Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts tagged surveillance
Crime prevention through environmental design (CPTED): A review and modern bibliography

By: Paul Michael Cozens, Greg Saville, and David Hillier

Purpose – The purpose of this paper is to critically review the core findings from recently published place-based crime prevention research. The paper aims to critically evaluate the available evidence on the contribution of crime prevention through environmental design as a crime prevention strategy.

Design/methodology/approach – Large-scale evaluations of crime prevention through environmental design (CPTED) are reviewed with a view to clarifying current knowledge on the evidence of crime prevention through environmental design.

Findings – The review concludes that there is a growing body of research that supports the assertion that crime prevention through environmental design is effective in reducing both crime and fear of crime in the community.

Research limitations/implications – Although the paper may not review all the evaluations of CPTED, it nonetheless provides a detailed compilation and overview of the most significant research in the area, including an extensive and modern bibliography on the subject. Research implications will be the subject of a forthcoming paper.

Practical implications – CPTED is an increasingly fashionable approach and is being implemented on a global scale. Additionally, individual components such as territoriality, surveillance, maintenance, access control, activity support and target-hardening are being widely deployed. However, the evidence currently available is inconclusive and much criticised, which effectively prevents widespread intervention and investment by central government. The paper details the difficulties associated with demonstrating the effectiveness of CPTED.

Originality/value – The paper concludes that although empirical proof has not been definitively demonstrated, there is a large and growing body of research, which supports the assertion that crime prevention through environmental design is a pragmatic and effective crime prevention tool. This review provides an extensive bibliography of contemporary crime prevention through environmental design and a follow-up paper will discuss the future research priorities for it.

Property Management Vol. 23 No. 5, 2005 pp. 328-356

Control or protection? Work environment implications of police body-worn cameras

By Cecilia Hansen Löfstrand, Christel Backman

This review paper critically examines the work environment implications of the use of body-worn camera (BWC) technology reported in research. We found that published peer-review studies (90 articles) pay very little attention to the work environment of BWC users – police officers. Departing from the notion of the two faces of surveillance and of BWC technology as a surveillance tool with uncertain implications – control or protection of officers – we critically examine how expectations in relation to BWC introduction and its implications have been addressed to explain why so little attention has been devoted to the topic. We found a dominant control rationale facilitating (rapid) BWC implementation at the expense of officers’ work environment, health and safety.

New Technology Work and Employment, Volume36, Issue3 November 2021 Pages 327-347

National Security Surveillance in Southern Africa: An Anti-Capitalist Perspective

By Jane Duncan

In spite of Edward Snowden’s disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people have become resigned to a world where they cannot have a reasonable expectation of privacy. In this open access book, the author looks at what can be done to rein in these powers and restructure how they are used beyond the limited and often ineffective reforms that have been attempted. Using southern Africa as a backdrop, and its liberation history, Jane Duncan examines what an anti-capitalist perspective on intelligence and security powers could look like. Are the police and intelligence agencies even needed, and if so, what should they do and why? What lessons can be learnt from how security was organised during the struggles for liberation in the region? Southern Africa is seeing thousands of people in the region taking to the streets in protests. In response, governments are scrambling to acquire surveillance technologies to monitor these new protest movements. Southern Africa faces no major terrorism threats at the moment, which should make it easier to develop clearer anti-surveillance campaigns than in Europe or the US. Yet, because of tactical and strategic ambivalence about security powers, movements often engage in limited calls for intelligence and policing reforms, and fail to provide an alternative vision for policing and intelligence. Surveillance and Intelligence in Southern Africa examines what that vision could look like.

London: Zed Books, 2020. 

Surveillance for Sale: The Underregulated Relationship between U.S. Data Brokers and Domestic and Foreign Government Agencies

By Caitlin Chin

Ten years ago, when whistleblower Edward Snowden revealed that U.S. government agencies had intercepted bulk telephone and internet communications from numerous individuals around the world, President Barack Obama acknowledged a long-standing yet unsettled dilemma: “You can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience. There are trade-offs involved.” Snowden’s disclosures reignited robust debates over the appropriate balance between an individual’s right to privacy and the state’s interest in protecting economic and national security—in particular, where to place limitations on the U.S. government’s ability to compel access to signals intelligence held by private companies. These debates continue today, but the internet landscape—and subsequently, the relationship between the U.S. government and private sector—has evolved substantially since 2013. U.S. government agencies still routinely mandate private companies like Verizon and Google hand over customers’ personal information and issue non-disclosure orders to prevent these companies from informing individuals about such access. But the volume and technical complexity of the data ecosystem have exploded over the past decade, spurred by the rising ubiquity of algorithmic profiling in the U.S. private sector. As a result, U.S. government agencies have increasingly turned to “voluntary” mechanisms to access data from private companies, such as purchasing smartphone geolocation history from third-party data brokers and deriving insights from publicly available social media posts, without the formal use of a warrant, subpoena, or court order. In June 2023, the Office of the Director of National Intelligence (ODNI) declassified a report from January 2022—one of the first public efforts to examine the “large amount” of commercially available information that federal national security agencies purchase. In this report, ODNI recognizes that sensitive personal information both “clearly provides intelligence value” but also increases the risk of harmful outcomes like blackmail or harassment. Despite the potential for abuse, the declassified report reveals that some intelligence community elements have not established proper privacy and civil liberties guardrails for commercially acquired information and that even ODNI lacks awareness of the full scope of data brokerage contracts across its 18 units. Critically, the report recognizes that modern advancements in data collection have outpaced existing legal safeguards: “Today’s CAI [commercially available information] is more revealing, available on more people (in bulk), less possible to avoid, and less well understood than traditional PAI [publicly available information].” The ODNI report demonstrates how the traditional view of the privacy-security trade-off is becoming increasingly nuanced, especially as gaps in outdated federal law around data collection and transfers expand the number of actors and risk vectors involved. National Security Adviser Jake Sullivan recently noted that there are also geopolitical implications to consider: “Our strategic competitors see big data as a strategic asset.” When Congress banned the popular mobile app TikTok on government devices in the 2023 National Defense Authorization Act (NDAA), it cited fears that the Chinese Communist Party (CCP) could use the video-hosting app to spy on Americans. However, the NDAA did not address how numerous other smartphone apps, beyond TikTok, share personal information with data brokers—which, in turn, could transfer it to adversarial entities. In 2013, over 250,000 website privacy policies acknowledged sharing data with other companies; since then, this number inevitably has increased. In a digitized society, unchecked data collection has become a vulnerability for U.S. national security—not merely, as some once viewed, a strength. The reinvigorated focus on TikTok’s data collection practices creates a certain paradox. While politicians have expressed concerns about Chinese government surveillance through mobile apps, U.S. government agencies have purchased access to smartphone geolocation data and social media images related to millions of Americans from data brokers without a warrant. The U.S. government has simultaneously treated TikTok as a national security risk and a handy source of information, reportedly issuing the app over 1,500 legal requests for data in 2021 alone. It is also important to note that national security is not the only value that can come into tension with information privacy, as unfettered data collection carries broader implications for civil rights, algorithmic fairness, free expression, and international commerce, affecting individuals both within and outside the United States.

Washington, DC: The Center for Strategic and International Studies (CSIS) 2023. 60p.

Surveillance Law in Africa: a Review of Six Countries

By Roberts, T.; Mohamed Ali, A.; Farahat, M.; Oloyede, R. and Mutung’u, G..

This review provides the first comparative analysis of African legal surveillance frameworks. The study identifies nine core principles derived from existing guidelines as an analytical framework to identify opportunities to strengthen privacy protection, while narrowly targeting surveillance on the most serious crimes. Six detailed country reports are synthesised in this comparative analysis to produce a series of actionable recommendations for policy, practice and further research

Brighton, UK: Institute of Development Studies, 2021. 203p.

Making Things Stick: Surveillance Technologies and Mexico’s War on Crime

By Keith Guzik.

“Mexico’s Federal Police Intelligence Center (CIPF) was inaugurated on November 24, 2009… The CIPF, a subterranean structure colloquially known as El Bunker, serves as the command center for the federal government’s War on Crime… El Bunker features four video walls, each measuring 65 by 10 feet, displaying eighty rear-screen projectors arranged in four 2 by 10 configurations..

Luminos. (2016) 272 pages.