Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts in security
Problem-Oriented Policing in England and Wales 2019

Aiden Sidebottom (University College London) Karen Bullock (Surrey University) Rachel Armitage (University of Huddersfield) Matt Ashby (University College London) Caitlin Clemmow (University College London) Stuart Kirby (Crime Insights Limited) Gloria Laycock (University College London) Nick Tilley (University College London).

‘Problem-oriented policing’ (POP) is an approach for improving police effectiveness. In the United Kingdom (UK), it is also referred to as ‘problem-oriented partnerships’ or ‘problem-solving policing’. Problem-solving policing calls for the police to focus not on individual incidents but on problems - defined as recurrent clusters of related incidents that affect the community. It advocates a structured process whereby the police (1) systematically identify persistent problems, (2) undertake in-depth analysis to determine the conditions giving rise to these problems, (3) devise and implement tailored responses and (4) work out if the chosen responses were effective. At its simplest, POP outlines a method for dealing with localised problems. In its most general sense, it outlines an approach for how the police operate.

Problem-solving has been widely adopted by police forces in the UK and internationally. Successive reviews, case studies and experiments have shown POP to be an effective way of reducing crime and disorder. Yet despite extensive evidence demonstrating the effectiveness of problem-solving, research also identifies recurrent challenges both in the implementation and practice of a problem-oriented approach. Consequently, POP has not become a persistent feature of policing in the UK.

College of Policing. NPCC. 2019. 89p.

Whither฀problem-oriented฀policing

By Nick Tilley

Herman฀Goldstein’s฀(1979,฀1990)฀vision฀of฀problem-oriented฀policing฀(POP)฀has฀not฀ been฀difficult฀to฀sell,฀at฀least฀in฀principle,฀and฀in฀the฀30฀years฀since฀he฀first฀mooted฀ it฀many฀scholars฀and฀police฀agencies฀have฀bought฀into฀it.฀POP฀promises฀a฀move฀ away฀from฀managerial฀priorities,฀standardized฀(and฀often฀ineffective)฀ways฀of฀working,฀and฀law฀ enforcement฀as฀an฀end฀in฀itself.฀It฀focuses฀instead฀on฀relevant฀community฀concerns,฀the฀openminded฀pursuit฀of฀ethical฀and฀effective฀solutions฀to฀recurrent฀problems,฀and฀attention฀to฀results฀ to฀learn฀better฀how฀to฀deal฀with฀similar฀problems฀in฀the฀future.฀It฀also฀suggests฀an฀efficient฀and฀ effective฀way฀of฀handling฀heavy฀demands฀on฀police฀time,฀by฀resolving฀problems฀rather฀than฀ simply฀by฀responding฀to฀them฀incident฀by฀incident.฀

American฀Society฀of฀Criminology. Criminology฀&฀Public฀Policy฀•฀Volume฀9฀•฀Issue฀1. 13p.

Cybersecurity of the Civil Nuclear Sector: Threat Landscape and International Legal Protections in Peacetime and Conflict

DIAS, TALITA DE SOUZA; HAKMEH, JOYCE; MESSMER, MARION

From the document: "Many states are becoming more interested in nuclear energy as a means to help achieve environmental goals, economic development and energy security. A declaration by 25 countries - including the US, the UK and Canada - during the COP28 UN [28th Conference of Parties to the United Nations] Climate Change Conference in December 2023 exemplified this trend, announcing an ambition to triple nuclear energy capacity by 2050 as part of efforts to achieve net zero greenhouse gas emissions and limit global warming. The commitment emphasized not only the potential role of nuclear energy in supporting sustainable development but also the consequent importance of maintaining safety, sustainability, security and non-proliferation standards in the civil nuclear industry. As growth in the use of nuclear energy would imply that more nuclear power plants will come into operation, considerations of safety and security in the civil nuclear industry - including around cybersecurity, the specific subject of this paper - are likely to become more critical than ever. Since Russia's full-scale invasion of Ukraine in February 2022, there has been a notable shift in many Western countries' energy security strategies. [...] This surge in interest can be attributed in part to nuclear energy's reliability, resilience and low carbon footprint. [...] However, any expansion of nuclear capabilities also brings new challenges, particularly in cybersecurity. Cyber operations targeting civil nuclear systems have been reported worldwide. Such operations pose significant risks, with potential harms including information theft, equipment malfunction, disruption of energy supplies, environmental damage and health impacts. The risks are prevalent both in peacetime and during conflicts."

ROYAL INSTITUTE OF INTERNATIONAL AFFAIRS. JUL, 2024.

Cargo Security : A Nuts and Bolts Approach

By Lawrence S. Jones

Cargo Security Focus: The book, titled "Cargo Security: A Nuts andBolts Approach" by Lawrence S. Jones, R.I.C., is dedicated to combating cargo theft through management and procedural strategies.

Comprehensive Coverage: It covers various aspects of cargo security,including employee roles, cargo protection basics, warehouse and docksecurity, packaging, transportation hazards, and the involvement oforganized crime in cargo theft.

Practical Guidelines: The book provides practical checklists, securitymeasures, and detailed procedures for securing cargo across differenttransportation modes such as motor carriers, marine cargo, air cargo,and rail cargo.

Management's Role: Emphasizes the critical role of management in implementing effective controls and procedures to minimize cargo theft and loss, highlighting the importance of a coordinated effort among all parties involved in the transportation chain. The document serves as a guide for business executives, security directors, consultants, and law enforcement personnel to implement security practices effectively.

Butterworth Publishes, 1983, 379 pages

Permission to Steal : Revealing the Roots of Corporate Scandal

By Lisa H. Newton

Author and Work: Lisa H. Newton, the author of the book "Permissionto Steal," is a Professor of Philosophy and Director of the Program inApplied Ethics at Fairfield University[^1^][1]. The book addresses theroots of corporate scandal and is published by Blackwell Publishing.

Ethical Analysis: Newton provides a philosophical and ethical analysis of corporate scandals, questioning what went wrong, why it was wrong, and how it happened. She emphasizes the importance of ethics in business for a healthier society.

Corporate Scandals: The book discusses the wave of corporate scandals, highlighting the need for vigilance and accountability in the business system. It reflects on the loss of trust and the impact of greed and corruption at high levels.

Societal Impact: Newton suggests tasks to restore trust in the nation's wealthiest and proposes ways to prevent future theft and corruption, advocating for an integrated and morally sound society. The book calls for action to end white-collar crime and establish honest governance.

John Wiley & Sons, 2008, 105 pages

Routine crime in exceptional times: The impact of the 2002 Winter Olympics on citizen demand for police services

By Scott Decker, Sean Verano and Jack Greene.

Despite their rich theoretical and practical importance, criminologists have paid scant attention to the patterns of crime and the responses to crime during exceptional events. Throughout the world large-scale political, social, economic, cultural, and sporting events have become commonplace. Natural disasters such as as blackouts, hurricanes, tornadoes, and tsunamis present similar opportunities. Such events often tax the capacities of jurisdictions to provide safety and security in response to the exceptional to event, asas well asas toto meet thethe "“routine”routine" public safety needs. This article examines “routine” crime as measured by calls for police "routine" as by for service, official crime reports, and police arrests in Salt Lake City before, during, and after the 2002 Olympic Games. The analyses the suggest that while a rather benign demographic among attendees and the presence of large numbers of social control agents might have been expected to decrease calls for police service for minor crime, it actually increased in Salt Lake during this period. The it in Salt this implications of these findings are considered for theories of routine activities, as well as systems capacity.

Journal of Criminal Justice. 32. (2007) 89-101.

Catalyzing Crisis: A Primer on Artificial Intelligence, Catastrophes, and National Security

DREXEL, BILL; WITHERS, CALEB

From the document: "Since ChatGPT [Chat Generative Pre-Trained Transformer] was launched in November 2022, artificial intelligence (AI) systems have captured public imagination across the globe. ChatGPT's record-breaking speed of adoption--logging 100 million users in just two months--gave an unprecedented number of individuals direct, tangible experience with the capabilities of today's state-of-the-art AI systems. More than any other AI system to date, ChatGPT and subsequent competitor large language models (LLMs) have awakened societies to the promise of AI technologies to revolutionize industries, cultures, and political life. [...] This report aims to help policymakers understand catastrophic AI risks and their relevance to national security in three ways. First, it attempts to further clarify AI's catastrophic risks and distinguish them from other threats such as existential risks that have featured prominently in public discourse. Second, the report explains why catastrophic risks associated with AI development merit close attention from U.S. national security practitioners in the years ahead. Finally, it presents a framework of AI safety dimensions that contribute to catastrophic risks."

CENTER FOR A NEW AMERICAN SECURITY. JUN, 2024.

Safeguarding Sport from Corruption: Focus on the FIFA World Cup 2026 and the 2028 Summer Olympics in Los Angeles

By UNODC

The FIFA World Cup and the Olympic Games are landmark events on the sporting calendar – historic competitions that are embraced around the world and that showcase the power of sport as an inspiring, unifying force. It is important that they are celebrated, and that they are protected from corruption. Corruption poses a serious threat to sport, putting at risk its capacity to positively contribute to society and lives. Since the Italian football team of Rossi and Zoff triumphed in Madrid and American sprinter Carl Lewis ran into the history books in Los Angeles, sport has undergone far reaching changes. Globalization, a huge influx of money at the top level of professional sport, the rapid growth of legal and illegal betting and marked technological advances have transformed the way sport is played and consumed. These factors have also had a major impact on corruption in sport, both in terms of its scale and its forms. These evolutions have made sports more vulnerable to corruption. Governments, organizations and other stakeholders are taking steps to better protect sport, but in many ways this journey is only in its early stages. This is why, since 2017, the UNODC Programme on Safeguarding Sport from Corruption and Economic Crime has been supporting governments, sports organizations and other stakeholders in their efforts to protect sports against corruption in its many forms. At the forefront of this work is the use of the only legally binding universal anti-corruption instrument – the United Nations Convention against Corruption. One of the areas in which this work is focused is major sports events. The exposure of corruption surrounding these types of events in recent times needs little reiteration, but it is a reminder of the work to be done and of the importance of strengthening the fight against corruption in sport. This is why detecting and preventing corruption in relation to the FIFA World Cup 2026 and the 2028 Summer Olympic Games, preparation for which is getting under way in Canada, Mexico and the United States of America, is critical. First and foremost, these competitions are blue-ribbon events, the integrity of which must be fully protected, but they also represent a timely opportunity to showcase how this anti corruption action can be delivered. They are a chance to demonstrate how UNODC and its partners, and how greater international, regional, national and local cooperation between government authorities, sports organizations, anti corruption agencies and other key stakeholders, can help combat corruption linked to major sports events, and in sport in general. This is the focus of the present report – an examination of the corruption-related risks faced by the FIFA World Cup 2026 and the 2028 Summer Olympic Games in Los Angeles and the presentation of a clear road map of how these threats can be met, so that these events, and future ones, are better safeguarded against corruption and that their capacity to bring people together, to forge new relationships and create lasting legacies remains undiminished.

Tenth session of the Conference of the States Parties to the United Nations Convention against Corruption, held in Atlanta, Georgia, United States of America.. 2024. 28p.

Faster, Higher, Stronger: Preventing Human Trafficking at the 2010 Olympics

Perrin, Benjamin

This report considers the upcoming 2010 Olympics in Vancouver in the context of Canada's human trafficking response to date, and makes recommendations to ensure that this event is not a flashpoint for human trafficking.

Calgary: Future Group, 2007. 24p.

Tools of Security Risk Management for the London 2012 Olympic Games and FIFA 2006 World Cup in Germany

Jennings, Will and Martin Lodge

Mega-events such as the Olympic Games and the football World Cup represent a special venue for the practice of risk management. This paper explores management of security risks in the case of two sporting mega-events, the London 2012 Olympic Games and the FIFA 2006 World Cup in Germany. The analysis progresses in three stages. First, it explores three explanations that have dominated the literature on policy instruments and tools and introduces the generic tools of government approach developed by Christopher Hood (1983). Second, it reviews the tools used for security risk management at the two mega-events. Third, it evaluates competing explanations of tool choice and degree to which these are consistent with organisational strategies of risk management at the events. The findings highlight the importance of national political systems in influencing tool choice.

London: Centre fo Analysis of Risk and Regulation, London School of Economics, 2009. 27p.

Mega-Events and Risk Colonisation: Risk Management and the Olympics

Jennings, Will

This paper uses the idea of risk colonisation (Rothstein et al. 2006) to analyse how societal and institutional risks simultaneously make mega-events such as the Olympics a problematic site for risk management while contributing to the spread of the logic and formal managerial practice of risk management. It outlines how mega-events are linked to broader societal and institutional hazards and threats but at the same time induce their own unique set of organizational pathologies and biases. In this context, it is argued that the combination of societal and institutional risks create pressure for safety and security which in turn give rise to the growing influence of risk as an object of planning, operations and communication both in organisation of the Games and governance of the Olympic movement. This is consistent with the colonizing influence of risk over time: both in the creation of formal institutions (such as risk management teams and divisions) and the proliferation of the language of 'risk' as an object of regulation and control.

London: Centre for Analysis of Risk and Regulation, London School of Economics and Political Science, 2012. 31p.

Olympic Policing During the 2012 Security Games

Blowe, Kevin and du Boulay, Estelle

In the months before the start of the 2012 Olympics in Stratford in east London, there was a growing anxiety amongst Londoners about the prospect of snipers in helicopters and RAF fighters in the skies, missile launchers on tower blocks and repeated predictions that Newham would experience lockdown during peak periods. Newham Monitoring Project had also been receiving enquiries from across east London for months from local residents, particularly those working with young people, who were concerned about the massive proposed policing operation and its impact at street level. London 2012 seemed to deserve its reputation as the first 'Security Games'. The Olympics presented the largest peacetime military and security operation since 1945, with a policing and security budget of around L553m. From 2010, the number of security personnel required by Olympic organisers rose sharply to an estimated 23,700 on the busiest days, more than double the original predictions, with up to 12,000 police from forces across the country and the Ministry of Defence providing more troops deployed (in uniform) to work during the Games than were then stationed in Afghanistan. Even more CCTV was installed in a city that already had the highest level of surveillance of its citizens than anywhere in the world, whilst around $80 million was spent on the construction of an 11-mile long 5000-volt electric fence around the Olympic zone. The reason for this extraordinary level of security, the Home Office argued in its March 2011 publication 'Olympic and Paralympic Safety and Security Strategy,' was primarily the threat from terrorism: it promised 'maximum use of existing national security and intelligence structures' with the threat-level raised from 'substantial' to 'severe' (which assumes 'an attack is highly likely'). A secondary threat was public disorder, heightened by the perception of a weak police response to rioting the previous summer that followed the death of Mark Duggan in August 2011. The International Olympic Committee had made it clear after the riots that it expected the British government, the Metropolitan police and other domestic agencies to ensure that the Olympics passed off without incident. Arrangements were made to fast-track the trials of people accused of offences linked to the Olympics in the same highly controversial way that had followed the disorder of the previous year, with Alison Saunders, the chief CPS prosecutor for London, explicitly linking these measures to 'the lessons of the summer riots.' With a climate of fear slowly building through state institutions and the media, we were also aware of the significant pattern of racialised social "sanitisation" and exploitation that have been a hallmark of sport mega events globally, particularly where they have been held in poorer and developing areas. Activists and academics from countries including South Africa and India, which have both hosted major sport events in recent years, travelled to the UK to share their experiences of human rights abuses and 'sweep up operations' in their localities. These had had a massively detrimental and often devastating impact on the lives of local people, leaving them homeless, unemployed or vulnerable to excessive policing or criminalisation, with a legacy of property developers and real estate owners benefiting most. These were real life stories behind the promises of employment and regeneration that had been made in each host city. We recognised that an atmosphere of intensive security, focused on the borough where Newham Monitoring Project has worked for over thirty years, had the potential to negatively impact on local people. Most military and all private security personnel would work inside the 'ticketed areas' of the event venues, but in the streets surrounding the Olympic Park in Stratford and the ExCel Centre in Canning Town, it was the prospect of a massive policing operation that was our greatest concern. Newham is one of London's poorest and most ethnically diverse boroughs with the second highest Muslim population in the UK, one that had experienced long-term state surveillance, suspicion and incidents like the bungled anti-terrorism raids in 2006 on two families living in Forest Gate, who endured a terrifying ordeal based on faulty intelligence. The borough also has one of the youngest populations in London, with 23.6% of residents in 2011 aged between 10 and 24,6 coupled with a long history of difficult relationships between young people and the police. This is particularly the case over the use of stop and search powers.

London: Newham Monitoring Project, 2013. 29p.

The 2016 Olympic Games: Health, Security, Environmental and Doping Issues

Halchin, L. Elaine and John W. Rollins

Issues affecting the safety and security of athletes and spectators at the 2016 Olympic Games, which begins August 5 in Rio de Janeiro, Brazil, are reviewed in this report from the Congressional Research Service. Concerns addressed in the CRS report include the Zika virus outbreak, domestic crime, the threat of terrorism, environmental hazards, and more.

Washington, DC: Congressional Research Service, 2016. 38p.

The Cybersecurity of Olympic Sports: New Opportunities, New Risks

Cooper, Betsy

The UC Berkeley Center for Long-Term Cybersecurity (CLTC) has released a report focused on the rapidly evolving landscape of cybersecurity in sports, with an emphasis on the Olympic Games. The report, "The Cybersecurity of Olympic Sports: New Opportunities, New Risks," is an unprecedented look into how the proliferation of new technologies in major sporting events�from digital display panels in stadiums to online ticketing systems to artificial intelligence-based scoring software - opens the door to cyberattacks that could threaten public safety, diminish the fan experience, and undermine the integrity of competition. CLTC produced the report through a partnership with Cal Athletics (the University of California, Berkeley's athletics department) as well as the Los Angeles Organizing Committee for the 2028 Olympic Games. Using the Olympic Games as a case study, the report introduces a framework for evaluating potential risks posed by digital technologies in sports, and highlights possible threats that will arise as these technologies are deployed. The study identifies key areas of risk, including hacks on stadiums, scoring systems, and photo and video replay systems; manipulation of digital systems used by athletes for training and self-care; hacks on transportation and entry systems; as well as more extreme attacks designed to induce panic or facilitate terrorism or kidnapping. The report also includes fictional news stories from the future to highlight hypothetical incidents. One shows how malicious actors seeking to disrupt the Olympics could cause mass panic in a stadium by hacking into digital display panels. Another story highlights how hackers could manipulate a software-based scoring system in gymnastics, throwing a marquee event into chaos. A third story focuses on how "smart" appliances installed in athlete' residences in the Olympics Village could be hacked and used for surveillance. The report suggests that sporting event planners should consider the potential cybersecurity implications of any new technology, noting that "organizers should press to ensure that there are tangible benefits to incorporating digital devices�and that significant risks can be mitigated�before going forward."

Berkeley, CA: University of California at Berkeley, Center for Long-Term Cybersecurity, 2017. 40p.

Olympic-Caliber Cybersecurity: Lessons for Safeguarding the 2020 Games and Other Major Events

By Cynthia Dion-Schwarz, Alt. Authors: Nathan Ryan, Julia A. Thompson, Erik Silfversten, Giacomo Persi Paoli

This report profiles the cybersecurity threat landscape faced by Japan as the host nation of the 2020 Summer Games and 2020 Paralympic Games of the XXXII Olympiad. The overarching objective of the study was to produce a threat actor typology, based on a risk assessment of the Tokyo 2020 threat landscape. Synthesizing multiple sources of primary and secondary data, the study team developed a visualization of the threat landscape that provides an at-a-glance overview to guide Olympic security planners, computer emergency response teams, and policy- and decisionmakers as they prioritize and address cybersecurity threats. The risk assessment also considered the motivation, sophistication, and propensity of threat actors to collude with one another. This research could be valuable to a wide variety of stakeholders and will be of particular interest to stakeholders involved in planning and ensuring the security of the Tokyo 2020 Games. The research also serves as a reference to inform ongoing policy debates on cybersecurity preparations for mega-events and as a basis for future research.

Santa Monica, CA: RAND, 2018. 97p.

Stasi : The Untold Story of the East German Secret Police

By John O. Koehler

This book is about the untold story of the East German secret police, known as theStasi. It discusses the history and operations of the Stasi, including their collaboration with the KGB, their espionage activities in West Germany and other countries, and their involvement in terrorism. The document also includes interviews with former Stasi officers and victims of Stasi repression.

Basic Books, 1999, 460 pages

Secret Empire : The KGB in Russia Today

By J. Micheal Waller

Summary of main points

•The book is titled“Security for Small Businesses”by David L. Berger.•The book covers various topics related to security measures for small businesses.

•It includes chapters on perimeter control, alarms, closed circuittelevision (CCTV),and security services

.•The book also includes a bibliography with references to other publications onsecurity management.•The book provides information on crime prevention and basic precautions against crimes.

•It discusses security equipment and methods such as barrier protection, alarm systems, and locks.•The book also covers topics like check cashing, credit cards, robbery, and burglary.

•There are references to other books on hotel security management, industrialsecurity management, and employee honesty management.

•The book provides information on tools, maintenance, environment, buildingconditions, housekeeping, lighting, heating, and ventilation.

•It includes information on employee training, personal protection, machine safety, and electricity equipment.

•The book emphasizes the importance of security for small businesses and provides practical advice and recommendations.

Avalon Publishing, 1994, 390 pages

U.S. Government Global Health Security Strategy 2024

UNITED STATES. WHITE HOUSE OFFICE

From the document: "Over the last 3 years, we have more than doubled our global health partnerships--working directly with 50 countries to ensure they can more effectively prevent, detect, and control outbreaks. And we are working with partners to support an additional 50 countries to save even more lives and minimize economic losses. With strong bipartisan support from Congress, we also championed the creation of the Pandemic Fund, a new international body that has already catalyzed $2 billion in financing from 27 contributors, including countries, foundations, and philanthropies, to build stronger global health security capabilities. We are working to make life-saving medicines and vaccines more rapidly available in health emergencies, including through supporting Gavi, the Vaccine Alliance and the Coalition for Epidemic Preparedness Innovations. And we are leading efforts to ensure international financial institutions, such as the World Bank Group, scale up lending for pandemic prevention, preparedness, and response because health security, economic security, climate security, and national security are all related. This new Global Health Security Strategy lays out the actions the United States will take over the next 5 years to ensure we continue this progress[.]"

United States. White House Office. APR, 2024. 64p.

DHS Innovation, Research & Development Strategic Plan: Fiscal Years 2024-2030

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY

From the document: "Protecting our nation requires timely responses to rapidly evolving dangers while protecting against longer-term homeland security threats and hazards. To meet these complex operational needs, innovation, research and development (IRD) initiatives and investments are critical to ensure the Department of Homeland Security (DHS) has the tools to help secure our nation. [...] While historically DHS has supported research and development (R&D), investments in innovation are newer and growing in scope and number across all DHS Components, whether through technological improvements or process efficiencies. The combination of these innovation and R&D investments will benefit from increased awareness and coordination. The Secretary's Calendar Year (CY) 2023 priorities captured this, seeking to 'ensure R&D across the Department and with external partners are coordinated and integrated.' To accomplish this goal, this coordinated DHS IRD Strategic Plan focuses on current efforts and longer-term Departmental investments. The Plan also highlights complementary efforts underway across the HSE [homeland security enterprise], consisting of federal, state, local, tribal, territorial, nongovernmental, and private sector entities, as well as individuals, families, and communities who share a common national interest in the safety and security of the United States and its people. The Plan inventories current and future IRD efforts within DHS, organized by the DHS Missions and Objectives as articulated in the third 'Quadrennial Homeland Security Review (2023).' By capturing these initiatives in a comprehensive plan, the Department can identify cross-cutting IRD themes that provide opportunities for making impacts towards meeting multiple desired outcomes. These are articulated as Strategic Priority Research Areas (SPRAs)[.]"

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY. MAY, 2024. 44p.

State Policing in Sub-Saharan Africa

By Fatoumata Sira Diallo

This book is a collection of various titles and references related to the topics of diplomacy, strategy, and policing in Sub-Saharan Africa. It includes information on academic works, books, articles, and documents that cover subjects such as international relations, political science, economic science, and sociology. The document also mentions specific titles and authors, as well as organizations and websites that provide relevant information on these topics.

Editions L'Harmattan, 2019, 391 pages