Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts in security
U.S. Government Global Health Security Strategy 2024

UNITED STATES. WHITE HOUSE OFFICE

From the document: "Over the last 3 years, we have more than doubled our global health partnerships--working directly with 50 countries to ensure they can more effectively prevent, detect, and control outbreaks. And we are working with partners to support an additional 50 countries to save even more lives and minimize economic losses. With strong bipartisan support from Congress, we also championed the creation of the Pandemic Fund, a new international body that has already catalyzed $2 billion in financing from 27 contributors, including countries, foundations, and philanthropies, to build stronger global health security capabilities. We are working to make life-saving medicines and vaccines more rapidly available in health emergencies, including through supporting Gavi, the Vaccine Alliance and the Coalition for Epidemic Preparedness Innovations. And we are leading efforts to ensure international financial institutions, such as the World Bank Group, scale up lending for pandemic prevention, preparedness, and response because health security, economic security, climate security, and national security are all related. This new Global Health Security Strategy lays out the actions the United States will take over the next 5 years to ensure we continue this progress[.]"

United States. White House Office. APR, 2024. 64p.

DHS Innovation, Research & Development Strategic Plan: Fiscal Years 2024-2030

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY

From the document: "Protecting our nation requires timely responses to rapidly evolving dangers while protecting against longer-term homeland security threats and hazards. To meet these complex operational needs, innovation, research and development (IRD) initiatives and investments are critical to ensure the Department of Homeland Security (DHS) has the tools to help secure our nation. [...] While historically DHS has supported research and development (R&D), investments in innovation are newer and growing in scope and number across all DHS Components, whether through technological improvements or process efficiencies. The combination of these innovation and R&D investments will benefit from increased awareness and coordination. The Secretary's Calendar Year (CY) 2023 priorities captured this, seeking to 'ensure R&D across the Department and with external partners are coordinated and integrated.' To accomplish this goal, this coordinated DHS IRD Strategic Plan focuses on current efforts and longer-term Departmental investments. The Plan also highlights complementary efforts underway across the HSE [homeland security enterprise], consisting of federal, state, local, tribal, territorial, nongovernmental, and private sector entities, as well as individuals, families, and communities who share a common national interest in the safety and security of the United States and its people. The Plan inventories current and future IRD efforts within DHS, organized by the DHS Missions and Objectives as articulated in the third 'Quadrennial Homeland Security Review (2023).' By capturing these initiatives in a comprehensive plan, the Department can identify cross-cutting IRD themes that provide opportunities for making impacts towards meeting multiple desired outcomes. These are articulated as Strategic Priority Research Areas (SPRAs)[.]"

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY. MAY, 2024. 44p.

State Policing in Sub-Saharan Africa

By Fatoumata Sira Diallo

This book is a collection of various titles and references related to the topics of diplomacy, strategy, and policing in Sub-Saharan Africa. It includes information on academic works, books, articles, and documents that cover subjects such as international relations, political science, economic science, and sociology. The document also mentions specific titles and authors, as well as organizations and websites that provide relevant information on these topics.

Editions L'Harmattan, 2019, 391 pages

Policing Terrorism, Crime-Control, and Police-Community Relations

By by Tal Jonathan-Zamir, David Weisburd, and Badi Hasisi.

“Policing Terrorism, Crime Control, and Police-Community Relations: Learning fromthe Israeli Experience.”is written by Tal Jonathan-Zamir, David Weisburd, and Badi Hasisi. The book discusses the Israeli experience in policing terrorism, crime control,and police-community relations. It covers various topics such as the impact of terrorismthreats on police performance, public evaluations of the police, and the role of thepolice in counterterrorism. The book is supported by grants from the U.S. Departmentof Homeland Security and the U.S. National Institute of Justice

Springer, 2014, 172 pagine

Policing the Conflict in South Africa

By M.L. Mathews, Philip B. Heymann, andA.S. Mathews

“Policing the Conflict in South Africa”edited by M.L. Mathews, Philip B. Heymann, and A.S. Mathews. discusses the reform of policing in South Africa, including the structure, membership, and control of the police, as well as popular perceptions of policing among blacks in South Africa. The document also mentions protests and police misconduct in South Africa.

Cambridge University Press, 2008, 226 pages

Policing the Frontier

By Marco Gopfert

This book titled“Policing the Frontier: An Ethnography of Two Worlds in Niger”by Mirco Gopfert. is part of the seriesPolice/Worlds: Studies in Security, Crime, and Governance. It explores the topic of policing in rural Niger and examines thei nteraction between the police and the local communities. The book provides an ethnographic perspective on the challenges and complexities of policing in this context.

Cornell University Press, 2020, 175 pages

KGB

By Brian Freemantle

KGB By Brian Freemantle delves into the shadowy world of espionage, taking readers on a thrilling journey through the intricate web of Soviet intelligence. In this gripping tale, Freemantle masterfully weaves together a narrative filled with suspense, betrayal, and unexpected twists. As the protagonist navigates the dangerous landscape of Cold War politics, they must confront their own demons while unraveling a conspiracy that threatens to change the course of history. Freemantle's expert storytelling and attention to detail make KGB a must-read for fans of espionage fiction.

Little, Brown Book Group Limited, 1984 192 pages

Optimizing Cyberdeterrence

By Robert Mandel

Optimizing Cyberdeterrence by Robert Mandel provides a comprehensive analysis of strategies to enhance cybersecurity on a global scale. Mandel delves into the concept of cyberdeterrence and how it can be optimized to prevent cyberattacks effectively. Through detailed case studies and theoretical frameworks, the book offers valuable insights into the evolving landscape of cyber threats and the necessary steps to mitigate them. A must-read for policymakers, cybersecurity professionals, and anyone interested in safeguarding against cyber risks.

Georgetown University Press, 2017 - 287 pages

Loss Prevention and Security Procedures

Loss Prevention and Security Procedures By Robert James Fischer & Richard Janoski

Loss Prevention and Security Procedures by Robert James Fischer & Richard Janoski provides a comprehensive overview of strategies and tactics essential for safeguarding businesses and organizations. This practical guide offers insights into the latest advancements in loss prevention technologies and security measures, equipping readers with the knowledge needed to mitigate risks effectively. Fischer and Janoski's expertise shines through in this invaluable resource, making it a must-read for professionals in the field of security and loss prevention.

Butterworth-Heinemann, Dec 13, 1999, 336 pages

Cyberstalking Harassment in the Internet Age and How to Protect Your Family

MAY CONTAIN MARKUP

PAUL BoCIJ

INTRODUCTION; “We are constantly told that technology enriches our lives: the Internet provides learning opportunities for our children, cell phones allow us to keep in touch with our relatives while we're on the move, and laptop computers allow us to work almost anywhere at any time. But we are also constantly warned about the dangers of technology, especially the Internet: hackers can steal our credit card numbers, pedophiles can target our children, and racists can spread messages of hate. We take these dangers seriously because technology permeates almost every aspect of our lives. For instance, it is not an exaggeration to sugges t that virtually every child in the United States, Europe, and any number of other technically advanced nations will come into regular contact with the Internet. It is for this reason that parents, teachers, law enforcement agencies, and others constantly monitor the safety of th e young people in their care.”

Praeger. Westport, Connecticut London. 2004. 273p.

Computer Fraud and Countermeasures

MAY CONTAIN MARKUP

By LEONARD I. KRAUSS and AILEEN MACGAHAN

FROM THE PREFACE: “This book deals with computer fraud prevention, detection, deterrents, investigation, loss recovery, and risk management. (The term "computer fraud" is our shorthand way of referring to computerassisted or computer-related crimes. The people who commit these crimes may use the computer either directly or as a vehicle for deliberate misrepresentation or deception, usually to cover up the embezzlement or theft of money, goods, services, or information.) Avoiding the sensationalism that so often characterizes the current literature on the subject, this book is addressed to business executives, financial and administrative officers, data processing managers, systems analysts, auditors, corporate and computer security supervisors, law enforcement investigators, and others who are responsible for providing direction in coping with the risk of computer fraud.”

RENTICE-HALL, INC., Englewood Cliffs, New Jersey. 1979. 502p.

Global Threat Forecast 2024

GUNARATNA, ROHAN

From the document: "In 2024, the Israel-Hamas conflict will emerge as the preeminent threat to global security. An escalation of the conflict could spark a regional war and lead to a global recession. The West's support for Israel will fuel protests in the Muslim world, drive radicalisation and bring about terrorist attacks. Sunni and Shia groups will pose a common threat to western, Israeli and Jewish interests. Preventing the conflict from escalating and working towards a sustainable solution for the Palestinian people will require visionary leadership."

NANYANG TECHNOLOGICAL UNIVERSITY. .30 MAY, 2024.

Assessing Shifts in U.S. Department of Homeland Security Targeted Violence Prevention Efforts Through Early 2022

By Caitlin McCullochBrian A. JacksonSameer M. SiddiqiJordan R. ReimerEmily Allendorf

The U.S. Department of Homeland Security (DHS) has changed and expanded its efforts in violence prevention in the past five years. DHS asked the Homeland Security Operational Analysis Center (HSOAC) to examine the change in efforts by the Center for Prevention Programs and Partnerships (CP3) and its predecessor organizations in preventing terrorism and other violence and explore options for CP3 moving forward.

In the United States, the full potential value of countering violent extremism (CVE) has never been realized because of key disconnects between the intent of CVE programs and the realities of their implementation. Although it might not have been the intent, efforts singled out and stigmatized American Muslim communities. The disconnect between stated intention and reality stimulated potent opposition to CVE as a concept. In response, the federal government decided to make significant changes in its approaches in this policy area. In late 2021, DHS asked HSOAC to examine and characterize the changes that had been made, providing an outside viewpoint on the extent of change and how those changes had responded to the concerns about CVE efforts. This report documents the researchers' approach, findings, and recommendations.

Key Findings

  • There has been enormous growth in CP3, and it is currently working on developing and standardizing the institutions and processes that are required to support a larger organization. These efforts include extensive standardization efforts in training and evaluation of CP3's work. Coronavirus disease 2019 (COVID-19) posed some problems, including making it difficult to create a cohesive whole with new personnel, but also presented some new opportunities, such as an increased ability to reach a diversity of stakeholders digitally.

  • CP3 and the government more broadly have made major shifts in the rhetorical framing of their work, toward a public health–informed approach, a framing that aligns more closely with the intent of their programs. Although there is still discussion of the implications of a public health–informed approach, this shift was reflected in both interviews and official documentation.

  • In line with this rhetorical shift is the expansion in the diversity of stakeholders, both in engagement and in grantees, including evidence of a shift away from criminal justice and security partners, although they remain important collaborators.

  • External stakeholders remain skeptical, but there are some signs of increasing trust in relevant actors outside government.

Recommendations

  • Continue efforts to build and sustain consistency in messages and activities. Many external stakeholders noted the importance of rebuilding trust and that sustainable and continuous actions and relationships were essential for fostering that trust.

  • Continue to codify and standardize internal office procedures—with rapid growth comes a renewed need for new internal institutions to keep all personnel on the same page.

  • More clearly define the elements of a public health–informed approach and how they will be applied to violence prevention for CP3 programs and outreach. There are many definitions present in practitioner circles and the academic literature; choosing one and fully exploring the implications of the definition will be key for aligning stated CP3 goals with programmatic action.

  • Invest further in program evaluation. The research team recognizes that it is difficult to evaluate effectiveness in this area, but, without standardized evaluation, supporting the impact of CP3 programs will be difficult.

  • Commit to transparency and external communication. Transparency in actions taken and evidence collected, as well as communication with skeptical audiences, will be key in showing change and growth in CP3 and its activities to external actors and in further building trust with external audiences.

Keeping Soft Targets and Crowded Places Safe from Mass-Casualty Attacks: Insights from a Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Soft targets and crowded places (ST-CPs) are easily accessible to large numbers of people and have limited security or protective measures in place, making them vulnerable to attack. Examples include sports arenas, shopping centers, schools, transportation systems, and houses of worship. Although attacks on them are relatively rare, they result in significant loss of life and contribute to an atmosphere of fear throughout society. Researchers performed a landscape assessment of the threat to and major vulnerabilities of ST-CPs, existing security measures and initiatives, and ways to improve allocation of security resources. The researchers then developed a road map for future investments and made recommendations for improving ST-CP security and response to attacks. These recommendations include research, development, test, and evaluation priorities to improve prevention and protection, such as seeking methods of deterring and dissuading would-be attackers, more evaluation of the effectiveness of security measures, and developing a model concept of operations for open and nonsecure spaces. In addition, they recommended funding and policy priorities focused on public education and training, providing additional resources to cross-organizational security teams and managers, and increasing funding for access control systems.

Key Findings

  • The most-common motivations for attacks are personal, followed by terrorism and extremism.

  • Education and private buildings are the most–frequently targeted types of ST-CPs.

  • Attacks on ST-CPs with large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, have the highest average lethality.

  • Layered security strategies, in which measures work together, improve the chance that an attack will be prevented, halted, or mitigated.

  • Tips from the public have prevented attacks. Public education on what to report and how, and support for threat assessment teams, would make tips more effective.

  • Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient but need to be trained on and maintained.

  • Bystanders and security have both stopped attacks. Groups of bystanders tackling shooters have been highly effective. Training can make responses even more effective.

  • Response command, control, and communications need to be improved. Alternatives to traditional, push-to-talk voice radio communications are needed.

  • Security measures need more effectiveness and efficiency evaluations. The security community has growing interest in artificial intelligence (AI); evaluations of security systems with AI will be needed as these systems deploy.

Recommendations

  • Find ways to deter and dissuade would-be attackers.

  • Develop indicators of and education about suspicious seeking of weapons.

  • Develop protocols and education for wellness checks.

  • Further evaluate the effectiveness and cost-effectiveness of security measures.

  • Develop a model concept of operations for open and nonsecure spaces, such as shopping malls and restaurants.

  • Continuously track and analyze mass-attack plots.

  • Review mass-shooting events to determine whether some ordinary criminal shootings should be treated as mass attacks on soft targets or crowded places.

  • Find ways to reduce the mass psychological effects of attacks, including societal fear and secondary trauma.

  • Focus on basics, such as provision and maintenance of access control equipment and public education campaigns on what to look for and how to report it.

  • Strengthen the system-based, layered security framework.

  • Ensure that funding and policy priorities reflect research findings.

  • Fund enhanced public education and training on what to report and how.

  • Provide additional funding to cross-organizational threat assessment teams and managers.

  • Fund enhanced public education and training on how to respond to an active attacker.

  • Provide additional funding to cross-organizational security teams and managers.

  • Fund and distribute updates of site security guidance documents and training.

  • Fund access control systems

Santa Monica, CA: RAND, 2024. 24p.

Improving the Security of Soft Targets and Crowded Places: A Landscape Assessment

By John S. Hollywood, Keith Gierlack, Pauline Moore, Thomas Goode, Henry H. Willis, Devon Hill, Rahim Ali, Annie Brothers, Ryan Bauer, Jonathan Tran

Attacks on soft targets and crowded places (ST-CPs) represent a significant challenge. The U.S. Department of Homeland Security requires research and development to assess methods for reducing the propensity and loss of life from these types of attacks. In response, researchers from the Homeland Security Operational Analysis Center conducted a comprehensive landscape assessment of the threat to ST-CPs and corresponding security measures. This assessment integrated literature reviews, attack plot analyses, grant data reviews, and security cost modeling to identify both needs for improvement and recommended research and investment priorities for addressing those needs.

The number of attack plots is broadly aligned with regional population counts. The most-common motivations for ST-CP attacks have been personal, followed by terrorist and extremist motivations. Education and private buildings (workplaces) are the most–frequently targeted types of ST-CPs. Attacks on ST-CPs that have large, accessible crowds, such as houses of worship, shopping malls, restaurants, bars, and nightclubs, had the highest average lethality.

To defend ST-CPs, a layered approach has security measures work together to improve the chance that an attack will be stopped or mitigated. Prevention measures stop attacks before they reach execution; however, the public needs to know what warning signs to look for and how to report them, and threat assessment teams need to assess tips and follow up appropriately. Access control systems, such as locks, secured windows, and secured entryways, have been effective and efficient. Bystanders and security have both stopped attacks; groups of bystanders tackling shooters have been highly effective.

Key Findings

The conditions that a would-be attacker must fulfill to successfully execute a high-fatality attack are collectively the attack chain; interrupting that chain can prevent or reduce casualties

  • An attacker must carry out many steps to complete a high-fatality attack. The attacker must become fully committed, plan, acquire weapons and skills, and make other preparations without being detected and reported by others. Once on scene, the attacker must get through the site's security layers and engage a crowd without being stopped quickly.

  • A system-based, or layered, approach helps security measures work together to improve the chances that an attack will be stopped or mitigated at any of these steps, guarding against single points of failure.

  • Prevention measures are perhaps the most-important factors in interrupting the attack chain because they can and have halted many plots before they reached execution. Reports of warning signs have been key. However, the public must know what to look for and how, and authorities need threat assessment teams and training to assess tips and follow up appropriately.

  • Access and entry-control systems, including locks, secured windows, and secured entry spaces, have been effective and efficient in protecting against attackers.

  • Both bystanders and on-scene security have been effective in stopping attacks. Groups of bystanders tackling shooters have been highly effective in ending attacks.

    Recommendations

  • Seek methods for deterring and dissuading would-be attackers from becoming committed to plots.

  • Develop indicators and training to detect suspicious seeking of weapons and ammunition.

  • Develop enhancements to "see something, say something" campaigns.

  • Develop and evaluate campaigns to reduce hoax threats of violence.

  • Develop rules and processes for assessment, monitoring, and follow-up with reported threats, including processes for initial wellness checks.

  • Evaluate the effectiveness of site security technologies in stopping simulated attacks.

  • Study the social costs of security measures more.

  • Develop a model strategy for open and nonsecure spaces, such as parks, parking lots, shopping malls, and restaurants.

  • Improve command and control, leadership, and coordination during attack responses.

  • Study alternatives to traditional voice radio communications during attack responses.

  • Continuously track and analyze mass-attack plots.

  • Determine whether some ordinary criminal shootings should be treated as mass attacks on ST-CPs.

  • Seek ways to reduce the mass psychological impacts of attacks.

  • Support detailed tracking of grant spending related to ST-CP security.

  • Fund enhanced public education and training on what to report and how and on how to respond to an active attacker.

  • Provide funding to cross-organizational threat assessment teams, security teams, and managers, and provide training on how to report on and how to respond during an incident.

  • Fund access control systems.

  • Fund medical supplies and training to match updated medical standards.

Santa Monica, CA: RAND, 2024. 168p.

Risk Management and Enterprise Risk Management

By Sonjai Kumar

This article discusses the differences between the risk management and enterprise risk management. Though the concept of risk management is very old, almost as old as beginning of human existence but the concept of ERM is new around two decades old. The importance of enterprise risk management increased over the period of time due various crisis and emergence risk based capital in banking and insurance industry. The article discuss the various factors necessary for success of enterprise risk management.

Academia Letters, July 2021. Article 2234. 9p

Terrorism and Immigration: A Risk Analysis, 1975-2023

NOWRASTEH, ALEX

From the document: "This policy analysis is an update and simplification of three previous Cato policy analyses on the same topic that were published in 2016, 2019, and 2023. It differs from the 2016 and 2019 editions because it does not include the total number of visas issued during the years analyzed, does not include a cost-benefit analysis of different immigration policies intended to reduce the threat of foreign-born terrorism, and it further differs from the 2019 version because it does not include native-born terrorists. The risks of foreign-born terrorists on US soil are quantified by evaluating how many people they murdered and injured in attacks, the ideologies of the attackers, the visas on which the foreign-born terrorists entered the country, their countries of origin, and the costs of their terrorist attacks."

CATO INSTITUTE. 9 APR, 2024. 28p.

Mitigating Cyber Threats with Limited Resources: Guidance for Civil Society

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY. OFFICE OF INTELLIGENCE AND ANALYSIS; UNITED STATES. FEDERAL BUREAU OF INVESTIGATION; CANADIAN CENTRE FOR CYBER SECURITY; ESTONIAN NATIONAL CYBER SECURITY CENTRE; JAPAN COMPUTER EMERGENCY RESPONSE TEAM COORDINATION CENTER; NATIONAL CENTER OF INCIDENT READINESS AND STRATEGY FOR CYBERSECURITY JAPAN; FINLAND. NATIONAL CYBER SECURITY CENTRE; JAPAN. NATIONAL POLICE AGENCY; UNITED KINGDOM. NATIONAL CYBER SECURITY CENTRE

From the document: "Civil society--nonprofit, advocacy, cultural, faith-based, academic, think tanks, journalist, dissident, and diaspora organizations, communities, and individuals involved in defending human rights and advancing democracy--are considered high-risk communities. Often, these organizations and their employees are targeted by state-sponsored threat actors who seek to undermine democratic values and interests. Regularly conducted as a type of transnational repression (also referred to as digital transnational repression), state-sponsored actors compromise organizational or personal devices and networks to intimidate, silence, coerce, harass, or harm civil society organizations and individuals. According to industry reporting, state-sponsored targeting of high-risk communities predominantly emanates from the governments of Russia, China, Iran, and North Korea. Actors typically perform extensive pre-operational research to learn about potential victims, gather information to support social engineering, or obtain login credentials. Actors target organization networks or personal accounts (e.g., email) and devices of individuals for surveillance and monitoring, often via spyware applications--malicious software that collects data from affected devices. This guide provides recommendations for civil society organizations and individuals to mitigate the threat of state-sponsored cyber operations based on observed malicious behavior. The guide also provides recommendations for software manufacturers to improve the security posture of their customers."

UNITED STATES. CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY. 14 MAY, 2024. 19p.

U.S. Space Force Commercial Space Strategy

UNITED STATES. SPACE FORCE

From the document: "The threats the United States faces from its strategic competitors have grown substantially. At the same time, the environment is being shaped by a rapidly growing commercial space sector, which is cultivating an ecosystem of innovation and reducing barriers to entry to deliver new, operationally relevant capabilities. This has extraordinary implications for global security and stability. The United States Space Force (USSF) will be more resilient and capable if it combines organic capabilities with the capabilities from other providers. Therefore, the USSF will integrate a mix of organic, allied, and commercial space solutions into hybrid architectures where the nation's space capabilities truly are greater than the sum of the parts. The USSF will leverage the commercial sector's innovative capabilities, scalable production, and rapid technology refresh rates to enhance the resilience of national security space architectures, strengthen deterrence, and support Combatant Commander objectives in times of peace, competition, crisis, conflict, and post-conflict."

UNITED STATES. DEPARTMENT OF THE AIR FORCE. 8 APR, 2024. 19p.

2023 Disaster in Numbers

DELFORGE, DAMIEN; BELOW, REGINA; WATHELET, VALENTIN; LOENHOUT, JORIS VAN; SPEYBROECK, NIKO

From the document: "In 2023, the Emergency Events Database (EM-DAT) recorded a total of 399 disasters related to natural hazards. These events resulted in 86,473 fatalities and affected 93.1 million people. The economic losses amounted to US$202.7 billion. The 2023 earthquake in Türkiye and the Syrian Arab Republic was the most catastrophic event of the year in terms of mortality and economic damage, with 56,683 reported deaths and damage worth US$42.9 billion damage. This earthquake impacted an estimated 18 million people, a total for both countries, making it the second most impactful event in terms of affected individuals. The first was the 2023 Indonesian Drought, which affected 18.8 million people from June to September 2023. In the year under review there was a high level of disaster mortality, with a total of 86,473 deaths, exceeding the 20-year average of 64,148 deaths and the median value of 19,290 deaths for the same period, mainly due to the dramatic earthquake in Türkiye and Syria in February 2023, counting for two-thirds of the EM-DAT total deaths. The number of individuals affected by disasters, 93.1 million, is below the 2003-2022 annual average of 175.5 million."

CENTRE FOR RESEARCH ON THE EPIDEMIOLOGY OF DISASTERS; CATHOLIC UNIVERSITY OF LOUVAIN (1970- : FRENCH-SPEAKING); UNITED STATES. AGENCY FOR INTERNATIONAL DEVELOPMENT. 3 APR, 2024.