The Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts in Criminal Justice
Policing the Frontier

By Marco Gopfert

This book titled“Policing the Frontier: An Ethnography of Two Worlds in Niger”by Mirco Gopfert. is part of the seriesPolice/Worlds: Studies in Security, Crime, and Governance. It explores the topic of policing in rural Niger and examines thei nteraction between the police and the local communities. The book provides an ethnographic perspective on the challenges and complexities of policing in this context.

Cornell University Press, 2020, 175 pages

Assessing Shifts in U.S. Department of Homeland Security Targeted Violence Prevention Efforts Through Early 2022

By Caitlin McCullochBrian A. JacksonSameer M. SiddiqiJordan R. ReimerEmily Allendorf

The U.S. Department of Homeland Security (DHS) has changed and expanded its efforts in violence prevention in the past five years. DHS asked the Homeland Security Operational Analysis Center (HSOAC) to examine the change in efforts by the Center for Prevention Programs and Partnerships (CP3) and its predecessor organizations in preventing terrorism and other violence and explore options for CP3 moving forward.

In the United States, the full potential value of countering violent extremism (CVE) has never been realized because of key disconnects between the intent of CVE programs and the realities of their implementation. Although it might not have been the intent, efforts singled out and stigmatized American Muslim communities. The disconnect between stated intention and reality stimulated potent opposition to CVE as a concept. In response, the federal government decided to make significant changes in its approaches in this policy area. In late 2021, DHS asked HSOAC to examine and characterize the changes that had been made, providing an outside viewpoint on the extent of change and how those changes had responded to the concerns about CVE efforts. This report documents the researchers' approach, findings, and recommendations.

Key Findings

  • There has been enormous growth in CP3, and it is currently working on developing and standardizing the institutions and processes that are required to support a larger organization. These efforts include extensive standardization efforts in training and evaluation of CP3's work. Coronavirus disease 2019 (COVID-19) posed some problems, including making it difficult to create a cohesive whole with new personnel, but also presented some new opportunities, such as an increased ability to reach a diversity of stakeholders digitally.

  • CP3 and the government more broadly have made major shifts in the rhetorical framing of their work, toward a public health–informed approach, a framing that aligns more closely with the intent of their programs. Although there is still discussion of the implications of a public health–informed approach, this shift was reflected in both interviews and official documentation.

  • In line with this rhetorical shift is the expansion in the diversity of stakeholders, both in engagement and in grantees, including evidence of a shift away from criminal justice and security partners, although they remain important collaborators.

  • External stakeholders remain skeptical, but there are some signs of increasing trust in relevant actors outside government.

Recommendations

  • Continue efforts to build and sustain consistency in messages and activities. Many external stakeholders noted the importance of rebuilding trust and that sustainable and continuous actions and relationships were essential for fostering that trust.

  • Continue to codify and standardize internal office procedures—with rapid growth comes a renewed need for new internal institutions to keep all personnel on the same page.

  • More clearly define the elements of a public health–informed approach and how they will be applied to violence prevention for CP3 programs and outreach. There are many definitions present in practitioner circles and the academic literature; choosing one and fully exploring the implications of the definition will be key for aligning stated CP3 goals with programmatic action.

  • Invest further in program evaluation. The research team recognizes that it is difficult to evaluate effectiveness in this area, but, without standardized evaluation, supporting the impact of CP3 programs will be difficult.

  • Commit to transparency and external communication. Transparency in actions taken and evidence collected, as well as communication with skeptical audiences, will be key in showing change and growth in CP3 and its activities to external actors and in further building trust with external audiences.

Keeping Soft Targets and Crowded Places Safe from Mass-Casualty Attacks: Insights from a Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Soft targets and crowded places (ST-CPs) are easily accessible to large numbers of people and have limited security or protective measures in place, making them vulnerable to attack. Examples include sports arenas, shopping centers, schools, transportation systems, and houses of worship. Although attacks on them are relatively rare, they result in significant loss of life and contribute to an atmosphere of fear throughout society. Researchers performed a landscape assessment of the threat to and major vulnerabilities of ST-CPs, existing security measures and initiatives, and ways to improve allocation of security resources. The researchers then developed a road map for future investments and made recommendations for improving ST-CP security and response to attacks. These recommendations include research, development, test, and evaluation priorities to improve prevention and protection, such as seeking methods of deterring and dissuading would-be attackers, more evaluation of the effectiveness of security measures, and developing a model concept of operations for open and nonsecure spaces. In addition, they recommended funding and policy priorities focused on public education and training, providing additional resources to cross-organizational security teams and managers, and increasing funding for access control systems.

Key Findings

  • The most-common motivations for attacks are personal, followed by terrorism and extremism.

  • Education and private buildings are the most–frequently targeted types of ST-CPs.

  • Attacks on ST-CPs with large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, have the highest average lethality.

  • Layered security strategies, in which measures work together, improve the chance that an attack will be prevented, halted, or mitigated.

  • Tips from the public have prevented attacks. Public education on what to report and how, and support for threat assessment teams, would make tips more effective.

  • Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient but need to be trained on and maintained.

  • Bystanders and security have both stopped attacks. Groups of bystanders tackling shooters have been highly effective. Training can make responses even more effective.

  • Response command, control, and communications need to be improved. Alternatives to traditional, push-to-talk voice radio communications are needed.

  • Security measures need more effectiveness and efficiency evaluations. The security community has growing interest in artificial intelligence (AI); evaluations of security systems with AI will be needed as these systems deploy.

Recommendations

  • Find ways to deter and dissuade would-be attackers.

  • Develop indicators of and education about suspicious seeking of weapons.

  • Develop protocols and education for wellness checks.

  • Further evaluate the effectiveness and cost-effectiveness of security measures.

  • Develop a model concept of operations for open and nonsecure spaces, such as shopping malls and restaurants.

  • Continuously track and analyze mass-attack plots.

  • Review mass-shooting events to determine whether some ordinary criminal shootings should be treated as mass attacks on soft targets or crowded places.

  • Find ways to reduce the mass psychological effects of attacks, including societal fear and secondary trauma.

  • Focus on basics, such as provision and maintenance of access control equipment and public education campaigns on what to look for and how to report it.

  • Strengthen the system-based, layered security framework.

  • Ensure that funding and policy priorities reflect research findings.

  • Fund enhanced public education and training on what to report and how.

  • Provide additional funding to cross-organizational threat assessment teams and managers.

  • Fund enhanced public education and training on how to respond to an active attacker.

  • Provide additional funding to cross-organizational security teams and managers.

  • Fund and distribute updates of site security guidance documents and training.

  • Fund access control systems

Santa Monica, CA: RAND, 2024. 24p.

Improving the Security of Soft Targets and Crowded Places: A Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Attacks on soft targets and crowded places (ST-CPs) represent a significant challenge. The U.S. Department of Homeland Security requires research and development to assess methods for reducing the propensity and loss of life from these types of attacks. In response, researchers from the Homeland Security Operational Analysis Center conducted a comprehensive landscape assessment of the threat to ST-CPs and corresponding security measures. This assessment integrated literature reviews, attack plot analyses, grant data reviews, and security cost modeling to identify both needs for improvement and recommended research and investment priorities for addressing those needs.

The number of attack plots is broadly aligned with regional population counts. The most-common motivations for ST-CP attacks have been personal, followed by terrorist and extremist motivations. Education and private buildings (workplaces) are the most–frequently targeted types of ST-CPs. Attacks on ST-CPs that have large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, had the highest average lethality.

To defend ST-CPs, a layered approach has security measures work together to improve the chance that an attack will be stopped or mitigated. Prevention measures stop attacks before they reach execution; however, the public needs to know what warning signs to look for and how to report them, and threat assessment teams need to assess tips and follow up appropriately. Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient. Bystanders and security have both stopped attacks; groups of bystanders tackling shooters have been highly effective.

Key Findings

The conditions that a would-be attacker must fulfill to successfully execute a high-fatality attack are collectively the attack chain; interrupting that chain can prevent or reduce casualties

  • An attacker must carry out many steps to complete a high-fatality attack. The attacker must become fully committed, plan, acquire weapons and skills, and make other preparations without being detected and reported by others. Once on scene, the attacker must get through the site's security layers and engage a crowd without being stopped quickly.

  • A system-based, or layered, approach helps security measures work together to improve the chances that an attack will be stopped or mitigated at any of these steps, guarding against single points of failure.

  • Prevention measures are perhaps the most-important factors in interrupting the attack chain because they can and have halted many plots before they reached execution. Reports of warning signs have been key. However, the public must know what to look for and how, and authorities need threat assessment teams and training to assess tips and follow up appropriately.

  • Access and entry-control systems, including locks, secured windows, and secured entry spaces, have been effective and efficient in protecting against attackers.

  • Both bystanders and on-scene security have been effective in stopping attacks. Groups of bystanders tackling shooters have been highly effective in ending attacks.

    Recommendations

  • Seek methods for deterring and dissuading would-be attackers from becoming committed to plots.

  • Develop indicators and training to detect suspicious seeking of weapons and ammunition.

  • Develop enhancements to "see something, say something" campaigns.

  • Develop and evaluate campaigns to reduce hoax threats of violence.

  • Develop rules and processes for assessment, monitoring, and follow-up with reported threats, including processes for initial wellness checks.

  • Evaluate the effectiveness of site security technologies in stopping simulated attacks.

  • Study the social costs of security measures more.

  • Develop a model strategy for open and nonsecure spaces, such as parks, parking lots, shopping malls, and restaurants.

  • Improve command and control, leadership, and coordination during attack responses.

  • Study alternatives to traditional voice radio communications during attack responses.

  • Continuously track and analyze mass-attack plots.

  • Determine whether some ordinary criminal shootings should be treated as mass attacks on ST-CPs.

  • Seek ways to reduce the mass psychological impacts of attacks.

  • Support detailed tracking of grant spending related to ST-CP security.

  • Fund enhanced public education and training on what to report and how and on how to respond to an active attacker.

  • Provide funding to cross-organizational threat assessment teams, security teams, and managers, and provide training on how to report on and how to respond during an incident.

  • Fund access control systems.

  • Fund medical supplies and training to match updated medical standards.

Santa Monica, CA: RAND, 2024. 168p.

In defence of the decriminalisation of drug possession in the UK

ByAlex Stevens, Niamh Eastwood, and Kirstie Douse

In this review article, we develop the case for the decriminalisation of drug possession in the UK by describing our ‘modest proposal’ to repeal the relevant sections of the Misuse of Drugs Act 1971 and its advantages. We defend this proposal against possible critiques from both conservative and radical positions. On the conservative side, these criticisms include that it would increase drug use and harm and that it would be illegal under international law. From the more radical position, we anticipate the criticisms that decriminalisation of possession would leave the harm associated with illegal drug supply to continue, that it would leave in place restrictions on the rights to use drugs, that it would forego the possible tax income from a legally regulated market, and that the drug laws would continue to act as tools of social control. In response, we argue that decriminalisation offers a feasible first step towards reducing the harm of drug control which would not increase drug-related harm.

Drug Science, Policy and Law Volume 10: 1–10

2024 Report on the Cybersecurity Posture of the United States

UNITED STATES. EXECUTIVE OFFICE OF THE PRESIDENT; UNITED STATES. OFFICE OF THE NATIONAL CYBER DIRECTOR

From the document: "The '2024 Report on the Cybersecurity Posture of the United States' assesses the cybersecurity posture of the United States, the effectiveness of national cyber policy and strategy, and the status of the implementation of national cyber policy and strategy by Federal departments and agencies. Additionally, this report highlights cybersecurity threats and issues facing the United States, including new or emerging technologies that may affect national security, economic prosperity, and the rule of law. This is the first edition of the report and covers calendar year 2023, with additional consideration of developments in 2024 preceding the publication of this report. Over the past year, U.S. national cybersecurity posture improved, driven by steady progress towards the 2023 National Cybersecurity Strategy's (NCS) vision of a defensible, resilient, and values-aligned digital ecosystem achieved through fundamental shifts in the underlying dynamics that shape cyberspace. The Administration has successfully begun implementation of the NCS Implementation Plan, which coordinates actions by departments and agencies across the Federal Government to make the President's affirmative vision a reality. These initial implementation actions set the foundation for further investment and sustained commitment by stakeholders across the digital ecosystem."

United States. Executive Office of the President. United States. Office of the National Cyber Director. 2024. 37p.

Climate Security and Misinformation: A Baseline

ELLISON, TOM; HUGH, BRIGITTE

From the document: "Climate change and policy responses provide new opportunities for state and non-state actors to engage in mis- and disinformation across a wide range of scales and topics. Traditionally, analysis of climate change and misinformation has focused most on the problem of climate change denialism and politicization of emissions reductions. However, misinformation, disinformation peddling, and malign influence campaigns are increasing around a broader range of climate-related issues, such as blame for climate hazards, backlash to climate-driven displacement, disputes over clean energy policies, polarization over climate protests, and competition for influence in climate-vulnerable states. Such efforts have security implications across the political, economic and societal spheres, and warrant more holistic and proactive policy attention, drawing lessons from analogous efforts around the COVID-19 pandemic and security of elections. This report provides a baseline on the intersection of climate security risks and mis- and disinformation challenges."

CENTER FOR CLIMATE AND SECURITY. COUNCIL ON STRATEGIC RISKS. 2024. 14p.

National Drug Threat Assessment 2024

United States. Drug Enforcement Administration

From the document: "The 2024 NDTA [National Drug Threat Assessment] highlights the dangerous shift from plant-based drugs to synthetic drugs. This shift has resulted in the most dangerous and deadly drug crisis the United States has ever faced. These synthetic drugs, such as fentanyl and methamphetamine, are responsible for nearly all of the fatal drug poisonings in our nation. The Sinaloa and Jalisco Cartels are at the heart of this crisis. These two Cartels are global criminal enterprises that have developed global supply chain networks. They rely on chemical companies and pill press companies in China to supply the precursor chemicals and pill presses needed to manufacture the drugs. They operate clandestine labs in Mexico where they manufacture these drugs, and then utilize their vast distribution networks to transport the drugs into the United States. They rely on associates in the United States to distribute the drugs at a retail level on the streets and on social media. Finally, the Cartels utilize Chinese Money Laundering Organizations to move their profits from the United States back to Mexico. Drug trafficking organizations based in Mexico and South America are increasingly utilizing China based underground banking systems as their primary money laundering mechanism. In response to these threats, the DEA [Drug Enforcement Administration] has acted urgently to target the criminal networks responsible for the influx of synthetic drugs into the United States."

United States. Drug Enforcement Administration. 2024. 57p

Impact of darknet market seizures on opioid availability

By Roderic Broadhurst, Matthew Ball, Chuxuan Jiang, Joy Wang and Harshit Trivedi

Opioids, including the highly potent synthetic opioids fentanyl and carfentanil, are commonly sold on illicit cryptomarkets or Tor darknet markets. Data collected throughout 2019 from 12 large darknet markets that sold opioids enabled observation of the impact of law enforcement seizures and voluntary or scam market closures on the availability of fentanyl and other opioids.

Trends in opioid and fentanyl availability before and after law enforcement interventions indicate whether market operators and sellers are deterred and whether market closures lead to displacement, dispersal or substitution. Evidence of all of these outcomes was present in both descriptive and trend analyses, although most effects were short lived. Market closures, especially law enforcement seizures, reduced the availability of opioids, in particular fentanyl, as well as increasing prices and displacing vendors to other markets. Market closures also led vendors to substitute fentanyl for other opioids or other illicit drugs.

Research Report no. 18. Canberra: Australian Institute of Criminology, 2021. 73p.

Private Security and Public Police

By Ben Grunwald, John Rappaport and Michael Berg

Private security officers outnumber police by a wide margin, and the gap may be growing. As cities have claimed to defund the police, many have quietly expanded their use of private security, reallocating spending from the public to the private sector. It is difficult to know what to make of these trends, largely because we know so little about what private security looks like on the ground. On one prevalent view of the facts, a shift from public to private security would mean little more than a change of uniform, as the two labor markets are deeply intertwined. Indeed, academics, the media, popular culture, and the police themselves all tell us that private security is some amalgam of a police retirement community and a dumping ground for disgraced former cops. But if, instead, private officers differ systematically from the public police—and crossover between the sectors is limited—then substitution from policing to private security could drastically change who is providing security services.

We bring novel data to bear on these questions, presenting the largest empirical study of private security to date. We introduce an administrative dataset covering nearly 300,000 licensed private security officers in the State of Florida. By linking this dataset to similarly comprehensive information about public law enforcement, we have, for the first time, a nearly complete picture of the entire security labor market in one state. We report two principal findings. First, the public and private security markets are predominantly characterized by occupational segregation, not integration. The individuals who compose the private security sector differ markedly from the public police; they are, for example, significantly less likely to be white men. We also find that few private officers, roughly 2%, have previously worked in public policing, and even fewer will go on to policing in the future. Second, while former police make up a small share of all private security, roughly a quarter of cops who do cross over have been fired from a policing job. In fact, fired police officers are nearly as likely to land in private security as to find another policing job, and a full quarter end up in one or the other. We explore the implications of these findings, including intersections with police abolition and the future of policing, at the paper’s close.

Journal of Empirical Legal Studies, Forthcoming . U of Chicago, Public Law Working Paper No. 850. University of Chicago Coase-Sandor Institute for Law & Economics Research Paper No. 1004. Duke Law School Public Law & Legal Theory Series No. 2024-24

Law and Order in Sung China

MAY CONTAIN MARKUP

By Brian E. McKnight

FROM THE PREFACE: “In moving down through this nested hierarchy of organizational types, we reach one of the key steps at a level where the social units are distinct as unique cultural and political entities. What was peculiarly Byzantine, or peculiarly Chinese, about the perception of law-enforcement problems and responses and about the ways in which lawbreakers were treated? These attributes, which distinguish one such political entity from another, are simply parts of our definition of what it is to be Chinese or Byzantine or Roman. Such defining attributes evolve over time. The Chinese language has changed from the time of the Shang dynasty to today. However, the changes in these fundamental attributes are evolutionary, not revolutionary. Despite the ways in which it has changed, the Chinese language has remained the Chinese language..”

Cambridge University Press. 1992. 572p.

Police Custody in Ireland

Edited by Yvonne Daly

Police Custody in Ireland brings together experts from policing studies, law, criminology, and psychology, to critically examine contemporary police custody in Ireland, what we know about it, how it operates, how it is experienced, and how it might be improved. This first-of-its-kind collection focuses exclusively on detention in Garda Síochána stations, critically examining it from human rights and best practice perspectives. It examines the physical environment of custody, police interview techniques, existing protections, rights, and entitlements, and experiences of specific communities in custody, such as children, ethnic minorities, non-English speakers, the Mincéir/Traveller community, and those with intellectual disabilities or Autism Spectrum Disorder. Police Custody in Ireland gives a snapshot of garda custody as it is now and makes important recommendations for necessary future improvements. An accessible and compelling read, this book will be of interest to those engaged in policing and criminology, as well as related areas of interest such as human rights, youth justice and disability studies.

Abingdon, Oxon ; New York : Routledge, 2024. 363p.

The Strategies for Policing Innovation Initiative: Reflecting on 10 Years of Innovation

By Christopher M. Sun, James R. “Chip” Coldren, Jr.Keri RichardsonEmma Wohl

Law enforcement agencies continue to develop new and innovative strategies to better support and police the communities they serve, from integrating gunshot detection technologies into dispatch systems to improve response times during shootings, to collaborating with local health and social service organizations to address issues such as homelessness or substance abuse in comprehensively ways. Over the past 10 years, the Bureau of Justice Assistance (BJA), in partnership with the CNA Institute for Public Research (IPR), has supported law enforcement agencies across the country in implementing innovative policing approaches through the Strategies for Policing Innovation Initiative (SPI, formerly the Smart Policing Initiative). SPI supports not only the development and implementation of innovative policing strategies, but also the research partnerships that result in in-depth analyses and rigorous evaluations of these strategies to advance what is known about effective and efficient policing practices. This report examines SPI’s accomplishments since its inception in 2009 and explores some of the major themes across SPI initiatives in both policing and policing research, including the following:

  • Reductions in violent crime

  • Improved crime analysis capabilities in police agencies

  • Evolution of research partnerships with SPI sites

  • Collaborative partnerships with agencies, organizations, and community stakeholders

  • Integration of technology into policing

Arlington, VA: CNA, 2019. 20p.

Disorder policing to reduce crime: An updated systematic review and meta-analysis

By Anthony A. Braga, Cory Schnell, Brandon C. Welsh

Research Summary

Broken windows theory suggests that police can prevent serious crime by addressing social and physical disorder in neighborhoods. In many U.S. cities, recent increases in disorder, fear, and crime have initiated calls for an intensification of disorder policing efforts. Disorder policing programs can be controversial, with evaluations yielding conflicting results. Further, a growing number of descriptive analyses of aggressive order maintenance programs raise concerns over varied negative consequences, such as increased racial disparities in arrests of citizens. Systematic review and meta-analytic techniques were used to conduct an updated analysis of the effects of disorder policing on crime. Fifty-six eligible studies including 59 independent tests of disorder policing interventions were identified, representing almost twice the number included in the previous review. As part of the meta-analysis, new effect size metrics were used. The updated meta-analysis suggests that policing disorder strategies are associated with overall statistically significant crime reduction effects that spill over into surrounding areas. The strongest program effect sizes were generated by community and problem-solving interventions designed to change social and physical disorder conditions at crime hot spots. Conversely, aggressive order maintenance strategies did not generate significant crime reductions.

Policy Implications

The types of strategies used by police departments to address disorder seem to matter in controlling crime, and this holds important implications for police–community relations, justice, and crime prevention. Further research is needed to understand the key programmatic elements that maximize the capacity of these strategies to prevent crime.

Criminology & Public Policy. Early View, May 2024.

Nevada SafeVoice, Final Report

By Al Stein-Seroussi

Anonymous tip lines (sometimes referred to as Anonymous Reporting Systems or ARS) have been recommended as promising and viable approaches to prevent school violence (e.g., Schwartz et al., 2016) and are becoming a popular mechanism for school systems to elicit information from students about potentially harmful events that may occur on school campuses (Planty et al., 2018). A recent national review found that 51% of middle and high schools reported having tip lines (Planty et al., 2020) and that 15 states have codified the use of tip lines through state legislation (Gourdet et al, 2021). The tip lines allow students to report suspicious behaviors they observe or become aware of (e.g., weapons in schools and planned school attacks), health and mental health concerns about their peers or themselves (e.g., depression or suicidal ideation), and other threats to the safety and well-being of students (e.g., bullying, cyberbullying, and physical fights). The idea is that providing students with an anonymous or confidential tool to report potentially harmful events to trusted adults, will lead to the prevention of the events before they occur or the mitigation of events that are already occurring. Tip lines include three primary components believed to be critical for school and community safety: 1) a mechanism for reporting behaviors that have been observed by others; 2) a mechanism for sharing that information within the confines of the law; and 3) encouragement for reporting (Amman et al., 2017; Vossekuil et al., 2002).

Pacific Institute for Research and Evaluation (PIRE). 2003, 82pg

Participation in anti-authority protests and vulnerability to radicalisation

By Anthony Morgan,  Timothy Cubitt,  Isabella Voce

  • Using data from a large national survey of online Australians, we examined the presence of risk and protective factors for cognitive and behavioural radicalisation among individuals who participated in an anti-authority protest since early 2020.

  • Anti-authority protesters exhibited more risk factors and fewer protective factors for cognitive and behavioural radicalisation than other respondents, including people who had protested in support of other issues or movements. They were also more likely to justify violence in support of their cause and willing to support or participate in violent or unlawful behaviour on behalf of their group.

  • These findings show that people who participated in anti-authority protests were more vulnerable to radicalisation compared with other protestors and non-protestors. The results have implications for responding to protest movements that promote anti-government sentiment, that spread disinformation and that are exploited by malicious actors.

  • AIC Research Report 31

Canberra: Australian Institute of Criminology, 2024. 62p.

Policing WorldPride: gatekeepers at the festival turnstiles

By Vicki Sentas, Louise Boon-Kuo  & Justin R. Ellis

The violent and contested overpolicing of LGBTQI+ communities at Sydney’s Gay and Lesbian Mardi Gras has a long and visible history which has been amplified through intensified drug policing over the last two decades. This article scrutinises police practices during Sydney WorldPride events in February and March 2023, which included Mardi Gras events. It draws on a unique data set drawn from the NSW Police Force and an independent legal observer initiative, ‘Fair Play’, that provided support for policed people at WorldPride. We ask: What do police practices tell us about the exercise of police power over LGBTQI+ people at WorldPride? Our study found intensive and aggressive high-visibility policing characterised by invasive questioning and drug detection dog patrols, and humiliating and potentially unlawful searches. The impacts illustrate how policing criminalises and gatekeeps belonging to sexual and gender-diverse communities.

Current Issues in Criminal Justice, 1–17.2024.

Bombs, Bugs, Drugs, and Thugs: Intelligence and America's Quest for Security

By Loch K. Johnson

Recent years have seen numerous books about the looming threat posed to Western society by biological and chemical terrorism, by narcoterrorists, and by the unpredictable leaders of rogue nations. Some of these works have been alarmist. Some have been sensible and measured. But none has been by Loch Johnson.

Johnson, author of the acclaimed Secret Agencies and "an experienced overseer of intelligence" (Foreign Affairs), here examines the present state and future challenges of American strategic intelligence. Written in his trademark style--dubbed "highly readable" by Publishers Weekly--and drawing on dozens of personal interviews and contacts, Johnson takes advantage of his insider access to explore how America today aspires to achieve nothing less than "global transparency," ferreting out information on potential dangers in every corner of the world.

And yet the American security establishment, for all its formidable resources, technology, and networks, currently remains a loose federation of individual fortresses, rather than a well integrated "community" of agencies working together to provide the President with accurate information on foreign threats and opportunities. Intelligence failure, like the misidentified Chinese embassy in Belgrade accidentally bombed by a NATO pilot, is the inevitable outcome when the nation's thirteen secret agencies steadfastly resist the need for central coordination.

Ranging widely and boldly over such controversial topics as the intelligence role of the United Nations (which Johnson believes should be expanded) and whether assassination should be a part of America's foreign policy (an option he rejects for fear that the U.S. would then be cast not only as global policeman but also as global godfather), Loch K. Johnson here maps out a critical and prescriptive vision of the future of American intelligence.

New York; London: NYU Press, 2002. 298p.

Shutting Down the Streets: Political Violence and Social Control in the Global Era

By Luis A. Fernandez , Amory Starr and Christian Scholl

Recently, a wall was built in eastern Germany. Made of steel and cement blocks, topped with razor barbed wire, and reinforced with video monitors and movement sensors, this wall was not put up to protect a prison or a military base, but rather to guard a three-day meeting of the finance ministers of the Group of Eight (G8). The wall manifested a level of security that is increasingly commonplace at meetings regarding the global economy. The authors of Shutting Down the Streets have directly observed and participated in more than 20 mass actions against global in North America and Europe, beginning with the watershed 1999 WTO meetings in Seattle and including the 2007 G8 protests in Heiligendamm. Shutting Down the Streets is the first book to conceptualize the social control of dissent in the era of alter globalization. Based on direct observation of more than 20 global summits, the book demonstrates that social control is not only global, but also preemptive, and that it relegates dissent to the realm of criminality. The charge is insurrection, but the accused have no weapons. The authors document in detail how social control forecloses the spaces through which social movements nurture the development of dissent and effect disruptive challenges.

New York; London: NYU Press, 2011. 224p.

Policing Pleasure: Sex Work, Policy, and the State in Global Perspective

By Susan Dewey and Patty Kelly

Mónica waits in the Anti-Venereal Medical Service of the Zona Galactica, the legal, state-run brothel where she works in Tuxtla Gutiérrez, Mexico. Surrounded by other sex workers, she clutches the Sanitary Control Cards that deem her registered with the city, disease-free, and able to work. On the other side of the world, Min stands singing karaoke with one of her regular clients, warily eyeing the door lest a raid by the anti-trafficking Public Security Bureau disrupt their evening by placing one or both of them in jail.

Whether in Mexico or China, sex work-related public policy varies considerably from one community to the next. A range of policies dictate what is permissible, many of them intending to keep sex workers themselves healthy and free from harm. Yet often, policies with particular goals end up having completely different consequences.

Policing Pleasure examines cross-cultural public policies related to sex work, bringing together ethnographic studies from around the world—from South Africa to India—to offer a nuanced critique of national and municipal approaches to regulating sex work. Contributors offer new theoretical and methodological perspectives that move beyond already well-established debates between “abolitionists” and “sex workers’ rights advocates” to document both the intention of public policies on sex work and their actual impact upon those who sell sex, those who buy sex, and public health more generally.

New York; London: NYU Press, 2011. 240p.