The Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts tagged internet
Understanding and preventing internet-facilitated radicalisation

By Heather Wolbers, Christopher Dowling, Timothy Cubitt and Chante Kuhn

This paper reviews available research on how the internet facilitates radicalisation and measures to prevent it. It briefly canvasses evidence on the extent to which the internet contributes to radicalisation broadly, and who is most susceptible to its influence, before delving further into the mechanisms underpinning the relationship between the internet and violent extremism.

High-level approaches to combating internet-facilitated radicalisation, including content removal, account suspensions, reducing anonymity, and counternarrative and education campaigns, are mapped against these mechanisms. This illustrates how these approaches can disrupt radicalisation and assists researchers, policymakers and practitioners to identify potential gaps in existing counterterrorism and countering violent extremism regimes. Research on the implementation and outcomes of these approaches is also summarised.

Trends & issues in crime and criminal justice no. 673.  Canberra: Australian Institute of Criminology. 2023. 17p.

Dirty Data, Bad Predictions: How Civil rights violations Impact Police Data, Predictive Policing Systems. and Justice

By Rashida Richardson, Jason M. Schultz, and Kate Crawford

Law enforcement agencies are increasingly using predictive policing systems to forecast criminal activity and allocate police resources. Yet in numerous jurisdictions, these systems are built on data produced during documented periods of flawed, racially biased, and sometimes unlawful practices and policies (“dirty policing”). These policing practices and policies shape the environment and the methodology by which data is created, which raises the risk of creating inaccurate, skewed, or systematically biased data (“dirty data”). If predictive policing systems are informed by such data, they cannot escape the legacies of the unlawful or biased policing practices that they are built on. Nor do current claims by predictive policing vendors provide sufficient assurances that their systems adequately mitigate or segregate this data.

In our research, we analyze thirteen jurisdictions that have used or developed predictive policing tools while under government commission investigations or federal court monitored settlements, consent decrees, or memoranda of agreement stemming from corrupt, racially biased, or otherwise illegal policing practices. In particular, we examine the link between unlawful and biased police practices and the data available to train or implement these systems. We highlight three case studies: (1) Chicago, an example of where dirty data was ingested directly into the city’s predictive system; (2) New Orleans, an example where the extensive evidence of dirty policing practices and recent litigation suggests an extremely high risk that dirty data was or could be used in predictive policing; and (3) Maricopa County, where despite extensive evidence of dirty policing practices, a lack of public transparency about the details of various predictive policing systems restricts a proper assessment of the risks. The implications of these findings have widespread ramifications for predictive policing writ large. Deploying predictive policing systems in jurisdictions with extensive histories of unlawful police practices presents elevated risks that dirty data will lead to flawed or unlawful predictions, which in turn risk perpetuating additional harm via feedback loops throughout the criminal justice system. The use of predictive policing must be treated with high levels of caution and mechanisms for the public to know, assess, and reject such systems are imperative.

94 N.Y.U. L. REV. ONLINE 192 (2019), Available at SSRN: https://ssrn.com/abstract=3333423

Super Highway Robbery: Preventing e-commerce crime

By Ronald V. Clarke and Graeme R. Newman

This book analyzes the expanding crime opportunities created by the Internet and e-commerce, and it explains how concepts of crime prevention developed in other contexts can be effectively applied in this new environment. The authors note that the Internet and associated e-commerce constitute a lawless "wild frontier" where users of the Internet can anonymously exploit and victimize other users without a high risk of being detected, arrested, prosecuted, and punished. For acquisitive criminals who seek to gain money by stealing it from others, e-commerce through the Internet enables them to "hack" their way into bank records and transfer funds for their own enrichment. Computer programs that are readily available for download on the Web can be used to scan the Web for individual computers that are vulnerable to attack. By using the Internet addresses of other users or using another person's or organization's computers or computing environment, criminals can hide their trails and escape detection. After identifying the multiple opportunities for crime in the world of e-commerce, the book describes specific steps that can be taken to prevent e-commerce crime at particular points of vulnerability. The authors explain how two aspects of situational crime prevention can prevent Internet crime. This involves both a targeting of individual vulnerabilities and a broad approach that requires partnerships in producing changes and modifications that can reduce or eliminate criminal opportunities. The authors apply the 16 techniques of situational crime prevention to the points of vulnerability of the e-commerce system. The points of vulnerability are identified and preventive measures are proposed. In discussing the broad approach of institutionalized and systemic efforts to police e-commerce, the book focuses on ways to increase the risks of detection and sanctions for crime without undue intrusions on the freedom and privacy of legitimate Internet and e-commerce users.Links coming….

Devon, U.K. Willan Publishers. 2003. 224p.

Action Plan 2023: Our Internet, Our Future: Protecting the Internet for Today and Tomorrow

By Internet Society

From the introduction:

In 2023, we will:

  • Engage in at least 900 advocacy activities

  • Urge government officials to make pro-

    encryption statements at least 10 times

  • Encourage governments or press to reference Internet Society encryption-focused documents or statements at least 30 times

Internet Society.2023. 21p.