Open Access Publisher and Free Library
CRIME+CRIMINOLOGY.jpeg

CRIME

Violent-Non-Violent-Cyber-Global-Organized-Environmental-Policing-Crime Prevention-Victimization

Posts tagged security
Voting System Security Measures

By: US Election Assistance Commission

The security of voting systems is essential to a trustworthy election. Every state and local jurisdiction utilizes common-sense procedures and tools to safeguard the voting process. Common best practices include using locks, tamper-evident seals, security cameras, system testing before and after elections, audits, and physical and cybersecurity access controls. This guide outlines some of the many best practices local election officials follow to secure voting systems through an election cycle. It's important to note this is a broad list of common security measures and procedures to protect the integrity of an election. The types of security measures may vary based on the voting systems in use in state and local jurisdictions.

United States. Election Assistance Commission, Oct 2024

Dangerous Waters: The Economic Toll of Piracy on Maritime Shipping

By Renato Molina, Juan Carlos Villaseñor-Derbez, Gavin McDonald, Grant McDermott

Maritime transport has been historically susceptible to piracy. While broad assessments suggest the impact of modern piracy causes large economic losses, the literature lacks quantification of the magnitude of the costs and the behavioral responses that underpin them. Here, we combine theory and a unique geospatial dataset combining more than 25 million shipping voyages and thousands of pirate encounters across the globe to find that pirate encounters lead to significant and costly avoidance measures. Shippers modify their path along a route to avoid locations with known pirate encounters. This increases voyage distance and duration, which lead to significant increases in fuel and labor costs estimated to be over US$1.5 billion/year. Additionally, emission of CO2, NOx, and SOx due to increased fuel consumption results in environmental damages valued at US$5.1 billion per year. Together, our results provide the first global estimates linking the presence of pirates to individual behaviour and aggregate transportation cost, as well as its environmental impact, with major implications for the shipping industry and maritime security at a global scale.

CESifo Working Paper No. 11077, Munich: Munich Society for the Promotion of Economic Research - CESifo , 2024. 72p.

Path-Dependent Criminality: Criminal Governance after the Paramilitary Demobilization in Cali and Medellín

By Angélica Durán-Martínez

Objective/context: After the paramilitary demobilization in Colombia, Cali and Medellín—major cities with a long history of political and criminal violence—saw a decline in violence despite the continuing operation of criminal groups. Yet, while Cali remained more violent than the national average, with criminal groups displaying less ability to regulate local affairs and security, Medellín became less violent than the national average and criminal groups engaged in more intensive governance. Methodology: I compare these cities using case studies constructed through fieldwork and interviews with security officials, NGO and social leaders, and former members of groups, drawing on my long-term, ongoing research engagement in both locations. Conclusions: The contrast between these cities exemplifies varied manifestations of post-conflict criminality. I argue that this variation in criminal governance is connected to the wartime balance of power, specifically, the level of territorial control and political connections armed groups had before the demobilization. Where control and political connections of paramilitary before demobilization were high, post-conflict crime groups were more likely to engage in governance behaviors. By contrast, disputed territories during wartime were likely to experience less criminal governance. Drawing on path dependence ideas, I introduce an overlooked mechanism through which wartime orders affect criminal behavior: learning processes inside and outside criminal groups. Originality: I show that to fully understand post-conflict criminality, it is crucial to consider armed actors peripherally involved in the war but essential for territorial control, whereas to understand criminal governance, the mid-ranks of armed groups and learning processes are crucial.

Revista Colombia Internacional ,2024. 35p.

Futureproof: Security Aesthetics and the Management of Life

Editor(s): D. Asher Ghertner, Hudson McFann, Daniel M. Goldstein

Security is a defining characteristic of our age and the driving force behind the management of collective political, economic, and social life. Directed at safeguarding society against future peril, security is often thought of as the hard infrastructures and invisible technologies assumed to deliver it: walls, turnstiles, CCTV cameras, digital encryption, and the like. The contributors to Futureproof redirect this focus, showing how security is a sensory domain shaped by affect and image as much as rules and rationalities. They examine security as it is lived and felt in domains as varied as real estate listings, active-shooter drills, border crossings, landslide maps, gang graffiti, and museum exhibits to theorize how security regimes are expressed through aesthetic forms. Taking a global perspective with studies ranging from Jamaica to Jakarta and Colombia to the U.S.-Mexico border ;Futureproof expands our understanding of the security practices, infrastructures, and technologies that pervade everyday life.

Contributors: Victoria Bernal, Jon Horne Carter, Alexandra Demshock, Zaire Z. Dinzey-Flores, Didier Fassin, D. Asher Ghertner, Daniel M. Goldstein, Rachel Hall, Rivke Jaffe, Ieva Jusionyte, Catherine Lutz, Alejandra Leal Martínez, Hudson McFann, Limor Samimian-Darash, AbdouMaliq Simone, Austin Zeiderman

Durham, NC: Duke University Press, 2020. 312p.

Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

By John Kleinig, Peter Mameli, Seumas Miller, Douglas Salane and Adina Schwartz

This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal democracies, namely, security and privacy. Both values are essential to individual liberty, but they come into conflict in times when civil order is threatened, as has been the case from late in the twentieth century, with the advent of global terrorism and trans-national crime. We seek to articulate legally sustainable, politically possible, and technologically feasible, global ethical standards for identity management technology and policies in liberal democracies in the contemporary global security context. Although the standards in question are to be understood as global ethical standards potentially to be adopted not only by the United States, but also by the European Union, India, Australasia, and other contemporary liberal democratic states, we take as our primary focus the tensions that have arisen between the United States and the European Union.

Canberra: ANU Press, 2011. 304p.

Mitigating Risk: A Delphi Study Identifying Competencies in Sport and Event Security Management

By Elizabeth Burke Voorhees

The purpose of this study was to identify core competencies for supervisory-level security management professionals working in the sports and entertainment industry. Qualified and trained sport and event security-management professionals are essential to support the U.S. homeland security objectives outlined in Presidential Policy Directive21. Providing effective safety and security for sports and entertainment events requires specialized knowledge and skill on the behalf of security-management practitioners who detect, deter, prevent, and respond to potential risks and threats. This qualitative research study employed a Delphi research design to elicit expertise from a purposefully selected panel of experts (N = 36). The expert panel suggested a list of competencies in Delphi round one and rated each competency statement based on level of importance and frequency using a 5-point Likert scale. The expert panel produced 136 core competencies in seven clusters: Risk Management, Emergency Planning, Problem Solving and Decision Making, Leadership, Communication, Building Collaborative Relationships, and Human Resource Management. Twenty-nine panelists successfully completed all three rounds of the Delphi study yielding a 93.5% response rate. Sport and event security management professionals and industry stakeholders can use the validated list of competencies to develop human capital and improve performance though the strategic application of human resource management,

Hattiesburg, MS: University of Southern Mississippi, 2010. 247p.

Bribery and Extortion: Undermining Business, Governments, and Security

By Alexandra Addison Wrage

Bribery plays a significant role in international criminal activity. Terrorists pay bribes. Money-launderers pay bribes. Those who traffic in people, narcotics, and illegal arms pay bribes. People pay immigration officers not to ask, customs officials not to inspect, and police officers not to investigate. Bribes follow patterns that are not at all mysterious to the officials, salesmen, and citizens who seek them and pay them. Using a series of international cases, Wrage examines bribery, peeling back the mystique and ambiguity and exposing the very simple transactions that lie beneath. She shows how these seemingly everyday transactions can affect security, democratization, and human aid. Examples from around the world help to illustrate the nature of the problem and efforts at combating it.Bribery plays a significant role in international criminal activity. Terrorists pay bribes. Money-launderers pay bribes. Those who traffic in people, narcotics, and illegal arms pay bribes. People pay immigration officers not to ask, customs officials not to inspect, and police officers not to investigate. At corporate headquarters in the United States, it can be easy to dismiss modest bribes in distant countries as an unfortunate cost of doing business. Bribes follow patterns that are not at all mysterious to the officials, salesmen, and citizens who seek them and pay them. Using a series of international cases, Wrage examines bribery, peeling back the mystique and ambiguity and exposing the very simple transactions that lie beneath. She shows how these seemingly everyday transactions can affect security, democratization, and human aid around the globe.Bribery and Extortion presents a clear picture of the world of bribery and the havoc it can wreak on whole populations. Wrage covers commercial bribery, administrative and service-based bribery, and extortion. She considers bribery and extortion at both high levels of government and lower levels on the street. Examples from around the world help to illustrate the nature of the problem and efforts at combating it. The book concludes with practical suggestions and an assessment of current efforts to stem the tide of bribery and restore transparency to everyday transactions in all realms.

Westport, CT: Praeger Security International, 2007. 177p.

Downstream Oil Theft: Implications and Next Steps

By Ian M. Ralby

On January 13, 2017, the Atlantic Council launched a major study on downstream oil theft at its inaugural Global Energy Forum in Abu Dhabi, United Arab Emirates. The present analysis draws on that launch event to examine the implications of the Downstream Oil Theft: Global Modalities, Trends, and Remedies report findings, and to suggest tangible next steps in both further investigating this global scourge and beginning to confront it effectively. The panel, moderated by Ambassador Richard Morningstar, the Atlantic Council Global Energy Center’s chairman, included the lead author of the report, Dr. Ian Ralby, a nonresident senior fellow of the center and chief executive officer (CEO) of I.R. Consilium; Éric Besson, former minister of industry, energy, and digital economy for the Republic of France; Dr. John Gannon, former Central Intelligence Agency deputy director for intelligence and chairman of the US National Intelligence Council; and Kola Karim, CEO of Shoreline Energy, an oil company in Nigeria. Though the panelists’ comments form a starting point for this analysis, they do not constitute the sole basis for this report. The implications of the study are extensive and point to a wide range of challenges, but six areas stand out as encompassing the most significant consequences of illicit downstream hydrocarbons activity: 1. The Energy Industry 2. Security, Terrorism, and Law Enforcement 3. The Environment 4. Finance and Economics 5. Politics and Policy 6. International Relations The present analysis focuses on the implications of the study for these six areas

Washington, DC: Atlantic Council, 2017. 15p.

La Familia Drug Cartel: Implications for U.S.-Mexican Security

By George W. Grayson

La Familia Michoacana burst onto the national stage on September 6, 2006, when ruffians crashed into the seedy Sol y Sombra nightclub in Uruapan, Michoacán, and fired shots into the air. They screamed at the revelers to lie down, ripped open a plastic bag, and lobbed five human heads onto the beer-stained black and white dance floor. The day before these macabre pyrotechnics, the killers seized their prey from a mechanic’s shop and hacked off their heads with bowie knives while the men writhed in pain. “You don’t do something like that unless you want to send a big message,” said a U.S. law-enforcement official, speaking on condition of anonymity about an act of human depravity that would “cast a pall over the darkest nooks of hell.” The desperados left behind a note hailing their act as “divine justice,” adding that: "The Family doesn't kill for money; it doesn't kill women; it doesn't kill innocent people; only those who deserve to die, die. Everyone should know . . . this is divine justice.” While claiming to do the “Lord’s work,” the ruthless leaders of this syndicate have emerged as the dominant exporter of methamphetamines to the United States, even as they control scores of municipalities in Michoacán and neighboring states.

Carlisle, PA: U.S. Army War College Press, 2010. 128p.

Contemporary Criminological Issues: Moving Beyond Insecurity and Exclusion

Edited by Carolyn Côté-Lussier, David Moffette, and Justin Piché.

Contemporary Criminological Issues tackles some of today’s most pressing social issues, from the criminalization of Indigenous peoples to interpersonal violence, border control, and armed conflicts. This book advances cutting-edge theories and methods, with the aim of moving beyond the scholarship that reproduces insecurity and exclusion. The breadth of approaches encompasses much of the current critical criminological scholarship, serving as a counterpoint to the growth of managerial and administrative criminologies and the rise of explicitly exclusionary and punitive state policies and practices with respect to ‘crime’ and ‘security.’ This edited collection featuring two books, one in English and one in French, includes important contributions to knowledge and public policy by eminent experts and emerging scholars.

Ottawa: University of Ottawa Press, 2020. 322p.