Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts tagged crowd control
Improving the Security of Soft Targets and Crowded Places: A Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Attacks on soft targets and crowded places (ST-CPs) represent a significant challenge. The U.S. Department of Homeland Security requires research and development to assess methods for reducing the propensity and loss of life from these types of attacks. In response, researchers from the Homeland Security Operational Analysis Center conducted a comprehensive landscape assessment of the threat to ST-CPs and corresponding security measures. This assessment integrated literature reviews, attack plot analyses, grant data reviews, and security cost modeling to identify both needs for improvement and recommended research and investment priorities for addressing those needs.

The number of attack plots is broadly aligned with regional population counts. The most-common motivations for ST-CP attacks have been personal, followed by terrorist and extremist motivations. Education and private buildings (workplaces) are the most–frequently targeted types of ST-CPs. Attacks on ST-CPs that have large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, had the highest average lethality.

To defend ST-CPs, a layered approach has security measures work together to improve the chance that an attack will be stopped or mitigated. Prevention measures stop attacks before they reach execution; however, the public needs to know what warning signs to look for and how to report them, and threat assessment teams need to assess tips and follow up appropriately. Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient. Bystanders and security have both stopped attacks; groups of bystanders tackling shooters have been highly effective.

Key Findings

The conditions that a would-be attacker must fulfill to successfully execute a high-fatality attack are collectively the attack chain; interrupting that chain can prevent or reduce casualties

  • An attacker must carry out many steps to complete a high-fatality attack. The attacker must become fully committed, plan, acquire weapons and skills, and make other preparations without being detected and reported by others. Once on scene, the attacker must get through the site's security layers and engage a crowd without being stopped quickly.

  • A system-based, or layered, approach helps security measures work together to improve the chances that an attack will be stopped or mitigated at any of these steps, guarding against single points of failure.

  • Prevention measures are perhaps the most-important factors in interrupting the attack chain because they can and have halted many plots before they reached execution. Reports of warning signs have been key. However, the public must know what to look for and how, and authorities need threat assessment teams and training to assess tips and follow up appropriately.

  • Access and entry-control systems, including locks, secured windows, and secured entry spaces, have been effective and efficient in protecting against attackers.

  • Both bystanders and on-scene security have been effective in stopping attacks. Groups of bystanders tackling shooters have been highly effective in ending attacks.

    Recommendations

  • Seek methods for deterring and dissuading would-be attackers from becoming committed to plots.

  • Develop indicators and training to detect suspicious seeking of weapons and ammunition.

  • Develop enhancements to "see something, say something" campaigns.

  • Develop and evaluate campaigns to reduce hoax threats of violence.

  • Develop rules and processes for assessment, monitoring, and follow-up with reported threats, including processes for initial wellness checks.

  • Evaluate the effectiveness of site security technologies in stopping simulated attacks.

  • Study the social costs of security measures more.

  • Develop a model strategy for open and nonsecure spaces, such as parks, parking lots, shopping malls, and restaurants.

  • Improve command and control, leadership, and coordination during attack responses.

  • Study alternatives to traditional voice radio communications during attack responses.

  • Continuously track and analyze mass-attack plots.

  • Determine whether some ordinary criminal shootings should be treated as mass attacks on ST-CPs.

  • Seek ways to reduce the mass psychological impacts of attacks.

  • Support detailed tracking of grant spending related to ST-CP security.

  • Fund enhanced public education and training on what to report and how and on how to respond to an active attacker.

  • Provide funding to cross-organizational threat assessment teams, security teams, and managers, and provide training on how to report on and how to respond during an incident.

  • Fund access control systems.

  • Fund medical supplies and training to match updated medical standards.

Santa Monica, CA: RAND, 2024. 168p.

Participation in anti-authority protests and vulnerability to radicalisation

By Anthony Morgan,  Timothy Cubitt,  Isabella Voce

  • Using data from a large national survey of online Australians, we examined the presence of risk and protective factors for cognitive and behavioural radicalisation among individuals who participated in an anti-authority protest since early 2020.

  • Anti-authority protesters exhibited more risk factors and fewer protective factors for cognitive and behavioural radicalisation than other respondents, including people who had protested in support of other issues or movements. They were also more likely to justify violence in support of their cause and willing to support or participate in violent or unlawful behaviour on behalf of their group.

  • These findings show that people who participated in anti-authority protests were more vulnerable to radicalisation compared with other protestors and non-protestors. The results have implications for responding to protest movements that promote anti-government sentiment, that spread disinformation and that are exploited by malicious actors.

  • AIC Research Report 31

Canberra: Australian Institute of Criminology, 2024. 62p.

Shutting Down the Streets: Political Violence and Social Control in the Global Era

By Luis A. Fernandez , Amory Starr and Christian Scholl

Recently, a wall was built in eastern Germany. Made of steel and cement blocks, topped with razor barbed wire, and reinforced with video monitors and movement sensors, this wall was not put up to protect a prison or a military base, but rather to guard a three-day meeting of the finance ministers of the Group of Eight (G8). The wall manifested a level of security that is increasingly commonplace at meetings regarding the global economy. The authors of Shutting Down the Streets have directly observed and participated in more than 20 mass actions against global in North America and Europe, beginning with the watershed 1999 WTO meetings in Seattle and including the 2007 G8 protests in Heiligendamm. Shutting Down the Streets is the first book to conceptualize the social control of dissent in the era of alter globalization. Based on direct observation of more than 20 global summits, the book demonstrates that social control is not only global, but also preemptive, and that it relegates dissent to the realm of criminality. The charge is insurrection, but the accused have no weapons. The authors document in detail how social control forecloses the spaces through which social movements nurture the development of dissent and effect disruptive challenges.

New York; London: NYU Press, 2011. 224p.

The Use of Less-Lethal Weapons in South African Prisons and Crowd Management

By David Bruce

What are the weapons used in the policing of protests and in prisons in South Africa? Focusing on less-lethal weapons (LLWs) this monograph provides an in-depth look at the weapons provided to prison warders and public order police. The monograph is based on documentary sources, press reports and interviews with DCS officials, JICS officials and others. The primary focus is on the period 2013–2018.

Pretoria, South Africa: Institute for Security Studies, 2019.