Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts in Policy
Problem-Oriented Policing: Reflections on the First 20 Years

Michael S. Scott

In the last three decades, several concepts have been advanced to structure efforts to improve policing. Among them have been team policing, neighborhood policing, community policing, problem-oriented policing, and, most recently, quality-of-life policing. With much overlap, each concept, as reflected in its name, emphasizes a different need, relegating other commonly advocated reforms to a secondary role, shaped to support that need. This volume traces the efforts to implement problem-oriented policing.

The emphasis in problem-oriented policing is on directing attention to the broad range of problems the community expects the police to handle–the problems that constitute the business of the police–and on how police can be more effective in dealing with them. A layperson may think this focus elementary on first being introduced to it. Indeed, laypeople probably assume that police continually focus on the problems they are expected to handle. But within policing, this focus constitutes a radical shift in perspective.

Problem-oriented policing recognizes, at the outset, that police are expected to deal with an incredibly broad range of diverse community problems–not simply crime. It recognizes that the ultimate goal of the police is not simply to enforce the law, but to deal with problems effectively–ideally, by preventing them from occurring in the first place. It therefore plunges the police into an in-depth study of the specific problems they confront. It invites consideration of a wide range of alternatives, in addition to criminal law, for responding to each specific problem. Thus, problem-oriented policing draws the police away from the traditional preoccupation with creating an efficient organization; from the heavy investment in standard, generic operating procedures for responding to calls and preventing crime; and from heavy dependence on criminal law as the primary means for getting their job done. It looks to increased knowledge and thinking about the specific problems police confront as the driving force in fashioning police services.

This publication was supported through Grant #98CKWXK052 from the Office of Community-Oriented Policing Services, U.S. Department of Justice. The opinions expressed herein are the author's and do not necessarily represent the official position of the U.S. Department of Justice. October 2000. 46p.

Problem-Oriented Policing in England and Wales 2019

Aiden Sidebottom (University College London) Karen Bullock (Surrey University) Rachel Armitage (University of Huddersfield) Matt Ashby (University College London) Caitlin Clemmow (University College London) Stuart Kirby (Crime Insights Limited) Gloria Laycock (University College London) Nick Tilley (University College London).

‘Problem-oriented policing’ (POP) is an approach for improving police effectiveness. In the United Kingdom (UK), it is also referred to as ‘problem-oriented partnerships’ or ‘problem-solving policing’. Problem-solving policing calls for the police to focus not on individual incidents but on problems - defined as recurrent clusters of related incidents that affect the community. It advocates a structured process whereby the police (1) systematically identify persistent problems, (2) undertake in-depth analysis to determine the conditions giving rise to these problems, (3) devise and implement tailored responses and (4) work out if the chosen responses were effective. At its simplest, POP outlines a method for dealing with localised problems. In its most general sense, it outlines an approach for how the police operate.

Problem-solving has been widely adopted by police forces in the UK and internationally. Successive reviews, case studies and experiments have shown POP to be an effective way of reducing crime and disorder. Yet despite extensive evidence demonstrating the effectiveness of problem-solving, research also identifies recurrent challenges both in the implementation and practice of a problem-oriented approach. Consequently, POP has not become a persistent feature of policing in the UK.

College of Policing. NPCC. 2019. 89p.

Whither฀problem-oriented฀policing

By Nick Tilley

Herman฀Goldstein’s฀(1979,฀1990)฀vision฀of฀problem-oriented฀policing฀(POP)฀has฀not฀ been฀difficult฀to฀sell,฀at฀least฀in฀principle,฀and฀in฀the฀30฀years฀since฀he฀first฀mooted฀ it฀many฀scholars฀and฀police฀agencies฀have฀bought฀into฀it.฀POP฀promises฀a฀move฀ away฀from฀managerial฀priorities,฀standardized฀(and฀often฀ineffective)฀ways฀of฀working,฀and฀law฀ enforcement฀as฀an฀end฀in฀itself.฀It฀focuses฀instead฀on฀relevant฀community฀concerns,฀the฀openminded฀pursuit฀of฀ethical฀and฀effective฀solutions฀to฀recurrent฀problems,฀and฀attention฀to฀results฀ to฀learn฀better฀how฀to฀deal฀with฀similar฀problems฀in฀the฀future.฀It฀also฀suggests฀an฀efficient฀and฀ effective฀way฀of฀handling฀heavy฀demands฀on฀police฀time,฀by฀resolving฀problems฀rather฀than฀ simply฀by฀responding฀to฀them฀incident฀by฀incident.฀

American฀Society฀of฀Criminology. Criminology฀&฀Public฀Policy฀•฀Volume฀9฀•฀Issue฀1. 13p.

Cybersecurity of the Civil Nuclear Sector: Threat Landscape and International Legal Protections in Peacetime and Conflict

DIAS, TALITA DE SOUZA; HAKMEH, JOYCE; MESSMER, MARION

From the document: "Many states are becoming more interested in nuclear energy as a means to help achieve environmental goals, economic development and energy security. A declaration by 25 countries - including the US, the UK and Canada - during the COP28 UN [28th Conference of Parties to the United Nations] Climate Change Conference in December 2023 exemplified this trend, announcing an ambition to triple nuclear energy capacity by 2050 as part of efforts to achieve net zero greenhouse gas emissions and limit global warming. The commitment emphasized not only the potential role of nuclear energy in supporting sustainable development but also the consequent importance of maintaining safety, sustainability, security and non-proliferation standards in the civil nuclear industry. As growth in the use of nuclear energy would imply that more nuclear power plants will come into operation, considerations of safety and security in the civil nuclear industry - including around cybersecurity, the specific subject of this paper - are likely to become more critical than ever. Since Russia's full-scale invasion of Ukraine in February 2022, there has been a notable shift in many Western countries' energy security strategies. [...] This surge in interest can be attributed in part to nuclear energy's reliability, resilience and low carbon footprint. [...] However, any expansion of nuclear capabilities also brings new challenges, particularly in cybersecurity. Cyber operations targeting civil nuclear systems have been reported worldwide. Such operations pose significant risks, with potential harms including information theft, equipment malfunction, disruption of energy supplies, environmental damage and health impacts. The risks are prevalent both in peacetime and during conflicts."

ROYAL INSTITUTE OF INTERNATIONAL AFFAIRS. JUL, 2024.

Permission to Steal : Revealing the Roots of Corporate Scandal

By Lisa H. Newton

Author and Work: Lisa H. Newton, the author of the book "Permissionto Steal," is a Professor of Philosophy and Director of the Program inApplied Ethics at Fairfield University[^1^][1]. The book addresses theroots of corporate scandal and is published by Blackwell Publishing.

Ethical Analysis: Newton provides a philosophical and ethical analysis of corporate scandals, questioning what went wrong, why it was wrong, and how it happened. She emphasizes the importance of ethics in business for a healthier society.

Corporate Scandals: The book discusses the wave of corporate scandals, highlighting the need for vigilance and accountability in the business system. It reflects on the loss of trust and the impact of greed and corruption at high levels.

Societal Impact: Newton suggests tasks to restore trust in the nation's wealthiest and proposes ways to prevent future theft and corruption, advocating for an integrated and morally sound society. The book calls for action to end white-collar crime and establish honest governance.

John Wiley & Sons, 2008, 105 pages

Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. JUN, 2024.

Safeguarding Sport from Corruption: Focus on the FIFA World Cup 2026 and the 2028 Summer Olympics in Los Angeles

By UNODC

The FIFA World Cup and the Olympic Games are landmark events on the sporting calendar – historic competitions that are embraced around the world and that showcase the power of sport as an inspiring, unifying force. It is important that they are celebrated, and that they are protected from corruption. Corruption poses a serious threat to sport, putting at risk its capacity to positively contribute to society and lives. Since the Italian football team of Rossi and Zoff triumphed in Madrid and American sprinter Carl Lewis ran into the history books in Los Angeles, sport has undergone far reaching changes. Globalization, a huge influx of money at the top level of professional sport, the rapid growth of legal and illegal betting and marked technological advances have transformed the way sport is played and consumed. These factors have also had a major impact on corruption in sport, both in terms of its scale and its forms. These evolutions have made sports more vulnerable to corruption. Governments, organizations and other stakeholders are taking steps to better protect sport, but in many ways this journey is only in its early stages. This is why, since 2017, the UNODC Programme on Safeguarding Sport from Corruption and Economic Crime has been supporting governments, sports organizations and other stakeholders in their efforts to protect sports against corruption in its many forms. At the forefront of this work is the use of the only legally binding universal anti-corruption instrument – the United Nations Convention against Corruption. One of the areas in which this work is focused is major sports events. The exposure of corruption surrounding these types of events in recent times needs little reiteration, but it is a reminder of the work to be done and of the importance of strengthening the fight against corruption in sport. This is why detecting and preventing corruption in relation to the FIFA World Cup 2026 and the 2028 Summer Olympic Games, preparation for which is getting under way in Canada, Mexico and the United States of America, is critical. First and foremost, these competitions are blue-ribbon events, the integrity of which must be fully protected, but they also represent a timely opportunity to showcase how this anti corruption action can be delivered. They are a chance to demonstrate how UNODC and its partners, and how greater international, regional, national and local cooperation between government authorities, sports organizations, anti corruption agencies and other key stakeholders, can help combat corruption linked to major sports events, and in sport in general. This is the focus of the present report – an examination of the corruption-related risks faced by the FIFA World Cup 2026 and the 2028 Summer Olympic Games in Los Angeles and the presentation of a clear road map of how these threats can be met, so that these events, and future ones, are better safeguarded against corruption and that their capacity to bring people together, to forge new relationships and create lasting legacies remains undiminished.

Tenth session of the Conference of the States Parties to the United Nations Convention against Corruption, held in Atlanta, Georgia, United States of America.. 2024. 28p.

Faster, Higher, Stronger: Preventing Human Trafficking at the 2010 Olympics

Perrin, Benjamin

This report considers the upcoming 2010 Olympics in Vancouver in the context of Canada's human trafficking response to date, and makes recommendations to ensure that this event is not a flashpoint for human trafficking.

Calgary: Future Group, 2007. 24p.

Mega-Events and Risk Colonisation: Risk Management and the Olympics

Jennings, Will

This paper uses the idea of risk colonisation (Rothstein et al. 2006) to analyse how societal and institutional risks simultaneously make mega-events such as the Olympics a problematic site for risk management while contributing to the spread of the logic and formal managerial practice of risk management. It outlines how mega-events are linked to broader societal and institutional hazards and threats but at the same time induce their own unique set of organizational pathologies and biases. In this context, it is argued that the combination of societal and institutional risks create pressure for safety and security which in turn give rise to the growing influence of risk as an object of planning, operations and communication both in organisation of the Games and governance of the Olympic movement. This is consistent with the colonizing influence of risk over time: both in the creation of formal institutions (such as risk management teams and divisions) and the proliferation of the language of 'risk' as an object of regulation and control.

London: Centre for Analysis of Risk and Regulation, London School of Economics and Political Science, 2012. 31p.

The 2016 Olympic Games: Health, Security, Environmental and Doping Issues

Halchin, L. Elaine and John W. Rollins

Issues affecting the safety and security of athletes and spectators at the 2016 Olympic Games, which begins August 5 in Rio de Janeiro, Brazil, are reviewed in this report from the Congressional Research Service. Concerns addressed in the CRS report include the Zika virus outbreak, domestic crime, the threat of terrorism, environmental hazards, and more.

Washington, DC: Congressional Research Service, 2016. 38p.

The Cybersecurity of Olympic Sports: New Opportunities, New Risks

Cooper, Betsy

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) has released a report focused on the rapidly evolving landscape of cybersecurity in sports, with an emphasis on the Olympic Games. The report, "The Cybersecurity of Olympic Sports: New Opportunities, New Risks," is an unprecedented look into how the proliferation of new technologies in major sporting events�from digital display panels in stadiums to online ticketing systems to artificial intelligence-based scoring software - opens the door to cyberattacks that could threaten public safety, diminish the fan experience, and undermine the integrity of competition. CLTC produced the report through a partnership with Cal Athletics (the University of California, Berkeley's athletics department) as well as the Los Angeles Organizing Committee for the 2028 Olympic Games. Using the Olympic Games as a case study, the report introduces a framework for evaluating potential risks posed by digital technologies in sports, and highlights possible threats that will arise as these technologies are deployed. The study identifies key areas of risk, including hacks on stadiums, scoring systems, and photo and video replay systems; manipulation of digital systems used by athletes for training and self-care; hacks on transportation and entry systems; as well as more extreme attacks designed to induce panic or facilitate terrorism or kidnapping. The report also includes fictional news stories from the future to highlight hypothetical incidents. One shows how malicious actors seeking to disrupt the Olympics could cause mass panic in a stadium by hacking into digital display panels. Another story highlights how hackers could manipulate a software-based scoring system in gymnastics, throwing a marquee event into chaos. A third story focuses on how "smart" appliances installed in athlete' residences in the Olympics Village could be hacked and used for surveillance. The report suggests that sporting event planners should consider the potential cybersecurity implications of any new technology, noting that "organizers should press to ensure that there are tangible benefits to incorporating digital devices�and that significant risks can be mitigated�before going forward."

Berkeley, CA: University of California at Berkeley, Center for Long-Term Cybersecurity, 2017. 40p.

Soldiers, Cops, Bannermen

By Kees Kuiken

“Soldiers, Cops, Bannermen: The Rise and Fall of the First Communist Chinese PoliceState1931-1969”by Kees Kuiken, discusses the history of the Chinese police state from1931 to 1969. The book explores topics such as the role of police in maintaining control, the transition from soldiers to cops, and the challenges faced by the police state. The book also examines the historical context of China’s quest for order and the evolution of the police system in the Chinese Empire.

Wolters-Noordhoff, 1993 - 143 pages

Provisional Authority

By Beatrice Jauregui

“Provisional Authority: Police, Order, and Security in India” by Beatrice Jauregui. was published by The University of Chicago Press in 2016. The book explores the role of the police in India, focusing on the Uttar Pradesh Police Department and its challenges with corruption and maintaining order. The author conducted interviews with police officers to gain insight into their experiences. The book also discusses the bureaucratic politics and states of insecurity within the police department. The document includes acknowledgments, a table of contents, and references.

University of Chicago Press, 2016. 205 pages

U.S. Government Global Health Security Strategy 2024

UNITED STATES. WHITE HOUSE OFFICE

From the document: "Over the last 3 years, we have more than doubled our global health partnerships--working directly with 50 countries to ensure they can more effectively prevent, detect, and control outbreaks. And we are working with partners to support an additional 50 countries to save even more lives and minimize economic losses. With strong bipartisan support from Congress, we also championed the creation of the Pandemic Fund, a new international body that has already catalyzed $2 billion in financing from 27 contributors, including countries, foundations, and philanthropies, to build stronger global health security capabilities. We are working to make life-saving medicines and vaccines more rapidly available in health emergencies, including through supporting Gavi, the Vaccine Alliance and the Coalition for Epidemic Preparedness Innovations. And we are leading efforts to ensure international financial institutions, such as the World Bank Group, scale up lending for pandemic prevention, preparedness, and response because health security, economic security, climate security, and national security are all related. This new Global Health Security Strategy lays out the actions the United States will take over the next 5 years to ensure we continue this progress[.]"

United States. White House Office. APR, 2024. 64p.

DHS Innovation, Research & Development Strategic Plan: Fiscal Years 2024-2030

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY

From the document: "Protecting our nation requires timely responses to rapidly evolving dangers while protecting against longer-term homeland security threats and hazards. To meet these complex operational needs, innovation, research and development (IRD) initiatives and investments are critical to ensure the Department of Homeland Security (DHS) has the tools to help secure our nation. [...] While historically DHS has supported research and development (R&D), investments in innovation are newer and growing in scope and number across all DHS Components, whether through technological improvements or process efficiencies. The combination of these innovation and R&D investments will benefit from increased awareness and coordination. The Secretary's Calendar Year (CY) 2023 priorities captured this, seeking to 'ensure R&D across the Department and with external partners are coordinated and integrated.' To accomplish this goal, this coordinated DHS IRD Strategic Plan focuses on current efforts and longer-term Departmental investments. The Plan also highlights complementary efforts underway across the HSE [homeland security enterprise], consisting of federal, state, local, tribal, territorial, nongovernmental, and private sector entities, as well as individuals, families, and communities who share a common national interest in the safety and security of the United States and its people. The Plan inventories current and future IRD efforts within DHS, organized by the DHS Missions and Objectives as articulated in the third 'Quadrennial Homeland Security Review (2023).' By capturing these initiatives in a comprehensive plan, the Department can identify cross-cutting IRD themes that provide opportunities for making impacts towards meeting multiple desired outcomes. These are articulated as Strategic Priority Research Areas (SPRAs)[.]"

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY. MAY, 2024. 44p.

Global Threat Forecast 2024

GUNARATNA, ROHAN

From the document: "In 2024, the Israel-Hamas conflict will emerge as the preeminent threat to global security. An escalation of the conflict could spark a regional war and lead to a global recession. The West's support for Israel will fuel protests in the Muslim world, drive radicalisation and bring about terrorist attacks. Sunni and Shia groups will pose a common threat to western, Israeli and Jewish interests. Preventing the conflict from escalating and working towards a sustainable solution for the Palestinian people will require visionary leadership."

NANYANG TECHNOLOGICAL UNIVERSITY. .30 MAY, 2024.

Assessing Shifts in U.S. Department of Homeland Security Targeted Violence Prevention Efforts Through Early 2022

By Caitlin McCullochBrian A. JacksonSameer M. SiddiqiJordan R. ReimerEmily Allendorf

The U.S. Department of Homeland Security (DHS) has changed and expanded its efforts in violence prevention in the past five years. DHS asked the Homeland Security Operational Analysis Center (HSOAC) to examine the change in efforts by the Center for Prevention Programs and Partnerships (CP3) and its predecessor organizations in preventing terrorism and other violence and explore options for CP3 moving forward.

In the United States, the full potential value of countering violent extremism (CVE) has never been realized because of key disconnects between the intent of CVE programs and the realities of their implementation. Although it might not have been the intent, efforts singled out and stigmatized American Muslim communities. The disconnect between stated intention and reality stimulated potent opposition to CVE as a concept. In response, the federal government decided to make significant changes in its approaches in this policy area. In late 2021, DHS asked HSOAC to examine and characterize the changes that had been made, providing an outside viewpoint on the extent of change and how those changes had responded to the concerns about CVE efforts. This report documents the researchers' approach, findings, and recommendations.

Key Findings

  • There has been enormous growth in CP3, and it is currently working on developing and standardizing the institutions and processes that are required to support a larger organization. These efforts include extensive standardization efforts in training and evaluation of CP3's work. Coronavirus disease 2019 (COVID-19) posed some problems, including making it difficult to create a cohesive whole with new personnel, but also presented some new opportunities, such as an increased ability to reach a diversity of stakeholders digitally.

  • CP3 and the government more broadly have made major shifts in the rhetorical framing of their work, toward a public health–informed approach, a framing that aligns more closely with the intent of their programs. Although there is still discussion of the implications of a public health–informed approach, this shift was reflected in both interviews and official documentation.

  • In line with this rhetorical shift is the expansion in the diversity of stakeholders, both in engagement and in grantees, including evidence of a shift away from criminal justice and security partners, although they remain important collaborators.

  • External stakeholders remain skeptical, but there are some signs of increasing trust in relevant actors outside government.

Recommendations

  • Continue efforts to build and sustain consistency in messages and activities. Many external stakeholders noted the importance of rebuilding trust and that sustainable and continuous actions and relationships were essential for fostering that trust.

  • Continue to codify and standardize internal office procedures—with rapid growth comes a renewed need for new internal institutions to keep all personnel on the same page.

  • More clearly define the elements of a public health–informed approach and how they will be applied to violence prevention for CP3 programs and outreach. There are many definitions present in practitioner circles and the academic literature; choosing one and fully exploring the implications of the definition will be key for aligning stated CP3 goals with programmatic action.

  • Invest further in program evaluation. The research team recognizes that it is difficult to evaluate effectiveness in this area, but, without standardized evaluation, supporting the impact of CP3 programs will be difficult.

  • Commit to transparency and external communication. Transparency in actions taken and evidence collected, as well as communication with skeptical audiences, will be key in showing change and growth in CP3 and its activities to external actors and in further building trust with external audiences.

Keeping Soft Targets and Crowded Places Safe from Mass-Casualty Attacks: Insights from a Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Soft targets and crowded places (ST-CPs) are easily accessible to large numbers of people and have limited security or protective measures in place, making them vulnerable to attack. Examples include sports arenas, shopping centers, schools, transportation systems, and houses of worship. Although attacks on them are relatively rare, they result in significant loss of life and contribute to an atmosphere of fear throughout society. Researchers performed a landscape assessment of the threat to and major vulnerabilities of ST-CPs, existing security measures and initiatives, and ways to improve allocation of security resources. The researchers then developed a road map for future investments and made recommendations for improving ST-CP security and response to attacks. These recommendations include research, development, test, and evaluation priorities to improve prevention and protection, such as seeking methods of deterring and dissuading would-be attackers, more evaluation of the effectiveness of security measures, and developing a model concept of operations for open and nonsecure spaces. In addition, they recommended funding and policy priorities focused on public education and training, providing additional resources to cross-organizational security teams and managers, and increasing funding for access control systems.

Key Findings

  • The most-common motivations for attacks are personal, followed by terrorism and extremism.

  • Education and private buildings are the most–frequently targeted types of ST-CPs.

  • Attacks on ST-CPs with large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, have the highest average lethality.

  • Layered security strategies, in which measures work together, improve the chance that an attack will be prevented, halted, or mitigated.

  • Tips from the public have prevented attacks. Public education on what to report and how, and support for threat assessment teams, would make tips more effective.

  • Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient but need to be trained on and maintained.

  • Bystanders and security have both stopped attacks. Groups of bystanders tackling shooters have been highly effective. Training can make responses even more effective.

  • Response command, control, and communications need to be improved. Alternatives to traditional, push-to-talk voice radio communications are needed.

  • Security measures need more effectiveness and efficiency evaluations. The security community has growing interest in artificial intelligence (AI); evaluations of security systems with AI will be needed as these systems deploy.

Recommendations

  • Find ways to deter and dissuade would-be attackers.

  • Develop indicators of and education about suspicious seeking of weapons.

  • Develop protocols and education for wellness checks.

  • Further evaluate the effectiveness and cost-effectiveness of security measures.

  • Develop a model concept of operations for open and nonsecure spaces, such as shopping malls and restaurants.

  • Continuously track and analyze mass-attack plots.

  • Review mass-shooting events to determine whether some ordinary criminal shootings should be treated as mass attacks on soft targets or crowded places.

  • Find ways to reduce the mass psychological effects of attacks, including societal fear and secondary trauma.

  • Focus on basics, such as provision and maintenance of access control equipment and public education campaigns on what to look for and how to report it.

  • Strengthen the system-based, layered security framework.

  • Ensure that funding and policy priorities reflect research findings.

  • Fund enhanced public education and training on what to report and how.

  • Provide additional funding to cross-organizational threat assessment teams and managers.

  • Fund enhanced public education and training on how to respond to an active attacker.

  • Provide additional funding to cross-organizational security teams and managers.

  • Fund and distribute updates of site security guidance documents and training.

  • Fund access control systems

Santa Monica, CA: RAND, 2024. 24p.

Improving the Security of Soft Targets and Crowded Places: A Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Attacks on soft targets and crowded places (ST-CPs) represent a significant challenge. The U.S. Department of Homeland Security requires research and development to assess methods for reducing the propensity and loss of life from these types of attacks. In response, researchers from the Homeland Security Operational Analysis Center conducted a comprehensive landscape assessment of the threat to ST-CPs and corresponding security measures. This assessment integrated literature reviews, attack plot analyses, grant data reviews, and security cost modeling to identify both needs for improvement and recommended research and investment priorities for addressing those needs.

The number of attack plots is broadly aligned with regional population counts. The most-common motivations for ST-CP attacks have been personal, followed by terrorist and extremist motivations. Education and private buildings (workplaces) are the most–frequently targeted types of ST-CPs. Attacks on ST-CPs that have large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, had the highest average lethality.

To defend ST-CPs, a layered approach has security measures work together to improve the chance that an attack will be stopped or mitigated. Prevention measures stop attacks before they reach execution; however, the public needs to know what warning signs to look for and how to report them, and threat assessment teams need to assess tips and follow up appropriately. Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient. Bystanders and security have both stopped attacks; groups of bystanders tackling shooters have been highly effective.

Key Findings

The conditions that a would-be attacker must fulfill to successfully execute a high-fatality attack are collectively the attack chain; interrupting that chain can prevent or reduce casualties

  • An attacker must carry out many steps to complete a high-fatality attack. The attacker must become fully committed, plan, acquire weapons and skills, and make other preparations without being detected and reported by others. Once on scene, the attacker must get through the site's security layers and engage a crowd without being stopped quickly.

  • A system-based, or layered, approach helps security measures work together to improve the chances that an attack will be stopped or mitigated at any of these steps, guarding against single points of failure.

  • Prevention measures are perhaps the most-important factors in interrupting the attack chain because they can and have halted many plots before they reached execution. Reports of warning signs have been key. However, the public must know what to look for and how, and authorities need threat assessment teams and training to assess tips and follow up appropriately.

  • Access and entry-control systems, including locks, secured windows, and secured entry spaces, have been effective and efficient in protecting against attackers.

  • Both bystanders and on-scene security have been effective in stopping attacks. Groups of bystanders tackling shooters have been highly effective in ending attacks.

    Recommendations

  • Seek methods for deterring and dissuading would-be attackers from becoming committed to plots.

  • Develop indicators and training to detect suspicious seeking of weapons and ammunition.

  • Develop enhancements to "see something, say something" campaigns.

  • Develop and evaluate campaigns to reduce hoax threats of violence.

  • Develop rules and processes for assessment, monitoring, and follow-up with reported threats, including processes for initial wellness checks.

  • Evaluate the effectiveness of site security technologies in stopping simulated attacks.

  • Study the social costs of security measures more.

  • Develop a model strategy for open and nonsecure spaces, such as parks, parking lots, shopping malls, and restaurants.

  • Improve command and control, leadership, and coordination during attack responses.

  • Study alternatives to traditional voice radio communications during attack responses.

  • Continuously track and analyze mass-attack plots.

  • Determine whether some ordinary criminal shootings should be treated as mass attacks on ST-CPs.

  • Seek ways to reduce the mass psychological impacts of attacks.

  • Support detailed tracking of grant spending related to ST-CP security.

  • Fund enhanced public education and training on what to report and how and on how to respond to an active attacker.

  • Provide funding to cross-organizational threat assessment teams, security teams, and managers, and provide training on how to report on and how to respond during an incident.

  • Fund access control systems.

  • Fund medical supplies and training to match updated medical standards.

Santa Monica, CA: RAND, 2024. 168p.

Terrorism and Immigration: A Risk Analysis, 1975-2023

NOWRASTEH, ALEX

From the document: "This policy analysis is an update and simplification of three previous Cato policy analyses on the same topic that were published in 2016, 2019, and 2023. It differs from the 2016 and 2019 editions because it does not include the total number of visas issued during the years analyzed, does not include a cost-benefit analysis of different immigration policies intended to reduce the threat of foreign-born terrorism, and it further differs from the 2019 version because it does not include native-born terrorists. The risks of foreign-born terrorists on US soil are quantified by evaluating how many people they murdered and injured in attacks, the ideologies of the attackers, the visas on which the foreign-born terrorists entered the country, their countries of origin, and the costs of their terrorist attacks."

CATO INSTITUTE. 9 APR, 2024. 28p.