The Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts tagged security
DHS Innovation, Research & Development Strategic Plan: Fiscal Years 2024-2030

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY

From the document: "Protecting our nation requires timely responses to rapidly evolving dangers while protecting against longer-term homeland security threats and hazards. To meet these complex operational needs, innovation, research and development (IRD) initiatives and investments are critical to ensure the Department of Homeland Security (DHS) has the tools to help secure our nation. [...] While historically DHS has supported research and development (R&D), investments in innovation are newer and growing in scope and number across all DHS Components, whether through technological improvements or process efficiencies. The combination of these innovation and R&D investments will benefit from increased awareness and coordination. The Secretary's Calendar Year (CY) 2023 priorities captured this, seeking to 'ensure R&D across the Department and with external partners are coordinated and integrated.' To accomplish this goal, this coordinated DHS IRD Strategic Plan focuses on current efforts and longer-term Departmental investments. The Plan also highlights complementary efforts underway across the HSE [homeland security enterprise], consisting of federal, state, local, tribal, territorial, nongovernmental, and private sector entities, as well as individuals, families, and communities who share a common national interest in the safety and security of the United States and its people. The Plan inventories current and future IRD efforts within DHS, organized by the DHS Missions and Objectives as articulated in the third 'Quadrennial Homeland Security Review (2023).' By capturing these initiatives in a comprehensive plan, the Department can identify cross-cutting IRD themes that provide opportunities for making impacts towards meeting multiple desired outcomes. These are articulated as Strategic Priority Research Areas (SPRAs)[.]"

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY. MAY, 2024. 44p.

Climate Security and Misinformation: A Baseline

ELLISON, TOM; HUGH, BRIGITTE

From the document: "Climate change and policy responses provide new opportunities for state and non-state actors to engage in mis- and disinformation across a wide range of scales and topics. Traditionally, analysis of climate change and misinformation has focused most on the problem of climate change denialism and politicization of emissions reductions. However, misinformation, disinformation peddling, and malign influence campaigns are increasing around a broader range of climate-related issues, such as blame for climate hazards, backlash to climate-driven displacement, disputes over clean energy policies, polarization over climate protests, and competition for influence in climate-vulnerable states. Such efforts have security implications across the political, economic and societal spheres, and warrant more holistic and proactive policy attention, drawing lessons from analogous efforts around the COVID-19 pandemic and security of elections. This report provides a baseline on the intersection of climate security risks and mis- and disinformation challenges."

CENTER FOR CLIMATE AND SECURITY. COUNCIL ON STRATEGIC RISKS. 2024. 14p.

Private Security and Public Police

By Ben Grunwald, John Rappaport and Michael Berg

Private security officers outnumber police by a wide margin, and the gap may be growing. As cities have claimed to defund the police, many have quietly expanded their use of private security, reallocating spending from the public to the private sector. It is difficult to know what to make of these trends, largely because we know so little about what private security looks like on the ground. On one prevalent view of the facts, a shift from public to private security would mean little more than a change of uniform, as the two labor markets are deeply intertwined. Indeed, academics, the media, popular culture, and the police themselves all tell us that private security is some amalgam of a police retirement community and a dumping ground for disgraced former cops. But if, instead, private officers differ systematically from the public police—and crossover between the sectors is limited—then substitution from policing to private security could drastically change who is providing security services.

We bring novel data to bear on these questions, presenting the largest empirical study of private security to date. We introduce an administrative dataset covering nearly 300,000 licensed private security officers in the State of Florida. By linking this dataset to similarly comprehensive information about public law enforcement, we have, for the first time, a nearly complete picture of the entire security labor market in one state. We report two principal findings. First, the public and private security markets are predominantly characterized by occupational segregation, not integration. The individuals who compose the private security sector differ markedly from the public police; they are, for example, significantly less likely to be white men. We also find that few private officers, roughly 2%, have previously worked in public policing, and even fewer will go on to policing in the future. Second, while former police make up a small share of all private security, roughly a quarter of cops who do cross over have been fired from a policing job. In fact, fired police officers are nearly as likely to land in private security as to find another policing job, and a full quarter end up in one or the other. We explore the implications of these findings, including intersections with police abolition and the future of policing, at the paper’s close.

Journal of Empirical Legal Studies, Forthcoming . U of Chicago, Public Law Working Paper No. 850. University of Chicago Coase-Sandor Institute for Law & Economics Research Paper No. 1004. Duke Law School Public Law & Legal Theory Series No. 2024-24

Bombs, Bugs, Drugs, and Thugs: Intelligence and America's Quest for Security

By Loch K. Johnson

Recent years have seen numerous books about the looming threat posed to Western society by biological and chemical terrorism, by narcoterrorists, and by the unpredictable leaders of rogue nations. Some of these works have been alarmist. Some have been sensible and measured. But none has been by Loch Johnson.

Johnson, author of the acclaimed Secret Agencies and "an experienced overseer of intelligence" (Foreign Affairs), here examines the present state and future challenges of American strategic intelligence. Written in his trademark style--dubbed "highly readable" by Publishers Weekly--and drawing on dozens of personal interviews and contacts, Johnson takes advantage of his insider access to explore how America today aspires to achieve nothing less than "global transparency," ferreting out information on potential dangers in every corner of the world.

And yet the American security establishment, for all its formidable resources, technology, and networks, currently remains a loose federation of individual fortresses, rather than a well integrated "community" of agencies working together to provide the President with accurate information on foreign threats and opportunities. Intelligence failure, like the misidentified Chinese embassy in Belgrade accidentally bombed by a NATO pilot, is the inevitable outcome when the nation's thirteen secret agencies steadfastly resist the need for central coordination.

Ranging widely and boldly over such controversial topics as the intelligence role of the United Nations (which Johnson believes should be expanded) and whether assassination should be a part of America's foreign policy (an option he rejects for fear that the U.S. would then be cast not only as global policeman but also as global godfather), Loch K. Johnson here maps out a critical and prescriptive vision of the future of American intelligence.

New York; London: NYU Press, 2002. 298p.

Securing Election Infrastructure Against the Tactics of Foreign Malign Influence Operations

United States. Cybersecurity & Infrastructure Security Agency; United States. Federal Bureau Of Investigation; United States.

From the document: "Foreign malign influence operations refer to hostile efforts by or on behalf of foreign governments to shape U.S. policies, decisions, and discourse. These operations may occur overtly or covertly, taking many forms and using a variety of tactics and techniques to accomplish their goals. Foreign malign influence operations are not new; however, technology developments have enabled actors to conduct operations while more effectively hiding their identities. To help critical infrastructure stakeholders increase the resilience of the elections process to foreign malign influence operations, CISA [Cybersecurity & Infrastructure Security Agency] publishes materials, such as this guide, to explain the tactics used by these operations, such as the potential for malicious use of generative artificial intelligence (AI) tools. Generative AI tools enable or support large-scale creation of more realistic fake videos, images, audio, and text for foreign malign influence operations. Several of the tactics outlined [in the document] can be powered by generative AI tools to increase the scale of foreign malign influence operations. In addition, the tactics covered [in the document] can also be utilized by domestic actors to spread disinformation."

Office Of The Director Of National Intelligence 2024. 8p.

Improving the Security of Soft Targets and Crowded Places A Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Edward Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

The U.S. Department of Homeland Security requires research and development to assess methods for reducing the propensity and loss of life from attacks on soft targets and crowded places (ST-CPs). Researchers conducted a comprehensive landscape assessment of the threat to ST-CPs and corresponding security measures to identify needs for improvement, and they recommended research and investment priorities for addressing those needs. 

The number of attack plots is broadly aligned with regional population counts, except that there were more plots in New York City and Washington, D.C. The most-common motivations for ST-CP attacks have been personal, followed by terrorist and racial and ethnic extremist motivations. The ST-CP locations targeted have been diverse and often directly accessible. Education and private buildings (workplaces) are the most–frequently targeted types of ST-CPs. In general, locations in which a would-be attacker had ready access to a dense crowd on scene had the highest average lethality (close to six deaths, on average, as compared with fewer than three when there was not a dense crowd present). Not surprisingly, locations that typically have large crowds without controlled entries, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, had the highest average lethality.

RAND Corporation, Mar 27, 2024, 148 pages

DESIGN AGAINST CRIME: Crime Proofing Everyday Products

MAY CONTAIN MARKUP

Edited by Paul Ekblom

In the realm of product design, the concept of crime-proofing everyday products has emerged as a vital consideration. With the objective of enhancing safety and security in mind, designers are exploring innovative ways to deter criminal activities through the very objects we interact with on a daily basis. By integrating elements such as tamper-proof features, anti-theft mechanisms, and user-friendly security measures, these products aim to provide users with a heightened sense of protection and peace of mind. Design Against Crime represents a proactive approach towards creating a more secure environment, where intelligent design serves as the first line of defense against potential threats.

Lynne Rienner Publishers, 2012 , 293 pages

RETHINKING CORPORATE SECURITY in the Post 9/11 Era

MAY CONTAIN MARKUP

By Dennis R. Dalton

The attacks on the World Trade Center and the Pentagon on September 11, 2001 changed the way the world thinks about security. Everyday citizens learned how national security, international politics, and the economy are inextricably linked to business continuity and corporate security. Corporate leaders were reminded that the security of business, intellectual, and human assets has a tremendous impact on an organization's long-term viability.

In Rethinking Corporate Security, Fortune 500 consultant Dennis Dalton helps security directors, CEOs, and business managers understand the fundamental role of security in today's business environment and outlines the steps to protect against corporate loss. He draws on the insights of such leaders as Jack Welch, Bill Gates, Charles Schwab, and Tom Peters in this unique review of security's evolving role and the development of a new management paradigm.

* If you truly wish to improve your own skills, and the effectiveness of your Corporation's security focus, you need to read this book
* Presents connections of theory to real-world case examples in historical and contemporary assessment of security management principles
* Applies classic business and management strategies to the corporate security management function

NY. BUTTERWORTH/HEINEMANN. 2003. 346p.

Systematic review of situational prevention methods for crime against species 

By Dorothea Delpech , Herve Borrion and Shane Johnson

Illegal activities concerning terrestrial species (TS) are responsible for a variety of health, environmental, economic and security issues. The majority of academic research associated with species relates to conservation, with few publications specifically investigating the scale of crimes impacting species or how they can be prevented. This article systematically reviews the available evidence about what works to prevent crime against terrestrial species. Of over 29,000 documents that were returned in the first stage of the review, these were filtered to just over 100. The remaining documents were partially or fully read to identify the most relevant documents to include in the final qualitative synthesis. The review results show there is a significant lack of primary research in this area, as only five articles were found that met the study inclusion criteria. The identified articles focus on the effects of two types of situational crime prevention interventions: community outreach and ranger patrol frequency. Community outreach was shown to have a significant impact on local poaching levels, while for patrolling the evidence suggests a positive impact on the discovery of poachers, animal carcasses and poaching paraphernalia, however, the quality of these studies varied greatly. To prevent the further decline of species numbers internationally, more effort should be invested in publicising existing research into the effectiveness of prevention strategies that have not reached the wider scientific audience, as well as the funding and promotion of research into alternate methods of crime prevention. 

Crime Sci (2021) 10:1 

National Security Surveillance in Southern Africa: An Anti-Capitalist Perspective

By Jane Duncan

In spite of Edward Snowden’s disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people have become resigned to a world where they cannot have a reasonable expectation of privacy. In this open access book, the author looks at what can be done to rein in these powers and restructure how they are used beyond the limited and often ineffective reforms that have been attempted. Using southern Africa as a backdrop, and its liberation history, Jane Duncan examines what an anti-capitalist perspective on intelligence and security powers could look like. Are the police and intelligence agencies even needed, and if so, what should they do and why? What lessons can be learnt from how security was organised during the struggles for liberation in the region? Southern Africa is seeing thousands of people in the region taking to the streets in protests. In response, governments are scrambling to acquire surveillance technologies to monitor these new protest movements. Southern Africa faces no major terrorism threats at the moment, which should make it easier to develop clearer anti-surveillance campaigns than in Europe or the US. Yet, because of tactical and strategic ambivalence about security powers, movements often engage in limited calls for intelligence and policing reforms, and fail to provide an alternative vision for policing and intelligence. Surveillance and Intelligence in Southern Africa examines what that vision could look like.

London: Zed Books, 2020. 

Microtargeting Unmasked: Safeguarding Law Enforcement, the Military, and the Nation in the Era of Personalized Threats

By Lindsay, Greg; Brown, Jason C.; Johnson, Brian David; Owens, Christopher; Hall, Andrew; Carrott, James H.

From the document: "Microtargeting is the practice of collecting and analyzing personal data to create highly specific messaging for advertising, marketing, and influence campaigns. With microtargeting, the adversary's goal is to destabilize the leadership and decisionmaking of federal institutions tasked with protecting the population. This report describes how, in the coming decade, state and non-state adversaries will use microtargeting tactics to attack high-value individuals (HVIs) in military, law enforcement, and civilian leadership to stigmatize, extort, and even assassinate figures crucial to the security and stability of the United States. Adversaries will also use microtargeting tactics to manipulate and exploit individuals in proximity to HVIs when the HVI is unreachable (e.g., physical proximity, familial ties, business associates, and/or friends)."

Army Cyber Institute, West Point; United States. Secret Service; Arizona State University. Threatcasting Lab. 2023. 88p.

Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

By John Kleinig • Peter Mameli • Seumas Miller • Douglas Salane Adina Schwartz

This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal democracies, namely, security and privacy. Both values are essential to individual liberty, but they come into conflict in times when civil order is threatened, as has been the case from late in the twentieth century, with the advent of global terrorism and trans-national crime. We seek to articulate legally sustainable, politically possible, and technologically feasible, global ethical standards for identity management technology and policies in liberal democracies in the contemporary global security context. Although the standards in question are to be understood as global ethical standards potentially to be adopted not only by the United States, but also by the European Union, India, Australasia, and other contemporary liberal democratic states, we take as our primary focus the tensions that have arisen between the United States and the European Union.

Canberra: ANU Press, 2011. 304p.

Downtown St. Louis Safety and Security - Understanding the Level of Police Presence

By Citizens for a Greater Downtown St. Louis

 Among the greatest concerns of people living, working, visiting, and investing in Downtown St. Louis is public safety. Over the last decade, the character of Downtown has come to be defined not by its great architecture, live sporting events, or conventions, but by a litany of headlines describing crime, violence, and disruptive behavior. To respond to those headlines, city and civic leaders have suggested several explanations: that the recent pandemic created a vacuum of empty streets and diminished law enforcement; that increases in criminal activity are not reflected in data and are only a “perception”; and, that this is a nationwide phenomenon with other cities across the country experiencing the same problems. Some have suggested that complaints about security are a product of racism. First, the facts are undeniable; six homicides downtown in the first five months of 2023 (10 in 2022), numerous violent events, hundreds of car break-ins etc. Second, downtown residents and businesses make a choice to live or locate in a racially and culturally diverse neighborhood. That’s part of what makes Downtown special and a great place to live and work. Concerns about security are shared by neighbors of all races. As this report shows, none of those explanations are credible or helpful. While some of our public safety problems were exacerbated by the pandemic, the trends of rising crime and disorder were present years before. …

St. Louis, MO: The Authors, 20233. 15p..

Dealing with the Past in Security Sector Reform

By Alexander Mayer-Rieckh

Security sector reform (SSR) and transitional justice processes often occur alongside each other in societies emerging from conflict or authoritarian rule, involve many of the same actors, are supported by some of the same partner countries and impact on each other. Yet the relationship between SSR and transitional justice, or â dealing with the pastâ (DwP) as it is also called, remains underexplored and is often marked by ignorance and resistance. While SSR and transitional justice processes can get into each otherâ s way, this paper argues that SSR and DwP are intrinsically linked and can complement each other. SSR can make for better transitional justice and vice versa. Transitional justice needs SSR to prevent a recurrence of abuses, an essential element of justice. SSR can learn from transitional justice not only that it is better to deal with rather than ignore an abusive past but also how to address an abusive legacy in the security sector. The validity of these assumptions is tested in two case studies: the police reform process in Bosnia and Herzegovina after 1995 and the SSR process in Nepal after 2006.

London: Ubiquity Press, 2018. 79p.

Building Resilient Communities in Mexico: Civic Responses to Crime and Violence

Edited by David A. Shirk, Duncan Wood, and Eric L. Olson

Mexico has suffered a severe security crisis over the last decade. As in several other Latin American countries, elevated levels of crime and violence—and especially the proliferation of violent organized crime groups—have presented a serious threat to the Mexican state and to ordinary citizens. During the presidency of Felipe Calderón (2006–2012), the Mexican government attempted to address these problems primarily through law enforcement and military operations to combat organized crime and reforms to enhance the institutional integrity and efficacy of police and judicial sectors. Calderón’s successor, President Enrique Peña Nieto (whose six-year term began in 2012) spent much of his first year in office attempting to shift the narrative within and about Mexico from security issues to other matters, including political, economic, and social reforms to help move the country forward. However, while placing less emphasis on such matters, Peña Nieto also largely continued Calderón’s approach to security by targeting major organized crime figures, deploying federal forces to address urgent local security crises, and pushing ahead with efforts to implement Mexico’s new criminal justice system. Still, for many Mexicans, there have been few improvements in their dayto-day sense of security, their confidence in law enforcement authorities, or their ability to attain access to justice. Indeed, crime and violence remains such a serious concern in certain parts of the country that ordinary citizens have taken to extraordinary measures—hiring private security guards and embracing vigilantism—to protect themselves. In recent years, the emergence of self-professed citizen self-defense groups has introduced a new dimension to Mexico’s security situation. Such developments raise concerns about the course of Mexico’s security situation over the longer term. On the one hand, there are serious questions about the capacity of the Mexican government to fulfill its responsibility to provide for basic citizen security. While not a failed state, Mexico has proved highly vulnerable to penetration and corruption by powerful organized crime groups, and the government’s ability to maintain a monopoly on the legitimate use of force has been challenged by both political insurgents and violent criminal organizations.

Washington DC: Woodrow Wilson International Center for Scholars; San Diego University of San Diego Justice in Mexico Project, 2014. 294p.

A Comprehensive Assessment of the Municipal Police of Ciudad Juárez

By Marcos Pablo Moloeznik, Maria Eugenia Suárez de Garay, and David A. Shirk

This report presents a first look at the results from the study titled Justiciabarómetro: Comprehensive Study of Municipal Police in Ciudad Juárez, which was designed to evaluate the provision of public security in one of Mexico’s most troubled cities through the viewpoints, experiences, and opinions of law enforcement officers themselves. To do so, this study relied on two distinct methodological approaches: 1) A qualitative inquiry into the structural and organizational conditions present within the Ciudad Juárez Department of Public Security (Secretaría de Seguridad Pública Municipal de Ciudad Juárez, SSPM), using a variety of techniques —including participant observation, individual and group interviews, focus group studies, field visits, seminars, and analysis of archival documents— that allowed for detailed analysis of three priority areas in police institutions: organizational and operational, intelligence and counter-intelligence, and psychology, health, and work atmosphere; 2) A quantitative analysis of the organizational culture that prevails within the SSPM through a survey of the entire police department to examine their experiences and opinions regarding their professional careers, working conditions, adherence to due process, and relations to crime and society.

San Diego: Justice in Mexico, University of San Diego, 2011. 52p.

Ethical Issues in Covert, Security and Surveillance Research

Edited by Ron Iphofen and Dónal O’Mathúna

The ebook edition of this title is Open Access and freely available to read online. The EU-funded PRO-RES Project aimed to produce a guidance framework that helps to deliver Responsible Research and Innovation (RRI). PRO-RES is a Horizon 2020 project coordinated by the European Science Foundation (ESF), involving 14 different partners across Europe. As one of a series of open access products of the Project, Ethical Issues in Covert, Security and Surveillance Research will be placed in the hands of policymakers and their advisors to offer practical and efficient ways to respond to the issues addressed. Understanding that the problem of covert research and surveillance research for security purposes have proven highly challenging for all research ethics appraisal services, the chapters here are valuable resources for expert reviewers, helping further the discussion of these complex ethical issues, and raising the standards applied to the process. Delivering an applied approach, and influencing where it counts, this volume showcases that it is only when the integrity of research is carefully pursued can users of the evidence produced be assured of its value and its ethical credentials.

Bingley, UK: Emerald Publishing, 2022. 241p.

Surveillance, Privacy and Security: Citizen's Perspectives

Edited by Michael Friedewald, J. Peter Burgess, Johann Čas, Rocco Bellanova and Walter Peissl.

This volume examines the relationship between privacy, surveillance and security, and the alleged privacy–security trade-off, focusing on the citizen’s perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen’s perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed.

London; New York: Routledge, 2017. 310p.

National Security Intelligence and Ethics

Edited by Seumas Miller, Mitt Regan, and Patrick F. Walsh. This volume examines the ethical issues that arise as a result of national security intelligence collection and analysis. Powerful new technologies enable the collection, communication, and analysis of national security data on an unprecedented scale. Data collection now plays a central role in intelligence practice, yet this development raises a host of ethical and national security problems, such as: privacy; autonomy; threats to national security and democracy by foreign states; and accountability for liberal democracies. This volume provides a comprehensive set of in-depth ethical analyses of these problems by combining contributions from both ethics scholars and intelligence practitioners. It provides the reader with a practical understanding of relevant operations, the issues that they raise, and analysis of how responses to these issues can be informed by a commitment to liberal democratic values. This combination of perspectives is crucial in providing an informed appreciation of ethical challenges that is also grounded in the realities of the practice of intelligence.

London; New York: Routledge, 2022. 317p.

The Coupling of Safety and Security: Exploring Interrelations in Theory and Practice

By Corinne Bieder and Kenneth Pettersen Gould.

This open access book explores the synergies and tensions between safety and security management from a variety of perspectives and by combining input from numerous disciplines. It defines the concepts of safety and security, and discusses the methodological, organizational and institutional implications that accompany approaching them as separate entities and combining them, respectively. The book explores the coupling of safety and security from different perspectives, especially: the concepts and methods of risk, safety and security; the managerial aspects; user experiences in connection with safety and security. Given its scope, the book will be of interest to researchers and practitioners in the fields of safety and security, and to anyone working at a business or in an industry concerned with how safety and security should be managed.

Springer Nature, 2020. 114p.