Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts in Crime Prevention
Tools of Security Risk Management for the London 2012 Olympic Games and FIFA 2006 World Cup in Germany

Jennings, Will and Martin Lodge

Mega-events such as the Olympic Games and the football World Cup represent a special venue for the practice of risk management. This paper explores management of security risks in the case of two sporting mega-events, the London 2012 Olympic Games and the FIFA 2006 World Cup in Germany. The analysis progresses in three stages. First, it explores three explanations that have dominated the literature on policy instruments and tools and introduces the generic tools of government approach developed by Christopher Hood (1983). Second, it reviews the tools used for security risk management at the two mega-events. Third, it evaluates competing explanations of tool choice and degree to which these are consistent with organisational strategies of risk management at the events. The findings highlight the importance of national political systems in influencing tool choice.

London: Centre fo Analysis of Risk and Regulation, London School of Economics, 2009. 27p.

Mega-Events and Risk Colonisation: Risk Management and the Olympics

Jennings, Will

This paper uses the idea of risk colonisation (Rothstein et al. 2006) to analyse how societal and institutional risks simultaneously make mega-events such as the Olympics a problematic site for risk management while contributing to the spread of the logic and formal managerial practice of risk management. It outlines how mega-events are linked to broader societal and institutional hazards and threats but at the same time induce their own unique set of organizational pathologies and biases. In this context, it is argued that the combination of societal and institutional risks create pressure for safety and security which in turn give rise to the growing influence of risk as an object of planning, operations and communication both in organisation of the Games and governance of the Olympic movement. This is consistent with the colonizing influence of risk over time: both in the creation of formal institutions (such as risk management teams and divisions) and the proliferation of the language of 'risk' as an object of regulation and control.

London: Centre for Analysis of Risk and Regulation, London School of Economics and Political Science, 2012. 31p.

Olympic Policing During the 2012 Security Games

Blowe, Kevin and du Boulay, Estelle

In the months before the start of the 2012 Olympics in Stratford in east London, there was a growing anxiety amongst Londoners about the prospect of snipers in helicopters and RAF fighters in the skies, missile launchers on tower blocks and repeated predictions that Newham would experience lockdown during peak periods. Newham Monitoring Project had also been receiving enquiries from across east London for months from local residents, particularly those working with young people, who were concerned about the massive proposed policing operation and its impact at street level. London 2012 seemed to deserve its reputation as the first 'Security Games'. The Olympics presented the largest peacetime military and security operation since 1945, with a policing and security budget of around L553m. From 2010, the number of security personnel required by Olympic organisers rose sharply to an estimated 23,700 on the busiest days, more than double the original predictions, with up to 12,000 police from forces across the country and the Ministry of Defence providing more troops deployed (in uniform) to work during the Games than were then stationed in Afghanistan. Even more CCTV was installed in a city that already had the highest level of surveillance of its citizens than anywhere in the world, whilst around $80 million was spent on the construction of an 11-mile long 5000-volt electric fence around the Olympic zone. The reason for this extraordinary level of security, the Home Office argued in its March 2011 publication 'Olympic and Paralympic Safety and Security Strategy,' was primarily the threat from terrorism: it promised 'maximum use of existing national security and intelligence structures' with the threat-level raised from 'substantial' to 'severe' (which assumes 'an attack is highly likely'). A secondary threat was public disorder, heightened by the perception of a weak police response to rioting the previous summer that followed the death of Mark Duggan in August 2011. The International Olympic Committee had made it clear after the riots that it expected the British government, the Metropolitan police and other domestic agencies to ensure that the Olympics passed off without incident. Arrangements were made to fast-track the trials of people accused of offences linked to the Olympics in the same highly controversial way that had followed the disorder of the previous year, with Alison Saunders, the chief CPS prosecutor for London, explicitly linking these measures to 'the lessons of the summer riots.' With a climate of fear slowly building through state institutions and the media, we were also aware of the significant pattern of racialised social "sanitisation" and exploitation that have been a hallmark of sport mega events globally, particularly where they have been held in poorer and developing areas. Activists and academics from countries including South Africa and India, which have both hosted major sport events in recent years, travelled to the UK to share their experiences of human rights abuses and 'sweep up operations' in their localities. These had had a massively detrimental and often devastating impact on the lives of local people, leaving them homeless, unemployed or vulnerable to excessive policing or criminalisation, with a legacy of property developers and real estate owners benefiting most. These were real life stories behind the promises of employment and regeneration that had been made in each host city. We recognised that an atmosphere of intensive security, focused on the borough where Newham Monitoring Project has worked for over thirty years, had the potential to negatively impact on local people. Most military and all private security personnel would work inside the 'ticketed areas' of the event venues, but in the streets surrounding the Olympic Park in Stratford and the ExCel Centre in Canning Town, it was the prospect of a massive policing operation that was our greatest concern. Newham is one of London's poorest and most ethnically diverse boroughs with the second highest Muslim population in the UK, one that had experienced long-term state surveillance, suspicion and incidents like the bungled anti-terrorism raids in 2006 on two families living in Forest Gate, who endured a terrifying ordeal based on faulty intelligence. The borough also has one of the youngest populations in London, with 23.6% of residents in 2011 aged between 10 and 24,6 coupled with a long history of difficult relationships between young people and the police. This is particularly the case over the use of stop and search powers.

London: Newham Monitoring Project, 2013. 29p.

The 2016 Olympic Games: Health, Security, Environmental and Doping Issues

Halchin, L. Elaine and John W. Rollins

Issues affecting the safety and security of athletes and spectators at the 2016 Olympic Games, which begins August 5 in Rio de Janeiro, Brazil, are reviewed in this report from the Congressional Research Service. Concerns addressed in the CRS report include the Zika virus outbreak, domestic crime, the threat of terrorism, environmental hazards, and more.

Washington, DC: Congressional Research Service, 2016. 38p.

The Cybersecurity of Olympic Sports: New Opportunities, New Risks

Cooper, Betsy

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) has released a report focused on the rapidly evolving landscape of cybersecurity in sports, with an emphasis on the Olympic Games. The report, "The Cybersecurity of Olympic Sports: New Opportunities, New Risks," is an unprecedented look into how the proliferation of new technologies in major sporting events�from digital display panels in stadiums to online ticketing systems to artificial intelligence-based scoring software - opens the door to cyberattacks that could threaten public safety, diminish the fan experience, and undermine the integrity of competition. CLTC produced the report through a partnership with Cal Athletics (the University of California, Berkeley's athletics department) as well as the Los Angeles Organizing Committee for the 2028 Olympic Games. Using the Olympic Games as a case study, the report introduces a framework for evaluating potential risks posed by digital technologies in sports, and highlights possible threats that will arise as these technologies are deployed. The study identifies key areas of risk, including hacks on stadiums, scoring systems, and photo and video replay systems; manipulation of digital systems used by athletes for training and self-care; hacks on transportation and entry systems; as well as more extreme attacks designed to induce panic or facilitate terrorism or kidnapping. The report also includes fictional news stories from the future to highlight hypothetical incidents. One shows how malicious actors seeking to disrupt the Olympics could cause mass panic in a stadium by hacking into digital display panels. Another story highlights how hackers could manipulate a software-based scoring system in gymnastics, throwing a marquee event into chaos. A third story focuses on how "smart" appliances installed in athlete' residences in the Olympics Village could be hacked and used for surveillance. The report suggests that sporting event planners should consider the potential cybersecurity implications of any new technology, noting that "organizers should press to ensure that there are tangible benefits to incorporating digital devices�and that significant risks can be mitigated�before going forward."

Berkeley, CA: University of California at Berkeley, Center for Long-Term Cybersecurity, 2017. 40p.

Olympic-Caliber Cybersecurity: Lessons for Safeguarding the 2020 Games and Other Major Events

By Cynthia Dion-Schwarz, Alt. Authors: Nathan Ryan, Julia A. Thompson, Erik Silfversten, Giacomo Persi Paoli

This report profiles the cybersecurity threat landscape faced by Japan as the host nation of the 2020 Summer Games and 2020 Paralympic Games of the XXXII Olympiad. The overarching objective of the study was to produce a threat actor typology, based on a risk assessment of the Tokyo 2020 threat landscape. Synthesizing multiple sources of primary and secondary data, the study team developed a visualization of the threat landscape that provides an at-a-glance overview to guide Olympic security planners, computer emergency response teams, and policy- and decisionmakers as they prioritize and address cybersecurity threats. The risk assessment also considered the motivation, sophistication, and propensity of threat actors to collude with one another. This research could be valuable to a wide variety of stakeholders and will be of particular interest to stakeholders involved in planning and ensuring the security of the Tokyo 2020 Games. The research also serves as a reference to inform ongoing policy debates on cybersecurity preparations for mega-events and as a basis for future research.

Santa Monica, CA: RAND, 2018. 97p.

Stasi : The Untold Story of the East German Secret Police

By John O. Koehler

This book is about the untold story of the East German secret police, known as theStasi. It discusses the history and operations of the Stasi, including their collaboration with the KGB, their espionage activities in West Germany and other countries, and their involvement in terrorism. The document also includes interviews with former Stasi officers and victims of Stasi repression.

Basic Books, 1999, 460 pages

Soldiers, Cops, Bannermen

By Kees Kuiken

“Soldiers, Cops, Bannermen: The Rise and Fall of the First Communist Chinese PoliceState1931-1969”by Kees Kuiken, discusses the history of the Chinese police state from1931 to 1969. The book explores topics such as the role of police in maintaining control, the transition from soldiers to cops, and the challenges faced by the police state. The book also examines the historical context of China’s quest for order and the evolution of the police system in the Chinese Empire.

Wolters-Noordhoff, 1993 - 143 pages

Secret Empire : The KGB in Russia Today

By J. Micheal Waller

Summary of main points

•The book is titled“Security for Small Businesses”by David L. Berger.•The book covers various topics related to security measures for small businesses.

•It includes chapters on perimeter control, alarms, closed circuittelevision (CCTV),and security services

.•The book also includes a bibliography with references to other publications onsecurity management.•The book provides information on crime prevention and basic precautions against crimes.

•It discusses security equipment and methods such as barrier protection, alarm systems, and locks.•The book also covers topics like check cashing, credit cards, robbery, and burglary.

•There are references to other books on hotel security management, industrialsecurity management, and employee honesty management.

•The book provides information on tools, maintenance, environment, buildingconditions, housekeeping, lighting, heating, and ventilation.

•It includes information on employee training, personal protection, machine safety, and electricity equipment.

•The book emphasizes the importance of security for small businesses and provides practical advice and recommendations.

Avalon Publishing, 1994, 390 pages

Russian Hide & Seek

By Iain Lauchlan

This book explores the origins, structure, and activities of the Okhrana, the secret police in Tsarist Russia and discusses the comparison of security policing in Russia and the West, as well as the role of the Okhrana in suppressing revolution and counter-revolutionary activities. It also examines the connections between the Okhrana and right-wing terror groups, as well as its interactions with civil society and military intelligence.The author uses various sources, including archival documents and personal memoirs, to provide a comprehensive analysis of the Okhrana’s operations.

The book concludes with some remarks on the predictable downfall of Imperial Russia.A bibliography and index are included.

SKS-FLS, 2002, 405 pages

U.S. Government Global Health Security Strategy 2024

UNITED STATES. WHITE HOUSE OFFICE

From the document: "Over the last 3 years, we have more than doubled our global health partnerships--working directly with 50 countries to ensure they can more effectively prevent, detect, and control outbreaks. And we are working with partners to support an additional 50 countries to save even more lives and minimize economic losses. With strong bipartisan support from Congress, we also championed the creation of the Pandemic Fund, a new international body that has already catalyzed $2 billion in financing from 27 contributors, including countries, foundations, and philanthropies, to build stronger global health security capabilities. We are working to make life-saving medicines and vaccines more rapidly available in health emergencies, including through supporting Gavi, the Vaccine Alliance and the Coalition for Epidemic Preparedness Innovations. And we are leading efforts to ensure international financial institutions, such as the World Bank Group, scale up lending for pandemic prevention, preparedness, and response because health security, economic security, climate security, and national security are all related. This new Global Health Security Strategy lays out the actions the United States will take over the next 5 years to ensure we continue this progress[.]"

United States. White House Office. APR, 2024. 64p.

State Policing in Sub-Saharan Africa

By Fatoumata Sira Diallo

This book is a collection of various titles and references related to the topics of diplomacy, strategy, and policing in Sub-Saharan Africa. It includes information on academic works, books, articles, and documents that cover subjects such as international relations, political science, economic science, and sociology. The document also mentions specific titles and authors, as well as organizations and websites that provide relevant information on these topics.

Editions L'Harmattan, 2019, 391 pages

Policing Terrorism, Crime-Control, and Police-Community Relations

By by Tal Jonathan-Zamir, David Weisburd, and Badi Hasisi.

“Policing Terrorism, Crime Control, and Police-Community Relations: Learning fromthe Israeli Experience.”is written by Tal Jonathan-Zamir, David Weisburd, and Badi Hasisi. The book discusses the Israeli experience in policing terrorism, crime control,and police-community relations. It covers various topics such as the impact of terrorismthreats on police performance, public evaluations of the police, and the role of thepolice in counterterrorism. The book is supported by grants from the U.S. Departmentof Homeland Security and the U.S. National Institute of Justice

Springer, 2014, 172 pagine

Policing the Conflict in South Africa

By M.L. Mathews, Philip B. Heymann, andA.S. Mathews

“Policing the Conflict in South Africa”edited by M.L. Mathews, Philip B. Heymann, and A.S. Mathews. discusses the reform of policing in South Africa, including the structure, membership, and control of the police, as well as popular perceptions of policing among blacks in South Africa. The document also mentions protests and police misconduct in South Africa.

Cambridge University Press, 2008, 226 pages

Policing the Frontier

By Marco Gopfert

This book titled“Policing the Frontier: An Ethnography of Two Worlds in Niger”by Mirco Gopfert. is part of the seriesPolice/Worlds: Studies in Security, Crime, and Governance. It explores the topic of policing in rural Niger and examines thei nteraction between the police and the local communities. The book provides an ethnographic perspective on the challenges and complexities of policing in this context.

Cornell University Press, 2020, 175 pages

The Police of Paris

By Alan Williams

“The Police of Paris, 1718-1789” by Alan Williams provides a historical account of the police force in Paris during the 18th century. The book covers topics such as the power and organization of the police, their operations, and the relationship between the police and the people of Paris. The document also includes a bibliography and index for further reference.

Louisiana State University Press, 1979, 328 pages

The Night The Police Went On Strike

By Gerald W. Reynolds & Anthony Judge

The Night The Police Went On Strike by Gerald W. Reynolds and Anthony Judge is a compelling novel that explores a fictional scenario where law enforcement officers in a small town decide to go on strike. As chaos ensues and crime rates skyrocket, the community must confront its own vulnerabilities and limitations. Through a gripping narrative, the authors delve into themes of justice, social order, and the delicate balance between security and freedom. This thought-provoking book challenges readers to consider the essential role of law enforcement in maintaining a functioning society and the consequences when that role is disrupted.

Weidenfeld & Nicolson, London, 1962, 246 pages

Cyberstalking Harassment in the Internet Age and How to Protect Your Family

MAY CONTAIN MARKUP

PAUL BoCIJ

INTRODUCTION; “We are constantly told that technology enriches our lives: the Internet provides learning opportunities for our children, cell phones allow us to keep in touch with our relatives while we're on the move, and laptop computers allow us to work almost anywhere at any time. But we are also constantly warned about the dangers of technology, especially the Internet: hackers can steal our credit card numbers, pedophiles can target our children, and racists can spread messages of hate. We take these dangers seriously because technology permeates almost every aspect of our lives. For instance, it is not an exaggeration to sugges t that virtually every child in the United States, Europe, and any number of other technically advanced nations will come into regular contact with the Internet. It is for this reason that parents, teachers, law enforcement agencies, and others constantly monitor the safety of th e young people in their care.”

Praeger. Westport, Connecticut London. 2004. 273p.

Computer Fraud and Countermeasures

MAY CONTAIN MARKUP

By LEONARD I. KRAUSS and AILEEN MACGAHAN

FROM THE PREFACE: “This book deals with computer fraud prevention, detection, deterrents, investigation, loss recovery, and risk management. (The term "computer fraud" is our shorthand way of referring to computerassisted or computer-related crimes. The people who commit these crimes may use the computer either directly or as a vehicle for deliberate misrepresentation or deception, usually to cover up the embezzlement or theft of money, goods, services, or information.) Avoiding the sensationalism that so often characterizes the current literature on the subject, this book is addressed to business executives, financial and administrative officers, data processing managers, systems analysts, auditors, corporate and computer security supervisors, law enforcement investigators, and others who are responsible for providing direction in coping with the risk of computer fraud.”

RENTICE-HALL, INC., Englewood Cliffs, New Jersey. 1979. 502p.

Global Threat Forecast 2024

GUNARATNA, ROHAN

From the document: "In 2024, the Israel-Hamas conflict will emerge as the preeminent threat to global security. An escalation of the conflict could spark a regional war and lead to a global recession. The West's support for Israel will fuel protests in the Muslim world, drive radicalisation and bring about terrorist attacks. Sunni and Shia groups will pose a common threat to western, Israeli and Jewish interests. Preventing the conflict from escalating and working towards a sustainable solution for the Palestinian people will require visionary leadership."

NANYANG TECHNOLOGICAL UNIVERSITY. .30 MAY, 2024.