gap to Counter Crime: Part 1. Crime, Poverty and the Police

Summary: Crime and violence impede development and disproportionally impact poor people in many countries across the world. Though crime and violence represent serious problems in many countries, less-developed countries experience particular concentrations, especially those that are characterized by fragile or less-trusted government institutions and pervasive insecurity. Under such circumstances, human, social, political, and economic development suffers. Research across the globe has shown that holistic approaches that focus on the entire spectrum of a government's crime response chain, ranging from crime prevention to enforcement, tend to have better outcomes than isolated interventions involving only the police or other individual government agency. To date, most of the Bank's investment in efforts to reduce crime have focused on crime prevention in the form of urban and social development programs. Investment and policy lending that support the improvement of police operations to reduce crime and develop stronger neighborhoods are more limited. To assist country teams and client counterparts in their efforts to develop effective, holistic responses against crime that include the police, justice reform staff in the Governance Global Practice teamed up with internationally recognized experts to compile evidence-based good practice information for developing effective police responses to crime. The resulting three part publication, titled Addressing the Enforcement Gap to Counter Crime: Investing in Public Safety, the Rule of Law and Local Development in Poor Neighborhoods outlines the impact of crime and violence on development and the poor in particular and explains a proven three-pronged approach to creating police agencies that work in collaboration with communities and other government and private service providers to identify crime problems, develop holistic and inclusive solutions the apply a restorative justice approach. The publication also outlines how such approach can be integrated into Bank projects and client country reform plans.

Details: Washington, DC: World Bank Group, 2016. 58p.

Source: Internet Resource: Accessed March 26, 2018 at: https://elibrary.worldbank.org/doi/abs/10.1596/24416

Year: 2016

Country: International

Keywords: Development and Crime

Shelf Number: 149567


Author: Gramckow, Heike P.

Title: Addressing the Enforcement Gap to Counter Crime: Part 2: Options for World Bank Engagement with Police

Summary: The first volume of this report examined the implications of socially disorganized communities on the continued spread of violence and crime, as well as the ways that police services can become engaged to rebuild their legitimacy, improve community safety, and restore support for the law. Criminologists have long recognized a connection between crime, violence, and social disorder on the one hand and marginalization on the other, whether of communities or individuals. Environmental theories of crime suggest that people who live in socially disorganized communities, where local informal social control has become frayed and the community is unable to effectively supervise individual behavior, are less able to address crime and disorder problems and must rely instead on the formal apparatus of the state, including the police and the wider justice system, to help protect community safety. Absent a constructive police response, however, these communities often spiral downward into more disorder and crime, sometimes leaving them controlled or overseen by criminal organizations or gangs and thus further undermining inclusive development and the rule of law. Research on police practices in these communities suggests that the police can exacerbate community problems by failing to support legitimate community leaders. They can also impede community building efforts by demonstrating indifference to community problems and/or participating in corrupt practices. Moreover, it is clear worldwide that poor communities in particular feel the brunt of crime and violence (Haugen and Boutros 2014) and that their vulnerability to crime and violence inhibits the very measures that would help pull these communities out of their desperate situation. Without safety and security interventions in violence-prone communities, other development assistance in sectors such as education, public health, and so forth are blunted by the all-consuming insecurity and fear of victimization that crime and violence cause. Recognizing the critical link between security and the ability to achieve its twin goals of eradicating extreme poverty and contributing to shared prosperity, the World Bank has increased efforts to support programs that aim to prevent violence and promote citizen safety. The 2011 World Development Report (WDR) already positioned security as a critical development issue, with a corresponding operationalization plan. Other corporate measures have included guidance for staff on the Bank's engagement in criminal justice activities; the creation of a Criminal Justice Resource Group (CJRG) that spans several Global Practices; and the generation of knowledge on various aspects of violence prevention and criminal justice reform. The extent of crime, violence, and corruption, as well as governments' capacities and efforts to deal with these issues, are all elements of the Bank's Country Policy and Institutional Assessment (CPIA) for International Development Association (IDA) countries, and the cost of crime to the business community is weighed in the Bank's World Development Indicators. With an increasing focus on urbanization, and urban upgrading in particular, the World Bank's clients are demanding greater investment in violence prevention, urban safety, and citizen security. Not surprisingly, the Systematic Country Diagnostics (SCDs) of a number of Central American and other countries, including Liberia, Madagascar, and Papua New Guinea, have recognized the substantial impediment to development that crime and violence represent. According to an informal 2013 portfolio review, the Bank's lending, technical assistance, and analytical services in citizen security and interpersonal violence prevention amounted to approximately US$276 million in that year. This spans activities ranging from violence monitoring and municipal planning to implement citizen security strategies, to crime prevention through urban upgrading, school-based violence prevention, and support for criminal justice reform. Added to this are the Development Policy Loans (DPLs) of US$2.7 billion that contain violence prevention and citizen security prior actions or policy pillars in Brazil, Colombia, and Honduras. This increasing demand, together with the restructuring of the World Bank into 14 Global Practices, provides an unprecedented opportunity to consolidate programming that addresses violence and citizen security into integrated strategic solutions rather than through sector-specific interventions. The 2012 legal opinion clarifying the scope of the Bank's criminal justice work in a development context has also created the necessary space for the Bank to engage in a wide range of interventions, with only a few exceptions, if the appropriate risk management approach is part of the design, that is, if one recognizes that sometimes the option not to engage can be even more harmful to the client country. Crime prevention activities, especially as part of broader sector work in urban planning and social development, have gained traction in the Bank's lending portfolio. The piece that is most often missing, however, is support for reform of policing efforts in crime-ridden neighborhoods.

Details: Washington, DC: World Bank Group, 2016. 44p.

Source: Internet Resource: Accessed March 26, 2018 at: http://documents.worldbank.org/curated/en/196771468001493442/pdf/105089-WP-PUBLIC-Crime-and-Enforcement-Part-2.pdf

Year: 2016

Country: International

Keywords: Crime Prevention

Shelf Number: 149568


Author: Symantec

Title: Internet Security Threat Report. Volume 23

Summary: From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources. With each passing year, not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so. Coin mining attacks explode Cyber criminals who have been firmly focused on ransomware for revenue generation are now starting to explore other opportunities. During the past year, the astronomical rise in crypto currency values inspired many cyber criminals to shift to coin mining as an alternative revenue source. This coin mining gold rush resulted in an 8,500 percent increase in detections of coinminers on endpoint computers in 2017. With a low barrier of entry-only requiring a couple lines of code to operate-cyber criminals are using coin miners to steal computer processing power and cloud CPU usage from consumers and enterprises to mine crypto currency. While the immediate impact of coin mining is typically performance related-slowing down devices, overheating batteries, and in some cases, rendering devices unusable-there are broader implications, particularly for organizations. Corporate networks are at risk of shutdown from coin miners aggressively propagated across their environment. There may also be financial implications for organizations who find themselves billed for cloud CPU usage by coin miners. As malicious coin mining evolves, IoT devices will continue to be ripe targets for exploitation. Symantec already found a 600 percent increase in overall IoT attacks in 2017, which means that cyber criminals could exploit the connected nature of these devices to mine en masse. Despite the Eternal Blue exploit wreaking havoc in 2017, the reality is that vulnerabilities are becoming increasingly difficult for attackers to identify and exploit. In response to this, Symantec is now seeing an increase in attackers injecting malware implants into the supply chain to infiltrate unsuspecting organizations, with a 200 percent increase in these attacks-one every month of 2017 as compared to four attacks annually in years prior. Hijacking software updates provides attackers with an entry point for compromising well-protected targets, or to target a specific region or sector. The Petya/NotPetya (Ransom.Petya) outbreak was the most notable example: After exploiting Ukrainian accounting software as the point of entry, Petya/ NotPetya used a variety of methods, spreading across corporate networks to deploy the attackers' malicious payload. When viewed as a business, it's clear that ransomware profitability in 2016 led to a crowded market, with overpriced ransom demands. In 2017, the ransomware 'market' made a correction with fewer ransomware families and lower ransom demands-signaling that ransomware has become a commodity. Many cyber criminals may have shifted their focus to coin mining as an alternative to cash in while crypto currency values are high. Some online banking threats have also experienced a renaissance as established ransomware groups have attempted to diversify. Last year, the average ransom demand dropped to $522, less than half the average of the year prior. And while the number of ransomware variants increased by 46 percent, indicating the established criminal groups are still quite productive, the number of ransomware families dropped, suggesting they are innovating less and may have shifted their focus to new, higher value targets Symantec has found that overall targeted attack activity is up by 10 percent in 2017, motivated primarily by intelligence gathering (90 percent). However, a not-so-insignificant 10 per cent of attack groups engage in some form of disruptive activity. The 'living off the land' trend continues with attack groups opting for tried-and-trusted means to infiltrate target organizations. Spearphishing is the number one infection vector, employed by 71 percent of organized groups in 2017. The use of zero days continues to fall out of favor. In fact, only 27 percent of the 140 targeted attack groups that Symantec tracks have been known to use zero-day vulnerabilities at any point in the past. Threats in the mobile space continue to grow year-over-year. The number of new mobile malware variants increased by 54 percent in 2017, as compared to 2016. And last year, an average of 24,000 malicious mobile applications were blocked each day. While threats are on the increase, the problem is exacerbated by the continued use of older operating systems. In particular, on Android, only 20 percent of devices are running the newest major version and only 2.3 percent are on the latest minor release. Mobile users also face privacy risks from grayware, apps that aren't completely malicious but can be troublesome. Symantec found that 63 percent of grayware apps leak the device's phone number. With grayware increasing by 20 percent in 2017, this isn't a problem that's going away.

Details: Mountain View, CA: Symantic, 2018. 87p.

Source: Internet Resource: Accessed March 27, 2018 at: https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-summary-en.pdf

Year: 2018

Country: International

Keywords: Computer Crimes

Shelf Number: 149586


Author: Mendel, William

Title: SOF Role in Combating Transnational Organized Crime

Summary: In April 2015, military and civilian personnel from Canada, Mexico, and the United States came together at Colorado Springs, Colorado, for a symposium hosted by U.S. Special Operations Command-North and facilitated by Joint Special Operations University (JSOU) and Canadian Special Operations Forces Command (CANSOFCOM). Their task was to examine the role of Special Operations Forces (SOF) in combating transnational organized crime (TOC). After opening remarks by Rear Admiral Kerry Metz, a U.S. Navy SEAL and SOCNORTH commander, the panelists and plenary participants set to work considering a wide range of issues attending to the TOC threat. Symposium panelists and speakers synthesized the results of their research and panel discussions about TOC, and these are found in the chapters of this report of proceedings, The SOF Role in Combating Transnational Organized Crime. So what is TOC? President Obama in his strategy to counter TOC advances this description: Transnational organized crime refers to those self-perpetuating associations of individuals who operate transnationally for the purpose of obtaining power, influence, monetary and/or commercial gains, wholly or in part by illegal means, while protecting their activities through a pattern of corruption and/or violence, or while protecting their illegal activities through a transnational organizational structure and the exploitation of transnational commerce or communication mechanisms. The United Nations (UN) defines TOC as a: structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences - in order to obtain, directly or indirectly, a financial or other material benefit. Douglas Farah, author and veteran analyst of financial crime, armed groups, and TOC, focuses upon TOC as drug trafficking, money laundering, and human trafficking, plus trafficking in weapons of mass destruction. Compiling a complete list of TOC activities is challenging.

Details: Miami: Joint Special Operations University Press, 2016. 204p.

Source: Internet Resource: Accessed March 27, 2018 at: http://cco.ndu.edu/Portals/96/Documents/books/JSOU%20SOF/JSOU16_MendelMcCabe_CTOC_final.pdf

Year: 2016

Country: International

Keywords: Drug Trafficking

Shelf Number: 149593


Author: KnowTheChain

Title: Food and Beverage Benchmark Findings Report. How are 20 of the largest companies addressing forced labor in their supply chains?

Summary: According to the International Labour Organization (ILO), an estimated 21 million people are victims of forced labor around the world. As defined by the ILO, forced labor refers to "situations in which persons are coerced to work through the use of violence or intimidation, or by more subtle means such as accumulated debt, retention of identity papers or threats of denunciation to immigration authorities." The agricultural sector alone (including forestry and fishing) generates an estimated US$9 billion in illegal profits from forced labor each year.1 The food and beverage industry is an at-risk sector. Forced labor occurs both in the production of raw materials and during the food processing stages of food and beverage companies' supply chains. Food commodities are produced by agricultural workers who often come from vulnerable groups such as women, international migrants, and internal migrants with little education. Weak labor laws and law enforcement in the sector, together with isolated workplaces where housing tends to be provided by the employer, aggravate the typically poor working conditions and can leave workers vulnerable and dependent on their employer. Evidence of forced labor can be found in numerous commodities and countries, such as rice from India or sugar from Brazil. Much of the recent media attention has focused on Thailand, and Thai companies are not only facing scrutiny on using forced labor in the seafood industry, but also in poultry production, for which the EU is the biggest export market. Fourteen workers who escaped a Thai poultry farm in 2016 reported abusive supervisors, long working hours, were only allowed to leave the farm for two hours a week under supervision, and sometimes were forced to sleep next to hatchlings.2 Forced labor is a global occurrence and also occurs in Western countries-it is linked to food products including strawberries from Germany, apples from the United Kingdom, and tomatoes from the United States.3 In fact, the Coalition of Immokalee Workers, a worker-based human rights organization, estimates that approximately 5% of all farm workers in the US are victims of forced labor, the majority of whom are migrant workers from Mexico, Guatemala, and Haiti. Workers are held against their will, forced to work for little or no pay, with their work and commute taking up at least 12 hours a day. Suppliers and retailers alike face significant business risks due to forced labor. These include operational risks (such as having to discontinue supplier contracts due to public pressure, reputational risk incurred from negative publicity) and legal and regulatory risks (such as lawsuits from employees, customers, and other stakeholders). For example, in early 2016 the Thai tuna processing factory Golden Prize Tuna Canning paid Myanmar migrant workers US$1.3 million compensation for labor abuses.4 At the same time, companies-particularly consumer-facing brands-can benefit from a proactive stance on eliminating forced labor in their supply chains in terms of reputation, reduced operational and regulatory risks, and employee motivation. There is growing global momentum in both soft and hard law requiring companies to address forced labor risks in their supply chains and disclose their efforts in this respect. The UN Guiding Principles on Business and Human Rights have established that businesses have a responsibility to respect human rights, including through business relationships. The UN Sustainable Development Goals also address the issue: Goal 8 includes the objective to "take immediate and effective measures to eradicate forced labor [and] end modern slavery and human trafficking." Regulatory requirements include the California Supply Chains Transparency Act and the Modern Slavery Act in the United Kingdom. Access to government contracts is increasingly linked to provisions on forced labor, with both the US and Dutch governments having put provisions for government contractors in place in 2012. The ILO's legally binding Protocol on Forced Labour, which was adopted in 2014 and requires states to prevent and remedy forced labor, has been ratified by eight ILO member countries with more to come.5 Overall, progress in the food and beverage industry to address supply chain labor issues such as forced labor has been slow. In the 2016 update of its Behind the Brands campaign, Oxfam found that, in contrast to areas such as climate change or land rights, "[t]he Big 10 [food and beverage companies] have barely shown any improvement [from 2013] on the issue of labor rights in their supply chains." Companies in this sector have been less responsive to KnowTheChain than companies in the Information and Communications Technology and Apparel & Footwear sectors. Nevertheless, the sector is starting to recognize its impacts and several sectoral initiatives have recently pledged to address forced labor. In December 2015, Australian retailers signed a pledge to address forced labor in their supply chains; in January 2016, the Consumer Goods Forum published a resolution to develop an action plan to eradicate forced labor; and in May 2016, AIM-PROGRESS publicly committed to support the implementation of this resolution. Further, investors have started to engage investee companies in the sector in recent years. For example, as part of its "No Fees" Initiative, members of the US faith-based investor network Interfaith Center on Corporate Responsibility have held dialogues on modern slavery with companies sourcing palm oil and seafood, both retailers and manufacturers in the food sector. Another example is a group of global investors coordinated by the UN-supported Principles for Responsible Investment which have been engaging food companies on supply chain labor issues.

Details: San Francisco: KnowTheChain, 2016. 28p.

Source: Internet Resource: Accessed March 28, 2018 at: https://knowthechain.org/wp-content/plugins/ktc-benchmark/app/public/images/benchmark_reports/KTC_Food_Beverage_Findings_Report_October.pdf

Year: 2016

Country: International

Keywords: Forced Labor

Shelf Number: 149604


Author: Latchford, Lia

Title: Young people who sexually harm peers in groups: A Rapid Evidence Assessment of International Literature

Summary: This literature review was conducted by the University of Bedfordshire to develop an evidence base on young people who sexually harm in groups, by synthesising existing literature on group harmful sexual behaviour (HSB), wider group offending and group interventions. Using a Rapid Evidence Assessment (REA) methodology, the review addresses the following research objectives:  Provide a critical overview and synthesis of existing literature on harmful sexual behaviour, group offending and group interventions and what this means for practice  Identify the gaps and limitations in existing research on young people who sexually harm peers in groups  Consider how existing evidence could be applied and built upon to respond to young people who sexually harm peers in groups The literature was identified, screened, coded, and synthesised to draw out the following key findings:  There is a limited evidence-base focused on young people who display harmful sexual behaviour within a group context. The majority of literature is located in the USA and the Netherlands, with fewer studies generated from other parts of Europe  Young people who sexually harm in a group context have a mixed profile with a range of individual characteristics and situational contexts that differ between young people  Group harmful sexual behaviour, like broader group offending, is found to peak during adolescence and decline into adulthood  Peer influence, group pressure and group dynamics impact on young people who sexually harm, and engage in wider offending behaviour, within a group context. Group roles are flexible and may change from one situation to another  The literature did not identify existing interventions that work to respond to group harmful sexual behaviour The literature review concludes that there is scope to explore adaptations to Multisystemic Therapy (MST) and interventions such as detached youth work, that work with young people in their own environments, to begin to address group-based harmful sexual behaviour. The review suggests that it may be useful to equip practitioners who already work with young people in a group context, with the skills to respond specifically to group-based harmful sexual behaviour and to appropriately safeguard those affected.

Details: Bedfordshire, UK: University of Bedfordshire, International Centre Researching Child Sexual Exploitation, Violence and Trafficking, 2016. 21p.

Source: Internet Resource: Accessed March 30, 2018 at: https://contextualsafeguarding.org.uk/assets/documents/IC-literature-review-on-group-HSB.pdf

Year: 2016

Country: International

Keywords: Group Offending

Shelf Number: 149619


Author: Medina, Leandro

Title: Shadow Economies Around the World: What Did We Learn Over the Last 20 Years?

Summary: We undertake an extended discussion of the latest developments about the existing and new estimation methods of the shadow economy. New results on the shadow economy for 158 countries all over the world are presented over 1991 to 2015. Strengths and weaknesses of these methods are assessed and a critical comparison and evaluation of the methods is carried out. The average size of the shadow economy of the 158 countries over 1991 to 2015 is 31.9 percent. The largest ones are Zimbabwe with 60.6 percent, and Bolivia with 62.3 percent of GDP. The lowest ones are Austria with 8.9 percent, and Switzerland with 7.2 percent. The new methods, especially the new macro method, Currency Demand Approach (CDA) and Multiple Indicators Multiple Causes (MIMIC) in a structured hybrid-model based estimation procedure, are promising approaches from an econometric standpoint, alongside some new micro estimates. These estimations come quite close to others used by statistical offices or based on surveys

Details: Washington, DC: International Monetary Fund, 2018. 77p.

Source: IMF Working Paper No. 18/17: Accessed April 2, 2018 at: https://www.imf.org/en/Publications/WP/Issues/2018/01/25/Shadow-Economies-Around-the-World-What-Did-We-Learn-Over-the-Last-20-Years-45583

Year: 2018

Country: International

Keywords: Financial Crimes

Shelf Number: 149649


Author: American University. Washington College of Law. Center for Human Rights and Humanitarian Law

Title: Gender Perspectives on Torture: Law and Practice

Summary: I once asked a Guatemalan public defender how she knew when a woman's murder was the result of gender-based violence and not a simple homicide. She showed me several pictures of women's half or fully naked bodies exhibiting obvious signs of torture, mutilation, and violent sexual assault prior to their deaths. She said that was how women's bodies were usually found. That was the difference between gender-based violence and simple homicide. Women's bodies are often used as instruments to send messages of terror, or as instruments of pleasure, or as instruments of experimentation. In all of these cases, gender-based violence is recognizable because of its profound denial of personhood. The common thread running through the collection of articles presented in this publication is that women's bodies are still looked at and treated as instruments, or means to achieving a goal, rather than as autonomous individuals. Killing a body to end a life is different than killing a body to send a signal. In both cases, the person is refused her or his basic right to life, but in the latter, the person is a mark, a sign for others to see and use. The first chapter of this volume elaborates on the notion of gender-based violence, the need to incorporate a gender perspective in legal systems in general, and the responsibilities of States with regard to those at the margins of legal protections. Although gender-based violence has existed since the beginning of time, it has only entered the realm of human rights as a specific issue within the last decades. International human rights law, traditionally, has not protected women from the harms they have suffered as a result of being women. As with the rest of legal and political institutions, women have had to struggle for their experiences to be recognized. The invisibility of women's harms has also included a lack of reparations with a gender perspective; if the suffering women have endured is not understood, its consequences cannot be adequately addressed. Owing to the inclusion of a gender perspective, human rights treaty bodies have started to include reparations that put women, and not only their families or communities, at the center of their analyses. The new trends in international human rights are welcome by the international community, but they have not necessarily translated into substantive protection of women's and girl's rights, and States must work to ensure that they carry through with their obligations to investigate incidents of gender-based violence and provide redress for victims. Chapter two examines specific forms of violence that women and girls experience throughout the world, including honor killings, female genital mutilation, pregnancy and virginity testing, and the use of forced contraception and addresses the need to advance the humanization of women's rights. States have been reluctant to introduce laws opposing these forms of violence on grounds that certain practices are based on culture or religion. Although international human rights law protects the right to freedom of religion, sexual-based violence cannot be excused on religious grounds, and it has taken too long for laws to begin to act against practices that constitute torture or ill-treatment. The chapter invites readers to view women as the protagonists of human rights standards rather than continually framing men as the central figures of such rights; the standard of protection cannot always be viewed through the lens of male actors. The chapter then moves beyond the gender perspective as a tool to protect women and analyzes the need for the specific recognition of harms suffered by trans and intersex individuals. Perhaps one of the most important challenges that legal systems face is the deconstruction of the male-female binary, and international human rights is not shielded from this challenge. The chapter reinforces the need for human rights to go beyond the binary with regard to the protection of individuals by analyzing how torture and ill-treatment has played an intricate role in the lives of a whole category of individuals. For many trans and intersex persons, torture and ill-treatment are a constant in their lives and this chapter invites us to better understand what torture and ill-treatment means from the perspective of these individuals. The third chapter focuses specifically on deprivation of liberty, and the torture and ill-treatment that often take place under custodial settings. Vulnerability increases in detention facilities, even when the detention is considered lawful. In the cases of LGBTI individuals, who are at greater risk of being in contact with the criminal justice system, once in custodial settings they are subject to brutality and abuse by prison authorities and fellow inmates. This violence is usually underreported and tends to be ignored by State officials because of the underlying assumption that people of diverse sexualities "deserve punishment" for not conforming to traditional gender roles. For custodial settings to cease being places of torture and ill-treatment for LGBTI individuals, violence must be understood from a gender and sexuality perspective. For prison officials, this means not placing trans individuals, whose legal names may not correspond to the gender with which they identify, in solitary confinement because they are unsure of where to house them-it simply replaces one form of violence with another form. The chapter also addresses how criminal justice systems are structured around the idea of a male detainee. Incarcerated women-and their visitors-often endure invasive and humiliating searches, where the women are forced to undress in front of unqualified male officers who may also perform unnecessary body cavity searches. These techniques are not used with the legitimate purpose of ensuring safety within the detention facility, but rather to dehumanize and assert power over the already powerless. This is even more serious when it affects young girls. Criminal justice systems are also not structured with families in mind; "ideal perpetrators" are not only male but also single and with no dependents. Women detainees tend to be mothers with children and usually in a position of vulnerability with nobody to care for their children. In these conditions, it is not uncommon to find detention facilities and jails where children live with their mothers for some time, increasing the incarcerated population to include children, who at a young age, develop their first connections with the world through the prism of a detention facility. A gender perspective requires legal frameworks that look at detained persons not as isolated beings, but as individuals with dependents and family connections. Chapter four considers torture and ill-treatment within the context of women's health care and reproductive rights. Women face mistreatment when seeking maternal health care, undergo forced sterilizations, can face criminal repercussions for self-inducing abortions, and are often denied safe and legal abortion services. It is not uncommon for women in custodial settings to deliver their babies while in shackles, and this chapter explores how the lack of adequate maternal health care can amount to ill-treatment or torture. Depriving women of their right to reproductive self-determination is an additional example of how States have long-ignored the needs of women as citizens. A traditional concept of torture does not allow for an understanding of the common experiences of women, and this chapter expands on the idea that torture and ill-treatment not only occur in situations where government actors themselves are the perpetrators of harm, but when the government allows harms to occur out of a complete disregard for women's bodies. To understand how the lack of adequate maternal care or reproductive rights can be so severe that it amounts to ill-treatment and even torture, one simply has to compare the experiences of women-be it forced sterilization, lack of access to painkillers during childbirth, or lack of abortion regulations-with international human rights standards, and it becomes clear that often ill-treatment, torture, and the experiences of women are all the same. In that sense, this volume expands on the important and influential report by the former Special Rapporteur on Torture on the issue of women and torture. Restrictions on reproduction have long been used to control women's bodies and entire populations, and legal systems, including the norms, standards, and rules of international law, have denied women from seeing their harms recognized as such. Rape was not considered torture until recently; it was not worth the time of special war crime tribunals or worth the time of international treaty bodies. But this is changing, and this publication is a testament to that change. Seeing torture as a gendered practice requires a specific gaze that for most people is a learned process. Only recently have our legal systems started viewing and treating women as individuals. Only recently have legal systems understood and given a name to women's specific harms. In the case of LGBTI persons, those strides are still in their infancy. Despite how widespread and deep-rooted violence against women has been for centuries, torture and ill-treatment were primarily viewed and analyzed through a "male as the main victim" lens. This publication takes a formidable step toward debunking the myth of heterosexual cisgender men as exclusive victims and reinforces the need to integrate women's rights and sexuality perspectives into the mainstream of international human rights.

Details: Washington, DC: The Center, 2018. 344p.

Source: Internet Resource: Accessed April 2, 2018 at: https://www.wcl.american.edu/impact/initiatives-programs/center/documents/gender-perspectives-on-torture/

Year: 2018

Country: International

Keywords: Female Genital Mutilation

Shelf Number: 149650


Author: Workman, Simon

Title: "A Criminal Strain Ran In His Blood": Biomedical Science, Criminology, and Empire in the Sherlock Holmes Canon

Summary: Nearly a century and a half after their initial publication, it is clear that Arthur Conan Doyle's Sherlock Holmes stories and novels continue to be a cultural phenomenon throughout the world. However, less clear are the ways in which those works emerged in response to-and as an example of-cultural anxieties surrounding advancements in science, particularly in the fields of biology and medicine. Advances such as Darwin's theory of evolution through natural selection not only called into question basic long-standing assumptions about man's relationship to the universe; they also promised to improve the investigation of crime, as well as potentially justify certain imperialist beliefs about racial difference-beliefs that themselves influenced the development of criminal investigation. This project demonstrates how the Sherlock Holmes novels and stories both respond to and participate in the ideological nexus of biomedical science, criminology, and British imperialism by examining the ways in which certain key texts in the Holmes canon deploy medical discourse, criminological theory, and imperialist assumptions in the creation of a rational and "scientific" worldview through the characters of Dr. John Watson and Sherlock Holmes.

Details: Cincinnati: University of Cincinnati, 2017. 183p.

Source: Internet Resource: Dissertation: Accessed April 3, 2018 at; https://etd.ohiolink.edu/!etd.send_file?accession=ucin1505126689988603&disposition=inline

Year: 2017

Country: International

Keywords: Crime in Literature

Shelf Number: 149659


Author: Perotti, Victoria

Title: Imagining the Future of Crime and Politics

Summary: Organized crime networks dedicated to illicit trafficking of drugs, people and wildlife-as well as money laundering and cybercrime, among other activities-are engines of instability. From Latin America to West Africa, from West Asia to Eastern Europe, and from Central Africa to Southern Europe, these networks engage in corruption to advance their interests, depriving the state of precious resources needed to build resilient institutions (OECD 2014). Corruption is channeled through multiple avenues, including by pouring illicit money into political institutions and actors (Villaveces-Izquierdo and Uribe Burcher 2013; Briscoe, Perdomo and Uribe Burcher 2014; Perdomo and Uribe Burcher 2016). The world is experiencing several parallel trends-including increased violent conflict, democratic backsliding and technological advancements-that affect these corrupt dynamics. Given that conflict and weak governance typically create a fertile environment for organized crime to engage in public sector corruption (Lupsha 1996; Cockayne and Pfister 2008: 18; Kupferschmidt 2009), and since technology may facilitate or hinder criminal behaviour (Baker 2014), these trends will presumably have a pivotal impact on the fight against organized crime and political corruption. On 4 May 2017, International IDEA hosted the workshop 'Political corruption and organized crime: Drivers, effects and responses' at the 2017 Stockholm Forum on Peace and Development, organized by Stockholm International Peace Research Institute (SIPRI 2017). The workshop aimed to discuss potential future trends regarding corruption linked to organized crime and strategic policy responses. It gathered scholars and practitioners in anticorruption, international crime prevention and peacebuilding in a common dialogue. This Discussion Paper was initially drafted as a scenario-building exercise to inform the workshop and was further developed with the input of its participants. Scenario building is an analytical method that encourages prospective thinking within a thematic field to identify new strategic policy alternatives (Conway 2006). Specifically, the scenarios consist of an illustration of possible futures. As such, they are not intended to predict the future (European Commission 2007). The methodology tends to be qualitative and engages a group of people in a simulation process. By developing a future narrative that takes existing interconnected trends to the extreme, participants can challenge assumptions and expand their perceptions of options available, ultimately engaging in strategic conversations. This Discussion Paper and the adapted scenario-building exercise on which it is based were therefore developed from the perspective of a fictitious criminal network. Its hypothetical activity focus is diverse and, depending on the opportunities, it could hypothetically venture to any existing and new illicit activities. Its structure is flexible as well; as such, it can potentially adapt to new markets. Section 1 illustrates some of the key geopolitical trends and drivers in governance, peace and technology that may affect corruption dynamics in relation to organized crime in the coming 10 years. Written from the perspective of a fictitious criminal network, it depicts a scenario where conflict, democratic decline and new technologies exacerbate the negative impact of organized crime on the state. By describing an imaginary future, it includes the most relevant concerns for practitioners within the field. Section 2 briefly presents current policy options for tackling organized crime and political corruption, and outlines recommendations for future policy adjustments that may contribute to the improvement of crime and corruption prevention and mitigation. The main argument of this Discussion Paper is that the policies that seek to address corruption and organized crime should be brought closer together in the promotion of global peace and stability.

Details: Stockholm: International Institute for Democracy and Electoral Assistance, 2018. 23p.

Source: Internet Resource: International IDEA Discussion Paper 2/2018: Accessed April 3, 2018 at: https://www.idea.int/sites/default/files/publications/imagining-the-future-of-crime-and-politics.pdf

Year: 2018

Country: International

Keywords: Criminal Networks

Shelf Number: 149660


Author: Briscoe, Ivan

Title: Protecting Politics: Deterring the Influence of Organized Crime on Political Parties

Summary: Political parties play a crucial role in the functioning of democracy. As the intermediaries between political representatives and the citizens, parties hold the keys to ensure that institutions are inclusive and responsive. In essence, the policies and ideologies that parties uphold are designed to mirror the wishes and needs of the people, and the candidates that these organizations support become the voice for those ideas within elected offices. The general distrust of political parties, and their subsequent weak legitimacy, is therefore one of the most pressing problems for democracy today. This phenomenon corrodes the precious relationship between citizens and politicians, thus destroying the basic fabric of representative democracy. The low levels of membership in political parties reflect this disturbing trend. Citizens are seeking alternatives, increasingly turning to the streets and forming citizen movements to voice their concerns. Recent protests in Asia, Europe and Latin America reflect this general dissatisfaction with the way democratic institutions in general, and political parties in particular, are tackling inequality, poor service delivery and, most importantly, political corruption. Indeed, corruption, partly fuelled by illicit money, is arguably one of the root causes of citizen distrust in political parties. The International Institute for Democracy and Electoral Assistance (International IDEA), the Netherlands Institute of International Relations (Clingendael) and other partners are therefore committed to shedding light on how organized crime corrupts political parties. Injecting dirty money into political parties and pursuing alliances with key politicians and their intermediaries are some of the principal avenues these illicit networks use to penetrate democracy. This report provides insights into these issues, as well as potential strategies for preventing and mitigating relationships between criminals and political actors, by looking at the specific cases of Georgia, Mali and Mexico. This report builds on comparative research that International IDEA has conducted since 2011 under the umbrella of the Protecting Politics project, which broadly focuses on the threat that organized crime poses to democracy around the world. In 2015 the Clingendael Institute joined International IDEA in exploring the particular dynamics that organized crime uses to engage with political parties and actors. Three other reports complement this study by looking at the related issues of elections, service delivery and local democracy.

Details: The Hague: Clingendael Institute, 2016. 91p.

Source: Internet Resource: Accessed April 3, 2018 at: https://www.clingendael.org/sites/default/files/pdfs/Protecting-Politics-Deterring-the-Influence-of-Organized-Crime-on-Political-Parties-PDF.pdf

Year: 2016

Country: International

Keywords: Elections

Shelf Number: 149662


Author: Maley, William

Title: Terrorism, Diplomacy, and State Communications

Summary: In countering the communications of terrorist organisations, states face a number of distinct challenges. Blatant lying can be at the expense of a state's authority, credibility, and instrumental effectiveness. Effective state communications need to be integrated, multidimensional and persuasive. Often they are anything but. Messages can be poorly formulated, and can be understood in unexpected ways, not least because there may be multiple audiences for a particular message. Nonetheless, effective messaging can be of great psychological value, helping to trigger 'cascades' that can undermine even ruthless enemies. Except perhaps in the direst of existential crises, effective messaging should avoid lies; but it can be of value not to fixate on telling the whole truth.

Details: The Hague: International Centre for Counter-Terrorism, 2018. 21p.

Source: Internet Resource: ICCT Research Paper: Accessed April 5, 2018 at: https://icct.nl/wp-content/uploads/2018/03/ICCT-Maley-Terrorism-Diplomacy-and-State-Communications-March2018-1.pdf

Year: 2018

Country: International

Keywords: Communication

Shelf Number: 149698


Author: Jelsma, Martin

Title: Balancing Treaty Stability and Change: Inter se modification of the UN drug control conventions to facilitate cannabis regulation

Summary: Key Points - Legal tensions are growing within the international drug control regime as increasing numbers of member states or jurisdictions therein move towards or seriously consider legal regulation of the cannabis market for non-medical purposes, a policy choice not permitted under the existing UN legal framework. - Reaching a new global consensus to revise or amend the UN drug control conventions to accommodate cannabis regulation, or that of other psychoactive plants and substances currently scheduled in these treaties, does not appear to be a viable political option in the foreseeable future. - The application of dubious or 'untidy' legal arguments to accommodate regulated cannabis markets does little for the integrity of the regime, undermines respect for international law more broadly and is not sustainable. - Appealing to human rights obligations can provide powerful arguments to question full compliance with certain drug control treaty provisions, but does not in itself resolve the arguable conflict between different treaty obligations. - States may wish to adopt a stance of respectful temporary non-compliance as they pursue legally valid and appropriate options for the re-alignment of international obligations with domestic policy. - The nature of the international drug control regime's internal mechanisms does much to limit avenues for modernisation and forces states to consider extraordinary measures, such as the rightful choice made by Bolivia in relation to coca to withdraw and re-adhere with a new reservation. - Amongst reform options not requiring consensus, inter se modification appears to be the most 'elegant' approach and one that provides a useful safety valve for collective action to adjust a treaty regime arguably frozen in time. - Inter se modification would require the like-minded agreement to include a clear commitment to the original treaty aim to promote the health and welfare of humankind and to the original treaty obligations vis-a-vis countries not party to the agreement. - A legally-grounded and coordinated collective response has many clear benefits compared to a chaotic scenario of a growing number of different unilateral reservations and questionable re-interpretations. - Among other things, inter se modification would provide opportunities to experiment and learn from different models of regulation as well as open the possibility of international trade enabling small cannabis farmers in traditional Southern producing countries to supply the emerging regulated licit spaces in the global market. - Inter se modification would facilitate the development of what, within an international policy environment characterized by faux consensus, is increasingly necessary: a 'multi-speed drug control system' operating within the boundaries of international law, rather than one that strains against them.

Details: Swansea, UK: Global Drug Policy Observatory, Swansea University, 2018. 46p.

Source: Internet Resource: Policy Report 7: Accessed April 5, 2018 at: https://www.wola.org/wp-content/uploads/2018/03/Stability-Change-Inter-Se-Modification_GDPO-TNI-WOLA_March-2018.pdf

Year: 2018

Country: International

Keywords: Cannabis

Shelf Number: 149703


Author: Environmental Investigation Agency (EIA)

Title: Facing Extinction: Survival of the Vaquita Depends on Eliminating the Illegal Trade in Totoaba

Summary: Ahead of the 69th meeting of the CITES Standing Committee, EIA's new briefing provides an update on the world's most threatened marine mammal - the vaquita - and the ongoing illegal trade in totoaba that is driving the species to extinction. EIA urges Mexico, China and the US to substantially increase enforcement efforts, dismantling the criminal networks facilitating the trade and fully protecting the last remaining handful of vaquita.

Details: London: EIA, 2017. 8p.

Source: Internet Resource: Accessed April 6, 2018 at: https://drive.google.com/viewerng/viewer?url=https://eia-international.org/wp-content/uploads/EIA_Ocean_report_briefing_Vaquita_Final.pdf

Year: 2017

Country: International

Keywords: Criminal Networks

Shelf Number: 149714


Author: Sander, Gen

Title: The Death Penalty for Drug Offences: Global Overview 2017

Summary: Our Global Overview series monitors the death penalty for drugs in law and practice worldwide, and also considers critical developments on the issue. Since being launched in 2007, Harm Reduction International's death penalty work has been the leading global resource on the issue of the death penalty for drug offences. Among the key findings from the 2017 Global Overview report: At least 33 countries and territories prescribe the death penalty for drug offences in law. At least nine countries still have the death penalty for drug offences as a mandatory sanction, although three of these (Brunei Darussalam, Laos and Myanmar) are abolitionist in practice. Malaysia removed the mandatory sentence for drug offences in November 2017. Between January 2015 and December 2017, at least 1,320 people are known to have been executed for drug-related offences - 718 in 2015; 325 in 2016; and 280 in 2017. These estimates do not include China, as reliable figures continue to be unavailable for the country. Taking China out of the equation due to a lack of data, Iran has been the world's top executioner for drug offences by far, with at least 1,176 executions carried out since January 2015. That amounts to nearly 90% of all known drug-related executions during that period. Between 2015 and 2017, executions for drug offences took place in at least five countries: China, Iran, Saudi Arabia, Indonesia and Singapore. The report also reveals a critical tension: the situation is at once improving and deteriorating. On the one hand, recent positive developments provide a glimmer of hope that the tide could finally be shifting. At the national level, executions for drug offences have been steadily declining in High Application States since 2015, and important legal and policy changes have taken place in several countries, including Iran, Thailand and Malaysia. At the international level, political support for the abolition of the death penalty for drug offences is also gaining considerable momentum. The 2016 UN General Assembly Special Session on Drugs failed to reach consensus on the death penalty for drug offences, but 73 countries expressed strong support for abolition, proving that the issue is firmly on the radar of the global community. On the other hand, these signs of progress are being overshadowed by the surge in extrajudicial executions of people accused of using or selling drugs in the Philippines. Worrying signs that Indonesia may be adopting a similar violent response, and the explicit support for President Duterte's 'war on drugs' expressed by other countries in the region and beyond, raise serious concerns about whether we are seeing a new trend which could normalise the killing of people for drugs and undo years of steady progress.

Details: London: Harm Reduction International, 2018. 33p.

Source: Internet Resource: Accessed April 6, 2018 at: https://www.hri.global/files/2018/03/06/HRI-Death-Penalty-Report-2018.pdf

Year: 2018

Country: International

Keywords: Capital Punishment

Shelf Number: 149719


Author: KnowTheChain

Title: Apparel and Footwear Benchmark Findings Report: How are 20 of the largest companies addressing forced labor in their supply chains?

Summary: According to the International Labour Organization (ILO), an estimated 21 million people are victims of forced labor around the world. As defined by the ILO, forced labor refers to "situations in which persons are coerced to work through the use of violence or intimidation, or by subtler means such as accumulated debt, retention of identity papers or threats of denunciation to immigration authorities." The apparel & footwear industry is an at-risk sector. Forced labor occurs both in the production of raw materials and during the manufacturing stages of apparel and footwear companies' supply chains, especially at lower tier suppliers and in home-based or informal manufacturing. Most nations in the world participate to some degree in the textile and apparel sector. And, the textiles, clothing, and footwear industry is a rapidly growing field of employment: While in 2000 the global garment industry employed about 20 million workers, this number has at least tripled to 60-75 million workers in 2014, three quarters of whom are women. Following incidents of child labor and reports about sweatshop conditions since the 1990s, companies have taken action, and associations such as the Ethical Trading Initiative, the Fair Labor Association, and the Better Work Initiative, a partnership between the ILO and the International Finance Corporation, have helped companies to work towards improving conditions in apparel supply chains. Today, companies acknowledge responsibility for working conditions in their supply chains, and traceability and transparency are higher than in other sectors. The majority of large apparel and footwear companies have in place supplier monitoring systems, and, through initiatives such as ACT (Action, Collaboration, Transformation), apparel brands, retailers, manufacturers, and trade unions are collaborating to implement living wages. Why does forced labor in the sector persist? While progress has been made, forced labor persists in the sector. The tragic collapse of the Rana Plaza building in Bangladesh has proven that auditing systems can easily fall short: two factories in the building had been audited for social compliance and several brands were unaware that their clothes were being made there. Where audits are announced, some employers ask undocumented workers or child workers to hide. In other instances, the work is subcontracted, and poor working conditions move to a deeper, less visible part of the supply chain.4 "Fast fashion" models can exacerbate the risk of forced labor, with pressure on lead times and pricing leading suppliers to outsource production.

Details: San Francisco: KnowTheChain, 2016. 36p.

Source: Internet Resources: Accessed April 6, 2018 at: https://knowthechain.org/wp-content/plugins/ktc-benchmark/app/public/images/benchmark_reports/KTC_A&F_ExternalReport_Final.pdf

Year: 2016

Country: International

Keywords: Consumer Products

Shelf Number: 149720


Author: KnowTheChain

Title: How food and beverage companies tackle forced labor risks in sugarcane supply chains

Summary: Sugarcane is one of the largest agricultural commodities in the world. It can be found in everyday food items such as cereals, yogurts, and ready-made pizzas, and in beverages such as soft drinks, sports drinks, and flavored coffees. Sugarcane is typically manually harvested, often by migrants and rural workers with little education-in Brazil, more than 25% of the rural population work in sugarcane supply chains. Sugarcane workers face hazardous working conditions, long working hours in isolated workplaces, low wages, and even forced labor. Food and beverage companies face major risks in sourcing sugarcane, given this commodity has been found to be produced by forced labor in Brazil and India, the two largest sugarcane producers in the world. This case study assesses how a sample of 10 companies address forced labor risks across their sugarcane supply chains, finding that, while some companies have assessed risks and set targets, all companies in the case study need to improve significantly-in particular to provide grievance mechanisms and remedy. For the purpose of this report, the term "sugar" has been used where sources refer to sugarcane and may also refer to sugar beets. This study follows KnowTheChain's first food and beverage benchmark completed in 2016, which found a lack of transparency and adequate action to address forced labor in commodity supply chains such as sugarcane, where risks have been documented. We compared the disclosed policies and practices of the 10 companies and examined additional information provided through a questionnaire, which was developed in consultation with global and local stakeholders. Eight of the companies responded to the questionnaire, which represents a notable increase from the 2016 benchmark, when less than half of the companies provided additional disclosure. Key findings on the 10 companies in our case study include: - All companies disclose where at least some parts of their sugarcane supply chains are located. Coca-Cola discloses a map that highlights all sourcing countries for its key commodities. However, the company did not follow through on its commitment from 2013 to disclose the names of all its direct sugarcane suppliers within three years. Wilmar is the only company that discloses a list with names and addresses of its sugar suppliers. - All companies should take concrete follow-up steps at the country level. However, we found steps taken at that level are limited. PepsiCo, Coca-Cola, Nestle, and ABF are the only companies making efforts to understand and assess forced labor risks in their sugarcane supply chains at the country level. While most companies have a grievance mechanism in place, it is unclear whether the mechanisms are communicated to and used by suppliers' workers. Further, no company was able to provide an example of remedy provided to workers in their sugarcane supply chains. - Most companies recognize the need to significantly increase their efforts to improve working conditions in their sugar supply chains and have committed to implement or strengthen sustainable sugar sourcing, which includes efforts to prevent forced labor. Notably, Nestle has set time-bound targets for salient labor issues which include, for example, working with suppliers to promote the right of workers to establish and join trade unions.

Details: San Francisco: KnowTheChain, 2017. 34p.

Source: Internet Resource: Accessed April 6, 2018 at: https://knowthechain.org/wp-content/uploads/KTC-SugarcaneReport-Final_August-2017.pdf

Year: 2017

Country: International

Keywords: Consumer Products

Shelf Number: 149721


Author: Huerbsch, Brian

Title: The Cost of Environmental Crime: Illegal Logging

Summary: Illegal logging poses real and significant regulatory risk for international financial institutions and corporations, especially those connected, either directly or indirectly, with the global timber industry, or that operate in areas where the industry is prevalent and important to the local economy. Considering the notable increase in regulatory activity over the past decade, the amount of enforcement actions given, and the ballooning size of fines over the past several years, it is clear that illegal logging is a crime that cannot be ignored anymore. Fortunately, this risk can be mitigated properly if strong third-party risk and know your customer (KYC) processes are in place, including enhanced due diligence (EDD) and anti-money laundering (AML) protocols.

Details: Thomson Reuters, 2016. 12p.

Source: Internet Resource: Accessed April 6, 2018 at: https://risk.thomsonreuters.com/en/resources/white-paper/the-cost-of-environmental-crime-illegal-logging.html

Year: 2016

Country: International

Keywords: Costs of Crime

Shelf Number: 149623


Author: Soomeren, Paul van

Title: Reducing the Fear Factor: Guidance for addressing fear of crime and insecurity within urban development

Summary: While people are often aware of the risks of being a victim of crime, fear of crime in the urban environment relates less to actual risk. This paper presents guidance for the design of urban areas in order to prevent victimization.

Details: Salford, UK: Design Against Crime Solution Centre, 2008.

Source: Internet Resource: Accessed April 9, 2018 at: http://www.securefit.org/downloads/files/Reducing%20the%20Fear%20Factor.pdf

Year: 2008

Country: International

Keywords: Crime Prevention

Shelf Number: 149728


Author: Carrillo, Roxanna

Title: Not A Minute More: Ending Violence Against Women

Summary: Violence against women and girls kills and maims vast numbers; it fills their lives with pain and terror, from which some never recover. It exists in every country of the world in some form, and the statistics paint a horrifying picture: 40 per cent of all female homicide victims in the United Kingdom are killed by their intimate partners; every year thousands of women suffer dowry-related deaths or are disfigured by acid thrown in their faces by rejected suitors in Bangladesh, Colombia, India, Nigeria and Pakistan. In 2002, the Council of Europe declared violence against women a major cause of death and disability for women 16 to 44 years of age and called it a public health emergency. And in the United States, the health-related costs of rape, physical assault, stalking and homicide by intimate partners are more than $5.8 billion every single year. Globally, the World Bank estimates that violence against women is as serious a cause of death and incapacity among women of reproductive age as cancer and a greater cause of ill health than traffic accidents and malaria combined. One in three women throughout the world will suffer this violence in her lifetime; she will be beaten, raped, assaulted, trafficked, harassed or forced to submit to harmful practices such as female genital mutilation (FGM). In the majority of cases, the abuser will be a member of the woman's own family or someone known to her. Exacerbating the problem is the fact that violence in general has not abated. Whether it breaks out as full-scale war, ethnic or religious conflict, terrorism or the violence that regular unabated? The answer is deceptively simple, but the solution is deeply complex: gender inequality fuels violence against women and the power imbalances it creates are not easily rectified. As long as women in diverse countries do not have access to property and employment and equal wages, to the seats of power, to education, it is possible for governments to ignore them and their needs. Our work to end violence against women must be a conscious part of our work towards the empowerment of women in general. We cannot change the basic structures of society overnight. But each step in the ongoing effort to eradicate violence puts more pressure on those who condone the violence and allow it to exist. Each step makes it harder to ignore the international agreements to protect and promote women's human rights. This is the moment for a renewed commitment to build on the achievements of the last decades and find the resources for meaningful action. Without this commitment, much of what has been achieved may be lost. That would be a tragedy for all of us, since, as we have learned, women's security is tied to global security. In the words of the UN Commission on Human Security (Human Security Now, 2003): "The security of one person, one community, one nation rests on the decisions of many others, sometimes fortuitously, sometimes precariously." In our interconnected world, we are all affected by the decisions of individuals and nations whether close to home or on the other side of the world. Gender-based violence is part of an intricate web of violence. The trafficking of women is linked to the trafficking of drugs and arms, and an increase in criminality. Rape and sexual abuse are tied to the devastation caused by HIV/AIDS and the destruction of families. Impunity for violence against women suggests impunity for criminal behaviour and the disintegration of the rule of law. Violence against women is tied also to the brutality of war, an issue that was taken up extensively in Women War and Peace, an independent expert assessment commissioned by UNIFEM and published in 2002. Our goal in this report is to highlight achievements and indicate what must be done to build on these achievements. The report provides examples of good practices as well as of efforts that did not meet the goals set out for them - and explores why not. It looks at the challenges ahead, and asks what the most fruitful next steps might be. The work of the last decades indicates several directions for the future, but one of the most critical areas is the need for collaboration and partnerships. No one government or international agency or civil society organization can hope to have an impact alone. Pooling resources, sharing strengths and knowledge and listening to local leaders will allow end-violence efforts to move to the next level. We hope that that the lessons gathered here will serve as a tool, a prod and an inspiration to those entrusted with building the rule of law and honouring human rights as the basis for human security everywhere.

Details: New York: United Nations Development Fund for Women (UNIFEM), 2003. 114p.

Source: Internet Resource: Accessed April 10, 2018 at: https://www.un.org/ruleoflaw/files/312_book_complete_eng.pdf

Year: 2003

Country: International

Keywords: Dowry Deaths

Shelf Number: 117087


Author: Malik, Nikita

Title: Terror in the Dark: How Terrorists Use Encryption

Summary: Terrorists and extremists are increasingly moving their activities online - and areas of the web have become a safe haven for Islamic State to plot its next attacks, according to a report published today by the Henry Jackson Society. Terror in The Dark: How Terrorists use Encryption, the Darknet and Cryptocurrencies shows how those planning to commit terrorist atrocities are using extremist networks on the 'Darknet' to indoctrinate sympathisers, create a reservoir of propaganda, evade detection and fundraise. It calls for urgent action by government and the policing and security services to step up intelligence gathering and action to counter online extremist activity. The report shows how terrorists are: Using encrypted apps such as Telegram to hide, communicate and plan attacks. Drawing interested sympathisers from the 'surface' world of the web into the Darknet in order to recruit and indoctrinate new supporters. Building up reservoirs of propaganda - saving it from deletion by the security services or tech companies and removing it as potential evidence for use by law enforcement. Using cryptocurrencies such as bitcoin to fundraise, taking advantage of the anonymity they offer. Following the five terror attacks on British soil in 2017, the Government has dedicated more time and funds to the combating of online extremism. However, the report makes a strong case for more attention to be paid to the Darknet, as terrorists mask their actions and intentions unchallenged on a currently anarchic platform. The report recommends: That tech companies should create a self-regulatory system to remove and audit extremist content - and release public annual reports outlining their efforts, including stats on content flagged by users, the outcome of companies' investigations and areas for improvement. That there should be a new internet regulatory body appointed by government, with the role of scrutinising tech companies' efforts to remove extremist content - with the potential for fines if companies consistently fail to take down offending material. More resources for the Joint Terrorism Action Centre to build up intelligence on the Darknet. Social media companies should work with law enforcement to ensure that extremist material is not lost when it is deleted, but is archived - to ensure that we understand extremists' patterns of behaviour online and retain evidence.

Details: London: Henry Jackson Society, 2018. 61p.

Source: Internet Resource: Accessed April 11, 2018 at: http://henryjacksonsociety.org/wp-content/uploads/2018/04/Terror-in-the-Dark.pdf

Year: 2018

Country: International

Keywords: Counter-Extremism

Shelf Number: 149759


Author: Australian Strategic Policy Institute

Title: Counterterrorism Yearbook 2018

Summary: he Counter Terrorism Yearbook is ASPI's annual flagship publication curated by the Counter Terrorism Policy Centre, now in its second year of publication. It is a comprehensive resource for academics and policymakers to build on their knowledge of counterterrorism developments in countries and regions around world. Each chapter in the Yearbook is written by internationally renowned subject matter and regional experts, who provide their insight and commentary on counterterrorism policy, legislation, operations and strategy for a specific country/region, concerning the year in review, and looking at challenges for the year ahead.

Details: Barton, ACT, Australia: Australian Strategic Policy Institiute: ASPI, 2018. 176p.

Source: Internet Resource: Accessed April 12, 2018 at: https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2018-04/ASPI%20Counterterrorism%20YB2018.pdf?FwGhpI3OBFhspKnvxVLGkUjWHcU_SHrT

Year: 2018

Country: International

Keywords: Counter-Terrorism

Shelf Number: 149793


Author: American Civil Liberties Union

Title: Out of Step with the World: An Analysis of Felony Disfranchisement in the U.S. and Other Democracies

Summary: Well over 100 years ago, the Supreme Court concluded in Yick Wo v. Hopkins that the right to vote is "fundamental" because it is "preservative of all rights." Even the most basic civil rights, the Court has said, "are illusory if the right to vote is undermined." Foreign courts examining voting rights cases frequently cite American voting rights jurisprudence. Yet, the United States bars from the vote nearly 5.3 million American citizens on the grounds that they committed a crime, although most committed nonviolent offenses and only a quarter are in prison or jail, with three-quarters either on probation or parole or having completed sentences. Particularly since the contested presidential election of 2000, American laws barring people with criminal convictions from voting have come under considerable public scrutiny. In the United States, each state has its own criminal disfranchisement law. In two states people retain the right to vote even while incarcerated, but policies in the other 48 states and the District of Columbia range from disqualification for incarcerated felons to lifetime bans on voting: 48 states bar prison inmates from voting; 36 bar convicted felons from voting while on parole, 31 of these states also excluding felony probationers from voting; 3 states prohibit all ex-felons from voting even after they have fully completed their sentences, and another 9 states permanently restrict from voting those convicted of specific offenses, or require a post-sentence waiting period for some offenders. While disfranchisement policies have been in effect for many years, they are affecting a growing segment of the population, as the United States' criminal justice system continues to convict and imprison more people than ever before. The United States now incarcerates over 2 million people, at a rate of 702 per 100,000. (Including those on parole or probation, or housed in jails, the U.S. has more than 6 million people under some form of criminal supervision.) This incarceration rate is 5-8 times that in comparable industrialized nations, western Europe (e.g., Germany: 97; England & Wales: 144 and Canada: 107). If current trends continue, black males would have a 1 in 3 chance of going to prison during their lifetimes; Hispanics, 1 in 6, and whites, 1 in 17. And though American disfranchisement policies keep a large segment of the entire population from the voting booth, they have a disproportionate impact on African Americans and other minorities. While disfranchisement policies prevent 2.5% of the total population from voting, they prevent 13% of the total population of African American men from casting a ballot. States have begun to alter their disfranchisement rules in the last few years, motivated by concerns about the policy's uneasy relationship with modern American ideas about the right to vote, its illdefined punitive purposes, or its linkages to the racial inequities of the U.S. criminal-justice system. As citizens, lawmakers, and judges in the United States and elsewhere consider the wisdom of laws barring people with criminal convictions from voting, relatively little detailed information has been available about similar policies - or the lack thereof - in other democracies. This report has been written in the hope of improving our understanding of disfranchisement law in the twenty-first century, with a particular eye towards enriching the ongoing discussion of disfranchisement law in the United States - a democracy that has very unusual policies in this area. This report offers the first in-depth analysis of the criminal disfranchisement policies of the world's democracies, with a focus on Europe. (We do also examine, though perhaps not in the same depth, other developed democracies' policies and precedents, namely those of Israel, Canada, Australia, New Zealand and South Africa.) Simply describing these laws accurately has proven a surprisingly difficult task; a few previous authors have attempted to do so, focusing their attention mostly on documents such as constitutions and election-law statutes.6 We have drawn on their important work here, but have found that constitutions and statutes alone often fail to deliver a full understanding of a given country's disfranchisement policies and practices. In addition to such formal legal sources, this report benefits from exhaustive research into legislative materials, judicial proceedings, advocacy reports, and numerous other sources, including information from original surveys and interviews with governmental and non-governmental officials of several countries. No previous publication has synthesized so much country-by-country disfranchisement data, decisions of high courts, and international legal instruments. Following this Introduction, Section II of the report describes the policies of European nations, and Section III offers detailed summaries of the decisions rendered by various countries' constitutional courts in the last decade. Section IV examines mechanisms used in various democracies to implement prisoner voting, and Section V considers treaties and other legal instruments, both binding and advisory, which bear on the voting rights of people with criminal convictions. These are among the central findings of this study: - Almost half of European countries allow all incarcerated people to vote while others disqualify only a small number of prisoners from the polls. As we explain below, almost all of the countries that disqualify all inmates are in Eastern Europe. - In most countries where disfranchisement does exist, the policy is both more narrowly targeted and more visible in its application than in the United States. - A number of treaties and other types of international instruments support either the abolition of criminal disfranchisement law, or considerably narrower restrictions than those employed by most American states. - All foreign constitutional courts that have evaluated disfranchisement law have found the automatic, blanket disqualification of prisoners to violate basic democratic principles. In countries where courts have called for enfranchisement of inmates, the legislative and executive branches have complied without significant resistance. - Where prisoners are allowed to vote, they do so either in the correctional facilities themselves - with no threat to security - or by some version of absentee ballot, in their town of previous residence, in all cases with government entities facilitating the voting. In no country do prisoners vote in a manner that allows them to shape the politics of the prison locality. Readers will have different responses to this evidence. Some will deduce from the widespread and unproblematic fact of prisoner voting elsewhere that the United States should promptly overhaul its policies. Others may scoff, perhaps having already concluded that the ideas and policies of other countries are and should remain irrelevant to the American political context. We believe no less an authority than the American Declaration of Independence counsels against the latter conclusion. As Jefferson famously wrote, "a decent respect to the opinions of mankind requires" that we be able to explain the reasons for our policies to others. While it is not our view that the international setting alone justifies a change in American law, we do argue that the evidence compiled here should induce greater skepticism about the wisdom of disfranchisement law in the United States. In our view, this evidence, coupled with the serious and extensive problems these laws pose for both the officials administering them and those affected by them, counsels in favor of rethinking the broad bans and replacing them with rational, tailored bans, or none at all. Given the relative ease (and low cost) of administering absentee ballot voting in prisons, states may want to seriously consider the examples of Maine, Vermont and Puerto Rico. Or, following the example of some European democracies, consider barring only those it makes sense to bar - for example, those convicted of election fraud. Another possibility would be to enfranchise all except the incarcerated, with no documentary requirement complicating reinstatement on the rolls after release from prison. Although such a policy now survives only in the most regressive European nations, it would constitute a significant movement forward for most American states, given how far out of step the United States is on this issue. Moreover, inmate-only disfranchisement - if you are able to appear physically at the polls and meet age and residency requirements, you are eligible to vote - would solve the multitude of problems now bedeviling the administration of disfranchisement policies in the U.S.

Details: New York: ACLU, 2006. 38p.

Source: Internet Resource: Accessed April 18, 2018 at: https://www.aclu.org/sites/default/files/field_document/asset_upload_file825_25663.pdf

Year: 2006

Country: International

Keywords: Collateral Consequences

Shelf Number: 117111


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Opioid overdose: preventing and reducing opioid overdose mortality

Summary: Although data are limited, an estimated 70,000-100,000 people die from opioid overdose each year. Opioid overdose was the main cause of the estimated 99,000- 253,000 deaths worldwide related to illicit drug use in 2010. Opioid overdose is both preventable and, if witnessed, treatable (reversible). In its resolution 55/7 on promoting measures to prevent drug overdose, in particular opioid overdose, the Commission on Narcotic Drugs called upon Member States to include effective measures to prevent and treat drug overdose in national drug policies. In that resolution, the Commission requested the United Nations Office on Drugs and Crime (UNODC), in collaboration with the World Health Organization (WHO), to collect and circulate available best practices on the prevention and treatment of and emergency response to drug overdose, in particular opioid overdose, including on the use and availability of opioid receptor antagonists such as naloxone and other measures based on scientific evidence. This discussion paper outlines the facts about opioid overdose, the actions that can be taken to prevent and treat (reverse) opioid overdose and areas requiring further investigation. Opioids, which can be chemically synthesized or derived from the opium poppy plant, are a group of compounds that activate the brain's opioid receptors, a class of receptors that influence perceptions of pain and euphoria and are involved in the regulation of breathing. Some of the more commonly known and used opioids are morphine, heroin, methadone, buprenorphine, codeine, tramado, oxycodone and hydrocodone. They are used as medicines to treat pain and opioid dependence. If used in excess or without proper medical supervision, opioids can cause fatal respiratory depression. In cases of fatal overdose, the victim's breathing slows to the point where oxygen levels in the blood fall below the level needed to transfer oxygen to the vital organs. As oxygen saturation (normally greater than 97 per cent) falls below 86 per cent, the brain struggles to function. Typically, the individual becomes unresponsive, blood pressure progressively decreases and the heart rate slows, ultimately leading to cardiac arrest. Death can occur within minutes of opioid ingestion. But often, prior to death there is a longer period of unresponsiveness lasting up to several hours. This period is sometimes associated with loud snoring, leading to the term "unrousable snorers". Worldwide, overdose is the leading cause of avoidable death among people who inject drugs. However, it is difficult to accurately estimate the number of fatal opioid overdoses because of the poor quality or limited nature of mortality data available. According to UNODC estimates, drug-related deaths account for between 0.5 percent and 1.3 percent of all-cause mortality at the global level among persons aged 15-64. In that regard, the recent Global Burden of Diseases, Injuries, and Risk Factors Study, 2010 found that there were an estimated 43,000 deaths in 2010 due to opioid dependence and 180,000 deaths due to drug poisoning, resulting in more than 2 million years of life lost. In the United States of America alone, there were an estimated 38,329 drug poisoning deaths in 2010, including 16,651 fatal opioid overdoses related to prescription opioid analgesics in 2010, with the remainder of those deaths largely involving heroin and/or cocaine. Opioid overdose accounts for nearly half of all deaths among heroin injectors, exceeding HIV and other disease-related deaths. Overdose was reported more frequently than were other causes in the 58 cohort studies examined in a 2011 meta-analysis. That meta-analysis also indicated that overdose represented the most common specific cause of death, at 6.5 deaths per 1,000 person-years. Among the 10 per cent of people living with HIV in the United States who also inject drugs, overdose is a common cause of non-AIDS related death. A recent meta-analysis showed that HIV sero-positivity is associated with an increased risk of overdose: people who use drugs have a 74 percent greater risk of overdose if they are HIV-positive compared with their HIV-negative counterparts. In the Russian Federation, overdose is the second leading cause of death for people with HIV after tuberculosis. Nationally reported mortality data in both low-income and high-income countries are often insufficient to estimate overdose deaths. Current data on overdose mortality derive mostly from prospective cohort studies and national reporting systems, largely from high-income countries. To address these challenges, some countries have now adopted a standard case definition, contributing to an improved capacity for reliable overdose data. However, in a significant number of countries, data on overdose are limited, with the result that alternative data sources, often combined with expert opinion, are required to estimate rates. Consequently, overdose mortality generally tends to be underestimated, and nationally reported statistics in that regard are likely to be conservative. For example, against the backdrop of negligible numbers of fatal overdoses reported by national authorities of Central Asian countries, 25.1 percent of injecting drug users surveyed in Kazakhstan, Kyrgyzstan and Tajikistan in 2010 reported having witnessed someone die from an overdose in the previous 12 months. It is likely that people who use opioids also experience a high rate of non-fatal overdose. For instance, 59 percent of known heroin injectors in a study conducted in 16 Russian cities reported having had at least one non-fatal overdose in their lifetime. The proportion of heroin injectors reporting lifetime non-fatal overdose is similarly high in several other cities: 41 percent in Baltimore, 42 percent in New York City, 68 percent in Sydney, 38 percent in London, 30 percent in Bangkok, and 83 percent in Bac Ninh, Viet Nam. Non-fatal overdose can significantly contribute to morbidity, including cerebral hypoxia, pulmonary oedema, pneumonia and cardiac arrhythmia, that may result in prolonged hospitalizations and brain damage.

Details: Vienna: UNODC, 2013. 28p.

Source: Internet Resource: Discussion paper, UNODC/WHO: Accessed April 18, 2018 at: https://www.unodc.org/docs/treatment/overdose.pdf

Year: 2013

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 149846


Author: Danelo, David J.

Title: For Protection or Profit? Free trade, human smuggling and international border management

Summary: For the past two decades, policy officials and human-rights groups in both Europe and the US have participated in a vicious cycle of criticizing each other over the impact of border-control policies. Many activists hold enforcement authorities responsible for the human impact of migration enforcement, evident in allegations of increases in human smuggling and the grim realities of migrant deaths. In contrast, policymakers often claim that humanrights advocates encourage migration and risk-taking by proposing consequence-free international transit, which exacerbates the problem. Although the role of free-trade policies and supply chains is critical to understanding the border-management landscape in which these activities play out, customs laws are rarely considered by either side in this debate. This policy paper considers the impact of multinational corporations on border control through so-called trusted trader and traveller programmes, whose aim is to reduce border inspections for individuals and companies by allowing inspectors to pre-screen cargo and passengers who pass background investigations. Although these programmes have become essential to the management of global supply chains, they often create an illusion of increased security while simultaneously intensifying the divide between those who are and those who are not willing to pay the fees to participate in them. The paper also critically examines two pillars of American border policy - beyond-the-border initiatives and joint border management - and compares them with security elements of the European system. These mechanisms, which increased sharply through American-led initiatives following the 9/11 terrorist attacks, often appear effective and harmless, and therefore receive little scrutiny. Both in the US and Europe, multinational border-control agreements have been subjected to little scrutiny because of the failure of stakeholders to hold the global transportation system and state authorities accountable for these agreements. Although scant empirical evidence is available, what little does exist suggests that illicit activities, such as smuggling, are only marginally deterred by these strategies. By taking advantage of the vulnerabilities in such border-control agreements, smugglers of migrants and contraband are able to exploit trusted trader/ traveler programmes and public-private partnerships by using companies or people that are participants to make illicit transits. Although these agreements should not be eliminated, Europe should be cautious about mirroring the American approach to border management. And amid the current political climate of increasingly xenophobic US immigration policies, European policy negotiators should consider stipulating minimum requirements for participation in US programmes, including protections for people seeking humanitarian relief.

Details: Global Initiative Against Transnational Organized Crime, 2018. 22p.

Source: Internet Resource: Policy Note: Accessed April 18, 2018 at: http://globalinitiative.net/wp-content/uploads/2018/03/For-Protection-or-Profit-Intl-Border-Management-March-2018-web.pdf

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 149847


Author: Park, Maki

Title: Responding to the ECEC Needs of Children of Refugees and Asylum Seekers in Europe and North America

Summary: In Europe and North America, the arrival of heightened numbers of refugees and asylum seekers in recent years has challenged the ability of governments and service providers to both meet initial reception needs and provide effective long-term integration services. Young children make up a significant share of these newcomers. As a result, there is a pressing need for early childhood education and care (ECEC) programs equipped to serve culturally and linguistically diverse learners and their families, including by supporting the healthy development of children who have experienced trauma. his report explores the findings of a nine-country study of ECEC policies and practices designed to serve young children of refugees and asylum seekers. It draws on fieldwork conducted in Belgium, Canada, Germany, Greece, Italy, the Netherlands, Sweden, Turkey, and the United States-major host countries with varied refugee and asylum-seeker populations, migration-management policies, and ECEC systems-to highlights both common challenges and promising practices. In many of the countries studied, country-wide responses to the ECEC needs of this population have been weak or nonexistent, as has support for the local government actors charged with ECEC service provision. And while many ECEC programs recognize the importance of trauma-informed care, few feel they have the training or resources to adequately provide it. Nonetheless, some countries and individual ECEC programs have developed strategies to better serve these children-from expanding services and language supports, to offering health and educational services in one location, to boosting stakeholder coordination through interagency and community partnerships.

Details: Washington, DC: Migration Policy Institute, 2018. 65p.

Source: Internet Resource: Accessed April 19, 2018 at: https://www.migrationpolicy.org/research/responding-ecec-needs-children-refugees-asylum-seekers-europe-north-america

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 149857


Author: West, Darrell M.

Title: Benefits and Best Practices of Safe City Innovation

Summary: Public safety is an important aspect of contemporary life. In a world that is chaotic, dangerous, and volatile, it is hard for there to be economic prosperity and social cohesion without some degree of safety. People need security in order to live day-to-day and undertake business and communications. This is especially the case in regard to cities. According to UNICEF, 70 percent of people around the world will live in cities by the Cities face a variety of implementation challenges, such as poor funding, infrastructure difficulties, public resistance, a lack of technical expertise, and privacy and security concerns. Implementation of public safety solutions represents a major challenge in many different places, and it is crucial for leaders to overcome these barriers in order to achieve the benefits of public safety innovation. Solutions such as CCTV cameras, police body cameras, integrated command centers using broadband trunking, social media safety alerts, and predictive data analysis show great promise as tools for law enforcement. Many factors affect technology innovation in the public sector. This includes the level of financial investment, crime rates, safety considerations, openness to technology solutions, and the strength of the digital infrastructure in particular countries. But government policy is especially important because officials make investments that enhance the efficiency and effectiveness of public sector operations. The way in which they handle modernization strategies matters a lot in terms of innovation and service delivery. There are many opportunities for cities to build their economies and promote social inclusion through public safety innovation. Cities can encourage greater innovation by increasing budget investments in digital infrastructure, building public support, using crowd-sourcing platforms to encourage citizen participation, breaking down organizational stovepipes through technology, overcoming organizational resistance, making data openly available, deploying data analytics, integrating solutions, figuring out how to balance privacy and security concerns, and identifying opportunities for improvement.

Details: Washington, DC: Center for Technology Innovation (CTI) at Brookings, 2017. 58p.

Source: Internet Resource: Accessed April 26, 2018 at: https://www.brookings.edu/wp-content/uploads/2017/10/safe-city-innovation_final.pdf

Year: 2017

Country: International

Keywords: Body-Worn Cameras

Shelf Number: 149914


Author: Barr, Michael

Title: Enhancing anti-money laundering and financial access: Can new technology achieve both?

Summary: Advances in both private-sector financial technology (FinTech) and technology supporting public sector regulatory compliance (RegTech) offer tremendous promise for broadening and strengthening the global financial system. By vastly reducing the cost of providing financial services, FinTech makes greatly expanded and sustainable financial inclusion a realistic goal. At the same time, greater automation, simplified operational processes, and more detailed and less costly analytics create the potential to enable enhanced transparency while maintaining or improving personal privacy and security of financial activity. Such transparency would in turn support improved financial regulation and supervision as well as consumer protection. Global financial standard-setting bodies (SSBs) are alive to the opportunity to encourage regulators to harness the strongest capabilities of these new technologies. Doing so would enable financial services providers to create the efficiencies necessary to provide meaningful financial access to the underserved while enhancing anti-money laundering (AML), combating of financing of terrorism (CFT) and other risk mitigation objectives. If done appropriately, FinTech and RegTech would also strengthen regulatory and supervisory capabilities and lower compliance costs. This can be a classic win-win. Standard-setters, regulators, and global organizations are making positive statements about new technology and are reaching out to FinTech providers to understand technologies better. At the same time, current global financial standards and practices actually impair the adoption of new technology, not least due to uncertainty regarding how these standards, designed with legacy technology in mind, apply to the new capabilities and processes that come with technological advances. There is a significant opportunity to advance efficiency, consumer empowerment, safety and soundness, and anti-money laundering and antiterrorist financing goals together. In this paper, we focus on those global standards that apply to cross-border payments. Global financial standards have a large impact on cross-border payments as the challenges regarding interpretation and application of international standards at a national level are amplified by the number of jurisdictions affected. Navigating differing regulatory views and capabilities across jurisdictions is a costly and uncertain venture, confining it to the largest FinTech providers with sufficient funds to negotiate national complexities jurisdiction by jurisdiction. As a result, this is an area where coordinated global action could be especially beneficial. In particular, by encouraging global coordination and appropriate adoption of new technologies, modernized global financial standards could make a substantial contribution to resolving the challenges that currently beset the global remittance market. Apart from being a particularly challenging market, the socio-economic importance of the remittance market also strengthens its bid for priority attention. Remittances represent a key financial service for the growing migrant, refugee, and transnational community who rely on them to remit funds back to their loved ones in their country of origin. Indeed, the G20, the IMF and others working on financial policy have identified remittances as one of the best potential areas of focus for financial inclusion efforts.

Details: Washington, DC: Brookings Institution, 2018. 21p.

Source: Internet Resource: Working Paper: Accessed April 28, 2018 at: https://www.brookings.edu/wp-content/uploads/2018/04/es_20180413_fintech_access.pdf

Year: 2018

Country: International

Keywords: Crime Prevention

Shelf Number: 149892


Author: WePROTECT Global Alliance

Title: Global Threat Assessment 2018: Working together to end sexual exploitation of children online

Summary: The Global Threat Assessment is the first of its type, both in terms of the broad stakeholder community that it draws from but also in its global vision to strengthen and further develop the international response to this growing and persistent threat. The report has been commissioned with the following aims: - raising international awareness of online child sexual exploitation (OCSE); - greater understanding of the threat and how it is evolving; - greater understanding of both the impact to victims and the wider societal impact of OCSE; - creating a baseline which can be used to monitor both the level of the threat and the positive impact that interventions are having on the offender population; - to provide evidence based examples to support members in making domestic and international decisions or investments. The WePROTECT Global Alliance to End Child Sexual Exploitation Online combines two major initiatives: the Global Alliance against Child Sexual Abuse Online, led by the US Department of Justice and the EU Commission, and WePROTECT, convened by the UK. This new, merged initiative has unprecedented reach, with 82 government members of the WePROTECT Global Alliance, along with major international organisations, 20 of the biggest names in the global technology industry, and 24 leading international and non-governmental organisations.

Details: s.l.: The Alliance, 2018. 36p.

Source: Internet Resource: Accessed April 28, 2018 at: http://www.africanchildinfo.net/index.php?option=com_sobi2&sobi2Task=sobi2Details&sobi2Id=1718&Itemid=142&lang=en

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 149945


Author: Organization for Security and Co-operation Europe, Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings

Title: Compendium of relevant reference materials and resources on ethical sourcing and prevention of trafficking in human beings for labour exploitation in supply chains

Summary: The objective of the Compendium of Resources is to take stock of the existing legislation, policies, guidelines, recommendations, reports, studies, and other types of initiatives developed to better understand and respond to the global problem of trafficking in human beings through its prevention in supply chains. The resources included in the Compendium do not represent by any means an exhaustive list and are only intended to illustrate the initiatives identified by the OSCE Office of the Special Representative and Co-ordinator for Combating Trafficking in Human Beings during the development of this project. The Compendium is intended for the use by government officials involved in policy making, as well as businesses and other stakeholders interested to learn from current practices in order to further enhance their own measures on ethical sourcing and the prevention of human trafficking in supply chains

Details: Vienna: OSCE, 2018. 116p.

Source: Internet Resource: Accessed April 30, 2018 at: https://www.osce.org/secretariat/375910?download=true

Year: 2018

Country: International

Keywords: Forced Labor

Shelf Number: 149961


Author: Crijns, J.H.

Title: Collaboration with Justice in the Netherlands, Germany, Italy and Canada. A comparative study on the provision of undertakings to offenders who are willing to give evidence in the prosecution of others

Summary: 1.1 Background, purpose and research questions One of the more far-reaching investigative tools in criminal cases is the instrument of collaboration with justice, the measure by which undertakings are made to otherwise unwilling ‘offender witnesses’, i.e. witnesses who themselves are suspected or who have been found guilty of committing a criminal offence, in order to persuade them to cooperate with the authorities, by giving (incriminating) evidence in the prosecution of others. While the instrument is generally viewed as a useful tool for penetrating the higher echelons of a criminal organization, it is not uncontroversial, entailing as it does the promise of ‘benefits’ to persons who themselves are suspected of, or who have been found guilty of, committing a criminal offence, thereby posing a risk to the reliability of the testimony as well as to the integrity of the proceedings and the criminal justice system more generally. This study aims to gain insight into the legal avenues available for making undertakings to witnesses in exchange for their evidence in several countries – the Netherlands, Germany, Italy and Canada –, ultimately with a view to drawing lessons from the comparative exercise for the Netherlands in particular. The Netherlands has had a statutory provision since 2006 on collaboration with justice. However, since its introduction into the Code of Criminal Procedure, it has been applied in only a handful of cases, while one of those cases in particular – Passage – has raised important and sometimes difficult questions concerning the nature and applicability of the statutory provision. In July 2013 – six months after passing judgment in the first instance in the Passage case – the then (Dutch) Minister of Security and Justice sent a letter to the Lower House of Parliament in which he indicated that in the context of effectively combatting organized crime, he considered it necessary ‘to widen the scope for working with members of the civilian population who themselves are – or have been – active in groups which are subject to investigation, or who are in some way closely related to members of such groups’. The statutory framework which currently applies to the instrument of collaboration with justice was felt to be too restrictive, in the minister’s view. For these reasons he announced that a bill would be prepared ‘that provides for a widening of the Public Prosecution Service’s […] room to negotiate in order, in exceptional situations, to be able to make greater undertakings than are now possible.’ As an example the minister referred to undertakings to reduce sentences by more than half, i.e. more than may currently be granted, without this amounting to an undertaking of complete immunity from prosecution, or providing financial compensation, which is currently forbidden. The minister also indicated that he wanted to make the instrument of collaboration with justice available for more offences than is currently possible under the statutory provisions, and for economic and financial crime and corruption, in particular. As part of the current legislative process for modernising the Dutch Code of Criminal Procedure, this topic is once again up for consideration by the Dutch legislator. In drawing lessons from the comparative exercise for the Netherlands, then, the more specific aim of this study is to provide input for the purpose of the determination of whether or not to introduce a new statutory provision on collaboration with justice or to refine the existing one. In examining each of the four countries, it will be considered how the instrument has been legally framed, along with how it is applied in practice, and what kinds of problems and public debate that has engendered. Accordingly, this study is not only concerned with ‘the law in the books’, but also ‘the law in action’, and this is reflected in the research questions (as well as the more general aim of the study, as set out above). Thus, the main questions to be answered in this study are as follows. a) How is the instrument of collaboration with justice (hereafter: ‘the instrument’) regulated in each of the countries under examination? b) How is the instrument applied in practice in each of the countries under examination, and what are the experiences and results achieved in this regard? c) How does the relevant law and practice in Germany, Italy and Canada compare to that in the Netherlands?

Details: Leiden: University of Leiden, Criminal law and Criminology, 2017. 400p.

Source: Internet Resource: Accessed May 2, 2018 at: https://www.rijksoverheid.nl/documenten/rapporten/2018/05/01/tk-bijlage-1-collaboration-with-justice-in-the-netherlands-germany-italy-and-canada

Year: 2017

Country: International

Keywords: Collaboration

Shelf Number: 149981


Author: International Expert Group on Drug Policy Metrics

Title: Aligning Agendas: Drugs, Sustainable Development, and the Drive for Policy Coherence

Summary: Current drug policy too often has a negative impact on communities and runs counter to efforts to ameliorate poverty through sustainable development. However, this is often not captured by the metrics used to measure the impact of drug policy. One way to improve these metrics is to align them with the Sustainable Development Goals (SDGs). This would not only help overcome many of the limitations of drug policies resulting from suboptimal metrics but also make sure these policies enhance, rather than hinder, efforts to achieve the SDGs. This report analyzes how more precise, more complete, and better conceived metrics can help us to understand the impact of drug policy on sustainable development and the prospects of achieving the SDGs. The report is the result of over a year of work by the International Expert Group on Drug Policy Metrics, convened by the Conflict Prevention and Peace Forum and the International Peace Institute. This group puts forward the following recommendations for the UN, member states, and the drug policy community: Develop a framework for policy coherence between drug policy and sustainable development. Create an external advisory committee bringing together experts on drug policy and sustainable development. Add SDG indicators related to drug policy. Put in place mechanisms to gather data on the effects of drug policies. Use the SDG indicators as a model for improving drug policy indicators. Prioritize outcome - rather than process-oriented metrics.

Details: New York: International Peace Institute, 2018. 28p.

Source: Internet Resource: Accessed May 2, 2018 at: https://www.ipinst.org/wp-content/uploads/2018/02/1802_Aligning-Agendas.pdf

Year: 2018

Country: International

Keywords: Developing Countries

Shelf Number: 149982


Author: Disney, Lynn

Title: Illicit Drug Use and Criminal Behavior: A Literature Review

Summary: Speculation and case histories about the role of illegal drug use and crime abounds. Turf wars between rival gangs, desperate users seeking resources to supply their habits, injuries resulting from a person high on PCP-are all examples of crimes that occurred as a result of illegal drug use. Look at almost any newspaper and you will find articles discussing these crimes in detail. These accounts rarely apply an empirical framework, and in reality, estimating the proportion of crime attributable to illegal drug use is an area of research where little agreement exists. The purpose of this literature review is to examine evidence-based approaches that have been tested in research and then determine whether defensible methodologies exist for calculating a drug use-attributable fraction for crimes committed in the United States. ANALYTICAL CONSIDERATIONS The precise nature and relationship of these factors is complex. Drugs can produce a variety of symptoms and side effects, depending on the individual. Do mental health problems precede or are they caused by the drug use? Does the criminal behavior occur because the individual is taking drugs or is it a cause of substance use? The answers to these questions differ based on who is taking the drug, the drug being taken, and the environment in which it is taken. A person with schizophrenia may abuse drugs to quell the symptoms of the disease. A woman may abuse drugs to alleviate feelings of inadequacy caused by spousal abuse. A teenager may engage in risky sexual behaviors due to lowered inhibitions caused by using drugs. A heroin addict may commit a burglary to obtain the funds to support his habit. In some cases, the crime would not occur but for the drug use. This paper attempts to tease out the causal relationship between illicit drug use and other forms of criminal behavior. Complicating any examination of the link between illicit drug use and criminal behavior is the tendency to include tobacco use and alcohol in this equation. While these products all may involve some significant risk of criminal behavior, they are outside the scope of this report. To the extent possible, numbers attributed to the use and abuse of tobacco and alcohol will be removed from the analysis. The abuse of prescription drugs as a cause of criminal behavior was not excluded but few studies focused solely on this exposure.

Details: Washington, DC; Office of National Drug Control Policy, 2010. 84p.

Source: Internet Resource: Accessed May 4, 2018 at: https://obamawhitehouse.archives.gov/sites/default/files/ondcp/policy-and-research/illicit_drug_use_and_criminal_behavior_literature_review_2010.pdf

Year: 2010

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 150048


Author: Efrat, Asif

Title: Governing Guns, Opposing Opium: A Theory of Internationally Regulated Goods

Summary: The paper examines a significant phenomenon overlooked by the trade literature: internationally regulated goods. Contrary to the general trend of trade liberalization, specific goods, such as drugs, small arms, and antiquities, have come under increasing international control in recent decades through a set of global regulatory agreements. I argue that these goods are unique in that they involve transnational negative externalities. Whereas certain countries benefit from the trade in these goods, the trade inflicts negative effects on other countries. Examples of such negative externalities include fatalities and refugee flows resulting from rampant gun violence, high crime rates associated with widespread drug abuse, and archaeological destruction caused by antiquities looting. The paper develops a theory that first explains why national regulation is insufficient and why international regulation is necessary for curbing these negative externalities. The theory then analyzes why certain governments are strongly in favor of international regulation while others wish to maintain the trade uncontrolled. My analysis locates the sources of governments' conflicting preferences in the domestic political arena and considers how exporters, consumers, and civil society shape governments' views. The final part of the theory examines how the distribution of state power affects the establishment of the regulatory agreements. The paper makes several theoretical contributions by bridging rationalist and non-rationalist accounts of international law and by focusing on international cooperation in the absence of shared interest.

Details: Ithaca, NY: Cornell Law School, 2008. 71p.

Source: Internet Resource: Cornell Law Faculty Working Papers: Accessed May 4, 2018 at: https://scholarship.law.cornell.edu/clsops_papers/41/

Year: 2008

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 150060


Author: Efrat, Asif

Title: Governing Guns, Opposing Opium: The Politics of Internationally Regulated Goods

Summary: Contrary to the general trend of trade liberalization, specific goods - such as small arms, drugs and antiquities - have come under increasing international control in recent decades through a set of international regulatory agreements. The motivation for international regulation has been the negative externalities that these goods involve, such as fatalities and refugee flows stemming from rampant gun violence, crime associated with widespread drug abuse, and archaeological destruction caused by antiquities looting. Yet despite the severity of the problems it addresses, international regulation has been extremely controversial. The dissertation seeks to account for the highly-divergent preferences of governments over the extent of - and even need for - the international control of these goods. I argue that governments that face the trade's negative effects upon their own countries favor strong international regulation. So do governments that are concerned about secondary externalities - the trade's negative effects on foreign countries. Concern about secondary externalities may result from pressure of principled actors committed to worldwide suppression of trade that they deem harmful. Proregulation governments, however, meet with resistance from governments guarding the interests of exporters or consumers who wish to maintain the trade uncontrolled. Given the absence of shared interest in cooperation, the resulting international regulation typically reflects the preferences of the powerful actors.

Details: Cambridge, MA: Harvard University, Department of Government, 2008. 433p.

Source: Internet Resource: Dissertation: Available at Rutgers Criminal Justice Library.

Year: 2008

Country: International

Keywords: Illegal Trade

Shelf Number: 150082


Author: Saalman, Lora, ed.

Title: Integrating Cybersecurity and Critical Infrastructure: National, Regional and International Approaches

Summary: There seems to be a consensus that cyberattacks resulting in damage to critical infrastructure, such as hospitals and power grids, are a common threat. However, there is a great deal of disagreement on how to define the parameters of and escalation within this arena. In this volume, six experts from industry, government, academia and the legal sector delve deeper into several key target areas of cybersecurity and critical infrastructure-namely system integrity, the role of the private sector and legal frameworks. Their essays provide a baseline for understanding how these issues are unfolding at the national level in Japan, at the regional level in Europe and at the international level under the United Nations. Contents 1. Introduction 2. System integrity and the national level 3. Private sector and the regional level 4. Legal frameworks and the international level 5. Conclusions

Details: Solna, Sweden: Stockholm International Peace Research Institute, 2018, 58p.

Source: Internet Resource: Accessed May 7, 2018 at: https://www.sipri.org/sites/default/files/2018-04/integrating_cybersecurity_0.pdf

Year: 2018

Country: International

Keywords: Critical Infrastructure

Shelf Number: 150091


Author: Finlay, Brian D.

Title: Public Threats, Private Solutions: Meeting Nonproliferation Challenges with the Force of the Market

Summary: The rapid pace and geographic breadth of technology innovation; the rapidity and volume of international trade; globalized business practices from outsourcing to offshoring and supply-chaining; the atomization of government interests and bureaucratic organization; and the inherent inability of governments to act at the speed of 21st-century commerce: these are but a few factors negatively influencing our ability to manage the lengthening global proliferation supply chain. The net result has been the global diffusion of the "means of production" of weapons of mass destruction (WMD) at the very moment that the traditional instruments of control are being challenged by downward budgetary pressures in government, complex cost-benefit calculations by political leaders, and a rapid evolution of the nature and modalities of the proliferation threat. These realities necessitate the advent of new approaches that better match and ultimately defeat emerging avenues for proliferation threats. Governments can no longer be solitary nonproliferation activists. The end of the last millennium brought with it a host of challenges that transcend national borders and institutional and conceptual boundaries: 9/11 and the rise of non-state actors, global disease pandemics, economic crises, and climate change. Globalization has clearly yielded a more uncertain and potentially dangerous world. A rapid increase in the movement of goods and people around the world has fueled a concomitant rise in illicit trade and a surge in profits to global gray and black markets. In 2012 the United Nations (UN) Secretary General's report noted that while over 500 million maritime containers move around the world every year, accounting for 90 percent of international trade, only 2 percent of these containers are physically inspected for contraband on an annual basis. In 2009, the UN Office on Drugs and Crime (UNODC) estimated that transnational organized crime generates $870 billion a year, an amount equal to 1.5 percent of the global gross domestic product and six times the amount of official development assistance. More recent estimates put this number even higher, at closer to $3 trillion annually. Cybercrime, for which private industry bears most of the cost, is also surging. Cyber activities have increased by 26 percent since 2012, and reportedly now cost victims $11.56 million per year. And successive reports by the UN Sanctions Committees on North Korea and Iran demonstrate the widespread exploitation of private industry as both a witting and unwitting facilitator of proliferation. For security analysts, the conclusion is clear: globalization has made the world a far less safe and predicable place. Yet these grand challenges resulting from globalization have also yielded heretofore unimagined technological, economic, and development opportunities in virtually every corner of the globe. For instance, thanks in large measure to globalization, extreme poverty has declined significantly over the last two decades. In 1990, nearly half of the population in the developing world lived on less than $1.25 a day. Today, that proportion has dropped to just 14 percent - the largest mass migration from poverty in human history. For most of the planet's population, globalization and technology diffusion are rightly celebrated as truly life-changing - and in many cases life-saving - phenomena.

Details: Washington, DC: Stimson Center, 2016. 40p.

Source: Internet Resource: Accessed May 10, 2018 at: https://www.stimson.org/sites/default/files/file-attachments/public-threats-private-solutions.pdf

Year: 2016

Country: International

Keywords: Black Markets

Shelf Number: 150134


Author: Shaver, Amanda

Title: Casting a Wider Net: The Security Implications of Illegal, Unreported, and Unregulated Fishing

Summary: The world's fisheries are on the brink of collapse. The Food and Agriculture Organization of the United Nations (UNFAO) estimates nearly 90 percent are fully exploited or overexploited and depleted, while demand for seafood continues to increase. Faced with this reality, fishing fleets are scavenging the globe to meet the growing demand, and in the process often engage in illegal, unreported, and unregulated (IUU) fishing. These pervasive operations do not just pose a threat to the environment, but also a significant threat to national, regional, and global security. This report details those threats, which are the: 1 Threat to ecological security 2 Threat to economic security 3 Threat to food security 4 Threat to geopolitical stability 5 Threat of maritime piracy 6 Threat of transnational organized crime The perpetrators of IUU fishing are not just the local fisherman catching a bit more than his quota allows, but include a range of offenders: from foreign vessels fishing illegally in another nation's sovereign waters to criminal networks that participate in a variety of illicit activities, including trafficking in drugs, arms, and humans, as well as utilizing shell companies to launder money and slaves to carry out their operations. For these reasons and many others explored within this report, IUU fishing poses a risk to national security and addressing it will require more effort and focus than can be addressed by the conservation community and natural resource management agencies alone. These threats necessitate countries across the world, and particularly the United States, to develop a whole-of-government strategy to combat IUU fishing. This integrated approach involves tapping into the expertise of agencies across government, including those with knowledge spanning from natural resource management, development, trade and finance, to intelligence gathering and law enforcement, as well as the wide community of stakeholders interested in combating IUU fishing. Casting a Wider Net: The Security Implications of Illegal, Unreported, and Unregulated Fishing, argues that IUU fishing is a threat to national security due to its multivariate impacts on individuals, communities, economies, institutions, and governments. It sets out a series of recommendations that articulate a whole-of-government strategy that the U.S. government and other foreign partners can utilize to curb the impacts of IUU fishing, which are to: - Create a whole-of-government approach - Increase engagement of Combatant Commands (COCOMS) - Expand shiprider agreements between the U.S. and foreign countries - Encourage countries to ratify, implement, and enforce the Port State Measures Agreement - Dedicate resources to increase monitoring and enforcement capacities - Advocate for comprehensive foreign domestic fisheries regulations and catch reporting requirements - Encourage greater transparency of the fishing industry

Details: Washington, DC: Stimson Center, 2018. 40p.

Source: Internet Resource: Accessed May 10, 2018 at: https://www.stimson.org/sites/default/files/file-attachments/Casting%20a%20Wider%20Net%20Report.pdf

Year: 2018

Country: International

Keywords: Fishing Industry

Shelf Number: 150135


Author: Council on Foreign Relations

Title: How Anonymous Shell Companies Finance Insurgents, Criminals, and Dictators

Summary: The Panama Papers leak of eleven million documents in April 2016 revealed that former Iraqi Prime Minister Ayad Allawi, the brother-in-law of Chinese President Xi Jinping, longtime friends of Russian President Vladimir Putin, drug kingpins, and even a soccer megastar had something in common: they all channeled money through anonymous shell companies. Anonymous shell companies are entities that usually employ few or no workers, do not conduct any substantive business, and allow their owners to store or route money while hiding their identities. Because of the secrecy they can provide, anonymous companies represent an important nexus of corruption, money laundering, transnational organized crime, and terrorism, which directly harm U.S. interests. As one of the main facilitators of anonymous companies, the United States should pass legislation to disclose ownership information for all companies, increase federal contract transparency, and boost other business and government transparency mechanisms at home and abroad. Doing so would significantly cut back on the ability of terrorists, criminals, and their ilk to use American corporations, real estate, and trusts to finance activities that harm the United States and its foreign interests.

Details: Washington, DC: Council on Foreign Relations, 2017. 8p.

Source: Internet Resource: Accessed May 10, 2018 at: http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/CFR-How%20Anonymous%20Shell%20Companies%20Finance%20Insurgents,%20Criminals,%20and%20Dictators.pdf

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 150136


Author: Ibrahim, Zainab

Title: Counting the Cost: The Price Society Pays for Violence Against Women

Summary: A new global report launched by the international relief and development organization, CARE International, estimates that violence against women (VAW) costs society upwards of 2% of global GDP, and states that the problem is serious in low, middle and high income countries alike. "First and foremost, violence against women is a fundamental human rights violation that demands condemnation and action. While all costs cannot be easily measured, an understanding of the economic costs to society provides additional perspectives as to why governments, donors and the private sector need to come together to address this pandemic", said Sofia Sprechmann, Program Director for CARE International. The report, "Counting the Cost: The price society pays for violence against women," draws on studies from 13 different areas of the world and presents the economic costs of VAW in relation to national economies. Three of the case studies were conducted by CARE which looked at intimate partner violence (IPV) in Bangladesh and Zambia and sexual harassment in the workplace in Cambodia. Survivors bear the highest costs but States bear costs in service delivery to victims while the private sector pays for reduced productivity. Costs and lives are therefore saved when laws and proper investments address preventing violence, education, and thus the implementation of behavioural, legal and regulatory solutions across sectors. The cost of violence to GDP greatly exceeds the cost of prevention and intervention. For example, in Uganda, implementing the provisions of the Domestic Violence Act of 2010 for both prevention and response was slated at just over US$ 8 million over three years while the cost of violence occurring was estimated at US$ 30.7 million for just one year. "These figures - both the billions of US dollars that violence costs and the more than one billion women likely to suffer that violence in their lifetime - point to one inescapable conclusion: violence against women has a devastating and lasting impact on all of us and demands that we pledge support and take urgent action" said Jayanthi Kuru-Utumpala, one of the co-authors of the report from Chrysalis, Sri Lanka, an affiliate member of the CARE International network. _"__Violence and harassment against women are among the abuses that leave women vulnerable at avoidable cost to them, their families, and whole economies. In the case of workplace protection, more than one-third of the world's countries have no laws prohibiting sexual harassment at work. This is why CARE is encouraging more governments and employers to join the many other governments that have taken a position in support of the adoption of an International Labour Organisation (ILO) __Convention on ending violence and sexual harassment in the world of work as one critical step," said Milkah Kihunah, Deputy Director of Global Advocacy of CARE USA._ The report recommends actions to prevent and respond to violence against women across the government and private sectors and by donors. These include increased resources, support for women's and grassroots movements, and strong laws. CARE is also calling on governments, businesses, trade unions and others to support the establishment of an ILO Convention to end harassment and violence in the world of work. Given the legal gaps in how national laws and current international standards address this issue, a binding ILO Convention would provide a critical guidepost and address the challenges that women and marginalised groups face in accessing the right to work free from violence and harassment.

Details: Geneva, SWIT: CARE International, 2018. 35p.

Source: Internet Resource: Accessed May 11, 2018 at: https://reliefweb.int/sites/reliefweb.int/files/resources/Counting_the_costofViolence.pdf

Year: 2018

Country: International

Keywords: Costs of Violence

Shelf Number: 150155


Author: U.S. Government Accountability Office

Title: Combating Wildlife Trafficking: Opportunities Exist to Improve the Use of Financial Rewards

Summary: Why GAO Did This Study Wildlife trafficking-the poaching and illegal trade of plants, fish, and wildlife-is a multibillion-dollar, global criminal activity that imperils thousands of species. FWS and NOAA enforce laws prohibiting wildlife trafficking that authorize the agencies to pay financial rewards for information about such illegal activities. GAO was asked to review FWS's and NOAA's use of financial rewards to combat wildlife trafficking. This report examines (1) laws that authorize FWS and NOAA to pay rewards for information on wildlife trafficking and the extent to which the agencies paid such rewards from fiscal years 2007 through 2017, (2) the agencies' reward policies, (3) information available to the public on rewards, and (4) the extent to which the agencies reviewed the effectiveness of their use of rewards. GAO reviewed laws, examined FWS and NOAA policies and public communications on rewards, analyzed agency reward data for fiscal years 2007 through 2017 and assessed their reliability, interviewed FWS and NOAA officials, and compared agency policies and public communications on rewards to federal internal control standards. What GAO Recommends GAO is making seven recommendations, including that FWS and NOAA track reward information, FWS augment its reward policy to specify factors for agents to consider when developing proposed reward amounts, FWS and NOAA develop plans to communicate more reward information to the public, and FWS and NOAA review the effectiveness of their reward use. Both agencies concurred with these recommendations.

Details: Washington, DC: GAO, 2018. 55p.

Source: Internet Resource: GAO-18-279, Accessed May 14, 2018 at: https://www.gao.gov/assets/700/691401.pdf

Year: 2018

Country: International

Keywords: Illegal Trade

Shelf Number: 150176


Author: Stimson Study Group on Counterterrorism Spending

Title: Stimson Study Group on Counterterrorism Spending: Protecting American While Promoting Efficiencies and Accountability

Summary: The United States currently lacks an accurate accounting of how much it has spent on the fight against terrorism. Without accurate data, policymakers will have difficulty evaluating whether the nation spends too much or too little on the counterterrorism (CT) mission, and whether current spending is doing its job effectively or efficiently. In the summer of 2017, the Stimson Center convened a nonpartisan study group to provide an initial tally of total CT spending since 9/11, to examine gaps in the understanding of CT spending, and to offer recommendations for improving U.S. government efforts to account for these expenditures. Stimson's research suggests that total spending that has been characterized as CT-related - including expenditures for government-wide homeland security efforts, international programs, and the wars in Afghanistan, Iraq, and Syria - totaled $2.8 trillion during fiscal years 2002 through 2017. According to the group's research, annual CT spending peaked at $260 billion in 2008 at the height of the wars in Afghanistan and Iraq. This represents a 16-fold increase over the 2001 total. In 2017, as war funding declined, total CT spending amounted to $175 billion, nearly an 11-fold increase from the 2001 level. With this growth, CT spending has become a substantial component of total discretionary spending for programs across a wide range of areas, including defense, education, and medical research. Of $18 trillion in discretionary spending between fiscal years 2002-2017, CT spending made up nearly 16 percent of the whole.[i] At its peak in 2008, CT spending amounted to 22 percent of total discretionary spending. By 2017, CT spending had fallen to 14 percent of the total. Despite this drop, the study group found no indication that CT spending is likely to continue to decline. At the same time, budgetary caps enacted in 2011 in the Budget Control Act (BCA) have created an attractive fiscal loophole by placing new pressures on spending while exempting spending characterized as emergency or war spending, also known as overseas contingency operations (OCO). In recent years, billions of dollars in spending unrelated to the wars has been characterized as OCO in order to exempt it from the BCA caps. This practice makes it more difficult to identify spending that is truly dedicated to CT and to evaluate potential trade-offs. The Stimson study group found a variety of weaknesses in definitions, tracking, and consistencies that limit accuracy and contribute to a lack of transparency regarding the current data on CT spending. These weaknesses make it difficult to evaluate whether CT spending has been effective at enhancing security at home or overseas. The study group's recommendations are designed to improve the accuracy of tracking CT spending and to provide greater clarity for budget planning for future CT programs. The study group concluded that a broader set of parameters is urgently needed in order to make the full federal investment in CT more transparent, to identify gaps and trade-offs, and to permit more useful evaluations of the effectiveness and efficiency of that spending. 1. Create a clear and transparent counterterrorism funding report. Congress should reinstate and expand the statutory requirement that the Office of Management and Budget (OMB) compile data and analyze government-wide U.S. homeland security spending in its annual budget request. OMB should provide metrics that show Congress and the public the scope of counter-terrorism spending relative to total discretionary spending and total spending, including mandatory spending. 2. Adopt a detailed agency-wide definition for counter-terrorism spending. OMB and Congress should develop, adopt, and enforce a clear, usable set of criteria to define counter-terrorism spending, including programs with the primary purpose of preventing, mitigating, or responding to terrorist attacks in the United States or overseas. This definition may be tailored to individual agency missions as long as agencies show how any counterterrorism spending addresses a credible threat to the United States. 3. Build on current accounting structures to anticipate future budget pressures. OMB should work with agencies to build on the current accounting structure to distinguish counter-terrorism spending at the program, activity, and project levels, identifying ongoing vs. incremental emergency needs. 4. Tie the definition of war spending to specific activities. OMB and Congress should develop and implement clear criteria for terrorism-related spending through overseas contingency operations and other emergency authorities. This should include the cost of deploying U.S. troops to conflict zones; countering terrorist groups through military, diplomatic, or other operations; training foreign militaries; and conducting emergency military response activities within the United States that have a counter-terrorism focus. Overseas contingency operations should be limited to such spending. 5. Require Congress to separately approve emergency or wartime spending. Congress should pass new legislation that requires it to vote separately to approve spending that is designated as war-related emergency or wartime overseas contingency operations spending before those funds can be obligated.

Details: Washington, DC: Stimson, 2018. 43p.

Source: Internet Resource: Accessed May 16, 2018 at: https://www.stimson.org/sites/default/files/file-attachments/CT_Spending_Report_0.pdf

Year: 2018

Country: International

Keywords: Costs of Terrorism

Shelf Number: 150191


Author: Tita, George E.

Title: Strategies for Reducing Gun Violence: The Role of Gangs, Drugs and Firearm Accessibility

Summary: This report on strategies to reduce gun violence begins with a brief overview of recent trends in gun violence with a particular focus on emerging trends and changes in Canada. A review of literature covers the linkages between gangs, drug markets and firearm accessibility and firearm violence. When possible, the impacts of these factors on patterns of violence are explored at both the individual and community levels. Overall, the report highlights the prevalence and patterns of homicide and gun violence in North America, Britain, Mexico, Canada and other countries. Particular attention is paid to the role of gangs and drug markets in facilitating violence. In addition, research findings and program evaluations aimed at reducing gun violence are also included. Given the exceptionally high rates of interpersonal violence (especially gun violence) within the United States, and its long history of gang violence, it is not surprising that much of the literature is centered on programs and interventions in America. If the current trends of gun violence involving youth continue in Canada, it is important that Canadian policies learn from the successes and failures of recent gun violence reduction strategies elsewhere. Drawing from the literature review as well as the first author's experiences in the design, implementation and evaluation of violence reduction strategies, this report includes a broad set of policy recommendations that might prove useful in the effort to control gun violence within the larger census metropolitan areas (CMAs) in Canada. The case is made that before any policies aimed at reducing gun violence are implemented, it is extremely important to conduct basic research into the nature of local gun and gang violence. One must first understand who is involved, and why they are involved in violence, before one can design and implement an effective gun violence strategy. Finally, the report includes an Annotated Bibliography of the most current and useful gun and gang violence prevention and intervention resources.

Details: Ottawa: National Crime Prevention Centre, 2007. 61p.

Source: Internet Resource: Research Report: 2007-3: Accessed May 16, 2018 at: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/rdcng-gn-vlnc/rdcng-gn-vlnc-eng.pdf

Year: 2007

Country: International

Keywords: Crime Prevention

Shelf Number: 150241


Author: International Centre for Missing & Exploited Chidlren

Title: Online Grooming of Children for Sexual Purposes: Model Legislation & Global Review

Summary: The grooming of children for sexual purposes through the Internet and related technologies is a growing problem worldwide, putting countless children at risk for sexual abuse and exploitation. Grooming is the process by which an adult establishes or builds a relationship with a child, either in person or through the use of the Internet and related technologies, to facilitate online or offline sexual contact with the child. Online grooming can be connected with a variety of different forms of sexual exploitation of children, such as the creation of child sexual abuse material and sexual assault. The National Society for the Prevention of Cruelty to Children (NSPCC) reported that in England and Wales the Internet was used to commit an average of eight sexual crimes against children, including rape, grooming, and live streaming of abuse, every day in 2015. Each year, Internet availability and accessibility continues to improve, and in turn the number of Internet users globally grows steadily - more than 50% of the world's population now actively uses Internet services. There are more than 3.8 billion Internet users worldwide today with 70% of the world's Internet users ages 15-2412 and an estimated 750,000 predators online at any given moment. Easy access to information and communication technologies (ICTs) together with a growing population of young people online makes apparent the need for comprehensive legislation and other tools to help protect children from the risk of sexual abuse Technology gives offenders access to children around the clock. A 2010 study found that US children between the ages of 8-18 spend an average of 7.5 hours each day on the Internet. An even earlier study of Swedish children's media habits found that 82% of children ages 9-11 and 95% of children ages 12-16 use the Internet; 28% and 54% of those same age groups respectively use the Internet daily.17 These reports demonstrate that children around the world have integrated the Internet into their lives in a way that may still be incomprehensible to many adults. Children today use the Internet every day not only to communicate with one another, but also to establish and maintain relationships with others, their social spheres often spanning both online and offline without any clear separation between the two. Some studies show that children who have experienced negative life events or maltreatment may be more vulnerable to online grooming. However, research from various industrialized countries shows that some children who have been victimized online "shared no apparent negative prior life circumstances and appeared to have been randomly targeted...," demonstrating that "there is no typical victim and the most striking thing about children abused online is their heterogeneity." Victims are most often between the ages of 13-15. Some groomers communicate with many children simultaneously as they develop relationships and, in 2012, the European Online Grooming Research Project found that "girls seem to be at greater risk than boys." Boys are shown to constitute a "substantial group of the victims," but are generally less willing to report instances of abuse. Thus, the gap in confirmed victimization between boys and girls may be smaller than some reports indicate. Online grooming occurs via email, instant messaging apps, social networking sites, chatrooms, online gaming sites, photo sharing sites, and dating apps, which can be accessed through personal computers and laptops, tablets, and mobile phones. A 2012 UK-based survey of 1,718 children aged 11-16 years old revealed that 42% received online attachments by email from strangers, 37% added a stranger to their instant messaging contacts, and 35% added a stranger to their social networking friends group. These technologies are not only popular amongst younger generations, but they also provide offenders with a platform to create a persona and, in some cases, to mask their true age and identity. In doing so, they are better able to connect with children and more easily gain their trust and cooperation, ultimately introducing a sexual element into the relationship. In particular, social networking sites are widely used for online grooming. Offenders can use the Internet and related technologies to find vulnerable children who meet their preferred sexual interests by scanning such sites to find a young person's personal information before contacting them. For example, offenders can use such sites to access profile pictures, demographic information, interests, and communications with others (i.e., news feed, status posts, comments on posts) to target victims. Offenders thus can identify the children in whom they are interested so they may contact and eventually sexually exploit them. Child Internet users are particularly open to interacting with strangers because they use social media and social networking sites as a way to meet new people, rather than solely as a way to keep in touch with people they already know. Given such openness with strangers, a cybercrime study conducted in the UK estimated that "850,000 cases of unwanted online sexual approaches were made in chat rooms during 2006 and that 238 offenses of meeting a child following sexual grooming were recorded." A 2005 US study showed that one in 25 children ages 10-17 had received aggressive sexual solicitations that included attempts to contact them offline, and one in 25 were solicited by an online offender to take sexual pictures of themselves. Just five years later, another study reported that one in 11 US children aged 10 to 17 reported receiving an unwanted sexual solicitation online. Over the last two decades, online gaming has similarly grown into a worldwide activity for adults and children alike. The functionality of online gaming platforms (computers, video game consoles, or hand-held gaming systems) has evolved and expanded to include Internet access, messaging platforms, and photo and video sharing, thus enabling people around the world to communicate and play games with each other in real-time. Sexual predators increasingly use online games as a means to easily gain access to and connect with children. Subsequently, as more and more children play video games online, the risk of children coming into contact with sexual predators has grown. The unique capabilities of video games often enable video and voice communications between a child and an offender. Online games automatically give the offender and child a common interest, bypassing some of the child's fears of establishing a relationship with a stranger. In addition, children often spend time on the gaming platforms with little or no adult supervision, thus increasing an offender's ability to build and progress a relationship. Once a trust-relationship has been established, the offender may encourage the child to communicate on other platforms like private chatrooms, instant messengers, and social media apps, further facilitating the exchange of sexual conversations and images/videos, and even live-streaming sexual acts. While the grooming process can occur in-person, online grooming often progresses more rapidly, and the offender may use a variety of techniques to persuade, pressure, and manipulate the child to cooperate, all while taking advantage of the anonymity the Internet provides. Online groomers can persuade a child to meet in less than half an hour and, according to the findings of a UK-based research team, in some cases it can take as little as 18 minutes to convince a child to meet. Likewise, a Middlesex University (London) study found that offenders, when chatting online with children, often introduce sexual topics after just three minutes, and a bond can be formed with a child after only eight minutes. The grooming process is complex and involves "trust-building, isolation and desensitization towards sexual behavior...a network of processes and strategies that do not follow always the same order." As there is no single method of grooming children, there is also no single profile of online groomers.

Details: Alexandria, VA: The Centre, 2017. 67p.

Source: Internet Resource: Accessed May 18, 2018 at: http://www.icmec.org/wp-content/uploads/2017/09/Online-Grooming-of-Children_FINAL_9-18-17.pdf

Year: 2017

Country: International

Keywords: Computer Crimes

Shelf Number: 150267


Author: Glensor, Ronald W.

Title: Crimes Against Tourists

Summary: This guide addresses tourist crime, beginning by describing the problem and reviewing the factors that contribute to it. It then identifies a series of questions to help you analyze your local problem. Finally, it provides a number of measures your agency can take to address the problem and to evaluate responses. The guide addresses tourist crimes committed in the United States, although the information provided here will no doubt benefit those readers dealing with the problem abroad.

Details: Washington, DC: U.S. Department of Justice Office of Community Oriented Policing Services. 2004. 54p.

Source: Internet Resource: Problem-Oriented Guides for Police Problem-Specific Guides Series No. 26: Accessed May 21, 2018 at: http://www.popcenter.org/problems/pdfs/crimes_against_tourists.pdf

Year: 2004

Country: International

Keywords: Tourists

Shelf Number: 9416


Author: Holloway, Katy

Title: Does Neighborhood Watch Reduce Crime?

Summary: Neighborhood Watch grew out of a movement in the United States that promoted greater involvement of citizens in the prevention of crime (Titus, 1984). Variations include block watch, apartment watch, home watch, citizen alert, and community watch. The main method by which Neighborhood Watch is supposed to help reduce crime is when residents look for and report suspicious incidents to the police and thereby perhaps deter potential offenders from committing a crime (Bennett 1990). One of the first evaluations of Neighborhood Watch programs in the United States was of the Seattle (Washington) Community Crime Prevention Project launched in 1973 (Cirel, Evans, McGillis, and Whitcomb, 1977). One of the first evaluations of Neighborhood Watch programs1 in the United Kingdom was of the Home Watch program implemented in 1982 in Cheshire (Anderton, 1985). Both evaluations identified a greater reduction in burglary in areas where Neighborhood Watch programs had been introduced, than in comparison areas. Since the 1980s, the number of Neighborhood Watch programs in the UK has expanded considerably. The report of the 2000 British Crime Survey estimated that more than a quarter (27 percent) of all households (approximately six million households) in England and Wales were members of a Neighborhood Watch program (Sims, 2001). This amounted to more than 155,000 active programs. A similar expansion has occurred in the U.S. The report of The 2000 National Crime Prevention Survey (National Crime Prevention Council, 2001) estimated that 41 percent of the American population lived in communities covered by Neighborhood Watch. The report concluded, "This makes Neighborhood Watch the largest single organized crime-prevention activity in the nation" (p. 39). Considering such large investments of resources and community involvement, it is important to ask whether Neighborhood Watch is effective in reducing crime. To investigate this, we reviewed all available studies evaluating the effectiveness of Neighborhood Watch programs in reducing crime. In this publication we summarize the findings of this review and discuss policy implications.

Details: Washington, DC: U.S. Department of Justice Office of Community Oriented Policing Services, 2008. 46p.

Source: Internet Resource: Crime Prevention Research Review No. 3: Accessed May 21, 2018 at: https://www.hsdl.org/?abstract&did=703241

Year: 2008

Country: International

Keywords: Community Crime Prevention

Shelf Number: 150322


Author: Rope, Olivia

Title: Global Prison Trends 2018: a global view on the state of prisons

Summary: Every year, Global Prison Trends by Penal Reform International (in collaboration with the Thailand Institute of Justice) provides us with a global view on the state of prisons. And, every year, this report is, unfortunately, hardly a surprise - we read about the degrading conditions in which people are imprisoned, and about their growing number. Yet the level of crime in most societies is constantly decreasing. The question that remains unanswered, therefore, is why our societies focus their response to unlawful behaviours so often on prison? Where is the proportionality in sentencing when we punish nonviolent offences with lengthy prison sentences? Is this the only response we can offer? The chapter on drugs and imprisonment in this report highlights that a high number of prisons in the world are overcrowded due to the incarceration of people for drug-related offences, in particular non-violent offences involving use and possession for personal use. This directly reflects our contemporary addiction to punishment and showcases the disproportionality of punishment in relation to the offence. The use of harsh prison sentences for people who use drugs or for those who play a minor role in the drug trade also shows the inefficiency, limitations and perverse effects of current drug control policies. Not only are punishment and incarceration becoming the sole instruments used to enforce the law, but also they are serving to implement moral norms which have no link with the reality of the offence that they are supposed to punish. This trend of over-incarceration and punishment of people who use drugs is seen on every continent. The deep impact it has on prison systems and on people in prison and their communities has sparked the current global debate on drug policy reform. In recent years, more and more countries have been introducing amendments to their drug laws; for example, by decriminalising the use of drugs in Norway and Colombia, and by replacing prison terms with monetary fines in Ghana and Tunisia or with community service, as envisaged in Senegal. Other countries have gone even further. Ecuador gave an amnesty to drug couriers and released thousands of prisoners. Countries that have traditionally adopted harsh stances on drugs, such as Malaysia and Iran, are reviewing their death penalty policies for drug offences, and removing people from death row. These changes and reforms are being discussed and implemented in a global environment that remains highly stigmatising, where drugs are still considered 'evil' and prohibition approaches prevail. They are therefore born out of a real need - the need for societies to stop exposing their citizens to greater risks from arrests related to drug use than come from the act of using drugs

Details: London: Penal Reform International; Bangkok: Thailand Institute of Justice, 2018. 60p.

Source: Internet Resource: Accessed May 23, 2018 at: https://www.penalreform.org/wp-content/uploads/2018/04/PRI_Global-Prison-Trends-2018_EN_WEB.pdf

Year: 2018

Country: International

Keywords: Drug Offenders

Shelf Number: 150332


Author: Zabyelina, Yuliya G.

Title: The State of Transnational Organized Crime: A Case Study Analysis of Criminal Opportunities in the Russian Federation and the United States

Summary: The concern with the role of failing and post-conflict states as incubators of transnational organized crime (TOC) was a recurrent theme in research in the 1990s. Because of deep-seated institutional failures, instability and impoverishment, weak states were considered as crime-facilitative environments, in which criminal organizations were provided with rewarding criminal opportunities and a high degree of immunity. The resilience of properly functioning states has often been taken for granted in mainstream accounts of TOC. Fragmented but nevertheless important empirical data provide evidence that TOC has established in many countries around the world irrespective of high levels of economic development and outstanding governance. This dissertation studies the nexus between state features and TOC. In order to do so, a qualitative analysis of the formation of criminal opportunities within different types of states is offered. Two case studies, the Russian Federation (the North Caucasus region) and the United States (the US-Mexico border area) were selected for the analysis. Although the two states have encountered similar security problems such as those related to securing extended borders, fighting terrorism and TOC, they have experienced different patterns of relative success and failure circumscribed by their contrasting governance, economic and security capacities as well as different roles, perspectives and ambitions on global and regional agendas. Based on the data collected from interviews with experts in Moscow and in Washington, D.C., the analysis of official reports, secondary literature and the mass media, the dissertation offers both the knowledge base on organized crime groups and specific criminal offences, as well as develops a comparative framework for the study of criminal opportunities in the context of poorly functioning and properly-performing states defined along Weberian categories of statehood. The analysis of the data was performed to develop a typology of criminal opportunities for TOC. Three major categories are distinguished. Criminal opportunities of a-type are characteristic of poorly functioning states and presuppose a vicious downward spiral, in which deteriorating political, economic and security institutions as well as the presence of illicit armed groups and lawless zones generate unprecedented criminogenic opportunities such as in the case of the Russian Federation during the two large-scale wars in Chechnya and the post-conflict reconstruction years. Criminal opportunities of b-type refer to situations, when policies adopted by developed democracies accidentally facilitate transnational criminal activities, thus, creating more lucrative criminal opportunities. Based on the analysis of criminal activities at the US-Mexico border, the dissertation argues that properly functioning states that endorse vastly penalizing security policies create the criminogenic environment that instigates more sophisticated and resourceful criminal strategies. Finally, not only state qualities define criminal opportunities. The nature of the systemic environment is a crucial contributing factor to the formation of criminal opportunities of c-type. The findings suggest that TOC triumphs in the circumstances of criminogenic asymmetries constituted by systemic gaps between those states that are affluent and secure and those that are poor and ungoverned. Discrepancies between properly functioning states and zones of instability generate lucrative opportunities for the creation of black markets. This said, criminal opportunities may not only be produced by states but also by a particular composition of asymmetric relationships among states. Although non-exclusive and often overlapping, the patterns of the formation of criminal opportunities studied in this dissertation are important as they provide greater detail about the concept of a criminal opportunity and shed light to the role of the state as target and a facilitator of TOC.

Details: Trento, Italy: University of Trento - Italy, 2013.

Source: Internet Resource: Dissertation: Accessed May 23, 2018 at: http://eprints-phd.biblio.unitn.it/1061/

Year: 2013

Country: International

Keywords: Criminal Opportunities

Shelf Number: 150335


Author: Koenraadt, Rosa Marthe

Title: The Illicit Medicines Trade from Within: An analysis of the demand and supply sides of the illicit market for lifestyle medicines

Summary: Although the existence of illicit medicines is not new, all sorts of medicines, ranging from antibiotics to weight loss drugs, antimalarial tablets to steroids, are increasingly traded worldwide. The illicit medicines market is generally associated with considerable health risks for its users, as well as with high revenues and a perceived growing degree of criminal organization. It is therefore important to gain extensive criminological insights into this global market. However, with a few exceptions, little criminological research has been conducted on the supply and demand sides of the illicit pharmaceutical market. The current thesis aims to engage directly with these perceptions as it fills gaps in the literature, by providing in-depth and empirically grounded theoretical insights on the online and offline trade in illicit pharmaceuticals, with particular reference to lifestyle pharmaceuticals. The main focus lies on the dynamics and activities of actors on both the demand and supply sides of the illicit medicines market in the Netherlands, and on the production and transnational distribution of illicit medicines in and from China. The central research question of this thesis is: how are actors involved in the illicit medicines trade, and how is the illicit market structured. In order to understand the dynamic interplay among actors as they operate, compete and develop trust relations, as well as how the illicit market is structured, a mixed-method approach of both qualitative and quantitative data is adopted. This includes the use of interviews with suppliers, consumers and professionals, an online study of vending websites and discussion platforms, an analysis of court cases and a survey study among consumers. This study shows that it is important to distinguish between deceived and non-deceived consumers of illicit medicines; this distinction is associated with important differences in motives for consumption, risk perception, risk management and feelings of shame or failure. In addition, the illicit medicines market can be characterized by the blurring and shifting boundaries among online and offline markets, as well the legitimate, semi-legitimate and illegitimate trade. Consumers and suppliers engage in various forms of risk minimization in order to obtain an acceptable balance between anonymity, deceit, trust and privacy. Furthermore, the illicit medicines trade is characterized by low entry barriers, especially through online distribution channels. As such, although the market has been portrayed as one that organized crime groups control on a large scale, this study shows that there is a large continuum of suppliers, traders and sellers that are involved in the market, which makes the trade in illicit medicines rather unorganized, with shifting roles and highly flexible networks.

Details: Utrecht: Utrecht University, 2018. 272p.

Source: Internet Resource: Dissertation: Accessed May 23, 2018 at: https://dspace.library.uu.nl/handle/1874/359561

Year: 2018

Country: International

Keywords: Counterfeit Medicines

Shelf Number: 150340


Author: Amnesty International

Title: Toxic Twitter: Violence and Abuse Against Women Online

Summary: Twitter is a social media platform used by hundreds of millions of people around the world to debate, network and share information with each other. From high-level female politicians to journalists, activists, writers and bloggers, to women who simply want to know what's happening around them - Twitter can be a powerful tool for women to make connections and express themselves. In fact, the company has touted itself as a place where 'every voice has the power to impact the world'. But for many women, Twitter is a platform where violence and abuse against them is allowed to flourish, often with little accountability. As a company, Twitter is failing to respect women's rights online by inadequately investigating and responding to reports of violence and abuse in a transparent manner. The violence and abuse many women experience on the platform has a detrimental effect on their right to express themselves equally, freely and without fear. Instead of Twitter strengthening women's voices, the violence and abuse women experience on the platform means that women are self-censoring what they post, limiting their interactions, or being driven off Twitter completely. At a watershed moment when women around the world are using their collective power to speak out and amplify their voices through social media platforms, Twitter's failure to respect human rights and tackle violence and abuse means that instead of women using their voices 'to impact the world', many women are instead being pushed backwards towards a culture of silence.

Details: London: AI, 2018. 77p.

Source: Internet Resource: Accessed May 25, 2018 at: https://www.amnestyusa.org/wp-content/uploads/2018/03/Toxic-Twitter.pdf

Year: 2018

Country: International

Keywords: Online Victimization

Shelf Number: 150374


Author: Wilson, David B.

Title: Police-initiated diversion for youth to prevent future delinquent behavior: A systematic review

Summary: Police-led diversion of low-risk youth reduces their future contact with the justice system Police-led diversion of low-risk youth who come into contact with the justice system is more effective in reducing a youth's future contact with the justice system compared to traditional processing. What is this review about? Youth misconduct and misbehavior is a normal part of adolescence and that misbehavior sometimes crosses the line from disruptive or problematic to delinquent. Nationally representative surveys of youth in the USA have indicated that minor delinquent behavior is normative, particularly for boys. The normative nature of minor delinquent behavior raises the question of how police should respond to minor delinquent behavior in a way that is corrective, but also avoids involving the youth in the criminal justice system beyond what will be effective in reducing future misbehavior. Police diversion schemes are a collection of strategies police can apply as an alternative to court processing of youth. Diversion as an option is popular among law enforcement officers, as it provides an option between ignoring youth engaged in minor wrongdoing and formally charging such youth with a crime. Police-led diversion has the potential to reduce reoffending by limiting the exposure of low-risk youth to potentially harmful effects of engagement with the criminal justice system. This review examined whether police-led diversion and traditional processing of youth have different effects on rates of official delinquency.

Details: Oslo: Campbell Collaboration, 2018. 88p.

Source: Internet Resource: A Campbell Systematic Review 2018:5: Accessed June 5, 2018 at: https://campbellcollaboration.org/library/police-initiated-diversion-to-prevent-future-delinquent-behaviour.html

Year: 2018

Country: International

Keywords: At-risk Youth

Shelf Number: 150466


Author: Zehnder, Michael

Title: The Economics of Subjective Security and Camera Surveillance

Summary: In recent times, camera surveillance or closed-circuit television (CCTV) as an instrument potentially deterring crime and terrorism has become a focus of the public discourse. CCTV might be the most rapidly spreading and, at the same time, one of the most disputed measures of contemporary public security policy. This article presents theoretical arguments and empirical results that need to be considered in plans of future CCTV schemes as well as in methodically challenging CCTV evaluations. Previous evidence shows that the effectiveness of this situational crime prevention instrument is substantially depending on the context within which it is implemented. According to a comparative economic analysis of illegal behavior, we expect a relatively smaller deterrent effect of CCTV on terrorism than on other forms of crime. On the one hand, terrorists can switch to numerous alternative targets not monitored by cameras. On the other hand, CCTV images raise the degree of publicity terrorists can achieve.

Details: Besel: Department of Business and Economics (WWZ) University of Basel, 2009. 145p.

Source: Internet Resource: WWZ Forschungsbericht 04/09: Accessed June 8, 2018 at: https://wwz.unibas.ch/fileadmin/user_upload/wwz/99_WWZ_Forum/Forschungsberichte/B_099Zehnder.pdf

Year: 2009

Country: International

Keywords: CCTV

Shelf Number: 150511


Author: Public Safety Canada

Title: Sports-Based Crime Prevention Programs

Summary: Research suggests that sports have the capacity to connect youth to positive adult role models and provide positive development opportunities (Mulholland, 2008), as well as promote the learning and application of life skills (Goudas & Giannoudis, 2008; Mulholland, 2008; Holt et al., 2009). Furthermore, in addition to the physical activity and positive health effects it provides, sport is a generator of social capital, helping to mobilize the community by promoting involvement, togetherness and teamwork (Ehsani et al., 2012, Mulholland, 2008), as well as supporting culture within the community (MacIntosh et al., 2016). Because of their potential for supporting youth development, supervised sports have been used in many countries, as well as by the United Nations, as a programming strategy for addressing social issues, such as youth crime and substance abuse. Although there is wide variability in the way sports-based programs are implemented and structured, these programs generally aim to use sport, either as a means or complementary activity, to achieve youth development and prevent crime. In particular, these initiatives use a safe recreation setting to promote the lessons learned from sports (e.g., cooperation, communication, etc.), and possibly administer other social, individual development-based interventions (e.g., counselling, mentoring and life skills training), while providing youth with a pro-social way to spend their time. Unfortunately, due to research limitations and a lack of standardization in terminology within this emerging field of study, general statements and conclusions on the effectiveness of these programs are difficult to make. The purpose of this document is to provide additional information on crime prevention using sports, including summaries of promising programs and initiatives both in Canada and internationally, the difference in implementation approaches across applications, and lessons learned.

Details: Ottawa: Public Safety Canada, 2017. 17p.

Source: Internet Resource: 2017–H03-CP: Accessed June 14, 2018 at: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2017-h03-cp/2017-h03-cp-en.pdf

Year: 2017

Country: International

Keywords: At-Risk Youth

Shelf Number: 150529


Author: Karp, Aaron

Title: Estimating Global Civilian-Held Firearms Numbers

Summary: Uncertainty about any firearms data requires systematic estimation that relies on a broad spectrum of sources and makes approximation unavoidable. The Small Arms Survey's estimates of civilian firearms holdings use data gathered from multiple sources. However, with much of civilian ownership concealed or hard to identify, gun ownership numbers can only approximate reality. Using data from several different sources, at the end of 2017 there were approximately 857 million civilian-held firearms in the world's 230 countries and territories. Civilian firearms registration data was available for 133 countries and territories. Survey results were used to help establish total gun civilian holdings in 56 countries. The new figure is 32 per cent higher than the previous estimate from 2006, when the Small Arms Survey estimated there were approximately 650 million civilian-held firearms. Virtually all countries show higher numbers, although national ownership rates vary widely, reflecting factors such as national legislation, a country's gun culture, historical and other factors. While some of the increase reflects improved data and research methods, much is due to actual growth of civilian ownership. Key findings There were approximately 857 million civilian-held firearms in the world at the end of 2017. Roughly 100 million civilian firearms were reported as registered, accounting for some 12 per cent of the global total. National ownership rates vary from about 120.5 firearms for every 100 residents in the United States to less than 1 firearm for every 100 residents in countries like Indonesia, Japan, Malawi, and several Pacific island states. There are regional or national surveys concerning civilian holdings for 56 countries and territories.

Details: Geneva: SWIT: Small Arms Survey, 2018. 12p.

Source: Internet Resource: Briefing Paper: Accessed June 19, 2018 at: http://www.smallarmssurvey.org/fileadmin/docs/T-Briefing-Papers/SAS-BP-Civilian-Firearms-Numbers.pdf

Year: 2018

Country: International

Keywords: Firearms

Shelf Number: 150581


Author: Karp, Aaron

Title: Estimating Global law Enforcement Firearms Numbers

Summary: Available sources indicate that as of 2017 there was a global total of at least 22.7 million known or estimated law enforcement firearms, equal to roughly 2.2 per cent of all firearms identified by the Small Arms Survey around the world. Worldwide, 4.8 million law enforcement firearms have been reported to the Small Arms Survey or documented from other sources. An additional 17.9 million or so firearms owned by law enforcement agencies can be estimated with reasonable confidence. The global estimate is slightly lower than the previous Small Arms Survey global estimate for 2006, the result of methodological changes and a decision not to estimate the holdings for many specialized or smaller law enforcement agencies. There are several reasons to assume that the total of 22.7 million law enforcement firearms given in this Briefing Paper is an underestimate. The state of research on law enforcement armament makes it hard to say whether global law enforcement weapons inventories are increasing or decreasing. But the types of firearms used by law enforcement agencies appear to be changing more rapidly than those of military services, also becoming more alike to military armament. Key findings As of the end of 2017 there was a global total of at least 22.7 million known or estimated law enforcement firearms. Law enforcement firearms made up roughly 2.2 per cent of all firearms identified by the Small Arms Survey. Official reports account for 4.8 million law enforcement firearms, or 21 per cent of the estimated law enforcement total. The average ratio for the 28 countries reporting official data is 1.7 firearms per sworn law enforcement officer.

Details: Geneva: Small Arms Survey, 2018. 12p.

Source: Internet Resource: Briefing Paper: Accessed June 19, 2018 at: http://www.smallarmssurvey.org/fileadmin/docs/T-Briefing-Papers/SAS-BP-Law-Enforcement-Firearms-Numbers.pdf

Year: 2018

Country: International

Keywords: Firearms

Shelf Number: 150584


Author: Lessing, Benjamin

Title: Inside Out: The Challenge of Prison-Based Criminal Organizations

Summary: Contemporary prison gangs present new and confounding challenges for states. In Central America and Brazil-and even in the U.S.- prison gangs have evolved from small predatory groups to sophisticated criminal organizations with the capacity to organize street-level crime, radically alter patterns of criminal violence, and, in the extreme, hold governments hostage to debilitating, orchestrated violence and disruption. Unlike traditional armed groups though, prison gangs cannot be directly neutralized through repressive force, since most of their leadership is already incarcerated. Indeed, common hardline state responses like aggressive policing, anti-gang sweeps, and enhanced sentencing can inadvertently swell prison gangs' ranks and strengthen their ability to coordinate activity on the street. Breaking up prison-gang leadership has proved particularly counterproductive, often facilitating prison gangs' propagation throughout state-and national-level prison systems. Alternative approaches like gang truces that exploit prison gangs' capacity to organize and pacify criminal markets - and indeed whole peripheral regions - can be very effective at reducing violence. However, they are politically dicey (and hence unstable), and ultimately leave the state partially dependent on prison gangs for the provision of order, both within and beyond the prison walls. Unfortunately, there is no silver bullet. Indeed, there are three distinct problems for policy-makers to grapple with. First, as the research discussed here shows, many typical responses have unintended and deeply counterproductive consequences. In particular, anti-gang crackdowns, which often raise incarceration rates, lengthen sentences, and worsen prison conditions, can actually help prison gangs establish authority outside prison, organize criminal markets, and orchestrate mass violence and protest. In many cases, prison gangs come to play a major role in providing order in peripheral communities, imposing codes of conduct that significantly reduce property crime and violence among residents. Second, while there is evidence that these mass-incarceration policies helped prison gangs establish their authority, both within prison and on the street, it is not clear that simply reducing incarceration rates or improving prison conditions would neutralize that authority. The social orders that prison gangs have built in Central America, Brazil, and even parts of the U.S., rest on real institutions of varying degrees of formality: from shared language and symbols to written constitutions, and even corporate and state-like administrative structures. Like all institutions, these are likely to be "sticky," i.e. resilient to turnover in members and leaders, and adaptable to changing local conditions. Finally, it is not clear that rolling back, undermining, or neutralizing gang authority - even if it were possible - would produce positive outcomes. States were not good at providing order in prisons or peripheral areas before sophisticated prison gangs arose, and there is little reason to believe that they can entirely supplant gang authority in the short or even medium term. Smashing the authority of prison gangs could lead to outbreaks of brutal infighting or a chaotic scramble for power. As such, this paper recommends a containment approach that strikes a balance between hardline repression and accommodation. Policymakers should aim to: increasingly acknowledge gang presence and power, rather than deny or obfuscate it; set rules of the game that take advantage of gang leaders' ability to pacify criminal markets while demarcating realms where the state can slowly supplant gangs; use repression more strategically to enforce these rules, creating incentives for gang leaders to avoid violence and anti-social behavior; and put greater state, civil-society, and international resources into recuperating state authority in non-criminal areas where gangs currently hold sway. The paper begins with background on contemporary prison gangs, which we might more accurately refer to as prison-based criminal organizations. I then present findings of research into the link between state law-enforcement and carceral policies and prison gangs' capacity to project their power onto the street in three leading cases: California; El Salvador; and Sao Paulo, Brazil. I follow with a discussion of the uses to which prison gangs use this capacity (organizing criminal activity, providing parallel power in peripheral communities, and orchestrating / curtailing violence) as a bargaining chip. I conclude with analysis and policy recommendations.

Details: Washington, DC: Brookings Institution, 2016. 28p.

Source: Internet Resource: Accessed June 19, 2018 at: https://www.brookings.edu/wp-content/uploads/2016/09/fp_20160927_prison_based_organizations.pdf

Year: 2016

Country: International

Keywords: Gangs

Shelf Number: 150587


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Study on Smuggling of Migrants 2018

Summary: At least 2.5 million migrants were smuggled in 2016, according to the first Global Study on Smuggling of Migrants released by the United Nations Office on Drugs and Crime (UNODC) today. Migrant smuggling occurred in all regions of the world and generated an income for smugglers of up to US$7 billion, equivalent to what the United States or the European Union countries spent on global humanitarian aid in 2016. The study describes 30 major smuggling routes worldwide and finds that demand for smuggling services is particularly high among refugees who, for lack of other means, may need to use smugglers to reach a safe destination fleeing their origin countries. Data suggests that many smuggling flows include unaccompanied or separated children, who might be particularly vulnerable to deception and abuse by smugglers and others. In 2016, nearly 34,000 unaccompanied and separated children arrived in Europe (in Greece, Italy, Bulgaria and Spain). "This transnational crime preys on the most vulnerable of the vulnerable," said Jean-Luc Lemahieu, UNODC Director of Policy Analysis and Public Affairs. "It's a global crime that requires global action, including improved regional and international cooperation and national criminal justice responses." According to the International Organization for Migration, there are thousands of deaths due to migrant smuggling activities each year. Many smuggled migrants die from drowning, whereas others perish due to accidents or extreme terrain and weather conditions. According to records, the Mediterranean appears to be the deadliest route, with around 50 per cent of the total number of deaths. Systematic killings of migrants have also been reported along most smuggling routes. But smuggled migrants are also vulnerable to a range of other forms of crime such as violence, rape, theft, kidnapping, extortion and trafficking in persons. The study also looks at the gender composition of smuggled migrants and finds that this is often influenced by the circumstances driving their mobility, but most of them are relatively young men. On some routes, notably in parts of South-East Asia, however, women comprise large shares of smuggled migrants. Smuggling may involve complex schemes, such as organizing fake marriages or fictitious employment, counterfeiting travel documents or corrupting senior officials. For this, many smuggling networks engage in systematic corruption at most levels. The study also explores the links between smugglers and migrants, and finds that as a general pattern, smaller-scale smugglers are either ethnically linked to the territories where they operate, or they share ethnic or linguistic ties with the migrants they smuggle. What is more, some of the migrants who were successfully smuggled become smugglers themselves. Smugglers advertise their business where migrants can be easily reached, the study says. This includes neighbourhoods that are home to diaspora communities, refugee camps or various social networks online. To make a decision, migrants then rely on the opinion of their communities, relatives and friends, and more recently, of social media. Conclusions and policy implications A holistic approach to counter smuggling of migrants needs to take into account not only the geography of the crime, but also its different contributing factors. Making regular migration opportunities more accessible in origin countries and refugee camps, including the expansion of migration and asylum bureaux in origin areas, would reduce opportunities for smugglers. Tackling smuggling networks in their entirety requires improved regional and international cooperation and national criminal justice responses. Raising awareness in communities of origin, and particularly in refugee camps, about the dangers involved in smuggling may also help reduce the demand for smuggling services. Data collection, analysis and research on smuggling of migrants remain at their infancy. To build a solid international body of knowledge to support policy making in the area of smuggling of migrant, there is a need to improve data collection systems at the national, regional and international levels.

Details: Vienna: UNODC, 2018. 170p.

Source: Internet Resource: Accessed June 19, 2018 at: https://www.unodc.org/documents/data-and-analysis/glosom/GLOSOM_2018_web_small.pdf

Year: 2018

Country: International

Keywords: Human Smuggling

Shelf Number: 150589


Author: Holtom, Paul

Title: Implementing the Programme of Action and International Tracing Instrument: An Assessment of National Reports, 2012–17

Summary: In preparation for the Third Review Conference (RevCon3) to review progress made in the implementation of the Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects (PoA) and the International Tracing Instrument (ITI), this study presents a comprehensive analysis of national reports on PoA and ITI implementation submitted during 2012-17. It identifies the current state of play, progress in implementation, and assistance opportunities. The level of reporting on implementation of the PoA and ITI declined between 2008 and 2014. Although the trend was reversed in 2016, fewer than half of UN member states reported. This report reviews implementation of the PoA and ITI during 2012– 17 for 110 states that provided reports that can be assessed using the Small Arms Survey's methodology. To determine the current state of PoA and ITI implementation, the Survey research team analysed responses to the 63 closed questions, 21 multiple-choice questions, and 41 open questions contained in the 2014 PoA reporting template for 108 states that utilized the template in their latest report and 2 additional states that answered most of these 125 questions. Progress was assessed by comparing information provided by 77 states that submitted at least two reports during 2012-17 and addressed most of the 125 questions used for analysis. However, the analysis presented in the report on the state of implementation and progress is subject to several caveats. First, information contained in the national reports is not verified. Second, different responses between two reports could be due to a new NPC lacking the necessary knowledge to complete the report, or interpreting a question differently to their predecessor. Third, closed questions do not enable respondents to adequately reflect whether a national measure is partial or applies only in certain circumstances. Fourth, it was not possible to measure progress in implementation during 2012-17 if a state only submitted one report during this period. Fifth, it was difficult to track progress for issues that were removed from the PoA reporting template during 2012-17. Finally, the fact that states do not respond to questions in the reporting template in one year, but do in another year, hampers analysis. States have repeatedly made the point that national reports should be used to communicate assistance needs and opportunities. Unfortunately, many of the states that could benefit most from indicating implementation challenges and explicitly requesting assistance either did not report during 2012-17 or did not share such information in their national reports. Each section in the PoA reporting template provides an opportunity for states to request assistance but does not encourage states to indicate whether assistance has been received, or could be provided, in these areas. Therefore, if there is a desire for national reports to be used to request assistance, and also to highlight assistance received from or potentially on offer for other states, then the PoA reporting template should be revised to serve such purposes.

Details: Geneva, SWIT: Small Arms Survey, 2018. 92p.

Source: Internet Resource: Accessed June 20, 2018 at: http://www.smallarmssurvey.org/fileadmin/docs/U-Reports/SAS-Report-PoA-ITI-2012-17.pdf

Year: 2018

Country: International

Keywords: Illegal Trade

Shelf Number: 150604


Author: Penal Reform International

Title: Life Imprisonment: A Policy Briefing

Summary: Between the years 2000 and 2014, there was an increase of almost 84 per cent in the number of those serving formal life sentences worldwide. However, since the United Nations report on life imprisonment 20 years ago, there has been no international assessment of the use of and issues surrounding life imprisonment, despite substantial developments in penal policy and practice. This briefing assesses the use of life imprisonment as a global phenomenon, drawing on key findings from international research, and examines its use within the context of Goal 16 of the Sustainable Development Goals, the Nelson Mandela Rules and other international standards. This briefing was written by PRI and Professor Dirk van Zyl Smit and Dr Catherine Appleton of the University of Nottingham. Much of the research that underpins the publication was carried out as part of the Life Imprisonment Worldwide project at the University of Nottingham, the full findings of which will be published in Life Imprisonment: A Global Human Rights Analysis.

Details: Nottingham, UK: University of Nottingham; London: Penal Reform International, 2018. 16p.

Source: Internet Resource: Accessed June 25, 2018 at: https://www.penalreform.org/wp-content/uploads/2018/04/PRI_Life-Imprisonment-Briefing.pdf

Year: 2018

Country: International

Keywords: Life Imprisonment

Shelf Number: 150647


Author: Oosterhoff, Pauline

Title: The Modern Slavery Trap: Bonded Labour

Summary: International enterprises, sex work, organised crime groups, and exploitative recruitment agencies have dominated the discussion on modern slavery in recent years. However, while this work is important, it is just the tip of the iceberg. It misses the diversity of relationships and perpetrators colluding to make modern slavery, and particularly bonded labour, a public secret in the twenty-first century. Across the world bonded labour is taking place in formal and informal industries, such as brick kilns or quarries and in restaurants, tea shops, nail salons, or carpet-making. In areas of South Asia, some families marginalised by customs and traditions are living in poverty and turning to illegal moneylenders to cover emergency costs, such as a sudden illness. This leads some to become trapped in a cycle of bonded labour. Financially illiterate, they are forced to pay off the debt by working for the moneylenders directly or for third parties linked to the moneylenders, who may be local landlords or businesses in local activities such as brickmaking, farming, stone breaking and garment making, and in some cases trafficking.

Details: Brighton, UK: Institute of Development Studies, 2018. 4p.

Source: Internet Resource: IDS Modern Slavery Briefing: Accessed June 25, 2018 at: https://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/13764/Modern_Slavery_Briefing.pdf?sequence=1&isAllowed=y

Year: 2018

Country: International

Keywords: Bonded Labor

Shelf Number: 150649


Author: LeBaron, Genevieve

Title: The Global Business of Forced Labour: Report of Findings

Summary: The era of globalisation has been characterised by a growth of the world's biggest retail and brand companies, coupled with a deepened concern regarding the presence of forced labour in global supply chains. Indeed, one of the gravest and growing risks that brand companies face is the use of forced labour, human trafficking, or other illegal labour practices within their supply chain. Research on this topic has focused almost entirely on the big brand businesses at the top of the supply chain, rather than the worksites that actually deploy and manage forced labour and exploitation, which usually involve much smaller and more informal business actors. However, the overwhelming and singular focus on multi-national corporations (MNCs) at the top of supply chains has hindered our understanding of some of the broader patterns surrounding the business dynamics of forced labour in the global economy. Designed to address this gap, the Global Business of Forced Labour project is a first-of-its kind international research study investigating the business models of forced labour in global agricultural supply chains. The project has systematically mapped the business of forced labour, focusing on case studies of cocoa and tea supply chains. Through extensive primary research in the cocoa industry in Ghana and the tea industry in India and with domestic and international business actors, the project generated an original dataset that sheds light on the drivers and patterns of forced labour in agricultural supply chains feeding UK markets. This dataset includes in-depth interviews with over 120 tea and cocoa workers, a survey of over 1000 tea and cocoa workers, and over 100 interviews with business and government actors. Summary of Findings Business of Forced Labour There is a coherent pattern of labour exploitation including forced labour at the base of global tea and cocoa supply chains. Tea and cocoa businesses profit from forced labour and exploitation in two main ways: Employers use forced labour to reduce their costs of doing business. Our research uncovers that employers systematically under-pay wages and under-provide legally-mandated essential services for workers. Employers are legally required to provide basic services for tea workers on permanent contracts and their families. However, our study found that 47% of tea workers do not have access to potable water and 26% do not have access to a toilet. Workers also reported being charged by employers for services like electricity but not receiving these. In the cocoa industry, employers seek to cut costs through a complex system of financial calculations, including fines (e.g. for failing to carry out mandatory unpaid labour), fees (e.g. for obtaining a job on a cocoa farm), and deductions (e.g. for costs of inputs like pesticides and safety equipment) to systematically under-pay workers and create situations of debt bondage. In both industries, these widespread forms of exploitation are also sometimes accompanied by physical violence, threats, verbal abuse, and/or sexual violence. Employers use forced labour to generate revenue. In the tea industry, employers seek to generate revenue by lending money or providing services to workers and charging high interest on debts, thus engendering situations of debt bondage. Situations of debt bondage are closely linked to the under-provision of services; most tea workers reported borrowing money to pay for food or medical care (which employers are legally required to provide). In the cocoa industry, employers seek to profit by forcing workers to carry out additional labour beyond the agreed terms and conditions of the work, such as working for free on the employer's other farmlands for periods as long as three months. Failure to perform this involuntary labour results in deductions from the worker's wages, fines, threats, or even dismissal. In both industries, these widespread forms of exploitation are also sometimes accompanied by physical violence, threats, verbal abuse, and/or sexual violence. Workers face severe constraints on their ability to exit exploitative tea plantations and cocoa farms. Although chocolate and tea companies are highly profitable, the tea and cocoa workers at the base of their supply chains are living far below the poverty line and are routinely subjected to abuse. According to the World Bank, the poverty line for lower middle-income countries such as Ghana and India is $3.20 (L2.35) per day. Tea workers' wages in India are as low as 25% of the poverty line amount and cocoa workers' wages are around 30% of the poverty line amount. Producers - tea plantation owners and cocoa farmers - claim they do not receive enough payment for their products to obey labour laws and pay the minimum wage.

Details: Sheffield, UK: University of Sheffield, Sheffield Political Economy Research Institute, 2018. 61p.

Source: Internet Resource: Accessed June 25, 2018 at: http://globalbusinessofforcedlabour.ac.uk/wp-content/uploads/2018/05/Report-of-Findings-Global-Business-of-Forced-Labour.pdf

Year: 2018

Country: International

Keywords: Agriculture

Shelf Number: 150650


Author: Holder, Robyn

Title: Just Interests: Victims, citizens and the potential for justice

Summary: As a social and legal value, justice is a highly contextual and contested construct. In this thesis the ideal of and ideas about justice are told mainly through the narratives of ordinary people victimised by violence who then engage with the criminal justice process. Mapped alongside is the discourse of elite legal officials that sketch the discursive underpinnings to an institutional ideology about justice. For both - ordinary people and official elite - this is 'justice in the real world'. The stories of these two groupings are often posed in counterpoint. Rather than call for complete or partial redesign of state administered justice, I explore the ways in which peoples' thinking - from below - opens the space for justice that accommodates both public and private interests. In doing so, I refocus attention on the social and political status of the victim as a citizen first. Their institutional interactions create an engagement with justice that constitutes a practice of citizenship. When mobilising law, the victim-citizen draws upon an architecture of beliefs and values that operate in a particular time and space. Diverse ideas and images about justice open lines of action and stimulate attention to different objects of value. I find these cohere on a trilogy of relational interests: victim, offender and community. This justice trilogy accommodates multiple goals which are themselves accompanied by varied criteria and explanation. Face-to-face interviews conducted on three occasions with victim-citizens in a longitudinal prospective panel as they interact with different justice entities reveals these goals as partially ordered. The sequencing of these justice goals - whatever the differing priorities - allows public and private interests to be arranged and accommodated in a communicative process. However, after recording high levels of satisfaction with police intervention, the victim-citizen's satisfaction with prosecution and court tumbles, and does not recover even six months after the case is finalised at court. Unpacking what lies behind this assessment reveals a rich dimensionality to justice judgments. Here reasoning about outcome, interpersonal treatment, voice, and respect for the offender is layered, nuanced and affirms the contingent nature of justice in different settings. Perhaps inevitably the resolutions experienced are partial and incomplete. The longitudinal design of the thesis not only reveals people's thinking as responsive, contextual and dynamic but was indispensable in identifying the importance of interaction with public authorities. I show that victim-citizens want a voice that is influential, but they do not wish to dominate decision makers. They recognise justice as a unique public space in which they expect equal concern and respect accorded to the justice interests of their trilogy. I show victim-citizens were primarily interested in participatory opportunities that came after an authoritative finding. Justice emerges as a communal construct. The structured opening provided through law is an opportunity for people to rise to the demands their citizenship entails. Both justice and democracy lie at this point of convergence where the capacity of directly affected citizens is engaged.

Details: Canberra: Australian National University, 2013. 400p.

Source: Internet Resource: Dissertation: Accessed June 25, 2018 at: https://openresearch-repository.anu.edu.au/bitstream/1885/11464/1/Holder_R.L._2013L.pdf

Year: 2013

Country: International

Keywords: Victims of Crime

Shelf Number: 150682


Author: Jenkins, Martin

Title: Wild at Home: Exploring the global harvest, trade and use of wild plant ingredients

Summary: The past few decades have witnessed extraordinary change in the world. The human population is larger than it has ever been, and is consuming more than ever before, with unprecedented impacts on the environment. As a result, many indicators paint an increasingly bleak picture of the future at least as far as nature is concerned. At the same time, consumers - and that means all of us - are becoming increasingly aware of the impacts that our decisions have, not just in our immediate surroundings but across the globe. Any of us wishing to act responsibly in exercising our choices is faced with a potentially overwhelming range of issues: carbon footprints, loss of natural habitats, generation of plastic waste and use of polluting chemicals, not to mention the wellbeing of those producing the things we consume. It is often difficult in all this to know how to act for the best. One area where there are clear ways forward, with entirely practical solutions at hand, is the use of wild plants, something which is remarkably widespread but very often overlooked. This report highlights the vital role that plants play in all our lives, the often surprising places in which wild plant products can be found and the economic importance of the global trade in these products. It shows that where successfully managed, this trade can provide a hugely important source of income for poor and disadvantaged people in rural communities across the world while at the same time delivering significant environmental benefits. It also underscores the risks involved where the trade is not well managed. It outlines the various mechanisms already in place, including the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) and certification systems such as FairWild, that try to ensure that harvest and trade of wild plants is sustainable. Most importantly, it provides clear guidance as to what you, the reader, can do to help, whether it is in exercising your choice as a responsible consumer of goods containing wild plant products or ensuring that, as an importer, manufacturer or retailer of such goods, your supplies come from legal, sustainable sources.

Details: Cambridge, UK: TRAFFIC International, 2018. 52p.

Source: Internet Resource: Accessed June 26, 2018 at: http://www.indiaenvironmentportal.org.in/files/file/Wild%20at%20Home.pdf

Year: 2018

Country: International

Keywords: Environmental Crime

Shelf Number: 150708


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Results of a pilot survey of forty selected organized criminal groups in sixteen countries

Summary: Globalization and growing economic interdependence have encouraged and promoted the transformation of crime beyond borders in all parts of the world. Improved communications and information technologies, increased blurring of national borders, greater mobility of people, goods and services across countries, and the emergence of a globalized economy have moved crime further away from its domestic base. The nature of organized crime in the contemporary world then cannot be understood separately from the concept of globalization. In 1998, in recognition of these factors, the Member States of the United Nations decided to established an ad hoc Committee for the purpose of elaborating a comprehensive international Convention against Transnational Organized Crime (TOC). The ad hoc Committee succeeded in drafting four international legal instruments -- the Convention and three Protocols on Trafficking in Persons, Smuggling of Migrants and Illicit Manufacturing of and Trafficking in Firearms -- that will facilitate the prevention and combating of transnational organized crime. Through the ratification of these instruments several new legal concepts and mechanisms will be adopted by the State Parties who ratify the Convention. Of importance in this regard, is the criminalizing of participation in the activities of a criminal group itself. Importantly too, the Convention will provide a basic framework of cooperation across a large number of countries in the fight against organized crime. Critical to the implementation and monitoring of the TOC Convention will be the ability to access reliable information on international organized crime trends. Adequate information on ongoing developments from a global perspective may provide a useful marker against which progress can be measured and changes in the nature of organized crime assessed. At the same time, an international effort to collect data on developments in organized crime around the globe would provide a platform for the work of a wide ranging number of individuals and governments who are increasingly adopting more systematic ways of acquiring information on organized criminal groups. Beyond the establishment of an overall measure to assess trends in organized crime, the development of a more comprehensive system of classification and the ongoing collection of data on criminal groups provides a useful tool for both law enforcement officials and prosecutors. Information on various criminal groups serves not only to inform counterparts in other countries what kind of criminal groups are being investigated in specific states, but allows information on the activities of similar groups to be compared. If combined with data about institutional arrangements and strategies of states in addressing crime, it provides insights into the viability of measures and strategies adopted in tackling various types of criminal groups. Important to note here is that by providing a standard set of agreed upon definitions, for example for the term "organised crime group" and for offences such as "trafficking in human beings", the Convention and its Protocols have in effect established a base-line for future research and analysis. If all the countries which ratify the Convention use the same terminology and definitions, the task of comparative analysis is made much easier. To further the debate on measures and instruments to collect data on organized crime trends at an international level, this report presents the findings of a survey of 40 selected organized criminal groups in 16 countries and one region. The survey was conducted by the Centre for International Crime Prevention (CICP) in an attempt to both build the knowledge base on organized crime groups, and to develop a comparative framework for the study of the phenomenon. The mechanism in which the data was collected and analyzed is explored below and the findings presented. Among other results, the data has allowed the development of a typology of organized criminal groups.

Details: New York: UNODC, 2002. 123p.

Source: Internet Resource: Accessed June 28, 2018 at: https://www.unodc.org/pdf/crime/publications/Pilot_survey.pdf

Year: 2002

Country: International

Keywords: Human Smuggling

Shelf Number: 150727


Author: Institute for Integrated Transitions

Title: The Limits of Punishment: Transitional Justice and Violent Extremism

Summary: The Limits of Punishment is a research project led by the United Nations University's Centre for Policy Research, in partnership with the Institute for Integrated Transitions, and supported by the UK Department for International Development. It seeks to understand if, when and how transitional justice, in combination with other conflict resolution tools, can contribute to transitions away from conflict in settings affected by major jihadist groups. Specifically, it aims to answer two questions: 1. What are the effects of current approaches toward punishment and leniency for individuals accused of association with jihadist groups in fragile and conflict-affected states? 2. What factors should policymakers consider in designing alternative and complementary strategies leveraging transitional justice tools to better contribute to sustainable transitions away from conflict? To answer the first question, the project undertook three fieldwork-based case studies that assessed nationally-led approaches to handling individuals accused of having been associated with: al Shabaab in Somalia; Boko Haram in Nigeria; and the Islamic State (IS) in Iraq. The case studies look at a broad range of formal and informal mechanisms of punishment and leniency. These include, inter alia: amnesties; prosecutions; traditional justice; and disarmament, demobilisation, reintegration (DDR), rehabilitation, and similar programs that, in practice, offer some individuals alternatives to criminal justice. The case studies demonstrate the risks of excessively heavy-handed and at times indiscriminate approaches that penalise broad sectors of local populations accused of association with these groups, and assess the quality and limitations of existing leniency programs for such individuals. To answer the second question, the Institute for Integrated Transitions' Law and Peace Practice Group - a group of leading transitional justice experts - analysed the empirical evidence of the case studies in light of broader lessons learned from decades of international practice in the field of transitional justice. On this basis, the Group developed a framework to assist national policymakers and practitioners - as well as their international partners - in applying transitional justice tools as part of a broader strategy to resolve conflicts involving groups deemed violent extremist. The framework offers a range of approaches toward effectively balancing leniency and accountability, that can be tailored to conflict settings marked by violent extremism.

Details: Tokyo: United Nations University, 2018. 146p.

Source: Internet Resource: Accessed June 29, 2018 at: http://ifit-transitions.org/resources/publications/major-publications-briefings/the-limits-of-punishment-transitional-justice-and-violent-extremism/final-the-limits-of-punishment-01062018.pdf/view

Year: 2018

Country: International

Keywords: Conflict Resolution

Shelf Number: 150732


Author: Hunter, Marcena

Title: Measures that Miss the Mark: Capturing proceeds of crime in illicit financial flows models

Summary: Illicit financial flows (IFFs) are generally viewed as the financial side of criminal activity, and there is widespread agreement IFFs are a global threat. There is also agreement that IFFs, particularly prevalent and damaging in the context of weak, developing and fragile states, are a threat to sustainable development. International recognition of IFFs as a development threat include Sustainable Development Goals (SDGs) target 16.4, which states: "[b]y 2030, significantly reduce illicit financial flow". However, the concept remains vague and its content controversial. Furthermore, misalignment between terminology used to define IFFs and methodology to measure the scale of IFFs has troubling implications for policy response. Terminology encompasses a wide variety of illicit flows, while existing measures tend to be narrower and inherently give greater weight to IFFs linked to the classifications of commerce, as compared to those generated by crime and corruption. Furthermore, IFFs from the least developed states are at high risk of being undervalued. This paper examines how terminology and measurement frameworks can better reflect the form and scale of IFFs linked to crime.Due to the complex nature of the phenomenon, a more accurate and multifaceted approach to defining and measuring crime-related IFFs is critical to better reflect the detrimental impact these types of flows have on development and to formulating effective responses. Continuing to treat IFFs as a single, indivisible phenomenon inhibits the development of comprehensive and effective responses. Disaggregation of analysis and measures of IFF types is therefore essential.Key recommendations: Develop more accurate terminology and definitions, including better accounting for elements especially relevant to developing nations and crime IFFs; Represent estimates of IFFs more accurately and transparently; Adopt a multi-step model that makes use of both crime- and country-specific assessments and the gravity model, as well as information from both quantitative and qualitative sources; and, Utilize assessment frameworks that go beyond monetary values and account for harm.

Details: Geneva: Global Initiative against Transnational Organized Crime, 2018. 39p.

Source: Internet Resource: Accessed June 29, 2018 at: http://globalinitiative.net/wp-content/uploads/2018/06/TGIATOC-Illicit-Financial-Flows-report-1941-hi-res-2-1.pdf

Year: 2018

Country: International

Keywords: Financial Crimes

Shelf Number: 150735


Author: U.S. Department of State

Title: Trafficking in Persons Report, 2018

Summary: Human trafficking is a global phenomenon to which no country is immune. Victims of modern slavery are exploited in every region of the world, compelled into service for labor or commercial sex in the real world of industry and on the pages of the internet. The enormity of the problem necessitates the development of a unified, comprehensive response from world leaders to collectively address a crime that defies all borders. Despite its global reach, human trafficking takes place locally-in a favorite nail salon or restaurant; in a neighborhood home or popular hotel; on a city street or rural farm. Local communities face the realities and consequences of modern slavery, including weakened rule of law, strained public health systems, and decreased economic development, while traffickers profit from the exploitation of others. International recognition of the devastating effects of human trafficking grows each year. As of the date of this report, governments of more than 170 countries have made public commitments to its eradication, promising punishment for traffickers, care for victims, and action to prevent this crime. The importance of these commitments cannot be overstated. Yet, the grinding reality of fighting modern slavery takes place not on world stages but through the dedicated actions of individuals to meaningfully implement such commitments-in the slow and often tedious process of building a strong case against a trafficker; the long-term and case-specific provision of comprehensive care for victims; the consistent efforts of civil society partners to strategically raise awareness about human trafficking; and the development of well-planned and evidence-driven preventive policies. National governments cannot do these things alone. Their commitments to this issue are more effectively realized in partnership with the communities that face it, including local authorities, NGOs and advocates, and individual community members who are often the eyes, ears, and hearts of the places they call home. After all, traffickers exploit the political, social, economic, and cultural contours of local communities, often in ways that would be hard to address fully from a distance. By supporting and empowering these communities, national governments can truly begin to address the individual trafficking cases that collectively make up the larger global issue. This year's Trafficking in Persons Report highlights some of the elements of an effective community-based approach, the challenges in implementing such initiatives, and the opportunities national governments have to facilitate coordination, cooperation, and responsibility-sharing with and between local governments and communities.

Details: Washington, DC: State Department, 2018. 486p.

Source: Internet Resource: Accessed June 29, 2018 at: https://reliefweb.int/sites/reliefweb.int/files/resources/282798.pdf

Year: 2018

Country: International

Keywords: Forced Labor

Shelf Number: 150736


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Overview of Drug Demand and Supply: Latest trends, cross-cutting issues

Summary: Drug use is associated with significant adverse health consequences About 275 million people worldwide, which is roughly 5.6 per cent of the global population aged 15-64 years, used drugs at least once during 2016. Some 31 million people who use drugs suffer from drug use disorders, meaning that their drug use is harmful to the point where they may need treatment. Opioids continue to cause the most harm, accounting for 76 per cent of deaths where drug use disorders were implicated. PWID - some 10.6 million worldwide in 2016 - endure the greatest health risks. More than half of them live with hepatitis C, and one in eight live with HIV. Number of deaths associated with the use of drugs remains high Roughly 450,000 people died as a result of drug use in 2015, according to WHO. Of those deaths, 167,750 were directly associated with drug use disorders (mainly overdoses). The rest were indirectly attributable to drug use and included deaths related to HIV and hepatitis C acquired through unsafe injecting practices. Overdose deaths from the non-medical use of pharmaceutical opioid use reach epidemic proportions in North America In 2015 and 2016, for the first time in half a century, life expectancy in the United States of America declined for two consecutive years. A key factor was the increase in unintentional injuries, which include overdose deaths. In 2016, 63,632 people died from a drug overdose in the United States, the highest number on record and a 21 per cent increase from the previous year. This was largely due to a rise in deaths associated with pharmaceutical opioids, including fentanyl and fentanyl analogues. This group of opioids, excluding methadone, was implicated in 19,413 deaths in the country, more than double the number in 2015. Evidence suggests that Canada is also affected, with a large number of overdose deaths involving fentanyl and its analogues in 2016. Outside North America, with the exception of Estonia, the impact of fentanyl and its analogues is relatively low. Many countries still fail to provide adequate drug treatment and health services to reduce the harm caused by drugs One in six people suffering from drug use disorders received treatment for those disorders during 2016, which is a relatively low proportion that has remained constant in recent years. Some of the most adverse health consequences of drug use are experienced by PWID. A global review of services aimed at reducing adverse health consequences among PWID has suggested that only 79 countries have implemented both needle and syringe programmes and opioid substitution therapy. Only four countries were classified as having high levels of coverage of both of those types of interventions. Information on the availability of HIV testing and counselling and antiretroviral therapy remains sparse: only 34 countries could confirm the availability of HIV-testing programmes for PWID, and 17 countries confirmed that they had no such programmes. There was no information on the availability of antiretroviral therapy for 162 countries. Witnessing an overdose and experiencing a non-fatal overdose are common Witnessing an overdose is common among those who use heroin and/or cocaine and who inject drugs. This provides an opportunity to intervene and influence the outcome of the situation (for example, in the administration of naloxone in the case of opioid overdose) and whether it proves to be fatal. Many people who use heroin and/or cocaine and who inject drugs also report that they have experienced a non-fatal overdose. Non-fatal overdoses can leave drug users with significant health problems and have also been shown to be associated with a subsequent fatal overdose, with the risk of death increasing with the number of prior non-fatal overdoses. Prisoners are at higher risk for infectious diseases but are poorly served People in prison and other closed settings are at a much greater risk of contracting infections such as tuberculosis, HIV and hepatitis C than the general population, but access to treatment and prevention programmes is often lacking. Even where such programmes are available, they are not necessarily of the same standard as those provided in the community. The lack of access to prevention measures in many prisons can result in the rapid spread of HIV and other infections. People who use heroin are exposed to a severe risk of death from overdose after release from prison, especially in the first two weeks. Such deaths are related to a lowered tolerance to the effects of heroin use developed after periods of relative abstinence, including during incarceration. However, released prisoners are rarely able to access overdose management interventions, including prevention medications such as naloxone, or treatment for substance dependence, including methadone. Afghan opium poppy cultivation drives record opiate production Total global opium production jumped by 65 per cent from 2016 to 2017, to 10,500 tons, easily the highest estimate recorded by UNODC since it started estimating global opium production at the beginning of the twenty-first century. The total area under opium poppy cultivation worldwide increased to almost 420,000 ha in 2017. More than 75 per cent of that area is in Afghanistan. Overall seizures of opiates rose by almost 50 per cent from 2015 to 2016. The quantity of heroin seized globally reached a record high of 91 tons in 2016. Most opiates were seized near the manufacturing hubs in Afghanistan. A notable increase has been seen in cocaine manufacture Global cocaine manufacture in 2016 reached its highest level ever: an estimated 1,410 tons. After falling during the period 2005–2013, global cocaine manufacture rose by 56 per cent during the period 2013–2016. The increase from 2015 to 2016 was 25 per cent. The total area under coca cultivation worldwide in 2016 was 213,000 ha, almost 69 per cent of which was in Colombia. Global seizures are still dominated by cannabis but sharp increases are reported for other drugs Despite declining in 2016, cannabis continues to be the drug seized in the greatest quantities worldwide, followed by coca/cocaine-related substances and opioids. Both the quantity of ATS and of cocaine seized worldwide reached a record level in 2016. The sharpest increases in the quantities of drugs intercepted worldwide in 2016 were reported for plant-based NPS, which rose sevenfold, mainly due to seizures of kratom. The quantity of synthetic NPS seized worldwide, by contrast, saw a marked decline of more than 50 per cent in 2016, mainly due to a decline in the quantities of phenetalyamines and synthetic cannabinoids seized. Effect of the crackdown on darknet drug dealers is not yet clear In July 2017, police forces from several countries worked together to take down the largest drug-trading platform on the darknet, the part of the "deep web" containing information that is only accessible using special web browsers. Before it was closed, AlphaBay had featured more than 250,000 listings for illegal drugs and chemicals. It had had over 200,000 users and 40,000 vendors during its existence. The authorities also succeeded in taking down the trading platform Hansa, described as the third largest criminal marketplace on the dark web. It is not yet clear what effect the closures will have. According to an online survey in January 2018, 15 per cent of those who had used darknet sites for purchasing drugs said that they had used such markets less frequently since the closures, and 9 per cent said they had completely stopped. However, more than half did not consider themselves to have been affected by the closures. Although the scale of drug trafficking on the darknet remains limited, it has shown signs of rapid growth. Authorities in Europe estimated that drug sales on the darknet from 22 November 2011 to 16 February 2015 amounted to roughly $44 million per year. However, a later study estimated that, in early 2016, drug sales on the darknet were between $14 million and $25 million per month, equivalent to between $170 million and $300 million per year.

Details: Vienna: UNODC, 2018. 64p.

Source: Internet Resource: World Drug Report 2018, No. 2: Accessed June 29, 2018 at: https://reliefweb.int/sites/reliefweb.int/files/resources/WDR18_Booklet_2_GLOBAL.pdf

Year: 2018

Country: International

Keywords: Darknet

Shelf Number: 150739


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Analysis of Drug Markets: Opiates, cocaine, cannabis, synthetic drugs

Summary: Afghan opium poppy cultivation drives record opiate production Total global opium production jumped by 65 per cent from 2016 to 2017, to 10,500 tons, easily the highest estimate recorded by UNODC since it started estimating global opium production at the beginning of the twenty-first century. A marked increase in opium poppy cultivation and a gradual increase in opium poppy yields in Afghanistan resulted in opium production in the country reaching 9,000 tons in 2017, an increase of 87 per cent from the previous year. Among the drivers of that increase were political instability, lack of government control and reduced economic opportunities for rural communities, which may have left the rural population vulnerable to the influence of groups involved in the drug trade. The surge in opium poppy cultivation in Afghanistan meant that the total area under opium poppy cultivation worldwide increased by 37 per cent from 2016 to 2017, to almost 420,000 ha. More than 75 per cent of that area is in Afghanistan. Overall seizures of opiates rose by almost 50 per cent from 2015 to 2016. The quantity of heroin seized globally reached a record high of 91 tons in 2016. Most opiates were seized near the manufacturing hubs in Afghanistan. Towards a multifaceted global opioid crisis The non-medical use of pharmaceutical opioids is of increasing concern for both law enforcement authorities and public health professionals. Different pharmaceutical opioids are misused in different regions. In North America, illicitly sourced fentanyl, mixed with heroin or other drugs, is driving the unprecedented number of overdose deaths. In Europe, the main opioid of concern remains heroin, but the non-medical use of methadone, buprenorphine and fentanyl has also been reported. In countries in West and North Africa and the Near and Middle East, the non-medical use of tramadol, a pharmaceutical opioid that is not under international control, is emerging as a substance of concern. Non-medical use and trafficking of tramadol are becoming the main drug threat in parts of Africa The focus of attention for global seizures of pharmaceutical opioids is now firmly on countries in West and Central Africa and North Africa, which accounted for 87 per cent of the global total in 2016. Countries in Asia, which had previously accounted for more than half of global seizures, reported just 7 per cent of the global total in 2016. The rise in seizures of pharmaceutical opioids in Africa is mostly due to the worldwide popularity of tramadol, an opioid used to treat moderate and moderate-to-severe pain that is widely trafficked for non-medical use in the region. Tramadol is smuggled to various markets in West and Central Africa and North Africa, from where some of it is trafficked onwards to countries in the Near and Middle East. Countries in those subregions have reported the rapid expansion of the non-medical use of tramadol, in particular among some vulnerable populations. The drug is not yet under international control and is perceived by recreational users as a way of boosting energy and improving mood. However, tramadol can produce physical dependence, with WHO studies showing that this dependence may occur when it is used daily for more than a few weeks. While some tramadol is diverted from licit channels, most of the tramadol seized worldwide in the period 2012-2016 appears to have originated in clandestine laboratories in Asia. Non-medical use of pharmaceutical opioids reaches epidemic proportions in North America In 2015 and 2016, for the first time in half a century, life expectancy in the United States of America declined for two consecutive years. A key factor was the increase in unintentional injuries, which includes overdose deaths. In 2016, 63,632 people died from a drug overdose in the United States, the highest number on record and a 21 per cent increase from the previous year. This was largely due to a rise in deaths associated with pharmaceutical opioids, including fentanyl and fentanyl analogues. This group of opioids, excluding methadone, was implicated in 19,413 deaths in the country, more than double the number in 2015. Evidence suggests that Canada is also affected, with a large number of overdose deaths involving fentanyl and its analogues in 2016. Illicit fentanyl and its analogues are reportedly mixed into heroin and other drugs, such as cocaine and MDMA, or "ecstasy", or sold as counterfeit prescription opioids. Users are often unaware of the contents of the substance they are taking, which inevitably leads to a great number of fatal overdoses. Outside North America, the impact of fentanyl and its analogues is relatively low. In Europe, for example, opiates such as heroin and morphine continue to predominate, although some deaths involving fentanyl analogues have started to emerge in the region. A notable exception is Estonia, where fentanyl has long been regarded as the most frequently misused opioid. The downward trend in opiate use since the late 1990s observed in Western and Central Europe appears to have come to an end in 2013. In that subregion as whole, 12 countries reported stable trends in heroin use in 2016, two reported a decline and three an increase. A notable increase has been seen in cocaine manufacture Global cocaine manufacture in 2016 reached its highest level ever: an estimated 1,410 tons. After falling during the period 2005–2013, global cocaine manufacture rose by 56 per cent during the period 2013-2016. The increase from 2015 to 2016 was 25 per cent. Most of the world's cocaine comes from Colombia, which boosted its manufacture by more than one third from 2015 to 2016, to some 866 tons. The total area under coca cultivation worldwide in 2016 was 213,000 ha, almost 69 per cent of which was in Colombia. The dramatic resurgence of coca bush cultivation in Colombia - which had almost halved from 2000 to 2013 - came about for a number of reasons related to market dynamics, the strategies of trafficking organizations and expectations in some communities of receiving compensation for replacing coca bush cultivation, as well as a reduction in alternative development interventions and in eradication. In 2006, more than 213,000 ha were eradicated. Ten years later, the figure was less than 18,000 ha. The result has been a perceived decrease in the risk of coca cultivation and a dramatic scaling-up of manufacture. Colombia has seen massive rises in both the number of cocaine laboratories dismantled and the amount of cocaine seized. Africa and Asia have emerged as cocaine trafficking and consumption hubs Most indicators from North America suggest that cocaine use rose between 2013 and 2016. In 2013, there were fewer than 5,000 cocaine-related deaths in the United States, but by 2016 the figure was more than 10,000. Although many of those deaths also involved synthetic opioids and cannot be attributed exclusively to higher levels of cocaine consumption, the increase is nonetheless a strong indicator of increasing levels of harmful cocaine use. The biggest growth in cocaine seizures in 2016 took place in Asia and Africa, reflecting the ongoing spread of cocaine trafficking and consumption to emerging markets. Although starting from a much lower level than North America, the quantity of cocaine seized in Asia tripled from 2015 to 2016; in South Asia, it increased tenfold. The quantity of cocaine seized in Africa doubled in 2016, with countries in North Africa seeing a sixfold increase and accounting for 69 per cent of all the cocaine seized in the region in 2016. This was in contrast to previous years, when cocaine tended to be seized mainly in West and Central Africa. Cannabis remains the world's most commonly used drug Cannabis was the most commonly used drug in 2016, with 192 million people using it at least once in the past year. The global number of cannabis users continues to rise and appears to have increased by roughly 16 per cent in the decade ending 2016, which is in line with the increase in the world population. The quantities of cannabis herb seized globally declined by 27 per cent, to 4,386 tons, in 2016. The decline was particularly marked in North America, where the availability of medical cannabis in many jurisdictions and the legalization of cannabis for recreational use in several states of the United States may have played a role. Latest developments in recreational cannabis regulations Since 2017, the non-medical use of cannabis has been allowed in eight state-level jurisdictions in the United States, in addition to the District of Columbia. Colorado was one of the first states to adopt measures to allow the non-medical use of cannabis in the United States. Cannabis use has increased significantly among the population aged 18-25 years or older in Colorado since legalization, while it has remained relatively stable among those aged 17-18 years. However, there has been a significant increase in cannabis-related emergency room visits, hospital admissions and traffic deaths, as well as instances of people driving under the influence of cannabis in the State of Colorado. In Uruguay, up to 480 grams per person per year of cannabis can now be obtained through pharmacies, cannabis clubs or individual cultivation. Cannabis regulation in the country allows for the possession of cannabis products with a tetrahydrocannabinol content of up to 9 per cent and a minimum cannabidiol content of 3 per cent. In mid-2017, the registration of those who choose to obtain cannabis for non-medical use through pharmacies began, as did the sale of the drug through a network of 16 pharmacies. Major markets for methamphetamine continue to grow East and South-East Asia and North America remain the two main subregions for methamphetamine trafficking worldwide. In North America, the availability of methamphetamine was reported to have increased between 2013 and 2016, and, in 2016, the drug was reported to be the second greatest drug threat in the United States after heroin. Based on qualitative assessments, increases in consumption, manufacturing capacity and in the amounts seized point to a growing market for methamphetamine in East and South-East Asia and Oceania, where the use of crystalline methamphetamine in particular has become a key concern. Trafficking in amphetamine expands beyond established markets For many years, amphetamine dominated synthetic drug markets in the Near and Middle East and Western and Central Europe, but recent increases in the quantities seized in North Africa and North America point to growing activity in other subregions. While the reasons for the spike in the quantity of amphetamine seized in North Africa are not entirely clear, it may be related to the trafficking of amphetamine destined for the large market in the neighbouring subregion of the Near and Middle East. The synthetic drug market grows in complexity and diversity In recent years, hundreds of NPS have emerged, adding to the established synthetic drug market for ATS. Grouped by their main pharmacological effect, the largest portion of NPS reported since UNODC began monitoring are stimulants, followed by cannabinoid receptor agonists and classic hallucinogens. A total of 803 NPS were reported in the period 2009-2017. The global NPS market remains widely diversified, but except for a few substances, NPS do not seem to have established themselves on drug markets or replaced traditional drugs on a larger scale. Use of new psychoactive substances leads to an increase in related harm Although the overall quantity of NPS seized fell in 2016, an increasing number of countries have been reporting NPS seizures and concerns have been growing over the harm caused by the use of NPS. In several countries, an increasing number of NPS with opioid effects emerging on the market have been associated with fatalities. The injecting use of stimulant NPS also remains a concern, in particular because of reported associated high-risk injecting practices. NPS use in prison and among people on probation remains an issue of concern in some countries in Europe, North America and Oceania Kratom is emerging as a popular plantbased new psychoactive substance Kratom products are derived from the leaf of the kratom tree, which is used in South-East Asia as a traditional remedy for minor ailments and for nonmedical purposes. Few countries have placed kratom under national legal control, making it relatively easy to buy. There are now numerous products around the world advertised as containing kratom, which usually come mixed with other substances. Some opioid users in the United States have reported using kratom products for the self-management of withdrawal symptoms. Some 500 tons of kratom were seized during 2016, triple the amount of the previous year, suggesting a boom in its popularity.

Details: Vienna: UNODC, 2018. 76p.

Source: Internet Resource: World Drug Report 2018 Booklet 3: Accessed June 29, 2018 at: https://www.unodc.org/wdr2018/prelaunch/WDR18_Booklet_3_DRUG_MARKETS.pdf

Year: 2018

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 150741


Author: Piza, Eric L.

Title: CCTV and Crime Prevention: A New Systematic Review and Meta-Analysis

Summary: This report updates the systematic reviews and meta-analyses of the crime prevention effect of closed-circuit television (CCTV) conducted by Welsh and Farrington (2002, 2007, 2009). We build upon the important insights generated by the prior reviews while posing new questions on the effect of CCTV as a crime prevention strategy. We began our study through a rigorous approach for locating, appraising, and synthesizing evidence from prior evaluation studies. The search process resulted in the collection of 36 new evaluations of CCTV that met the inclusion criteria. In considering these new evaluations alongside those included in the last review (Welsh and Farrington, 2007, 2009), the present review includes 80 distinct evaluations of CCTV. This represents an approximately 82% increase from the 44 studies included in the last review. Of the 80 included studies, 76 provided the requisite data to be included in the meta-analysis. Our meta-analysis generated a number of findings that both replicate and build upon those of the last review, including: - Overall, CCTV is associated with a modest but significant decrease in crime. - The effect of CCTV was largest and most consistently observed in car parks. However, findings suggest that more settings may be amenable to CCTV than previously thought, as crime reductions were also observed in residential areas. - Of the six countries where CCTV was evaluated, CCTV showed the strongest evidence of effectiveness in the UK. - Of the five primary crime types tested in the CCTV evaluations, property crime, vehicle crime, and drug crime exhibited statistically significant reductions. - The manner by which public safety agencies use CCTV is an important consideration. Actively monitored systems and programs deploying CCTV in conjunction with multiple other interventions generated larger effect sizes than their counterparts. The findings of this review have implications for researchers, policymakers, and practitioners. Overall, we can conclude that CCTV reduces crime to a certain degree and that these effects are most pronounced within certain environments. The research evidence also supports the notion that CCTV should be deployed not as a "standalone" intervention, but rather as one component of a comprehensive strategy involving multiple interventions. For the research community, we see opportunities for the further improvement of the evidence base. Researchers can increase the rigor of CCTV evaluations by emphasizing the use of rigorous quasi-experimental evaluations and creatively generating opportunities for randomized experiments. Furthermore, researchers should move beyond the singular research question of "Does CCTV Work?" and attempt to isolate the programmatic, societal, and geographic factors associated with CCTV effect.

Details: Stockholm: Swedish National Council for Crime Prevention (Bra), 2018. 88p.

Source: Internet Resource: Accessed July 9, 2018 at: https://www.bra.se/download/18.c4ecee2162e20d258c421a8/1530605772865/2018_CCTV_and_Crime_Prevention.pdf

Year: 2018

Country: International

Keywords: CCTV

Shelf Number: 150780


Author: Global Detention Project

Title: Global Detention Project: Annual Report 2017

Summary: The world's population is growing, as are the numbers of people on the move, driven by hunger, persecution, war, scarcity, or dreams of a better future. In 2017, according to UN statistics, there were 258 million international migrants, 60 percent of whom were living in Asia and Europe. The UN High Commissioner for Refugees estimates that more than 22 million of these people fall within the protections provided by the UN Refugee Convention. Whether a child migrant, a refugee, an asylum seeker, a victim of trafficking, or a stateless person, what is common to all of these vulnerable people are the growing numbers of obstacles being placed in their way, including detention and deportation, as well as increasingly hostile public attitudes. While the world's leading migration experts and human rights bodies are taking notice of the plight of these people, as reflected in the negotiations over the Global Compacts on refugees and migrants, there remains a critical need for more detailed, systematic information about the treatment and conditions non-citizens face in detention in order to hold governments accountable and advocate for effective, meaningful reforms. This demand for more and better detention data was repeatedly affirmed by international bodies in 2017, including by the EU Agency for Fundamental Rights, the UN Special Representative on Migration, and the UN Independent Expert of the Global Study on Children Deprived of Liberty. Recognition of this need spurred the founding of the Global Detention Project more than a decade ago as a student-led research project at the Graduate Institute of International and Development Studies in Geneva. Motivated by the goal of measuring the worldwide spread of immigration detention, GDP researchers developed a first-of-its-kind methodology for documenting where people are deprived of their liberty for migration-related reasons. This methodology has since expanded to include indicators on a range of other elements of detention systems, including conditions in detention, statistical trends, domestic and international law, and the institutions responsible for operating and providing services in detention. To date we have developed data on more than 100 countries and 2,100 detention centres.

Details: Geneva: Global Detention Project, 2018. 40p.

Source: Internet Resource: Accessed July 11, 2018 at: https://www.globaldetentionproject.org/global-detention-project-annual-report-2017

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 150825


Author: Rollins, Tom

Title: Physical Fences and Digital Divides. A Global Detention Project Investigation into the Role of Social Media in the Context of Migration Control. Part I: Exposing the "Crisis"

Summary: A migrant essential or a criminal marketplace? Since the "refugee crisis" exploded across the international media and political landscapes, the role of social media has been repeatedly dissected, argued over, and-more often than not-misunderstood. Although officials and politicians often present new digital platforms as security threats that enable traffickers and illicit enterprises, these technologies also have played a critically important role in aiding refugees, asylum seekers, and migrants in need. They help people connect to the outside world from inside detention centres, provide desperately needed information about sources of humanitarian assistance, and enable the creation of digital communities that give migrants and their loved ones' agency to proactively search out solutions. This Global Detention Project Special Report is aimed at improving our understanding of how people use social media during their migration journeys, with a special emphasis on their use in the context of detention and migration control in North Africa and the Mediterranean. Part I, "Exposing the 'Crisis,'" charts the historical relationship between migration and social media, reviewing the various tech responses to the "crisis" and highlighting the importance of human-centred design of new technologies. Two subsequent installments in this series will include on-the-ground reports of the diverse ways people put social media to use during their migration journeys and provide recommendations for human rights practitioners who wish to harness social media in ways that emphasise harm-reduction.

Details: Geneva: Global Detention Project, 2018. 30p.

Source: Internet Resource: Accessed July 14, 2018 at: https://www.globaldetentionproject.org/physical-fences-and-digital-divides-exposing-the-crisis

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 1508073


Author: Ashby, Matthew

Title: Does a good cop really never get wet? The impact of weather on stop and frisk

Summary: Description: The study of discretionary police activity has largely focused on the demographic characteristics (particularly ethnicity) of the parties involved. This study proposes a police action model that facilitates a more-holistic analysis of individual and situational influences on police actions. This model is used to generate hypotheses about the relationship between police stop and search/frisk and weather (temperature and precipitation) in London and New York City. After controlling for other situational factors (such as public holidays and special events) and for the frequency of street crime, increasing temperatures are associated with small increases in police stops, while precipitation (rain and snow) is associated with substantial decreases. These relationships disappear, however, when stops conducted indoors (e.g. in shopping malls) are modeled. This research suggests that analysis of discretionary police activity should consider the influence of the environment as well as other factors.

Details: Unpublished paper, 2018. 28p.

Source: Internet Resource: Accessed July 16, 2018 at: https://osf.io/rn9yj/

Year: 2018

Country: International

Keywords: Police Decision Making

Shelf Number: 150882


Author: Fitzalan Howard, Flora

Title: The experience of electronic monitoring and implications for practice: A qualitative research synthesis

Summary: The aims of the study were to understand the experience of electronic monitoring (EM) in the Criminal Justice System (CJS), and how this sanction can be implemented most effectively to achieve best outcomes, including compliance with legal requirements, rehabilitation and desistance. The findings of six qualitative studies of the experience of EM were synthesised using Thematic Synthesis (Thomas and Harden, 2008). Key findings - Six studies of sufficient quality and focus were included, examining the experience of EM in England, Belgium, New Zealand, Canada and the US. EM was used as an alternative sanction, or as part of an early release scheme (none looked at EM for people on bail). The findings may be limited by the small number of primary studies available, and variations in how EM is used in different countries. - EM appeared to offer a range of potential benefits. These included the opportunity for 'headspace', reflection and to disengage from antisocial aspects of life. Additionally, EM could facilitate access to employment and training opportunities, and allow for relationships and social capital to be developed. - Individuals are not guaranteed these benefits. They appeared to be influenced by the individual's circumstances and their response. For some people, EM could lead to a deterioration of relationships, and act as a barrier to employment opportunities. -0 The nature of EM and the consequences of non-compliance meant that monitored life could be stressful and pressured for some. Individuals' private lives felt intruded on and people living in the same household could be negatively affected. - For many people, EM offered valued freedom, despite life still feeling controlled. For some, autonomy and self-sufficiency improved, but others appeared to experience a lack of control and choice, and may have become overly reliant on others. 0- From the perspectives of people that are reflected in the research literature, the advantages of EM usually outweighed the disadvantages, and those sentenced to EM tended to readily accept this, particularly if the alternative was to spend time in prison. - People appeared to comply with EM mainly through fear of punishment for non-compliance. Behaviour change may be maintained while EM was active. However, people felt their reoffending and longer-term outcomes may be less affected by EM, and identified additional critical support needed, for example interventions that helped them to think differently or provided them with necessary risk management skills. - From the perspective of monitored people, and the wider evidence base, people's compliance may potentially be enhanced by making EM feel procedurally just. Compliance with EM and rehabilitative outcomes may also be improved by including structured interventions and support to target criminogenic needs (facilitating changes in thinking and skill development), access to employment, hope, self-efficacy and positive relationships. These may also prevent people's future chances of desistance being diminished.

Details: London: HM Prison & Probation Service, 2018. 8p.

Source: Internet Resource: Analytical Summary 2018: Accessed July 18, 2018 at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/723218/The_experience_of_electronic_monitoring_and_implications_for_practice__a_qualitative_research_synthesis.pdf

Year: 2018

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 150899


Author: U.S. Department of Justice. Office of Justice Programs. Office of Juvenile Justice and Delinquency Prevention

Title: A Law Enforcement Guide on International Parental Kidnapping

Summary: International parental kidnapping, whether as a result of a parent or other person taking or wrongfully retaining a child with the intent to obstruct the lawful exercise of parental rights, merits the full and timely attention of law enforcement. The child (or children) should be considered to be in danger, especially when the person taking or retaining the child has previously threatened to abduct or harm the child or themselves, or is otherwise unstable. In these cases, the law enforcement responsibility is much broader than the simple act of retrieving the child. Officers, and the agencies they represent, who respond promptly, professionally, and efficiently to reports regarding what many term "family kidnappings" become, in effect, a means of protection for the child (Findlay and Lowery, 2011). This guide is for local, state, and federal law enforcement authorities who respond to international parental child kidnapping cases. It suggests methods for preventing international child kidnappings by family members; describes the role of law enforcement as the initial responder and investigator; discusses applicable laws, treaties, and legal remedies for child recovery and reunification; and outlines considerations for criminal prosecution and extradition of offenders. The guide covers: - Risks and effects of the problem, as well as scope and remedies. - Law enforcement interventions for preventing kidnapping. - Initial law enforcement response. - Interdiction: How to stop a kidnapping in progress. - The continuing investigation in the United States and abroad. - Federal resources that can aid in the investigation.

Details: Washington, DC: OJJDP, 2018. 100p.

Source: Internet Resource: Accessed July 25, 2018 at: https://www.ojjdp.gov/pubs/250606.pdf

Year: 2018

Country: International

Keywords: Child Abduction

Shelf Number: 150916


Author: Gerstein, Daniel M.

Title: Looking to the Future of the Department of Immigration and Border Protection (DIBP): Assessment of the Consolidation of the Australian Customs and Border Protection Service (ACBPS) and the DIBP (2016-2017)

Summary: In 2016, RAND Corporation conducted an evaluation of the newly integrated Department of Immigration and Border Protection (DIBP). This report, requested by the DIBP, presents a second, follow-on evaluation with two thrusts: to update the previous analysis and identify lessons for continued DIBP reform, and to inform the upcoming transition to an Australian Department of Home Affairs (HA). Interviews with senior leaders and documents dating to 2005 provide the foundation for judgments and findings in this report, concentrating on changes during the period 2016-2017 and ongoing and planned efforts by DIBP as part of future reform. Analysis focuses on: (1) intelligence, (2) investigations, (3) detention, (4) integrity and corruption, and (5) learning and development. This report finds that (1) previous DIBP progress toward integration and reform has continued, although uneven across the department, and many goals remain a work in progress, (2) lessons and insights applicable to the formation of the soon-to-be-established HA have been learned; and (3) other organisational transformations by similar organisations identify insights and pitfalls for the establishment of HA. Overall, progress has been made in building a modern border management capability for Australia, though more work remains. The foundations of the DIBP are solid and can serve as a basis for the establishment of HA. Key Findings DIBP Progress Toward Integration and Reform Noted, Although Uneven Across Five Areas of Analysis Resource reductions hindered development in some areas. Aggressive integration timelines outpaced organizational capacity. Intelligence made the most progress, with shortfalls in technical areas and use of intelligence to develop enforcement priorities. Detention made progress, particularly in key policies and in closures of facilities. Investigations show improvement from both internal and external perspectives. However, both were underfunded, hindering timeliness of investigations and resolution of cases. Progress was made in integrity and anti-corruption, but this area requires continued emphasis. L&D made the least progress of the five areas. Lessons and Insights Learned as DIBP Forms the Soon-To-Be-Established HA ECM functions are a year behind POI functions. This is important going into the establishment of HA, where DIBP will likely serve as the receiving organisation for the new department. Managers with the correct authorities, experience, and leadership skills must in charge of reform initiatives. The pace of change may strain the ability of the organisation and staff to keep up. Key skill sets are missing among staff. Unrealistic integration and reform timelines result in overpromising and underdelivering. HA establishment will require deconfliction between the agencies being integrated. POI and ECM areas should receive equal attention from leadership. Senior leader turbulence - staff turnover - should be avoided; this slows momentum and destabilises staff. L&D should receive appropriate attention from the onset. Expenditures will be necessary to assist building new institutions for HA. Early savings turn into a self-defeating proposition.

Details: Santa Monica, CA: RAND, 2018. 134p.

Source: Internet Resource: Accessed July 30, 2018 at: https://www.rand.org/pubs/research_reports/RR2262.html

Year: 2018

Country: International

Keywords: Border Control

Shelf Number: 150946


Author: George Washington University. Global Women's Institute

Title: Community-Based Approaches to Intimate Partner Violence: A review of evidence and essential steps to adaptation

Summary: This review focuses specifically on Intimate partner violence (IPV) against women, as opposed to Violence against women and girls (VAWG) more broadly, for several reasons. Partner violence is the most prevalent form of violence against women globally: a woman is at the greatest risk for suffering violence in her own home by someone she knows. A recent systematic review found that most of effective evaluations and programs on VAWG have been directed to IPV. This paper emphasizes results of these and other primary prevention programs, not because secondary and tertiary prevention programs are ineffective, but because primary prevention programs allow for macro-level programming that targets root causes of violence, such as harmful gender norms, to create generations of men, women, boys, and girls who not only no longer accept violence, but also feel empowered to eliminate it. To conclude, this methodological annex outlines the steps involved in adapting to new settings a community-based intervention to prevent intimate partner violence. While the precise nature of these steps will vary depending on the setting in which they are applied, the core ethical and effectiveness considerations here should remain true regardless of location. The authors hope that this note will help programmers worldwide to successfully transform community norms and prevent intimate partner violence.

Details: Washington, DC: World Bank, 2016. 52p.

Source: Internet Resource: accessed July 30, 2018 at: http://documents.worldbank.org/curated/en/907511467996712161/AUS16688-REVISED-Community-Programs-SinglePages.pdf

Year: 2016

Country: International

Keywords: Domestic Violence

Shelf Number: 150947


Author: De Waard, Jaap

Title: What Works? A systematic overview of recently published meta evaluations: synthesis studies within the knowledge domains of Situational Crime Prevention, Policing, and Criminal Justice Interventions, 1997-2017

Summary: This document presents a summary overview of knowledge on effective preventive and repressive criminal justice interventions and measures. The goal is to provide a systematic overview of recently published meta evaluations and synthesis studies of proven effective and ineffective measures and interventions. This will allow a policy to be pursued based on reliable facts, thorough analyses and useful concepts and insights from science and practice: so-called 'evidence based crime policies'. It will also provide a description of a number of core factors and characteristics which determine the efficacy and effectiveness of those interventions and measures. A systematic classification is used via which the scientific knowledge is subdivided into three knowledge domains: - Situational Crime Prevention (61 meta evaluations); - Policing (51 meta evaluations); and - Criminal Justice Interventions (147 meta evaluations). Within these three knowledge domains, some 259 recently published meta evaluations are summed up chronologically. These studies can be accessed separately by clicking the attached deep links. In this way the studies can be examined 'without leaving one's desk'. Of course, the subject matter is very empirical in nature, meaning that not everyone can evaluate or understand it. That is why agreements have been made with the WODC (our in-house Research and Documentation Centre within the Dutch Ministry of Security and Justice) to make the studies available in a more understandable and customer-friendly way via a so-called effective criminal justice interventions portal. For background information interested readers can contact: kennisbank.helpdesk@minvenj.nl A further 'translation' into another form is therefore going to take place. The main goal of this overview is to demonstrate that knowledge has been accumulated in recent years relating to the effectiveness of criminal justice policies ( prevention, detection, repression, or a combination of these issues).

Details: The Hague: Ministry of Security and Justice, Law Enforcement Department, Unit for General Crime Policy, 2018. 24p.

Source: Accessed July 31, 2018 at: https://www.researchgate.net/publication/320519021_What_Works_A_systematic_overview_of_recently_published_meta_evaluations_synthesis_studies_within_the_knowledge_domains_of_Situational_Crime_Prevention_Policing_and_Criminal_Justice_Interventions_1997-

Year: 2018

Country: International

Keywords: Crime Prevention

Shelf Number: 150982


Author: Great Britain. National Offender Management Service

Title: Young Offenders and the ART Programme

Summary: A significant proportion of crime is committed by young people. 'Juvenile delinquency' was being charted as a complaint from as early as the 17th century and it is increasingly evident that in modern social conditions, adult fears about youthful deviance have become more and more prominent. Subsequently, programmes and interventions to reduce the incidence of crime and anti‐social behaviour amongst youths are spreading not just nationally, but internationally as problems are increasingly shared across borders and we look towards our international counterparts for guidance and expertise.    The primary objective of the following report is to develop a clear picture of Aggression Replacement Training (ART) practices across international borders. Questionnaires were administered to professionals and practitioners in the field of youth offending in order to collate information on their ART practices and most specifically information and experience of the transfer and adaptation of ART from one jurisdiction to another. In addition, current literature and research surrounding the ART programme and specifically its potential effectiveness in terms of reducing re‐offending amongst young offenders is drawn upon and analysed.  

Details: London: NOMS, 2011. 31p.

Source: Internet Resource: Accessed August 1, 2018 at: http://www.starr-probation.org/uploaded_files/Rep%20STARR%20ART%20YO.pdf

Year: 2011

Country: International

Keywords: Aggression Replacement Training

Shelf Number: 150991


Author: Triandafyllidou, Anna

Title: Migrant Smuggling Data and Research: A global review of the emerging evidence base Volume 2

Summary: Migrant Smuggling Data and Research: A global review of the emerging evidence base (Volume 2) presents a unique review of what is being collected and what can be done to further build the evidence base on migrant smuggling globally. The second volume on the topic, and building on the 2016 report, Volume 2 is again the result of a collaboration between the International Organization for Migration and researchers from a range of backgrounds and academic disciplines, and supported by the Government of Turkey. The report shows that important research has been undertaken on the transnational crime aspects of migrant smuggling, including on routes, smuggling organization (such as criminal networking and facilitation), smuggler profiles and fees/payment. Likewise, there is an emerging academic literature on migrant smuggling, particularly the economic and social processes involved in smuggling, which has largely been based on small-scale qualitative research, mostly undertaken by early-career researchers. Contributions from private research companies, as well as investigative journalists, have provided useful insights in some regions, helping to shed light on smuggling practices. The report confirms key findings of Volume 1, making recommendations in three priority areas: Strengthening research and analysis partnerships; Supporting capacity-building; and Focusing on emerging and priority topics.

Details: Geneva, SWIT: International Organization for Migration, 2018. 228p.

Source: Internet Resource: Accessed August 1, 2018 at: https://publications.iom.int/books/migrant-smuggling-data-and-research-global-review-emerging-evidence-base-volume-2

Year: 2018

Country: International

Keywords: Human Smuggling

Shelf Number: 150999


Author: International Organization for Migration

Title: Migrant Smuggling to Canada - An Enquiry into Vulnerability and Irregularity through Migrant Stories,

Summary: When trapped at origin or in transit, and left without means to pursue regular options for migration, people have no choice but to resort to smugglers; in many instances, smugglers provide the only lifeline available to migrants. At the point of origin, smuggling is a complex practice with deep roots in communities of origin. In an article analysing the various dimensions of human smuggling and its roots, Majidi argues that "the smuggler is from the community and introduced by the community." Through time and distance, and specifically in locations of transit, the smuggler's profile and role changes. It evolves in terms of methods, using technology and phone-based applications, transnational networks and informal funds transfer systems, as well as treatment, with implications for migrants' rights and protection needs. This study challenges views on smuggling and the migrant-smuggler relationship, and instead of perpetuating a narrow definition of the smuggler and a linear model for the relationship, captures the broad spectrum of interactions and individuals involved in the experience of being smuggled and the migration process. The study focuses on assessing migrant vulnerabilities, protection needs and exposure to exploitation before migration, during their transit and upon arrival through a qualitative research based on migrants' experiences of irregular migration to Canada, with a focus on Afghan and Syrian migrants. With limitations of time and scope, this study provides an enquiry into the following: - Conditions of the journey, including methods of coercion used in the exploitation of smuggled migrants; - Factors leading to irregular migration and reasons why migrants select particular routes over others; - Profile of the interviewed smuggled Afghan and Syrian migrants; - Migrant perception of the reception processes and the legal frameworks in transit and destination; - Influence of systems in place on migrants' strategies; and - Role of social media in smuggling.

Details: Accra, Ghana: IOM, 2018. 78p.

Source: Internet Resource: Accessed August 1, 2018 at: https://publications.iom.int/system/files/pdf/migrant_smuggling_to_canada_2018_final.pdf

Year: 2018

Country: International

Keywords: Human Smuggling

Shelf Number: 151000


Author: Conway, Maura

Title: Violent Extremism and Terrorism Online in 2017: The Year in Review

Summary: The use of the Internet, particularly social media, by violent extremists and terrorists and their supporters received an increasing amount of attention from policymakers, media, Internet companies, and civil society organisations in 2017. In addition to politicians stepping-up their rhetoric regarding the threat posed by consumption of and networking around violent extremist and terrorist online content, prominent and heavily trafficked social media platforms also took a stronger stand on the issue this year, which caused civil liberties organisations considerable disquiet. This report treats developments in the violent extremist and terrorist online scene(s) and responses to them in the 12-month period from 1 December 2016 to 30 November 2017.2 It is divided into two parts: Part I focuses on the online activities of both the so-called 'Islamic State' (hereafter IS) and the extreme right; Part II details the responses of major social media companies to this activity. Concerns surrounding freedom of expression are addressed throughout.

Details: Dublin: VOX-Pol Network of Excellence (NoE), 2018. 23p.

Source: Internet Resource: Accessed August 2, 2018 at: http://www.voxpol.eu/download/vox-pol_publication/YiR-2017_Web-Version.pdf

Year: 2017

Country: International

Keywords: Internet Crimes

Shelf Number: 151007


Author: Hempel, Olga

Title: "Death Row Phenomenon. A Fate Worse Than Death." Torture on death row from a psychological and legal perspective.

Summary: The conditions on death row globally are characterised by an emphasis on high security, isolation and a limitation of resources. Under these deplorable conditions death row inmates are deteriorating mentally and physically. Internationally, the notion "death row phenomenon" had emerged in an attempt to conceptualise a claim that confining death row inmates in such conditions is unlawful and constitutes torture or inhuman treatment. Twenty-seven years since the doctrine first entered the international realm, there is still no agreement on what constitutes the phenomenon. This absence of clear-cut lines leaves ambiguous of when death row detention becomes unlawful. This paper seeks to answer whether it is possible to detain inmates on death row without triggering the death row phenomenon. After examining various psychological studies on the effects of death row confinement and current divergent approaches to finding detention unlawful, the thesis concludes that the psychological anguish from awaiting execution is inherent in death row, and therefore it is impossible to confine inmates on death row without breaching the norm prohibiting torture or inhuman treatment.

Details: Vienna: University of Vienna, 2016. 92p.

Source: Internet Resource: Thesis: Accessed August 6, 2018 at: https://globalcampus.eiuc.org/bitstream/handle/20.500.11825/174/Hempel.pdf?sequence=1&isAllowed=y

Year: 2016

Country: International

Keywords: Capital Punishment

Shelf Number: 151022


Author: International Fund for Animal Welfare

Title: Killing with Keystrokes: An Investigation of the Illegal Wildlife Trade on the World Wide Web

Summary: The rise of the Internet has revolutionized the way we exchange ideas, information and merchandise. This is largely due to the medium's ability to facilitate communications and new commercial and social connections around the globe. However, as a result, the Internet is also facilitating the illegal trade in wildlife, which is having a devastating effect on animals, ecosystems and the communities that rely on them worldwide, making it one of the major wildlife conservation challenges of our generation. The International Fund for Animal Welfare (IFAW) has completed its fourth and most comprehensive investigation into the potentially illegal trade in endangered species on the Internet. The investigation spanned three months, involved six one-week snapshot investigations on 183 publicly accessible websites in 11 countries and looked at both the wildlife product and live animal trade in primates, birds, reptiles, big cats, bears, elephants, rhinoceros, sharks, Tibetan antelopes and sturgeon. In a six-week period, IFAW investigators tracked 7,122 online auctions, advertisements and communiqués offering trade in the Convention on International Trade in Endangered Species (CITES) Appendix I listed wildlife, as well as a notable number of Appendix II listed species, for sale both domestically and internationally. This high volume clearly points to an even greater problem given that investigators focused on a limited number of species and only publicly available Web sites.The results identified the United States as being responsible for more than two-thirds of the trade, an amount that was nearly 10 times more than the two countries with the next highest volume, the United Kingdom and China. The final tally of verifiable commerce (excluding the Latin America results) was approximately US$3.8 million in advertisements and nearly US$450,000 in final sales. While these figures are already high, they are made even more sobering considering that many sites do not offer an advertised sale price and only eBay provides the means for tracking final sales; a comprehensive tally would likely be much higher. The results also indicate that this trade is contributing to the endangerment of species. It is alarming that IFAW found elephant ivory items dominating the results of this investigation. It is estimated that 20,000 elephants are slaughtered annually by poachers trading in tusks, and indeed, ivory appears at more than 73% of the activity monitored. The complexity of laws surrounding the sale of ivory, the fact that it is nearly impossible to distinguish between legal and illegal ivory on the Internet, the fluid nature of the Internet and weak or absent enforcement seem to allow unscrupulous sellers to profit from the slaughter of elephants. In 2007, eBay announced a ban on cross-border trade in elephant ivory, meaning that sales across country lines would be prohibited. Yet a year after the announcement of the ban, eBay was found responsible for 83% of all ivory identified by investigators and a full 63% of all trade in this investigation, a significant amount of which shipped internationally. This demonstrates one of the key issues in global Internet trade: a strong policy without adequate enforcement is ineffective.The investigation concludes that illegal wildlife transactions via the Internet may be fostered by low levels of awareness about guidelines regarding trade in protected wildlife; by a lack of stringent and enforceable legislation that clearly declares trade in endangered wildlife online as a serious criminal offence; by weak monitoring and enforcement and by readily available electronic loopholes through which wildlife traffickers can operate without detection. This latter point was most clearly evident with regard to the trade in live exotic birds, where buyers and sellers were observed to choose Internet sites that offered classified ads or message boards. The trade in live exotic birds accounted for nearly 20% of total activity identified in this investigation, and was second only to the trade in elephant ivory. This report urges CITES, governments worldwide, Internet marketplaces, consumers, Internet Service Providers and anyone who values our planet’s rich biodiversity to take the steps necessary to stop the illegal wildlife trade over the Internet, including: -  Enacting robust domestic legislation on Internet wildlife trade -  Implementing and empowering effective enforcement -  Increasing public awareness of the problem -  Devising new ways to monitor and curtail the online trade in endangered wildlife

Details: Yarmouth Port, MA: International Fund for Animal Welfare, 2008. 40p.

Source: Internet Resource: Accessed August 7, 2018 at: https://s3.amazonaws.com/ifaw-pantheon/sites/default/files/legacy/Killing%20with%20Keystrokes.pdf

Year: 0

Country: International

Keywords: Endangered Species

Shelf Number: 151036


Author: Mahlouly, Dounia

Title: A Tale of Two Caliphates: Comparing the Islamic State's Internal and External Messaging Priorities

Summary: OVERVIEW - In recent years, the media department of the self-proclaimed Islamic State has proven itself to be highly adept at strategic communication. While much research has gone into the group's digital and online capabilities, there remains a significant gap in the knowledge regarding its in-country propaganda operations and objectives. In recognition of this, the following research paper approaches the issue from a different angle, attempting to better understand how and why the group communicates its brand through the lens of two publications - al-Naba', its Arabic-language newspaper, which appears to be designed primarily for offline dissemination in the caliphate itself, and Rumiyah, its foreign-language electronic magazine, which has only ever appeared online. Using content analysis to identify and compare each publication's internal (local) and external (global) media priorities over the four-month period between September and December 2016, we develop an empirical evaluation of the group's recent forays into targeted outreach. KEY FINDINGS - The Islamic State's publication priorities at the end of 2016 were largely bifurcated-its propagandists seemed to want different responses from different audiences, and Rumiyah and al-Naba' were particularly demonstrative of this. - Structurally, the publications bore only partial resemblance to each other, with Rumiyah privileging lengthier, more discursive ideological content and al-Naba' primarily tending to preference briefer tactical news items. - The publications were also distinct thematically: Rumiyah's content was significantly more abstract - that is, weighted towards complex political, social and theological issues - than that of al-Naba', which shed much more light on present-day military matters than anything else. - Al-Naba’’s conception of jihad was distinctly more pragmatic than that of Rumiyah - it focused on real-world concerns rather than ideology, something that could point towards the differing motivations of the Islamic State's in- and ex-theatre supporters. - There were significant geographic discrepancies between the two publications, with Rumiyah spending more time discussing events and operations external to Syria and Iraq than al-Naba'. This was most apparent in the context of the battle for Mosul, which was entirely absent from the pages of Rumiyah, and regularly frontpage news in al-Naba'. - It appears that each publication was carefully tailored to suit its primary consumer audience - in Rumiyah's case, this was the Islamic State's diffuse archipelago of global supporters, and in the context of al-Naba', this was, and continues to be, its in-country rank-and-file.

Details: VOX-Pol Network of Excellence, 2018. 49p.

Source: Internet Resource: Accessed August 7, 2018 at:

Year: 2018

Country: International

Keywords: Caliphate

Shelf Number: 151040


Author: Beck, Adrian

Title: Applying Risk in Retail Stores: The evidence to date on making shop thieves think twice

Summary: Retailers are not short on advice as to how they might manage the risk of shop theft in their physical and virtual stores - a considerable consulting and technology-based industry has developed around them offering a plethora of ways to try and achieve this goal. It is easy to see why this has happened - the challenge is considerable and even the best 'solutions' often struggle to maintain their potency - the shop thief (both external and internal) can be highly adaptive, innovative and brazen in the approaches taken to relieve retailers of their produce. This is further compounded by the almost constant change witnessed in the retail world, which has become for many an absolute necessity if they are to maintain market share and continue to generate a profit. This almost continual cycle of change brings with it not only new opportunities to maintain and grow sales but also opportunities for theft to occur - the perennial double-edged sword - requiring those tasked with managing the problem to be equally flight of foot in how they adapt and respond. Understanding the Offending Decision The work of Cornish and Clarke and others has developed a body of knowledge that provides a solid framework for better understanding how offenders think and the way they go about making decisions to steal and, perhaps more importantly, the factors that can act to deter them4. This research suggests that offenders assess the following factors before coming to a decision: the perceived risk (how likely is it that I will be caught?); the relative ease with which the offence can be committed (how easy is it for me to do this?); the benefit of undertaking the offence (what will I get from doing this and is it worth it?); and the likely consequences if they were to be caught (what will happen to me if they catch me?). If they decide that the risk is low, that it is easy to do, well worth the effort and even if they were to be caught the consequences would be low, then they are highly likely to go ahead and offend. Of these factors, it has been found that the first (the risk of being caught) is the most important in an offenders' decision-making process, while consequential punishment is regarded as the least important5. For retailers, it is difficult to impact upon all four of these factors to the same extent and some are more susceptible to their control the others. For instance, retailers are certainly able to influence the degree to which an offender feels like they may be caught and how easy it is to carry out a crime, and while they can impact to a degree on reducing the benefit obtained (such as utilising benefit denial strategies)6, it is much more difficult to influence this factor given the nature of their business (selling goods of value). Equally, while retailers can try and impact the 'punishments' associated with crimes against their businesses (for instance pursuing approaches such as civil recovery) it is relatively difficult to influence criminal justice systems and governments to make this happen. Building on this thinking has been work on how to influence these decisions, particularly through changing the situation in which the offender operates. A useful summary of this approach can be seen below in Table 18. As can been seen, a series of factors have been identified as ways to try and influence the decision-making and circumstances surrounding a prospective offender. For instance, ways have been developed to make it harder for the offender to commit a crime, such as through 'target hardening', limiting their access or encouraging them to go elsewhere. Similarly, and of particular interest to this report, ways have been developed to increase the risk such as by increasing surveillance and guardianship and reducing the amount of anonymity enjoyed by the offender. Likewise approaches have been developed to reduce the rewords, make it less likely that the offender will be provoked into offending and removing any possible excuses they might have to commit an offence.

Details: Brussels: ECR Community Shrinkage & On-shelf Availability Group, 2016. 62p.

Source: Internet Resource: Accessed August 7, 2018 at: http://logisticacollaborativa.it/media/filer_public/61/42/61428382-5228-41ab-8c42-81aea4b1bad8/amplifying_risk_in_retail_stores_report.pdf

Year: 2016

Country: International

Keywords: Crime Prevention

Shelf Number: 151044


Author: Walk Free Foundation

Title: Global Slavery Index 2018

Summary: The 2018 Global Slavery Index provides a country by country ranking of the number of people in modern slavery, as well as an analysis of the actions governments are taking to respond, and the factors that make people vulnerable. This year, so that we might better understand the problem, we have also included an analysis of trade flows and data on state imposed forced labour in North Korea, risk factors in the fishing industry, and the prevalence of forced labour in the cocoa sector.

Details: Walk Free Foundation, 2018. 276p.

Source: Internet Resource: Accessed August 7, 2018 at: https://cdn.globalslaveryindex.org/2018-content/uploads/2018/07/07142844/GSI-2018_FNL_180807_DigitalSmall_p.pdf

Year: 2018

Country: International

Keywords: Child Marriage

Shelf Number: 151045


Author: Financial Action Task Force

Title: Financial Flows from Human Trafficking

Summary: Executive Summary 1. In addition to its enormous human cost, human trafficking is estimated to be one of the most profitable proceeds generating crime in the world, with the International Labour Organisation estimating that forced labour generates USD 150.2 billion per year. While in the past, many aspects of the crime went 'unseen', there is now an increased understanding of the breadth and gravity of human trafficking, particularly with respect to domestic human trafficking and human trafficking for labour exploitation. Human trafficking is also one of the fastest growing forms of international crime. The increased displacement and vulnerability of people in, and around, conflict zones increases instances of human trafficking, including potential involvement by opportunistic terrorist organisations. 2. As we learn more about the way human traffickers operate and exploit vulnerable humans, it is clear that this phenomenon affects nearly every country in the world. The Financial Action Task Force (FATF) and the Asia/Pacific Group on Money Laundering (APG) jointly undertook this study to improve global understanding of the financial flows associated with the crime of human trafficking, both as a money laundering predicate and potential source of terrorist financing. This study updates the FATF's 2011 report. This study has brought granularity to indicators of suspected money laundering of the proceeds of human trafficking by separating human trafficking into three categories in line with the Palermo Protocol: human trafficking for forced labour, sexual exploitation or for the removal of organs. 3. The project team found that the proceeds from each of these types of exploitation are realised in a different manner, and required different laundering mechanisms. In addition, each of these three types of exploitation could be better understood and detected through the financial activities of the various actors and/or roles involved to conduct each of the three types of exploitation. Further segmentation based on roles and actors provided a second opportunity to develop a more detailed understanding of the offence. The report also provides a more precise set of global money laundering indicators for use by reporting entities, financial intelligence units and other national authorities. 4. This study also identifies the challenges national authorities frequently face in detecting, investigating and prosecuting money laundering and terrorist financing from human trafficking. The study identifies good practices, and in particular the two primary good practices, to mitigate some of these challenges: - Assess the diverse money laundering risks from human trafficking, share with stakeholders and ensure that they're understood - Leverage expertise, capabilities and information through partnerships between the public sector, private sector, civil society and NPO communities. 5. This study updates the FATF Global Network's understanding of the financial flows from human trafficking, and provides tangible indicators and best practices for national authorities to improve their effectiveness in combatting money laundering and terrorist financing from human trafficking (see Annex B). While our understanding is improved, it is by no means complete. This study therefore concludes with practical next steps to develop further precision to the financial flows from human trafficking, both at the global level, and at the regional/national level.

Details: Paris: Financial Action Task Force (FATF), 2018. 74p.

Source: Internet Resource: Accessed August 7, 2018 at: http://www.fatf-gafi.org/media/fatf/content/images/Human-Trafficking-2018.pdf

Year: 2018

Country: International

Keywords: Forced Labor

Shelf Number: 151047


Author: Barone, Raffaella

Title: Shedding light on money laundering. Is it a damping wave?

Summary: This paper has three goals. First, some theoretical remarks about money laundering (the demand and supply sides) are made. Second, we provide a quantitative analysis of money laundering and a preliminary review of our empirical findings on the proceeds of transnational crime worldwide, as well as a breakdown of different types of crime proceeds. Third, we review literature on anti-money laundering and draw policy conclusions. The significance of our contribution is that we provide knowledge about money laundering which could be the basis of a more effective fight against transnational crime organizations.

Details: Unpublished paper, 2018. 36p.

Source: Internet Resource: Accessed August 8, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3204289

Year: 2018

Country: International

Keywords: Drug Trafficking

Shelf Number: 151051


Author: Utermohlen, Mary

Title: In Plane Sight: Wildlife Trafficking in the Air Transport Sector

Summary: Wildlife traffickers are benefiting from an increasingly interconnected world. As marketplaces have become progressively more international, wildlife trafficking networks have been able to exploit the advance of technology, profiting off the development of the international financial system and increasingly intertwined transportation networks. By 2016, environmental crime had grown into a multi-billion dollar industry, worth as much as $91 to $258 billion annually, with wildlife crime specifically making up $7 to $23 billion of the total. But while wildlife criminal networks were learning to take advantage of finance and transportation networks, they made a mistake: they became dependent on them. Wildlife criminal groups now rely on international systems of trade, finance, and transport to make a profit, forcing them to emerge from behind their carefully constructed disguises to engage with the lawful, regulated world, thus exposing themselves to discovery. Wildlife seizures are the clearest outward sign of this weakness. If carefully collected, stored, and analyzed, wildlife seizure data can reveal a great deal about wildlife trafficking trends, routes, and methods, including how wildlife networks seem to respond to different enforcement and market pressures. In Plane Sight examines wildlife trafficking through the air transport sector by analyzing nine years' worth of open source seizure information, and is intended to provide an update on wildlife trafficking activity in airports since last year's Flying Under the Radar. Unhindered by laws, regulations, or bureaucracy, criminal networks are creative and evolve quickly, generally outpacing enforcement, which remains perpetually a step behind. Ultimately, large-scale disruption of wildlife criminal networks requires shifting alongside them, identifying new trafficking methods as they arise, and overtaking them by anticipating their responses to enhanced enforcement activity and preparing accordingly. Over the past year, C4ADS analysts have continued to collect ivory, rhino horn, reptile, and bird seizures, and have developed three new datasets covering pangolin, marine products, and mammal seizures. Together, these seven categories account for about 81% of known trafficked wildlife, according to the United Nations Office on Drugs and Crime (UNODC). Although seizure data can present a slightly inaccurate view of wildlife trafficking, if considered with the appropriate caveats, it provides the best available picture of overall trafficking activity and can be used to direct future anti-trafficking efforts. This report is divided into the seven different wildlife categories included in the C4ADS Air Seizure Database. The analysis in each section is broken down into smaller subsections that review, in order: overall trafficking trends, trafficking routes, and trafficking methods. The first four sections (ivory, rhino horn, reptiles, and birds) focus primarily on 2017 data, while the next three sections (pangolins, marine products, and mammals) cover 2009 through 2017. The wildlife category sections are followed by five appendices, which include: 1) an analysis of WCO CEN wildlife seizure data, 2) an analysis of FWS LEMIS seizure data, 3) annual trafficking route maps (2015 through 2017) for each wildlife category, 4) a Human Trafficking Assessment Tool for the air transport sector, 5) a seizure reporting template, and 6) the R packages used to create the graphics for this report. In general, this report finds wildlife trafficking activity to be truly global in scope, and increasingly so, as trafficking networks continue to seek out new source regions and demand markets for their illicit products.

Details: Washington, DC: Center for Advanced Defense Studies (C4ADS), 2018. 214p.

Source: Internet Resource: Accessed August 9, 2018 at: https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/5b68614a2b6a28d46b615f5f/1533567389029/In+Plane+Sight.pdf

Year: 2018

Country: International

Keywords: Criminal Networks

Shelf Number: 151088


Author: Utermohlen, Mary

Title: Flying Under the Radar Wildlife Trafficking in the Air Transport Sector

Summary: Environmental crime is estimated to be worth between $91 and 258 billion, with wildlife crime making up $7 to 23 billion of the total, and is currently estimated to be growing at two to three times the speed of the global economy. Over the past few years, myriad studies and reports have examined the economic and environmental devastation wreaked by wildlife crime, as well as its intertwining links to transnational criminal networks. Few studies, however, have focused on the transport systems used by wildlife traffickers, despite the large benefits that traffickers have gained from the increasing interconnectedness of global infrastructure and transport systems. Flying Under the Radar examines wildlife trafficking through the air transport sector, and is designed to support law enforcement and the private sector's efforts to stem the hidden flow of illegal wildlife through their jurisdictions and supply chains. Given the covert nature of illegal activity, wildlife traffickers' past, current, and potential future moves must be assessed by obtaining and analyzing detailed wildlife seizure data. Where this data exists, however, it exists largely in partial and incomplete form, or held disparately and privately by various intergovernmental organizations and enforcement agencies. To mitigate this challenge, C4ADS' analysts spent three months building a baseline of information by collecting and structuring open source seizure data for four categories of wildlife and wildlife products (ivory, rhino horn, live reptiles, and live birds). These categories were specifically chosen based on data availability and trafficking frequency, and collectively account for about 66% of trafficked wildlife products, according to the United Nations Office on Drugs and Crime (UNODC). C4ADS' analysts collected the majority of this data from country reporting and news media, as most seizure databases do not provide the requisite detail for inclusion in an assessment of air trafficking. The use of seizure data, while currently the best method available for investigating trafficking activity of all types, can lead to a variety of mistaken conclusions. For instance, better public seizure reporting may create the appearance of a trafficking problem where none exists. Still, seizure data, taken together with the appropriate caveats, provides a good picture of overall trafficking activity, and can be used to direct future anti-trafficking efforts. Wildlife trafficking is a global problem that takes advantage of enforcement loopholes, lack of awareness, limited public and private sector coordination, capacity gaps, and lagging technology and procedures to move illicit products through the licit transportation system. As international travel continues to exponentially increase, particularly in the air transport sector, enforcement and the private sector should make immediate changes to better stem the international flow of illicit wildlife. Without such changes, wildlife traffickers will continue to find the illegal wildlife trade a profitable, comparatively easy and low-risk enterprise, at substantial detriment to ecosystems, economies, and global security. Flying Under the Radar is divided into three main sections: • Trends and Totals examines the overall conclusions that can be drawn from the seizure data contained within the C4ADS Air Seizure Database, such as the changes in seizure sizes over time, a Country Enforcement Index for countries involved in twenty or more trafficking instances, and an analysis of the number of trafficking instances per country. • Airports and Routes maps out the international and domestic transit routes that appear in our data, evaluates countries’ roles in different illicit wildlife supply chains, and assesses airport seizure numbers. • Modus Operandi details the common methods used by traffickers, as well as methods that seem to be specific to one category of wildlife and wildlife products.

Details: Washington, DC: Center for Advanced Defense Studies (C4ADS), 2017. 114p.

Source: Internet Resource: Accessed August 9, 2018 at: https://static1.squarespace.com/static/566ef8b4d8af107232d5358a/t/59225c49db29d65872a1a67b/1495424094784/Flying+Under+the+Radar.pdf

Year: 2017

Country: International

Keywords: Criminal Networks

Shelf Number: 151089


Author: Harris, Lindsey

Title: Understanding the Global Caviar Market: Results of a rapid assessment of trade in sturgeon caviar

Summary: Sturgeon and paddlefish populations have been declining globally due to, among other factors, habitat degradation and overexploitation, including illegal fishing. Of the 27 species of sturgeon and paddlefish, 85% are now on the brink of extinction (WWF, 2017). In response to this and to ensure trade is sustainable, since 1998, all species of sturgeon and paddlefish have been listed on Appendix I or II of the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) whereby international commercial trade is prohibited or only authorised with the relevant CITES documents granted by the CITES authorities . Despite the introduction of CITES regulations and the rapid growth of aquaculture production, the high price and rarity of certain sturgeon and paddlefish species as well as a long-term investment to produce caviar from farmed sturgeons makes illegal trade of caviar and poaching of sturgeons and paddlefish attractive. There are several types of illegal trade of caviar and sturgeon products identified through the study, which include: - Caviar and sturgeon meat taken from allegedly poached wild stocks are on sale at open air markets, "under the counter", or through individual contacts or online offers; - Caviar labelling is not in compliance with the relevant CITES Resolution (e.g. labelling not containing all required information); - Wild sourced caviar from sturgeon species can be deliberately mislabelled as aquaculture derived species to allow laundering through the legal trade; - Aquaculture derived products are deliberately declared as wild sourced or different species to sell at a higher price. - Falsified or forged CITES documents, or genuine CITES documents issued corruptly, are used to permit exports. The aim of this study was to obtain a better understanding of global caviar markets, specifically: - To look for any evidence of illegal trade in caviar and to identify the type of illegality, e.g. non-compliance with labelling, laundering/mis-labelling, modus operandi; - To identify geographical hotspots for trade in caviar; - To obtain an initial understanding of consumer attitudes towards consumption of caviar to explore what factors drive demand. This study was intended to provide a rapid assessment of caviar trade globally. Therefore, physical market surveys were limited to only one city in each country in order to obtain a snapshot of the situation. Furthermore, it was not possible to collect detailed information concerning fishing regulations and production of each species in the countries reviewed in the scope of this project.

Details: Cambridge, UK: Traffic; World Wildlife Fund, 2018. 94p.

Source: Internet Resource: Accessed August 9, 2018 at: https://www.traffic.org/site/assets/files/9805/global-caviar-market-1.pdf

Year: 2018

Country: International

Keywords: Caviar

Shelf Number: 151094


Author: Liem, Marieke

Title: Cut from the same cloth? Lone Actor Terrorists versus Common Homicide Offenders

Summary: The term "lone actor" has been applied to a variety of violent individuals, including jihadists, right-wing extremists, school shooters, and others whose crimes were ideologically motivated and generated much societal impact. It may be argued, however, that such a classification of this rare subset of violent offenders is an artificial one, based on political perspectives rather than on empirical findings. In this study, we examine and compare characteristics of European single perpetrators or lone actor terrorists to a large sample of European 'common' homicide offenders. Bivariate analysis shows that lone actors are significantly younger, more single, and more educated than homicide offenders. In terms of event characteristics, however, the two groups differ more substantially. Lone actors are more likely to attack 'strangers' in public places and to use firearms, while homicide offenders tend to attack victims they know in private settings and to use more hands-on methods. These differences may be understood through the notion of instrumental versus expressive motivations. Our findings question the classification of lone actors as an entity fundamentally different from our sample of single homicide offenders and call for future in-depth assessments of possible differences in homicidal drive.

Details: The Hague: International Centre for Counter-Terrorism, 2018. 22p.

Source: Internet Resource: Accessed August 13, 2018 at: https://icct.nl/wp-content/uploads/2018/04/ICCT-Liem-et-al-Cut-from-the-Same-Cloth-April2018.pdf

Year: 2018

Country: International

Keywords: Lone Actor Terrorists

Shelf Number: 151121


Author: Cocarascu, Oana

Title: A Framework for Modelling and Reasoning About Lone Actor Terrorism

Summary: Identifying key risk factors for offending is recognised as one of the main challenges facing criminological research. In this project, we investigate the use of machine learning techniques to identify the most relevant characteristics and antecedent behaviors of lone actor terrorists for explaining their target selection. The choice for an ensemble of classifiers is guided by their proven capabilities to outperform the standard algorithms the ensemble consists of. The classifier ensemble is based on Support Vector Machines, known for generating good models even when handling limited data (which is the case in lone actor terrorism), Decision Trees and K Nearest Neighbours. Features are grouped according to three themes (ideology, network membership and mental illness) and explanatory models are generated under each theme using a pairwise feature selection model based on information gain. Each generated model comprises only those features that are considered most relevant with respect to target choices. These are then compared with a model generated using all variables combined (i.e. not with respect to themes). A Bayesian network is used with the attributes obtained from the best model as a graphical representation and inference engine to model the knowledge about individual terrorists and the relationships between characteristics.

Details: London: Imperial College London, Department of Computing, 2015. 119p.

Source: Internet Resource: Dissertation: Accessed August 13, 2018 at: https://www.doc.ic.ac.uk/teaching/distinguished-projects/2015/o.cocarascu.pdf

Year: 2015

Country: International

Keywords: Lone Actor Terrorism

Shelf Number: 151124


Author: United Nations Population Fund

Title: Young Persons with Disabilities: Plobal Study on Ending Gender-Based Violence, and Realising Sexual and Reproductive Health and Rights

Summary: Around the world, more than 1 billion women and men and boys and girls are living with some form of disability. Although most people will experience disability at some point in their lives, understanding the meaning of disability and its impact on the ability of each individual to be active participants in social, economic, sociocultural, and political life remains a challenge. Physical, social, and legal barriers continue to limit access to education, health care including sexual and reproductive health (SRH), employment, leisure activities, and family life for millions of persons with disabilities worldwide. These barriers can be most acute for young persons with disabilities. Globally, an estimated 180 to 200 million persons with disabilities are between the ages of 10 and 24. Young persons with disabilities are like young people everywhere: They have dreams and ambitions, interests and desires, and hopes for their futures. But young persons with disabilities face persistent social disadvantages worldwide stemming from discrimination, stigma and prejudice, and the routine failure to incorporate disability into building policy, and programme designs. Physical, socio-economic, socio-cultural, and legal barriers continue to limit access to education, health care including SRH, employment, leisure activities, and family life for millions of persons with disabilities worldwide, and violence against young persons with disabilities is widespread. Persons with disabilities, including young persons with disabilities, are at greater risk of living in poverty than are their peers without disabilities. They are much more vulnerable to violence, including gender-based violence (GBV), and are less likely to attend school. They receive too little information about puberty, sexuality, and healthy relationships, introducing new vulnerabilities to sexual exploitation and denying them the rights to live satisfying sexual lives, choose to be married, and have children.

Details: New York: UNPFA, 2018. 436p.

Source: Internet Resource: Accessed August 16, 2018 at: http://www.srhr-ask-us.org/wp-content/uploads/2018/08/51936_-_UNFPA_Global_Study_on_Disability_-_web.pdf

Year: 2018

Country: International

Keywords: Disabilities

Shelf Number: 151140


Author: Schain, Martin A.

Title: Shifting Tides: Radical-Right Populism and Immigration Policy in Europe and the United States

Summary: Recent elections in Europe and the United States have seen a rise in support for candidates touting populist radical-right policies, particularly in the area of immigration and asylum. While these platforms vary from country to country, they are often imbued with a sense of exclusive nationalism, distrust of elites, and desire to tighten borders and cut immigration. The politicians who espouse these positions have seen mixed electoral results, but whether in office or in the opposition, they have played a pronounced role in reshaping policy agendas, public discourse, and the priorities of more mainstream political actors. This Transatlantic Council on Migration report examines the (re-)emergence of radical-right populism in countries across Western Europe and in the United States. Taking a comparative approach, it highlights some of the similarities and key differences in the factors driving its support and in its impact on political systems and immigration policymaking. "It is striking," the author notes, "that the United States-a country without a dedicated populist radical-right party-has under the Trump administration seen the implementation of immigration policies more strongly inspired by this ideology than many enacted in Europe." In many countries, more established political actors have attempted (with often limited success) to curb support for populist radical-right opponents, whether by banding together to exclude them from government or co-opting elements of their platforms. Other strategies centered around addressing the economic and social concerns that underpin this support, this analysis concludes, may prove more effective.

Details: Washington, DC: Transatlantic Council on Immigration, 2018. 33p.

Source: Internet Resource: Accessed August 16, 2018 at: https://www.migrationpolicy.org/research/radical-right-immigration-europe-united-states

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 151149


Author: Financial Action Task Force

Title: Professional Money Laundering

Summary: Professional money launderers are individuals, organisations or networks who, for a fee, help criminals launder the proceeds of crime. This report looks at the techniques and tools used by professional money launderers, to help countries identify and dismantle them. The FATF's fourth round of assessments has revealed that many countries are not sufficiently investigating and prosecuting complex and third party money laundering. This report identifies the key characteristics of the individual professional money launderer, the professional money laundering organisation and the professional money laundering network of associates and contacts that work together to facilitate money laundering. The report also identifies the various roles and functions that are necessary to operate a professional money laundering 'business'. Using the case studies collected, it identifies a range of different money laundering organisations and networks, from money transport and cash controller networks to proxy networks. Professional money launderers use a variety of money laundering tools and techniques such as trade-based money laundering, account management mechanisms and underground banking and alternative banking platforms. To lend a veneer of legitimacy to their activities, professional money launderers may work with corrupt individual(s) who specialise in the provision of otherwise legitimate services (e.g. bankers, lawyers, accountants) in addition to their criminal money laundering activity. Professional money launderers often work for more than one criminal or criminal organisation. A successful prosecution of a professional money launderer can therefore potentially impact the activity of a number of criminal clients. This report helps authorities understand how professional money launderers operate so that they can successfully target, prosecute and dismantle those who help make crime pay.

Details: Paris: FATF, 2018. 53p.

Source: Internet Resource: Accessed August 16, 2018 at: http://www.fatf-gafi.org/publications/methodsandtrends/documents/professional-money-laundering.html

Year: 2018

Country: International

Keywords: Financial Crimes

Shelf Number: 151151


Author: Anders, Holger

Title: Monitoring Illicit Arms Flows: The Role of UN Peacekeeping Operations

Summary: The illicit flow of arms and ammunition contributes to destabilizing countries in which UN PKOs operate. Understanding such flows is a prerequisite for effective countermeasures. UN PKOs are uniquely placed to assist in the identification and monitoring of these flows; in some cases, PKOs also have legal obligations to take certain actions to counter diversion. At the same time, few PKOs take advantage of their potential capacity to monitor illicit arms flows. This appears to be mainly due to a lack of awareness and understanding of the requirements of PKOs. In turn, this leaves unused an important tool that is available for identifying and eventually countering illicit arms flows. This Briefing Paper first looks at the mandates of UN PKOs and at why missions and the troop- and police-contributing countries (TCCs and PCCs) that take part in them can make a significant contribution to the monitoring of illicit arms flows. The paper then highlights the relevant experiences of two UN PKOs with extensive experience in this field: Coote d'Ivoire and Mali. It concludes with a discussion of lessons learned and challenges faced.

Details: Small Arms Survey, 2018.

Source: Internet Resource: Briefing Paper: Accessed August 22, 2018 at: http://www.smallarmssurvey.org/fileadmin/docs/T-Briefing-Papers/SANA-BP-Monitoring-Illicit-Arms-Flows-PKOs.pdf

Year: 2018

Country: International

Keywords: Illicit Weapons

Shelf Number: 151237


Author: Wingard, James R.

Title: Catch Me If You Can: Legal Challenges to illicit wildlife trafficking over the internet

Summary: Although illicit internet trade falls into the larger universe of cybercrime, it is better described as a cyber-enabled crime - in other words, a traditional crime that uses new technologies with the traditional part being the illegal capture of wildlife and the associated physical forms of trade. In addition to the many legal and enforcement challenges associated with conventional wildlife crimes, internet-based illegal wildlife trade (IWT) poses another set of problems for officials, forcing them to operate in a trans-jurisdictional, virtual space that they, and the law, are largely unprepared to manage. On the practical side, they face substantial difficulties merely distinguishing legal from illegal trade, including: - knowing which species are involved and which countries' laws apply to the activity in question (e.g. advertising, sale and purchase, arrangement of logistics); - determining trade quantities and making decisions on whether to invest resources in the pursuit of crimes; and - knowing which specific legal basis may apply to the species being traded. In terms of their legal authorities and practices, officials also confront further problems, in that they may have no specific power to carry out covert investigations; no, or limited, access to cybercrime units; and no, or limited, experience with cybercrime laws and digital forensics to conduct necessary investigations. Concerning the legal frameworks directed at illicit wildlife trade, they face: - criminal and related laws that do not adequately address all parts of the digital trade chain by expressly criminalizing the advertising of illicit wildlife trade or related offences; - differing investigative authorities between jurisdictions that compromise transnational enforcement efforts; and - inconsistent regulation of and limitations to subject matter and personal jurisdiction that create 'digital safe havens' and prevent prosecutions. Taken as a whole, the overall ability of enforcement authorities to adequately identify, investigate and prosecute the advertising of illicit wildlife on the internet is severely compromised. Key efforts to improve this situation have been included in the conclusion and recommendations to this brief.

Details: Geneva, SWIT: Global Initiative Against Transnational Organized Crime, 2018. 31p.

Source: Internet Resource: Accessed August 23, 2018 at: http://globalinitiative.net/wp-content/uploads/2018/07/Wingard-and-Pascual-Digital-Dangers-Catch-me-if-you-can-July-2018.pdf

Year: 2018

Country: International

Keywords: Computer Crime

Shelf Number: 151245


Author: Family for Every Child

Title: Caring for Boys Affected by Sexual Violence

Summary: Sexual violence affects boys and girls. However interventions, public attention and donor investments fail to aptly address the experiences of boys. Family for Every Child examined this critical issue of sexual violence affecting boys through its global scoping study, Caring for Boys Affected by Sexual Violence. This study explores both sexual abuse experienced by boys, including sexual exploitation, as well as harmful sexual behaviour of boys; referred to collectively as sexual violence. The scoping study indicates that socio-cultural norms related to childhood, gender, masculinity and sexuality perpetuate sexual violence affecting boys, increase the vulnerability of boys to sexual violence, and contribute to under reporting. This study suggests that a multi-layered prevention and response strategy is needed to reduce vulnerabilities and risk factors, identify boys who are at greater risk, such as those without adult care, and address those risk factors early on, as well as to intervene when sexual violence occurs. This requires further exploration through research and well evaluated pilot interventions. This study highlights the need for donors, policy-makers, researchers, programmers and practitioners to consider how stereotypes around masculinity have affected resource allocation, programming priorities and targeting when it comes to strategies to prevent and respond to sexual violence. Caring for Boys Affected by Sexual Violence is in initial scoping study by Family for Every Child. The second stage of this project involves action research with children and families to gain in-depth understanding of how social norms around gender and masculinity influence sexual abuse experienced by boys and harmful sexual behaviour of boys, and what interventions are needed. This will inform the development of services and tools for boys that address their specific needs.

Details: London: Family for Every Child, 2018. 55p.

Source: Internet Resource: Accessed August 24, 2018 at: https://familyforeverychild.org/report/caring-for-boys-affected-by-sexual-violence/

Year: 2018

Country: International

Keywords: Child Protection

Shelf Number: 151252


Author: Thijs, Fabienne

Title: Literature research into the effects of using ex-prisoners as 'role models': Summary

Summary: In this report, we present the results of a study that was aimed at investigating the potential effects of using ex-prisoners or other 'negative role models' in educational and prevention programmes for young people. Both within and outside of the Netherlands, educational and prevention programmes are regularly conducted in which ex-offenders are used to inform young people and school students about the dangers and consequences of problematic behaviour and crime. Such a method in the Netherlands is the educational programme youth (EPJO), that provided almost 200 lessons at schools in Amsterdam and The Hague in the past school year. The effect on young people of using ex-offenders in programmes such as EPJO is unclear. Therefore, the aim of the current study was to examine to what extent educational and prevention programmes for young people, in which ex-prisoners or others who have been in contact with the judiciary system ('negative role models'), are effective in preventing or reducing delinquent behaviour. Research questions The central research questions were formulated as follows: 1) What is known about the effects of using ex-prisoners and other 'negative role models' in prevention and educational programmes for young people? 2) Which theories and/or models are applicable to a potential (positive or negative) impact of using ex-prisoners and other negative role models? If we were able to find enough relevant and adequate empirical studies for the first research question, we would try to answer the following additional questions: a) What is known about the effect of using ex-prisoners and other negative role models on later involvement in delinquent behaviour and on attitudes about delinquent behaviour? b) What is known about the effect on knowledge and insight into the lives and experiences of ex-prisoners and on attitudes towards ex-prisoners and other negative role models? c) Is there something known about the significance of implementation modalities (such as intensity and content of the programme, type of negative role model)? d) Is there something known about the role of age of the recipients of the programme? e) Is there something known about differences between short-term effects (directly after the programme) and long-term effects (about one to several years)? In addition, we were also interested in the following themes: f) The impact of the interventions on attitudes towards police and authority figures; g) Possible effects (positive or negative) for the role models themselves; h) Whether the interventions and/or studies are motivated by a specific theory (assumed processes or causes); I) Whether interventions may have more or less impact on vulnerable or at-risk youths; j) Whether something is known about the effects on different forms of delinquent behaviour; k) Whether the programme descriptions include information about why an ex-prisoner would have an effect

Details: Amsterdam: Netherlands Institute for the Study of Crime and Law Enforcement (NSCR), 2018.

Source: Internet Resource: Accessed August 24, 2018 at: https://english.wodc.nl/binaries/2906_summary_tcm29-340928.pdf (full text only available in Dutch)

Year: 2018

Country: International

Keywords: At-Risk Youth

Shelf Number: 151254


Author: Asghar, Khudejha

Title: Preventing Household Violence: Promising Strategies for Humanitarian Settings

Summary: Violence against women (VAW) and violence against children (VAC) are both global epidemics with prolonged impact on the health, well-being, and safety of both individuals and communities. The epidemics are also intimately interconnected, as VAW and VAC tend to co-occur within the same homes and exposure to VAC predicts VAW in adulthood. Yet despite a growing body of evidence indicating alarming levels of both VAW and VAC in emergencies, most interventions to address these issues have been fragmented across the gender-based violence (GBV) and child protection (CP) sectors. The goal of this review was to use a holistic lens to examine the landscape of interventions that have been used in humanitarian contexts and that may have applicability to primary prevention of any form of interpersonal household violence, including VAW, VAC or both. A combination of electronic database searches, published or publicly available reviews of violence prevention interventions, and communication with practitioners in the field was employed to identify interventions that met this criteria.

Details: Alliance for Child Protection in Humanitarian Action, CPC Learning Network; Unicef, USAID, 2017. 96p.

Source: Internet Resource: Accessed August 27, 2018 at: http://www.cpcnetwork.org/wp-content/uploads/2017/02/Landscaping-review-Final-Jan-2017.pdf

Year: 2017

Country: International

Keywords: Domestic Violence

Shelf Number: 151263


Author: Horsley, Rupert

Title: Cut the Purse Strings: Targeting the online illegal wildlife trade through digital payment systems

Summary: There has been startling growth in the online illegal wildlife trade (IWT), and broad recognition of the need to apply financial and anti-money-laundering tools to the fight against environmental crime. Much illicit trade carried out over the internet requires some form of electronic payment. This paper explores how various payment methods are used in the online IWT, and the challenges and opportunities these present to law enforcement. Some inroads have been made into combating the online counterfeit trade by suppressing activities of 'rogue' digital payment providers that facilitate illicit trade. Opportunities to target the online IWT by monitoring digital payment transactions will emerge only if regulatory systems and technology keep pace with levels of innovation used by illegal wildlife traders to avoid detection. Key points - The dynamic growth and fractured nature of online payment systems present considerable challenges to law enforcement and regulators across all sectors. - The online IWT varies across region and product type. Traders have been found to make use of various payment methods, at least in part reflecting concerns about privacy and security. These include e-wallets or payment intermediaries and direct deposits. Card payment systems, traditionally the dominant force in digital payments, are also likely to be used. - Reflecting broader regional trends, researchers have identified the use of e-wallets, such as WeChat Pay, in the online IWT in China and other Asian countries. Until recently, e-wallet payments have been somewhat opaque in China. However, the creation of a new clearing house for all non-bank intermediaries in the country may offer opportunities for collaboration in the bid to deny traders the use of such payment services. Models for this exist in the fight against the online counterfeit trade. - There has been no significant uptake of crypto currencies in the online IWT. There is also limited evidence that cash on delivery or mobile money is being used to any great extent. - Attention should be paid to developments in online payment system technologies and the efforts of regulators to keep up with these, particularly in Asian markets such as China and Malaysia, where innovation is most concentrated. As new regulations are adopted, opportunities to deny online traders the use of payment services are likely to emerge.

Details: Geneva, SWIT: Global Initiative Against Transnational Organized Crime, 2018. 20p.

Source: Internet Resource: accessed August 27, 2018 at: http://globalinitiative.net/wp-content/uploads/2018/06/TGIATOC-Purse-Strings-Report-.pdf

Year: 2018

Country: International

Keywords: Computer Crime

Shelf Number: 151273


Author: Milton, Daniel

Title: Pulling Back the Curtain: An Inside Look at the Islamic State’s Media Organization

Summary: As he spoke, the visual behind him was supposed to remind the audience, in part, of the lengths to which the Islamic State's enemies would go to prevent the group from spreading its message to a larger audience. The image behind the speaker was a mangled metal frame and other debris, the remains of what had been an Islamic State media kiosk. The messenger was John Cantlie, a British journalist who had been captured by the Islamic State nearly four years earlier in November 2012. His words were an attempt to drive the visual image home: "The kiosks are used to distribute pamphlets and information regarding the Islamic State and serve to expose some of the lies and propaganda the Western media continues to peddle in their never-ending mission to tarnish the image of the Islamic State." What goes unsaid is that the Islamic State's effort to "distribute pamphlets and information" is not just a benign messaging campaign. Instead, it is a highly choreographed influence campaign in which the group has invested significant institutional effort. While the results of the Islamic State's media eforts have received a significant amount of attention from governments, scholars, and analysts, most of these research eforts have been based on the group's end products: videos, picture reports, texts, and magazines. This is of necessity, as information or documents based on the group’s internal media policies and procedures have been difficult to find. However, captured enemy material obtained by the U.S. Department of Defense in operations targeting senior Islamic State Khurasan personnel in Afghanistan and provided to the Combating Terrorism Center (CTC) provides a look inside the group's media operations. This examination comes through the lens of a number of memos and documents that communicate instructions from the Islamic State's Diwan of Central Media (central media organization in charge of the group's media operations) to those charged with coordinating the group's media efforts in Afghanistan. It is important to note that although the materials used here came from Afghanistan, they do not appear to be specific to the Islamic State's Khurasan media bureau, which is responsible for the group's media productions in Afghanistan-Pakistan. There are no specific references in any of these documents to issues unique to Afghanistan. Instead, despite the fact that the Department of Defense obtained them in Afghanistan, they appear to be the general training materials that the Diwan of Central Media provided to media bureaus across all the Islamic State's provinces (wilayat). Indeed, the fact that most of these documents were recovered during an operation targeting a senior Islamic State-Khurasan media official increases their value and supports the assumption that these documents were actively being utilized to shape the group's media operations. Another important issue related to these documents is the timeframe that they cover. The documents themselves were obtained by the Department of Defense between 2016 and 2017. However, this date provides little evidence about when these documents were created. Unfortunately, it is impossible to state the date of authorship for most of these documents with any level of certainty. Indeed, there are only three date reference points in the entire set of documents. The first is in a document titled "Information Security." This particular document carries a specific date, Muharram 1437, or October-November 2015. The other documents do not actually carry a date, but instead we can assess the date based on the items referenced in the document. One of these documents, "Top Ten Releases Month of Rajab," references various Islamic State videos that were released in May 2016. These 10 videos are among the 34 videos evaluated in spreadsheet format in another document, "A Table of the Statistics for the video releases." Although it may be tempting to use these two specific dates as the bookends for the likely time of authorship for the other documents, there is no way to be sure of the origin date for most the other documents. The CTC is committed to continuing to search out unique sources of data to provide insight into the workings of terrorist organizations and, when possible, making them available to the broader research community, which will undoubtedly add its own insights and continue to enhance our collective understanding. To further this end, all of the documents (both the original Arabic as well as English translations) referred to in this report are being released on the CTC's website at ctc.usma.edu. These 13 documents provide interesting and important insights on four main topics regarding the Islamic State's media organization. The first insight is that these documents offer, for the first time, a conclusive link between the Islamic State's central media bureau and Amaq News Agency. More specifically, these documents show that the central media bureau considered Amaq to be on par with other previously recognized central media entities such as Al-Naba and Al-Bayan. Furthermore, the Islamic State's Diwan of Central Media encouraged local media bureaus to send content to Amaq, going so far as to make cooperation with Amaq a part of each local media bureau’s monthly evaluation. The second is that these documents show the emphasis the organization placed on producing different types of products in order to convey a broader narrative about the caliphate. Although examining the group's propaganda products after they have been released demonstrates this as well, the level of detail and efort put in by the group to this end, as highlighted by these documents, is more expansive than previously acknowledged. Third, these documents show very clearly how the Diwan of Central Media created rules, evaluations, and internal memos that were designed to strengthen the centralization of the group's media bureaucracy, solidifying the central media organization's control over what and how the local media bureaus carried on their propaganda work. This finding runs counter to some discussion on decentralization as one of the main reasons for the success of the group's media operations. There certainly is an element of decentralization to the group's online activities, but these documents show there is a limit to the group's willingness to decentralize in the media realm. Indeed, in a document titled "General Guidance and Instructions," we find the following counsel: "We also advise the brothers to avoid innovation because it is mostly the main cause of mistakes." Finally, the documents show that the Islamic State's media organization exercises self-awareness in terms of its potential vulnerability. Indeed, the documents provide several insights into how the media side of the organization recognized that its role in promoting the group meant that the media components of the group would be in possession of information that could result in harm if it were known or otherwise obtained by the enemy. This led the group to focus on the importance of information security among media operatives. The Islamic State's efforts in each of these four areas provide a more detailed understanding not only of how the group organized and implemented its media strategy, but also how a militant organization was able to capture the world's attention using the art of propaganda. This report proceeds by examining each of these four areas in turn.

Details: West Point, NY: Combating Terrorism Center at West Point, 2018. 28p.

Source: Internet Resource: Accessed August 29, 2018 at: https://ctc.usma.edu/app/uploads/2018/08/Pulling-Back-the-Curtain.pdf

Year: 2018

Country: International

Keywords: ISIS

Shelf Number: 151276


Author: United Nations Trust Fund to End Violence Against Women

Title: Engaging Men to Prevent Gender-Based Violence: A Multi-Country Intervention and Impact Evaluation Study

Summary: Over three years Instituto Promundo, with support from the United Nations Trust Fund to End Violence Against Women, implemented a multi-country project to engage men and boys in preventing violence against women and promote gender equality. Project activities in each country varied but all included educational workshops with men and young men on gender equity and training programs with partner staff on evidence-based methodologies for the prevention of violence against women. The project deliberately sought to test and evaluate an array of interventions to engage young and adult men in GBV prevention, namely: 1 A community-based intervention (India); 2 A sports-based intervention (Brazil); 3 A health-sector-based intervention (Chile), and; 4 A work-place-based intervention (Rwanda). The interventions in three of the four settings – Chile, Brazil and India – were subject to a quasi-experimental impact evaluation. In all three settings, there was a statistically signi!cant change in attitudes correlated with use of violence against women, and a statistically signi!cant selfreported decrease in use of violence against female partners (in the previous three months). Qualitative results further af!rmed that the group education and campaign activities used in each site led to increased discussion by young and adult men about gender equality and decreased support for attitudes that encourage men's use of intimate partner violence. Limitations of the data include the lack of randomization (although there were control groups in similar communities in India and Brazil), and the lack of women's reports (with the exception of India). In India, through youth groups, advocacy campaigns and community outreach more than 1500 men and youth were educated on the consequences of gender-based violence and prevention tools. Themes of masculinity, gender, violence against women and sexuality were central to the efforts. As a result of workshops, men self-reported doing their own washing and participating more equally in household responsibilities and boys self-reported advocating for their sisters' right to an education. Participants developed individual plans to address the prevalence of violence against women in their own lives. Additionally, the group as a whole devised community education plans for their villages to educate their neighbors on these issues. In Brazil, workshops and campaigns aimed to increase awareness about inequitable gender norms and the consequences of violence against women amongst adult and young men. Additionally, a football (soccer) tournament was held amongst participants to bring the messages of the workshops to the communities at a more informal and social level and to encourage higher participation by men in the activities. Results show a change in attitudes among men in the intervention community and in the control community (where "contamination" inadvertently occurred through a football club organizer.) Ninety-two percent of participants in the soccer tournament said that they spoke about the themes of the campaigns with others. The project received the region Nike/Change Makers prize for the competition "Changing Lives Through Football" for its use of sports in mobilizing men and boys to address violence against women. In Chile, CulturaSalud conducted educational workshops for 260 young men via the public health sector and in public schools on the prevention of violence against women, alternatives to violence and gender equity. More than 90 percent of participants strongly agreed that the topics covered in the workshops were important and interesting and all agreed that the people in charge of the workshops had a good handle of the issues. Following the workshops participants increased their use of condoms, increased their knowledge of different forms of violence, and were more likely to reject violence against women. In Rwanda, the Rwandan Men's Resource Center (RWAMREC) worked with three local coffee cooperatives to conduct gender-based violence prevention trainings. The trainings served a dual purpose: when men and women worked alongside each other through the cooperatives they were educated on how to prevent gender-based violence and promote healthy families while also increasing coffee production and related incomes. Following the trainings, there was a reported increase in the questioning of gender-based violence by men, as well as a decrease in the number of gender-based violence cases and more equitable division of labor. Results in Rwanda are informal and not backed up by a control group nor systematized pre- and post-test results.

Details: Washington, DC: PROMUNDO, 2018(?).

Source: Internet Resource: Accessed August 30, 2018 at: http://www.ncdsv.org/images/IP_EngagingMenToPreventGBVMulticountryInterventionImpactStudy_2012.pdf

Year: 2018

Country: International

Keywords: Abusive Men

Shelf Number: 151316


Author: Schmid, Alex P.

Title: Revisiting the Relationship between International Terrorism and Transnational Organised Crime 22 Years Later

Summary: The Research Paper opens with a conceptual discussion about definitions of 'organised crime/groups' (OCGs) and 'terrorism/terrorist groups (TGs)'. It distinguishes between four types/levels of 'links' between OCGs and TGs and identifies two special types of violent hybrid organisations. It first summarises the main findings of a background report on the links between transnational organised crime groups and international terrorist groups, prepared by the author for the UN Crime Commission in the mid-1990s. After presenting key aspects of transnational OCGs and TGs in the 1990s, and comparing some of the features noted then to the situation today, the paper elaborates key differences and similarities between these two types of organisations. In the mid-1990s, transnational organised crime groups and terrorist organisations were decidedly distinct, linked in some ways but separated in more important other ways. Today the situations has evolved as there are new features not prominent in 1996. Looking at the present situation, the paper notes that recruiters of OCGs and TGs in Western diasporas increasingly fish in the same pool of mainly ethnic youth gangs and petty criminals. Another novelty is the role of prisons where convicted terrorists have successfully radicalised common petty criminals and members of OCGs. The report also draws attention to the situation in Sub-Saharan Africa where some smuggling and trafficking networks and jihadist networks have assumed a hybrid character. The criminalisation of some states and the involvement of government officials in organised crime or in supporting terrorism is also addressed. Concluding, the Research Paper notes an increase in both organised crime and terrorism since the mid-1990s but sees the main cause for this not so much in greater and deeper links between terrorist and organised crime groups but in the development of in-house capabilities of organised crime methods by TGs and terrorist tactics by OCGs and - more importantly - in changes in their operational environments due to, inter alia, globalisation and the role of the Internet. While the links between TGs and OCGs are a matter of serious concern for the international community, the far greater problem is that increasingly past and present political power holders are involved as third parties, whereby state facilities (e.g. diplomatic channels) are used as vehicles and cover for violent and predatory crimes across international borders. The paper also features an extensive, up-to-date bibliography on the nexus between international terrorism and transnational organised crime.

Details: The Hague: The International Centre for Counter-Terrorism, 2018. 40p.

Source: Internet Resource: ICCT Research paper: Accessed August 31, 2018 at: https://icct.nl/wp-content/uploads/2018/08/ICCT-Schmid-International-Terrorism-Organised-Crime-August2018.pdf

Year: 2018

Country: International

Keywords: Criminal Networks

Shelf Number: 151320


Author: Nemr, Christina

Title: It Takes A Village: An Action Agenda on the Role of Civil Society in the Rehabilitation and Reintegration of Those Associated With and Affected by Violent Extremism

Summary: This report examines the role of civil society organisation (CSOs) in the rehabilitation and reintegration of those associated with and affected by violent extremism. It builds on the work conducted by ICCT and the Global Center on Cooperative Security, together with four subregional partners over the past two-and-a-half years in Africa and South-East Asia. The project aimed to first understand how CSOs work within their communities and with their governments to support the rehabilitation and reintegration of violent extremist offenders, victims of violence, and affected communities. It then supported the work of select CSOs by facilitating small grants to bolster existing efforts or pilot innovative approaches. The findings and lessons learned from the project have culminated in the development of this action agenda, which provides policy and programmatic recommendations for stakeholders working on rehabilitation and reintegration and the role of CSOs in supporting that process. The project focused on three regions: the Sahel (Burkina Faso, Cameroon, Chad, Mali, Mauritania, Niger, Nigeria, and Senegal); the Greater Horn of Africa (Djibouti, Ethiopia, Kenya, Somalia, Tanzania, and Uganda); and Southeast Asia (Indonesia, Malaysia, and the Philippines). While each region has its own rich experiences and unique challenges, there are overarching lessons that emerged-lessons that are applicable to a variety of rehabilitation and reintegration contexts. The action agenda therefore is not divided by region but, rather, by themes and the audiences to whom the recommendations are directed. Overall, the report consists of six guiding principles and 10 recommendations targeted to a range of audiences. Each guiding principle and recommendation is followed by examples that illustrate the ways a recommendation has been put into practice or offer suggestions for implementing a given recommendation.

Details: Washington, DC: Global Center on Cooperative Security, 2018. 53p.

Source: Internet Resource: Accessed August 31, 2018 at: https://icct.nl/wp-content/uploads/2018/08/GC_It-Takes-a-Village_WEB.pdf

Year: 2018

Country: International

Keywords: Counter-Terrorism

Shelf Number: 151328


Author: Aguilar, Sofia

Title: Medicinal Cannabis Policies and Practices Around the World

Summary: Although cannabis remains a prohibited substance worldwide, in recent decades a series of political, legislative and judicial processes in various parts of the world have given rise to various forms of legal regulatory regimes for the medical and therapeutic use of the plant. This trend seems to be consolidating in the Americas, in particular in Latin America and the Caribbean, where the largest number of available experiences is concentrated, and where the regulatory changes are occurring successively, in a sort of domino effect. Although this progress is not exclusive to Latin America, and is still far from being a won battle, there is a clear shift in the global drug policy debate, particularly on cannabis. A variety of factors played a role here, including the growing availability of scientific evidence, the inability of the international drug control regime to accommodate and respond appropriately to new evidence, the emergence of a new public health paradigm in the area of drugs, the adoption of alternative policies at local level - sometimes at the expense of the international legal framework - and the growing perception that the costs of the 'war on drugs' far outweigh its benefits. Unfortunately, and despite the growing number of regulatory experiences, the world has not yet reached a consensus on how to proceed, and continues to resist any possibility of activating the legal and institutional mechanisms within the scope of the United Nations to adapt the current treaty framework to this new situation. The United Nations General Assembly Special Session (UNGASS) on the ‘world drug problem’ in 2016 was the clearest example of the reluctance to openly discuss cannabis and its regulation.5 Although it occurred at a historic moment - when the legalisation of medicinal cannabis was already a reality in 16 countries (or 40 jurisdictions if US states are counted individually) – the Outcome Document of the global summit6 made no mention of the issue, or even acknowledge its existence. It is in the midst of this contradiction that the legal regulation of medicinal cannabis is currently moving ahead. However, as with all innovative approaches, major obstacles remain in terms of its acceptance and of the restrictions imposed by the rigid international legal framework. Indeed, although medicinal cannabis per se is not prohibited under the UN drug control conventions, the inclusion of the substance in Schedule IV of the 1961 Single Convention on Narcotic Drugs restricts medical research and strict rules must be followed to allow the medicinal and scientific use of the substance. The lack of internationally sanctioned scientific consensus on medicinal cannabis is also a major issue, with no standardised or consistent products being used worldwide. These and additional factors which will be described in this paper have resulted in wide-ranging policies, requiring a certain degree of compromise (when done at the sub-national level, for example), and governed by a diversity of norms and institutions. Inevitably, the scope and impact of these policies vary greatly. As will be discussed below, all experiences are different, and no international or regional standards currently exist. While the regulation of medicinal cannabis in Uruguay resulted from government policy and coexists with licit recreational use in a clear effort to improve public health, in countries like Argentina, Brazil and Mexico, timid legislative reforms responded to citizen initiatives which, for lack of political support, only managed to open the minimum space necessary to comply with court orders and allow the importation of pharmacological preparations produced abroad. Meanwhile, North America is silently consolidating industrial-commercial models of regulation. Although not immune to political backlash and court decisions, Canada and the United States are now at the vanguard of scientific innovation, while also meeting clear revenue-collection goals, and providing a solid basis to expand recreational and industrial systems. This report precisely highlights this diversity of experiences, approaches and directions. The purpose of this analysis is to enhance our understanding of the current state of reforms and the lessons to be learned from them. Although the authors have done their utmost to gather as much information as possible, this paper does not claim to be comprehensive review but rather a selection of key models of medicinal cannabis being developed around the world as of March 2018. Based on the findings, we offer general recommendations, in an effort to improve public policies in areas where legislation has already changed, and inform decision-making processes in countries where reform is still pending.

Details: London: International Drug Policy Consortium, 2018. 32p.

Source: Internet Resource: Accessed September 7, 2018 at https://idpc.net/publications/2018/04/medicinal-cannabis-policies-and-practices-around-the-world

Year: 2018

Country: International

Keywords: Drug Legalization

Shelf Number: 151427


Author: Sustainalytics

Title: Forced Labor Action Compared: Findings from Three Sectors

Summary: Forced labor is a risk for all large global companies. As public awareness of forced labor in supply chains has grown, regulations requiring companies to take action have continued to emerge-businesses are being held to higher transparency and legal standards. Simply put, corporations across all sectors can no longer afford to ignore this issue. Recognizing that benchmarks can play a powerful role in encouraging companies to uphold labor standards, in 2016 KnowTheChain benchmarked 60 large global companies from three high-risk sectors (information and communications technology, food & beverage, and apparel & footwear) on the transparency of their efforts to eradicate forced labor from their global supply chains. With a combined market capitalization of more than US $4 trillion, the companies analyzed by KnowTheChain represent some of the largest companies in the world. These companies were evaluated in seven categories and received a score out of 100 possible points. Key findings across the three sectors include: - Average sector scores were below 50/100, indicating significant room for improvement across sectors. - Shockingly, there was one company in each sector that received a score of 0/100 (Belle International, Monster Beverage, Keyence), indicating a concerning lack of action. - Apparel companies tend to be more advanced, while food & beverage companies are lagging behind. This is reflective of the level of media attention and civil society pressure companies in each of the sectors have received. - Companies tend to be more advanced in developing supply chain commitments and monitoring the labor performance of first-tier suppliers. - Companies are taking limited steps to address the exploitation of migrant workers by recruitment agencies. However, it is encouraging that a number of companies across sectors have joined the Leadership Group for Responsible Recruitment (thus committing to the “Employer Pays” Principle) and that some industry associations are starting to take action. - Two areas with limited progress are engagement with supply chain workers and providing remedy for workers whose rights are violated. These areas both lack attention from companies as well as from business and multi-stakeholder associations. The primary goal of this report is to highlight the cross-sector findings that can benefit companies regardless of their industry. The report concludes with recommendations and good practice examples for companies, business and multi-stakeholder associations, and investors to consider as a path forward.

Details: San Francisco, CA: 2018. 34p.

Source: Internet Resource: Accessed September 7, 2018 at: https://knowthechain.org/wp-content/uploads/KTC_CrossSectoralFindings_Final.pdf

Year: 2017

Country: International

Keywords: Corporations

Shelf Number: 151435


Author: Haysom, Simone

Title: Digitally Enhanced Responses: New Horizons for Combating On-line Illegal Wildlife Trade

Summary: During the first decade of the 2000s, conservation NGOs began to identify the internet as a unique enabler of the illegal trade in wildlife. As the quote above illustrates, the internet has been seen as a virtual marketplace with unparalleled and expansive ability to advertise to consumers in any part of the world, at any time of day. As such, it can not only reach existing buyers of wildlife products, but also create whole new markets. The internet was also seen as a platform that allowed sellers and buyers alike greater powers to hide their identity and evade detection from law enforcement, in part by facilitating private communication between suppliers, dealers, traders and consumers. In the intervening period, internet access has grown enormously and social-media platforms, with billions of users worldwide, have become incredibly powerful tools for communication. At the same time, the threat that the illegal wildlife trade (IWT) poses to endangered species has grown apace. In the same way that the illegal drugs market, as well as the trade in guns and people, has adapted to the opportunities offered by digital platforms, this shift has also manifested in the way the illicit wildlife trade has taken advantage of online marketing opportunities. This brief sets out to describe how our understanding of the problems posed by the online IWT, and our responses to it, have evolved. It measures the progress made in exposing the threat posed by the adoption of digital platforms by traders in endangered wildlife and raises questions about what we have not yet been able to understand, and why we need to. It looks at trends in the phenomenon and suggests what they mean for the next generation of efforts to address this issue. Lastly, it describes the most pressing issues on the online IWT agenda, and explains how the Global Initiative's new project, Digital Dangers: Disrupting Online IWT, aims to contribute to tackling the problem.

Details: Geneva, Switzerland: The Global Initiative Against Transnational Organized Crime, 2018. 18p.

Source: Internet Resource: Accessed September 8, 2018 at: http://globalinitiative.net/digitally-enhanced-responses/

Year: 2018

Country: International

Keywords: Cybercrime

Shelf Number: 151440


Author: Bahgat, Karim

Title: Urban Social Disorder: an Update

Summary: Unlike most other forms of violent conflict, the rate of urban social disorder events, such as demonstrations and riots, has increased steadily over recent decades. One reason for the diverging trends in political violence may be the demographic shift in the global population. The world is rapidly urbanizing, and the rural-urban migration is especially strong in the developing world, which has historically hosted the large majority of rural-based civil conflicts. Are we witnessing a transformation of violence, where conventional rebel conflicts in the countryside are gradually being replaced by less organized and less predictable forms of urban unrest? This paper presents an updated and expanded version of the PRIO Urban Social Disorder (USD) dataset, covering lethal as well as non-lethal disorder events for national capitals and other major cities across the developing world for all years, 1960–2014. This paper consists of four parts: (i) a description of the new dataset; (ii) a presentation of spatiotemporal trends and patterns in urban violence; (iii) a simple comparison of the USD data with alternative conflict event datasets; and (iv) a replication of an earlier study of urban population growth and social disorder, in order to assess whether past findings are likely to hold up with new data.

Details: Norway: Peace Research Institute Oslo, 2018. 24p.

Source: Internet Resource: Accessed September 8, 2018 at: https://www.prio.org/Publications/Publication/?x=10888

Year: 2018

Country: International

Keywords: Demonstrations

Shelf Number: 151443


Author: Ruiz-Benitez de Lugo, Lucia Bird

Title: Battling Human Trafficking: a Scrutiny of Private Sector Obligations under the Modern Slavery Act

Summary: Modern slavery is a global problem estimated to affect over 40 million people, 16 million of those in forced labour in the private sector. Forced labour in the private economy is estimated to generate $150 billion in illegal profits per year, with recent research finding that 71% of companies believe modern slavery is likely to be occurring in their supply chains. Multi-nationals from Nestle to Costco have faced class actions in US courts and, even where the case has been unsuccessful, suffered significant reputational damage. The private sector is being held to account for human rights violations in their supply chains in an unprecedented manner. The Transparency in Supply Chains clause (TSC) in the Modern Slavery Act 2015 (MSA), which firmly placed obligations on a significant cross-section of the private sector for mitigating the risk of human trafficking in their supply chains (HTSC), is the UK's landmark legislation effecting this shift of responsibility onto business. The MSA is groundbreaking legislation, and a number of other jurisdictions are already following suit. Consequently, an analysis of the MSA yields a clearer understanding of the current trend in global regulation of human trafficking in supply chains. The TSC requires companies falling within specified financial and geographic thresholds to publish an annual statement outlining the steps they have taken to mitigate the risk of HTSC (the "TSC Statement"). The aim of the TSC is to 'prevent modern slavery in organisations and their supply chains' by increasing the transparency and accountability of companies to both shareholders and consumers, thereby driving best practice in HTSC risk mitigation. The TSC came into force in 2015, and most companies falling within scope have been required to publish the first TSC Statement in 2017 to cover the 2016 fiscal year. This is consequently a key moment to take stock and analyse the efficacy of the TSC against its stated purpose, to assess compliance and review how the structure of the TSC requirement could be tweaked to enhance impact.

Details: Geneva, Switzerland: The Global Initiative Against Transnational Organized Crime, 2018. 36p.

Source: Internet Resource: Accessed September 8, 2018 at: http://globalinitiative.net/battling-human-trafficking-a-scrutiny-of-private-sector-obligations-under-the-modern-slavery-act/

Year: 2018

Country: International

Keywords: Forced Labor

Shelf Number: 151448


Author: Hudson Jones, Rhiannon

Title: Tools and Resources to Combat Illegal Wildlife Trade

Summary: The Illegal Wildlife Trade (IWT) has reached an unprecedented scale, in part due to increasing demand from consumers. It is widely recognized that this criminality threatens peace, security, livelihoods, and biodiversity. The illegal trafficking in protected fauna and flora generates significant profits. IWT occurs globally and involves a multitude of species both iconic and lesser known. The response to IWT is multifaceted. It involves multiple national actors and agencies, numerous intergovernmental organizations (IGO) and national and international nongovernmental organizations (NGO), across borders and jurisdictions. This report provides an overview of the key types of tools and resources available to officials in the criminal justice system for combating IWT, and provides examples of prominent tools and resources, where appropriate. It describes both publicly-available and restricted tools.

Details: Washington, DC: The World Bank Group, 2018. 38p.

Source: Internet Resource: Accessed September 9, 2018 at: http://documents.worldbank.org/curated/en/131671521451683536/Tools-and-resources-to-combat-illegal-wildlife-trade

Year: 2018

Country: International

Keywords: Environmental Crime

Shelf Number: 151455


Author: Rahman, Muhammad Faizal Bin Abdul

Title: Smart CCTVs for Secure Cities: Potentials and Challenges

Summary: The operating environment for law enforcement particularly in cities has grown more complex over the last decade. Security threats emanate from both traditional and non-traditional sources, emerging technologies give rise to new forms of crimes, and public demand for more agile responses make policing extremely challenging. Leveraging new technologies is one key way in which law enforcement has responded to these challenges. In particular, the integration of smart technologies with regular closed-circuit televisions (CCTVs), otherwise known as Smart CCTVs, is envisaged to help law enforcement improve situational awareness as well as obtain additional sources of data for analysis or investigation. Yet, not much has been written about this emerging technology. As such, this exploratory study aims to: (i) examine how Smart CCTVs can be used to enhance law enforcement capabilities; (ii) identify issues and challenges associated with that use; and (iii) examine approaches to mitigate such challenges. Upon examination, this study has found that Smart CCTVs can enhance law enforcement capabilities in four ways. They can: (i) act as a force multiplier; (ii) support police patrols; (iii); overcome human limitations; and (iv) support crisis and emergency management. As Smart CCTVs are powered by Artificial Intelligence (AI) and Machine Learning (ML), it is argued that they should not be regarded simply as tools for law enforcement, but rather as "partners". With that, the challenges associated with the use of Smart CCTV for law enforcement include: (i) cybersecurity issues; (ii) adaptive and resolute adversaries; (iii) operational surprises; and (iv) an overreliance on the technology. As such, approaches to mitigate these challenges include: (i) a multi-pronged cybersecurity strategy that focuses on resilience rather than deterrence; (ii) empowering law enforcement officers with new skill sets; (iii) experimenting with plausible security scenarios to optimally integrate the use of Smart CCTVs into patrol operations, investigations and intelligence; (iv) ensuring that the adoption of technology is done in tandem with community partnership; and (v) deepening partnership with the private sector in terms of both regular CCTV and Smart CCTV surveillance.

Details: Singapore: S. Rajaratnam School of International Studies, 2017. 42p.

Source: Internet Resource: Accessed September 9, 2018 at:http://www.css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/RSIS-Smart%20CCTVs%20for%20Secure%20Cities,%20Potential%20and%20Challenges.pdf

Year: 2017

Country: International

Keywords: Closed Circuit Televisions

Shelf Number: 151458


Author: Atkinson, Colin

Title: A Systematic Review of the Effectiveness of Asset-Focussed Interventions Against Organised Crime

Summary: Asset-focussed interventions (AFIs) against organised crime are measures that target assets and finance deriving from crime or intended for use in a crime. They seek to deplete organised criminal finance and so reduce organised crime. This systematic review set out to conduct two types of analysis: a meta-analysis of the 'effect size' of asset focused interventions against organised crime; and a realist synthesis of the theory and knowledge around these types of interventions, using the EMMIE framework. In the absence of quantitative outcome evidence to measure effect, the review focuses on discussion of the other elements of the EMMIE framework. Alongside the full review, a narrative summary of the work is published here, along with a research protocol which was produced at the start of the work, setting out our approach to methodology. Asset-focussed interventions (AFIs) against organised crime are measures that target assets and finance deriving from crime or intended for use in a crime. They seek to deplete organised criminal finance and so reduce organised crime.

Details: Glasgow: Scottish Centre for Crime and Justice Research, University of Glasgow, 2017. 67p.

Source: Internet Resource: What Works: Crime Reduction Systematic Review Series, 9: Accessed September 13, 2018 at: http://whatworks.college.police.uk/Research/Systematic_Review_Series/Documents/Organised_crime_SR.pdf

Year: 2017

Country: International

Keywords: Asset Forfeiture

Shelf Number: 151520


Author: Gavira, Simon

Title: Invisible Walls: Measuring the Impact of Organized Violence on Urban Expansion

Summary: In this paper, we examine the relationship between density and organized violence. Security for most of human history has been one of the determinant factors for city development and growth; this remains true today. What is new, and the focus of this paper, is that the prevalence of organized violence increases the density of adjacent areas. Throughout history, those fleeing organized violence have sought refuge in cities or neighboring towns that provided “pockets of safety” or a measure of “relative security.” We first observed this phenomenon in Colombia when we found that after decades of organized conflict between guerilla groups and the Colombian national government, its cities were denser than neighboring cities. Drawing on data from the Uppsala Conflict Data Program, we found that in a representative sample of 200 global cities, cities with frequent organized violence were significantly denser as well. We conclude that organized violence creates an invisible wall that contains the outward expansion of cities adjacent to organized conflict.

Details: New York, 2018. 37p.

Source: Internet Resource: Accessed September 14, 2018 at: http://marroninstitute.nyu.edu/working-papers/invisible-walls

Year: 2018

Country: International

Keywords: Organized Violence

Shelf Number: 151530


Author: Crino, Rosario

Title: Fighting Mobile Crime

Summary: We develop a model in which two countries choose their enforcement levels non- cooperatively, in order to deter native and foreign individuals from committing crime in their territory. We assume that crime is mobile, both ex ante (migration) and ex post (fleeing), and that criminals who hide abroad after having committed a crime in a country must be extradited back. We show that, when extradition is not too costly, countries over-invest in enforcement compared to the cooperative outcome: insourcing foreign criminals is more costly than paying the extradition cost. By contrast, when extradition is sufficiently costly, a large enforcement may induce criminals to flee the country in which they have perpetrated a crime. Surprisingly, the fear of extraditing criminals enables countries to coordinate on the e¢ cient (cooperative) outcome.

Details: Naples, Italy: Centre for Studies in Economics and Finance (CSEF), University of Naples, 2018. 31p.

Source: Internet Resource: CSEF Working Paper no. 504: Accessed September 18, 2018 at: http://www.csef.it/WP/wp504.pdf

Year: 2018

Country: International

Keywords: Extradition

Shelf Number: 151568


Author: Dell, Gillian

Title: Exporting Corruption: Progress report 2018: assessing enforcement of the OECD Anti-Bribery Convention

Summary: Transparency International's 2018 Progress Report is an independent assessment of the enforcement of the Organisation for Economic Co-operation and Development (OECD) Anti-Bribery Convention, which requires parties to criminalise bribery of foreign public officials and introduce related measures. The Convention is a key instrument for curbing global corruption because the 44 signatory countries are responsible for approximately 65 per cent of world exports and more than 75 per cent of total foreign direct investment outflows. This twelfth such report also assesses enforcement in China, Hong Kong Special Administrative Region of the People's Republic of China, India and Singapore, which are not parties to the OECD Convention but are major exporters, accounting for 18 per cent of world exports. Hong Kong is covered separately in the report, as it is an autonomous territory, with a different legal system from China and export data compiled separately. The report has been prepared by Transparency International, with contributions from our national chapters and experts in 41 OECD Convention countries, as well as in China, Hong Kong SAR, India and Singapore.

Details: Berlin: Transparency International, 2018. 160p.

Source: Internet Resource: Accessed September 18, 2018 at: https://www.transparency.org/whatwedo/publication/exporting_corruption_2018

Year: 2018

Country: International

Keywords: Bribes

Shelf Number: 151569


Author: Presler-Marshall, Elizabeth

Title: The devil is in the detail: Why a gender- and adolescent-specific lens is essential to accelerate progress in eradicating child exploitation

Summary: This report highlights that in order to eradicate child exploitation, we must take a dual pronged approach that uses a broad lens, to identify and challenge child and adolescent exploitation in all its forms, while systematically disaggregating its underlying causes and effects by gender, age, disability and other indicators of social exclusion. Beginning with the ways in which child exploitation has been framed, in the Sustainable Development Goals and by international conventions - especially those on child labour - the report then discusses the magnitude and patterning of child labour today. It notes that while boys appear to be more vulnerable than girls, this is in large part because the work that girls do is largely invisible and uncounted. It also notes that girls are especially vulnerable to trafficking and almost uniquely vulnerable to forced marriage, now conceptualised as a form of modern slavery. The second half of the paper looks at promising entry points to tackle adolescent labour and exploitation. These range from working with the private sector to ensure that young workers are adequately protected to targeted programmes that focus on particularly vulnerable populations, such as domestic workers. We conclude with policy and practice recommendations.

Details: London: GAGE Programme Office, 2018. 40p.

Source: Internet Resource: Accessed September 18, 2018 at: https://www.gage.odi.org/sites/default/files/2018-09/GAGE%20Child%20Exploitation%2012082018.pdf

Year: 2018

Country: International

Keywords: Child Labor

Shelf Number: 151576


Author: Stutzer, Alois

Title: Camera Surveillance as a Measure of Counterterrorism?

Summary: Camera surveillance has recently gained prominence in policy proposals on combating terrorism. We evaluate the instrument based on a comparative perspective and previous evidence on crime. We expect camera surveillance to have a relatively smaller deterrent effect on terrorism than on other forms of crime. In particular, we emphasize that (i) terrorists have more opportunities for substitution; (ii) targets under camera surveillance might become more and not less attractive if terrorists aspire media attention; (iii) real-time interventions are limited as behavior is only understood as suspicious in the light of hindsight; and (iv) CCTV might crowd out social surveillance.

Details: Basel, SWIT: Department of Business and Economics, University of Basel, 2011. 29p.

Source: Internet Resource: Accessed September 19, 2018 at: https://edoc.unibas.ch/27667/1/20160104154156_568a84b4639ca.pdf

Year: 2011

Country: International

Keywords: Camera Surveillance

Shelf Number: 151581


Author: TRAFFIC

Title: Reducing Demand for Illegal Wildlife Products: Research Analysis on Strategies to Change Illegal Wildlife Product Consumer Behaviour

Summary: KEY FINDINGS - The project identified 85 demand reduction initiatives delivered during the decade to 2015. The majority related to ivory in China, while rhino horn activities were focused in Viet Nam. Most involved broad communications (LCD displays, Public Service Announcements, banners and posters, etc) aimed at the general public. Few initiatives were targeted to more specific audiences, or underpinned by adequate understanding of the motivations of target audiences. - An in-depth review of demand reduction activities in Viet Nam in 2015 evaluated interventions by comparing them to social marketing and behavioural change criteria. This showed that many lacked the components required to achieve change. Very few campaigns included adequate research to identify the target audience, used behavioural change models or set adequate indicators or evaluation methods to record the success of their interventions. The review found that messages seeking to persuade consumers to change their behaviour have primarily been designed based on assumptions instead of insights into motivations of consumption. Measures of success tended towards anecdotes and expression of interest in the messages, rather than evidence of actual behavioural change. - The project also included a broad (i.e. rather than systematic) evidence review (sources per Annex 9.2) covering Chinese and Vietnamese literature on what has worked previously in influencing consumer choice or changing behaviour, including beyond conservation related issues, and identified promising evidence to inform campaigns. It highlighted the potential of marketing and consumer engagement strategies used in the luxury brand sector. The evidence review considered a range of behavioural change approaches that have been effective in China and Viet Nam. Some of the most successful examples exhibit a 'twintrack' approach. One track involves activities and communications to implement a societal behavioural control (e.g. ensuring the laws are appropriate, perceived to be an adequate deterrent and effectively enforced) and restricting consumer choice (e.g. retailers removing products from sale, or manufacturers using alternatives). The other track involves influential individuals, who can shape the attitudes and social norms of consumer groups and other target audiences, issuing messaging to help inspire and shape individual motivation. - The new primary research conducted as part of the study trialled promising methods to understand the motivations underpinning demand and estimate the prevalence of demand for illegal wildlife products. In addition, ten in-depth interviews were conducted with key informants, who were leading figures from across the spheres of business, celebrity and the brand and communications industry. The research suggested that the following methods are potentially useful: - Brand attachment - this can provide an accurate prediction of i) intention to purchase; ii) actual purchase behaviours, iii) 'brand purchase share' (or, the share of a brand amongst directly competing brands), and iv) 'need share' (or, the extent to which consumers rely on a brand to address their needs), - Emotional territory mapping - which can reveal the emotional connections and benefits consumers make when they are considering products and services to purchase, - Unmatched count technique - this is a survey-based approach which can provide an estimate of the proportion of people who have engaged in sensitive behaviours. The research suggested that it could be used more widely to assess levels of demand for illegal wildlife products and improve identification of key target audiences. It should be noted that overall the findings do not provide in-depth insight into the motivations of actual consumers of illegal wildlife products, since as it was a methodological pilot it was not possible to engage specifically with these groups. The target demographic was relatively well-off urban people, who use online media and who are interested in luxury brands. This group has been highlighted by previous research as potential users of both ivory and rhino horn. However, the achieved sample was disproportionately female and in the 26-45 age bracket, so was not representative of the target population. The small sample size contributed to the fact that the dataset for the unmatched count technique could not be analysed although the findings suggested that the method had potential. In further research to inform the development of demand reduction initiatives, the project suggests it will be important to engage directly with actual consumers of illegal wildlife products. The methodological challenges associated with this will require specific consideration. - The project contributed to a successful demand reduction workshop in Hong Kong in March, and was focused on in day one. The workshop brought together around 100 participants from 60 organisations, able to offer diverse expertise, experience and professional opinion around what it takes to change consumer choice. Overall, combining insights from previous evidence, knowledge and experience as well as new findings from this research, the project makes the following key suggestions to those designing, developing and delivering demand reduction initiatives and associated behaviour change interventions: 1. Employ an evidence-based and insight-led approach to produce effective, targeted interventions; 2. Ensure that initiatives have a foundation in behavioural science, so that they use efficient and effective approaches to influence consumer choice; 3. Consider employing new approaches from luxury brand marketing, consumer research and other fields when conducting research to understand demand for wildlife products; 4. Increase efforts to share findings, harmonise collection protocols and pool data between implementing organisations; 5. Ensure government buy-in and multi-stakeholder partnerships, as part of a Twin-Track Approach: track one using mechanisms to impose a societal control or restrict consumer choice; track two using messaging and influencers to shape individual motivation; 6. Mainstream demand reduction action where possible (e.g. relate activities and messaging to wider issues, rather than just those focused on natural resource use/conservation), and explore whether it can be embedded within existing culturally appropriate / context specific communications; 7. Employ creative communications and make lateral connections; 8. Understand the barriers to changing behaviour, and ensure that these are removed and that direct benefits of adopting the new behaviour are made clear to the target audience; 9. Adopt multiple ways of reaching the target audience to reinforce the message over time; 10. Adopt an iterative (adaptive) approach to demand reduction intervention design and implementation, including ongoing monitoring and evaluation of intervention effectiveness.

Details: London, 2018. 123p.

Source: Internet Resource: Accessed September 23, 2018 at: https://www.traffic.org/site/assets/files/11081/demand_reduction_research_report.pdf

Year: 2018

Country: International

Keywords: Behavioral Change

Shelf Number: 151586


Author: Fried, Mark

Title: Prescription for Poverty: Drug companies as tax dodgers, price gougers, and influence peddlers

Summary: New Oxfam research shows that four pharmaceutical corporations - Abbott, Johnson & Johnson, Merck, and Pfizer - systematically hide their profits in overseas tax havens. This activity could deprive developing countries of more than $100 million every year - money that is urgently needed to meet the health needs of people in these countries - while charging very high prices for their products. Tax dodging, high prices, and political influencing by drug companies exacerbate the yawning gap between rich and poor, between men and women, and between advanced economies and developing ones. This report shows how corporations can use sophisticated tax planning to take advantage of a broken system that allows multinational corporations from many different industries to avoid taxes.

Details: London: Oxfam, 2018. 80p.

Source: Internet Resource: Accessed September 24, 2018 at: https://oxfamilibrary.openrepository.com/handle/10546/620548

Year: 2018

Country: International

Keywords: Healthcare

Shelf Number: 151649


Author: Hughes, Donna M.

Title: The Demand for Victims of Sex Trafficking

Summary: Examines sex trafficking from the 'demand' side, focusing on the role of 'exploiters' and the 'state' as two components.

Details: South Kingstown, Rhode Island: University of Rhode Island, 2005. 76p.

Source: Internet Resource: Accessed September 26, 2018 at: https://www.researchgate.net/publication/265578917_The_Demand_for_Victims_of_Sex_Trafficking

Year: 2005

Country: International

Keywords: Human Trafficking

Shelf Number: 151696


Author: Nelleman, Christian

Title: World atlas of illicit flows. A RHIPTO-INTERPOL-GI Assessment.

Summary: This atlas of illicit flows presents over a thousand smuggling routes worldwide of goods and services associated with environmental crimes, drugs and people. Conflict and terrorism are today funded on an unprecedented scale by transnational organized crime and by illicit revenue from natural resources. While it is not possible to establish with certainty the exact value of revenues flowing to criminalized groups and non-state armed groups, it is possible to generate a rough snapshot based on the major non-state armed groups. The proceeds of environmental crime - which encompasses not just wildlife crime, but also fuel smuggling and illicit mining of gold, diamonds and other minerals and resources - have become the largest source of income for non-state armed groups and terrorist organizations. Combined, environmental crimes, including those that involve the sale or taxation of natural resources, account for 38% of the financing of conflicts and of non-state armed groups, including terrorist groups; followed by drugs (at 28%); other forms of illegal taxation, extortion, confiscation and looting (26%); external donations (3%); and money extorted through kidnapping (3%). This evidence-based report aims to quantify how these illicit flows finance the major non-state armed groups. Broadly speaking, environmental crimes generate the single-largest overall threat finance to conflicts today. The lack of criminal investigation, enforcement efforts or attention from the international community has enabled environmental crime to provide a 'free ticket' to armed criminalized groups and war profiteers, and it is gaining increasing interest as a source of financing among insurgents, terrorist groups and criminal cartels, in addition to their traditional financing sources from drug trafficking and kidnapping for ransom. The interest in natural resources is rising, especially gold and other minerals, and timber, among many armed and criminal groups, and this can be currently seen in the Great Lakes region of Africa, Colombia, Peru and Central America, and South East Asia. The biggest source of revenue - that is, from one single illicit product category - for non-state armed groups in conflict is drugs, which, as mentioned, account for 28% of their funding. Most of this revenue comes from taxation of drugs by groups such as FARC and the Taliban. Illegally procured oil, gas, gasoline and diesel provides 20% of their income (this was the predominant source of financing for Islamic State in 2014 and 2015). Illegal income from oil is also crucial for organizations outside of the seven main global insurgent and terrorist groups discussed in detail here, including funding organized crime in conflict zones. Gasoline and diesel smuggling is a key source of criminal networks' financing particularly in parts of Latin America, Libya and Nigeria. After drugs and oil, taxation and extortion, and illegal mining, follow, with both representing 17% of revenue. Then, kidnapping for ransom, and external funding and donations each represent 3%. Charcoal and antiquities constitute 1% each, but these categories feature more predominantly as financial sources in particular regions, especially charcoal. Combined, these illicit flows directly fund an estimated 96 900 full-time fighters, and an unknown number of part-timers, associated with the seven most notable non-state insurgent and terrorist groups, plus the multitude of non-state armed groups active in north-eastern DRC.

Details: RHIPTO -Norwegian Center for Global Analyses, INTERPOL and the Global Initiative Against Transnational Organized crime, 2018. 152p.

Source: Internet Resource: Accessed October 1, 2018 at: http://globalinitiative.net/wp-content/uploads/2018/09/Atlas-Illicit-Flows-FINAL-WEB-VERSION-copia-compressed.pdf

Year: 2018

Country: International

Keywords: Drug Trafficking

Shelf Number: 151733


Author: Global Financial Integrity

Title: Illicit Financial Flows and the Illegal Trade in Great Apes

Summary: Global Financial Integrity's October 2018 report "Illicit Financial Flows and the Illegal Trade in Great Apes" studies the trafficking of great apes from source to buyer in West & Central Africa and Southeast Asia. The live trade is the most significant in terms of value, and the markets for bushmeat and body parts are linked with the highest impact on the survival of the four species-bonobos, chimpanzees, and gorillas in Africa and orangutans in Indonesia and Malaysia, all of which are endangered species. Criminal networks of poachers, suppliers, dealers, wholesalers, and consumers make up the multimillion dollar industry in live great apes, their bushmeat, and their body parts, and investigators are missing intelligence and enforcement opportunities on these illicit financial flows. Governments, CITES, Interpol, the United Nations (UN), the World Customs Organization (WCO), and civil society organizations can increase their effectiveness in combatting the illegal great ape trade by closing information gaps, by increasing the legal risks and consequences for traffickers, dealers, and high-level consumers, and by focusing more investigative resources on the money from the illegal trade that is in the formal financial system.

Details: Washington, DC: Global Financial Trade, 2018. 76p.

Source: Internet Resource: Accessed October 1, 2018 at: https://www.gfintegrity.org/wp-content/uploads/2018/10/GFI-Illicit-Financial-Flows-and-the-Illegal-Trade-in-Great-Apes.pdf

Year: 2018

Country: International

Keywords: Great Apes

Shelf Number: 151735


Author: ECPAT International

Title: Global Monitoring report on the status of action against commercial sexual exploitation of children

Summary: ECPAT International has released a global monitoring report on the commercial sexual exploitation of children. The report provides information and analysis on more than 50 specific country situations and an assessment of the efforts made, and still needed, to protect children from sexual exploitation. Children of all ages are under threat from abusers and exploiters. The changing nature of the means used to meet adult demand for sex with children and the fragmented action being taken to protect them, has maintained this threat. Ten years after the scale of commercial sexual exploitation of children (CSEC) was first acknowledged at the First World Congress against CSEC, this report shows that legal measures alone are not enough to stop the demand. Analysis of countries around the world shows that poverty, low levels of education and political and civil unrest still force huge numbers of children into sexual exploitation. At the same time, new consumer culture and media influence are redefining the boundaries of social belonging, creating profound pressures which can propel children into the hands of adults who will use their bodies and exploit children's search for resources to meet these expectations. While the children are often wrongly blamed, the role of the perpetrator who exploits them through abuse of power and wealth goes largely unnoticed and unaddressed. Only half of the countries examined have child prostitution laws that carry penalties for exploiters and in most cases, prosecution is constrained by the necessity to prove rape, coercion or corruption of minors. While the global awareness of child sex tourism has led to improvements in prevention and protection mechanisms, the dramatic growth in low cost airline routes and increase in worldwide tourism have facilitated the ease with which abusers can access children without constraint in virtually any destination. Likewise, developments in information technology are seeing multi-billion dollar growth in child pornography materials and the number of adults accessing images of child abuse. The children they seek to entrap can now be victimized from anywhere in the world with very few countries putting sufficient protection measures in place. ECPAT research has found that less than 25 per cent of countries have a dedicated and current National Plan of Action (NPA) to combat the various forms of commercial sexual exploitation of children. Of those which do, many NPAs contain weak goals and objectives and have no assigned resources for implementation.

Details: Bangkok : ECPAT International, 2006. v.p.

Source: Internet Resource: Accessed October 2, 2018 at: https://www.crin.org/en/library/publications/global-monitoring-report-status-action-against-commercial-sexual-exploitation

Year: 2006

Country: International

Keywords: Child Prostitution

Shelf Number: 106486


Author: ECPAT International

Title: Trends in Online Child Sexual Abuse Material

Summary: CSAM crimes are varied and subject to change, terminology differs across researchers and practitioners, and inconsistent ways of operationalising and measuring CSAM make comparison across studies difficult. This has had a negative impact on global efforts at data collection across different forms of child sexual abuse and exploitation and is the case with online CSAM. Our capacity to evaluate the scale of the problem in terms of the quantity of CSAM is compromised by the volume of online content in the open, and also hidden, Internet and the reality that content may be removed but not destroyed. Criminal justice data from public records, as well as research surveys, would suggest an increase over time in the number of CSAM crimes. Youth-produced images pose a problem for law enforcement in terms of resource demands alongside their ability to determine the age of the child and whether they have been produced as part of coercive activity by adults or peers or represent behaviour that is consistent with adolescent development and risk-taking. Mapping of existing national and international CSAM databases would suggest that they fall largely into two groups: hash collections and image collections. While there are a number of databases globally, there is limited connectivity between them. Differences in how data is defined and recorded means that it is impossible to draw firm conclusions as to whether there have been changes in the gender, age and level of violence within recorded CSAM. However there is some converging evidence that the percentage of egregious images has increased over time. Across three studies, younger victims are associated with greater levels of sexual violence, produced within a family context and more likely to be widely distributed. However, the preponderance of images are of pubescent and pre-pubescent children and the numbers of images of very young children (infants and toddlers) remain relatively low. This is in contrast to the views of experts interviewed in the current study. The majority of victims and offenders are white Caucasians, and while there has been an increase in other ethnic groups, these numbers remain disproportionately small. This does require further investigation given the increasing availability of Internet connectivity through hand-held devices across hand-held devices and the concerns expressed about, for example, live streaming of abuse.

Details: Bangkok: ECPAT International, 2018. 44p.

Source: Internet Resource: Accessed October 3, 2018 at: http://www.ecpat.org/wp-content/uploads/2018/07/ECPAT-International-Report-Trends-in-Online-Child-Sexual-Abuse-Material-2018.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 151750


Author: Schoder, Diana

Title: Trade Openness and the Illegal Ivory Trade

Summary: This paper examines how the illegal ivory trade-including poaching, smuggling, and stockpiling-responds to increases in trade openness. When a Trade and Investment Framework Agreement promotes legal trade between an ivory-exporting country and the United States, the impact on illegal ivory is unclear. Predictions about poaching activity and smuggling diverge, and the option to stockpile further complicates this scenario. A difference-in-differences estimation using a panel regression with synthetic controls and unique tests to analyze shifting markets and stockpiling behavior suggest that 1) trade openness motivates increased poaching, 2) this increased supply of ivory is, at least in part, stockpiled, while 3) seizures of ivory at the US border do not change. Secondary results show that poverty does stimulate poaching and that increases in legal trade mask a growing illegal trade.

Details: Haverford College, 2017. 29p.

Source: Internet Resource: Accessed October 3, 2018 at: https://scholarship.tricolib.brynmawr.edu/bitstream/handle/10066/19258/2017SchoderD.pdf?sequence=1

Year: 2017

Country: International

Keywords: Environmental Crime

Shelf Number: 151659


Author: Webb, Vincent

Title: Influence of Risk and Protective Factors on School-aged Youth Involvement with Gangs, Guns, and Delinquency: Findings from the El Salvador Youth Survey

Summary: Executive Summary Youth participation in problem behavior, including crime and violence, especially in gang-related violence, has become a global concern over the past several years. The research that is the basis for this report was designed to provide policymakers in El Salvador with systematic empirical evidence to serve as the foundation for developing evidence-based prevention and intervention strategies for addressing such problem behavior. This research was organized around three research questions. First, it was designed to collect data that could be used to gauge the involvement of school-aged Salvadoran youth in gangs, guns, and delinquent activity. Second, the research was designed to identify factors that put school-aged youth at risk for and protect them from engaging with gangs, guns, and delinquency. Third, it was designed to determine which, if any, of those risk and protective factors would have cumulative effects on that involvement. To answer these questions, the El Salvador Youth Survey was developed and administered to more than 8,900 6th and 9th graders attending 81 schools throughout El Salvador. The survey was organized around the risk and protective factor paradigm, with a principal goal of identifying risk and protective factors within the four domains of community, family, school and peers. The analyses reported in this document are based upon a final sample of 6,268 school aged Salvadoran youth. Youth in the sample were selected on the basis of having completed surveys without missing data and having denied being dishonest in their responses to survey items. Of those 6,268 school-aged respondents, 19.6% were classified as having gang involvement. This meant that they reported being a member or former member of a gang or having friends who were in a gang. In addition, approximately 5.3% of the respondents in the sample were classified as having been involved with guns, and 8.5% were classified as having been engaged in delinquent activity. Within the sample, significant associations of risk factors with gang involvement were found in three of four domains. Two risk factors were found to be significant in the community domain, four in the family domain, and six in the peer-individual domain. None of the risk factors in the school domain were found to be significantly associated with gang involvement. For gun involvement, risk factors in two domains (community and peer-individual) were found to be significant, but none of the risk factors in the school or family domains were significant. Nine risk factors were found to be associated with delinquency, with three of those being in the community domain, two in the family domain, and four in the peer-individual domain. Again, none of the risk factors in the school domain were found to be significantly associated with delinquency. Significant associations also were found for protective factors within three domains. And as was expected, the cumulative effect of multiple risk factors was significantly associated with involvement in problem behaviors, and conversely the cumulative effect of multiple protective factors was associated with a lower probability of participation in problem behaviors. These findings have provided program planners and policymakers with an opportunity to identify and develop prevention and intervention strategies that target significant risk and protective factors within the community, family and peer-individual domains. Research findings from the risk and protective factor paradigm have previously been used to develop programs that target specific risk and protective factors, and the evidence supports their effectiveness. Most of those programs have been implemented and evaluated in settings other than El Salvador. In all likelihood, existing evidence-based "best practices" programs will serve simply as a heuristic starting point preceding their adaptation to reflect the cultural context of El Salvador.

Details: Arizona, 2016. 51p.

Source: Internet Resource: Accessed October 3, 2018 at: https://www.researchgate.net/publication/318641913_Influence_of_risk_and_protective_factors_on_school_aged_youth_involvement_with_gangs_guns_and_delinquency_Findings_from_the_El_Salvador_Youth_Survey

Year: 2016

Country: International

Keywords: Gangs

Shelf Number: 151526


Author: Dion-Schwarz, Cynthia

Title: Olympic-Caliber Cybersecurity: Lessons for Safeguarding the 2020 Games and Other Major Events

Summary: This report profiles the cybersecurity threat landscape faced by Japan as the host nation of the 2020 Summer Games and 2020 Paralympic Games of the XXXII Olympiad. The overarching objective of the study was to produce a threat actor typology, based on a risk assessment of the Tokyo 2020 threat landscape. Synthesizing multiple sources of primary and secondary data, the study team developed a visualization of the threat landscape that provides an at-a-glance overview to guide Olympic security planners, computer emergency response teams, and policy- and decisionmakers as they prioritize and address cybersecurity threats. The risk assessment also considered the motivation, sophistication, and propensity of threat actors to collude with one another. This research could be valuable to a wide variety of stakeholders and will be of particular interest to stakeholders involved in planning and ensuring the security of the Tokyo 2020 Games. The research also serves as a reference to inform ongoing policy debates on cybersecurity preparations for mega-events and as a basis for future research.

Details: Santa Monica, CA: RAND, 2018. 97p.

Source: Internet Resource: Accessed October 5, 2018 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR2300/RR2395/RAND_RR2395.pdf

Year: 2018

Country: International

Keywords: Cybercrime

Shelf Number: 152841


Author: Environmental Investigation Agency (EIA)

Title: Taking Stock: An Assessment of Progress Under the National Action Plan Process

Summary: The National Ivory Action Plan (NIAP) process is an important framework. It was developed under the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) in response to the continuing elephant poaching crisis in Africa, the worst the continent has experienced since the 1970s and 1980s. If implemented effectively, the NIAP process can contribute significantly to a reduction in elephant poaching and the illegal trade in ivory. The NIAP process identifies the key CITES Parties with high levels of elephant poaching and ivory trafficking. It calls for these countries to develop and implement robust time-bound action plans to address country-specific concerns, with the ultimate goal of achieving positive impact on the ground. For example, impact can be measured through progress made in reducing elephant poaching (resulting in stabilised or increased elephant populations) or improving legislation and enforcement actions (resulting in increased ivory seizures and successful prosecutions). The NIAP process has prompted notable progress in some participating countries. For example, Kenya has strengthened national legislation and improved conviction rates. In 2015, Thailand took steps to regulate its domestic ivory market which, although falling well short of a ban, have measurably reduced illegal trade. In 2017, China closed its domestic ivory market almost entirely. Meanwhile, Uganda has reported that participating in the NIAP process has been positive by encouraging key Government officials to recognise the importance of tackling illegal ivory trafficking as well as by giving the issue more public prominence across the country. There have already been some welcome developments in the process, such as the production of templates for NIAPs and progress reports. The NIAP Guidelines adopted at the 17th CITES Conference of the Parties in 2016 (CoP17), recognise the need for performance indicators and targets to demonstrate progress. They include data on elephant poaching levels, number of ivory seizures, successful prosecutions and any relevant indicators from the International Consortium on Combating Wildlife Crime (ICCWC). The CITES Standing Committee (SC) has the ultimate decision-making authority over who participates in, stays in or exits the NIAP process. Since the SC meets every year, this offers an opportunity for tracking progress, supporting implementation and securing strong country-specific decisions on a timely basis, rather than waiting for three years to secure action at a CITES CoP. However, the NIAP process is in its infancy. As such, weaknesses are still being identified and there are opportunities for learning and making improvements. The NIAP Guidelines are an important step forward but they have not been fully implemented to date. One of the most significant concerns is that even though the NIAP Guidelines specifically encourage assessment of progress by independent experts, the process continues to rely on self-assessment progress reports submitted by Parties, without independent review. These progress reports may not fully reflect the key challenges being faced by the NIAP Party in question. There is a clear and pressing need for the mandatory use of independent experts in the assessment of progress against NIAP objectives. Similarly, serious concerns have also been raised about the adequacy of certain NIAPs to address the problems they need to solve. Therefore, as well as being involved in the assessment of progress, it is important that independent experts participate in the development of the NIAP. Finally, independent experts should be involved in the ultimate assessment as to whether a country should exit the NIAP process. While the existing NIAP Guidelines do call for consultation with independent experts, necessary amendments to the NIAP Guidelines should be made at CoP18 to ensure that involvement of expert analysis becomes a standard part of the NIAP process and not an optional extra. The underlying issues within a country may change during the period covered by a NIAP. If that happens, the SC should be able to work with the Party to revise its NIAP to address those changed circumstances, rather than wait for the end of the NIAP period to request the development of a new NIAP. A significant concern about the NIAP process is that the focus is on tracking actions of NIAP Parties rather than on impact. Parties tend to focus on achieving a certain percentage of the NIAP objectives rather than assessing their actual impact in addressing the problems (for example, by demonstrating an increase in elephant populations or disruption of organised criminal networks involved in ivory trafficking). Once a certain percentage of the NIAP objectives has been achieved, the Party may argue that it should exit the process. That would be premature. Before the SC decides that any Party should exit the NIAP process, there should be an assessment period involving detailed input from independent experts to establish whether the actions taken have actually made any difference to the underlying problems. If not, the NIAP should be revised. For example, if a country has made legislative changes, it would be premature for that country to exit the NIAP process, without demonstrating the impact of the changes such as increased prosecutions and disruption of the organised criminal networks implicated in ivory trafficking.

Details: London, 2018. 26p.

Source: Internet Resource: Accessed October 5, 2018 at: https://eia-international.org/wp-content/uploads/EIA-report-NIAP-2018.pdf

Year: 2018

Country: International

Keywords: Environmental Crime

Shelf Number: 152847


Author: UNICEF

Title: An Everyday Lesson: #ENDviolence in Schools

Summary: Nqobile is taking a stand against violence in and around her school. And she is starting by speaking up about what happened to her. At age 13, Nqobile was sexually assaulted on her way home from school in South Africa. In the aftermath, she struggled with self-confidence and feelings of shame. "In school, I never told anybody," Nqobile said. "It was so difficult. In my culture, it's such a taboo." Now a peer counsellor and Deputy President of her school, Nqobile, 18, encourages others to speak out and offers support to students who have experienced violence. One day, she hopes to study psychology so she can counsel children who have faced trauma. "I'm opening up to people about this for the first time," she said. "I knew what I needed the moment that I needed it at school," she added. "I don’t want any other girl to go through what I went through at school." For millions of students around the world, the school environment is not a safe space to study and grow. It is a danger zone where they learn in fear. For Nqobile and many others, the trip to and from school is perilous. In school, they face dangers that include threatening teachers, bullying, cyberbullying, sexual assault and violence that pushes into schoolrooms from the world outside. Far too often students are forced to take cover as gunfire invades their classroom. Sometimes this violence is caused by war or community conflict; other times it is a student with a gun. A UNICEF analysis of data underscores how common violence is in schools around the world. Globally, half of students aged 13-15, about 150 million, report experiencing peer-to-peer violence in and around school. This number includes students who report having been bullied in the last month or having had a physical fight within the past year. But bullying and physical fights are only two types of violence. Students routinely deal with corporal and other degrading forms of punishment, physical and sexual attacks and gender-based violence. For example, about 720 million school-age children live in countries where they are not fully protected by law from corporal punishment at school. Indeed, violence in schools puts bodies, minds and lives at risk. It causes physical injury and can lead to depression, anxiety and suicide. It has short-term effects on students' educational achievement and leaves a long-term impression on their futures. In El Salvador, 23 per cent of students aged 13-15 said they had not attended school on one or more days in the past month due to safety concerns. The impact of violence in schools places an economic burden on society. It has been estimated that the global costs of the consequences of violence against children are as high as US$7 trillion per year.

Details: New York: UNICEF, 2018. 32p.

Source: Internet Resource: Accessed October 8, 2018 at: https://www.unicef.org/publications/files/An_Everyday_Lesson-ENDviolence_in_Schools.pdf

Year: 2018

Country: International

Keywords: Costs of Violence

Shelf Number: 152856


Author: Scalabrini Migration Study Centers

Title: 2018 International Migration Policy Report: Perspectives on the Content and Implementation of the Global Compact for Safe, Orderly, and Regular Migration

Summary: The 2018 International Migration Policy Report: Perspectives on the Content and Implementation of the Global Compact for Safe, Orderly, and Regular Migration features several articles focusing upon issues discussed and negotiated by United Nations (UN) member states in producing the Global Compact for Safe, Orderly, and Regular Migration ("the Compact"). The final draft of the Global Compact was agreed to in New York by 191 member states on July 13, 2018, with final adoption of the document set for December 2018 at an intergovernmental conference in Marrakesh, Morocco. The articles, written by global Scalabrini Migration Study Centers founded by the Congregation of the Missionaries of St Charles, Scalabrinians, provide best practices and recommendations on important migration policy issues included in the Compact. The study centers contributing to the report include the Center for Migration Studies of New York (CMS), the Scalabrini Migration Center (SMC) in the Philippines, the Scalabrini Institute for Human Mobility in Africa (SIHMA), and the Fondazione Centro Studi Emigrazione - Roma (CSER). The report also includes shorter essays from special contributors to CMS addressing other important topics addressed by the member states during the negotiations of the Compact. The appendix features a sampling of interventions made by the Scalabrini International Migration Network (SIMN) and CMS during the negotiation process. In his paper, "Return Migration: A Conceptual and Policy Framework," Graziano Battistella, c.s., executive director of SMC in Quezon City, Philippines, tackles the controversial issue of return migration, ranging from voluntary to forced returns. The author proposes a conceptual framework to accommodate four categories of returns: (1) return of achievement; (2) return of completion; (3) return of setback; and (4) return of crisis (forced return). These models could be adopted by UN member states, but each category would require a different policy framework. Sergio Carciotto, executive director of SIMHA in Cape Town, South Africa, addresses the issue of labor migration in his paper, "The Regularization of Zimbabwean Migrants: A Case of Permanent Temporariness." The author, using the example of Zimbabwean laborers in South Africa, makes the case that migrant workers should be eligible for permanent residence after a certain length of time working in a host nation, as they have contributed to the host nation's economy and culture. Permanent residence would also ensure that workers can market their skills and fully contribute to their new country, while also being protected from workplace abuse and exploitation. In the paper, "In Search of Protection: Unaccompanied Minors in Italy," a team of writers examines the pressing topic of unaccompanied migrant children and how nations should treat them. Pietro Demurtas, Mattia Vitiello, and Marco Accorinti of the Institute for Research on Population and Social Policies at the National Research Council in Rome, Aldo Skoda of the Scalabrini International Migration Institute in Rome, and Carola Perillo of CSER critique Italy's policy on these children and offer recommendations for reform of the system, concluding with four principles of protection for possible adoption by the compacts. Finally, Kevin Appleby, senior director of international migration policy at CMS and SIMN, highlights issues that have been controversial in negotiations on the Global Compact on Migration in his piece, "The Global Compact on Safe, Orderly, and Regular Migration: Will It Live Up to Its Name?" The author - who has been centrally involved in the process leading to the compact - offers recommendations to resolve issues related to regularization, border enforcement and return, the rights of irregular migrants, information firewalls, and the protection of migrants in vulnerable situations. The papers are followed by a series of shorter essays addressing "on the ground" issues confronting migrants in vulnerable situations, with a focus upon how faith-based organizations (FBOs) help fill service and protection gaps. In "Protecting Families and Facilitating Their Integration," Linda Rabben, associate research professor, Department of Anthropology at the University of Maryland, discusses the global crisis in forcible displacement, focusing on the hardships and challenges encountered by migrant families and children. Rabben describes several successful FBO programs for migrants. Following a series of recommendations, she concludes that FBOs have as much to contribute to the compacts' implementation, as to its content. Laurie Carafone, co-director of legal services for Kids in Need of Defense (KIND) speaks to the needs of women and girls, and how faith-based groups can and do meet them, in her essay "Meeting the Needs of Women and Girl Migrants and Refugees in the Comprehensive Refugee Response Framework: The Unique Role of Faith-Based Organizations." Mike Nicholson, researcher at the Center for Migration Studies of New York, explores the role of FBOs in providing health care to migrants and promoting their employment and entrepreneurial activities in his essay, "The Role of Faith-Based Organizations in Immigrants' Health and Entrepreneurship." In advocacy efforts throughout the negotiation of the Global Compact, SIMN and CMS collaborated with the Delegation of the Holy See to the United Nations, member states, faith-based organizations, and civil society to identify and raise issues impacting the human rights of migrants and refugees. SIMN and CMS hope that these collaborations will continue into the implementation phase of the Global Compact. Speaking to the Plenary Council of the International Catholic Migration Commission (ICMC) in March 2018, Pope Francis stated that the Church "must encourage countries to coordinate more suitable and effective responses to the challenges posed by issues of migration." He also recognized the important role of the Church in providing leadership and service to the most vulnerable of those among us, including persons on the move: "Today, as in the past, liberating the poor, the oppressed, and the persecuted is an integral part of the mission entrusted by God to the Church."

Details: New York: The Center, 2018. 157p.

Source: Internet Resource: Accessed October 10, 2018 at: http://cmsny.org/wp-content/uploads/2018/09/2018-GLOBAL-POLICY-REPORT-UPDATED-9.18.18-full.pdf

Year: 2018

Country: International

Keywords: Immigrants

Shelf Number: 152894


Author: Cooper, Betsy

Title: The Cybersecurity of Olympic Sports: New Opportunities, New Risks

Summary: The UC Berkeley Center for Long-Term Cybersecurity (CLTC) has released a report focused on the rapidly evolving landscape of cybersecurity in sports, with an emphasis on the Olympic Games. The report, "The Cybersecurity of Olympic Sports: New Opportunities, New Risks," is an unprecedented look into how the proliferation of new technologies in major sporting events—from digital display panels in stadiums to online ticketing systems to artificial intelligence-based scoring software - opens the door to cyberattacks that could threaten public safety, diminish the fan experience, and undermine the integrity of competition. CLTC produced the report through a partnership with Cal Athletics (the University of California, Berkeley's athletics department) as well as the Los Angeles Organizing Committee for the 2028 Olympic Games. Using the Olympic Games as a case study, the report introduces a framework for evaluating potential risks posed by digital technologies in sports, and highlights possible threats that will arise as these technologies are deployed. The study identifies key areas of risk, including hacks on stadiums, scoring systems, and photo and video replay systems; manipulation of digital systems used by athletes for training and self-care; hacks on transportation and entry systems; as well as more extreme attacks designed to induce panic or facilitate terrorism or kidnapping. The report also includes fictional news stories from the future to highlight hypothetical incidents. One shows how malicious actors seeking to disrupt the Olympics could cause mass panic in a stadium by hacking into digital display panels. Another story highlights how hackers could manipulate a software-based scoring system in gymnastics, throwing a marquee event into chaos. A third story focuses on how "smart" appliances installed in athlete' residences in the Olympics Village could be hacked and used for surveillance. The report suggests that sporting event planners should consider the potential cybersecurity implications of any new technology, noting that "organizers should press to ensure that there are tangible benefits to incorporating digital devices—and that significant risks can be mitigated—before going forward."

Details: Berkeley, CA: University of California at Berkeley, Center for Long-Term Cybersecurity, 2017. 40p.

Source: Internet Resource: Accessed October 11, 2018 at: https://cltc.berkeley.edu/wp-content/uploads/2017/10/Cybersecurity_of_Olympics_CLTC.pdf

Year: 2017

Country: International

Keywords: Cybercrime

Shelf Number: 152900


Author: Denton, Erin

Title: An Analysis of Migratory Patterns and Social Network Chains, Ties, and Bonds in Human Trafficking: Australia, Britain, Canada, and the United States, 2006-2011

Summary: Research on human trafficking to date reveals certain limitations. First, little empirical research exists that focuses specifically on analyzing occurrences of human trafficking incidents. Second, very few human trafficking studies break away from the traditional male/female dichotomy of offender and victim. Investigations of disaggregated data on persons and circumstances remain rare. As a consequence, who does what to whom, and how often, remains unclear. This is problematic because current trends in trafficking research affect the direction of legislation meant to combat trafficking, and inadequate research can lead to inadequate legislation. It is paramount to understand human trafficking actors not only by their gender, but also by their actions, pathways, and networks that determine their inclusion in this underground economy. My intention is not to irreverently stir the pot, but to illustrate that the grey area is far too large for continuing calls to curb trafficking without understanding the logistics and rationale behind the action. This dissertation uses six years (2006-2011) of legal case files from Australia, Britain, Canada, and the United States in order to consider how human trafficking operates transnationally and regionally. Focusing on the influence of networks and social ties, chains, and bonds, this dissertation addresses the nuances of human trafficking insofar as relationships between victim and offender are cultivated and employed in order to actuate the trafficking act. Analyses are two-fold: first, descriptive statistics are gathered in order to create a focused analysis of the particularities of those captured by the scope of this study; and, second, social network analysis (SNA) is used to better understand power dynamics within human trafficking networks. The structure of human trafficking networks is addressed based on the gender of offender and the prosecutorial action is addressed with a comparison of influence in the network and the imposed sentence length. The purpose of these two flows of analyses is to address how or whether a trafficker’s gender affects his or her power and influence within the trafficking networks, as well as to investigate how law enforcement and criminal justice systems are affectively addressing the human trafficking problem. Findings suggest that insofar as power and influence within a trafficking network are concerned, gender does not matter: there is little to no difference between network centrality scores of males and females. Additionally, findings suggest that traffickers and trafficked individuals more often than not are from the same origin: meaning, being a migrant matters insofar as who is likely to be both trafficker and trafficked individual. An individual is more likely to be trafficked by someone from within her own community regardless of whether she is trafficked transnationally or regionally. This dissertation highlights the importance of the previously unaddressed impact of social networks and migration in the commission of the trafficking offense.

Details: Montreal, 2015. 2017p.

Source: Internet Resource: Accessed October 11, 2018: http://digitool.library.mcgill.ca/webclient/StreamGate?folder_id=0&dvs=1539264340527~796

Year: 2015

Country: International

Keywords: Human Smuggling

Shelf Number: 152896


Author: Hayman, Gavin

Title: International Environmental Crime: The Nature and Control of Environmental Black Markets

Summary: This paper summarizes the discussions and conclusions of a workshop on the nature and control of environmental black markets held at the Royal Institute of International Affairs, London on 27ñ28 May 2002. Thanks to generous support from the European Commission (DG Environment) and UNEP Ozone Secretariat, some eighty participants from over thirty different countries were able to attend. Rather than simply collect and repeat what is known about the extent of the illegal activities in specific jurisdictions in a traditional indulgence of the regulatory community in the workshop was intended to provide a more systematic understanding of the driving forces behind international environmental crime. Efforts to tackle the smuggling of environmental contraband have been dogged by an ad hoc and unsystematic approach where individual enforcement agencies attempt to headhunt environmental criminals without reducing the size of the illegal market in which they operate. The failure of the international war on drugs suggests that this policy is doomed: as long as demand and supply pressures that shape profit-making opportunities remain, other operators will expand their operations or new operations will enter the international market. Thus, the workshop raised the need to think beyond simply increasing enforcement effort to minimize overall levels of environmental harm by addressing the demand and supply of the contraband. This paper is not a literal account of proceedings but rather an attempt to summarize and draw conclusions from the wide-ranging discussions held. It also tries to clarify elements of successful national and international regulatory strategies and draw lessons between the different areas of environmental regulation discussed.

Details: London, 2002. 42p.

Source: Internet Resource: Accessed October 11, 2018 at: http://ec.europa.eu/environment/archives/docum/pdf/02544_environmental_crime_workshop.pdf

Year: 2002

Country: International

Keywords: Environmental Crime

Shelf Number: 152880


Author: International Organization for Migration

Title: Protection of Migrants at Sea

Summary: The sea has long offered passage to a diverse range of people fleeing poverty, conflict, persecution and oppression, in search of safety and opportunity "on the other side." Complex migration routes and mass exploitation of migrants are among the most urgent humanitarian tests of our time. As criminals work to profit from the plight of those who lack options to safely mobilize - including through the exploitation of vulnerable people at sea - States find themselves under increasing pressure to adapt long-standing international legal frameworks to evolving phenomena. The result is that States are, understandably, often unsure of and may even dispute their obligation to protect lives in the contexts they encounter migrants at sea. Further, those States that do encounter migrants in need of protection may not be equipped with the capacity and resources required to fulfill their obligations in the areas of the ocean for which they are responsible. The allocation and assumption of responsibility in the maritime context is further complicated by the number of actors - both State and non-State - that may be involved. Protection of Migrants at Sea provides guidance on applying international legal principles in protecting migrants at sea. The obligations and responsibilities that arise in different jurisdictions are dissected in the contexts of both irregular maritime migration flows and exploitation of migrants at sea. This publication urges that complex (and often overlapping) protection obligations be approached as opportunities to strengthen collaboration towards striking a balance between interests and duties in the interpretation and application of international law at sea.

Details: Geneva, SWIT: IOM, 2018. 148p.

Source: Internet Resource: Accessed October 12, 2018. at: https://publications.iom.int/books/protection-migrants-sea

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 152908


Author: Transparency International

Title: European Getaway: Inside the Murky World of Golden Visas

Summary: Burgundy passports are turning gold, as EU governments sell residency and citizenship to the ultra-rich. By their nature, these schemes pose inherent risks for corruption, as people who steal money from their home countries need other jurisdictions to escape to when the going gets tough. Golden visa schemes offer fast-track citizenship and/or residency to foreign nationals in exchange for lots of cash. European golden visas are particularly appealing, as they give their owners free reign to move throughout the EU, unconstrained by interference or checks. There are numerous examples of high-risk business people and oligarchs enjoying all the benefits that golden visas have to offer. Finding safe haven through these schemes is simpler than you might think if you have a lot of money to spare. Despite the risks posed by golden visa schemes, several of the governments selling residency and citizenship do not seem to question where applicants' money comes from. This perhaps contributes to the EU: Welcoming over 6,000 new citizens and close to 100,000 new residents through golden visas schemes in the last decade. Attracting around €25 billion in foreign direct investment through golden visas over the last ten years. While some nations are profiting from the sales of golden visas, all EU citizens take the sizeable hit due to the ethical implications and risks embedded in the current practice. Nonetheless, secrecy continues to obscure even basic information about these schemes and EU citizens do not have the information necessary to decide whether selling residency or citizenship is a risk worth taking. We have worked with Transparency International to change this, investigating publicly available sources and reaching out to national governments for additional information. In our latest report, we are able to shine some light on the shady situation, revealing a telling though still incomplete picture of the golden visa scheme. RECOMMENDATIONS: With Transparency International, we call upon EU institutions to: Set EU-wide standards for golden visa schemes, including enhanced due diligence and transparency; Identify and regularly assess the risks posed by schemes for the EU as a whole and mitigate accordingly; Seek to broaden anti-money laundering rules so they apply to all players in the golden visa industry; Establish mechanisms for collecting and coordinating information on applications, investment and rejections; Start legal proceedings against member states whose schemes could undermine the collective security of EU nations.

Details: Berlin: Transparency International and Global Witness, 2018. 88p.

Source: Internet Resource: Accessed October 12, 2018 at: https://www.globalwitness.org/en/campaigns/corruption-and-money-laundering/european-getaway/

Year: 2018

Country: International

Keywords: Financial Crimes

Shelf Number: 152914


Author: Novak, Adam

Title: Multi-country evaluation of the impact of juvenile justice system reforms on children in conflict with the law (2006-2012)

Summary: 2.1 Background The UN Convention on the Rights of the Child (CRC) requires States to promote the establishment of laws, policies, procedures institutions and services specifically applicable to children who are alleged as, accused of or recognised as having infringed the criminal law. More specifically, the UN Committee on the Rights of the Child requires that States parties establish a juvenile justice system, whose principal aim is to reintegrate children into their communities and society. The juvenile justice systems in countries and territories of CEE/CIS, which shared a common legal background until independence at the beginning of the 90s, focused on punishment rather than reintegration, and on prosecution and detention rather than on diversion from judicial proceedings and the various community-based alternative to custody that can best support the reintegration of young people in conflict with the law. None of the countries or territories in the CEE/CIS region have a juvenile justice system that fully meets the standard set by the CRC and other UN international standards and norms. UNICEF country offices have gradually started working on juvenile justice in the CEE/CIS region in 2000, with most of them active in this area by 2006. In addition to specific country-based support to reforms, there have been two initiatives led by the UNICEF Regional Office. The first, the 'critical mass' exercise started in 2008, and aimed at encouraging a group of CEE/CIS states that had developed experience in juvenile justice to work with a common set of objectives and priorities, strengthen their approaches, and to document and share experience and lessons learnt for the benefit of other countries in the region. The second was a programme co-funded by the European Instrument for Democracy and Human Rights' (EIDHR) on Consolidation of Juvenile Justice System Reforms against Torture and Other Forms of Ill-treatment of Children in Former Soviet Countries," covering 8 countries. 2.2 Objective, scope and methodology In 2012, UNICEF decided to commission an independent evaluation of its work on juvenile justice in the region as part of a series of thematic multi-country evaluations aimed at assessing and reinforcing the impact of UNICEF's work on the most vulnerable children. The present evaluation was carried out in partnership with the European Commission (EC) and constitute the final evaluation of the above-mentioned regional programme co-funded by EIDHR and UNICEF. This joint EC and UNICEF multi-country evaluation (MCE) assesses the extent to which juvenile justice system reforms in eleven countries and territories of the CEE/CIS region during the period 2006-2012 have contributed to (a) reducing deprivation of liberty for children in conflict with the law, (b) increasing the use of diversion from the judicial process and (c) reducing the average duration of pre-sentence detention. These three results are necessary in ensuring the child's reintegration into the community - i.e. the ultimate objective of juvenile justice reforms as stated above. They also correspond to interventions where UNICEF has been particularly active in the region. The evaluation reviews UNICEF's and the EIDHR support to system level changes and assesses the extent to which this support contributed to the three above-mentioned results. The MCE was conducted in 11 selected countries and territories which had reported significant results in terms of reductions of children in detention (Albania, Armenia, Azerbaijan, Georgia, Kazakhstan, Kosovo (UNSCR 1244), Kyrgyzstan, Moldova, Montenegro, Tajikistan and Ukraine), with two overarching goals: - Demonstrate how reduction of equity gaps and impact results were made possible through changes in the national/regional/local systems and document UNICEF's contribution to such changes; - Identify key lessons in order to improve current and future action. The evaluation was carried out by a team of twelve independent consultants and took place between September 2013 and January 2015. The methodology was based on a reconstructed Theory of Change (TOC); this generated a series of hypotheses regarding the sequencing and causal links of changes in juvenile justice and UNICEF's engagement. Using 16 evaluation questions, findings from the region were used to assess the validity of the logic underpinning the TOC; the extent to which the sequencing of inputs, outputs, outcomes and Impacts corresponded to the TOC, and whether the assumptions that link one level of the TOC to the next hold true. This was followed by a combined desk and field phase, based on documentary review, interviews and focus groups, and questionnaires for UNICEF staff and for practitioners and NGOs. Fieldwork was carried out in six of the 11 countries and territories included within the scope of the evaluation, with local experts assisting in the data collection in the remaining countries and territories. The evaluation team’s analysis was shared with UNICEF stakeholders and an expert panel at various stages and the final draft report was discussed during a validation workshop and passed an external quality assurance review.

Details: New York: UNICEF, 2015. 106p.

Source: Internet Resource: Accessed October 12, 2018 at: https://www.unicef.org/evaldatabase/files/MCE2_Final_CEECIS_2015-005.pdf

Year: 2015

Country: International

Keywords: Delinquency Prevention

Shelf Number: 152915


Author: de Leede, Seran

Title: Women in Jihad: A Historical Perspective

Summary: By exploring the different roles women have historically played in jihadist movements, this policy brief aims to broaden the understanding of women's positions in, and their relevance for contemporary jihadism. Women have maintained and propagated jihadist ideology, supported their jihadist husbands, raised their children according to jihadist ideology, recruited others, helped create alliances through strategic marriages, raised funds and transported messages, weapons and goods. On a smaller scale, women have taken on operational roles in the planning and execution of attacks, including as suicide bombers. As the principal focus in understanding (global) jihadism is often on perpetrators and leaders - positions in which women are underrepresented in jihadist movements - women's facilitative and supportive contributions are often poorly understood and assessed. This policy brief demonstrates that women's roles have been complementary to men's and argues that women form an integral part of contemporary jihadism that cannot be seen as separate from or secondary to men's contributions to jihad.

Details: The Hague: Internationial Centre for Counter-Terrorism, 2018. 16p.

Source: Internet Resource: Policy Brief: Accessed October 13, 2018 at: https://icct.nl/wp-content/uploads/2018/09/ICCT-deLeede-Women-in-Jihad-Sept2018.pdf

Year: 2018

Country: International

Keywords: Female Terrorists

Shelf Number: 152926


Author: United Nations Office of Drugs and Crime

Title: Handbook on Dynamic Security and Prison Intelligence

Summary: Who the Handbook is for - This Handbook is one of a series of tools developed by UNODC to support countries in the implementation of the rule of law and the development of criminal justice reform. It is designed to be used by all actors involved in the prison system, including policymakers, legislators, prison managers, prison intelligence officers and prison staff. Members of other law enforcement bodies, non-governmental organizations and other individuals interested or active in the field of criminal justice and prison reform may find it of interest. It can be used in a variety of contexts, both as a reference document and as a training tool. What the Handbook covers - The theme of the Handbook is prison security-the means by which escapes and other crimes are prevented. Its main focus is on the contribution made by dynamic security and highlights one particular element of dynamic security-prison intelligence -which provides important intelligence for use within the prison to prevent escapes and maintain order and control. Prison intelligence can also be used more widely by criminal justice, law enforcement and security bodies and agencies to prevent prisoners from within the prison directing criminal activity taking place outside the prison. For example, conducting organized crime-related activities, terrorist or gang activity, drug trafficking, intimidating or corrupting witnesses, judiciary, lawyers or jurors. Chapter 1 describes the three key elements in the prison security framework—physical security, procedural security and dynamic security-and sets those within the context of international human rights instruments. It makes clear that effective security and human rights are compatible and both can be delivered within a well-managed prison. The four main high-level security functions (categorization and assessment, accounting and control, searching, communications and surveillance) are described, and related objectives and baselines identified. The importance of security risk assessment and security risk indicators is also explored. Dynamic security and the importance of staff directly supervising and engaging with prisoners is the focus of chapter 2. It highlights the need for staff to communicate with prisoners, have regular contact with prisoners, establish professional relationships and involve themselves in prisoners' daily lives. The importance of preventing the conditioning and manipulation of staff is explored. The second part of the chapter emphasizes another element of dynamic security-putting in place a programme of constructive activities that provides prisoners with opportunities to change and develop, gain qualifications, and maintain their health and intellectual and social functioning. It makes the point that such programmes contribute to prison security by keeping prisoners active and occupied. Chapter 3 focuses on defining what is meant by intelligence, before going on to explain the rationale for intelligence gathering in prisons. It describes types of intelligence and provides definitions for key terms used by intelligence practitioners. The chapter looks at the policy and organization required for an effective intelligence operation in prisons. It goes on to describe the role and function of a Prisons Intelligence Unit. The need for having effective safeguards in place is highlighted. The issues of internal and external coordination are explored and the importance of multi-agency working emphasized. The role and benefits of having prison-based police intelligence officers is discussed. The use of covert surveillance measures and prisoner informers involves a careful balancing of a prisoner’s rights against the need to investigate serious criminality and is considered at the end of the chapter. The final chapter, chapter 4, outlines the intelligence cycle, its components and principles. It describes in detail the key elements of the intelligence cycle: tasking, collection, evaluation, collation, analysis, dissemination and re-evaluation. Examples of various intelligence-related template forms are provided in the annexes.

Details: New York: UNODC, 2015. 90p.

Source: Internet Resource: Accessed October 18, 2018 at: https://www.unodc.org/documents/justice-and-prison-reform/UNODC_Handbook_on_Dynamic_Security_and_Prison_Intelligence.pdf

Year: 2015

Country: International

Keywords: Correctional Administration

Shelf Number: 153020


Author: Martinez Flores, Fernanda

Title: The Deterrence Effect of Immigration Enforcement in Transit Countries: Evidence from Central American Deportees

Summary: Immigration enforcement cooperation between final destination and transit countries has increased in the last decades. However, the question whether these measures are successful in deterring undocumented migrants has not been previously explored by the empirical literature. This paper examines whether the Southern Border Plan, an immigration enforcement program implemented by the Mexican government in 2014, has curbed intentions of unauthorized migrants from El Salvador, Guatemala, and Honduras to migrate to the United States. Combining surveys from Central American and Mexican deportees and using a DiD approach, I find that increased enforcement in Mexico decreases the likelihood of attempting repeated unauthorized crossings. The results indicate that in the short-run the cooperation between destination and transit countries could be effective in deterring undocumented migrants.

Details: Germany: RUHR, 2018. 40p.

Source: Internet Resource: Accessed October 18, 2018 at:https://ideas.repec.org/p/zbw/rwirep/749.html

Year: 2018

Country: International

Keywords: Deportees

Shelf Number: 152879


Author: International Drug Policy Consortium

Title: Taking Stock: A Decade of Drug Policy: A Civil Society Shadow Report

Summary: Global drug control policies have been based on the general principles of eliminating the production, trade or use of any illegal psychoactive substance from the world. Yet policies which seek to reach that objective have involved harsh law-enforcement and even militarisation. These end up affecting the most vulnerable people who use drugs, subsistence farmers involved in illegal crop cultivation and small-scale traffickers because they are easier to apprehend than are wealthy and well-connected people. The collateral damages are human rights and lives - those of the most vulnerable and those of the voiceless. To quote the Deputy High Commissioner for Human Rights (May 2018), in a world that is meant to be more inclusive and where no one should be left behind, 'people who use drugs are not left behind. They are left outside'. A decade ago, the international community reiterated its aspiration to achieve a drug-free world. Yet over that decade, available data shows that the production, sale, and consumption of currently illegal drugs are soaring. So are the harms related to current policies, with dramatic increases in overdoses, prison overcrowding, HIV and hepatitis transmission, a more revenue-generating and increasingly violent illegal market, and in the condoning by some of extrajudicial killings against people who use drugs - killings that often take place in broad daylight. Ten years after the world's governments adopted at the UN the Political Declaration and Plan of Action on drugs, there is still little discussion on how to evaluate the impact of current policies, or on how to analyse the results of the policies implemented during this period. In 2014, there was a mid-term High-Level Review of the Political Declaration and Plan of Action. It resulted in a new negotiated document that reiterated the commitments, without providing any such 'High-Level Review'. Two years later, the 2016 UNGASS on drugs provided another opportunity to review the current approach, to no avail. Although progress was made in bringing in more visibility to issues related to health, human rights and development, the resulting Outcome Document failed to recognise the harmful consequences of the war on drugs approach. The international community is meeting again at a Ministerial Segment at the Commission on Narcotic Drugs in March 2019 to decide upon a common strategy for the next ten years. But how can we plan the future without a serious and far-ranging assessment of the past's errors and successes? How can we quantify the unintended consequences of drug control policies when they are not evaluated? Up until now, no comprehensive evaluation has been carried out either on progress towards achieving the 2009 targets or on the consequences of the past decade in global drug control on human rights, health, security, development, the environment, and on the lives of the millions of affected people worldwide. Furthermore, there is little appetite among countries for such a review from the UN, proving once more that drug policy remains mostly an ideological issue rather than a societal topic that needs to be addressed based on evidence, dialogue, and building consensus. In that vacuum, I welcome this Civil Society Shadow Report in which the International Drug Policy Consortium which provides us with an excellent overview of the progress and the lack of it made in the last decade, as well as highlighting the challenges and opportunities ahead – using all existing government-based and UN-based data, along with scientific and grey literature. drugs have reached record levels. Moreover, current drug policies are a serious obstacle to other social and economic objectives: progress on combating the HIV epidemic had been significant in the last 20 years, but is now stalled among people who inject drugs; prison overcrowding has worsened, with a fifth of the world's inmates being arrested for drug-related offences and mostly for drug use alone; and the 'war on drugs' has resulted in millions of people murdered, disappeared, or internally displaced. As the situation stands today, the major Sustainable Development Goals that concern gender equality, the protection of the environment, socioeconomic development, and the reduction of violence and corruption will not be achieved for an important part of the population because of current drug policies. But there is still hope for a better outcome and for the international community to do better during the 2019 high-level meeting. While the possibility of building a new negotiated political declaration and plan of action is unlikely with the lack of any monitoring and assessment apart from the current Shadow Report, the Vienna-based consensus that has driven countries to agree on the paths to control drugs is breaking, both at the multilateral and at the regional levels. It is our hope, at the Global Commission on Drug Policy, that the next decade in global drug policy will align with the 2030 Agenda for Sustainable Development to alleviate the pain and suffering of millions of people affected by current drug policies, with the objective of leaving no one behind. By providing the most comprehensive assessment of the past lost decade, I am certain that this Civil Society Shadow Report will greatly contribute to the global drug control debates and ensure that the coming decade will be better embedded in the international community's priorities of human rights, development, peace and security.

Details: IDPC, 2018. 136p.

Source: Internet Resource: Accessed October 22, 2018 at: http://fileserver.idpc.net/library/Shadow%20Report_FINAL_ENGLISH.pdf

Year: 2018

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 153037


Author: Merkle, Ortrun

Title: A Gender Perspective on Corruption Encountered during Forced and Irregular Migration

Summary: Policymakers are starting to pay more attention to the links between migration and corruption. This study explores a specific area of these links, by examining the ways in which corruption affects the migration journeys of women - be they regular, irregular, forced or voluntary. It does so by looking at experiences of corruption in countries of origin, transit and destination. The analysis is based on desk research and interviews with stakeholders and migrants conducted between April and May 2017. We find that corruption comes into play whenever legal options for migration are limited, and this seems to be a constant throughout all stages of the migration process of several migrant groups. While both men and women encounter corruption during the various stages of the migration process, this study finds that women are especially vulnerable to atypical forms of corruption, including sexual extortion ('sextortion') when their financial capital is limited. Women travelling alone are particularly vulnerable to different forms of corruption and sexual exploitation, which can have negative consequences on their short-, medium- and long-term mental and physical health. The report concludes that sextortion, which occurs at the intersection of sexual violence and corruption must be clearly defined as a form of corruption and a criminal offence. The report continues with policy recommendations for the country of origin, transit and destination both in the realm of anti-corruption as well as women's empowerment and concludes with suggestions for further research.

Details: Eschborn, Germany: Deutsche Gesellschaft fur Internationale Zusammenarbeit (GIZ), 2017. 63p.p.

Source: Internet Resource: Accessed October 22, 2018 at: https://i.unu.edu/media/migration.unu.edu/attachment/4665/A-Gender-Perspective-on-Corruption-Encountered-during-Forced-and-Irregular-Migration.pdf

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 153038


Author: Merkle, Ortrun

Title: A Study of the Link between Corruption and the Causes of Migration and Forced Displacement

Summary: The aim of the present study is to develop a theoretical framework explaining the links between corruption and migration, including various forms of migration such as forced and voluntary migration as well as forced displacement. This framework is suitable to be applied to different country contexts. It identifies how corruption impacts human security and thereby directly or indirectly leads to migration and displacement, develops research hypotheses and gives recommendations for addressing corruption as a cause of migration and displacement. Both migration and corruption are multi-faceted complex phenomena, which need to be examined in more detail before exploring the relationship between corruption, migration and forced displacement. This study uses a broad understanding of corruption explicitly including discussions about nepotism, patronage networks and political corruption rather than focusing solely on bureaucratic corruption. It focuses on the ways in which these different types of corruption threaten aspects of human security and thereby indirectly lead to migration. The framework also considers different forms of voluntary and forced migration as well as forced displacement to show a comprehensive picture. The second part of the report applies the theoretical framework to two case studies, Mali and Ukraine, to investigate in more detail what role corruption can play as a driver for migration and displacement. These case studies were selected as they offer a broad picture of different reasons for migration, variation in levels and types of corruption as well as socio-demographic factors. Mali is chosen as a case study because it is among the poorest and least developed countries in the world, with endemic corruption in the public and private sector. In addition, it is a migrant sending country, in which migration as a livelihood strategy has been employed for centuries and therefore can be seen as a norm rather than an exception. Recent political developments and the outbreak of conflict in which corruption and human security issues played an important part, make Mali a particularly interesting case study also for internal and forced displacement. Ukraine is equally interesting as corruption is a problem on all levels of the state. Corruption is among the highest in Europe and citizens have created major protest movements against corrupt governments twice in the last decade (the 'Orange Revolution' and 'Euromaidan'). Ukraine also sees significant migration movements to Europe and Russia including more than 300,000 international refugees in 2015 (World Bank, 2016) and about 1.7 million internally displaced persons (IDPs) (World Bank, 2016) as a result of the ongoing conflict in Eastern Ukraine. Relevant data for both case studies is gathered using semi-structured expert interviews. The research for this report identified only weak direct links of corruption as a push-factor for voluntary migration. As corruption is understood as a strong indicator that the overall state system is not functioning, people might consider migrating because they are generally tired of the system. This is in line with other research showing that general life dissatisfaction can motivate migration. The indirect links between corruption and voluntary and forced migration and forced displacement are found to be much stronger. All dimensions of human security can be strongly affected by corruption and therefore lead to migration and displacement. The effect of corruption on lack of (good) employment opportunities and on aid resources have been identified as the most prominent links to the decision to migrate in both Mali and Ukraine. High-level corruption, in particular nepotism and patronage systems, which tie economic and political elites closely together are identified as the most damaging types of corruption. The exact linkages are extremely case specific and require a deep understanding of the roots and types of corruption prominent in the country. Both the case of Mali and Ukraine show that there are even sub-national differences in the role corruption plays in shaping migration aspirations. It is therefore crucial not to generalise across different cases.

Details: Eschborn, Germany: Deutsche Gesellschaft fur Internationale Zusammenarbeit (GIZ), 2017. 188p.

Source: Internet Resource: Accessed October 22, 2018 at: https://migration.unu.edu/publications/reports/a-study-on-the-link-between-corruption-and-the-causes-of-migration-and-forced-displacement.html

Year: 2017

Country: International

Keywords: Migrants

Shelf Number: 153054


Author: Beck, Adrian

Title: Beyond Shrinkage: Introducing Total Retail Loss

Summary: While the word 'shrinkage' or 'shortage' has been in use for more than a 100 years to describe retail 'losses', it does not enjoy a universally agreed upon definition in terms of what is included and excluded when it is used, nor how the value of losses should be calculated. Often used to describe the difference between anticipated and actual levels of retail inventory, where the root causes of losses are typically unknown, it has become a catch all term used by the industry to describe a wide variety of retail-related losses, some of which relate as much to lost margin as they do lost stock. This lack of a universally agreed definition has led to existing industry surveys on shrinkage generating data which can be highly problematic to benchmark against, especially when it is unclear what types of loss have been included or excluded by respondents. In addition, the rapidly changing nature and scale of the risks retailers are now facing further undermines the applicability of the current ways in which losses are being defined and measured. This is particularly the case with the increasing use of new technologies and retail formats, which are generating new types of losses. Moreover, retailing is now able to generate a broader range of data points across the entire value chain - gone are the days when differences in anticipated and actual store stock levels were the only data game in town - new sources of data are now available to better understand how a broader range of losses are impacting upon retail businesses. Given all of this the Retail Leaders Industry Association's Asset Protection Leaders Council, commissioned research to look at how the retail industry currently understands the nature and extent of all the potential types of losses they presently experience, with a view to developing a new definition of loss and associated typology fit for the 21st Century retailing landscape. This report puts forward a new definition of 'Total Retail Loss' together with a typology made up of 33 categories of loss that span the entire retail environment, from shop theft in physical retail stores to frauds in corporate headquarters. It offers a unique way of thinking about how a much broader range of losses impact upon retail businesses, differentiating between the 'costs' of being a retailer and the 'losses' that negatively impact business profitability. In addition, the report offers detailed definitions of each of the categories of loss with a view to improving the accuracy of future benchmarking exercises. It is believed that by using Total Retail Loss, retail businesses in general, and loss prevention practitioners in particular, will be able to not only better understand the impact of current and future retail risks, but also make more informed choices about the utilization of increasingly scarce resources. For loss prevention specialists, it provides a unique opportunity to build upon and reinforce the critical role they can play in becoming agents of change within their retail businesses.

Details: Arlington, VA: Retail Industry Leaders Association (RILA), 2016. 61p.

Source: Internet Resource: Accessed October 23, 2018 at: https://www.rila.org/protection/resources/BeyondShrinkageReport/Documents/Total%20Retail%20Loss%20Report.pdf

Year: 2016

Country: International

Keywords: Crime Against Businesses

Shelf Number: 153067


Author: Freccero, Julie

Title: Toward an End to Child Marriage: Lessons from Research and Practice in Development and Humanitarian Sectors

Summary: While child marriage has been on the decline recent decades, there is a growing concern for its increased prevalence in crisis situations during conflict and natural disasters. The more typical underlying factors such as gender inequality and social norms, in combination with new factors such as protection risks and poverty, are leaving girls vulnerable in these settings. This report by the Human Rights Center at UC Berkeley Law gathers learnings from both humanitarian and development contexts to determine what Save the Children and related organizations can do to improve their response to this rising problem in their programming. This is done through a literature review of existing studies, a mapping of current programming, and key informant interviews with child marriage prevention practitioners. Find recommendations enclosed within the report.

Details: Berkeley: Human Rights Center, 2018. 94p.

Source: Internet Resource: Accessed October 24, 2018 at: https://resourcecentre.savethechildren.net/library/toward-end-child-marriage-lessons-research-and-practice-development-and-humanitarian-sectors

Year: 2018

Country: International

Keywords: Child Marriage

Shelf Number: 152872


Author: Chan, Jason

Title: The Digital Sin City: An Empirical Study of Craigslist's Impact on Prostitution Trends

Summary: The Internet facilitates information flow between sex workers and buyers, making it easier to set up paid sexual transactions online. Despite the illegality of selling sexual services online, Section 230 of Communications Decency Act shields websites from liability for unlawful postings by third parties. Consequently, websites such as Craigslist have become a haven for prostitution-related ads. With prostitution-related sites still in operation, it is imperative to understand the link between these sites and prostitution trends. Specifically, in this paper, we quantify the economic impact of Craigslist’s entry on prostitution incidence, and identify potential pathways in which the website affects the sex industry. Using a national panel data set for 1,796 U.S. counties from 1999 to 2008, our analyses suggest that entry of Craigslist to a county leads to a 17.58 percent increase in prostitution cases. In addition, the analyses reveal that a majority of prostitution activity on Craigslist are induced by organized vice groups, in addition to voluntary participation by smaller set of independent providers. Further, we find site entry has a stronger impact in counties with a past history of prostitution and produces spillover effects in neighboring locations that are not directly served by Craigslist. Sex workers providing niche sexual services are found to increase with site entry. In addition, we learn that site entry leads to an increase in transactions of existing workers and also attracts new workers to the market. We find that the increase in prostitution arrests does not catch up with the growth in prostitution trends brought in by Craigslist. Finally, we find complementarity effects between erotic and casual sex ads in leading to the increase of prostitution. Our results contribute broadly to the emerging literature on the societal challenges associated with online intermediaries and Internet penetration, and serve to provide guidelines for policy makers in regulating the sex industry in the Internet era.

Details: Information System's Research, 2017. 50p.

Source: Internet Resource: Accessed October 24, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3057722

Year: 2017

Country: International

Keywords: Online Crime

Shelf Number: 152865


Author: WildAid

Title: 25 Years After China's Rhino Horn Ban Poaching Persists

Summary: Executive Summary This year marks the 25th anniversary of China's ban on the domestic sale of rhino horn, and in Vietnam, the second most significant market for the product, a revised penal code banning sales came into effect just this year. A year after the 1993 decision to ban the domestic trade, the Chinese government removed rhino horn from the official traditional medicine books and poaching quickly began to fall. With rapid economic growth and rising incomes in China and Vietnam, rhino poaching escalated from 13 in 2007 to 1,215 rhinos reported killed in South Africa in 2014 while the price of rhino horn reached US$65,000 per kg, almost twice that of gold. Vietnam became established as a new market for rhino horn, where it was used as a supposed cure for a number of ailments from cancer to hangovers. It also became a transit country for illegal imports into China. Previously safe rhino populations in South Africa were targeted at a time when criminality and corruption were rife. Initially the Vietnamese market was supplied by "pseudo hunting" whereby fake trophy hunters carried out legal trophy hunting with the real purpose of illegally supplying the commercial horn trade. When this practice was ended in 2012 – after more than 200 cases - poachers became the principal source of rhino horns. The number of rhinos poached in South Africa has exceeded 1,000 every year since then, much of this inside Kruger National Park, but with a significant poaching increase in KwaZulu-Natal in recent years. Meanwhile in Asia there has been positive progress with prices falling and consumer awareness drastically improving. By early 2017, investigations in Vietnam and China found that the price of rhino horn had fallen by 70 percent to roughly half the price of gold. China seems to remain the main source of current demand with reliance on heavy trafficking through Vietnam. The government of Vietnam has strengthened its wildlife crime laws now dictating some of the stiffest penalties, especially for rhino horn. The key will be putting these laws to work with more effective enforcement efforts, especially in curbing the cross-border trade to China. Unfortunately, poaching continues in South Africa amidst pervasive corruption and failure to prosecute poaching and smuggling kingpins. While some poachers have been killed and some given lengthy prison sentences, the middlemen and leaders of the criminal syndicates, who are known to authorities, have largely gone unpunished. Also, only lip service has been paid to the universally recognized strategy of engaging local communities adjoining the reserves. Historically, trade bans imposed on rhino horn and ivory have resulted in increased consumer awareness, falling retail prices and poaching declines, as we saw with rhino horn in Taiwan in 1994 and more recently with ivory and elephant poaching in Kenya and Tanzania. We have made important progress, but several areas for improvement remain: - Use existing laws to arrest, prosecute and punish prominent sellers and end users in China and Vietnam, not just smugglers - Continue to raise consumer awareness and further reduce demand in China and Vietnam - Arrest and punish organizers and kingpins in South Africa and Mozambique, not just poachers - Crack down with an anti-corruption drive in parks and reserves in South Africa - Establish a "wildlife court" in South Africa to strengthen judicial effectiveness on wildlife crime - Improve investigation capacity and speed up criminal prosecutions

Details: San Francisco: WildAid USA, 2018. 16p.

Source: Internet Resource: Accessed October 28, 2018 at: https://wildaid.org/wp-content/uploads/2018/09/25-Years-After-Chinas-Ban.pdf

Year: 2018

Country: International

Keywords: Illicit Wildlife Products Trade

Shelf Number: 153125


Author: Meleshevich, Kirill

Title: Online Information Laundering: The Role of Social Media

Summary: Revelations that the Kremlin exploited social networking tools to disseminate and promote divisive content in the United States and Europe have highlighted the role of those platforms in the proliferation of disinformation. While a great deal of attention has been given to both the creators and consumers of disinformation, far less focus has been paid to how disinformation spreads from questionable to credible sources online. In order for social media companies to combat the misuse of their platforms by state and non-state actors, it is important to recognize how the online information space operates and what tactics are used by those exploiting it. Operational similarities between the placement and spread of disinformation online and the laundering of ill gotten financial gains can provide useful insights for analysts and policymakers. By understanding those similarities, governments and the tech sector can fight disinformation by considering many of the techniques honed by anti-money laundering practitioners.

Details: Washington, DC: Alliance for Securing Democracy, 2018. 7p.

Source: Internet Resource: Accessed November 1, 2018 at:https://securingdemocracy.gmfus.org/wp-content/uploads/2018/06/InfoLaundering_final-edited.pdf

Year: 2018

Country: International

Keywords: Anti-Money Laundering

Shelf Number: 153133


Author: Berger, J.M.

Title: The Alt-Right Twitter Census: Defining and Describing the Audience for Alt-Right Content on Twitter

Summary: The so-called 'alt-right' is an amorphous but synchronized collection of far-right people and movements, an umbrella label for a number of loosely affiliated social movements around the world, although its centre of gravity is in the United States. Many factors have contributed to the alt-right's rise to prominence, but one of the most visible is its online presence. Alt-right views have been promoted online by a small army of trolls and activists staging harassment campaigns, pushing hashtags and posting links to extremist content and conspiracy theories on social media. Since 2016, the alt-right and its allies have held an increasingly prominent place in American and European politics, rallying support behind a variety of causes and candidates. This study seeks to evaluate the alt-right's online presence with robust metrics and an analysis of content shared by adherents. The alt-right has many components online; this report will primarily examine its presence on Twitter, in part because the movement is particularly active on that platform, and in part because Twitter's data access policies allow for more robust evaluation than is possible on other platforms. This report will: - Create a demographic and identity snapshot of a representative portion of the audience for alt-right supporters on Twitter - Examine content shared within the dataset - Describe the methodology used to derive these findings - Propose avenues for further research based on this report's findings

Details: Dublin: VOX-Pol Network of Excellence, 2018. 59p.

Source: Internet Resource: Accessed November 3, 2018 at: https://www.voxpol.eu/download/vox-pol_publication/AltRightTwitterCensus.pdf

Year: 2018

Country: International

Keywords: Extremism

Shelf Number: 153242


Author: Goredema, Charles

Title: Not above the law: The role of lawyers in combating money laundering and illicit asset flows.

Summary: Lawyers frequently find themselves caught between their obligations to governmental authorities and their fidelity to their clients. This becomes particularly problematic when, as intermediaries in business transactions, they become aware of, or are requested to facilitate, illicit financial flows (IFFs). Lawyers can become complicit in, or even initiate, economic crime, as the case studies in this report show. They may become complicit through negligence. The extent to which this occurs on a global scale was revealed by the Panama and Paradise papers, but it is of particular concern for developing economies, where such crimes can have especially devastating effects. Recognizing the dilemma lawyers face when caught between an oath to client confidentiality and a responsibility to report financial misconduct, this report suggests ways in which they might contribute to anti-money-laundering (AML) measures, in particular stressing the importance of client due diligence (CDD), the involvement of lawyers in national risk assessments and the need to tailor combating strategies to judicial environments.

Details: Geneva: Global Initiative Against Transnational Organized Crime, 2018. 18p.

Source: Internet Resource: Accessed November 3, 2018 at: http://globalinitiative.net/wp-content/uploads/2018/10/TGIATOC-What-can-lawyers-do-Policy-Note-1971-web.pdf

Year: 2018

Country: International

Keywords: Economic Crimes

Shelf Number: 153250


Author: Paoli, Giacomo Persi

Title: The Trade in Small Arms and Light Weapons on the Dark Web: A Study

Summary: The potential role of the dark web in facilitating trade in firearms, ammunition and explosives has gained increased public attention following recent terrorist attacks and other criminal activities worldwide. In fact, the hidden and obscured parts of the web are used by criminals and others to access a worldwide market where it's possible to procure or sell a wide range of weapons and associated products through encrypted marketplaces and vendor shops. Following the outcomes of the Third United Nations Conference to Review Progress Made in the Implementation of the Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small Arms and Light Weapons in All Its Aspects, which acknowledged the importance of considering new challenges and opportunities arising from new forms of illicit trafficking, this Occasional Paper summarises the main findings and implications of the first empirical study investigating the scale and scope of arms trafficking on the dark web. The findings of this study shed light on the scale and scope of arms trafficking on the dark web, illustrating the range of weapons traded, their market price and most common transit routes. In addition, this Occasional Paper discusses the implications of this growing phenomenon for law enforcement agencies and policy makers, highlighting the key role that firearms control measures continue to play in the presence of new forms of trafficking.

Details: New York?: UNODA, 2018. 107p.

Source: Internet Resource: UNODA Occasional Papers No. 32: Accessed November 3, 2018 at: https://s3.amazonaws.com/unoda-web/wp-content/uploads/2018/10/occasional-paper-32.pdf

Year: 2018

Country: International

Keywords: Cybercrime

Shelf Number: 153252


Author: Berger, J.M.

Title: Nazis vs. ISIS on Twitter: A Comparative Study of White Nationalist and ISIS Online Social Media Networks

Summary: The Islamic State, also known as ISIS, has distinguished itself as a pioneer in the use of social media for recruitment. But, while ISIS continues to be one of the most influential terrorist groups in the material world, other extremists are closing the gap in the virtual realm. On Twitter, ISIS's preferred social platform, American white nationalist movements have seen their followers grow by more than 600% since 2012. Today, they outperform ISIS in nearly every social metric, from follower counts to tweets per day. This study examines and compares the use of Twitter by white nationalists, Nazi sympathizers, and ISIS supporters respectively, providing some preliminary comparisons of how each movement uses the platform. Major findings include: 1. Major American white nationalist movements on Twitter added about 22,000 followers since 2012, an increase of about 600%. The increase was driven in part by organized social media activism, organic growth in the adoption of social media by people interested in white nationalism, and, to some extent, the rise of organized trolling communities seeking to flood social media platforms with negative content, regardless of participants' actual beliefs. 2. The most popular theme among white nationalists on Twitter was the concept of “white genocide,” the notion that the "white race" is directly endangered by the increasing diversity of society. Social media activists tweeted hundreds of times per day using repetitive hashtags and slogans associated with this trope. 3. Followers of white nationalists on Twitter were heavily invested in Donald Trump's presidential campaign. White nationalist users referenced Trump more than almost any other topic, and Trump-related hashtags outperformed every white nationalist hashtag except for white-genocide within the sets of users examined. 4. White nationalism is highly factionalized, and includes a number of competing movements. On Twitter, accounts focused on Nazi sympathies were more prevalent than any other white nationalist movement, and pro-Nazi propaganda was tweeted more often than any other content. 5. Within the broader community of white nationalists, organized recruitment, proselytization, and social media activism were primarily carried out by a highly interconnected network of users drawing on common themes/ Activity with a Nazi slant was more organic and less organized. Recruitment focused on the theme of white genocide and used terminology drawn from popular entertainment. 6. The white nationalist datasets examined outperformed ISIS in most current metrics and many historical metrics. White nationalists and Nazis had substantially higher follower counts than ISIS supporters, and tweeted more often. ISIS supporters had better discipline regarding consistent use of the movement's hashtags, but trailed in virtually every other respect. The clear advantage enjoyed by white nationalists was attributable in part to the effects of aggressive suspensions of accounts associated with ISIS networks. 7. Small groups of users tweeting in concert at high volumes can amplify their effect, causing hashtags and content to trend in numbers significant enough to prompt mainstream media coverage. White nationalist sympathizers used this strategy in October 2015 with calls to boycott Star Wars: The Force Awakens as "anti-white." Media coverage can lead to increased curiosity about extremist groups, feeding their social media success. 8. In general, these findings suggest that the battle against ISIS on social media is only the first of many challenges to mainstream, normative values, some of which are ongoing, but most of which lie ahead.

Details: Washington, DC: Program on Extremism at George Washington University, 2016. 33p.

Source: Internet Resource: Accessed November 6, 2018 at: https://cchs.gwu.edu/sites/g/files/zaxdzs2371/f/downloads/Nazis%20v.%20ISIS%20Final_0.pdf

Year: 2016

Country: International

Keywords: Extremist Groups

Shelf Number: 153332


Author: Hays, G.

Title: Beyond State Control: Improvised and Craft-produced Small Arms and Light Weapons

Summary: Improvised and craft-produced small arms and light weapons are widespread in many parts of the world, even if they account for a small fraction of global holdings. More data is needed before researchers can arrive at a reliable estimate of these holdings, yet the figure is doubtless in the millions. These weapons have been manufactured for as long as firearms have existed, typically by hand or in small workshops. Many are based on principles that are simple to replicate, such that individuals need only conduct minimal research to produce the most basic examples. However, advancements in materials science, production technologies, and globalized communications have meant that more effective and efficient designs are now available to criminals, armed groups, and pseudo-states. While craft producers are not manufacturing advanced man-portable air defence systems (MANPADS) or antitank guided weapons (ATGWs), they are constructing other types of light weapons - including mortars, recoilless guns, and grenade launchers - with some regularity. This report presents the results of a long-term assessment of the broad and loosely defined field of improvised and craft-produced small arms and light weapons. In evaluating the nature and scale of production, acquisition patterns, and implications for law enforcement and policy, it identifies producers, users, and their motivations, along with emerging trends that may require monitoring and action. The study presents data and evaluations based on original and desk-based research, including interviews and hands-on technical appraisals of dozens of improvised and craft-produced weapons. Improvised and craft-produced small arms and light weapons - which vary widely in terms of quality and safety - remain an important source of firepower for a wide range of actors, including tribal groups, poachers, criminals, insurgent groups, and even some states and quasi-state groups. In some areas, these weapons account for the vast majority of firearms used in crime; in others, their production is institutionalized, providing essential income for local gunsmiths. Some of these weapons are used locally, others are trafficked on a national, regional, or international scale. In Iraq, Libya, Syria, Ukraine, and elsewhere, armed non-state actors are regularly developing and employing new designs of improvised and craft-produced small arms and light weapons. In the future, it may be possible to bypass traditional manufacturing and instead to produce entire firearms by using novel techniques, such as 3D printing. For now, however, most of those who cannot obtain conventionally-produced alternatives will continue to manufacture weapons using relatively low-tech means. Regardless of how they are made, improvised and craft-produced weapons will remain a significant constituent in the arsenals of non-state actors and criminal groups. At the same time, they will pose global challenges to law enforcement and policy-makers, who will require increasingly thorough documentation of their use in crime and conflict to be able to recognize trends and curb illicit proliferation.

Details: Geneva:; Small Arms Survey, Graduate Institute of International and Development Studies, 2018. 136p.

Source: Internet Resource: Accessed November 7, 2018 at: http://www.smallarmssurvey.org/fileadmin/docs/U-Reports/SAS-improvised-craft-weapons-report.pdf

Year: 2018

Country: International

Keywords: Firearms

Shelf Number: 153352


Author: Islamic Relief

Title: An Islamic Human Rights Perspective on Early and Forced Marriages: Protecting the Sanctity of Marriage

Summary: Marriage, in the Islamic worldview, is an important part of building healthy and protective relationships, families, and societies. In order for an Islamic marriage to be valid, it has to meet certain criteria, which ensures the health, security and wellbeing of the couple, their families and their communities. In Muslim communities around the world, marriage takes on many local customs and cultural forms. Islam allows this cultural diversity as long as the practices do not cause harm - specifically, as long as they do not contradict the principles of Islamic law that seek to protect human beings. Islamic Relief is an independent aid agency that is guided by Islamic humanitarian principles and seeks to end poverty and suffering around the world, especially among vulnerable groups. As part of our commitment to ending suffering, we seek to protect children and establish gender justice by ending gender-based violence. Early and forced marriage (EFM) often take place in communities where there is a wider social context that denies women's and children's rights, and where EFM persists alongside other harmful practices such as female genital mutilation/cutting (FGM/C), gender-based violence and child abuse. We are committed to seeing an end to these harmful practices that are prevalent in many Muslim communities and often wrongly associated with Islamic teaching. Early and forced marriages (EFM) are practices that violate the God-given human rights of all, particularly women and children, as well as the sanctity of marriage in Islam. This guide presents an Islamic human rights perspective on EFM for those seeking to understand the issues and working to end the practices in Muslim communities. Islamic Relief believes that changing perceptions in order to end harmful practices in Muslim communities is best done through better understanding and raising awareness of human rights as enshrined in Islamic law. We call upon parents and guardians, imams and community leaders, teachers and health workers, governments and NGOs to work together to understand why EFM is practiced in Muslim communities, raise awareness about the harm it causes, tackle the complex issues that lead to its prevalence and seek to change perceptions and behaviour by promoting a better understanding of human rights enshrined in Islamic teaching.

Details: Birmingham, UK: Islamic Relief, 2018. 16p.

Source: Internet Resource: Accessed November 8, 2018 at: https://www.girlsnotbrides.org/wp-content/uploads/2018/05/IRW-Islamic-persepctive-on-CM.pdf

Year: 2018

Country: International

Keywords: Forced Marriage

Shelf Number: 153358


Author: Jelsma, Martin

Title: Connecting the dots... Human rights, illicit cultivation and alternative development

Summary: How can we resolve the tensions between current drug control policies and states' human rights obligations? The international human rights framework clearly establishes that, in the event of conflicts between obligations under the UN Charter and other international agreements, human rights obligations take precedence. As legally regulated cannabis markets start to grow, now is the time to secure a legitimate place for small farmers using alternative development, human rights and fair trade principles. There are clear tensions between current drug control approaches and states' human rights obligations. Over the last years, the need to respect human rights in drug control policies has become more widely accepted, with the UN and EU making explicit reference to it and creating some room for alternative approaches. However, until today, supply reduction policies are still frequently implemented in ways that violate the human rights of subsistence growers of coca, cannabis and opium poppy. This is due to forced eradication and ill-designed crop substitution programmes, which result in repercussions such as the loss of livelihoods, stigmatisation and marginalisation of small-scale producers, extortion, imprisonment, displacement, environmental degradation, and the criminalisation of indigenous and traditional cultural practices. In envisioning the way forward for aligning drug policies around illicit cultivation with human rights obligations, policy makers could draw upon lessons learned in successful drug policy reforms addressing consumption, especially as pertains to decriminalisation, harm reduction, proportionality of sentences, alternatives to incarceration and involvement of affected populations in policy making. Ultimately, in some cases, it will also be necessary to challenge certain inconsistencies and outdated paradigms of the drug control treaty regime that constitute irreconcilable obstacles for truly harmonizing drug control and human rights obligations. Especially with regards to indigenous rights, there is an undeniable conflict between international human rights obligations and the UN drug control treaties. Key Points -- Around the world, millions of farmers and other people living in rural areas depend on the cultivation of coca, opium poppy and cannabis to reduce food insecurity and to secure an adequate standard of living for themselves and their families. Gradual reduction, proper sequencing, tolerance for local culture and community participation were relatively common features in alternative development programmes until the mid-1980s. Today, in spite of the improved discourse around alternative development, the application of such principles in practice has become the exception rather than the rule. The UN drug control conventions have an inherent bias towards criminalisation and repressive law enforcement, establishing floors with no ceilings. However, the international human rights framework clearly establishes that, in the event of conflicts between obligations under the UN Charter and other international agreements, human rights obligations take precedence. Forced eradication in the absence of alternative livelihoods violates people's rights to live a life in dignity and to be free from hunger, as well as their right to an adequate standard of living. This represents, therefore, a policy option that is in conflict with international human rights law. Increases in illicit cultivation, as recently reported for Colombia and Afghanistan, tend to trigger a political response of more repression and eradication that risks making things worse, especially in circumstances where drugs and conflict dynamics are interconnected. Peace building and sustainable development both require time, sufficient resources and community ownership. The drug control treaties leave sufficient flexibility to allow states to refrain from forced crop eradication or incarceration of subsistence farmers, as they refer explicitly to providing measures for social reintegration and rural development "as alternatives to conviction or punishment". The dominance of repressive realities on the ground and the lack of commitment to alternative development by donors have turned the global discourse around alternative development largely into a "virtual reality", perpetuating the myth that a human rights-based and development-driven approach to illicit cultivation exists in practice. In spite of multiple references in international drugs policy documents to the importance of community involvement and a gender perspective, the space for serious dialogue, in which community representatives including women have substantial leeway for negotiation about the design and implementation of alternative development projects, is still very limited and often non-existent. Coca, opium poppy and cannabis have been grown for centuries for traditional medicinal, cultural and ceremonial purposes. The 1961 Single Convention on Narcotic Drugs' enshrinement of a zero-tolerance approach towards those practices and establishment of an obligation for states to abolish them represents a historical mistake rooted in colonial attitudes and cultural insensitivity. Countries truly committed to human rights protection in drugs policy must recognise that, when it comes to indigenous, cultural and religious rights, full compliance will require the amendment of, or derogation from, certain provisions in the drug control treaties. The expansion of licit uses of poppy, coca and cannabis offers opportunities for farmers to transition away from dependence on the illicit drugs market. Alternative development, human rights and fair trade principles need to be employed to secure a legitimate place for small farmers in the fast-growing legally regulated cannabis markets. The UN Guiding Principles on Alternative Development and the development chapter of the 2016 UNGASS outcome document should be implemented in coherence with the UN Tenure Guidelines, the Rights of Indigenous Peoples, the Rights of Peasants and the Sustainable Development Goals to ensure that "no one is left behind."

Details: Amsterdam: Transnational Institute (tni), 2018. 64p.

Source: Internet Resource: Accessed November 12, 2018 at: https://www.tni.org/files/publication-downloads/tni-2018_connecting_the_dots.pdf

Year: 2018

Country: International

Keywords: Crop-Substitution Programs

Shelf Number: 153394


Author: United Nations Office on Drugs and Crime. Independent Evaluation Unit

Title: Global Programme for Implementation of the Doha Declaration: towards the promotion of a culture of lawfulness

Summary: The aim of the Global Programme is to ensure the effective follow-up to and implementation of the Doha Declaration: towards the promotion of a culture of lawfulness'. The intent of the Programme is to provide support and technical assistance to Member States, upon their request, in specific areas covered by the Declaration. A funding agreement between UNODC and the Government of Qatar was signed in November 2015, with the Programme scheduled to last from 1 March 2016 through 31 December 2019. The Programme's budget is $49,149,351. The overall Programme Objective is the effective implementation of the Doha Declaration. The Programme has five outcome areas, each with links to specific aspects of the Declaration. Outcome 1 is the Implementation of international standards strengthened in judicial integrity and the prevention of corruption in the judiciary. The focus of this outcome area is 'resilient, reliable and transparent institutions, and the development and application of international standards in judicial integrity and the prevention of corruption'. Outcome 2 is Prison administrations and other relevant stakeholders reinforce delivery of rehabilitation programmes for prisoners. The focus is on 'holistic crime prevention and fair, humane and effective criminal justice systems: A second chance in life - fostering the rehabilitation and social integration of prisoners'. Outcome 3 is Youth crime is prevented through sports-based programmes. The focus of this outcome area is a 'holistic crime prevention and fair, humane and effective criminal justice systems: Preventing youth crime through sports-based programmes'. Outcome 4 is Establishment of the E4J Initiative. The focus of this outcome area is development, implementation and maintenance of the Education for Justice Initiative (E4J) for all levels of education. Outcome 5 is Increased awareness of the Doha Declaration. The focus is somewhat different to the other four outcomes, as the intent is that there be comprehensive media, communication, advocacy and branding strategies for the implementation of all Programme activities. In compliance with UNODC evaluation rules and regulations, and the Programme document, the Global Programme is subject to mid-term and final independent evaluations. The findings and recommendations of the evaluation are mainly intended for the Programme team, to improve programme implementation, monitoring and reporting. The unit of analysis of the evaluation was the entire Global Programme, covering the period from 3 March 2016 through 1 December 2017. The evaluation methodology conforms to UNODC Norms and Standards for Evaluation and specifically considered primary and secondary data sources. A qualitative approach was taken based on the evaluation team's understanding of the programme's design and activities, and the requirements of the ToR. The main data sources consisted of programme documentation and programme stakeholders, although external informants and documents were also accessed. 91 documents were reviewed for the evaluation. The documents analysed include a range of reports (Programme, component, participant), products and tools, and externally produced documents. A total of 82 people were interviewed, several on more than one occasion, including the 8 designated Core Learning Partners (CLPs), and stakeholders in 28 countries. The 82 interviewees included 38 women and 44 men. Many interviews involved more than one evaluator, to facilitate note-taking and triangulation. The evaluation combined investigator triangulation with methodological triangulation, involving document review, interviews with multiple stakeholders, and observation where possible in meetings, interviews and other opportunities related to the Programme during the field mission to UNODC HQ in Vienna. The team synthesised and analysed data collected during document review and primary research. This analysis was drawn together into a set of coherent findings in response to the evaluation questions, balancing the views of external and internal informants and documents, to maximize reliability. Based on these findings, the evaluation team formulated its conclusions, a set of key lessons learned and recommendations. This report is the product of this synthesis and formulation process. Relevance - In supporting the functioning and quality of aspects of the criminal justice system, and promoting diversions from criminal activity, the Programme is laying the foundation for security, which is now widely recognised as a precondition for sustainable development. Since the inception of the Global Programme a total of more than 9,700 stakeholders, primarily judges, prison practitioners, academics, teachers, sports coaches, representatives of relevant NGOs and an increasing number of children and youth across more than 158 countries have been reached through the activities carried out under the programme. More than 4,000 stakeholders from 121 countries benefitted from a range of capacity-building activities, including conferences, workshops and training events. A further approximately 5,600 stakeholders from 125 countries were exposed to awareness raising through the participation of the Programme team in the events of other organisations. Judicial Integrity - Implementation of the Judicial Integrity component builds on 20 years of work of UNODC in this area, which has facilitated building the foundation for the still nascent Global Judicial Integrity Network. The establishment of the Network has been prioritised, and is generating considerable interest, although its ongoing effectiveness and buy-in by key stakeholders is not yet assured. Other core outputs are advancing more slowly. At domestic level, training on judicial ethics will require widespread and deep dissemination and needs to be complemented by other measures aimed to enhance integrity in order to be fully effective. Thus, the link with technical assistance is vital, as a means of developing specific tools that tackle local level challenges. Prison Reform - Prison administrations require support in the development of workable business plans, to ensure that the prisoner rehabilitation programme concentrate on training and benefitting prisoners, rather than focusing on becoming an income source for prisons. UNODC is well placed for this role as a trusted partner of national governments and with national and regional officers on the ground. UNODC guidance material must be 'user-friendly' in order to be genuinely of value, and in this context, it is important to focus on practical guidance rather than normative information. Despite working in some countries where civil society is still fragile, the Programme has made good progress in finding CSO partners and raising their capacity. Unexpected challenges to creating a 'global brand of prison products' have absorbed management time and could prove distracting from other activities. Youth Crime Prevention - The combination of sports activities with life-skills is innovative in the crime/drug prevention field and demonstrates that component management is responsive to changes in context. Partnering with international sports organisations and local NGOs has been useful for getting a clearer understanding of sport as a vehicle for reaching out to vulnerable youths. Local knowledge and rigorous research methods are being used for identifying target groups and field locales. Efforts to raise awareness of the use of sports to deter crime are still in the early stages, and to date have primarily targeted counterparts such as government officials and teachers. Working with governments can produce multiplier effects via government-led sport initiatives and school-based programs, although this does not necessarily target marginalised youth without specific outreach activities. In this regard the programme's partnership with NGOs that work with youth outside schools is crucial. The combination of sports with life-skills fills a gap in the suite of UNODC resources that can be adapted for use elsewhere. The E4J Initiative - A range of activities are taking place and being developed in E4J, focused mainly on materials, curricula and games, across the three levels of education. Events, focus groups and ad hoc piloting with teachers and learners have contributed to this shaping and testing of E4J material and games, both digital and non-digital. It is not certain though that quality materials can be produced by the end of the Programme, which is subject to skills and capacity within current IT resources and their ability to implement defined games and resources for the E4J initiative. Further, with delays in implementing the E4J website, the intended digital space for uploading and sharing resources does not yet exist. The absence of specific technical, educational inputs impacts on the relevance and detail of E4J content. One aspect of this was the delay in finalising a contractual agreement with UNESCO on their contributions to the Programme, which include a number of key areas of focus. Another aspect is the absence of a dedicated education and learning expert on staff, to address specific technical areas. Finally, work with academic institutions or learning organisations in producing tertiary modules could help to widen the angle of content covered and support a clearer understanding of what makes them meaningful. Such affiliations could also help to ensure that programming develops according to standard principles and practices of education and learning, including learning assessment to determine quality. Visibility - The basic frameworks of the communications approach are in place (the brand, strategies, tools and key personnel), and the strength of stories and sharing approaches are building over time as the programmatic results become more evident. Since early 2017, monthly website views and the Twitter account have begun to show increased reach (from less than 20,000 per month to almost 80,000 (website) and from 25,000 to more than 100,000 (Twitter). Since inception, more than 1.8 million people have been reached through Twitter, Facebook and LinkedIn on matters relating to the Global Programme, and approximately 450,000 people have visited the Global Programme’s website. More than 50 articles and other news stories were published by the Programme during the second half of 2017. However, the visibility strategy and approach are not yet at a stage where they are visibly supporting and reinforcing the overall achievement of the Programme's outcomes in a significant way, and significant pressures remain on the visibility team to continue to build momentum, and to consolidate recent gains. All communications tools, including any specific websites planned for Programme components, must be operational at the earliest possible moment. Design - According to the findings of UNODC's Independent Evaluation Unit’s recent metaanalysis, 'independent evaluators stress that the ability to manage for results critically depends on the development of a sound design' . The Global Programme should have had a stronger focus on sound design, specifically at its initiation, although no resources were dedicated to programme development. The Programme would have benefited from a defined inception phase as well as a more elaborate and better-funded formulation process. The approach to preparation of the Programme is reflected in the quality of the logframe, which has not provided a strong framework for identification of anticipated results, nor a fully developed methodology to measure and report results over time, for Programme direction and improvements to implementation. Efficiency - There are a number of areas in current management and coordination arrangements that can be improved in order to more efficiently contribute to timely and effective implementation of the Programme, and to facilitating the achievement of the objectives, outcomes and outputs. More systematic information sharing among components, and closer physical location of their respective teams, would promote greater synergies and cohesion. Sustainability - Although some steps are being taken through component activities, and there are positive signs of nascent stakeholder ownership, overall the Programme has given a low priority to sustainability. A focus on sustainability planning is now critical, especially for the Judicial Integrity and E4J components, which are undertaking ambitious new directions. Ensuring that these initiatives leave behind something of continuing value will be a significant challenge. Human rights and gender equality - The Programme sets out to support effective, fair, humane and accountable criminal justice systems and to promote the human rights and fundamental freedoms for all, in particular for those affected by crime, and those who may be in contact with the criminal justice system. The human rights framework is thoroughly referenced, and permeates through all components, but there are areas where a greater focus in implementation would respond more effectively to design intentions, and where greater emphasis on specific human rights outcomes in reporting would be of benefit. Despite positive efforts in some activities, a stronger, more holistic approach to implementation as guided by the framework, and incorporating gender equality, is required to align with the pronounced emphasis in Programme literature, with a more detailed and visible emphasis on the integration of human rights and gender equality frameworks, through Programme initiatives, with beneficiary agencies and target groups.

Details: Vienna: UNODC, 2018. 117p.

Source: Internet Resource: Mid-term Independent Project Evaluation Report: Accessed November 12, 2018 at: https://www.unodc.org/documents/evaluation/Independent_Project_Evaluations/2018/GLOZ82_Mid-term_Independent_Project_Evaluation_Report_June_2018.pdf

Year: 2018

Country: International

Keywords: Crime Prevention

Shelf Number: 153397


Author: Global Women's Institute

Title: Intersections of violence against women and girls with state-building and peace-building: Lessons from Nepal, Sierra Leone and South Sudan

Summary: As part of the What Works to Prevent Violence Against Women and Girls program, funded by the UK Department for International Development, this study draw on three case countries - Nepal, Sierra Leone and South Sudan - to address gaps in evidence and understanding on violence against women and girls during post-conflict transition. In doing so, the study aims to increase recognition of the potential for state-building and peace-building processes to more effectively institutionalize approaches to violence against women and girls, and the role that addressing such violence can play in advancing sustainable peace.

Details: Washington, DC: Global Women's Institute, The George Washington University, 2018. 101p.

Source: Internet Resource: Accessed November 13, 2018 at: https://globalwomensinstitute.gwu.edu/sites/g/files/zaxdzs1356/f/downloads/P784%20IRC%20What%20Works%20Report_LR.pdf

Year: 2018

Country: International

Keywords: Gender-Based Violence

Shelf Number: 153402


Author: Academic Council on the United Nations System (ACUNS) Vienna Liaison Office

Title: Femicide Volume X: Contemporary Forms of Enslavement of Women and Girls

Summary: Since 2013 the ACUNS Vienna Liaison Office has worked hard to provide a platform for those who dedicate their resources to fighting gender-related violence against women and girls, including the killing of women (femicide), its most severe manifestation. Hence, over the years FEMICIDE has become an important resource book for international institutions, scholars and practitioners. Connecting the right people has always been at the top of our agenda. We are convinced that it is only by working together that we can end gender-related violence worldwide. FEMICIDE X reflects this important principle. International organisations, NGOs and independent researchers have come together to help produce this awareness-raising publication on contemporary forms of slavery, which touches upon many important and, sadly, overlooked issues. In the first part of this Volume important statements give an overview of past actions to eliminate violence against women and what needs to be done in the future. There then follows a collection of reports and articles on modern-day enslavement of women and girls, a practice that is still commonplace in too many parts of this world. Further, we provide a review of the ACUNS Vienna Liaison Office symposium on "Ending Impunity for Gender-related Killing of Women and Girls - State Responsibility and Accountability", which took place in May 2018. There is then a short preview of our next volume on cyber bullying as a form of violence against women. The last section of FEMICIDE X is dedicated to the efforts and achievements of the civil society to combat femicide. FEMICIDE X is meant to be a wake-up call and provides a glimmer of hope at the same time. Countless women and girls suffer slavery and other horrible situations every day. However, the hard work being undertaken on so many sides to combat violence against women has not been in vain. Much has changed as a result of this work; many have been saved, and many more will be saved in the future.

Details: Vienna: The Council, 2018. 100p.

Source: Internet Resource: Accessed November 13, 2018 at: https://acuns.org/wp-content/uploads/2018/10/Femicide-Volume-X.pdf

Year: 2018

Country: International

Keywords: Femicide

Shelf Number: 153403


Author: Walmsley, Roy

Title: World Prison Population List: twelfth edition

Summary: This twelfth edition of the World Prison Population List gives details of the number of prisoners held in 223 prison systems in independent countries and dependent territories. It shows the differences in the levels of imprisonment across the world and makes possible an estimate of the world prison population total. The figures include both pre-trial detainees/remand prisoners and those who have been convicted and sentenced. The information is the latest available at the end of September 2018. The data are presented in two parts. Part one, tables 1-5, sets out prison population totals, rates and trends for each individual country. Part two, tables 6-8, provides data on prison population totals, rates and trends by continent, and shows that in recent years a number of countries have recorded substantial changes in prison population levels (some increases and some decreases).

Details: London: Institute for Criminal Policy Research, 2018. 19p.

Source: Internet Resource: World Prison Brief: Accessed November 15, 2018 at: http://www.prisonstudies.org/sites/default/files/resources/downloads/wppl_12.pdf

Year: 2018

Country: International

Keywords: Criminal Justice Statistics

Shelf Number: 153472


Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Sexual Extortion and Nonconsensual Pornography

Summary: The rapid evolution of technology and the increasingly widespread use of the Internet, have changed the face of child sexual exploitation globally. Child sexual exploitation includes, but is not limited to: enticing, manipulating, or threatening a child into performing sexual acts in front of a webcam; grooming children online with the goal of sexually exploiting them; and distributing child sexual abuse material online.2 Sex offenders have become proficient in using technology to engage in child sexual abuse by utilizing the Internet as a vehicle to meet children in order to prepare them for sexual encounters, or even to target, manipulate, and lure them into sex trafficking. While the vulnerability of children to sexual predators is not new, the tools predators use and the language to describe various types of online child sexual abuse have changed remarkably. Two forms of online child sexual exploitation have emerged as pervasive threats to children's safety around the world: sexual extortion, commonly referred to as "sextortion," and nonconsensual pornography or nonconsensual sharing of intimate images, also often referred to as "revenge pornography."

Details: Alexandria, VA: The Centre, 2018.46p.

Source: Internet Resource: Accessed November 15, 2018 at: https://riselearningnetwork.org/wp-content/uploads/2018/11/Sexual-Extortion_Nonconsensual-Pornography_final_10-26-18.pdf

Year: 2018

Country: International

Keywords: Child Grooming

Shelf Number: 153477


Author: Thomson Reuters Foundation

Title: Combating Sextortion: A Comparative Study of Laws to Prosecute Corruption Involving Sexual Exploitation

Summary: Sextortion - as termed by the International Association of Women Judges - is the abuse of power to obtain a sexual benefit or advantage. It is a pervasive yet under-reported form of corruption in which sex, rather than money, is the currency of the bribe. It is not limited to certain countries or sectors, but can be found wherever those entrusted with power lack integrity and try to sexually exploit those who are vulnerable and dependent on their power. Examples range from government officials granting permits in exchange for sexual favors, to teachers and employers trading good grades and career opportunities for sex with students and employees. This report is a landscape study of legal and institutional frameworks for combating sextortion in nine jurisdictions: Argentina, Australia, Brazil, Canada, Kenya, Mexico, Taiwan, Uganda and the United Kingdom. In each jurisdiction, the research identifies: (i) how sextortion manifests itself, for example in government, educational or other settings; (ii) the existing legal framework for addressing sextortion, including statutory provisions and case law; (iii) institutional and other barriers to effective prosecution, including legal gaps, resource constraints, or cultural and societal pressures; (iv) resources in the form of tools or organizations that provides support for efforts to combat sextortion.

Details: London: Thomson Reuters Foundation, 2015. 199p.

Source: Internet Resource: Accessed November 15, 2018 at: http://www.trust.org/contentAsset/raw-data/588013e6-2f99-4d54-8dd8-9a65ae2e0802/file

Year: 2015

Country: International

Keywords: Criminal Prosecution

Shelf Number: 153481


Author: Campbell, Helen

Title: What Works? Preventing and Responding to Sexual Harassment in the Workplace: A Rapid Review of Evidence

Summary: This evidence review occurs at a time of change and a movement globally to stop sexual harassment. Harassment, abuse and exploitation, and their denial, have a significant impact on women and men of diverse races, gender identities, expressions and sexual orientations, on people with the courage to speak out, on the many individuals who have been unable to take action. Sexual harassment adversely impacts people and business, it results in significant physical and mental health consequences, costs to business operations, and can affect all employees in the workplace. This rapid review seeks to gain and share insight on promising global approaches to addressing harassment in the workplace. It is hoped that robust evidence of what works to address this sensitive and pervasive issue will guide the practice, and accountability of employers to workplace health and safety. The evidence shows significant convergence around several themes, including: - The importance of sustained leadership engagement and commitment; - Broader efforts to prevent sexual harassment by shifting social norms; - 'Whole of organisation' approaches that include formalised governance approaches and policies, effective complaints mechanisms and ongoing staff training; and - Embedding organisational approaches in a broader commitment to gender equality.

Details: Canberra: CARE Australia, 2018. 81p.

Source: Internet Resource: Accessed November 16, 2018 at: https://www.care.org.au/wp-content/uploads/2018/10/STOP_What-works-to-address-workplace-sexual-harassment_Rapid-Review-of-evidence.pdf

Year: 2018

Country: International

Keywords: Gender-Based Violence

Shelf Number: 153498


Author: International Transport Forum

Title: Women's Safety and Security: A Public Transport Priority

Summary: This compendium assembles voices from the transport sector on the critical issue of safety for women in public transport and transport more generally. Surveys show that most women who use public transport feel exposed to physical or verbal aggression, sexual harassment and other forms of violence or unwelcome behavior, leading to personal stress and physical harm. As women rely on public transport for access to employment, education and other public services, making it hard for them to be mobile also reinforces inequality

Details: Paris: The Forum, 2018. 45p.

Source: Internet Resource: Accessed November 16, 2018 at: https://www.itf-oecd.org/sites/default/files/docs/womens-safety-security_0.pdf

Year: 2018

Country: International

Keywords: Sexual Harassment

Shelf Number: 153499


Author: Segal, Adam (Project Director)

Title: Hacking for Cash: Is China Stealing Western IP?

Summary: In September 2015, following mounting pressure exerted by the US on China, Chinese President Xi Jinping agreed to a US proposal that neither country would steal the other’s intellectual property (IP) for commercial gain. This bilateral agreement was quickly expanded when the US succeeded in inserting similar language into the November 2015 G20 communique. A handful of other countries also pursued their own bilateral agreements. Three years after the inking of the US–China agreement, this report examines China's adherence to those agreements in three countries: the US, Germany and Australia. This work involved a combination of desktop research as well as interviews with senior government officials in all three countries. The rationale for this multi-country report was to examine patterns and trends among countries that had struck agreements with China. In all three countries, it was found that China was clearly, or likely to be, in breach of its agreements. China has adapted its approach to commercial cyber espionage, and attacks are becoming more targeted and use more sophisticated tradecraft. This improved tradecraft may also be leading to an underestimation of the scale of ongoing activity. Despite initial hopes that China had accepted a distinction between (legitimate) traditional political–military espionage and (illegal) espionage to advantage commercial companies, assessments from the three countries suggest that this might be wishful thinking. China appears to have come to the conclusion that the combination of improved techniques and more focused efforts have reduced Western frustration to levels that will be tolerated. Unless the targeted states ramp up pressure and potential costs, China is likely to continue its current approach.

Details: Barton, ACT, Australia: Australian Strategic Policy Institute, 2018. 20p.

Source: Internet Resource: Accessed November 21, 2018 at: https://www.aspi.org.au/report/hacking-cash

Year: 2018

Country: International

Keywords: Commercial Cyber Espionage

Shelf Number: 153340


Author: Hubschle, Annette Michaela

Title: Ending Wildlife Trafficking: Local Communities as Change Agents

Summary: A large number of anti-poaching, conservation and management measures have been implemented to protect rhinos. None of these responses has achieved tangible results in lowering unnatural rhino deaths through illegal hunting in southern Africa. The international donor community, conservation NGOs and governments have disbursed millions of dollars to fight this illegal wildlife trade, and continue to do so. We argue in this report that these measures are bound to fail, as they do not engage with the most important change agents in conservation: local people who live in or near protected areas and game reserves. The report therefore aims to provide a better understanding of why African rural communities participate in wildlife economies, both legal and illegal, and how alternative, community-oriented strategies can help build a more resilient response to organized wildlife crime than has hitherto been achieved.

Details: Geneva, Switzerland: The Global Initiative Against Transnational Organized Crime, 2018. 48p.

Source: Internet Resource: Accessed November 21, 2018 at: http://globalinitiative.net/ending-wildlife-trafficking/

Year: 2018

Country: International

Keywords: Anti-Poaching Measures

Shelf Number: 153235


Author: Vandome, Christopher

Title: Tackling Illegal Wildlife Trade in Africa: Economic Incentives and Approaches

Summary: The illegal wildlife trade (IWT) significantly impacts African economies by destroying and corroding natural, human and social capital stocks. This hinders the achievement of the Sustainable Development Goals (SDGs) and has an impact on national budgets. Illicit financial flows from IWT deny revenue to governments where legal wildlife product trade exists and perpetuate cash externalization. IWT diverts national budgets away from social or development programmes, increases insecurity and threatens vulnerable populations. In expanding wildlife economies and pursuing conservation-driven development models, governments can protect their citizens, derive revenue from wildlife products, and establish world class tourism offerings. The illegal exploitation of wildlife is often due to a failure to enforce rights over those resources, where rights are unclearly defined or not fully exercised. Southern African countries have defined these rights in various ways, contributing to regional differences in conservation practices and the socioeconomic benefits derived from wildlife resources. Combating IWT is an important step towards allowing legitimate business and communities to develop livelihoods that incentivize stewardship and connect people to conservation. The Southern African Development Community (SADC) has several framework policies for the establishment of transfrontier conservation areas (TFCAs). These promote local stewardship across multiple land-use areas to conserve biodiversity and increase the welfare and socioeconomic development of rural communities. Private-sector partnerships also increase skills transfer, improve access to investment finance, and expand economic opportunities, including through the promotion of local procurement. The economic benefits of TFCAs extend beyond tourism. The economic value of African ecosystems is often under-recognized because they remain unquantified, partly due to the lack of available data on the broader economic costs of IWT. Improved monitoring and evaluation with key performance indicators would help governments and citizens to appreciate the economic value of combating IWT.

Details: London, UK: Chatham House, The Royal Institute of International Affairs, 2018. 28p.

Source: Internet Resource: Accessed November 21, 2018 at: https://www.chathamhouse.org/publication/tackling-illegal-wildlife-trade-africa-economic-incentives-and-approaches

Year: 2018

Country: International

Keywords: Biodiversity Conservation

Shelf Number: 153234


Author: Budiani, Indah

Title: Illegal Online Trade in Indonesian Parrots

Summary: This report aims to address how the illegal parrot trade is conducted online, and to what extent the use of internet-based platforms has facilitated the international trade. It examines the overall structure and key figures in the parrot trade, and addresses how trade chains and interactions between different actors in the illegal market have changed with the emergence of new, virtual forms of doing business. The increased efforts of Indonesian authorities to clamp down on wildlife trade and to pursue criminal actors operating online are also covered, as well as the effect these operations have had on the strategies used by parrot traders to avoid detection. It also addresses the relationship between the illegal and legal trade in captive-bred parrots and opportunities for laundering. Drawing together these strands, the report considers both the challenges and opportunities the online parrot trade offers for effective monitoring and law-enforcement responses.

Details: Geneva, Switzerland: The Global Initiative Against Transnational Organized Crime, 2018. 18p.

Source: Internet Resource: Accessed November 21, 2018 at: http://globalinitiative.net/indonesian_parrots/

Year: 2018

Country: International

Keywords: Captive-Bred Parrots

Shelf Number: 153153


Author: Runhovde, Siv Rebekka

Title: Illegal Online Trade in Reptiles From Madagascar

Summary: Endemic Madagascan animals are prized for their idiosyncrasies and rarity, and the island’s tortoises, geckos and chameleons are a particular focus of reptile enthusiasts. The international illegal trade in Madagascan reptiles is routinely conducted online, increasingly via social-media platforms. These sites offer traders a convenient way of connecting with a wide international customer base, where there is little internal monitoring and enforcement and access to information can be easily controlled. As a result, the internet facilitates a trade that already poses an acute threat to highly endangered species. At the same time, internet-based or internet-facilitated trade makes enforcing existing legislation designed to protect these animals much harder, due to the use of multiple platforms, the linguistic and technical barriers to monitoring these platforms, and the diffuse networks of sellers and buyers driving the trade which are not suitable to 'kingpin'-driven enforcement tactics.

Details: Geneva, Switzerland: The Global Initiative Against Transnational Organized Crime, 2018. 19p.

Source: Internet Resource: Accessed November 21, 2018 at: http://globalinitiative.net/illegal-online-trade-in-reptiles-from-madagascar/

Year: 2018

Country: International

Keywords: Illegal Reptile Trade

Shelf Number: 153152


Author: Cornell Law School’s Avon Global Center for Women and Justice and International Human Rights Clinic

Title: Judged for More Than Her Crime: A Global Overview of Women Facing the Death Penalty

Summary: We estimate that at least 500 women are currently on death rows around the world. While exact figures are impossible to obtain, we further estimate that over 100 women have been executed in the last ten years - and potentially hundreds more. The number of women facing execution is not dramatically different from the number of juveniles currently on death row, but the latter have received a great deal more attention from international human rights bodies, national courts, scholars, and advocates. This report aims to shed light on this much-neglected population. Few researchers have sought to obtain information about the crimes for which women have been sentenced to death, the circumstances of their lives before their convictions, and the conditions under which they are detained on death row. As a result, there is little empirical data about women on death row, which impedes advocates from understanding patterns in capital sentencing and the operation of gender bias in the criminal legal system. To the extent that scholars have focused on women on death row, they have concluded that they are beneficiaries of gender bias that operates in their favor. While it is undeniable that women are protected from execution under certain circumstances (particularly mothers of infants and young children) and that women sometimes benefit from more lenient sentencing, those that are sentenced to death are subjected to multiple forms of gender bias. Most women have been sentenced to death for the crime of murder, often in relation to the killing of family members in a context of gender-based violence. Others have been sentenced to death for drug offenses, terrorism, adultery, witchcraft, and blasphemy, among other offenses. Although they represent a tiny minority of all prisoners sentenced to death, their cases are emblematic of systemic failings in the application of capital punishment. Women in conflict with the law are particularly vulnerable to abuse and other rights violations, either at the police station, during trial, or while incarcerated. Women are more likely than men to be illiterate, which affects their ability to understand and participate in their own defense. For example, of the 12 women on India's death row in 2015, six have never attended school. Illiteracy also increases their vulnerability to coercion, heightening the risk of false confessions. In certain countries, particularly in the Gulf states, most death-sentenced women are foreign migrant workers who are subject to discriminatory treatment. Mental illness and intellectual disability are common among women facing the death penalty. In Pakistan, Kanizan Bibi has been on death row since 1989, when she was only 16-years-old. Diagnosed with paranoid schizophrenia, she cannot care for herself in the most basic ways and has lost all awareness of her surroundings. Although she is now confined in a psychiatric hospital, she remains under sentence of death. Many women enter prison as long-term survivors of gender-based violence and harsh socioeconomic deprivation. We have documented several cases of women convicted of crimes committed while they were minors, often in the context of child marriage. These factors receive little attention from lawyers and courts. In many death penalty jurisdictions, gender-based violence is not considered at sentencing. Few lawyers present such evidence, and even where they do, the courts often discount it. In mandatory death penalty jurisdictions, a woman's prior history as a survivor of physical or sexual abuse is simply irrelevant, since the death penalty is automatically imposed for death-eligible offenses without consideration of the offender's background or the circumstances of the crime. Our research also indicates that women who are seen as violating entrenched norms of gender behavior are more likely to receive the death penalty. In several cases documented in this report, women facing the death penalty have been cast as the "femme fatale," the "child murderer," or the "witch." The case of Brenda Andrew in the United States is illustrative. In her capital trial, the prosecution aired details of her sexual history under the guise of establishing her motive to kill her husband. The jury was allowed to hear about Brenda's alleged extramarital affairs from years before the murder, as well as details about outfits she wore. The trial court also permitted the prosecutor to show the underwear found in the suitcase in her possession after she fled to Mexico, because it showed that she was not behaving as "a grieving widow, but as a free fugitive living large on a Mexico beach." As one Justice of the Court of Criminal Appeals of Oklahoma noted, Brenda was put on trial not only for the murder of her husband but for being "a bad wife, a bad mother, and a bad woman." Death row conditions around the world are harsh and at times life-threatening for both men and women. In China, for example, all death row inmates, including women, are shackled at all times by their hands and feet. Women face certain deprivations, however, that do not affect the male population to the same extent. Some death sentenced women must also care for infants or young children who are incarcerated alongside them. Meriam Ibrahim, sentenced to death in Sudan for apostasy in 2014, was shackled to heavy chains in prison while eight months pregnant and caring for a young child. In Thailand and Myanmar, inmates have reportedly given birth alone in prison. In many countries, it is challenging or impossible for women to access sanitary pads or other menstruation products. In Zambia, for example, women must make do with rags that they struggle to clean without soap. The social stigma associated with women who are convicted and imprisoned, paired in some cases with restrictive family and child visitation rules, means that many female death row inmates around the world suffer an enduring lack of family contact, contributing to the high levels of depression suffered by women prisoners. Women on death row may also be denied access to occupational training and educational programs. For instance, the general female prison population in Thailand has access to work programs, but death row inmates do not. One woman in Ghana explained, after being denied educational opportunities while on death row: "I don't do anything. I sweep and I wait." Our country profiles aim to provide a snapshot of women facing the death penalty in several major regions of the world. The stories of women on death row provide anecdotal evidence of the particular forms of oppression and inhumane treatment documented in this report. It is our hope that this initial publication, the first of its kind, will inspire the international community to pay greater attention to the troubling plight of women on death row worldwide.

Details: Ithaca, NY: Cornell Law School, 2018. 62p.

Source: Internet Resource: Accessed November 23, 2018 at: https://deathpenaltyinfo.org/node/7202

Year: 2018

Country: International

Keywords: Capital Punishment

Shelf Number: 153113


Author: Global Witness

Title: Paradise Lost: How China Can Help the Solomon Islands Protect Its Forests

Summary: At first glance, the Solomon Islands looks like a tropical paradise with palm-fringed white sand beaches and pristine, biodiverse rainforests. It's advertised as being 'untouched' or 'unspoiled'. But look closer and the paradise isn't so idyllic. A Global Witness report, 'Paradise Lost: How China can help the Solomon Islands protect its forests' used detailed research, satellite imagery, drone photography and trade data, conclusively shows that tropical timber across the Solomon Islands is being harvested on an unsustainable scale, and that much of the activity driving this environmental destruction is at high risk of being illegal. The report highlights that although China is taking serious steps to address environmental degradation and to reduce pollution and carbon emissions at home, the Chinese government is overlooking an important aspect of its ecological footprint: the raw materials that it sources from overseas. China is the destination for about two-thirds of all tropical logs globally, many of which come from countries like the Solomon Islands that are struggling to address governance and rule of law issues. As the most important actor in the global timber trade, if China continues to buy its wood with 'no questions asked,' it risks undermining efforts by its trading partners to improve governance, prevent environmental degradation, and achieve the UN Sustainable Development Goals.

Details: London, UK: Global Witness, 2018. 28p.

Source: Internet Resource: Accessed November 23, 2018 at: https://www.illegal-logging.info/content/paradise-lost-how-china-can-help-solomon-islands-protect-its-forests

Year: 2018

Country: International

Keywords: Biodiversity Conservation

Shelf Number: 153105


Author: The Sentry

Title: The Golden Laundromat: The Conflict Gold Trade from Eastern Congo to the United States and Europe

Summary: An investigation by The Sentry raises significant concerns that gold mined from conflict areas in eastern Democratic Republic of Congo (“Congo”) is reaching international markets, including the supply chains of major U.S. companies and in products that consumers use every day. Documents reviewed and interviews conducted by The Sentry raise serious concern that the corporate network controlled by Belgian tycoon Alain Goetz has refined illegally-smuggled conflict gold from eastern Congo at the African Gold Refinery (AGR) in Uganda and then exported it through a series of companies to the United States and Europe, potentially including Amazon, General Electric (GE), and Sony. According to the United Nations (U.N.), conflict gold provides the largest source of revenue to armed actors in the conflict in eastern Congo, where an estimated 3.3 to 7.6 million people have died. An estimated $300 to $600 million worth of gold is smuggled out of Congo each year. According to documents reviewed by The Sentry, AGR exported approximately $377 million in gold in 2017 to an apparent affiliate of the Belgian gold refinery Tony Goetz NV, based in Dubai. According to 2018 U.S. Securities and Exchange Commission filings, 283 publicly-traded companies in the U.S. listed the Belgian refinery as an entity that may be in their supply chains, despite the fact that the refinery failed a major international conflict minerals audit in 2017. Those same filings indicate that AGR itself, opened in Uganda in 2016 and owned by Goetz, 7 may also be in the supply chains of 103 publicly traded U.S. companies, including GE and Halliburton. Numerous sources interviewed by The Sentry identified AGR as sourcing conflict gold from Congo. Twelve different traders and government officials in the region told The Sentry that AGR has taken over a significant portion of the market for gold trafficked from Congo to Uganda and the region, and Ugandan export records reviewed by The Sentry show that AGR accounted for over 99 percent of gold officially exported from Uganda in 2017. Uganda is the main transit hub for gold smuggled out of Congo, according to the U.N. Group of Experts (with Rwanda growing as such). Two major gold smugglers in Congo acknowledged to The Sentry that they illegally trafficked gold from eastern Congo to AGR, and other regional gold traders corroborated these accounts. Furthermore, four regional traders told The Sentry that gold traffickers Buganda Bagalwa and Mange Namuhanda, who have been named in several U.N. Group of Experts reports on Congo as purchasers of conflict gold, supplied gold to AGR in 2017. 15 AGR specifically denies having received gold from Bagalwa or Namuhanda and denies generally that it has otherwise received significant amounts of undocumented gold from other sources. Goetz has set up a major gold trading hub in Rwanda as well. The activities of the network appear to be non-compliant with both international supply chain due diligence guidance and international anti-money laundering safeguards as the network's companies buy, refine, and then sell the gold. As a result, the hundreds of publicly listed U.S. companies that may source gold from the refineries in this network are at risk of purchasing conflict gold. Goetz is a director or owner of 15 different companies, from Uganda, Dubai, Belgium, and Luxembourg, and 8 of these companies have the same address in Belgium. For its part, AGR steadfastly maintains that it is committed to refraining from any action that contributes to the financing of conflict and that its due diligence systems are based on international guidance. Further, Tony Goetz NV asserts that it follows strict procedures to avoid sourcing conflict minerals and that it follows all laws and international guidelines. Nevertheless, according to documents reviewed and sources interviewed by The Sentry, there is a significant risk that AGR has sourced large volumes of gold from eastern Congo with undocumented origins and lacking conflict-free certification. Although AGR has confirmed that it sources gold from Congo and that it sources some undocumented gold, it insists that the latter comes from old jewelry and other scrap sources. However, sourcing scrap from countries known to be transit points for conflict gold is a red flag in international due diligence guidance because it can be a loophole for mixing in gold from conflict sources. It is illegal, according to Congolese law, to export gold from artisanal mines that are not certified as conflict-free in Congo. An estimated 96 percent of artisanal gold mines in Congo are not certified at present (60 out of approximately 1,499), an estimated 71 percent of gold miners work at conflict mines according to the latest independent survey, and in 2017 the U.N. Group of Experts said that it had confirmed that nearly all artisanally sourced gold in Congo was exported illegally. In sum, nearly all of the gold mined in Congo flowing to Uganda is very likely not from certified mines. According to Ugandan export records, AGR also exported gold in 2017 to a Dubai-based company that in 2012 had reportedly been one of the most important cash suppliers to Kaloti Precious Metals, the Dubai-based gold refining giant. In 2015, a Kaloti refinery was de-listed from the Dubai "Good Delivery" list after failing to meet the criteria for Good Delivery certification and following a gold sourcing scandal. AGR has denied exporting to this company or knowing of the links between the supplier and Kaloti. Goetz’s new gold trading operation in Rwanda is also significant, exporting approximately one ton of gold per month since November 2017 (the equivalent of $500 million per year), according to the U.N. Group of Experts. The U.N. Group of Experts concluded in 2018 that much of the gold traded in Rwanda and Uganda is smuggled from Congo and/or other neighboring countries. In 2016 and 2017, it appears that Goetz’s network effectively assumed much of the market share previously controlled by another Uganda-based gold trading network run by the directors of Uganda Commercial Impex, which has been extensively involved in sourcing uncertified gold from eastern Congo for more than a decade, according to the U.N. Group of Experts. That network has greatly decreased its trade but remains somewhat active and in competition with Goetz, according to regional experts and the U.N. Group of Experts. The smuggling of gold from eastern Congo and the region by hand using commercial airlines also remains a key area of concern. The Sentry conducted over 100 interviews with gold miners, traders, and civil society organizations in Congo for this report. The investigation found evidence of armed groups and army commanders collecting illegal taxes on miners, government agents, and businessmen, and of clashes between armed groups and the Congolese army at gold mines. The trail of conflict gold follows a roughly six-step supply chain from eastern Congo to its primary end-products – jewelry, gold bars for investors and banks, and electronics. Uganda, where AGR is the only gold refinery, is the main transit hub for smuggled gold from eastern Congo, according to U.N. Group of Experts reports. Following AGR’s opening, Uganda increased its gold exports by a staggering 85,000 percent, going from exporting approximately $443,000 worth of gold in 2014 to an estimated $377 million in 2017. AGR signed agreements with a relative of Ugandan President Yoweri Museveni named Barnabas Taremwa, who the U.N. Group of Experts says traded in illegally trafficked gold from Congo, as well as a former high-level Ugandan official and childhood friend of President Museveni, who resigned from the World Bank following reports of alleged bribery. AGR has halted relationships with both men, but Taremwa has sued. Anti-money laundering (AML) practices are another key area of concern for certain companies in the Goetz network. Uganda's Financial Intelligence Authority referred AGR to the Director of Public Prosecutions for prosecution for violation of AML laws. However, the case has not gone forward. Some Ugandan officials say this lack of action is a result of Goetz’s relationship with President Museveni, who recommended that Uganda give AGR incentives to do business in the country. AGR denies having any commercial relationship with Museveni or any other senior Ugandan government officials. Several corporate practices of AGR and the Goetz network of companies appear to raise AML red flags set forth by the Financial Action Task Force (FATF) and to be inconsistent with U.N. Security Council and Organization for Economic Cooperation and Development (OECD) due diligence guidance on conflict minerals. The FATF red flags are indicators of potential money laundering that should trigger enhanced scrutiny by banks and other companies. Potentially noncompliant practices of AGR and/or the Goetz network include failure to report to the national financial intelligence unit (FIU), the risk - described in this report - that it is trading in gold that is mined and traded illegally (which AGR denies), setting up a complex web of companies with overlapping ownership structures and activities linked to the trade in Congo's gold, and conducting inadequate due diligence given the high risk of sourcing conflict gold. Collectively, such practices raise the risk that AGR may be attempting to hide the origins of high-risk gold from Congo. Indeed, AGR continues to export gold in large volumes despite having received noncompliance notices from Uganda on licensing, disclosure, and registration. The company maintains that, although it is not licensed by the mining ministry, all of its data is publicly available, and it has expressed a desire to assist with mapping and traceability. Goetz has insisted his business record is clean. “Conflict minerals don’t exist,” he stated in 2017. “All minerals are created by God.” Goetz co-owns Tony Goetz NV, the Belgian refinery whose apparent affiliate directly imports gold from AGR. Although the company maintains that it has internal procedures to identify its clients and the origin of its gold, and avoid sourcing conflict minerals, it failed a third-party audit of the Responsible Minerals Initiative (RMI) in 2017, which includes strict due diligence requirements on conflict minerals. Apple, Intel, and 345 multinational companies use RMI audits as a primary source for determining whether smelters meet responsible sourcing standards. The RMI audit failure raises the question as to why the refinery remains certified by the main commodities trading association in Dubai, a global gold trading hub, as “Good Delivery,” a status that includes conflict-free requirements. It was due to be re-audited in 2017 under the Dubai program, but no new audit report has been published. In addition, European press has reported that Belgian authorities were also investigating Tony Goetz NV for possible money laundering. The company asserts that its activities are in accordance with the law and that it follows strict AML procedures. AGR marks a return to the region for Goetz. He reportedly made deals with a major rebel group in Congo in 1997, and the corporate network operated by Goetz and his father is estimated to have purchased over 100 tons of gold worth approximately $1.1 billion in the 1990s. International due diligence, responsible minerals audits, and AML frameworks were established in order to combat corruption and the deadly conflict minerals trade. Companies that fail such audits, and that do not adhere to such guidance yet continue to sell their minerals internationally must face steep consequences, or else there will be no change in the conflict gold trade that fuels armed conflict. The activities of such companies are a primary obstacle to increasing the conflict-free, responsible gold trade from Congo, which can help de-link the gold trade from conflict and help the Congolese people benefit from their natural resources.

Details: Washington, DC: The Sentry, 56p.

Source: Internet Resource: Accessed November 25, 2018 at: https://thesentry.org/reports/the-golden-laundromat/

Year: 2018

Country: International

Keywords: Anti-Money Laundering

Shelf Number: 153534


Author: Paquet-Clouston, Masarah-Cynthia

Title: Are Cryptomarkets the Future of Drug Dealing? Assessing the Structure of the Drug Market Hosted on Cryptomarkets

Summary: Since 2011, drug market participants have had the opportunity to trade illegal drugs through online anonymous marketplaces dubbed cryptomarkets. Cryptomarkets offer a user-friendly infrastructure, similar to eBay, where market participants can meet and conduct business together. These well-designed anonymous platforms offer a professional setting for drug sales, but to what extent they are the future of drug dealing is unclear. This study characterizes the structure of the drug market hosted on cryptomarkets in order to better understand the economic setting of cryptomarket drug vendors. Market competition and the size and scope of drug vendor activities are analyzed. We find that the drug market hosted on cryptomarkets is fiercely competitive and deeply unequal. The size and scope of vendors' activities are limited. Challenges arise due to the online, anonymity and illegality features of cryptomarket drug transactions. The illegality status of drugs forces vendors' offline activities to stay within a small size and scope, limiting their potential growth online. The online nature of cryptomarkets fosters competition, but the risks that arise from anonymous transactions exacerbate buyers' tendency to choose well-reputed and experienced vendors. Thus, vendors face strong barriers to sales and 90% of them act as spectators in the market. This inequality is exacerbated by aggressive advertising conducted by established vendors to push out potential competitors. A paradox is found: the market is fiercely competitive, but also populated by market superstars, whom, however, still have limited size and scope. We conclude that cryptomarkets are not likely be the future of drug dealing because of the challenging environment they offer to cryptomarket drug vendors.

Details: Montreal: University of Montreal, 2016. 117p.

Source: Internet Resource: Dissertation: Accessed November 26, 2018 at: https://papyrus.bib.umontreal.ca/xmlui/handle/1866/18689

Year: 2016

Country: International

Keywords: Cryptomarkets

Shelf Number: 153839


Author: Odierno, Raymond

Title: Securing Global Cities: Best Practices, Innovation, and the Path Ahead

Summary: Today, more than half of the world's population lives in cities. Over the next 30 years, that figure will likely increase to 66 percent. This breakneck pace of urban development, coupled with globalization and increased access to information, is changing geopolitics and global economic development. Increasingly, cities are at the center of the world’s economic activity. In the United States, for example, the largest 100 metropolitan areas account for three-quarters of U.S. GDP and two-thirds of the country's population. Integrated global networks, financial systems, and markets are dramatically changing how cities will develop in the future. Connections among cities across the world are deepening through the flow of goods, people, technology, and ideas, bringing increased economic opportunity. Cities are also becoming more interconnected through international diasporas, multinational companies and supply chains, and worldwide communications and travel networks. As one indication, the aggregate amount of transnational investment, services, and trade in goods increased globally from $5 trillion in 1990 to $30 trillion in 2014 (growing from 24 to 39 percent of world GDP). The interconnectedness of citizens, both physically and electronically, leads to ripple effects: what happens in one locale can quickly affect a distant locale too. While these movements of people, goods, and ideas create new opportunities and have positive implications, they also create vulnerabilities. Cities in the United States and around the world find themselves at the nexus of society's most pressing issues, including terrorism, transnational violence, civil and ethnic unrest, organized crime, and technology-based crime, such as cyber threats. Securing cities may be emerging as the central challenge of our day. Security for the individuals, communities, businesses, infrastructure, and institutions making up urban areas is crucial in its own right. It is also fundamentally important for economic growth and for cities to thrive. Some places can advance economically even while experiencing sustained high levels of violence, at least to a degree. But it is difficult to entice investors, inspire innovators, and keep mobile work-forces content without a basic degree of safety. It is these realities that have driven us to focus on the intersection of economic growth, security, and stability, building on the Global Cities Initiative, a joint project of Brookings and JPMorgan Chase. Through conversations with hundreds of practitioners, academics, civic leaders, and government officials over the course of the past year-dialogues that took place in a dozen cities in five countries-we have identified several best practices and principles that should inform the urban security mission.

Details: Washington, DC: Bookings Institute and JP Morgan Chase, 2018. 54p.

Source: Internet Resource: Accessed November 26, 2018 at: https://www.brookings.edu/wp-content/uploads/2017/03/fp_201703_securing_global_cities.pdf

Year: 2018

Country: International

Keywords: Community Policing

Shelf Number: 153840


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Study on Homicide: Gender-related killing of women and girls

Summary: This study gives an overview of the scope of gender-related killing of women and girls. It provides in-depth analysis of killings perpetrated within the family sphere and examines forms of gender-related killings perpetrated outside the family sphere, such as the killing of women in conflict and the killing of female sex workers. The study explores the scale of intimate partner/family-related killings of women and girls, and describes different forms of gender-related killings of women. It also looks at the characteristics of the perpetrators of intimate partner killings, the link between lethal and non-lethal violence against women, and the criminal justice response. The availability of data on intimate partner/family-related homicide means that such killings of females are analysed in greater depth than other forms of "femicide" and that the analysis focuses on how women and girls are affected by certain norms, harmful traditional practices and stereotypical gender roles. Although other forms of gender-related killing of women and girls are described, such as female infanticide and the killing of indigenous or aboriginal women, given severe limitations in terms of data availability, only literature-based evidence is provided. The data presented in this study are based on homicide statistics produced by national statistical systems in which the relationship between the victim and perpetrator or the motive is reported. While the disaggregation of homicide data at country level has improved over the years, regional and global estimates are based on a limited number of countries, with Africa and Asia accounting for most of the gaps.

Details: Vienna: UNODC, 2018. 66p.

Source: Internet Resource: Accessed November 26, 2018 at: https://www.unodc.org/documents/data-and-analysis/GSH2018/GSH18_Gender-related_killing_of_women_and_girls.pdf

Year: 2018

Country: International

Keywords: Domestic Violence

Shelf Number: 153842


Author: Ekwall, Daniel

Title: Theft of Goods in Ports: A review of TAPA EMEA IIS statistics

Summary: This report examines patterns of reported cargo thefts at maritime transport facilities in Europe, the Middle East, and Africa (EMEA) with respect to frequency, incident category, modus operandi, and targeted product category. The analysis is based on data obtained from the Incident Information Service (IIS), a database of transport-related crimes from the Transported Asset Protection Association (TAPA) in the EMEA region. The results are analysed and discussed within a frame of reference based on supply chain risk management and criminology theories. We find that maritime transport facilities constitute a rare target location for cargo thieves, as only 102 of more than 24,500 incidents (0.4%) in the IIS database occur there. Nevertheless, some conclusions can be made. First, there seems to be seasonality in day of the week, but probably not in month of the year. Second, violent and fraudulent modi operandi of theft at maritime transport facilities are about as common as in the whole data set. Thus, it could be conjectured that the impact from violent and fraudulent incidents is several times higher than the most common types of incident category or modus operandi, although this is unsupported in this study. The product categories signal that there is big variation in value in stolen goods. Third, it is possible that potential perpetrators consider security levels at maritime transport facilities to be higher, leading to fewer theft attempts. This study is limited by the content of and classifications within the TAPA EMEA IIS database.

Details: Turku, Finland: HAZARD Project, Turku School of Economics, University of Turku, 2018. 38p.

Source: Internet Resource: Publications of the Hazard Project, 18:2018: Accessed November 27, 2018 at: http://www.utu.fi/en/sites/hazard/publications/Documents/HAZARD%20Publication%2018%20Theft%20of%20Goods%20in%20Ports.pdf

Year: 2018

Country: International

Keywords: Cargo Security

Shelf Number: 153852


Author: Waltman, Max

Title: The Politics of Legal Challenges to Pornography: Canada, Sweden, and the United States

Summary: The dissertation analyzes obstacles and potential in democracies, specifically Canada, Sweden, and United States, to effectively address empirically documented harms of pornography. Legislative and judicial challenges under different democratic and legal frameworks are compared. Adopting a problem-driven theoretical approach, the reality of pornography's harms is analyzed. Evidence shows its production exploits existing inequalities among persons typically drawn from other forms of prostitution who suffer multiple disadvantages, such as extreme poverty, childhood sexual abuse, and race and gender discrimination, making survival alternatives remote. Consumption is also divided by sex. A majority of young adult men consumes pornography frequently; women rarely do, usually not unless initiated by others. After consumption, studies show many normal men become substantially more sexually aggressive and increasingly trivialize and support violence against women. Vulnerable populations - including battered, raped, or prostituted women - are most harmed as a result. The impact of attempts to address pornography's harms on democratic rights and freedoms, specifically gender equality and speech, is explored through the case studies. Democracies are found to provide more favorable conditions for legal challenges to pornography's harms when recognizing substantive (not formal) equality in law, and when promoting representation of perspectives and interests of groups particularly injured by pornography. State-implemented approaches such as criminal obscenity laws are found less effective. More victim-centered and survivor-initiated civil rights approaches would be more responsive and remedial - a finding with implications for other politico-legal problems, such as global warming, that disproportionately affect disadvantaged populations traditionally largely excluded from decision-making.

Details: Stockholm: Stockholm University, Department of Political Science, 2014. 582p.

Source: Internet Resource: Dissertation: Stockholm Studies in Politics No. 160: Accessed November 27, 2018 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2539998

Year: 2014

Country: International

Keywords: Human Trafficking

Shelf Number: 153855


Author: Maternowska, M. Catherine

Title: Research that Drives Change: Conceptualizing and Conducting Nationally Led Violence Prevention Research. Synthesis Report of the "Multi-Country Study on the Drivers of Violence Affecting Children" in Italy, Peru, Viet Nam and Zimbabwe

Summary: Globally, studies have demonstrated that children in every society are affected by physical, sexual and emotional violence. The drive to both quantify and qualify violence through data and research has been powerful: discourse among policy makers is shifting from "this does not happen here" to "what is driving this?" and "how can we address it?" To help answer these questions, the MultiCountry Study on the Drivers of Violence Affecting Children - conducted in Italy, Viet Nam, Peru and Zimbabwe - sought to disentangle the complex and often interrelated underlying causes of violence affecting children (VAC) in these four countries. Led by the UNICEF Office of Research - Innocenti with its academic partner, the University of Edinburgh, the Study was conducted by national research teams comprised of government, practitioners and academic researchers in each of the four countries. Drawing on human-centred principles, the Study used an iterative approach which put national ownership and co-creation at its core. Government partners were actively engaged as co-researchers and all data analysis was conducted in-country by government statisticians. Facilitating and prioritizing national meaning-making through dialogue and joint analysis and synthesis of findings was also a key part of the Study design. Each national team used a common process involving three separate components, all of which build on existing data and research: a systematic literature review of academic and 'grey' literature (such as research reports) including both quality quantitative and qualitative research, secondary analyses of nationally representative data sets and an initial mapping of the interventions landscape. Analysed together, these sources of information helped build initial hypotheses around what drives violence in each country. Two key frameworks were applied to the analysis in this Study: 1) a version of the socio-ecological model, which helps to understand the dynamic relationships between factors at the micro-, meso-and macro-levels, and 2) an age and gender framework, which recognizes that a child's vulnerability and ability to protect herself from violence changes over time with her evolving capacities. Through these lenses, common themes emerged across contexts. Guided by findings from the four countries highlighting the dynamic and constantly changing and/or overlapping domains that shape violence in children's lives, this Study moved beyond understanding the risk and protective factors for violence affecting children, which are often measured at the individual, interpersonal and community level. In doing so, it demonstrated how patterns of interpersonal violence are intimately connected to larger structural and institutional factors-or the drivers of violence. The structural drivers of violence identified across the four country sites, representing high (Italy), upper middle (Peru), lower middle (Viet Nam) and low income (Zimbabwe) settings, include: rapid socio-economic transformations accompanied by economic growth but also instability; poverty; migration; and gender inequality. The institutional drivers of violence, such as legal structures, ineffective child protection systems, weak school governance and harmful social and cultural norms, often serve to reinforce children's vulnerabilities. Drivers are rarely isolated factors and tend to work in potent combination with other factors within a single level as well as between levels of the social ecology that shapes children's lives. While some drivers can lead to positive change for children, in this study, these factors or combinations of factors are most often invisible forms of harm in and of themselves While VAC is present in every country, the analyses also show how violence conspires unevenly to create and maintain inequalities between and within countries. The institutions and communities upon which children and their families depend are changing social entities with many interdependent parts. The type of violence in any one or multiple settings may vary depending on a variety of risk or protective factors and/or by age and gender. One of the most important findings is that violence is a fluid and shifting phenomenon in children's lives as they move between the places where they live, play, sleep and learn. Identifying and addressing unequal power dynamics - wherever they may occur in the home, school or community - is of central importance to effective violence prevention. The research also shows how behaviours around violence are passed through generations, suggesting that the social tolerance of these behaviours is learned in childhood. Data across countries also shows how violence is intimately connected to how relationships are structured and defined by power dynamics within and among families, peers and communities. These findings, along with learning from the study process, led to the development of a new child-centred and integrated framework, which proposes a process by which interdisciplinary coalitions of researchers, practitioners and policymakers can understand violence affecting children and what can be done to prevent it. Using data to drive change, our proposed Child-Centred and Integrated Framework for Violence Prevention serves to situate national findings according to a child's social ecology, making clear how institutional and structural drivers and risk/protective factors together shape the many risks and opportunities of childhood around the world. KEY POINTS: - Unpacking the drivers of violence at the structural and institutional levels, and analysing how these interact with risk and protective factors at the community, interpersonal and individual levels is critical to understanding how violence affects children. It is this interaction between drivers and risk/protective factors that delineates how, where, when and why violence occurs in children's lives. - Focusing solely on the types of violence and the places where it occurs - as is commonly done in large-scale surveys and some qualitative studies - will only provide part of the picture of a child's risk of violence. - The role of age and gender as childhood unfolds over time is also essential to understanding violence. - Qualitative inquiry and analysis should be further promoted within the field of violence prevention - on its own or as part of a mixed-methods approach - to ensure meaningful data interpretation of the social world, including the webs of interactions and the concepts and behaviours of people within it. - Research that engages and empowers stakeholders can contribute to a common strategy for building and sustaining political will to end violence affecting children. - The way the study was conducted - led by national teams and using existing literature and data - provided a relatively low-cost and human-centred alternative model to costly surveys that assess the scope of violence without examining the drivers that determine it. - Moving forward, violence prevention research should continuously and critically examine the ways in which we count and construct the complex social phenomenon of violence affecting children: placing recognition of process and power at the heart of our research endeavours.

Details: Florence, Italy: UNICEF, Innocenti Office of Research, 2018. 91p.

Source: Internet Resource: Accessed November 28, 2018 at: https://www.unicef-irc.org/publications/pdf/Drivers-of-Violence_Study.pdf

Year: 2018

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 153883


Author: Dowling, Christopher

Title: Policing Domestic Violence: A Review of the Evidence

Summary: This review examines what is known about the policing of domestic violence. It covers six domains of police involvement in domestic violence-workforce development, reporting to police, first response, prevention of further domestic violence, investigative responses and charging of perpetrators. A systematic search of 10 literature databases, with targeted follow-up searches, identified 346 eligible studies. Findings indicate that police can influence the likelihood of further violence, victim satisfaction and well-being, and criminal justice outcomes. Improvements to the policing of domestic violence should focus on optimising the implementation and effectiveness of police responses-specifically, targeting responses at the incidents, victims and perpetrators where they are likely to have the greatest impact; developing the workforce; embracing new technologies and innovative approaches; minimising bureaucratic or administrative barriers to effective police responses; and working closely with victims.

Details: Canberra: Australian Institute of Criminology, 2018. 141p.

Source: Internet Resource: AIC Research Report 13: Accessed Dec. 6, 2018 at: https://aic.gov.au/publications/rr/rr13

Year: 2018

Country: International

Keywords: Domestic Violence

Shelf Number: 153917


Author: Environemtnal Investigation Agency, Inc. (US)

Title: Tip of the Iceberg:; Implications of Illegal CFC Production and Use

Summary: Tip of the Iceberg: Implications of Illegal CFC Production and Use is an update on China's illegal CFC-11 emissions crisis and includes independent laboratory tests of polyurethane (PU) foam samples – provided by Chinese enterprises previously investigated by EIA – that confirm the presence of CFC-11 as a blowing agent. CFC-11 is a potent ozone depleting substance (ODS) that has been banned for almost a decade. The report urges Parties to the Montreal Protocol to address a number of remaining unanswered questions, in particular the absence of comprehensive data regarding the size of current banks of CFC-11 in PU foam and other products or equipment. It also urges the Montreal Protocol to undertake a comprehensive review of the monitoring and enforcement regime of the Montreal Protocol to ensure it is effective in combatting the illegal trade in ODS and prepared for new controls on HFCs.

Details: Washington, DC: EIA, 2018. 16p.

Source: Internet Resource: EIA Briefing: Accessed December 6, 2018 at: https://drive.google.com/viewerng/viewer?url=https://eia-international.org/wp-content/uploads/Tip-of-the-Iceberg-CFCs-FINAL.pdf

Year: 2018

Country: International

Keywords: Environmental Crimes

Shelf Number: 153919


Author: Thomaz, Felipe

Title: Illicit Wildlife Markets and the Dark Web: A Scenario of the Changing Dynamics

Summary: This brief gives an overview of the online illicit wildlife trade (IWT), and analyzes the current state of this market, and speculates on its likely developments. Although there is currently very little IWT activity on the dark web, we expect this to change as enforcement steps up, and this brief explores how that process might evolve. The online market for illicit wildlife trade appears to be disaggregated and characterized by 'blurred channels', yet, at the same time, it is relatively 'out in the open', which points either to a lack of enforcement or challenges that stymie effective enforcement.However, as and when enforcement activities are stepped up, it is probable that the IWT will respond by moving along a specific pathway. This trajectory would first see a move to centralized dark-web markets, then to specialist, and smaller, dark-web 'shops'. These market shifts would be followed by 'markets by invitation' and then distributed, peer-to-peer marketplaces. Under this scenario of a changing market, each step would be accompanied by a decline in market size caused by a decrease in potential consumers (and vendors), but this market loss would be counteracted by an increase in marketing efficiencies and organization on the part of the vendors.

Details: Global Initiative Against Transnational Organized Crime, 2018. 15p.

Source: Internet Resource: Accessed Dec. 6, 2018 at: https://globalinitiative.net/wp-content/uploads/2018/11/TGIATOC-DarkWebReport-Web.pdf

Year: 2018

Country: International

Keywords: Dark Web

Shelf Number: 153927


Author: Schwartz, Matthew

Title: Shifting the PVE Paradigm: A Think Piece on Human Insecurity, Political Violence, and New Directions for Preventing Violent Extremism

Summary: For the past 17 years, the international security policy community has been transfixed on articulating a global agenda to effectively prevent and counter terrorism and violent extremism. According to the Global Terrorism Index, deaths attributed to terrorist attacks in 2016 were a staggering eight times higher than the number recorded in 2000. As casualty rates began to skyrocket in 2012, the field was embracing a new paradigm that promised to stem the seemingly exponential growth of terrorist groups over the previous decade. This agenda, commonly referred to as preventing and countering violent extremism (P/CVE), focuses on addressing the underlying conditions that drive, or push, individuals to radicalize and those factors that induce, or pull, them to join violent extremist groups. Under the rubric of P/CVE, international organizations, governments, and foreign assistance providers began developing an expansive menu of initiatives with a range of governmental and nongovernmental partners. The focus of these interventions ranged from countering "extremist narratives" to strengthening "social resilience" to providing individualized support to curtail "radicalization that leads to violent extremism." Although not intended to replace the hard, militarized approaches to fighting terrorism that characterized the early years of the “global war on terror," many international organizations have come to view P/CVE as a more holistic approach in preemptively dissuading individuals from adopting extremist beliefs. Yet, is a focus on preventing violent extremism the antidote to terrorism and related violence? There is little reason to think so. Like previous counterterrorism paradigms that underpinned international policy from the years leading up to and since the global war on terror, common approaches to P/CVE are premised on the prevalence and exceptionalism of violent extremism as a unique form of violent conduct distinguished by the presumed importance of ideological factors deemed to facilitate the radicalization process in driving individuals and groups to commit violence. Like past formulations of the counterterrorism agenda, this insistence on centering ideology in framing terrorism as a new typology of violence tends to require observers to suspend consideration of the context, relationships, history, and past violence and victimhood out of which violent extremism emerges, thus often precluding any serious investigation into the causes and potential solutions to violence. With its every iteration, the international community's attempts to establish a coherent framework to counter terrorism and prevent violent extremism have proven largely ineffectual or counterproductive, further perpetuating cycles of violence. The time is past due for a paradigm shift—one that centers its analysis of terrorism not on its exceptionalism but on its normalcy, situating it in the context of the violence mutually constituted by states and non-states. In doing so, perhaps it may reveal a new range of possibilities and priorities for a more effective P/CVE agenda. To lay the groundwork for this endeavor, this brief begins by considering how state conduct, particularly its role in maintaining and perpetuating power through various levels of coercion, should be understood as a significant factor in driving various forms of conflict and political violence, including violent extremism. A series of thematic vignettes on corruption, human rights abuses, and war-making will illustrate ways in which state conduct plays a central role in manifesting or escalating political violence from which violent extremism and terrorism emerge. These discussions demonstrate that sustainable, long-term gains against terrorism demand a greater political, programmatic, and financial investment on matters of governance, including serious reforms in domestic and foreign policy. Based on these lessons, the concluding section offers recommendations to policymakers and strategists on conceptual frameworks and approaches that would facilitate a shift toward more holistic and evidence-based approaches to P/CVE.

Details: Washington, DC: Global Center on Cooperative Security, 2018. 15p.

Source: Internet Resource: Accessed December 7, 2018 at: https://www.globalcenter.org/wp-content/uploads/2018/09/GCCS-Shifting-the-PVE-Paradigm-07-09-18-v2.pdf

Year: 2018

Country: International

Keywords: Corruption

Shelf Number: 153882


Author: Reporters Without Borders

Title: Journalists: The Bete Noire of Organized crime

Summary: Organized crime knows no borders, scorns the rule of law in democracies, and leaves little choice to journalists, who have limited resources and are extremely vulnerable. The only choice for reporters is often to say nothing or risk their lives. Either they don't do their job as journalists or, by violating the criminal code of silence, they expose themselves to terrible reprisals from organizations that stop at nothing to defend their interests. Such is the dangerous dilemma for the media. And it's not just in Italy, the cradle of the mafia, or in Mexico, where narcos control entire swathes of the country. The Mob has spread its tentacles around the globe faster than all the multinationals combined and has spawned offspring whose virulence matches their youth. From Beijing to Moscow, from Tijuana to Bogota, from Malta to Slovakia, investigative journalists who shed light on the deals that involve organized crime unleash the wrath of gangsters, whose common feature is an aversion to any publicity unless they control it. Very sensitive to whenever their image is at stake, organized crime's godfathers do not hesitate to crack down on any reporter who poses a threat. Those who tell the truth deserve to die. For exposing the sordid underside of the Italian mafia's activities, writer and journalist Roberto Saviano has been condemned to living under permanent police protection, with less freedom of movement than those he exposes, who threaten to kill him. The criminal underworld is always masked, but the biggest danger for the investigative reporter nowadays is not necessarily the ruthless, bloodthirsty individuals who people this world; rather, in many countries, organized crime has established a kind of pact with the state, to the point that you cannot tell where one stops and the other begins. How is it possible that Mexico's drug cartels sprout and flourish like mushrooms without the support of part of the state's apparatus in the field? How do you explain the murky links between the yakuza and state in Japanese society? How do these small armies at the head of sprawling business empires manage to live outside the law without the - at least passive - complicity of the states in which they are often well established? Far from combatting them head-on, states tolerate them and give them a free hand by omission. By, for example, failing to apply controls in ports and airports. Organized crime does not fight states; it seeks to merge with them. Instead of trying to exercise power, it wants to control it or rather to contaminate it. Journalists who try to draw attention to organized crime's corruption of the political and business elite in their country must brave not only gangsters, but also white-collar crime that has married its interests to those of the gangsters whose antennae reach into the very heart of the state. Those who tackle this almost institutional impunity need to know that they will be alone at the hour of reprisals, especially in countries where the special units that are supposed to combat organized crime have become no more than cosmetic tools for assuaging public opinion.

Details: Paris: Reporters Without Borders, 2018. 48p.

Source: Internet Resource: Accessed Dec. 7, 2018 at: https://rsf.org/sites/default/files/en_rapport_mafia_web_0.pdf

Year: 2018

Country: International

Keywords: Drug Cartels

Shelf Number: 153942


Author: Glazzard, Andrew

Title: Global Evaluation of the European Union Engagement on Counter-Terrorism

Summary: This report presents the findings of an evaluation of the EU's external interventions in counter-terrorism (CT), including preventing and countering violent extremism (P/CVE) carried out in the first semester of 2018. The evaluation does not cover the entirety of the EU's CT interventions, but only those financed by the EU's external instruments. The purpose of the evaluation is to assess the relevance, coherence, efficiency and impact of the EU's interventions in order to determine the extent to which the objectives and desired outcomes of the EU's CT policy have so far been achieved.

Details: The Hague, Netherlands: International Centre for Counter-Terrorism, 2018. 35p.

Source: Internet Resource: Accessed December 9, 2018 at: https://icct.nl/publication/global-evaluation-of-the-european-union-engagement-on-counter-terrorism/

Year: 2018

Country: International

Keywords: Countering Terrorism Financing

Shelf Number: 153949


Author: Pertek, Iman S.

Title: Don't Force Me!: A Policy Brief on Early and Forced Marriage

Summary: Islamic Relief is working in the countries of high and highest Early and Forced Marriage (EFM) prevalence, such as Niger, Bangladesh, Chad, Mali, India, Ethiopia and Malawi. Our teams identified EFM as a serious issue hindering females and communities at large from improving their wellbeing. We have been addressing this problem through multi-sector and integrated approaches, applying culturally sensitive and sustainable strategies, to help communities achieve most effective development outcomes. A clear organisational policy stance on EFM will further strengthen the effectiveness of our interventions. “Early marriage has devastating consequences... According to the 2012 Demographic and Health Survey, in Niger 57 % of girls aged 10-14 are not attending school, because it is considered that married girls are expected to stay at home.” Habou Illyassou, Child Welfare Coordinator, IR Niger, Niamey office. Islamic Relief is calling for an end to EFM as part of its wider strategy to promote universal human rights and in particular, establish gender justice, ensure child protection, promote healthy families and provide appropriate Islamic solutions in Muslim communities. Our work to end EFM will be guided by research into EFM in specific contexts and tailor-made interventions that are effective, culturally-appropriate and sustainable. We will implement direct programmes tackling EFM and include efforts to end EFM as part of our wider emergency and development programmes. We will work closely with partner organisations that have the same goal, advocate for greater inclusive protection for all women and children of all abilities and contribute to the global effort to end EFM.

Details: Birmingham, UK: Islamic Relief Worldwide, 2017. 28p.

Source: Internet Resource: Accessed December 17, 2018 at: https://www.researchgate.net/publication/326450573_Don't_Force_Me_A_policy_brief_on_early_and_forced_marriage_Islamic_Relief_Worldwide

Year: 2017

Country: International

Keywords: Early and Forced Marriage

Shelf Number: 153876


Author: Olver, Kristen

Title: Organized Crime and its Role in Contemporary Conflict: An Analysis of UN Security Council Resolutions

Summary: This brief aims to contribute to the basis of evidence for ongoing debates over the complex connections between criminal markets and conflict actors, organized-criminal groups and their use of violence in conflict settings. It presents a thorough analysis of the content of the UN Security Council (UNSC) resolutions from 2000 to 2017, according to references made within the resolutions to forms of organized crime. Security Council resolutions provide a comprehensive overview of major threats to global peace and security and so provide a rich documentary resource for analysis and an indicator of the dynamics of contemporary conflict. It is an indicator that is wide-ranging, both in terms of global scope and in reflecting conflict trends over time. The dataset that forms the basis of this analysis has been developed into an interactive tool, which is available from the website of the Global Initiative Against Transnational Organized Crime.

Details: Geneva, Switzerland: The Global Initiative Against Transnational Organized Crime, 2018. 20p.

Source: Internet Resource: Accessed December 17, 2018 at: https://globalinitiative.net/wp-content/uploads/2018/09/TGIATOC-UNSC-Policy-Note-1962-web.pdf

Year: 2018

Country: International

Keywords: Conflict

Shelf Number: 153874


Author: Rawlings, Samantha

Title: Domestic Violence and Child Mortality

Summary: We examine the effect of domestic violence on mortality of children born to female victims using Demographic and Health Survey (DHS) data across thirty two different developing countries. We start by examining associations between interpersonal violence and child mortality while controlling for potential confounds. We find that children of (ever) victimized mothers are 0.4 pp more likely to die within thirty days, 0.7 pp more likely to die within a year and 1.1 pp more likely to die within the first five years of being born in comparison with children born to mothers who never experienced violence. We find similar patterns when examining the effect of violence taking place in the last twelve months on female victims and their children. Our results are similar when we use matching methods.We also examine the causal effect of violence on child mortality using an instrumental variables strategy. Exploiting variation in domestic violence and marital rape laws across countries and over time, we find that laws that criminalize violence against women and/or marital rape lower its incidence. Using this as an exogenous source of variation in domestic violence, we find that children born within the last twelve months to female victims were 3.7 pp more likely to die in the first thirty days of life. Our results indicate significant externalities to violence against women and underline the importance of recent efforts to tackle this violence in developing countries.

Details: Bonn, Germany: Institute of Labor Economics, 2018. 58p.

Source: Internet Resource: Accessed December 17, 2018 at: http://ftp.iza.org/dp11899.pdf

Year: 2018

Country: International

Keywords: Child Mortality

Shelf Number: 153867


Author: Rijnsdorp, Adriaan D.

Title: Assessing and Mitigating Impact of Bottom Trawling

Summary: BENTHIS developed the scientific basis to quantify the impact of bottom trawling on the seafloor and the benthic ecosystem. Based on insight in how fishing gear affects the seafloor, an assessment framework was developed that provide indicators of impact and seafloor status on a continuous scale that can be applied in the context of the MSFD. The mechanistic approach allows us to set reference values of impact (status) to estimate the proportion of a region or habitat where the impact is below (status is above) the threshold. The methodology combines estimates of trawling intensity with the depth to which the fishing gear penetrates into the sea bed (penetration profile) and the sensitivity of the habitat. Habitat sensitivity is estimated from the longevity composition of the benthic community that is related to the recovery rate. The mortality imposed by trawling was shown to be related to penetration depth of the fishing gear. The framework was applied to explore which fisheries had the greatest impact and which habitats were impacted the most. Fishers concentrate their activities in only a part of their total fishing area. These core fishing grounds are characterised by a relative low status (high impact). Additional fishing in these core grounds have only a small impact. In the peripheral areas where fishing intensity is low, additional fishing will have a much larger impact. Hence, shifting trawling activities from the core fishing grounds to the peripheral areas will increase the overall impact. Shifting activities from the peripheral grounds to the core will reduce the overall impact. This asymmetry provides the possibility to reduce the impact at a minimal cost. It was shown that implementing a habitat credit management system can provide incentives to reduce fishing in peripheral areas at minimal cost. In collaboration with the fishing industry and gear manufacturers, technological innovations were studied to reduce the impact of trawling. Promising results were obtained showing that (semi-) pelagic otter doors can be applied to reduce bottom impact and at the same time reduce the fuel cost without affecting the catch rate of the target species. Replacing mechanical stimulation by tickler chains with electrical stimulation In the beam trawl fishery for sole, reduced footprint and penetration depth as well as the fuel cost. Electrical stimulation is also a promising innovation to reduce the bycatch and bottom contact in the beam trawl fishery for brown shrimps. Sea trials to replace bottom trawls with pots were inconclusive. Results suggest that creels may offer an alternative for small Nephrops fishers in the Kattegat. In waters off Greece, the catch rates were very low. Sea trials with the blue mussel fishery showed that fishers could reduce their footprint by deploying acoustic equipment to detect mussel concentrations that allow the fishers to more precisely target the mussel beds and hence reduce fishing in areas with low mussel density. A review of the various case studies carried out in BENTHIS revealed the critical success factors for implementing technological innovations to mitigate trawling impact. While economic investment theory predict that economic profitability should lead to investment in innovative gears, it appeared that many other factors play a role in the successful uptake of new technology such as social, regulatory, technological and environmental factors. For the successful development and implementation of gear innovations, collaboration between fishers, gear manufacturers, policy makers, scientist and society is important.

Details: Netherlands: BENTHIS, 2018. 28p.

Source: Internet Resource: Accessed December 17, 2018 at: https://www.researchgate.net/publication/323084956_Assessing_and_mitigating_of_bottom_trawling_Final_BENTHIS_project_Report_Benthic_Ecosystem_Fisheries_Impact_Study

Year: 2018

Country: International

Keywords: Benthic Econsystem Fisheries Impact Study

Shelf Number: 153863


Author: OSCE Office of the Special Representative and Co-ordinatorfor Combating Trafficking in Human Beings

Title: Child Trafficking and Child Protection: Ensuring that Child Protection Mechanisms Protect the Rights and Meet the Needs of Child Victims of Human Trafficking

Summary: This Occasional Paper concerns the protection of child victims of trafficking by State-run child protection agencies. It does not review all the measures required during all the phases involved in protecting and assisting a trafficked child, but focuses on the following phases of action: 1. The decision-making process to choose a comprehensive, secure and sustainable solution in the child’s best interests (i.e., solutions that are sometimes called “durable solutions”) concerning: - Children who are outside their country of origin (whether unaccompanied, separated or accompanied), including regularization of the immigration status of such a child; - Children who have not left their own country; 2. Implementation of such solutions; 3. The medium-term and long-term provision of assistance to ensure each child’s satisfactory recovery (“re/integration”), whether in the child’s country or place of origin or elsewhere. Chapter 2 sets out the child rights principles that underpin the protection of trafficked children. The first and overriding principle is that in all actions affecting children (covering everything done to protect trafficked children or to tackle child trafficking), the best interests of the child must be a primary consideration. Chapter 3 explains what decisions generally have to be made concerning trafficked children and at what point in the protection process these occur. It emphasizes that child protection specialists should take a leading role in making decisions whenever feasible, and refers to Sweden’s National Referral Mechanism handbook, which highlights the action points required with respect to children and young people. The chapter also examines the “The Child House” (Barnahus) model, which seeks to ensure that child victims are not subjected to repeated interviews about the same topics. Chapter 4 goes into further detail on the interim care of a trafficked child, the period in which child protection authorities are preparing to make key decisions affecting the child. Considerations on whether a trafficked child should be placed in alternative care are discussed, and the types of assessment recommended by the United Nations (UN) Guidelines for the Alternative Care of Children are described. In the case of children who are (or appear to be) unaccompanied when identified as presumed trafficking victims, the “necessity principle” set out in the UN Guidelines means that the child must be provided with alternative care straight away. In such cases the authority responsible for making the decision must assess the risks facing the child and how these affect his or her placement, keeping a record of the factors taken into consideration in deciding where to accommodate the child and what measures are needed to protect the child from any identified risks. It is emphasized how important it is to avoid placing presumed trafficked children in any sort of prison cell or other kind of detention situation. The risk of a child victim being subjected to further abuse at a shelter or care home is also discussed, along with some of the steps that are essential for preventing this. Chapter 5 considers the best interests of the child and how an understanding of what this implies can be introduced into the decision-making process, not only in countries where unaccompanied children are identified, but also in children's countries of origin. Chapter 6 looks at the experience of implementing decisions made about trafficked children, focusing on case management and care plans that promote the satisfactory reintegration of children. It describes some of the benefits of preparing a “life project” with a trafficked child. It also discusses appropriate measures for reducing the likelihood that a trafficked child placed in alternative care will walk out and go “missing”. Chapter 7 summarizes the principles surrounding a trafficked child’s possible return to their country or place of origin, emphasizing the safeguards that are essential. It describes both bilateral and multilateral frameworks governing the return of unaccompanied children, and discusses cases in which restrictions have been placed upon trafficked children after their return to their country of origin. Finally, Chapter 8 presents a series of recommendations for the OSCE participating States, noting that these supplement, but are not intended to replace, the measures that have already been recommended to participating States in the past. Central to these recommendations is that child trafficking should be addressed as a child protection issue within a child protection framework, with child protection specialists playing a leading role in all procedures involving decisions that might have a significant impact on a trafficked child. The Occasional Paper contains two annexes, the first quoting from a Joint General Comment issued in 2017 by two United Nations treaty-monitoring bodies, and the second summarizing points from a UNICEF model bilateral agreement concerning children who have been trafficked.

Details: Vienna, Austria: Organization for Security and Co-operation in Europe, 2018. 80p.

Source: Internet Resource: Accessed December 17, 2018 at: https://riselearningnetwork.org/wp-content/uploads/2018/12/OSCE-OSR-Child-Trafficking-2018-405095.pdf

Year: 2018

Country: International

Keywords: Child Prison

Shelf Number: 154042


Author: Alexander, Audrey

Title: Digital Decay?: Tracing Change over Time Among English-Language Islamic State Sympathizers on Twitter

Summary: Until 2016, Twitter was the online platform of choice for English-language Islamic State (IS) sympathizers. As a result of Twitter's counter-extremism policies - including content removal - there has been a decline in activity by IS supporters. This outcome may suggest the company's efforts have been effective, but a deeper analysis reveals a complex, nonlinear portrait of decay. Such observations show that the fight against IS in the digital sphere is far from over. In order to examine this change over time, this report collects and reviews 845,646 tweets produced by 1,782 English-language pro-IS accounts from February 15, 2016 to May 1, 2017. This study finds that: - Twitter's policies hinder sympathizers on the platform, but counter-IS practitioners should not overstate the impact of these measures in the broader fight against the organization online. ‐ Most accounts lasted fewer than 50 days, and the network of sympathizers failed to draw the same number of followers over time. ‐ The decline in activity by English-language IS sympathizers is caused by Twitter suspensions and IS' strategic shift from Twitter to messaging platforms that offer encryption services. ‐ Silencing IS adherents on Twitter may produce unwanted side effects that challenge law enforcement's ability to detect and disrupt threats posed by violent extremists. - The rope connecting IS' base of sympathizers to the organization's top-down, central infrastructure is beginning to fray as followers stray from the agenda set for them by strategic communicators. - While IS' battlefield initiatives are a unifying theme among adherents on Twitter, the organization's strategic messaging output about these fronts receive varying degrees of attention from sympathizers. - Terrorist attacks do little to sustain the conversation among supporters on Twitter, despite substantive attention from IS leadership, central propaganda, and even Western mass media. ‐ Over time, there has been a decline in tweets following major attacks. This suggests that attacks in the West have diminishing effects in mobilizing support. - Current events - such as the attempted coup in Turkey and the 2016 U.S. presidential election - are among the most popular topics within the sample. ‐ Events unrelated directly to IS cause some of the greatest spikes in activity. ‐ These discussions are ongoing despite Twitter's policies. Conclusions and Policy Recommendations ‐ English-language IS sympathizers on Twitter defy straightforward analysis and convenient solutions. ‐ They are skilled problem-solvers in the digital sphere. Rather than ruminating over losses, angered adherents fight to be heard, either on Twitter or other digital platforms. ‐ Counter-IS practitioners must show a similar willingness to adapt and explore alternative ventures. ‐ While some collaboration is beneficial, the government cannot rely predominantly on the efforts of tech companies to counter IS and its supporters.

Details: Washington, DC: George Washington University, 2017. 60p.

Source: Internet Resource: Accessed December 18, 2018 at: https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/DigitalDecayFinal_0.pdf

Year: 2017

Country: International

Keywords: Counter-Extremism

Shelf Number: 154039


Author: Gaston, Sophia

Title: Out of the Shadows: Conspiracy Thinking on Immigration

Summary: Out of the Shadows: Conspiracy Thinking on Immigration, a major new report by Sophia Gaston of the Centre for Social and Political Risk at the Henry Jackson Society, is published today. Polling conducted for the report shows 58% of British adults believe the Government is hiding the cost of immigration to taxpayers and society. The report finds that the rise in immigration levels and the public's concerns about immigration have coincided with the weakening of trust in governments and institutions. These forces are mutually reinforcing, with politicians seen to have systematically ignored and disregarded citizens' anxieties, challenging the contract that stands at the heart of Western democracies. The think tank undertook polling with Opinium to understand the number of British voters who had resorted to 'conspiratorial thinking' over the issue of immigration. Key findings were: - 58 percent of all British citizens believe the Government is hiding the true cost of immigration to taxpayers and society. Only 12% disagree with the contention that the Government is hiding these costs. - 51 percent of all Brits believe that successive governments have deliberately tried to make British society more diverse through its immigration policy. Of those who expressed a view, 59 percent believe that those who have spoken out about immigration in the media and politics have been treated unfairly. In a signal of how mainstream conspiracy thinking on immigration has become, 40 percent of Remain voters and 49 percent of Labour voters believe that the Government is concealing the economic and social costs of immigration. The report comes as Theresa May and her Government are scheduled to continue their promotion of the Withdrawal Bill by promoting it as a 'step change' on immigration policy. The report finds that distrust over immigration is far higher amongst Leave voters. 75 percent of Leave voters believe the Government is hiding the true costs of immigration - just 4 percent are convinced that the Government is not. Likewise, 65 percent of Leave voters believe that those who had spoken out on immigration had been treated unfairly. In news that will trigger alarm bells amongst Tory MPs, 62 percent of Conservative voters believe that the aim of Government policy over recent years had been to 'make Britain more ethnically diverse'.

Details: London, U.K.: Centre for Social and Political Risk, 2018. 60p.

Source: Internet Resource: Accessed December 18, 2018 at: https://henryjacksonsociety.org/wp-content/uploads/2018/12/Out-of-the-Shadows-Conspiracy-thinking-on-immigration.pdf

Year: 2018

Country: International

Keywords: Government Conspiracy

Shelf Number: 154036


Author: Stefan, Marco

Title: Cross- Border Access to Electronic Data through Judicial Cooperation in Criminal Matters: State of the Art and Latest Developments in the EU and the US

Summary: In the digital age, access to data sought in the framework of a criminal investigation often entails the exercise of prosecuting powers over individuals and material that fall under another jurisdiction. Mutual legal assistance treaties, and the European Investigation Order allow for the lawful collection of electronic information in cross-border proceedings. These instruments rely on formal judicial cooperation between competent authorities in the different countries concerned by the investigative measure. By subjecting foreign actors’ requests for data to domestic independent judicial scrutiny, they guarantee that the information sought during an investigation is lawfully obtained and admissible in court. At the same time, pressure is mounting within the EU and in the US to allow law enforcement authorities’ access to data outside existing judicial cooperation channels. Initiatives such as the European Commission’s proposals on electronic evidence and the CLOUD Act in the US foster a model of direct private–public crossborder cooperation under which service providers receive, assess and respond directly to a foreign law enforcement order to produce or preserve electronic information. This paper scrutinises these recent EU and US initiatives in light of the fundamental rights standards, rule of law touchstones, and secondary norms that, in the EU legal system, must be observed to ensure the lawful collection and exchange of data for criminal justice purposes. A series of doubts are raised as to the Commission e-evidence proposal and the CLOUD Act’s compatibility with the legality, necessity and proportionality benchmarks provided under EU primary and secondary law.

Details: Brussels, Belgium: CEPS, 2018. 64p.

Source: Internet Resource: Accessed December 18, 2018 at: https://www.ceps.eu/system/files/MS%26GGF_JudicialCooperationInCriminalMatters.pdf

Year: 2018

Country: International

Keywords: CLOUD Act

Shelf Number: 154035


Author: Gachuz, Juan Carlos

Title: Globalization and Organized Crime: Challenges for International Cooperation

Summary: The concept of transnational organized crime is not clear-cut or straightforward. There is no standard definition for it in criminological or criminal law theories. Moreover, transnational criminal organizations differ substantially from each other—in organizational structure, types of activities, or size, for example. Despite this lack of consensus on the definition of transnational organized crime, several crucial elements are evident in all cases. First, such organizations conduct criminal acts, violating legal frameworksand carrying out punishment outside the legitimate procedures of law enforcement. Individuals who intentionally join the groups operate under the direction of established leaders and execute their activities efficiently. And although they are well organized, their structure is more or less permanent, even when they are not composed of rigidly subordinated groups. Sometimes, transnational organized crime in fact occurs through a network of homogeneous groups linked to one another across borders by various forms of solidarity, complicity, and a hierarchical order. Additionally, transnational criminal organizations are active in a variety of fields. Their full spectrum of activities includes bank fraud, cyber crime, and the illegal trafficking of goods or people. Moreover, in order to achieve their goals and protect their interests, transnational criminal organizations are willing to use violence, bribery, and other such instruments to carry out their business activities. And, of course, a main characteristic of these groups is that their criminal practices are not limited to national boundaries. In the Convention against Transnational Organized Crime (CATOC), the United Nations stated that an offense is transnational in nature if: (a) it is committed in more than one State; (b) it is committed in one State but a substantial part of its preparation, planning, direction, or control takes place in another State; (c) it is committed in one State but involves an organized criminal group that engages in criminal activities in more than one State; or (d) it is committed in one State but has substantial effects in another State. In an earlier document, the United Nations also listed several categories of transnational organized crime: money laundering, terrorist activities, theft of art and cultural objects, intellectual property theft, illicit arms trafficking, aircraft hijacking, sea piracy, land hijacking, insurance fraud, cyber crime, environmental crimes, trafficking of persons, trade of human body parts, illicit drug trafficking, fraudulent bankruptcy, infiltration of legal business, corruption and bribery of public officials as defined in national legislation, corruption and bribery of party officials and elected representatives as defined in national legislation, and other offenses committed by organized criminal groups.

Details: Houston, TX: Rice University's Baker Institute for Public Policy, 2016. 4p.

Source: Internet Resource: Accessed December 18, 2018 at: https://www.bakerinstitute.org/media/files/files/37efaacf/BI-Brief-070616-MEX_Globalization.pdf

Year: 2016

Country: International

Keywords: Bank Fraud

Shelf Number: 154032


Author: Stone, Katie

Title: The Global State of Harm Reduction 2018

Summary: In 2008, Harm Reduction International (HRI) released the first Global State of Harm Reduction, a report that mapped responses to drug-related HIV, viral hepatitis and tuberculosis (TB) around the world for the first time. The data gathered for the report provided a critical baseline against which progress could be measured in terms of the international, regional and national recognition of harm reduction in policy and practice. Since 2008, the biennial report has become a key publication for researchers, policymakers, civil society organisations, UN agencies and advocates, mapping harm reduction policy adoption and programme implementation globally. Over the last decade, reports of injecting drug use and the harm reduction response have increased; harm reduction programmes are currently operating at some level in almost half of the 179 countries in the world where injecting drug use has been documented. With patterns of drug use globally continuing to evolve, Harm Reduction International reached out in 2017 to civil society networks across the world to ask what they wanted to see in this report. The 2018 Global State of Harm Reduction report has a broader scope, containing information on: - The number of people who inject drugs and the number of people imprisoned for drug use (where data is available). - Needle and syringe programmes (NSP), opioid substitution therapy (OST), HIV and hepatitis C and TB testing and treatment for people who use drugs, in both the community and in prisons. - The harm reduction response for people who use amphetamine-type stimulants, cocaine and its derivatives, and new psychoactive substances. - Drug-checking in nightlife settings. - Harm reduction for women who use drugs. - Drug consumption rooms. - Drug-related mortality and morbidity and the overdose response, as well as naloxone peer distribution in the community and naloxone provision in prisons. - Developments and regressions in funding for harm reduction. This report and other Global State of Harm Reduction resources can be found at www.hri.global.

Details: London: Harm Reduction International, 2018. 176p.

Source: Internet Resource: Accessed December 18, 2018 at: https://www.hri.global/files/2018/12/11/global-state-harm-reduction-2018.pdf

Year: 2018

Country: International

Keywords: Cocaine

Shelf Number: 154070


Author: Reporters Without Borders

Title: Online Harassment of Journalists: Attack of the Trolls

Summary: In a new report entitled "Online harassment of journalists: the trolls attack," Reporters Without Borders (RSF) sheds light on the latest danger for journalists – threats and insults on social networks that are designed to intimidate them into silence. The sources of these threats and insults may be ordinary "trolls" (individuals or communities of individuals hiding behind their screens) or armies of online mercenaries. Harassing journalists has never been as easy as it is now. Freedom of expression and bots are being used to curtail the freedom to inform. With the help of its 12 bureaux and sections and its worldwide network of correspondents, RSF has documented dozens of cases in 32 countries for the last six months and has for the first time classified the types of online harassment. RSF has interviewed experts in cyber-crime, newsroom editors, lawyers and, above all, journalists themselves - some of whom have been terrified by the torrents of online abuse to a scale they had never imagined possible. The links between the masterminds and the trolls who carry out the cyberviolence against journalists are often hard to demonstrate. More research needs to be done. One thing is nonetheless clear: this phenomenon is spreading throughout the world. How should we respond to these virulent online campaigns that often have dramatic consequences? RSF offers recommendations for governments, international organizations, online platforms, media companies, and advertisers.

Details: Washington, DC: Reporters without Borders, 2018. 37p.

Source: Internet Resource: Accessed January 9, 2019 at: https://rsf.org/sites/default/files/rsf_report_on_online_harassment.pdf

Year: 2018

Country: International

Keywords: Bots

Shelf Number: 154020


Author: Morton, Jesse

Title: When Terrorists Come Home: The Need for Rehabilitating and Reintegrating America's Convicted Jihadists

Summary: The United States Government (USG) has prosecuted more than 400 jihadist terrorists since 9/11. While several of those convicted will spend the rest of their lives in prison, the overwhelming majority will one day re-enter society. In fact, over the next five years, nearly a quarter of the United States' terror convicts will complete their terms of imprisonment. Moreover, since the average age of those charged with ISIS-related crimes is only 27, they will be released back into American society with a long life to live. This raises a critical and little examined question regarding U.S. counterterrorism strategy: what is being done in U.S. prisons to prepare this growing and unique segment of the prison population for re-entry into society? To further complicate the scenario, these individuals, who were at violent odds with American society, will face the complex process of reintegrating against the strong headwinds of extraordinarily high recidivism rates for those that were previously imprisoned. A 2016 United States Sentencing Commission study calculated that federal prisoners have a 44.7 percent re-arrest rate after five years. At 76.6 percent, that number is much higher for state prisoners. While the re-offender rate for violent extremist offenders appears to be much lower, it is worth considering that, in 2010, the Director of National Intelligence assessed that approximately 20 percent of former Guantanamo Bay detainees were suspected of re-engaging in terrorist or insurgent activities, a figure confirmed by the Obama administration. Thus, the recidivism rate among violent extremist offenders within the U.S. is unlikely to be zero. And, if terrorists go back to their original activity after prison, the damage they could to do is likely to be much higher than by ordinary offenders. While several programs for violent extremists have emerged across the globe in the last few years, to date, there exists no formal national rehabilitation and re-entry program for convicted terrorists in the United States and little, if any, developed infrastructure to support individuals upon their release. Rather, analysts have suggested that the Federal Bureau of Prisons (BOP) has "been content to apply whatever programs it has in place for the general criminal population to the population of terrorism-related convicts." This scenario invites at least a few questions: should the United States be doing more to rehabilitate violent extremists and prepare them for re-entry? After all, there are domestic re-entry programs for gang members both during their imprisonment and post-release; they arguably pose less of a threat to society than former terrorists, yet there are no programs in place for terrorists. If so, what might be implemented? With many already released and many more to follow, how does the United States prepare for the day convicted terrorism-related offenders return to the streets of America?

Details: New York: Counter Extremism Project, 2018. 62p.

Source: Internet Resource: Accessed January 9, 2019 at: https://www.counterextremism.com/sites/default/files/CEP%20Report_When%20Terrorists%20Come%20Home_120618.pdf

Year: 2018

Country: International

Keywords: Countering Violent Extremism

Shelf Number: 154063


Author: Counter Extremism Project

Title: Extremists and Online Propaganda

Summary: Official propaganda materials produced by the media arms of groups like ISIS, al-Qaeda, the Taliban, and al-Shabab are intentionally crafted to radicalize, inspire, and incite individuals to violence. These groups have produced propaganda in a myriad of textual, audio, and video forms - from music videos to glossy magazines - that have helped to convince individuals around the world to travel abroad to join extremist groups and to conduct deadly attacks in their home countries. At times, they have even offered specific guidance on how to do so. Abdirizak Warsame, who was arrested at the age of 19 for attempting to join ISIS abroad, stated that while watching violent ISIS execution videos on YouTube, he started to believe that he was "doing something for a greater cause --- for good" by supporting the group. Warsame was one of 57 individuals documented by the Counter Extremism Project (CEP) who attempted to join an extremist group abroad, and one of 72 individuals who accessed explicitly violent propaganda materials. Dzhokhar Tsarnaev - who detonated two homemade bombs along with his brother, Tamerlan, at the April 2013 Boston Marathon - told investigators that he and his brother built the bombs using instructions from al-Qaeda in the Arabian Peninsula"s Inspire propaganda magazine. The Tsarnaev brothers were two of 26 individuals documented who successfully enacted an act of terror, and two of 25 individuals who accessed propaganda materials that provided instructions on how to prepare or execute violent terrorist acts. (Sources: U.S. Department of Justice 2013, Slate, Foreign Policy, CBS News) Official extremist group propaganda materials are easily disseminated and accessed on the Internet. The individuals documented in this report accessed extremist group propaganda on a variety of social media platforms, including Facebook, Twitter, YouTube, Tumblr, Google Plus, Skype, Paltalk, and WhatsApp. Several individuals also played a part in further propagating extremist propaganda materials. Of the 168 individuals documented by CEP, at least 51 disseminated propaganda materials either online, in person, or via mail, and 59 viewed or discussed propaganda materials with another individual. Even if extremist groups lose control over territory in their respective regions of operation, their ability to reach out and spread propaganda online will allow them to continue to attract support from across the globe. For example, even as ISIS steadily lost ground in Iraq and Syria throughout 2017, U.S. permanent resident Sayfullo Habibullaevic Saipov was still inspired by the group's propaganda videos to carry out a vehicular attack in New York City on October 31, 2017, that killed eight people. As long as extremist groups continue to produce compelling propaganda that plays a part in inspiring and inciting individuals to violence - and remains easily accessible online - terrorism in the name of these extremist groups will remain a threat worldwide. (Source: U.S. Department of Justice 2017)

Details: New York, NY: Counter Extremism Project, 2018. 68p.

Source: Internet Resource: Accessed January 9, 2019 at: https://www.counterextremism.com/extremists-online-propaganda

Year: 2018

Country: International

Keywords: al-Qaeda

Shelf Number: 154062


Author: Shrivasta, Utkarsh

Title: ICT as a Corruption Deterrent: A Theoretical Perspective

Summary: Investigations of white collar crimes such as corruption are often hindered by the lack of information or physical evidence. However, vast amount of information recorded, stored, analyzed, and shared using information and communication technologies (ICT) by businesses, governments, and citizens may help in investigating and prosecuting these crimes, and in deterring future crimes. This paper investigates the relationship between ICT and corruption at the country level using the theoretical lens of general deterrence theory. Using time-lagged regression and multilevel analysis of country level data from 97 countries for the years 2011-2013, we demonstrate that countries with higher ICT penetration and higher rule of law tend to have lesser corruption after accounting for social, economic, and political controls.

Details: Puerto Rico: Americas Conference on Information Systems, 2015. 13p.

Source: Internet Resource: Accessed January 9, 2019 at: https://pdfs.semanticscholar.org/213a/64668a5a627e0a78850f04916544e79dfb24.pdf

Year: 2015

Country: International

Keywords: Corruption

Shelf Number: 154060


Author: Kroll

Title: Anti-Bribery and Corruption Benchmarking Report - 2018. Converging Third Party Risks: Regulation, Reputation, and Information

Summary: EXECUTIVE SUMMARY In today's global, hyper-connected economy, we find anti-bribery and corruption programs in the midst of an evolution that is driven by converging organizational risks and priorities. Regulatory mandates, critical reputational factors, and data security issues are increasingly intertwined as compliance teams strive to protect their organizations from ABC risks. The common thread running through all these risks is the high volume of direct and indirect third parties that partner with and supply services to organizations. Forty-five percent of respondents work with at least 1,000 third parties per year, a six percentage point increase over the 2017 Report. Individually, regulatory, reputational, and data security risks are persistent challenges that compliance and ethics professionals know very well. The convergence of these risks is driving greater collaboration between the organization's compliance and information security teams, which can make for stronger, more compliant anti-bribery and corruption programs. Leadership engagement, always a key and essential contributor to program effectiveness, is especially critical for ensuring enterprise-wide support for compliance efforts. Doing business ethically and maintaining an up-to-date anti-bribery and corruption program is not just about avoiding the pitfalls of reputational or legal risk. Investors are finding that a focus on ethical business dealings can translate into rewarding financial outcomes. By way of example, the publicly traded companies among Ethisphere's 2018 World's Most Ethical Companies ("Honorees") outperformed U.S. Large Cap Indices by 4.88 percent over the last three years, demonstrating that ethics and performance are well-suited companions and valued in the marketplace. Despite the increased focus and engagement of organizational resources on compliance efforts, a staggering 93 percent of respondents believe their ABC risks will remain the same or worsen in 2018. Those who expect greater ABC risks attribute the rise to increased enforcement of existing regulations, followed closely by new regulations. Given these expanding regulatory pressures, a holistic, multidisciplinary approach may hold the key to sustainable improvements in the future. Some key findings from our study include: ABC PROGRAMS: ONGOING CHALLENGES Overall, the results of this year's survey were consistent with those in our last report; namely, that third party risks - particularly reputational issues - were of greatest concern to respondents. In a shift from last year, however, respondents singled out increased enforcement of existing regulations along with the prospect of new regulations as the top reasons why they expect their anti-bribery and corruption risks to grow in 2018. A significant percentage of respondents continue to worry that they are not prepared to address the risks that their third parties present. Indeed, 58 percent of respondents uncovered legal, ethical, or compliance issues with a third party after initial due diligence. Most often, organizations' due diligence practices - such as ongoing and active monitoring - are responsible for bringing these issues to light. However, in a growing number of cases, third parties are self-disclosing infractions, a clear reflection of changing cultural and regulatory trends, including heightened concerns over personal liability. Risk-based segmentation, ongoing monitoring that incorporates regular data refresh, and periodic program evaluations have emerged as best-practice features of effective anti-bribery and corruption programs. OWNERSHIP STRUCTURE RISKS ON THE RISE The most notable year-over-year change in survey responses was the increased concern over opaque ownership structures, which rose this year to become the third most common reason why third parties are failing to meet an organization's standards. However, current mitigation efforts have not translated into confidence for compliance teams: less than a quarter of respondents reported that they are very comfortable with their ability to effectively address the risks associated with beneficial ownership. A global expansion of regulatory mandates that demand attention to ownership is driving much of the greater focus on the matter. Broader societal expectations, however, are also playing a critical role; the potential for significant, long-lasting reputational damage has made the effort to track ownership an imperative. ABC AFTER ONBOARDING: ONGOING MONITORING AND DATA REFRESH In the fast-changing global marketplace, organizations cannot expect that a third party's risk profile and/or ownership will remain static after initial on-boarding due diligence. In fact, regulatory guidance has made ongoing monitoring an expectation for an effective and engaged anti-bribery and corruption program. However, there is no clear mandate as to what monitoring should entail or how often it should be done. To be expected - and consistent with prior data -respondents reported a number of different approaches to monitoring. This year, however, we introduced the topic of third party data refresh into our survey and found many organizations using the practice to one degree or another. Refreshing baseline information on their third-party universe can help ensure organizations are conducting diligence or other monitoring practices corresponding with the actual risk presented by their third parties. With anti-bribery and corruption programs increasingly driven by technology, data integrity is a growing factor in risk mitigation and defense. MERGERS AND ACQUISITIONS Virtually the same percentage of respondents reported their organizations had engaged in M and A activity in 2017 as did in the prior year (62 percent and 67 percent, respectively). However, M and A continues to challenge compliance professionals from an anti-bribery and corruption perspective. The data shows that respondents are still not consistently meeting regulatory guidance, which expects organizations to thoroughly understand who they are acquiring. Similar to last year, respondents report collecting less information on the third parties of their transaction targets than on direct third parties. In a more positive development, Kroll experts have noted that some organizations, particularly those looking to be acquired, are turning this exercise into a competitive advantage. "Clean-up" work on their own third-party universe or supply chains can help make target companies more attractive to buyers and accelerate the transaction process. NEW RESOURCES EMERGE AS ABC AND ENTERPRISE RISKS CONVERGE A convergence of risk factors - specifically regulatory, reputational, and data security - is driving home the realization that greater collaboration and support from resources across the enterprise can help anti-bribery and corruption programs better mitigate risks. Increasingly stringent data privacy laws - including the imminent adoption of the European Union's General Data Protection Regulation (GDPR) - are making information - gathering on third parties a minefield. Across all survey respondents, 85 percent described themselves as somewhat or very concerned about data security risks. Meanwhile, mobile technology and applications such as WhatsApp and WeChat are creating internal vulnerabilities. Growing collaboration between compliance and information security/technology teams is proving instrumental in making due diligence efforts compliant and comprehensive. Overall, ABC programs are receiving greater investments from their organizations; however, nearly half of this year's respondents (47 percent) feel they need more resources. Measuring the effectiveness of programs can be the key to ensuring appropriate funding levels. Indeed, the survey data shows a link between program measurement and high levels of leadership engagement, which plays a critical role in anti-bribery and corruption program effectiveness. Beyond regulatory compliance, leaders are aiming to safeguard brands and organizational reputations.

Details: New York: 2018. 28p.

Source: Internet Resource: Accessed January 9, 2019 at: https://www.kroll.com/en-us/abc-report

Year: 2018

Country: International

Keywords: ABC Programs

Shelf Number: 154046


Author: Stoop, Nik

Title: More Legislation, More Violence? The Impact of Dodd-Frank on the Democratic Republic of the Congo

Summary: For many countries, natural resources are a curse rather than a blessing. In the Democratic Republic of the Congo (DRC), untapped deposits of raw minerals are estimated to be worth $24 trillion. Most of its population, however, is dismally poor, mainly because both war and political mismanagement have ravaged the country. Conflicts in the DRC, the argument often goes, center around the illegal exploitation of minerals, creating competition between rapacious rebel groups and providing them with the means to purchase weapons and attract fighters. To end the ongoing violence, it was deemed necessary to end the illegal trade in natural resources. In this spirit, Section 1502 of the Dodd-Frank Wall Street Reform and Consumer Protection Act was passed in July 2010. Section 1502 requires all companies listed on the U.S. stock market to trace the minerals used in their supply chain and to declare whether these minerals are conflict-free or not. It specifically targets resources from the DRC and focuses on four minerals: tin, tantalum, tungsten — often referred to as "the 3Ts" — and gold.

Details: Washington, DC: CATO Institute, 2019. 2p.

Source: Internet Resource: Accessed January 11, 2019 at: https://object.cato.org/sites/cato.org/files/pubs/pdf/rb_145.pdf

Year: 2019

Country: International

Keywords: Democratic Republic of the Congo

Shelf Number: 154131


Author: Idris, Iffat

Title: Role of Business in Tackling Modern Slavery in Supply Chains

Summary: Key findings: Not much research has been done on business supply chain management and modern slavery: The available literature is extremely limited. Pressures on companies to tackle modern slavery in supply chains are increasing: These include growing consumer concerns about the issue, fears of reputational damage, the potential for companies to charge more for 'slave free' ethical products, and increasing government regulation. It is not easy to identify modern slavery in supply chains: The complexity of these chains, the different forms of modern slavery, its often transient nature, and active efforts by those involved to conceal it, make it hard to detect. Companies can have vested interests in not tackling it and can even fuel it: Companies benefit hugely from cost savings through use of modern slavery so could be unwilling to tackle it. More worrying, the power asymmetry between large multinationals at the top of the supply chain and lower tier suppliers could create the conditions that lead to use of modern slavery by the latter. Based on this analysis, modern slavery is not an aberration but a normal part of the system. Once detected, responding to modern slavery in supply chains is challenging for firms: The literature is clear that withdrawing from a region/country would make the situation worse. Companies can adopt a multi-stakeholder approach to address modern slavery, but working with a diverse range of unfamiliar actors, each with their own priorities and perspectives, could be difficult. A second option is working at community level to improve local conditions, and a third is engaging with suppliers and supporting their development so they produce goods without using slave labour. Focus in initiatives to date is on identification rather than on tackling modern slavery: California's 2010 Transparency in Supply Chain Act and the 2015 UK Modern Slavery Act are examples of legislation to promote supply chain transparency. However, these only require firms to report on efforts to tackle slavery and do not mandate action to curb it. The International Cocoa Initiative in West Africa takes a multi-stakeholder approach to curbing modern slavery in cocoa production, while IKEA is an example of a retailer promoting supplier development. The bulk of initiatives to date have come from government rather than business.

Details: Brighton, UK: Institute of Development Studies, 2017. 15p.

Source: Internet Resource: Accessed January 11, 2019 at: https://gsdrc.org/wp-content/uploads/2017/05/K4D_HDQ87.pdf

Year: 2017

Country: International

Keywords: IKEA

Shelf Number: 154117


Author: Gauri, Varun

Title: How do Local-Level Institutions Promote Development? An Exploratory Essay

Summary: This paper develops a framework and some hypotheses regarding the impact of local-level, informal legal institutions on three economic outcomes: aggregate growth, inequality, and human capabilities. It presents a set of stylized differences between formal and informal legal justice systems, identifies the pathways through which formal systems promote economic outcomes, reflects on what the stylized differences mean for the potential impact of informal legal institutions on economic outcomes, and looks at extant case studies to examine the plausibility of the arguments presented. The paper concludes that local-level, informal legal institutions: (i) can support social substitutes for the enforcement of contracts, though these substitutes tend to be limited in range and scale; (ii) are flexible and could conceivably be adapted to serve the interests of the poor and marginalized if supportive organizational and social resources could be brought to buttress the legal claims of the disempowered; and (iii) are more likely to support personal integrity rights than the positive liberties that are also constitutive of development as freedom.

Details: Washington, DC: The World Bank Group, 2009. 34p.

Source: Internet Resource: Accessed January 11, 2019 at: https://openknowledge.worldbank.org/handle/10986/18109?locale-attribute=es

Year: 2009

Country: International

Keywords: Case Studies

Shelf Number: 154115


Author: Azimi, Abdul Salam

Title: Justice Development Programming in Fragile and Conflict-Affected Areas: Perspectives of Two Leaders in Justice Administration

Summary: ABSTRACT This spoken presentation profiles the efforts of the Supreme Court of Afghanistan to produce effective plans for developing that court and the judicial system in general. It offers an assessment of the limits of financial assistance by donors in bringing about rapid improvements in the quality of the judiciary. It argues for the need to invest in the human capital of the justice system as the most important though time consuming strategy for overcoming poor judicial performance and reducing corruption in the justice system. It also explains the strategic planning processes of the Supreme Court of Afghanistan and the reasons why the court's current plan deserves continued and sustained support from donors.

Details: Washington, DC: The World Bank Group, 2011. 18p.

Source: Internet Resource: Accessed January 11, 2019 at: http://documents.worldbank.org/curated/en/303181468320046007/Justice-development-programming-in-fragile-and-conflict-affected-areas-perspectives-of-two-leaders-in-justice-administration

Year: 2011

Country: International

Keywords: Afghanistan

Shelf Number: 154112


Author: Alvarado, Nathalie

Title: Crime and Violence: Obstacles to Development in Latin America and Caribbean Cities

Summary: Crime and violence are a common threat to Latin America and the Caribbean, but their manifestations vary across countries, cities, and neighborhoods. Reducing and preventing crime is fundamental to achieving sustainable development in our region, and local governments are strategically positioned to tackle this challenge. Today's cities are increasingly innovating with crime and violence prevention programs. Ensuring the safety and security of citizens is one of – some might even say the primary – functions of municipal governments. Owing to their proximity to local neighborhoods, mayors and other local actors are particularly well located to play a central role in designing, implementing and evaluating strategies to make cities safer and more secure. And while there are obvious benefits to be gained from improving the overall security of cities, they are far from guaranteed. In many parts of the world, including Latin America and the Caribbean, there are few incentives and limited capacity for local governments to play a more active role in improving citizen security.

Details: Rio de Janeiro, Brazil: Igarape Institute, 2018. 30p.

Source: Internet Resource: Accessed January 11, 2019 at: https://igarape.org.br/en/crime-and-violence-obstacles-to-development-in-latin-america-and-caribbean-cities/?utm_campaign=2018_newsletter_10&utm_medium=email&utm_source=RD+Station

Year: 2018

Country: International

Keywords: Caribbean

Shelf Number: 154137


Author: Higginson, Angela

Title: The Impact of Policing Interventions on Violent Crime in Developing Countries

Summary: Background for the review Violent Crime Violence is a global public health problem with complex causes at the individual, family, community, and societal levels (World Health Organization [WHO], 2002a). Worldwide, the direct impact of violence is estimated at 4400 deaths per day and many thousands of injuries (Krug, Mercy, Dahlberg, & Zwi, 2002), and the economic cost of this violence is estimated to be between $95 and $163 billion per year (Geneva Declaration Secretariat, cited in Willman & Makisaka, 2010). Direct costs of violent crime victimisation include those related to health care, lost work productivity, law enforcement and prosecution of offenders, rehabilitation, and repairing damage to property (Fajnzylber, Lederman, and Loayza, 2002; Hofman, Primack, Keusch, and Hrynkow, 2005; WHO, 2002a). For victims, mortality, physical and psychological damage, disability, and social problems are immediate and long-lasting outcomes of violence (WHO, 2002a). The indirect impact of violent crime varies across countries. The World Health Organization (WHO) defines violence as “the intentional use of physical force or power, threatened or actual, against oneself, another person, or against a group or community that either results in or has a high likelihood of resulting in injury, death, psychological harm, maldevelopment or deprivation.” (WHO Global Consultation on Violence and Health, cited in WHO, 2002b, p. 5). Individual level risk factors include age and gender, while individual level protective factors centre on social connections with family, friends or school groups (Willman & Makisaka, 2010). Family risk factors for violent crime include harsh parenting styles, physical or psychological abuse, and the involvement of other family members in crime (United Nations Office on Drugs and Crime (UNODC), 2008). Communities are at risk of violence when violence has historically been present in the area, when firearms are easily available and sections of the population have been trained in their use (UNODC & the Latin America and the Caribbean Region of the World Bank, 2007). Weakness of state security institutions, including the criminal justice system and the military, is also associated with higher levels of violence at the societal level (UNODC, 2005). Rapid urbanisation, low education levels, and high income inequality, especially when divided along religious, ethnic, or racial lines, further increase the risks of violence in a society (Willman and Makisaka, 2010). Developing countries are particularly affected by violent crime, with interpersonal violence a leading cause of death and disability (Hofman et al., 2005; Liebling & KiziriMayengo, 2002; Morrison, Ellsberg, and Bott, 2007; Seedat, Van Niekerk, Jewkes, Suffla, and Ratele, 2009). In addition, violent crime can indirectly suppress growth in developing countries when local or international agents are influenced, by their perceptions of violent crime in the region, to refrain from investing socially or economically in developing the area (Akpokodje, Bowles, & Tigere, 2002). Fear of violence prohibits development by preventing local citizens from travelling to work and school, encouraging capital flight, increasing brain drain as educated citizens leave troubled areas, and lowering social cohesion (Willman & Makisaka, 2010). The World Health Organization typology of violence categorises violent acts into selfdirected violence, interpersonal violence and collective violence, and notes that whilst the nature of the violent act may be similar across categories, the causal mechanisms and motives for each category of violence are very different (WHO, 2002b). The nature of effective interventions will also differ across categories, and therefore the effectiveness of interventions needs to be reviewed separately for each category. Whilst collective violence is a clear threat to the stability and growth of developing countries, the complexities of the specific contexts of collective violence - such as war, state violence, genocide, or terrorist activity - mean that interventions to combat collective violence are likely to be dependent on socio-political context, and are considered to be outside the scope of the present review. Our review focuses on interpersonal violent crimes in developing countries. We define interpersonal violent crime as those acts of violence - such as assault, homicide, rape, kidnapping, sexual assault, and maltreatment - committed by one person or small group against another person or small group. There are many different types of interventions that seek to reduce interpersonal violent crime in developing countries, and several different ways to classify interventions. Interventions can be broadly separated according to the point at which the prevention program is implemented. Programs that aim to prevent or reduce violent crime can be grouped into primary, secondary or tertiary interventions (Van Der Merwe and Dawes, 2007). Primary prevention programs are broad based and aim to prevent the occurrence of a problem or behaviour, secondary prevention programs focus on individuals at risk of developing the behaviour, and tertiary prevention programs focus on reducing the problem behaviour in individuals who already exhibit the behaviour (for example, youths already displaying violent behaviours) (Van Der Merwe and Dawes, 2007). Interventions can be classified according to whether they address violence at either the individual, family or community levels; indeed, it is argued that the most successful interventions are those that address all three levels (Van Der Merwe & Dawes, 2007). Interventions can also be classified according to the societal sector in which they are implemented. Social interventions include parent training programs, school-based education programs, family enrichment, gender equality education, life skills training programs, and edutainment initiatives. Economic-based interventions that target violent crime problems include microfinance credit schemes and raising the price of alcohol. Health sector programs include screening and referral programs, victim advocacy and support groups, and psychological or medical interventions. Programs often involve coordinated, multi-sector responses involving multiple agencies working together to reduce violent crime (WHO, 2002a). Justice system interventions can be defined as interventions that focus on preventing or reducing violent crime and actively involve at least one entity of the justice system (e.g. courts, corrections, police, legislation), or a surrogate organisation providing justice system services (e.g. an NGO intervening to provide conflict mediation services). These organisations may be intervening to provide surrogate justice services (for example, providing conflict mediation services to disputants within the country) or to build justice system capacity (for example, by providing advice or training to a newly formed police force). These supplementary interventions are an important part of the violence prevention portfolio in developing countries, where justice systems are often under-resourced and struggle to contain large problems such as drug trafficking (e.g. Latin America and the Caribbean) or terrorism (e.g. Afghanistan, Pakistan) while dealing with local violent crime. Justice system interventions may include: - Legislative changes to criminalise violent behaviour or strengthen penalties for violent crime; - Police actions such as community policing, increased patrols, police training programs, and creation of specialist police forces; - Removal of risk factors for violence through enforcement of bans on alcohol and firearms; - Reformation of the court system through legal aid systems, alternative processing of violent offenders and alternatives to formal court processes such as restorative justice programs. The largest, and arguably the most important, component of the justice system that focuses on efforts to reduce violent crime is policing. Indeed, the preliminary results of our scoping review indicate that the largest category of justice system interventions that address interpersonal violent crime in developing countries relate to policing, with over one third of documents describing justice system interventions reporting on the areas of police reform, activity, training, surveillance and non-state policing. As such, the focus of our review is to synthesise the evaluation literature that focuses on policing interventions that target violent crime in developing countries. We will include policing interventions that work at primary, secondary or tertiary levels, and interventions that focus on individual, family or community factors. Policing in developing countries In developed democracies, police reform has generally followed what Kelling and Moore (1988) describe as three major eras of policing: the political era, the professional era and the community policing era. Whilst policing scholars debate the detail of these eras in policing history (see Bayley, 1994; Greene & Mastrofski, 1988; Skogan, 1990), they argue that policing in the 21st century is most likely characterised by a new era of policing (Bayley & Nixon, 2010; Mazerolle & Ransley, 2005; Stone & Travis, 2011). Policing in democratic societies has largely moved from being highly politicised agencies - responding to calls for service based on political demands, deriving their legitimacy from local political authorities, with a broad mandate to deal with a range of social issues from hunger to homelessness to riot control - to going through the professionalisation of the occupation during the 1970s, to establishing the foundations for community policing during the late 1980s and early 1990s. We also note that different police agencies progressed through these eras at different time periods in developed democracies. We argue that developed country police agencies, which have experienced all three eras of change and development over a period of nearly 100 years, are situated very differently to police agencies in emerging democracies. Policing and police agencies in many emerging democracies and developing countries have very different histories to those in the developed world: often times developing countries have long histories of military or totalitarian rule, with no experience of a civilian police (Brogden, 2002). Many countries have experienced only great politicisation of their policing services and have skipped over the professionalisation era in an effort to quickly establish community policing approaches as part of rapid state building activities (see, for example, Goldsmith and Dinnen, 2007; Goldsmith and Harris, 2010). Moreover, most developing countries lack the physical infrastructure, governance mechanisms and social norms that form an essential background to the successful implementation of policing interventions indeveloped democracies, and they often lack a strong judiciary to regulate and constrain policing behaviour. This review will focus on policing interventions and their ability to prevent or reduce violence in developing countries. We use the term "developing countries" to refer to economically developing countries, defined as developing according to World Bank country classifications (http://data.worldbank.org/about/country-classifications/countryand-lending-groups). However, we acknowledge that there can be economically developing countries that are established democracies and economically developed countries that are "developing" democratically. Despite the continuity implied by the terms "developing" and "developed," we propose that there are significant and qualitative differences between policing initiatives in western democracies and those that are implemented in developing countries. The fundamental difference lies in the institutional histories and capacities of police agencies in developed and developing countries. The contextual differences in intervention implementation provide a strong justification for a review exclusively focused on developing country evidence; those strategies that have been deemed successful for policing in developed countries are not necessarily appropriate for developing countries. These countries often have low police professionalism, poor relations between the police and the public, under-equipped police services and an unstable political and/or socio-economic situation, and, in some cases, low community enthusiasm and participation (Eijkman, 2006; Frühling, 2007, 2011). We recognise that there are likely to be few high-quality experimental and quasiexperimental evaluations of violent crime interventions in developing countries. Developing countries struggle to provide accurate and reliable data on criminal justice processes, lack research resources, have varying culture-specific definitions of violent crime, and, in many cases, seriously under-report certain types of crime such as sex and race-based violence. Ethical considerations associated with researching violent crime in developing countries also contribute to the dearth of research (Neugebauer, 1999; WHO, 2002a). Much of the existing evidence is not available in a published, peer-reviewed form, and often essential information is not reported. No systematic review has combined experimental and quasi-experimental evidence from developing countries on the impact of violent crime interventions. The sole reviews conducted on the topic have been qualitative and exploratory in nature (Akpokodje et al., 2002; Willman & Makisaka, 2010). Despite the likely data limitations, we consider the topic urgent and important enough to warrant a full systematic review of experimental and quasi-experimental impact evaluations. Overall, we argue that the different histories and structural context of policing in developed and developing countries are so fundamentally different that we will only include policing interventions that target populations in developing countries. We do not limit the geographic focus of the review, except to exclude countries defined as “developed” by the World Bank. This exclusion is intended to limit the population under study and not to necessarily limit the geographic region under study.

Details: Queensland, Australia: International Initiative for Impact Evaluation, 2013. 31p.

Source: Internet Resource: Accessed January 11, 2019 at: https://espace.library.uq.edu.au/data/UQ_308505/UQ308505_protocol.pdf?Expires=1547323086&Signature=eMW4Bu7KFq7KtNeu1cVqDuuNnw51AGI8q9YgyJKhCt5D1bwqu0iqlE0gWZFAEKHnETPONL5nDHGp3fCZAjwydsCo0OE1z4xfeiEVXMv7p2VmqoNAmZWhyVdtYCnhX-eRFlBjxPFeN~aNsK4yGjl~LbMD7dDH~fRWvH7~BA7Vy0oFNMltkNRQej-pmyoNxMSY7xWBHEOst3nsRl-u8nsA00sITQLxVc13-E358YL4TlLx9PbrB2qh1YjxOCzcCJIq026GbYOvHv2a1LPqtBUc4hZmqxZHjqJr1XYwqhZ2uOmNBL4GPeSaC8fl8vXZYFBE~i4wbHLCnzW60Vf6wzRM1Q__&Key-Pair-Id=APKAJKNBJ4MJBJNC6NLQ

Year: 2013

Country: International

Keywords: Costs of Crime

Shelf Number: 154107


Author: World Health Organization, Europe

Title: The Economic Dimensions of Interpersonal Violence

Summary: Summary Interpersonal violence is expensive. For instance, estimates of the cost of violence in the United States of America reach 3.3 percent of the gross domestic product. In England and Wales, the total costs from violence - including homicide, wounding and sexual assault - amount to an estimated $40.2 billion annually. Interpersonal violence is defined to include violence between family members and intimate partners and violence between acquaintances and strangers that is not intended to further the aims of any formally defined group or cause. Self-directed violence, war, state-sponsored violence and other collective violence are specifically excluded from these definitions. This report, based on an extensive review of peer reviewed articles and published and unpublished reports, treats the following themes: - The economic effects of interpersonal violence in a variety of socioeconomic and cultural settings. - The economic effects of interventions intended to reduce interpersonal violence. - The effects of economic conditions and policies on interpersonal violence - with particular reference to poverty, structural adjustment, income equality and social investment. Interpersonal violence disproportionately affects low- and middle-income countries. The economic effects are also likely to be more severe in poorer countries. However, as this report shows, there is a scarcity of studies of the economic effects of this violence in low- and middle-income countries. Comparisons with high-income countries are complicated by the fact that economic losses related to productivity tend to be undervalued in low-income countries since these losses are typically based on foregone wages and income. For example, a single homicide is calculated to cost, on average, $15 319 in South Africa, $602 000 in Australia, $829 000 in New Zealand, and more than $2 million in the USA. Many of the studies detailing the costs of violence are from the USA where child abuse results in $94 billion in annual costs to the economy - 1.0 percent of the gross domestic product. Direct medical treatment costs per abused child have been calculated by different studies to range from $13 781 to $42 518. Intimate partner violence costs the USA economy $12.6 billion on an annual basis - 0.1 percent of the gross domestic product - compared to 1.6 percent of the gross domestic product in Nicaragua and 2.0 percent of the gross domestic product in Chile. Gun violence - which includes suicides - has alone been calculated at $155 billion annually in the USA, with lifetime medical treatment costs per victim ranging from $37 000 to $42 000. Evidence abounds that the public sector - and thus society in general - bears much of the economic burden of interpersonal violence. Several studies in the USA showed that from 56 percent to 80 percent of the costs of care for gun and stabbing injuries are either directly paid by public financing or are not paid at all - in which case they are absorbed by the government and society in the form of uncompensated care financing and overall higher payment rates. In low- and middle-income countries, it is also probable that society absorbs much of the costs of violence through direct public expenditures and negative effects on investment and economic growth. There are relatively few published economic evaluations of interventions targeting interpersonal violence. Available studies showed that preventive interventions to stop interpersonal violence occurring cost less than the money that they save, in some cases by several orders of magnitude. The 1994 Violence Against Women Act in the USA has resulted in an estimated net benefit of $16.4 billion, including $14.8 billion in averted victim's costs. A separate analysis showed that providing shelters for victims of domestic violence resulted in a benefit to cost ratio between 6.8 and 18.4. Similarly, the costs of a programme to prevent child abuse through counselling equalled 5.0 percent of the costs of child abuse itself. Implementation of a gun registration law in Canada cost $70 million, in comparison with a total annual cost of $5.6 billion for firearm-related injuries in that country. Interventions that targeted juvenile offenders - including aggression replacement training and foster care treatment - resulted in economic benefits that were more than 30 times greater than the corresponding costs. The approaches taken to several key methodological issues differed substantially across the studies reviewed. Studies documenting the economic effects of interpersonal violence have used a broad range of categories of costs. Those estimating indirect costs - including the opportunity cost of time, lost productivity and reduced quality of life - provided higher cost estimates than studies that limited the costs of violence to direct costs alone. Other key methodological issues included the economic values assigned to human life, lost productive time and psychological distress. The rate at which future costs and benefits are discounted, in accounting terms, also varied across studies. Given the wide range of methodological differences and extensive gaps in the existing literature on the economics of interpersonal violence, there is a clear need for systematic future research into the costs of violence. Such research should follow rigorous methodological guidelines, be inclusive of both direct and indirect cost categories, and - perhaps most importantly - be comparable across countries and settings. The World report on violence and health (Krug et al., 2002) also showed that effective interventions are available - particularly in the areas of child abuse and neglect by caregivers, youth violence and gun-related violence. Given the overwhelming evidence of the high costs of interpersonal violence, detailed analysis of the economic feasibility of interventions is a clear research priority.

Details: Geneva, Switzerland: World Health Organization, 2004. 70p.

Source: Internet Resource: Accessed January 11, 2019 at: http://apps.who.int/iris/bitstream/handle/10665/42944/9241591609.pdf;jsessionid=EBA6E91F536ECB8444021C76ECAA0491?sequence=1

Year: 2004

Country: International

Keywords: Child Abuse

Shelf Number: 154106


Author: Overton, Iain, ed.

Title: Understanding the Regional and Transnational Networks that Facilitate IED Use

Summary: The main perpetrators of IED attacks in the countries most affected by explosive violence are almost all Salafi-jihadi in outlook and in practice. The jihadi terrorism that fuels such attacks is, in turn, a globalised transnational enterprise, networked but largely decentralised in its operations. This report examines the regional and transnational networks that facilitate IED use, aiming throughout to analyse and explain as well as to describe them. We have focused on networks linking the ‘Islamic State’ (IS); al-Qaeda (AQ) and its affiliates; the Taliban; al-Shabaab; and Boko Haram, as these are the major groups responsible for the worst IED violence. In section 2 we introduce the non-state actors regularly using IEDs, together with technical data and notes on their tactics, techniques and procedures. We show how the groups under review use IEDs both for quasi-military purposes and as an insurgency tactic, and do so in very similar ways. AOAV’s data reveal, for example, remarkable similarities in the proportion of suicide bombings different groups carry out, and the ratio of civilian to armed actor casualties of their attacks. Most of the groups target civilians with IEDs and, in the countries worst affected by their actions, civilians overwhelmingly represent the majority of the casualties they inflict. AOAV has been able to identify links between several of the groups relating to the manufacture, tactics and usage of IEDs, as well as signs of interorganisational cooperation. Much of the material that terrorist groups’ bomb-makers use in their improvised devices is stolen military ammunition, supplemented by commercially available precursor materials such as fertiliser, potassium chlorate, hydrogen peroxide and other chemicals. We track the sources of these components and the exchange of bomb-making expertise between groups. Section 3 looks at the cultural, religious and ideological underpinnings of Islamist terrorism, and focuses on these groups’ shared Salafi-jihadi ideology in the context of other relevant factors. We examine the arguments of classical and contemporary Salafi scholars in Islamic jurisprudence both for and against armed jihad, suicide bombings, and the targeting of civilians. For example, we see how IS made unorthodox use of the Islamic principles of qisas and mumathala to justify the burning of Jordanian Air Force pilot Muath al-Kasasbeh in February 2015, in defiance of mainstream Islamic scholarly opinion that it is forbidden to use fire as a punishment. The sectarian – that is, anti-Shia – dimension of Salafi-jihadism is also discussed. Groups vary in the degree to which they seek to justify their actions theologically, but they all adopt some sort of religious framework. At group level they paint a black-and-white view of the world, depicting their actions as a defence of Islam and a virtuous struggle against corruption and injustice, and some of their grievances are legitimate. Yet individual followers are often motivated by more personal or local socio-economic factors, and may have joined the jihad as an act of rebellion, thrill-seeking or self-protection. Action to address issues such as social or economic inequality, corruption and injustice would, as a by-product, be of considerable value to counterterrorism efforts. The Islamic ‘caliphate’ in Iraq and Syria is the new Afghanistan. As in the 1980s, a conflict portrayed by the Salafi-jihadis as a battle between Islam and anti-Islamic forces is attracting thousands of foreign volunteers. These fighters may – some of them, at least – return to their countries of origin to carry out bombings and other terrorist attacks, or go on to fight elsewhere. It was in Afghanistan, and more recently in Iraq and now in Syria, that jihadi recruits have received their most intensive indoctrination and training. Already over 20,000 foreign fighters have reportedly arrived in IS-controlled Syria and Iraq, more than the total number of foreign fighters who battled the Soviet Union in Afghanistan. Section 4 examines the foreign fighters phenomenon. IS recruitment propaganda is heavily slanted toward foreigners, and nearly 20% of the foreign fighters travelling to Syria and Iraq have been from Western Europe. A disproportionate (though still small) number have been converts to Islam. The potential threat posed by foreign fighters returning home is a challenge facing not only Western governments but also those in the Middle East and North Africa region, which continues to provide the bulk of the insurgents. Not all returnees will be intent on mayhem, however; many may be traumatised or disillusioned. The sources of Islamist terrorist groups’ financial, material and human resources are diverse and have evolved with changing circumstances – including counterterrorism measures – in recent years. Section 5 shows that state sponsorship has become less of an issue than was previously the case, although Qatar and Kuwait (see section 6) are still passively allowing private donations to reach groups in Syria fighting the Assad regime, especially Jabhat al-Nusra. Since the rise of IS in Syria and Iraq and IS-linked terrorist plots within the kingdom, Saudi Arabia in particular has cracked down on terrorist financing and joined in coalition airstrikes against IS. It continues, though, to sponsor military action against those it sees as allies of Iran in Syria and Yemen. Most of the Gulf states now have legislation and mechanisms in place for combating the financing of terrorism, and these are starting to be used, at least with reference to IS. Where state sponsorship and/or private donations have been reduced, and especially in the case of IS, where the group postures as an independent power, terrorist organisations have developed diversified quasi-state economies. They rely heavily on revenues from oil and agriculture and various forms of taxation. They also attempt to provide some kinds of public services. Criminal activities such as extortion, illicit trade and kidnapping for ransom are also important sources of funds for these groups. Two emerging features of terrorist financing are highlighted. The first is the two-way flow of funds between, primarily, IS in Syria and Iraq and returning fighters or new recruits from a wide range of places, including Western Europe and the US but also Libya and possibly other Middle Eastern states. The second is the movement of self-funding foreign fighters into conflict zones, often bringing with them material support of various kinds, and their use of multiple small transactions to microfinance their jihad. The report notes innovative measures being piloted to track this form of funding. Islamic charities, which have a track record of supporting violent jihadi groups in the past, are also looked at. They continue to play a nebulous but potentially significant role in the funding of terrorism. These charities carry out much valued humanitarian work in many of the areas most affected by IED violence, but their association with particular groups has a darker side: it aids jihadis’ efforts to win local hearts and minds. In some instances, there are even plausible claims that weapons have been transferred to armed groups under the cover of humanitarian aid. Pan-Islamic humanitarianism often responds to the same rhetoric as the global jihad: the need to aid fellow-Muslims suffering hardship or aggression by non-Muslims. Both forms of response draw on a sense of solidarity and, on its own terms, altruism. Section 7 tracks the way in which decades of oil-financed Wahhabi propaganda have – without promoting violence – spread fundamentalist Salafi Islam across the globe, largely as a counterweight to Shiism and the political Islam of the Muslim Brotherhood. Wealthy Arab states continue to fund mosque-building and proselytisation, including in the non-Muslim West. This has contributed to providing fertile ground for some groups, especially nowadays with the aid of social media, to find potential recruits for a more radical outlook. Radicalisation, however, tends to take place not in mainstream or foreign-funded mosques but in private prayer halls and ‘garage mosques’. We conclude that the Salafi-jihadi genie is out of the bottle. Whereas previously jihadi recruits would have been young, radicalised Muslims, it may be that radicalism itself is now attracting other alienated youth to Islam, making the radicalisation process all the harder to monitor. In examining the ongoing efforts of some Gulf states to spread Salafi Islam in Europe, we have questioned whether this is compatible with host societies’ desire to integrate Muslims in their communities. We suggest that at a minimum, greater transparency on the part of Gulf State donors and local European Muslim recipients is called for. To round off the report, we identify in section 8 some areas of concern for the future, top of the list being the Sahel region. AQIM and IS in Libya are already active to the north, and Boko Haram to the south. The fluidity of alliances among these and other similar groups is an additional factor for instability. Mali is a hub of Salafi-jihadi influence. Niger is seen as particularly vulnerable to more radical jihadi violence, largely due to economic stagnation, high population growth, rapid urbanisation and climate change. AOAV’s data show a sharp increase in IED attacks in Egypt, by a range of minor groups, in 2014 and 2015. There have also been a large number of terrorist attacks reported in Sinai in 2016. Egypt’s repressive government, bleak economic outlook and vulnerability to a spillover of violence from neighbouring Libya make it another area to watch. Finally, the report addresses the conundrum of NATO ally Turkey’s ambivalent relations with IS and Jahbat al-Nusra, and its ongoing hostility to the PKK. Turkey, now facing IED violence on its own soil, is critical to international efforts to tackle the epicentre of the globalised transnational jihad and its profligate use of IEDs, the source of so many civilian deaths. Notes on methodology The IED data in this report are based on AOAV’s Explosive Weapons Monitor Project (EWMP), and cover IED attacks between January 1, 2011 and June 30, 2016. The analysis of IED tactics, techniques and procedures (TTP) in this report is therefore based on events that occurred and were recorded by the EWMP within this timeframe; events occurring before or after this period have not been included. However, in order to provide a comprehensive view of the networks behind IED attacks, the report does not limit itself to this timeframe when discussing the general workings of these groups. The full methodology of the EWMP can be found through the AOAV website. However, some notes should be made in regard to its use in this report. The EWMP collects data on global explosive violence from English language sources. Sources are collected through an amalgamation of alerts set up for certain words pertaining to explosive violence being used in news stories. Examples of such words include ‘explosion’, ‘rocket’, and ‘IED’. Only attacks that have produced casualties (killed and/or injured) are taken into account. Incidents are classified according to the launch method used. For the purposes of this report, the part of the EWMP classified as ‘Launch method: IED’ is therefore the one that has been analysed. This launch method may have different activation methods, which means that suicide bombings and car bombs (among others) are included in the report as long as the device used was an IED. The EWMP also records the location, time, target and perpetrator (if known) of IED attacks. In the report, responsibility for attacks is assigned according to two variables: first, if a group claims responsibility for the attack, and second, if a group is clearly named as the perpetrator in the source used. As groups have had different names during the timeframe under review, the total number of attacks attributed to their various names has been merged. For example, the Islamic State in Iraq’s (ISI's) attacks have been merged with the Islamic State’s (IS's) attacks to create a single total figure. It should be noted that since many attacks are never attributed to a specific perpetrator, the true number of attacks by any perpetrator may be higher than that given in this report. Groups are referred to by only one name throughout this report, regardless of whether they have been known by other names during the timeframe under consideration. For example, Islamic State (IS) is called IS throughout the report, despite having been known by other names between 2011 and 2016. Conversely, the group currently known as Jabhat Fateh al-Sham is called Jabhat al-Nusra in this report, since this is the name by which the group was known during the period when the IED data used in this report were collected.

Details: London, UK: Action on Armed Violence, 2017.

Source: Internet Resource: Accessed January 12, 2019 at: https://aoav.org.uk/explosiveviolence/ieds/understanding-regional-transnational-networks-facilitate-ied-use/

Year: 2017

Country: International

Keywords: al-Qaeda

Shelf Number: 154098


Author: Rollins, Tom

Title: Physical Fences and Digital Divides, Part II: "Why Would You Go?" Case Studies of Social Media in North Africa and the Mediterranean

Summary: INTRODUCTION Groups of youths from around West Africa are sitting in a cafe-cum-community space down a Palermo back-street. There's free Internet at the Arci Porco Rosso Centre - something of an essential round here - and the table in the corner is a tangle of phone chargers and accents. For some of the mostly young men here, this is the first time they have owned a smartphone since leaving home and crossing the perils of the Mediterranean to reach Sicily. “I never used social media before,” says 23-year-old Moussa, from Guinea.1 “I had a phone during the journey but it was just an old phone - it didn’t have WhatsApp or Facebook, or even the internet.” Academic literature and journalistic coverage of migration and social media (as well as migration and tech more generally) have taught us that smartphones are a “migrant essential,” a very modern feature of 21st-century migration. Europe is familiar with the sight of refugees employing phones to get to their destinations, and the role of social media has been endlessly discussed and debated since the advent of the so-called refugee crisis that began some time in 2015. The first instalment of this special report argued that while officials and politicians often present new digital platforms as hand-held facilitators of irregular migration and security threats that enable traffickers and illicit enterprises, these technologies have also played a critically important role in aiding refugees, asylum seekers, and migrants in need. Online platforms, the first instalment argued, help individuals connect to the outside world from inside detention centres, provide desperately needed information about sources of humanitarian assistance, and enable the creation of digital communities that give migrants and their loved ones’ agency to proactively search out solutions. It also suggested that journalists, researchers, and policymakers had focused too much on the Balkan Route to understand social media use by people on the move - and that various factors impacted social media in different migratory contexts. However, there are gaps in the literature about how new information and communications technologies (ICTs) are used both for and during irregular migration. Clearly, to better understand this, it is necessary to speak to refugees, asylum seekers, and migrants themselves. Previous reports have revealed that the use of social media by people on the move varies depending on different factors. The UN High Commissioner for Refugees (UNHCR), for example, has found that Syrians and Afghans using the same migratory route from Turkey to Greece and the Balkans use Facebook and other apps in different ways, and that their reliance on and trust of smuggling networks through social media is also different. Journalists have reported that refugees, asylum seekers, and migrants passing through the Central Mediterranean appear to use social media (and carry smartphones) less frequently than those on the move elsewhere. Migration experts have noted how the use of social media in origin, transit, and destination countries remains “uneven,” depending on a range of factors like age, gender, nationality, and basic socio-economics back home - which have led to the emergence of "digital divides" - while differing smuggling modus operandi on a given route leads to contrasting uses of social media. The European Commission (EC) has also produced studies investigating these differences. According to a recent EC report on West African migration, people from this region tend to "rely on word-of-mouth communication to devise and implement migration plans” because “people smugglers play a diminished role in motivating migration journeys.” It found that communication from an origin country tends to depend on encouragement from diaspora networks, peer pressure from local networks, or the presentation of opportunity by a recruitment agent, broker, or smuggler. In contrast to the activities reported by some of the other populations covered in this GDP report - particularly people fleeing Syria - the EC report found that few migrants from West Africa “actively searched for information online before migrating.” Social media and ICTs were “more commonly used as channels of communications rather than platforms to gather information on migration,” and their primary role was to “facilitate private communication between migrants, potential migrants, and their networks.” In early 2018, the author travelled to Egypt and Sicily to speak with refugees, asylum seekers, and migrants about how social media and other tech were employed during their migration journeys. This second instalment of the GDP Special Report Physical Fences and Digital Divides” details lessons learned from these on-the-ground investigations. One broad finding is that usage of digital tools is far more varied than the extant literature generally reports. Many sources, for example, emphasised the importance of community and diaspora networks during the various stages of their journeys and downplayed the role of social media and smartphones, which were often barely used—and sometimes not at all. Ultimately, the material presented here challenges some of our current assumptions about the relationship between digital media and migration, including oft-repeated claims that social media can serve as an “awareness-raising” tool to help limit migration flows.

Details: Geneva, Switzerland: Global Detention Project, 2018. 36p.

Source: Internet Resource: Accessed January 12, 2019 at: https://reliefweb.int/report/world/physical-fences-and-digital-divides-part-ii-why-would-you-go-case-studies-social-media

Year: 2018

Country: International

Keywords: Asylum Seekers

Shelf Number: 154079


Author: Viuhko, M.

Title: Exploitative Sham Marriages: Exploring the Links Between Human Trafficking and Sham Marriages

Summary: In recent years, concern over sham marriages as a form of exploitation in human trafficking has increased in Europe. A research report, published by HEUNI in October 2016, sheds light on the links between trafficking in human beings and sham marriages that include exploitation of persons. In a marriage of convenience, the parties would get married, and later separate, by common consent. However, in some cases the marriage can become exploitative, or can even lead to human trafficking. Some of the cases identified within the scope of this project (HESTIA) included serious and continued exploitation, sexual and physical violence, limitations of personal freedom and movement, and confiscation of identity documents. Some of the cases included all the necessary elements (the act, the means, and the purpose) for defining them as involving human trafficking.

Details: Helsinki, Finland: HEUNI, 2017. 4p.

Source: Internet Resource: Accessed January 12, 2019 at: http://www.cilvektirdznieciba.lv/uploads/files/heuni_hestia_policypaper_final.pdf

Year: 2017

Country: International

Keywords: Exploitation

Shelf Number: 154073


Author: OECD

Title: Terrorism, Corruption and the Criminal Exploitation of Natural Resources

Summary: Corruption and terrorism do not only join forces in conflict-affected countries where criminal activities are likely to flourish. In any country where endemic corruption has made the country itself or its neighbors vulnerable to terrorist activities, terrorist organisations are ready to use it to finance and perpetrate their acts. Like criminals and those ready to take their bribes, terrorist organisations depend on the same legal grey areas and the porosity of the financial sector to channel their financing. As such, no country is totally immune. Identifying connections between corruption and terrorism, as well as the means to break them, is crucial to fighting terrorism. Four main types of connection can be identified: - Corruption and poor governance hamper countries’ ability to fight terrorism - Corruption facilitates international terror attacks - Corruption helps cross-border terrorist financing - Corruption and terrorist financing share methods to hide money

Details: Paris, France: Organization for the Economic Development and Cooperation, 2017. 8p

Source: Internet Resource: Accessed January 14, 2019 at: https://www.oecd.org/investment/Terrorism-Corruption-Criminal-Exploitation-Natural-Resources-2017.pdf

Year: 2017

Country: International

Keywords: Conflict-Affected Countries

Shelf Number: 154149


Author: Monras, Joan

Title: Understanding the Effects of Legalizing Undocumented Immigrants

Summary: Many countries host large numbers of undocumented immigrants. By many accounts, the United States leads this ranking. According to the Pew Research Center, in 2010 there were as many as 11 million unauthorized immigrants on American soil, representing 26 percent of all immigrants. These large numbers of undocumented immigrants have led recent U.S. administrations, not without controversy, to consider either legalizing these immigrants or deporting many of them to their countries of origin. The United States is not alone in hosting undocumented immigrants. Migration Watch UK estimated the undocumented immigrant population in the United Kingdom to be 1.1 million in 2010, representing more than 13 percent of all immigrants in the country. A European Commission research project on undocumented migration, the Clandestino Project, estimated that, in 2008, there were between 1.9 and 3.8 million undocumented immigrants in the EU27, representing between 7 percent and 13 percent of the total immigrant population. In the early 2000s, Spain experienced a large immigration boom. From 1995 to 2004, the share of immigrants in the working-age population increased from less than 2 percent to around 10 percent. Many of these newly arrived immigrants lacked work permits. According to some accounts, as many as 1 million immigrants-in a country of around 43 million inhabitants-were undocumented by 2004. Despite the prominence of undocumented migration in public debates, we know relatively little about the effect of legalizing the work status of immigrants. Most academic research has focused on understanding how legal status affects immigrants themselves. We know from this work that gaining legal status is beneficial to immigrant workers in a number of ways. However, we still know relatively little about how the mass legalization of immigrants affects the overall host economy. Our research addresses this gap using a unique natural experiment.

Details: Washington, DC: CATO Institute, 2018. 2p.

Source: Internet Resource: Accessed January 14, 2019 at: https://www.cato.org/publications/research-briefs-economic-policy/understanding-effects-legalizing-undocumented

Year: 2018

Country: International

Keywords: CATO Institute

Shelf Number: 154153


Author: Child, Early and Forced Marriage and Sexuality Programs Working Group

Title: Tackling the Taboo: Sexuality and Gender Transformative Programmes to End Child Marriage

Summary: INTRODUCTION AND METHODOLOGY The control and regulation of sexuality - in particular, the control of adolescent girls' sexuality - remains a critical and often unaddressed way in which gender inequality manifests across different cultural contexts. Virtually all communities place legal, religious, political or socio-economic restrictions on: - how sensuality, intimacy and pleasure are experienced - how people - in particular girls - express their sexuality, including sexual orientation and gender identities - how people engage in sexual and other intimate relationships - how they understand and ensure their own sexual and reproductive health - the exercise of sexual agency and bodily autonomy in general. For adolescent girls, these restrictions are exacerbated because age and gender are key dimensions of power inequalities, and girls usually lack access to power and are highly constrained in their ability to make decisions for themselves. Marriage, as a social, cultural and economic institution, also plays a key role in this control of girls' sexuality and bodily autonomy. Over the past few years, there has been a growing awareness that patriarchy and the control of sexuality matter in terms of understanding both the complex causes of and the diverse solutions to the practice of child, early and forced marriage (CEFM). Girls may struggle to develop a healthy view of their sexuality in the face of prevailing beliefs that deny their sexual desires and define female sexuality as passive and vulnerable. Girls' lives and mobility are under constant scrutiny, and any deviation from the dominant gender norms is severely penalised. The sexuality and mobility of married girls, too, is often highly restricted and limited to household activities and childbearing. The Child, Early and Forced Marriage and Sexuality Programs Working Group (CSPWG) commissioning this report acknowledges that sexuality is intrinsically linked with power dynamics and as such requires an understanding of different dimensions of inequality including age, class, caste, sexual orientation and gender identity and highlights the importance of challenging practices of CEFM with gender-transformative approaches (GTAs). The ultimate goal of this research is to identify promising gender-transformative programming that addresses sexuality and links with reducing CEFM, including by highlighting promising gender-transformative work taking place in politically and culturally conservative contexts. This research foregrounds successful empowerment approaches that consider the inequalities and harmful social norms that married and unmarried girls and young women disproportionately face, and focuses on and identifies initiatives that recognise and support girls' autonomy with skills, knowledge, and agency (including sexual agency). Working definition of gender-transformative programming Gender Transformative Approaches (GTAs), seek 'to reshape gender relations to be more gender equitable, largely through approaches that free individuals across the gender spectrum from the impact of destructive gender and sexual norms'. Gender-transformative approaches encourage critical awareness of gender roles and norms; promote the position of girls and women; challenge the distribution of resources and allocation of duties between men and women; and/or address the power relationships between girls and women and others in the community, such as service providers or traditional leaders. The ultimate aim of GTA is to achieve gender equality, empowering women, girls and gender non-conforming young people, promoting health and eliminating violence. Gender-transformative approaches may require working at all levels of an ecological model (individual - family/ relationships - communities – society etc.) and may be highly contextually specific. Research methodology -- The consultant team undertook extensive information-gathering and a detailed analysis of selected programmes and organisations to identify and understand promising programming and approaches with potential for replication. Through a highly iterative process with multiple phases, a review of 190 programmes was narrowed down to a pool of 26 using a set of parameters developed in consultation with the CSPWG and based on existing knowledge of what constitutes gender-transformative sexuality programming. The analysis of the 26 short-listed programmes surfaced promising approaches and positive outcomes linked to sexuality and CEFM. The project put special effort into uncovering lesser known and under-documented grassroots organisations, as well as paying attention to diversity, including context and geography among other factors. Nevertheless, a large number of organisations were excluded from the analysis due to lack of response or ability to provide documentation. FINDINGS -- Addressing the control of adolescent sexuality from a rights framework that includes issues like consent, choice, and pleasure is very challenging. Such efforts are often met with reluctance and resistance at all levels - from families, communities, schools, health service providers, community-based organisations, government officials, and policymakers. Issues around sexuality are widely considered to be taboo, and the extreme sensitivity around these issues is palpable. In particular, organisations working in highly conservative and religious settings tend to use other entry points to address sexuality (sports and formal education scholarships, for example), and some introduce the topic of sexuality through more general or indirect lenses (through health or hygiene). The review looked carefully at promising approaches that are making significant strides in achieving normative and legal change and positively impacting the lives of girls. While even well-articulated programmes that involved the parents and the communities experienced some form of backlash, it can be argued that this iterative and complex journey is already 'transformative' as it shakes the foundations upon which unequal gender norms are established. Below are some of the components of programmatic success found through this review. The full report and findings will be available later in 2018. - Grounding programmes in the contexts where they are implemented Formative research ahead of programme design and implementation is critical to understand the specific local drivers of CEFM (including gender norms) and the ways in which sexuality is generally conceived in a community. In addition, in-depth contextual analysis helps to gain community trust and develop tailored strategies. Hiring staff that know the values and practices of their community is also instrumental in building trust, gaining community buy-in, and driving change. This is especially important when addressing issues around sexuality, to minimise backlash against the language and approaches used during programme implementation. But it is important to note that, even with the involvement of communities, resistance and opposition are still very common. Interestingly, some organisations have found that this process of dealing with and responding to opposition can be part of the journey of transformation that leads to longer-term and more sustainable change. - Gender-sensitive, flexible, context-specific and relatable curricula The majority of organisations note that the language used in curricula should be given special attention to ensure that it is culturally appropriate, as well as relevant and relatable - using, for instance, current and site-specific case studies. Curricula, some argue, must be developed with a grassroots approach, starting with the girls and boys themselves and engaging them in the actual design and adaptation processes. Many organisations have their curricula and resource materials evaluated and pilot-tested before implementation, making any necessary revisions with the help of reviewers drawn from among the target girls themselves, and from civil society representatives, religious scholars, educators, subject experts, teachers, and parents. - Girls as agents of change and leaders: ownership, involvement, and training Young people need to be recognised as crucial partners in sexual and reproductive health interventions, and not treated merely as recipients or beneficiaries. Indeed, girls' ability to speak up for their own rights played a major part in the achievement of some of the organisations' results: once they asserted their own rights, it was generally easier for others, such as their parents, to support their decisions. However, as the YP Foundation points out, "young people don't just run on motivation and fresh air"; strong support networks are needed, as well as strategies that include connecting participants and graduates with further learning and development opportunities. Beyond training young people and strengthening their individual leadership skills, many organisations note that collectivising girls to take joint action has empowered them to voice their opinions and concerns at the community level and enabled them to collectively work out solutions to their problems. Once girls form a critical mass that is seen in public behaving according to new social norms, these new platforms can sustain other activities and efforts that benefit other women in their communities. - Community ownership: partnerships with parents and other gatekeepers Established networks and trust within communities are widely cited as indispensable assets in the implementation of activities that address sensitive issues. When working with adolescent girls, who seldom have a voice in the public sphere, it is critical to create an enabling community environment through community mobilisation and involvement. Consulting, engaging with and securing buy-in from religious leaders and religious scholars may be very important in informing and developing strategies of resilience to any backlash. Parents and adult community members are critical gatekeepers to changing the social institutions that support CEFM and hamper girls' bodily integrity and sexual agency. Securing their support from the outset can help reduce resistance and identify allies and partners. - Addressing gender norms and challenging stereotypes about femininity and masculinity by engaging men and boys as active agents of change for gender equality Challenging inequitable gender norms is at the core of successful gender-transformative programming and is a critical approach for achieving sexual and reproductive health rights and CEFM outcomes. Besides working with girls and women, most successful approaches not only involve, educate, and empower men and boys, but challenge them to understand and reject their privilege, toxic masculinities, and to hold other men and boys accountable. To achieve this, successful programmes tap into young men's interests, whether through a particular vehicle for intervention (e.g., sports), or through its content and messaging (e.g., tailored to incorporate key issues facing young men). - Careful selection, training, and ongoing support of teachers, mentors and facilitators based on clear, well-articulated, and fully agreed principles The attitudes and aptitudes of teachers, mentors, or facilitators around content areas such as sex and gender are key to the successful implementation of the programmes. The selection process should include assessment of a candidate's ability and willingness to teach the curriculum. For example, they must be fully accepting of different aspects of sexuality and should address any prejudices or discomfort they may have beforehand (e.g. with regard to homosexuality or sex before marriage). Before a programme starts, some organisations conduct "values clarification" exercises to ensure whoever is delivering the curriculum fully embraces feminist principles of equal and inalienable rights. While conducting gender-transformative training and "staff transformation" is embedded in the theory of change of a few organisations or programmes, the training and support of teachers, mentors, and facilitators remains a weak component of many organisations. Finally, to ensure consistent and appropriate messaging, it is necessary to regularly follow up with teachers, mentors, and facilitators. - Learning oriented program design, monitoring, and evaluation using evidence-based approaches A core set of learning and evaluation technical capacities were deemed essential to the sustained development, monitoring, and implementation of integrated programming over the long term. These capacities include sufficient monitoring and evaluation (M&E) experience, including participatory approaches; and the capacity to design, implement, and learn from gender-transformative programming. Learning focused M&E provides a basis for course-correction of existing programmes, including the design of additional programme elements that address any critical needs that may emerge. Investing in baseline research and other contextual analysis is also crucial to ensure that programming is clearly and appropriately fine-tuned to achieve results. Moreover, solid baselines are essential for project evaluation and can inform recruiting and retention techniques, as well as other areas of programme design. In some cases, robust evaluation results proved critical in making the case for scaling programmes up, or in ensuring that governments institutionalise programmes. - Ensuring sustainability and developing programmes on a long-term basis Achieving sustainability during and beyond programme implementation requires multi-pronged approaches and strategies that involve working with communities, government, and other stakeholders. Patriarchal gender norms and conceptions of sexuality are deeply rooted and normalised, making the process of ensuring sustainable change around gender and social norms (especially around sexuality) a complex one. Sustainable change requires patience, time, and continuity. Therefore, programmes should be long-term and with adequate resources to support them over time. RECOMMENDATIONS The forthcoming full review and findings will illustrate a substantial number of grassroots organisations working at the intersections of sexuality and CEFM, including some in highly restrictive settings. Based on the review, recommendations emerged for the broader field as well as programme implementers, funders, researchers, and advocates. A comprehensive conceptual framework is needed One critical recommendation emerging from the review is the need for a comprehensive conceptual framework for this type of work. The lack of a conceptual framework on the link between sexuality and CEFM or any agreed-upon measures of success may have negative implications for donors' willingness to fund sexuality work, which obstructs funding flows, dilutes the coherence and effectiveness of programme implementation, and hampers the adequate evaluation of results. It is important that a conceptual framework establishes common measurements and creates robust yet flexible definitions of success. Within CEFM work, it is important to prioritise indicators based on access to services and autonomous decision-making and quality of life in addition to age of marriage. Solely age-focused measures often ignore larger issues of gender inequality as well as issues of choice and consent about their lives and bodies. This conceptual framework should not only focus on the individuals but also seek to describe the ways in which communities and institutions determine and enforce social norms that govern sexuality for all persons, with particular attention to age and gender. Further discussion, research and guidance needed on criminalisation of adolescent sexuality Discussion, research and guidance is needed regarding the criminalisation of adolescent sexuality. Many organisations find themselves in the conundrum of how to respond to the intersections of control of girls' sexuality and CEFM in a way that respects girls' aspirations and desires while also recognising that social norms influence or restrict girls' choices in and outside of marriage. Recommendations for programme implementers 1. Empower girls to be advocates for themselves, create alternative pathways, and give young girls the skills needed to make changes in their lives possible. Programming should put gender-transformative work with girls at the centre. In order to reduce CEFM, it is imperative that programme implementers investigate and generate alternative choices and opportunities (for example advocating for additional years of schooling or income generating opportunities) so that girls and their families can refuse early marriage and not be at risk of sexual shaming, bullying, and physical attacks. Married and unmarried girls of all ages should be included in programming. It is critical to address issues of CEFM by examining the attitudes that underpin the perceived need to regulate girls' sexuality and push them into marriage. 2. Involve men and boys in programming. Work strategically and intentionally with boys and men to mutually reinforce and create a supportive environment for young girls to develop as autonomous individuals. Furthermore, working with boys from an early age is an important approach to challenge and change harmful norms regarding gender and sexuality. More creative approaches need to be developed to bring adult men in as partners for gender equality and to create opportunities. 3. Use an intergenerational approach. Empowering girls to better express their needs, wants and desires so that parents understand and value their daughters' aspirations is critical. Intergenerational approaches can create a more supportive environment within the home so that young people feel comfortable expressing themselves to parents. Intergenerational approaches may also enhance communities' understanding of the lived realities of married girls and women and allow for a broader understanding of how the institution of marriage can be used to limit girls' voices and choices. Approaches cannot focus only on prevention of early or forced marriage but must address the needs of already married girls. 4. Build partnerships with communities and governments to ensure sustainability during and beyond the programme. Sexuality is a relational phenomenon based in power structures and it cannot be addressed without involving individuals, families, communities and governments. Structural approaches that work at the different levels of the ecological model to decrease gender inequality and increased sexual autonomy are important to pursue. Without community-led approaches that bring together multiple stakeholders, programmes will not be successful in the medium or long term. A key aspect of building partnerships is developing trust and ensuring that information gathered is not only accurate but also created within a safe space. Additionally, there is a need to create messages that are appropriate across different levels and to be responsive to the differing needs of stakeholder groups. Doing so requires time, patience, negotiation skills and resources, all of which must be carefully planned for. 5. Mainstream gender-transformative approaches that include sexuality at all organisational levels. It is important that programmers are well-trained and feel comfortable discussing taboo issues. A critical part of the training should be "values clarification" and building meaningful girl engagement skills. Organisations working in this field need to build their internal capacity for gender-transformative programming and embed the practice of self-reflection on gender and sexuality within their organisations and their theories of change. 6. More specific gender-transformative work on sexuality that is inclusive of the most marginalised girls, including girls with disabilities or of diverse sexual orientations and gender identities is needed. The sexuality of people with disabilities - especially girls and young women - is widely overlooked by most programmes. Furthermore, work to encompass sexual orientation and gender identity should be further explored. Many programmes are gender-binary and only a few discuss or work to address these issues in detail. 7. Review all the additional key factors of success articulated in this report and study the feasibility of tailoring different approaches to different contexts, particularly mitigation strategies for backlash. For example, rigid processes and standardised project management procedures might not always be adequate when working on sexuality. It is advisable to include language in project proposals about the need for adaptive programming and high levels of flexibility (which might also have an impact on budgets), and incorporate well-articulated risk and mitigation strategies accordingly.

Details: New York, NY: American Jewish World Service, 2018. 20p.

Source: Internet Resource: Accessed January 14, 2019 at: https://ajws.org/wp-content/uploads/2018/06/Tackling-the-Taboo.pdf

Year: 2018

Country: International

Keywords: Adolescents

Shelf Number: 154155


Author: Parlour, Richard

Title: Cybersecurity in Finance: Getting the Policy Mix Right!

Summary: Executive Summary Amid several large cyberattacks in 2017, the European Commission adopted in September 2017 its multi-sector cybersecurity package. Whereas this initiative should contribute to strengthening the cyber-resilience and response of EU financial firms, several policy issues and unanswered questions remain. In order to analyse the issues that are considered to be relevant to financial fields (retail banking, corporate banking, capital markets, financial infrastructure and insurance), CEPS-ECRI organised a Task Force between September 2017 and May 2018 with a group of experts from the financial industry, tech industry, national supervisors and European institutions, as well from one consumer association and one law firm. Nine more policy issues need to be further addressed in order to bolster the financial industry’s cyber-resilience against current and future threats. These issues are itemised below, followed by a more in-depth discussion of each issue. Main policy recommendations 1. Convergence in the taxonomies of cyber-incidents is needed. 2. The framework for incident reporting needs to be significantly improved to fully contribute to the cyber-resilience of financial firms. 3. Authorities should assess how and to what extent the data held by the centralised hub should be shared with supervisors, firms and clients. 4. Ambitious policies are needed to develop consistent, reliable and exploitable statistics on cyber-trends. 5. Best practices for cyber-hygiene should be continuously enhanced by regulators and supervisors. 6. The European Cybersecurity Certification Scheme needs to be strengthened to contribute better to cybersecurity, cyber-risk management and capability. 7. In order to improve the processes of attribution and extradition, the reinforcement of cross-border cooperation and legal convergence remains a priority, both within the EU and more widely. 8. Best practices in remedies in case of cyberattacks need to be further encouraged. 9. Policy-makers should further assess the pros, cons and feasibility of creating an emergency fund in case of large cyberattacks. 1. A common taxonomy for cyber-incidents A common taxonomy across regulations, jurisdictions and sectors should ease the understanding of multi-country and multi-sector cyberattacks, and eventually strengthen the quality of responses. Given the ever-changing nature of cyberspace, the reference taxonomyshould be flexible enough to be revised on a regular basis. Also, for better readability by CSIRTs, this common taxonomy should include specific sections on the variants applicable to different sectors, if relevant. Wherever possible, convergence in templates for incident reporting is needed across legislation. However, given the diversity in the purposes of legislation, full harmonisation in those templates remains challenging. 2. Need to develop an efficient legislative and institutional framework for incident reporting The emergence of different reporting requirements (notably in GDPR, PSD2, NIS Directive, ECB/SSM, eIDAS regulation and Target 2) raises questions about what is the most adequate cyber-incident framework for boosting the cyber-resilience of financial firms. For that purpose, regulators, supervisors and financial firms need to address five issues. First, national templates for the NIS Directive and the GDPR should be harmonised across the EU. Secondly, large firms active in different countries need to develop adequate consolidation processes of the “overall cyber-risk” at group level. Thirdly, authorities should be able to exploit the content of incident reporting to inform and advise CSIRTs in return. For that purpose, policymakers and firms should assess together the risks and opportunities of developing a system of standard messaging services. Fourthly, the creation of a European sectoral hub for finance in charge of centralising all incident reports, dispatching the right information to stakeholders and advising both authorities and CSIRTs could greatly reinforce the incident reporting framework. Finally, in order to create a resilient cybersecurity framework that could efficiently handle multi-sectoral cyberattacks and prevent contagion from one sector to another, the hub should also be able to cover all the other sectors of the EU economy. 3. Sharing of the data held by the centralised hub with supervisors, firms and clients Authorities should encourage the set-up of platforms aimed at facilitating the voluntary exchange of cyber-information between financial firms. In parallel, authorities should ensure that incident reporting requirements fully contribute to the cyber-resilience of financial firms. For that purpose, when deemed pertinent, the information contained in incident reporting should be quickly shared with the most relevant stakeholders. First, the centralised hub in charge of incident reporting should quickly provide relevant supervisors with the right information on cyberattacks. Secondly, the hub also needs to share relevant information with financial firms, provided that the right balance is found between building up an efficient collective response to cyberattacks and safeguarding firms’ interests. To provide technical assistance to those firms, the hub would need a clear mandate from regulators. Sharing some information with firms’ potential clients through the development of cyberratings that mirror the cyber-risk to which each supplier, and therefore their potential clients, is exposed should be based on market rather than regulatory initiatives. Whatever policy options are selected, tight security of the data managed by the centralised hub should be considered one of the main priorities. 4. The need to build a benchmark for macro statistics The absence of a benchmark for macro statistics on cyber-trends and the poor consistency across sources raise the risk that the cyber-strategies of firms and cyber-policies are not wellfounded. If a centralised framework is developed for incident reporting, robust and relevant macro statistics could be developed at national and European level. Specifically, the creation of robust statistics on the financial impact of cyberattacks is necessary to better understand the overall impact of attacks and to adjust cyber-policies and strategies as needed. However, the complexity of measuring the financial impact at firm level has made it so far impossible to have consistent methodologies across organisations. A principle-based list should operate at EU level, with the aim of enhancing best practices to measure both “tangible” and "intangible” factors. Convergence should be achieved provided that collaboration is improved between cyber-authorities, CSIRTs, chief financial officers and chief financial officers of organisations, authorities in charge of setting accountancy norms, etc. 5. Promoting cyber-hygiene Authorities should continue to enhance best practices in terms of cyber-hygiene. Principle-based lists should be updated on a regular basis. At present they should for example include conducting adequate education and awareness activities, updating programs regularly and patching systems, creating complex passwords and changing them frequently, using microsegmentation, multifactor authentication and encryption of sensitive data, implementing the least privilege principle, developing an adequate strategy to handle shadow IT and establishing an incident response and reporting plan. 6. The European Cybersecurity Certification Scheme needs to be strengthened to contribute to improve cybersecurity Given the rising importance of digital technologies and their vulnerability to cyberattacks, authorities need to address persistent information asymmetries and the fragmentation of standards in national certifications. A European Cybersecurity Certification Scheme could be a powerful tool for reinforcing harmonisation, raising awareness and ensuring mutual recognition. Yet the current Commission’s proposal might lack practical operability and add unnecessary complexity. As the scheme’s success depends on the voluntary participation of the private sector, it is imperative that its value added exceeds its costs. With too many issues left unclear, the current European Cybersecurity Certification Scheme needs to be strengthened to have a clear positive impact on cybersecurity. 7. Reinforcing cross-border cooperation and legal convergence in order to improve the processes of attribution and criminalisation Authorities need to develop further a cross-border framework that facilitates the exchange of information and electronic evidence for the purpose of prevention, investigation and attribution of cross-border cybercrimes. When the cyber-criminals behind cross-border attacks are identified, there is a need for convergence in relevant national legal frameworks in order to facilitate their extradition. 8. Enhancing best practices in remedies after cyberattacks Best practices in remedies in case of cyberattacks need to be encouraged by EU and national supervisors through the creation of core principles. These principles should cover the use of robust methodologies to assess the degree to which firms and/or clients share the cyberliability. They should also help firms assess when consumer financial compensation that goes beyond the actual financial loss incurred should be provided. Finally, these principles should also provide guidelines on the best type of remedies in case of data theft without immediate financial loss. 9. Assessing the pros, cons and feasibility of creating an emergency fund in case of large cyberattacks Authorities should assess further the pros, cons and feasibility of developing an emergency cyber-fund aimed at alleviating the risk of financial instability in case of major cyberattacks in the financial industry. Should the EU proceed in that direction, criteria for a cyber-incident to qualify and necessary conditions for the fund to be used will have to be well defined in advance. The benefits and costs of the different options available to create such a fund should be carefully analysed. In particular, could existing EU funding schemes for natural disasters be extended to large-scale cyberattacks? Who should bear the costs? Would it preferable to design a fund specifically for the financial sector? Or would it make more sense to create a fund that covers all operators of essential services, as defined in the NIS Directive?

Details: Brussels, Belgium: Centre for European Policy Studies, 2018. 52p.

Source: Internet Resource: Accessed January 14, 2019 at: https://www.ceps.eu/publications/cybersecurity-finance-getting-policy-mix-right

Year: 2018

Country: International

Keywords: Corporate Banking

Shelf Number: 154159


Author: Pak, Lauren

Title: One in Four Condone Spousal Violence, Though Attitudes Vary across Countries and Individuals in the Americas

Summary: This report examines and assesses acceptance of spousal violence in the Americas. Main Findings: - On average across 16 countries, 1 out of 4 individuals either approves or understands a man hitting his wife if she neglects household chores - Rates vary significantly across countries: Guatemalans express the highest acceptance of spousal violence (53.9%); Paraguayans express the lowest support among the countries studied (8.3%) - Women, those in the oldest age cohorts, those with more years of schooling, those in urban areas, and those who are wealthier are less likely to accept spousal violence against women - Stress and dislocation matter: Individuals whose households are facing economic hardship and those who intend to live or work abroad are more likely to accept spousal violence against women

Details: Nashville, TN: Vanderbilt University, 2016. 9p.

Source: Internet Resource: Accessed January 14, 2019 at: https://www.vanderbilt.edu/lapop/insights/IO927en.pdf

Year: 2016

Country: International

Keywords: Attitudes

Shelf Number: 154146


Author: Efrat, Asif

Title: Protecting against Plunder: The United States and the International Efforts against Looting of Antiquities

Summary: In 1970 UNESCO adopted a convention intended to stem the flow of looted antiquities from developing countries to collections in art-importing countries. The majority of art-importing countries, including Britain, Germany, and Japan, refused to join the Convention. Contrary to other art-importing countries, and reversing its own traditionally-liberal policy, the United States accepted the international regulation of antiquities and joined the UNESCO Convention. The article seeks to explain why the United States chose to establish controls on antiquities, to the benefit of foreign countries facing archaeological plunder and to the detriment of the US art market. I argue that the concern of US policymakers about looting abroad resulted from a series of scandals which exposed the involvement of American museums and collectors with looted material. Advocacy efforts of American archaeologists also played a key role in educating policymakers about the loss of historical knowledge caused by looting and the necessity of regulation. The article further analyzes how antiquities dealers and certain museums lobbied Congress against implementing the UNESCO Convention and why Congress decided in favor of implementation as an act of international moral leadership. Following the analysis of the Congressional battle, I examine how the US debate over looted antiquities has evolved to the present. The article concludes with implications for the role of values versus interests in international law.

Details: Ithaca, NY: Cornell Law School, 2010. 88p.

Source: Internet Resource: Accessed January 14, 2019 at: https://scholarship.law.cornell.edu/clsops_papers/47/

Year: 2010

Country: International

Keywords: Antiquities

Shelf Number: 154170


Author: Mazerolle, Lorraine

Title: Criminal Justice Responses to Domestic and Family Violence: A Rapid Review of the Evaluation Literature: Final Report

Summary: Executive Summary Background This report provides a systematic and comprehensive review of the impact evaluation evidence base of criminal justice system responses to domestic and family violence (DFV). The review aimed to (1) systematically identify impact evaluation evidence that addressed ways to improve the engagement of domestic and family violence victims with the criminal justice system; (2) identify best practice approaches to improve the identification of, and responses to, high risk recidivist perpetrators of domestic and family violence within the criminal justice system. Search Methods We used systematic review methodologies to identify eligible studies that met the following criteria. The study had to: (1) Include a quantitative impact evaluation of a criminal justice response to domestic and family violence. Eligible study designs included systematic reviews, randomised control trials and high quality quasi-experimental studies; (2) Be conducted or published between 1997 and 2017; (3) Be focused on a population of offenders, victims or staff working within the criminal justice system; (4) Take place in a high income country; (5) Be written in English. No limitations were placed on the type of outcome variable used to evaluate intervention effectiveness. The initial search produced 13,383 records. First stage title and abstract screening eliminated 10,846 records due to their being non-criminal justice system responses to DFV (n = 5,311), duplicate records (n = 4,517), and for other reasons outside of our eligibility criteria (e.g., not from a high income country, prior to 1997). Second stage full text systematic screening and coding of 2,537 remaining records produced a population of 193 studies (41 systematic reviews, 30 RCTs and 122 quasi-experiments) that met our review criteria plus an additional four systematic reviews that brought together a range of criminal justice interventions targeting DFV. This level of attrition is common in systematic reviews of evaluation evidence in the crime and justice arena, reflective of the dearth of high quality evaluations in criminal justice interventions in the world. Systematic reviews and/or meta-analyses (the most robust forms of evidence) were prioritised in the written syntheses of evidence. Results Police-Focused Responses - 26 police-focused studies are included in the review; however, a number of police-led or police involved interventions were included as multi-/inter-agency responses. - Higher staffing levels are linked to a lower risk of DFV homicide. - The use of body worn cameras during DFV incidents and the collection of photographic evidence can positively impact court outcomes. - Proactive policing practices showed promising results regarding victim understanding of violent behaviours, understanding of no-contact orders, and help-seeking behaviours. - Mixed support is found for specialised domestic violence units. - Conditional cautioning practices reduce the severity of subsequent crimes for offenders. - Mandatory arrest policies are not associated with reductions in homicide or repeat victimisation. Evidence suggests that mandatory arrest can create further harm to victims, particularly for racial minorities. - Police training in evidence-based practices do not increase the length of time officers spend with victims at DFV incidents or improve conviction rates. Courts-Focused Responses - 36 courts-focused studies are included in the review. - Legal advocacy is associated with greater social support, better quality of life, reduced likelihood of further abuse, and greater access to community resources. - Restorative justice approaches uncovered mixed results with some studies suggesting fewer emergency visits to home and improvements in perpetrator empathy and self-esteem. - We found no evidence to support mandatory prosecution policies in terms of recidivist offending. - The impact of judicial monitoring on batterer intervention attendance and completion is mixed and difficult to disentangle, as is the evidence on specialised domestic violence courts. The increased supervision of offenders in these interventions is often linked to higher rates of recidivism when drawing on official reports. However these findings may reflect an increased ability to detect recidivism rather than the intervention causing greater abuse. Corrections-Focused Responses - 58 corrections-focused studies are included in the review. - Motivational interviewing techniques can increase offender motivation and readiness to change, increase program completion rates, and reduce domestic violence recidivism. - Incarcerated batterers in therapeutic community programs are less likely to be rearrested and re-incarcerated than non-treated offenders. - Treating concurrent risk factors – such as substance abuse problems – can help reduce reoffending. - Batterer programs which draw on multiple frameworks such as Cognitive Behavioural Therapy and Duluth are associated with lower reconviction rates. - Evidence was found to support specialised domestic violence probation programs. Multi-agency/Inter-agency Responses - 69 multi-/inter-agency studies are included in the review, with many involving police as intervention partners. - Initiatives that pair police and victim advocates (other than second responder programs) were associated with increased service uptake, lower homicide rates and greater police contact. - Second responder programs were not associated with a reduction in repeat victimisation. They did, however, appear to improve victim confidence in disclosing incidents to police. - Multi-agency centres for victim support are shown to effectively assist victims of DFV and improve conviction rates. - Legislative responses such as banning firearm possession for known DFV offenders is found to significantly decrease the number of DFV homicides by firearm. - Death Review Boards are shown to be effective in implementing system change although they are not associated with reductions in DFV homicides. - GPS monitoring of DFV offenders while on bail shows some promise in reducing the likelihood that offenders will enter exclusion zones of victim contact. - Intensive bail supervision is an effective deterrent. Concluding Observations - This review only covers studies that include robust impact evaluations of criminal justice interventions that address DFV and met our other inclusion criteria. The review of impact evaluation studies does not include studies that offer research into the causes and correlates of DFV, process evaluations, or qualitative or exploratory studies about DFV. - Of the 193 studies in our review, we identified a dearth of impact evaluation studies from Australia that met our eligibility criteria. -The evidence gap maps have identified where we have quite a bit of knowledge and, at the same time, a range of significant absences of impact evaluation knowledge. - From our review of police responses to DFV, we know quite a bit about the backfire effects of mandatory arrest, yet we know very little about the impacts of conditional cautioning, risk assessment, police contact, proactive policing, quality of police investigative methods and sole versus dual arrest strategies in relation to DFV. We have some emerging promising evidence around the use of body worn cameras. We have very few studies with outcome measures such as self-reported recidivism, official victimization, perpetrator psycho-social indicators and practitioner outcomes. Most of the policing impact evaluations used official recidivism as the primary outcome measure. - From our review of court responses to DFV, we have quite a bit of mixed evidence on specialised DFV courts and restorative justice interventions. We know very little about legal advocacy, although what we do know appears promising. Most of the courts-focused impact evaluations used official recidivism, self-reported victimisation, victim psycho-social indicators and court processing measures as the primary outcome measures. We uncovered no studies about court interventions that used self-reported recidivism, death/homicide or practitioner outcomes to assess effectiveness. - From our review of correctional responses to DFV, we have quite a bit of evidence pertaining to various types of treatment approaches (including integrative, mind-body, Duluth and Cognitive Behavioural Therapy), but far less evidence around culturally sensitive, substance abuse and group therapeutic responses. More research is also needed around assessing the effectiveness of computerised interventions and risk–needs–responsivity. The corpus of corrections-focused studies presented a wide variety of outcome measures, yet focused heavily on official and self-reported recidivism as well as perpetrator and victim psycho-social outcomes. No studies included official victimisation or death/homicide as outcome measures. - From our review of multi-/inter-agency responses to DFV, we observed a wide range of outcome measures used to assess the effectiveness of interventions. The main outcome measures used were official recidivism and victim psycho-social indicators. Most of the evaluation evidence focused on interventions such as second responder programs, partnerships around victim advocates, protection orders and multi-agency teams. Much less is known about effectiveness of practitioner training, Death Review Boards, victim help-seeking interventions, and multi-agency centres. Recommendations 1. This review – particularly the Evidence and Gap Maps – provides a guide to policymakers to carefully plan and prioritise a program of evaluations of interventions of CJS responses to DFV in Queensland. 2. Police interventions that are worthwhile for further consideration and a priority for evaluation include a. Programs that explicitly include follow up with DFV victims b. Proactive policing interventions that increase victim understanding of violent behaviours, no-contact orders and help seeking options c. Police use of body worn cameras during attendance at DFV incidents. 3. Court interventions that are worthwhile for further consideration and a priority for evaluation include a. legal advocacy b. enforcement of “no contact” orders c. restorative justice d. specialist and/or integrated DFV courts 4. Correctional interventions that are worthwhile for further consideration and a priority for evaluation include a. Computerised delivery of suitable programs (such as WORTH and online courses for those under correctional orders) b. Motivational interviewing accompanying various intervention programs (particularly therapeutic programs) to increase perpetrator participation and completion c. Specialised probation programs d. Substance abuse treatment programs for perpetrators e. Integrative treatment and mind-body bridging programs f. House of Hope (a therapeutic community program). 5. Multi-/Inter-agency interventions that are worthwhile for further consideration and a priority for evaluation include a. Second responder programs, particularly given the mixed evidence for these programs b. Collaborative multi-agency teams and centres to support victim help seeking c. GPS monitoring of DFV offenders while on bail d. Intensive bail supervision e. Electronic training for DFV responders about legislative reforms. 6. Across all criminal justice system responses to DFV, explore ways to include motivational interviewing into programs that target perpetrators as a way to increase perpetrator program participation and completion. 7. Examine the impact of programs beyond physical violence and official recidivism to include clear outcome measures of coercive behaviour and control (such as respectful communication, control and the well-being of children) in measuring effectiveness of DFV interventions. 8. Robust evaluations of DFV interventions with minority group representation (e.g. Aboriginal and Torres Strait Islander people) should be prioritised. 9. DFV training of CJS practitioners, particularly using electronic and blended learning methods, is worthwhile for further testing and evaluating.

Details: St. Lucia, Queensland, Australia: University of Queensland, 2018. 160p.

Source: Internet Resource: Accessed January 14, 2019 at: https://www.courts.qld.gov.au/__data/assets/pdf_file/0006/586185/systematic-review-of-criminal-justice-responses-to-domestic-and-family-violence.pdf

Year: 2018

Country: International

Keywords: Batterer Programs

Shelf Number: 154169


Author: Global Commission on Drug Policy

Title: Regulation: The Responsible Control of Drugs

Summary: Executive Summary The legal regulation of drugs is rapidly moving from the theoretical to the practical domain. Regulation is a critical part of drug policy reform if the harms of prohibition and the illegal drug market are to be reduced but remains a particularly challenging element of the public and political debate. Progress requires engaging with legitimate public concerns about how regulation might be implemented and what its impacts will be, as well as political opposition and institutional inertia. Regulation and management of risky products and behaviors is a key function of government authorities across the world. It is the norm in almost all areas of policy and law - except drug policy. Regulation addresses the reality of risk in our lives and our communities and is all around us: product safety regulations that require flame-retardant mattresses; food regulations that require "sell-by" dates on labels; regulation of which vehicles can be driven, how fast, and where, and so on. This report addresses the reality that over 250 million people around the world are taking risks by consuming currently prohibited drugs. Accepting this reality and putting in place an effective regulatory strategy to manage it is neither admitting defeat nor condoning drug use. It is part of a responsible, evidence-based approach that deals with the world as it is in contrast with ideologically driven and ultimately counterproductive attempts to create a "drug free world". The report identifies key questions that, in the Commission's experience, have become particular stumbling blocks in the progress of the public dialogue on regulation. By engaging with these questions directly, the report aims to facilitate and encourage the debate, thus bringing this much needed reform nearer.

Details: Geneva, Switzerland: Author, 2018. 56p.

Source: Internet Resource: Accessed January 16, 2019 at: http://www.globalcommissionondrugs.org/reports/regulation-the-responsible-control-of-drugs/

Year: 2018

Country: International

Keywords: Drug Policy

Shelf Number: 154187


Author: Bove, Vincenzo

Title: Policeman on the Frontline or a Soldier? The Effect of Police Militarization on Crime

Summary: Abstract Recently a considerable popular debate has been dedicated to the issue of “police militarization”. We investigate whether the “1033 Program”, which allows local law enforcement agencies to acquire excess property of the US Department of Defense, affects crime rates. To identify the causal effect of militarized policing on crime, we use temporal variations in US military expenditure and between-counties variations in the odds to receive a positive amount of military aid. We find that (i) military aid reduces street-level crimes; (ii) the program is cost-effective; and (iii) there is evidence in favor of a deterrence mechanism.

Details: Warwick, UK: 2015. 36p.

Source: Internet Resource: Accessed January 16, 2019 at: https://www.aeaweb.org/articles?id=10.1257/pol.20150478

Year: 2015

Country: International

Keywords: 1033 Program

Shelf Number: 154186


Author: Berghuis, Bert

Title: Declining Juvenile Crime: Explanations for the International Downturn

Summary: The Netherlands registered youth crime figures show a spectacular downward trend from 2007 (minus 60%). This decrease can be seen amongst girls and boys, and also amongst ethnic minorities and the native Dutch. This trend can also be observed in a lot of other countries. It is striking that also in international terms youth crime has been capped. A strikingly similar picture is apparent to the one in the Netherlands. The level of the available evidence of the decrease in youth crime in a large number of different countries means that the possibility of a coincidental development occurring at the same time is extremely small, and hence there must be a causal connection. It seems that a number of international developments created a climate favorable for juvenile crime reduction: more (techno)prevention, less use of alcohol, more commitment to schooling, more satisfaction with living conditions, and the use of time. For The Netherlands this goes together with an diminished willingness of the Dutch police to follow up on suspicions that a youngster committed a minor offense. However, the real trigger for the freefall of youth crime seems to be the extensive worldwide dissemination of smartphones and online-games that started in 2006/7. This led to a lot of free time spent 'looking at screens' and not being present on the street and public space. So the main factor responsible for the fall in youth crime can be found in the use of free time and a different role and influence of peer groups.

Details: Brussels, Belgium: European Union, 2018. 12p.

Source: Internet Resource: Accessed January 16, 2019 at: https://eucpn.org/document/declining-juvenile-crime-explanations-international-downturn-0

Year: 2017

Country: International

Keywords: Crime Trends

Shelf Number: 154228


Author: Trend Micro

Title: Cybercrime and the Deep Web

Summary: The cybercriminal underground economy changes every minute. Constantly evolving cybercriminal tools and techniques can put anyone at risk in a split second. Trend Micro researchers have been monitoring the underground economy for years. We were the first to describe how the different underground markets in Russia, China, Brazil, Japan, Germany, and North America vary. Each country’s market is as distinct as its culture. The Russian underground, for instance, can be likened to a well-functioning assembly line where each player has a role to play. It acts as the German market’s “big brother” as well in that it greatly influences how the latter works. The Chinese market, meanwhile, boasts of robust tool and hardware development, acting as a prototype hub for cybercriminal wannabes. Brazil is more focused on banking Trojans while Japan tends to be deliberately exclusive to members. We were also among the first security vendors to dive deep into the underground. Our researchers have been digging into as many seedy markets as possible, each year adding a new country/region to our growing list, to gather precious intel. This allows us to know and monitor what wares cybercriminals sell to their peers, what makes them tick, and how they behave. Cybercriminals from every corner of the world take advantage of the anonymity of the Web, particularly the Deep Web, to hide from the authorities. Infrastructure and skill differences affect how far into the Deep Web each underground market has gone. Chinese cybercriminals, for instance, do not rely on the Deep Web as much as their German and North American counterparts do. This could, however, be due to the fact that the “great firewall” of China prevents its citizens (even the tech-savviest of its cybercrooks) from accessing the Deep Web. The fact that Germany and North America more strictly implement cybercrime laws may have something to do with their greater reliance on the Deep Web, too. Crimes aided by wares bought underground can span from simple electronic thievery and selling contraband like drugs and firearms to shocking real-world crimes like engaging in child pornography and offering assassination services. We will continue to aid in seizing cybercriminals across the globe though public-private partnerships (PPPs) and providing intel that law enforcement agencies can use to further their anti-cybercrime efforts. As we go along making the world safe for the exchange of digital information, we will continue to monitor and report the latest in cybercrime developments so our customers can stay safe from these kinds of threats.

Details: Irving, TX: 2016. 14p.

Source: Internet Resource: Accessed January 16, 2019 at: https://documents.trendmicro.com/assets/wp/wp-cybercrime-and-the-deep-web.pdf

Year: 2016

Country: International

Keywords: Black Market

Shelf Number: 154208


Author: Fernandez, Lovell

Title: Review of the ISS Project on Terrorism, Money Laundering, Organised Crime and Corruption

Summary: Executive Summary In the period from 2004 to 2006, the Norwegian government funded the Institute for Security Studies (ISS) to carry out a project, the aim of which was to “enhance the capacity of Southern African states to counter terrorism, money laundering, organised crime and corruption”. By conducting research within these four project areas and disseminating the research findings to key role players in the sub-region, the project was expected to help develop the required legislative framework within these areas. ISS is a non-governmental organisation concentrating on applied research and this particular project was run by the ISS office in Cape Town. The Norwegian Embassy in Pretoria commissioned a review of the ISS project in October 2007, at the request of the ISS office in Cape Town. The overall objective of the review was to assess “the implementation and results of the project in order to determine its relevance, efficiency, and impact”. The methodological framework for the review was to a large extent based upon the method of outcome mapping, acknowledging the challenges with regards to establishing causal links from the research developed by the ISS and the actual enhanced capacity of the Southern African states and thereby the development of legislation. The project was implemented more or less according to plan. Some difficulties were encountered, such as initial resistance towards the ISS as an NGO working on issues which were seen as governmental matters and the fact that the political situation in some of the Southern African states did not allow for any legislative improvements. Tools to ensure the quality of the publications were developed and instruments for planning and reporting were put in place, and these became more refined as the project developed. The performance of the project was monitored regularly by the head of the ISS office, providing the Norwegian government with semi-annual progress reports where its activities were measured against the planned deliverables. By the end of 2006, the ISS had met its deliverables, sometimes even exceeding its targets, with the exception of some main deliverables such as a monograph on terrorism. The progress reports, however, provide reasonable explanations as to why these were not delivered according to plan. It is difficult to determine to what extent the project did actually enhance the capacity of Southern African states, although there are several examples as to how the ISS has contributed with relevant research and updated information pertaining to the issues in question. The component addressing terrorism was perhaps the component which made the least progress, much due to its difficulties in approaching the governments on such a sensitive issue. And although the practical implementation of policies and legislation was relatively slow, the ISS has carried out several research activities targeting both the media and civil society. Money laundering saw more progress in terms of legislation being prepared in various SADC countries. Through close collaboration with the Eastern and Southern African Anti Money Laundering Group (ESAAMLG), the ISS helped create awareness with regards to the need for such legislation. Similarly, the third component which dealt with organised crime benefited to a large extent from its co-operation with the Palermo Group, consisting of senior government officials with the mandate to implement the UN Convention against Transnational Organised Crime. As the ISS provided comparative legislative analysis to this group, ten of the fourteen countries within the sub-region had ratified the Convention by the end of 2006. The ISS produced a substantial amount of research and handbooks within the area of corruption, although these publications could have been used more efficiently. Some progress was made with regards to the ratification and implementation of the SADC Protocol against Corruption, where the collaboration with the Southern African Regional Police Chiefs Co-ordinating Organisation (SARPCCO) was key. At the time the project was initiated, all four components were seen as relevant to the human security of the people living in Southern Africa. The events of 9/11, coupled with the increased incidence of money laundering, organised crime and corruption, prompted the need to address these issues within the sub-regional context. At present, the weight given to each component might have changed slightly, for instance, making domestic terrorism a more genuine threat than international terrorism. The project was very efficient in the sense that it produced most, and sometimes more, of the planned deliverables within the time-frame. The results coming out of all the round-table discussions and seminars that were held could be questioned as it is difficult to establish how these plentiful activities have targeted relevant stakeholders and to what extent the participants at these events have actually applied the ISS research in their work. Nevertheless, through its research and dissemination of findings, the ISS has contributed to the passing of legislation in the areas of terrorism, money laundering, organised crime and corruption. Whether this again will impact on the actual crime rates within these particular areas remains to be seen. Among the key lessons learned is the need to establish close working relationships with role players in these thematic areas. Through its network of inter-governmental bodies, as well as civil society, the ISS has accomplished more than would be possible through just individual contacts. The recommendations directed towards the ISS include the need to develop a communication strategy in order to take a comprehensive look at its dissemination practices. What is also recommended is that the ISS keep a clear profile as a non-governmental organisation focusing on applied research. Providing training should therefore not be seen as a central task, but rather let the researchers keep on doing what they are best at doing. The Norwegian Ministry of Foreign Affairs and its embassy in Pretoria are particularly keen to use ISS input at its own seminars and to participate at seminars held by the ISS, as well as using its research as input in its own policy development. The actual ISS publications could probably be used even more actively though, simply by reading them and thereby applying them directly. Notwithstanding its increased support to the ISS over the years, The Ministry would need to exercise care that it does not depend too heavily on the ISS, but that it keeps an open mind and be receptive to similar research being conducted by other institutions in the region. The recommendation to the Norwegian government would therefore be that it balances its collaboration with the ISS carefully.

Details: Olso, Norway: Norwegian Agency for Development Cooperation, 2007. 58p.

Source: Internet Resource: Accessed January 18. 2019 at: https://norad.no/en/toolspublications/publications/2009/review-of-the-iss-project-on-terrorism-money-laundering-organised-crime-and-corruption/

Year: 2007

Country: International

Keywords: Africa

Shelf Number: 154242


Author: Walker, David

Title: Costing the Impacts of Gender-Based Violence (GBV) to Business: A Practical Tool

Summary: Overview This brief presents an approach to assessing the cost impacts of GBV on businesses. The approach is adjusted from a methodology created by Duvvury et al. (2004) but also draws upon previous studies that specifically examined existing methodologies and strategies for costing GBV impacts (Williams, 2014; Day et al., 2005; Duvvury et al., 2004). Based on these reviews, as well as applied experience in Papua New Guinea (Darko et al., 2015), the costing methodology and tools consist of four core steps: a framing of GBV definitions and scope; partnership development and collection of background data; fieldwork and feedback; and a cost-calculation and presentation phase. These four components are addressed in detail below. Each consists of several methodological subcategories that depend on the broader implementation environment, the business sector context and the type and capacity of the actors undertaking the costing activity. The latter issues are addressed after discussion of the core tool, and a case study provides a brief overview of the costing process in action.

Details: London, UK: Overseas Development Institute, 2016. 15p.

Source: Internet Resource: Accessed January 19, 2019 at: https://www.odi.org/publications/10298-costing-impacts-gender-based-violence-business-practical-tool

Year: 0

Country: International

Keywords: Cost Assessment

Shelf Number: 154270


Author: Hanif, Nafis

Title: Conversations with a Crime Boss: Doing Asian Criminal Business

Summary: Abstract Media piracy, in Malaysia, is organised through illicit negotiations between a dominant crime syndicate and consumers, street-corner gang leaders, the Malaysian police, custom officers and directors of the Malaysian Film Censorship Board. These key social actors who crossover class, race, religion, gang membership, and bridge porous legitimate and illegitimate commercial and political sectors of society establish a mutually collaborative relationship by negotiating their asymmetrical social capital, according to a conventional cost-benefit analysis. Contextual analyses of these illicit interactions identify criminal enterprise opportunities and plot the interactive progress of enterprise as it unfolds, against models of organisational and functional inter-connection. The dominant crime syndicate leader, whose perspective pervades this paper, strategically negotiates a cooperative relationship with corrupt regulators (1) to ensure the marketability of pirated films among consumers is unrivaled by legitimate suppliers, (2) to operate a profitable criminal enterprise that is uninterrupted by social control agents, and (3) to dominate the role of primary supplier of pirated DVDs and enforce order among other criminal groups within the illegitimate sector of society. In arguing the salience and specific business location of enterprise theory to appreciate organised crime and debunk normative theoretical frameworks of race, class, gender, this paper argues differing methodological frameworks to be a primary cause of the discordance. The ‘two-napkins’ methodology employed in this paper is shown to be more advantages over those of preceding studies where enterprise is the research concern. Interactive variant analysis enables rather than confuse as it has in the past, understanding Asian organized crime as business.

Details: Sydney, Australia: Sydney Law School, 2010. 46p.

Source: Internet Resource: Accessed January 19, 2019 at: https://ink.library.smu.edu.sg/soss_research/2222/

Year: 2010

Country: International

Keywords: Asia

Shelf Number: 154264


Author: Buckland, Helen

Title: The Oil for Ape Scandal: How Palm Oil is Threatening Orang-utan Survival

Summary: Palm oil plantations threaten extinction of the orang-utan in Malaysia and Indonesia This report discusses the imminent threat of extinction to orang-utan in Malaysia and Indonesia bought about by the production of palm oil (a source of vegetable oil). The orang-utan is a flagship species whose decline is an indicator of the wider destruction of natural environments vital to the existence of countless other birds, animals and insects. Malaysia and Indonesia are racing to become the world’s largest supplier of palm oil and allowing the logging of rain forests and destroying of species-rich habitats. Both logging and palm oil production are intertwined in a process of forest clearance and plantation development. Considering a number of case studies the report argues that orang-utan extinction can be avoided. International governments, supply chains, consumers and producers could play a significant role in saving the species: - Supermarkets need to join the Roundtable on Sustainable palm oil considering the source and nature of palm oil production. At present they appear unwilling to tackle the source of palm oil which is used in 1 of every 10 of their products. - Redirection of palm oil production onto readily available abandoned and degraded land would enable production to continue. This can only be achieved through legislative means and a move to tackle corruption within government which allows the continuation of illegal logging. - Illegal logging is only possible due to the theft of land from indigenous people. They must have their customary claim to the land recognised and give informed consent to any plantation proposals. - Market buyers must use their influence to ensure that palm oil is produced using non-destructive methods. Switching to another oil such as soy oil is not the solution, as the production of alternatives is invariably as damaging as that of palm oil. - The international community must take responsibility for the destruction of such natural environments. A transparent supply chain is required. Also a commitment within the British Government's draft Company Reform Bill, requiring companies take 'reasonable and practical steps' to reduce negative impacts on people and the environment. - A number of measures are recommended for palm oil producers. These include the reduction of pesticide use, banning of forest clearance by fire and use of environmental impact assessments. The report argues that orang-utan extinction will not be due to a lack of knowledge but corporate greed and a lack of political will.

Details: London, UK: Friends of the Earth, 2005.

Source: Internet Resource: Accessed January 20, 2019 at: http://www.eldis.org/document/A20615

Year: 2005

Country: International

Keywords: Environmental

Shelf Number: 154262


Author: Child Rights International Network

Title: Caught in the Crossfire?: An International Survey of Anti-Terrorism Legislation and its Impact on Children

Summary: As terrorism has proliferated in the last 20 years, so have States' counterterrorism strategies and the legislation that underpins them, which has introduced new surveillance measures, restrictions on behaviour, powers of detention, and hundreds of new offences carrying heavy sentences. In developing their counter-terrorism strategies, States are obliged to ensure that human rights are promoted and protected in full. Approaches that undermine human rights are not only unlawful; they are now widely understood to be counter-productive, insofar as they consolidate the social conditions in which terrorism can flourish. Nonetheless, States commonly regard human rights as an operational impediment and are allowing them to erode. No group has been more vulnerable to this than children and young people, particularly from marginalised minority groups. This report presents the findings from CRIN's research of anti-terrorism legislation in 33 countries across five continents. It shows that counterterrorism measures are leading to extensive violations of children's rights: - Children's behaviour and interests are monitored in schools and online, without their consent and sometimes without their knowledge; - Children are criminalised for association with terrorist groups, even for marginal involvement, rather than treated as victims of grooming and calculated indoctrination by recruiters; - Children can be routinely detained without charge for long periods under counter-terrorism powers in many countries; - Children convicted of offences, such as association with a terrorist group, are punished with harsh and sometimes extreme penalties; life imprisonment is not unusual, and in some countries children have been executed; - Some State military and intelligence agencies use children as spies and informants, exposing them to undue and potentially serious harm. These effects of counter-terrorism measures are unambiguously incompatible with States' human rights obligations to children. In particular, the strategies violate several specific rights of the child, including: - The right to privacy and to freedom of expression; - The right to be protected from violence and exploitation; - The right not to be used by State military and intelligence agencies; - The right not to be deprived of liberty unlawfully or arbitrarily and the right to be treated with dignity; - The right to a criminal justice system designed for the particular needs of children, and which recognises their lesser culpability by virtue of their cognitive and emotional immaturity relative to adults; - The right of a child to have their best interests treated as a primary consideration in all actions concerning them. Where apprehended children can be subject to extended detention without charge or harsh penalties after conviction, their treatment defies cardinal principles of juvenile justice established by the Convention on the Rights of the Child and other international rules and standards. In the worst cases, such punishments amount to torture, cruel, inhuman, or degrading treatment. Where counter-terrorism measures target one social group disproportionately, they are also likely to amount to a violation of the right to be free from discrimination. States have favoured a 'firefighting approach' to counter-terrorism, by targeting suspected terrorists but not the social conditions in which terrorism can flourish. Structural risk factors that radically increase children's vulnerability to recruitment, such as poverty, marginalisation and the stigmatisation of certain social groups - all of which are human rights violation in themselves - have been largely overlooked. A 'human rights first' approach to counter-terrorism would begin to reverse these social conditions. A human rights approach would not criminalise children for association with terrorist groups, nor incarcerate them for terrorism offences. Instead, it would recognise children's vulnerability to recruitment, supporting them to develop their own awareness of the risks. If children had been groomed and manipulated, the State would recognise their victimisation and provide rehabilitative care. Counter-terrorism authorities committed to human rights would not snoop on children, but would allow professionals charged with their care to make informed and measured decisions about any threats to their welfare. Nor should States ever imperil children by using them in the fight against suspected terrorists. No State needs to violate the human rights of its public to tackle terrorism effectively, nor is there any advantage to be gained from doing so. A State willing to sacrifice children's rights puts them in harm's way, while handing an easy victory to terrorism.

Details: London, UK: The Child Rights International Network, 2018. 44p.

Source: Internet Resource: Accessed January 20, 2019 at: https://archive.crin.org/sites/default/files/caughtinthecrossfire.pdf

Year: 2018

Country: International

Keywords: Anti-Terrorism

Shelf Number: 154254


Author: Fell, James C.

Title: The Effects of Increased Traffic Enforcement on Other Crime

Summary: Abstract American communities are currently confronted with several public safety challenges: homeland security, violent crime, illegal drugs, property crimes, and calls for service. This is also apparently true for many other countries around the world. Law enforcement resources are being stretched thin in every community in attempts to deal with these issues. Traffic law enforcement has been given a lower priority despite the fact that traffic crashes result in more deaths, injuries, and societal costs in most communities than any of the other problems. Specific traffic law enforcement strategies have been shown to be effective in reducing impaired driving. In 2003, the Fresno, California, Police Department increased impaired driving enforcement from 1 or 2 operations per year between 1998 and 2002, to 32 in 2003 and almost 130 in 2010. Not only were alcohol-related crashes reduced by 17%, but burglary rates and motor vehicle theft rates per capita declined by 17% and 32%, respectively, between 2003 and 2011. This is compared to another city in California (Simi Valley) that did not change their traffic enforcement over that same period (2003-2011), conducting 3 impaired driving operations in each year. Burglary rates per capita increased 5% while motor vehicle theft rates per capita decreased only 3% during that period. When examining robberies, the rates in Fresno decreased 29% between the periods from 1996-2002 (pre-intervention) and 2003-2011 (post-intervention). In contrast, the Simi Valley rates for robberies increased 35% between those same periods. Employing high-visibility traffic enforcement, such as the use of sobriety checkpoints and saturation patrols, is known to raise the perceived probability of apprehension for impaired driving, but may also raise the perceived risk of being arrested for other criminal activity. If it can be demonstrated that increased traffic enforcement reduces other crime in the community, police departments in the United States and other countries may be more willing to use resources to implement that strategy. Countries that already use high visibility traffic enforcement in terms of random breath testing (RBT) and automated enforcement (speed and red light cameras) should analyse other crime rates associated with those activities.

Details: Calverton, Maryland: Pacific Institute for Research and Evaluation, 2013. (Paper presented at Australasian Road Safety Research, Policing & Education Conference, 28th – 30th August, Brisbane, Queensland)

Source: Internet Resource: Accessed January 20, 2019 at: http://acrs.org.au/files/arsrpe/Paper%2029%20-%20Fell%20-%20Traffic%20Leg%20&%20Enforcement.pdf

Year: 2013

Country: International

Keywords: Automatic Enforcement

Shelf Number: 154253


Author: Dijk, Jan van

Title: Multiple Systems Estimation for Estimating the Number of Victims of Human Trafficking Across the World

Summary: Overview UNODC has been collecting international statistics on detected victims of trafficking in persons since 2003. At present, there is no sound estimate of the non-detected number of victims of trafficking in persons worldwide. Due to methodological differences and the challenges associated with estimating the sizes of hidden populations such as trafficking victims, this is a task that has so far not been satisfactorily accomplished. However, these efforts are set to gain momentum now that the eradication of trafficking in persons has been adopted as part of the Sustainable Development Goals (SDGs) under the 2030 Agenda for Sustainable Development. The number of victims of human trafficking has been selected as an indicator to measure progress towards the implementation of SDG target 16.2. In light of current efforts and challenges to collect this type of information, this research brief explores the potential of Multiple Systems Estimation as an alternative, efficient method of estimating the number of non-detected numbers of victims of trafficking in persons in a country. In short, the MSE methodology utilizes existing lists of victims of trafficking by different authorities or NGOs and on the basis of a statistical methodology based on the concept of the caprture-ricaprture method the "dark figure" of victims that are not included on any list is estimated by analyzing the overlaps between the lists. A pioneering study of the UK’s Home Office published in 2014 applied MSE to an existing database on detected victims of human trafficking maintained by the National Crime Agency of the United Kingdom. The resulting estimate of the dark number of victims of this crime (Silverman 2014; Bales, Henketh and Silverman 2015) was three to five times the number of detected victims (which ranged between 7,000-10,000). This research brief present the preliminary results of a similar exercise using the databases of the National Rapporteur on Human Trafficking of the Netherlands to arrive for the first time at an estimate of undetected victims of trafficking in persons in the Netherlands. This estimate reveals that ten per cent of all victims are detected in the Netherlands and the total total number of victims is 17,800 (range 14,000-23,900). This research shows the potential of applying the Multiple Systems Estimation method to the databases on detected victims of other countries. An analysis of the data on identified victims of countries in the UNODC database on trafficking in persons of 2012 suggests that MSE could potentially be applied to existing databases of around fifty countries around the world. An in-depth analysis of existing databases on detected victims in Europe suggests that in at least a dozen European countries, existing multi-source databases would allow Multiple Systems Estimation. Finally, this research brief provides some recommendations on next steps in the design of an efficient international statistical system on detected and undetected victims of human trafficking as envisaged by the SDG indicator framework. Generating a methodologically sound estimate of the global number of trafficking victims, in order to better formulate policy and help bring an end to all forms of trafficking in persons, is a commendable objective that is now within our reach.

Details: Vienna, Austra: United Nations Office of Drugs and Crime, 2016. 46p.

Source: Internet Resource: Accessed January 20, 2019 at: https://www.unodc.org/documents/data-and-analysis/tip/TiPMSE.pdf

Year: 2016

Country: International

Keywords: Dark Figure

Shelf Number: 154250


Author: Schleifer, Rebecca

Title: Drug Courts in the Americas

Summary: Executive Summary Drug courts in the United States are presented as an alternative to incarceration for people arrested for minor drug offenses where drug use is considered an underlying cause of the crime, thus theoretically serving as a tool for reducing prison and jail populations. The United States has nearly thirty years of experience with these courts, which have spread to all fifty states as well as US territories. Many countries around the world have looked to the United States' experience with drug courts as a model to be adopted, and the US government has also promoted them abroad as an alternative to incarceration. Perhaps the most organized efforts to expand this policy are those currently underway in Latin America and the Caribbean. The considerable influence of the United States on the region's drug control policies has certainly encouraged many of its countries to view drug courts as such an alternative, and the growing number of countries implementing them signals that these efforts are moving ahead with full force there. The Canadian government has also worked to support the expansion of drug courts, particularly in the Caribbean, but this report does not focus on the Canadian model. Proponents of drug courts assert that they are cost-effective; they reduce recidivism as well as time spent in detention (prison or jail); and they offer drug treatment as an alternative to incarceration to people whose drug use fuels their criminal activity. To evaluate these assertions, this report reviews key findings from the United States' experience which, despite major institutional, legal, and cultural differences, may usefully inform debates about drug courts, along with other alternatives to incarceration for low-level drug crimes, in other countries - in particular, in countries in Latin America and the Caribbean that have either established, or are looking to establish, drug courts. This report also presents a brief overview of where and how drug courts have been implemented in Latin America and the Caribbean to identify, to the extent possible, the different experiences and challenges faced by those countries. One main difficulty in this exercise is the limited availability of data that would allow strong parallels to be drawn. As is the case with the United States, with rare exceptions, drug courts in Latin America and Caribbean are not independently monitored and evaluated, and most were established relatively recently. Nevertheless, we have found the information available points to fundamental problems with the implementation of drug courts; the findings from the United States experience could, at the very least, offer insight into whether and under what circumstances they provide a more desirable option than incarceration. The US section is based on review of the existing research on drug courts and treatment for substance use disorders and evaluations of drug court efficacy conducted and published by the US government, major research institutions, advocacy organizations, and leading scholars whose work focuses on drug courts specifically or on criminal justice, substance use disorders, drug treatment, and drug policy more broadly. The Latin America and Caribbean sections are based on a review of their available information on drug courts (which is significantly more limited than the vast literature available in the United States), as well as on research on criminal justice, incarceration, drug treatment, and drug policy, responses to requests for information, and interviews. Also reviewed for each country are laws, official documents (including memoranda of understanding, government documents and web pages, judiciary reports, PowerPoint presentations made by authorities, and international organization documents, among others), studies and evaluations (when available), and, in a few cases, news reports. The substantial diversity among drug court models complicates efforts to evaluate their impact on the problems they aim to address, but our review of the existing evidence shows the claim that drug courts provide an alternative to incarceration is debatable. We found that drug courts, as implemented in the United States, are a costly, cumbersome intervention that has limited, if any, impact on reducing incarceration. Indeed, for many participants, they may have the opposite effect by increasing criminal justice supervision and subjecting those who fail to graduate to harsher penalties than they might otherwise have received, thus becoming an adjunct rather than an alternative to incarceration. Moreover, evidence about their effectiveness in reducing cost, recidivism, and time spent in prison is mixed. The financial and human costs to drug court participants are also steep and disproportionately burdensome to the poor and racial minorities. The evidence also does not support drug courts as an appropriate public health intervention. Drug court judges are empowered to make treatment decisions that should be the domain of health care professionals, choosing from limited or counterproductive options that may threaten the health and lives of participants as well as expose confidential information about their health and drug use. One of the main stated objectives of drug courts is to ensure access to comprehensive substance abuse treatment for those who need it. Our review of the available evidence shows, however, that, in practice, many drug court participants do not need treatment; at the same time, treatment may be unavailable to or inappropriate for those who do. Evidence we have found indicates the resort to drug courts may be an appropriate measure for certain offenders - that is, people charged with serious crimes linked to their drug dependence who would otherwise serve prison terms. What is often not considered is that most drug courts do not meet this definition. More important, we must remember that drug dependence treatment is a type of medical care. People who are dependent on drugs have a right, under international human rights law, to relevant health care services that are available, physically and economically accessible without discrimination, gender appropriate, culturally and ethically acceptable, designed to respect confidentiality, scientifically and medically appropriate, and of good quality. By mediating treatment through the criminal justice system, drug courts aggressively insert the penal system into people's private and family lives and into their decisions about their health and medical care, reproducing and perpetuating the criminalization of people who use drugs and those involved in low-level drug-related crimes. As an overall framework through which to think about drug courts, we should not lose sight of the fact that no individuals, regardless of their criminal records, should be punished for their medical conditions, nor should they have to allow courts to make their medical decisions for them or rely on the criminal justice system for access to treatment that could perhaps have prevented their incarceration in the first place. The primary lessons learned from US drug courts that should be considered by other countries in the Americas as they look at this model are the following: Drug courts are not an alternative to incarceration: - Defendants remain in criminal proceedings at every step in the drug court program, risk incarceration, both as a sanction while in the program and for failure to complete it, and, in some cases, spend more time behind bars than they would have had they chosen to pursue criminal justice proceedings instead of drug court. Drug courts may increase the number of people under supervision of the criminal justice system in the following ways: - By requiring them to plead guilty as a condition of getting access to drug court. - By processing discretionary crimes that police might have not enforced had drug court not been an option. - By mediating treatment through the criminal justice system. Drug courts are not a rights-based health intervention: - Drug court judges maintain control over treatment decisions for drug court participants, in some cases ordering treatment that is at odds with accepted medical practice. - Participants who fail drug court risk incarceration and face abrupt interruption of treatment and other health risks attendant to incarceration. - Access to treatment comes at the cost of forfeiting fundamental legal and human rights. Drug courts may perpetuate racial bias in the criminal justice system: - Drug courts point to drug dependence as the factor that puts people at risk of criminal justice involvement, ignoring the racial bias in drug policing and prosecution in the United States that leads African Americans and Latinos into long-term criminal justice supervision at much higher rates than their white counterparts. Further complicating this scenario is the concerted effort to export drug courts as a model that should be adopted by other countries. Despite the evidence from the United States experience cited above, countries in Latin America and the Caribbean have embraced drug courts as a promising solution to the over-incarceration problem that plagues the region. This development is problematic not only because governments in the region apparently are not conducting proper investigations before adopting drug courts as a public policy model, but also because the very specific social, economic, and political context of Latin American and Caribbean countries immediately complicates the adoption of public policies designed by other, more developed countries with different legal systems. The lack, for example, of scientifically and medically appropriate treatment options and the reliance on private providers is a serious issue in the Latin America and Caribbean region, where numerous cases of abuse and human rights violations by treatment providers have been documented. Furthermore, health systems do not have enough capacity to provide health and social services to all the people who need them; in these cases, private and religious institutions with scarce knowledge about drug dependence, treatment, and medical standards are used. A reliance on abstinence-based treatment programs and drug testing is also of concern. On the criminal justice side of the issue, many drug courts in the region still focus on simple drug possession as a crime, contributing to the criminalization and stigmatization of people who use drugs. Research about drug courts in Latin America and the Caribbean also underscores the need for a more rigorous data management system that can provide sufficient information for a comprehensive assessment of their effectiveness in the region. Currently, research is too dependent on anecdotal evidence and not focused on evidence-based analysis. This report's main findings about drug treatment courts in Latin America are as follows: - Generally speaking, detailed and current data are lacking in almost all the Latin American countries studied, and independent evaluations are scarce. - The model is more advanced in three countries (Chile, Mexico, and Costa Rica) and in a pilot phase in four others (Argentina, Panama, Dominican Republic, and Colombia). Ecuador and Peru are also considering whether to establish drug courts. - Most programs in the region were established in 2012 or later, except for the Chilean model, which was implemented in 2004. - Drug courts in Latin America function as specific programs within the legal jurisdictions where they have been established rather than as special courts. They function under the conditional suspension of criminal proceedings mechanism and adopt a pre-plea approach that diverts participants before conviction. - Candidates must meet two basic requirements to enter the programs: they must be prosecuted for an eligible offense, and they must receive a diagnosis of problematic drug use related to the commission of the crime. - Only people charged with what the local jurisdictions consider to be minor and/or nonviolent rimes (charges carrying sentences of no more than three to five years in prison) are accepted in the programs. - Many programs carry harsh penalties as sanctions during the course of treatment. - In most programs, participants must be first-time offenders. - In contrast to the US experience, Latin American drug treatment courts graduate few participants. - The drug courts in the region most commonly address crimes against property, domestic violence, and drug possession. Based on available information, simple possession is one of the most frequent crimes in drug court programs that include drug offenses (those in Chile, Dominican Republic, Mexico, and Panama). - Most participants in drug court programs are male. - Juvenile courts have been established in Chile, Colombia, Costa Rica, and Mexico, and other countries plan to create such programs. - Much as in the United States, participation in Latin American drug courts typically requires that participants remain drug free and sometimes sanction them for positive drug tests. - Most countries clearly lack the capacity to provide appropriate treatment to all program participants. This report's main findings about drug treatment courts in the English-speaking Caribbean are as follows: - Much as in Latin America, detailed and current data are lacking in almost all the Caribbean countries studied, and no independent evaluations of drug courts have been done. The information available is mostly from government sources. - The earliest drug court programs in the Caribbean were established in 2001 in Bermuda and Jamaica (making these the oldest programs in the Latin America and Caribbean region), with other countries (the Cayman Islands, Trinidad and Tobago, Barbados, and Belize) establishing drug courts in 2012 or later. - The drug court model is more advanced in three countries (Bermuda, Jamaica, and the Cayman Islands) and in an initial phase in three others (Trinidad and Tobago, Barbados, and Belize). The Bahamas seems to be interested in establishing drug courts. - Drug courts in the Caribbean are not specialized courts as in the United States but, rather, operate as specific programs under local lower (parish/magistrate’s) courts, as in Latin America. The drug treatment courts in Caribbean countries operate under different legal structures. Bermuda, the Cayman Islands, and Jamaica have enacted specific legislation, while Barbados, Belize, and Trinidad and Tobago have signed memoranda of understanding with the Organization of American States' Inter-American Drug Abuse Control Commission (CICAD). The Canadian government has directly supported the implementation of drug courts in a few Caribbean countries. - The basic requirements for admission to drug court are to be charged with an eligible offense and receive a diagnosis of problematic drug use related to the commission of the crime. - Only people charged with what the local jurisdictions consider to be minor and/or nonviolent crimes are accepted in the programs, with the exception of Jamaica, where people charged with certain more serious crimes may be eligible. Participants must be first-time offenders. - Jamaica is the only country in the English-speaking Caribbean where a guilty plea is not a requirement for admission. - The information available suggests that few participants graduate from Caribbean drug courts. - The drug courts in the region most commonly address crimes against property and drug possession. Based on available information, simple possession is one of the most frequent crimes in drug court programs that include drug offenses. - Most participants in drug court programs are male. - Juvenile courts have been established in Jamaica, and reports indicate the Cayman Islands and Trinidad and Tobago are exploring the possibility of establishing such programs. - Many programs carry harsh penalties as sanctions during the course of treatment. - Participation in Caribbean drug courts typically requires that participants remain drug free, and they rely on drug testing to assess compliance, with sanctions imposed for positive drug tests. - Information about treatment standards and options available is scarce, but our research suggests most countries in the region lack the capacity to provide appropriate treatment to all program participants. Undoubtedly, the creation of alternatives to the criminal justice system for drug-related offenses is urgently needed, and countries should focus on moving away from an excessive reliance on incarceration as a panacea. Nonetheless, a close examination of the United States as a case study does not support the drug court model as the most appropriate solution for governments genuinely focused on addressing this issue, since in some respects it continues to criminalize drug consumption and prioritize a criminal approach to drug dependence over a health approach. Hence, this report presents a series of recommendations that should be seriously considered by countries concerned with mass incarceration and intent on moving away from over-reliance on criminal justice responses to drug use. We developed the recommendations with two groups in mind: countries that have not established drug courts or in which they are in early stages, and countries in which drug courts are more established and their continuation is overwhelmingly supported, thus making it difficult (but not impossible) to address the issues raised here.

Details: New York, NY: Social Science Research Council, 2018. 126p.

Source: Internet Resource: Accessed January 20, 2019 at: https://www.ssrc.org/publications/view/drug-courts-in-the-americas/

Year: 2018

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 154312


Author: McBride, David

Title: Who is a Member? Targeted Killings against Members of Organized Armed Groups

Summary: INTRODUCTION This paper argues that the most practical and legally correct definition is somewhere between the extreme views of Dr Melzer or the one hand, and Brigadier General Watkin on the other. It is submitted, to be properly categorized as a 'member of organized armed group' a person does not have to directly inflict harm in one causal step on a recurrent basis. However, neither should 'a cook' be properly considered a 'member of an organized armed group'. A more accurate reflection of who is a legitimately targetable member of an organized armed group is based not on the harm the individual causes, but simply on conduct that shows they intentionally enable the operational activities of the group. Accordingly, this paper will submit that a more satisfactory way of defining them will come from simply considering whether they form part of the 'armed force', in a not dissimilar way one might recognise a State Armed force, without recourse to formal membership, or indicia such as uniforms. This is quite a different test to one used to decide whether a civilian has lost his protection from attack, and I submit it produces a more logical representation of an armed group than a test that is based on an individual's proximity to the causing of harm, let alone one based on the causing of harm in a single causal step.

Details: S.L., 2013. 46p.

Source: Internet Resource: Accessed January 21, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2261128

Year: 2013

Country: International

Keywords: Armed Force

Shelf Number: 154338


Author: Friedland, Steven I.

Title: The Difference Between Invisible and Visible Surveillance in a Mass Surveillance World

Summary: Abstract In Tijuana, Mexico, one can now look in the night sky and possibly see a small, desk-size object flying over the city. The object, a small, unmanned, low-altitude aircraft commonly referred to as a drone, is capable of twenty-minute battery-operated flights. The drone sends live video to screens at police headquarters. Several drones are being used both day and night in Tijuana for crime interdiction, particularly against burglaries. In Great Britain, multiple cameras appear throughout the country, part of a network of closed-circuit televisions also utilized for crime interdiction. In the United States, there are some "red light" cameras at intersections and various other surveillance systems. The National Security Agency (NSA), for example, has multiple surveillance programs that obtain data from private companies, tap telephone calls, and gather massive amounts of phone metadata and telephone records. Government agencies also are developing biometric programs, such as facial recognition software like the Biometric Optical Surveillance System (BOSS), which are already employed in a sophisticated manner by private companies such as Facebook. These collective activities lead inexorably to the realization that we are now living in a mass surveillance world. The types and numbers of systems of surveillance continue to multiply, from drones to biometrics to signals analysis. As we learn from the French root of the word surveillance, surveiller, meaning to watch over, our movements are being watched, stored, connected and dissected every day in myriad ways. For most surveillance to succeed, unless it is designed primarily to deter observers instead of capturing information or behavior, it is almost axiomatic that an element of secrecy is needed. This is especially true when the governmental objective is national security. The problem is that the national security narrative cloaks surveillance in invisibility. In doing so, the cloaking minimizes other factors in the calculus for determining the parameters of lawful surveillance, such as the harms incurred by individuals, the Constitution and the rule of law. As a recent report by the independent Privacy and Civil Liberties Oversight Board noted, "Despite widespread support for balancing openness and secrecy, there has been equally widespread consensus within and without the government that the system tilts too far in the direction of secrecy." Thus, the distinction between invisible and visible surveillance has potentially profound consequences. With invisibility, there generally is no narrative, and without such a narrative, a coherent voice – the core of our adversarial court system and democracy -- cannot be raised concerning the harms of surveillance, such as whether it might violate the Fourth Amendment or various statutes. Consequently, it is more difficult to distinguish between legitimate and illegitimate powers, creating a slippery slope of one-sided justification. This paper will explore the distinctions between visible and invisible surveillance. Given the significance of these distinctions, I will argue that some visibility of surveillance — some transparency — is needed to ensure that proper privacy safeguards exist. In short, reframing the analysis to allow a narrative about the harms of indiscriminate mass surveillance hopefully will lead to greater government accountability, increased protection of liberty and a stronger rule of law.

Details: Elon, North Carolina: Elon University Law, 2014. 18p.

Source: Internet Resource: Accessed January 21, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2392489

Year: 2014

Country: International

Keywords: Biometric Optical Surveillance System (BOSS)

Shelf Number: 154339


Author: Fink, Naureen Chowdhury

Title: Beyond Terrorism: Deradicalization and Disengagement from Violent Extremism

Summary: Executive Summary Many scholars have noted the cyclical nature of terrorist movements. Yet, little attention has been paid to the ways in which such groups come to an end or move away from violence of their own accord. Similarly, though much current attention has focused on the process of radicalization and the espousal of violent extremism, Tore Bjorgo and John Horgan argue that insufficient attention has been paid to the other end of the spectrum: the factors which prompt individual and collective withdrawal from violent extremist or radical groups - i.e., the processes of disengagement and deradicalization. Disengagement refers to a behavioral change, such as leaving a group or changing one's role within it. It does not necessitate a change in values or ideals, but requires relinquishing the objective of achieving change through violence. Deradicalization, however, implies a cognitive shift - i.e., a fundamental change in understanding. Furthermore, it has been argued that, cumulatively, such processes can have a positive impact on global counterterrorism efforts by promoting the internal fragmentation of violent radical groups and by delegitimizing their rhetoric and tactics in the eyes of the broader public. To this end, Bjorgo and Horgan have edited a volume gathering together research, analyses, and case studies on processes of disengagement from violent extremism, as well as descriptions and assessments of global initiatives facilitating withdrawal from violent extremist groups. This report draws on their work and reflects the discussions at a conference on "Leaving Terrorism Behind: Individual and Collective Disengagement from Violent Extremism," hosted by the International Peace Institute and the Norwegian Ministry of Foreign Affairs, on April 22, 2008, in New York City. Bringing together a wide range of perspectives from the academic, diplomatic, and practitioner communities in New York, this conference generated an engaging discussion on the impact of disengagement and deradicalization programs on global counterterrorism efforts and informed the ongoing work of the UN in this area. Researchers at the conference described various initiatives, including those undertaken in Europe, Southeast Asia, Colombia, and Saudi Arabia, which are detailed below. Furthermore, the report notes a number of innovative programs in, for example, Yemen and Qatar, which have sought creative solutions to the challenge of radicalization within their societies. Although research into violent groups in various countries was conducted discretely, researchers noted common patterns which arose among the factors encouraging disengagement from violent extremism. Among these were familial and social influences; frustration with the group's leadership or tactics; and longing for a "normal" civilian life separate from clandestine activities and the threat of punitive actions by law enforcement. Consequently, whether discussing white supremacist groups or jihadist terrorists, disengagement and deradicalization were encouraged by many similar factors, beginning for many with the experience of trauma and a subsequent "cognitive opening," disillusionment, revulsion, or stress, and further facilitated by education, social and economic assistance, and counseling. This has important implications for the work of the United Nations in countering terrorism and violent radicalism. These patterns highlight the value of a cross-fertilization of ideas among different regional and ideological groups; for example, lessons learned in Indonesia and Saudi Arabia may be applied in Europe, and the experiences of Irish Republicans may tell us much about jihadists in Southeast Asia. However, the research team also noted that there is no "one-size-fits-all" model; terrorism is often context-specific and, therefore, the local environment and culture must impact the format of such initiatives. Still, these findings also indicate great value in broad cooperative initiatives to share experiences, program designs, research, and analysis among UN Member States, especially those countries grappling with the challenge of violent extremism or terrorism. Although the UN might not be a central actor in many of these programs, which are mostly the result of national initiatives, it could provide the mechanisms for transmitting lessons learned from one country to another and assist states in the development of their own programs. Given its universal state membership, its access to international expertise, and its convening power, participants at the conference suggested key roles in which the United Nations could contribute to facilitating disengagement and deradicalization initiatives: - Collating best practices and information sharing By drawing on its convening capacity, the United Nations and its partners can collect and disseminate insights, best practices, and lessons learned to inform the initiatives of Member States and relevant organizations. - Facilitating cooperative relationships and capacity development The UN can also empower and facilitate regional and cross-regional cooperative mechanisms among counterterrorism practitioners and state representatives. One product from such a series of exchanges might be a compendium or manual derived from states' collated best practices and experiences in setting up a disengagement or deradicalization program. - Developing standards and benchmarks The mapping exercise currently being undertaken by the Counterterrorism Implementation Task Force's Working Group on "radicalization and extremism that leads to terrorism" may be developed into a series of standards and benchmarks that states and their programs might use to measure success. - Capacity-building assistance for criminal justice systems Arms of the United Nations, such as the Interregional Crime and Justice Research Institute (UNICRI) and the Office on Drugs and Crime (UNODC), perform roles that supplement the UN’s counterterrorism efforts by transmitting technical knowledge and assistance. Their expertise in legal, judicial, and criminal matters may be drawn upon by states seeking to develop deradicalization and disengagement programs. - Norm-setting and media outreach In many subject areas, such as human rights, decolonization, and child combatants, the UN has served as a setter of international norms. This role could be further extended to set international standards and norms delegitimizing the use of violence against noncombatants and highlight the negative impact of violent extremism on families and societies, bolstered by a strong and vocal commitment from a cross-regional coalition of UN Member States. As Terje Pedersen, Norway's Deputy Minister of Justice and the Police, noted, discussions about terrorism and the broader understanding of it have come a long way since September 11, 2001, but there is yet much to learn regarding long-term prevention. This discussion was intended therefore not only to inform the work of the UN and its Member States, but also to encourage further research and analysis of the processes and drivers of individual and collective disengagements. This will help states to better understand how these processes relate to their counterterrorism strategies and capacities. The UN, with its role in facilitating knowledge exchange and providing technical assistance, may be a vital element in a truly holistic and transnational approach to the challenge of violent extremism.

Details: New York, NY: International Peace Institute, 2008. 36p.

Source: Internet Resource: Accessed January 21, 2019 at: https://www.ipinst.org/wp-content/uploads/publications/beter.pdf

Year: 2008

Country: International

Keywords: Countering Violent Extremism

Shelf Number: 154324


Author: Economist Intelligence Unit

Title: Out of the shadows: Shining light on the response to child sexual abuse and exploitation. A 40-country benchmarking index

Summary: Out of the shadows: Shining light on the response to child sexual abuse and exploitation is an Economist Intelligence Unit research programme supported by the World Childhood Foundation and the Oak Foundation with additional support from the Carlson Family Foundation. It is based largely on a country-level benchmarking index that evaluates how stakeholders are responding to the scourge of sexual violence against children in 40 selected countries. They include: Albania, Argentina, Australia, Brazil, Cambodia, Canada, China, Egypt, El Salvador, France, Germany, India, Indonesia, Italy, Jamaica, Japan, Kazakhstan, Kenya, Malaysia, Mexico, Mongolia, Mozambique, Nigeria, Pakistan, Philippines, Romania, Russia, Rwanda, Serbia, South Africa, South Korea, Sri Lanka, Sweden, Tanzania, Turkey, the UAE, Uganda, the UK, the US and Vietnam. The Out of the Shadows Index examines four categories within which these responses take place: - Environment: the safety and stability of a country, the social protections available to families and children, and whether norms lead to open discussion of the issue. - Legal framework: the degree to which a country provides legal or regulatory protections for children from sexual exploitation or abuse. - Government commitment and capacity: whether governments invest in resources to equip institutions and personnel to respond appropriately, and to collect data to understand the scope of the problem. - Engagement of industry, civil society and media: the propensity for addressing risks to children at the industry and community levels, as well as providing support to victims. Created with input from international experts, the index draws on the latest available quantitative data and qualitative research. The index model is available at https://outoftheshadows.eiu.com. A detailed description of the index construction and research process is available in a downloadable methodology paper, alongside other resources related to working with the model. As a complement to the index's country-level focus, this report broadly examines the barriers and pathways towards addressing sexual violence against children. It spotlights the index's key findings and includes interviews with global experts and in-depth secondary research.

Details: London: The Author, 2019. 39p.

Source: Internet Resource: Accessed January 24, 2019 at: https://outoftheshadows.eiu.com/wp-content/uploads/2019/01/Out-the-Shadows-Whitepaper.pdf

Year: 2019

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 154393


Author: United Nations Educational, Scientific and Cultural Organization

Title: Behind the numbers: ending school violence and bullying

Summary: School-related violence in all its forms is an infringement of children's and adolescents' rights to education and to health and well-being. No country can achieve inclusive and equitable quality education for all if learners experience violence and bullying in school.This UNESCO publication provides an up-to-date and comprehensive overview of global and regional prevalence and trends related to school-related violence and examines the nature and impact of school violence and bullying. It reviews national responses, focusing on countries that have seen positive trends in prevalence and identifies factors that have contributed to an effective response to school violence and bullying.Addressing school violence and bullying is essential in order to achieve the Sustainable Development Goals (SDGs), in particular SDG 4, which aims to ensure inclusive and equitable quality education and promote lifelong learning opportunities for all, and SDG 16, which aims to promote peaceful and inclusive societies. Monitoring progress in this regard requires accurate data on prevalence and trends in school violence and bullying, and on how effectively the education sector is responding to it. This publication aims to contribute to monitoring progress towards the achievement of safe, non-violent, inclusive and effective learning environments.School violence and bullying can be devastating for the victims. The consequences include children and youth finding it difficult to concentrate in class, missing classes, avoiding school activities, playing truant or dropping out of school altogether. This has an adverse impact on academic achievement and future education and employment prospects. An atmosphere of anxiety, fear and insecurity is incompatible with learning and unsafe learning environments can, therefore, undermine the quality of education for all learners.This publication builds on previous UNESCO work on school violence and bullying including publication of the School Violence and Bullying: Global Status Report (UNESCO, 2017), and we trust that it will be useful to everyone who has an interest in preventing and addressing school violence and bullying. We also hope that it will make an important contribution to the Safe to Learn Campaign, which aims to end all violence in schools by 2024, by raising awareness and catalyzing action to eliminate school violence and bullying

Details: Paris: UNESCO, 2019. 74p.

Source: Internet Resource: Accessed January 24, 2019 at: https://unesdoc.unesco.org/ark:/48223/pf0000366483

Year: 2019

Country: International

Keywords: School Bullying

Shelf Number: 154394


Author: International Organization for Migration

Title: Addressing Human Trafficking and Exploitation in Times of Crisis: Evidence and Recommendations for Further Action to Protect Vulnerable and Mobile Populations

Summary: Although human trafficking has gathered momentum and several international organizations have developed approaches to address it, the phenomenon remains a serious crime, with grave human rights concerns, that is largely overlooked in crisis situations. In addition, human trafficking is typically not considered a direct consequence of crisis. This misplaced assumption, coupled with the fact that counter-trafficking efforts are not necessarily understood as an immediate life-saver in crisis, often hampers the humanitarian response to human trafficking cases, particularly in terms of identification of and assistance to victims. In reality, as the newly published IOM report Addressing Human Trafficking and Exploitation in Times of Crisis reveals these efforts are a matter of life and livelihood for victims of trafficking and should therefore be considered with as much priority as for any other crisis-affected population and be addressed at the outset of a crisis. The report recommends that human trafficking in times of crisis be urgently included in the humanitarian community, with support from both emergency and development donor communities.

Details: Geneva, SWIT: IOM, 2015. 51p.

Source: Internet Resource: Accessed January 24, 2019 at: https://publications.iom.int/books/addressing-human-trafficking-and-exploitation-times-crisis-evidence-and-recommendations-0

Year: 2015

Country: International

Keywords: Human Trafficking

Shelf Number: 154400


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Report on Trafficking in Persons: 2018

Summary: The 2018 UNODC Global Report on Trafficking in Persons is the fourth of its kind mandated by the General Assembly through the 2010 United Nations Global Plan of Action to Combat Trafficking in Persons. It covers 142 countries and provides an overview of patterns and flows of trafficking in persons at global, regional and national levels, based primarily on trafficking cases detected between 2014 and 2016. As UNODC has been systematically collecting data on trafficking in persons for more than a decade, trend information is presented for a broad range of indicators.

Details: Vienna: UNODC, 2018. 90p.

Source: Internet Resource: Accessed January 24, 2019 at: https://www.unodc.org/documents/data-and-analysis/glotip/2018/GLOTiP_2018_BOOK_web_small.pdf

Year: 2018

Country: International

Keywords: Human Smuggling

Shelf Number: 154401


Author: United Nations Educational, Scientific and Cultural Organization

Title: School Violence and Bullying: Global Status Report

Summary: A 2012 report by the Special Representative of the Secretary-General on Violence against Children notes that 'more than one billion children around the world attend school. Many of these children enjoy their right to be taught in a safe and stimulating environment. For many others, however, schooling does not guarantee such opportunity. These girls and boys are exposed to bullying, sexual and gender-based violence, corporal punishment and other forms of violence... Many are also exposed to schoolyard fighting, gang violence, assault with weapons, and sexual and gender-based violence by their own peers. New manifestations of violence are also affecting children’s lives, notably the phenomenon of cyberbullying via mobile phones, computers, websites and social networking sites.' The scope of school violence and bullying#School violence encompasses physical violence, including corporal punishment; psychological violence, including verbal abuse; sexual violence, including rape and harassment; and bullying, including cyberbullying. #Bullying, which is a type of violence, is a pattern of behaviour rather than an isolated event, and it has an adverse impact on the victim, the bully and bystanders. Bullying has been defined as 'unwanted, aggressive behaviour among school-aged children that involves a real or perceived imbalance of power. The behaviour is repeated, or has the potential to be repeated, over time'. Bullying and cyberbullying are a key concern for children and adolescents. School violence and bullying is perpetrated by other students, teachers and other school staff; violence that occurs on the way to and from school may also be perpetrated by members of the wider community. It is important to differentiate between violence perpetrated by peers and violence perpetrated by educational institutions or their representatives as this distinction influences both the impact of and the response to violence. There is some evidence to suggest that girls are more likely to experience sexual violence and that boys are more likely to experience corporal punishment, or more severe corporal punishment, in school than girls, although girls are not exempt. The underlying causes of school violence and bullying include gender and social norms and wider contextual and structural factors. Much school violence and bullying is related to gender; gender-based violence is violence that results in physical, sexual or psychological harm or suffering against someone based on gender discrimination, gender role expectations or gender stereotypes or based on differential power status linked to gender. The most vulnerable children and adolescents, including those who are poor or from ethnic, linguistic or cultural minorities or migrant or refugee communities or have disabilities, are at higher risk of school violence and bullying. Children and adolescents whose sexual orientation, gender identity or expression does not conform to traditional social or gender norms are also disproportionately affected.School violence and bullying can occur inside and outside the classroom, around schools, on the way to and from school, as well as online. In school, bullying often occurs in places such as toilets, changing rooms, corridors and playgrounds where children and adolescents are less easily be seen or supervised by teachers and other school staff. Special Representative of the Secretary-General on Violence against Children (2012). Tackling violence in schools: A global perspective bridging the gap between standards and practice.2See for example StopBullying.gov This report uses the UN definition of children as those aged under 18 years and adolescents as those aged 10-19 years. 9Summary - Different types of violence and bullying often overlap. Children and adolescents may experience violence and bullying both at home and at school and in the real and virtual worlds. Those involved in bullying can be both victims and perpetrators. For example, those who report bullying others online commonly report also being bullied by others online and online victims are also often bullied in person.#Many victims of school violence and bullying do not tell anyone about their experience. Reasons include lack of trust in adults, including teachers, fear of repercussions or reprisals, feelings of guilt, shame or confusion, concerns that they will not be taken seriously or not knowing where to seek help. School violence and bullying is often invisible to or ignored by teachers and parents. In some contexts, adults view corporal punishment, fighting and bullying as a normal part of discipline or growing up and are not aware of the negative impact it has on the education, health and well-being of children and adolescents.The prevalence of school violence and bullying#School violence and bullying occurs throughout the world and affects a significant proportion of children and adolescents. It is estimated that 246 million children and adolescents experience school violence and bullying in some form every year. Estimates of the proportion of children and young people affected by school bullying specifically vary between countries and studies, ranging from less than 10% to over 65%. In the 2016 UNICEF U-Report/ Special Representative of the UN Secretary General on Violence against Children (SRSG-VAC) opinion poll, to which 100,000 young people in 18 countries responded, two-thirds of respondents reported that they had been the victim of bullying. UNESCO evidence review found that the proportion of lesbian, gay, bisexual and transgender students (LGBT ) experiencing school violence and bullying ranged from 16% to 85% and the prevalence of violence was between three and five times higher among LGBT students than among their non-LGBT peers. Cyberbullying is a growing problem. Most available data on the prevalence of cyberbullying is from surveys conducted in industrialised countries, and this suggests that the proportion of children and adolescents who are affected by cyberbullying ranges from 5% to 21% and that girls appear to be more likely to experience cyberbullying than boys.Available data suggests that physical violence is less common in schools than bullying, but much available data is from industrialised countries; anecdotal evidence suggests that physical violence is a serious problem in schools in other regions. #Specific data on sexual violence in and around the school setting is limited, since many victims are hesitant to report acts of sexual violence for fear of being shamed or stigmatised or because they are concerned that they will not be believed or will face retaliation from their aggressor or aggressors. Nevertheless, available figures suggest that sexual violence and abuse in schools, perpetuated by staff and by other students, is a reality for many students, particularly girls.

Details: Paris: UNESCO, 2017. 56p.

Source: Internet Resource: Accessed January 24, 2019 at: https://unesdoc.unesco.org/ark:/48223/pf0000246970

Year: 2017

Country: International

Keywords: Cyberbullying

Shelf Number: 154402


Author: Mueller-Smith, Michael

Title: Essays on the Economics of Crime and Discrimination

Summary: This dissertation studies marginalized populations in the United States and Western countries, with a broad focus on how legal and social institutions affect individual economic outcomes and well-being. The fi rst chapter examines the impacts of incarceration on criminal defendants in Houston, Texas, documenting patterns of worsening criminality, diminished earnings and social detachment after exposure to the prison system. The second chapter develops a framework to consider the interplay between discrimination and concealment of minority status in the context of sexual orientation and shows empirical evidence from the United States on the large magnitudes of concealment costs. The third chapter considers the role of legal recognition of unions in shaping the labor market activity and childbearing decisions of same-sex couples in Sweden, implicitly providing insight into some of the constraints imposed on same-sex couples by widespread exclusion from the institution of marriage throughout the world. Together these essays highlight how public institutions and social systems influence lifecycle outcomes in the population, particularly among minority and other vulnerable groups.

Details: New York: Columbia University, 2015. 195p.

Source: Internet Resource: Dissertation: Accessed January 30, 2019 at: https://academiccommons.columbia.edu/doi/10.7916/D8QN65QV

Year: 2015

Country: International

Keywords: Economics of Crime

Shelf Number: 154463


Author: Plan International

Title: Unsafe in the City: The Everyday Experiences of Girls and Young Women

Summary: Introduction For the first time in history, there are more people living in cities than in rural areas. Today, cities are home to 54% of the world's population, and by the middle of this century that figure will rise to 66%. There will be approximately one billion girls under the age of 18 alive in 2025; millions of them will be among the five billion people who will be living in towns and cities by 2030. Despite the economic opportunities that urban areas can offer, this migration from the countryside and villages to towns and cities is challenging: poverty, overcrowding, casual employment, bad housing and inefficient public transport create an environment that penalises the most vulnerable, including those who are young and female. Girls brought up in cities contend with its contradictions. Although they are more likely to be educated, less likely to be married at an early age and more likely to participate in politics than girls brought up in rural areas, these advantages come at a cost. As the research conducted for this report reveals, city life also brings with it a frightening level of sexual harassment, exploitation and insecurity. Gender discrimination and sexist attitudes, prevalent everywhere, exacerbate the effects of inadequate infrastructure, poor pay and underemployment that are characteristic of so many cities. And girls and young women are easy targets.

Details: Surrey, United Kingdom: Plan International, 2018. 19p.

Source: Internet Resource: Accessed January 30, 2019 at: https://reliefweb.int/report/world/unsafe-city-research-everyday-experiences-girls-and-young-women

Year: 2018

Country: International

Keywords: Exploitation

Shelf Number: 154310


Author: Baier, Jessica

Title: Essays on Violent Crime and the World

Summary: The main goal of the presented studies is to identify determinants of crime by looking at specific contexts in which crime rates have been observed to be especially high. The first paper of the thesis presents a case study on the country of Mexico, a country that is notorious for its high prevalence of violence and crime. Especially in recent years Mexico has caught the attention of the international public due to its spectacular increase in murder rates. The paper reconstructs the development of crime back until the beginning of the 20th century and then examines the driving forces behind this development. While looking at some of the general determinants that have been identified in a global framework as drivers of crime, the study also looks at factors that are specific to the Mexican case. The second chapter, a result of a cooperation with my supervisor, Jorg Baten, shifts the focus away from the single country-case towards a worldwide perspective. Using a newly assembled global data set, the paper takes a look at the impact of valuable natural resources, a factor that has been known to increase the risk of collective violence such as interstate war and civil conflict. The paper shows that the presence of valuable silver resources can be a main driver of violent crime, by altering the incentives in an economy. Deterrence is the hypothesis that the threat of a severe punishment can decrease the expected utility of a crime substantially, which results in fewer crimes. While often used as anti-crime measure, the efficacy of deterrence has not been proven reliably. One fact that complicates the matter is that the relationship between crime and punishment is not clear-cut. Societies might react to changes in crime rates and adjust punishment accordingly, hence there is the potential of reverse causation. Using a newly assembled data set it was possible to model the complex interactions between homicide rates and the capital punishment and to test the deterrence hypothesis as well as the hypothesis that crime levels determine the severity of punishment in the final chapter of the thesis.

Details: Tubingen: University of Tubingen, 2018. 266p.

Source: Internet Resource: Dissertation: Accessed February 4, 2019 at: https://publikationen.uni-tuebingen.de/xmlui/handle/10900/84670

Year: 2018

Country: International

Keywords: Crime Rates

Shelf Number: 154473


Author: International Centre for the Prevention of Crime (ICPC)

Title: 6th International Report on Crime Prevention and Community Safety: Preventing Cybercrime

Summary: The sixth edition of the International Report is concerned with the overarching theme of cybercrime and how does one prevent it. As in previous publications, this new edition starts with an international overview of crime and its prevention. Four separate chapters then look in more detail at cybercrime-related issues such as crime in a digital world, cybercrimes, cybercriminals and cybervictims, cybercrime prevention approaches and public-private partnerships in cybercrime prevention. Published every two years since 2008,The International Report provides essential information and tools to help governments, local authorities, international organizations and practitioners implement successful crime prevention policies in their countries, cities and communities.

Details: Montreal: The Author, 2018. 164p.

Source: Internet Resource: Accessed February 4, 2019 at: http://www.crime-prevention-intl.org/en/publications/report/report/article/6th-international-report-on-crime-prevention-and-community-safety-preventing-cybercrime.html

Year: 2018

Country: International

Keywords: Computer Crime

Shelf Number: 154477


Author: Madriaza, Pablo

Title: The Prevention of Radicalization Leading to Violence: An International Study of Front-Line Workers and Intervention Issues

Summary: The objective of this study, funded by Public Safety Canada, is to identify the main challenges faced by frontline workers in preventing radicalization in order to gather specific and practical information regarding the implementation of programmes and initiatives, especially the ones linked to challenges, difficulties, as well as intervention management approaches. To do so, the study was carried out in two phases. During the first one, exploratory interviews were held with 27 experts and specialists from 14 countries. Through this phase, we were able to obtain recommendations in selecting which frontline workers to target as well as countries and cities implementing interesting interventions for the prevention of radicalization. We were also given the contact information of some workers. Subsequently, the second phase of the study consisted in interviewing frontline actors, such as social workers, educators, etc. who are involved in the prevention of radicalization. A total of 63 workers from 23 countries in North America, Europe, Africa, Asia and Oceania were interviewed. The Report for this study thus presents the main intervention dimensions in preventing radicalization as well as challenges faced by frontline workers, while also sharing their recommendations when it comes to intervening to prevent radicalization.

Details: Montreat: International Centre for the Prevention of Crime, 2017. 137p.

Source: Internet Resource: Accessed February 4, 2019 at: http://www.crime-prevention-intl.org/fileadmin/user_upload/Publications/2017/EN_Rapport_Radicalisation_Final_Aout2017.pdf

Year: 2017

Country: International

Keywords: Crime Prevention

Shelf Number: 154482


Author: International Drug Policy Consortium

Title: Taking stock: A decade of drug policy. A civil society shadow report

Summary: 'Taking stock: A decade of drug policy' evaluates the impacts of drug policies implemented across the world over the past decade, using data from the United Nations (UN), complemented with peer-reviewed academic research and grey literature reports from civil society. The important role of civil society in the design, implementation, monitoring and evaluation of global drug policies is recognised in the 2009 Political Declaration and Plan of Action on drugs, as well as in the Outcome Document of the 2016 United Nations General Assembly Special Session (UNGASS) on drugs. It is in this spirit that the International Drug Policy Consortium (IDPC) has produced this Shadow Report, to contribute constructively to high-level discussions on the next decade in global drug policy. Conclusion The commitments and targets set in the 2009 Political Declaration and Plan of Action have not been achieved, and in many cases have resulted in counterproductive policies. The Shadow Report also raises a number of issues on the past and future evaluation of global drug policies. Firstly, the Report highlights the urgent need to conduct more thorough and regular research on the broader range of impacts of drug policies at local, national, regional and international level. Secondly, and related to the need for more research, the Report puts into question the sources of data currently being be used for such formal evaluations. These rely heavily on government reporting. A more comprehensive and balanced picture of the situation requires incorporating civil society and academic research. This is particularly important for sensitive issues related to drug policy and human rights. And thirdly, the lack of progress made towards the drug-free targets, along with the negative consequences associated with efforts to achieve those targets, mean that member states should reflect upon what to measure. Focusing exclusively on measuring the scale of the illegal drug market is clearly not enough to understand the impact of drug policy on the key UN Charter commitments to health, human rights, development, peace and security. The third section of this Shadow Report attempts to provide some recommendations which we hope will provide a useful starting point for further discussions as to which goals and metrics could be considered for the post-2019 global drug strategy. Recommendations -- In preparation for the 2019 Ministerial Segment, the IDPC network recommends that: The international community should consider adopting more meaningful goals and targets in line with the 2030 Agenda for Sustainable Development, the UNGASS Outcome Document and international human rights commitments, and move away from targets seeking to eliminate the illegal drug market. Post-2019, member states should meaningfully reflect upon the impacts of drug control on the UN goals of promoting health, human rights, development, peace and security - and adopt drug policies and strategies that actively contribute to advancing the 2030 Agenda for Sustainable Development, especially for those most marginalised and vulnerable. Global drug policy debates going forward should reflect the realities of drug policies on the ground, both positive and negative, and discuss constructively the resulting tensions with the UN drug control treaties and any human rights concerns associated with drug control efforts. Beyond 2019, UN member states should end punitive drug control approaches and put people and communities first. This includes promoting and facilitating the participation of civil society and affected communities in all aspects of the design, implementation, evaluation and monitoring of drug policies.

Details: London: IDCP, 2018. 138p.

Source: Internet Resource: Accessed February 5, 2019 at: https://idpc.net/publications/2018/10/taking-stock-a-decade-of-drug-policy-a-civil-society-shadow-report?utm_source=IDPC+Monthly+Alert+%28English%29&utm_campaign=35eea0b244-IDPC+February+Alert+2019&utm_medium=email&utm_term=0_801bc38237-35eea0b244-151900983

Year: 2018

Country: International

Keywords: Drug Control

Shelf Number: 154487


Author: Health Poverty Action

Title: Punishing poverty - How the failed 'war on drugs' harms vulnerable communities: Case studies of Brazil and India

Summary: Around the world the so called 'war on drugs' is collapsing. Many countries are replacing the prohibition of illicit drugs, with new approaches which prioritise and protect people's health and wellbeing. Whilst reform is underway, it is not happening nearly fast enough or reaching far enough. The prohibitionist criminal justice approach that has dominated drug policy for the past 50 years continues to destroy livelihoods and claim lives. The people most affected aren't those in charge of the drugs trade. Instead, it's those caught up at the lowest levels in a trade that is destroying their lives and communities, particularly in the global south. Prohibition has failed to reduce the world's supply of illicit drugs. Meanwhile the heavy handed and often militarised law enforcement approach that often goes with it - directed primarily at those involved at the lowest level in the production and supply of illicit drugs - has fueled poverty, inequality, corruption and violence. This is felt most sharply by marginalised communities and women who engage in the small-scale trade out of necessity or lack of alternatives. In these contexts of significant vulnerability, powerlessness and poverty, the drugs trade can offer a decent income or means of survival, where no other exists.

Details: London: HPC, 2019. 40p.

Source: Internet Resource: Accessed February 5, 2019 at: http://fileserver.idpc.net/library/Punishing-poverty-research-report-WEB.pdf

Year: 2019

Country: International

Keywords: Brazil

Shelf Number: 154489


Author: ECPAT International

Title: Terminology Guidelines for the Protection of Children from Sexual Exploitation and Sexual Abuse

Summary: The Terminology Guidelines, dubbed the 'Luxembourg Guidelines' after their adoption in the small country earlier this year, offer guidance on how to navigate the complex lexicon of terms commonly used relating to sexual exploitation and sexual abuse of children. They aim to build consensus on key concepts in order to strengthen data collection and cooperation across agencies, sectors and countries.

Details: Rachathewi, Bangkok, Thailand: ECPAT International, 2016. 114p.

Source: Internet Resource: Accessed February 5, 2019 at: https://www.ilo.org/wcmsp5/groups/public/---ed_norm/---ipec/documents/instructionalmaterial/wcms_490167.pdf

Year: 2016

Country: International

Keywords: Child Abuse and Neglect

Shelf Number: 154497


Author: Barone, Raffaella

Title: Cryptocurrency or Usury? Crime and Alternative Money Laundering Techniques

Summary: The article presents a novel dynamic setting to compare old - usury - and new – cryptocurrency – money laundering techniques and uses it for calibration to shed light on their relative role as an effective device for the criminal organizations to clean their illegal revenues. The specialness of the usury contract depends on its role in laundering illegal revenues originating from criminal activities and it is independent from the interest rate level, while the cryptocurrency money laundering is associated with an initial coin offering (ICO) tool. The calibration compares the leverage effect on the overall capital owned by the criminal organizations triggered by the two money laundering techniques.

Details: Milan: BAFFI CAREFIN Centre, 2018. 23p.

Source: Internet Resource: BAFFI CAREFIN Centre Research Paper No. 2018-101: Accessed February 7, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3303871

Year: 2018

Country: International

Keywords: Cryptocurrency

Shelf Number: 154508


Author: United States Agency for International Development

Title: Combating Wildlife Trafficking: Cross-Mission Learning Agenda

Summary: USAID has a long history of support for biodiversity conservation, including programs that help park authorities and rural communities reduce poaching and consumption of wildlife, usually as part of broader investments in protected area management or community-based natural resource management. Wildlife trafficking, defined as illegal hunting, transport and commerce of wildlife and wildlife products, is now prioritized for action by USAID due to a dramatic increase in the volume and scope of the threat in recent years, a 2014 Executive Order on Combating Wildlife Trafficking (and associated National Strategy and Interagency Task Force), and the 2016 Eliminate, Neutralize and Disrupt (END) Wildlife Trafficking Act. As missions begin or ramp up new programs, there is an important opportunity for cross-mission collaboration to capitalize on previous experiences, share the latest information, and spread innovative ideas across missions. USAID highlights 10 common strategic approaches used to combat wildlife crime in its Measuring Efforts to Combat Wildlife Crime toolkit. The Collaborative Learning Group elected to focus learning efforts on theories of change for strategic approaches #1, #2, and #7 from the toolkit,1 defined as: 1. Reduce Consumer Demand through Behavior Change Methodologies: The use of social marketing and other methodologies to raise awareness and change the behaviors of target audiences, especially consumer choices and reporting of illegal products and markets. 2. Build Capacity for Effective Enforcement and Prosecution: The provision of financial or technical assistance to improve the capacity of governments and agencies to enforce wildlife laws and prosecute wildlife criminals. 7. Increase Community Conservation Action and Support to Combat Poaching and Trafficking: Efforts to build community support and action to decrease poaching and illegal activity. These strategic approaches are currently applied by USAID in a number of countries. To date, little information has been collected in a systematic way to be able to test key assumptions regarding the effectiveness of these approaches. Given their growing application within the USAID portfolio, there is an important need and opportunity to build the evidence base regarding the effectiveness of these approaches across USAID mission programming.

Details: Washington, DC: United States Agency for International Development, 2017. 17p

Source: Internet Resource: Accessed February 8, 2019 at: https://usaidlearninglab.org/sites/default/files/resource/files/combating_wildlife_trafficking_learning_agenda.pdf

Year: 2017

Country: International

Keywords: Biodiversity Conservation

Shelf Number: 154292


Author: Greenberger, Michael

Title: The Need for Closed Circuit Television in Mass Transit Systems

Summary: Abstract Closed circuit television video (CCTV) surveillance systems need to be introduced or enhanced in the public areas within United States' mass transit systems. London's extensive system was used very successfully in the investigation of the July 2005 terrorist attacks on its subway and bus systems. That effective investigatory use of CCTV is very likely to be a significant deterrence to future terrorist activities on London mass transit. The United States must be prepared in the event of similar attacks on its soil. As roughly twenty times more people travel by mass transit than by air, it is time for this nation's transportation security focus to shift to mass transit, and to use CCTV widely in public mass transit systems.

Details: Bethesda, Maryland: University of Maryland, Center for Health and Homeland Security, 2006. 9p.

Source: Internet Resource: Accessed February 8, 2019 at: https://digitalcommons.law.umaryland.edu/fac_pubs/64/

Year: 2006

Country: International

Keywords: Bus

Shelf Number: 154291


Author: Edmonds, Ruth

Title: Resilience-based approaches for street-connected children exposed to sexual abuse & sexual exploitation

Summary: 'Building with Bamboo' led by Consortium for Street Children (CSC), is an international learning project exploring resilience-based approaches to working with street-connected children who are exposed to sexual abuse and sexual exploitation. The project was the second phase of the Oak Foundation's Bamboo Initiative and focused on piloting the findings from the first research phase. Three action learning projects were implemented successfully with three CSC network members working with street-connected children and child domestic workers in Ecuador, Uganda and Nepal. Objectives The second phase of the Building with Bamboo project explored resilience-based practice in terms of how organisations work and what forms a resilience-informed or resilience-based approach might usefully take. Learning questions included: - How can the findings about resilience be put into practice as approaches that promote or increase the resilience of children exposed to sexual abuse and sexual exploitation? - How are these approaches promoting or increasing the resilience of children exposed to sexual abuse and sexual exploitation? - How does promoting or increasing the resilience of children exposed to sexual abuse and sexual exploitation improve outcomes for them?

Details: Building with Bamboo; Consortium for Street Children, Oak Foundation, 2018. 76p.

Source: Internet Resource: Accessed February 13, 2019 at: https://riselearningnetwork.org/wp-content/uploads/2018/12/BwB_Final-Report_FINAL-Low-res.pdf

Year: 2018

Country: International

Keywords: Child Protection

Shelf Number: 154546


Author: Fielitz, Maik, ed.

Title: Post-Digital Cultures of the Far Right: Online Actions and Offline Consequences in Europe and the US

Summary: How have digital tools and networks transformed the far right's strategies and transnational prospects? This volume presents a unique critical survey of the online and offline tactics, symbols and platforms that are strategically remixed by contemporary far-right groups in Europe and the US. It features thirteen accessible essays by an international range of expert scholars, policy advisors and activists who offer informed answers to a number of urgent practical and theoretical questions: How and why has the internet emboldened extreme nationalisms? What counter-cultural approaches should civil societies develop in response?

Details: Bielefeld: Transcript Verlag, 2019. 210p.

Source: Internet Resource: Political Science | Volume 71: Accessed February 13, 2019 at: https://www.transcript-verlag.de/en/detail/index/sArticle/4371

Year: 2019

Country: International

Keywords: Extremism

Shelf Number: 154548


Author: Kettrey, Heather Hensman

Title: Effects of bystander programs on the prevention of sexual assault among adolescents and college students: a systematic review

Summary: Sexual assault among adolescents and college students Sexual assault is a significant problem among adolescents and college students in the United States and globally. Findings from the Campus Sexual Assault study estimated that 15.9% of college women had experienced attempted or completed sexual assault (i.e., unwanted sexual contact that could include sexual touching, oral sex, intercourse, anal sex, or penetration with a finger or object) prior to entering college and 19% had experienced attempted or completed sexual assault since entering college (Krebs, Lindquist, Warner, Fisher, & Martin, 2009). Similar rates have been reported in Australia (Australian Human Rights Commission, 2017), Chile (Lehrer, Lehrer, & Koss, 2013), China (Su, Hao, Huang, Xiao, & Tao, 2011), Finland (Bjorklund, Hakkanen-Nyholm, Huttunen, & Kunttu, 2010), Poland (Tomaszewska & Krahe, 2015), Rwanda (Van Decraen, Michielsen, Herbots, Rossem, & Temmerman, 2012), Spain (Vazquez, Torres, Otero, 2012) and in a global survey of countries in Africa, Asia, and the Americas (Pengpid & Peltzer, 2016). The bystander approach -- One promising strategy for preventing sexual assault among adolescents and young adults is the implementation of bystander programs, which encourage young people to intervene when witnessing incidents or warning signs of sexual assault. Bystander programs seek to sensitize young people to warning signs of sexual assault, create attitudinal changes that foster bystander responsibility for intervening (e.g., creating empathy for victims), and build requisite skills and knowledge of tactics for taking action (Banyard, 2011; Banyard, Plante, & Moynihan, 2004; Burn, 2009; McMahon & Banyard, 2012). Many of these programs are implemented with large groups of adolescents or college students in the format of a single training/education session (e.g., as part of college orientation). However, some programs use broader implementation strategies, such as advertising campaigns that post signs across college campuses to encourage students to act when witnessing signs of violence. By treating young people as potential allies in preventing sexual assault, bystander programs have the capacity to be less threatening than traditional sexual assault prevention programs, which tend to address young people as either potential perpetrators or victims of sexual violence (Burn, 2009; Messner, 2015; [Jackson] Katz, 1995). Instead of placing emphasis on how young people may modify their individual behavior to either respect the sexual boundaries of others or reduce their personal risk for being sexually assaulted, bystander programs aim to foster prerequisite knowledge and skills for intervening on behalf of potential victims. Thus, by treating young people as part of the solution to sexual assault, rather than part of the problem, bystander programs may limit the risk of defensiveness or backlash among participants (e.g., decreased empathy for victims, increased rape myth acceptance) (Banyard et al., 2004; Katz, 1995). Objectives The overall objective of this systematic review and meta-analysis was to examine what effects bystander programs have on preventing sexual assault among adolescents and college students. More specifically, this review addressed three objectives. 1. The first objective was to assess the overall effects (including adverse effects), and the variability of the effects, of bystander programs on adolescents' and college students' attitudes and behaviors regarding sexual assault. 2. The second objective was to explore the comparative effectiveness of bystander programs for different profiles of participants (e.g., mean age of the sample, education level of the sample, proportion of males/females in the sample, proportion of fraternity/sorority members in the sample, proportion of athletic team members in the sample). 3. The third objective was to explore the comparative effectiveness of different bystander programs in terms of gendered content and approach (e.g., conceptualizing sexual assault as a gendered or gender-neutral problem, mixed- or single-sex group implementation).

Details: Oslo: Campbell Collaboration, 2019. 159p.

Source: Internet Resource: Campbell Systematic Reviews 2019:1: Accessed February 13, 2019 at: https://campbellcollaboration.org/library/bystander-programs-sexual-assault-adolescents-college-students.html

Year: 2019

Country: International

Keywords: Bystander Interventions

Shelf Number: 154551


Author: Simmons, Beth

Title: Border Rules

Summary: International political borders have historically performed one overriding function: the delimitation of a state's territorial jurisdiction, but today they are sites of intense security scrutiny and law enforcement. Traditionally they were created to secure peace through territorial independence of political units. Today borders face new pressures from heightened human mobility, economic interdependence (legal and illicit), and perceived challenges from a host of non-state threats. Research has only begun to reveal what some of these changes mean for the governance of interstate borders. The problems surrounding international borders today go well-beyond traditional delineation and delimitation. These problems call for active forms of governance to manage human mobility and interdependence. However, human rights norms sometimes rest uneasily alongside unilateral border governance. A research agenda which documents and explains new border developments, and critically assesses emerging rules and practices in light of international human rights, is an essential direction for international studies research.

Details: Philadelphia: University of Pennsylvania, School of Law, 2019. 47p.

Source: Internet Resource: U of Penn Law School, Public Law Research Paper No. 19-07: Accessed February 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3322647

Year: 2019

Country: International

Keywords: Border Enforcement

Shelf Number: 154598


Author: Adrian, Tobias

Title: A Review of Shadow Banking

Summary: Traditional financial intermediaries are centralized entities brokering the flow of funds between households and borrowers. Households could certainly bypass intermediaries and directly invest in equity or debt of borrowers. However, direct finance requires dealing with well-known informational and liquidity frictions. In particular, it is usually costly to screen, select, monitor, and diversify across investment projects. Moreover, direct investments may be constrained by the need by households for liquidity: that is, the need to access funds before the investments comes to fruition, resulting in wasteful liquidation costs. Financial intermediaries exist to minimize on all of these costs. In the traditional model, intermediaries are centralized agents performing under one roof multiple roles of screening, selection, monitoring, and diversification of risk, while simultaneously providing liquidity services to the providers of funds. The simultaneous provision of these services to multiple agents through maturity, liquidity, and credit transformation provides for a better allocation of risk between households and firms. While financial intermediation facilitates more efficient risk sharing between borrowers and the suppliers of funds, it does create new risks, the most relevant one being the well-known exposure to "runs" and premature liquidation of projects when the suppliers of funds pull out en masse. Hence, financial intermediation activity is intrinsically fragile, and most importantly it carries a significant social externality, represented by the risk of systemic disruptions in the case of contagion of run events. The official sector has attempted to minimize this systemic risk through the use of its own balance sheet, by providing credit guarantees on the liabilities of these intermediaries as well as by providing contingent liquidity to these institutions from the lender of last resort. However, the risk-insensitive provision of credit guarantees and liquidity backstops creates well-known incentives for excessive risk-taking, leverage, and maturity transformation, motivating the need for enhanced supervision and prudential regulation. This traditional form of financial intermediation, with credit being intermediated through banks and insurance companies, but with the public sector standing close by to prevent destabilizing runs, dominated other forms of financial intermediation from the Great Depression well into the 1990s. Over time, financial innovation has transformed intermediation from a process involving a single financial institution to a process now broken down among several institutions, each with their own role in manufacturing the intermediation of credit. With specialization has come significant reductions in the cost of intermediation, but the motive to reduce costs has also pushed financial activity into the shadows in order to reduce or eliminate the cost associated with prudential supervision and regulation, investor disclosure, and taxes. Over the course of three decades, the shadow banking system quickly grew to become equal in size to that of the traditional system, improving on the terms of liquidity traditionally offered to households and borrowers. However, it was only a matter of time before intermediation designed to evade public sector oversight would end badly, as occurred during the post-2007-08 credit cycle. Consequently, while financial innovation is naturally associated with the more efficient provision of financial services, it is this dark side of non-traditional intermediation that has come to define shadow banking.

Details: London: Centre for Economic Policy Research, 2018. 38p.

Source: Internet Resource: Discussion Paper DP13363: Accessed February 15, 2019 at: https://cepr.org/active/publications/discussion_papers/dp.php?dpno=13363

Year: 2018

Country: International

Keywords: Banking

Shelf Number: 154613


Author: Bauer, Michal

Title: Anti-social Behavior in Groups

Summary: This paper provides strong evidence supporting the long-standing speculation that decision-making in groups has a dark side, by magnifying the prevalence of anti-social behavior towards outsiders. A large-scale experiment implemented in Slovakia and Uganda (N=2,309) reveals that deciding in a group with randomly assigned peers increases the prevalence of anti-social behavior that reduces everyone's but which improves the relative position of own group. The effects are driven by the influence of a group context on individual behavior, rather than by group deliberation. The observed patterns are strikingly similar on both continents

Details: London: Centre for Economic policy Research, 2018. 51p.

Source: Internet Resource: Discussion Paper DP13315: Accessed February 15, 2019 at: https://cepr.org/active/publications/discussion_papers/dp.php?dpno=13315

Year: 2018

Country: International

Keywords: Anti-Social Behavior

Shelf Number: 154616


Author: Cody, Claire

Title: Connecting the Dots: Supporting the Recovery and Reintegration of Children Affected by Sexual Exploitation

Summary: Over the last 25 years child sexual exploitation (CSE) has become a high priority issue for the international community. Multiple commitments, congresses and the introduction of conventions and protocols have attempted to prevent CSE, prosecute perpetrators and protect victims. Despite these efforts, the ever-changing landscape of exploitation and abuse persists and children continue struggling to access appropriate support and services in line with their rights. Through the Sustainable Development Goals (SDG), the international community again acknowledged the widespread nature of CSE and set the ambitious target to 'End abuse, exploitation, trafficking and all forms of violence against and torture of children' by 2030. Ending abuse and exploitation means not only preventing it in the first place, but ensuring that those affected can access confidential, high quality, consistent, long-term support so that they can overcome these experiences and are not revictimised in the future. A recent global evidence review focusing on preventing and responding to child sexual abuse and exploitation concluded that 'robust research and evaluation in this area is seriously lacking, particularly in LMICs [low and middle income countries]'. In high-income countries, there is a similar dearth of evidence-based interventions for children affected by CSE. This means that where recovery and reintegration programmes are designed, funded and implemented, they are not yet grounded on a sound evidence-base. The lack of evaluation studies also makes it difficult to understand how effective support is, for who, why and in what circumstances. While the research community attempts to address this gap, service providers need to know how best to respond and support children, families and communities currently affected by CSE. This report attempts to fill this gap, drawing on an initial review of the literature and findings from field research carried out in Nepal, Thailand and the Philippines with victims/survivors of CSE and their service providers.10 This report 'connects the dots' and pieces together existing evidence on priorities for children affected by CSE in their recovery and reintegration. The first chapter provides an overview of key definitions and overall context surrounding the recovery and reintegration processes. This chapter also gives a brief overview of the local contexts where the fieldwork, which this report draws on, took place. Chapter two outlines how the report was developed, explaining the methods used for the field research and the initial review of the literature. Chapter three highlights the key barriers that impact children's ability to access quality care and support. Chapter four identifies overarching approaches and key principles critical to working with children affected by CSE. Chapters five and six outline the process of case management and the key role of caregivers in supporting children’s recovery and reintegration. Chapters seven to twelve explore the different areas or domains of provision highlighted during the field research and which are echoed in the literature as being necessary or helpful for children during their recovery and reintegration. Chapter thirteen explores the key role of the family and community in supporting children's reintegration. In conclusion, chapter fourteen summarises the main findings of the report and provides a series of overarching recommendations.

Details: Bangkok, Thailand: ECPAT International, 2017. 128p.

Source: Internet Resource: Thematic Report: Accessed February 15, 2019 at: https://www.ecpat.org/wp-content/uploads/2017/06/Access-to-Justice-Thematic-Report-Connecting-the-dots.pdf

Year: 2017

Country: International

Keywords: Child Prostitution

Shelf Number: 154631


Author: Lipsey, Mark W.

Title: Rehabilitation Programs for Adult Offenders: A Meta-Analysis in Support of Guidelines for Effective Practice

Summary: Project Purpose-- - To conduct a comprehensive meta-analysis of the available research through 2014 on the effects of intervention programs for adult offenders, building on an existing database drawn from eligible studies reported through 2005. - To analyze the resulting meta-analytic data with a focus on estimating the impact of different interventions on recidivism and other outcomes, and identifying the program and participant characteristics most strongly associated with positive outcomes. - To use the meta-analysis findings to construct effective practice guidelines and obtain feedback on their applicability, utility, and ease of implementation from criminal justice practitioners in the adult correctional system. Project Design and Methods -- Eligibility criteria. Research studies were eligible for inclusion in this meta-analysis if they met specific criteria summarized in brief as follows: 1. The study involves a qualifying psychosocial intervention or treatment that has as its aim, implicitly or explicitly, the reduction of criminal behavior or other improvements in behavior, skills, mental health, social functioning, and the like. 2. At least 50% of the sample consists of criminal offenders and at least 60% of the sample consists of adults (age ≥ 18 years) or the mean age of the sample is > 18. 3. Outcomes for at least one participant group of at least 10 individuals receiving treatment are compared with those for at least one qualifying control condition (no treatment; treatment as usual, etc., but not persons dropping out or refusing treatment) of at least 10 individuals. 4. Participants are randomly assigned to treatment and control conditions, or matched on or compared on baseline variables that included at least one pretest criminal history/risk variable or two relevant personal / demographic characteristics. 5. At least one outcome variable is reported for recidivism or other outcomes indicative of successful intervention such as employment, mental health, substance use, etc. 6. The study was conducted during or after 1950 in the U.S. or another English-speaking, culturally similar country (e.g., Canada, UK, Australia, New Zealand).

Details: Nashville, TN: Peabody College of Education and Human Development, Vanderbilt University, 2018. 12p.

Source: Internet Resource: accessed February 18, 2019 at: https://www.ncjrs.gov/pdffiles1/nij/grants/252504.pdf

Year: 2018

Country: International

Keywords: Offender Rehabilitation

Shelf Number: 154635


Author: Global Financial Integrity

Title: Illicit Financial Flows to and from 148 Developing Countries: 2006-2015

Summary: This is the latest in a series of reports, issued on a roughly annual basis by Global Financial Integrity (GFI), which provides country-level estimates of the illicit flows of money into and out of 148 developing and emerging market nations as a result of their trade in goods with advanced economies, as classified by the International Monetary Fund. Such flows - hereafter referred to as illicit financial flows (IFFs)-are estimated over the years from 2006 to 2015, the most recent ten year period for which comprehensive data are available. In addition to updating the estimated IFFs GFI has presented in the past, this report widens the scope of its research and uses a more detailed database published by the United Nations (UN) along with updated measures from the International Monetary Fund (IMF) data it has used previously. This report presents estimates of IFFs based on both data sets. GFI defines IFFs as "money that is illegally earned, used or moved and which crosses an international border." Currently, the World Bank, IMF, UN, and the OECD use a similar definition. This study underscores the point that trade-related IFFs appear to be both significant and persistent features of developing country trade with advanced economies. As such, trade misinvoicing remains an obstacle to achieving sustainable and equitable growth in the developing world.

Details: Washington, DC: GFI, 2019. 56p.

Source: Internet Resource: Accessed February 18, 2019 at: https://www.gfintegrity.org/wp-content/uploads/2019/01/GFI-2019-IFF-Update-Report-1.29.18.pdf

Year: 2019

Country: International

Keywords: Corporate Corruption

Shelf Number: 154642


Author: Conway, Maura

Title: Violent Extremism and Terrorism Online in 2018: The Year in Review

Summary: This report treats developments in the violent extremist and terrorist online scene(s) in the 12-month period from 1 December 2017 to 30 November 2018.1 It is divided into three parts: Part I focuses on the online activities of violent jihadis, particularly the so-called 'Islamic State' (hereafter IS); Part II supplies information on contemporary extreme right online activity; and Part III identifies issues in the violent extremism and terrorism online realm that bear watching in 2019. In terms of overarching trends, the focus of policymakers, internet companies, media, and thus also publics has, since 2014, been almost exclusively on IS's online activity. A growing concern with extreme right activity, both its online and offline variants, began to be apparent in 2017 however, especially in the wake of events in Charlottesville. This solidified in 2018 due to a number of factors, including a decrease in IS terrorist attacks in the West and an uptick in extreme right and hate attacks and terrorist events, a number of the latter of which appeared to have significant online components. Having said this, IS is still active on the ground in numerous locales globally and continues to produce and widely disseminate online content, as do a large number of other groups that share core tenets of its ideology. IS may be down therefore, but it is certainly not out.

Details: Dublin: VOX-Pol Network of Excellence (NoE), 2019. 25p.

Source: Internet Resource: Accessed February 22, 2019 at: https://www.voxpol.eu/download/vox-pol_publication/Year-in-Review-2018.pdf

Year: 2019

Country: International

Keywords: Internet Crimes

Shelf Number: 154690


Author: Durner, Tracey

Title: Untangling a Marriage of Convenience: Anti-Money Laundering and Countering the Financing of Terrorism

Summary: Within the realm of policy discussions, anti-money laundering (AML) and countering the financing of terrorism (CFT) efforts are generally treated as a package deal. The Financial Action Task Force (FATF), the FATF Recommendations, and related guidance documents represent today's international AML and CFT standards and are mirrored in laws and initiatives around the world. Given the "obvious similarities and differences between money laundering and terrorism financing," FATF notes "the risks (of both) are often assessed and managed using the same information flows between public and private sector institutions." This convergence between the types of information and stakeholders relevant to money laundering and terrorism financing is, in part, behind the unification of AML and CFT efforts. From a policy-making standpoint, the combination makes sense. Financial intelligence units (FIUs) already analyze suspicious financial activity, including potential instances of money laundering, often triggered by reports from the private sector resulting from frontline compliance and transaction monitoring procedures. It seems logical to incorporate the deterrence, detection, and tracking of terrorism financing into existing AML frameworks. In practice, critics have argued this "marriage" places undue burden on the private sector to understand the intent of criminals behind the actual transactions.2 Others contend that the very premise of CFT policies are misguided, resulting in ineffective and even harmful outcomes. With the rise of the Islamic State of Iraq and the Levant (ISIL) and the preponderance of low-cost, lone-actor attacks in North America and Europe, international attention once again has focused on CFT as a central tenet in the fight against terrorism. In 2016, FATF issued a consolidated strategy on CFT, followed by the adoption of an operational plan in 2018. CFT-specific entities such as the Counter ISIL Financing Group have emerged, and the French government in 2018 convened a high-level international conference focused on combating the financing of ISIL and al-Qaida, with a second conference scheduled for Australia in mid-2019. This brief examines where and how AML frameworks are fit for purpose relative to CFT and considers where additional CFT-specific efforts are necessary. It begins with a brief summary of the evolution of money laundering and terrorism financing policies, discussing the unification of the two fields and the key differences between the motivations and typologies of money laundering and terrorism financing crimes. Against that backdrop, it explores the four objectives of CFT efforts (prevent, detect, freeze, and trace) to identify areas where existing unified AML/CFT frameworks are working and areas where more nuance is required to effectively combat threats specific to terrorism financing. Although particular attention is given to the United States and United Kingdom as international financial centers, similar approaches and convergences between AML and CFT policies and practices occur worldwide. The brief concludes with recommendations on how current CFT policy discourse and evolution can meaningfully support broader counterterrorism objectives.

Details: Washington, DC: Global Center on Cooperative Security, 2019. 14p.

Source: Internet Resource: Accessed February 22, 2019 at: https://www.globalcenter.org/wp-content/uploads/2019/01/GCCS-PB-Untangling-Marriage-Convenience-AML-CFT-2018.pdf

Year: 2019

Country: International

Keywords: Counter-Terrorism

Shelf Number: 154691


Author: Dean, Christopher

Title: Compendium of Good Practices in the Rehabilitation and Reintegration of Violent Extremist Offenders

Summary: The Compendium of Good Practices in the Rehabilitation and Reintegration of Violent Extremist Offenders presents good and promising practices in the rehabilitation and reintegration of violent extremist offenders (VEOs) in correctional settings, while also discussing how practices related to prison regime, security, intelligence, and risk assessment can impact these two processes. The compilation endeavors to (1) inform understanding and improve decision-making regarding the implementation of approaches for the rehabilitation and reintegration of VEOs, specifically in the correctional services of Australia, Canada, New Zealand, the United Kingdom, and the United States, although it has value in other jurisdictions; (2) integrate established with emerging promising practices in this field; (3) translate key existing documents into an applied and accessible resource for use by various stakeholders; and (4) include good and promising practices associated with women, juveniles, and foreign fighters convicted of terrorism offenses, and prison and probation services where issues associated with violent extremism may be less frequent. Good and promising practices for this compendium have been compiled from handbooks, reports, and papers that have previously addressed the issue of effectively rehabilitating and reintegrating VEOs in correctional settings, as well as from practical, on-the-ground experience.

Details: Washington, DC: Global Center on Cooperative Security, 2018. 69p.

Source: Internet Resource: Accessed February 22, 2019 at: https://www.globalcenter.org/publications/compendium-of-good-practices-in-the-rehabilitation-and-reintegration-of-violent-extremist-offenders/

Year: 2018

Country: International

Keywords: Counter-Radicalization

Shelf Number: 154692


Author: Miller, Carl

Title: Detecting Online Environmental Crime Markets

Summary: The internet is used to trade endangered species and commodities containing parts from endangered species, and more broadly hosts communities and subcultures where this trade is normalized, routine and unchallenged.This report presents a new technical process that has been trialled to identify online marketplaces and websites involved in the trade of a selection of CITES-listed animals and plants. The technology, known as the Dynamic Data Discovery Engine (or DDDE), was developed with the aim of building upon qualitative research to produce larger, more comprehensive datasets of similar activity taking place. The report contains a description of the process and the results that it produced, its strengths and weaknesses, and some thoughts on how it might be used by others hoping to reduce the extent to which the internet can be exploited by those wishing to transact endangered animals and plants.It is hoped that the process will contribute to the creation of a more comprehensive picture of online illicit wildlife trade (IWT) activity.

Details: Geneva, SWIT: Global Initiative Against Transnational Organized Crime, 2019. 28p.

Source: Internet Resource: Accessed February 22, 2019 at: https://globalinitiative.net/wp-content/uploads/2019/01/TGIATOC-DetectingOnlineMarkets-Web-1.pdf

Year: 2019

Country: International

Keywords: Endangered Species

Shelf Number: 154728


Author: Haysom, Simone

Title: In Search of Cyber-Enabled Disruption: Insights from the Digital Dangers project

Summary: The internet has made new and more effective avenues available for the marketing and selling of endangered animals and illicit wildlife products. There are several indications that cyberspace has become a major area of online criminality in this respect, expanding demand among consumers and frustrating traditional law-enforcement approaches. Despite the apparent opposition from major tech companies to their platforms being used in the illegal wildlife trade (IWT), the Digital Dangers studies and reports in the international media have revealed the trade to be present on all major social-media platforms and easy to detect on most e-commerce platforms. Additionally, the low political priority placed on combating wildlife crime means that many state responses are inadequate and law enforcement under-resourced. While this picture of rampant, almost unimpeded criminality and its serious consequences for wildlife may be bleak, there are important exceptions to state apathy. We have noted, in some instances, the creation of new cyber enforcement capacity and the establishment of government operations to this end. Drawing on the knowledge gleaned from a year spent testing ideas, refining methodologies and exploring the dynamics of different markets, we suggest here some possible entry points for disruption of the trade; these range from openings for tactical improvements to strategic approaches that could change the playing field for those looking to respond.

Details: Geneva: Global Initiative Against Transnational Organized Crime, 2019. 30p.

Source: Internet Resource: Accessed February 25, 2019 at: https://globalinitiative.net/wp-content/uploads/2019/02/TGIATOC-FinalSynthesis-Web.pdf

Year: 2019

Country: International

Keywords: Cybercrime

Shelf Number: 154738


Author: KnowTheChain

Title: Apparel and Footwear Benchmark Findings Report: 2018

Summary: Today, it is estimated that 60-75 million people are employed in the textile, clothing, and footwear sector around the world, more than two-thirds of whom are women. A US$3 trillion industry, the apparel and footwear sector is characterized by globally complex and opaque supply chains and competition for low prices and quick turnarounds. As precarious employment increases, vulnerable workers, including women and migrant workers, are hit the hardest. Workers in the sector are likely to become even more vulnerable as migration flows continue to grow rapidly. The apparel and footwear sector is increasingly reliant on migrant workers. As such, it is crucial that companies have the right policies and processes in place to address the dynamic nature of forced labor risks in their supply chains, including the risks to migrant workers. In this follow-up to its 2016 benchmark, KnowTheChain assessed 43 of the largest global apparel and footwear companies on their efforts, finding that: - The average score overall remains low, at 37 out of 100. Company scores range from 0/100 to 92/100; however, less than a third of the companies (15 out of 43) score over 50/100, and policies and practices are lacking on the theme of recruitment-the area with the most direct impact on workers' lives. - Adidas (92/100) remains the top-scoring company in the benchmark, while Lululemon (89/100) overtook Gap Inc. (75/100) to secure second place. Adidas and Lululemon achieve a significantly higher score than their peers due to their strong approaches to addressing risks associated with recruitment and migrant workers as well as risks in lower tiers of their supply chains. They are the only companies to disclose evidence that workers below the first tier of their supply chains have access to and have used their grievance mechanisms. - Those scoring below 15/100 include companies across subsectors and regions, including Asian retailers such as Zhejiang Semir Garment (0/100), the owner of China's largest specialty children's apparel brand, and Shimamura (0/100), the second-largest apparel retailer in Japan; US footwear companies such as Foot Locker (12/100) and Skechers (7/100); and European luxury brands such as LVMH (14/100) and Prada (5/100). - Despite disclosure of some leading practices, recruitment remains the lowest scoring theme, at 18/100. Only four companies provide evidence that they have reimbursed recruitment fees to workers in their supply chains (Adidas, Lululemon, Primark, and Ralph Lauren), and only seven companies provide evidence of how they support ethical recruitment in their supply chains. Eighteen out of the 43 companies in the benchmark received a score of zero for their lack of action on recruitment. Inaction on tackling recruitment practices that render migrant workers at risk of exploitation shows that companies are not paying adequate attention to one of the most vulnerable groups of workers in the sector. - On the other hand, the subset of 19 companies that were benchmarked in both 2016 and 2018 show significant improvements. The average score of companies benchmarked in both years increased from 49/100 to 56/100. While all of the 19 companies benchmarked in both years improved, notably, eight companies (Adidas, Hugo Boss, Kering, Lululemon, Nike, PVH, Ralph Lauren, and VF) increased their scores by more than 10 points.

Details: San Francisco: Author, 2018. 79p.

Source: Internet Resource: Accessed February 27, 2019 at: http://ktcdevlab2.wpengine.com/wp-content/uploads/KTC_AF_2018_.pdf

Year: 2018

Country: International

Keywords: Consumer Products

Shelf Number: 154771


Author: Vlahakis, Maria

Title: Breaking the Silence: Ending Online Violence and Abuse Against Women's Rights Activists

Summary: Over the last thirty years women’s rights organisations, activists and feminists have used information and communications technologies (ICTs), including the internet and social media, to access and share critical information on their rights, organise and mobilise for activism and engage in advocacy. However, despite their benefits and potential to support women's rights and movement-building globally, these new technologies have also created significant challenges for women's rights organisations and movements, including the emergence of new forms of violence and abuse against women online. These new forms of violence and abuse online are being used to subjugate and silence women, limiting their ability to meaningfully participate in public life and discourse and shrinking the space for civil society. This briefing aims to highlight women's rights activists' and feminists' experiences of online violence and abuse across a number of Womankind’s focus countries, particularly Zimbabwe, Nepal and Kenya. It looks at the psychological harm and distress it causes survivors, their coping mechanisms, including support from other feminists, and the effectiveness of responses from governments, law enforcement, and internet service providers and social media companies. It draws on new research resulting from a partnership between the School of Politics and International Studies (POLIS) at the University of Leeds in the UK and Womankind Worldwide (Womankind), alongside existing research by Womankind partners and others working in the field of human rights and violence against women and girls. The briefing ends with a series of policy recommendations for state and non-state actors.

Details: London, England: Womankind Worldwide, 2018. 22p.

Source: Internet Resource: Accessed March 1, 2019 at: https://feministinternet.org/en/resource/breaking-silence-ending-online-violence-against-womens-rights-activists

Year: 2018

Country: International

Keywords: Abuse

Shelf Number: 154762


Author: Girelli, Giada

Title: The Death Penalty for Drug Offences: Global Overview 2018

Summary: The death penalty for drug offences is a clear violation of international human rights law. Numerous international authorities and legal scholars have reaffirmed this point, including the UN Human Rights Committee as recently as 2018. Since Harm Reduction International began monitoring the use of this abhorrent practice in 2007, annual implementation of the death penalty for drug offences has fluctuated markedly. Over 4,000 people were executed globally for these offences between 2008 and 2018, with executions hitting a peak above 750 in 2015 (excluding China and Vietnam, where these figures are a state secret). Notably, 2018 figures show a significant downward trend, with known executions falling below 100 globally. While executions are falling, thousands of people remain on death row for drug offences. A number of these people are at the lowest levels of the drug trade, socio-economically vulnerable, are tried without due process and/or have inadequate legal representation. In short, it appears that the death penalty for drug offences is primarily reserved for the most marginalised in society. Other events in 2018 show that for every progressive step, there is a regressive counter-narrative. In Bangladesh and Sri Lanka, populist rhetoric against the 'threat' of the 'drugs menace' has seen leaders push for expansion or re- implementation of the death penalty, while governments in the Philippines and United States (among others) pointed to capital punishment as an essential tool to confront drug trafficking or public health emergencies. There is no evidence that the death penalty is an effective deterrent to the drug trade - in fact, according to available estimates, drug markets continue to thrive around the world, despite drug laws in almost every country being grounded in a punitive approach. In December 2018, a record 120 countries voted in favour of the Resolution on a moratorium on the use of the death penalty at the 73rd Session of the UN General Assembly, and since 2008 the number of abolitionist countries crept up from 92 to 106 in 2017. This is a positive trend, but when countered by inflammatory political rhetoric, progress is fragile at best. Governments must ground their drug laws in rights, dignity and evidence, and do away with the death penalty once and for all. The death penalty for drug offences in 2018: a snapshot -- Drug offences are punishable by death in at least 35 countries and territories worldwide. The total number of confirmed executions for drug offences (excluding China, including very limited data from Vietnam) between 2008 and 2018 is 4,366 (of which 3,975 were in Iran alone). Only four of these countries executed individuals for drug offences in 2018 (China, Iran, Singapore and Saudi Arabia). It is likely that Vietnam carried out drug-related executions, but because of state secrecy it is not possible to confirm this. At least 91 people were executed for drug offences in 2018 (excluding China and Vietnam). This represents a 68.5% decrease from 2017, a fall primarily driven by developments in Iran, where executions for drug offences fell 90% (from 221 in 2017 to 23 in 2018). Over 7,000 people are currently on death row for drug offences globally. At least 13 countries sentenced a minimum of 149 people to death for non-violent drug offences in 2018. A significant proportion of those sentenced are foreign nationals.

Details: London: Harm Reduction International, 2019. 48p.

Source: Internet Resource: Accessed March 5, 2019 at: https://www.hri.global/files/2019/02/22/HRI_DeathPenaltyReport_2019.pdf

Year: 2019

Country: International

Keywords: Capital Punishment

Shelf Number: 154810


Author: International Federation of Red Cross and Red Crescent Societies

Title: Alone and Unsafe: Children, migration, and sexual and gender-based violence

Summary: Protracted violent conflicts, devastating climate events, entrenched economic inequality, relentless persecution and crime, and other complex problems with no easy solutions drive millions of people every year to go in search of a safer and more dignified life. Among them are children, some with their families, but many without. These children face harrowing journeys and risk unspeakable suffering. The number of children on the move, including those traveling alone, has grown substantially and alarmingly in the past decade. In 2017, it was estimated that at least 300,000 unaccompanied and separated child migrants were in transit in 80 countries - a five-fold increase from five years earlier. The number of children migrating alone worldwide right now is likely much higher. In 2017, 60 per cent of the children who arrived in Greece, Italy, Spain and Bulgaria following dangerous and life-threatening journeys were unaccompanied or separated, nearly double the figure reported in 2016 - another staggering increase, providing a hint at the scale and scope of the problem. Children on the move are easy prey for abusers, exploiters and traffickers and their vulnerability puts them at high risk of sexual and gender-based violence at every stage of their migratory path. When children are in transit alone, they are at very high risk of being assaulted, sexually abused, raped, trafficked into sexual exploitation or forced into "survival sex". This study seeks to improve understanding of the risks and types of sexual and gender-based violence faced by children who migrate on their own, as well as the unfortunate and widespread gaps in protection and assistance for these children. It looks closely at the situation in dangerous or remote locations - places that are fragile, conflict-ridden, under-served and hard to reach, where children may be particularly vulnerable. The study also identifies actions that are urgently needed, by governments and humanitarian organizations, to better protect and assist children migrating on their own and reduce the risk of sexual and gender-based violence, as called for in the Global Compact on Safe, Orderly and Regular Migration. The study draws on interviews with specialists from a number of humanitarian agencies, an extensive literature review, and research missions to Afghanistan, Honduras, Niger and Turkey. Importantly it also draws heavily on the experience of Red Cross and Red Crescent volunteers and staff in Benin, Ecuador, Ethiopia, Guatemala, Indonesia and Zimbabwe.

Details: Geneva: The Authors, 2018. 28p.

Source: Internet Resource: Accessed March 5, 2019 at: https://media.ifrc.org/ifrc/wp-content/uploads/sites/5/2018/12/181126-AloneUnsafe-Report-EN-web.pdf

Year: 2018

Country: International

Keywords: Child Abuse

Shelf Number: 154815


Author: Eisner, Manuel

Title: What Causes Large-scale Variation in Homicide Rates?

Summary: Violence - i.e. the intentional infliction or threat of physical harm against another person - is a pervasive feature of human societies. There is no known human society where the equivalents of assault, rape, robbery, or murder do not occur. The omnipresence of violence amongst members of the human species has led some researchers to argue that violence has evolutionary roots in the development of humankind during the Pleistocene (2 Million years ago). According to this view violence was not always the dysfunctional 'disease' or abhorred crime as which it appears to be in contemporary societies. Rather, evolutionary psychologists argue, violence had a number of uses that increased the likelihood of survival of a person who is sometimes aggressive over somebody who is always peaceful (Buss & Shackelford, 1997; Eisner, 2009). But while violence seems to be a human universal, there also exists a lot of variation in the amount of violence in any society at a given moment of time. In some societies violent attacks by others account for up to 60% of all deaths, making violence a hugely important factor in one's chances to survive (Knauft et al., 1991; Robarchek & Robarchek, 1998). In other societies lethal interpersonal violence accounts for less than 0.05% of all deaths, meaning that it barely affects the overall life expectancy of a population. This suggests that the extent to which humans primarily display co-operative and caring or antagonistic and violent behaviour depends on social circumstances (Roth, 2011). This paper examines homicide, the best documented manifestation of violence. In particular, it examines whether any generalizable conclusions can be drawn from three research traditions that have tried to understand why societies differ in levels of homicide. The three research traditions examined here are a) criminological research on cross-national differences in homicide, b) comparative anthropological research on levels of lethal violence in non-state societies, and c) historical research on the factors that affect long-term variation in homicide rates over time. Many researchers believe that homicide is probably a good lead indicator of overall levels of interpersonal violence in a society. However, the extent to which this assumption is true is not clear, and one should bear in mind that different manifestations of violence may have different distributions across societies and over time. Thus, the large-scale variation in the frequency of rape, robbery, wife beating or infanticide may be partly correlated with the distribution of homicide, but each of these behaviours is probably also influenced by specific factors. The first section will examine the extent of variation in homicide across human societies. I then examine the extent to which some characteristics of 'homicide' differ between relatively peaceful societies and violent societies. This is important because we need to understand whether peaceful and violent societies simply have more or less of the same problems, or whether homicide in high-violence societies differs systematically from homicide in low homicide societies. In a third section I discuss empirical research in each research tradition on the factors that are systematically associated with variation in homicide levels, both over time and between societies. In a final section I examine some research gaps and strategies for future research.

Details: Cambridge, UK: University of Cambridge, Institute of Criminology, 2013. 23p.

Source: Internet Resource: Accessed March 8, 2019 at: https://www.researchgate.net/publication/285635222_What_causes_large-scale_variation_in_homicide_rates

Year: 2013

Country: International

Keywords: Crime Rates

Shelf Number: 154848


Author: Gisler, Charlotte

Title: Experiences with welfare, rehabilitation and reintegration of prisoners: Lessons learned?

Summary: This paper contributes to the debate on desirable correctional services systems by presenting four national case studies on the welfare, rehabilitation and reintegration of prisoners, and how each country regulates and institutionalizes these aspects of the penal system. The countries analysed are: Canada, known for its community involvement in release approach; Norway, known for its strong welfare system; Japan, known for its decreasing prison rate; and Malaysia, known for its efforts in the deradicalization and reintegration of prisoners with extremist ideologies. To create a comparable basis for analysis between the different countries, a comparative scale was developed based on the revised United Nations Standard Minimum Rules for the Treatment of Prisoners (the Nelson Mandela Rules). The scale allows the welfare, rehabilitation and reintegration dimensions of correctional services in each country to be classified in three categories (insufficient, sufficient and excelled). In addition to these three dimensions, the prison regime of each country was analysed to allow the national prison context to be considered in the country comparison. Some of the main findings and lessons of the paper are as follows. The only country classified as sufficient in terms of the Nelson Mandela Rules is Norway, which demonstrates promising practices (in terms of exceeding the standards) in the areas of health care, living conditions, visits, offender assessment, conditional release, parole and probation, aftercare and re-entry assistance, as well as family support. All the other countries have at least one insufficient dimension, implying breaches of the Nelson Mandela Rules. The most frequent breach affecting the prison regime is the inappropriate use of solitary confinement. This demonstrates that correctional services administrators in these countries still have difficulties in finding the right balance between the rights of inmates on the one hand, and the overall peace and order of the institution (or in a broader sense, of the society) on the other. The impact of an insufficient or sufficient prison regime on the implementation of welfare, rehabilitation and reintegration measures is considerable. Further, the analysis in this paper argues that promising practices are achieved in collaboration with external stakeholders, such as non-governmental organizations (NGOs), volunteers, families, national service providers, communities or external employers. This finding underscores the positive impact that inter-sectoral collaborations have on prisoner rehabilitation, as well as the need for equal provision of services for inmates and for the general population. Promising practices among the case study countries are not limited to Norway. Another example can be seen in Canada's levels of community involvement in the reintegration process. Canada displays a remarkably high percentage of conditional releases, facilitating the application of the "throughcare" approach (that is, the probation service takes responsibility for the support of the offender after release to ease the transition from prison to society) for the majority of prisoners. Regarding Japan, its cooperative employers' service achieves two important reintegration goals by supporting released prisoners to find employment and by integrating civil society into the reintegration strategy. Finally, and despite the Malaysian correctional service system being insufficient insofar as meeting the Nelson Mandela Rules, the country has an effective deradicalization programme for prisoners with extremist ideologies, which is designed to begin in prison and end with a reintegrated person in the community

Details: Geneva, SWIT: United Nations Research Institute for Social Development (UNRISD), 2018. 80p.

Source: Internet Resource: UNRISD Working Paper, No. 2018-5: Accessed march 8, 2019 at: http://www.unrisd.org/80256B3C005BCCF9/(httpAuxPages)/45121C97B9B92C7BC125827B00469BDA/$file/gisler-et-al.pdf

Year: 2018

Country: International

Keywords: Deradicalization

Shelf Number: 154883


Author: Levitt, Matthew

Title: Neither Remaining Nor Expanding: The Decline of the Islamic State

Summary: In step with the progression of the coalition war against the Islamic State over the course of 2016, the threat of IS-directed attacks in the West continued to trend upward, posing significant challenges for social media companies, law enforcement, intelligence agencies, and local communities alike. Edited by Matthew Levitt, this eighth volume in the Institute's Counterterrorism Lectures Series spans the period from February 2016 to November 2017, offering a snapshot of how officials, experts, and CT practitioners addressed some of the most pressing challenges at the height of the battle against IS and the beginning of its decline. This volume includes lectures by the following experts; the positions were current at the time of presentation: Ali Mohsen al-Alaq, governor, Central Bank of Iraq Shanna Batten, director, Community Resilience Initiatives Program, Center for Health and Homeland Security, University of Maryland; Rand Beers, deputy assistant to the president for Homeland Security, Obama administration; Monika Bickert, head of global policy management, Facebook; William Brannif, executive director, National Consortium for the Study of Terrorism and Responses to Terrorism; Lord Richard Dannatt, chief of the general staff, British Army; commander of British forces, Afghanistan; advisor to David Cameron; Olivier Decottignies, TWI diplomat in residence; second counselor, French Embassy, Iran Muhammad Fraser-Rahim, executive director, North America, Quilliam International; Bruce Hoffman, director, Center for Security Studies, Georgetown University; Boaz Ganor, dean and Ronald Lauder Chair for Counter-Terrorism, Lauder School of Government, Diplomacy and Strategy, IDC, Herzliya, Israel; Daniel L. Glaser, assistant secretary for terrorist financing, Office of Terrorism and Financial Intelligence, Treasury Department; Seamus Hughes, deputy director, Program on Extremism, George Washington University; James F. Jeffrey, Philip Solondz Distinguished Fellow, TWI; former ambassador to Iraq, Turkey, and Albania; Richard Kemp, senior associate fellow, Royal United Services Institute; commander, British forces, Afghanistan; head, international terrorism team, UK Joint Intelligence Committee; Gilles de Kerchove, counterterrorism coordinator, European Union; Naomi Kikoler, deputy director, Simon-Skjodt Center for the Prevention of Genocide, U.S. Holocaust Memorial Museum Matthew Levitt, Fromer-Wexler fellow and director, Stein Program on Counterterrorism and Intelligence (now the Reinhard Program on Counterterrorism and Intelligence), TWI; Marlene Mazel, TWI adjunct scholar; director, Counter-Terrorism Litigation Division, Israeli Ministry of Justice; Klaus Naumann, former chief of staff, German Bundeswehr; chairman, NATO Military Committee Farah Pandith, adjunct senior fellow, Council on Foreign Relations; senior fellow, Belfer Center for Science and International Affairs, Harvard University; Samantha Ravich, deputy national security advisor for Vice President Cheney; Eric Rosand, director, The Prevention Project: Organizing Against Violent Extremism, Global Center on Cooperative Security; Dick Schoof, national coordinator for security and counterterrorism, Netherlands; Michael Steinbach, executive assistant director, National Security Branch, FBI.

Details: Washington, DC: The Washington Institute for Near East Policy, 2018. 104p

Source: Internet Resource: Counterterrorism Lectures 2016-17: Accessed March 12, 2019 at: https://www.washingtoninstitute.org/uploads/Documents/pubs/PolicyFocus155-CT8-7.pdf

Year: 2018

Country: International

Keywords: Counter-Terrorism

Shelf Number: 154930


Author: World Health Organization

Title: Community management of opioid overdose

Summary: An estimated 69 000 people die each year from opioid overdose. Opioid overdose is easily reversed with the opioid antidote naloxone and with basic life support. Such care is generally only available in medical settings, however. These guidelines recommend that people who are likely to witness an opioid overdose, including people who use opioids, and their family and friends should be given access to naloxone and training in its use so that they can respond to opioid overdose in an emergency if a medical response is not available. Naloxone can be injected or administered intra-nasally and has minimal effects in people who have not used opioids. While naloxone administered by bystanders is a potentially life-saving emergency interim response to opioid overdose, it should not be seen as a replacement for comprehensive medical care.

Details: Geneva, SWIT: WHO, 2015. 88p.

Source: Internet Resource: Accessed March 12, 2019 at: https://apps.who.int/iris/bitstream/handle/10665/137462/9789241548816_eng.pdf;jsessionid=652CFCA99830F19EBC23119265151ACF?sequence=1

Year: 2014

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 154931


Author: Harm Reduction Coalition

Title: Alternatives to Public Injecting

Summary: Harm Reduction Coalition convened a consultation in 2015 with international law enforcement and public health experts to understand the local dynamics shaping the establishment and implementation of supervised injection facilities in Frankfurt, Germany; Sydney, Australia; and Vancouver, Canada. The attendees identified a number of key lessons relevant to American policymakers: People who use SIFs take better care of themselves, reduce or eliminate their needle sharing, use their drugs more safely, and ultimately reduce their drug use; SIF participants gain access to other medical and social services and entry into drug treatment; There has not been a single overdose death in any of these programs over many years of operation and many thousands supervised of injections; SIFs do not increase drug use in the area, nor do they encourage young people to initiate drug use; Crime and public nuisance decrease in the areas around these programs.

Details: New York: The Coalition, 2016. 20p.

Source: Internet Resource: Accessed March 13, 2019 at: https://harmreduction.org/wp-content/uploads/2016/05/Alternatives-to-Public-Injection-report.pdf

Year: 2016

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 154936


Author: United Nations Office on Drugs and Crime. Independent Evaluation Unit

Title: Final Independent Project Evaluation of the project "Integrating crime, corruption, drugs and terrorism related issues into the preparation of national plans and processes”"

Summary: Issues under the mandate of the United Nations Office on Drugs and Crime (UNODC), namely crime corruption, drugs and terrorism, are being recognized by the international community as major obstacles and threats to development, human security and good governance. These are inherently linked with the achievement of the Millennium Development Goals (MDGs) whilst the United Nations (UN) Millennium Declaration makes direct reference to areas that need to be strengthened which fall under the mandate of UNODC. The issues of crime and security have also reached high levels in various international forums. More specifically, the Twelfth United Nations Congress on Crime Prevention and Criminal Justice, held in Salvador, Brazil, in April 2010 focused strongly on emphasizing the criminal justice system as a central pillar in the rule-of-law architecture and highlighting the pivotal role of criminal justice systems in development. Furthermore, there is currently an increased recognition that inclusive, safe, and resilient cities and societies are an important factor in sustainable development as reflected in the 2030 Sustainable Development Agenda, adopted by the UN in 2015. The Sustainable Development Goals (SDGs) aim to "Make cities and human settlements inclusive, safe, resilient and sustainable" (SDG 11) and to "Promote peaceful and inclusive societies for sustainable development, providing access to justice for all and build effective, accountable and inclusive institutions at all levels" (SDG 16). The project "Integrating crime, corruption, drugs and terrorism-related issues into the preparation of national plans and processes" was implemented by the Strategic Planning and Interagency Affairs Unit (SPIA), Division for Policy Affairs and Public Affairs (DPA), UNODC. The project was funded by the UN Development Account (1213V) with a total approved budget of US$ 650,000. The project implementation commenced, following a delay, in August 2014, and proceeded for two years, including a no-cost extension until June 2016. The project's initial objective was to ensure that the issues of crime, corruption, drugs, and terrorism were integrated into the preparation of national development plans and processes in selected countries. The project's concept approach was however changed to focus on the development of a Guide on the Framework to Guide Urban Policy-Makers and Practitioners for Governing Safer Cities. The intention of the Guide was to catalyse a policy debate and serve as a practical tool for UN system and those jurisdictions seeking to develop strategic responses to the challenges of crime, corruption or terrorism at the city level. The Core Learning Partners (CLPs), i.e. the main stakeholders, as identified by the project manager, were involved throughout the evaluation process, i.e. in reviewing and commenting on the TOR and the evaluation questions, reviewing and commenting on the draft evaluation report, as well as facilitating the dissemination and application of the results and other follow-up action. The stakeholders have further been involved through the interviews and discussions held about the project's outcome. Purpose and methodology of the evaluation The final Independent Project Evaluation was conducted by an external independent evaluator from December 2016 until January 2017. The purpose of the evaluation was to draw lessons from the project implementation to form the basis for instituting improvements to the existing and future project planning, design, and management. The project was evaluated following the OECD-DAC criteria: relevance, efficiency, effectiveness, impact and sustainability, as well as assessing design, established partnerships and cooperation, with a focus on human rights and gender. Prior to the evaluation, the draft ToR was shared with the evaluator. During the evaluation process, the external independent evaluator utilised an analysis of primary data (project documents) and secondary sources (interviews with the stakeholders and web-research of the evaluated subject.). Based on the evaluator's desk review and interviews of the project staff and other stakeholders involved in the project implementation, as well as using questionnaires, the information obtained was cross-checked, verified and tested in order to obtain an objective, unbiased, and reliable assessment of the project achievements. It was decided not to develop and apply a survey for the project's stakeholders as part of the evaluation methodology since the main project output, i.e. the Guide, has not been used yet by the stakeholders.

Details: Vienna: UNODC, 2017. 59p.

Source: Internet Resource: Accessed march 13, 2019 at: https://www.unodc.org/documents/evaluation/Independent_Project_Evaluations/2017/UNODC_UNDA_1213V_Final_Independent_Project_Evaluation_Report_March_2017.pdf

Year: 2017

Country: International

Keywords: Corruption

Shelf Number: 154942


Author: Broadhurst, Roderic

Title: Malware Trends on 'Darknet' Crypto-Markets: Research Review

Summary: This is an overview of current trends in online illicit crypto-markets or dark-nets, including the key role of virtual crypto-currencies in their operation. The focus is on the different kinds of digital products that are found in these on-line 'dark markets'. Primary data was collected from relevant websites accessed via The Onion Router (Tor). Tor allows anonymous encrypted communication between web-sites, and data capture over several months from one of the largest crypto-markets currently active - Dream Market enabled a description of short-term trends in the different malware products and their costs as available in underground or 'dark-net' crypto-markets.

Details: Canberra: Australian National University, Cybercrime Observatory, 2018. 99p.

Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3226758

Year: 2018

Country: International

Keywords: Cybercrime

Shelf Number: 154956


Author: Maxim, Donald

Title: Online Child Exploitation Material - Trends and Emerging Issues: Research Report of the Australian National University Cybercrime Observatory with the input of the Office of the Children's eSafety Commissioner

Summary: This report by the ANU Cybercrime Observatory provides an overview of three important areas for Child Exploitation Material (CEM): - The relationship between online and offline offending; - Horizon scanning - identifying emerging areas of CEM development; and - Current regulatory, educational and collaborative approaches to combatting CEM Each section provides an overview of the issue and further analysis of other key areas identified during the research phase. At the conclusion of each section, a brief annotated bibliography is available to provide insight into which sources may be useful for further investigation. Information for this report was derived from many and varied sources including but not limited to government agencies (national and international), non-governmental organisations, academic articles, law enforcement agencies, blogs, tech websites, product sites, online news articles and surveys. While investigating each area, the research team worked within the scope of online CEM and aimed to provide a substantial overview for each section by addressing some of the key points or emerging trends. However during the research phase several areas that were not initially considered for the report were later identified as key areas of development for online CEM (e.g. Virtual Reality and Applications). Accordingly these topics were also included in the report. The relationship between online and offline sexual offending is highly controversial and complex. It is clear that research is lacking in this area and current research presents insufficient evidence for establishing a causal relationship between online and offline offending. Apart from addressing some of the methodological limitations of research in this area, this section of the report also addresses how the internet or technological advances (e.g. Virtual Reality) may assist in the desistance of offending or exacerbate motivations to commit real life offenses. The second section presents several emerging issues in online CEM and aims to provide a brief but comprehensive insight into how these areas are developing. The various topics include live streaming, applications, online gaming, user-generated content, Darknet, hacking, phishing, emerging technology and Virtual Reality (VR). Some of these concepts are quite traditional (e.g. user-generated content) however it is the development of 'cyber' and 'technology', which frames them as emerging issues. Other topics (e.g. live streaming or VR) present new, unique challenges to combatting online CEM. Some topics include snapshots of current cases such as the Pokemon Go trend, the Australian schools online pornography website, and interactive VR brothels and their implications for CEM. The final section discusses trends and effectiveness of current regulatory, educational, and collaborative approaches to CEM. Regulatory methods include ISP and social media regulation, parental control tools, and the potential for app regulation is also briefly mentioned. Key educational approaches include online safety guides and training courses. Collaborative prevention measures include hotlines, the National Centre for Missing and Exploited Children (NCMEC), Child Rescue Coalition, and the Virtual Global Taskforce (VGT). While these CEM prevention methods have made notable differences in detection and removal of CEM the effectiveness of education of the public, generation of reports, self-reporting, and tracking of child predators remains empirically untested. Technology is continually evolving and it is difficult to predict or evaluate emerging issues. The research team found it challenging to identify substantial information that can be verified by current research. This was particularly the case when analysing cutting edge or new technology as well as evaluating the effectiveness of current prevention approaches. This report aims to provide a reference point for further analysis and research on the topics addressed. Challenges associated with the cyber sphere and the 'Internet of Everything' do not remain static. The degree of facilitation (e.g. Virtual Private Networks, digital currency) and convergence associated with online CEM are continuously evolving in step with changes in technology. The rapid rate of change is the key challenge for the development of effective prevention strategies. This was demonstrated while our research was underway. Innovation, usually an adaptation of existing software or technology that was not initially present was later identified as a key developing area in online CEM (e.g. Virtual Reality and software applications). The Pokemon Go craze, which quickly attracted malware and grooming is a good example of the misuse of a popular apps. The velocity and variety of new and emerging risks with potential impact on online CEM will require, as a priority, the means to monitor these developments. The increase and rapid distribution of user-generated content is especially concerning. One aspect, consensually shared or 'stolen' sexualized images has given rise to 'sextortion', which can be propagated with the development of 'apps' that can inadvertently enhance and facilitate online CEM. Equally concerning are the implications of Virtual Reality (VR). VR in combination with teledildonics (or 'cyberdildonics' products designed to realise remote sex) enables potential offenders to live out any of their sexual fantasies. The VR trend may motivate offenders to seek on-line or off-line victims. The effects of VR on the conduct of pedophiles remain unclear. We don't know whether VR will placate desires or erode social inhibitions. However, VR is likely to encourage some criminals to enhance their experience by incorporating live streaming of child sex abuse with the tactile experiences promised by such technologies. The prevention of online CEM depends entirely on knowing present and emerging risks. Effective counter-measures include deep web surveillance of CEM innovators, and the development of early warning systems, for example, SNS 'swarm' warning flags.

Details: Canberra: Australian National University, Cybercrime Observatory, 2016. 105p.

Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2861644

Year: 2016

Country: International

Keywords: Child Grooming

Shelf Number: 154957


Author: Broadhurst, Roderic

Title: Cybercrime: Thieves, Swindlers, Bandits and Privateers in Cyberspace

Summary: This chapter describes the definitions and scope of cybercrime including an outline of the history of hackers and the role of criminal networks and markets in the dissemination of malicious software. Cybercrime types and methods are described, including the widespread use of deception in computer misuse and identity theft. The challenges facing law enforcement and the important role of private and public partnerships, as well as cross-national co-operation in the suppression of cybercrime are illustrated.

Details: Canberra: Australian National University, Cybercrime Observatory, 2017. 30p,

Source: Internet Resource: Accessed March 14, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3009574

Year: 2017

Country: International

Keywords: Computer Crime

Shelf Number: 154959


Author: Garofalo, Jontue J.G.

Title: The Globalization of the Private Prison Industry and its Effects on Mentally Ill Inmates. An Examination and Analysis of the Treatment of Mentally Ill Prisoners Housed in Private Prisons in the United States, Australia, Scotland, England, New Zealand and

Summary: The purpose of this paper is to examine the globalization of the private prison industry and its effects on mentally ill inmates. This paper will discuss what globalization means, the international privatization of the private prison industry, mental health policies and the care of mentally inmates in these private prisons, as well as what can be done to improve to improve the treatment of mentally ill inmates in private prisons throughout the world. Introduction Several industries have fallen prey to globalization and the private prison industry is not immune from this global business model. The treatment of mentally ill individuals in prisons is critical, especially because these individuals are vulnerable and often abused while incarcerated. Left untreated, their psychiatric conditions often grow worse, and they leave prison sicker than when they entered. As a society, we owe it to those who suffer from mentally illness in the most dire of conditions (prison cells), to restructure the current system and find a solution to the revolving doors of the system.

Details: Phoenix: Arizona Summit Law School, 2016. 35p.

Source: Internet Resource: Accessed March 18, 2019 at: https://www.azsummitlaw.edu/sites/default/files/tjasls_files/GAROFALO%20THE%20GLOBALIZATION%20OF%20THE%20PRIVATE%20PRISON%20INDUSTRY%20AND%20ITS%20EFFECTS%20ON%20MENTALLY%20ILL%20INMATE.pdf

Year: 2016

Country: International

Keywords: Correctional Health Care

Shelf Number: 155014


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Synthetic Drugs Assessment: Amphetamine-type stimulants and new psychoactive substances

Summary: This report provides an analysis of the global synthetic drugs market in two parts. The first part consists of regional overviews that highlight context-specific dynamics relating to the demand and supply of Amphetamine-Type Stimulants (ATS) and New Psychoactive Substances (NPS) in Africa, Central and Southwest Asia, East and South-East Asia and Oceania, Europe, the Near and Middle East, North and Central America, and South Central America. The second part of this report presents a global thematic analysis of the key trends and emerging developments of the synthetic drugs market.

Details: Vienna: UNODC, 2017. 81p.

Source: Internet Resource: Accessed March 18, 2019 at: https://www.unodc.org/unodc/en/scientists/global-synthetic-drugs-assessment-2017.html

Year: 2017

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 155027


Author: International Centre for Missing & Exploited Children

Title: Child Pornography: Model Legislation & Global Review. 9th ed.

Summary: As global accessibility to technology platforms and the Internet has increased, so too has children's online presence. According to UNICEF, one in three Internet users worldwide is a child. And while the digital world offers countless benefits and opportunities, it also vastly multiplies the risks to children. As ICMEC enters its 20th year, we still believe that protecting children is a global imperative. We recognize the continued need for ever stronger laws, policies, and mechanisms; increased coordination across sectors; and the value of sharing ideas, perspectives, and best practices to positively influence child protection responses. We also celebrate the progress of recent years as organizations and institutions around the world have come together in collaborative initiatives such as the WePROTECT Global Alliance, utilizing tools like the Model National Response and the World Health Organization's INSPIRE Strategies to fulfill the UN Sustainable Development Goals and enhance support for children on all fronts. We are particularly excited that adoption of our Model Legislation has been included as a key recommendation of the recent Child Dignity Alliance Technology Working Group Report. Twelve years ago, in an effort to better understand the global legislative landscape as it related to child sexual abuse material (then referred to as "child pornography"), ICMEC launched an initiative that some have called our "Rule of Law" project. We developed model legislation, after careful consideration and consultation, to increase global understanding and concern, and enable governments around the world to adopt and enact appropriate legislation necessary to combat this crime and better protect children. Since we first published the Model Legislation report in 2006, 150 countries have refined or implemented new legislation combating child sexual abuse material. We have seen tremendous progress during the 9th Edition review period, nearly the most we have seen to date. This does not, however, mean that there is nothing left to do - rather, this is the time to be diligent, to persist and push forward to help bring the remaining countries into the fold. As always, it is important to note that the legislative review accompanying our model legislation is not a scorecard or a scold, but an effort to assess the current state and awareness of the problem. Realizing the importance of taking into consideration varying cultural, religious, socio-economic, and political norms, our model legislation continues to resemble a menu of concepts that can be applied universally, as opposed to actual statutory language. With this latest edition, we continue our efforts to improve the legislative landscape and strengthen child protection efforts by introducing new and updated sections in the model law, incorporating additional international and regional legal instruments, and featuring new initiatives related to implementation.

Details: Alexandria, VA: The Centre, 2018. 68p.

Source: Internet Resource: Accessed march 18, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/CSAM-Model-Law-9th-Ed-FINAL-12-3-18.pdf

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 155029


Author: Ernst & Young

Title: Corporate Misconduct - individual consequences

Summary: Global commitments to combating corruption and enhanced cooperation by international law enforcement agencies have increased the pressure on companies to mitigate fraud, bribery and corruption risks. While many businesses have made significant progress in tackling these issues, there remains a persistent level of unethical conduct. Boards need to be aware that regulators are enforcing anti-corruption legislation with vigor, and are increasingly focused on individual misconduct. Boards must respond and confirm that they are doing enough to protect their business from these risks – or both board members and their employees may be held personally responsible for misconduct under their watch. Combating corruption as a global priority There is an unprecedented level of support for combating bribery and corruption, from both governments and multilateral institutions. Such cooperation has led to enhanced collaboration among law enforcement agencies in 2016, with numerous high-profile prosecutions in the past year. There have also been concerted efforts to apply international standards on transparency of company ownership, including by the World Bank and by the Group of 20 (G20) member countries, as part its wider focus on corruption under the Chinese presidency in 2016.....

Details: London: The Author, 2016. 48p.

Source: Internet Resource: 14th Global Fraud Survey: Accessed march 18, 2019 at: https://www.ey.com/Publication/vwLUAssets/EY-corporate-misconduct-individual-consequences/$FILE/EY-corporate-misconduct-individual-consequences.pdf

Year: 2016

Country: International

Keywords: Bribery

Shelf Number: 155031


Author: Behner, Peter

Title: Fighting counterfeit pharmaceuticals: New defenses for an underestimated - and growing - menace

Summary: With sales ranging from L150 billion to L200 billion (US$163 billion to $217 billion) per year, according to industry estimates, counterfeit pharmaceuticals are the most lucrative sector of the global trade in illegally copied goods. Fraudulent drugs harm or kill millions around the world and inflict serious damage on the brand names and bottom lines of major pharmaceutical manufacturers. Although less developed markets have long been their stronghold, pharma counterfeiters are now using digital channels to penetrate developed countries, where traditional physical drug distribution networks are well protected. Companies have plowed billions of euros into defensive measures, but their efforts haven’t slowed counterfeiters. Common anti-counterfeiting tactics block about half of the fake drugs, at most. New regulatory initiatives, meanwhile, leave large gaps for criminals to exploit. Yet a new survey by Strategy&, PwC's strategy consulting business, finds that pharmaceutical executives generally aren't inclined to spend more to fight fakes, despite their awareness that current measures don’t go far enough. Not only do these executives misjudge their own vulnerability, but they also overlook the opportunities awaiting those that capitalize on rapidly evolving anti-counterfeiting technologies that do more than improve on existing supply chain safeguards. Companies that adopt these technologies will reap a range of new benefits, and gain an edge over rivals relying on yesterday's solutions.

Details: Strategy and PWC, 2017. 24p.

Source: Internet Resource: Accessed March 18, 2019 at: https://www.strategyand.pwc.com/media/file/Fighting-counterfeit-pharmaceuticals.pdf

Year: 2017

Country: International

Keywords: Consumer Protection

Shelf Number: 155037


Author: McAfee

Title: Blockchain Threat Report. Blockchain, a Revolutionary Basis for Decentralized Online Transactions, Carries Security Risks

Summary: In late 2017 the cryptocurrency Bitcoin hit the headlines in a big way. Its value skyrocketed to almost US$20,000 per coin, waking up major news organizations and catching the eyes of would-be investors. Bitcoin, the leading cryptocurrency, is based on blockchain, a revolutionary new technology. Blockchain, which records transactions in a decentralized way, has begun to change the way we look at money and offers a path to solve old business problems in new ways. However, with new technologies come new security concerns. Bad actors have already targeted many blockchain implementations using social engineering, malware, and exploits. As additional groups begin using blockchain and building tools around it, they must understand the security risks. In this report we will look at current security problems and specific incidents within blockchain implementations. We will cover bad actors' techniques, targets, and malware used for attacks. In 2009, the first implementation of a blockchain, Bitcoin, raised excitement among technologists and researchers. It appeared to be a feasible solution to an age-old problem: how to ensure agreement among peers. Blockchain accomplished this by means of rigorous research resulting in a decentralized payment system in which peers could agree and trust a ledger, which represents the current state of the network. This agreement enabled previously untrustable decentralized payment systems and promises much more.

Details: McAfee, 2018. 27p.

Source: Internet Resource: Accessed March 18, 2019 at: https://www.mcafee.com/enterprise/en-us/assets/reports/rp-blockchain-security-risks.pdf

Year: 2018

Country: International

Keywords: Bitcoin

Shelf Number: 155038


Author: O'Driscoll, Dylan

Title: Data on Child Trafficking

Summary: Question How do OECD countries collect data on children trafficked into their own countries for the worst forms of child labour, and what data is publicly available? Summary This rapid review synthesises findings from rigorous academic, practitioner, and policy references published in the past fifteen years that discuss child trafficking and human trafficking more generally. The focus is on the most predominant data produced by OECD countries, reports produced by international organisations that collect data from OECD countries, as well as available literature on the methods utilised by OECD countries to collect data. Key Findings - There are a number of methodological issues with collecting data on trafficking, making it difficult to accurately estimate the scale of the problem. - There is a lack of data available that differentiates between child and human trafficking with most reports devoting little space to child trafficking and often not differentiating between the two on key aspects such as routes, prosecutions, etc.. - Issues such as death in transit and the cost of trafficking children are almost completely ignored in the published data. - There are two approaches to collecting data: victim-centred and trafficker-centred, which should be combined to give a thorough overview of the issue. However, there are significant shortcomings in how this data is collected, managed, analysed, and disaggregated. - In the EU, data is predominantly collected by the police and the multi-agency data repository suggested by the EU is not always in place. - Trafficking does not necessarily mean crossing borders: children are often trafficked within their own country. For instance, in Germany 45 percent of minor victims of trafficking for sexual exploitation reported were German nationals. - According to UNODC, 20 percent of victims of trafficking reported are girls, whilst eight percent are boys. Africa and the Middle East have the highest proportion of child trafficking with 62 percent of the victims reported as children (UNODC, 2014). - The ILO estimates that as many as 1,225,000 children are in a forced labour situation as a result of trafficking. - In the EU most victims of trafficking reported are Bulgarian, Romanian and Latvian, with Nigerians being the highest non-EU citizens reported. However, the information is not further disaggregated by the age of these citizens and the only data available is that 15 percent of cases recorded within the EU between 2010 and 2012 were of minors.

Details: Brighton, U.K.: Institute of Development Studies, 2017. 14p.

Source: Internet Resource: Accessed March 21, 2019 at: https://gsdrc.org/publications/data-on-child-trafficking/

Year: 2017

Country: International

Keywords: Child Exploitation and Abuse

Shelf Number: 155131


Author: Laws, Ed

Title: The Political Economy of the Illegal Wildlife Trade

Summary: Question What is the available political economy analysis of the illegal wildlife trade and the criminal networks involved? Summary This review is based on a rapid assessment of academic, donor and grey literature. A large part of recent scholarship in this area has been produced by international non-governmental organisations (INGOs), or else can be found in peer-reviewed academic journals. Authors do not appear to have engaged with the gender implications of IWT in the context of PEA. Most recent literature on IWT acknowledges the importance of political economy issues such as the prevalence of governance failings in source countries. There is also a common recognition in much of the literature that political, economic, cultural and social factors drive both demand and supply sides of IWT, and that any effort to address the trade needs to be cognisant of these drivers. However, it is very rare to find PEA tools or methods being used to analyse the drivers of the trade or to shape policy recommendations or interventions. Despite consensus in the literature that IWT involves complex networks between transnational crime syndicates, poachers, armed non-state actors, traders and consumers, this review found little evidence of attempts to map the links between these actors or to look in detail at their operating practices. This may be a consequence of the fact that the trade is clandestine and therefore empirical evidence is limited.

Details: Brighton, U.K.: Institute of Development Studies, 2017. 11p.

Source: Internet Resource: Accessed March 21, 2019 at: https://gsdrc.org/publications/the-political-economy-of-the-illegal-wildlife-trade/

Year: 2017

Country: International

Keywords: Criminal Networks

Shelf Number: 155134


Author: Avis, William Robert

Title: Digital Tools and Behaviour Change in Relation to Violence Against Women

Summary: Question What are the most effective tools developed for digital platforms (social media, mobile phone apps and websites) that have been successful in changing behaviour in relation to violence against women? Contents 1. Overview 2. Violence Against Women and Girls (VAWG) 3. Digital platforms, behaviour change and VAWG 4. Case Studies 5. References 6. Annex 1

Details: Brighton, U.K.: GSDRC, University of Birmingham, 2017.

Source: Internet Resource: Accessed March 21, 2019 at: http://www.gsdrc.org/wp-content/uploads/2017/09/GSDRC-HDR-Digital-Tools-and-Behaviour-Change1.pdf

Year: 2017

Country: International

Keywords: Abuse

Shelf Number: 155135


Author: O'Driscoll, Dylan

Title: Overview of Child Labour in the Artisanal and Small-Scale Mining Sector in Asia and Africa

Summary: Abstract This helpdesk report addreses these questions: What data is available regarding the numbers of children involved? What are the supply chains? What data is available regarding the type of child labour involved in mining? What are the positive and negative implications of child labour? This rapid review synthesises data from academic, policy, and non governmental organisation sources on child labour in the artisanal and small-scale mining (ASM) sector in Asia and Africa. ASM refers to small groups engaged in low-cost, low-tech, labour-intensive excavation and processing of minerals. Therefore, a clear distinction can be made between industrial and large-scale (usually licensed) mining on the one hand, and artisanal and small-scale (often unlicensed) mining on the other. Small-scale mining also includes all lower segments of mining (both non-mechanised and mechanised) that are not conventional industrial mining operations. Children engage in a range of tasks in ASM, however not all of them are considered dangerous and often mirror the tasks they would undertake in agriculture. This is where there is a debate between agencies such as International Labour Organization (ILO) and the UN, who consider all forms of child labour in mining the worst form, and academics, who argue the case is more complex. Moreover, ILO and the UN argue that child labour in mining prevents children from going to school, when many academics argue it often enables them to afford school. Academics tend to examine the cultural and societal elements of children working more generally within the context, whereas these larger agencies use a broader Western concept of childhood when examining child labour in mining, which can have implications for policy. K4D helpdesk reports provide summaries of current research, evidence and lessons learned. This report was commissioned by the UK Department for International Development.

Details: Brighton, U.K.: Institute of Development Studies, 2017. 23p.

Source: Internet Resource: Accessed March 21, 2019 at: https://assets.publishing.service.gov.uk/media/5a5f34feed915d7dfb57d02f/209-213-Child-labour-in-mining.pdf

Year: 2017

Country: International

Keywords: Africa

Shelf Number: 155136


Author: Idris, Iffat

Title: Interventions to Support Victims of Modern Slavery

Summary: Abstract This helpdesk report addresses this question: What evidence is there, from academic or other sources, about effective and ineffective interventions to provide support for victims of modern slavery? This review found few evaluations of interventions to support victims of modern slavery, even though there is recognition of the need for support services. While there is little evidence on effectiveness of interventions, the literature highlights the importance of victim-centred, holistic (multi-disciplinary) approaches to supporting victims. There is strong consensus in the literature on the importance of providing support to victims of modern slavery. Many will have experienced physical violence, psychological abuse and even sexual abuse. The conditions they suffer from can include anxiety, depression, post-traumatic stress disorder, sexually transmitted infections, unwanted pregnancies and abortions, physical ill-health and malnourishment. Mental health issues are particularly significant, especially in children. 'Even if the physical wounds have been healed, it is still a long process to help the victims regain their dignity and the confidence to make choices and move forward with their lives. It is therefore crucial ...to ensure that the rights, needs and requests of the victims are recognised'. In the absence of suitable support, victims are at heightened risk of becoming slaves again/being re-trafficked. This review drew on a mixture of academic and grey literature. Significant information was found on provision of services (or lack of it) to survivors of modern slavery in the UK (as well as some other developed countries), but far less on developing countries. Some of the literature made specific reference to the needs of women, but much was gender-blind or focused on the needs of men. Nothing was found from the perspective of persons with disabilities. K4D helpdesk reports provide summaries of current research, evidence and lessons learned. This report was commissioned by the UK Department for International Development.

Details: Brighton, U.K.: Institute of Development Studies, 2017. 17p.

Source: Internet Resource: Accessed March 21, 2019 at: https://www.gov.uk/dfid-research-outputs/interventions-to-support-victims-of-modern-slavery

Year: 2017

Country: International

Keywords: Modern Slavery

Shelf Number: 155138


Author: Idris, Iffat

Title: Youth Vulnerability to Violent Extremist Groups in the Indo-Pacific

Summary: Question What factors make youth more vulnerable to - or bulwarks against - recruitment to violent extremist groups? Focus on the Indo-Pacific region, in particular Bangladesh, Indonesia and the Philippines. Summary This review of factors driving youth vulnerability to recruitment by violent extremist groups in the Indo-Pacific highlights the variety of factors involved, and the importance of looking at each situation individually. It is impossible to generalize: youth recruitment is context-specific. In Bangladesh the political situation has created space for violent groups, with youth recruitment facilitated by the country's youth bulge, high youth unemployment and targeting of youth on social media. In Indonesia political and economic factors are less significant than the role of traditional Islamic study circles and recruitment through educational institutions as well as online. In the Philippines violent Islamist extremism is deeply rooted in the long-standing Mindanao conflict, Muslim grievances there and disillusionment with the protracted peace process. Perhaps the most significant common factors in the region are, one, that it is predominantly youth who are recruited by violent extremist groups and, two, the role of transnational movements (notably ISIS) in fostering radicalization. There is considerable literature on factors driving youth vulnerability to violent extremism but much of this is either generic, country-specific or covers smaller regions: this review found little literature looking at the Indo-Pacific region as a whole. A recent article by Gunaratna (2017) gives a useful overview of the challenges with regard to politico-religious extremism in the Asia-Pacific region. Gunaratna traces the first wave of politico-religious conflict back to the 1990s when veterans of the Soviet-Afghan war returned to their home countries re-joining existing violent groups and setting up new ones. He sees the diverse Islamist extremist groups operating in the region against the backdrop of transnational movements, most notably Islamic State (IS): It has mounted an ambitious propaganda campaign worldwide to spread its ideology. IS has used its sophisticated social media propaganda campaign to recruit, radicalize and raise funds, and to garner the support of hundreds of thousands of Asians. The exploitation of social media technology to spread its narratives and the growth of operational capabilities by IS and likeminded groups have given these groups the capacity to threaten both Muslim and non-Muslim governments and societies in Asia (Gunaratna, 2017). This review looks at violent extremism in three countries - Bangladesh, Indonesia and the Philippines - and seeks to identify factors driving youth vulnerability to recruitment by extremist groups in each. Government and other initiatives to foster the role of youth in countering such recruitment were beyond the scope of the review. The available literature did not identify other factors acting as bulwarks against youth recruitment. The literature reviewed comprised a mix of academic papers, policy and programme documents, and media articles. Key findings for the three countries examined are as follows: Bangladesh Youth are a key target group for radicalization and recruitment by violent extremist groups: this includes youth from all socioeconomic backgrounds; The country's large proportion of youth in the population, high youth unemployment and high levels of internet and social media use by youth all facilitate radicalization and recruitment. Online radicalization is a major factor in Bangladesh; Bitter rivalry between the ruling Awami Party and opposition Bangladesh National Party (BNP) has created the space for violent extremist groups in Bangladesh to operate and expand, and is one reason for the government's muted response to violent extremism. Indonesia Disillusionment with Indonesia's democracy, in particular due to corruption, and inequality are seen as factors in youth radicalization in Indonesia; Islamic study circles are widespread in Indonesia and a common pathway to joining extremist groups: people could start off in 'mainstream' circles but this could lead to them joining more radical groups. The circles allow recruiters to identify and groom potential members; The 40-odd pesantren (Islamic schools) affiliated to extremist group Jemaah Islamiyah certainly foster radicalization, but the literature differs on the role of the majority moderate pesantren. Universities, however, are seen as targeted by extremists, with 'success' evident from rising conservative ideology among students and the involvement of students/alumni in violent extremism; Youth Vulnerability to Violent Extremist Groups in the Indo-Pacific 'Inherited jihadism' is identified as a phenomenon distinct to Indonesia, whereby the involvement of parents/older siblings/relatives in extremist groups pushes young people to follow in their footsteps; Online radicalization is significant, particularly as ISIS has targeted Indonesia in its online propaganda, and reinforces radicalization through pesantren and in person contacts. Prisons and returning foreign fighters also promote radicalization and recruitment. The Philippines The roots of violent Islamist extremism in the Philippines lie in the over 40-year insurgency in Muslim Mindanao. Muslim grievances about marginalization by the centre are exploited by violent extremist groups to win support; There is also disillusionment with the protracted peace process and anger at the widespread destruction of infrastructure in Marawi city as a result of military operations against extremists; Financial incentives are a factor in Mindanao, both motivating some extremist groups and motivating individual membership of violent extremist groups. But financial incentives alone do not account for violent extremism; Social ties (family, kin, friends) are important in Mindanao and thus a driver of radicalization. The role of charismatic radical preachers is also significant; Violent extremist groups in Mindanao draw on online ISIS propaganda to mobilize support: ISIS has urged its followers to travel to the Philippines to undertake 'jihad' there. The literature considered in this review was largely gender-blind, making extensive use of gender-neutral terms such as youth, jihadists and extremists, and not distinguishing between males and females. One study of violent extremism in Bangladesh made reference to women. In the case of Indonesia the review found a couple of reports focusing on female recruitment. The literature on violent extremism in the Philippines made virtually no reference to women specifically.

Details: Birmingham, U.K.: GSDRC, University of Birmingham, 2018. 23p.

Source: Internet Resource: Accessed March 21, 2019 at: https://gsdrc.org/wp-content/uploads/2018/10/1438-Youth-Vulnerability-to-Violent-Extremist-Groups-in-the-Indo-Pacific.pdf

Year: 2018

Country: International

Keywords: At-Risk Youths

Shelf Number: 155139


Author: Transparency International

Title: The Ignored Pandemic: How corruption in healthcare service delivery threatens Universal Health Coverage

Summary: Universal health coverage, meaning that all individuals and communities can access essential quality health services without suffering financial hardship, has become the top priority of the World Health Organisation. Achieving the ambitious goal of universal health coverage will require more resources, and the better use of existing resources. At the same time, efforts to achieve universal health coverage are being significantly undermined by widespread corruption in frontline healthcare service delivery. Corruption in the health sector kills an estimated 140,000 children a year, fuels the global rise in anti-microbial resistance, and hinders the fight against HIV/AIDS and other diseases. Unless the most harmful forms of corruption are curbed, universal health coverage is unlikely to be achieved. Based on an extensive review of the literature, this report seeks to open a new page by taking a fresh look at the evidence on corruption and anti-corruption. It explores the drivers, prevalence, and impact of corruption at the service delivery level. In many countries, deep structural problems drive frontline healthcare workers to absent themselves from work, solicit gifts and extort bribes from patients, steal medicines, and abuse their positions of power in a variety of other ways, usually without facing any consequences.

Details: London: Transparency International, 2019. 54p.

Source: Internet Resource: Accessed March 22, 2019 at: http://ti-health.org/wp-content/uploads/2019/03/IgnoredPandemic-WEB-v2.pdf

Year: 2019

Country: International

Keywords: Corruption

Shelf Number: 155100


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Global Report on Trafficking in Persons 2018, Booklet 2: Trafficking in persons in the context of armed conflict

Summary: In 2016, more countries were experiencing some form of violent conflict than at any other time in the previous 30 years. People living in conflict-affected areas may experience abuse, violence and exploitation, including trafficking in persons. The risk of trafficking in persons is also connected with the high numbers of refugees. A need to flee war and persecution may be taken advantage of for exploitation by traffickers. Trafficking in persons in the context of armed conflict has received increased attention by the international community. In November 2017, the United Nations Security Council addressed the topic in Resolution 2388 and reiterated its deep concern that trafficking in persons in areas affected by armed conflict continues to occur. It also underscored that certain offences associated with trafficking in persons in the context of armed conflict may constitute war crimes. Moreover, the Security Council reiterated its condemnation of all acts of trafficking undertaken by the Islamic State of Iraq and the Levant (ISIL) , Boko Haram, Al-Shabaab, the Lord's Resistance Army and other terrorist or armed groups for the purpose of sexual slavery, sexual exploitation and forced labour. In Resolution 2331 of December 2016, the Security Council requested the Secretary-General to take steps to improve the collection of data, monitoring and analysis of trafficking in persons in the context of armed conflict. In response, the present study examines how trafficking in persons occurs in the context of armed conflict through an analysis based on an extensive literature review, a review of case narratives from international tribunals and interviews with personnel from United Nations peacekeeping operations. Trafficking in persons is another dimension of the violence, brutality and abuse that occur in the context of armed conflict. While trafficking takes many forms, it always involves the purpose of exploitation. Victims are trafficked for exploitation in forced labour in different sectors, from agriculture to mines. They are also trafficked to serve as domestic servants, for sexual exploitation or for armed combat. Children are often recruited into armed groups for forced labour in a range of military-related roles. As one expert described it: "when there are armed groups you may find all kinds of exploitation".

Details: Vienna: UNODC, 2018. 32p.

Source: Internet Resource: Accessed March 28, 2019 at: https://www.unodc.org/documents/data-and-analysis/glotip/2018/GloTIP2018_BOOKLET_2_Conflict.pdf

Year: 2018

Country: International

Keywords: Conflict Areas and Violence

Shelf Number: 155197


Author: KnowTheChain

Title: 2018 Food and Beverage Benchmark Findings Report

Summary: The risk of forced labor is pervasive across today’s food and beverage supply chains: from tea pickers on tea estates to crew members on fishing vessels and laborers on cattle and poultry ranches, cocoa farms, and rice mills. Workers in the agricultural sector tend to be isolated on remote farms or boats, and harder to reach than more permanent factory workers, making them particularly vulnerable to exploitation. Driven by increasing demand for fuel, food, and raw materials, the sector increasingly pushes agricultural work into more rural areas to accommodate its land-intensive activities, exacerbating the remote nature of the work. To better understand how companies are addressing the risk of forced labor occurring in their supply chains, KnowTheChain evaluated 38 of the largest global food and beverage companies on the forced labor policies and procedures that each company has in place. This report marks KnowTheChain's second food and beverage benchmark since it was launched in 2016.

Details: San Francisco: The Author, 2018. 71p.

Source: Internet Resource: Accessed March 28, 2019 at: https://knowthechain.org/wp-content/uploads/KTC_FB_2018.pdf

Year: 2018

Country: International

Keywords: Forced Labor

Shelf Number: 155210


Author: Horwood, Chris

Title: The new 'public enemy number one': Comparing and contrasting the war on drugs and the emerging war on migrant smugglers

Summary: There are those who seek to apply the experience of the war on drugs to the emerging war on migrant smugglers to warn that such a confrontation carries high costs, low chances of success and would likely lead to an escalation of violence against the migrants themselves. Such arguments suggest we should learn from the war on drugs' failures, and design different policy and criminal justice responses to irregular migration and human smugglers so as not to repeat past and ongoing failures. This research report examines this hypothesis; that the war on drugs is analogous to the war on migrant smuggling and that the lessons derived from the war on drugs are applicable to current policy makers around migration. Using a compare-and-contrast analysis it looks at the intrinsic aspects of the commodities themselves (substances vs migrants), the dynamics and modalities of the respective illicit economies, the lessons learnt from the war on drugs, the policy environment and implications of using alternative approaches, namely 'legalising' drugs and/or new approaches, inter alia, towards decriminalizing irregular migration.

Details: s.l.: Mixed Migration Centre, 2019. 78p.

Source: Internet Resource: Accessed March 28, 2019 at: http://www.mixedmigration.org/wp-content/uploads/2019/03/060_new-public-enemy-number-1_full-report.pdf

Year: 2019

Country: International

Keywords: Human Smuggling

Shelf Number: 155211


Author: Dion-Schwarz, Cynthia

Title: Terrorist Use of Cryptocurrencies: Technical and Organizational Barriers and Future Threats

Summary: Given the key role of funding in supporting terrorist operations, counter-terrorism finance (CTF) efforts often focus on tracking money and preventing financial transactions that might be used to support attacks and other terrorist activities. However, the success of these strategies in reducing terrorist access to official currencies has raised concerns that terrorist organizations might increase their use of such digital cryptocurrencies as Bitcoin to support their activities. Current cryptocurrencies are not well matched with the totality of features that would be needed and desirable to terrorist groups but might be employed for selected financial activities. The authors' research shows that, should a single cryptocurrency emerge that provides widespread adoption, better anonymity, improved security, and that is subject to lax or inconsistent regulation, then the potential utility of this cryptocurrency, as well as the potential for its use by terrorist organizations, would increase. Regulation and oversight of cryptocurrencies, along with international cooperation between law enforcement and the intelligence community, would be important steps to prevent terrorist organizations from using cryptocurrencies to support their activities. Key Findings -- Factors that will increase cryptocurrency viability for terrorist organizations A growing market presumably will require increased reliability and more-widespread usage. As use becomes more common across the world, the current lack of acceptance of these systems - especially in areas where terrorist organizations operate - could disappear. Widespread adoption of second-generation cryptocurrencies with advanced privacy features will enable more illicit use of these systems. Regulatory oversight in the United States, Europe, and China makes it difficult to obtain bitcoin anonymously on an exchange. However, if trading occurs on a decentralized exchange or in a country without regulatory oversight, the transactions could become much harder to trace. Increased use of cryptocurrencies in complementary and adjacent markets could indicate increased viability among terrorist organizations. Some counterfeiting operations have begun to use darknet markets, and there is a significant trade in illicit drugs and stolen identities in these markets. Factors that will decrease cryptocurrency viability for terrorist organizations Uncertainty and infighting have plagued many cryptocurrencies as they grow. This could decrease wider adoption, making cryptocurrency less viable for terrorist groups. Law enforcement cooperation in cybersecurity domains and cryptocurrency markets will be a critical enabler for deanonymization and tracking of funds. If the cryptocurrency systems that are most widely used are incorporated into the regulatory system and those that are incompatible are abandoned or remain marginal because of lack of support, then terrorist groups and other illicit actors may find that the digital world is less, not more, hospitable. A series of fraudulent exchanges and theft of improperly secured monies have plagued cryptocurrency since it became valuable. If similar issues continue to be discovered and exploited, trust in cryptocurrency systems will remain low.

Details: Santa Monica, CA: RAND, 2019. 98p.

Source: Internet Resource: Accessed March 29, 2019 at: https://www.rand.org/pubs/research_reports/RR3026.html

Year: 2019

Country: International

Keywords: Banking Infrastructure Security

Shelf Number: 155227


Author: Organisation for Economic Co-operation and Development

Title: Trade in Counterfeit ICT Goods

Summary: Recent years have witnessed a constant rise in the spread of ICT (information and communication technologies) infrastructure and a growing demand for ICT goods. The production of these goods is knowledge intensive and the industry relies extensively on intellectual property (IP) rights. This strong and growing demand for ICT goods, and their IP dependence, makes them an attractive target for counterfeiters. This study looks at the trade in counterfeit ICT goods, including the size of the trade, the main sources of fake goods, and the countries whose companies are most affected.

Details: Paris: OECD Publishing, 2017. 94p.

Source: Internet Resource: Accessed March 30, 2019 at: https://read.oecd-ilibrary.org/governance/trade-in-counterfeit-ict-goods_9789264270848-en#page1

Year: 2017

Country: International

Keywords: Counterfeit Goods

Shelf Number: 155232


Author: Organization for Economic Co-operation and Development (OECD)

Title: Trade in Counterfeit Products and the UK Economy: Fake Goods, Real Losses

Summary: The modern structure of the UK economy is largely based on knowledge, ideas and innovation and its well integrated global value chains. These factors help boost the country's economic growth, but at the same time they make it highly susceptible to the risk of trade in counterfeit goods. This risk negatively affects UK rights holders, the UK government, and the reputation of UK firms. This report measures the direct, economic effects of counterfeiting on consumers, retail and manufacturing industry and governments in the United Kingdom. It does so from two perspectives: the impact on these three groups of imports of fake products into the UK, and the impact of the global trade in fake products on UK intellectual property rights holders.

Details: Paris: OECD Publishing, 2017. 152p.

Source: Internet Resource: Accessed March 30, 2019 at: http://www.oecd.org/gov/trade-in-counterfeit-products-and-the-uk-economy-9789264279063-en.htm

Year: 2017

Country: International

Keywords: Counterfeit Products

Shelf Number: 155233


Author: Organization for Economic Co-operation and Development (OECD)

Title: Governance Frameworks to Counter Illicit Trade

Summary: This report examines governance frameworks to counter illicit trade. It looks at the adequacy and effectiveness of sanctions and penalties applicable, the steps parties engaged in illicit trade take to lower the risk of detection - for example through small shipments - and the use of free trade zones as hubs for managing trade in illicit products. It also identifies gaps in enforcement that may need to be addressed. The report provides an overview of selected enforcement issues in BRICS economies (Brazil, China, India, the Russian Federation and South Africa).

Details: Paris: OECD Publishing, 2018. 245p.

Source: Internet Resource: Accessed March 30, 2019 at: https://www.oecd-ilibrary.org/docserver/9789264291652-en.pdf?expires=1553955039&id=id&accname=oid006203&checksum=8E25339CE1316247565CB35A3E26CDD3

Year: 2018

Country: International

Keywords: Counterfeit Products

Shelf Number: 155234


Author: Organisation for Economic Co-operation and Development

Title: Trade in Counterfeit Goods and Free Trade Zones: Evidence from Recent Trends

Summary: This study examines the potential for the misuse of Free Trade Zones (FTZs) for trade in counterfeit and pirated goods. It presents the evolution of the FTZs and the international legal framework in which they operate, the reasons for establishing such zones and the benefits they offer businesses, and, finally, the role these zones play in fueling trade in counterfeit and pirated goods. It also analyses the links between the FTZs and trade in counterfeit products, and provides data on these links.

Details: Paris: OECD Publishing, 2018. 82p.

Source: Internet Resource: Accessed March 30, 2019 at: https://www.oecd-ilibrary.org/docserver/9789264289550-en.pdf?expires=1553955479&id=id&accname=oid006203&checksum=CBB320957F8520F57F01BF21A837D80F

Year: 2018

Country: International

Keywords: Counterfeit Goods

Shelf Number: 155235


Author: Organisation for Economic Co-operation and Development

Title: Why do Countries Export Fakes? The Role of Governance Frameworks, Enforcement, and Socio-Economic Factors

Summary: This study provides an in-depth exploration of a series of factors that can explain a country's propensity to export fake goods. The analysis explores the role and interplay of macroeconomic factors, governance variables, and the presence of Free Trade Zones, logistics facilities and trade facilitation. In addition, it analyses the role corrruption and enforcement of IP play in facilitating trade in counterfeit products, and provides data on these links.

Details: Paris: OECD Publishing, 2018. 66p.

Source: Internet Resource: Accessed March 30, 2019 at: https://www.oecd-ilibrary.org/governance/why-do-countries-export-fakes_9789264302464-en

Year: 2018

Country: International

Keywords: Corruption

Shelf Number: 155237


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: Misuse of Small Parcels for Trade in Counterfeit Goods: Facts and Trends

Summary: This study examines the potential for the misuse of small parcels for trade in counterfeit and pirated goods. It presents the legal and economic contexts of the operation of express and postal services. It also looks at the available data on volumes of small consignments, via postal and courier streams, in the context of seizures of counterfeit and pirated goods. Furthermore it analyses the links between the observed dynamics in markets for small parcels and the available information on misuse of this service by traffickers in counterfeit and pirated goods.

Details: Paris: OECD Publishing, 2018. 88p.

Source: Internet Resource: Accessed March 30, 2019 at: https://www.oecd-ilibrary.org/governance/misuse-of-small-parcels-for-trade-in-counterfeit-goods_9789264307858-en

Year: 2018

Country: International

Keywords: Counterfeit Goods

Shelf Number: 155239


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: Trends in Trade in Counterfeit and Pirated Goods

Summary: This study examines the value, scope and trends of trade in counterfeit and pirated goods. First, it presents the overall scale of this trade and discusses which parts of the economy are particularly at risk. Next, it looks at the main economies of origin of fakes in global trade. Finally, it analyses recent trends in terms of changing modes of shipment and the evolution of trade flows.

Details: Paris: OECD Publishing, 2019. 88p.

Source: Internet Resource: Accessed March 30, 2019 at: http://www.oecd.org/governance/risk/trends-in-trade-in-counterfeit-and-pirated-goods-g2g9f533-en.htm

Year: 2019

Country: International

Keywords: Counterfeit Goods

Shelf Number: 155240


Author: Couttenier, Mathieu

Title: The Logic of Fear: Populism and Media Coverage of Immigrant Crimes

Summary: Abstract We study how news coverage of immigrant criminality impacted municipality-level votes in the November 2009 "minaret ban" referendum in Switzerland. The campaign, successfully led by the populist Swiss People's Party, played aggressively on fears of Muslim immigration and linked Islam with terrorism and violence. We combine an exhaustive violent crime detection dataset with detailed information on crime coverage from 12 newspapers. The data allow us to quantify the extent of pre-vote media bias in the coverage of migrant criminality. We then estimate a theory-based voting equation in the cross-section of municipalities. Exploiting random variations in crime occurrences, we find a first-order, positive effect of news coverage on political support for the minaret ban. Counterfactual simulations show that, under a law forbidding newspapers to disclose a perpetrator's nationality, the vote in favor of the ban would have decreased by 5 percentage points (from 57.6% to 52.6%).

Details: S.L.: 2019. 76p.

Source: Internet Resource: Accessed March 30, 2019 at: https://ideas.repec.org/p/cpr/ceprdp/13496.html

Year: 2019

Country: International

Keywords: Illegal Immigration

Shelf Number: 155243


Author: Bryant, Katherine

Title: Promising Practices: What Works? A Review of interventions to combat modern day slavery

Summary: The importance of evaluation to understanding the impact and effectiveness of projects designed to prevent or address the harm connected with modern slavery is widely accepted. Reviews of evaluations already undertaken offers an opportunity to both take stock of the state of the evaluation field - what has been evaluated and what has not? - but also to identify and examine results emerging from evaluation work that has already been undertaken. From these existing evaluations we’re able to identify what do we know, what don't we know, and what remains unclear? In an effort to increase the effectiveness and efficiency of projects combating modern slavery, the Promising Practices Database was created by the Walk Free Foundation. The Database collates impact and programmatic evaluations of anti-slavery and counter trafficking programming and categorises these by terms such as country, region, type of modern slavery, and impact of the evaluation. The Database was developed so that project developers, researchers, and academics could quickly identify relevant evaluation work that had already been undertaken, but also seek to better understand what works - and what does not- through a simple search by country, target population, type or sector of slavery, or type of intervention. The theory is that we can learn from the evaluations already undertaken, even if the learning is 'there is a lot we don't know.' To date, the Database contains 179 evaluations from the modern slavery and associated sectors. Within the database, each evaluation is categorised based on the type of modern slavery, sector (or industry), type of activity, and program results. From this categorisation, we have mapped existing evaluations, identifying where they have been conducted, and whether there are any areas where further evaluation work is necessary. We have also been able to draw some general conclusions about the current state of monitoring and evaluation in the anti- slavery and counter trafficking field. Following this overview paper are a set of policy papers that dive into different sectors or interventions targeting modern slavery, where we have made observations about which practices have been proven to work, which look promising, and which are ineffective. This paper sets out the theory and purpose of the database; an overview of the process for developing the database; and identifies key lessons for modern slavery programming and evaluations. For more detailed analysis of certain sectors or interventions, please refer to corresponding policy briefs on case management initiatives, labour monitoring systems, and conditional and non-conditional cash transfers, among others.

Details: Nedlands, WA: Walk Free Foundation, 2019. 28p.

Source: Internet Resource: Accessed April 2, 2019 at: https://cdn.minderoo.com.au/content/uploads/2019/02/05180522/Promising-Practices-180213-p.pdf

Year: 2019

Country: International

Keywords: Forced Labor

Shelf Number: 155270


Author: Jelsma, Martin

Title: Fair(er) Trade Options for the Cannabis Market

Summary: Policy changes over the past five years or so have dramatically reshaped the global cannabis market. Not only has there been an unprecedented boom in medical markets, but following policy shifts in several jurisdictions a growing number of countries are also preparing for legal regulation of non-medical use. Such moves look set to bring a clear range of benefits in terms of health and human rights. As this groundbreaking Report, highlights, however, there are also serious concerns about the unfolding market dynamics. Many for-profit cannabis companies from the Global North are aggressively competing to capture the licit spaces now rapidly opening in the multi-billion-dollar global cannabis market. This threatens to push small-scale and marginalized traditional farmers from many countries in the Global South out of the emerging legal market. It is argued here by Martin Jelsma, Sylvia Kay and David Bewley-Taylor that there should be no reason why, using carefully designed regulatory frameworks, small-scale farmers cannot work in mutually beneficial partnership with or alongside large companies. This might be achieved through a fair(er) trade cannabis model built around a rights-based, inclusive and environmentally sustainable approach to market engagement. Mindful of the intricate, cross-cutting and complex nature of the commercial and legal environment, Fair(er) Trade Options for the Cannabis Market proposes a set of interconnecting frameworks through which to better understand the issue and concludes with a set of guiding principles upon which a fair(er) trade cannabis model might be built.

Details: s.l.: Cannabis Innovate, 2019. 40p.

Source: Internet Resource: Accessed April 4, 2019 at: https://cannabisinnovate.org/

Year: 2019

Country: International

Keywords: Cannabis Markets

Shelf Number: 155334


Author: International Network Supporting Victims of Terrorism and Mass Violence

Title: Supporting Victims of Terrorism. Report of the INVICTM Symposium in Stockholm

Summary: On May 19, 2018, INVICTM - International Network Supporting Victims of Terrorism and Mass Violence - held its second international symposium on Supporting Victims of Terrorism in Stockholm, Sweden. This report reflects the discussions held during the symposium. Terrorism affects individuals, communities and societies. The Circles of Impact model offers a framework to illustrate the breadth of the potential impact of a terrorist attack: four circles encompass the different groups in society that an attack might affect. The inner circle of victimization contains individuals during the terrorist attack and directly affected by it. A second, wider, circle includes the direct victims' close social environment, such as family, friends or peers. The third circle refers to individuals who are part of the formal support network such as first responders or victim support providers. And the fourth, largest circle embraces the wider society of which the individual victim is a member. A victim response aimed at understanding and responding to the needs of all those affected by terrorism builds on the Circles of Impact model and can be more inclusive than relying on limited legal definitions of who is a victim. Experts agree that a broad set of needs are common to victims of all types of crime. Victims of terrorism, however, can have additional needs and exacerbated common crime victim needs. Symposium participants identified respect and recognition, commemoration, information provision, support, compensation, access to justice and peer support as some of terrorism victims' primary needs. The list is not exhaustive nor are the needs isolated from one another -- they are closely intertwined. This report describes primary terrorism victim needs and offers tips, practical solutions, good practices and examples from across the globe to help meet these needs. Given the complexities of supporting victims of terrorism, experts recommend a flexible approach to responding to each unique terrorist attack. Years of experience and expertise, however, allow us to identify some common predictable challenges and the practical solutions that can address them. Participants from around the world identified local challenges and practical solutions for supporting victims of terrorism during the symposium. A high quality response to victims of terrorism should build on a number of basic principles: First, understand that short and long-term terrorism victim needs are intertwined. No matter how well the immediate response is carried out, there will unavoidably be long-term consequences to the victim. Second, the foundation for an effective response is a victim-centered perspective that incorporates listening to individual victims to identify their needs and being attentive to the particular needs of vulnerable groups. Individuals or groups that are particularly vulnerable to the impact of terrorist attacks include children, cross-border victims, support providers or individuals who could have been on the scene of the attack. Vulnerable individuals may have particular needs that require a specialized and adaptive response. Given the nature of the scenario used during the symposium, participants focused, in particular, on cross-border victims. Increasingly, foreigners become victims in a country that is not their own, which adds a layer of complexity to both understanding and responding to victim needs. Third, sufficient advance planning and preparation form the backbone of any comprehensive response for victims of terrorism. Symposium participants reinforced the importance of the preparatory phase identifying numerous steps that can and should be taken in advance of an attack. Fourth, effective coordination in times of need builds on a network established during the preparatory phase. The work of creating networks is currently ongoing at both national and international levels. INVICTM's leadership role in fostering and facilitating a network is an important step in improving international collaboration to strengthen the support for all victims of terrorism.

Details: Brussels: Victim Support Europe, 2018. 86p.

Source: Internet Resource: Accessed April 4, 2019 at: https://victimsupport.eu/activeapp/wp-content/files_mf/1553847245INVICTMSymposiumReport2018.pdf

Year: 2018

Country: International

Keywords: First Responders

Shelf Number: 155340


Author: Foust, Jeremy

Title: The Dark Internet: An Exploration of Culture and User Experience

Summary: Our research sought to investigate the culture of the Dark Internet through a combination of cultural analysis and experiential learning. We split our research into three major portions: analysis of culture of the Dark Internet through the way it is viewed by various media outlets and on the Dark Internet itself; how the culture of the Dark Internet reacts in times of crises; and a comparison of the experience of the users of Dark Internet marketplaces versus users of traditional internet marketplaces. Our cultural analysis was accomplished through the use of textual coding; by coding the articles, forums, and pages that we were gathering, we were able to find and observe key commonalities in behavior and communication among the sources. We also went through the process of purchasing goods from both Dark Internet marketplaces and traditional internet marketplaces allowing us to compare the experiences in a variety of ways including: ease of access, ease of purchase, delivery time, etc. This research aims to provide further insight into the nature of the Dark Internet and open the way for future research into this ever-changing culture.

Details: College Park: University of Maryland, 2017. 98p.

Source: Internet Resource: Thesis: Accessed April 4, 2019 at: https://drum.lib.umd.edu/handle/1903/19609

Year: 2017

Country: International

Keywords: Dark Internet

Shelf Number: 155346


Author: Greenpeace International

Title: 30×30: A Blueprint for Ocean Protection. How we can protect 30% of our oceans by 2030

Summary: This ocean sanctuaries scientific study maps out how to protect 30% of the world's oceans by 2030, a target that scientists say is crucial in order to safeguard wildlife and to help mitigate the impacts of climate change. 30×30: A Blueprint For Ocean Protection is the result of a year-long collaboration between leading academics at the University of York, University of Oxford and Greenpeace. Download our report 30x30: A Blueprint for Ocean Protection From climate change to ocean acidification, overfishing and pollution, our oceans are under threat like never before. We urgently need to protect at least a third of our oceans by 2030 and this research shows what a robust, planet-wide network of ocean sanctuaries could look like. The research represents a new approach to designing and creating a network of ocean sanctuaries (or 'fully protected marine protected areas'). In one of the largest ever studies of its kind, the researchers broke down the oceans that are classed as 'international waters' - which cover almost half the planet - into 25,000 squares of 100km x 100km, and then mapped the distribution of 458 different conservation features, including wildlife, habitats and key oceanographic features, generating hundreds of scenarios for what a planet-wide network of ocean sanctuaries, free from harmful human activity, could look like. Governments are negotiating towards a Global Ocean Treaty at the UN that could pave the way for this network of ocean sanctuaries.

Details: Amsterdam: Author, 2019. 96p.

Source: Internet Resource: Accessed April 5, 2019 at: https://storage.googleapis.com/planet4-international-stateless/2019/03/5db0f88b-greenpeace-30x30-blueprint-report.pdf

Year: 2019

Country: International

Keywords: Environmental Crimes

Shelf Number: 155348


Author: Ocean Conservancy

Title: Stemming the Tide: Land-Based Strategies for a Plastic-Free Ocean

Summary: The amount of unmanaged plastic waste entering the ocean - known as plastic-waste leakage - has reached crisis levels and has caused significant economic and environmental damage. The problem warrants a collective global response. The first step should focus on the five countries that together account for between 55 and 60 percent of the total plastic-waste leakage; this report describes an integrated set of measures (or levers) that together could reduce leakage in these five countries by 65 percent and reduce total global leakage by approximately 45 percent by 2025. This is the prerequisite for successfully ending plastic-waste leakage entirely by 2035. For each lever, the report specifies costs and plastic-waste-leakage reduction potential. Total costs of implementing these levers could be contained at an estimated $5 billion a year - an investment with significant returns to the entire economy. That amount could largely be met through typical project-financing mechanisms involving the public, private, and multilateral sectors. Private industry has an important role to play in catalyzing public and private investment by strategically reducing capital costs and investment risk. Assembling the appropriate financing approach, along with the need for political commitment, location-specific data and analysis, and action to align government policies and regulatory environments, will require coordinated action across public and private stakeholders. Although each set of actions described in the report has a different lead time - with effects in the short, medium, and long term - they all require an immediate start if we as a society are to move toward peaking and then essentially eliminating the leakage of plastic into the ocean. The agenda described in this report recognizes ongoing efforts such as capital-light improvements to uncontained dump sites located near waterways and heavy penalties for dumping of waste into waterways by waste-transportation systems. But it also suggests new priorities, acceleration of existing initiatives, increased private-sector commitment, and a focus on "ocean-smart" measures geared primarily toward reducing leakage of plastic to the ocean. And while this report focuses on five countries with especially high levels of plastic-waste leakage, we believe it also sets forth a replicable model that can be applied in other countries that would benefit from improved waste management systems. An article in the February 13, 2015, issue of the journal Science added to an already robust body of research suggesting that the volume of plastic leaking into the sea - estimated at approximately eight million metric tons a year - greatly exceeds any previous estimates. Evidence of the environmental and economic damage is mounting. In a business-as-usual scenario of unchecked plastic-waste leakage, the global quantity of plastic in the ocean would nearly double to 250 million metric tons by 2025. A broad range of stakeholders from the public and private sectors is aligning on ocean plastic as a major global issue. Capitalizing on this momentum requires a global agenda, underpinned by a strong understanding of the possible solutions and their economics. This report is meant to provide a basis for global action. It is the result of corporate and nongovernmental-organization (NGO) parties coming together on this issue and represents emerging collaborative action across the consumer - goods value chain and between the private, public, and social sectors.

Details: Washington, DC: Ocean Conservancy and McKinsey Center for Business and Environment, 2015. 48p.

Source: Internet Resource: Accessed April 7, 2019 at: https://oceanconservancy.org/wp-content/uploads/2017/04/full-report-stemming-the.pdf

Year: 2015

Country: International

Keywords: Environmental Crime

Shelf Number: 155358


Author: International Solid Waste Association

Title: A Roadmap for Closing Waste Dumpsites: The World's Most Polluted Places

Summary: From December 2015 to June 2016, in only seven months, ISWA has recorded more than 750 deaths related to poor waste management in dumpsites and several incidents with important health impacts (see chapter "Alarming Signals"). There is no doubt about it: dumpsites are a global health and environmental emergency. Dumpsites receive roughly 40% of the world's waste and they serve about 3-4 billion people. As an example, the 50 biggest dumpsites affect the daily lives of 64 million people, a population the size of France. As urbanization and population growth will continue, it is expected that at least several hundreds of millions more people will be served by dumpsites, mainly in the developing world. If the situation follows the business as usual scenario then dumpsites will account for 8-10 % of the global anthropogenic GHG emissions by 2025. The operation of dumpsites damages the health and violates the human rights of the hundreds of millions of people that are living in their surroundings or even inside them. As is demonstrated later in this report, closing the world's dumpsites becomes a central element for the progress of the Sustainability Development Goals (SDGs). Ensuring proper sanitation and solid waste management sits alongside the provision of potable water, shelter, food, energy, transport and communications as essential to society and to the economy as a whole. It is important to remember that closing down a dumpsite is neither a simple nor an easy task. It requires an alternative waste management system, so it requires adequate planning, institutional and administrative capacity, financial resources, social support and finally political consensus. All of these conditions are really difficult and sometimes impossible to meet in countries where dumpsites are the dominant method of waste disposal and level of governance quality is questionable. This report provides the guidance required, to each and every local authority or government, for the process and procedures required to close a dumpsite and develop an alternative sound waste management system. The report proves that all the elements for closing a dumpsite (technical, financial, governance and social) are proven and available. The report proves that for each and every case, there is a Roadmap that drives to an improved waste management system with minimum environmental and health impacts. However, it is well known that many poor countries face serious barriers in their efforts to attract International Development Assistance because usually they lack the minimum administrative structures and know-how to prepare the relevant paperwork and strategic frameworks. This results in an inconvenient truth: without a proper international community intervention, those countries will not be able to close their dumpsites and upgrade their waste management systems and the vast health and environmental impacts of dumpsites will only grow and expand. Taking into account that some of the poorest countries of the world are the ones with the most rapid population growth, it is obvious that the health threats will be very important, especially in the world's emerging megacities. With the current level of interconnectivity, certainly this can't be considered as a local problem and the international community can't close its eyes in front of the frightening prospect of mega-dumpsites that will affect the lives of hundreds of millions of people. ISWA believes that speaking about the change required is not enough anymore. Making reports, presentations and supporting local authorities and governments for a more sustainable waste management is a starting point, but more tangible and game-changing activities are required, like the recent ISWA’s Scholarship Program. The program targets kids who are sorting garbage in dumpsites called Nueva Vida and La Chureca in Nicaragua. The program provides funding and administration for removing 40 children from the dumpsites and providing them with a quality education for two years. ISWA hopes that the program will be further expanded with the support of other organizations and donors. ISWA calls everyone to cooperate and contribute towards a world without dumpsites. As a first step, ISWA calls on the international community to cooperate, in every possible form, for the immediate closure of the 50 most polluting dumpsites of the world. This single, but not simple, target will immediately improve: - The health conditions of millions of people. - The quality of life for the millions living around and inside the dumpsites. - The business landscape in the developing world, as closing the dumpsites is a key-element for the development of new markets related to waste management and recycling services. In addition, closing the world's dumpsites will provide substantial reduction of CO2 emissions and it will decrease the leakages of solid waste to the oceans, as many dumpsites are located near the coast or inland waterways.

Details: Vienna, Austria: International Solid Waste Association, 2017. 124p.

Source: Internet Resource: Accessed April 7, 2019 at: https://www.iswa.org/fileadmin/galleries/About%20ISWA/ISWA_Roadmap_Report.pdf

Year: 2017

Country: International

Keywords: Dumping

Shelf Number: 155340


Author: International Solid Waste Association

Title: Wasted Health: The Tragic Case of Dumpsites

Summary: Dumpsites are a global problem. They receive roughly 40% of the world's waste and they serve about 3.5-4 billion people. The 50 biggest dumpsites affect the daily lives of 64 million people, a population the size of France. As urbanization and population growth will continue, it is expected that at least several hundreds of millions more people will be served by dumpsites, mainly in the developing world. Although there is a lack of systematic long-term epidemiological studies that fully document the health impacts from dumpsites, the existing scientific evidence demonstrates very important health risks. The health problems associated with dumpsites are related to their emissions, which usually involve POPs (persistent organic pollutants), heavy metals and VOCs (volatile organic compounds). The actual health risks depend on the practices followed and on the type of the waste disposed of in each dumpsite, as well as on the environmental and social conditions of the area. Open burning and animal feeding increase the health risks substantially, the first by direct emissions of dangerous pollutants and the second by transferring the pollutants to the food chain. Uncontrolled disposal of hazardous and healthcare waste as well as manual on-site treatment and disposal of e-waste by informal workers result in important increases of all the health risks and the negative environmental impacts. ISWA calls upon international organizations, governments and local authorities to develop emergency programs that will identify the riskiest dumpsites and proceed with their closure. ISWA considers the closure of the dumpsites as a global health emergency and it will work closely with all the involved stakeholders to accelerate programs, initiatives and investments that will result in a world free of dumpsites.

Details: Vienna, Austria: International Solid Waste Association, 2013. 38p.

Source: Internet Resource: Accessed April 7, 2019 at: https://www.iswa.org/fileadmin/galleries/Task_Forces/THE_TRAGIC_CASE_OF_DUMPSITES.pdf

Year: 2013

Country: International

Keywords: Dumpsites

Shelf Number: 155342


Author: International Corporate Accountability Roundtable

Title: Full Disclosure: Towards Better Modern Slavery Reporting

Summary: As several jurisdictions around the world consider introducing modern slavery transparency laws and other forms of supply chain legislation, this report assesses how effective current modern slavery reporting requirements have been in preventing and addressing forced labor and human trafficking in global supply chains. Based on broad stakeholder consultation, desk-research, and company statement analysis, the report takes stock of progress brought about by and gaps in existing modern slavery reporting requirements, namely the California Transparency in Supply Chain Act, the UK Modern Slavery Act, and the Australia Modern Slavery Act. It also assesses the positives and shortcomings in current corporate reporting practices under these laws. The report finds that current modern slavery transparency laws do not go far enough to protect workers or prevent forced labor and human trafficking in global supply chains. The report provides recommendations to policy-makers that outline key elements to consider in order to make modern slavery reporting requirements more impactful. The recommendations address the scope and coverage of the law, monitoring and enforcement mechanisms, government guidance for companies, and access to remedy. The report acknowledges that modern slavery and transparency in supply chain laws are only one tool that can be used to address forced labor and human trafficking in supply chains. It argues that, ultimately, mandatory human rights due diligence legislation would be more impactful to prevent and address human rights impacts in complex global supply chains and encourages a move towards this type of legislation, which is gaining momentum in various jurisdictions. The report concludes with recommendations to companies that are meant to help them better comply with existing modern slavery laws and improve their human rights disclosures. It argues that in order to be meaningful, reporting must be based on effective human rights due diligence processes, stakeholder engagement, and include information about risks throughout the entire supply chain. Companies must evaluate and report on risks related to their own business practices, as well as about the outcomes of measures taken to address forced labor.

Details: San Francisco: ICAR, 2019. 64p.

Source: Internet Resource: Accessed April 11, 2019 at: https://static1.squarespace.com/static/583f3fca725e25fcd45aa446/t/5c9aee46085229887ba8f773/1553657415304/ICAR+Full+Disclosure+Report_Final.pdf

Year: 2019

Country: International

Keywords: Corporate Misconduct

Shelf Number: 155359


Author: Pardo, Bryce

Title: Assessing the Evidence on Supervised Drug Consumption Sites

Summary: Current levels of opioid-related morbidity and mortality in the United States are staggering. Data for 2017 indicate that there were more than 47,000 opioid-involved overdose deaths (roughly similar to deaths from AIDS at its peak in 1995), and 1 in 8 adults now report having had a family member or close friend die from opioids. There has been a near universal call from blue-ribbon commissions and expert panels for increasing access to Food and Drug Administration-approved medications for those with an opioid use disorder; however, jurisdictions addressing opioid use disorder and overdose may wish to consider additional interventions beyond increasing access to these medications. Two interventions that are implemented in some other countries but not in the United States are heroin-assisted treatment (HAT) and supervised consumption sites (SCSs). Given the severity of the opioid crisis, there is urgency to evaluate tools that might reduce its impact and save lives. This working paper is part of a series of reports assessing the evidence on and arguments made about HAT and SCSs and examining some of the issues associated with implementing them in the United States. The target audiences include decision makers in rural and urban areas grappling with opioids as well as researchers and journalists. This working paper assesses evidence on and arguments made about SCSs. It also offers a descriptive assessment of SCSs and the logic model behind their implementation. The other parts of this series of reports include: (1) a summary report of all the components of the research study; (2) a review of the HAT literature; (3) a report on key informant views on the acceptability and feasibility of implementing HAT and SCSs in selected U.S. jurisdictions heavily affected by the opioid crisis and (4) a report on international experience with the implementation of HAT and SCSs.

Details: Santa Monica, CA: RAND, 2018. 91p.

Source: Internet Resource: Working Paper: WR-1261-RC: Accessed April 11, 2019 at: https://www.rand.org/content/dam/rand/pubs/working_papers/WR1200/WR1261/RAND_WR1261.pdf

Year: 2018

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 155363


Author: Strang, Lucy

Title: Heroin-Assisted Treatment and Supervised Drug Consumption Sites: Experience from Four Countries

Summary: Current levels of opioid-related morbidity and mortality in the United States are staggering. Data for 2017 indicate that there were more than 47,000 opioid-involved overdose deaths (roughly similar to deaths from AIDS at its peak in 1995), and 1 in 8 adults now report having had a family member or close friend die from opioids. There has been a near universal call from blue-ribbon commissions and expert panels for increasing access to Food and Drug Administration-approved medications for those with an opioid use disorder; however, jurisdictions addressing opioid use disorder and overdose may wish to consider additional interventions beyond increasing access to these medications. Two interventions that are implemented in some other countries but not in the United States are heroin-assisted treatment (HAT) and supervised consumption sites (SCSs). Given the severity of the opioid crisis, there is urgency to evaluate potential tools that might reduce its impact and save lives. This working paper is part of a series of reports assessing the evidence on and arguments made about HAT and SCSs and examining some of the issues associated with implementing them in the United States. The target audiences include decision makers in rural and urban areas grappling with opioids as well as researchers and journalists. This document is a report on international experience with the implementation of HAT and SCSs. The other parts of this series of reports include: (1) a summary report of all the components of the research study; (2) a review of the HAT literature; (3) a review of the SCS literature, and (4) a report on key informant views on the acceptability and feasibility of implementing HAT and SCSs in selected U.S. jurisdictions heavily affected by the opioid crisis.

Details: Santa Monica, CA: RAND, 2018. 90p.

Source: Internet Resource: Working Paer WR01262-RC: Accessed April 11, 2019 at: https://www.rand.org/pubs/working_papers/WR1262.html

Year: 2018

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 155364


Author: Crock, Mary

Title: Central Issues in the Protection of Child Migrants

Summary: In this introductory chapter we identify themes that will be carried throughout the book. We begin in section 2 with a discussion of the human rights challenges presented by children on the move, posing questions that our contributors will address as they build on the themes we identify. This is followed by an examination of obstacles that have been created to recognising child migrants as rights bearers. After setting out in section 4 a brief outline of the book's structure, the chapter concludes with some comments on global initiatives that have been made to address the challenges associated with mass migration on the one hand and of forced movement of refugees on the other. We will argue that the uncertainty and risks facing the world in the new millennium certainly constitute problems - but they also offer opportunities for positive change. Four foundational principles inform our discussion of how states should respond to children on the move. The first is that childhood is unique in that the status of being a child is transitory and (absent disabilities) the capacities of children evolve as children age. Second, it follows that children require special protection and assistance, most particularly in their younger and adolescent years, if they are to develop and thrive. The third point is that procedural accommodations should be made for children in recognition of the physical and cognitive stages of their development. The fourth and final principle both flows from and unites the three that precede it. It is that the treatment of child migrants matters because it has long term consequences - both for the children themselves and for their host communities.

Details: Sydney: Sydney Law School, 2018. 20p.

Source: Internet Resource: Sydney Law School Research Paper No. 18/65: Accessed April 13, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3264953

Year: 2018

Country: International

Keywords: Child Migrants

Shelf Number: 155385


Author: Global Initiative Against Transnational Organized Crime

Title: The Illegal, Unreported and Unregulated Fishing Index

Summary: Incentives for illegal, unreported and unregulated (IUU) fishing are considerable given the financial benefits that can accrue in both largeand small-scale fishing operations, and in developed and developing countries alike. IUU fishing is a major threat to the sustainable exploitation of the world's fisheries resources. The negative impacts of IUU fishing are environmental through its depleting effect on fish stocks; fisheries management is impacted by impairing scientific research; and it has profound social and economic impacts on communities, those working in the fisheries sector, and consumers. Many actions have been taken at international, regional and national levels to reduce IUU fishing. Indicator 14.6.1 of the Sustainable Development Goals (SDGs), related to SDG 14 'Life Below Water', is dedicated to measuring achievements made towards the ambitious target of eliminating IUU fishing by 2020. There are no reliable estimates of IUU fishing covering all countries and using a standardized methodology to generate comprehensive and reliable figures of volumes and values for IUU fish catches. Doing so would be impossible with any degree of reliability, given the clandestine nature of IUU fishing, the fact that one methodology may not fit all circumstances, and the multiple assumptions that would have to be made. However, the lack of a robust basis by which countries can be benchmarked - regarding both their exposure and response to IUU fishing - poses a problem for those in government, regional fisheries management organizations, donors and civil society in seeking to identify where interventions are most needed. This IUU Fishing Index has been developed to address this need. For all 152 coastal countries of the world, a score is calculated based on a suite of 40 indicators. These relate to the prevalence of IUU fishing in each country, and their vulnerability and response to it, drawing on various coastal, flag, port, and other state responsibilities. The scores do not indicate a measure of the volume or value of the IUU fish catch, but they do indicate a standardized measure of performance related to the 40 indicators included in the Index. The Index therefore provides a measure of the degree to which states are exposed to and effectively combat IUU fishing. The scores allow for comparisons to be made between countries, regions and ocean basins, and serve to identify where action is most needed. The Index, being repeatable and updated in 2020, will allow for changes to be monitored over time. A dedicated IUU Fishing Index website (IUUfishingindex.net) provides maps to visualize scores by indicator type and responsibility, country ranking data, and 152 individual country profiles which provide scores for each indicator for the country concerned, and show how the country's scores compare with the average scores for the region and the ocean basin(s) in which the country is located. The database underpinning the IUU fishing scores contains 5 528 separate data entries, based on both publicly available data and expert opinion, with a high (95%) completion rate across all indicators and countries

Details: Portmore, Lymington, UK: Poseidon Aquatic Resource Management Limited; Geneva: Global Initiative Against Transnational Organized Crime, 2019. 115p.

Source: Internet Resource: Accessed April 13, 2019 at; https://globalinitiative.net/wp-content/uploads/2019/02/IUU-Fishing-Index-Report-web-version.pdf

Year: 2019

Country: International

Keywords: Environmental Crime

Shelf Number: 155398


Author: Wilson, Tom

Title: Terrorism in the West: An Age of Extremes

Summary: Western countries have experienced a rise in terrorist activity and terrorist attacks over recent years. The threat is increasingly generated not by a single form of extremism but by multiple extremist ideologies. This phenomenon is being perpetuated by a wide range of individuals who come from diverse backgrounds but who are all willing to act upon the violent ideas promoted by their respective belief systems. They have employed numerous types of weapons and have had varying degrees of success at inflicting casualties and fear. Despite their divergent worldviews, there are signs of commonalities between the extremists driving terrorism. Those who perpetrate these attacks have chosen to step outside of the democratic system as a means to achieve their objectives. Instead, they have resorted to force, violence and intimidation. Almost invariably they adhere to ideologies that fundamentally reject the liberal way of life that the Western democracies have sought to maintain. This report provides detailed information and a statistical analysis of terrorism in the West in 2017, measured against comparative data from the previous year. The Executive Summary presented here sets out some of the key findings of this research, splitting the information between what is known about the attacks, and what is known about the assailants.

Details: London: Henry Jackson Society, 2018. 124p.

Source: Internet Resource: accessed April 15, 2019 at: https://henryjacksonsociety.org/wp-content/uploads/2018/10/HJS-Terrorism-in-the-West-Report-Preview.pdf

Year: 2018

Country: International

Keywords: Extremist Violence

Shelf Number: 155407


Author: United Nations Programme on HIVAIDS (UNAIDS)

Title: Health, Rights and Drugs: Harm Reduction, Decriminalization and Zero Discrimination for People Who Use Drugs

Summary: People who use drugs have been the biggest casualties of the global war on drugs. Vilified and criminalized for decades, they have been pushed to the margins of society, harassed, imprisoned, tortured, denied services, and in some countries, summarily executed. Billions of dollars spent, a considerable amount of blood spilt and the imprisonment of millions of people have failed to reduce either the size of the drug trade or the number of people who use psychoactive substances. Amid the widespread stigma and discrimination, violence and poor health faced by people who use drugs, people who inject drugs are beset by persistently high rates of HIV. While the incidence of HIV infection globally (all ages) declined by 25% between 2010 and 2017, HIV infections among people who inject drugs are rising. Outside of sub-Saharan Africa, people who inject drugs and their sexual partners account for roughly one quarter of all people newly infected with HIV. In two regions of the world-eastern Europe and central Asia, and the Middle East and North Africa- people who inject drugs accounted for more than one third of new infections in 2017. Viral hepatitis and tuberculosis rates among people who use drugs also are high in many parts of the world. These preventable and treatable diseases, combined with overdose deaths that are equally preventable, are claiming hundreds of thousands of lives each year. This is a problem that has a clear solution: harm reduction. Study after study has demonstrated that comprehensive harm reduction services-including needle-syringe programmes, drug dependence treatment, overdose prevention with naloxone, and testing and treatment for HIV, tuberculosis, and hepatitis B and C-reduce the incidence of blood-borne infections, problem drug use, overdose deaths and other harms. Countries that have successfully scaled up harm reduction have experienced steep declines in HIV infections among people who inject drugs. Armed with this overwhelming evidence, grass-roots organizations of people who use drugs, harm reduction and human rights advocates, and allied nongovernmental organizations have played a leading advocacy role on harm reduction. Civil society organizations also are instrumental in the delivery of harm reduction services, often through trusted peer outreach workers. ...

Details: Geneva, SWIT: Author, 2019. 68p.

Source: Internet Resource: Accessed April 16, 2019 at: http://www.unaids.org/sites/default/files/media_asset/JC2954_UNAIDS_drugs_report_2019_en.pdf

Year: 2019

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 155433


Author: Human Rights Monitoring Institute

Title: Communicating with Victims of Crime: A Handbook for Officers

Summary: Each year plenty of people become victims of crimes. A crime violates the victim's physical and (or) psychological integrity and may damage the person's self-esteem and trust in other people. Therefore, professional communicating by pre-trial investigation officers is a crucial precondition for avoiding further negative and harmful consequences related to the experienced crime. The Human Rights Monitoring Institute gathered a team of nine experts and produced a practical Handbook for law-enforcement officers "Communicating with victims of crime". The aim of the Handbook is to equip law enforcement officers with the knowledge and skills on how to communicate with victims in a respectful, sensitive and professional manner without discrimination of any kind. Special emphasis is placed on communicating and providing help to especially vulnerable victims - children, persons with psychosocial or intellectual disabilities, victims of sex crimes, human trafficking, domestic violence and hate crimes.

Details: Vilnius, Lithuania: Author, 2018. 68p.

Source: Internet Resource: Accessed April 17, 2019 at: https://hrmi.lt/wp-content/uploads/2018/01/Handbook-for-Officers-HRMI.pdf

Year: 2018

Country: International

Keywords: Human Rights

Shelf Number: 155442


Author: Hofman, Joanna, ed.

Title: Evaluating Interventions that prevent or counter violent extremism: A practical guide

Summary: This document provides an overview of data collection methods and evaluation designs suitable for evaluating interventions and programmes designed to prevent and counter violent extremism and radicalisation (PCVE). This collection helps to inform decision-making about the evaluation methods or designs which are most suitable to answer specific information needs, and which are most appropriate given the context in which an evaluation of PCVE work takes place in. This collection has been developed with the PCVE context in mind and with the aim of tailoring descriptions of methods to specific characteristics of work in this field. While the list of methods included in this collection is not exhaustive, the ones presented were selected based on the breadth of data collection and analysis they cover, as well as on their appropriateness for PCVE programmes and interventions. Where real-life examples of the use of the methods featured in this collection for PCVE evaluations were identified, these have been included to illustrate when and how these methods can be effectively applied. This document also provides a comprehensive discussion of ethical considerations in PCVE evaluation from a broad perspective, as well as in the application of specific evaluation methods. Offering a wealth of resources, examples and further reading, this document is a valuable guide for those who want to enhance their PCVE evaluation toolbox.

Details: Cambridge, UK: Rand Europe, 173p.

Source: Internet Resource: Accessed April 17, 2019 at: https://www.rand.org/pubs/research_reports/RR2094.html

Year: 2018

Country: International

Keywords: Counter-Terrorism

Shelf Number: 155448


Author: Lauland, Andrew

Title: Countering Violent Extremism in Australia and Abroad: A Framework for Characterising CVE Programs in Australia, the United States, and Europe

Summary: As countries around the world develop countering violent extremism (CVE) programs to prevent homegrown terrorism, there is a dearth of understanding about what types of CVE programs exist and which CVE approaches are most effective. (CVE is a relatively new, and potentially still evolving, term for a set of programs that share ties to, but are distinct from, traditional counterterrorism efforts and domestically focused law enforcement activities, such as community policing.) Significant differences exist across nations in terms of CVE strategy and approach, how long government-funded efforts have been underway, and how government and other partners and stakeholders work together. This report documents an effort to help CVE program directors and policymakers in Australia place their efforts in context and identify promising approaches internationally. The authors developed a general framework for characterising CVE programs and then interviewed project staff at and collected information on two promising Australian CVE programs. Using this framework and the results of the interviews and data collection, the project team analysed the Australian programs to identify their primary characteristics, and then examined publicly available information to identify programs in Europe and the United States with goals, approaches, and target populations similar to the Australian programs. This method for mapping programs against goals and activity types could facilitate information exchange across countries.

Details: Canberra, AUS: RAND, 2019. 112p.

Source: Internet Resource: Accessed April 17, 2019 at: https://www.rand.org/pubs/research_reports/RR2168.html

Year: 2019

Country: International

Keywords: Counter-Terrorism

Shelf Number: 155449


Author: Symantec

Title: Internet Security Threat Report Volume 24

Summary: Symantec's 2019 Internet Security Threat Report takes a deep dive into insights from the world's largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each month. Ransomware shifted targets from consumers to enterprises, where infections rose 12 percent. More than 70 million records stolen from poorly configured S3 buckets, a casualty of rapid cloud adoption. Supply chains remained a soft target with attacks ballooning by 78 percent. "Smart Speaker, get me a cyber attack" — IoT was a key entry point for targeted attacks; most IoT devices are vulnerable. Our exhaustive research is informed by 123 million sensors recording thousands of threat events every second from 157 countries and territories. Use this unparalleled intelligence to your advantage by downloading the Symantec 2019 Internet Security Threat Report.

Details: Mountain View, CA: Symantic, 2019. 61p.

Source: Internet Resource: Accessed April 18, 2019 at: https://www.symantec.com/content/dam/symantec/docs/reports/istr-24-2019-en.pdf

Year: 2019

Country: International

Keywords: Computer Crimes

Shelf Number: 155453


Author: Kroetz, Kailin

Title: Examining Seafood Fraud Through the Lens of Production and Trade: How Much Mislabeled Seafood do Consumers Buy?

Summary: Key findings -- Due to the globalized nature and complexity of seafood markets, unraveling the causes and consequences of seafood mislabeling will require novel approaches with multiple types of data. Mislabeling rates can be integrated with import and production data to produce estimates of apparent consumption of mislabeled seafood. Estimating apparent consumption of mislabeled products, however, is currently limited by the quality of consumption and mislabeling data, of which the latter is particularly problematic and challenging. More coordinated and targeted research is needed in order to understand to seafood mislabeling and its potential impacts.

Details: Washington, DC: Resources for the Future, 2018. 29p.

Source: Internet Resource: Accessed April 18, 2019 at: https://www.rff.org/publications/reports/examining-seafood-fraud-through-the-lens-of-production-and-trade-how-much-mislabeled-seafood-do-consumers-buy/

Year: 2018

Country: International

Keywords: Consumer Fraud

Shelf Number: 155455


Author: Strong, John

Title: New heroin-assisted treatment Recent evidence and current practices of supervised injectable heroin treatment in Europe and beyond

Summary: Supervised injectable heroin (SIH) treatment has emerged over the last 15 years as a potentially important intensive second-line treatment for entrenched heroin addicts for whom previous orthodox treatments (i.e. oral methadone maintenance treatment (MMT) or residential rehabilitation) have produced little benefit. This treatment, by its very nature, attracts attention and controversy. Therefore, it is particularly important that there is a robust evidence base for its effectiveness and that the research evidence from international trials is brought together in one document and examined alongside the evidence from wider clinical experience in order to provide a complete picture of what we know about this treatment. We now have the results from a series of well-designed randomised clinical trials, from Europe and Canada, which have been peer reviewed and published in high-impact scientific journals, as well as steadily accumulating clinical experience of the development and provision of supervised injectable heroin treatment. All of the available findings from randomised controlled trials (RCTs) published in academic papers and project reports have been examined in order to gauge the efficacy (against a range of outcomes) as well as the cost and cost utility of SIH treatment. Thus, this Insights gives a historical overview of SIH, including the international policy and legislation regarding this treatment, before moving on to examine the research evidence and clinical and policy experience with this new treatment.

Details: Luxembourg: Publications Office of the European Union, 2012. 176p.

Source: EMDCCA Insights 11: Accessed April 18, 2019 at: http://www.emcdda.europa.eu/system/files/publications/690/Heroin_Insight_335259.pdf

Year: 2012

Country: International

Keywords: Drug Abuse and Addiction

Shelf Number: 0


Author: Reilly, Alan

Title: Overview of Food Fraud in the Fisheries Sector

Summary: Fish fraud is committed when fish is illegally placed on the market with the intention of deceiving the customer, usually for financial gain. However, its precise scale and nature in the wider global food market is largely unknown. This publication presents evidence highlighting the serious consequences of fraud for the fish sector. It describes the different types of fraud that can take place along the fish supply chain, for example: intentional mislabelling, species substitution, overglazing and overbreading, and the use of undeclared water-binding agents to increase weight. This publication shows that combating fish fraud is a complex task that requires the strengthening of national food regulatory programmes and the development of effective, science-based traceability systems and improved methods for fish authenticity testing. It highlights the need for the fish industry to develop and implement systems for fish fraud vulnerability assessment in order to identify potential sources of fish fraud within their supply chains, and to prioritize control measures to minimize the risk of receiving fraudulent or adulterated raw materials or ingredients. The publication also indicates an important role for the Codex Alimentarius Commission - to work in collaboration with countries in order to develop international principles and guidelines designed to identify, manage and mitigate fraudulent practices in food trade and to develop guidelines to standardize food safety management systems for fish fraud vulnerability assessment.

Details: Rome: Good and Agriculture Organization of the United Nations, 2018. 32p.

Source: Internet Resource: Accessed April 19, 2019 at: http://www.fao.org/3/i8791en/I8791EN.pdf

Year: 2018

Country: International

Keywords: Consumer Fraud

Shelf Number: 155465


Author: Commission for Environmental Cooperation

Title: Hazardous Trade? An Examination of US-generated Spent Lead-Acid Battery Exports and Secondary Lead Recycling in Canada, Mexico, and the United States

Summary: The report analyzes the reported cross-border trade in lead-acid batteries and presents recommendations on how to better monitor their handling to the CEC Council, composed of Canada's Environment Minister, Mexico's Secretary of the Environment, and the US Environmental Protection Agency Administrator. Spent lead-acid batteries (SLABs) from cars and trucks are one of the world's most-recycled consumer products because the lead they contain is valuable and can be processed for reuse. REPORT This independent report, written under the authority of NAAEC Article 13, was initiated in 2012 in response to concerns that a surge in spent lead-acid battery (SLAB) exports to Mexico in recent years was an effort to avoid the costs of stricter environmental and health protection laws prevalent in the United States. Lead is a persistent, bioaccumulative, and toxic substance and how lead-acid batteries are recycled is an important economic, public health and environmental issue. Findings include The regulatory frameworks covering secondary lead smelters in the United States, Canada and Mexico do not provide equivalent levels of environmental and health protection. Currently, the United States has the most stringent overall framework, while Mexico, with significant gaps in its existing regulatory framework, is the furthest from US standards in terms of certain emission controls and requirements. According to estimates, between 2004 and 2011, US net exports to Mexico increased by between 449 and 525 percent. A review of USEPA and US Census Bureau data indicated that 47,352,382 kg of SLABs were exported to Mexico in 2011 without applying the proper harmonized tariff code. Recommendations include -- The governments in Canada and Mexico should commit to achieving levels of environmental and health protections in the secondary lead industry that are functionally equivalent to those in the US. The US should require the use of manifests for each international shipment of SLABs, and require exporters to obtain a certificate of recovery from recycling facilities. Mexico needs to establish a comprehensive monitoring system to measure lead air emissions from every secondary lead smelter in operation in the country.

Details: Montreal: Author, 2013. 84p.

Source: Internet Resource: Accessed April 19, 2019 at: http://www3.cec.org/islandora/en/item/11220-hazardous-trade-examination-us-generated-spent-lead-acid-battery-exports-and

Year: 2013

Country: International

Keywords: E-Waste

Shelf Number: 155466


Author: Denmark. Ministry of Environment and Food

Title: Import restrictions on used electric and electronic equipment

Summary: This guidance is for exporters of used electric and electronic equipment (used EEE). The guidance gives you an overview of countries with import restrictions on used EEE. An import restriction means that you should not export used EEE to this country. In some countries it is forbidden to import used EEE. In other countries the used EEE must fulfill various technical criteria in order to be legal to import. Please be aware that the list of countries in this guidance is not necessarily complete and that the rules in the listed countries can change. Other countries may have import restrictions on used EEE. You should always check with the receivers of your used EEE that it is legal to import to their country. The Danish authorities cannot stop an export of used EEE to a country with import restrictions, but they can warn the authorities in the receiving country that a shipment that might be illegal to import is on its way. Furthermore, please be aware of the Danish Environmental Protection Agency's general guidance on exports of used EEE. In this guide you can find a general description of the rules on shipments of used EEE. These rules concern packaging, test of functionality and documentation etc. Countries with import restrictions on used EEE have these restrictions for a reason. They want to stop illegal shipments of waste disguised as used EEE. Waste from electric and electronic equipment (WEEE) contains hazardous substances that can be harmful to humans and to the environment. Therefore, WEEE must only be treated at specialized waste treatment facilities.

Details: Copenhagen: Danish Environmental Protection Agency, 2015. 32p.

Source: Internet Resource: Guidance Document No. 15: Accessed April 19, 2019 at: https://www2.mst.dk/Udgiv/publications/2016/01/978-87-93435-07-0.pdf

Year: 2015

Country: International

Keywords: E-Waste

Shelf Number: 155467


Author: Baker, James

Title: Pollution in the Ocean: Everything Flows Downhill

Summary: In May 2009, the Aquarium brought together a group of leading marine scientists, informal educators, communicators, exhibit designers, and public policy experts to identify and explore major ocean issues and to develop documents and strategies to engage the public in these issues. Support for the conference was provided by NOAA, NSF, Southern California Edison, the Marine Conservation Research Institute of the Aquarium of the Pacific, Kings Seafood, and Santa Monica Seafood. The first four reports - (1) Coastal Hazards, (2) Ecosystems and Fisheries, (3) Critical Condition: Ocean Health and Human Health, and (4) Pollution-are based very loosely on booklets in the National Academies Ocean Science Series which can be found at http://dels.nas.edu/osb. Other reports based upon the conference will be added to this Aquarium of the Pacific website.

Details: S.L.: 2009. 36p.

Source: Internet Resource: Accessed April 20, 2019 at: http://www.aquariumofpacific.org/images/mcri_uploads/Pollution-Ocean.pdf

Year: 2009

Country: International

Keywords: Environmental Crime

Shelf Number: 155478


Author: United Nations Environment Programme

Title: The State of Knowledge of Crimes that have Serious Impacts on the Environment

Summary: Magnitude of the Problem Statistics and data Environmental crimes are widely recognised as among some of the most profitable forms of transnational criminal activity. The monetary value of these crimes is estimated at between USD 91-259 billion annually, most likely the fourth largest criminal area in the world after drugs, counterfeits and human trafficking. The estimate corresponds to a 26% increase compared to the previous estimate in 2014, with the annual rates of such crimes expected to further increase by 5-7% (Nellemann et al., 2016). Illegal activities that involve the environment, biodiversity, or natural resources are often lucrative and involve comparatively low risks for criminals (INTERPOL-UNEP, 2016). This may be explained, in part, by the fact that environmental crimes have previously not been regarded as a priority in some countries, which has resulted in a lack of appropriate and proportionate governmental response. In effect, many authorities lack the expertise and resources required to effectively prevent, detect, and investigate environmental crimes, or even measure their magnitude. Even when expertise and resources are available, efforts may be compromised by corruption. Moreover, nations generally do not routinely collect, collate, and publish statistical data on environmental crime, environmental offenders, or actions taken against them. (Shover and Routhe, 2005), which in turn provides a significant challenge for both awareness and enforcement alike. Some countries and international organizations have, however, made credible attempts to collect and publish data on environmental crimes. Drivers There are many drivers of environmental crimes, most notably economic benefits, substantial demand, and institutional and regulatory failures that results in impunity. The influence of these drivers might slightly differ depending on the type of environmental crimes. Poverty is also deemed to be an influential element of environmental crimes by facilitating recruitment of low-level perpetrators. Impacts Among their many negative impacts, environmental crimes undermine sustainable development and contribute to the acceleration of climate change, mainly through accelerated tropical deforestation. No less significant, such crimes undermine the rule of law, good governance, and fuel geopolitical conflicts. In many cases, environmental crimes deprive governments of vast revenues that could have been used to support development and undercut legitimate businesses and markets. Added to these impacts is the fact that organised criminals often exploit impoverished communities by employing citizens to facilitate or commit environmental crimes. Given the reduced job opportunities available to these individuals, they may become dependent upon criminal networks for survival. These impacts point to the need for the international community to recognise environmental crimes as serious threats to peace and sustainable development, to strengthen the environmental rule of law and adopt and implement coordinated measures to effectively combat environmental crimes.

Details: New York, NY: United Nations Environmental Programme, 2018. 110p.

Source: Internet Resource: Accessed April 20, 2019 at: https://www.unenvironment.org/resources/publication/state-knowledge-crimes-have-serious-impacts-environment

Year: 2018

Country: International

Keywords: Environmental Crimes

Shelf Number: 155479


Author: European Commission

Title: Final Report: International Oceans Governance - Scientific Support

Summary: The United Nations Sustainable Development Goals (SDGs) and the associated targets for achieving them are tailored to create sustainable change in five important areas, namely; People, Planet, Prosperity, Peace and Partnership. The SDGs officially came into force on 1st January 2016 and, although not legally binding, over the next fifteen years governments are expected to take ownership and create the frameworks to facilitate their implementation and monitor progress as part of the 2030 Agenda for Sustainable Development. Specific implementation and success on achieving the SDG Goals will rely on the country's own sustainable development policies, plans and organisations. It is recognised that creating concrete and workable plans at country level will be a challenge and is expected to be a greater challenge for developing countries. Each country will have the primary responsibility for follow-up and review, at the national, regional and global levels, with regard to the progress made in implementing the Goals and targets. The 2016 SDG progress report recognises these challenges, highlighting that "enhancing support to developing countries, in particular the Least Developed Countries and the Small Island Developing States, is fundamental to equitable progress for all". More recently, the high-level United Nations Oceans Conference (5-9 June, 2017) adopted a call for action and provided an opportunity for coastal States to build new partnerships and make voluntary commitments. In addition, the European Union (EU) hosted the 4th edition of the Our Ocean conference in Malta, 5-6 October. This event led to 437 tangible and measurable commitments with a value of EUR 7.2 billion in financial pledges and 2.5 million km2 of additional Marine Protected Areas (MPAs). Some of the challenges of implementing the SDGs relate to the need to improve data collection, integrate key aspects of the SDG vision into national plans, and develop robust frameworks for assessing and measuring progress. The latter has been the focus of a UN Inter-Agency Expert Group (IAEG) tasked with developing a global indicator framework for the post-2015 development agenda, and to support its implementation. It is envisaged that this framework will be complemented by regional and national indicators developed by the States. In line with the five important areas, SDG 14 recognises the importance of the conservation and sustainable use of the oceans and seas and of their resources for sustainable development, including through their contributions to poverty eradication (SDG 1), food security and creation of sustainable livelihoods and decent work (SDG 2), sustained economic growth (SDG ), while at the same time protecting biodiversity and the marine environment and addressing the impacts of climate change and sets targets that aim to promote sustainable use, inclusivity, resilience, and equitable distribution of benefits (SDG 12). In terms of providing support to the countries that might need it most, and specifically relating to SDG 14, a number of initiatives support the SDG agenda, including the United Nations Open-ended Informal Consultative Process on Oceans and the Law of the Sea and the Convention for Biological Diversity (CBD) Sustainable Ocean Initiative as well as a number of other initiatives under the Commonwealths' Enhancing Ocean Governance Goal and Fisheries Governance and Trade Programmes of the Comprehensive Africa Agriculture Develop Programme (CAADP).

Details: Brussels, Belgium: European Commission, 2018. 264p.

Source: Internet Resource: Accessed April 20, 2019 at: https://publications.europa.eu/en/publication-detail/-/publication/a52a5f65-832b-11e8-ac6a-01aa75ed71a1/language-en

Year: 2018

Country: International

Keywords: Environmental Criminology

Shelf Number: 155477


Author: United Nations Environment Programme

Title: Environmental Rule of Law: First Global Report

Summary: Executive Summary If human society is to stay within the bounds of critical ecological thresholds, it is imperative that environmental laws are widely understood, respected, and enforced and the benefits of environmental protection are enjoyed by people and the planet. Environmental rule of law offers a framework for addressing the gap between environmental laws on the books and in practice and is key to achieving the Sustainable Development Goals. Environmental laws have grown dramatically over the last three decades, as countries have come to understand the vital linkages between environment, economic growth, public health, social cohesion, and security. As of 2017, 176 countries have environmental framework laws; 150 countries have enshrined environmental protection or the right to a healthy environment in their constitutions; and 164 countries have created cabinet-level bodies responsible for environmental protection. These and other environmental laws, rights, and institutions have helped to slow - and in some cases to reverse -environmental degradation and to achieve the public health, economic, social, and human rights benefits that accompany environmental protection. The 1972 United Nations Conference on the Human Environment brought the global environment into the public consciousness, leading to the establishment of the United Nations Environment Programme. Following the 1992 United Nations Conference on Environment and Development (known as the Rio Earth Summit), many countries made a concerted effort to enact environmental laws, establish environment ministries and agencies, and enshrine environmental rights and protections in their national constitutions. By the 2012 United Nations Conference on Sustainable Development, the focus had shifted to implementation of environmental laws, which is where progress has waned. Too often, implementation and enforcement of environmental laws and regulations falls far short of what is required to address environmental challenges. Laws sometimes lack clear standards or necessary mandates. Others are not tailored to national and local contexts and so fail to address the conditions on the ground. Implementing ministries are often underfunded and politically weak in comparison to ministries responsible for economic or natural resource development. And while many countries are endeavouring to strengthen implementation of environmental law, a backlash has also occurred as environmental defenders are killed and funding for civil society restricted. These shortfalls are by no means limited to developing nations: reviews of developed nations have found their performance on environmental issues lacking in certain respects. In short, environmental rule of law is a challenge for all countries. This Report discusses the range of measures that countries are adopting to address this implementation gap - and to ensure that rule of law is effective in the environmental sphere. As the first assessment of the global environmental rule of law, this Report draws on experiences, challenges, viewpoints, and successes of diverse countries around the world, highlighting global trends as well as opportunities for countries and partners to strengthen the environmental rule of law. The Report highlights the need to undertake a regular global assessment of the state of environmental rule of law. To track progress nationally and globally, it is necessary to utilize a set of consistent indicators. The Report proposes an indicator framework for environmental rule of law and highlights existing datasets that may be utilized in support of the global assessment. The Report also calls for a concerted effort to support countries in pilot testing approaches to strengthen environmental rule of law. Such an initiative could support testing of approaches in diverse contexts, and then adapting them before scaling them up. It should also foster exchange of experiences between jurisdictions to foster learning. In addition to these two cross-cutting recommendations, the Report highlights numerous actionable steps that States can take to support environmental rule of law. For example, States can evaluate the current mandates and structure of environmental institutions to identify regulatory overlap or underlap. States and partners can build the capacity of the public to engage thoughtfully and meaningfully with government and project proponents. They can prioritize protection of environmental defenders and whistleblowers. States may consider the creation of specialized environmental courts and tribunals, and use administrative enforcement processes to handle minor offenses. And there is an ongoing need to research which approaches are effective under what circumstances. The benefits of environmental rule of law extend far beyond the environmental sector. While the most direct effects are in protection of the environment, it also strengthens rule of law more broadly, supports sustainable economic and social development, protects public health, contributes to peace and security by avoiding and defusing confict, and protects human and constitutional rights. As such, it is a growing priority for all countries.

Details: New York: United Nations Environment Programme, 2019. 306p.

Source: Internet Resource: Accessed April 20, 2019 at: https://www.unenvironment.org/resources/assessment/environmental-rule-law-first-global-report

Year: 2019

Country: International

Keywords: Environmental Crime

Shelf Number: 155481


Author: Lundgren, Karin

Title: The Global Impact of E-Waste: Addressing the Challenge

Summary: Executive Summary Electrical and electronic waste (e-waste) is currently the largest growing waste stream. It is hazardous, complex and expensive to treat in an environmentally sound manner, and there is a general lack of legislation or enforcement surrounding it. Today, most e-waste is being discarded in the general waste stream. Of the e-waste in developed countries that is sent for recycling, 80 per cent ends up being shipped (often illegally) to developing countries such as China, India, Ghana and Nigeria for recycling. Within the informal economy of such countries, it is recycled for its many valuable materials by recyclers using rudimentary techniques. Such globalization of e-waste has adverse environmental and health implications. Furthermore, developing countries are shouldering a disproportionate burden of a global problem without having the technology to deal with it. In addition, developing countries themselves are increasingly generating significant quantities of e-waste. This paper explores the volumes, sources and flows of e-waste, the risks it poses to e-waste workers and the environment, occupational safety and health (OSH) issues, labour issues and regulatory frameworks, and links this growing global problem with the International Labour Organisation (ILO)'s current and future work. It is clear that the future of e-waste management depends not only on the effectiveness of local government authorities working with the operators of recycling services but also on community participation, together with national, regional and global initiatives. The solution to the e-waste problem is not simply the banning of transboundary movements of e-waste, as domestic generation accounts for a significant proportion of e-waste in all countries. Fundamental to a sustainable solution will be tackling the fact that current practices and the illegal trade provide economic stimulus. It is important to recognize local and regional contexts and the social implications of the issue; implementing a high-tech, capital-intensive recycling process will not be appropriate in every country or region. Effective regulation must be combined with incentives for recyclers in the informal sector not to engage in destructive processes. Cheap, safe and simple processing methods for introduction into the informal sector are currently lacking; hence, it is necessary to create a financial incentive for recyclers operating in the informal sector to deliver recovered parts to central collection sites rather than process them themselves. Multidisciplinary solutions are vital in addition to technical solutions, as is addressing the underlying social inequities inherent in the e-waste business. Recycling operations in the informal sector of the economy enable employment for hundreds of thousands of people in poverty. A possible entry point to address their negative impacts is to address occupational risks, targeting poverty as the root cause of hazardous work and, in the process, developing decent working conditions. More generally, solutions to the global e-waste problem involve awareness-raising among both consumers and e-waste recyclers in the informal economy, integration of the informal sector with the formal, creating green jobs, enforcing legislation and labour standards, and eliminating practices which are harmful to human health and the environment. It is also imperative to target electrical and electronics manufacturers by introducing Extended Producer Responsibility (EPR) legislation and encouraging initial designs to be green, long lived, upgradeable and built for recycling. In considering solutions to the e-waste problem, this paper focuses on worker protection through appropriate legislation, formalization of the informal recycling sector and the opportunities represented by cooperative organization of e-waste workers.

Details: Geneva, Switzerland: International Labour Office, 2012. 72p.

Source: Internet Resource: Accessed April 20, 2019 at: https://www.ilo.org/sector/Resources/publications/WCMS_196105/lang--en/index.htm

Year: 2012

Country: International

Keywords: E-Waste

Shelf Number: 155482


Author: Puckett, Jim

Title: Disconnect: Goodwill and Dell, Exporting the Public's E-Waste to Developing Countries

Summary: The international toxic trade watchdog organization, Basel Action Network (BAN), released a new report today following a two­-year study that involved placing electronic GPS tracking devices into old hazardous electronic equipment such as printers, and computer monitors, and then watching where they travelled across the globe. The report, the first to be released from the project is entitled Disconnect: Goodwill and Dell Exporting the Public's E-­waste to Developing Countries, and is released in conjunction with the airing of a PBS NewHour segment entitled The Circuit, as well as an MIT interactive website which graphically shows the overall movement of the tracked devices. BAN’s e­Trash Transparency Project so far has delivered 200 trackers across the US to places where the public is likely to take their old electronics to be recycled – such as recyclers and Goodwill stores. The results are in and we now see that instead of being recycled, 65 (32.5%) of these devices, were exported overseas on container ships. Most of them went to Asia, and most were traded in likely violation of the laws of the importing countries. Of the 149 trackers delivered just to recyclers, 39% of these were exported. As a particular focus of the study and the Disconnect report, 46 of the 200 tracker ­planted electronic devices were delivered to Goodwill Industries stores across the United States. Seven of these later reported their whereabouts in the Asian countries of Thailand, Taiwan, and China (Mainland and Hong Kong). Six of these were part of Dell, Inc.'s Reconnect partnership with Goodwill. Instead of being recycled in the United States as their customers were promised, these devices were exported in violation of Dell's strict policies, and were likely illegal under the laws of the importing countries. The report takes issue with the fact that Goodwill does not even have a policy against export to developing countries, and Dell surprisingly refuses to tell the public whom their recyclers are. As part of the study, BAN traveled to the locations where the Goodwill and Dell and other trackers ended up, even retrieving one of them. Most arrived in the rural mainland border area, New Territories in Hong Kong. In this area the devices arrived at many informal, outdoor junkyards. These unpermitted facilities exposed illegal immigrant laborers and the environment as the workers smash equipment releasing toxic mercury from the LCD monitors or toxic toners from the printers. BAN intends to continue the use of tracking technology, as they believe its use will play a pivotal role in holding an errant and troubled electronics recycling industry to account. They will also make this service available to other civil society organizations, governments, as well as large enterprises.

Details: Seattle, Washington: Basel Action Network, 2016. 114p.

Source: Internet Resource: Accessed April 20, 2019 at: https://www.ban.org/trash-transparency

Year: 2016

Country: International

Keywords: Criminal Networks

Shelf Number: 155483


Author: Basel Action Network

Title: E-Tech: E-Waste Management at EcoPark

Summary: This report highlights the special case of e-Tech Management which has been brought to our attention as one of the companies that was recently discovered sending electronic equipment from the US to Hong Kong. e-Tech had been well known to BAN for over a decade as a serial exporter of North American waste with facilities in Ohio and in British Columbia. And it was not surprising to see their export business model continued with our recent tracker placed with them in Texas (see Appendix 1). What was more surprising to us was the realization that e-Tech enjoyed the blessing of the EPD which had featured them at their EcoPark. We decided to do more research. What we have learned is an important story revealing the larger context and longer history far beyond the simple export description. We believe this entire e-Tech picture is worth examining as it is sadly illustrative of the Hong Kong Environmental Protection Department's (EPD) lack of proper diligence when it comes to enforcing the environmental laws applicable to e-Waste importation and management. This story raises many questions -- all in need of answers.

Details: Seattle, Washington: Basel Action Network, 2018. 23p.

Source: Internet Resource: Accessed April 20, 2019 at: http://wiki.ban.org/images/2/29/E-Tech_e-Waste_Mismanagement_at_EcoPark.pdf

Year: 2018

Country: International

Keywords: E-Tech

Shelf Number: 15484


Author: Basel Action Network

Title: The

Summary: INTRODUCTION The BAN e-Trash Transparency Project In 2016, BAN published its groundbreaking reports entitled "Disconnect: Goodwill and Dell, Exporting the Public's E-Waste to Developing Countries," (May) and "Scam Recycling: e-Dumping on Asia by US Recyclers," (September). These reports followed several years of research, development and implementation of GPS/cell phone-based tracking technology. They involved placing 205 different GPS tracking devices inside of old printers, LCD, and CRT monitors, delivering them to US charities, retailers and recyclers and following them to their endpoints across the globe. Such research activities and subsequent publication of the results can be said to be a form of citizen enforcement because the trade of hazardous wastes, including most electronic waste, to developing countries from developed countries is illegal under international norms (Basel Convention) and under laws of most developed countries. Certainly, under the rules of the Basel Convention, it is illegal for developing countries to import hazardous e-wastes from the United States. 96% of the exports revealed by BAN 's 2016 study were deemed as likely illegal. The study as summarized in "Scam Recycling" witnessed 34% of the 205 deployments moving offshore with 31% of the total going to developing countries. Looking at those that were exported only 93% of the exports went to developing countries. 87% to Asia, 3% to Africa and 1% to the Middle East, and 1% to the Latin America/Caribbean region. 7% moved to the developed countries of Mexico and Canada. Most of the exports ended up in Hong Kong's rural northern area called New Territories. BAN's investigators visited GPS locations where the trackers ended up and found hundreds of e-waste junkyards in New Territories where the hazardous equipment is unfortunately smashed by hand, exposing workers to dangerous mercury laden dust, vapors and hazardous toners. Much of the e-waste was simply dumped in fields and wastelands. Of the 152 trackers delivered directly to recyclers and not to charities, 40% were exported significantly higher than the 15% rate for the 53 trackers delivered to charities or retailers. In the course of the entire pathways (chains) of the 205 tracker movements, the trackers passed through the hands of 168 different identifiable US recyclers. Of these companies, over 45% were part of a movement that went offshore (export chain). That study revealed also that R2 certified recyclers had a higher-than-average export rate. Uncertified recyclers had a lower-than-average export rate, and e-Stewards Certified Recyclers had the lowest average export rate of all three categories. With respect to the Certifications held by the "last holder" (apparent exporter), R2 exceeded e-Stewards 9-1. Finally, the report reveals the false claims and "green washing" of many of the companies that claim that they never would allow the public's waste electronics to be exported. The complete reports and media generated from them, including the PBS Newshour video segment that followed BAN to Hong Kong, can be found on our website's Trash Transparency Project pages. These reports include in detail, a full disclosure of the study findings including lists of all companies involved, the environmental harm caused, methodology, conclusions, and recommendations. BAN's work tracking e-waste in the United States and around the world with GPS trackers continues. BAN's ethical recycling certification program known as e-Stewards now uses trackers routinely to verify performance of the trade requirements in the standard (e.g. no export of hazardous e-waste to developing countries). At the same time, BAN continues to deploy trackers across North America to reveal for consumers and lawmakers alike, the illegal and/or unethical trade practices of some recyclers. It is our intention to continue to report on these trackers. The most recent deployment involved 60 trackers deployed in Texas, Georgia, and Florida in the US. 31 of these were R2 Certified (52%), 4 were both e-Stewards and R2 (6.66%), 1 was eStewards only (1.67 percent), and 24 were uncertified (40%). On September 6 of 2017, the first update of new tracker findings since our September 15, 2016 report was published. In that report we revealed 16 more chains of export (15 LCD monitors and one printer) involving 7 target recycling companies. 5 of these were in California, one in Ohio and one in Texas. An additional two companies (Skill Office Machines and VKL Exports) were also identified.

Details: Seattle, Washington: Basel Action Network, 2017. 18p.

Source: Internet Resource: Accessed April 20, 2019 at: http://wiki.ban.org/images/1/13/TheScamRecyclingContinuesUpdate_1.pdf

Year: 2017

Country: International

Keywords: E-Waste

Shelf Number: 155487


Author: Basel Action Network

Title: The "Scam Recycling" Continues: E-Waste Exportation from the U.S. to Developing Countries Update Number 2

Summary: INTRODUCTION The BAN e-Trash Transparency Project In 2016, BAN published its groundbreaking reports entitled "Disconnect: Goodwill and Dell, Exporting the Public's E-Waste to Developing Countries," (May) and "Scam Recycling: e-Dumping on Asia by US Recyclers," (September). These reports followed several years of research, development and implementation of GPS/cell phone-based tracking technology. They involved placing 205 different GPS tracking devices inside of old printers, LCD, and CRT monitors, delivering them to US charities, retailers and recyclers and following them to their endpoints across the globe. Such research activities and subsequent publication of the results can be said to be a form of citizen enforcement because the trade of hazardous wastes, including most electronic waste, to developing countries from developed countries is illegal under international norms (Basel Convention) and under laws of most developed countries. Certainly, under the rules of the Basel Convention, it is illegal for developing countries to import hazardous e-wastes from the United States. 96% of the exports revealed by BAN 's 2016 study were deemed as likely illegal. The study as summarized in "Scam Recycling" witnessed 34% of the 205 deployments moving offshore with 31% of the total going to developing countries. Looking at those that were exported only 93% of the exports went to developing countries. 87% to Asia, 3% to Africa and 1% to the Middle East, and 1% to the Latin America/Caribbean region. 7% moved to the developed countries of Mexico and Canada. Most of the exports ended up in Hong Kong's rural northern area called New Territories. BAN's investigators visited GPS locations where the trackers ended up and found hundreds of e-waste junkyards in New Territories where the hazardous equipment is unfortunately smashed by hand, exposing workers to dangerous mercury laden dust, vapors and hazardous toners. Much of the e-waste was simply dumped in fields and wastelands. Of the 152 trackers delivered directly to recyclers and not to charities, 40% were exported significantly higher than the 15% rate for the 53 trackers delivered to charities or retailers. In the course of the entire pathways (chains) of the 205 tracker movements, the trackers passed through the hands of 168 different identifiable US recyclers. Of these companies, over 45% were part of a movement that went offshore (export chain). That study revealed also that R2 certified recyclers had a higher-than-average export rate. Uncertified recyclers had a lower-than-average export rate, and e-Stewards Certified Recyclers had the lowest average export rate of all three categories. With respect to the Certifications held by the "last holder" (apparent exporter), R2 exceeded e-Stewards 9-1. Finally, the report reveals the false claims and "green washing" of many of the companies that claim that they never would allow the public's waste electronics to be exported. The complete reports and media generated from them, including the PBS Newshour video segment that followed BAN to Hong Kong, can be found on our website's Trash Transparency Project pages. These reports include in detail, a full disclosure of the study findings including lists of all companies involved, the environmental harm caused, methodology, conclusions, and recommendations. In this latest update report we have identified six new chains of export (involving four printers and two LCDs) involving six new US recycling companies. Three of these were in Texas, one in Georgia, and two in Florida. We have also included an update on a company - CompuCycle that we reported in our first update. We have included it here as its tracked printer has since moved to a new country - Pakistan. But we have not included it in the table below in order to keep our running tally of chains of export accurate. This report also shows that the City of Houston was involved in export via their approved collection center. A listing in this report of a company does not necessarily imply culpability. However, companies that are the "last" handlers prior to export are likely willfully involved in exporting, as they most likely had direct control over the decision to export or not. For this reason, we call these actors "apparent exporters."

Details: Seattle, Washington: Basel Action Network, 2018. 18p.

Source: Internet Resource: Accessed April 20, 2019 at: https://www.ban.org/trash-transparency

Year: 2018

Country: International

Keywords: E-Waste

Shelf Number: 155488


Author: Brigden, K

Title: Recycling of Electronnic Wastes in China and India: Workplace and Environmental Contamination

Summary: Executive Summary Introduction Expansion of the global market for electrical and electronic products continues to accelerate, while the lifespan of the products is dropping, resulting in a corresponding explosion in electronic scrap. As noted by UNEP (2005): "Every year, 20 to 50 million tonnes of electrical and electronic equipment waste ("e-waste") are generated world-wide, which could bring serious risks to human health and the environment. While 4 million PCs are discarded per year in China alone." This rapidly growing "e-waste" stream presents additional difficulties because a wide range of hazardous chemicals are, or have in the past been, used in components of electrical and electronic devices, and these subsequently create substantial problems with regard to handling, recycling and disposal of obsolete products. The European Union (EU), Japan, South Korea,Taiwan and several states of the USA have introduced legislation making producers responsible for their end-of-life products. The EU has banned the use of certain hazardous substances in electrical and electronic products from July 2006, to facilitate safer recycling. For the present, however, the "e-waste" recycling sector in many parts of Asia remains largely unregulated. It is also poorly studied with regard to its impacts on the environment and on the health of recycling workers and surrounding communities. design of the study This study was designed to provide a snapshot of workplace and environmental contamination from a selection of industrial units and dump sites associated with the electronic waste-recycling sector in China and India. A total of more than 70 samples were collected during March 2005 from sites located in the vicinity of Guiyu Town, Guangdong Province in southern China and in the suburbs of New Delhi, India. Samples included industrial wastes, indoor dusts, soils, river sediments and groundwater from typical sites representing all major stages routinely employed in the dismantling, recycling and final disposal of electrical and electronic wastes (i.e. storage, component separation, plastic shredding, acid processing/leaching, open burning and residue dumping) in both countries. summary of key findings Results confirm that all stages in the processing of electrical and electronic wastes have the potential to release substantial quantities of toxic heavy metals and organic compounds to the workplace environment and, at least to the extent studied, also to surrounding soils and water courses. Among the toxic heavy metals most commonly found in elevated levels in wastes from the industry, as well as in indoor dusts and river sediments, were those known to have extensive use in the electronics sector, i.e. lead and tin, most probably arising in large part from solder and, in the case of lead, batteries - copper, for example from wires and cables - cadmium, from a variety of uses including batteries and solder joints - antimony, most probably from use of antimony trioxide as a flame retardant additive in plastics and resins as well from use in electrical solders. Many other metals associated with the electronics industry were also relatively abundant in many samples, including barium, chromium, cobalt, gold, mercury, nickel, silver and zinc. The range of organic contaminants identified in waste and sediment samples also reflected current or historical use in electrical and/or electronic goods, including brominated, chlorinated and phosphorus-based flame retardants, phthalate esters and esters of long-chain organic acids. Polybrominated diphenyl ethers (PBDEs) and polychlorinated biphenyls (PCBs) were particularly in evidence, as well as many other organic chemicals, some containing chlorine or bromine, which could not be reliably identified. Given the crude methods employed in much of the recycling sector investigated, it is likely that some of these chemicals arose as products of incomplete combustion or of chemical reactions occurring in complex mixed wastes. Key results according to the different activities and processes employed in the "e-waste" recycling sector in both China and India, as well as brief information on the hazards of some of the chemical groups investigated, are summarised below.

Details: Exeter, United Kingdom: University of Exeter, 2005. 56p.

Source: Internet Resource: Accessed April 20, 2019 at: https://www.greenpeace.org/austria/Global/austria/marktcheck/uploads/media/report_recycling_electronic_waste_2005.pdf

Year: 2005

Country: International

Keywords: Asia

Shelf Number: 155490


Author: Macfadyen, Graeme

Title: Abandoned, Lost or Otherwise Discarded Fishing Gear

Summary: Abandoned, lost or otherwise discarded fishing gear (ALDFG) is a problem that is increasingly of concern. Various United Nations General Assembly resolutions now provide a mandate for, and indeed require, action to reduce ALDFG and marine debris in general. Consequently, the United Nations Environment Programme (UNEP) and the Food and Agriculture Organization of the United Nations (FAO) entered into an agreement to carry out a study in relation to ALDFG in order to raise awareness of the extent of the problem and to recommend action to mitigate the problem of ALDFG by flag states, regional fisheries management bodies and organizations, and international organizations, such as UNEP, the International Maritime Organization (IMO) and FAO. This report reviews the magnitude and composition of ALDFG, and while noting that information is not comprehensive and does not allow for any global estimates, suggests that gillnets and fishing traps/pots may be the most common type of ALDFG, although netting fragments may also be common in some locations. The impacts of ALDFG are also considered and include: continued catching of target and non-target species (such as turtles, seabirds and marine mammals); alterations to the benthic environment; navigational hazards; beach debris/litter; introduction of synthetic material into the marine food web; introduction of alien species transported by ALDFG; and a variety of costs related to clean-up operations and impacts on business activities. In general, gillnets and pots/traps are most likely to "ghost fish" while other gear, such as trawls and longlines, are more likely to cause entanglement of marine organisms, including protected species, and habitat damage. The factors which cause fishing gear to be abandoned, lost or otherwise discarded are numerous and include: adverse weather; operational fishing factors including the cost of gear retrieval; gear conflicts; illegal, unregulated and unreported (IUU) fishing; vandalism/theft; and access to and cost and availability of shoreside collection facilities. Weather, operational fishing factors and gear conflicts are probably the most significant factors, but the causes of ALDFG accumulation are poorly documented and not well understood. A detailed understanding of why gear is abandoned, lost or discarded is needed when designing and tailoring effective measures to reduce ALDFG in particular locations. A variety of measures are currently in place to reduce ALDFG, and these are profiled in this report. They include those which are preventative or ex-ante, and those which are curative or ex-post. Evidence suggests that while both are important, much of the emphasis to date has been placed on curative measures such as gear retrieval programmes and clean-up of beach litter, while preventative measures may generally be more cost-effective in reducing ALDFG debris and its impacts. This report concludes with a number of recommendations for future action to reduce ALDFG debris, be it on a mandatory or voluntary basis. It also considers at what scale and which stakeholders (e.g. international organizations, national government, the private sector, research institutions) might be best placed to address the wide range of possible measures to reduce the amount of ALDFG debris.

Details: Rome, Italy: United Nations Environment Programme, 2009. 117p.

Source: Internet Resource: Accessed April 20, 2019 at: http://www.fao.org/3/i0620e/i0620e00.htm

Year: 2009

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 155493


Author: Gilman, Eric

Title: Abandoned, Lost or Otherwise Discarded Gillnets and Trammel Nets: Methods to Estimate Ghost Fishing Mortality, and the Status of Regional Monitoring and Management

Summary: The ecological and socio-economic problems caused by abandoned, lost and discarded fishing gear (ALDFG) are increasingly of concern. Used primarily by coastal, artisanal, small-scale fisheries worldwide, marine gillnets and trammel nets, which have relatively high ghost fishing potential, account for about one-fifth of global marine fisheries landings. FAO and the Global Programme of Action for the Protection of the Marine Environment from Land-based Activities, hosted by the United Nations Environment Programme, as Secretariat for the Global Partnership on Marine Litter, commissioned this study to identify best practices to estimate ghost fishing mortality rates and levels, priority research needs, and the status of international monitoring and management of ALDFG and ghost fishing by marine gillnet and trammel net fisheries. Accurate estimates of total ghost fishing mortality levels can be made given quality data on the density of ALDFG retaining fishing efficiency, duration of ghost fishing efficiency, and total ghost fishing mortality level of a unit of effort of ALDFG over the full period that the derelict gear retains fishing efficiency. Recommendations to improve estimates of regional and global rates and levels of ghost fishing from ALDFG from marine gillnet and trammel net fisheries were made. An assessment was made and opportunities were identified to improve intergovernmental organizations' data collection protocols and management measures to prevent and remediate ALDFG and ghost fishing by marine gillnets and trammel nets.

Details: Rome, Italy: United Nations Environment Programme and Food and Agriculture Organization of the United Nations, 2016. 96p.

Source: Internet Resource: Accessed April 20, 2019 at: http://www.fao.org/3/a-i5051e.pdf

Year: 2016

Country: International

Keywords: Crimes Against the Environment

Shelf Number: 155494


Author: Bos, Marieke

Title: The Pawn Industry and Its Customers: The United States and Europe

Summary: As humankind's oldest financial institution, pawnbroking has served the financial needs of low-income families for centuries. Recently, and especially in the last five years, an increasing number of consumers have relied on pawnbrokers to help them meet daily financial needs. Seven percent of all U.S. and four percent of all Swedish households have used pawn credit at one time or another. Despite the general public's increased interest in the pawn industry, evidenced by the popularity of reality television shows like "Pawn Stars" and "Hard Core Pawn," economists have paid surprisingly little attention to the pawnbroking industry and pawnshop borrowers. We start by reviewing the history of pawn credit and the sparse economic literature on pawnbroking, and then present unique U.S. transaction data and Swedish register data to, first, show aggregate trends, and, second, shed light on the social and financial background of pawnshop borrowers and their behavior within the pawnbroking industry in both countries. We find that the pawnbroking industry and pawnshop borrowers are unexpectedly similar in the United States and Sweden.

Details: Nashville, TN: The Authors, 2012. 29p.

Source: Internet Resource: Vanderbilt Law and Economics Research Paper No. 12-26: Accessed April 25, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2149575

Year: 2012

Country: International

Keywords: Fringe Banking

Shelf Number: 155519


Author: Katz, Leora Dahan

Title: Response Retributivism: Defending the Duty to Punish

Summary: Punishment presents a problem. While we generally believe that intentionally harming others is impermissible, it is widely presumed that this problem can be overcome in the case of punishment. Nonetheless, many worry about the justification of excessive punishment, especially given the state of criminal justice today. This paper offers a moderate retributive justification of punishment that avoids many of the classic problems associated with retributive theories, while retaining their intuitively compelling answer to the problem of punishment. The response-retributive theory proposed restructures traditional retributive theories: rather than relying on offender-centric reasons for punishment, response retributivism offers a punisher-centric justification, which takes the role of the punisher as well as the relations between the wrongdoer and punisher as central to the justification of punishment. The paper proposes that punishment is justified in terms of the ethics of appropriate response to wrongdoing and the duty that those in relevant relations with the wrongdoer have to dissociate from the devaluation inherent in the wrongdoer's action. It demonstrates that on such account, while the harm and suffering involved in punishment is rightly imposed, it is not "good." This open a space to argue for the relevance of a second duty in the context of punishment: the duty to mitigate our retributive practices. The paper demonstrates that the proposed theory offers a unitary theory of punishment, which has the resources to justify not only criminal punishment, but punishment as it is imposed across all relations: private, institutional and public. It thus further provides a springboard for grounding claims regarding requisite punishment in non-state institutions (e.g. academic institutions and sports clubs) and private contexts as well.

Details: Unpublished paper, 2018. 46p.

Source: Internet Resource: Accessed April 25, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3264139

Year: 2018

Country: International

Keywords: Desert Theory

Shelf Number: 155523


Author: Yukhnenko, Denis

Title: A systematic review of criminal recidivism rates worldwide: 3-year update

Summary: Background: Comparing recidivism rates between countries may provide useful information about the relative effectiveness of different criminal justice policies. A previous 2015 review identified criminal recidivism data for 18 countries and found little consistency in outcome definitions and time periods. We aimed to update recidivism rates in prisoners internationally. Methods: We conducted a systematic review of criminal recidivism rates in prisoners and followed PRISMA guidelines. Using three bibliographic indexes, we carried out non-country-specific and targeted searches for 50 countries with the largest total prison populations. We included reports and studies of released prisoners that reported re-arrest, reconviction and reincarceration rates. Meta-analysis was not possible due to multiple sources of heterogeneity. Results: We identified criminal recidivism information for 23 countries. Of the 50 countries with the largest prison populations, 10 reported recidivism rates for prisoners. The most commonly reported outcome was the 2-year reconviction rate. We were able to examine recidivism over different time periods for 11 countries and found that most reported small changes in official recidivism rates. Overall, for 2-year follow-up period, reported re-arrest rates were between 26% and 60%, reconviction rates ranged from 20% to 63%, and reimprisonment rates varied from 14 to 45%. Conclusions: Although some countries made efforts to improve reporting, recidivism rates are not comparable between countries. Criminal justice agencies should consider using reporting guidelines described here to update their data. Keywords

Details: Wellcome Open Research, 2019, 4:28. 12p.

Source: Internet Resource: Internet Resource: Accessed April 25, 2019 at: https://d212y8ha88k086.cloudfront.net/manuscripts/16329/a6346545-8c27-45fd-9af8-defde4571266_14970_-_denis_yukhnenko.pdf?doi=10.12688/wellcomeopenres.14970.1&numberOfBrowsableCollections=2&numberOfBrowsableGateways=9

Year: 2019

Country: International

Keywords: Recidivism

Shelf Number: 155524


Author: Global Detention Project

Title: Global Detention Project Annual Report 2018

Summary: As representatives from countries around the world prepared to meet in Marrakesh to adopt the Global Compact for Safe, Orderly and Regular Migration in December 2018, a first-of-its-kind global agreement for humanely managing migration, negotiations became overshadowed by the news that a handful of states-including, notably, the United States, Australia, and a host of European countries-would refuse to sign it. The naysayers worried that the agreement would threaten their sovereignty and that its mention of the human rights of migrants would limit their ability to ramp up border security. "No to Marrakesh! - The UN's Sinister Blueprint for Globalist Migration Hell," clamoured the headline of one widely circulated oped in the United States. Although the compact was approved by the vast majority of states, the widespread fear-mongering spurred by the non-binding agreement reveals the hostility that migrants, asylum seekers, and refugees continue to face across the globe, even as many "crises" have faded. States continue to rely heavily on detention and deportation in their response to irregular migration, including using detention as a deterrent, despite a lack of evidence showing its effectiveness. From the de facto detention centres in Hungary's transit zones and Malaysia's grim migration "depots" where hundreds have died of preventable diseases in recent years, to Libya's nightmarish EU-financed migrant prisons and Mexico's burgeoning network of estaciones migratorias, countless thousands are locked behind bars and placed in extreme vulnerability every day across our planet solely because of their immigration status. Consider this: As of 21 December 2018, Saudi Arabia had arrested 1,996,069 people during the year as part of its "Homeland Without Illegals Campaign." Who knows about this? All too often, authorities fail to disclose information and statistics concerning their detention operations, and facilities are operated under deceptive forms and guises-they can be called "residential centres," "guesthouses," "hotspots," "shelters." This lack of transparency shields states from scrutiny and reforms. The need for detailed, systematic information about who is being deprived of their liberty, where they are locked up, and the conditions they face in detention are greater than ever. And the Global Detention Project's work holding governments to account and promoting effective, meaningful reforms remains pivotal. It was the recognition of these needs more than a decade ago that spurred the founding of the Global Detention Project at the Graduate Institute of International and Development Studies in Geneva. Motivated by the goal of measuring the worldwide spread of immigration detention, GDP researchers developed a first-of-its-kind methodology for documenting where people are deprived of their liberty for migration-related reasons.

Details: Geneva, SWIT: Author, 2019. 40p.

Source: Internet Resource: Accessed April 26, 2019 at: https://www.globaldetentionproject.org/wp-content/uploads/2019/04/GDP-AR-2018-Online-V2_compressed.pdf

Year: 2019

Country: International

Keywords: Illegal Immigrants

Shelf Number: 155558


Author: Berman, Eric G.

Title: Beyond Blue Helmets: Promoting Weapons and Ammunition Management in Non-UN Peace Operations

Summary: The United Nations (UN), with 70 years of peacekeeping experience, garners considerable attention in terms of its successes and shortcomings, as well as the increasing number of challenges it faces. This report looks at the experiences of organizations other than the UN that undertake peace operations, which arguably receive less attention. It focuses on the challenges these organizations face in securing their contingent-owned equipment (COE) and the lethal materiel they recover. The study notes that the challenges facing non-UN actors are as great-or greater-than those facing the world body. The scale and scope of diversion of arms and ammunition in peace operations that these organizations undertake is very difficult to assess because of imperfect information. Seizures occur as a result of attacks on fixed sites, patrols, and convoy movements (such as deployments, resupply operations, and transfers of recovered materiel). Blockades and the threat of attacks have also led to the forced abandonment of COE. Peacekeepers' residences are known to have been burgled and arms seized. Materiel has also been stolen during shipment and as a consequence of challenging situations and difficult decisions. Corruption and ill-discipline are additional causes of diversion- of both COE and recovered materiel. These are among the most sensitive and challenging circumstances to document. Nevertheless, it is clear that these various causes have led to the loss of significant quantities of lethal materiel. The Survey has documented at least seven organizations other than the UN that have lost arms and ammunition in missions they have undertaken. Al-Shabaab, Boko Haram, the Taliban, and various al-Qaeda affiliates are among the armed groups that have seized or otherwise acquired these weapons, which include armoured vehicles. Better information would almost certainly result in a longer listing of both the perpetrators of attacks and the organizations and missions that have been sources of arms and ammunition. Some of the organizations listed in this report have measures in place to reduce the loss of materiel; many do not. Many control frameworks, however-even those that are legally binding-are ineffectual. Encouragingly, several organizations have recently undertaken activities or stated their intention to address these shortcomings. Making good on existing commitments and aspirations will take significant resources and years of concerted effort, but meaningful incremental progress can be made in the short term.

Details: Geneva, SWIT: Small Arms Survey, 2019. 83p.

Source: Internet Resource: Accessed April 26, 2019 at: http://www.smallarmssurvey.org/fileadmin/docs/U-Reports/SAS-MPOME-Report-WAM-Non-UN-Peace-Ops.pdf

Year: 2019

Country: International

Keywords: Arms and Ammunitions

Shelf Number: 155557


Author: Donati, Alessandro

Title: World Traffic in Doping Substances

Summary: 1. DOES EVERYONE KNOW WHAT DOPING IS? The English word "doping" is used worldwide but, up to about twenty years ago, only athletes and sports experts were aware of its meaning. Then, year after year, as one case followed closely behind another and involved high-level athletes from different sports disciplines, everyone began to understand it. Doping scandals among sports stars have deeply influenced the dissemination of the term "doping" to the extent that, nowadays, if you were to ask 1,000 people "do you know what doping is?", at least 990 of them would link it to sports and reply that it is a system used by athletes to artificially enhance their performances. Everyone knows that doping is currently used by a relatively significant number of athletes in different sports disciplines. Most people, however, are not aware of the fact that this phenomenon originated outside the world of sport and now extends well beyond it. Two of the purposes of this critical overview of the doping phenomenon are to explain the essentials of its origin and its diverse destinations. Indeed, without this background, it would be impossible to have a comprehensive view of the ramifications and the social hazard that doping entails, and it would be impossible to implement the measures necessary, if not to defeat it, at least to check its development. 1.1 The different origins of doping Researchers created most of the pharmaceutical substances used for doping practices as treatments for specific diseases: such is the case for amphetamines, anabolic steroids, growth hormone or GH, erythropoietin hormone or EPO, other peptide hormones that stimulate endogenous testosterone production, and many other drugs. Also, the doping process most used in sports, blood transfusion or blood doping, originated as an emergency treatment in the case of critical and copious bleeding or a critical reduction in red blood cells. There is also the case of particular stimulants and synthetic testosterone-based drugs -anabolic steroids - that were specifically created to support and increase the aggressiveness of German soldiers fighting, often in extremely stressful environments, in World War II. It is also well known that US pilots used stimulants. Obviously, these drugs were administered by military physicians. Only recently, and as a purely secondary phenomenon, researchers have modified molecules already known in the field of sports doping (for instance, anabolic steroids) so that they cannot be identified and, therefore, would be untraceable in doping tests. This is the case for the modified steroid THG, discovered on the occasion of the BALCO case 4. Another case of modified anabolic steroids was brought to light by the Canadian customs police, who stopped a Russian athlete. Also, the NAS Carabinieri - a unit of the Italian police particularly qualified in anti-doping investigations - recently intercepted boxes of a modified anabolic steroid coming from China in the hands of a criminal organization. 1.2 The various destinations of doping We have already mentioned experiments with drugs carried out, as far back as the 1940s, on soldiers. As we said, these were administered to provide both physical and mental support: on the one hand, they increased physical strength and endurance and, on the other, they lowered the perception of danger and enhanced self-awareness and a sense of belonging to the group. You will find further on in this overview evidence, supported by striking incidents, that doping among soldiers has never ceased. But the distinction between soldiers and other military or paramilitary corps such as policemen, gaolers or firemen is often slight; indeed, doping is widespread among these corps. Just as slight is the distinction between state police and various forms of private police organizations working as security personnel and bodyguards. All these aspects are extensively discussed further on 8. Doping among soldiers and policemen began in the 1940s and became increasingly widespread and progressively heavier and, therefore, more hazardous health-wise. Doping among body builders also has a long background: it began in the USA around 1950. However, while among soldiers the consumption of doping substances occurred only in specific periods of time and, in most cases, the dosage was relatively low, among body builders, who are driven by the irrepressible impulse to increase the size of their muscles, the dosage was significantly higher than the dosage for which these drugs had been tested in the medical field. One can easily imagine the dangerous combination of motivations triggered in a soldier who is also a determined body builder. In the following paragraphs, we shall also discuss how, since the 1970s, cinema influenced, both deliberately and unconsciously, the dissemination of the body builder stereotype. Beginning in those years, doping has become increasingly widespread among actors who need to have a particularly good appearance, especially when the results have to be attained in the few months between casting and the first shoots. Progressively, doping spread to the theatre, to ballet, and even to fashion, so that now it is no longer restricted to actors but involves the whole show business milieu. Doping in sports, on the contrary, did not begin in a specific period but developed alongside sports. It is not necessary to go back to sports in Ancient Greece, with the fraud and the quest for magical potions that characterized a large part of the history of sports. We need only refer to the cases of doping that were brought to light as early as 1904, during the Saint Louis Olympic Games, even though there were no specific tests. From then on, new, increasingly sophisticated forms of doping were developed, closely connected to the development of sports performances, so that it is now impossible to separate and distinguish between the effects of one factor (doping) from the values of the other factor (the operational capacity of athletes, coaches and the entire sports system). Lastly, thanks to these four channels of dissemination - military, show business, body building and sports - pharmaceutical companies became aware, as of the 1970s, of a situation that was surprising and perverse but economically very profitable: a significant number of healthy subjects were willing to consume large quantities of drugs meant for the treatment of various diseases just to look better, although they were aware that, in so doing, they ran the risk of becoming unhealthy. With carefully studied production and distribution strategies on the borderline between legal and illegal practices, some pharmaceutical companies filled the market with huge quantities of drugs, mainly hormones, which were advertised in turn as adjuvant treatment for serious diseases, dietary supplements or wondrous anti-aging remedies. Such improper use of pharmaceutical substances, put into practice by the very industries that were more aware than anyone of these drugs' side effects, is the fifth and last destination stream.

Details: Montreal: World Anti-Coping Agency, 2007. 109p.

Source: Internet Resource: Accessed April 26, 2019 at: https://www.wada-ama.org/sites/default/files/resources/files/WADA_Donati_Report_On_Trafficking_2007.pdf

Year: 2007

Country: International

Keywords: Athletes

Shelf Number: 155559


Author: National Society for the Prevention of Cruelty to Children

Title: Statistics briefing: harmful sexual behaviour

Summary: This briefing looks at what data and statistics are available about harmful sexual behaviour to help professionals, and the organisations they work for, make evidence based decisions. How common is harmful sexual behaviour? We do not know the true number of children and young people affected by harmful sexual behaviour (HSB). HSB covers a wide range of behaviours, many of which do not come to the attention of authorities. However some attempts to estimate the prevalence of HSB have been made using data from children's self-reported experiences of sexual abuse by peers and services which work with children with HSB. From this research we can estimate that around a third of child sexual abuse is by other children and young people. Findings from the data There is some cross-over between online and offline HSB and between child sexual exploitation and HSB. Harmful sexual behaviour is most commonly identified in adolescent boys, but girls and younger children can also exhibit HSB. A significant proportion of children with HSB also have a learning disability. The majority of children with HSB have themselves experienced trauma, including abuse or neglect. The majority of children and young people displaying HSB do not become sexual offenders as adults. Young people who display HSB often experience other emotional, behavioural and peer related difficulties.

Details: London: Author, 2019. 16p.

Source: Internet Resource: Accessed April 26, 2019 at: https://learning.nspcc.org.uk/media/1661/statistics-briefing-harmful-sexual-behaviour.pdf

Year: 2019

Country: International

Keywords: Child Sexual Abuse

Shelf Number: 155562


Author: Verite

Title: Undocumented Workers in the US Garment Sector: An Assessment and Guide for Brands

Summary: At the request of a well-known U.S.-based garment brand, Verite conducted desk and field research and interviewed experts and workers to explore employment and social responsibility issues in U.S. garment manufacturing. We focused particularly on the challenges faced by undocumented workers, and the effect of the presence of undocumented workers on manufacturers in the U.S. and the brands that source from them. The U.S. garment sector presents obvious opportunities to brands and buyers which seek to strengthen U.S. manufacturing, reduce turn-around times for products, exert quality control over production, and generate other positive outcomes. The U.S. economy overall can also benefit from increased manufacturing employment and resulting financial impacts. The U.S. garment sector presents structural challenges to manufacturers and brands. Garment manufacturing in the U.S. is a 'fissured' industry with a large number of small factories and workshops competing with one another for limited business. These factories are able to generate only narrow profit margins. To cut costs they often reduce wage payments as much as possible, including by hiring undocumented workers who are willing to take these difficult jobs in return for low wages. Garment manufacturing in the U.S. relies heavily on immigrant workers - much as it has done historically. Many of these workers are undocumented. They are at great risk of wage and hour violations, risks to their health and safety, and harassment and abuse. Because both employers and workers rely on labor brokers, the risk of forced labor resulting from debt is real. The conditions that allow for the exploitation of undocumented workers - the use of labor brokers and their lack of legal status among others - also create the risk of reputational damage and legal sanctions for companies. Brands must carry out social assessments to determine where these risks are present in their supply chains and to come to grips with the conditions faced by workers in specific supplier factories. But resolving those risks in a situation where workers cannot be employed legally will necessarily be incomplete, and may require brands to embrace humane responses that are not entirely legal. In order to remedy these risks for the long-term, a range of public policy interventions and legal changes are necessary. Immigration policies and guest-worker arrangements must be reformed to facilitate legal employment for the undocumented worker population on whom U.S. garment manufacturing relies. Brands and their suppliers should join civil society groups to understand and advocate for a guestworker visa system that is realistic, transparent and effective for employers and workers. The private sector should find common ground with advocates for other temporary and permanent immigration policies that will provide a consistently available legal workforce for companies. Regardless of what immigration reforms may or may not be enacted in coming months and years, the urgent need for stronger regulation of labor recruiter activities in sending countries and in the US is beyond question. A host of other measures are also critical to implement in the current and any future system of managing guest workers, such as providing whistleblower protections for workers that file grievances.

Details: Amherst, MA: Verite, 2014. 19p.

Source: Internet Resource: Accessed April 27, 2019 at: https://www.verite.org/wp-content/uploads/2016/11/Undocumented_US_Garment_Workers.pdf

Year: 2014

Country: International

Keywords: Forced Labor

Shelf Number: 155577


Author: LeBaron, Genevieve

Title: Confronting root causes: forced labour in global supply chains

Summary: It is by now widely recognised that effectively tackling forced labour in the global economy means addressing its 'root causes'. Policymakers, business leaders and civil society organisations all routinely call for interventions that do so.[Yet what exactly are these root causes? And how do they operate? The two most commonly given answers are 'poverty' and 'globalisation'.[Although each may be foundational to forced labour, both terms are typically used in nebulous, catch-all ways that serve more as excuses than explanations. Both encompass and obscure a web of decisions and processes that maintain an unjust status quo, while being used as euphemisms for deeper socio-economic structures that lie at the core of the capitalist global economy. The question thus becomes: exactly which aspects of poverty and globalisation are responsible for the endemic labour exploitation frequently described with the terms forced labour, human trafficking or modern slavery? Which global economic processes ensure a constant and low-cost supply of highly exploitable and coerced workers? And which dynamics trigger a demand among businesses for their exploitation, making it possible for them to profit from it? This 12-part report is an attempt to answer these questions in a rigorous yet accessible way. With it, we hope to provide policymakers, journalists, scholars and activists with a road map for understanding the political economy of forced labour in today’s "global value chain (GVC) world".

Details: s.l.: Open Democracy; Sheffield, UK: Sheffield Political Economy Research Institute, 2019. 100p.

Source: Internet Resource: Accessed May 1, 2019 at: https://cdn-prod.opendemocracy.net/media/documents/Confronting_Root_Causes_Forced_Labour_In_Global_Supply_Chains.pdf

Year: 2019

Country: International

Keywords: Forced Labor

Shelf Number: 155589


Author: Douglas, Karen

Title: Why Do People Adopt Conspiracy Theories, How Are They Communicated, And What Are Their Risks?

Summary: This report provides a comprehensive and interdisciplinary review of the existing conspiracy theory research. It examines these questions using perspectives from psychology, information engineering, political science, and sociology. Conspiracy theories are more than just conversations in the local pub about who might have killed Princess Diana, or whether 9/11 was an inside job. In recent years, conspiracy theories have been tied to extremism, radical politics, and terrorism. Conspiracy theories have also driven people to eschew mainstream science and medicine, putting both the environment and society's health at risk by not vaccinating children against measles. Conspiracy theories have also been closely linked to prejudice and racial violence. Historically and across the globe, conspiracy theories have played prominent roles in witch-hunts, revolutions, and genocide. The report, focuses on three specific areas: First, it explores the extant literature that addresses beliefs in conspiracy theories, focusing on the psychological, political and social factors that correlate with heightened belief. That is, what factors predict conspiracy belief? Second, it examines the ways in which conspiracy theories travel across interpersonal relations, through traditional and new media, and on social media. That is, when are conspiracy theories communicated, through what means and in what forms, and what are the motives for these communications? Third, it considers the risks and rewards associated with conspiracy theories. In other words, what is the relationship between conspiracy theories and prejudice, the rejection of science and medicine, and radicalisation and extremism? How do conspiracy theories contribute to these and other social ills? To buttress this discussion, the report also assesses the opposite side of the ledger and denote the benefits gained from conspiracy theories and for the people who believe them.

Details: Lancaster, UK: CREST: Centre for Research and Evidence on Security Threats, Department of Psychology, Lancaster University, 2019. 68p.

Source: Internet Resource: Accessed May 2, 2019 at: https://crestresearch.ac.uk/news/how-are-conspiracy-theories-adopted-and-what-are-their-risks/

Year: 2019

Country: International

Keywords: Conspiracy Theories

Shelf Number: 155596


Author: Baumgardner-Zuzik, Jessica

Title: Violence Reduction Subsector Review and Evidence Evaluation

Summary: With levels of global violent conflict at a 25-year peak, the need for effective and impactful peacebuilding programming could not be more pressing. The peacebuilding field has shown immense commitment to understanding, preventing, and mitigating the impact of violent conflict, but has struggled to aggregate evidence across efforts to analyze, understand, and advocate for what works to reduce violence. If the peacebuilding field identifies where its programming has directly correlated to reduced levels of violence, then it will be better able to ground program design, monitoring, and evaluation (DM&E) in evidence, and leverage evidence to advocate for the necessity and utility of the field-making the case for peace. This evidence evaluation and subsector review analyzes data from twenty-two cases. Six macro-level violence reduction Theories of Change (ToC) were developed across three approaches from an analysis of the peacebuilding cases and the strength of evidence for each was assessed. This subsector review and evidence evaluation contains four sections. Section 1 introduces the scope and necessity of the subsector review, and articulates definitions, boundaries, and the methodology for finding and selecting sources. Section 2 examines the implications of peacebuilding programming for both the understanding and evaluation of violence reduction. Section 3 presents, in tabular form, the central theories of change (ToC) that emerged from the subsector review. These ToC are organized by approach and presented alongside their associated indicators, common activities, and a summary of the strength of evidence for each ToC. Following the table is an in-depth analysis of the strength of evidence for each ToC, examining where peacebuilding programs have successfully measured levels of violence and presented significant evidence attributing changes in levels of violence to peacebuilding programming. Section 4 concludes with identification of gaps in knowledge, opportunities for further study, and recommendations for where the peacebuilding field should focus evaluation efforts moving forward.

Details: Washington, DC: Alliance for Peacebuilding, 2019. 32p.

Source: Internet Resource: Accessed May 4, 2019 at: https://allianceforpeacebuilding.org/wp-content/uploads/2019/04/AFP_Violence_reduction_subsector_WEB_FINAL_4.17.2019.pdf

Year: 2019

Country: International

Keywords: Peace Building

Shelf Number: 155620


Author: Advocates for Human Rights

Title: Labor Trafficking Protocol Guidelines: Identifying and Responding to Victims of Labor Trafficking 24 Years Old and Under

Summary: Labor trafficking is a serious crime and a public health issue that inflicts lasting physical, psychological, emotional, and financial harm on its victims. Labor trafficking also harms society as a whole, from businesses facing unfair competition to local communities bearing the costs of recovery from the trafficker's actions. Youth especially are at high risk of labor trafficking and deserve special protections from society because of their vulnerability to abuse and limited ability to meet their own basic needs. Victims of labor trafficking rarely come forward on their own because they fear retaliation by their trafficker and because they do not know that they are victims of a crime. Thus, individuals across Minnesota need to be able to recognize the signs of labor trafficking and know how to respond. Minnesotans also need to work together and develop relationships between governmental and non-governmental agencies and organizations in a wide range of sectors, as recovery requires substantial resources and a victim's needs cannot be met by one organization alone. Minnesota has an obligation and an opportunity to take action against labor trafficking. Anyone - from individuals interested in learning more about how they can help, to professionals experienced in working with trafficking victims - can and should use these protocol guidelines. These protocol guidelines provide comprehensive information on the diverse needs of labor trafficking victims and different forms of relief available to them. The protocol guidelines also provide a roadmap for state and local governments, service providers, community organizations and others to prevent labor trafficking, protect and support victims, and hold traffickers accountable. Section 1: Background provides key information for individuals and organizations wanting to understand the definitions of labor trafficking and how it occurs. Section 2: Universal Protocol contains information that should be reviewed by anyone who may interact with victims of labor trafficking or who would like to learn more about the multiple components to a comprehensive response to labor trafficking, centered on protecting victims. To respond effectively, all sectors must be actively involved, and communities must understand who they should contact if they suspect labor trafficking. The Universal Protocol provides an overview of which organizations and agencies may need to be involved in a response, as well as guidance on prevention, identification, confidentiality, and special considerations for victims who are minors, foreign nationals, or vulnerable adults. Minnesota's unique context may place a greater burden on organizations and agencies to implement the protocol guidelines. Many government services are decentralized, with elected county and city officials exerting substantial control over agency policies and practices and affecting the conduct of law enforcement, child protection, adult protection, social welfare services, education, and other sectors. This allows policies to be responsive to local conditions, but also requires organizations and agencies implementing the protocol guidelines to investigate who is best placed to serve labor trafficking victims at the local level and the process their community will follow. Section 3: Protocol Implementation Worksheet provides an easy-to-use tool to help communities plan their response to labor trafficking. As part of the development of these protocol guidelines, there were several types of organizations and agencies that were identified as regularly interacting with - or having the potential to regularly interact with - victims of labor trafficking. Section 4: Sector-Specific Protocols includes detailed guidelines and best practices for these sectors. These chapters are designed to be used in conjunction with the Universal Protocol Section. The Sector-Specific Protocols do not include chapters for every sector that may interact with trafficking victims; all sectors should refer to the Universal Protocol for guidance. Section 5: Recommendations includes suggested changes in law and practice for policymakers, government agencies, and funders to improve Minnesota's response to youth victims of labor trafficking. Section 6: Appendices provides a detailed list of federal and state statutes related to labor trafficking, a directory of Minnesota labor trafficking service providers, a list of key resources, materials for trafficking victims, and a sample of the survey that was developed to research existing services for labor trafficking victims.

Details: Minneapolis, MN: Author, 2019. 114p.

Source: Internet Resource: Accessed May 7, 2019 at: http://www.theadvocatesforhumanrights.org/uploads/labor_trafficking_protocol_guidelines_final.pdf

Year: 2019

Country: International

Keywords: Child Labor

Shelf Number: 155670


Author: Brantingham, Paul J.

Title: How to Measure Efficiency. Effectiveness and Equity within the Complex Role of Police in a Democratic Society

Summary: Policing is complex. No easy measures exist for determining efficiency, effectiveness or equity in the overall economics of police service. Perhaps this is related to the fact that the debate on issues like core policing and tiered policing is both contentious and not well understood. For example, dealing with mental health issues in vulnerable communities may not be considered core policing in some discussions but it certainly remains an important element of and a key activity in contemporary policing. We are, nevertheless, making major advances in the 21st Century. Simple crime rate or response time measures have some meaning, but the multi-agency, multi-role character of policing calls for better measures that take into account the underlying public meaning of crime, the varying demands for police service in different jurisdictions, and the rapid increase in cyber crime.

Details: Burnaby, BC: Institute for Canadian Urban Research Studies, Simon Fraser University, 2017. 82p.

Source: Internet Resoruce: An ICURS Economics of Policing Study: Accessed May 7, 2019 at: http://summit.sfu.ca/item/17722

Year: 2017

Country: International

Keywords: Costs of Policing

Shelf Number: 155679


Author: Sevel, Michael

Title: Obeying the Law

Summary: What is it to obey the law? What is it to disobey? These questions have received remarkably little attention. The inattention is remarkable because answers to them are largely assumed in vast literatures in legal and political philosophy, for example as to whether there is a duty to obey the law, whether authorities demand obedience, and whether civil disobedience is ever justified. A common view, more often assumed than argued for, is that obedience consists in acting for a certain sort of reason - for the reason that the law requires that one so act. That view has recently come in for criticism, but I think the view and the criticism are both inadequate, because both understand the relevant phenomena solely in terms of the concepts of a reason for action and acting for a reason. I argue, instead, that both obeying and civilly disobeying the law require acting intentionally with a certain sort of knowledge, knowledge which bears a distinctive relation to the action required or forbidden by law. I refine and elaborate these claims, in hopes of clarifying what is at stake in the debates about civil disobedience, authority, and political obligation in legal and political philosophy.

Details: Sydney: University of Sydney Law School, 2018. 38p.

Source: Sydney Law School Research Paper No. 18/45: Accessed May 7, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3226760

Year: 2018

Country: International

Keywords: Civil Disobedience

Shelf Number: 155682


Author: Coccia, Mario

Title: General Causes of Terrorism: High Population Growth in Problematic Society

Summary: A fundamental problem in social and political sciences is how to explain the root causes of terrorism. The vast literature has analyzed several determinants of terrorism. However, the precise role of demographic factors for the origin and evolution of terrorism in specific geoeconomic areas is hardly known. Results here show that population growth of the Middle East seems to be basic for the source and evolution of terrorism. This study found that terrorism thrives in specific cultural zones with high growth rates of population combined with collective identity factors and low socioeconomic development. In particular, the finding here shows that the high growth rates of population in the Middle East, combined with acute environmental and socioeconomic stressors, can lead to cultural deviance, frustration and anger of individuals, and terrorism as a result. Overall, then, the main aim of this study is to clarify and generalize whenever possible, the demographic source of the terrorism and suggest appropriate socioeconomic policies of conflict resolution directed to preempt this critical problem in society over the long run.

Details: Unpublished paper, 2017. 38p.

Source: Internet Resource: CocciaLab Working Paper 2017 - No. 4: Accessed May 8, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2951293

Year: 2017

Country: International

Keywords: Population Growth

Shelf Number: 155688


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Legislative Guides for the Implementation of the United Nations Convention Against Transnational Organized Crime and the Protocol Thereto

Summary: The main purpose of the legislative guides is to assist States seeking to ratify or implement the United Nations Convention against Transnational Organized Crime and its supplementary Protocols. The guides lay out the basic requirements of the Convention and the Protocols thereto, as well as the issues that each State party must address, while furnishing a range of options and examples that national drafters may wish to consider as they try to implement the Convention and its Protocols. The guides have been drafted to accommodate different legal traditions and varying levels of institutional development and provide, where available, implementation options. The present legislative guides are the product of a broad participatory process involving invaluable input from numerous experts, institutions and government representatives from all regions of the world, who contributed to the guides a wealth of knowledge and expertise, together with significant enthusiasm and personal and professional commitment.

Details: Vienna: Author, 2004. 509p.

Source: Internet Resource: Accessed May 9, 2019 at: https://www.unodc.org/unodc/en/treaties/CTOC/legislative-guide.html

Year: 2004

Country: International

Keywords: Organized Crime

Shelf Number: 104129


Author: Finkelstein, Joel

Title: A Quantitative Approach to Understanding Online Antisemitism

Summary: A new wave of growing antisemitism, driven by fringe Web communities, is an increasingly worrying presence in the socio-political realm. The ubiquitous and global nature of the Web has provided tools used by these groups to spread their ideology to the rest of the Internet. Although the study of antisemitism and hate is not new, the scale and rate of change of online data has impacted the efficacy of traditional approaches to measure and understand this worrying trend. In this paper, we present a large-scale, quantitative study of online antisemitism. We collect hundreds of million comments and images from alt-right Web communities like 4chan's Politically Incorrect board (/pol/) and the Twitter clone, Gab. Using scientifically grounded methods, we quantify the escalation and spread of antisemitic memes and rhetoric across the Web. We find the frequency of antisemitic content greatly increases (in some cases more than doubling) after major political events such as the 2016 US Presidential Election and the "Unite the Right" rally in Charlottesville. Furthermore, this antisemitism appears in tandem with sharp increases in white ethnic nationalist content on the same communities. We extract semantic embeddings from our corpus of posts and demonstrate how automated techniques can discover and categorize the use of antisemitic terminology. We additionally examine the prevalence and spread of the antisemitic "Happy Merchant" meme, and in particular how these fringe communities influence its propagation to more mainstream services like Twitter and Reddit. Taken together, our results provide a data-driven, quantitative framework for understanding online antisemitism. Our open and scientifically grounded methods serve as a framework to augment current qualitative efforts by anti-hate groups, providing new insights into the growth and spread of antisemitism online.

Details: s.l.: 2018. 18p.

Source: Internet Resource: Accessed May 10, 2019 at: https://arxiv.org/pdf/1809.01644.pdf

Year: 2018

Country: International

Keywords: Antisemitism

Shelf Number: 155736


Author: International Centre for Missing & Exploited Chidlren

Title: Studies in Child Protection: Technology-Facilitated Child Sex Trafficking

Summary: Trafficking of children for sexual purposes, or child sex trafficking2, is defined internationally as: the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force or other forms of coercion, of abduction, of fraud, of deception, of the abuse of power or of a position of vulnerability or of the giving or receiving of payments or benefits to achieve the consent of a person having control over another person, for the purpose of exploitation. Exploitation shall include, at a minimum, the exploitation of the prostitution of others or other forms of sexual exploitation, forced labour or services, slavery or practices similar to slavery, servitude or the removal of organs. The Internet and related technologies are increasingly becoming the predominant mechanism by which children are lured, entrapped, and forced into modern-day enslavement for sexual purposes. While child sex trafficking is not a new crime, the use of technology to facilitate this crime is. As the Internet is highly unregulated and provides anonymity, accessibility, and global reach, the use of technology by traffickers will likely become even more prevalent. In general, traffickers are criminals "who enable or partake in the trade and exploitation of human beings." Online traffickers use information and communications technologies (ICTs) to seek out vulnerable children, recruit victims, and advertise/sell victims to offenders through social media, messaging applications, online ads, and peer-to-peer file sharing servers with the intent to exploit the victims for profit. Using the Internet and related technologies, traffickers may lure victims by posting false job advertisements, promising fame or money, expressing love or praise, or threatening harm or death to the victim and/or their family. Traffickers may use social media platforms to gain trust and build relationships by showing admiration or desire for the child, acting as a friend, and eventually employing tactics such as manipulation, coercion, and control to lure them away from their homes and loved ones. Child sex traffickers may be strangers, but they can also be family members, friends, guardians, or acquaintances.10 Nearly half of all identified cases of child trafficking begin with some family member involvement and the extent of family involvement in the trafficking of children is up to four times higher than in cases of adult trafficking. The high demand for children for sexual purposes has generated such high profits that many organized crime groups are turning away from other illicit activities to devote their resources to the trafficking of minors. Human trafficking appeals to criminal organizations as "it is becoming increasingly easy and inexpensive to procure, move and exploit vulnerable girls." Additionally, the relatively low risk of detection and prosecution of technology-facilitated child sex trafficking compared to the risk associated with traditional, "in-person" forms of trafficking makes online sex trafficking an attractive illegal activity in which to engage. One child can generate a profit of several thousand dollars a day for traffickers and can be abused and sold repeatedly, unlike other forms of illicit trade like drug trafficking. The International Labour Organization (ILO) estimates that "globally, two-thirds of the profits from forced labour are generated by forced sexual exploitation, amounting to an estimated US$99 billion per year." Approximately 5.5 million children under the age of 18 are forced into labor, and it is estimated that more than one million are victims of forced sexual exploitation. With the growth of Internet usage, a child's risk of being targeted increases; “technology has lowered the bar of entry to the criminal world, which has had an expansive effect on the growth of modern slavery. Our challenge is that technology is taking slavery into a darker corner of the world where law enforcement techniques and capabilities are not as strong as they are offline." Strategies to address technology-facilitated child sex trafficking must address the misuse of ICTs to facilitate it and harness the potential of ICTs to combat it The world has seen an increase in international, regional, and national laws addressing cybercrime and human trafficking; however, international law is silent on several key issues - namely, the use of ICTs to: 1) recruit child sex trafficking victims; 2) advertise the sexual services of these victims; and 3) provide or receive payments or benefits from the sexual exploitation of children. To address these legal gaps, ideally international legislation should be enacted to include: - A uniform definition of technology-facilitated child sex trafficking; - Statutes punishing the use of ICTs to recruit child victims, advertise their sexual services, and send and receive payments for sexual exploitation of children; and - Requisite punishment. The Internet has global reach, which fuels the need for international legal cooperation to develop more stringent, overt laws to protect children from technology-facilitated child sex trafficking. While vast research exists regarding child sex trafficking broadly, this paper specifically focuses on: how and why technology is increasingly used to recruit, advertise, and send/receive payments for child sex trafficking; examining available international and regional legal instruments; reviewing a sampling of relevant national legislation; presenting model legislative language for consideration; and discussing the role of the technology and financial industries to deter traffickers from misusing their platforms to sexually exploit children. The report is further intended to support and promote the United Nations Sustainable Development Goals (SDGs), in particular SDG 16.220 on ending the abuse, exploitation, trafficking, and all forms of violence against and torture of children, and contribute to reaching the goals of the 2030 Agenda for Sustainable Development by demonstrating our organizational commitment, helping raise awareness of the issues, and promoting the rule of law at the national and international levels. Additionally, the report contributes to the Implementation and Enforcement of Laws strategy, the first of the seven INSPIRE strategies developed by the World Health Organization (WHO), in particular core indicators 3.1 through 3.6 (i.e., laws and policies, awareness of laws, review of legal and policy framework)22; and helps to implement the WePROTECT Global Alliance to End Child Sexual Exploitation Online Model National Response (MNR) - specifically capabilities 2 (Research, Analysis and Monitoring) and 3 (Legislation) under Policy and Governance23.

Details: Alexandria, VA: The Centre, 2018. 50p.

Source: Internet Resource: Accessed May 10, 2019 at: https://www.icmec.org/wp-content/uploads/2018/12/Technology-Facilitated-Child-Sex-Trafficking_final_11-30-18.pdf

Year: 2018

Country: International

Keywords: Child Grooming

Shelf Number: 155745


Author: Oztig, Lacin Idil

Title: Why Do Border Guards Shoot? An Explanation of Shoot to Kill Policies Which Target Illegal Border Crossers

Summary: When states are interested in excluding illegal border crossers, they have a considerable number of strategies at their disposal. States can exclude illegal border crossers by building fences, militarizing their borders, adopting a push-back policy at their maritime borders, through cross-border cooperation with their neighboring states and adopting a shoot to kill policy. The objective of this study is to answer why some states choose shoot to kill policies and other states refrain from shoot to kill policies when they are interested in excluding illegal border crossers. The majority of arguments derived from the current literature fall short of explaining this research query. The findings of this study reveal that as the level of democracy decreases, states become more inclined to adopt shoot to kill policies at their borders. In a nutshell, it is argued that the norm of non-violent conflict regulation which is intrinsic to democracies induces policymakers to rule out a shoot to kill policy. In democracies the rule of law prevents abusive and arbitrary actions of governments. In other words, through independent legal institutions policymakers are held accountable for their actions. Most importantly, when domestic political conflicts emerge, the rule of law ensures that they are regulated non-violently. In and through nonviolent practices in light of domestic political conflicts, policymakers develop an understanding that non-violence is part of their identity. When states decide to reinforce their borders, policymakers think that as a non-violent state, they should rule out a shoot to kill policy as an option. This study also shows that when states have engaged in violent conflicts with their neighbors, they become more likely to adopt shoot to kill policies at their borders. Interestingly, violent interstate conflicts override the norm of non-violent conflict regulation. Overall, the study concludes that democracies are more likely to refrain from shoot to kill policies compared to other states given that they have not engaged in violent conflicts with their neighbors.

Details: Tubingen, Germany: University of Tubingen, 2013. 266p.,

Source: Internet Resource: Dissertation: Accessed May 11, 2019 at: https://publikationen.uni-tuebingen.de/xmlui/bitstream/handle/10900/48019/pdf/Diss_oztig.pdf;jsessionid=7253AED7D72E5C55978917EDC7C24939?sequence=1

Year: 2013

Country: International

Keywords: Border Guards

Shelf Number: 155748


Author: Correctional Service Canada

Title: 2018 International Survey of Correctional Services: Community Reintegration

Summary: Background -- Correctional organizations experience a continuously changing landscape and must be proactive in addressing the challenges facing their agencies. For the fourth consecutive year, the Correctional Service of Canada (CSC) has conducted an international consultation to gain a better understanding of the challenges nations face in their correctional organizations and the strategies used to address them. Each consultation has a different focus, with previous surveys exploring areas such as ageing infrastructure, rapid technological development, offender heath, and operational issues (2015, 2016, 2017). In anticipation of the 2018 Annual International Corrections and Prisons Association (ICPA) conference which will have as its theme community reintegration, the focus of the present consultation is to better understand the community reintegration policies and practices being used globally. Purpose -- CSC conducted an international consultation to develop a broader understanding of the community reintegration challenges faced by correctional organizations and to learn about the innovative policy and practice changes being used currently and planned for the future to address these issues. The international consultation was completed in collaboration with CSC's Intergovernmental Relations Division, CSC's Strategic Policy and Planning Division, and representatives from the ICPA. Procedure -- The 2018 International Survey of Correctional Services was developed and disseminated by staff at CSC's Research Branch in collaboration the Intergovernmental Relations Division. It was available in English and French, and could be completed online or on paper. The survey was comprised of both multiple choice and open-ended questions. Given the survey's focus on community reintegration, central challenges in this area were identified and questions specific to each challenge were developed. The resultant survey was organized based on the following three overarching areas of challenge: (1) community reintegration tools and intervention capacity; (2) community capacity; and (3) governance issues, including performance measurement, 2 evaluation, and research. The target sample included approximately 170 international correctional organizations affiliated with the ICPA, as well as Canadian provincial and territorial departments. Respondents were able to access the survey between May 18th and July 13th, 2018. A total of 14 correctional organizations representing eight countries responded to the survey (see the Appendix for a list of participating organizations). As in previous years, the majority of responses were received from individuals at the executive-level of their organization (64%), followed by those at the senior management-level (29%) and those in "other" roles/rankings (7%). The respondent who selected "other" specified that they were the National Director of their organization.

Details: Ottawa: Author, 2018. 19p.

Source: Internet Resource: 2018 No. SR 18-01: Accessed May 14, 2019 at: https://www.csc-scc.gc.ca/research/092/005008-3012-en.pdf

Year: 2018

Country: International

Keywords: Community Reintegration

Shelf Number: 155825


Author: Zimmerman, Shannon

Title: Recognizing the Violent Extremist Ideology of ‘Incels’

Summary: n April 2018 Alek Minassian drove a van into a crowd of people in Toronto, killing ten people. A few minutes before, he had posted on Facebook, "The Incel rebellion has already begun! We will overthrow all Chads and Stacys! All hail the supreme gentleman Elliot Rodger." Minassian was referring to Elliot Rodger, the 22-year-old male who committed the Isla Vista, Calif., attack which killed six people in 2014. Before his rampage, Rodger had posted a 'manifesto' online - a lengthy tirade against the failures of modern society to provide him sexual access to women. Rodger is often portrayed in the media as the godfather of Incel ideology and is referred to as the "Supreme Gentleman" in online spaces such as Reddit and incel.me. He was the first individual to be labeled a terrorist of the alt-right by the Southern Poverty Law Center, which tracks far-right activity. Minassian's Facebook post indicated that his act was linked to a broader political ideology rooted in a toxic combination of male supremacy and white supremacy. While lone-wolf attackers who invoke anti-feminist ideas- like Minassian- are often framed as mentally ill loners, this attack was terrorist in nature and should be considered as such. Like the response to Elliot Rodger's earlier attack at Isla Vista, media reporting after the Toronto attack quickly emphasized Minassian's struggles with mental health and cited claims from friends that he "wasn't a terrorist." This treatment fails to recognize the corrosive political ideology that underpinned Minassian's attack and his desire to terrorize the public. These qualities should rightly define his actions as terrorism.

Details: Washington, DC: Women in International Security, 2018. 5p.

Source: Internet Resource: Policy Brief: Accessed May 14, 2019 at: https://www.wiisglobal.org/wp-content/uploads/2018/09/Policybrief-Violent-Extremists-Incels.pdf

Year: 2018

Country: International

Keywords: Countering Violent Extremism

Shelf Number: 155826


Author: Tapley, Marina

Title: The Role of Reformers in Countering Violent Extremism

Summary: This policy brief examines the role former extremists and former combatants have in countering violent extremism (CVE). 'The former' as a special category of actor in CVE activities, including in peacebuilding settings, has gained significant attention in recent years. Various organisations and governments have utilised formers in CVE activities yet it remains unclear if and when formers can make a positive contribution to these efforts. The following brief brings together research on the subject to provide contexts in which formers do and do not play a positive role in CVE activities. Formers can often contribute to CVE work due to individual characteristics, such as charisma. However, the purpose of this brief is to identify characteristics attributable to the role of former extremists and former combatant. In doing so, it is possible to discuss the different contexts in which formers may contribute to CVE in a more general sense. Thus, the aim is not to evaluate the effectiveness of programmes involving formers but to provide a conceptual tool for identifying which activities may be appropriate for formers in various CVE settings. We argue that former combatants can play an active and productive role in CVE in contexts where formers have relatively more influence in communities than states, although these contexts are rare and have negative consequences, particularly for victims. Where formers do not fill a gap left by the state, formers have limited capacity to contribute to CVE beyond providing an important but short-term contribution to intelligence and counter-narratives.

Details: The Hague: International Centre for Counter-Terrorism, 2019. 20p.

Source: Internet Resource: ICCT Policy Brief: Accessed May 14, 2019 at: https://icct.nl/wp-content/uploads/2019/04/ICCT-Tapley-Clubb-The-Role-of-Formers-in-CVE-April2019.pdf

Year: 2019

Country: International

Keywords: Countering Violent Extremism

Shelf Number: 155827


Author: International Centre on Human Rights and Drug Policy

Title: International Guidelines on Human Rights and Drug Policy

Summary: Drug control intersects with much of the 2030 Agenda for Sustainable Development and the UN Member State pledge to leave no one behind. In line with the 2030 Agenda, the UNDP Strategic Plan 2018-2021 and the HIV, Health and Development Strategy 2016-2021: Connecting the Dots, the International Guidelines on Human Rights and Drug Policy provide a comprehensive set of international legal standards for placing human dignity and sustainable development at the centre of Member State responses to illicit drug economies. The guidelines cover a diverse set of substantive issues ranging from development to criminal justice to public health. The guidelines were developed by a coalition of UN Member States, WHO, UNAIDS, UNDP and leading human rights and drug policy experts. The Guidelines are an example of the support that UNDP provides to practically integrate international human rights commitments into national, regional and global policy and programmes

Details: Authors, 2019. 28p.

Source: Internet Resource: Accessed May 14, 2019 at: https://www.undp.org/content/undp/en/home/librarypage/hiv-aids/international-guidelines-on-human-rights-and-drug-policy.html

Year: 2019

Country: International

Keywords: Drug Control and Prevention

Shelf Number: 155833


Author: Nemr, Christina

Title: Integrative Complexity Interventions to Prevent and Counter Violent Extremism

Summary: The body of literature on violent extremism has established that several key economic, social, and political drivers of violence and conflict are equally applicable to terrorism-related violence. Corrupt governance, human rights abuses, inequality, and marginalization are just a few of the grievances that can fuel support for violent extremism. These fall into the category of structural drivers, requiring state-level policy action to make an impact on broad trends of conflict and violence. These structural drivers are often intertwined with individual-level vulnerability factors, such as a desire for belonging, a search for identity, or demands for quick answers to issues of injustice and inequality. Under these circumstances, individuals can be drawn to easy, black-and-white answers that seem to offer simplicity, clarity, and certainty. Unfortunately, a hallmark of violent extremist ideologies is this binary thinking, stripped of complexity and with an identifiable in-group/out-group dynamic that offers a sense of community and belonging and helps people make sense of the world. The various structural and individual drivers of violent extremism and their interaction merit a range of responses, of which there have been numerous during the preceding decade. Yet, programs aimed at preventing and countering violent extremism (P/CVE) continue to lack rigor, precision, and adequate evaluation. These efforts are notoriously difficult to evaluate because of challenges inherent to measuring the absence of what is be prevented, such as extremist activity or violence. Furthermore, ambiguities concerning what constitutes violent extremism, what works to counter it, and what are the merits of doing so have hampered rigorous appraisals of P/CVE intervention and program effectiveness. With a few notable exceptions, this has resulted in a field based largely on anecdotes and assumptions in lieu of empirical research and practice. To increase and add to the knowledge base of empirical research and practice in the P/CVE field, this brief explores a construct from the field of psychology that offers practitioners and policymakers a tested and validated measurement and intervention that has been applied to prevent and counter violent extremism. This psychological construct is known as integrative complexity (IC).

Details: Washington, DC: Global Center on Cooperative Security, 2019. 8p.

Source: Internet Resource: Policy Brief: accessed May 15, 2019 at: https://www.globalcenter.org/wp-content/uploads/2019/02/GCCS-PB-IC-Interventions-Prevent-Counter-Violent-Extremism-2019.pdf

Year: 2019

Country: International

Keywords: Counter-Terrorism

Shelf Number: 155838


Author: Cordes, Bernd

Title: Illegal, Unreported and Unregulated (IUU) Fishing: A Whitepaper

Summary: This whitepaper characterizes the status of Illegal, unregulated, and unreported fishing (IUU), the philanthropic community's current efforts to help reduce it, and potential opportunities for the Packard Foundation to become more actively engaged. The paper was drafted between March and June 2015 by Bernd Cordes and California Environmental Associates, following a combination of desk research and a handful of select interviews. What is IUU? Illegal, unregulated and unreported fishing (IUU) refers to fishing activities that do not comply with regional, national, or international fisheries conservation or management measures. To simplify, IUU consists of three distinct but related elements: - Illegal fishing refers to fishing activities that violate national or international laws. In practical terms, illegal fishing can include fishing without a license, under-reporting catches, keeping undersized fish, fishing in closed areas, using prohibited fishing gear types, illegally transshipping fish, or violating any other law. - Unregulated fishing refers to fishing activities in areas where there are no applicable national, regional, or international conservation or management measures. Unregulated fishing is not illegal per se and can either occur in an unmanaged fishery within a country's Exclusive Economic Zone (EEZ) or on the high seas, such as when fishing is done by vessels that are un-flagged or flagged to a State not party to international conventions. - Unreported fishing refers to fishing activities that have not been properly reported. Unreported fishing is not necessarily illegal or unregulated, though it can be either. Unreported fishing is often associated with poor data collection or weak fisheries management; lack of reporting can also conceal illegal activity. While it is well known that IUU is a major barrier to effective fisheries management, the exact scale of IUU is difficult to quantify. Available evidence suggests that at least 20 percent of wild landings (11-26 million tons of fish) are Illegal or Unreported, representing annual financial losses on the order of $10-24 billion. Developing countries are disproportionately affected by illegal fishing as they often have fewer means to safeguard their offshore resources. If one also adds Unregulated landings - which are also disproportionately found in the Global South - to the dollar figures above, the estimates increase substantially. Why is addressing IUU important? Reducing IUU fishing is important for several reasons. To start, IUU undermines efforts to effectively and sustainably manage fisheries. Undetected fishing leads to poor and ineffective management decisions, and often hinders efforts to protect populations of the most vulnerable and valuable species. The sale of IUU fish in the marketplace can distort free and fair competition for legal fishermen trying to practice their trade responsibly, and ultimately lead to very real disincentives for better management of fish resources at sea. From a market perspective, the IUU fish trade can pose significant liabilities for companies in the supply chain. Taking the necessary steps to prevent illegal fish from entering a market in the first place might simply be an easier route than certification or fully vetting the supply chain with sustainability criteria well after a fish has been pulled from the sea. Recognizing this, early adopters in the seafood business community are starting to implement voluntary measures to improve transparency, to support a handful of global initiatives and domestic policy reforms intended to deter IUU fishing, and to increase traceability in the seafood supply chains and reduce fraudulent labeling. IUU has also been associated with an array of crimes, including drug smuggling and human trafficking. Several recent high-profile cases in Thailand and Indonesia linking IUU fishing to human rights and labor abuses have given authorities another good reason to take action on IUU fishing. From a fiscal perspective, IUU is associated with lost government revenue in that it is not taxable, and is often linked to incursions by foreign fleets that routinely circumvent permitting and license fees. Preventing illegal activities is squarely in the self-interest of most fishing nations. Finally, combatting IUU can help ensure access to markets. In the last few years, import controls in Europe aimed at preventing trade in IUU fish have had substantial ripple effects on fisheries management across the Global South. In countries such as Indonesia, fighting illegal fishing (illegal foreign fishing vessels, in particular) has proven to be a politically powerful and dramatic effort. Combatting IUU fishing and the legal, financial, social, and reputational risks it poses - to the common good and private industry alike - can galvanize a broad cross-section of actors to move towards more transparent, better-managed fisheries. As a result, the fight against IUU provides a strategic entry point for philanthropic efforts to promote sustainable seafood and sound fisheries policy.

Details: Los Altos, CA: Packard Foundation, 2015. 30p.

Source: Internet Resource: Accessed May 15, 2019 at: https://www.packard.org/wp-content/uploads/2016/03/Packard-White-Paper-on-IUU-for-Packard-websiite.pdf

Year: 2015

Country: International

Keywords: Fisheries Management

Shelf Number: 155856


Author: O'Higgins, Aoife

Title: What is the relationship between being in care and the educational outcomes of children? An international systematic review

Summary: The education of children in care has long been a concern for policy-makers, practitioners, foster carers, teachers and young people themselves. Government data and research have demonstrated an achievement gap between children in care and their peers that has sustained over many years. Furthermore, international research demonstrates that low educational attainment of children in care is an issue in many countries (Dill, Flynn, Hollingshead, & Fernandes, 2012). Research spanning several decades and three continents has also documented poor health, employment and general well-being outcomes of care experienced adults (Blome, 1997; Buehler, Orme, Post, & Patterson, 2000; Dill et al., 2012; Harris, Jackson, O'Brien, & Pecora, 2009; Jackson, 2013; Social Exclusion Unit, 2003). Those who have been in care are more likely than the general population to be unemployed, have mental health problems, spend time in prison or psychiatric institutions or experience homelessness at some point in their lives (Centre for Social Justice, 2015; Jackson & McParlin, 2006). Greater educational success has been linked to better long-term outcomes in the general population, so raising attainment is an important strategy to interrupt these negative life trajectories (Gorard, Beng, & Davies, 2012). This review aims to contribute to this literature by reviewing the evidence on the relationship between being in foster or kinship care and educational outcomes. The review was undertaken in order to examine existing research evidence that addresses the following three questions: - Is there an association between being in care and educational outcomes? - What is the nature of the association between being in care and educational outcomes? - Is there any evidence to suggest that this association is causal? Electronic databases and websites were used to identify 28 studies including two reviews/meta-analyses from the UK, US, Canada and Australia. Comparisons across countries are subject to limitations of different cultures and services. Studies identified for the review were published after 1990 and were all in English. All but two studies (Barber & Delfabbro, 2005; Conger & Rebeck, 2001) employed comparison groups or compared children in care to the general population. Study samples ranged from 107 to over 222,000 young people.

Details: Oxford, UK: Rees Centre for Research in Fostering and Education, University of Oxford, 2015. 20p.

Source: Internet Resource: Accessed May 16, 2019 at: http://reescentre.education.ox.ac.uk/wordpress/wp-content/uploads/2015/09/ReesCentreReview_EducationalOutcomes.pdf

Year: 2015

Country: International

Keywords: Children in Care

Shelf Number: 155861


Author: Williams, Mari

Title: No Time to Waste: Tackling the Plastic Pollution Crisis Before it's Too Late

Summary: This report describes the environmental destruction, sickness, mortality, and damage to livelihoods that the plastic pollution crisis is causing. It outlines the problem - namely the huge recent increase in the production and distribution of single-use plastics, and its expansion across the globe to countries lacking the capacity to collect, manage and recycle waste. And it spells out the solutions. Current trajectories point to increased illness and unnecessary deaths, further harm to livelihoods and greater destruction of our environment. But it doesn't have to be this way. In this report we outline the roles and responsibilities of four groups we believe to be key to tackling the plastic pollution crisis: multinational consumer goods companies who drive the production of single-use plastic packaging, and currently do little to collect and sustainably manage the waste they have created developed country governments who have enabled and incentivised a 'throwaway' culture and whose response to the This report describes the environmental destruction, sickness, mortality, and damage to livelihoods that the plastic pollution crisis is causing. It outlines the problem - namely the huge recent increase in the production and distribution of single-use plastics, and its expansion across the globe to countries lacking the capacity to collect, manage and recycle waste. And it spells out the solutions. Current trajectories point to increased illness and unnecessary deaths, further harm to livelihoods and greater destruction of our environment. But it doesn't have to be this way. In this report we outline the roles and responsibilities of four groups we believe to be key to tackling the plastic pollution crisis: multinational consumer goods companies who drive the production of single-use plastic packaging, and currently do little to collect and sustainably manage the waste they have created developed country governments who have enabled and incentivised a 'throwaway' culture and whose response to the crisis in developing countries has so far been weak developing country governments whose citizens are the most severely impacted by the crisis citizens who can show that there is an overwhelming demand for change.

Details: London: Tearfund, 2019. 80p.

Source: Internet Resource: Accessed May 16, 2019 at: https://opendocs.ids.ac.uk/opendocs/bitstream/handle/123456789/14490/J32121_No_time_to_waste_web.pdf?sequence=1&isAllowed=y

Year: 2019

Country: International

Keywords: Environmental Crimes

Shelf Number: 155862


Author: European Union

Title: EU Annual Report on Human Rights and Democracy in the World 2018

Summary: In 2018 the European Union (EU) remained at the forefront of the protection and promotion of human rights in a rapidly changing geopolitical landscape. The EU engaged in activities across the globe in line with the objectives set out in the EU Action Plan on Human Rights and Democracy (2015-2019). In a volatile and unpredictable world, the Action Plan has been instrumental in moving forward the human rights agenda. In this 70th anniversary year of the Universal Declaration of Human Rights (UDHR), the EU strongly supported the promotion and protection of human rights at the heart of multilateralism - particularly important at a time which has seen serious negative trends in human rights and democracy around the world. The year saw an increase in threats and violations against journalists and other media workers, further shrinking the space for free journalism. In line with the priorities of the Global Strategy for the European Union's Foreign and Security Policy, the EU continued to firmly oppose any unjustified restrictions of the rights of freedom of association and of peaceful assembly. This year was not only about human rights challenges and setbacks; there was also positive change. For instance, the EU joined forces with the Organisation of Islamic Cooperation - for the first time ever - to pass a resolution in the Human Rights Council to establish an international accountability mechanism on Myanmar/Burma. In 2018, the EU acted to identify and support positive human rights narratives, building on the vision of a human rights-based 2030 Agenda. The EU-led 'Good Human Rights Stories' initiative launched at the 73rd United Nations General Assembly (UNGA) generated broad cross-regional resonance and aims to provide an effective vehicle for positive change in the future. This report provides a snapshot of the EU's engagement and actions to promote and protect human rights across the globe in 2018. The report focuses on thematic issues using country-specific examples and aims to be useful for all interlocutors.

Details: Brussels: Author, 2019. 125p.

Source: Internet Resource: Accessed May 16, 2019 at: https://eeas.europa.eu/sites/eeas/files/2018_annual_report_on_hr_e-version.pdf

Year: 2019

Country: International

Keywords: Human Rights

Shelf Number: 155864


Author: Perry, Ronen

Title: Civil Liability for Cyberbullying

Summary: Cyberbullying has become a notorious epidemic, culminating in widely publicized suicides. Whether a new and distinct problem or an old one in a new guise, the technological setting has undoubtedly generated new challenges and, at the same time, new opportunities for legal response. Regrettably, while delegation of power to educational institutions and criminalization of cyber-misconduct are relatively common, at least in public discourse, the potential impact of civil liability has been downplayed. This Article puts the underexplored regulatory tool under the spotlight. It provides systematic legal and economic analyses of civil liability for cyberbullying, based on a trichotomy of potential defendants-primary wrongdoers, real-life supervisors (parents, schools), and virtual supervisors (mostly online platform operators). Ultimately, the Article lays the foundations for an efficiency-oriented model which integrates technological features to reduce supervisors' information costs. In order to incentivize parents to reasonably use advanced surveillance applications, the proposed model imposes liability when failure to employ such tools results in juvenile cyber-wrongdoing, in addition to standard liability for not taking reasonable precautions upon learning about the risk. The model also imposes liability on schools for cyberbullying through school devices if they failed to: (1) enforce reliable identification of users, (2) employ advanced surveillance tools, or (3) take reasonable measures to prevent harm upon notification of possible misconduct. Finally, the model holds a virtual supervisor liable if the victim has insufficient information to identify the wrongdoer, the victim gave notice of the complaint, and the virtual supervisor did not properly respond.

Details: UC Irvine Law Review, Forthcoming, 2019. 53p.

Source: Internet Resource: Accessed May 16, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3371020

Year: 2019

Country: International

Keywords: Civil Liability

Shelf Number: 155874


Author: Verite

Title: Research on Indicators of Forced Labor: Successes, Challenges and Reflections on Future Engagement

Summary: A new estimate from the International Labor Organization (ILO) found that there were 20.9 million victims of forced labor around the globe in 2012, a significantly higher number than its previous estimate of 12.3 million victims in 2005. This shows that high numbers of workers around the globe continue to be enslaved and demonstrates the need for research to better understand the characteristics and causes of forced labor. From 2008 through 2011, Verite carried out research on the presence of indicators of forced labor in the production of ten goods in seven countries: shrimp in Bangladesh; Brazil-nuts, cattle, corn, and peanuts in Bolivia; sugar in the Dominican Republic; coffee in Guatemala; rubber in Liberia; fish in Indonesia; and tuna in the Philippines. The purpose of the research was to increase understanding about the nature of forced labor in the supply chains of a broad spectrum of goods in various countries around the world. The research aimed not to determine the existence or scale of forced labor in these countries and sectors, but rather to identify the presence of indicators of forced labor and factors that increase workers' vulnerability to labor exploitation. The sectors and locations of production were chosen as an area of focus based on past reports of the presence of, or vulnerability to, forced labor that would benefit from further systematic research. Verite's research was designed to lend more nuance and detail to existing understandings of these situations on-the-ground, to expand the body of research on forced and exploitative labor, and to raise awareness of stakeholders to the nature of the problem. The specific findings from this research in each locale are offered in seven stand-alone reports. The depth and breadth of this three-year, multi-country initiative offers a unique opportunity for reflection on approaches to researching forced and exploitative labor among hidden and highly vulnerable populations. In this document, Verite describes the overarching methodology that was used for its research, and the ways in which this methodology was adapted to meet individual country circumstances. Particular successes and challenges of research design, implementation, and analysis are discussed, and issues to consider are offered for future research on exploitative or forced labor. Verite shares these thoughts and insights as a contribution to the global movement - by concerned governments, international organizations, labor unions, nongovernmental organizations, companies, investors, and others - to build capacity to identify and clarify egregious labor abuses, and to use that information as a platform for crafting effective policies and programs to combat these abuses.

Details: Amherst, MA: Author, 2016. 19p.

Source: Internet Resource: Accessed May 16, 2019 at: https://www.verite.org/wp-content/uploads/2016/11/Lessons-Learned-During-Research-on-Indicators-of-Forced-Labor-in-the-Production-of-Goods-v2.pdf

Year: 2016

Country: International

Keywords: Forced Labor

Shelf Number: 155882


Author: Glover, Jamila N.

Title: A Dirty Dilemma: Determinants of Electronic Waste Importation

Summary: During the 1970s-1980s waste, specifically toxic waste from manufacturing, became a globally traded commodity. By the late 1980s, waste trade became a global political and environmental topic because many believed that developed countries were 'dumping' hazardous material on less developed nations despite knowing that less developed countries often lack adequate infrastructure to dispose of waste in an environmentally responsible manner, prompting international regulatory responses. This study focuses on the fastest growing category of traded toxic waste - electronic waste. In 2014, approximately 41.8 million tons of electronic waste was generated globally. During this same period 1.6 million tons were traded in the global economy. Electronic waste is particularly intriguing because of its mix of toxic dangers and high value opportunities. Unlike other hazardous waste, electronic waste is composed of toxic materials such as lead, mercury, cadmium and brominated retardants that can adversely affect human health and the environment and valuable recyclables such as iron, copper, gold, silver, and rare earth metals. Scholars debate whether the domestic political structure, international environmental agreements or economic factor is the primary determinant that induce states to import hazardous waste. The aim of this study is to provide insight to this puzzling question. The study creates a Waste Trade Framework that is a compilation of political, economic and environmental determinants. The framework is then tested using partial least squares-structural equation modeling. The study finds that when developed and developing countries are evaluated jointly, the economic factor has the largest impact on electronic waste import volume. When developed and developing countries are modeled independently, electronic waste import volume in both country types is most influenced by the political economic factor (the interaction of politics and the economy).

Details: Norfolk, VA: Old Dominion University, 2017. 231p.

Source: Internet Resource: Dissertation: Accessed May 20, 2019 at: https://digitalcommons.odu.edu/gpis_etds/20/

Year: 2019

Country: International

Keywords: Electronic Waste

Shelf Number: 155899


Author: International Centre for Counter-Terrorism

Title: Caliphate Soldiers and Lone Actors: What to Make of IS Claims for Attacks in the West 2016-2018

Summary: May 2016, IS began implementing a strategy aimed at inciting lone actor attacks in Western countries, under the supervision of its "external security" body. This report examines changes in the ways in which IS has claimed credit for violent incidents in Western countries under this strategy in an effort to shed light on the links between the external operations and the main leadership of the organisation. IS's claiming behaviour for attacks in the West fluctuated between leaving the initiative to perpetrators and trying to centralise the communication flow. The organisation, however, has experienced increasing difficulties in ascertaining information received from external sources, ultimately leading to the flawed claim for the Las Vegas shooting on 1 October 2017. Since then, communication between IS's central media outlets and external sources seems to have largely broken down. At present, the hierarchical external operations structures of IS seem to have been replaced by individuals that communicate and, possibly, cooperate based on their common experience and acquaintance. The threat they pose will depend on their personal influence on others and their motivation rather than their position in the IS hierarchy.

Details: The Hague, Netherlands: Europol, 2019. 32p.

Source: Internet Resource: Accessed May 20, 2019 at: https://www.europol.europa.eu/publications-documents/caliphate-soldiers-and-lone-actors-what-to-make-of-claims-for-attacks-in-west-2016-2018

Year: 2019

Country: International

Keywords: IS

Shelf Number: 155938


Author: Yukhnenko, Denis

Title: A Systematic Review of Criminal Recidivism Rates Worldwide: 3-Year Update

Summary: Background: Comparing recidivism rates between countries may provide useful information about the relative effectiveness of different criminal justice policies. A previous 2015 review identified criminal recidivism data for 18 countries and found little consistency in outcome definitions and time periods. We aimed to update recidivism rates in prisoners internationally. Methods: We conducted a systematic review of criminal recidivism rates in prisoners and followed PRISMA guidelines. Using three bibliographic indexes, we carried out non-country-specific and targeted searches for 50 countries with the largest total prison populations. We included reports and studies of released prisoners that reported re-arrest, reconviction and reincarceration rates. Meta-analysis was not possible due to multiple sources of heterogeneity. Results: We identified criminal recidivism information for 23 countries. Of the 50 countries with the largest prison populations, 10 reported recidivism rates for prisoners. The most commonly reported outcome was the 2-year reconviction rate. We were able to examine recidivism over different time periods for 11 countries and found that most reported small changes in official recidivism rates. Overall, for 2-year follow-up period, reported re-arrest rates were between 26% and 60%, reconviction rates ranged from 20% to 63%, and reimprisonment rates varied from 14 to 45%. Conclusions: Although some countries made efforts to improve reporting, recidivism rates are not comparable between countries. Criminal justice agencies should consider using reporting guidelines described here to update their data.

Details: S.L.: Wellcome Open Research, 2019. 12p.

Source: Internet Resource: Accessed May 21, 2019 at: https://wellcomeopenresearch.org/articles/4-28

Year: 2019

Country: International

Keywords: Incarceration

Shelf Number: 155946


Author: Underwood, F.M.

Title: Dissecting the Illegal Ivory Trade: An Analysis of Ivory Seizures Data

Summary: Reliable evidence of trends in the illegal ivory trade is important for informing decision making for elephants but it is difficult to obtain due to the covert nature of the trade. The Elephant Trade Information System, a global database of reported seizures of illegal ivory, holds the only extensive information on illicit trade available. However inherent biases in seizure data make it difficult to infer trends; countries differ in their ability to make and report seizures and these differences cannot be directly measured. We developed a new modelling framework to provide quantitative evidence on trends in the illegal ivory trade from seizures data. The framework used Bayesian hierarchical latent variable models to reduce bias in seizures data by identifying proxy variables that describe the variability in seizure and reporting rates between countries and over time. Models produced bias-adjusted smoothed estimates of relative trends in illegal ivory activity for raw and worked ivory in three weight classes. Activity is represented by two indicators describing the number of illegal ivory transactions - Transactions Index - and the total weight of illegal ivory transactions - Weights Index - at global, regional or national levels. Globally, activity was found to be rapidly increasing and at its highest level for 16 years, more than doubling from 2007 to 2011 and tripling from 1998 to 2011. Over 70% of the Transactions Index is from shipments of worked ivory weighing less than 10 kg and the rapid increase since 2007 is mainly due to increased consumption in China. Over 70% of the Weights Index is from shipments of raw ivory weighing at least 100 kg mainly moving from Central and East Africa to Southeast and East Asia. The results tie together recent findings on trends in poaching rates, declining populations and consumption and provide detailed evidence to inform international decision making on elephants.

Details: S.L., 2013. 12p.

Source: Internet Resource: Accessed May 21, 2019 at: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0076539

Year: 2013

Country: International

Keywords: Environmental Crime

Shelf Number: 155956


Author: Gingerich, Daniel W.

Title: A Heavy Hand or a Helping Hand? Information Provision and Citizen Preferences for Anti-Crime Policies

Summary: Welfarist justifications of democracy presume that citizens have policy preferences that are responsive to pertinent information. Is this accurate? This paper addresses that question by providing a model and empirical test of how citizens' policy preferences respond to information in the arena of anti-crime policy. The paper's model shows that preferences for anti-crime policy hinge on expectations about the crime rate: in high crime regimes punitive policies are preferred, whereas in low crime regimes social policies are. To evaluate the model, the authors employ an information experiment embedded in the 2017 LAPOP survey conducted in Panama. The evidence is partially consistent with the paper’s theory. As expected, a high crime message induced stronger preferences in favor of punitive policies. Unanticipated by the paper's theory, though, is the finding that a low crime message did not induce stronger preferences in favor of social policies. These findings raise the possibility that political communication about crime may have an inherent punitive policy bias.

Details: Washington, DC: Inter-American Development Bank, 2018. 37p.

Source: Internet Resource: Accessed May 21, 2019 at: https://publications.iadb.org/en/heavy-hand-or-helping-hand-information-provision-and-citizen-preferences-anti-crime-policies

Year: 2018

Country: International

Keywords: Anti-Crime Policy

Shelf Number: 155960


Author: Forrester, Andrew C.

Title: Do Immigrants Import Terrorism?

Summary: The relationship between immigration and terrorism is an important public policy concern. Using bilateral migration data for 174 countries from 1995 to 2015, we estimate the relationship between levels of immigration and terrorism using an instrumental variables (IV) strategy based on the initial distribution of immigrants in destination countries. We specifically investigate rates of immigration from Muslim Majority Middle Eastern and North African (MENA) countries and countries engaged in conflicts. We find no relationship between stocks of immigrants and terrorism, whether measured by the number of attacks or victims, in destination countries.

Details: Washington, DC: CATO Institute, 2019. 32p.

Source: Internet Resource: Accessed May 21, 2019 at: https://www.cato.org/publications/working-paper/do-immigrants-import-terrorism

Year: 2019

Country: International

Keywords: Immigrants

Shelf Number: 155961


Author: Vaz, Matthew

Title: The Jackpot Mentality: The Growth of Government Lotteries and the Suppression of Illegal Numbers Gambling in Rio de Janeiro and New York City

Summary: This dissertation examines social and political conflict over gambling policy in the United States and Brazil from 1960 to the present with a particular focus on New York City and Rio de Janeiro. The study accounts for the process by which illegal numbers gambling in New York and the jogo do bicho in Rio de Janeiro were determined to be the basis for widespread corruption and lawlessness. As policy makers proposed enhanced government lotteries as a solution for the problem of illegal gambling, numerous groups scrambled for position within shifting gambling frameworks. Tens of thousands of persons who had long worked in illegal numbers networks pressed for access to legal gambling jobs, corporate entities partnering with government lotteries pushed to secure monopoly concessions, while many citizens and religious groups opposed any and all forms of gambling legalization. As gambling workers, bettors, clergy, police officers, politicians and corporate lobbyists all struggled over how gambling would be conducted going forward, an intense debate unfolded in both Brazil and the United States with issues relating to police corruption, welfare, public safety, state sovereignty, personal liberty, and distribution of the tax burden all under examination. While there are many comparative elements of this study, it is ultimately transnational in that the narrative histories of gambling policy in Brazil and the United States eventually converge through the gambling technology corporation Gtech, which emerged as a powerhouse in the government lottery sectors of both nations. As the low stakes illegal gambling games of the numbers and the jogo do bicho are suppressed in favor of legal government lotteries, a vast new array of gambling habits are introduced to the gambling public in both Brazil and the United States. Of particular importance to this study is the growth of multimillion-dollar jackpot games offered by governments and their corporate partners. As players leave behind the old games with their reasonable odds and their modest payouts, they take up new games with astronomical odds and obscene jackpots. In the argument of this study, jackpot style gambling has brought the gambling habits of the poor and working classes into accord with contemporary patterns of wealth distribution.

Details: New York: Columbia University, 2011. 439p.

Source: Internet Resource Dissertation: Accessed May 22, 2019 at: https://academiccommons.columbia.edu/doi/10.7916/D8B85G4C

Year: 2011

Country: International

Keywords: Addictive Behavior

Shelf Number: 155965


Author: Jeftic, Ljubomir

Title: Marine Litter: A Global Challenge

Summary: Marine litter is a global concern affecting all the oceans of the world. It poses environmental, economic, health and aesthetic problems that are rooted in poor solid waste management practices, lack of infrastructure, indiscriminate human activities and behaviours and an inadequate understanding on the part of the public of the potential consequences of their actions. The UNEP Global Initiative on Marine Litter has provided an effective framework for conducting regional activities addressing marine litter around the world, including those of the 12 participating Regional Seas programmes. The objective of this document is (1) to present and analyse available information on marine litter discussed in documents produced by the 12 regional programmes with the help of regional consultants and technical experts and (2) to propose recommendations for addressing the problems associated with marine litter worldwide. This document is not a comprehensive overview of global marine litter, but it does provide current information on the marine litter issue in participating regions (Baltic Sea, Black Sea, Caspian, East African Seas, Eastern Africa, Mediterranean, Northeast Atlantic, Northwest Pacific, Red Sea and Gulf of Aden, South Asian Seas, South Pacific, and Wider Caribbean). Chapter 1, Facing the global challenge of marine litter, introduces the topic and the challenges marine litter poses to the international community. It describes the main sources and impacts of marine litter and how UNEP has begun to address these through its Regional Seas Programme and the Global Programme of Action for the Protection of the Marine Environment from Land-Based Activities (GPA), and the UNEP Global Initiative on Marine Litter. Finally it outlines the existing international and regional initiatives that address marine litter problems. Chapter 2, Review of regional assessments and regional action plans on marine litter, presents summaries of the documents produced as part of the UNEP Global Initiative on Marine Litter, including 12 regional overviews and seven regional action plans. In addition, a summary of the International Coastal Cleanup (ICC) programme is presented, covering ICC events carried out in 132 countries of the world and in 73 countries of the 12 Regional Seas that are part of the UNEP Global Marine Litter Initiative. Chapter 3, Analysis of regional review documents and action plans on marine litter, presents an analysis of the information and data presented in 12 regional assessment documents and seven Regional Action Plans summarized in Chapter 2 of this document. Chapter 4, The way forward, provides a discussion of the general conclusions and proposed recommendations presented in this overview, and also offers conclusions and recommendations related to nine specific issues that are important for the understanding, control and reduction of the global problem of marine litter.

Details: New York: United Nations Environment Programme, 2009. 234p.

Source: Internet Resource: Accessed May 22, 2019 at: https://wedocs.unep.org/bitstream/handle/20.500.11822/10744/MarineLitterAglobalChallenge.pdf?sequence=1&isAllowed=y

Year: 2009

Country: International

Keywords: Environmental Crime

Shelf Number: 155968


Author: Orlanski, Olga

Title: The Determinants of Islamophobia - An Empirical Analysis of the Swiss Minaret Referendum

Summary: We analyze the determinants of Islamophobia using the only nation-wide anti-Islam referendum ever, which was held in Switzerland in 2009 and led to the prohibition of minarets. We find economic, environmental, and cultural factors as well as the presence of Muslims to determine voting behavior. Approval rates for the bill rise with unemployment and decrease with education, income, and the attractiveness of the location. Approval is higher in rural areas, in municipalities with a higher share of men, and in the Italian and German speaking parts of Switzerland. It is higher in municipalities with a higher share of Muslims, which strongly supports the 'religious threat' hypothesis. We compare the voting behavior in the minaret referendum with the referendum "for democratic naturalizations", held in 2008, in order to disentangle determinants of Islamophobia from those of xenophobia. We show that our results are robust to the estimation with ecological inference.

Details: Munich, Germany: Munich Society for the Promotion of Economic Research, CESIFO Working Paper, 2018. 58p.

Source: Internet Resource: Accessed May 22, 2019 at: https://ideas.repec.org/p/ces/ceswps/_6741.html

Year: 2017

Country: International

Keywords: Islamophobia

Shelf Number: 155981


Author: van Dongen, Teun

Title: Detecting Elusive Criminals: Research for Tackling Europe's Grand Challenge of Transnational Organized Crime

Summary: Organized crime for the European market is a multi-billion dollar business that feeds on, as well as sustains, poverty and poor governmental control. As factors like the economic crisis and the emergence and growth of urban slums will sustain organized crime, this threat is likely to stay with us in the foreseeable future. Against this background, this report answers the following question: what research strands need to be explored further in order to find solutions for the threat posed to Europe by transnational organized crime? The flexibility of criminal networks is remarkable, as they seem to think nothing of moving operations to other countries, entering into new partnerships and using other modes of transportation. Also, they are often quick to pick up on new technologies that help them run their businesses. The consequent lack of signature and standard operating procedures on the part of criminal networks means that they are increasingly difficult to detect. The fact that a criminal cell has at one point been in touch with another cell, says little to nothing about the likelihood that they will be in touch again. In general, it is questionable to what extent past behaviors can be used as clues to predict future conduct and eventually find and catch criminal cells. Current research strands that have to do with the detection of criminal networks fail to take into account the state of flux that is characteristic of organized crime. Technological detection tools like scanners and air sampling devices are deployed statically, and fail to uncover more than a small part of all organized criminal activity. Knowledge discovery approaches, in which criminal networks can be detected through the analysis of digital data, are mostly based on police records. This means that approaches along these lines are largely reactive in nature. A similar objection can be raised against crime mapping exercises that are carried out by scholars and government research departments. They register trends and developments in organized crime after they have taken place. This means that organized crime mapping, while useful, is always a step behind- a shortcoming which could be a problem against a threat that changes rapidly and constantly. Therefore, we suggest a series of research strands that are more preventive in nature. First, the detection of criminal networks should be applied to the preventive and early warning phase. We should development frameworks and vulnerability assessment tools to predict or estimate whether a certain area – a neighborhood, a city, a region – will in the near future have to deal with criminal networks. This will help governments act quickly and at an early stage, which is crucial when dealing with a fluid and adaptive threat like the one posed by organized crime. For the development of such vulnerability and early warning frameworks, we need more research into what contextual factors make areas vulnerable to organized crime, and into the motives of criminal networks to choose certain areas of operation over others. We need, in other words, to learn more about the causes behind the trends and developments in organized crime. Second, research is needed to identify and address legal obstacles to the sharing of information between and within governments needed to detect criminal networks or make vulnerability assessments. What should be addressed is not only the legal obstacles between governments, but also within governments and between the government and the private sector. Finally, we should look into technological tools for criminal network detection (e.g., data mining) as well as into possibilities to generate human criminal intelligence, as such an approach will be non-intrusive and will help law enforcement agencies win the trust of the local population.

Details: The Hague, Netherlands: The Hague Centre for Strategic Studies, 2012. 58p.

Source: Internet Resource: Accessed May 22, 2019 at: https://www.researchgate.net/publication/284032861_DETECTING_ELUSIVE_CRIMINALS_RESEARCH_FOR_TACKLING_EUROPE'S_GRAND_CHALLENGE_OF_TRANSNATIONAL_ORGANIZED_CRIME

Year: 2012

Country: International

Keywords: Criminal Cells

Shelf Number: 156016


Author: Cohen, Eyal Tsir

Title: Pushing the Jihadist Genie Back into the Bottle: How to Counter the Ongoing Terrorist Threat

Summary: Recent terrorist attacks have shown that jihadist terror should still be considered a major threat worldwide, and specifically to the stability of the Middle East. While ISIS has lost the physical territory of its caliphate, this did not put an end to the jihadist doctrine that has invaded so many countries. ISIS will continue to maneuver, govern, radicalize, and inspire its followers to carry out both spontaneous and well-planned attacks that challenge authorities around the globe. This paper first provides a short overview of Jihadist organizations as we know them today, with a central focus on ISIS. Next, it describes the central elements of the terrorist threat today. Relying on empirical data collected from terrorist attacks over the last four years, it analyzes ISIS' ever-evolving modus operandi. Next, it suggests a layered strategy that defines the core framework that a vigilant country should adopt to meet the challenge ahead. While countries are grappling with urgent and immediate terrorist challenges, too often they ignore policy problems and long-term planning. Governments should resist this reactive approach, which could prove deadly, and instead adopt a comprehensive strategy that will prevent jihadist terrorism in different stages: from radicalization to thwarting an attack in motion. In formulating governments' response to jihadist terror, this report lays out five strategic dimensions for governments to consider. For each of these dimensions - including education, legislation, intelligence, enforcement, and defense - this report provides the framework for a sound strategy on a national level. The report does not prescribe a specific policy or provide a one-size-fits-all solution to the problems it details, but instead gives policymakers the tools with which to identify the blind spots or gaps in their countries' approach to counterterrorism. Education will deal with national efforts to establish a positive relationship with local Islamic communities and the need to address the problem of radicalization and lack of governance in Islamic countries. Legislation will address the struggle to find the right balance between democratic rights on one hand and the urgency of public safety on the other, a crucial question as emerging threats challenge notions of what a secure democracy should look like. Creative lawmakers will have to lay down new legal frameworks and not just interpret existing laws.

Details: Washington, DC: Brookings Institute, 2019. 13p.

Source: Internet Resource: Accessed May 22, 2019 at: https://www.brookings.edu/research/pushing-the-jihadist-genie-back-into-the-bottle-how-to-counter-the-ongoing-terrorist-threat/

Year: 2019

Country: International

Keywords: Counter-Terrorism

Shelf Number: 156005


Author: The Sentry

Title: Covert Capital: The Kabila Family's Secret Investment Bank

Summary: It would have been hard to understand the significance of Kwanza Capital just by looking at the company's headquarters in a commercial garage in Kinshasa's business district. No sign marked its presence. There was nothing to indicate the company was shuffling over one hundred million dollars through accounts held at a bank linked to the family of Joseph Kabila, who served as president of the Democratic Republic of Congo (Congo) from 2001 to January 2019. Nor would onlookers have had reason to suspect that the company was controlled by members of Congo's former first family and its close allies. Individuals with knowledge of the company's activities told The Sentry it maintained a low profile by design and the individuals behind Kwanza Capital apparently sought to minimize their public association with the company. Kwanza Capital, which is now reportedly under liquidation, gained only fleeting public notice as it made unusual maneuvers in the country's banking sector, but its story is more expansive than the public record would suggest. An investigation by The Sentry into Kwanza Capital's activities provides a new glimpse into how members of Kabila's family and inner circle have done business. The Sentry examined the firm's operations, finances, apparent beneficiaries, business partners, and relationships with government agencies and officials. In addition to maintaining extensive links to a bank run by members of Kabila's family, Kwanza Capital participated in multiple acquisition attempts in the Congolese banking sector. These attempts also involved a host of additional individuals and companies, including a Swiss-Angolan financier, a Chinese conglomerate, and a lawyer formerly affiliated with the French office of a U.S.-based law firm. While each attempt to take over a bank ultimately failed, a review of Kwanza Capital's financial records and those of its minority shareholder reveals several indicators of money laundering as well as signs these companies may have received millions of dollars in misappropriated funds from the Congolese government. In total, the records reviewed by The Sentry indicate that as much as $140 million may have circulated through these accounts and that they appear to have functioned as a ready source of cash for family members and friends of former President Kabila. The Sentry's investigation suggests that exercising control of the domestic banking and finance sector in Congo was a major priority for members of the Kabila family and its inner circle. In fact, according to documents reviewed and interviews conducted by The Sentry, Kwanza Capital and its allies sought to control banks that amounted to around 28 percent of the country's roughly $5 billion banking sector. Such control of banks by Kwanza Capital and its allies would have constituted a crucial element of Congo's kleptocratic system by affording the individuals behind this system the means to launder the proceeds of rampant corruption. While such control by politically exposed persons is not necessarily illegal in Congo, it is nevertheless problematic for reasons illustrated in this report and in other disclosures about the scope of the Kabila family's business interests. But the risks detailed in this report apply well beyond Congo. According to the Financial Action Task Force (FATF), an independent inter-governmental body that develops and promotes policies to protect the global financial system, when individuals entrusted with a prominent public function, their family members, or their associates - collectively known as politically exposed persons - control financial institutions, this can undermine the integrity of the domestic banking and finance sector as well as place the entire global anti-money laundering and countering the financing of terrorism system at risk. When politically exposed persons directly or indirectly control such institutions, the FATF notes, they will have effectively "rigged the game" and made it even more difficult for foreign banks and regulatory authorities to understand the source and destination of money passing through these elite-controlled entities. Part of this risk stems from the access politically exposed persons have to public funds, and part from the know-how they generally possess related to control of government budgets, state-owned enterprises, and contracting. The Sentry's investigation also illustrates how important it is for financial institutions to exercise enhanced due diligence in transactions involving politically exposed persons, their associates, and their companies. It is essential for banks to be able to clearly document the beneficial ownership of customers with whom they have a relationship in order to understand who ultimately derives financial or other benefits from a company or transaction. The financial records and other investigative information reviewed by The Sentry indicate that Kwanza Capital may have been intended to serve as a vehicle to obfuscate links to the Kabila family and its inner circle as a means of evading such scrutiny, even if some international actors saw through it. The Congolese government has a role in ensuring beneficial ownership transparency to avoid just these kinds of risks, but international banks should also consider the risk that companies and individuals for whom they process transactions in Congo are merely serving as proxies for politically exposed persons to evade enhanced due diligence compliance measures. The Congolese government must make it a priority to improve compliance standards at banks and institute safeguards against corruption at key government agencies and regulatory bodies that govern the country’s financial sector. As The Sentry recommended in its August 2018 Alert, "A Window for Kleptocrats," the Congolese government should issue guidance on anti-money laundering and countering the financing of terrorism recommendations and encourage banks to file suspicious transaction reports. 8 The Congolese government should also include guidance on politically exposed persons and money laundering typologies related to the mining and oil industries. While the country's evolving political landscape may provide an opportunity to push through key reforms, the stakes are not merely political; failing to address chronic concerns in the financial sector could result in reduced access to the international banking system and, in turn, have devastating consequences for the country's economy writ large. Congo already struggles to ensure its citizens have access to bank services. In fact, a 2017 study found that only six percent of the population had access to these services, which is less than one-quarter the average across sub-Saharan Africa. Key Recommendations: The Sentry is making the following key recommendations in the wake of this investigation. The full text of The Sentry's recommendations appears at the end of this report. Anti-Money Laundering (AML) Measures: The U.S. Department of the Treasury and European financial intelligence units should investigate the banking relationships described in this report and, if warranted, issue advisories to banks and other institutions. In particular, these entities should consider whether to issue advisories in relation to the past conduct of BGFIBank DRC - discussed throughout this report - and more broadly related to overall money laundering risk present in the Congolese banking sector. Targeted Sanctions: The United States and European Union should investigate and, if appropriate, impose and implement targeted sanctions pursuant to existing Congo sanctions authorities against members of former President Kabila's network and others in connection with the transactions described in this report. Bank Due Diligence: U.S. and international financial institutions should employ a range of actions to improve due diligence on transactions involving Congolese companies and politically exposed persons or individuals known to operate on their behalf. The Sentry also recommends that these institutions take appropriate follow-up actions if they have processed transactions in connection with the individuals and entities outlined in this report and that these same institutions should, where appropriate, emphasize that Congolese correspondent banking partners more robustly conduct enhanced due diligence. Internal Reforms and Accountability Measures: The Sentry is also recommending a range of internal actions by the Congolese government and other partners. Specifically, The Sentry recommends the current government take concerted steps to empower Congo’s financial intelligence unit, investigate potential malfeasance by the Central Bank of Congo and state-owned enterprises, enforce a public asset declaration by government officials, and boost beneficial ownership transparency with a complete and accessible corporate registry. The Sentry further recommends that the U.S. government encourage the Congolese government to ask the International Monetary Fund (IMF) to restart an Extended Credit Facility in Congo to improve financial transparency.

Details: Washington, DC: The Sentrey c/o The Enough Project, 2019. 49p.

Source: Internet Resource: Accessed May 23, 2019 at: https://thesentry.org/reports/covert-capital/

Year: 2019

Country: International

Keywords: Anti-Money Laundering

Shelf Number: 156010


Author: Organization for Economic Co-operation and Development (OECD)

Title: Addressing Problematic Opioid Use in OECD Countries

Summary: Over the past few years, Canada and the United States have been experiencing an opioid crisis as a result of problematic opioid use fueled by the emergence of synthetic opioids such as fentanyl and carfentanil. Problematic opioid use is also spreading in other OECD countries, due to the upward trend of prescription opioid use and the complexities of the illegal drug supply. This report presents evidence on the magnitude of problematic opioid use across OECD countries, describes the main drivers, and identifies a set of policy actions to address them. The report highlights the opioid crisis as a complex public health issue that requires a comprehensive approach across all sectors, including health, social services, and law enforcement. Strong health information systems are also needed, particularly data and research. Preventing problematic opioid use requires a combination of policies that ensure more information is provided to patients and health care practitioners, while providing access to appropriate pain management treatment for patients. A public health approach to problematic opioid use must incorporate socio-economic considerations (e.g. employment and housing), which also need to be addressed to prevent problematic substance use in general.

Details: Paris: Organization for Economic Cooperation and Development Health Policy Studies, 2019. 78p.

Source: Internet Resource: Accessed May 23, 2019 at: http://www.oecd.org/health/addressing-problematic-opioid-use-in-oecd-countries-a18286f0-en.htm

Year: 2019

Country: International

Keywords: Fentanyl

Shelf Number: 156023


Author: Organisation for Economic Co-Operation and Development (OECD)

Title: Tackling Vulnerability in the Informal Economy

Summary: A majority of workers in the world are informally employed and contribute to economic and social development through market and non-market activities that are not protected, regulated, well-recognised or valued. This study provides an in-depth diagnosis of informality and the vulnerability prevailing in the informal economy. It explores new ideas to improve the lives of workers in the informal economy based on the ILO indicators of informality and the new OECD Key Indicators of Informality based on Individuals and their Household (KIIbIH). The report contributes in four ways to the global debate on the transition from the informal to the formal economy: 1) by examining the multiple faces of informality in a large sample of countries representing diverse conditions, locations and stages of development; 2) by presenting new empirical evidence on the links between informality and the development process; 3) by assessing risks and vulnerabilities in the informal economy, such as poverty and occupational risks, which can be mitigated with social protection and appropriate risk management instruments; 4) by showing that the transition to formality is a complex issue that touches on a wide range of policy domains.

Details: Paris: Organisation for Cooperation and Development, Development Centre Studies, 2019. 172p.

Source: Internet Resource: Accessed May 23, 2019 at: http://www.oecd.org/publications/tackling-vulnerability-in-the-informal-economy-939b7bcd-en.htm

Year: 2019

Country: International

Keywords: Empirical Analysis

Shelf Number: 156024


Author: Pardo, Bryce

Title: Evolution of the U.S. Overdose Crisis: Understanding China's Role in the Production and Supply of Synthetic Opioids

Summary: Chairman Smith, Ranking Member Bass, and other distinguished members of the Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, thank you very much for the opportunity to testify before you today. I am a drug policy researcher at the RAND Corporation. For almost thirty years, the RAND Drug Policy Research Center has worked to help decision-makers in the United States and throughout the world address issues involving alcohol and other drugs. In doing so, the center brings an objective and data-driven perspective to this often emotional and fractious policy arena. I was asked to speak to you today about ongoing developments related to the current opioid crisis in the United States and China’s role in supplying potent synthetic opioids. The introduction of illicitly manufactured synthetic opioids to U.S. drug markets presents new challenges for contemporary drug policy: The potency of many synthetic opioids increases risk to users and poses challenges for first responders, the development of novel opioids that fall outside existing drug controls complicates regulatory efforts, and their ability to be produced and shipped with ease disrupts traditional supply chains. Today, I will briefly describe our country's ongoing opioid overdose crisis. Understanding recent developments and the shifting supply of opioids is critical to policy design. I will then describe the emergence of synthetic opioids, which have complicated many of our drug policy efforts. Given the topic of this hearing, I focus most of my testimony on China’s role as a source of synthetic psychoactives and chemical precursors, describing what we know about the manufacture and export of potent opioids, such as fentanyl, to the United States. Although most of these substances appear to come from China, many dimensions of this problem remain unclear. That said, China's export-led economic strategy and lack of regulatory oversight have created favorable conditions for the production and exportation of synthetic opioids and related chemicals. I conclude with some policy options going forward, aimed at the new challenges posed by these substances.

Details: Santa Monica, California: RAND Corporation, 2018. 14p.

Source: Internet Resource: Accessed May 23, 2019 at: https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT497/RAND_CT497.pdf

Year: 2018

Country: International

Keywords: Fentanyl

Shelf Number: 156026


Author: Navarro, Joan

Title: Feathered Detectives: Real-Time GPS Tracking of Scavenging Gulls Pinpoints Illegal Waste Dumping

Summary: Urban waste impacts human and environmental health, and waste management has become one of the major challenges of humanity. Concurrently with new directives due to manage this human by-product, illegal dumping has become one of the most lucrative activities of organized crime. Beyond economic fraud, illegal waste disposal strongly enhances uncontrolled dissemination of human pathogens, pollutants and invasive species. Here, we demonstrate the potential of novel real-time GPS tracking of scavenging species to detect environmental crime. Specifically, we were able to detect illegal activities at an officially closed dump, which was visited recurrently by 5 of 19 GPS-tracked yellow-legged gulls (Larus michahellis). In comparison with conventional land-based surveys, GPS tracking allows a much wider and cost-efficient spatiotemporal coverage, even of the most hazardous sites, while GPS data accessibility through the internet enables rapid intervention. Our results suggest that multi-species guilds of feathered detectives equipped with GPS and cameras could help fight illegal dumping at continental scales. We encourage further experimental studies, to infer waste detection thresholds in gulls and other scavenging species exploiting human waste dumps.

Details: S.L., 2016. 9p.

Source: Internet Resource: Accessed May 28, 2019 at: https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0159974

Year: 2016

Country: International

Keywords: Environmental Crime

Shelf Number: 156046


Author: Monk, Bryan

Title: Tor, What is it Good For? How Crime Predicts Domain Failure on the Darkweb

Summary: Content analysis of the darkweb shows the volume of illicit domains which are speculated to facilitate criminal activity. Describing Tor serves a valuable purpose, however does not allow for broader speculations about the criminogenic nature of the environment and the dismantling of the hidden services. Examining how the criminal content leads to domain failures is a small step towards providing insight into any casual mechanisms on Tor. The current study analyzes how 774 categorized domains explain website failure using a Cox repeated events regression while controlling for structure, popularity and size. Tor domain failure was found to be a function of popularity and size rather than criminality. Some criminally focused domains, however did survive longer on average than legal websites. The visibility of the domains may lead to increased costs financially as well as socially. The lack of infrastructure paired with law enforcement interventions may explain domain failures on Tor.

Details: Burnaby, British Columbia, Canada: Simon Fraser University, 2017. 75p.

Source: Internet Resource Master's Thesis: Accessed May 28, 2019 at: https://www.semanticscholar.org/paper/Tor-%2C-what-is-it-good-for-How-crime-predicts-domain-Monk-Mathesius/a8a7a04c56f5fcf4f60c76e646b61ebbdbf00547

Year: 2017

Country: International

Keywords: Cyber-Crime

Shelf Number: 156055


Author: Markov, Dimitar

Title: Assessing the Impact of Criminal Proceedings on the Social Situation of Suspects and Accused

Summary: This handbook offers practical guidelines to the law enforcement and criminal justice authorities on how to assess the impact of criminal proceedings on suspects and accused. It explains how the proceedings can affect the personal and social life of suspects and accused, provides summaries of court cases showing how criminal justice authorities are addressing this issue in practice, and offers references to research works for further reading. Enclosed in the handbook is an impact assessment questionnaire, which allows the law enforcement and criminal justice authorities to assess the degree to which the proceedings can affect the social status of suspects or accused. The English language edition of the handbook is available in two versions: one with examples from Bulgarian court cases and the other with summaries of court cases from Greece.

Details: Mountain View, California: University of California, Center for the Study of Democracy, Assessing the Risk of Social Isolation of Suspects and Accused (ARISA), 2019. 68p.

Source: Internet Resource: Accessed May 28, 2019 at: https://arisa-project.eu/fileadmin/user_upload/publications_library/files/Handbook_ARISA_EN_WEB_03.2019.pdf

Year: 2019

Country: International

Keywords: Accused Individuals

Shelf Number: 156057


Author: Berbec, Silvia

Title: Human Trafficking and the Economic/Business Sectors Susceptible to be Involved in the Demand and Supply Chain of Products and Services Resulting from Victims' Exploitation

Summary: The study was developed within the framework of the Anti-trafficking stakeholders and economic sectors networking, cooperation to combat the business of human trafficking chain (NET-COMBAT-THB CHAIN) transnational project implemented with the financial support of the Internal Security Fund Police programme of the European Union. The project is coordinated by Association Pro Refugiu Romania, in partnership with Center for the Study of Democracy Bulgaria, Center for European Constitutional Law Greece, Italian Coalition for Civil Liberties and Rights, Verein für Internationale Jugendarbeit e.V. Landesverein Germany. The study, just like the entire project, is based on the current European and international context: the increasing demand for sexual services, the demand for cheap labour, the desire to make a profit with minimal investment are factors that intensify the activity of the networks of human trafficking. The economic and social situation in many countries has increased the vulnerability to trafficking of certain social groups. Human trafficking is a highly profitable business and the products of this criminal activity are largely reintroduced into the world economy and financial system. Among the existing recommendations at European level is that the EU Member States must make the necessary efforts to identify and put a stop to the involvement of the public-private sector in the human trafficking or its complicity (even indirectly) in this trafficking through measures to ensure that those persons working in these areas are trained to recognize such cases and report them to the relevant authorities. States must encourage dialogue and partnerships with stakeholders in order to bring together economic sectors, NGOs, anti-trafficking experts, in joint actions against human trafficking and to support workers and their rights, including the fundamental labour rights. National and international companies need to be aware of the negative effects of human trafficking and make the necessary efforts to ensure that their products are not obtained through exploitation of persons.

Details: S.L., 2019. 59p.

Source: Internet Resource: Accessed May 28, 2019 at: https://prorefugiu.org/human-trafficking-and-the-economicbusiness-sectors-susceptible-to-be-involved-in-the-demand-and-supply-chain-of-products-and-services-resulting-from-victims-exploitation/

Year: 2019

Country: International

Keywords: Exploitation of Persons

Shelf Number: 156058


Author: Our Watch

Title: Change the Story :Three Years on: Reflections on Uptake and Impact, Lessons Learned and Our Watch's Ongoing Work to Embed and Expand the Evidence on Prevention

Summary: In 2015, Our Watch, together with Australia's National Research Organisation for Women's Safety (ANROWS) and VicHealth, published a world-first shared national framework for the primary prevention of violence against women and their children. Since its publication, Change the story: A shared framework for the primary prevention of violence against women and their children in Australia has been widely shared and endorsed, and used in many different ways by diverse audiences, from practitioners to policymakers, across a range of settings, and among both small community groups and large organisations. In this time, Our Watch has also used Change the story as the evidence base that informs our own ongoing work – in policy development and advice to governments, in supporting established and emerging prevention practitioners and developing prevention models for different settings, and in the development of media content and social marketing campaigns to change social norms, attitudes and behaviours. Three years after its release, it is an appropriate time to review the uptake of, and response to, Change the story by readers and users of the framework across the country, and to consider the lessons we’ve learned from this feedback. It is also an opportunity to reflect and report on our own subsequent and ongoing work, which aims both to promote and embed the approach outlined in Change the story across Australia, and to continue to develop the evidence base and expand our own thinking. Reporting publicly on this review and reflection process is the purpose of this publication. It also delivers on the first part of a commitment made in Change the story itself, namely that it would be reviewed in 2018 in parallel with planning for the Fourth Action Plan 2019-2022 of the National Plan to Reduce Violence against Women and their Children 2010-2022 (hereafter 'the National Plan'), and again in 2021, to align with the final stage of this National Plan and the anticipated development of its successor. Given the short time since the publication of Change the story, this three-year review and reflection has been kept deliberately limited in scope – it does not, for example, include an updated review of the international literature and evidence on prevention that informed the original document. We envisage that the 2021 review will encompass this substantial task, as well as a comprehensive assessment of the strengths and weaknesses of Change the story after five years of application and a revision or expansion of the approach if warranted.

Details: Melbourne, Australia: Our Watch, 2019. 52p.

Source: Internet Resource: Accessed May 28, 2019 at: https://www.ourwatch.org.au/Media-Resources

Year: 2019

Country: International

Keywords: Australia

Shelf Number: 156065


Author: Ivandic, Ria

Title: Jihadi Attacks, Media, and Local Hate Crime

Summary: Empirical connections between local anti-Muslim hate crimes and international jihadi terror attacks are studied. Based upon rich administrative data from Greater Manchester Police, event studies of ten terror attacks reveal an immediate big spike up in Islamophobic hate crimes and incidents when an attack occurs. In subsequent days, hate crime is amplified by real-time media. It subsequently attenuates, but hate crime incidence cumulates to higher levels than prior to the series of attacks. The overall conclusion is that, even when they reside in places far away from where jihadi terror attacks take place, local Muslim populations face a media magnified likelihood of hate crime victimization following international terror attacks. This matters for community cohesion in places affected by discriminatory hate crime and, from both a policy and research perspective, means that the process of media magnification of hate crime needs to be better understood.

Details: London: Centre for Economic Performance, 2019. 53p.

Source: Internet Resource: Accessed May 28, 2019 at: http://cep.lse.ac.uk/pubs/download/dp1615.pdf

Year: 2019

Country: International

Keywords: Anti-Muslim

Shelf Number: 156068


Author: Thoms, Oskar Timo

Title: Human Rights Change, Politics of Law and Order, and Targeting of Torture

Summary: Human rights have improved but not everywhere and for everyone. Scholarship has focused on domestic conditions under which they improve but we know little about how they affect different groups. Whose rights are being protected? Under what conditions? I compare dissidents and criminals as targets of human rights violations – specifically torture. I also examine the effectiveness of human rights protections under conditions of public insecurity due to crime – as opposed to political or civil conflict or terrorism. I argue that mobilization and judicial enforcement are less effective in the face of public insecurity, and criminals benefit less than dissidents because courts provide less accountability for violations of those accused of crimes. Human rights treaties that depend on these mechanisms thus primarily benefit dissidents. My statistical analysis supports this argument and directly addresses concerns about measurement bias. The key finding is that commitment to the Convention against Torture enhances judicial protection only for dissidents.

Details: Vancouver, Canada: Simon Fraser University, School for International Studies, 2018. 50p.

Source: Internet Resource: Accessed May 28, 2019 at: http://summit.sfu.ca/item/18289

Year: 2018

Country: International

Keywords: Dissidents

Shelf Number: 156074


Author: Hideg, Gergely

Title: Darkening Horizons: Global Violent Deaths Scenarios, 2018-30

Summary: This Briefing Paper analyses trends in global violent deaths based on data updated to 2017, which provides a benchmark for the scenarios for the period 2018-30 that constitute the main focus of the paper. The year 2017 was characterized by a marked increase in lethal violence, primarily due to a rise in homicides (that is, non-conflict deaths). The paper presents three different, but plausible scenarios reflecting possible trends in global violent deaths in the period 2018-30. These are: (1) a 'business-as-usual' scenario, where international efforts to reduce lethal violence continue as at present; (2) a positive scenario, where concerted efforts lead to reductions in global violent death rates; and (3) a negative scenario, where inaction and escalating lethal violence cause a significant increase in global violent death rates. All three scenarios are derived from longer-term trends and underline the need for policy-makers to renew efforts to achieve the Sustainable Development Goals (SDG) Target 16.1.

Details: Geneva, Switzerland: Small Arms Survey, 2019. 12p.

Source: Internet Resource: Accessed May 30, 2019 at: https://reliefweb.int/report/world/darkening-horizons-global-violent-deaths-scenarios-2018-30

Year: 2019

Country: International

Keywords: Arms Trafficking

Shelf Number: 156084


Author: Carrington, Kerry

Title: The Role of Women's Police Stations in Widening Access to Justice and Eliminating Gender Violence

Summary: This address is relevant to the priority theme of the 63rd meeting of the UN CSW of providing access to sustainable infrastructure for gender equality and the empowerment of women in order to eliminate violence against women and girls. First, outline the case for sex segregated policing, then briefly describe the emergence of women's police stations, next we outline the results of our study on the role of women's police stations in Argentina in responding to and preventing gender violence. Finally, we present some policy and practice lessons for UN Women to consider in relation to achieving the sustainable development goal of eliminating violence against women. The study is funded by the Australian Research Council and includes a multi-country team of researchers from Australia and Argentina whose contributions we gratefully acknowledge.

Details: S.L.: United Nations Conference Paper, 2019. 17p.

Source: Internet Resource: Accessed May 30, 2019 at: https://eprints.qut.edu.au/127632/

Year: 2019

Country: International

Keywords: Female Police Officers

Shelf Number: 156094


Author: Coaffee, Jon

Title: Enhancing Public Security through Use of Social Media: The Good, the Bad and the Ugly

Summary: This paper focuses upon the emerging findings of an ongoing Horizon 2020 project -MEDIat4SEC: The Emerging Role of New Social Media in Enhancing Public Security. Working actively with police forces across Europe, MEDIat4SEC is creating a future roadmap for the role of social media in law enforcement and public security planning, not only for communication purposes and as a listening platform, but also as a tool for collaboration – a digital realm where policing and crime prevention can be done in new ways with new types of digital and real-world interventions. The ongoing results of MEDIat4SEC presented here illuminate a variety of police tasks are increasingly utilising social media. Such activities further highlight a series of challenges and opportunities for policing associated with organisational change, legal and ethical issues, privacy, transparency and liability, technological infrastructure and training required and budgetary concerns that are likely to shape the take up of social media usage in police forces around Europe in the coming years.

Details: Budapest, Hungary: CEPOL (European Union Agency for Law Enforcement Training), 2019. 14p.

Source: Internet Resource: Accessed May 30, 2019 at: https://bulletin.cepol.europa.eu/index.php/bulletin/article/view/350

Year: 0

Country: International

Keywords: Law Enforcement

Shelf Number: 156095


Author: United Nations Environment Programme

Title: Analysis of the Environmental Impacts of Illegal Trade in Wildlife

Summary: The severity, diversity and global scale of the illegal trade in wildlife and wildlife products (ITW) has been recognised at various levels of international policy making, including the UN General Assembly (UNGA), the UN Environment Assembly (UNEA), UN ECOSOC, the UN Security Council, the Commission on Crime Prevention and Criminal Justice, and most recently in the Sustainable Development Goals (SDGs), as well as various conventions, agreements and other high-level political conferences. Government leaders, the international community, and civil society have responded by defining and strengthening commitments to address ITW through a range of measures, including through the development of regional and sub-regional strategies and action plans. However, considerable gaps in the current state of knowledge about the drivers, status, and impacts of ITW hinder the effectiveness of these efforts. More robust and up-to date evidence is needed if we are to have better-informed and more effective interventions, with greater coherence at the policy and advocacy level. This analysis goes some way to addressing this need by compiling and synthesizing for the first time the evidence base on the environmental impacts of ITW across taxonomic and geographic scales. Using the best available evidence, the analysis provides a cross-section of the currently available information and thus improves the current state of knowledge of the scale and broader impacts of ITW. The most documented environmental impact directly attributed to ITW is the decline in population size of iconic target species, for example tigers, now driven to the brink of extinction as a result of growing international demand for their parts and derivatives. Poaching and illegal harvesting methods can also alter the demographic and genetic structure of species: illegal logging, for instance, has the tendency to remove the largest and most reproductively valuable trees, which consequently has negative impacts on regeneration and the gene pool of the population. The impacts of ITW on the environment go beyond the immediate detrimental effects on target species. For instance, ITW can lead to the spread of diseases and invasive species when live animals are moved across international borders. Many illegal harvest methods have limited or no selectivity and result in substantial incidental mortality of non-target species: illegal dynamite fishing, bottom trawling and use of driftnets are all prominent examples of this. The analysis also highlights the cascading ecological effects deriving from the loss of species through ITW, and the resulting deterioration of ecosystem functions and services of both global and local importance. Compelling case studies such as on the illegal production of charcoal, which has been proven to contribute to deforestation and desertification, illustrate these intertwined effects. Ultimately, the negative impacts of ITW on ecosystem functioning adversely affect rural livelihoods both in the short- and long-term, creating major barriers to indigenous peoples in sustainably managing their natural resources, undermining good governance, the rule of law and national security. It is of critical importance to strengthen the policy and institutional frameworks to combat ITW at global, regional and national levels, not only to conserve biodiversity, but also to support sustainable development. Environmental policies should provide an enabling environment for communities to be involved in wildlife governance and derive benefits from its conservation and sustainable use. Furthermore, a robust mechanism for collating and monitoring global data on incidences of ITW, as well as the effectiveness of interventions to combat ITW, should be put in place to improve the evidence base and to provide a reliable and up-to-date information source for targeted actions. This will support the response to ITW at global, regional and national level and provide a foundation to tracking progress in addressing ITW and in meeting the relevant Sustainable Development Goal targets. Safeguarding biodiversity requires addressing the multiple, and often interconnected threats - not only from illegal trade, but also from habitat loss and fragmentation, pollution, invasive species and climate change. As the international community moves ahead with implementing the numerous commitments already in place, and with more actors, financial resources and knowledge, there is a growing need to ensure coherence and coordination in the international response, and to ensure that such responses are kept under review and are based on the best available scientific evidence to ensure effectiveness.

Details: New York City: United Nations Environment Programme, 2017. 55p.

Source: Internet Resource: Accessed May 30, 2019 at: https://wedocs.unep.org/bitstream/handle/20.500.11822/17554/FINAL_%20UNEA2_Inf%20doc%2028.pdf?sequence=2&isAllowed=y

Year: 2017

Country: International

Keywords: Environmental Crime

Shelf Number: 156100


Author: United Nations Office on Drugs and Crime (UNODC)

Title: The International Legal Definition of Trafficking in Persons: Consolidation of Research Findings and Reflection on Issues Raised

Summary: In line with the steady progress towards universal ratification of the UN Trafficking in Persons Protocol, UNODC has, in recent years, continued to evolve its efforts to bring greater clarity on the internationally agreed-upon definition on trafficking in persons. Despite the best efforts of drafters and the harmonization of national laws with the international definition, States are in fact still grappling with practical, day-to-day challenges stemming from a lack of conceptual understanding of 'trafficking in persons'. This, in turn, leads to inconsistent application of trafficking laws and ultimately hampers the effective implementation of the international legal framework around this crime, and its national equivalents. On 22 January 2019, UNODC launched a new Issue Paper on The International Legal Definition of Trafficking in Persons, thanks to the generous and long-term support of the Government of Switzerland. This publication consolidates learning from the drafting and publication of three earlier technical issue papers and one guidance note regarding specific elements of the legal definition of trafficking in persons:The new paper aims, in particular, to guide consideration and development of practical guiding principles for criminal justice practitioners that emerge from the three definitional concept papers, and the underlying practical experience in over 30 jurisdictions, as well as determine next steps for further research and analysis. In order to bring together the broadest range of views and perspectives, the development of this and the previous issue papers involved detailed in-country research, conducted through the dissemination of surveys that included analysis of national legal frameworks and associated practice, as well as interviews with national practitioners. The findings were then scrutinized during extensive consultations with independent, national and regional experts who shared information and provided important conceptual inputs as well as country case studies. The underlying cooperative efforts exemplify UNODC's commitment to ensuring the integrity of its work within its mandate of providing robust legislative assistance to States. As part of the efforts to bring about conceptual clarity as well as stronger reflection on State practice and experience, UNODC is also currently working on the review and revision of two important guidance materials, namely the Legislative Guide to the United Nations Trafficking in Persons Protocol (published in 2004), supporting ratification and implementation of the Protocol to Prevent, Suppress and Punish Trafficking in Persons, especially Women and Children and the Model Law against Trafficking in Persons (published in 2009), supporting the review and amendment of existing legislation and adoption of new legislation by States themselves. The revision exercise started with a first expert consultation in December 2018 and a second one in January 2019 on the Model Law. To those, a further consultation on the revision of the Legislative Guide will follow on 28-30 January 2019, as well as an additional expert consultation in early February 2019 to finalize the revision of the Model Law. The revised versions of these tools are expected to be published in mid-2019.

Details: Vienna, Austria: United Nations Office of Drugs and Crime, 2018. 43p.

Source: Internet Resource: Accessed May 30, 2019 at: https://www.unodc.org/documents/human-trafficking/2018/Issue_Paper_International_Definition_TIP.pdf

Year: 2018

Country: International

Keywords: Human Smuggling

Shelf Number: 156073


Author: Heiskanen, Markku

Title: Crime and Gender: A Study on How Men and Women are Represented in International Crime Statistics

Summary: The analysis in this publication is specifically focused on gender. It looks at the differences in the number of men and women represented in the criminal justice statistics. The first section presents global crime statistics based on the UN-CTS data. These global rates are shown by different regions and income levels, and where possible, ten-year trends are also presented from 2004 to 2013. The second section focuses on selected crime categories in Europe, using data from the European Sourcebooks of Crime and Criminal Justice Statistics (ESB). Based on the two data sources, we present sex-disaggregated rates for the following crime categories; total crime, homicide, rape offences, assault, theft, and fraud. Furthermore, the report includes information on the number of men and women among the police staff globally, and also explores possibilities of using indicators to study attrition, i.e., the trickling out of cases from the criminal justice process.

Details: Helsinki, Finland: European Institute for Crime Prevention and Control (HEUNI), 2016. 88p.

Source: Internet Resource: Accessed May 31, 2019 at: https://www.heuni.fi/material/attachments/heuni/reports/Ast1S7Egx/Crime_and_gender_taitto.pdf

Year: 2016

Country: International

Keywords: Crime and Gender

Shelf Number: 156122


Author: United Nations Office on Drugs and Crime (UNODC)

Title: Issue Paper: The Concept of "Financial or Other Material Benefit" in the Smuggling of Migrants Protocol

Summary: Smuggling of migrants is defined in the Smuggling of Migrants Protocol as: "the procurement, in order to obtain, directly or indirectly, a financial or other material benefit, of the illegal entry of a person into a state party of which the person is not a national" (article 3). The drafters of the Smuggling of Migrants Protocol elected to include the "financial or other material benefit" (FoMB) not only as an element of the definition of the offence but also as a requirement for its criminalization (article 6). However, in criminalizing migrant smuggling, many States Parties to the Protocol have not included a financial or material benefit element, despite it being a key component of the international definition. This disparity raises questions about the impact that different approaches to the definition may have on efforts to mount effective and coordinated responses to the transnational crime of smuggling of migrants. Recognizing the critical importance of a common understanding of the internationally agreed definition, UNODC has undertaken the present study into the "financial and other material benefit" element of the definition of migrant smuggling. The study examines legislation and case law among a broadly representative group of States in order to gain a comparative perspective on how this aspect of the definition has been understood and applied. It gives particular attention to the experiences and views of practitioners who are involved in investigating and prosecuting migrant smuggling and related crimes.

Details: Vienna, Austria: United Nations Office of Drugs and Crime, 2017. 102p.

Source: Internet Resource: Accessed May 31, 2019 at: https://www.unodc.org/documents/human-trafficking/Migrant-Smuggling/Issue-Papers/UNODC_Issue_Paper_The_Profit_Element_in_the_Smuggling_of_Migrants_Protocol.pdf

Year: 2017

Country: International

Keywords: Border Security

Shelf Number: 156146


Author: Lietonen, Anni

Title: Guidelines for Businesses and Employers for Risk Management in Subcontracting Chains: Preventing Labour Exploitation and Human Trafficking in Finland

Summary: The purpose of this guide is to give companies a brief overview on the risks of labour exploitation and demonstrate how the involvement in such scenarios can be avoided. The content is intended to be used as an information and risk management tool, which can help to promote ethically defensible enterprise that respects human rights. Even though the content is somewhat geared towards the Finnish context, any company that is or may become involved in labour exploitation, one way or another, can make use of the guide. It also features checklists, which contain various measures with which companies are able to reduce the risk of exploitation, especially in subcontracting and production chains. Such measures are of extreme importance, since companies may find themselves in dire straits, should signs of labour exploitation be discovered in, for instance, their subcontracting chains. Even simple misunderstandings can be damaging, since rumours are known to spread rapidly in the media, affecting the way clients and people in general view companies. Negative publicity can seriously affect the company's reputation, which in turn can translate to the loss of customers or profit. And should worst come to worst, the discovery of labour exploitation within the company's operations can result in police investigation, charges and, eventually, criminal convictions. Labour exploitation can be found especially in business lines where subcontracting chains consist of numerous links, e.g. in the construction and cleaning industries. The more links there are to the chain, the more difficult it is to survey how the subcontractors carry out their business. This means that companies are in danger of being involved in labour exploitation or even human trafficking due to possible abuse or neglect of working conditions on the subcontractor's part.

Details: Helsinki, Finland: European Institute for Crime Prevention and Control (HEUNI), 2019. 29p.

Source: Internet Resource: Accessed May 31, 2019 at: https://www.heuni.fi/material/attachments/heuni/reports/aUBaR9OYb/HEUNI_report_88c_Guide_for_businesses_and_employers_1405.pdf

Year: 2019

Country: International

Keywords: Construction Industry

Shelf Number: 156125


Author: Skorvanek, Ivan

Title: Surveillance, Criminal Procedure, and Regulatory Connection: The Case of Sewage Monitoring

Summary: This paper analyses the implications of a new form of surveillance - sewage monitoring - for criminal procedural law. Current law has not been written with a view to covering novel, technology-enabled forms of covert data acquisition, posing a challenge of regulatory connection. To what extent are new surveillance methods, such as sewage monitoring to combat drugs production, covered by existing legal frameworks? This question is answered through analysing the shifting nature of criminal investigation, reflecting on how to interpret laws not written for new technologies, and assessing checks and balances needed when law enforcement employ sewage monitoring in criminal investigation. The analysis is illustrated with reference to the legal systems of Germany, Poland, and the Netherlands, using legal doctrinal research. The main findings are 1) that sewage monitoring is not particularly intrusive as such, but constitutes a new form of investigation that legally differs significantly from traditional surveillance powers, 2) that comparable methods do not provide unequivocal analogies that could serve to find a legal basis, 3) that functionality of evidence collection poses legal and procedural challenges, which may have implications for the covertness of the method, and 4) that even if only used as a diagnostic tool, some form of transparency and oversight will be needed to legitimate the non-negligible potential interference with fundamental rights and to enable those subjected to sewage monitoring to contest the usage in court.

Details: The Netherlands: Tilburg Law and Technology Working Paper Series, 2019. 37p.

Source: Internet Resource Working Paper: Accessed May 31, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3377466

Year: 2019

Country: International

Keywords: Criminal Investigation

Shelf Number: 156126


Author: Campbell, Caylee E.

Title: A Child's Right to be Protected from Exposure to Online Pornography: Assessing the Harm Caused by Contemporary Online Pornography and Evaluating Current Regulatory and Legal Frameworks Aimed at Child Protection Online

Summary: Following the violent abduction, rape, and murder of eight-year old Asifa Bano in Kathua, Kashmir, her name topped the trending search board on at least one major pornography website. Across the globe in the United Kingdom, one thirteen-year-old boy reported, "I have been bullied into watching pornographic videos by people at school, which makes me feel sick. One showed a woman being raped, it was so upsetting." Another young girl confessed, "I am really ashamed and now I am getting emails from tons of porno sites. I am so scared my mum is going to find out." Pornography is not harmless. Each day children as young as five are exposed, either inadvertently or via deliberate searches, to shockingly violent content comprising today's mainstream pornography. The effects of young children viewing "barely legal" content and consuming sexually aggressive messages at a young age manifest in a slew of harms that are grave enough to have prompted governmental regulation. In addition to critically evaluating the incoming age-verification requirement for commercial pornography providers, we as individuals, parents, teachers, and communities need to recognise childhood exposure to pornography as a public health issue and react accordingly. Regulation alone is insufficient to uphold children's rights to be free from harm, to enjoy childhood, and to develop in a healthy manner. Our response must emphasise, without regard to politics or morality, the harms that pornography poses for children and seek to raise awareness across all sectors; we need to ensure that the pornography industry is held legally and socially accountable, as well as train educators to frankly discuss the issues with parents and children. Most importantly, we must commit to keeping children's voices at the centre of our discussions and to listen intently to their suggestions, concerns, and questions surrounding pornography and sexuality.

Details: Boston, Massachusetts: International Journal of the Jurisprudence of the Family, Boston College Law School Legal Studies Research Paper 2019. 67p.

Source: Internet Resource: Accessed May 31, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3381073

Year: 2019

Country: International

Keywords: Pornography

Shelf Number: 156132


Author: Fox, Emma

Title: Islamic Human Rights Commission: Advocating for the Ayatollahs

Summary: The Islamic Human Rights Commission (IHRC) is a London-based advocacy group established in 1997, inspired by the worldview of Ayatollah Khomeini and the revolutionary, theocratic societal aims he established in the Islamic Republic of Iran. IHRC has gained prominence in recent years for its pro-Hezbollah AlQuds Day parades, its controversial 'Islamophobia Awards' and the anti-Semitic rhetoric espoused by the group's senior figures. However, less attention has been given to IHRC's wider extremist links and terrorist sympathies. There is also a lack of understanding as to how extremist groups can exploit the charitable sector; obtain public funds; acquire status via academic associates; attain international recognition; and influence governments. IHRC is an institutionally pro-terrorist and anti-Semitic organisation. Senior figures have espoused support for violent jihad, expressed sympathy for convicted terrorists, and advocated for the extraction and eradication of 'Zionists'. Campaigns have supported high-profile associates of Al-Qaeda, the Taliban, the Popular Front for the Liberation of Palestine (PFLP), and Hezbollah. Events have hosted representatives from PFLP and Hezbollah, and have been used to seek out those "looking for martyrdom". One IHRC briefing claims that use of force against Israel can include the "destruction of installations" on her territory and "the financial, logistical and informational support" of Hezbollah. Some remarks, views or material advanced by individuals associated with IHRC, or at IHRC-organised events, may warrant criminal investigation with regard to S.11-13 Terrorism Act 2000 and S.1-4 Terrorism Act 2006. IHRC's alignment with the Iranian state's foreign and domestic agenda is typified through IHRC co-founder and director Saied Ameli’s appointment to President Hassan Rouhani's Supreme Council of the Cultural Revolution in 2019, having previously served as a member of Ayatollah Khamenei's Supreme Council of Cyberspace. Despite Ameli's role as a senior Iranian state official, he has continued to play an active role at IHRC. IHRC advisors have expressed sympathy for martyrdom and jihad, as well as support for militant resistance movements. Multiple advisors have been linked to overseas proscribed groups. This includes Muhammad al-Massari, a "key influence on young jihadists" who previously helped establish a press office for Osama Bin Laden in London. IHRC sells literature authored by Islamist and Salafi–Jihadist ideologues, including one book that is banned in UK prisons. This includes publications that have inspired violent Islamist movements across the globe, such as Sayyid Qutb's Milestones, Sayyid Abul A'la Mawdudi's work on jihad, and writings by Ibn Taymiyyah. They have also sold Abdullah el-Faisal’s violent interpretations of the Qur’anic hadith. Convicted of inciting racial hatred in this country, el-Faisal is currently fighting extradition from Jamaica to the US, where he is accused of recruiting for the Islamic State terror group (IS). Proceeds from the bookshop go towards the organisation's subsidiary charity, IHRC Trust.IHRC has acquired UN Special Consultative Status, European Commission funds, and public subsidies through its charitable affiliate, IHRC Trust. IHRC Ltd is also an accredited immigration advisor. It is particularly concerning that several academics who have engaged with IHRC have recently gained government and cross-party parliamentary influence. This includes Salman Sayyid, who coauthored the APPG on British Muslims' definition of Islamophobia, and Sadek Hamid and Tahir Abbas who were selected by the Commission for Countering Extremism to research extremism.

Details: London: The Henry Jackson Society, 2019. 60p.

Source: Internet Resource: Accessed June 3, 2019 at: https://henryjacksonsociety.org/wp-content/uploads/2019/05/HJS-IHRC-Report-WEB.pdf

Year: 2019

Country: International

Keywords: Anti-Semitic

Shelf Number: 156139


Author: Fisher, Julie

Title: Lighting the Way: Lighting, Sanitation and the Risk of Gender-Based Violence Omugo Extension Camp, Uganda

Summary: Humanitarian agencies strive to provide sanitation facilities which are safe, accessible and afford users privacy and dignity. Yet in reality, women in particular have many concerns which can prevent them from using the facilities, especially after dark. This report documents field research on whether sanitation lighting reduces risks of gender-based violence in Omugo Extension Camp in northern Uganda. It explores the perceived risks - including those relating to gender-based violence - and shares camp residents' views on what would make them feel safer using sanitation facilities. It is part of wider research, with studies also taking place in Iraq and Nigeria.

Details: S.L.: Oxfam, 2018. 44p.

Source: Internet Resource: Accessed June 3, 2019 at: https://gbvguidelines.org/wp/wp-content/uploads/2019/04/rr-lighting-the-way-research-uganda-211218-en.pdf

Year: 2018

Country: International

Keywords: Facility Security

Shelf Number: 156152


Author: Cavill, Sue

Title: Lighting, WASH and Gender-Based Violence in Camp Settings: Literature Review

Summary: Poor lighting at water, sanitation and hygiene (WASH) facilities may reduce the usage of latrines and other services such as bathing areas and water collection points; especially by women and children. Generally, poor lighting may contribute to fear of crime and specifically Gender-Based Violence (GBV), which may, in turn, further reduce the use of the WASH facilities. For example, in Haiti, teenage girls surveyed by the United Nations (UN) Stabilisation Mission stated that they were afraid to use latrines at night because of the lack of lighting (Emery et al., 2011). Improving lighting is intended to mitigate GBV, promote feelings of safety and increase usage of WASH facilities. This literature review is part of a Humanitarian Innovation Fund (HIF)-funded research project, conducted by Oxfam and the Water, Engineering and Development Centre (WEDC) on lighting for safer sanitation use, with the specific aim of reviewing existing literature and good practice on lighting, fear of crime and sanitation. It also informs the development of data collection tools for use in the three fieldwork study countries of Iraq, Nigeria and Uganda. The detailed review is focused on the following research questions: 1. Are there any existing recommendations/guidelines around lighting WASH facilities in camp settings? 2. What do WASH and GBV experts think about the potential for lighting at WASH facilities? Do they have a preference for the kind of lighting that would be logistically easiest/most effective? 3. What evidence exists that indicates improved lighting at WASH facilities in camp settings could reduce GBV? 4. What evidence exists that indicates improved lighting at WASH facilities in camp settings can improve WASH facility use? 61 articles were located through a keyword search. 38 of these had an explicit focus on lighting at WASH facilities and reported on GBV or increased use of WASH facilities and therefore were included for in-depth review and further synthesis. In terms of keywords used to search for articles in relation to GBV, the literature review focussed mainly on the aspects of physical and sexual violence of GBV, including sexual harassment, assault, verbal and physical violence, and intimidation to persons, especially those who have different sexual orientation (e.g. Lesbian, Gay, Bisexual, Transgender and Intersex (LGBTI)). Studies were included if improved lighting at WASH facilities was the main intervention and if there was an outcome measure on GBV or WASH usage. Most of the evidence identified on GBV, lighting and access to WASH is grey literature that is qualitative and anecdotal in nature. Nearly all this literature makes mention of the threats women and girls feel accessing sanitation facilities and the additional perceived and real threat that darkness poses to safety. Much of the peer-reviewed literature suffers from various flaws: weak study design, inadequate measures of lighting (e.g. type of light and how the lighting was provided at WASH facilities), poor measures of GBV, and insufficient appreciation of the impact of lighting on feelings of safety. The emergency response in Haiti is the most widely documented example of where lighting is used to address GBV and WASH. Overall, the published and grey literature found that improving lighting at WASH facilities was followed by increased feelings of safety. There is limited specific evidence of a decrease in GBV, given that reported cases of GBV are an unreliable indicator of prevalence. Fear of GBV, however, may be a more reliable indicator as it has a significant impact on behaviour and overall perceptions of safety. In saying this, lighting (or improved lighting) of WASH facilities provided some suggestion of an increase in usage of the facilities. Limitations in specific evidence of the decrease in GBV incidences may be due to people not wanting to disclose the incident because of cultural taboos, fear of rejection from their community, and threats from their attackers and others. Based on the current state of knowledge from humanitarian practitioners and the literature reviewed, the following recommendations were suggested: Interventions to improve lighting should be complemented by increased security patrols, appropriate design parameters (e.g. distance between male and female latrines), mechanisms to report GBV and ensure safe and timely access to these for the victims; Fear affects the use of WASH facilities, thus individual factors such as age and gender are highly influential. Further attention is needed on the effects of these factors on lighting around WASH facilities and particularly for vulnerable groups such as people with disabilities and the LGBTI community. In addition, the time of day (day or night) or season was not highlighted in most studies but requires further examination as these are considered to be important contributors to fear of crime; Identify training materials and/or guidelines that can be implemented by WASH staff at a country level. Training materials must be designed to correlate with the main WASH activities in humanitarian settings (e.g. appropriate design features of WASH facilities in relation to solutions to increase protection, particularly to women and girls); and There is a lack of information regarding responsibilities in funding, maintenance and Monitoring and Evaluation (M&E) for lighting initiatives, especially during a humanitarian response. Experts recommended that responsibilities must be clearly addressed during coordination meetings, especially at the beginning of an intervention.

Details: S.L., 2018. 68p.

Source: Internet Resource: Accessed June 3, 2019 at: https://gbvguidelines.org/wp/wp-content/uploads/2019/04/rr-lighting-sanitation-literature-review-211218-en.pdf

Year: 2018

Country: International

Keywords: Facility Security

Shelf Number: 156153


Author: Weinstein, Naomi M.

Title: "Who's Pretending to Care for Him?" How the Endless Jail-to-Hospital-to-Street-Repeat Cycle Deprives Persons with Mental Disabilities the Right to Continuity of Care

Summary: There is a well-documented "shuttle process" by which individuals committed to psychiatric institutions (having been charged with minor "nuisance"-type criminal offenses) are often stabilized, returned to jail to await trial, and then returned to the hospital following relapse. This shuttling or cycling is bad for many reasons, not least of which is the way that it deprives the cohort of individuals at risk from any meaningful continuity of care. Continuity of care is crucial in order to reduce the rate of incarceration and institutionalization for persons with mental illness. Without this continuity, it is far less likely that any therapeutic intervention will have any long-lasting ameliorative effect. In this paper, we will argue that the current system - in addition to being utterly counter-productive (and in many ways, destructive) – also violates the constitutional right to treatment, and the statutory right to non-discrimination as provided in domestic (the Americans with Disabilities Act) and international (the Convention on the Rights of Persons with Disabilities) human rights law. This also violates every precept of therapeutic jurisprudence; in this context, we argue that it is necessary for lawyers to integrate these teachings - focusing on the prerequisites of "voice, validation and voluntariness" - in their representation of this population in the hopes that the current system can be ameliorated. In conclusion, we will offer some solutions as to how continuity of care can be improved through mental health courts, programs that support diversion away from incarceration to treatment at an early process in a criminal proceeding, proper mental health screening, expanded access to mental health treatment and better re-entry services, and training for all persons interacting with someone with mental illness.

Details: New York: New York Law School Legal Studies Research Paper, 2017. 74p.

Source: Internet Resource: Accessed June 4, 1029 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3030350

Year: 2017

Country: International

Keywords: Continuity of Care

Shelf Number: 156165


Author: Human Rights Watch

Title: "Paying for a Bus Ticket and Expecting to Fly": How Apparel Brand Purchasing Practices Drive Labor Abuses

Summary: Soon after the Rana Plaza collapsed in 2013 in the outskirts of Dhaka, Bangladesh, killing over a thousand workers, a top official from a global brand flew into Pakistan. His sudden trip was sparked by the desperation to make up for orders his company had placed, and lost, with a factory destroyed in the Rana Plaza disaster. He concluded a business deal with a new Pakistani garment supplier and flew out within hours. Usual factory onboarding procedures were discarded. The fact that the global brand had previously rejected the supplier for "failing" social audits (inspections to check working conditions) did not matter. The brand's business needs trumped workers' rights. Lamenting the duplicity of the brand, a Pakistani garment supplier who followed this transaction and narrated its details to Human Rights Watch, said, "All this because he (the global brand representative) had to make up the order placed at Rana Plaza - and all ethics went out of the window. Everybody is like that." The Rana Plaza disaster was a wake-up call to the world - 1,138 workers died and over 2,000 were injured. It shone a light on the problem of death trap factories and poor government oversight. It also revealed much about how apparel brands do business and about their commitments to workers' rights. The nature of the apparel business is such that brands need to pay attention to market trends and consumer preferences that can change with dizzying speed. With the tremendous growth of online shopping, experts say global brands' ability to churn out products quickly is key to success. A maze of decisions underpins the development of each product before it hits the shelves. From forecasting consumer demand and planning; sales and marketing; designing products; selecting factories for manufacturing, monitoring them for social and labor compliance; and placing orders with and paying suppliers, numerous departments within a brand are involved in decision-making. Alternatively, some parts of these decisions maybe made through agents. This complex web of decisions is generally referred to as a brand's sourcing and purchasing practices. This report is based largely on interviews with garment suppliers, social compliance auditors, and garment industry experts, including those with at least a decade's experience sourcing for numerous global brands; hundreds of interviews with workers; and trade export data analysis for key producing markets from Asia. The report argues that brands' poor sourcing and purchasing practices can be a huge part of the root cause for rampant labor abuses in apparel factories, undercutting efforts to hold suppliers accountable for their abusive practices. Because brands typically have more business clout in a brand-supplier relationship, how brands do business with suppliers has a profound influence on working conditions. Brands can and should balance the twin goals of responding to consumer demands and protecting workers rights in factories that produce for them. This can only happen if they invest in a variety of human rights due diligence tools also needed to monitor and rectify their sourcing and purchasing and adopt key industry good practices. These steps will go a long way in discharging brands' responsibilities articulated in the UN Guiding Principles on Business and Human Rights (UN Guiding Principles) and the Organisation for Economic Cooperation and Development Due Diligence Guidance for Responsible Supply Chains in the Garment and Footwear Sector (OECD Due Diligence Guidance on Garments).

Details: New York: Human Rights Watch, 2019. 70p.

Source: Internet Resource: Accessed June 4, 2019 at: https://www.hrw.org/report/2019/04/23/paying-bus-ticket-and-expecting-fly/how-apparel-brand-purchasing-practices-drive

Year: 2019

Country: International

Keywords: Corporate Misconduct

Shelf Number: 156163


Author: Mai, Heike

Title: Cash, Freedom and Crime: Use and Impact of Cash in a World Going Digital

Summary: With the growing use of electronic payments, the need for physical cash is no longer self-evident. Indeed, cash has come under scrutiny for reasons of monetary policy, law enforcement and efficiency. Although cash-related evidence is scarce, facts rather than emotions should found the debate on the future of physical cash. Demand for euro cash is on the rise. Euro cash in circulation grew to EUR 1.1 trillion by Q3 2016, three times as much as in 2003. Also, cash grew faster than GDP at current prices. In the field of monetary policy, physical cash can be a crude instrument in anyone's hands. If bank deposits are withdrawn in cash on a large scale, financial institutions and monetary authorities can be pushed to the limits of their power. Abolishing cash will not eliminate profit-driven crime. Alternative ways of transferring the proceeds from illegal activities can substitute cash, albeit at higher transaction costs. Payments go digital and fraud follows: An (almost) cashless Sweden sees card fraud rising. However, the general safety of both cash and cashless transactions in Europe is high. Cash provides data protection and can therefore act as a guarantor of civil liberties in the event of an administration abusing its powers. The abolition of physical cash may be regarded as an attempt to tighten control over citizens. Trust in public authorities would erode.

Details: Frankfurt, Germany: Deutsche Bank Research, 2016. 20p.

Source: Internet Resource: Accessed June 4, 2019 at: https://www.dbresearch.com/servlet/reweb2.ReWEB?ColumnView=0&ColumnViewRwd=0&ColumnViewRwdFree=AT%2CDU2%2CTI%2CDA%2CT3%2CT1%2CT2%2CPE%2CNR%2CTE%2CDU1&ColumnViewRwdStyle=gmlist4&DocumentLanguage=EN&DocumentLayout=%24%2BSTFI%2C-SHEO%2CMEKL%2CMPEK&ElementCount=12&ElementKey=PROD0000000000441785&ExcludeIssue=PROD0000000000441785&ExcludePeriodical=PROD0000000000435639%2CPROD0000000000449408&Hits=12&LayoutTypeResult=rpsResultPage&LayoutTypeResult2=rpsResultAndFilter&NoStandardPage=OFF&OrderDirection=Desc&OrderTerm=Date&PageTitle=lTANfUkMmNf721Z65tXwUpp1EUYb1d7e1zFNNQ7X5EomUV8hYH0P3ILGa5O4gbhrQEyVEml1PVNBBNPjLP0aI93Xpc98m4k3Ge37woUgt2dmp9kiwOWRUA%3D%3D&ProdCollection=+&Property=7&TopicOperator=4&Topics3=INTERNAT&Topics4=THEMATIC&addCssJs=rpshome&dateColumnFormat=6&rfAjaxResult=false&rfAjaxUserFiltersView=TI%2CT3%2CT1%2CT2%2CPE&rfDocumentType=DOCU&rwdspl=0&rwnode=INTERNAT&rwobj=ReFIND.ReFindSearch.class&rwsite=RPS_EN-PROD

Year: 2016

Country: International

Keywords: Cash Transactions

Shelf Number: 156167


Author: Heard, Catherine

Title: Towards a Health-Informed Approach to Penal Reform?: Evidence from Ten Countries

Summary: In the year 2000, the world's prison population numbered around 8.7 million; less than two decades on, it stands at well over 11 million. The steady growth in prisoner numbers has given rise to severe prison overcrowding in much of the world, in both developed and less developed countries. Our World Prison Brief data show that prison systems are now overcrowded in well over 60 per cent of the world's countries. When prison population growth is not matched by increased investment in built capacity, staff and other resources (as it almost never is), living conditions quickly deteriorate, as do standards of sanitation, healthcare, wellbeing and safety. The consequences for health - not only the health of prisoners and staff but also of their families and wider society - are serious.

Details: London: Birkbeck University of London and Institute for Criminal Policy Research, 2019. 44p.

Source: Internet Resource: Accessed June 4, 2019 at: http://www.prisonstudies.org/sites/default/files/resources/downloads/icpr_prison_health_report.pdf

Year: 2019

Country: International

Keywords: Mass Incarceration

Shelf Number: 156172


Author: Barnes, Curtis

Title: Perception Inception: Preparing for Deepfakes and the Synthetic Media of Tomorrow

Summary: Contemporary audio-visual effects technologies now allow for the creation and manipulation of information in challenging ways never before encountered. They can be used to put words in people's mouths, portray people doing things they never did, copy their faces and voices, or even create entirely new faces and voices that appear thoroughly human. This research report considers the wide-ranging social, legal and policy issues arising. Synthetic media technologies have huge potential benefits, but they also have risks. Public awareness of this risk of deception has grown through discussion of one kind of emerging audiovisual technology known as "deepfakes". The existence of such technologies may undermine general trust in audiovisual information to some degree. The researchers anticipate that synthetic media will continue to improve, becoming better and more accessible. They think it likely that in the near future, consumers and citizens will be regularly exposed to audio, images and video that looks or sounds as if it is a reliable representation of factual events, even though it is not. It is information that gives the impression that it was "captured", when in fact it was "constructed" to a greater or lesser extent. Lots of this information will be benign or beneficial, but some of it will be harmful. The researchers are not convinced that enacting substantial new law is either necessary or the best way to address the harms that may be generated by synthetic media. They also identify a risk that, where new law goes beyond existing law, it may abrogate rights of freedom of expression. Synthetic media is a means of expression like many others. One of the more significant gaps in New Zealand law is not so much a gap as a boundary. It is a result of the nature of its jurisdictional limits to its own sovereign borders (in most cases): in particular, its application to overseas actors, whether other internet users, or to large social media platforms. Importantly, this is not an issue unique to New Zealand or to synthetic media technologies. In their research report from page 122 to 129, the researchers set out their conclusions, identify specific gaps in New Zealand law and make specific recommendations, as well as provide concluding remarks.

Details: Wellington, New Zealand: New Zealand Law Foundation, 2019. 143p.

Source: Internet Resource: Accessed June 4, 2019 at: https://apo.org.au/node/236911

Year: 2019

Country: International

Keywords: Audiovisual Technology

Shelf Number: 156175


Author: AUSTRAC

Title: Traveller's Cheques: Money Laundering and Terrorism Financing Risk Assessment

Summary: AUSTRAC has published an assessment of the money laundering/terrorism financing (ML/TF) risks associated with traveller’s cheques. The assessment will help businesses that provide traveller's cheque services to identify and manage the ML/TF risks they face.

Details: Sydney, Australia: AUSTRAC, 2018. 16p.

Source: Internet Resource: Accessed June 4, 2019 at: http://www.austrac.gov.au/sites/default/files/travellers-cheques-risk-assessment.pdf

Year: 2018

Country: International

Keywords: Australia

Shelf Number: 156178


Author: Aucoin, Ciara

Title: Migrant Smuggling and Human Trafficking from Libya to Europe: What does the Media Say?

Summary: Clearer media reporting on 'smuggling' and 'trafficking' create a better understanding of the migration crisis. The abuse of migrants by organised criminals, traffickers and armed groups has become a common feature of the current migration crisis in Libya. While not all migrants fall victim to trafficking, many experience some form of threat, coercion or exploitation, and many are subjected to forced labour and prostitution. This study analysed the ways in which a sample of English-language news media covered the topics of migrant smuggling and human trafficking from Libya, and the frequency of words used to denote slavery, abuse and financial transactions.

Details: Pretoria, South Africa: Enhancing Africa's Response to Transnational Organised Crime, 2019. 18p.

Source: Internet Resource: Accessed June 5, 2019 at: https://enactafrica.org/research/research-papers/migrant-smuggling-and-human-trafficking-from-libya-to-europe-what-does-the-media-say

Year: 2019

Country: International

Keywords: Forced Labor

Shelf Number: 156197


Author: Marine Resources Assessment Group

Title: Review of Impacts of Illegal, Unreported and Unregulated Fishing on Developing Countries: final report

Summary: IUU fishing is a global problem affecting both Exclusive Economic Zones (EEZs) and the high seas. A number of initiatives have been taken to quantify and combat it, notably the 2001 FAO International Plan of Action on IUU Fishing. In 2003 following a meeting of the Round Table on Sustainable Development at the OECD, a number of Ministers decided to form a High Seas Task Force with the objective of defining practical solutions to the problem. The UK is directly supporting the work of the High Seas Task Force. Part of this support covers work commissioned by the Department for International Development (DfID) to examine the economic impacts of IUU fishing on developing countries. Although there are quite a lot of studies of IUU fishing in high seas waters, there is currently a dearth of information on the economic and other impacts of IUU fishing on developing countries. This study set out to address this, as far as possible, using empirical information available from the literature and by examining case studies of 10 developing countries around Africa and in Oceania that are currently suffering from differing levels of IUU fishing in their waters. The study was undertaken by MRAG Ltd between January and June 2005. This project comprises two main tasks: - an impact analysis of IUU fishing on developing countries (including economic, social, environmental, ecological, biological, health and nutritional impacts); and - an empirical assessment of issues related to ecosystem and management. These tasks necessarily overlap in their scope. A consideration of ecosystem and management issues is an integral part of a study of the impacts of IUU on developing countries. Nevertheless, this report is directed primarily at the first task. The second task will be addressed more directly by a separate report. This report has the following objectives: 1. To identify the key impacts of IUU fishing on developing countries using a range of potential sources and approaches to derive best available knowledge (empirical and anecdotal). 2. To derive a better understanding of the areas of vulnerability that enable IUU activity to thrive. 3. To identify specific forms of assistance to enable developing countries to better implement their responsibilities and resource management in respect of IUU and high seas fisheries. An inception report was produced in February 2005 and was included in the literature presented to the High Seas Task Force at its meetings in Paris, 9 March 2004 and Rome, 11 March 2005. It is annexed to this report. A preliminary version of this report was also discussed at a DFID/NORAD funded workshop, held as part of the project process on the 16th and 17th June, 2005 in London. Comments generated from the discussion were incorporated into the final version. An additional report summarising the outputs of the workshop has been produced by DFID.

Details: London: Author, 2005. 176p.

Source: Internet Resource: Accessed June 6, 2019 at: https://webarchive.nationalarchives.gov.uk/20090422181306/http://www.dfid.gov.uk/pubs/files/illegal-fishing-mrag-report.pdf

Year: 2005

Country: International

Keywords: Economic Impact

Shelf Number: 115387


Author: Amnesty International

Title: Death Sentences and Executions 2018

Summary: This report covers the judicial use of the death penalty for the period January to December 2018. Amnesty International reports only on executions, death sentences and other aspects of the use of the death penalty, such as commutations and exonerations, where there is reasonable confirmation. In many countries governments do not publish information on their use of the death penalty.

Details: London: Author, 2019. 54p.

Source: Internet Resource: Accessed June 6, 2019 at: https://www.amnesty.org/download/Documents/ACT5098702019ENGLISH.PDF

Year: 2019

Country: International

Keywords: Capital Punishment

Shelf Number: 156235


Author: Gabriel, Helena, ed.

Title: Femicide Volume XI: Cyber Crimes Against Women and Girls

Summary: This volume again compiles strategies, best practices and innovative approaches, serves as a platform for, and provides practical support to anybody who wishes to prevent, investigate, prosecute, and punish VAW and gender-related killings of women and girls, i.e. femicide. The second section on cyber crimes includes an interview with Neil Walsh of UNODC, articles on online harassment of women journalists and cyber crimes against women in India, among others.

Details: Viena: UN Studies Association, 2019. 84p.

Source: Internet Resource: Accessed June 6, 2019 at: http://femicide-watch.org/sites/default/files/FemicideVolXI.pdf

Year: 2019

Country: International

Keywords: Cybercrime

Shelf Number: 156247


Author: Newman, Nick

Title: A Tangled Web: Rethinking the Approach to Online CSEA

Summary: Child sexual exploitation and abuse (CSEA) is a deeply emotive and troubling issue, and in recent years we've witnessed the worrying emergence of a much more insidious version of the threat. Online CSEA is changing the scope and scale of offending - with the internet increasing the exposure of victims and offering a safe haven for offenders to access imagery and stream live abuse on demand.

Details: London, UK: PA Consulting, 2018. 36p.

Source: Internet Resource: Accessed June 6, 2019 at: https://www.paconsulting.com/insights/2019/protecting-our-children/

Year: 2018

Country: International

Keywords: Child Pornography

Shelf Number: 156203


Author: Koops, Bert-Jaap

Title: Sewage Monitoring for Criminal Investigation and the Protection of Home Life

Summary: The fundamental right to inviolability of the home has traditionally been interpreted to protect people from physical intrusions into their homes. The growing use of technologies for non-physical intrusion into the home, enabling surveillance from the outside by law enforcement, makes home life more transparent without investigating officers having to physically enter. Sewage monitoring is an emerging new form of surveillance of the home from the outside, which potentially impacts the level of protection of home life in practice and in the law. The purpose of this paper is to survey forms of surveillance of the home similar to sewage monitoring, describe how German, Polish and Dutch law regulate these forms of surveillance, and suggest improvements to the legal framework so that people's fundamental right to protection of their home life remains sufficiently safeguarded. We group surveillance of the home from the outside into five groups: waste monitoring, monitoring of emanations, audio-visual surveillance, access to data in the home, and out-of-home access to data about home life. Our analysis shows that visual surveillance, acoustic surveillance, and access to data in and about the home are relatively well-regulated, usually with a sufficiently clear legal basis and considerable safeguards, thus offering generally adequate legal protection. In contrast, regulation of domestic waste (garbage and sewage) monitoring and monitoring of emanations from the home (heat, smell, electromagnetic waves) is less clear. Although these surveillance measures seem less serious interferences with inviolability of the home, law-makers should clarify the legal basis for these methods and the conditions applying to them. We conclude that legal systems will need to develop ways to more clearly distinguish between minor, more than minor, and very serious interferences with inviolability of the home. The Dutch systematicness requirement and the German protection of the core area of private life are useful starting points for developing a more comprehensive normative framework that can deal with non-physical intrusions of the home as well as current legal frameworks regulate physical intrusions of the home.

Details: Tilburg, The Netherlands: Tilburg University Law and Technology Working Paper Series, 2019. 71p.

Source: Internet Resource: Accessed June 6, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3377481

Year: 2019

Country: International

Keywords: Audio Visual Surveillance

Shelf Number: 156251


Author: Jelsma, Martin

Title: Human Rights, Illicit Cultivation and Alternative Development: Connecting the Dots...

Summary: The three UN drug control conventions (1961, 1971 and 1988) and subsequent UN Political Declarations and Action Plans (1998, 2009, 2016) have served as a basis for supply reduction measures towards the cultivation of crops used for the illicit production of narcotic drugs. Frequently, forced eradication operations have led to violent confrontations with small-scale farmers of coca, cannabis and opium poppy, and to numerous human rights violations. Alternative development (AD) programmes have been at the core of efforts to find a more humane balance between drug control obligations, supply reduction policy objectives, and the protection of the rights of people dependent on illicit cultivation for basic subsistence. The development of the AD discourse, its funding support and its troubled relationship with ongoing—and better resourced-parallel law enforcement and eradication operations, have encountered serious challenges. For many, “the difficult balancing between short-term objectives of illicit cultivation reduction and the longer-term approaches based on sustained development efforts has called into question the relevance and even the legitimacy of alternative development policies.”2 Human rights arguments have thus far not played an important role in this discussion and bringing economic, social and cultural rights more firmly to the table could change the terms of the debate. Over the past decade, policymakers, civil society groups and UN agencies have dedicated increasing attention to human rights violations associated with the criminalisation of people who use drugs, the transmission of HIV and hepatitis, forced treatment and drug detention centres, mass incarceration of low-level drug offenders, the death penalty for drug offences, extrajudicial killings, and the lack of access to controlled medicines in the developing world. Much less attention, however, has been paid to human rights protection for rural communities (small farmers, sharecroppers and day labourers) involved in the cultivation, harvesting, processing and trading of drug-linked crops. The only explicit mention of human rights in any of the three UN drug control treaties can be found in the 1988 Convention Against Trafficking of Narcotic Drugs and Psychotropic Substances and deals specifically with "measures to eradicate illicit cultivation of narcotic plants". Article 14.2 specifies that such measures "shall respect fundamental human rights and shall take due account of traditional licit uses, where there is historic evidence of such use, as well as the protection of the environment". ...

Details: Amsterdam: Transnational Institute (tni), 2018. 39p.

Source: Internet Resource: Discussion Paper: Accessed June 7, 2019 at: https://www.ohchr.org/Documents/HRBodies/HRCouncil/DrugProblem/HRC39/TransnationalInstitute.pdf

Year: 2018

Country: International

Keywords: Crop-Substitution Programs

Shelf Number: 156318


Author: Schuurman, Bart

Title: End of the Lone Wolf: The Typology that Should Not Have Been

Summary: This research note argues that the "lone wolf" typology should be fundamentally reconsidered. Based on a three-year empirical research project, two key points are made to support this argument. First, the authors found that ties to online and offline radical milieus are critical to lone actors' adoption and maintenance of both the motive and capability to commit acts of terrorism. Second, in terms of pre-attack behaviors, the majority of lone actors are not the stealthy and highly capable terrorists the "lone wolf" moniker alludes to. These findings not only urge a reconsideration of the utility of the lone-wolf concept, they are also particularly relevant for counterterrorism professionals, whose conceptions of this threat may have closed off avenues for detection and interdiction that do, in fact, exist.

Details: STUDIES IN CONFLICT & TERRORISM https://doi.org/10.1080/1057610X.2017.1419554 2019, VOL. 42, NO. 8, 771–778, (Open Access)

Source: Internet Resource: Accessed June 7, 2019 at: https://www.tandfonline.com/doi/pdf/10.1080/1057610X.2017.1419554?needAccess=true

Year: 2019

Country: International

Keywords: Counter-Terrorism

Shelf Number: 156322


Author: Worwood, Erin B.

Title: Statewide Evaluation of Utah Mental Health Courts: Phase I

Summary: This report provides details on the programs, participants, eligibility criteria, and methods/outcomes used to study 43 MHCs across the United States, Australia, and Canada. It also describes the program components, target populations, and available data for the nine MHCs in Utah. Both the Utah MHCs and the studies included in this review reflect significant heterogeneity in terms of program and study components. Unfortunately, these differences limit the generalizability of findings across programs. Nevertheless, this report provides a detailed cataloguing of methods used to evaluate the impact of MHCs and can be used to inform discussions as a statewide evaluation plan is finalized.

Details: Salt Lake City, Utah: University of Utah, Utah Criminal Justice Center and College of Social Work, 2015. 59p.

Source: Internet Resource: Accessed June 7, 2019 at: https://socialwork.utah.edu/_resources/documents/ucjc-reports/statewide-ut-mhc-study_part-1-report.pdf

Year: 2015

Country: International

Keywords: Disabilities

Shelf Number: 156208


Author: The Equality Institute

Title: Global Scoping of Advocacy and Funding for the Prevention of Violence Against Women and Girls

Summary: The violence against women and girls (VAWG) prevention field has grown considerably over the past 20 years. There is currently more funding, and more national and global policies and initiatives to address VAWG, and we also have multiple targets addressing VAWG in the SDGs that will continue to shape national and international actions over the coming decade. The SDGs are vital in that they demonstrate sustainable, equitable development cannot be achieved without addressing VAWG in a holistic, coordinated and multisectoral way, and that reducing VAWG will contribute to the achievement of multiple development outcomes. This global moment presents a vital opportunity for the VAWG prevention field to establish strong connections with broader feminist and women's rights movements in order to build the support base. There is also an opportunity to use that collective power and public attention to advocate for greater investment in evidence-based approaches to preventing VAWG, which can include women's rights organisations.

Details: Australia: The Equality Institute, 2019. 18p.

Source: Internet Resource: Accessed June 8, 2019 at: https://www.svri.org/svrinterest/new-report-global-scoping-advocacy-and-funding-prevention-violence-against-women-and

Year: 2019

Country: International

Keywords: Sexual Violence

Shelf Number: 156258


Author: Environmental Investigation Agency (EIA)

Title: A System of Extinction: The African Elephant Disaster

Summary: A ground-breaking ivory trade report which scrutinises key markets in Asia, the rampant poaching in African countries and exposes some of the international criminals who oversee the trade. Those people who have opposed an international ban on the ivory trade have had their chance to demonstrate that it could be controlled. A million elephants have died in the meantime and a total ban on the ivory trade must be agreed and implemented as soon as possible. The report played a key role in achieving the 1989 international ban on elephant ivory trade at CITES.

Details: London: Environmental Investigation Agency, 1989. 52p.

Source: Internet Resource: Accessed June 10, 2019 at: https://eia-international.org/report/a-system-of-extinction-the-african-elephant-disaster/

Year: 1989

Country: International

Keywords: Environmental Crime

Shelf Number: 156225


Author: University of California, San Diego

Title: U.S.-Mexico Security Cooperation 2018-2024

Summary: Over the more than two decades of free trade between Mexico and the United States (1994-2018), there has been an important alignment between the countries on strategic and security matters. New blueprints for bilateral cooperation have been created and there has been greater agreement regarding security in the region, especially with respect to Central America. However, the arrival of Donald Trump in the White House and the internal crises in both countries - the opioid epidemic in the United States and the escalation of violence in Mexico - have cast serious doubt on burgeoning security cooperation. In February 2018, the Center for U.S.-Mexican Studies at the University of California San Diego, in association with the Justice in Mexico program at the University of San Diego, gathered experts on security and violence, journalists, and former officials from both countries to discuss the areas of concern and opportunity in U.S.-Mexico cooperation. The arrival of Andres Manuel Lopez Obrador in the Mexican presidency represents an opportunity to resume a dialogue at the highest level around bilateral security. As a group of academics and former officials from both countries, we have assessed bilateral collaboration on security issues and propose a road map to enhance cooperation between the governments of Mexico and the United States.

Details: San Diego, California: University of California San Diego, Center for U.S.-Mexican Studies, 2019. 29p.

Source: Internet Resource: Accessed June 10, 2019 at: https://usmex.ucsd.edu/_files/Whitepaper_Security_Taskforce_March_26_Covers.pdf

Year: 2019

Country: International

Keywords: Free Trade

Shelf Number: 156343


Author: BSI

Title: BSI and TT Club Cargo Theft: Report H1 2018

Summary: BSI and TT Club have authored this report to demonstrate their shared goal of educating the transportation and manufacturing sectors about the dynamic cargo theft risks present across the globe. With the enhanced awareness of cargo crime trends across the globe, industry will be able to engage in a proactive approach in preventing cargo crime and also minimizing the financial loss and brand reputation damage that results from cargo crime.

Details: Scottsdale, Arizona: BSI, 2018. 14p.

Source: Internet Resource: Accessed June 10, 2019 at: https://www.ttclub.com/fileadmin/uploads/tt-club/Documents/BSI_TT_ClubCargoTheftReportH1_2018_FinalRev.pdf

Year: 2018

Country: International

Keywords: Cargo Crime

Shelf Number: 156346


Author: Transported Asset Protection Association

Title: United States and Canada Annual Cargo Theft Report

Summary: TAPA Americas collects, records, analyzes and reports on cargo theft data for the United States, Canada, Mexico and Brazil through the Incident Information System (IIS). The IIS will issue separate reports for Mexico, Brazil, and U.S./Canada. While quite comprehensive in the United States, cargo theft data collection for Canada is still being developed and will be provided when available. For a theft incident to be recorded in the IIS system, the following data points must be known: Mode, Product category, Location. Based on theft incidents reported to the IIS that met the above-stated criteria, TAPA recorded 649 theft incidents in the United States for 2017, a decrease of 15% from each of the 2016 and 2015 totals. As with other cargo theft reports, the TAPA IIS Annual Report is designed to provide TAPA members with a snapshot of cargo theft in the United States, along with an understanding of trends that affect supply chain security programs for its membership. In order to enhance the TAPA IIS Annual Report, Modi Operandi and other trends prominently seen throughout the year will be focused on, with anecdotes and case studies provided as available.

Details: Boca Raton, Florida: Transported Asset Protection Association, 2017. 11p.

Source: Internet Resource: Accessed June 10, 2019 at: https://tapa.memberclicks.net/assets/docs/IIS/2017_IIS_Reports/TAPA_US_2017_Annual.pdf

Year: 2017

Country: International

Keywords: Cargo Theft

Shelf Number: 156347


Author: FreightWatch International

Title: Putting a Price Tag on Underreported Cargo Theft in Europe: How Much is Really Stolen Every Year?

Summary: Sizeable efforts have been made to estimate the value of the total annual loss of all cargo stolen while transiting European Union (EU) roads. However, as long as the theft of freight is categorized as a subset of other types of crime, cargo crime will remain a vast grey area, the magnitude and economic impact of which can only be estimated. The first highly notable effort was made by the European Parliament (EP), which in July 2007 published a study on "Organized Theft of Commercial Vehicles and Their Loads in the European Union." This study, using data from 2003 to 2006, concluded that "...the total loss of value can be estimated at more than 8.2 billion Euros each year" for the entire EU, which at the time included 27 member states. Our estimate focuses on today's EU member states, minus Malta (due to a lack of data): a total of 27 countries (EU-27). The estimated loss figure of 8.2 billion Euros has been the only official statistic available to quantify the scale of cargo theft to policymakers and stakeholders. Even today, almost a decade later, the 8.2 billion Euros figure remains the primary statistic quoted by industry, law enforcement agencies, and media when it comes to quantifying the economic impact of cargo crime in the European Union. While the 2007 study was significant at the time, the FreightWatch International Supply Chain Intelligence Center (FWI SCIC) revisited the subject and reviewed European lossvalue estimates for three reasons. The first is that FWI SCIC now has increased accessibility to more and better European incident data. Second, the quality of the cargo crime intelligence that FWI SCIC can draw from has substantially improved over the past few years, thanks to help and insight from a growing number of European Law Enforcement Agencies, with whom FWI SCIC has developed professional relationships. This added value makes it possible to better understand geographic and commercial patterns of criminal behaviour within and across national borders, and has allowed FWI SCIC to make valid 'bottom-up' estimates of individual target countries. Third, the cargo crime landscape in Europe has worsened since 2007. Even though freight traffic has actually decreased since 2004 due to the economic crisis, threats to the supply chain are substantially higher today almost everywhere in the EU than they were 10 years ago. Criminal groups have also become better organized and more capable of operating across Europe than they were a decade ago. Consequently, FWI SCIC decided to combine the most recent data, and its best cargo theft intelligence, to update the 8.2 billion Euros figure and provide a more accurate and rationalized estimate of cargo theft in the European Union.

Details: Austin, Texas: FreightWatch International, 2016. 4p.

Source: Internet Resource: Accessed June 10, 2019 at: https://files.carrier.com/sensitech/en/contentimages/UnderreportedCargoTheftweb.pdf

Year: 2016

Country: International

Keywords: Cargo Theft

Shelf Number: 156352


Author: Herbert, Matthew

Title: Less than the Sum of its Parts: Europe's Fixation with Libyan Border Security

Summary: Europe views the drop in migration from Libya to Europe as a success. The EU and member states have buttressed Libya's border security by training and equipping formal forces, working with hybrid security forces, and making deals with armed groups. But these efforts impede the emergence of a functioning, civilian Libyan security sector and threaten stability. This is a problem for Europe. Migration will wax and wane, and its political salience will shift, but Libya remains on Europe's doorstep.

Details: Pretoria, South Africa: Institute for Security Studies, 2019.

Source: Internet Resource: Accessed June 10, 2019 at: https://issafrica.s3.amazonaws.com/site/uploads/pb-126.pdf

Year: 2019

Country: International

Keywords: Armed Groups

Shelf Number: 156363


Author: Symes, William Sigourney

Title: Investigation into the Individual and Combined Impacts of Wildlife Trade and Habitat Loss on Biodiversity and Conservation Interventions in the Tropics

Summary: My PhD thesis investigates the effects of two economic drivers of environmental change and biodiversity decline, wildlife trade and habitat loss. My first data chapter explores how socio-economic factors undermine protected areas by studying the spatial occurrence of protected area downgrading, downsizing and degazettement. Next, I apply a gravity-underreporting framework to data on legal and illegal wildlife trade, to understand the economic drivers of trade in mammalian, reptilian and avian products. The next two chapters focus Sundaland, a global biodiversity hotspot in South East Asia. Firstly, I combine remote sensing, ecological, and socio-economic data to quantify the combined impacts of wildlife trade and habitat loss on 308 species of forest dependent birds in the region. Finally, I engage in a process I have dubbed 'extinction accounting' for the extensive peatland areas in the region. I link biodiversity declines to agricultural profits from peatland conversion between 1990 and 2015.

Details: Singapore: National University of Singapore, Department of Biological Sciences, 2018. 167p.

Source: Internet Resource (Dissertation Thesis): Accessed June 10, 2019 at: https://scholarbank.nus.edu.sg/handle/10635/147846

Year: 2018

Country: International

Keywords: Biodiversity Conservation

Shelf Number: 156364


Author: Musing, Louisa

Title: Corruption and Wildlife Crime: A Focus on Caviar Trade

Summary: Corruption is a severe threat to wildlife conservation globally. While conservation practitioner anecdotes and existing empirical research all point to corruption as a main facilitator enabling wildlife crime, there is still limited knowledge about what can change this situation and help reverse the pernicious impact of corruption on conservation outcomes in practice. Corruption has a negative impact on conservation by reducing the effectiveness of conservation programmes, reducing law enforcement and political support, as well as establishing incentives for the over-exploitation of resources. It undermines the effectiveness and legitimacy of laws and regulations and can be an indicator of the presence of organised crime groups. Corruption needs to be addressed as a central part of the approach to tackling wildlife crime. As part of a wider project by TRAFFIC in collaboration with WWF to understand global caviar markets and to identify hotspots for illegal trade (Harris and Shiraishi, 2018), funding was provided by WWF to incorporate an anti-corruption component, working in partnership with and under the guidance of the U4 Anti-Corruption Resource Centre. The objectives of this component were to deepen understanding of how corruption may be facilitating the flow of illegal caviar along the value chain, to identify possible intervention strategies, and to inform further studies concerning environmental / wildlife crime and corruption. A typology of corruption for the illegal caviar trade was developed through the review of information gathered by TRAFFIC from academic literature and media reports, interviews with stakeholders who had some knowledge of illegal caviar trade, and the rapid market assessments in Beijing, Berlin, Chicago, Moscow, Paris and Tokyo that were conducted as part of the global caviar markets study (Harris and Shiraishi, 2018). Furthermore, a discussion group with anti-corruption, wildlife trade and sturgeon conservation experts (Table 1) was organised in April 2018 to discuss initial findings from TRAFFIC's rapid assessments, to refine the typology (Figure 3), to develop recommendations for policy and practice, and to build working relationships to support possible future studies (see Annex 1 for discussion group agenda). This report summarises key themes of corruption and wildlife crime as drawn from the literature reviews and interviews, and salient points arising from the discussion group in April 2018.

Details: Cambridge, UK: A TRAFFIC, WWF, U4 ACRC, Utrecht University, and Northumbria University report , 2019. 42p.

Source: Internet Resource: Accessed June 12, 2019 at: https://www.traffic.org/site/assets/files/11818/corruption-and-caviar-final.pdf

Year: 2019

Country: International

Keywords: Caviar

Shelf Number: 156400


Author: Lloyd, Monica

Title: Extremism Risk Assessment: A Directory

Summary: This directory has been assembled from frameworks that have been developed in recent years to assess aspects of extremist violence, a term used here to encompass terrorist violence that is framed by ideology and targeted violence that is framed by idiosyncratic beliefs. Each of these frameworks was developed in a slightly different context, and optimised for a different purpose and group of users. The frameworks covered are: ERG22+ (Extremist Risk Guidance), developed by the UK's Prisons and Probation Service; IR-46 (Islamic Radicalization), used by the Dutch National Police; IVP (Identifying Vulnerable People), developed out of open-source material on violent extremists; MLG Version 2 (Multi-Level Guidelines), used in North America and Europe; TRAP-18 (Terrorist Radicalization Assessment Protocol) in use since 2015 in Canada, the US and Europe; VERA-2R (Violent Extremism Risk Assessment Version 2 Revised), available in Dutch, English, French and German. These all conform, to a greater or lesser extent, to an approach that structures professional judgment from a number of potential indicators of risk derived from clinical and correctional research and practice, with the exception of the IVP framework that consists of a checklist for the assessment of escalating behaviours that open source research suggests correspond with more serious intent and/or imminence of attack. None of these frameworks claims to be able to straightforwardly predict future violence. In accordance with good practice in risk assessment, most claim instead to be able to identify behaviours or scenarios that signal when and in what circumstances an attack is more likely, in order to prevent it through appropriate action. Each is presented as work in progress, within a standard template that allows for some comparison across frameworks, together with a strengths and limitations appraisal informed by the comments of peer reviewers and users.

Details: Lancaster, UK: CREST (Centre for Research and Evidence on Security Threats), headquartered at Department of Psychology, Lancaster University 2019. 48p.

Source: Internet Resource: Accessed June 12, 2019 at: https://crestresearch.ac.uk/resources/extremism-risk-assessment-directory/

Year: 2019

Country: International

Keywords: Extremism

Shelf Number: 156402


Author: Helmus, Todd C.

Title: Assessing Outcomes of Online Campaigns Countering Violent Extremism: A Case Study of the Redirect Method

Summary: The number of programs dedicated to countering violent extremism (CVE) has grown in recent years, yet a fundamental gap remains in the understanding of the effectiveness of such programs. This is particularly the case for CVE campaigns, which are increasingly conducted in the online space. The goal of this report is to help CVE campaign planners better evaluate the impact of online efforts. It reviews prior assessments of online CVE campaigns, provides recommendations for future assessments, and provides a case study of one particular CVE campaign - the Redirect Method. A limited evaluation of the Redirect Method process variables suggests that the implementers are able to use advertisements linking to counter-extremist videos to effectively expose individuals searching for violent jihadist or violent far-right content to content that offers alternative narratives. Users clicked on these ads at a rate on par with industry standards. However, as is the case with other CVE evaluations, this partial evaluation did not assess the impact of the video content on user attitudes or behavior. The potentially highly radical nature of the Redirect Method's target audience makes evaluation of the campaign particularly complicated and therefore might necessitate the recruitment of former extremists to help gauge audience response. Alternatively, it might be advisable to analyze user comments to understand how a subsample of users respond to the content. Key Findings -- The unique nature of social media can impede conventional approaches to assessing program impact Exposure to social media content is highly self-selective. The rapid flow of social media information across browser screens can reduce the accuracy of exposure recall. Previous assessment efforts examined basic process characteristics Virtually all of the reviewed CVE evaluations focused on analysis of reach, views, and engagement. The field is still immature; very few systematic evaluations are published, most of which are brief case-study analyses. The Redirect Method campaign targets violent extremist content The campaign consisted of two separate arms, one focused on targeting violent jihadist extremists and the other targeting violent far-right extremists. The primary goal of the intervention was to "prevent unobstructed access to extremist content." Analysis of the results of the Redirect Method campaign focused on impression shares, clicks, click-through rates, and video watch statistics The violent far-right campaign achieved a much higher number of total impressions, which likely indicates that, in the United States, the number of violent far-right sympathizers is larger than the number of violent jihadist extremist sympathizers. Results for impression shares varied significantly between the two campaigns, with the violent jihadist campaign achieving more than 90-percent impression shares, compared with 51.23 percent for the violent far right campaign. Recommendations -- Online CVE campaign evaluators can study "open" campaigns using a social media platform's analytics to test reach and reactivity to the campaign and to evaluate other process-oriented metrics. "Closed" evaluation designs, which use participant surveys and random assignment to CVE content, enable researchers to assess changes in audience attitudes. Other approaches to evaluation include measuring audience responses to "calls to action" (social media campaigns that encourage audience members to engage in an observable behavior, such as calling phone lines or clicking on particular links); assessment of audience comments; and A-B testing, in which media planners compare audience reactions to two or more versions of online content. The Redirect Method should consider more-tailored options. First, it can recruit former extremists to help assess whether Google Ads and video content is entertaining, accurate, and potentially persuasive. Second, it might be feasible to test the impact of the Redirect Method in a closed evaluation design, drawing on a specially recruited population of participants, which would prevent the provision of survey content to viewers of the live campaign. A new method for analysis involves developing a sample of users who post comments on the Redirect Method's YouTube page, then assessing the comments that those users post to videos that they watch before and after watching Redirect Method videos.

Details: Santa Monica, CA: RAND, 2018. 19p.

Source: Internet Resource: Accessed June 13, 2019 at: https://www.rand.org/pubs/research_reports/RR2813.html

Year: 2018

Country: International

Keywords: Counter-Terrorism

Shelf Number: 156405


Author: Beagyley, Sina

Title: Development and Pilot Test of the Rand Program Toolkit for Countering Violent Extremism

Summary: Countering violent extremism (CVE) requires addressing the conditions and reducing the underlying factors that give rise to radicalization and recruitment. Evaluations are critical for assessing the impact of community-based CVE programs and informing decisions about how to allocate often-scarce resources. Choosing the most rigorous evaluation approach a program can sustain will provide its staff and funders with the most accurate view possible of whether the program is achieving its goals or whether efforts should be continued, scaled up, or discontinued. The RAND Program Evaluation Toolkit for Countering Violent Extremism was designed to help CVE program staff overcome common challenges to evaluating and planning improvements to their programs. This report summarizes the complementary methods used to develop the toolkit: a review of the evaluation literature on CVE programs; the development of a taxonomy of general types of CVE programs, their activities, and their target audiences; and interviews with CVE program managers to identify data collection practices and challenges to evaluation. This was followed by a pilot test of the draft toolkit with a subset of CVE program managers. Feedback from this pilot test informed revisions to the toolkit to ensure that it would serve as a helpful resource for CVE programs in evaluating their activities, informing resource allocations and program improvements, and - ultimately - reducing the risk of violent extremism in their communities. Key Findings -- There Is a Need for a Comprehensive Toolkit to Help Community-Based CVE Programs Evaluate the Impact of Their Activities Community-based CVE programs represent a critical tool in the fight against all forms of extremism, but little is known about their effectiveness. This limits the degree to which programs and funders can make informed decisions about program improvements and whether to sustain, scale up, or discontinue program activities. The RAND Program Evaluation Toolkit for Countering Violent Extremism Incorporates the Latest Research and Feedback from CVE Program Managers The toolkit's development included a review of the CVE program evaluation literature, which offers guidance and measures for a range of program types, program goals, and target audiences. The toolkit is informed by research on existing CVE programs and their activities and target audiences. The toolkit's content, including checklists, worksheets, and templates, also address evaluation challenges reported by CVE program managers in a series of interviews. It is important that the toolkit remain user-friendly while guiding program staff through the evaluation process. Pilot testing the toolkit with CVE program managers helped ensure that users would be comfortable using the tools and that the instructions were clear and applicable to their evaluations.

Details: Santa Monica, CA: RAND, 2017. 51p.

Source: Internet Resource: Accessed June 13, 2019 at: https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1799/RAND_RR1799.pdf

Year: 2017

Country: International

Keywords: Community-Based Programs

Shelf Number: 156414


Author: Ducol, Benjamin

Title: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism

Summary: This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism? There seems to be little doubt that the Internet is increasingly implicated in radicalization processes. Yet the mechanisms underlying the link between the Internet and violent extremism, and their relative importance, remain largely undefined. The literature on radicalization to violent extremism is starting to establish central roles for concepts such as identity change and peer group reinforcements, which can best be understood from the lens of social psychology.

Details: Waterloo, ON: TSAS - Canadian Network for Research on Terrorism, Security and Society, 2016 142p.

Source: Internet Resource: TSAS Working Paper Series No. 16-05: Accessed June 13, 2019 at: http://www.tsas.ca/wp-content/uploads/2018/03/TSASWP16-05_DucolEtAl.pdf

Year: 2016

Country: International

Keywords: Countering Violent Extremism

Shelf Number: 156415


Author: Albrecht, Hans-Jorg

Title: Prison Overcrowding: Finding Effect Solutions. Strategies and Best Practices Against Overcrowding in Correctional Facilities

Summary: This volume presents a report of the workshop on strategies and best practices against overcrowding in correctional facilities of the Twelfth United Nations Congress on Crime Prevention and Criminal Justice in Salvador Brazil in April 2010. The paper provides an international comparison of problems of prison overcrowding. Particular focus is on the definition of overcrowding, its extent in Europe, the US, South America, Africa, Asia, and post-conflict and conflict-affected countries, its causes and effects. It addresses problems of assessing occupancy rates resulting from the lack of robust data on the number of prisoners detained and available, which are further intensified by dissenting conceptions about parameters of adequate prison space. In addition, concepts for policies and strategies aiming at diminishing prison rates are developed and discussed.

Details: Freiburg i. Br.: edition iuscrim, 2012. 91p.

Source: Internet Resource: (Reprint., Vol. 43) forschung aktuell | research in brief: Accessed June 14, 2019 at: https://pure.mpg.de/rest/items/item_2499903_3/component/file_3014332/content

Year: 2012

Country: International

Keywords: Correctional Administration

Shelf Number: 156418


Author: Davis, Robert C.

Title: A synthesis of literature on the effectiveness of community orders

Summary: This report presents the findings of a review of the literature on the effectiveness of community orders in reducing re-offending. The National Audit Office (NAO) has begun research on a range of measures used by the government to divert offenders from prison and into community-based treatment and interventions. The NAO commissioned RAND Europe to conduct this review to identify and synthesize international research about the effectiveness of community orders in reducing re-offending. In this report, we review research on ten of the common requirements contained in community orders. Through examining reviews, systematic reviews and meta-analyses we draw conclusions about the state of research in the areas of unpaid work, mental health treatment, education/skills training, drug treatment, anger management, alcohol treatment, programmes for perpetrators of domestic abuse, regular probation, intensive probation and cognitive/behavioural programming. We also assess the strength of the evidence on whether each of these requirements affects the likelihood of re-offending. We find that the quality of research on the effectiveness of community-based interventions for offenders is extremely variable. However, in two areas - cognitive/behavioural programming and drug treatment - rigorous research exists that points to a reduction in the odds of re-offending. In four other areas - programmes for domestic abuse perpetrators, unpaid work, education and basic skills training and intensive probation - existing studies have not suggested that the programmes have a positive effect on recidivism. Finally, in four areas - anger management, probation, and alcohol and mental health treatment - the question of impact on re-offending remains unsettled. This review highlights the need for more rigorous research - especially randomized trials - into the requirements that constitute community orders. This report will be of particular interest to the NAO and relevant government departments, such as the Ministry of Justice and National Probation Service. It is also relevant for policy makers as well as a wider audience concerned with the challenge of designing and implementing effective and efficient interventions to divert offenders from prison and into the community.

Details: Santa Monica, CA: RAND Europe, 2008. 65p.

Source: Internet Resource: Accessed June 14, 2019 at: https://www.rand.org/content/dam/rand/pubs/technical_reports/2008/RAND_TR518.pdf

Year: 2008

Country: International

Keywords: Alternatives to Incarceration

Shelf Number: 113270


Author: Theuri, Naomi

Title: Gender and Contextual Perspective in Countering Violence Extremism (CVE): Examining Inclusion of Women and Contextual Factors in Online Approaches to CVE

Summary: A holistic approach to Counter Violent Extremism (CVE) in the Internet Environment and Social Media is essential. This thesis focuses on gender and context consideration in online approaches to CVE through use of a literature review and samples of online counter-narrative campaigns. This has led to determination of the extent to which gender and context have been considered in online approaches to CVE and identifying what they mean for CVE online, while highlighting full participation of women in online approaches that are aimed at countering violent extremism as well as the critical role of contextual factors in online approaches to CVE. In addition, the thesis shows that more research is needed to fill the gaps identified. These gaps are the role of women in online CVE campaigns as well as contextual factors that are associated to violent extremism. More so, online narratives should be all rounded since this study found that CVE narratives have failed to identify a predictable psychosocial trajectory to explain de-radicalization processes that are crucial to disengage radicals.

Details: Malmo, Sweden: Malmo University, Faculty of Health and Society, Department of Criminology, 2017. 38p.

Source: Internet Resource: Accessed June 14, 2019 at: https://pdfs.semanticscholar.org/0a05/c23ec145adcf726dabd717005f270d1b32e6.pdf

Year: 2017

Country: International

Keywords: Counter-Terrorism

Shelf Number: 156422


Author: Global Financial Integrity

Title: India: Potential Revenue Losses Associated with Trade Misinvoicing

Summary: In a comprehensive study on the level of trade misinvoicing in India in 2016, GFI found that the estimated potential tax revenue losses to the Indian Government that year is US$13.0 billion, equivalent to 5.5 percent of the value of India's total government revenue collections in 2016. Trade misinvoicing is a method for moving money illicitly across borders which involves the deliberate falsification of the value, volume, and/or type of commodity in an international commercial transaction of goods or services by at least one party to the transaction and constitutes the largest component of illicit financial flows as measured by GFI. Using a trade gap analysis, GFI was able to break down the estimated potential tax revenue losses to misinvoicing by measuring illicit financial inflows and outflows for both import and export under- and over-invoicing. GFI estimates that the value of the trade gap for misinvoiced goods equals US 74 billion dollars, or 12 percent of the country's total trade of US 617 billion dollars in 2016.

Details: Washington, DC: Global Financial Integrity, 2019. 44p.

Source: Internet Resource: Accessed June 17, 2019 at: https://gfintegrity.org/report/india-potential-revenue-losses-associated-with-trade-misinvoicing/

Year: 2019

Country: International

Keywords: Financial Crime

Shelf Number: 156371


Author: Hauenstein, Severin

Title: African Elephant Poaching Rates Correlate with Local Poverty, National Corruption and Global Ivory Price

Summary: Poaching is contributing to rapid declines in elephant populations across Africa. Following high-profile changes in the political environment, the overall number of illegally killed elephants in Africa seems to be falling, but to evaluate potential conservation interventions we must understand the processes driving poaching rates at local and global scales. Here we show that annual poaching rates in 53 sites strongly correlate with proxies of ivory demand in the main Chinese markets, whereas between-country and between-site variation is strongly associated with indicators of corruption and poverty. Our analysis reveals a recent decline in annual poaching mortality rate from an estimated peak of over 10% in 2011 to less than 4% in 2017. Based on these findings, we suggest that continued investment in law enforcement could further reduce poaching, but is unlikely to succeed without action that simultaneously reduces ivory demand and tackles corruption and poverty.

Details: New York: Nature Communications, 2019. 9p.

Source: Internet Resource: Accessed June 17, 2019 at: https://www.nature.com/articles/s41467-019-09993-2

Year: 2019

Country: International

Keywords: Corruption

Shelf Number: 156372


Author: Global Network of Sex Work Projects

Title: The Impact of Stigma and Discrimination on Key Populations and Their Families

Summary: The right to found and raise a family is a fundamental human right. Many members of key populations (gay, bisexual and other men who have sex with men, people who use drugs, sex workers, and transgender people) become or wish to become parents in their lifetime. However, widespread societal stigma, compounded by punitive legal frameworks, severely impede key populations' rights to parent free of arbitrary or unlawful interference and discrimination.

Details: London: Global Network of Sex Work Projects, International Network of People who use Drugs, and MPact: Global Action for Gay Men's Health and Rights, 2018. 34p.

Source: Internet Resource: Accessed June 17, 2019 at: https://www.nswp.org/sites/nswp.org/files/stigma_discrim_inpud_mpact_nswp_-_2018_0.pdf

Year: 2018

Country: International

Keywords: Discrimination

Shelf Number: 156466


Author: Glenesk, Julian

Title: How can Crowd Behaviour Modelling be used to Prevent and Respond to Violence and Antisocial Behaviour at Qatar 2022?

Summary: This case study is part of a research project which RAND Europe was commissioned to undertake by Qatar University, examining violent and antisocial behaviours at football events, the factors associated with these behaviours, and strategies to prevent and reduce their occurrence. In line with the overall aim of this study, this case study offers early reflections on these topics in relation to the 2018 FIFA World Cup, held in Russia. The aim of this case study is to explore the potential for crowd behaviour modelling (CBM) to inform crowd management strategies to minimise the risk of violent or antisocial behaviour taking place during the 2022 FIFA World Cup in Qatar, and to reduce harm if it does take place. The case study builds on evidence identified in earlier stages of the project relating to violent and antisocial behaviours at football events and factors associated with these behaviours, as well as interventions to prevent and reduce violent and antisocial behaviour at football events (Strang et al. 2018; Taylor et al. 2018). It is based on a review of academic and grey literature, desk research on relevant tools and applications, prior experience in CBM among the RAND Europe research team, and interviews with internationally renowned experts who have experience of applying CBM.

Details: Cambridge, United Kingdom: RAND Europe, 2018. 18p.

Source: Internet Resource: Accessed June 17, 2019 at: https://www.rand.org/pubs/research_reports/RR2736.html

Year: 2018

Country: International

Keywords: Antisocial Behavior

Shelf Number: 156428


Author: Lusher, Amy

Title: Microplastics in Fisheries and Aquaculture: Status of Knowledge on their Occurrence and Implications for Aquatic Organisms and Food Safety

Summary: This report looks into the issue of microplastics from the fisheries and aquaculture perspective. Based on existing scientific literature, a group of experts assessed the potential impact of microplastics and related contaminants on fish consumers' health and the ecological implications for aquatic organisms. A workshop was organized with invited experts (Rome, 5-8 December 2016) who complemented the published information and carried out a risk profiling of microplastics in aquaculture and fishery products. Despite the large amount of scientific data available, there are still significant knowledge gaps, in particular regarding impacts at fish population and community level, detailed data for a proper risk assessment and implications of nanoplastics presence in the marine environment. Nonetheless, measures should be taken at international, governmental and consumer levels to undertake cost-effective ecological and seafood safety risk assessments on micro- and nanoplastics and associated polymers, to reduce plastic use and encourage the use of alternative materials, recycling and the adoption of sustainable practices in using plastics and managing plastic pollution.

Details: Rome: Food and Agriculture Organization of the United Nations, 2017. 147p.

Source: Internet Resource: Accessed June 17, 2019 at: http://www.fao.org/3/a-i7677e.pdf

Year: 2017

Country: International

Keywords: Aquaculture

Shelf Number: 156469


Author: United Nations Environment Programme

Title: Marine Plastic Debris and Microplastics: Global Lessons and Research to Inspire Action and Guide Policy Change

Summary: Plastic debris, or litter, in the ocean is now ubiquitous. Society's adoption of plastics as a substitute for traditional materials has expanded almost exponentially since the 1950s, when large-scale plastic production began. Durability is a common feature of most plastics, and it is this property, combined with an unwillingness or inability to manage end-of-life plastic effectively that has resulted in marine plastics and microplastics becoming a global problem. As for many pollutants, plastic waste is a trans-boundary, complex, social, economic and environmental problem with few easy solutions. Warnings of what was happening were reported in the scientific literature in the early 1970s, with little reaction from much of the scientific community. It is only in the past decade that the scale and importance of the problem has received due attention. This report was prepared at the request of the first United Nations Environment Assembly, which took place 23-27 June 2014, hosted by UNEP in Nairobi, Kenya (Resolution 16/1). It is intended to summarise the state of our knowledge on sources, fate and effects of marine plastics and microplastics, and describe approaches and potential solutions to address this multifaceted conundrum. Plastic litter in the ocean can be considered a 'common concern of humankind'. The report is divided into four main sections: Background, Evidence Base, Taking Action, and Conclusions and Key Research Needs. The Background section describes the rationale for the report, noting that marine plastic litter is a global concern, and summarises the UNEA process. This is placed within the context of existing governance frameworks, at international and regional scales, and linked to the UN Sustainable Development Goals under Agenda 2030. The Evidence Base section provides the basis for the later discussion of potential reduction measures. It is divided into four chapters: Plastics, Sources, Distribution and fate, and Impacts. Plastics production increased rapidly from the 1950s, with global production reaching about 311 million tonnes in 2014. Plastics have been used increasingly in place of more traditional materials in many sectors, including construction, transportation, household goods and packaging. They have also been used for many novel applications including medical. There are many different varieties of polymer produced but in volume terms the market is dominated by a handful of main types: polyethylene (PE, high and low density), polyethylene terephthalate (PET), polypropylene (PP), polyvinyl chloride (PVC), polystyrene (PS, including expanded EPS) and polyurethane (PUR). Most plastics are synthesised from fossil fuels, but biomass can also be used. Packaging accounts for about one third of production, and much of this is designed for single-use. Plastics intended for more durable applications may be manufactured with additive chemicals to improve the material properties. These include plasticisers to soften the product, colouring agents, UV-resistance and flame-retardation, an important property for applications in transportation and electronics. Some of these chemicals have harmful properties when released into the environment. Microplastics are routinely defined as small particle or fragments of plastic measuring less than 5 mm in diameter. Some microplastics are purposefully manufactured for industrial and domestic purposes ('primary' microplastics). These include 'microbeads' used in cosmetic and personal healthcare products, such as toothpaste. 'Secondary' microplastics are created by the weathering and fragmentation of larger plastic objects. Weathering and fragmentation is enhanced by exposure to UV irradiation. The process becomes extremely slow once this is removed, as in much of the ocean. Plastics marked as 'biodegradable' do not degrade rapidly in the ocean. Sources of plastics and microplastics to the ocean are many and varied, but the actual quantities involved remain largely unknown. Reliable quantitative comparisons between the input loads of macro and microplastics, their sources, originating sectors and users are not possible at present, and this represents a significant knowledge gap. Estimates of some sources, such as municipal solid waste, have been made. These are useful to focus attention but the numbers should be treated with some caution due to the large uncertainties involved. Some of the most important land-based sources of larger plastic objects (macroplastics) include: construction, household goods, packaging, coastal tourism, and food and drink packaging. How much of this material enters the ocean will be dependent largely on the extent and effectiveness of wastewater and solid waste collection and management. Land-based sources of microplastics include: cosmetics and personal care products, textiles and clothing (syntheticfibres), terrestrial transport (dust from tyres), and plastic producers and fabricators (plastic resin pellets used in plastics manufacture). A variable proportion of microplastics will pass through wastewater treatment plants, depending on the sophistication of the equipment and procedures adopted, and regional differences are likely to be very significant. Sea-based sources appear to be dominated by the fisheries and shipping sectors. The quantities and types (size, shape, density, chemical composition) of material, together with the entry points to the ocean, will determine to a great extent the subsequent distribution and impact. Land-based inputs may be direct from shorelines or via rivers and wastewater pipelines. Inputs at sea may be from normal operations, accidental losses or deliberate discarding. There are likely to be significant regional differences in inputs to the ocean from land- and sea-based sources. Inadequate solid waste collection and management is considered to result in substantial leakages of plastics to the ocean. Rivers appear to act as conduits for significant but largely unquantified amounts of macro and microplastics, especially where catchments serve urbanised or industrial centres. Losses from commercial shipping correlate with busy shipping routes. Abandoned, lost or otherwise discarded fishing gear (ALDFG) gear tends to be concentrated in fishing grounds, but it can be transported considerable distances if floatation devices remain intact. Locally, aquaculture structures can produce significant quantities of plastic debris if damaged by storms. Marine plastics are distributed throughout the ocean, from the Arctic to the Antarctic. This is due to the durability of plastics, the global nature of potential sources and the ease to which surface currents will carry floating plastics. The surface circulation is well known and is amenable to modelling. There are several persistent features such as the five sub-tropical gyres in the Indian Ocean, North and South Atlantic, and North and South Pacific. These are areas with relatively high concentrations of floating microplastics. However, higher abundances of plastics (especially macroplastics) are also found in coastal waters, particularly in regions with: high coastal populations with inadequate waste collection and management; intensive fisheries; and, high levels of coastal tourism. Larger floating objects are also driven by winds, accumulating on mid-ocean islands and on shores distant from the source. Many types of plastic are denser than seawater so will sink once any initial buoyancy is removed. For example, empty drinks bottles made with the plastic PET are very common litter items on shorelines, but their ultimate fate is often the ocean sea floor. Most fishing gear will sink if the floatation buoys are removed. For this reason, much of the plastic debris in the ocean is out of sight, and will remain so for the foreseeable future. It is also the reason why no reliable estimate of the total quantity of plastic in the ocean has been made. Marine plastics can have significant ecological impacts. The impacts of macroplastics on biota are best known. Images of a dolphin or seal entangled in fishing gear, or the stomach of a young dead albatross full of plastic objects are arresting and can be distressing for the observer. However, some of the species affected are rare or endangered (IUCN red list) so there is concern also from a conservation perspective. Macro-debris can also cause damage to sensitive and at-risk habitats such as cold and warm water coral reefs. Microplastics have been found in many fish and shellfish species, and some cetaceans, but the impact is much more difficult to quantify and remains a knowledge gap. All sizes of plastic can provide an additional habitat for sessile organisms. This can have important implications, for example, in the success of jellyfish to extend their range. The rafting of species to a different region provides an additional mechanism for the introduction of non-indigenous species, most clearly demonstrated on the coast of North America as a consequence of the Japanese tsunami in 2011. Marine plastics can have direct social and economic impacts. Floating debris represents a navigation hazard and has been implicated in many accidents, some of which have resulted in fatalities. From the available limited evidence, it is concluded that microplastics in seafood do not currently represent a human health risk, although many uncertainties remain. However, there is great uncertainty about the possible effects of nano-sized plastic particles, which are capable of crossing cell walls. Economic losses include the cost of non-action (loss of income) and the cost of action (e.g. beach clean-ups). Marine plastic debris may cause a reduction in income as a result of reduced fishing days or reduced tourist numbers, if people are discouraged from visiting by the presence of litter. 'Ghost' fishing by derelict fishing gear results in significant losses of potential food for human consumption. The extent of the social and economic impact, and the options for remedying losses, are dependent on the social and economic context. This includes better understanding perceptions and attitudes and the economic circumstance as to why littering takes place. Improving wastewater and solid waste collection and management presents the most urgent short-term solution to reducing plastic inputs, especially in developing economies. This will also have other societal benefits in terms of human health, environmental degradation and economic development. Other priority areas include improving wastewater treatment and reducing ALDFG. However, a more sustainable solution in the longer term will be moving towards a more circular economy, in which waste is designed out of the production and use cycle, and society adopts more sustainable consumption patterns. There is sufficient evidence that marine plastics and microplastics are having an unacceptable impact to invoke the Precautionary Approach. This means that society should not wait until there is unequivocal and quantified evidence of the degree of impact before acting to reduce plastic inputs to the ocean. But this needs to be accompanied by an adaptive management approach. This should allow for sufficient flexibility to be built into governance frameworks, or technical measures, to permit for adjustment as more knowledge becomes available. In this way perverse incentives and unforeseen negative consequences can be removed as soon as they are recognised. Improved governance is of overarching importance, which includes looking at the effectiveness of existing measures and the extent to which they are succeeding in bringing about the intended solutions. Stakeholder engagement is key to designing and agreeing more sustainable production patterns, and in bringing about and implementing effective litter reduction and removal measures. This needs to take account of all representatives of each community, with due account given to gender and other demographic factors, and build effective partnerships, including between the public and private sectors. The private sector has an important role in fulfilling the expectation of extended producer responsibility (EPR) and including the environmental impact of waste plastics when carrying out Life-Cycle Analysis. Examples of measures are presented to bring about marine litter reduction and removal. These include Best Environmental Practices (BEPs), Best Available Techniques/Technologies (BATs), Market-Based Instruments (MBIs), legislation or some other intervention. These illustrate measures which have been successful, and which may have the potential to be replicated elsewhere. It is recognised that for most interventions to be fully successful there needs to be willingness by society to agree to the implementation, which is why the areas of education and awareness raising are important. Risk assessment is a key element in identifying appropriate intervention points and establishing which stakeholder groups need to be involved in helping to define the problem and potential solutions to 'close the loop' and prevent plastics escaping to the ocean. Criteria are presented to help select the most appropriate measures. Indicators of the state of the environment are needed to establish trends, set reduction targets and evaluate the effectiveness of any measures that are introduced. Harmonisation of monitoring and assessment approaches will help to select, implement and oversee measures for marine plastics reduction on regional scales. There is a great need to improve the sharing of knowledge and expertise, to encourage a more multi-disciplined approach, to develop public-private partnerships and empower citizen-led movements. The Global Partnerships on Marine Litter (GPML) and Waste Management (GPWM) should be utilised to this end, together with other local-, national- and regional-scale arrangements. There are several areas of research that should be pursued to gain a better understanding of the relative importance of different sources, and the fate and effects of marine macro and microplastics. Filling these knowledge gaps will help direct most cost-effectively the efforts taken to reducing further inputs of plastic to the ocean and mitigate the impacts of plastic debris that is already there.

Details: Nairobi, Kenya: United Nations Environment Programme, 2018. 274p.

Source: Internet Resource: Accessed June 17, 2019 at: http://www.unenvironment.org/resources/report/marine-plastic-debris-and-microplastics-global-lessons-and-research-inspire-action

Year: 2018

Country: International

Keywords: Aquaculture

Shelf Number: 156470


Author: Helmus, Todd C.

Title: Assessing Outcomes of Online Campaigns Countering Violent Extremism: A Case Study of the Redirect Method

Summary: The number of programs dedicated to countering violent extremism (CVE) has grown in recent years, yet a fundamental gap remains in the understanding of the effectiveness of such programs. This is particularly the case for CVE campaigns, which are increasingly conducted in the online space. The goal of this report is to help CVE campaign planners better evaluate the impact of online efforts. It reviews prior assessments of online CVE campaigns, provides recommendations for future assessments, and provides a case study of one particular CVE campaign - the Redirect Method. A limited evaluation of the Redirect Method process variables suggests that the implementers are able to use advertisements linking to counterextremist videos to effectively expose individuals searching for violent jihadist or violent far-right content to content that offers alternative narratives. Users clicked on these ads at a rate on par with industry standards. However, as is the case with other CVE evaluations, this partial evaluation did not assess the impact of the video content on user attitudes or behavior. The potentially highly radical nature of the Redirect Method's target audience makes evaluation of the campaign particularly complicated and therefore might necessitate the recruitment of former extremists to help gauge audience response. Alternatively, it might be advisable to analyze user comments to understand how a subsample of users respond to the content.

Details: Santa Monica, California: RAND Corporation, 2018. 19p.

Source: Internet Resource: Accessed June 17, 2019 at: https://www.rand.org/pubs/research_reports/RR2813.html

Year: 2018

Country: International

Keywords: Countering Violent Extremism

Shelf Number: 156473


Author: Global Network of Sex Work Projects

Title: Migrant Sex Workers

Summary: This Briefing Paper explores the human rights barriers encountered by migrant sex workers as a result of their type of labour. It highlights their lack of access to services, as well as the increased precariousness and exclusion they face due to legal restrictions on cross-border movement and work in the sex industry. This paper also places migrant sex work in the context of international labour migration, using consultation responses from NSWP member organisations.

Details: Edinburgh, Scotland: Global Network of Sex Work Projects, 2018. 16p.

Source: Internet Resource: Accessed June 18, 2019 at: https://www.nswp.org/sites/nswp.org/files/briefing_paper_migrant_sex_workers_nswp_-_2017.pdf

Year: 2018

Country: International

Keywords: Migrants

Shelf Number: 156519


Author: Shepherd, Marv

Title: Pharmaceutical Cargo Theft: Uncovering the True Costs

Summary: The purpose of this study was to find out more about pharmaceutical cargo theft. In particular, this research explored the full extent of this kind of theft, as well as the other or tangential costs associated with it. The study identified indirect costs and other cost factors, ranked their importance and identified the frequency of occurrence. Using this data and the opinions of those that participated in the survey, the researchers established an estimation of the total cost in dollars associated with these factors.

Details: Beverly, Massachusetts: Sensitech United Technologies, 2015. 12p.

Source: Internet Resource: Accessed June 18, 2019 at: http://files.sensitech.com/sensitech/nl/contentimages/SEN2162-PharmaCostsReport-Oct29-1.pdf

Year: 2015

Country: International

Keywords: Costs of Crime

Shelf Number: 156390


Author: Europol

Title: Women in Islamic State Propaganda: Roles and Incentives

Summary: IS is not the first jihadi movement to attract female followers. Many of its predecessors -including al-Qaeda - also had their share of female supporters. Yet the meteoric rise of IS appears to have brought about a leap in the nature and extent of women's roles within jihadi groups. Alternatively, one could suggest that the increased assimilation of women into the organisation in itself contributed to IS's swift ascent. What is certain is that women have become indispensable to IS, both in conflict areas and in the West (including in the European Union). They play their role in the organisation's state-building enterprise, produce and disseminate propaganda and have seemingly been granted more proactive roles on the 'battlefield'. The worry is that this increase in the involvement of women could pave the way for potentially major changes in the role of jihadi women in the future. The report aims to shed light on how IS - a group that espouses a patriarchal authority par excellence - could appeal to women. In so doing, the research will explore the doctrinal dialectics put forward by IS regarding women and the role(s) they are expected to play in jihad. It will also focus on how the organisation uses Islamic jurisprudence to mould the role of women within jihad.

Details: The Hague, Netherlands: Europol, 2019. 35p.

Source: Internet Resource: Accessed June 18, 2019 at: https://www.europol.europa.eu/activities-services/europol-specialist-reporting/women-in-islamic-state-propaganda

Year: 2019

Country: International

Keywords: Al Qaeda

Shelf Number: 155585


Author: Sollund, Ragnhild

Title: Animal Abuse, Animal Rights and Species Justice

Summary: In this paper I want to introduce criminologists who are unfamiliar with green criminology to the topic of animal abuse and speciesism. I will give an overview of its history and contributions I regard as important in this particular field, provide empirical examples and point to theoretical discussions which are central in the analysis of animal abuse, whether legal or illegal. Finally I will suggest where the field could be heading in the future. For a nonspeciesist criminology: Animal abuse as an object of study, published in 1999 in Criminology, Piers Beirne established that animal abuse should be positioned within criminology. Beirne emphasises here that animal abuse should be studied because it is a signifier of actual or potential interhuman conflict, (2) an existing object of criminal law, (3) an item in the utilitarian calculus on the avoidance of pain and suffering, (4) a violation of rights, and (5) one of several oppressions identified by feminism as an interconnected whole.

Details: Oslo, Norway: University of Oslo, Department of Criminology and Sociology of Law, 2013. 35p.

Source: Internet Resource: Accessed June 18, 2019 at: https://www.researchgate.net/publication/308878859_ANIMAL_ABUSE_ANIMAL_RIGHTS_AND_SPECIES_JUSTICE_1

Year: 2013

Country: International

Keywords: Animal Abuse

Shelf Number: 156496


Author: Human Rights Center, UC Berkeley School of Law.

Title: The Silence I Carry: Disclosing Gender-Based Violence in Forced Displacement

Summary: Over half a million displaced people journey north from Central America and through Mexico every year. Many suffer multiple forms of sexual and gender-based violence (SGBV), including rape, transactional sex, forced prostitution, sex trafficking, and sexual assault. Though few reliable statistics exist, different studies estimate that 24% to 80% of women suffer some form of sexual violence en route, along with 5% of men and 50% of gay and transgender individuals. And yet very few survivors report the harm they have suffered. One key to improving detection of and response to SGBV among refugees and migrants traveling through Central and North America is to better enable survivors to disclose, or reveal, their experiences of SGBV to service providers and others who can help. However, enabling SGBV disclosure in this context is not as simple as it sounds. High levels of mobility and regional insecurity, along with individual, social, and structural factors, can affect a person's capability, opportunity, and motivation to report this kind of harm. Additionally, it may not always be appropriate for some providers to pursue SGBV disclosure when they have such limited time with fast-moving refugees and migrants or cannot make meaningful referral to additional support services. At the invitation of UN High Commissioner for Refugees' Regional Legal Unit (UNHCR - RLU) for the Americas Region, the Sexual Violence Program of the Human Rights Center (HRC) at the University of California, Berkeley, conducted a pilot project to assess challenges and strategies related to SGBV disclosure among refugees and other migrants in Central America and Mexico. HRC focused on Mexico and Guatemala, two countries in which UNHCR has established a Regional Safe Spaces Network (RSSN) of service providers. This preliminary inquiry addressed two issues: a.) how to strengthen providers' approach to SGBV disclosure and b.) how to improve awareness raising about SGBV risks and support services. From September 2017 through January 2018, HRC’s Sexual Violence Program conducted desk research, a field mission to Guatemala and Mexico, and data analysis using qualitative coding software. In February 2018, HRC delivered an internal report to UNHCR with preliminary findings, analysis, recommendations, and a dozen draft tools to improve SGBV-related disclosure and outreach for the Central American and Mexican context. HRC's preliminary findings clarified how SGBV disclosure requires a multifaceted approach in a complicated context of high mobility, high insecurity, and high diversity of displacement profile, SGBV experience, and survivor identity. Findings also highlighted the need for a context-specific and coordinated communications strategy about SGBV risks and support services in order to reach refugees and other migrants traveling rapidly or far off the beaten path. In response to these results and based on its previous research on SGBV-related interventions, HRC produced several draft tools for UNHCR review and adaptation. HRC's draft tools included a typography of SGBV disclosure from a service provision standpoint, along with training modules and sample "do's and don'ts" for facilitating disclosure in ways that consider providers' capacity and role with respect to SGBV response. Specific communication tools offer suggestions both for in-person strategies, such as facilitated group discussions and community theater productions, and broader outreach campaigns such as the strategic distribution of printed materials and creative use of public space.

Details: Berkeley, California: Human Rights Center, UC Berkeley School of Law, 2018. 56p.

Source: Internet Resource: Accessed June 18, 2019 at: https://www.acnur.org/publications/pub_prot/5c081eae4/the-silence-i-carry-disclosing-gender-based-violence-in-forced-displacement.html

Year: 2018

Country: International

Keywords: Migrants

Shelf Number: 156498


Author: Human Rights Center, UC Berkeley School of Law.

Title: The Victims' Court?: A Study of 622 Victim Participants at the International Criminal Court

Summary: When the International Criminal Court (ICC) was created in 1998, its founders hailed it as a "victims' court," one that would give survivors of mass atrocity an influential voice in the administration of justice. In the nearly two decades since its establishment, thousands of victims have been registered as "victim participants," and thousands more have applied to the court for acceptance. However, there is now widespread agreement, both inside and outside of the court, that the ICC victim participation programs need reform. Court staff and outside observers have argued that current levels of outreach, care, and support are inadequate and incorporation of the views of so many victims is unworkable. Both defense and prosecution teams have also questioned whether victims' representations, filings, and testimony have sometimes had an adverse effect on the fairness of ICC trials. But what of the victim participants themselves? What motivated these men and women to become victim participants? Was it to tell their story and to have it acknowledged by the court? Did they wish to see the accused punished? Or was it more important to receive reparations for the harms they suffered? What did they think of the process of becoming a victim participant? What were their perceptions of the court and how it operated? How were their interactions with court staff? And did they have security or safety concerns? To explore these and other questions, we interviewed ICC victim participants in four countries where the ICC had initiated investigations and prosecutions of serious international crimes - Uganda, Democratic Republic of Congo, Kenya, and Côte d'Ivoire. Our interviews with 622 victim participants and dozens of key informants strongly suggest that the ICC has reached a critical juncture in its victim participation program. It is our view that the court must either invest more resources and think more creatively about how it can meet the pragmatic and psychosocial needs of victim participants in its present form or revamp the program entirely. Despite admirable efforts by ICC staff, both in The Hague and in victims' home countries, most victim participants, our findings indicate, have only a rudimentary knowledge of the ICC and its mandate. They want more contact with the court, are deeply frustrated by the slow pace of the proceedings, and expect to receive individual reparations. What remains to be seen is if the ICC (and the states that support it) can make the necessary reforms to meet these expectations.

Details: Berkeley, California: Human Rights Center at University of Berkeley School of Law, 2015. 86p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.law.berkeley.edu/wp-content/uploads/2015/04/The-Victims-Court-November-2015.pdf

Year: 2015

Country: International

Keywords: International Criminal Court

Shelf Number: 156499


Author: Human Rights Center, UC Berkeley School of Law.

Title: The Long Road: Accountability for Sexual Violence in Conflict and Post-Conflict Settings

Summary: Tens of thousands of men and women were raped or sexually tortured during the war in Bosnia between 1992 and 1995. During the 100-day genocide in Rwanda in 1994, thousands of women were raped or had their breasts or genitals mutilated. From 1975–1979, Khmer Rouge cadres in Cambodia raped women and girls despite strict regulations against extramarital sexual relations and an entire generation of men and women were subjected to forced marriage. Acts of sexual violence committed during periods of armed conflict or political unrest are, first and foremost, crimes against the individual survivor. As such, they may be investigated and prosecuted locally under domestic penal or gender-violence laws that criminalize offences against the person. However, where these acts are committed specifically because, or as part, of an armed conflict or larger attack on a civilian population or plan to destroy a particular group of people, they may also constitute an international crime. Since the 1990s, international courts have made progress in prosecuting military commanders and civilian officials for their roles in perpetrating sexual violence as a war crime, as a crime against humanity, and as an act of genocide. However, these international tribunals often operate at significant geographic and historical distance from the events in question. Not surprisingly, they have faced serious challenges in collecting evidence, access to witnesses, and establishing defendants' responsibility for acts they may not have personally committed. They may also have jurisdictional or practical constraints that limit the scope of events they can target. For a host of reasons, accountability for international crimes of sexual violence depends largely on the response of national authorities. To address international crimes of sexual violence, domestic investigators and prosecutors must first be able to prove an underlying act of rape under the Rome Statue, for example, before they can be expected to establish the additional contextual elements that would make that act of rape, a war crime, crime against humanity, or act of genocide. Therefore, in order to appreciate the potential of local actors to provide accountability for international crimes of sexual violence, it is critical to first understand their day-to-day challenges in investigating and prosecuting sexual violence and the strategies used to overcome these challenges. To this end, researchers at the Human Rights Center (HRC) at the University of California, Berkeley, School of Law, conducted a four-country study in Kenya, Liberia, Sierra Leone, and Uganda to identify key accountability barriers and strategies for reporting, investigating, and prosecuting cases of sexual violence. In addition to conducting desk research on the nature of sexual violence and accountability mechanisms in these countries, HRC researchers conducted a total of 279 semi-structured interviews with representatives of governments, UN agencies, and civil society organizations in Kenya (N=59), Liberia (N=115), Sierra Leone. (N=27), and Uganda (N=78). Researchers coded and analyzed the interviews to identify key themes related to the reporting, investigation, and prosecution of cases of sexual violence.

Details: Berkeley, California: Human Rights Center at University of California, Berkeley School of Law, 2015. 96p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.law.berkeley.edu/wp-content/uploads/2015/04/The-Long-Road-August-2015.pdf

Year: 2015

Country: International

Keywords: Armed Conflict

Shelf Number: 156500


Author: Appelqvist, Bjorn

Title: Waste Trafficking, Challenges and Actions to be Taken

Summary: Illegal export of waste is known as waste trafficking and when committed, it has a large negative impact on sustainable resource management and recycling efficiency as well as on the environment and on human health. Furthermore, exporting waste for unsound and unacceptable treatment abroad instead of complying with the regulations creates an uneven playing field that impairs sound market mechanisms. In order to secure sound and environmentally friendly waste handling globally, legislation such the Basel Convention and the European Waste Shipments Regulation have been introduced. Despite the regulations in place, large amounts of waste are unlawfully exported from OECD countries to transition and developing countries, such as China, other Asian and West African countries. The illegal trade in waste is estimated at a value of between US$ 10 and $ 12 billion annually and generates very high revenues to the criminal actors involved in the trade. The enforcement of waste trafficking is organisationally complex and most enforcement activities today are reactive in nature and rely on the cooperation between environmental agencies, customs and police networks in a number of countries. The lack of proper coordination and allocation of resources between different national authorities are the main bottlenecks to effective and efficient enforcement of the regulations on trans-frontier shipments of waste. Furthermore, effective collection, use and exchange of information and intelligence are essential for better and more effective enforcement, but delivering the intelligence material needed constitutes a large challenge since it demands transnational and cross-organisational cooperation. Ideally, in the long term, the most profound way of reducing the risks related to waste trafficking is to simultaneously reduce the probability of improper handling of the wastes and ensure financially and environmentally sound resource utilization in the receiving countries. However, such capacity building is time consuming and in the meantime the responsibility for securing sound and environmentally friendly waste handling and for preventing waste trafficking must be laid upon the exporting countries in co-operation with the relevant international bodies. The successful approach to achieving this task is to simultaneously pursue two parallel lines of activities believed to reduce the occurrence as well as the effects of waste trafficking activities; making it easier do right and, at the same time making it harder to do wrong.

Details: Copenhagen, Denmark: City of Copenhagen, Waste Management Department and ISWA Task Force on Globalisation and Waste Management, Denmark. Unknown Date. 8p.

Source: Internet Resource: Accessed June 19, 2019 at: Copy available at Rutgers-Newark Criminal Justice Library.

Year: 0

Country: International

Keywords: Environmental Crime

Shelf Number: 156501


Author: MacLeod, Melissa

Title: Transnational Trafficking of Hazardous Waste from Developed to Developing Nations: Policies and Recommendations

Summary: Transnational trafficking of e-waste has become a rising problem over time as the amount of waste produced in developed countries increases. Over time, the focus has moved from traditional industrial waste disposal to e-waste disposal. This acceptance of hazardous waste often leads to adverse health effects in the importing nation. As a case study, the history, consequences, current policies, and recommendations for hazardous waste trafficking are considered in the context of West Africa. Following the analysis, it is clear that despite strong policies on the importers part, there are confounding factors, such as economic expansion and corruption, which continue to drive the import of e-waste. Therefore, the recommendations are addressed to exporting nations which generally have well-developed economies, political systems, and technology thus increasing the likelihood of control over the situation.

Details: Ottawa, Canada: Interdisciplinary Journal of Health Sciences, 2013. 7p.

Source: Internet Resource: Accessed June 19, 2019 at: https://pdfs.semanticscholar.org/6a16/d80901eb2785c4851997180ad58e32f9b81e.pdf

Year: 2013

Country: International

Keywords: E-Waste

Shelf Number: 156503


Author: Shell-Duncan, Bettina

Title: A State-of-the-Art Synthesis on Female Genital Mutilation/Cutting: What do We Know Now?

Summary: Efforts to end female genital mutilation/cutting (FGM/C) are a rising priority on many national and global agendas. Thus it is imperative to have a clear understanding of the scale and scope of the practice, and where it occurs, as well as the dynamics of change and the broader context surrounding it. This state-of-the-art synthesis offers a snapshot of the most recent data available as of July 2016 and the most relevant contextual information on key FGM/C issues in clear, non-technical language that can help inform policymakers, donors, programme planners, and other key stakeholders. Nationally representative data on the prevalence of FGM/C among girls and women ages 15-49 are available for 29 countries: Twenty-seven countries in Africa plus Yemen and Iraq. Fifteen of these countries show no clear evidence of progress, while in 14 countries, the practice appears to be declining. Two out of three affected women live in just four countries - Egypt, Ethiopia, Nigeria, and Sudan. In Indonesia, nationally representative data on FGM/C prevalence is available but only for girls under the age of 12 years. FGM/C also occurs in some countries that have not had any nationally representative surveys, such as India and Malaysia. The extent to which FGM/C is practiced varies greatly across regions within countries, and is most markedly associated with ethnicity. Increasingly, girls are undergoing FGM/C at younger ages, with most cut before the age of 5. The vast majority of girls are cut by traditional practitioners, and types I and II (clitoridectomy and excision) are the most common forms of cutting. Increasingly, women and girls in immigrant communities such as in the United Kingdom and in the United States, Canada, New Zealand, and Australia are affected by the practice. Policies and programmes aimed at ending FGM/C must be attuned to the context in which the practice is embedded. Understanding the complex social norms and cultural value systems that often shape its meaning and significance is critical. Reasons given for the continuation of FGM/C vary across countries and cultures, and may change over time, though common rationales include: assurance of girls' or women's social status, chastity, or marriageability; religious identity; ritual marking of a transition to womanhood; maintenance of family honor and respect; and improvement of beauty and hygiene. Decisionmaking around FGM/C tends to be made within a broad social context, whereby the choices of parents or their daughters may be strongly influenced by other family or community members. Support for the practice is typically higher among those with less education, who live in rural areas, or who are from poor households. Despite these complexities, evidence in several countries shows that many men and women believe the practice should end, suggesting a promising window of opportunity for change. The currently available data is rich in information that can inform policymakers and programmers about where to focus attention and how best to implement and strengthen current efforts for abandoning FGM/C. The data points to "hot spot" geographic areas, identifies populations that may be more amenable to change, and highlights drivers, rationales, and patterns of influence related to the practice that should be acknowledged and addressed within policy and programmatic strategies. This synthesis also highlights how FGM/C data collection, analysis, and interpretation could be improved to fill some key gaps in our understanding and further guide the way forward.

Details: New York: Population Council, 2016. 35p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.popcouncil.org/uploads/pdfs/SOTA_Synthesis_2016_FINAL.pdf

Year: 2016

Country: International

Keywords: Female Circumcision

Shelf Number: 156514


Author: World Health Organization

Title: Global Strategy to Stop Health-Care Providers from Performing Female Genital Mutilation

Summary: This global strategy against medicalization of female genital mutilation (FGM) has been developed in collaboration with key stakeholders, including UN organizations and health-care professional bodies, national governments and NGOs. The strategy is intended for a broad audience of policy-makers in governments, parliamentarians, international agencies, professional associations, community leaders, religious leaders, NGOs and other institutions.

Details: Geneva, Switzerland: World Health Organization, 2010. 27p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.unfpa.org/sites/default/files/pub-pdf/who_rhr_10-9_en.pdf

Year: 2010

Country: International

Keywords: Female Circumcision

Shelf Number: 156516


Author: United Nations High Commissioner for Human Rights

Title: Istanbul Protocol: Manual on the Effective Investigation and Documentation of Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment

Summary: Torture is defined in this manual in the words of the United Nations Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, 1984: [T]orture means any act by which severe pain or suffering, whether physical or mental, is intentionally inflicted on a person for such purposes as obtaining from him or a third person information or a confession, punishing him for an act he or a third person, has committed or is suspected of having committed, or intimidating or coercing him or a third person, or for any reason based on discrimination of any kind, when such pain or suffering is inflicted by or at the instigation of or with the consent or acquiescence of a public official or other person acting in an official capacity. It does not include pain or suffering arising only from, inherent in or incidental to lawful sanctions. Torture is a profound concern of the world community. Its purpose is to destroy deliberately not only the physical and emotional well-being of individuals but also, in some instances, the dignity and will of entire communities. It concerns all members of the human family because it impugns the very meaning of our existence and our hopes for a brighter future. Although international human rights and humanitarian law consistently prohibit torture under any circumstance (see chapter I), torture and ill-treatment are practised in more than half of the world's countries. The striking disparity between the absolute prohibition of torture and its prevalence in the world today demonstrates the need for States to identify and implement effective measures to protect individuals from torture and ill-treatment. This manual was developed to enable States to address one of the most fundamental concerns in protecting individuals from torture -effective documentation. Such documentation brings evidence of torture and ill-treatment to light so that perpetrators may be held accountable for their actions and the interests of justice may be served. The documentation methods contained in this manual are also applicable to other contexts, including human rights investigations and monitoring, political asylum evaluations, the defence of individuals who "confess" to crimes during torture and needs assessments for the care of torture victims, among others. In the case of health professionals who are coerced into neglect, misrepresentation or falsification of evidence of torture, this manual also provides an international point of reference for health professionals and adjudicators alike. During the past two decades, much has been learned about torture and its consequences, but no international guidelines for documentation were available prior to the development of this manual. The Istanbul Protocol: Manual on the Effective Investigation and Documentation of Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment is intended to serve as international guidelines for the assessment of persons who allege torture and ill-treatment, for investigating cases of alleged torture and for reporting findings to the judiciary or any other investigative body. This manual includes principles for the effective investigation and documentation of torture, and other cruel, inhuman or degrading treatment or punishment (see annex I). These principles outline minimum standards for States in order to ensure the effective documentation of torture. The guidelines contained in this manual are not presented as a fixed protocol. Rather, they represent minimum standards based on the principles and should be used taking into account available resources. The manual and principles are the result of three years of analysis, research and drafting, undertaken by more than 75 experts in law, health and human rights, representing 40 organizations or institutions from 15 countries. The conceptualization and preparation of this manual was a collaborative effort between forensic scientists, physicians, psychologists, human-rights monitors and lawyers working in Chile, Costa Rica, Denmark, France, Germany, India, Israel, the Netherlands, South Africa, Sri Lanka, Switzerland, Turkey, the United Kingdom, the United States of America, and the occupied Palestinian territories.

Details: New York: Office of the United Nations High Commissioner for Human Rights, 2004. 83p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.ohchr.org/Documents/Publications/training8Rev1en.pdf

Year: 2004

Country: International

Keywords: Coercion

Shelf Number: 156513


Author: Jones, Andrew

Title: An Evaluation of the International Justice Mission's "Project Lantern": Assessment of the Five-Year Impact and Change in the Public Justice System

Summary: Project Lantern is the International Justice Mission's five-year anti-sex trafficking project in Cebu, the Philippines, funded in 2005 by the Bill & Melinda Gates Foundation. Cebu, located at the confluence of transportation networks and marked by a booming regional economy and high numbers of tourists from all over the world, is a human trafficking source, point of transit and destination. While the Philippines has criminalized human trafficking through the Anti-Trafficking in Persons Act of 2003 (Republic Act No. 9208, or RA 9208), availability of the protection of this law is predicated on a functioning public justice system. The primary intended outcome of Project Lantern, therefore, was to demonstrate the effectiveness of a law enforcement-based strategy to reduce the prevalence of sex trafficking and commercial sexual exploitation of children in the Metro Cebu area. An external project evaluation was commissioned in May 2010 to assess change in the Metro Cebu public justice system's response to sex trafficking and the role of Project Lantern in fomenting that change. The evaluation emphasized components of the system primarily targeted for change through the project: law enforcement, social services, and prosecution and conviction of perpetrators through the court system. An evaluation framework and methodology was developed and agreed upon with IJM, including a set of evaluation questions to assess resulting changes and a rating scale for each of the relevant dimensions of a strong public sector system. The latter was created to define the standard against which the evaluators would assess the strength of the system. The evaluation collected qualitative data from project stakeholders - select informants screened for their experience with the project and participation in anti-sex trafficking efforts in Cebu, including IJM staff - through a series of 23 interviews with 28 individuals and 7 focus groups with 39 total participants. The evaluation also utilized quantitative data from project monitoring documents and external research supported by IJM.

Details: Washington, DC: International Justice Mission, 2010. 122p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.ijm.org/documents/studies/Cebu-Project-Lantern-Impact-Assessment.pdf

Year: 2010

Country: International

Keywords: Anti-Sex Trafficking

Shelf Number: 156527


Author: Jawhar, Jasmine

Title: Terrorists' Use of the Internet: The Case of the Daesh

Summary: Technological advancement has made an impact on our lives through the globalisation of technology, services and ideas. Retrospectively, the usage of telegrams and typewriters have been replaced by sophisticated operating and communication systems. While the advancement of technology gave birth to the Internet, the invention of the Internet has created a borderless world that is able to cut across cultures and language barriers. As of July 1, 2016, it was estimated that about 46.1 per cent of the world's population have access to the Internet at home, while 43.4 per cent was recorded in 2015 and 40.7 per cent in 2014. This shows the rate of individuals accessing the Internet is rising on a yearly basis. The 21st century has led to an inevitable dependence on the Internet as a means for communication. The Internet has accelerated the growth of technology in terms of connecting people around the world, increasing business opportunities through e-commerce as well as creating space for a wealth of information to be accessed by people, regardless of where they are in the world. The Internet is a vital tool for communication on past and current issues and events, to communicate with colleagues, friends and family members amongst others. This technology has also invited individuals with ulterior intentions to promote violent ideologies, create havoc and spread fear amongst the general public. One such example is al Dawla al Islamiya fi al Iraq wa al Sham (Daesh), a terrorist group currently operating not only in Syria and Iraq, but also globally through the use of the Internet. Against this backdrop, this study attempts to discuss Daesh's exploitation of the Internet which is able to transcend boundaries, time and space. This research seeks to identify the various purposes that Daesh is using the Internet for and how they are using it in the effort to achieve their goals. This study would be of interest to policy makers, academicians, and other readers interested in the area of counter-terrorism. This study will mainly focus on the term 'terrorist's use of the Internet' as it is more suitable to denote the current state of terrorists and their use of the Internet. It will also set out to propose several uses of the Internet by terrorists that includes propaganda, radicalisation and recruitment, communication and networking, funding, training, planning and coordination of attacks, as well as data mining. This timely study would analyse Daesh's ability to adapt and change according to technological advancement. This study was conducted between 2015 to mid-2016 from a pure sociological perspective. The second part of this analysis will provide insights on Daesh's use of the Internet and its accompanying Web 2.0 ability to disseminate information and spread its radical ideologies. Handheld devices assisted the creation of group cells via real-time messaging apps that further facilitated the identification and radicalisation processes. It will also seek to emphasise on Daesh's extensive use of social media platforms and the various communication sites. It will then provide several observations based on the findings of the study, and followed by recommendations proposed to counter Daesh's propaganda and presence online. These includes the virtual mobilisation of religious movements and projecting the dire images of Syria and Iraq on social media. To reinforce these efforts, dissemination of counter-messages through active online platforms and enhancement of capabilities and technical know-how of the counter-messengers are essential. In addition, in support of all these approaches are the proliferation of counter-messages, strengthening offline measures to combat Daesh's presence online and the need for Public-Private Partnerships (PPPs) to boost the quality of the counter efforts against Daesh's propaganda and its presence online.

Details: Kuala Lumpur, Malaysia: The Southeast Asia Regional Centre for Counter-Terrorism, Ministry of Foreign Affairs, 2016. 121p.

Source: Internet Resource: Accessed June 19, 2019 at: http://www.searcct.gov.my/images/Articles_2016/Articles_2017/Terrorists_Use_Internet_Mac_17.pdf

Year: 2016

Country: International

Keywords: Counter-Terrorism

Shelf Number: 156528


Author: Birdlife International

Title: A Best Practice Guide for Monitoring Illegal Killing and Taking of Birds

Summary: Overexploitation is one of the main threats driving birds towards extinction globally, and much of this is illegal. Illegal activities are by definition hidden and difficult to track, and consequently most estimates of the numbers of birds illegally killed or taken are currently based on inference from fragmentary data, informed by expert knowledge. Monitoring of illegal killing and taking of birds using standardised, replicable methods is needed to generate robust quantitative data to help focus efforts, track trends and monitor the effectiveness of actions to address illegal killing. Detailed guidance is widely available on methods for monitoring bird population abundance, but little information is available on methods to monitor illegal killing and taking of birds. Such monitoring requires use of appropriate sampling design and methodology, recruitment and maintenance of a network of individuals to collect the data, involvement of relevant stakeholders, appropriate consideration of security issues, appropriate data management, analysis, presentation and communication, and many other elements. The aim of this best practice guide is to provide BirdLife Partners and other stakeholders with guidance covering these different aspects. The principle elements of each aspect of a monitoring scheme are summarised in the main chapters, illustrated by a series of case studies describing different approaches applied in selected countries.

Details: Cmabridge, UK: Birdlife International, 2015. 66p.

Source: Internet Resource: Accessed June 19, 2019 at: https://www.birdlife.org/sites/default/files/attachments/guidelines_for_monitoring_ikb_final_version.pdf

Year: 2015

Country: International

Keywords: Birds

Shelf Number: 156539


Author: Blakey, Robert

Title: Exploring the Impact of Neurocriminological Ideas on Public Sentencing Preferences and Moral Behaviour

Summary: While the focus of criminology has traditionally been the sociological correlates of criminal behaviour, there is growing interest in the neurobiological correlates of offending. Theorists predict that this emerging area of research, known as neurocriminology, will change how people view crime, punishment and their own behaviour. The veracity of this prediction will rest on the question of whether neurocriminology can challenge the belief that offenders make a morally relevant choice to offend (or not). By suggesting that offenders are less able to make such choices, neurocriminology could lead offenders to appear more dangerous yet less blameworthy. Indeed, learning about neurocriminology may actually promote deviant behaviour, if people internalise the idea that they are not really responsible for their actions, because their brain 'made them do it'. This thesis tested such hypotheses through two online survey experiments and three field experiments, with a total of 8153 participants. In every study, participants learned about some neurocriminological idea that could explain why a person, without any mental disorder, committed an impulsive offence - a common combination of factors in many individual acts of crime. The communication of neurocriminology significantly reduced attributions of blame, albeit to a small extent, and had no (or even an ameliorating) effect on perceived dangerousness. In the largest study, after exposure to neurocriminology, participants punished the offender significantly less, a response to ascribing him a significantly more moral character and significantly less self-control; though these effects remained small. Neurocriminological evidence also led participants to recall significantly more acts of prior deviance, but not to act less morally in the study. The fear that neurocriminology could promote deviance might explain the final finding: participants in the richest and poorest boroughs of London - but not those in between - were significantly more inclined to disrupt a scientific campaign aimed at communicating neurocriminology to offenders (rather than non-offenders). In sum, the implications of communicating neurocriminology were in the direction of promoting lenience for offenders, yet the effects were small. Hence this thesis concludes that lay people will not relinquish the notion that offenders deserve to be punished in the face of neurocriminology. Given its function in communicating censure, the human tendency to attribute blame may be too ingrained to be overthrown by science, at least at the present point in time.

Details: Oxford, UK: St. Hilda's College, Centre for Criminology, Faculty of Law, 2018.

Source: Internet Resource Thesis: Accessed June 19, 2019 at: https://ora.ox.ac.uk/objects/uuid:e3283478-5013-44be-b0ea-c06147187810/download_file?file_format=pdf&safe_filename=Thesis%2Bv9%2B-%2Bno%2BTrack%2BChanges%2B-%2Bcopyright%2Bcontent%2Bremoved%2B-%2Bdissemination%2Bversion.pdf&type_of_work=Thesis

Year: 2018

Country: International

Keywords: Criminal Behavior

Shelf Number: 156549


Author: Corbet, Shaen

Title: Investigating the Dynamics Between Price Volatility, Price Discovery, and Criminality in Cryptocurrency Markets

Summary: This paper identifies several stylised facts relating to the volatility and price discovery process from eight cryptocurrencies utilising an empirical analysis of intra-day trading data to uncover four main results. First, cryptocurrencies exhibit weekend-volatility effects while intra-day volatility is found to be influenced by international trading times, periods of substantial volatility in the markets for oil, and GBP/USD and cybercrime events. Secondly, a thorough investigation of recent cybercriminality identifies that cryptocurrency hacks are found to increase both the volatility of the currency hacked and the correlations across the hacked currency and other cryptocurrencies. Thirdly, hacks significantly reduce price discovery sourced within the hacked currency relative to other cryptocurrencies. Finally, there are abnormal returns associated with the hacks observed in the hours prior to the actual hacking event, which reverts to zero at the time of the public announcement of the hack.

Details: S.L., 2019. 57p.

Source: Internet Resource: Accessed June 20, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3384707

Year: 2019

Country: International

Keywords: Bitcoin

Shelf Number: 156533


Author: Norton, Simon

Title: Australia-China Law Enforcement Cooperation

Summary: Australia and China have an extensive and growing economic relationship underpinned by diverse people-to-people connections. China is Australia's largest two-way trading partner in goods and services (A$195 billion in 2017-18). Chinese investment into Australia's real estate industry increased by 400% in the five years to 2015, to A$12 billion in 2014-15. Money flows from China into Australia almost doubled between 2011-12 and 2015-16, from A$42 billion to almost A$77 billion. China is Australia's largest source of overseas students (over 157,000 studied in Australia in 2016) and second largest and highest spending inbound tourism market (with 1.2 million visits in 2016). This economic relationship is mutually beneficial, but it also creates opportunities for criminals. The large volume of money, goods and people moving between the two countries makes it easier to conceal crimes, such as trafficked drugs or laundered money. Much activity also takes place online, making the cyber realm a major vector for cross-border criminal activity. It's therefore important that the two governments work together to fight transnational crime where there are links between Australia and China, or where either's citizens play key facilitator roles. Australian police already have one of the strongest relationships with China's police of any Western liberal democracy. The Australian Federal Police (AFP) has maintained a liaison office in China since the late 1990s and currently has six liaison officers based in China. The AFP has been working with its Chinese counterparts on a successful joint counter-narcotics effort called Task Force Blaze since 2015. Australia and China signed a treaty on mutual legal assistance in criminal matters in 2006, leading to the confiscation and repatriation of criminal proceeds. The two countries signed a treaty concerning the transfer of sentenced persons, which came into force in 2011; Matthew Ng became the first Australian to be transferred back home to Australia under a prisoner exchange treaty. Australia and China cooperated in the ultimate arrest and conviction of Zhao Nuo, a Chinese-born Australian citizen who murdered his wife in Western Australia before fleeing to China on a false passport. The Australian financial intelligence unit, AUSTRAC, signed a memorandum of understanding with its Chinese counterpart in 2016 and announced in November 2018 the appointment of its first financial intelligence analyst to be posted to China. In April 2017, the inaugural Australia-China High-Level Security Dialogue was held, setting out a vision for future cooperation. Despite these successes and much promise, there are also inherent risks for Australian authorities in working with China, and limitations on what Australian authorities can do with their Chinese counterparts. China has a very different political and judicial system from that of Australia and other liberal democratic countries. China is a one-party authoritarian state in which law enforcement agencies operate at the direction of the Chinese Communist Party (CCP). Australians have legitimate concerns about the rule of law and civil and human rights in China. The deteriorating human rights situation in Xinjiang Province is of particular concern, especially due to its nature and scale and because of Chinese authorities' denial of any problems despite compelling physical, documentary and eyewitness evidence. And large-scale cyber espionage targeting Australia by Chinese cyber actors, including from the Chinese state, can't be overlooked. Working with Chinese authorities can be politically difficult, and there are many domestic critics of cooperation. This means that Australia should make it clear to China that these differences complicate the ability to engage in law enforcement cooperation. However, the Australian Government has a duty to protect Australia and Australians from crime and terrorism. Those threats are transnational, so effective relationships and collaboration with foreign countries are essential. Australia must prevent itself from becoming an attractive destination and safe haven for criminals. And Australians who are the victims of crime expect perpetrators to be brought to justice. Therefore, Australian authorities should continue to cooperate with their Chinese counterparts, guided by our legal framework and system of government, and look for opportunities to enhance cooperation where it's in Australia's interests to do so and where that cooperation doesn't conflict with Australia's laws and values. This paper outlines existing law enforcement cooperation between Australian and Chinese authorities, highlights the risks and limitations in working with China, and suggests areas where future cooperation can be enhanced. The following sections examine: -counter-narcotics, -concerns about and risks of working with the Chinese Government (using the debate over the ratification of the Australia-China extradition treaty as a case study), -economic crimes (fraud and corruption), -anti-money-laundering and proceeds of crime, -cybercrime, -counter-terrorism. The final section provides recommendations for future cooperation.

Details: Barton, Australia: Australian Strategic Policy Institute, 2019. 32p.

Source: Internet Resource: Accessed June 20, 2019 at: https://s3-ap-southeast-2.amazonaws.com/ad-aspi/2019-06/SR%20139%20Australia_China%20law%20enforcement%20cooperation_0.pdf?XTZs6NXo8RTt3.A45VMhBVAjHvAQOdwh

Year: 2019

Country: International

Keywords: Anti-Money Laundering

Shelf Number: 156550


Author: Economist Intelligence Unit

Title: The Global Illicit Trade Environment Index: Free Trade Zones: Five Case Studies

Summary: Free trade zones (FTZs) are the problem child of global trade. On the one hand they highly valued for their contributions to trade facilitation but on the other they are criticized for vulnerabilities that facilitate many forms of illicit trade and other illegal activities. Though the concept of a "geographically delimited area administered by a single body, offering incentives [to business]" has been around for hundreds of years, it wasn't until the 1980s that countries, mainly in the developing world, truly started creating them. And they were conceived as a means of stimulating economic growth, which in many instances is what they have done, with the most prominent example being the Shenzhen Special Economic Zone (SEZ). Many of the zones have come at a cost, however. In enticing businesses with the promise of a tax-free environment, with little in the way of regulation, governments across the world have created within their borders unmonitored havens ripe for criminal operations, including those of transnational organised crime networks. Over the past decade, numerous international bodies, non-governmental organisations (NGOs) and consultancies, including the OECD, the International Chamber of Commerce (ICC) and the UN Office on Drugs and Crime, as well as The Economist Intelligence Unit (EIU), have documented the myriad ways that free trade zones are used to facilitate trade in illicit goods. While no one knows for certain the precise volume or value of illicit trade that flows through the zones, it is estimated, by almost everyone, to be substantial and include counterfeits, narcotics, alcohol, tobacco, pharmaceuticals, wildlife and humans. Moreover, FTZs have been exploited by criminals as a means to initiate and facilitate illicit financial transactions, such as traditional money laundering, trade-based money laundering (TBML) and terrorist financing. Yet, it didn't - and doesn't - have to be this way. Free trade zones don't need to be free of oversight to deliver on their commercial and economic promise, and many governments are grappling with approaches to find the balance between facilitation and control/monitoring. Perhaps what might be concerning are cases where governments appear to be indifferent to the issue, some actively so. To measure how nations are addressing the issue of illicit trade, the Transnational Alliance to Combat Illicit Trade (TRACIT) has commissioned the Economist Intelligence Unit to produce the Global Illicit Trade Environment Index. The global index expands upon an Asia-specific version, originally created by The Economist Intelligence Unit in 2016 to score 17 economies in Asia on the extent to which they enabled or prevented illicit trade. The Asian index generated much needed attention on the issue of illicit trade within the region. Building upon the success of the Asia index, the global index now includes 84 economies, providing a global perspective and new insights on the social and economic impacts of illicit trade.

Details: New York: Transnational Alliance to Combat Illicit Trade (TRACIT), 2018. 28p.

Source: Internet Resource: Accessed June 21, 2019 at: http://illicittradeindex.eiu.com/documents/EIU%20Global%20Illicit%20Trade%20Environment%20Index%202018%20-%20FTZ%20June%206%20FINAL.pdf

Year: 2018

Country: International

Keywords: Free Trade Zones

Shelf Number: 156581


Author: Transnational Alliance to Combat Illicit Trade

Title: The Global Illicit Trade Environment Index: TRACIT Recommendations to Combat illicit Trade

Summary: The problem of illicit trade - Illicit trade presents a major and growing policy challenge worldwide. It encompasses a wide spectrum of illegal activities, both offline and online, including narcotics and arms trafficking, human trafficking, environmental and wildlife crime (e.g., ivory trade), robbery and resale of antiquities and cultural artifacts. On the commercial side, illicit trade is a nemesis to major industries such as pharmaceuticals, tobacco, alcohol, entertainment content, petroleum products, fishing, forestry, agri-foods, diamonds and pesticides - just to name a few. The adverse knock-on impact of illicit trade exposes consumers to poorly made, unregulated products; drains global GDP; robs governments of tax collections; clogs legitimate trade routes and internet bandwidth; multiplies burdens on border control; perpetuates corruption; amplifies the demand for forced labor; poses environment risks; undermines rule-of-law; puts cash in the hands of organized criminals and bankrolls terrorists around the globe. These are major and sometimes horrific scars on global society that cry out for an urgent policy response by governments - and their international governance bodies - worldwide. Evidence-based policy-making - Policymakers typically require clear evidence that a phenomenon has attained a certain threshold of seriousness to be able to orient and prioritize policy and legislative responses. To make the case for prioritizing illicit trade, estimates from experts are often cited. In this case: research from the World Economic Forum (WEF) places the value of illicit trade and transnational criminal activities at 8% to 15% of global GDP; and similar work conducted by Global Financial Integrity indicates financial losses across 11 industrial sectors susceptible to illicit trade amount to US$ 1.6 to 2.2 trillion per year. There also exist valuable quantifications of illicit trade in specific sectors, such as the World Health Organization (WHO) estimate that counterfeit medicines account for 10% of all medicines available globally; the International Labor Organization (ILO) and the Walk Free Foundation assessment that 25 million people globally are trapped in forced labor. Other sources estimate that: $133 billion of oil and fuels are illegally stolen, adulterated or defrauded every year; global illicit trade in tobacco has grown to more than $35 billion annually, causing substantial tax losses and providing a major source of financing for organized criminal groups; and food fraud robs the global food industry of $30-40 billion each year. And, the commercial value of music digital piracy in 2015 was estimated at $29 billion worldwide and could grow to $53-$117 billion in 2022. The Index: an additional policy tool to help prioritize action In addition to the vital necessity for more research and data, it is equally important to improve the understanding of the regulatory environment and economic circumstances that enable illicit trade - and critically to assess a nation's capability to prevent illicit trade II. RECOMMENDATIONS - Many of recommendations presented in this report reflect the thematic categories upon which the Global Illicit Trade Environment Index is constructed: (i) government policy, (ii) supply and demand, (iii) transparency and trade, and (iv) customs environment. Additional specific recommendations are also put forward in Section III, and these are based on standards and guidelines contained in relevant international instruments, selected national best practices and operational experience from TRACIT member companies in their respective efforts to combat illicit trade. They are all intended to highlight critical priority actions and help policy makers identify, initiate and improve practical and actionable steps to combat illicit trade.

Details: New York: TRACIT, 2018. 20p.

Source: Internet Resource: Accessed June 21, 2019 at: https://www.tracit.org/uploads/1/0/2/2/102238034/tracit_policy_recommendations_global.pdf

Year: 2018

Country: International

Keywords: Illegal Trade

Shelf Number: 156584


Author: Transnational Alliance to Combat Illicit Trade

Title: Oil and Fuel Theft: An Emerging Global Policy Challenge

Summary: - Despite the negative effects on the economy and environment, oil and fuel theft has been largely unchecked and hidden from international attention - The ripple effects include undercutting GDP, environmental degradation and facilitating illegal international financial flows and organized criminal activity - Fighting fuel fraud is a global responsibility, as well as a prerequisite for the achievement of the UN SDGs - Molecular marking of fuel is currently the most effective solution to reduce fuel fraud and minimize tax evasion - Governments need to promote shared policy development and ramp up implementation of enforcement measures

Details: New York: Author, 2018. 4p.

Source: Internet Resource: Accessed June 21, 2019 at: https://www.tracit.org/uploads/1/0/2/2/102238034/tracit_oil_and_fuel_theft_an_emerging_global_policy_challenge_april2018l.pdf

Year: 2018

Country: International

Keywords: Fuel Theft

Shelf Number: 156586


Author: Barnes, Richard

Title: Fisheries and Maritime Security: Understanding and Enhancing the Connection

Summary: Maritime security policy is beginning to change, and one may note that some statements on maritime security occasionally include reference to fisheries – typically illegal, unreported and unregulated (IUU) fishing. Some authors are sensitive to this change. Thus, some aspects of fisheries regulation, or rather IUU fishing, are occasionally connected to wider debates about maritime security. This literature is increasingly concerned with the operational links that make fishing activities vulnerable to or synergistic with crime. Other areas, such as the degree to which fisheries disputes and their resolution contribute to insecurity and good order respectively, remain underexplored. This chapter aims to deepen the dialogue about how fisheries fit within the broader framework of maritime security. We seek to move the debate forward by extending discussions about fisheries regulation into maritime security, showing how poor or ineffective regulation and management of fisheries activities can have a wider destabilizing effect on maritime security. In particular, we argue that cumulative, multiple stresses at lower/different levels can render maritime security generally more vulnerable. This is a novel perspective because it combines two discreet areas of concern: maritime security discourse and fisheries law.

Details: S.L., 2019. 25p.

Source: Internet Resource: Accessed June 21, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3388786

Year: 2019

Country: International

Keywords: Environmental Crime

Shelf Number: 156553


Author: Broadhurst, Roderic

Title: Child Sex Abuse Images and Exploitation Materials

Summary: Online markets for Child Exploitation Materials (CEM) or Child Sex Abuse materials (CSAM) have developed in tandem with the rapid expansion of the Internet. CEM images of sexual abuse of children, often photographs and videos, include live transmission of sexual assault as well as simulated experiences using virtual reality technology or robotics. User-generated images, sexting and 'revenge porn' are new sources of image-based abuse often involving older children. This chapter describes the prevalence and nature of CEM, profiles of offenders and victims, and law enforcement responses. The content of CEM constitutes a crime scene that can help trace offenders and identify victims, but poses challenges for digital forensics. Definitions of CEM, the relationship between online and offline offending; emerging developments in CEM; and international, regulatory, and collaborative approaches to suppress CEM are described.

Details: Canberra, Australia: Australian National University Cybercrime Observatory, 2019. 32p.

Source: Internet Resource: Accessed June 21, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3384499

Year: 2019

Country: International

Keywords: Child Exploitation

Shelf Number: 156554


Author: Shaw, Dave

Title: Child Sex Trafficking in Angeles City: Using Time-Space Sampling to Measure Prevalence of Child Sex Trafficking in Angeles City and Mabalacat in the Philippines

Summary: Introduction: This report presents the results of a 2016 study to measure the prevalence of child sex trafficking in establishment and street-based exploitation in Angeles City and Mabalacat, the Philippines. The study was conducted by International Justice Mission in March 2016. The Wave 2 Study described in this IJM report is the second of two waves of data collection designed to measure the availability of child sex trafficking victims in Angeles City and Mabalacat. Dubbed the "Entertainment Capital of Central Luzon" and the former site of the U.S. Clark Air Force Base, Angeles City and Mabalacat have a thriving sex trade, particularly along Fields Avenue. While initially developed to feed the demand created by the neighboring Clark AFB, the sex trade continued to grow even after the airbase closed in 1991. In 2010, the Philippine National Bureau of Investigation Region 3 director referred to the area as "ground zero" for human trafficking in the Philippines. Understanding the nature and scale of a child sex trafficking phenomenon is critical to an effective response. However, very little reliable data exists regarding the phenomenon. Past studies such as "Surviving Violence & Trafficking: Stories of Women and Youth in Angeles City" (conducted by The Red Anti-Violence Project and funded by the European Union) identified sex trafficking as a major problem in the region. Accurate assessment of child sex trafficking in the Philippines is difficult because children exploited for sex are a "hidden" population due to the clandestine nature of the crime. These studies are an attempt to provide accurate data on child sex trafficking in Angeles City and Mabalacat by systematically identifying, documenting and analyzing current cases of child sex trafficking in the target area. This data will assist IJM, other anti-trafficking NGOs and the Philippine Government in measuring and evaluating the impact of past anti-trafficking efforts, as well as in guiding future initiatives. Methodology: This study utilized a form of time-space sampling, coupled with undercover data collection, to measure the prevalence of child sex trafficking in Angeles City and Mabalacat. In total, 144 commercial sex locations were mapped and stratified by type. Over the course of the study, data collectors surveyed 142 randomly sampled locations. Data collectors gathered both quantitative and qualitative information through undercover investigative methods on the nature and prevalence of minors trafficked for sex. They used both direct observation and interactions with adults in the commercial sex industry, children in commercial sex establishments, pimps, mamasans and other intermediaries. Results: The data collected during the 2016 Wave 2 study indicates that the prevalence of child sex trafficking in Angeles City and Mabalacat was 1.21% in March 2016. This means that, on average, roughly one out of every 83 CSWs identified by data collectors was a minor. When compared to the data from the 2012 Wave 1 prevalence study, this represents an 86.23% reduction. During the 2016 study, data collectors had significant trouble finding identifiable minors trafficked for sex. Prevalence of minors decreased across all location types surveyed. In general, child sex trafficking prevalence was highest in locations typically frequented by Filipino customers (2.16%), and lowest in locations typically frequented by expat or Caucasian customers (0.35%). Throughout the study, individuals associated with the commercial sex industry in Angeles City and Mabalacat exhibited significant fear of law enforcement, and they routinely questioned IJM data collectors as to whether they were law enforcement officers.

Details: Washington, DC: International Justice Mission, 2016. 56p.

Source: Internet Resource: Accessed June 21, 2019 at: https://www.ijm.org/documents/studies/ijm-pampanga-final-web-pdf-v2.pdf

Year: 2016

Country: International

Keywords: Child Exploitation

Shelf Number: 156562


Author: United Nations Environment Programme

Title: Enforcement Strategies for Combating the Illegal Trade in HCFCs and Methyl Bromide

Summary: The Path to Ozone Recovery: The Montreal Protocol on Substances that Deplete the Ozone Layer is widely considered to be the most successful international environmental agreement. Working together, the 197 Parties to the Montreal Protocol have reduced global production and consumption of ozone depleting substances (ODS) by over 97%, placing the ozone layer on the path to recovery. In addition to preventing millions of cases of skin cancer, cataracts and other human health, agricultural and ecosystem damage by preventing additional damage to the stratospheric ozone layer, the Montreal Protocol has also made a major contribution to climate protection because most ODS are also potent greenhouse gases with long atmospheric lifetimes. The Emergence of Illegal Trade in ODS: However, despite the overall success of the agreement, the path to ozone recovery has not been without bumps along the way. In the early 1990's, a burgeoning black market trade in chlorofuorocarbons (CFCs) and other ODS arose as an unintended result of Montreal Protocol controls. It is estimated that illegal materials accounted for as much as 15% of the world trade in CFCs by the mid-1990s. Thanks to the efforts of government, industry, academia and non-government organisations (NGOs), the illegal trade in CFCs and other ODS has declined signifcantly since the problem was frst discovered, and global awareness of the problem of illegal trade in ODS is at an all-time high. High Risk of Smuggling in HCFCs and Methyl Bromide: As Parties begin to implement phase-out schedules for hydrochlorofuorocarbons (HCFCs), they can work to avoid a similar threat. HCFCs became the frst generation of substitute chemicals for CFCs when production and consumption of CFCs were phased out under the Montreal Protocol (the phase-out was completed as of 1 January 2010, with certain exemptions). Current uses of HCFCs include refrigeration, foam, solvent, aerosol and frefghting sectors. They are also used as raw materials, or feedstock, in the production of other chemical products. The Parties to the Montreal Protocol: classifed HCFCs, with considerably lower ozone depleting potentials (ODP) than CFCs, as "transitional substances" that could be used to facilitate the prompt phase out of CFCs in applications where non-ODS options were not yet available, but ultimately HCFCs were also scheduled for phase out. Although having considerably lower ODP than CFCs, HCFCs pose a signifcant threat to the global climate. HCFCs have global warming potentials between 700 and 2,300 times that of carbon dioxide. Recognising the ozone and climate impact of the continued use of HCFCs, the Parties to the Montreal Protocol agreed in 2007 to accelerate the phase out of these substances. HCFCs are to be completely phased out in developed countries by 2020 and in developing countries by 2030, with an initial freeze in 2013 and a 10% reduction step in 2015 (see table opposite). A number of countries, both developing and developed, have decided to phase out HCFCs faster than required by the Montreal Protocol and have introduced bans for selected uses. The limited supply creates demand for HCFCs in these countries, which in turn provides incentives for HCFC smuggling.

Details: Nairobi, Kenya: United Nations Environment Programme, 2013. 74p.

Source: Internet Resource: Accessed June 21, 2019 at: http://www.unep.fr/ozonaction/information/mmcfiles/7622-e-Enforcement_Strategies_Illegal_Trade_HCFCs.pdf

Year: 2013

Country: International

Keywords: Enforcement

Shelf Number: 156564


Author: Euromonitor International,

Title: Size and Shape of the Global Illicit Alcohol Market

Summary: Alcoholic beverages are deeply ingrained in most societies worldwide, with global consumption in 2017 generating US$1.6 trillion in legally registered sales1 of 222.8 million hectolitres of pure alcohol ("hectolitres of alcohol equivalent", or hl lae). However, despite the efforts of policy-makers, law enforcement officials, and legitimate alcohol manufacturers, illicit alcoholic beverages still account for a significant share of the total volume of alcohol consumed in many countries. This white paper explores critical issues affecting the problem of illicit alcohol in today's global alcohol industry. To this end, the paper analyses research conducted in 24 countries in Latin America, Africa, and Eastern Europe, and examines the major factors shaping their illicit alcohol markets. Illicit alcohol is prevalent in these countries: Of the 42.3 million hl lae of total alcohol consumed each year, approximately 25.8% is illicit. In other words, nearly 10.9 million hl lae of illicit alcohol is consumed annually in these 24 countries alone. This suggests they represent an effective sample for exploring this important topic. Illicit alcoholic beverages are defined as those not complying with the regulations and taxes in the countries where they are consumed, resulting in serious health risks to consumers, revenue loss, and brand degradation for legitimate manufacturers, as well as reduced tax revenue for governments. These products are responsible for hundreds of cases of death and illness due to accidental methanol intoxication, millions of dollars used to fund other criminal activities, and the fiscal loss of billions of dollars in unpaid taxes. Health risks affect the poorest and most vulnerable consumers by contributing to widening health inequalities. The most significant risks and costs for each country depend on the characteristics of the local market for illicit alcohol. The landscape of illicit alcohol is varied and complex, ranging from homemade artisanal beverages sold without the proper sanitary permits to legitimately branded bottles of alcohol smuggled illegally into a country. However, although market characteristics differ across countries, the problem of illicit alcohol exists in every region, in developed and developing countries, urban and rural areas, and higher-income and lower-income neighbourhoods alike. Governments, businesses, and civil society organizations - all stakeholders with vested interests in curbing illicit trade - have responded to this problem from many angles. The approaches are as varied as the markets themselves, but have often been partial or ineffective, especially due to rapid adaptation of illicit businesses to new regulations and restrictions This white paper analyses and summarises findings that may help stakeholders better understand the illicit alcohol trade. In particular, the paper identifies five themes that are shaping the global illicit alcohol trade and affecting the stakeholder initiatives intended to reduce it.

Details: London: Author, 2018. 42p.

Source: Internet Resource: Accessed June 24, 2019 at: https://www.tracit.org/uploads/1/0/2/2/102238034/illicit_alcohol__-_white_paper.pdf

Year: 2018

Country: International

Keywords: Alcohol Industry

Shelf Number: 156727


Author: Economist Intelligence Unit

Title: The Global Illicit Trade Environment Index. Overall Results

Summary: Behind most every major headline, every major story in the news, lies another potential headline and another story about some form of illicit trade. From the refugee crises in the Mediterranean and South-east Asia, where the chaos is providing cover for human traffckers, to North Korea, a criminal state that couldn't survive if it didn't trade in arms, illicit cigarettes and counterfeit currency. Even the investigation into Russian interference in the 2016 US presidential election has led to indictments on money laundering, which is both a product of illicit trade and a facilitator of it. To measure how nations are addressing these and other issues related to illicit trade, the Transnational Alliance to Combat Illicit Trade (TRACIT) has commissioned the Economist Intelligence Unit to produce the Global Illicit Trade Environment Index. The global index expands upon an Asia-specifc version, originally created by The Economist Intelligence Unit in 2016 to score 17 economies in Asia on the extent to which they enabled or prevented illicit trade. This year's updated and expanded version now includes 84 economies, providing a global perspective and new insights on the trade's societal and economic impacts. Key fndings from the index are: - With a score of 85.6 (out of 100), Finland ranks frst in the overall index, besting the United Kingdom by only 0.5 points. The rest of the top 10 is rounded out by a handful of European countries (Sweden, Austria, Netherlands, Denmark and Germany), along with the United States, Australia and New Zealand. - At the bottom of the overall index is a group of developing economies from all regions of the globe. Libya ranks 84th out of 84 economies, with a score of 8.6, and is joined by Iraq in 83rd place, scoring less than six points better. Faring slightly better, but still poorly, are a group of economies that score in the twenties and thirties in the index: Myanmar (82nd), Laos (81st), Venezuela (80th), Cambodia (79th), Kyrgyzstan (78th), Belize (77th), and Ukraine (76th) and Trinidad and Tobago (75th). - Regionally, Europe (34 economies in the index), which includes the EU-28 plus six other countries, earns the highest the average score (68.0). The Asia-Pacifc (21 economies) comes second at 56.0 and the Americas (19 economies), including the US and Canada, is in third at 54.0. The Middle East and Africa (10 economies) is last among the regions, mainly due to low scores on the "supply and demand" and the "transparency and trade" indicators. - Among the four categories in the index, the highest average score (69.0) across all 84 economies is in "customs environment," which measures how effectively an economy's customs service manages its dual mandate to facilitate licit trade while also preventing illicit trade. - The lowest average score (50.0) is in the "supply and demand" category, which measures the domestic environment that encourages or discourages the supply of and demand for illicit goods. A close look at the global environment that enables illicit trade can prove a somewhat dispiriting exercise. The average overall score in the Global Illicit Trade Environment is a shade under 60.0. Where economies aren't underresourced in customs or law enforcement, they may otherwise be indifferent or actively neglect illicit practices in order to continue reaping the economic benefits of being a global financial centre (like the UK) or a regional logistics hub (like Singapore, Dubai and Panama) or one of the world's factories (like China and Vietnam) or a main source of narcotics (like Colombia). Or they may just be corrupt; corruption is far more pervasive than people appreciate and it is by no means limited to the developing world, as investigations in the US and elsewhere have recently shown. As we noted in our 2016 paper, however, and emphasise again in this year's edition, there is an international community of people- observers, experts, private sector executives and government offcial- who have identified the many ways in which illicit trade, in all it various forms, can be combatted. The solutions they propose range from the quotidian to the more extreme. Few, if any, are unrealistic. What the index, this paper and all the other papers published alongside it as part of the larger project, proposes is that economies that are laggards on the issue can start small and build towards a better environment for preventing illicit trade. And the economies that are leaders should lead.

Details: London: Author, 2018. 44p.

Source: Internet Resource: Accessed June 24, 2019 at: https://www.tracit.org/uploads/1/0/2/2/102238034/eiu_global_illicit_trade_whitepaper_final.pdf

Year: 2018

Country: International

Keywords: Economic Crimes

Shelf Number: 156605


Author: Walker, Summer

Title: Fragmented But Far-Reaching: The UN System's mandate and response to organized crime

Summary: From peace operations to how to better manage forests and food supply chains, the United Nations (UN) is engaged in the fight against organized crime and efforts to mitigate its impact within the ambit of the UN's wider goals: peace and security, human rights and sustainable development. Mandates relating to key crime types are often allocated to one or more agencies or departments across the UN System, but, as always, mandates evolve, and information about these mandates and the relevant programmes and activities carried out by agencies can be fragmented, scattered and duplicatory. For some emerging or resurging forms of crime, mandates allocated decades ago have required a far more comprehensive set of responses in their contemporary forms. To better understand the UN's overall mandate for addressing organized crime, the Global Initiative conducted a desk review of the UN's entities and agencies to identify their mandates and working agendas for organized crime, specifically in relation to the UN's work on six crime types that have had major impacts on broader UN goals, including the UN Sustainable Development Goals (SDGs). This paper is a companion piece to an interactive online tool, which displays the organized-crime agendas within the UN System. The tool's purpose is to provide a better understanding of the UN's counter-crime work and serve as a basis for discussion about how organized crime challenges, which are now far-reaching and serious, could be more effectively met and how UN System resources can be used more coherently. The mandate for addressing organized crime extends across the UN System in a way that is expansive, exhaustive and certainly under-appreciated. A review by the Global Initiative has identified a working agenda for 79 out of the UN's 102 entities, bodies and agencies, or nearly 77 per cent. The research (see Figure 1) found that 37 per cent of these entities address human trafficking, and 33 per cent work on illicit drugs. Environmental crime was third, with 28 per cent of entities addressing related issues. Cybercrime and financial crime both saw 22 out of the 102 entities addressing the issue (21 per cent), and arms trafficking is worked on by 21 entities, yet this understanding of arms trafficking does not include illicit chemical and nuclear material trafficking. This paper examines the implications this has for the UN System given such a widely dispersed mandate. Organized crime is a cross-cutting threat to the goals of many different sectors, in all three core areas of the UN's work: peace and security, human rights and development. Previous analysis conducted by the Global Initiative found that organized crime affects a high proportion of the SDGs. An additional Global Initiative review of UN Security Council (UNSC) resolutions in 2018 found that 22 of the 54 resolutions (40 per cent) referred to a form of organized crime, showing a significant recognition of the problem on the international security agenda. Given the diverse nature of organized-crime threats, it is possible to argue that perhaps it is only right that the requirement to respond to organized crime is distributed across the UN System so widely. But without a coherent strategy underpinning this wide mandate, responses to organized crime across the system can be fragmented, and opportunities to achieve synergies and learn lessons from responses are not maximized, or perhaps not realized at all. Organized crime is a challenge that rises and falls on the global policy priority list. The diversity of illicit markets and the fact the harm caused by organized crime tends to be more corrosive in nature than sensational mean that it is often overlooked or downgraded on the priority list. However, over the past two decades, there have been certain points when the threat of a specific form of organized crime became so compelling that it demanded an urgent response from the international community and the UN System. These flashpoints in the debate - for example, during the piracy crisis in the Gulf of Aden in 2011/12 (see page 3), or the demand for a response to human smuggling and trafficking in 2016/17 - have regrettably shone a light on the UN System's shortcomings rather than draw attention to the efficacy of the world's global governance mechanism to respond to shared, transnational threats that require collective response. Many efforts have been made to create better UN System coherence, but with the global scale and impact of organized crime on the rise, the need to recognize its corrosive impact on major UN objectives should be an imperative for the following reasons: - Organized crime is a leading cause of violence and homicide globally. - Criminal interests and corruption in natural-resource sectors are leading drivers of deforestation and unsustainable natural-resource extraction. - Organized crime has a destructive impact on governance, anti-corruption, economic development and trade, and environmental protection efforts. - Serious rights violations to individuals are caused by organized crime, such as the interlinking phenomena of modern slavery, forced labour, human trafficking and aggravated smuggling. It is very clear when looking at the spread of activity across the system that the issue is not solely a law-enforcement problem. Threats posed by criminal groups are wide-ranging: they impact good governance, breed corruption and weaken development agendas. A holistic view of the issues aligned with increased coherence would help shrink the learning curve on the pervasive impact of organized crime on international security, development and human rights.

Details: Geneva: Global Initiative Against Transnational Organized Crime, 2019. 28p.

Source: Internet Resource: Accessed June 24, 2019 at: https://globalinitiative.net/wp-content/uploads/2019/06/gitoc_un_june_19.pdf

Year: 2019

Country: International

Keywords: Arms Trafficking

Shelf Number: 156607


Author: Davey, Jacob

Title: The Fringe Insurgency: Connectivity, Convergence and Mainstreaming of the Extreme Right

Summary: This report maps the ecosystem of the burgeoning 'new' extreme right across Europe and the US, which is characterised by its international outlook, technological sophistication, and overtures to groups outside of the traditional recruitment pool for the extreme-right. This movement is marked by its opportunistic pragmatism, seeing movements which hold seemingly contradictory ideologies share a bed for the sake of achieving common goals. It examines points of connectivity and collaboration between disparate groups and assesses the interplay between different extreme-right movements, key influencers and subcultures both online and offline. movements, key influencers and subcultures both online and offline.

Details: London: Institute for Strategic Dialogue (ISD), 2017. 36p.

Source: Internet Resource: Accessed June 25, 2019 at: https://www.isdglobal.org/wp-content/uploads/2017/10/The-Fringe-Insurgency-221017.pdf

Year: 2017

Country: International

Keywords: Extreme Right

Shelf Number: 156628


Author: World Bank

Title: Confronting Illicit Tobacco Trade: A Global Review of Country Experiences

Summary: Illicit trade in tobacco products undermines global tobacco prevention and control interventions, particularly with respect to tobacco tax policy. Additionally, tobacco illicit trade often depends on and can contribute to weakened governance. Confronting Tobacco Illicit Trade: A Global Review of Country Experiences, prepared in collaboration with a multisectoral team across different institutions, demonstrates that reducing illicit trade in tobacco products is critical whether viewed from the perspective of public health, public finance, governance, or equity. This publication presents country and regional case studies, covering over 30 countries, and provides practical input regarding how to address tobacco illicit trade. It also summarizes the good practices and recommendations that emerge from the country cases and draws on guidance from the WHO Framework Convention on Tobacco Control's (FCTC) Protocol to Eliminate Illicit Trade in Tobacco Products, as well as from the European Union (EU), and the International Monetary Fund (IMF). Key messages from this report include the following: - Tobacco taxes play only a minor role in illicit trade. - To reduce illicit trade in tobacco products, it is both crucial and feasible for all countries to strengthen tax administration and enforcement. - The strengthening of tax administration and tobacco tax reform should be viewed as mutually complementary. This report demonstrates the importance - and feasibility - of addressing illicit trade in tobacco products as an integral part of tobacco tax reform and comprehensive tobacco control.

Details: Washington, DC: World Bank Group, 2019. 706p.

Source: Internet Resource: Accessed June 25, 2019 at: http://documents.worldbank.org/curated/en/677451548260528135/Confronting-Illicit-Tobacco-Trade-a-Global-Review-of-Country-Experiences

Year: 2019

Country: International

Keywords: Cigarettes

Shelf Number: 156631


Author: Asongu, Simplice

Title: Terrorism and Social Media: Global Evidence

Summary: The study assesses the relationship between terrorism and social media from a cross section of 148 countries with data for the year 2012. The empirical evidence is based on Ordinary Least Squares, Negative Binomial and Quantile regressions. The main finding is that there is a positive relationship between social media in terms of Facebook penetration and terrorism. The positive relationship is driven by below-median quantiles of terrorism. In other words, countries in which existing levels of terrorism are low are more significantly associated with a positive Facebook-terrorism nexus. The established positive relationship is confirmed from other externalities of terrorism: terrorism fatalities, terrorism incidents, terrorism injuries and terrorism-related property damages. The terrorism externalities are constituents of the composite dependent variable.

Details: Yaounde, Cameroon; African Governance and Development Institute, 2019. 29p.

Source: Internet Resource: AGDI Working Paper no. 19/026: Accessed June 26, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3393855

Year: 2019

Country: International

Keywords: Social Media

Shelf Number: 156697


Author: Global Network of Sex Work Projects

Title: The Homophobia and Transphobia Experienced by LGBT Sex Workers

Summary: Introduction: Lesbian, gay, bisexual and transgender (LGBT) people experience targeted homophobia and transphobia at every level - including legal, political and social. For sex workers who are LGBT, discrimination on the grounds of sexual orientation and gender identity adds to and intensifies the discrimination they experience as sex workers, who are subjected to a distinct set of violations. The dual identities of LGBT sex workers therefore have the potential to further marginalise individuals and render them more vulnerable to increased levels of violence, human rights' abuses, and decreased access to services and justice. This Briefing Paper documents the stigma and discrimination experienced by LGBT sex workers and highlights differences in their experiences when compared with other members of their respective communities. Recommendations for addressing the double stigma and discrimination experienced by those at the intersection of the sex work and LGBT communities follow. This paper is a collaborative effort between MPact Global Action for Gay Men's Health and Rights (formerly MSMGF) and the Global Network of Sex Work Projects (NSWP).

Details: Edinburgh, Scotland: Global Network of Sex Work Projects, 2017. 18p.

Source: Internet Resource: Accessed June 27, 2019 at: https://www.nswp.org/sites/nswp.org/files/bp_homophobia_transphobia_mpact_nswp_-_2018.pdf

Year: 2017

Country: International

Keywords: Bisexual

Shelf Number: 156568


Author: Petrie, Elizabeth M.

Title: Piloting the Exchange of Insider Threat Reports: Information Sharing Challenges to Proactive Cyber Fraud Identification

Summary: Research published by the SWIFT Institute in August 2017, titled "Sharing Insider Threat Indicators: Examining the Potential Use of SWIFT's Messaging Platform to Combat Cyber Fraud" proposed a protocol for sharing insider threat activities between financial institutions. Building from the assumption that cyber criminals work off a shared services model to give them access to infrastructure, tools, targets and options for monetizing their exploits, the research asserted the strengthening of communication channels for defenders to share real time threat information is essential to pre-empting cyber fraud. A pilot to test this information sharing protocol through the development of an Insider Threat Report (ITR) message type was initiated in late September 2017. The pilot ran for 12 months during which time participants from financial and investment services firms worked together to validate a set of insider threat indicators based on actual use cases from internal investigations and customized the ITR fields for transmitting the information over the SWIFT messaging platform. The pilot concluded with a number of findings on key challenges to this level of information sharing that, until resolved, will prevent member organizations from formalizing their engagement on this effort.

Details: London: Swift Institute, 2019. 28p.

Source: Internet Resource: Accessed June 27, 2019 at: https://swiftinstitute.org/wp-content/uploads/2019/05/SIWP_2017-002_ITR_Pilot_FINALv3.pdf

Year: 2019

Country: International

Keywords: Cyber Fraud

Shelf Number: 156574


Author: Carter, William A.

Title: Forces Sharing the Cyber Threat Landscape for Financial Institutions

Summary: Protecting financial networks not only requires financial institutions to improve the security of their own systems, but to change the security balance of the entire internet environment. Cyber threats to financial institutions increasingly come from insecure low-cost mobile and IoT devices outside their own networks. This requires new approaches to defense, including developing new authentication and monitoring technologies for bank networks, and supporting the development of security solutions for these new devices outside the banks' own networks. Improving cybercrime education and awareness for new internet users in the developing world and supporting efforts to build law enforcement capacity to combat cybercrime around the world is also critical. Many financial institutions recognize the growing risks of cybercrime and are investing in their cyber defenses, but as changes in the attack surface, attacker incentives, and defenses evolve, so will the threats. Understanding the forces that shape the threat landscape is essential for financial institutions to get ahead and stay ahead of their adversaries in cyberspace.

Details: London: Forces Shaping the Cyber Threat Landscape for Financial Institutions, 2017. 31p.

Source: Internet Resource: Accessed June 27, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3047730

Year: 2017

Country: International

Keywords: Cyber Attack

Shelf Number: 156575


Author: Ferdinand, Jason

Title: The Cyber Security Ecosystem: Defining a Taxonomy of Existing, Emerging and Future Cyber Threats

Summary: This report presents a new Cyber Threat Taxonomy, Cyber Attack Taxonomy and Knowledge-based Cyber Resilience Framework. The research shows that despite high-profile cases in the media and the push from government agencies and industry groups, the importance of understanding cyber threats and the associated risks are still not widely known (or at least not widely communicated within organisations). Adopting these models across industries would enhance our understanding of cyber security and enable organisations to improve communication, coordination, governance and recovery when managing cyber security. These taxonomies are built upon the result of a systematic literature review and empirical research, which provides an overview of the cyber security ecosystem. They incorporate the most up-to-date understanding of 'cyber harm' as an attempt to facilitate a more incisive understanding of Value at Risk in Cyberspace (VaRiC).

Details: London: Swift Institute, 2017. 39p.

Source: Internet Resource: Accessed June 27, 2019 at: https://swiftinstitute.org/wp-content/uploads/2017/10/SIWP-2016-002_Cyber-Taxonomy_-Ferdinand-Benham-_vfinal2.pdf

Year: 2017

Country: International

Keywords: Cyber Security

Shelf Number: 156576


Author: Gordon, Sara

Title: About a Revolution: Toward Integrated Treatment in Drug and Mental Health Courts

Summary: This Article examines specialty courts, including drug, alcohol, and mental health courts, which proponents claim created a revolution in criminal justice. Defendants whose underlying crime is the result of a substance use disorder or a mental health disorder can choose to be diverted into a specialty court, where they receive treatment instead of punishment. Many of these individuals, however, do not just suffer from a substance use disorder or a mental health disorder; instead, many have a "co-occurring disorder." Approximately 8.9 million American adults have co-occurring mental health and substance use disorders, and almost half of individuals who meet diagnostic criteria for one disorder will also meet criteria for the other. Moreover, an extensive body of literature has shown that treatment for cooccurring disorders should be integrated and that individuals should receive appropriate mental health and substance abuse treatment from a single clinician or clinical team. This Article argues that the segregation of drug, alcohol, and mental health courts is out of step with our current understanding of the high rates of co-occurring disorders, and often fails to provide integrated treatment for the multiple disorders a single specialty-court participant might present. Moreover, by segregating specialty courts, we are further stigmatizing addiction and failing to acknowledge that drug and alcohol use disorders are some of the many types of mental illnesses recognized by the medical community. Drug, alcohol, and mental health courts should therefore move away from their traditional siloed approach to the selection and treatment of participants and instead provide individuals with comprehensive and integrated treatment for co-occurring substance use and mental health disorders.

Details: Las Vegas, Nevada: University of Las Vegas, William S. Boyd School of Law, 2019. 41p.

Source: Internet Resource: Accessed June 27, 2019 at: https://scholarship.law.unc.edu/cgi/viewcontent.cgi?article=6708&context=nclr

Year: 2019

Country: International

Keywords: Alcohol Courts

Shelf Number: 156577


Author: Stoffel, Florian

Title: Polimaps: Supporting Predictive Policing with Visual Analytics

Summary: Recently, predictive policing has gained a lot of attention, as the benefits, e.g., better crime prevention or an optimized resource planning are essential goals for law enforcement agencies. Commercial predictive policing systems commonly visualize predictions on maps but provide only little support for human analysts in the technical and methodological processes that constitute corresponding implementations. In this paper, we report on a project of bringing visual analytics to the field of predictive policing. We introduce a process model that includes machine learning as well as visualization and has been developed together with experts from a law enforcement agency. We also showcase a visual analytics tool, called polimaps, that is part of a real-world predictive policing project and implements elements of the proposed process.

Details: S.L., 2018. 5p.

Source: Internet Resource: Accessed June 27, 2019 at: https://pdfs.semanticscholar.org/3f83/419a51d6a742b0860f6045f8b0b2bcba2d8d.pdf?_ga=2.79246674.775410926.1561645908-462006081.1559056280

Year: 2018

Country: International

Keywords: Crime Mapping

Shelf Number: 156579


Author: Perry, Jonathan

Title: Developing Legislative Principles for E-Waste Policy in Developing and Emerging Countries

Summary: Governments around the world are developing e-waste policies and legislation to deal with the growth of end-of-life electrical and electronic products. The creation of policies and legislation is often based on experiences from post-industrialised countries, while not always taking into account the unique and specific challenges of industrialising countries or economies in transition. The aim of this paper is to present core legal principles based on Extended Producer Responsibility (EPR) that can be reviewed, contextualised, and adapted by decision makers in countries that are developing legislation that will implement Extended Producer Responsibility programmes into the local context and in order to avoid a 'copy-paste' approach from post-industrialised to industrialising country legislation, except in critical areas such as 'definitions'. In establishing a clear legal framework for e-waste collection and recycling, the following building block principles should be included: 1. Objectives - typically the legislative objectives should focus on the protection of the environment and human health, through sustainable management of e-waste along with any other specific goals or targets. 2. Definitions - clear definitions are necessary to ensure all stakeholders understand concepts as simple as what is e-waste, a producer, or a collector. 3. Roles and Responsibilities - determining what roles the stakeholders play in the e-waste take-back system is essential for all stakeholders to work together effectively. 4. System design - introducing producer responsibility systems is essential to ensure that both fractions with negative and positive value are collected and treated appropriately. 5. Enforcement - clear provisions for enforcement must ensure all stakeholders meet the requirements of the legislation. Having the best e-waste legislation in the world means nothing if it is not effectively enforced. 6. Social dimensions - Impacts and opportunities for stakeholders and the general public should be considered and, where appropriate, measures taken. 7. International alignment - aligning the legislation with internationally recognised conventions, such as the Basel Convention, and internationally recognised recycling standards will avoid complications. 8. Transparency - the more transparent the system is to all stakeholders and the public the less prone it will be to issues such as the misuse of funds or misreporting of data.

Details: Bonn, Germany: United Nations Step Initiative, 2018. 24p.

Source: Internet Resource: Accessed June 27, 2019 at: http://www.step-initiative.org/files/_documents/whitepapers/Step_White_Paper_7_180221_low_compressed.pdf

Year: 2018

Country: International

Keywords: E-Waste

Shelf Number: 156717


Author: Kramer, Franklin D.

Title: Cybersecurity: Changing the Model

Summary: There is a cybersecurity gap. Despite all efforts, adversarial cyberattacks are outrunning defender security improvements in technology, processes and education. Accordingly, this report recommends a change to new models of cybersecurity that will deliver significantly better results for the key arenas of: critical infrastructures; states, cities, and localities; the federal government; and the international sphere. Crucially, the federal government would enhance its active involvement, expanding support for "coordinated partnerships" in those key arenas, and Congress would provide additional resources and authorities requisite to the task. The private sector would likewise play a key role engaging and supporting coordinated partnerships, including in the development of advanced technologies and the use of critical capabilities such as cloud technologies, automation, and artificial intelligence. The important outcomes would result from coordinated actions, sustained and focused funding, and development and implementation of advanced technologies. -For the key critical infrastructures of energy, finance, transportation, telecommunications, and water treatment, this report recommends the establishment of an enhanced public-private model, with the federal government and key enterprises organizing coordinated, advanced protection and resilience, intelligence sharing, and active defense. The government should provide annual budgetary support and financing for costs incurred, and should utilize its capabilities to "defend forward...to stop threats before they reach their targets." -For states, cities, and localities, this report recommends moving from a largely decentralized and under-resourced approach to a full-fledged, state-centric cybersecurity expert center, to coordinate state-level cyber efforts including: law enforcement and the National Guard; provision of cybersecurity by the state as a service to cities and localities; and establishment of structures and procedures for the federal government to provide states with annual cybersecurity budgetary resources to increase education, training, and exercises, and to undertake "attack protection" through active defense and a "defend forward" approach. -For the federal government, this report recommends the establishment of a National Cybersecurity Fusion Center featuring: intelligence and operational capabilities; increased support to critical infrastructures and state, city, and locality entities, including establishment of a federal cybersecurity budget for these enterprises; expanded use of active defense and "defend forward"; an increased focus on the Department of Defense (DoD) overcoming vulnerabilities and enhancing cybersecurity resilience, including providing a standard "resilience architecture" for contractors and subcontractors; and significant additions of cybersecurity personnel and budgetary funding to the Department of Homeland Security (DHS) and the Department of Defense. -For international activities, this report recommends organizing around likeminded countries and organizations, including through: the establishment of an International Cyber Stability Board; provision of protection and resilience to key cross-border critical infrastructures, including finance and transportation; undertaking a multinational campaign response to malignant cyber actions by significant nation-state and criminal threats; and enhancing capabilities to defend against armed attack, including with allies and close partners. Congress will have a critical role in achieving these objectives. Legislation will be required for -establishing a National Cybersecurity Fusion Center that will coordinate intelligence and operational actions focused on cybersecurity resilience in the United States, to include timely technology insertion, streamlined processes and continuous learning; -providing requisite authorities for federal support to cybersecurity for key critical infrastructures, and to states, cities, and localities; -creating an annual federal budget line to support cybersecurity for states, cities, localities, and key critical infrastructures; -establishing a federal budget line item to support cybersecurity for the federal government, and increasing the number of cybersecurity personnel at the Department of Homeland Security, pursuant to a programmatic plan presented to the Congress; -increasing the focus on and expanding resources - including the number of cybersecurity personnel - to significantly upgrade the cyber resilience of the Department of Defense, including its contractors and subcontractors, pursuant to a programmatic plan presented to the Congress; -establishing and regulating "certified active defenders," private-sector entities that will operate in conjunction with, and under the direction and control of, the government to enhance cybersecurity resilience; and -internationally, authorizing enhanced cybersecurity support to NATO and other treaty allies, as well as the establishment of an International Cyber.

Details: Zurich, Switzerland: Atlantic Council, 2019. 28p.

Source: Internet Resource: Accessed June 27, 2019 at: https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/resources/docs/AtlanticCouncil-Cybersecurity-Changing_the_Model.pdf

Year: 2019

Country: International

Keywords: Cybercrime

Shelf Number: 156594


Author: Islam, Rubayat

Title: Automatic Prevention Model for Vehicle Fuel Theft

Summary: The discovery of automobile vehicles is the blessing to human being from engineering and science. The uses of automobile are increasing day-by-day as a transport vehicle. The majority of the transport vehicles are powered by traditional petroleum fuel such as gasoline, octane, diesel etc. The price of these transport fuels are also increasing worldwide and the high oil price becomes a factor of concern for civilization. From this point of view, advanced security system should be ensured for the fuel safety. The objective of this article is to describe the automatic prevention of fuel theft. An experimental study has been made by using ultrasonic sensor to measure the fuel flow rate by measuring the distance of fuel level with respect to time. When the fuel flow rate or fuel consumption rate becomes more than usual rate or fuel level falls drastically then the sensor is activated and sends a signal. After receiving the signal the GSM module sends a message to a specific number instantly by indicating that something is unusual so that one can immediately go into inspection. It has been found that it is a very low cost technology and it can also be implemented not only for vehicles but also in those sectors where liquid petroleum fuels are used such as power plant industries.

Details: Dhaka, Bangladesh: Bangladesh University of Engineering and Technology, 2014. 6p.

Source: Internet Resource: Accessed June 27, 2019 at: https://www.researchgate.net/publication/271055840_Automatic_prevention_model_for_vehicle_fuel_theft

Year: 2014

Country: International

Keywords: Crime Prevention

Shelf Number: 156595


Author: Halleux, Vivienne

Title: Single-Use Plastics and Fishing Gear

Summary: Most of the plastic in our oceans originates from land-based sources. On European beaches, plastics make up 80-85% of marine litter, which is considered a major threat to marine and coastal biodiversity. Marine litter also costs the European Union economy an estimated 259 million euros to 695 million euros per year. In May 2018, the European Commission put forward a legislative proposal seeking to address the issue of marine litter from plastics. The proposal would introduce a series of measures regarding the top 10 single-use plastics found on European beaches, as well as fishing gear, with a view to reducing their impact on the environment and ensuring a functional internal market. After completion of the legislative procedure, the final act was signed by the presidents of the co-legislators (European Parliament and Council) on 5 June 2019, and published in the Official Journal of the European Union on 12 June 2019. Member States have two years (i.e. until 3 July 2021) to transpose the new directive into national law. Fourth edition of a briefing originally drafted by Didier Bourguignon.

Details: Brussels, Belgium: European Parliamentary Research Service, 2019. 12p.

Source: Internet Resource: Accessed June 27, 2019 at: http://www.europarl.europa.eu/RegData/etudes/BRIE/2018/625115/EPRS_BRI%282018%29625115_EN.pdf

Year: 2019

Country: International

Keywords: Environmental Crime

Shelf Number: 156722


Author: Petrie, Elizabeth M.

Title: Sharing Insider Threat Indicators: Examining the Potential Use of Swift's Messaging Platform to Combat Cyber Fraud

Summary: Cyber actors are operating under a shared services model giving them access to infrastructure, tools, targets and the ability to monetise their exploits. As a result, organisations across industries must enhance communication channels to share threat information in order to pre-empt cyber fraud schemes. This requires both an ability to identify the patterns of behaviour that indicate cyber fraud activity is occurring and a platform for communicating potential threat information. The report "Sharing Insider Threat Indicators: Leveraging SWIFT's Messaging Platform to Combat Cyber Fraud" focuses on identifying the patterns of behaviour typically indicative of efforts by criminals to use insiders to cash out on fraudulent activity. The objective of this research is to explore the potential for organisations to use an existing telecommunication platform, such as SWIFT, to communicate cyber fraud threat information by establishing indicators of cashout behaviour, which could warn of cyber fraud activity.

Details: London: Swift Institute, 2017. 33p.

Source: Internet Resource: Accessed June 27, 2019 at: https://swiftinstitute.org/wp-content/uploads/2017/10/SIWP_2016-003_Insider_Cashout_Citi_American_University_final.pdf

Year: 2017

Country: International

Keywords: Cyber Fraud

Shelf Number: 156723


Author: Centre for Non-Traditional Security Studies

Title: Collective Response to the Challenge of Marine Plastic Pollution

Summary: Reducing plastic pollution in the oceans will be on the agenda of the G20 Summit in Osaka, Japan on 28 and 29 June. Attention to the challenge from the leaders of the world's major economies is timely and imperative because non-traditional security threats induced by plastic pollution like degradation of the marine ecosystem and contamination of the food chain are increasingly imminent. A crisis of plastic waste is unfolding in many parts of the world now. The Philippines recently shipped scores of containers of waste back to Canada. Malaysia is to send back thousands of tons of waste from around the world like Australia. Against this background, the Basel Convention was amended in May 2019, which requires more transparency and regulation in the global trade in plastic waste. Several East/Southeast Asian countries, like the Philippines, Indonesia, Malaysia, China and Japan, are important stakeholders for dealing with this challenge, as they are both major contributors to and victims of marine plastic pollution. They have strengthened efforts at the national level, like developing national action plans, specifying targets for reduction, and implementing new policies and regulations. Japan, for instance, adopted a new policy in May 2019 that aims to cut its flow of plastic waste into the ocean and to contribute to the global efforts as well. The aforementioned waste disputes have highlighted the loopholes in the existing cycle of reuse, reduce and recycle in many countries and the importance of a collaborative approach. Given that marine environmental pollution is borderless and developing countries in particular face mounting pressure for coping with plastic waste from domestic as well as foreign sources, international cooperation is crucial for an effective global solution to the problem. Japan's new policy package includes provision of technical and financial assistance for developing countries to tackle the challenge. This may indicate further support for Japan's existing cooperation with developing countries, like funding the proposed Knowledge Centre on ASEAN Marine Debris in Indonesia. The Asian Development Bank signed an agreement with Indonesia on collaboration in reducing marine plastic debris in early May, which includes technical assistance and knowledge sharing. International cooperation as such can enable better management of plastic waste in developing countries through supporting policy formulation and implementation, encouraging engagement of private sector and other social actors, and bridging partnerships between stakeholders. Given that marine plastic pollution will be discussed at the forthcoming G20 Summit, it is important that the needs and challenges of developing countries are given sufficient consideration in the discussion. Since Japan is the host and Indonesia, Singapore and China will attend the summit, East/Southeast Asian countries may take the opportunity to feature their perspectives in the global debate. Collaboration in financing and technological innovations should be emphasised as these two aspects are essential for better waste management and reduction in pollution in developing countries.

Details: Singapore: S. Rajartnam School of International Studies, NTS (National Non-Traditional Security Studies) Bulletin, 2019. 6p.

Source: Internet Resource: Accessed June 27, 2019 at: https://www.rsis.edu.sg/wp-content/uploads/2019/06/NTS-Bulletin-June-2019.pdf

Year: 2019

Country: International

Keywords: Environmental Crime

Shelf Number: 156580


Author: Child, Early and Forced Marriage and Sexuality Programs Working Group

Title: Tackling the Taboo: Sexuality and gender-transformative programmes to end child, early and forced marriage and unions

Summary: In response to the limited discussion of sexuality in the global discourse on child, early and forced marriage and unions (CEFMU), 41 local, national and global program implementers, government representatives, philanthropic foundations, researchers and policy advocates in the field of adolescent development and sexuality gathered in New York in March 2016 to discuss the control of adolescent girls' sexuality in the context of CEFMU. The two-day meeting was hosted by the American Jewish World Service, CARE USA, the International Women's Health Coalition and GreeneWorks. One of the objectives of this meeting was to develop recommendations for addressing sexuality within the context of CEFMU, including to fill programmatic, research and advocacy gaps. Coming out of this meeting, the CEFMU and Sexuality Programs Working Group was formed. The working group commissioned a review to identify gender-transformative programmes that promote bodily integrity and girls' rights and development and result in normative change that helps end CEFMU. The findings are captured in this report, which also showcases in detail, through case studies, some of the ground-breaking, gender-transformative work on sexuality carried out by three organisations: Trust for Indigenous Culture and Health (TICAH) in Kenya, International Centre for Reproductive Health and Sexual Rights (INCRESE) in Nigeria and The YP Foundation in India (see case studies, pages 29-31). We would like to thank all the organisations that shared their time, expertise and information with us. Without their generosity and important work, this report would not have been possible. This project was supported by the Kendeda Fund, the Ministry of Foreign Affairs of the Netherlands through the Prevention programme, the Swedish International Development Agency (SIDA) and other generous donors.

Details: Washington, DC: Author, 2019. 40p.

Source: Internet Resource: Accessed June 28, 2019 at: https://www.girlsnotbrides.org/wp-content/uploads/2019/05/Tackling-the-Taboo_-Full_English.pdf

Year: 2019

Country: International

Keywords: Child Marriage

Shelf Number: 156729


Author: Global Commission on Drug Policy

Title: Classification of Drugs: when science was left behind,

Summary: In Classification of Drugs: when science was left behind, the Global Commission on Drug Policy explains how the biased historical classification of psychoactive substances has contributed to the "world drug problem". It is the first-ever comprehensive report providing a political reading of the current evaluation and classification, or "scheduling" of drugs according to their harms. Psychoactive substances should be classified with regard to their potential for dependence and other harms. This is not the case today, where some substances are legally available because they are considered beneficial (medicines) or culturally important (alcohol), while others are seen as destructive, and are strictly prohibited. The classification of drugs is at the core of the international drug control system. As such, governments must ensure that such a classification is pragmatic and based on science and evidence, makes clear the benefits and harms of drugs, and allows for responsible legal regulatory models to control drugs.

Details: Geneva: Author, 2019. 55p.

Source: Internet Resource: Accessed June 28, 2019 at: http://www.globalcommissionondrugs.org/reports/classification-psychoactive-substances?mc_cid=bfe5537532&mc_eid=778a383071

Year: 2019

Country: International

Keywords: Drug Classification

Shelf Number: 156733


Author: Bate, Roger

Title: Smoking Out Illicit Trade: How Some Policies Intended to Limit Smoking Drive Illegal Trade

Summary: The World Health Organization (WHO) states that smoking cigarettes is the largest cause of preventable premature death globally. The WHO Framework Convention on Tobacco Control (FCTC) entered into force in 2005 with an aim to lower the death toll. FCTC has adopted a policy of encouraging developing nations to follow the demand reduction strategy of mature markets in raising taxes and introducing and then expanding regulation on tobacco products. In many cases such policies result in the rise of illicit tobacco (either counterfeits or legally produced smuggled cigarettes), especially where policy changes are implemented rapidly and enforcement capacity is limited. According to KPMG, illicit tobacco makes up roughly 10 percent of the global cigarette market, and the figure is rising. This paper reports on a novel empirical assessment of smoker opinion and availability of illicit whites (smuggled legally produced cigarettes), which shows a sizeable minority of smokers bought illicit whites in most cases because they are far cheaper. It is also established (across 10 cities) that illicit whites are easily available in most markets, even in the wealthy markets of London and Singapore. Low education levels are correlated with widespread illicit white availability.

Details: Washington, DC: American Enterprise Institute, 2016. 22p.

Source: Internet Resource: Accessed June 28, 2019 at: https://www.aei.org/wp-content/uploads/2016/09/Smoking-out-illicit-trade.pdf

Year: 2016

Country: International

Keywords: Illegal Cigarettes

Shelf Number: 156739


Author: International Organization for Migration (IOM)

Title: Fatal Journeys Volume 4: Missing Migrant Children

Summary: Fatal Journeys Volume 4 focuses on a special theme - missing migrant children - given the growing number of children embarking on journeys that are dangerous and often fatal. Since 2014, IOM has documented more than 32,000 deaths and disappearances during the migration journey worldwide, although the true number of migrant fatalities is unknown, as many deaths go unrecorded. Data on deaths and disappearances of missing migrant children tend to be even more limited. According to IOM's Missing Migrants Project, nearly 1,600 children have been reported dead or missing since 2014. This report discusses why it is often difficult to find data on missing migrants disaggregated by age. It explores what measures could be taken to improve data on missing migrant children, to help improve policy options and to prevent these tragedies from occurring. The report is a contribution to the joint efforts of UNICEF, UNHCR, IOM, Eurostat and OECD to improve data on migrant and refugee children. Without better data on missing migrants, any policy understanding of children's migration journeys and the risks and vulnerabilities they face will remain incomplete.

Details: Geneva, Switzerland: International Organization for Migration, 2019. 140p.

Source: Internet Resource: Accessed June 28, 2019 at: https://publications.iom.int/system/files/pdf/fatal_journeys_4.pdf

Year: 2019

Country: International

Keywords: Detained Children

Shelf Number: 156740


Author: Scarpa, Silvia

Title: Child Trafficking: the Worst Face of the World

Summary: The purpose of this article is to offer an overview on child trafficking; it briefly analyses the global phenomenon of trafficking in human beings and focuses on the major regional trends in child trafficking and the international response to this phenomenon. As regards the latter, an overview of international treaty law, soft law instruments and special mechanisms will underline the positive aspects of, as well as existing gaps in, the protection of child victims of human trafficking.The issue of trafficking in persons, and particularly in children, can be investigated from various points of view; trafficking is a criminal, a moral, a migration, a human rights, a public order, a labour and a gender issue. However, for the scope of this study it will only be analysed from a human rights perspective.

Details: Geneva: Global Commission on International Migration, 2005. 34p.

Source: Internet Resource: GLOBAL MIGRATION PERSPECTIVES No. 40: Accessed July 2, 2019 at: http://lastradainternational.org/lsidocs/484%20Working%20Paper-Child%20THB-SSUP2005.pdf

Year: 2005

Country: International

Keywords: Child Labor

Shelf Number: 105468


Author: Lindquist, Matthew J.

Title: Crime and Networks: 10 Policy Lessons

Summary: In this article, we argue that social network analysis can be used in a meaningful way to help us understand more about the root causes of delinquent behavior and crime and also to provide practical guidance for the design of crime prevention policies.

Details: London: Centre for Economic Policy Research, 2019. 43p.

Source: Internet Resource: Accessed July 5, 2019 at: https://cepr.org/active/publications/discussion_papers/dp.php?dpno=13823#

Year: 2019

Country: International

Keywords: Co-offending (Sweden)

Shelf Number: 156835


Author: Aguirre, Katherine

Title: Future Crime: Assessing twenty first century crime prediction

Summary: Cities are where the future happens first. They are hubs of innovation, productivity and experimentation. But many cities also are sites of crime and violence. More than ever, municipal authorities, private firms and civic groups are experimenting with new ways to improve real and perceived safety in cities. In some cities, new technologies are improving the situational awareness of public authorities and citizens. In others, all encompassing surveillance and monitoring systems are challenging fundamental norms of privacy. In most developed cities, high-frequency time series information on insecurity is increasingly available. Literally thousands of gigabytes of raw data are available representing the dynamics and characteristics of crime. New high-power computer analysis is giving rise to a next generation of smart, agile and evidence-informed policing strategies. Predictive platforms in particular can enhance police operations, identifying priority targets for police intervention, and enabling more effective allocation of police resources.

Details: Rio de Janeiro: Igarape Institute, 2019. 23p.

Source: Internet Resource: Strategic note 33: Accessed July 5, 2019 at: https://igarape.org.br/wp-content/uploads/2019/07/2019-07-03-NE_33_Future_Crime-V2.pdf

Year: 2019

Country: International

Keywords: Crime Analysis

Shelf Number: 156841


Author: Di Lemma, Lisa C.G.

Title: Responding to Adverse Childhood Experiences: An evidence review of interventions to prevent and address adversity across the life course

Summary: Adverse childhood experiences (ACEs) are stressful events during childhood that can have a profound impact on an individual's present and future health (Section 1.3). Growing up in the face of such adversities is recognised as an important public health concern in Wales and internationally (Welsh Government, 2017a; World Health Organization [WHO], 2014). Actions to prevent and mitigate ACEs and their associated harms are essential to improve population health for present and future generations (Bethell et al., 2017; Pachter et al., 2017). In Wales, many sectors are working to identify and respond to adversity in order to improve outcomes for those who have experienced ACEs. Whilst a number of evidence-based interventions target specific types of adversity (e.g. domestic violence), we know that ACEs are strongly correlated (e.g. individuals exposed to adversity are often exposed to more than one type; Hughes et al., 2017). Thus, complex adversity requires a response which extends across sectors including health, social care, policing, education, community and others, and across the life course from early childhood through to adulthood. To support innovation in addressing ACEs we have undertaken a review of evidence on common approaches to prevent ACEs and/or mitigate their negative impacts. Over 100 interventions were identified and collated across four common approaches: supporting parenting; building relationships and resilience; early identification of adversity; and, responding to trauma and specific ACEs (Chapter 3). Whilst the interventions vary in type, the review identified cross-cutting themes, which could be used to inform a whole system approach (spanning individual, family and community levels) to tackle ACEs across the life course, supporting the development of an ACE-informed approach (Chapter 4). The report concludes by highlighting current gaps in the evidence and suggests key areas for further work to tackle ACEs for our future generations (Chapter 5). The report is not an exhaustive systematic evidence review of the interventions for specific ACE types, nor does it advocate any specific intervention, rather it seeks to present a summary of the research evidence and information on common approaches across the prevention of ACEs and mitigation of their impact. We hope the report will be a useful resource for service planners, practitioners and commissioners to support innovation and development towards an ACE-free future.

Details: Cardiff: Public Health Wales; Wrexham, UK: Bangor University, 2019. 44p.

Source: Internet Resource: Accessed July 5, 2019 at: https://www.bangor.ac.uk/news/documents/RespondingToACEs-PHW2019-english.pdf

Year: 2019

Country: International

Keywords: At-Risk Youth

Shelf Number: 156842


Author: International Labour Office

Title: A global alliance against forced labour

Summary: This ground-breaking report is the most comprehensive account of contemporary forced labour to date. It provides the first global and regional estimates by an international organization of forced labour in the world today, including the number of people affected and how many of them are victims of trafficking, as well as of the profits made by the criminals exploiting trafficked workers. Based on these data, the report sheds new light on the gravity of the problem of forced labour. A dynamic picture emerges of three major categories of forced labour: forced labour imposed by the State for economic, political or other purposes, forced labour linked to poverty and discrimination and forced labour that arises from migration and trafficking of workers across the world, often associated with globalization. The report provides clear evidence that the abolition of forced labour represents a challenge for virtually every country in the world – industrialized, transition and developing countries alike. It assesses experience at the national level in taking up this challenge, with particular emphasis on the importance of sound laws and policies and their rigorous enforcement, as well as effective prevention strategies. The report also reviews the actions against forced labour taken over the past four years by the ILO and its tripartite partners—governments, employers and workers. It calls for a new global alliance to relegate forced labour to history.

Details: Geneva: ILO, 2005. 95p.

Source: Internet Resource: Accessed July 16, 2019 at: https://www.ilo.org/wcmsp5/groups/public/---ed_norm/---declaration/documents/publication/wcms_081882.pdf

Year: 2005

Country: International

Keywords: Forced Labor

Shelf Number: 156856


Author: Khetriwal, Deepali Sinha

Title: Solving the E-Waste Problem: An Interdisciplinary Compilation of International E-Waste Research

Summary: This edited volume provides a forum for young scholars to present their research and contribute to the international debate of challenges and solutions for a global e-waste management. The book contains research that was presented at the NVMP-StEP E-waste Summer School Series 2009/2010. It is structured in five parts. The first part contains the chapter by Mary Lawhon and Djahane Salehabadi and is aimed towards explicitly considering e-waste in ways that build on social studies of waste, including the recognition of its co-constituted material properties and social construction. The authors outline social scientific research on social and material constructions and show how this way of thinking offers critical insights into the e-waste problem. The second part has two chapters that focus on the concept of environmental justice, which, as the United States Environmental Protection Agency defines it, is the fair treatment and meaningful involvement of all people regardless of race, colour, national origin or income in the development, implementation and enforcement of environmental laws, regulations and policies. Hiromi Inagaki analyses the distribution and structure of economic benefits and environmental health risks of e-waste recycling on a global and national level, drawing on a case study on computer waste flows to and from India. Somjita Laha highlights the way in which capitalism escapes environmental regulations through the informalization of environmentally unsound activities, exemplified in the case of e-waste. The availability of cheap labour and the absence of rigid environmental and health regulations - or the absence of implementing or compliance mechanisms - provide an incentive for exporting e-waste to developing countries, where again, the waste is processed in the informal sector. Both chapters comment on the disproportionate weight of environmental problems borne by marginalized people in the informal sector, constituting a gross violation of the principles of global environmental justice. In the third part the authors discuss the environmental and health consequences of informal e-waste recycling and the resulting need for more environmental education, based on experiences in Nigeria and Kenya. Innocent Nnorom and Oladele Osibanjo present the results of a study of a site used for the open burning of selected WEEE components to recover the copper, aluminium and other valuable materials in Aba, South-eastern Nigeria. The results indicate there is severe heavy metal contamination of the soil. Further, the metal pollution at the site studied also has the potential to contaminate surface waters through rainwater leaching, of groundwater as well as crops in nearby farms, with obvious health hazards for the surrounding population. Kehinde Olubanjo and colleagues analyse the concentration of lead and copper in different parts of waste personal computers imported into Nigeria. The disposal of e-waste, particularly computers, in Nigeria has become a serious problem since the methods of disposal are very rudimentary and pose grave environmental and health hazards. The situation is worsened as there is no e-waste management system in place, as well as the lack of awareness, inadequate legislative mechanisms, a lack of funds and reluctance on the part of the government and corporate organizations to address this critical issue. The authors call for more environmental education and continuous and detailed education programmes to be implemented at all levels of society. The issue of consumer behaviour and disposal attitudes is central to the chapter by Elizabeth Muoria and colleagues, who have researched how residents in a municipality in Kenya dispose of e-waste, together with the factors that affect their behaviour and their level of awareness of the effects of poor disposal of e-waste on human health and the environment. Muoria and colleagues' study shows that once equipment is out of use, most of it is either stored or disposed of with other solid waste, either due to its intrinsic resource value or because it is convenient or cheap to do so. Most residents are not yet sufficiently aware of the dangers for the environment and in particular for human health resulting from an inappropriate disposal of e-waste. All three chapters not only shed light on e-waste in the African context but also emphasize the need for integrated e-waste management that addresses the social, technical and legislative challenges associated with e-waste. The next part of the book deals with system design approaches for sustainable e-waste management systems, given limited resources and limited carrying capacity of our ecosystem. Henning Wilts explores how the circulation of palladium, a scarce metal found in WEEE, can be improved by means of international covenants, negotiated but binding treaties based on private law between public institutions, industry and other stakeholders, for electronic products. A policy approach that is already widely adopted for the sustainable management of e-waste is the concept of extended producer responsibility (EPR), which encourages producersto design environmentally friendly products by holding them responsible for the costs of managing their products at their end of life. The European WEEE Directive, as one of the pioneering legislations on the sustainable management of WEEE, is based on the principles of EPR. Hazel Nash explores the extent to which the WEEE Directive and the WEEE Recast Proposal promote patterns of sustainable consumption and production. In particular, the chapter assesses the ways in which the roles and responsibilities of producers and consumers are addressed and the impact this has on achieving the overarching aim of sustainable waste management. Hua Zhong and Shu Schiller explore the implementation of an EPR strategy in China. In their chapter they proposes a third-party take-back model as an alternative approach where private companies assume the EoL responsibilities for products on behalf of the original equipment manufacturers. They argue that such a third-party recycling system, by means of an internet platform to organize the collection and recycling of WEEE, could balance the interests of all stakeholders involved: the consumer and the third-party recycler contracted by the manufacturers, as well as the government as the regulatory body. In part five, we look more at the technological challenges and innovations in managing e-waste, in particular bioleaching processes to recover metals. Conventional recycling processes are either hydrometallurgical (meaning the separation of metals by liquid processes, such as leaching) or pyrometallurgical, which entails thermal treatment. However, bioleaching can be an alternative method for recovering metals from WEEE. Metals-bearing waste like EoL vehicles or waste EEE are often recycled using post-shredder techniques encompassing gravimetric, magnetic or eddy current separation stages, which result in large amounts of materials such as plastics, foam or textiles that have to often be dumped in landfills. High dumping costs and recent advances in the hydrometallurgical extraction of metals have increased interest in hydrometallurgical processes and other alternatives. The use of microorganisms to solubilize metals from waste is one such potentially low-cost alternative to the classical hydrometallurgical processes. Bioleaching does not need high temperature and pressurization, which reduces the energy cost and avoids the emission of gas pollutants. Today, bioleaching is applied on a commercial scale for the recovery of copper and uranium from low levels ores and sulphide minerals. However, studies have demonstrated that metals can be recovered from printed circuit board scrap by bacterial leaching. Gregory Lewis and colleagues investigate the potential of bioleaching of polymetallic industrial waste using chemolithotrophic bacteria while Luciana Harue Yamane and colleagues discuss the influence of ferrous iron supplementation on bioleaching to recover copper from printed circuit boards.

Details: New York: United Nations University Office at United Nations, 2013. 208p.

Source: Internet Resource: Accessed July 16, 2019 at: https://pdfs.semanticscholar.org/4e5c/5729c74e15b7889a8c24f9b779fc22b65580.pdf?_ga=2.12509940.1124749473.1563312159-462006081.1559056280

Year: 2013

Country: International

Keywords: E-Waste

Shelf Number: 156812


Author: Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES)

Title: Report on Monitoring the Illegal Killing of Elephants (MIKE)

Summary: An updated assessment by the CITES programme Monitoring of Illegal Killing of Elephants (MIKE) has confirmed that poaching continues to threaten the long-term survival of the African elephant. MIKE evaluates relative levels of illegal killing based on the Proportion of Illegally Killed Elephants (PIKE). This is calculated as the number of illegally killed elephants found, divided by the total number of elephant carcasses encountered by patrols or other means, aggregated by year for each site. PIKE levels above 0.5 means that more elephant deaths reported were due to illegal killing than other types of death. The evidence reveals that the Proportion of Illegally Killed Elephants (PIKE) peaked in 2011 at 0.77, when an alarming 10% of African elephants were poached. It then steadily declined through 2017 to 0.53 and remained relatively unchanged in 2018. Such high PIKE levels are of concern because even in well-established and protected elephant populations, the annual losses due to illegal killing and other mortalities would not be compensated by birth rates. Many African elephant populations are small and fragmented and not well-protected, making them even more vulnerable to poaching. As PIKE levels remain above 0.5 in Africa, the number of African elephants in some countries continues to decline. African elephant populations have fallen from an estimated 12 million a century ago to some 400,000, according to the most recent estimations contained in the 2016 IUCN/SSC African Elephant Status Report. "Illegal killing of African elephants for ivory remains a significant threat to elephant populations in most of the range States. At the same time, the human population of Africa has grown tenfold, from 125 million to 1,225 million, creating competition for land with elephants." said CITES Secretary-General Ivonne Higuero. "We must continue to reduce poaching and illegal trade in ivory and find solutions to ensure the coexistence of elephants with local people. This means strengthening law enforcement, reducing demand for illegally sourced ivory and securing the livelihoods of people living with elephants. The international community should further expand its work with the African range States to find solutions that work both for the elephants and for local communities." International trade in elephant ivory has been banned by CITES since 1990. Opinions differ between countries about whether this ban should continue or not. African countries where elephant populations are sufficiently healthy and sustainable argue that they should be permitted to resume the ivory trade, among other things, to generate funds for the conservation of elephants. The African elephant and the debate over the ivory trade will be a major item on the agenda of the next triennial CITES Conference of the Parties (CoP18), originally planned for May in Colombo, Sri Lanka, but to be rescheduled for a later date.

Details: Geneva, Switzerland: Convention on International Trade in Endangered Species of Wild Fauna and Flora, 2019. 20p.

Source: Internet Resource: Accessed July 16, 2019 at: https://cites.org/sites/default/files/eng/cop/18/doc/E-CoP18-069-02.pdf

Year: 2019

Country: International

Keywords: Biodiversity Conservation

Shelf Number: 156808


Author: Forstater, Maya

Title: Illicit Flows and Trade Misinvoicing: Are We Looking Under the Wrong Lamppost?

Summary: Introduction: Large estimates of trade misinvoicing have played a key role in shaping perceptions of the issue. The Washington based NGO Global Financial Integrity (GFI) uses mismatches in official trade data to estimate that trade misinvoicing drains US800 billion dollars from developing countries annually. Their work also inspired UNECA and the African Union to set up a High Level Panel on Illicit Financial Flows from Africa, which estimated US50 billion dollars of illicit flows from Africa. Based on these estimates, Thabo Mbeki as chair of the panel argued that "the bulk of illicit financial flows - 60% and more - derive from the activities of the large commercial companies", through trade misinvoicing, with criminal activities such as drug trafficking accounting for about 30%, and corruption less than 10%. Manipulation of import and export prices is certainly a real phenomenon. In China overpayments of imports have been used to get around the country's currency controls. In Venezuela scammers use inflated import invoices to buy cheap dollars from the official currency control agency. There have long been concerns that exporters shipping tropical hardwoods from Papua New Guinea may be underdeclaring their value. Networks involved in smuggling people, drugs and arms use Halawa agents to transfer money, and they may settle up between themselves through shipments of licit goods under-charged. However, it is not clear that the influential and widely quoted estimates of trade misinvoicing derived from mismatches in trade statistics help us to understand the reality of illicit economies and networks in practice. This briefing looks at some of the key problems with these estimates and argues that continuing to use them as such a bright point of light in shaping our understanding could impede, rather than support targeting of effective action in combatting corruption, organized crime, illegal exploitation of natural resources and tax evasion.

Details: Bergen, Norway: Chr. Michelsen Institute, 2016. 8p.

Source: Internet Resource: Accessed July 16, 2019 at: https://www.cmi.no/publications/5979-illicit-flows-and-trade-misinvoicing#pdf

Year: 2016

Country: International

Keywords: Corruption

Shelf Number: 156809


Author: McCann, Duncan

Title: E-Waste Prevention, Take-Back System Design and Policy Approaches

Summary: This paper explores the large variety of policy options that have been implemented around the world and it draws some conclusions about the nature of responses to the e-waste problem and potential policy recommendations. In the first decade of the 2000s, policymakers in industrialized and emerging countries focused their efforts on developing financing and awareness schemes aimed at ensuring better participation of both the private sector and individuals aimed at ensuring higher collection rates while maintaining the finances to meet the treatment costs. The authors of this paper encourage further research on reducing overall e-waste volumes arising worldwide, encouraging repair and reuse both by producers and consumers and promoting eco-design, which are currently underrepresented in the literature. In terms of policy recommendations, this paper seeks to present a variety of policy options, most of them having already been implemented to some degree in both industrialized and developing countries. A minority of recommendations are suggestions gathered from scientific work, the private sector or civil society organizations. The authors have tried to identify the advantages and disadvantages of each policy option, as there is no one-size-fits-all for e-waste policy and what works under some conditions may be inappropriate in others.

Details: Tokyo, Japan: United Nations University, Solving the E-Waste Problem (STEP), 2015.

Source: Internet Resource: Accessed July 16, 2019 at: http://collections.unu.edu/eserv/UNU:6129/step_gp_prevention_take_back_system.pdf

Year: 2015

Country: International

Keywords: E-Tech

Shelf Number: 156811


Author: Enhancing Learning and Research for Humanitarian Assistance (ELRHA)

Title: Rapid Review of the Inclusion of People with Disabilities and Older People in Gender-Based Violence (GBV) Humanitarian Interventions

Summary: Purpose of this document: Elrha is a global charity that finds solutions to complex humanitarian problems through research and innovation. Elrha identified a knowledge gap in good practices and innovation for how people with disabilities and older people are included in gender-based violence (GBV) interventions in humanitarian contexts. To support a new area of focus under their Humanitarian Innovation Fund (the HIF) on Disability and Older Age Inclusion (DOAI), Elrha commissioned an independent rapid review to review the inclusion of people with disabilities and older people in humanitarian GBV interventions.

Details: London: Enhancing Learning and Research for Humanitarian Assistance and Humanitarian Innovation Fund, 2019. 30p.

Source: Internet Resource: Accessed July 16, 2019 at: https://www.elrha.org/wp-content/uploads/2019/06/GBV-Rapid-Review-1.pdf

Year: 2019

Country: International

Keywords: Disabilities

Shelf Number: 156813


Author: Global Commission on Drug Policy

Title: Classification of Psychoactive Substances: When Science was Left Behind

Summary: The international drug scheduling system, used to classify psychoactive substances according to their harms and benefits, lies at the core of the international drug control regime. Its proper functioning is the key to balancing the regime's dual objectives: securing adequate availability of controlled substances for medical purposes while preventing their diversion for non-medical or other uses. Before 1961, the global drug control system focused on imposing restrictions on international trade and was designed to accommodate and respect differences between the laws of states. Since the Single Convention on Narcotic Drugs was signed in 1961, however, states have responded to international law with schedules and classification systems that are not evidence-based or rationally linked to the harms and benefits of substances, but rather based on political choices and benefits for policymakers. Such drug control policies have resulted in social and economic problems not only for people who use drugs but also for the general population, including health epidemics, prison overcrowding and arbitrary enforcement of drug laws. The current system, governed by the 1961 Single Convention and the 1971 Convention on Psychotropic Substances, has gradually brought more and more psychoactive substances under international control. Today over 300 substances are scheduled. Eight schedules have been defined according to the dependence potential, abuse potential and therapeutic usefulness of the drugs included in them - four in each of the 1961 and 1971 conventions. These international drug control conventions recognize only medical use, including the relief from pain, as benefits from the use of psychoactive substances; other cultural, recreational or ceremonial uses are not taken into account, or rather are excluded. The strictness of control measures depends on the schedule in which a substance is placed. Of the eight schedules, two imply the prohibition of substances they include, including their medical use (with the exception of very limited quantities for research). However, with only a few specified exceptions, all substances scheduled under the conventions for non-medical and non-scientific purposes are effectively banned. This de facto prohibition is arbitrary. The current distinction between legal and illegal substances is not unequivocally based on pharmacological research but in large part on historical and cultural precedents. It is also distorted by and feeds into morally charged perceptions about a presumed "good and evil" distinction between legal and illegal drugs. Scheduling decisions are taken by the Commission on Narcotic Drugs (CND), which was established by the United Nations Economic and Social Council. The World Health Organization (WHO) provides recommendations on the advice of its Expert Committee on Drug Dependence (ECDD), which are then submitted to a vote of CND members (a simple majority vote for the schedules of the 1961 convention and two-thirds for the 1971 schedules). Decisions about scheduling have thus become subjected to political considerations and an inherent bias towards prohibiting new substances. The negative consequences of allowing a drug onto the market that might later turn out to be dangerous are very high, whereas the negative consequences - for decision makers - of keeping off the market a drug that is in fact harmless are minimal. As a result, recommendations to add new substances to the schedules are usually rubberstamped, while recommendations not to schedule substances or to place them under a less strict regime consistently meet significant opposition. Several substances listed on the earliest schedules of the 1961 convention - including widely used substances such as cannabis, cannabis resin, heroin and cocaine - had never received an expert evaluation or their evaluations were up to 30 years old. There have been calls to amend the conventions to resolve inherent inconsistencies and to clarify the mandates of WHO, the International Narcotics Control Board (INCB) and the CND in the scheduling process. Proposals have also been repeatedly made to improve the scheduling criteria and to outline a system based on scientific evidence. An improved scheduling procedure, which strikes a better balance between ensuring availability of controlled substances for legitimate uses and preventing problematic use, would provide a key tool to guide reforms that transform international and national drug control policies from an exclusively prohibitive framework into a flexible model based on regulation. An evidence-based international scheduling system would allow reform-oriented countries more flexibility to design domestic schedules according to their needs, while improving control over potential illegal exports. It would also be far more effective at gradually steering the drugs market in a direction that causes far less harm. Finally, an evidence-based scheduling system would remove much of the stigma associated with drug use, thus helping people to make more responsible and less harmful choices. Guiding principles for a more rational scheduling model include: -ensuring adequate availability of each substance for medical and research purposes; -abandoning zero-tolerance policies to provide more space for "other legitimate purposes"; -showing more leniency towards milder substances; -taking into account local social and cultural circumstances; -conducting a cost-benefit analysis of potential harms and perceived benefits; -accepting certain risk thresholds comparable to other acceptable societal risks, instead of upholding an absolute precautionary principle; -weighing carefully the potential consequences of scheduling decisions, taking into account predictable responses of users and markets; and -making better use of existing medical and consumer safety legal instruments, instead of criminal drug laws. The Global Commission on Drug Policy calls for a comprehensive and interdisciplinary approach to designing drug control policies. It is time to end the "silo" approach that treats drug control as a single issue and classifies drugs and enforces drug prohibition based on unreliable and scientifically dubious schedules. The only responsible path is to regulate the market of illegal drugs. Governments should establish regulations and a new scheduling system - adapted to the dangerousness of each drug and based on solid scientific assessments - and monitor and enforce these regulations. For the Global Commission, urgent action is needed to end the inconsistencies of the current scheduling system: -The international community must recognize the incoherence and inconsistencies in the international scheduling system, and must trigger a critical review of the current models of classification of drugs. -The international community must prioritize the role of the World Health Organization and interdisciplinary scientific research in further developing evidence-based scheduling criteria based on a rational scale of harms and benefits. -UN Member States must refocus the international scheduling system on the original impetus of controlling transnational trade and allow for innovative national classification systems to be developed.

Details: Geneva, Switzerland: Global Commission on Drug Policy, 2019. 55p.

Source: Internet Resource: Accessed July 21, 2019 at: http://www.globalcommissionondrugs.org/wp-content/uploads/2019/06/2019Report_EN_web.pdf

Year: 2019

Country: International

Keywords: Cannabis

Shelf Number: 156921


Author: Bate, Roger

Title: Smoking Out Illicit Trade: How Some Policies Intended to Limit Smoking Drive Illegal Trade

Summary: The World Health Organization (WHO) states that smoking cigarettes is the largest cause of preventable premature death globally and as therefore enacted various protocols in attempts to lower the death toll. However, in many cases the attempts to lower smoking, such as raising taxes and introducing or expanding regulation on tobacco products, has resulted in the rise of illicit tobacco, whether counterfeits or legally produced smuggled products. Bate argues that free trade zones, rogue nations and attempts by governments to stop illicit trade are the main drivers of illicit tobacco.

Details: Washington, DC: American Enterprise Institute, 2016. 22p.

Source: Internet Resource: Accessed July 21, 2019 at: https://www.aei.org/wp-content/uploads/2016/09/Smoking-out-illicit-trade.pdf

Year: 2016

Country: International

Keywords: Cigarettes

Shelf Number: 156739


Author: Magliocca, Nicholas R.

Title: Modeling Cocaine Traffickers and Counterdrug Interdiction Forces as a Complex Adaptive System

Summary: Abstract: Counterdrug interdiction efforts designed to seize or disrupt cocaine shipments between South American source zones and US markets remain a core US "supply side" drug policy and national security strategy. However, despite a long history of US-led interdiction efforts in the Western Hemisphere, cocaine movements to the United States through Central America, or "narco-trafficking," continue to rise. Here, we developed a spatially explicit agent-based model (ABM), called "NarcoLogic," of narco-trafficker operational decision making in response to interdiction forces to investigate the root causes of interdiction ineffectiveness across space and time. The central premise tested was that spatial proliferation and resiliency of narco-trafficking are not a consequence of ineffective interdiction, but rather part and natural consequence of interdiction itself. Model development relied on multiple theoretical perspectives, empirical studies, media reports, and the authors' own years of field research in the region. Parameterization and validation used the best available, authoritative data source for illicit cocaine flows. Despite inherently biased, unreliable, and/or incomplete data of a clandestine phenomenon, the model compellingly reproduced the "cat-and-mouse" dynamic between narco-traffickers and interdiction forces others have qualitatively described. The model produced qualitatively accurate and quantitatively realistic spatial and temporal patterns of cocaine trafficking in response to interdiction events. The NarcoLogic model offers a much-needed, evidence-based tool for the robust assessment of different drug policy scenarios, and their likely impact on trafficker behavior and the many collateral damages associated with the militarized war on drugs.

Details: S.L.: Proceedings of the National Academies of Sciences of the United States of America, 2018. 9p.

Source: Internet Resource: Accessed July 27, 2019 at: https://www.pnas.org/content/pnas/116/16/7784.full.pdf

Year: 2018

Country: International

Keywords: Cocaine

Shelf Number: 157047


Author: Stark, Lindsay

Title: Sex and Age Effects in Past-Year Experiences of Violence Amongst Adolescents in Five Countries

Summary: Abstract: Purpose: To date, there has been insufficient focus on age and sex differences in studies of violence amongst adolescents and young adults in low- and middle-income countries. As adolescence is a formative period during which experiencing violence can have both short- and long-term consequences, we aim to investigate experiences of violence by age and sex across five countries. Methods: Incidences of past-year violence victimization were estimated by sex across two-year age bands (13-24 years) using Violence Against Children Survey datasets from Cambodia, Haiti, Kenya, Malawi, and Tanzania. Analyses were conducted separately for each country. The presence of an association with age and each type of violence was identified using logistic regressions separately by sex. Sex was then added to the models as an interaction term and adjusted Wald tests were used to assess differences between males and females in age effects. Results: Risk of physical violence by both an adult caregiver and a community member decreased with age for both sexes in all countries. In contrast, risk of IPV increased with age for both sexes in all countries. Although some countries displayed a steeper increase in risk of IPV and sexual violence with age for males, females face higher overall levels of risk for these forms of violence. Conclusion: Findings highlight how adolescents' and young adults' risk of violence changes with age and type of violence. The analysis underscores the importance of collecting violence data disaggregated by age and sex to best inform policies and programming.

Details: San Francisco, California: Plos One, 2019. 13p.

Source: Internet Resource: Accessed August 11, 2019 at: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0219073&type=printable

Year: 2019

Country: International

Keywords: Adolescents

Shelf Number: 156949


Author: Steven, David

Title: The Challenge of SDG16.1 - Can we Halve Global Violence?

Summary: Abstract: SDG16plus includes 36 targets from eight Sustainable Development Goals (here in after referred to as SDGs) that aim to build more peaceful, just and inclusive societies. While the SDG16plus targets apply to all countries, they draw attention to the needs of people, communities, and societies at greatest risk of being left behind due to violence, injustice, exclusion, and poor governance. SDG16.1 promises to significantly reduce all forms of violence everywhere. While the number of violent deaths will increase by 10% by 2030 on current trends, the evidence suggests that conflict and non-conflict violence can be successfully prevented. Urgent action is needed to reduce the risk of conflict and to focus prevention on violence hotspots in cities. Longer-term efforts will transform harmful gender norms and make societies safer for women, children, and young people to live in. Those working on the prevention of different forms of violence should unite behind a common effort to implement SDG16.1.

Details: S.L.: Journal of International Development Cooperation, 2019. 22p.

Source: Internet Resource: Accessed August 11, 2019 at: https://www.ejidc.org/archive/view_article?pid=jidc-2018-4-3

Year: 2018

Country: International

Keywords: Sustainable Development Goals

Shelf Number: 156950


Author: Tuttle, Samantha

Title: Win-Win: Equipping Housing Providers to Open Doors to Housing for People with Criminal Records

Summary: In Illinois, nearly 5 million adults, 50% of the population, are estimated to have an arrest of conviction record. Housing is foundational for employment success, family stability, and overall well-being. For a housing provider, translating the desire to improve housing opportunity for people with records into concrete policies and practices can be a challenge. For providers who are putting out fires each and every day at their properties, slowing down to develop new approaches may be difficult. The purpose of Win-Win is to recommend a number of policies and practices - ranging from small changes to the more robust - that housing providers can adopt and adapt, in whole or in part, to increase housing opportunities for people with criminal records. In order to create concrete recommendations, Heartland Alliance consulted with a number of affordable housing developers and Cabrini Green Legal Aid's Leadership Council, which brings together people with criminal records to advance social change. We also worked with experts in the field and researchers to round out our recommendations. While we hope there are valuable takeaways for any housing provider in this guide, the recommendations are targeted at affordable housing providers whose units typically do not have services attached. These providers play a key role for people with records, who are frequently leaving reentry programs and need to find quality housing they can afford.

Details: Toronto, Canada: Heartland Alliance, 2019. 32p.

Source: Internet Resource: August 11, 2019 at: https://www.issuelab.org/resources/35116/35116.pdf

Year: 2019

Country: International

Keywords: Conviction Record

Shelf Number: 156951


Author: Weaver, Beth

Title: Inclusive Justice Co-Producing Change: A Practical Guide to Service User Involvement in Community Justice

Summary: This document is a practical 'how-to' guide to developing and implement service user involvement in justice services. It is informed by a two year action research project, commissioned by Community Justice Ayrshire, to support the establishment of three service user involvement structures, and to document the process of implementation and the resulting activities, outputs and inputs. The guide is designed and structured as a step by step guide from preparation to evaluation.

Details: Glasgow, Scotland: University of Strathclyde Glasgow, 2019. 28p.

Source: Internet Resource: Accessed August 11, 2019 at: https://pure.strath.ac.uk/ws/portalfiles/portal/88977529/Lightowler_Weaver_CYCJ_2019_Inclusive_justice_co_producing_change_a_practical_guide.pdf

Year: 2019

Country: International

Keywords: Criminal Justice System

Shelf Number: 156957


Author: Verheecke, Lora

Title: Red Carpet Courts: 10 Stories of How the Rich and Powerful Hijacked Justice

Summary: Imagine an environmentally or socially destructive corporate project - say, a toxic mine, which could poison your local supply of water, or a luxury real estate project, which would displace hundreds of people in its neighbourhood. You and your community oppose the plans, the courts judge in your favour and the project is stopped. Seems like a community victory right? But then, the company behind the project sues your country for interfering with its profits, demanding millions or even billions in compensation, including for future profits. Imagine the lawsuit takes place in a biased pseudo court where rulings have been so devastating for countries that many respond to a case, or even the mere threat of one, by offering vast concessions, such as rolling back their own laws. Actually, you do not need to imagine all this. It is the reality. Under the ISDS (investor-state dispute settlement) parallel justice system for corporations and the rich, companies can sue countries when they think that government decisions or court rulings - even ones whose explicit aim is to protect people or the environment - affect their profits. These lawsuits bypass domestic courts and take place before an international tribunal of arbitrators: essentially three investment lawyers who decide whether private profits or public interests are more important. For example, after Colombia's Constitutional Court banned mining activities in a sensitive ecosystem which provides drinking water for millions of Colombians, Canadian mining company Eco Oro sued the country for US dollars 764 million in damages. When Croatian courts cancelled illegal permits issued for a luxury golf resort in the city of Dubrovnik, Croatia was hit with a US dollars 500 million compensation claim. Romania is defending itself from a shocking US dollars 5.7 billion claim by Canadian mining company Gabriel Resources, after the country's courts declared the company's proposed toxic Rossia Montanaa gold mine illegal. These are just three out of ten noteworthy but also representative ISDS lawsuits described in more detail in this report, which have been filed, threatened or decided since 2015 (see table 1). Globally, almost 1,000 ISDS cases are known of to date, in which governments have been sued for more than US dollars 623 billion in total. This figure is equivalent to 90 per cent of all Foreign Direct Investment flows to all developing countries in 2018. The total amount of money which states have thus far been ordered or agreed to pay in disclosed ISDS rulings and settlements is US dollars 88 billion - another startlingly large figure, which is equivalent to all Foreign Direct Investment to Australia, Japan and other developed economies outside of Europe and North America in 2018.These lawsuits are happening at a critical moment for the ISDS regime. On the one hand, strong public controversy about the 'corporate courts' has kept citizens, politicians and the media engaged, interested and critical on the issue. Also, a number of countries have started to pull out of the regime by terminating ISDS deals. On the other hand, new trade and investment agreements which include ISDS provisions are under negotiation in many parts of the world, and the European Union (EU) is actually planning to scale-up ISDS through a World Court for Corporations (formally known as Multilateral Investment Court). These developments risk further expanding, locking-in and re-legitimising a much criticised system that has proven extremely dangerous for taxpayers, democracy, social and environmental protection, economic development and climate justice. Against this background, this report shows that ISDS is again and again used as a corporate weapon against the public interest, and in spite of the ongoing controversy about it, these red carpet courts for corporations continue to thrive and reinforce injustice across the world. This parallel legal system continues to deliver hundreds of millions or even billions of dollars of taxpayers' money to companies and rich individuals. ISDS cases, or just a risk thereof, regularly succeed in intimidating nations into gutting their own laws, thus deeply undermining democracy and citizen engagement around the world. Many cases also show how ISDS directly contradicts and obstructs other legal fields, most notably human rights and environmental law. The latest EU approach to corporate rights does not do anything to put an end to this or address the many concerns and critiques of the system of EU citizens. In fact, alarmingly, its impact is quite the opposite: under the EU's reformed ISDS (renamed Investment Court System or ICS) and the proposed Multilateral Investment Court, thousands of companies could continue to circumvent domestic courts and sue governments in an exclusive justice system if any national laws or regulations interfere with their ability to make huge profits. The EU's ISDS policy would still pave the way for billions of taxpayers' money being paid to big business and the rich. It could still curtail and undermine policymaking in the public interest, to protect people and the planet. And it could still lead to rulings that directly contradict human rights and environmental law. As the EU embarks on a crusade to globalise its ISDS approach, this should not just alarm Europeans. From Mexico to Vietnam, from North America to the African, Caribbean and Pacific group of states, citizens and policymakers across the world should realise that the EU has not resolved the deep-seated problems with ISDS, which came under such serious critique in recent years. Instead, the latest investment protection proposals are just as dangerous for taxpayers, policies in the public interest, and democracy as the 'old' ISDS system - and as much a one-way system with only rights and lucrative possibilities, but no obligations for investors. These red carpet courts for corporations should have no space in any international agreement.

Details: Amsterdam, Netherlands: Friends of the Earth International, The Transnational Institute, and Corporate Europe Observatory, 2019. 76p.

Source: Internet Resource: Accessed August 12, 2019 at: https://corporateeurope.org/sites/default/files/2019-06/Red%20Carpet%20Courts_1.pdf

Year: 2019

Country: International

Keywords: Corporate Crime

Shelf Number: 156962


Author: Beck, Adrian

Title: The GCC Loss Prevention Survey 2017

Summary: Executive Summary: Background to the Survey: Findings: Loss Prevention in an Organisational Context: Perceptions of Loss Prevention: Measuring the Impact of Loss: No representative data on loss prevention covering the GCC region currently exists. The data presented in this report comes from a survey based upon up to 18 respondents taking part in an interactive workshop where they could provide feedback in real time via interactive technology on 43 questions relating to loss prevention. It was not possible to verify the representativeness of the sample so caution needs to be used when interpreting the results. Virtually all companies had a loss prevention department; largest proportion of heads of loss prevention reported directly to Retail Operations (33%). A large proportion had a written corporate policy on loss prevention and an annual target for loss (78%). Most had an audit department (72%); the most frequent auditing period was 6 months (50%) and the majority were carried out internally (56%). Very few are currently using or planning to use self-scan checkout technologies. Majority are now offering or planning to offer e-commerce. Respondents felt that loss prevention was generally well resourced and that it was considered a priority within their business. However, awareness of the current rate of loss/shrinkage was not thought to be high amongst senior managers and contact with the CEO to discuss loss prevention was relatively low. The Retail Operations function was regarded as the most willing group to help with loss prevention, while Buying/Trading, Human Resources and Supply Chain operations were considered the least willing. Relatively few respondents were reaching out to manufacturers/suppliers to seek help to deal with specific loss problems. Respondents included a remarkably wide range of types of loss within their overall loss number - many more than seen in other regions. Given this, perhaps it is not surprising that a relatively large proportion thought they knew what the causes were for a large amount of their losses. Nearly one-half of respondents thought that 20% or less of their losses were due to malicious causes such as crime. Process/admin errors were thought to be the biggest cause of loss (33%). Most respondents measured their losses at cost price (69%). A majority could measure their losses at SKU level (56%) although a significant minority could only do this at store or company level (31%). When losses were measured at cost price, it was calculated that the overall range was between 0.98% and 1.42%, with the mid-point calculation being 1.21%. If an assumption is made about overall profit margins, a retail price calculation of this number suggests it could be approximately 1.7% - significantly higher than seen in other surveys carried out round the world. Most respondents thought that their loss number had decreased from the previous year (57%). Most had a policy in place to prosecute customers caught stealing and a majority said it was in regular use. A similar amount said the same about a policy in place to prosecute staff caught stealing although fewer said it was in regular use. Extrapolated data suggests that respondents spent between 0.51% and 0.91% of retail turnover (at cost prices) on loss prevention, with the mid-point calculation being 0.71%. This is significantly higher than found in other regions. Most thought that their budget had stayed the same from the previous year (44%). When allocating funding it was calculated that between 28% and 47% was spent on human resources compared with software and hardware. The mid-point calculation was 37%. There was a high take up of EAS technologies, particularly using hard and soft tags. A majority were using data mining technologies (53%). In terms of future loss prevention investment, the largest proportion selected more/better staff training (38%) followed by audit and process management systems (25%).

Details: Leicester, England: University of Leicester, 2017. 33p.

Source: Internet Resource: Accessed August 14, 2019 at: http://www.jard.me/source/brochure/12_1509469103.pdf

Year: 2017

Country: International

Keywords: Loss Prevention

Shelf Number: 156981


Author: Sida

Title: Preventing and Responding to Gender-Based Violence: Expressions and Strategies

Summary: Ending gender-based violence (GBV) and ensuring women's security is a priority for the Swedish government, a priority reflected in central objectives of Swedish policy for development cooperation. Sida defines GBV as any harm or suffering that is perpetrated against a woman or girl, man or boy and that has negative impact on the physical, sexual or psychological health, development or identity of the person. The cause of this violence is founded in gender-based inequalities and discrimination. GBV is the most extreme expression of these unequal gender relations in society, and a violation of human rights, as well as a main hindrance of the achievement of gender equality. In Sida's work an important point of departure is that GBV is preventable, which entails a focus on the root causes of violence and on possibilities for change. Women and girls are mostly affected by GBV, and globally at least one third of all women have been exposed to violence in an intimate relationship, but also men and boys can be subjected to GBV. Regardless, the violence is linked to gender inequalities and norms for gender. Most commonly GBV occurs in the family, but it also takes place at other arenas in society, private and public. GBV is an umbrella definition including a wide range of expressions of violence such as intimate partner violence, sexual violence by non-partners, Female Genital mutilation (FGM), honour violence, early marriage, violence against LGBTI and trafficking in human beings. In situations of war and conflict, GBV is particularly present. Entry points in addressing GBV is that gender-based violence is a violation of human rights, and that tackling GBV is crucial for poverty reduction and economic development. GBV is furthermore a key to protect sexual and reproductive health and rights (SRHR), and reverse the spread of HIV. It is also a security concern and a prerequisite for sustainable peace. When defining effective strategies to end a priority is to make efforts to prevent GBV. Given that GBV is linked to gender-based power inequalities, key in GBV prevention are efforts to increase gender equality and transformation of gender norms. Prevention strategies entail a shift from "victims" to "survivors" with a focus on women and girl's empowerment and agency, efforts to increase women's political and economic empowerment and sexual and reproductive rights, and to incorporate men and boys in the work. The strengthening of legal and policy framework is also of outmost importance, as are efforts to bridge the gap between law and practice and to end the impunity for GBV. Response to survivors, which meets their rights to protection and access to services, including shelters and health sector services, is also core.

Details: Stockholm, Sweden: Swedish International Development Cooperation Agency, 2015. 24p.

Source: Internet Resource: Accessed August 15, 2019 at: https://www.sida.se/contentassets/3a820dbd152f4fca98bacde8a8101e15/preventing-and-responding-to-gender-based-violence.pdf

Year: 2015

Country: International

Keywords: Female Genital Mutilation

Shelf Number: 156918


Author: Coccia, Mario

Title: What is the Growth Rate of Population that Supports Terrorism in Regions with Social Issues?

Summary: Understanding where and how terrorism happens can provide vital information to explaining why it happens. In particular, terrorism cannot be understood without having accurate knowledge of the environmental factors in which it occurs. The vast literature has analyzed several determinants of terrorism, such as economic, social, psychological and religious factors. However, demographic factors causing and sustaining terrorism in regions are hardly known. Results of the present study suggest a curvilinear relation between confirmed fatalities for terrorist incident and rates of growth of population. In addition, findings here also reveal that a high growth rate of population of about 3.6% maximizes the lethality due to terrorist incidents in society. This high growth rate of population is mainly in regions with socioeconomic issues that can lead to terrorism (e.g., Iraq, Mali, Sudan, etc.). As a matter of fact, the ethnicity and/or religion are illusory causes of terrorism, because they are not an environmental stressor per se, whereas a basic determinant of terrorism may be a critical demographic mass and high population growth that, in certain environments with problematic socioeconomic factors, leads to disrupt the stability of societies/communities, induce frustration and anger of people, and terrorism as a result. Overall, then, this study can clarify and generalize whenever possible, one of the sources of terrorism in regions with social issues. Some socioeconomic policies are suggested to increase economic conditions of people and work opportunities directed to reduce this critical problem in society over the long run.

Details: Moncalieri, Italy: National Research Council of Italy, 2018. 30p.

Source: Internet Resource: Accessed August 18, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3211249

Year: 2018

Country: International

Keywords: Cultural Deviance

Shelf Number: 157031


Author: Alfthan, Bjorn

Title: Waste Management Outlook for Mountain Regions: Sources and Solutions

Summary: Mountains play an essential role in supplying water, energy, food and other services to millions of people living in the mountains and downstream. Ensuring the continued supply of these services has never been more important. However, many mountain regions are experiencing a growing solid waste problem, from ever-expanding urban sprawls and cities, increasing consumption patterns, existing and past mining operations, tourism activities and practises of illegal dumping. The good news is that there are many options available to prevent and manage waste in mountain environments, in ways that protect mountain ecosystems and people, and prevent problems from migrating downstream. This report highlights both the challenges and the solutions for sound waste management in mountain regions.

Details: Vienna, Austria: United Nations Environment Programme, 2016. 92p.

Source: Internet Resource: Accessed August 21, 2019 at: https://wedocs.unep.org/handle/20.500.11822/16794

Year: 2016

Country: International

Keywords: Environmental Crimes

Shelf Number: 157027


Author: David, Fiona

Title: Migrants and Their Vulnerability to Human Trafficking, Modern Slavery and Forced Labour

Summary: Research suggests connections exist between migration and criminal forms of exploitation such as human trafficking, forced labour and modern slavery. Certainly, constellations of risk are seen in certain migrant communities and migration corridors. However, it is not known how many of the world's estimated 40 million victims of modern slavery are also migrants. Modern slavery, while not defined in law, serves as an umbrella term that emphasizes the commonalities between human trafficking, forced labour and slavery. Essentially, these are all situations of exploitation in which a person cannot refuse or leave an exploitative situation due to threats, violence, coercion, deception or abuse of power. If we are to understand the relationship between migration and modern slavery, it is important that we know more about which migrants are vulnerable to modern slavery, as well as when and in what enabling circumstances. The global community has pledged, through the Sustainable Development Goals (SDGs), to address global challenges to achieve a better and more sustainable future for all. SDG 8.7 aims to eradicate modern slavery, trafficking, forced labour and the worst forms of child labour by 2030, and to end child labour by 2025. Alliance 8.7 is a multi-stakeholder partnership committed to achieving Target 8.7 through coordination, strengthening research, data, and knowledge management and sharing. Also covered by the SDGs is migration, most notably under SDG 10.7, which aims to facilitate orderly, safe, and responsible migration and mobility of people, including through implementation of planned and well-managed migration policies. In addition, the Global Compact for Safe, Orderly and Regular Migration seeks to embody the first intergovernmental agreement on international migration under the auspices of the United Nations. The Global Compact emphasizes the need to address and reduce the vulnerabilities in migration and, through its Objective 10, calls on the international community to "prevent and combat trafficking in persons in the context of international migration." Recognizing the importance of addressing modern slavery and specific vulnerabilities of migrants to modern slavery, this report has been prepared for the Alliance 8.7 Action Group on Migration to help to inform the activities of the group aimed at achieving SDG 8.7. The report examines the recent research literature on migration and modern slavery (published between 2014-2018) through a crime prevention lens, to identify a set of salient features that will help us better understand the relevant connections between migration and vulnerability to trafficking, forced labour, child labour, and modern slavery.

Details: Geneva, Switzerland: International Organization for Migration, 2019. 112p.

Source: Internet Resource: Accessed August 21, 2019 at: https://reliefweb.int/report/world/migrants-and-their-vulnerability-human-trafficking-modern-slavery-and-forced-labour

Year: 2019

Country: International

Keywords: Child Labor

Shelf Number: 157026


Author: Rostami, Amir

Title: The Complexity of Crime Network Data: A Case Study of its Consequences for Crime Control and the Study of Networks

Summary: The field of social network analysis has received increasing attention during the past decades and has been used to tackle a variety of research questions, from prevention of sexually transmitted diseases to humanitarian relief operations. In particular, social network analyses are becoming an important component in studies of criminal networks and in criminal intelligence analysis. At the same time, intelligence analyses and assessments have become a vital component of modern approaches in policing, with policy implications for crime prevention, especially in the fight against organized crime. In this study, we have a unique opportunity to examine one specific Swedish street gang with three different datasets. These datasets are the most common information sources in studies of criminal networks: intelligence, surveillance and co-offending data. We use the data sources to build networks, and compare them by computing distance, centrality, and clustering measures. This study shows the complexity factor by which different data sources about the same object of study have a fundamental impact on the results. The same individuals have different importance ranking depending on the dataset and measure. Consequently, the data source plays a vital role in grasping the complexity of the phenomenon under study. Researchers, policy makers, and practitioners should therefore pay greater attention to the biases affecting the sources of the analysis, and be cautious when drawing conclusions based on intelligence assessments and limited network data. This study contributes to strengthening social network analysis as a reliable tool for understanding and analyzing criminality and criminal networks.

Details: Vienna, Austria: Medical University of Vienna, 2015. 20p.

Source: Internet Resource; Accessed August 21, 2019 at: https://www.ncbi.nlm.nih.gov/pubmed/25775130

Year: 2015

Country: International

Keywords: Crime Control

Shelf Number: 157040


Author: Ribeiro, Haroldo V.

Title: Unveiling Relationships Between Crime and Property in England and Wales via Density Scale-Adjusted Metrics and Network Tools

Summary: Scale-adjusted metrics (SAMs) are a significant achievement of the urban scaling hypothesis. SAMs remove the inherent biases of per capita measures computed in the absence of isometric allometries. However, this approach is limited to urban areas, while a large portion of the world's population still lives outside cities and rural areas dominate land use worldwide. Here, we extend the concept of SAMs to population density scale-adjusted metrics (DSAMs) to reveal relationships among different types of crime and property metrics. Our approach allows all human environments to be considered, avoids problems in the definition of urban areas, and accounts for the heterogeneity of population distributions within urban regions. By combining DSAMs, cross-correlation, and complex network analysis, we find that crime and property types have intricate and hierarchically organized relationships leading to some striking conclusions. Drugs and burglary had uncorrelated DSAMs and, to the extent property transaction values are indicators of affluence, twelve out of fourteen crime metrics showed no evidence of specifically targeting affluence. Burglary and robbery were the most connected in our network analysis and the modular structures suggest an alternative to "zero-tolerance" policies by unveiling the crime and/or property types most likely to affect each other.

Details: Cambridge, Massachusetts: Harvard Kennedy School, 2018. 21p.

Source: Internet Resource: Accessed August 21, 2019 at: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0192931&type=printable

Year: 2018

Country: International

Keywords: Burglary

Shelf Number: 157039


Author: Perc, Matjaz

Title: Understanding Recurrent Crime as System-Immanent Collective Behavior

Summary: Containing the spreading of crime is a major challenge for society. Yet, since thousands of years, no effective strategy has been found to overcome crime. To the contrary, empirical evidence shows that crime is recurrent, a fact that is not captured well by rational choice theories of crime. According to these, strong enough punishment should prevent crime from happening. To gain a better understanding of the relationship between crime and punishment, we consider that the latter requires prior discovery of illicit behavior and study a spatial version of the inspection game. Simulations reveal the spontaneous emergence of cyclic dominance between "criminals", "inspectors", and "ordinary people" as a consequence of spatial interactions. Such cycles dominate the evolutionary process, in particular when the temptation to commit crime or the cost of inspection are low or moderate. Yet, there are also critical parameter values beyond which cycles cease to exist and the population is dominated either by a stable mixture of criminals and inspectors or one of these two strategies alone. Both continuous and discontinuous phase transitions to different final states are possible, indicating that successful strategies to contain crime can be very much counter-intuitive and complex. Our results demonstrate that spatial interactions are crucial for the evolutionary outcome of the inspection game, and they also reveal why criminal behavior is likely to be recurrent rather than evolving towards an equilibrium with monotonous parameter dependencies.

Details: Maribor, Slovenia: University of Maribor, 2013. 7p.

Source: Internet Resource: Accessed August 21, 2019 at: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0076063&type=printable

Year: 2013

Country: International

Keywords: Crime Prevention

Shelf Number: 157038


Author: Scherrer, Amandine

Title: Detecting and Protecting Victims of Trafficking in Hotspots

Summary: Trafficking in human beings occurs in every country in the world, and has strong gender dimensions. In Europe, sexual exploitation is the most widespread form of trafficking, followed by forced labour. Women and girls comprise the majority of all victims of trafficking. At EU level, most victims of trafficking are detected in their countries of citizenship. However, trafficking can also have strong cross-border dimensions. This study focuses on the issue of trafficking in human beings in the first reception facilities for migrants and/or refugees coming into the EU by sea that are operated in Greece and Italy as part of the EU 'hotspot approach' launched in 2015. Currently nine hotspots are located on the EU's external borders under this approach, for the initial reception, identification and registration of asylum seekers and other migrants: five are located in Greece and four in Italy. In the context of the ongoing migration crisis, it is more than likely that among the migrants and refugees seeking international protection after reaching EU shores by sea (a large number of whom come from conflict zones), many have been victims of trafficking already in their countries of origin. Furthermore, during their journeys to Europe, asylum-seekers and migrants are exposed to additional risks of exploitation. Therefore, the study analyses the difficulties related to victim detection in hotspots. While in theory this stage in a migrant or refugee's arrival in Europe provides the first opportunity to detect victims of trafficking and ensure an adequate follow-up procedure, the task of detecting victims of trafficking is fraught with many practical difficulties. Furthermore, the risks of trafficking do not disappear when migrants and refugees reach EU soil. While waiting in hotspots for their papers to be processed, they are still at risk of falling victim to exploitative individuals and/or networks. Most of the hotspots are not designed in a protection-sensitive manner and all people staying in hotspot facilities, but especially women and children, can end up in dangerous situations. The study therefore looks at the extent to which measures are taken to prevent exploitation and violence. At EU level, trafficking in human beings is recognised as a violation of fundamental rights and is explicitly prohibited by the EU Charter of Fundamental Rights. Many efforts have been made to step up the fight against trafficking, and since 2009 these efforts have been coordinated by an EU antitrafficking coordinator. In the specific context of hotspots, Member States have full responsibility for setting up and managing reception and registration infrastructure. When it comes to the detection of victims of trafficking, they nonetheless have to comply with a number of EU requirements, as set out in the Anti-Trafficking Directive, the Reception Conditions Directive and the Qualification Directive. In practice, a considerable number of actors are involved in the procedures for identifying vulnerabilities. These include national authorities, non-governmental organisations (NGOs), EU agencies and international organisations. As the hotspot is usually the first place where migrants have a chance to have their vulnerability recognised, the roles of the actors involved in the process of vulnerability screening is key. The identification and referral of vulnerable people is thus a shared responsibility of all actors operating in the hotspots. The living conditions in hotspots in Italy and Greece are very different, and the study takes due consideration of these specificities.

Details: Brussels, Belgium: European Parliament, 2019. 48p.

Source: Internet Resource: Accessed August 24, 2019 at: http://www.europarl.europa.eu/RegData/etudes/STUD/2019/631757/EPRS_STU(2019)631757_EN.pdf

Year: 2019

Country: International

Keywords: Asylum Seekers

Shelf Number: 157043


Author: Euromonitor International,

Title: Illicit Alcohol Research Review: Global Summary

Summary: Illegal alcohol: includes all the alcoholic beverages, distilled or fermented, that exist outside legal framework due to counterfeiting, contraband of finished product or raw material, illegal artisanal manufacturing, tax leakage at a local level, or surrogate alcohol that is shifted to the alcoholic beverage market.

Details: London: Euromonitor Consulting, International, 2018. 70p.

Source: Internet Resource: Accessed August 25, 2019 at: https://www.tracit.org/uploads/1/0/2/2/102238034/illicit_alcohol_meta_study_-_euromonitor_.pdf

Year: 2018

Country: International

Keywords: Alcohol

Shelf Number: 156586


Author: Transnational Alliance to Combat Illicit Trade

Title: Mapping the Impact of Illicit Trade on the Sustainable Development Goals

Summary: Illicit Trade and the UN Sustainable Development Goals (SDGs): From smuggling, counterfeiting and tax evasion, to the illegal sale or possession of goods, services, humans and wildlife, illicit trade is compromising the attainment of the UN SDGs in significant ways, crowding out legitimate economic activity, depriving governments of revenues for investment in vital public services, dislocating millions of legitimate jobs and causing irreversible damage to ecosystems and human lives. Mapping the Impact of Illicit Trade on the Sustainable Development Goals: Despite the recognition of international trade as an important means to achieve the SDGs, insufficient attention has been given to the substantial impact that illicit trade has on holding back progress. In order to help governments and business better understand how their efforts to achieve sustainable development must account for the negative forces of illicit trade, this study maps the 17 UN SDGs against the following sectors: agri-foods, alcohol, fisheries, forestry, petroleum, pharmaceuticals, precious metals and gemstones, pesticides, tobacco, wildlife and all forms of counterfeiting and piracy. These sectors were chosen because they participate significantly in international trade and they are particularly vulnerable to illicit trade. Trafficking in persons is also examined as a particularly abhorrent phenomenon affecting supply chains and basic human rights as well as contributing to illicit trade practices. TRACIT would like to thank the Secretariat of the UN Conference on Trade and Development (UNCTAD) for hosting the Dialogue on Illicit Trade and the Sustainable Development Goals, and assisting with sharing the study to UNCTAD Member States as part of the publication's public launch that took place in Geneva, Switzerland, on 18 July 2019.

Details: New York: Transnational Alliance to Combat Illicit Trade, 2019. 130p.

Source: Internet Resource: Accessed September 1, 2019 at: https://unctad.org/meetings/en/Contribution/DITC2019_TRACIT_IllicitTradeandSDGs_fullreport_en.pdf

Year: 2019

Country: International

Keywords: Black Market

Shelf Number: 157088


Author: United Nations

Title: Beyond Boundaries: Utilizing Protection Orders to Cultivate a Holistic Response to Domestic Violence in the Arab Region

Summary: The present study documents and analyses legislation on domestic violence protection orders in the Arab region through the lens of international frameworks and good practice with the aim of having Arab States streamline their legislation in line with these standards. The study calls upon Arab States to implement and make greater use of civil protection orders, in addition to ex parte (emergency) orders and criminal protection orders, arguing that such orders provide a necessary level of empowerment and protection to survivors of domestic violence. The Special Rapporteur on violence against women, its causes and consequences (SR-VAW) has recently argued that the availability of shelters and protection orders are required under international human rights law, including the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) and the Declaration on the Elimination of Violence against Women (DEVAW). In line with the focus of this study, which seeks to challenge the notion that survivors of marital violence should be forced to hide from perpetrators, the SR-VAW has also noted that "there are pervasive cultural assumptions about a woman's need to 'leave' a violent household, as opposed to the need to remove a violent partner who undermines women's enjoyment of the right to adequate housing". Amongst other international frameworks, the Beijing Platform for Action's response to violence against women (VAW) calls upon States to facilitate access to justice for survivors through "just and effective remedies for the harm they have suffered and inform women of their rights in seeking redress through such mechanisms" (Strategic objective D.1, 124(h)). Agenda 2030 and the Sustainable Development Goals (SDGs) elaborate several targets for addressing gender-based discrimination and inequality, particularly under SDG 5.4 The current SR-VAW has singled out target 2 of SDG 5, which calls for the elimination of all forms of VAW in the public and private spheres, as a means for States to develop additional indicators to bridge the protection divide, which includes cultivating a holistic response through shelters and protection orders. United Nations General Assembly resolution 65/228 on Strengthening crime prevention and criminal justice responses to violence against women calls for the implementation of civil and criminal protection orders as part of women's equal protection under the law and equal access to justice. More broadly, the International Covenant on Civil and Political Rights, under article 26, declares that all persons are equal before law and that "the law shall prohibit any discrimination and guarantee to all persons equal and effective protection against discrimination on any grounds..." Furthermore, the Committee on Women for the United Nations Economic and Social Commission for Western Asia (ESCWA) adopted the Muscat Declaration in its seventh session: Towards the Achievement of Gender Justice in the Arab Region (2016), which calls for member States to "harmonize national legislation with international and regional commitments ratified by member States, so as to ensure the repeal of all discriminatory laws." 8 Arab States' accession to and engagement with the aforementioned legislation and frameworks creates the obligation to address VAW, particularly through legal reform. One aspect is to develop the provision of civil protection orders as part of a comprehensive and holistic legal response, among other gender justice obligations. The introduction explains the rationale for the study, including the argument for cultivating greater access to civil protection orders, and highlights the importance of such work for member States in the Arab region. It provides several important definitions and concepts relevant to protection orders. The chapter also addresses the research questions and explains the research methodology adopted for the study. Chapter 2 discusses historic State responses to VAW, including the prohibitive and enabling factors that have contributed to the response, such as the perceived public-private divide in society and law, in addition to the criminal justice response. It examines VAW in the Arab region, as well as the debates that impact the realization of legislation efforts to address such violence in the region. It then presents the global evolution and impact of the protection order and its impact on the safety and wellbeing of survivors who have utilized them. Furthermore, the chapter highlights how civil protection orders have been adopted and adapted internationally. Chapter 3 reviews the normative frameworks that call for civil protection orders as part of a coordinated legal response to VAW, as well as the jurisprudence resulting from such frameworks. Specifically, this section considers the normative frameworks and standards for civil protection orders regarding the due diligence standard. Building on the due diligence standard, there is now international and regional jurisprudence indicating an evolving norm of civil protection orders under customary international law as designated by the SR-VAW, the Committee on the Elimination of Discrimination against Women and the United Nations Handbook for Legislation on Violence against Women (2012). These engagements highlight how international frameworks that promote the provision of civil protection orders can impact State practice. Chapter 4 analyses in greater detail the national legal frameworks (constitutions, penal codes, domestic violence laws) and policy frameworks (strategies on combating VAW) that guide Arab States' responses to VAW. This chapter also examines in detail civil and criminal protection order legislation from the Arab region and compares it to good practice as outlined in the United Nations Handbook for Legislation on Violence against Women. The final chapter contends that protection orders are part of an integrated prevention and protection approach to services and measures for women exposed to domestic violence. To cultivate this holistic approach, States must provide survivors of domestic violence unfettered access to criminal and civil protection orders, while law enforcement and the justice system must do their due diligence to ensure that protection orders remain an effective and accessible option. A series of recommendations directed at member States' engagement at the international, regional and national/community levels is provided.

Details: Beirut, Lebanon: United Nations House, Economic and Social Commission for Western Asia, 2019. 85p.

Source: Internet Resource: Accessed September 1, 2019 at: https://www.unescwa.org/publications/utilizing-protection-orders-cultivate-holistic-response-domestic-violence

Year: 2019

Country: International

Keywords: Domestic Violence

Shelf Number: 157089


Author: Walsh, John

Title: The Who's First-Ever Critical Review of Cannabis: A Mixture of Obvious Recommendations Deserving Support and Dubious Methods and Outcomes Requiring Scrutiny

Summary: The World Health Organization's (WHO) Expert Committee on Drug Dependence (ECDD or Expert Committee) released in January 2019 the outcomes of the first-ever critical review of cannabis, recommending a series of changes in the current scheduling of cannabis-related substances under the UN drug control conventions. Eagerly awaited, the ECDD recommendations contain some clearly positive points, such as acknowledging the medicinal usefulness of cannabis by removing it from Schedule IV of the 1961 Single Convention on Narcotics Drugs; clarifying that cannabidiol (CBD) is not under international control; and addressing some long-standing scheduling inconsistencies. But the ECDD recommendations also reveal problematic underlying evaluation methods and scheduling procedures along with a very questionable rationale for keeping cannabis in Schedule I. Moreover, the recommendations leave many questions unanswered regarding levels of control for different types of medical cannabis preparations. The potential repercussions of those more questionable aspects of the ECDD recommendations trigger legitimate concerns that merit a close examination by governments and by civil society. These concerns are heightened precisely because the recommendations result from the first-ever WHO critical review of cannabis. Allowing the questionable aspects of the recommendations to escape scrutiny risks not only accepting dubious scheduling recommendations now, but also risks acquiescing to problematic underlying evaluation methods and procedures. Governments should seriously consider their options for challenging these aspects of the review, since their acceptance now could set a damaging precedent for the future.

Details: Washington, DC: Washington Office on Latin America, 2019. 18p.

Source: Internet Resource: Accessed September 2, 2019 at: https://www.tni.org/files/publication-downloads/who-cannabis-wola_tni_gdpo-march_2019.pdf

Year: 2019

Country: International

Keywords: Cannabis

Shelf Number: 157092


Author: Ross, Hana

Title: A Critique of the ITIC/OE Asia-14 Illicit Tobacco Indicator 2013

Summary: The "Asia-14 Illicit Tobacco Indicator 2013" (Asia-14) report was published by the International Tax and Investment Center (ITIC) and Oxford Economics (OE) as a follow up to their previous attempt to estimate the scope and composition of illicit tobacco consumption in Asia presented in "Asia-11 Illicit Tobacco Indicator 2012" (Asia-11). Both reports were funded by Philip Morris International. The new report claims to take advantage of newly available data and improved methodology and covers all 10 ASEAN member nations plus Australia, Hong Kong, Pakistan, and Taiwan. Similarly to the 2012 report, the Asia-14 report fails to provide scientifically sound and unbiased information to policy makers and other tobacco market stakeholders. The reason for this is simple. The figures and statistics it reports are products of either incorrect or unverified/unverifiable estimation methods applied to often questionable data from multiple sources that do not blend. The results are not comparable across countries and are inconsistent with results of other studies. As was true for the prior Asia-11 Report, the reliance on potentially biased data, combined with the lack of transparency about methods employed, results in a study whose estimates are of questionable value. We would caution any stakeholders against relying on this report when assessing the trade in illicit cigarettes in their country or in the region.

Details: Cape Town, South Africa: University of Cape Town, 2015. 29p.

Source: Internet Resource: Accessed September 2, 2019 at: https://seatca.org/dmdocuments/Asia%2014%20Critique_Final_20May2015.pdf

Year: 2015

Country: International

Keywords: Illicit Cigarettes

Shelf Number: 157099


Author: Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES)

Title: Status of Elephant Populations, Levels of Illegal Killing and the Trade in Ivory: A Report to the CITES Standing Committee

Summary: Resolution Conf. 10.10 (Rev. CoP17) on Trade in elephant specimens, in paragraph 11, directs the Secretariat, pending the necessary external funding, to: (a) report on information and analyses provided by MIKE (by the CITES Secretariat)and ETIS (by TRAFFIC)..., subject to the availability of adequate new MIKE or ETIS data, at relevant meetings of the Standing Committee; and (b) prior to relevant meetings of the Standing Committee, invite the United Nations Environment Programme World Conservation Monitoring Centre (UNEP-WCMC) to provide an overview of trade in elephant specimens as recorded in the CITES database; the IUCN Species Survival Commission (IUCN/SSC) African and Asian Elephant Specialist Groups to submit any new and relevant information on the conservation status of elephants, pertinent conservation actions and management strategies; and African elephant range States to provide information on progress made in the implementation of the African Elephant Action Plan. On the basis of the information specified above, the Secretariat is to recommend actions for consideration by the Conference of the Parties or the Standing Committee.

Details: Geneva, Switzerland: CITES Secretariat, 2017. 31p.

Source: Internet Resource: Accessed September 2, 2019 at: https://conservationaction.co.za/resources/reports/status-elephant-populations-levels-illegal-killing-trade-ivory-report-cites-standing-committee/

Year: 2017

Country: International

Keywords: Elephant Poaching

Shelf Number: 158103


Author: Interpol

Title: Operation Opson VII: Analysis Report

Summary: KEY ELEMENTS: - 67 countries, among them 24 EU Member States (MS) participated in Operation OPSON VII. As a comparison, 65 countries took part in OPSON VI. This year, 22 private partners supported OPSON VII. - According to the results reported by countries, almost 3,950 tons, 9.7 million liters and almost 14.5 million pieces of potentially harmful food and beverages were withdrawn from the markets. Converted in tons, these quantities represent a total of 19,358 tons. - The value of the illicit food products seized is estimated at approximately 78.5 million USD (67.5 million EUR). - Considering quantities of products seized, alcohol was the most seized product during OPSON VII. - By value, meat and meat products represent the first category of seized goods, with seizures estimated at more than 32 million USD (27.5 million EUR). - Participating countries reported 41,293 inspections and checks, 3,029 criminal cases, 3,201 administrative cases, 3,325 arrests warrants and 713 search warrants executed. - Sixty-six organized crime groups involved in the production of illicit food, goods smuggling as well as other criminal deeds were disrupted. - Seventy-four illicit factories have been dismantled, 71 of which produced alcohol, two manufactured substandard food supplements and medicines and one illegally produced in the same premises food products, cosmetics and pesticides. - Regarding side seizures, during OPSON VII, the participants seized around 10.6 million pieces and more than 80 tons of illicit products, evaluated at approximately 10 million USD (8.6 million EUR). Amongst the most notable side seizures were: smuggled cigarettes, car spare parts and lubricants, pharmaceutical products, clothes and shoes, mobile phones, toys as well as fuel. Firearms and ammunitions were also seized.

Details: The Hague: Interpol, 2018. 59p.

Source: Internet Resource: Accessed September 2, 2019 at: https://www.europol.europa.eu/publications-documents/operation-opson-vii-analysis-report

Year: 2018

Country: International

Keywords: Consumer Protection

Shelf Number: 158105


Author: Olson, Eric L.

Title: What If They Return?: How El Salvador, Honduras, and the United States Could Prepare for an Effective Reintegration of TPS Beneficiaries

Summary: An estimated 332,000 immigrants from El Salvador and Honduras are at risk of losing their legal status in the United States over the next year, and hundreds of thousands of their U.S. citizen children may also be affected directly or indirectly depending on the fate of their parents. Their future in the United States depends on whether their Temporary Protected Status (TPS) is extended, reformed, or terminated. The purpose of this paper is to suggest possible policy approaches El Salvador, Honduras, and the United States could pursue to incentivize the return and effective reintegration of TPS beneficiaries who either choose to return or are required to do so when the program is ended. It is based on the findings of studies and workshops in each country that seek to define the barriers to return and assess existing capacities within each country to receive and reintegrate those who are returning after an average of twenty years away. Furthermore, we seek to identify the kinds of policies that the governments of El Salvador and Honduras could adopt to incentivize the return of TPS beneficiaries and that would make the reintegration process successful. If policies are adequately defined and carried out, we assume a reduction in revolving door migration from the region. Additionally, fully reintegrated TPSers can make a positive contribution to the development and well-being of their country. Additional assumptions include the likelihood that only a fraction of current beneficiaries will return to their countries of origin should the TPS program be discontinued. For many, the challenges of leaving behind their communities, employment, families, and future dreams will be unbearable. It is reasonable to assume that those with options to adjust their legal status - possibly through U.S. citizen family members - will do so. Those that do not have legal options will likely leave for a third country - like many Haitians have done by leaving for Canada - or they will fade into the shadows with no legal status once TPS is terminated. Given the risks and uncertainties associated with moving to a third country or reverting to an undocumented status, creating incentives to return to their homelands is an important alternative. Another assumption is that TPS recipients have benefited significantly from the 17 to 20 years of legal status they have enjoyed in the United States. During this time, they have developed significant employment skills, increased their educational levels, purchased homes, become entrepreneurs, and gained access to capital. Documented status has enabled them to take advantage of the opportunities afforded by the United States economy, education and healthcare systems and, thus, many TPS beneficiaries find themselves in an advantageous position when compared to their compatriots with no legal status. As such, TPS recipients have resources and skills at their disposal that could potentially make reintegration to their countries of origin more successful and may, in fact, represent an important opportunity for development in both El Salvador and Honduras. In the following paragraphs we will review the current status of Salvadoran and Honduran beneficiaries of TPS in the United States; summarize what is known about their socio-economic situation; review possible barriers to their effective return and reintegration to their countries of origin; assess what governmental programs and resources might be available to help with reintegration; and suggest possible policy approaches all three countries could pursue to incentivize a return and effective reintegration. It is our conclusion that failure to take seriously the factors shaping decisions TPS beneficiaries will be forced to make if the program is terminated, and failure to consider policy options that incentivize effective reintegration will lead most to opt for becoming undocumented immigrants in the United States and, in cases where individuals are forced to return, simply further the immigration revolving door or result in new push factors for additional migration.

Details: Seattle, Washington: Seattle International Foundation and Wilson Center, 2019. 32p.

Source: Internet Resource: Accessed September 2, 2019 at: https://www.wilsoncenter.org/sites/default/files/lap_olson_and_wachter.pdf

Year: 2019

Country: International

Keywords: Asylum Seekers

Shelf Number: 158107