Handbook Security
Handbook Security
Martin Gill
The Handbook of Security
3rd ed. 2022
Editor
Martin Gill
Perpetuity Research, Tunbridge Wells, UK
© The Editor(s) (if applicable) and The Author(s), under exclusive license
to Springer Nature Switzerland AG 2022
This work is subject to copyright. All rights are solely and exclusively
licensed by the Publisher, whether the whole or part of the material is
concerned, specifically the rights of translation, reprinting, reuse of
illustrations, recitation, broadcasting, reproduction on microfilms or in any
other physical way, and transmission or information storage and retrieval,
electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The publisher, the authors, and the editors are safe to assume that the advice
and information in this book are believed to be true and accurate at the date
of publication. Neither the publisher nor the authors or the editors give a
warranty, expressed or implied, with respect to the material contained
herein or for any errors or omissions that may have been made. The
publisher remains neutral with regard to jurisdictional claims in published
maps and institutional affiliations.
Fig. 18.3 A scheme of (a) an AHP structure and (b) an ANP structure.
(Adapted from Saaty and Vargas (2006))
Fig. 21.3 The ‘other reviews & discussions’ section of the Wall Street
Forum
Fig. 21.4 A product advertisement in the Wall Street Forum (posted on 15th
January 2018)
Fig. 23.1 The relative strength of treatment effects across US and British
studies. (Source: Welsh, B., & Farrington, D. (2008). Effects of improved
street lighting on crime. Campbell Collaboration. p. 51)
Fig. 26.1 Conceptualisation of fear of crime and the role of perceived in/
security
Fig. 26.2 Eye tracker capture of one experiment participant showing their
field of visitation and a red circle highlighting on the specific point on
which they focus within the stimuli presented
Fig. 28.2 Percentage agree about views on security guards. (Source: Nalla
et al. 2017c)
Fig. 32.2 Intrusion detection system events. (Adjusted from Brooks and
Coole 2019)
Fig. 41.1 The decline in crime and youth offending in England and Wales,
1999–2018. (Source: CSEW, and arrests data from Office for National
Statistics)
Fig. 45.1 Business engagement with crime prevention and security: high-
harms compared to low-harms businesses. (Base sample: 4429 business
asked security questions)
List of Tables
Table 6.1 Global cases of Covid-19 pandemic (confirmed)
Table 19.2 Campus policing safety and security issues, milestones, and their
impact on campus police/security
Table 21.1 The brands that were found to be abused on the Dream Market
Table 21.2 Types of brand abuse in the category of banking and finance
Table 25.1 Example script ‘Cargo theft from a parked trailer’ (modified
from Haelterman 2016)
Table 40.3 Burglary prevention measures’ carbon footprint (min, max and
median) per household and carbon payback ratio (Skudder et al. 2017—
Table 4)
Table 41.1 Security Protection Factors and net interaction effects of security
configurations
Table 42.1 Odds ratios of effects from primary studies eligible for meta-
analysis reproduced from Armitage et al. (in production)
Table 45.3 Direct crime costs (£) across business sectors by crime type
(based on median values)
Table 45.4 Total average costs (£) of crime harms and lost productivity
across business sectors by crime type and per business
Simon Baechler
is head of forensic science and crime intelligence with the Neuchâtel State
Police, Switzerland. He benefits from over ten years of experience in police
work and is also a researcher and lecturer in forensic science, crime
intelligence and crime investigation at the University of Lausanne,
Switzerland, as well as an associate professor at the University of Québec in
Trois-Rivières, Canada. He chairs the Swiss National Association of Chiefs
of Forensic Science Services.
Adrian Beck
is an emeritus professor at the University of Leicester, UK, where he was
one of the founders of the Department of Criminology in 1988, and Head of
Department between 2009 and 2015. Over the last 30 years, his research
work has focused on helping retailers around the world better understand
the impact all forms of loss have upon their businesses and how they can be
more effectively managed.
John M. Blythe
is an honorary research fellow at the Dawes Centre for Future Crime at
UCL and Head of Behavioural Science at CybSafe. He is a chartered
psychologist with the British Psychological Society and specializes in
human aspects of cyber security and behaviour change. He has held cyber
security research positions in academia, government and industry including
leading on behaviour change policy at the UK Department for Digital,
Culture, Media and Sport on security by design for consumer IoT.
Gregory Breetzke
is Associate Professor in the Department of Geography, Geoinformatics and
Meteorology at the University of Pretoria. Greg’s research focuses mainly
on the geospatial analysis of crime and criminal offenders. He is
particularly interested in examining crime patterns and trends and how they
vary across space and time. Other interests include the development of
indigenous theories of crime as well as examining crime as a development
issue. Greg has presented his work at numerous local and international
conferences and symposia and has also worked with New Zealand Police
and the South African Police Services.
David J. Brooks
is Associate Professor of Security Science at Edith Cowan University,
Australia. Brooks commenced his career in Military Air Defence, moving
into the Electronic Security sector and later Security Consultancy prior to
his academic role. He has broad industrial security experience within
Defence, Critical Infrastructure, Resources and Corrections. Research
interests include Security Science education, and security system design
and evaluation. Brooks has published widely, with books, chapters and
academic journals. Brooks’s books include Security Science: The Theory
and Practice of Security with Elsevier, and Corporate Security in the Asia
Pacific Region: Crisis, Crime, Fraud and Misconduct with Taylor and
Francis Books. He was also lead author on the ASIS International guide in
Intelligent Building Management Systems: Guidance for Protecting
Organizations. Brooks is a Trustee on the ASIS Foundation and a member
of the Security Journal Editorial Committee.
Ian Brunton-Smith
is Professor of Criminology and Research Methods at the University of
Surrey and co-director of the Surrey Centre for Criminology. His research
interests focus on the application of advanced quantitative methods to key
issues in the social sciences, including prison effects, the spatial patterning
of crime and perceptions of crime, and the role of neighbourhood context.
Mark Button
is Director of the Centre for Counter Fraud Studies at the Institute of
Criminal Justice Studies, University of Portsmouth. Button has written
extensively on counter fraud and private policing issues, publishing many
articles, chapters and completing ten books with one forthcoming. Some of
the most significant research projects include leading the research on behalf
of the National Fraud Authority and ACPO on fraud victims, the
Department for International Development on fraud measurement, Acromas
(AA and Saga) on ‘Cash-for-Crash fraudsters’, the Midlands Fraud Forum,
Eversheds and PKF on ‘Sanctioning Fraudsters’. Button has also acted as a
consultant for the United Nations Offices on Drugs and Crime on Civilian
Private Security Services.
James D. Calder
is a professor in the Department of Political Science, Global Affairs and
Geography at The University of Texas at San Antonio. He also serves as a
consultant and expert witness in matters of premises security and dram shop
liabilities. His academic career spans 44 years at two major universities
including administration as department chair and associate dean. He served
for several years in investigative and security management positions in two
major aerospace firms and as a military intelligence officer. Instructional
specializations include federal crime control policy, national security and
intelligence, public administration and policy, and politics of domestic and
international security. He is author of two books with a third book in
progress and articles and chapters exploring issues of private security
history, private policing, federal organized crime control strategies, security
operations, and security litigation. Expert witness work is cited in Texas
appellate decisions. Dr Calder is one of three original and continuously
serving designees as an ASIS, Int. Certified Protection Professional (CPP).
He has served for 33 years on the Underwriters’ Laboratories Security
Council and is a member of the International Association for the Study of
Organized Crime, the Academy of Criminal Justice Sciences, and the
Association of Former Intelligence Officers.
Chao Chen
is a PhD candidate in the Safety and Security Science Group of Delft
University of Technology. His research focuses on the safety, security, and
resilience of chemical and process industrial infrastructures, developing
dynamic risk assessment models and decision models for protecting
chemical and process industries from domino effects. Now he has published
more than ten journal papers and several chapters related to safety and
security in the chemical and process industry.
R. V. G. Clarke
is University Professor at the Rutgers School of Criminal Justice and
associate director of the Center for Problem-Oriented Policing. Before
immigrating to the United States, he worked for 15 years in the British
government’s criminological research department, the Home Office
Research and Planning Unit. While there, he led the team that originated
situational crime prevention and is now considered to be the leading
authority on that approach. In 2015, he was awarded the Stockholm Prize in
Criminology. His research focuses on wildlife crimes.
Cassandra Cross
is a senior research fellow, Cybersecurity Cooperative Research Centre
(CRC), and an associate professor, School of Justice, Queensland
University of Technology (QUT). In 2011, while working for the
Queensland Police Service, she was awarded a Churchill Fellowship to
examine the prevention and support of online fraud victims worldwide.
Since taking up her position at QUT in 2012, she has continued her research
into fraud, publishing over 60 outputs across the policing, prevention, and
victim support aspects of fraud. Further, she has been awarded over
AUD$1.3million in funding, largely to drive her research in this area. She is
co-author (with Professor Mark Button) of the book Cyber Frauds, Scams
and Their Victims published by Routledge in 2017.
Silvia D’Amato
is an assistant professor at the Institute of Global and Security Affairs at
Leiden University in The Hague. She has previously worked at the
European University Institute as Max Weber Fellow, and she holds a PhD in
Political Science from the Scuola Normale Superiore in Florence. She is the
author of the book Cultures of Counterterrorism: French and Italian
Responses to Terrorism After 9/11. Her research interests include terrorism
and counterterrorism, European and international politics and military
interventions.
Francis Dodsworth
is Senior Lecturer in Criminology at Kingston University London. His
research explores the history of crime, policing and security in modern
Britain, with a particular focus on governmentality, the relationship between
government and self-government, and gender and identity. These themes
are integrated in his recent book The Security Society: History, Patriarchy,
Protection, published by Palgrave in 2019.
Angela Druckman
is Professor of Sustainable Consumption and Production and Director of the
Centre for Environment and Sustainability, University of Surrey. She is a
Chartered Engineer, having read Engineering at the University of
Cambridge. Druckman’s research focuses on investigating avenues that may
lead towards more sustainable lifestyles. Druckman leads on education for
sustainability for the University of Surrey: she chairs the Sustainability in
the Curriculum Working Group and is a member of the Executive
Sustainability Steering Group.
Paul Ekblom
As a researcher in the UK Home Office, Ekblom led diverse crime
prevention projects. His final responsibilities centred on horizon-scanning,
advising on design against crime and developing crime prevention
knowledge management. He then spent ten years as a professor (now
emeritus) at the University of the Arts London Design Against Crime
Research Centre. He is also a visiting professor in the Department of
Security and Crime Science, UCL, and the Applied Criminology and
Policing Centre, University of Huddersfield. Ekblom has worked with the
Australian Institute of Criminology, Government of Abu Dhabi, Council of
Europe, EU Crime Prevention Network, European Commission, European
Forum on Urban Security, Europol, and Cepol. His work covers design and
developing knowledge frameworks/ontologies for general crime prevention,
CPTED, community safety, problem-oriented policing, cybercrime and
counter-terrorism. Ekblom also writes on technology and crime, and
crime/terrorism arms races. In 2018 he received the Ronald V Clarke
ECCA Award for Fundamental Contributions to Environmental
Criminology and Crime Analysis.
Graham Farrell
(PhD Manchester 1994) is Professor of Crime Science at the School of Law,
University of Leeds. He has worked at Oxford University, the United
Nations in Austria, and at Universities in Canada (Simon Fraser) and the
US (Rutgers, Cincinnati) and as deputy research director at the Police
Foundation in Washington DC. He has published in a range of areas, but
much of his research in the last decade focuses on the international crime
drop and the role of security.
Bonnie S. Fisher
is a distinguished research professor in the School of Criminal Justice at the
University of Cincinnati. Her research interests span victimological topics
ranging from the measurement and prevalence of interpersonal violence
against college students to the identification of theory-based predictors of
interpersonal victimization to the evaluation of prevention strategies and,
most recently, to the design and implementation of a longitudinal study of
interpersonal violence against and by emerging adults funded by the
National Institute of Justice. Her work has been published in Criminology,
Justice Quarterly, Journal of Quantitative Criminology, Violence Against
Women, Journal of School Violence, and Journal of Interpersonal Violence.
She was member of the “1 in 5” statistics that was reported by the Campus
Sexual Assault study and the National Academy of Science’s panel to
examine the measurement of rape and sexual assault. Most recently, she
was the Co-PI, with Dr David Cantor, on the 2015 and 2019 Association of
American University’s Campus Climate Survey on Sexual Assault and
Misconduct. She received her PhD in political science from Northwestern
University in Evanston, Illinois.
Christopher M. Fleming
is Professor of Economics who teaches, researches, consults and provides
public policy advice on the economic determinants of wellbeing and the
sustainable management of the world around us. An applied micro-
economist, Fleming’s research and consulting interests include natural
resource and environmental economics, climate change economics, social
and economic project/program evaluation, sustainable development,
tourism economics and the economic determinants of subjective wellbeing.
Prior to joining Griffith Business School, Fleming worked as a senior
consultant for MainStream Economics and Policy, and Marsden Jacob
Associates, as well as a senior advisor within the Sustainable Development
Policy Group of the New Zealand Ministry for the Environment.
Helen Forbes-Mewett
is Associate Professor of Sociology at Monash University, Australia. She is
Editor in Chief of the Journal of Sociology. She is also the Deputy Director
of the Monash Migration and Inclusion Centre. Her work on human
security in relation to international students and migrants has been
published widely in many journal articles and chapters, and she is the
author of four books. Her most recent books include The New Security:
Individual, Community and Cultural Experiences (2019), published by
Palgrave Macmillan and an edited collection titled ‘Vulnerability in a
Mobile World’ (2020) published by Emerald. Some of her most significant
projects include International Student Security; International Students
Safety from Crime; Approaches to Death, Funeral Rites and
Memorialisation in Contemporary Australia: Changes and Continuities;
International Students’ Sexual and Intimate Partner Violence Experiences;
and Migration, Mixed Marriage and Integration in Australia.
Declan Garrett
is Doctor of Security Risk Management and holds an MSc in Security &
Risk Management and an MBA. He has several years of experience in
strategic security risk management within Europe and the Middle East. Dr
Garrett Chairs the Board of Governors for Academic Standards at The
Security Institute of Ireland and their representative to the government’s
private security regulator on training and education. His research includes
developing the foundations of structured career pathways for the private
security sector and has contributed as a subject matter expert to European
Union-funded research projects on training and education. His publications
include Protecting Works of Art from Theft in the Palgrave Handbook on
Art Crime, and he has co-written several security educational manuals. He
is a fellow of the Institute of Strategic Risk Management and serves on their
Global Advisory Council. He is a visiting lecturer to the Berlin Institute of
Economics and Law, teaching students of the MA in International Security
Management.
Jim Gee
is a Partner and Head of the National Forensic Services team at Crowe UK.
He is also a visiting professor and chairs Europe’s premier research unit in
this area—the Centre for Counter Fraud Studies at the University of
Portsmouth. He has published more than 30 research reports and two books.
He was the founding Director-General of the European Healthcare Fraud
and Corruption Network supported by 28 European countries. He has
worked internationally across 43 countries to date advising a diverse range
of professional services firms, private companies, charities, pension
schemes, as well as global mining companies, international governments
and major public sector organisations.
Martin Gill
is a criminologist and Director of Perpetuity Research. He holds
honorary/visiting Chairs at the Universities of Leicester and London. Gill
has been actively involved in a range of studies relating to different aspects
of security, private policing and business crime on topics including
organised crime and fraud, why offenders offend, the (in)effectiveness of
different security measures, and the scope of security management. Gill has
been extensively involved with evaluation research and with the offender’s
perspective of looking at how they target certain people and premises and
aim to circumvent security measures. He has written 14 books. He is the
organiser and Chair of the Security Thought Leadership webinar series. Gill
is a Fellow of the Security Institute, and a member of the Company of
Security Professionals (and a Freeman of the City of London). He is a
Trustee of the ASIS Foundation. In 2002 the ASIS Security Foundation
made a ‘citation for distinguished service’ in ‘recognition of his significant
contribution to the security profession’. In 2010 he was recognised by the
BSIA with a special award for ‘outstanding service to the security sector’.
In 2015 and 2016 he was nominated and shortlisted for the Imbert Prize at
the Association of Security Consultants and in the latter he won. In 2016
ASIS International awarded him a Presidential Order of Merit for
distinguished service. In annual IFSEC listings he is regularly recorded as
one of the world’s most influential fire and security experts. In 2016 he was
entered onto the Register of Chartered Security Professionals. Gill is the
Founder of the Outstanding Security Performance Awards (the OSPAs and
Cyber OSPAs) and Tackling Economic Crime Awards (the TECAs).
Michael Gips
is the principal of Global Insights in Professional Security, LLC, a strategic
consultancy supporting security providers and executives. Gips partners
with organizations including the Network Contagion Research Institute,
Cardinal Point Strategies, and insider threat firm Signpost Six. He writes a
monthly leadership column for Security Magazine, hosts the Global
Insights in Professional Security Podcast, and frequently presents at
professional and industry conferences. He also sits on several corporate
advisory boards. He served previously as Chief Global Knowledge Officer
at ASIS International, with responsibility for editorial services, learning,
certification, standards and guidelines, and the CSO Center for Leadership
and Development, which he started as a membership organization in 2008.
In his early career, Mike was an attorney who worked on death-penalty
cases, workplace issues, and intellectual property matters. He has a BA in
History and Spanish from Tufts University, and a Juris Doctorate from
Harvard Law School. He has been named as one of the most influential
people in security by both Security Magazine and IFSEC International.
Ines Guedes
is Lecturer in Criminology in the School of Criminology at the University
of Porto. She teaches different topics related to security, fear of crime,
criminological perspectives, situational crime prevention and cybercrime.
She is also a research member of the Centre of Crime, Justice and Security
(University of Porto) and of the Center for Juridical, Economic and
Environmental Studies (CEJEA) of the University of Lusiada Norte. Her
research interests are in the nature of fear of crime and safety perception,
new and innovative methods to address the experience of situational fear of
crime and correlates of (fear) of cybercrime. She has been participating in
many projects under the field of fear of crime using self-report, eye-
tracking, sensing and qualitative methods to explore how people perceive
environments. Most of her published works are on the fear of crime, and
she is also the editor and co-author of the handbook of Cybercrime, which
will be published in Portuguese in March 2021.
Harald Haelterman
is an academic advisor and former visiting professor at the Faculty of Law
and Criminology of Ghent University and a former visiting professor at the
Law Faculty of KU Leuven. He received his PhD in Criminology from
Ghent University and has been combining his academic work with an
international career in corporate security, ethics and compliance. He further
served as an Independent Expert for the European Commission Research
Executive Agency and as a Security Committee Chairman for the European
Express Association. Haelterman’s recent publications include articles in
the European Journal on Criminal Policy and Research, Security Journal,
and Crime, Law and Social Change, and a monograph on crime script
analysis published in the Palgrave Crime Prevention and Security
Management Series.
Branislav Hock
has been involved in a broad range of research, teaching, and consultancy
activities, many have been related to money laundering, anti-corruption, tax
evasion and compliance. He is an author of Extraterritoriality and
International Bribery: A Collective Action Perspective, Routledge, 2020.
Hock supervises doctoral and master projects in the areas of international
corruption and money-laundering. Hock is the founding member of the
European Compliance Center. He worked for a law firm, where he was
advising on various compliance issues.
Matt Hopkins
is an associate professor at the School of Criminology, University of
Leicester. He has a PhD entitled ‘Abuse and Violence Against Small
Businesses’ and has published in a variety of journals including the British
Journal of Criminology, Criminology and Criminal Justice, the
International Review of Victimology, Policing and Society, and the Security
Journal. His work spans a number of activities and interests including
Commercial Victimisation, Security, Organised Crime and Violence. He is a
member of the Home Office Commercial Victimisation Survey steering
group and has conducted several studies on crimes against businesses,
security consumption and the efficacy of security in business settings. Most
recently he has conducted a major national study for the UK Home Office
on Acid Attacks and Corrosive Substance Crime and is leading on an
ESRC-funded Violence Reduction Information Network, which aims to
develop a better understanding of measures that prevent public space
violence. He is also on the editorial board of the Security Journal and is a
research fellow of the Security Institute.
Shane D. Johnson
is Professor of Future Crime. He directs the Dawes Centre for Future Crime
at UCL and co-directs the Centre for Doctoral Training in Cybersecurity at
UCL. His recent research has examined the (lack of) security of the Internet
of Things (IoT), crime threats associated with biotechnologies, the use of
advanced materials (e.g. Graphene) to reduce crime, crime threats
associated with Cryptocurrencies, and the security of Smart Cities. He has
worked closely with the UK Department for Digital, Culture, Media and
Sport to secure the IoT, has a Chief Constable’s commendation for his work
on what works to reduce crime, and is on the Scientific Advisory boards of
the UK Home Office and the Max Planck Institute.
Eon Kim
is a research fellow at UCL’s Jill Dando Institute of Security and Crime
Science. Her research interests include computational criminology,
quantitative geography and the application of big data analytics to
understand crime patterns and security issues, and she has conducted
research on policing, social media and crime, and justice reinvestment.
Glen Kitteringham
is a Doctor of Security Risk Management (University of Portsmouth) and
holds a Master of Science in Security & Crime Risk Management
(University of Leicester). He has worked in the security industry since 1990
in positions ranging from security officer to international security
consultant. He has undertaken research into shoplifting, training
effectiveness, how security officers manage violence and security officer
duties and task complexity.
Susanne Knickmeier
is a German lawyer who also holds a master’s degree in criminology. She
was a researcher at the Max Planck Institute for the Study of Crime,
Security and Law from 2012 to 2010 and has been working at the Ministry
of Justice in Brandenburg since 2021. Her research focuses on organized
and economic crime, but also trust in the justice system, as well as
European criminal and security policy with a particular focus on migration,
border security and cross-border police cooperation. Her latest research
project about economic and industrial espionage in Germany and Europe
was based on an extensive empirical analysis about the phenomenon of
economic and industrial espionage and the effectiveness of criminal
proceedings. Knickmeier has also acted at the University of Basel (2019–
2020) in a research project about open research data.
Steven Kohm
is a full professor in the Criminal Justice department at The University of
Winnipeg, where he has taught undergraduate and graduate courses since
2004. He has degrees in Urban Studies (University of Winnipeg),
Geography (University of Toronto) and Criminology (Simon Fraser
University). His teaching and research focus is on media and crime, and his
work has been published in such journals as Crime Media Culture,
Theoretical Criminology, Critical Criminology, and The Canadian Journal
of Criminology and Criminal Justice. He is lead editor of Screening Justice:
Canadian Crime Films, Culture and Society (2017) and is co-editor of The
Annual Review of Interdisciplinary Justice Research. He is the principle
investigator of a collaborative SSHRC research project titled Frozen
Justice: A Century of Crime in Canadian Film. Along with his research
team, he recently launched a seven-part online documentary video series
about Canadian Crime films in collaboration with Eagle Vision
Productions, an award-winning Indigenous owned film and TV production
company located in Winnipeg, Canada: http://www.uwinnipeg.ca/frozen-
justice.
Markus Lahtinen
took up his position as a lecturer at Lund University, School of Economics
and Management (LUSEM) in Sweden in 2002. Since 2006 he has been
involved in studying technological change and the digitalization of the
security industry, with a particular end-user B2B focus. In Sweden,
Lahtinen has established himself as an outreach security scholar, working
closely with public agencies, media and corporations on topics concerning
security management as well social and public aspects concerning the use
CCTV. Together with Benjamin Weaver, Lahtinen also runs the LUSAX
security research team—a practice-driven research team affiliated with
LUSEM.
Logan J. Lanson
is a first-year PhD student at the University of Cincinnati’s School of
Criminal Justice. His research focuses include the history and development
of policing, police discretionary decision making, and the development of
criminal justice as an academic discipline. He has presented his research on
the development of criminal justice as an academic discipline at national
and regional conferences, including the annual meetings of the Academy of
Criminal Justice Sciences and the Midwest Criminal Justice Association.
He is working on a study with Professors Fisher and Sloan that examines
the predictors of US states’ receptivity to state-accorded institutional
discretion for concealed carry weapons on postsecondary campuses. He
holds an MS in Criminal Justice from Bowling Green State University.
J. Lettieri
is a PhD student at the CUNY Graduate Center and John Jay College of
Criminal Justice. She received her master’s degree in International Crime
and Justice in 2019 from John Jay College. Her research interests include
drug trafficking, terrorism, illicit markets, and the theoretical applications of
environmental criminology.
Michael Levi
graduated from Oxford, Cambridge and Southampton, and has been
Professor of Criminology at Cardiff since 1991. His main work has been
making sense of the linkages and differences between white-collar and
organised crime and their public and private sector controls, intersecting
with corruption and money laundering locally and transnationally. This and
his efforts to improve corruption and economic crime prevention and
criminal justice have previously won him major research prizes from the
British and American Societies of Criminology, the first lifetime Tackling
Economic Crime Award in the UK in 2019, and the Rule of Law
Committee/UNODC Corruption Research and Education prize in 2020. His
projects include Fraud and Its Relationship to Pandemics and Economic
Crises from 1850 to the Present, the impact of technologies on criminal
markets and transnational organised crime, and cyber-enabled fraud and
money laundering projects. He is (very slowly!) co-authoring books on the
Organisation of White-Collar Crimes, on Corporate & Individual Shaming,
and on White-Collar Crimes and their Victims.
Ken Livingstone
is a former officer in the Royal Military Police. He now lectures in Security
Management at University of Plymouth. Livingstone has also lectured in
Security Management at Leicester University, where he was Assistant
Director, and at Loughborough University. Livingstone works extensively
with the commercial sector designing and delivering award-winning
training programmes that can be delivered both in-house and online. He
specialises in creating courses that combine professional best practice with
academic rigour. Livingstone has worked with leading organisations in the
UK and internationally and is a regular speaker at conferences and events.
He is Fellow of the Security Institute (SyI).
Matthew Manning
is a criminological economist and future crimes scholar. As well as
forecasting how new technologies can be exploited by criminals, Prof.
Manning studies which policing strategies really work. As a future crimes
scholar he is committed to advancing knowledge about (1) why individuals
commit future crimes, (2) the processes that can be adopted to make
committing future crimes more difficult and less rewarding and (3) the tools
that assist government and industry in making strategic economic decisions
that create efficiency and enhance return on investment. His work in this
area has contributed to the development of theories for identifying where
and how individuals commit these forms of crime, processes that minimise
insider threat, and tools that provide economic evidence that assist in policy
decision making.
Rob I. Mawby
is Visiting Professor of Rural Criminology at Harper Adams University. He
previously worked at the universities of Sheffield, Leeds, Bradford and
Plymouth, where he was Professor of Criminology and Criminal Justice for
over 15 years and was subsequently Visiting Professor of Criminology and
Criminal Justice at the universities of Gloucestershire and South Wales. His
interests include policing and victimology, especially in a cross-national
context, crime reduction, burglary, tourism and crime, and rural crime and
policing. He was the UK representative on CEPOL’s Special Expert
Committee on Police Science in the EU (2005–2007), worked as an
academic expert on EFUS’s ‘Security and Tourism’ initiative (2013–2015),
and engaged with the EC in producing the UK reports on victims rights and
victims services. He is editor of Crime Prevention and Community Safety:
an international journal.
C. A. Meerts
is an assistant professor in the Criminology Department of the Vrije
Universiteit Amsterdam. Her research interests include corporate
investigations, public–private relationships, and white-collar and financial
crime. Her PhD project was funded by de Dutch Research Council (NWO)
and focused on corporate investigations in the Netherlands. She has since
published empirical work pertaining corporate investigations, corporate
settlements and public-private cooperation and public-private relationships.
In addition, she has published on the subject of the conceptualisation of
public-private relationships in the field of internal financial crime.
Anthony Minnaar
from January 2009 to June 2014 was the Programme Head: Security
Management and Postgraduate Co-ordinator in the Department of
Criminology & Security Science in the School of Criminal Justice of the
College of Law at the University of South Africa (UNISA) in Pretoria.
Became a full professor (Criminal Justice Studies) in July 2003. In 2013
appointed as a Research Professor at UNISA. A National Research
Foundation (NRF) rated Researcher (2003–2007 (C3); 2008–2012 (C2);
2013–2018 (C1); rerated for 2020–2025). Recipient in 2006 and 2017 of the
UNISA Chancellor’s Prize for Research Excellence (College of Law). He
has published widely and presented at numerous international conferences
on a wide variety of topics and issues in criminal justice, criminology,
policing and security management. In the early 1990s he has published
largely on issues of political violence and conflict inter alia migrant labour
hostel violence (Goldstone Commission Report). In the mid-1990s he has
researched border controls, border policing and irregular/undocumented
cross-border migrants (as Chair of the Technical Sub-Committee on Border
Policing, 1995) and undertook a review of the SADC Protocol on the Free
Movement of People and Goods (1995) and on immigration legislation in
South Africa and Africa (1996) for the Department of Home affairs. In the
early 2000s he examined security measures at South African ports-of-entry.
Main research interests are cyberattacks, cybersecurity, information
protection and cybercrime, ransomware, privacy issues and
cybersurveillance, the use of CCTV surveillance systems for security and
neighbourhood safety/crime prevention, and issues of rural crime in South
Africa. He was the editor-in-chief (2012–2016) and co-editor-in-Chief
(2017–2018) of the journal Acta Criminologica: Southern African Journal
of Criminology. He was retired from UNISA in December 2018. He is a
research associate in the Department of Criminology & Criminal Justice at
the University of Limpopo, Sovenga, South Africa.
William D. Moreto
is an associate professor in the Department of Criminal Justice at the
University of Central Florida. He received his BA from the School of
Criminology at Simon Fraser University and his PhD from the Rutgers
School of Criminal Justice. In 2015, he was awarded a visiting fellow
scholar position at the Netherlands Institute for the Study of Crime and Law
Enforcement. His research interests include environmental criminology and
crime science, situational crime prevention, policing, wildlife crime, and
wildlife law enforcement. He has conducted fieldwork in Kenya, Nepal,
Uganda, and the Philippines, and has collaborated with international NGOs,
including the World Wide Fund for Nature (WWF) and Global Wildlife
Conservation (GWC). His research can be found in leading criminology,
criminal justice, and conservation science journals, including Justice
Quarterly, British Journal of Criminology, and Oryx: The International
Journal of Conservation. He is the lead author (with Stephen F. Pires) of
Wildlife Crime: An Environmental Criminology and Crime Science
Perspective (2018) and editor of Wildlife Crime: From Theory to Practice
(2018).
Kate Moss
is Professor of Applied Criminology at the University of Derby. Actively
researching for over twenty years and specializing in applied research and
project management, Moss has achieved notable successes in bidding for
research funding and delivering research for significant organisations
throughout Europe. She has undertaken research for organisations including
the Home Office, the National Police Training Units, the Prime Ministers
Delivery Unit and numerous police forces, charities and NGOs. Perhaps
most significantly Moss led on three European Commission-funded
projects, which together were worth in excess of 2.5 million Euros. This
work—into the phenomenon of female homelessness and its links with
domestic abuse—has made a significant contribution to the academic
understanding of this social issue. Moss has also published previously on
the topic of security and liberty, providing one of very few academic
commentaries on the debate surrounding whether there is an acceptable
balance between national security needs and the protection of civil liberties
(Moss 2008—nominated for the SLSA Hart prize 2010—and Moss 2011).
Tshiamo Mosuwe
is a recent graduate student in Environmental Sciences in the Department of
Geography, Geoinformatics and Meteorology at the University of Pretoria
of the University of Pretoria. Her research passion lies with understanding
as well as tackling the issues that impede the goals of community
sustainability. Other interests include examining the impact that policing
has on social cohesion, community engagement, and trust amongst
community members.
Mahesh K. Nalla
is a professor at the School of Criminal Justice at Michigan State University
in East Lansing, USA. His research projects are centred on organizational
issues, security governance and trust in public and private police in
developed and emerging democracies. One of his multi-nation projects on
firearm-related violence for the United Nations resulted in forming the
cornerstone of the draft (UN ECOSOC) International Protocol Against the
Illicit Manufacturing of and Trafficking in Firearms, Ammunition and Other
Related Materials, as a supplement to the UN Convention Against
Transnational Organized Crime. Nalla is Editor-in-Chief of the
International Journal of Comparative and Applied Criminal Justice.
Andy Newton
is Associate Professor of Policing and Criminology in the Department of
Criminology and Criminal Justice at Nottingham Trent University (NTU).
His research interests focus on the intersection of crime, people, and space.
More specifically he is interested in crime and policing as it relates to
transport, technology, intelligent mobility and crime; acquisitive crime;
policy analysis and evaluation, problem solving and evidence-based
policing, data science, crime analysis and GIS; situational crime prevention;
offender mobility, and mixed methods research. He is lead of NTU’s
strategic research theme Safety and Security of Citizens and Society and a
Strategic Board member of the Nottingham and Nottinghamshire’s Violence
Reduction Unit (NNVRU).
Tochukwu Omenma
is a senior lecturer at the University of Nigeria Nsukka, Nigeria,
Department of Political Science, and holds a doctorate in Comparative
Politics from the same University. Omenma recently concluded a
postdoctoral fellowship at the University of Johannesburg, South Africa.
His primary area of research is conflict and counterterrorism, with a bias in
local defence forces, state response to violent extremism, and the
development dynamics of violent extremism in the Lake Chad region. He
has published articles on terrorism, insurgency and counterterrorism in
several refereed journals including Security Journal, Politics & Religious
Journal, Innovation: The European Journal of Social Science Research,
Africa Insight, India Quarterly, Peace and Conflict Studies and Journal of
Security Sector Management (JofSSM). He is researching on counter-
insurgency approach from the local defence force in Nigeria. He has
consulted for the United Nations Educational, Scientific, and Cultural
Organization (UNESCO) on Nigeria’s land tenure policy and human rights
violation as well as Department for International Development (DFID).
G. A. Petrossian
is an associate professor in the Department of Criminal Justice, and the
Director of the International Crime and Justice Master’s Program at John
Jay College of Criminal Justice. She is a quantitative researcher and crime
scientist, and her research focuses on testing environmental criminology
and opportunity theories of crime, with a particular focus on illegal,
unreported, and unregulated (IUU) fishing. Dr Petrossian has published
over two-dozen scholarly articles and book chapters on the topic of wildlife
trafficking and IUU fishing. She is the author of the book The Last Fish
Swimming: The Global Crime of Illegal Fishing (2019). Dr Petrossian’s
research has been featured in Global Fishing Watch, Yale University’s
Environment Review, National Geographic, and PBS Nature.
Hien-Thuc Pham
is an applied economist, and her research areas are political economy,
economics of culture and economics of subjective well-being. Dr Pham also
has interests in security and criminological economics, especially in the
cost-benefit analysis of various crime prevention interventions. She holds a
PhD (Economics) from Griffith University and a master’s degree in
International Economics and Finance from the University of Queensland.
Tim Prenzler
is Professor of Criminology in the School of Law and Society at the
University of the Sunshine Coast (USC) Australia. He was the foundation
Coordinator of the Bachelor of Criminology and Justice from 2015 to 2018.
He teaches courses in policing, crime prevention, and criminal justice ethics
and accountability. He has been a recipient of the USC Vice-Chancellor’s
Award for Excellence in Learning and Teaching. His research interests
include crime and corruption prevention, police and security officer safety,
security industry regulation, and gender equity in policing. He has been a
recipient of the Australian and New Zealand Society of Criminology Adam
Sutton Crime Prevention Research Award on two occasions. Prenzler’s
books include Regulating the Security Industry: Global Perspectives (2018,
with Mahesh Nalla), Understanding Crime Prevention: The Case Study
Approach (2017), Contemporary Police Practice (2015, with Jacki Drew),
Understanding and Preventing Corruption (2013, Palgrave, with Adam
Graycar) and The Law of Private Security in Australia (2009, with Rick
Sarre).
Michelle E. Protas
is a first-year PhD student in the School of Criminal Justice at the
University of Cincinnati. Her research interests include campus violence,
sexual assault prevention, victimology, and mass shootings in K-12 schools.
She is collaborating with Women Helping Women, a local advocacy
agency, Cincinnati Police Department, and a team of graduate students led
by Professors Valerie Anderson and Bonnie Fisher to evaluate the Domestic
Violence Enhanced Response Team (DVERT) that provides on-call and on-
scene response to domestic violence survivors. Additionally, Protas is
working with Professor Brittany Hayes on a cross-national examination of
individual-level, community-level and national-level predictors of child
marriage and their association with physical and emotional intimate partner
violence.
Kumar Ramakrishna
is a tenured Associate Professor, Associate Dean for Policy Studies, as well
as Head of the International Centre for Political Violence and Terrorism
Research (ICPVTR), in the S. Rajaratnam School of International Studies
(RSIS), in Nanyang Technological University, Singapore. He was
previously the Head of the Centre of Excellence for National Security
(CENS) at RSIS from 2006 to 2015, and Head of the National Security
Studies Programme (NSSP) from 2016 to 2020. A historian by background,
Ramakrishna has been a frequent speaker on counter-terrorism before local
and international audiences, a regular media commentator on counter-
terrorism, and an established author in numerous internationally refereed
journals. His first book, Emergency Propaganda: The Winning of Malayan
Hearts and Minds 1948–1958 (2002) was described by the International
History Review as “required reading for historians of Malaya, and for those
whose task is to counter insurgents, guerrillas, and terrorists”. His second
major book, Radical Pathways: Understanding Muslim Radicalisation in
Indonesia (2009), was featured as one of the top 150 books on terrorism
and counterterrorism in the respected journal Perspectives on Terrorism,
which identified Ramakrishna as “one of Southeast Asia’s leading
counterterrorism experts”. His recent research has focused on
understanding, preventing and countering violent extremism in Southeast
Asia.
Genserik Reniers
is a full professor at the Delft University of Technology, at the Safety and
Security Science Group. He is also a professor (in a part-time capacity) both
at the University of Antwerp and at the KU Leuven (campus Brussels), both
in Belgium, lecturing amongst others in chemistry, organic chemistry, and
engineering risk analysis and risk management. His research topics include
domino effects, operational safety economics, physical security in the
chemical industry, safety and security culture. Now he has authored more
than 200 papers in impact factor journals and has authored and co-authored,
as well as edited, more than 30 scientific books.
Olivier Ribaux
is a professor at the School of Criminal Justice, University of Lausanne,
Switzerland. His research and courses are mainly focused on the use of
traces in crime analysis (forensic intelligence). Beyond his academic career,
Ribaux served for eight years as a crime analyst of the Vaud state police,
Switzerland. In this role, his responsibility was to develop, harmonise and
implement crime analysis and criminal intelligence analysis methods across
six police forces and to support specific investigations of various types of
crimes.
Quentin Rossy
a professor at the School of Criminal Justice, University of Lausanne, and a
former crime analyst, is in charge of the Master’s in Crime Data Analysis
and Traceology, a joint programme with the School of Criminology at the
University of Montreal. Anchored in forensic intelligence, his research
interests focus on methods of crime analysis and the analysis of Internet
crimes, particularly frauds and illicit markets.
Rick Sarre
is Emeritus Professor of Law and Criminal Justice at the University of
South Australia (UniSA). He was previously the President of the Australian
and New Zealand Society of Criminology (2012–2016), Dean of Law at the
UniSA Law School (2019–2020), and Chair of Academic Board at UniSA
(2011–2016). He taught courses in criminology, policing, commercial law
and media law for 35 years, and received a Carrick Citation from the
Australian Learning and Teaching Council in 2008. His research interests
include bail reform, surveillance science, restorative justice, and security
law and practice. Sarre has received awards for research from UniSA, the
Australian Security Industry Association Limited (ASIAL) and Herald
Publishing House. His books include The Law of Private Security in
Australia (2009, with Tim Prenzler), Key Issues in Criminal Justice (2005,
with John Tomaino), Policing Corruption: International Perspectives
(2005, with Dilip Das and Hans-Jurg Albrecht) and Religion Matters (2020,
with Paul Babie).
David Shepherd
Following a career in product and process engineering, Shepherd moved
into research, focusing on white-collar crime, fraud and corruption. Using
quantitative and qualitative methods, Shepherd’s research encompasses
organisational characteristics and compliance, offender behaviour, security
and justice.
Helen Shoesmith
(nee Skudder) is a sustainability professional working in the Ministry of
Justice (UK Government Department). Prior to her role in the Civil Service
she completed an Engineering Doctorate studying the Carbon Cost of
Crime sponsored by the University of Surrey, Home Office and Secured by
Design. Her work at the Ministry of Justice involves reducing the
environmental impacts of the criminal justice system and its estate
including prisons, courts, probation and office buildings.
Michael Skidmore
is a senior researcher at the Police Foundation and has worked over a
number of years on a portfolio of work looking at serious and organised
crime and the response from government, police and partner agencies. He
has led substantive research projects on fraud, cybercrime, online child
sexual abuse, local organised crime, and criminal pathways and profiles,
publishing findings in Police Foundation reports, academic journals and
blogs. Previously, he conducted crime and criminal justice research at the
Home Office and Ministry of Justice. He has an MSc in forensic
psychology from London Metropolitan University.
Reka Solymosi
is Lecturer in Quantitative Methods in the Department of Criminology at
the University of Manchester. She is a fellow of the Software Sustainability
Institute and an honorary lecturer at University College London. She has
led numerous research projects making use of new forms of data to gain
insight into people’s behaviour and subjective experiences, particularly
focusing on crime, victimisation, transport, and spatial research. Her work
promoting place-based measures of fear of crime has been replicated
internationally. She is dedicated to promoting data literacy in social science
study and practice. Her most recent book (co-authored with Juanjo Medina)
Crime Mapping and Analysis using R: A Practical Introduction aims to
promote open-source software and reproducible crime analysis amongst
practitioner and academic researchers.
Nissy Sombatruang
is a senior researcher at the National Institute of Information and
Communications Technology (NICT), Tokyo, Japan. Her recent research
has examined various aspects of human factors in Cybersecurity, from
economics to usability, and in different domains, from IoT to visualisation
in security, and security notification. Prior to obtaining her PhD from UCL,
Sombatruang worked primarily in IT advisory, audit, and assurance in
London, UK.
Emmeline Taylor
is Associate Professor of Criminology at City, University of London. Her
research explores several dimensions of crime and community safety with
particular emphasis on retail crime, new technologies, and the police. Dr
Taylor has published extensively across these topics, including the books:
Armed Robbers (Oxford University Press, forthcoming), Surveillance
Futures (2017), and Crime, Deviance and Society (2020).
Rebecca Thompson
is an associate professor at Nottingham Trent University (NTU). She has a
BSc (Hons) and MSc from Loughborough University and a PhD in
Criminology from NTU. Prior to this, she worked for a police force in the
UK (with a specific remit around crime reduction and community safety).
Since her PhD, she has held research and teaching positions at a number of
academic institutions. Her research focuses upon household burglary, anti-
social behaviour and police-academic collaboration. Much of this involves
working with external partners.
Nick Tilley
is a member of the UCL Jill Dando Institute. His abiding interest lies in
theoretically informed applied social science. His research has focused
mainly on philosophy of social science, programme evaluation
methodology, problem-oriented policing, and situational crime prevention.
This is reflected in far too many publications. Recent empirical work has
concerned the international crime drop and the consequences of Covid-19
for crime patterns.
Yuriy Timofeyev
is Assistant Professor of Management at the Higher School of Economics in
Moscow, Russia. He holds a doctoral degree from Frankfurt School of
Finance and Management, Germany. His recent research focuses on causes
and consequences of fraudulent and unethical behaviour in different spheres
as well as the effectiveness of preventative strategies. The most significant
projects are related to prevention of fraud and cybercrime by insurers in
contemporary Russia, and pharmaceutical and healthcare fraud in the US.
Timofeyev is Associate Editor at Cost Effectiveness and Resource
Allocation and International Journal of Health Planning and Management.
Lisa Tompson
is Senior Lecturer at the New Zealand Institute for Security and Crime
Science. Prior to that she was an associate professor at UCL. Tompson
focuses on research for and with crime reduction agencies. Her work has
helped to shape the professionalization agenda for the UK police, and the
infrastructure underpinning this transformation. She regularly publishes in
top-tier journals on topics relating to crime analysis, crime prevention and
police practice. Her research interests centre on building the evidence base
for evidence-based policing. She is interested in all tiers of evidence
generation, from evaluations of small-scale problem-oriented policing
projects through to evidence synthesis.
Andromachi Tseloni
is Professor of Quantitative Criminology and leads the Quantitative and
Spatial Criminology Research Group at Nottingham Trent University,
working on research projects informing crime prevention and community
policing. She is also Academic Lead of the Ministry of Justice/ADR UK
Data First Programme. Tseloni’s research expertise include risk and
protective factors, including security, of acquisitive crime and violence
victimisation and witnessing anti-social behaviour; the crime drop; crime
perceptions; social capital and cross-national comparisons. She won the
prestigious Office for National Statistics (ONS) Research Excellence Award
2019.
Zarina I. Vakhitova
is Lecturer (Assistant Professor) in Criminology at Monash University,
Melbourne, Australia. Her research expertise is in victimology, crime
prevention and methodological and analytical aspects of quantitative
criminology. Her articles have appeared extensively in prestigious peer-
reviewed journals, such as PLOS One, Computers in Human Behaviour,
International Review of Victimology, Crime Prevention and Community
Safety, Journal of Contemporary Criminal Justice and Deviant Behaviour.
She is researching hotel crime and tourist victimisation.
Laura Vozmediano
is Lecturer in Criminology and Psychology at the University of the Basque
Country and a member of the research group on Applied Criminology. She
has been a member of the directive board in the Spanish Society of
Criminological Research. Her research interests are in perception of safety
and fear of crime, design of safer cities and promotion of sustainable
behaviour, aimed at contributing to the development of safe, sustainable and
friendly cities for all kinds of people. She has led projects related to both
environmental psychology and environmental criminology and is the co-
author of the first handbook about Environmental Criminology published in
Spanish (Criminología ambiental: Ecología del delito y de la seguridad),
along with multiple articles, and several chapters and books.
Alison Wakefield
is Professor of Criminology and Security Studies and Co-director of the
Cybersecurity and Criminology Centre at the University of West London.
She is also an associate fellow of the Royal United Services Institute, a
London-based defence and security think tank, and she was Chair of the
Security Institute, the UK’s largest association for security practitioners,
from 2018 to 2020. Wakefield’s other roles include Academic Adviser to
the Chartered Security Professionals Registration Authority, a
Commissioner on the UK’s National Preparedness Commission, and
membership of a number of editorial and advisory boards, including those
of Security Journal and the Journal of Criminology (formerly the
Australian and New Zealand Journal of Criminology). She was recognised
among the digital magazine SC Media UK’s 30 most influential women in
cyber security in 2021, and her latest book Security and Crime: Converging
Perspectives on a Complex World was published in 2021.
Patrick F. Walsh
is a former intelligence analyst who has worked in Australian national
security and law enforcement agencies. He is Associate Professor of
Intelligence and Security Studies at the Australian Graduate School of
Policing and Security, Charles Sturt University, Australia. He has consults
to government, and his research focuses on a range of intelligence
capability issues including governance, leadership, intelligence and ethics,
biosecurity, health security and cyber. He is the author of Intelligence and
Intelligence Analysis (2011); Intelligence, Biosecurity and Bioterrorism
(Palgrave Macmillan, UK, 2018); and Intelligence Leadership and
Governance. Building Effective Intelligence Communities in the 21st
Century (2020).
Victoria Wang
is a Reader in Security and Cyber-crime, Institute for Criminal Justice
Studies (ICJS), University of Portsmouth. She completed her undergraduate
studies and Doctorate at Swansea University. Wang’s research covers
cybersecurity and information security management, social theory, and
theoretical criminology; in particular, (i) security threats and management
measures in organisations; and (ii) cybersecurity in various countries (e.g.,
Nigeria, South Korea and Vietnam) and networks (e.g., the Darknet). She is
the Principal Investigator of the EPSRC project Data Release—Trust,
Identity, Privacy Security (EP/N027825/1) (2016–2020). She is an
investigator of several HM Government-funded projects, including Cyber
Security Breaches Survey (2016–2019); Victims of Computer Misuse Crime
(2018–2019); and Understanding the UK Cyber Skills Labour Market
(2019). Wang is a regular speaker at various cybersecurity/crime
conferences and seminars, including Oxford, Cambridge and Dagstuhl in
Summer 2019.
Benjamin Weaver
holds a position as Lecturer at Lund University, School of Economics and
Management (LUSEM). Since 2006 he has been involved in studying
technological change and the digitalization of the security industry, with a
particular focus on business strategy and technology. Besides his
contribution to CCTV raising awareness on CCTV research to a wider
Swedish audience, he has in recent years been exploring the impacts of
artificial intelligence and machine learning on business strategy and
management. Weaver is a member and active researcher of the LUSAX
security research team at LUSEM.
Adam White
is Senior Lecturer in Criminology in the Centre for Criminological
Research, School of Law, University of Sheffield. Before arriving in
Sheffield, he was Lecturer and then Senior Lecturer in Public Policy in
Department of Politics, University of York. He has also spent time as a
visiting scholar at the University of Washington (Seattle) and as a
researcher for Gun Free South Africa (Cape Town) and Demos (London).
His research focuses on three interconnected themes: (i) the rise of the
private security and private military industries in the postwar era; (ii)
corresponding issues of governance, regulation and legitimacy in the
security and military sectors; (iii) and the changing nature of state-market
relations. Over the past decade, he has published 30 journal articles and
book chapters on these themes as well as one book, The Politics of Private
Security: Regulation, Reform and Re-legitimation.
Gabriel T. W. Wong
is a criminologist and prevention scientist with experience in evaluation,
cost-benefit analysis, and multi-criteria decision modelling. His research
interests include crime and drug involvement, policy decision-making,
knowledge synthesis, economic analysis of crime prevention and efficiency
in policing. His work in these areas have implications to (i) the
development of targeted institutional and criminal justice policies aimed at
mitigating the adverse harms and consequences associated with crime and
illicit drug involvement, (ii) the deployment of finite resources that improve
the efficiency of policing activities (e.g. arrest, detection), and (iii) the costs
and benefits of prevention interventions.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_1
1. Introducing the Handbook of Security
Martin Gill1
(1) Perpetuity Research, Tunbridge Wells, UK
Martin Gill
Email: [email protected]
Abstract
This chapter introduces this third edition of the Handbook. It starts by
outlining the issues that have influenced how it is presented and then moves
on to introduce, albeit briefly, each of the chapters.
Offence Types
In Chap. 8 Kumar Ramakrishna examines how the transnational terrorism
and extremism landscape has evolved since the so-called religiously
inspired wave that emerged most forcefully with the Al Qaeda attacks in
New York and Washington in September 2001, and more recently continued
by the virulent Al Qaeda offshoot Islamic State of Iraq and Syria (ISIS)
from the mid-2010s onwards. Ramakrishna shows how not just violent
Islamist extremism as exemplified by Al Qaeda and ISIS but other forms—
such as the White Supremacist, Buddhist and Hindu Extreme Right—have
gained momentum in recent years. The chapter moves on to consider the
key elements of the strategically dexterous approach needed for coping with
such rapidly mutating threats.
In Chap. 9 Emmeline Taylor looks at seemingly increasing levels of
violence and aggression in retailing and the far-reaching consequences for
shop workers, customers and local communities. Indeed, each year
hundreds of thousands of working hours are lost due to injuries. Taylor
assesses the main scenarios in which violence and abuse is becoming
prevalent: encountering shoplifters; enforcing legislation relating to the sale
of age-restricted goods and other prohibited sales; hate motivated incidents,
armed and unarmed robberies, and, most recently, upholding Covid-19
related rules and restrictions such as requiring customers to wear a mask in
store.
The next chapter focusses on burglary which in the United States is the
second most frequently occurring major crime after theft. Jim Calder
discusses how in the past 25 years burglary rates have dropped dramatically
in Western-law nations significantly attributable to effective crime
prevention and security measures. Calder suggests that even more rate
reductions can be achieved by conceptualising and developing the
community security function (CSFs) as a learning organisation. Burglars
learn from experiences, successes and challenges, and research.
Communities also learn from information disseminated in many forms but
crucially he argues they can learn a lot more but this will depend in part on
more research.
The next two contributions focus on different types of frauds. In Chap.
11 Cassandra Cross focusses on how fraudsters are using a combination of
offline and online approaches to deceive, manipulate and exploit
unsuspecting victims across a variety of communication channels and
platforms. Overall, Cross argues that the response to fraud requires a
change in thinking and practice. While in Chap. 12 Yuriy Timofeyev and
Mike Skidmore discuss the complexities of fraud in the insurance industry.
They assess the nature of insurance fraud as well as the drivers of offending
through different lenses including routine activity theory.
In Chap. 14 Mark Button and Susanne Knickmeier focus on industrial
espionage. The danger of business secrets being spied on by competitors,
hacker groups or foreign intelligence services or its exploitation by third
parties has the potential for significant economic consequences (which they
discuss). Their chapter uses case examples to illustrate and examine the
legal basis of the problem in different European countries and it explores
the techniques perpetrators use. In Chap. 15 Michael Levi focusses on
money laundering where he analyses the collateral damage it causes for
both for companies and for society. Levi discusses how money laundering
is an evil in itself but so are the underlying crimes which give rise to it. He
provides an estimate of the size and harmfulness of the threat, and identifies
improvements/emerging problems in the assessment of money laundering.
In the final part of this section Branislav Hock, Mark Button and David
Shepherd evaluate the threat posed by corporate corruption and bribery
where they start by arguing that categorising those tainted as either
perpetrators or victims is reductionist. Drawing on court papers in bribery
cases involving Airbus and Roll-Royce, they use pathogen theory to explain
the situational factors that may lead a person to engage in bribery.
Researching Security
The first four chapters in this section discuss the ways in which different
methodologies are used in security research. First, Matthew Manning and
Gabriel T. W. Wong and Hien-Thuc Pham discuss an approach that enables
practitioners and decision-makers to assess a holistic evidence base. They
summarise examples of meta-analyses (including those related to the
effectiveness of CCTV, alley gating and street lighting) and identify areas
that merit further attention. In Chap. 24 Andrew Newton argues for a
greater uptake of two underused approached in the security field, realistic
evaluation and the 5Is framework. He outlines many advantages to these
complimentary approaches including a greater understanding of the
mechanisms by which a security intervention has or has not worked in a
particular setting or place, and provides a user friendly structure for
disseminating and communicating the evaluation results of interventions to
security practitioners. The chapter examines the strengths and limitations of
each approach, the merits of combining the two, and uses a hypothetical
scenario to guide the reader through how to carry out a combined realistic
evaluation and 5Is evaluation of a security intervention.
In Chap. 25 Dr. Harald Haelterman discusses script analysis which he
positions as a useful tool to help security practitioners design and upgrade
preventive and protective controls. In addition to providing some
documented examples of how the approach has been applied in practice, it
highlights some recent advances in script analysis and some suggested areas
for improvement. In the next chapter Reka Solymosi, Ines Guedes and
Laura Vozmediano discuss a somewhat novel methodology, namely mobile
apps and physiological measures and show how they are increasingly used
to study perceived security of built environments. They allow researchers to
evaluate perceived security in a concrete time and place, framing perception
as a context-specific experience. They hope to inspire more researcher and
help build a more robust understanding of place-based perception of
security. While the final chapter in this section takes a different stance, it
explains how methodologies can be applied to a specific area of study. Rob
I. Mawby and Zarina I. Vakhitova argue that while the relationship between
tourism and crime is not commonly addressed by criminologists, it is
clearly an important issue. Tourists are often identified as causing crime and
public disorder in resort areas, tourists appear to be overrepresented as
victims and some tourist areas are crime hotspots. This impacts the quality
of life of local residents and the vacation experience of tourists. But it also
affects the tourism industry. They provide an engaging critique of what we
know about the relationship between tourism and crime and how research
might be improved.
References
Allen, B.J. and Loyear, R. (2017) Enterprise Security Risk Management: Concepts and Applications.
Virginia: ASIS International.
Blythe J. and Johnson S. (2019) A Systematic Review of Crime Facilitated by Consumer Internet of
Things. Security Journal. https://doi.org/10.1057/s41284-019-00211-8.
Gill, M., Howell, C., McGeer, C. and Ramm, J. (2019). The Evolution of Physical Security
Measures: Assessing the Benefits and Implications of Using More Advanced Technologies.
Tunbridge Wells: Perpetuity Research. www.perpetuityresearch.com.
Gill, M., Howell, C. and McGeer, C. (2020) Understanding the Influences on Security as a
Career/Job Choice: What Those Working in the Security Sector Think. Tunbridge Wells: Perpetuity
Research and Consultancy International.
Howell, C., McGeer, C., Gill, M. and Ramm, J. (2019) Exploring the Experience of Women in
Security and Identifying Key Areas for Industry Development. Tunbridge Wells: Perpetuity Research
and Consultancy International.
Part I
The Subject Area of Security
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_2
Francis Dodsworth
Email: [email protected]
Abstract
This chapter explores the temporal and disciplinary boundaries of security.
Although the language of ‘security’ only became prominent in
criminological work in the last twenty years, the concepts of ‘security’,
prevention, and sets of practices associated with ‘taming the future’ in the
fields of crime, vice and disorder, nevertheless have a long history.
However, the nature of that history and its interpretation are contested, and
it has only recently begun to be explored in detail. This chapter introduces
important features of the histories of policing, crime prevention and
protection, and their transformation over the modern period, but in doing
so, it also guides the reader through academic debates about the
significance of these developments. Particularly important themes are the
relationship between the state and private security; security and protection
as forms of power or hegemony; the moral and the technical dimensions of
security; and the dynamics of ideology, identity and politics, particularly
articulated in relation to (neo)liberalism, capitalism and feminism. These
themes are related to particular methodological approaches to, or uses of,
the history of security: criminological work inspired by Michel Foucault;
neo-Marxist critiques of security; and more historicist approaches based
around more conventional historical research as a means of engaging in
criminological debate, increasingly being termed ‘historical criminology’.
Introduction
One of the central questions that arise when we start to explore the
boundaries of ‘security’ is its place in time. The development of ‘crime
prevention’ as a criminological sub-discipline and coherent body of practice
since the 1960s; the pluralisation of policing; the centrality of risk
management to contemporary crime control; and the political drive to
‘responsibilise’ the public and engage them in their own protection through
security consumption, have all been identified as harbingers of ‘late’ or
‘liquid’ modernity, or the ‘risk society’, and more specifically with
‘neoliberal’ politics since the late 1970s (Bayley and Shearing 1996;
Ericson and Haggerty 1997; Garland 2001; Gilling 1997; Hope and Sparks
2000; Johnston and Shearing 2003; Zedner 2000, 2009). However, although
the ‘securitisation’ of society may have taken a distinctive form in the last
fifty years, this chapter will argue that the search for security is not a
function of the unique insecurities of the ‘neoliberal’ or ‘late modern’ age.
Rather, efforts to ‘make the future certain’ (Schuilenburg 2015: 1) are
coextensive with ‘modernity’ in the long term and the provision of security
has always been a mixed economy of differing agents, agencies and
technologies.
The ‘securitisation’ of society appears to be part of a wider long-term
dynamic involving the socialisation of risks, pacification of social relations
and the governmentalisation of the state, and thus, as the work of Mark
Neocleous (2011, 2014) has already recognised, intersects with the work of
the two great ‘genealogists’ of the late twentieth century, Norbert Elias and
Michel Foucault. This chapter uses their work to help us to understand the
long-term process of securitisation, but at the same time, it also uses the
history of security to challenge aspects of their accounts. In particular,
rather than seeing the process of securitisation simply in terms of the
accumulation and imposition of state power, followed by its loss or
qualification in the recent past, this chapter will draw on a range of recent
work in the history of crime and policing to argue that although the state
became increasingly important in security provision over the modern
period, it never claimed or achieved a monopoly in this regard (Churchill
2014, 2017). Indeed, rather than seeing securitisation as the outcome of the
development of the modern state, the state itself appears as an outcome of
the process of securitisation and its associated practices. These practices
developed in the context of long-term processes of social change, including
population growth and the emergence of ‘the population’ as a concept, the
breakdown of feudal systems of personal obligation and dependence, the
associated phenomenon of urbanisation and the practical requirements of
governing a society of strangers, and the development of a wide range of
new techniques and technologies of risk management and security
(Dodsworth 2019).
Recommended Readings
Churchill et al. (2020) provides the most up to date and comprehensive
historical collection to date, this book includes studies of a range of
different forms of private security provision in various national contexts,
integrated through a useful survey of the field as a whole. Subjects include
self-defence, armed and unarmed; private investigation; the private security
sector; employer and political surveillance; and informal resolution of
offences. Dodsworth (2019) provides an attempt to approach the subject of
security in long-term historical perspective; drawing on the most recent
historical research, this book extends many of the themes presented in this
chapter. With an empirical focus on English urban history, the book
explores the process of securitisation from the sixteenth century to the
present, with a particular focus on how the quest for security has shaped
new roles, identities and positions of power, and has simultaneously
challenged and maintained patriarchal disciplinary structures. Neocleous
(2008) provides an important theoretical analysis that argues for the
centrality of security to liberal, capitalist and colonial power, with a focus
particularly on the Anglo-Saxon sphere. Although crime is not a central
concern of this work, the focus on the wider rationality of ordering, social
control, and its relationship to particular socio-economic structures and
ideology provides an important context for thinking about the relationship
between security and long-term processes of social change.
References
Bailey, V. (2014). Charles Booth’s Policemen: Crime, Police and Community in Jack-the-Ripper’s
London. London: Breviary Staff.
Barry, A., Osborne, T. and Rose, N. (Eds.) (1996). Foucault and Political Reason: Liberalism, Neo-
Liberalism and Rationalities of Government. London: UCL Press.
Bayley, D.H. and Shearing, C. (1996). The Future of Policing. Law and Society Review, 30(3), 585–
606.
Burchell, G. (1991). Peculiar Interests: Civil Society and Governing the ‘System of Natural Liberty’.
In G. Burchell, C. Gordon and P. Miller (Eds.), The Foucault Effect: Studies in Governmentality (pp.
119–50). Hemel Hempsted: Harvester.
Burchell, G., Gordon, C. and Miller, P. (Eds.) (1991). The Foucault Effect: Studies in
Governmentality. With Two Lectures by and an Interview with Michel Foucault. London: Harvester.
Churchill, D. (2014). Rethinking the State Monopolisation Thesis: The Historiography of Policing
and Criminal Justice in Nineteenth-Century England. Crime, Histoire & Sociétés / Crime, History
and Societies, 18(1), 131–52.
Churchill, D. (2015). The Spectacle of Security: Lock-picking Competitions and the Security
Industry in Mid-Victorian Britain. History Workshop Journal, 80(1), 52–74.
Churchill, D. (2016). Security and Visions of the Criminal: Technology, Professional Criminality and
Social Change in Victorian and Edwardian Britain. British Journal of Criminology, 56(5), 857–76.
Churchill, D. (2017). Crime Control and Everyday Life in the Victorian City: The Police and the
Public. Oxford: Oxford University Press.
Churchill, D. Janiewski, D. and Leloup, P. (Eds.) (2020). Private Security and the Modern State:
Historical and Comparative Perspectives. London: Routledge.
Dean, M. (1999). Governmentality: Power and Rule in Modern Society. London: Sage.
Dodsworth, F. (2004). ‘Civic’ Police and the Condition of Liberty: The Rationality of Governance in
Eighteenth Century England. Social History, 29(2), 199–216.
Dodsworth, F. (2007a). Masculinity as Governance: Police, Public Service and the Embodiment of
Authority, c. 1700–1850. In M.L. McCormack (Ed.), Public Men: Masculinity and Politics in
Modern Britain (pp. 33–53). Basingstoke: Palgrave Macmillan.
Dodsworth, F. (2007b). Police and the Prevention of Crime: Commerce, Temptation and the
Corruption of the Body Politic, from Fielding to Colquhoun. British Journal of Criminology, 47(3),
439–54.
Dodsworth, F. (2016). Risk, Prevention and Policing, c. 1750–1850. In T. Crook and M. Esbester
(Eds.), Governing Risks in Modern Britain: Danger, Safety and Accidents, c. 1800–2000 (pp. 29–53).
Basingstoke: Palgrave Macmillan.
Dodsworth, F. (2019). The Security Society: History, Patriarchy, Protection. London: Palgrave
Macmillan.
Dodsworth, F. (2020a). Fighting for the Right to the Streets: The Politics and Poetics of Protection in
Women’s Self-Defence. In S. Watson (Ed.), Spatial Justice in the City (pp. 118–35). London:
Routledge.
Dodsworth, F. (2020b). Protection: Selling Self-Defence in Twentieth-Century Britain and the United
States. In D. Churchill, D. Janiewski, and P. Leloup (Eds.), Private Security and the Modern State:
Historical and Comparative Perspectives (pp. 154–71). London: Routledge.
Emsley, C. (1996). The New Police: A Political and Social History (2nd ed.). London: Longman.
Ericson, R.V. and Haggerty, K.D. (1997). Policing the Risk Society. Oxford: Clarendon.
Foucault, M. (2008). The Birth of Biopolitics: Lectures at the College de France, 1978–1979 (M.
Senellart, Ed., G. Burchell, Trans.). Basingstoke: Palgrave Macmillan.
Foucault, M. (2009). Security, Territory, Population: Lectures at the College de France, 1977–1978
(M. Senellart, Ed., G. Burchell, Trans.). Basingstoke: Palgrave Macmillan.
Garland, D. (2001). The Culture of Control: Crime and Social Order in Contemporary Society.
London: University of Chicago Press.
Gatrell, V.A.C. (1990). Crime, Authority and the Policeman-State. In F.M.L. Thompson (Ed.), The
Cambridge Social History of Britain, 1750–1950: Volume 3 (pp. 243–310). Cambridge: Cambridge
University Press.
Gilling, D. (1997). Crime Prevention: Theory, Policy and Practice. London: UCL Press.
Godfrey, B. and Cox, D. (2016). Policing the Industrial North of England, 1777–1877: The Control
of Labour at Work and in the Streets. Crime, Histoire & Sociétés / Crime, History and Societies,
20(1), 129–47.
Godfrey, E. (2010). Masculinity, Crime and Self-Defence in Victorian Literature: Duelling with
Danger. Basingstoke: Palgrave Macmillan.
Godfrey, E. (2012). Femininity, Crime and Self-Defence in Victorian Literature and Society: From
Dagger Fans to Suffragettes. Basingstoke: Palgrave Macmillan.
Hope, T. and Sparks, R. (Ed.) (2000). Crime, Risk and Insecurity: Law and Order in Everyday Life
and Political Discourse. London: Routledge.
Hunt, A. (1999). Governing Morals: A Social History of Moral Regulation. Cambridge: Cambridge
University Press.
Jeffrys-Jones, R. (2020). What Burleson and Orwell Overlooked: Private Security Provision in the
United States and the United Kingdom. In D. Churchill, D. Janiewski and P. Leloup (Eds.) Private
Security and the Modern State: Historical and Comparative Perspectives (pp. 214–31). London:
Routledge.
Johnston, L. and Shearing, C. (2003). Governing Security: Explorations of Policing and Justice.
London: Routledge.
Klingenstein, S., Hitchcock, T. and DeDeo, S. (2014). The Civilizing Process in London’s Old
Bailey. Proceedings of the National Academy of Sciences of the United States of America, 111(26),
9419–24.
Lemmings, D. (2011). Law and Government in England During the Long Eighteenth Century: From
Consent to Command. Basingstoke: Palgrave Macmillan.
Moss, E. (2011). Burglary Insurance and the Culture of Fear in Britain, c. 1889–1939. Historical
Journal, 54, 1039–64.
Neocleous, M. (2000). The Fabrication of Social Order: A Critical Theory of Police Power. London:
Pluto.
Neocleous, M. (2006). Theoretical Foundations of the ‘New Police Science’. In M.D. Dubber and M.
Valverde (Eds.), The New Police Science: The Police Power in Domestic and International
Governance (pp. 17–41). Stanford, CA: Stanford University Press.
O’Malley, P. and Hutchinson, S. (2007). Reinventing Prevention: Why Did “Crime Prevention”
Develop So Late? British Journal of Criminology, 47(3): 373–89.
Pasquino, P. (1991). Theatrum Politicum: The Genealogy of Capital—Police and the State of
Prosperity. In G. Burchell, C. Gordon and P. Miller (Eds.), The Foucault Effect: Studies in
Governmentality (pp. 1105–18). Hemel Hempsted: Harvester.
Petrow, S. (1994). Policing Morals: The Metropolitan Police and the Home Office, 1870–1914.
Oxford: The Clarendon Press.
Rose, N. (1996). Governing ‘Advanced’ Liberal Democracies. In A. Barry, T. Osborne and N. Rose
(Eds.), Foucault and Political Reason: Liberalism, Neo-Liberalism and Rationalities of Government
(pp. 37–64). London: UCL Press.
Schuilenburg, M. (2015). The Securitization of Society: Crime, Risk and Social Order (G. Hall,
Trans., introduced by D. Garland). London: New York University Press.
Stenning, P. (2020). Foreword. In D. Churchill, D. Janiewski and P. Leloup (Eds.), Private Security
and the Modern State: Historical and Comparative Perspectives (pp. x–xi). London: Routledge.
Storch, R. (1976). The Policeman as Domestic Missionary: Urban Discipline and Popular Culture in
Northern England, 1850–1880. Journal of Social History, 9(4), 481–509.
Valverde, M. (2008). Police, Sovereignty, and Law: Foucaultian Reflections. In M.D. Dubber and M.
Valverde (Eds.), Police and the Liberal State (pp. 15–32). Stanford, CA: Stanford University Press.
White, A. (2020). Monopoly or Plurality? The Police and the Private Security Industry in Mid-
Twentieth-Century Britain. In D. Churchill, D. Janiewski and P. Leloup (Eds.), Private Security and
the Modern State: Historical and Comparative Perspectives (pp. 78–95). London: Routledge.
Wood, J.C. (2004). Violence and Crime in Nineteenth-Century England: The Shadow of Our
Refinement. London: Routledge.
Zedner, L. (2000). The Pursuit of Security. In T. Hope and R. Sparks (Ed.), Crime, Risk and
Insecurity: Law and Order in Everyday Life and Political Discourse (pp. 200–14). London:
Routledge.
Helen Forbes-Mewett
Email: [email protected]
Abstract
This chapter will consider many diverse meanings of the term security. It
will also include examples of various applications that show how
understandings of the notion have broadened well beyond traditional
boundaries. Perspectives will include international relations, security
studies, economic and human security, psychological security, and
sociological security—leading to what has been recently termed ‘the new
security’. The latter being a concept that is applied in an increasingly
mobile world. Case studies in the chapter are based on the topics of campus
security, employment security, housing security, food security and personal
security.
Introduction
This chapter investigates how the boundaries of the concept of security
have been widened and how the concept has been redefined within modern
society. The meaning of security for both individuals and groups is diverse
and this is explored in a broader context through various interpretations and
applications of security, as well as through the acknowledgment of the
importance of existing work on this topic. The chapter evolved from an
earlier examination of the notion of security where the term was redefined
as ‘the new security’ (Forbes-Mewett 2019). The notion of ‘new security’
reflects different understandings of what it means to be secure in the
contemporary world. Security can be both objective and subjective, relative
to risk and opportunity, and can involve social influences such as education,
employment as well as economic, cultural and other social factors. That is,
security extends well beyond earlier understandings around national
security issues to impacts on people’s everyday lives. The case studies
included in the chapter relate to individual, community and cultural
experiences across the United States (US), the United Kingdom (UK),
Australia and China.
Specific topics including personal security, campus security,
employment security, housing security and food security are a focal point of
the case studies presented. The chapter begins with personal security, which
provides context for other forms of security. Next considered is campus
security, which is framed from the purposes of safety and breaking down
barriers between individuals and police. The notion of employment security
is based on research conducted within a small coastal town in the Australian
state of Queensland facing employment issues and the proposal of Chinese
foreign direct investment. The high impact of housing security on
international students in Australia, the UK and the US is also analysed.
Concern about food security is normally associated with developing
nations; however, in this chapter it is applied to Australia—a developed
nation with a high standard of living. In the case study presented,
‘Australia’s Food Bowl’, is threatened by the proposal of a Chinese-owned
mining venture. The case studies reveal new perspectives and experiences
that signify what emerged as ‘the new security’. The term ‘the new
security’ evolved from the standpoint of security studies—a subfield of
international relations, alongside a holistic approach including human
security as well as economic, psychological and sociological perspectives.
Redefining Security
The notion of security has evolved over time from the basic concept of
physical protection to the provision of welfare enabling an individual’s
well-being and potential in life to flourish. However, there are many sources
of security and individuals have differing values and needs. The
relationships between human needs and security are evident when examined
from a psychological perspective. For example, Adler (1930) acknowledges
the psychological perspective of the impacts of security and insecurity on
an individual and Berne (1947) highlights security as freedom from anxiety.
Similarly, Maslow (1943) asserts that safety and security are basic human
needs. But sociology takes a broader approach that incorporates both
individual and community elements of security, such as how people are
socialised to understand and be aware of possible threats. Due to the
application and understanding of security being so diverse, some claim it to
be indefinable. However, Baldwin (1997) provides an international relations
perspective that challenges the view that the breadth of what is meant by
‘security’ prevents the offering of a meaningful definition. Baldwin
explains:
Human Security
Human security proposes that an ‘individual is to be made secure from two
kinds of basic threats: freedom from fear and freedom from want’
(Nesadurai 2005, p. 9). The 1994 Human Development Report of the
United Nations Development Programme (UNDP 1994, p. 23) defines
human security as ‘protection from sudden and hurtful disruptions in the
patterns of daily life—whether in homes, jobs or in communities’ as well as
‘safety from chronic threats such as hunger, disease and repression’. Former
United Nations Secretary-General Kofi Annan reiterated that:
Human security in its broadest sense embraces far more than the
absence of violent conflict. It encompasses human rights, good
governance, access to education and health care and ensuring that
each individual has opportunities and choice to fulfil his or her own
potential. Every step in this direction is also a step towards reducing
poverty, achieving economic growth and preventing conflict.
Freedom from want, freedom from fear and the freedom of future
generations to inherit a healthy environment—these are the
interrelated building blocks of human, and therefore national
security. (Commission on Human Security 2003, p. 4)
Personal Security
Overall perspectives on security differ across countries, organisations,
communities and individuals. This section is based on the views of
undergraduate university students in Australia. Personal perspectives on
security have been expressed as ‘ feeling comfortable’ (Adriana, female
student) and ‘ being in control of (at least) my immediate future in terms of
where I’ll be, what I’m doing and who I am with’ (Zeda, female student).
Both Adriana and Zeda’s perception of security was subjective and related
to Bénabou and Tirole’s (2005) work, which suggests that responsibility for
security relates to the individual. In contrast, Aja, a female Indian student
holds a view which intertwines a subjective and objective view of security:
‘Security to me is both a mental state and depends on one’s environment. If
I feel secure in my own mind and body, I in turn am able to feel safe. Then
again, my mental state depends on many things including stability with
friends, family, work and uni, which make up my environment’. Another
respondent mentioned that he had experienced mental health issues from a
young age and valued the support of his family, which enhanced his well-
being and sense of security. The support of loved ones was raised by
several respondents, reiterating the importance of having caring, kind
people close by.
Others expressed a focus on physical safety. Sijun (male student)
articulated that ‘Security means to me that everyone can live in a safe
environment’. This was reiterated by Tracy (female student) who stated that
security meant feeling ‘safe from physical harm’. Material security was also
common in interviewee responses. The notion of having access to basic
needs such as shelter, food and health services was prominent. An
interesting aspect regarding ‘the new security’ was the concept of safety
deriving from social relationships. Many students noted that friends and
family being close was vital to their personal sense of security. This was
articulated by Maria (female student) who explained that ‘The epitome of
when I feel secure is the nights when all six members of my family are
home. I have some of my best sleeps these nights because I know there are
five people who are there as well’.
Cultural security stems from kindness and acceptance, as individuals
should be able to express who they are and be free from any discrimination.
For example, Ronny, a male student says, ‘The right to freedom of thought
and action. The freedom to believe whatever I want and not be
discriminated against because of it’. This form of security goes beyond
physical safety and acknowledges the importance of beliefs and actions
requiring respect and safety. Often those from differing cultural
backgrounds were those who expressed the importance of cultural security
for marginalised groups in society. As highlighted by Briana (female
student):
Security also applies to everyone and does not discriminate on a
basis of race, culture, gender or ethnicity. However, I believe that
there can become a time when security can be overemphasised
resulting in oppression, racism and discrimination evident when we
look at the treatment of Muslims post 9/11.
Campus Security
Campus security has evolved over time (see Chapter by Fisher et al., this
volume) due to both national and international incidents and threats. In
contemporary society, educational institutions such as universities attract a
large number of students from dissimilar backgrounds and different
countries. This has raised concerns regarding safety both on and off
campus. So too, attitudes to the police may vary, based on negative
experiences in students’ home countries (Forbes-Mewett et al. 2015).
Positive relationships with authority and civic participation continue to
become a concern and those responsible for campus security have a
challenging role in counteracting negative perspectives. For example, a
University Community Officer in the UK reported that Chinese students
referred to the police in their home country as corrupt forces who cannot be
trusted. Consequently, these students felt unable to trust campus police.
All of those involved in campus security roles across the US, UK and
Australia acknowledged the need to update their campus security practices.
This included updated ways of sharing safety information and alerts. The
advance of information technology allowed this to be more effective for
both campus security, staff and students.
I’ll give you an example. You know the shootings that we were
talking about? Within about 12 minutes, we were on Twitter
warning people about what was going on. Now for some people,
Twitter is like their main route of communication so we were into
them. Now they were people that we wouldn’t have caught by other
media. (Student Liaison Officer, UK)
Online language translation services were also integrated to UK Police
websites as well as Victorian Police in Australia ensuring that each sub-
culture group had a representative in the police department. The sharing of
information was considered to be crucial in relation to campus security as
was support from the student cohort regarding communication and
reporting of any struggles or crime. A key concern of the interviewees was
the need for increased resources to be able to provide for increasing campus
security needs.
While university campus police is not the norm in Australia, one large
university trialled a ‘Police on Campus’ Pilot programme to enhance
security, well-being and social integration within the community. The
university community was multicultural and there were tensions between
different cultural groups and police. Victoria Police initiated the programme
with the hope of breaking down cultural barriers and enhancing the
communication and relationship between police and the university
community. The Victorian Police Blue Paper (Lay 2014) explicitly states
that Victoria Police need to work closely with Australian universities and
that there was a need to change the policing approach. Interviews regarding
the ‘Police on Campus’ Pilot programme were conducted in 2016 and
despite the positive relationships being built with campus security, students
and staff, the future and longevity of the programme were undetermined.
The availability of police officers became an issue due to a Government
requirement to attend to other security issues in broader society. A police
officer stated, ‘We ended up with the heightened terror alert and not being
able to staff [the on campus program] for as long and at the level that we
wanted’ (Victoria Police). The programme also aimed to decrease isolation
and radicalisation of young people. Ironically, the occurrence of incidences
relating this issue meant police were required to work in pairs and this
placed further limits on the availability of police. Thus, due to stretched
resources, the campus pilot project was no longer a priority in terms of
police and community security. Nonetheless, concern about campus
security continued. All the interviewees acknowledged that large gatherings
at universities involved an increased risk to security in Australia.
The proactive approach of campus security and police to build
relationships with various cultural groups meant that ‘there’s a lot more
trust there’ (Campus Security). Gender-balanced representation of campus
police was also implemented due to gender-based violence, different
cultural mores and a tendency for non-reporting (Forbes-Mewett et al.
2015; Forbes-Mewett and McCulloch 2016). Through the on campus
policing pilot programme, community relationships and engagement
improved, particularly with authorities and students from diverse cultural
backgrounds. Trust between the police and the community were integral to
the aim of delaying and avoiding all forms of security risks within the
university and broader community. These findings strongly supported the
need for police visibility as well as campus security in order to adapt to the
changing security environment on campus. While concerns about campus
security were well-founded, the notion of security extends well beyond the
university campus to affect many dimensions in the everyday lives of
individuals. In the following section, I consider employment security
through a case study on an Australian coastal town.
Employment Security
Employment and security are related in a number of ways. The lack of
employment security has important implications for people and this is
discussed in the context of a coastal town in the Australian State of
Queensland which faced ongoing employment issues. Many in the town
hoped that a proposal for Chinese foreign direct investment promising work
for the local community would provide new employment opportunities and
security. The town was located near the Great Barrier Reef. It had a
population of 10,260 consisting of 7.3 per cent indigenous locals, 76.4 per
cent community born in Australia and 16.3 per cent born overseas. There
were also many non-resident workers in the mining and gas industry, as
well as ‘backpackers’ frequenting the area seeking short term employment.
Mobile workers were attracted to this case study town as employment was
temporary, therefore it was hoped that the proposed foreign development
would encourage a ‘new breed of mobile worker’ who could be ‘enticed to
base themselves in the town’ (Human Resource Manager).
With workers moving into the town, there was a shortage of affordable
housing for locals. Steep rent increases meant only mobile workers earning
‘big money’ could afford to pay. Local jobs had also become scarce and as
explained by a long-term resident farmer, there are now ‘about 75 per cent
backpackers and 25 per cent locals [employed on farms]. There wouldn’t be
too many farms that’d be different. Even the big ones, there are huge
numbers [of mobile workers]’. One young member of the community hoped
that the proposed Chinese refinery would allow her to be employed and to
stay in the town. However, she also had concerns due to her observations of
a similar company who had previously moved into the area:
[They] came in, but they’ve brought their own people as well. That’s
all good and well because they need to start and they need to start
doing stuff, but they come down to us and they say, “… we’ll get
you a job”, blah, blah, blah … I wouldn’t care if you put me as a
receptionist, but you still can’t seem to get ahead and that’s making
me disheartened at the moment … if everyone’s going to bring their
own people in, well what are the locals going to do? (Long-term
resident, seeking work)
We’ve never been involved in the union and we look after our staff
very well … do I need to have someone hovering over me to tell me
what I’m doing wrong? If you’re a good employer, and you’re fairly
good at your business, you don’t need a watchdog. The men will …
vote with their feet, if you’re not doing the right thing by them, you
won’t have a work force. (Long-term local employer, retired)
There was concern among residents that the Chinese refinery would
employ workers from China who may accept more work for less pay.
A business owner in the town was frustrated that he may lose his trained
workers to the large transnational enterprise: ‘The concern and big fear of
the local businesses here are that the large companies put nothing back into
training and they’re quite happy to take whoever has been trained by
someone else’ (Long-term resident and local business owner). Another
community member shared scepticism from seeing similar ventures fail in
the past.
Well, they have promised the fact that [the proposed new refinery]
would enhance the area with jobs and all the rest of it. But in
hindsight, we have seen in other areas that this hasn’t happened. I
believe that if they were to build the refinery, apart from the
pollution problem which they would create, that there wouldn’t be
any jobs there for Australians.
Housing Security
Another integral factor of security is safe and economical housing. Housing
is a major problem for many, even in developed countries. Australia, for
example, is generally believed to have a high standard of living.
Nonetheless, much media attention has been paid to the housing difficulties
faced by international students pursuing an international education in
Australia. Marginson et al. (2010) highlights the issue of a lack of housing
security for international students—noting that their living conditions were
not congruent with host country standards. Other risks came to light
through students arranging their accommodation prior to their arrival in
their host country. This led to students often living in areas a long distance
from campus (Forbes-Mewett 2011). Affordability was a central focus for
international students compared to an understanding of logistical
practicality between their residence and educational institution.
It was evident throughout the interviews that cheaper housing tended to
be associated with less security. For example:
The north side of campus is much safer [than the west side of the
campus]. There are more police patrolling the neighbourhood a little
bit better. And the west side is, I would say, a little more dangerous.
And the rent is actually cheaper there, that’s why a lot of
international students choose to live on the west side of campus …
A lot of students want to save money for their parents on housing
and they try to live in the cheaper area, which is the less safe area.
So, I think if the school tries to build more affordable and safe
housing for students that would be a big help. (Chinese, post-
graduate student, female, 20, US)
It’s pretty rare, but I have a friend who is staying in a house with
eight or nine people. They had two bedrooms, one toilet and one
bathroom together. I said to him, “Well why don’t you rent down the
street where it might be a bit more expensive or maybe even cheaper
instead of living in those poor conditions”. He was like, “No, that’s
my community; I stay with them”. I’m like, “But you’re suffering”.
He’s like, “Yes, but that’s community; we stay together”.
(International Student Officer, female, 20, Australia)
Other issues linked to student housing and security included the power
imbalance between landlords and their tenants, resulting in the mistreatment
and sexual assault of international students (Forbes-Mewett et al. 2015;
Forbes-Mewett and McCulloch 2016).
Food Security
According to the World Food Summit, ‘Food security exists when all
people, at all times, have physical and economic access to sufficient, safe
and nutritious food that meets their dietary needs and food preferences for
an active and healthy life’ (FAO Policy Brief 2006, p. 1). It is important to
acknowledge that ‘Australia feeds a lot of people’ (Bellotti 2017, p. 1).
Natural resources as well as economic, social and cultural factors are
vital to food security. Australia’s largest area of agricultural land, known as
‘Australia’s Food Bowl’ is located in the Liverpool Plains region in New
South Wales. ‘Australia’s Food Bowl’ provides approximately 40 per cent
above the national average of agricultural outputs. The availability of water
in the region was also frequently mentioned in relation to being able to
produce crops all year round. Within this agricultural area is also a Chinese-
owned piece of land proposing a coal mine which poses as a potential threat
to the current environment and agricultural output. The interviewees
believed that the proposal by Shenhua, a transnational mining company,
would negatively impact food security both in Australia and across the
globe.
[We need] to protect this land because it is truly unique. There are
not many pockets of soil like this in the world and if you take away
the water then the land [because of a coal mine], yes, it’s still
productive but if the rainfall isn’t very reliable and our last four
years, if you look at the rainfall charts you’ll see, it hasn’t been
reliable. But we could produce crops because we’ve had ground
water. Now when that groundwater is damaged and you can’t access
it because of another industry, then it totally changes the game, it
totally changes the productivity of this land. (Joe, male, 40s)
Future impacts of the proposed mine were also of concern for the local
residents as ‘ when the mine moves away, like they leave and 100 years
down the track, it’ll reach equilibrium where all those holes and those voids
that’ve been filled up with rock and rubble, when they fill up with water
again and water goes in, what comes out is going to be salty’ (Wendy,
female, 40s). The residents’ concerns were driven by their love of the land
and a sense of responsibility for food security in Australia and beyond for
not only themselves but for future generations. The potential to provide
food for distribution throughout Australia and across the world was
acknowledged by many interviewees. However, the Australian leaders’ lack
of experience regarding minimal food security and the broader community
were viewed as barriers to the in-depth understanding required regarding
the impacts of the proposed mine. As articulated by Joe (male, 40s):
During the First World War and the Second World War people went
without, they were using sawdust to fill their sausages so that they
could get enough to fill their tummies. I mean we’ve never had to do
that and our generation haven’t. But people have starved, they do
know what it’s like … there’s a great quote, basically it says there is
no more dangerous animal on earth than a hungry human. … So,
people fob us off when we’re saying, “We want to protect this land
for food security” but I don’t think that they understand the
importance of food, it’s too easy at the moment, they all just get it
off the shelf.
As recently as April 2021, it was announced that the New South Wales
Government scrapped the Liverpool Plains open cut mine by paying the
Chinese company, Shenhua, $100 million to put a stop to coal mining on
prime agricultural land. This followed a community-led fight for well over
decade to protect the region and Australia’s contribution to global food
security.
Conclusion
This chapter has sought to present the case for a ‘new security’.
Traditionally the focus has been on security being about the mitigation of
threats or the protection of assets which has led to a narrow and a false
understanding. Via research in three countries, and by looking at different
areas of security, I have sought to show how security is entwined with
many aspects of life, and that both its study and its applications need to take
account of this.
The chapter first outlined the need to redefine security before discussing
the more subjective notion of human security. A number of case studies
then illustrated just how broad the notion of security is. Based on interviews
conducted in the US, UK, and Australia, the case studies provided examples
of how different forms of security relate to the impact of social, cultural,
and economical factors. By first considering the idea of personal security,
the chapter set the scene for other forms of security that relate to individuals
lives, such campus security, employment security, and security relating to
housing and food.
The concept of personal security was commonly associated with caring,
kind people in one’s life. Campus security was thought to be imperative to
not only making staff, students and the local community safer but also for
breaking down cultural barriers between diverse groups and authority
figures such as police and security staff. Employment security was
considered in the context of a regional town where there were few
opportunities for work other than casual and seasonal jobs attractive only to
an itinerant workforce. The issue of housing security was presented from
the perspective of international students in a case study that revealed
concerning aspects that greatly impacted the security of international
students. Food security was discussed within the context of the Liverpool
Plains in NSW Australia. In the Liverpool Plains case, there was
community-led opposition for well over a decade to mining that would
contribute to land degradation and a subsequent loss of food security, not
only for Australia but also for the world where exports feed large
populations in other countries. It was shown in recent times that food
security prevailed because the NSW government brought the mining project
to a halt.
Recommended Readings
Baldwin (1997) highlights an abstract version of security and of how it can
apply to all people in many different ways. This reconceptualisation of
security is further developed by Nesadurai (2005) who focusses on
economic security in the globalised world. Marginson et al. (2010) write in
detail about ‘International Student Security’. Their work presents security
as a broadly encompassing concept involving all aspects of the international
student sojourn and acknowledges the agency of students. Forbes-Mewett
(2011) adds the issues of minimising risk and furthering security in relation
to preparation for the international education experience. Forbes-Mewett et
al. (2015) focus on international students and crime in relation to security
needs as both victims and perpetrators. Forbes-Mewett’s (2019) more recent
work, The New Security: Individual, Community and Cultural Experiences,
further broadens the notion of security and underpins this chapter through a
book based on in-depth case studies.
References
Adler, A. (1930) Problems of Neurosis. New York: Cosmopolitan Book Co.
Baldwin, D.A. (1997) The Concept of Security. Review of International Studies 23(1): 5–26.
[Crossref]
Bellotti, B. (2017). How Many People Can Australia Feed? The Conversation, July 13.
Bénabou, R. and Tirole, J. (2005) Belief in a Just World and Redistributive Politics. Cambridge:
National Bureau of Economic Research.
[Crossref]
Berne, E. (1947) The Mind in Action. New York: Simon and Schuster.
Commission on Human Security (2003) Human Security Now. New York: Human Security Unit,
Office for the Coordination of Humanitarian Affairs (OCHA).
Food and Agriculture Organization of the United Nations, FAO (2006) Food Security, Policy Brief,
June 2006, Issue 2. Available from: http://www.fao.org/forestry/13128-0e6f36f27e009105
5bec28ebe830f46b3.pdf [Accessed 30 June 2017].
Forbes-Mewett, H. (2019) The New Security: Individual, Community and Cultural Experiences.
Palgrave Macmillan, London.
Forbes-Mewett, H., McCulloch, J. and Nyland, C. (2015) International Students and Crime. Palgrave
Macmillan, Houndmills.
[Crossref]
Lay, K. (2014) The Victoria Police Blue Paper, A vision for Victoria Police in 2015. Victoria Police:
Victoria.
Marginson, S., Nyland, C., Sawir, E. and Forbes-Mewett, H. (2010) International Student Security.
Cambridge University Press: Cambridge.
Maslow, A.H. (1943) A Theory of Human Motivation. Psychological Review 50(4): 370–396.
[Crossref]
Morris, A., Hastings, C., Wilson, S., Mitchell, E., Ramia, G., Overgaard, C. (2000). The experience
of international students before and during COVID-19: Housing, work, study and wellbeing (pp. 1–
131). Sydney, Australia: University of Technology Sydney.
Nesadurai, H.E.S. (2005) Conceptualising Economic Security in an Era of Globalisation: What Does
the East Asian Experience Reveal? The University of Warwick, Coventry, UK: Centre for the Study
of Globalisation and Regionalisation. Working Paper.
Nyland, C., Forbes-Mewett, H., & Thomson, S. B. (2011). Sinophobia as a Corporate Tactic and the
Response of Host Communities. Journal of Contemporary Asia, 41(4), 610–632.
[Crossref]
UNDP (1994) Human Development Report. New York: United Nations Development Programme.
Wolfers, A. (1952) “National Security” as an Ambiguous Symbol. Political Science Quarterly 67(4):
481–502.
[Crossref]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_4
Abstract
The COVID-19 pandemic has brought changes to everyday life that have
impacted on levels and types of crime and disorder prevalent in societies, in
many cases leading to reductions in crime but in other cases increases. This
has implications for policing and security. This chapter discusses the
evidence, offers explanations for changing crime patterns and discusses the
implications for policing by the public police, private sector and informal
guardians.
Introduction
To criminologists, safety and security are generally perceived to involve
crime, public disorder and terrorism incidents. However, both international
bodies (United Nations Development Programme 1994) and national
governments (Department of Homeland Security 2021; UK Cabinet Office
2017) have envisaged security to incorporate natural hazards and
technological or accidental hazards.
The COVID-19 pandemic may thus be viewed as a security issue in its
own right. However, the issue that has most intrigued criminologists is the
extent to which the increased health risk posed by the pandemic has led to
changes to everyday routines that affect safety and security vis a vis crime
and disorder, and as a consequence, how the policing of societies has
adjusted to any changes. It is these questions that are the main focus herein.
The chapter is divided into five sections. Firstly, the spread of COVID-
19 and subsequent attempts to suppress it are discussed. Secondly, the
impact of the pandemic on crime and disorder during the lockdowns in
2020 is addressed. Thirdly, evidence on crimes specifically related to
lockdowns is considered. Fourthly, the impact of this on policing is
discussed. The final section is more speculative, in looking to the future, in
terms of changing patterns of offending and policing post-pandemic.
Lockdown-Related Crimes
In addition to conventional crimes, new legislation has been introduced in
many countries to enforce lockdowns and restrict behaviour during partial
lockdowns. New laws have broadly covered: external border restrictions,
that is, laws regulating access to and egress from the country; internal
border restrictions, a key feature of Australia’s approach to containment;
leisure and retail restrictions; prohibition of social gatherings; curfews;
restrictions on legitimate reasons to leave home; restrictions on distance one
is allowed to travel; and requirements regarding face coverings. In England,
an increase in anti-social behaviour offences under lockdowns at least
partially reflects this. Thus, these rose during the first lockdown before
decreasing significantly over summer 2020, and then increasing as
movement restrictions were imposed through to second lockdown (Farrell
and Dixon 2021).
Offences that are a direct result of lockdown may be considered in two
ways: firstly, the extent to which the different laws have been applied; and
secondly, the ways in which law breaking can be explained.
In the former case, the police in England and Wales recorded a total of
134,188 Covid-19 related incidents in the four weeks to the 24 May 2020
(National Police Chiefs’ Council 2020). These resulted in 15,552 Fixed
Penalty Notices, showing that in the vast majority of cases (88%) the police
used their discretion and offered advice and warnings. In cases where FPNs
were issued, most (11,568) were issued for ‘Contravene requirement as to
restriction of movement during emergency period’, with 4031 issued for
‘Contravening the requirement to not participate in a gathering in public of
more than two people’. Most of those charged were male (81%) and 18–28
(55%), albeit this may partly be explained as the result of police discretion
as to who to charge. The pattern did, however, differ between different
police force areas. BBC News (2021) reported that Devon and Cornwall felt
that breaking the lockdown rules had increased during the third lockdown,
and in a region characterised by large numbers of second homes, travelling
from outside the counties to live in these holiday homes was of particular
concern. In contrast, Transport for London revealed that by mid-February
2021 some 137,000 travellers had been stopped and told they would not be
allowed to board its buses and metro system unless they wore a mask since
it became mandatory. The majority complied when directed, but some 9800
people were prevented from travelling and a further 2100 ejected and issued
with fixed penalty notices (Corbishley 2021).
These figures give only a broad-brush picture. Media reports cover a
wide range of scenarios: illegal opening of businesses; raves and private
parties; illegal movement including driving to beaches, national parks and
second homes; close contact with others in public, either informally or at
protest meetings; and failure to wear facemasks in shops.
A key distinction can be made between offences motivated by conflict,
denial and protest and offences of circumvention. The former include cases
where the offender(s) deliberately and openly challenge laws they consider
wrong: either because they feel that COVID-19 is a hoax used by the state
to repress their freedoms; or because they feel that at least some of the new
laws are an overreaction to the problem. By offences of circumvention I
mean, following Sykes and Matza’s (1957) techniques of neutralisation,
situations where offenders broadly support legal restrictions but create
justifications regarding why a particular aspect of the law does not apply to
them at a particular point in time. This may take one or more of at least six
forms:
Inappropriate role models: during lockdowns a number of politicians,
senior political advisors and media stars have been exposed for breaking
the rules. In such circumstances, it is possible to justify one’s own
transgressions according to the maxim, ‘If it’s OK for them to do it, it’s
OK for me to.’
Appeal to a higher loyalty: particularly an appeal to freedom and a
rejection of an alleged police state, although perhaps the extreme
example relates to two nuns who broke the laws in Eire to perform an
exorcism ‘according to God’s wishes’ (Elvin 2021).
Exceptional circumstances: for example, the claim that one cannot afford
to self-isolate, which applies especially to those excluded from
government easement measures.
Challenge the law: claiming the rules are irrational, inconsistent or
ambiguous: for example during lockdowns in England where one was
required to exercise locally but with no legal definition of local.
Special dispensation: claiming one is extra-careful when bending the
rules.
Victim-denial: the argument that it is only the transgressor who is
affected.
Policing Lockdown
The Covid-19 pandemic and resulting lockdowns have clearly impacted on
crime leading to reductions in some crimes, increases in others, and the
creation of new offences and bases for public disorder. This has
implications for the policing process (Grace 2020; McVie 2020; O’Neill
2020; Sheptycki 2020)and the well-being of officers (Frenkela et al. 2021),
albeit there is no parallel research on the impact of the pandemic on private
security staff. What is also known is that both public sector and private
sector police have experienced high death rates from COVID-19. The
Industrial Injuries Advisory Council (2021) found that males working in the
private security sector had death rates of over three times the national
average and male police officers (below inspector rank) had over six times
the national average. In each case, these mortality rates were higher than
those of nurses were. In England and Wales, the TCSEW variously includes
questions on public perceptions of policing under lockdown. This reveals
that in England and Wales during August 2020 91% of adults were satisfied
with the way local police were responding to the coronavirus outbreak and
that there was general support for police powers that were available to help
enforce new laws, such as on-the-spot fines for people found out of their
homes without a good reason (72%) and police-enforced curfews (67%)
(Office for National Statistics 2020c). The government’s Opinions and
Lifestyle Survey (OPN) covering the same period found that 69% of adults
thought that the police should be strict in enforcing the new rules, although
only 15% thought the police were enforcing the rules strictly (Office for
National Statistics 2020d).
This data, of course, is limited to England and Wales. However, despite
increases in policy transference there are marked variations between nations
in both legal and police systems (Mawby 2018). Moreover, just as the
extent of COVID-19 and the health- and economic-based responses have
varied between countries, so legislative and policing responses have
differed (Godwin 2020; Roche 2020).
Various commentators have pointed to key differences in the functions,
structure and legitimacy of the police in different countries to draw
comparisons between police systems that are more control-oriented and
those that are more service-oriented (Mawby 2018). In the former, clearly,
non-democratic police systems have been decisively used to enforce the
policing of health initiatives, whether through advanced technology
(Magnay 2020; Rapoza 2020; Reevell 2020; Roth 2020) or through more
traditional militaristic or ideologically dominated police institutions, as in
Iran (The New Arab 2020), Iraq (Watkins 2020) and the PRC (Li 2020),
illustrate the refocusing of already powerful police systems on enforcing
new ‘lockdown laws’. Similar examples can be found in the EU, where
relatively new democracies have arguably used the pandemic to hasten a
return to more traditional control-dominated policing, Hungary being a case
in point (Williamson 2020).
However, in some ways policing the lockdown has underscored historic
concerns about the reality of democratic policing. The philosophy of
community policing thus almost inevitably glosses over the fact that
societies are comprised of a multitude of communities, with different
lifestyles and priorities as well as different histories of police-public
interaction. Policing during the pandemic inevitably raises issues
concerning whether communities are being policed equally (Grace 2020).
Given the primacy of the Black Lives Matter (BLM) movement and the
unequal impact of COVID-19 on Black Asian Minority and Ethnic
(BAME) communities (Public Health England 2020), ethnicity has been a
focal point of critiques of the discriminatory application of new police
powers (Amnesty International 2020; Boffey 2020). But differences
according to, inter alia, age, class and region are also important.
Some, like Sheptycki (2020) see the pandemic as accelerating a shift to
more authoritarian and totalitarian police systems, but it is important to
recognise that alongside the concerns of more radical organisations like
Amnesty International (2020) and Human Rights Watch (2020) much of the
hostile reaction to lockdowns has been orchestrated by the hard right, with
liberal support for increased police powers and more proactive policing, as
long as it is proportionate, fair, and time-limited. Moreover, while the extent
to which the police throughout the UK have used their new powers varies
markedly (McVie 2020), there is no evidence that the police have embraced
them with any enthusiasm, and as noted above, during the first and second
lockdowns most transgressions were handled informally. However, both
police and policing have changed in a number of ways.
In some cases, this has involved the reorganisation of police structures
to address new issues. Thus, many police forces have created new specialist
units to enforce lockdown laws. For example, by November 2020 Devon
and Cornwall Police reported having ten dedicated COVID patrol cars
operating across the force area (Eve 2020). Alongside this, new
technologies have been deployed: for example, facial recognition
technology (Reevell 2020; Roth 2020) and number plate recognition
cameras to track illegal movements and smartphone technology to plot
transmission of the virus. In the former case, the police use of drones, in
Paris (Schippers 2020) and Yorkshire (Pidd and Dodd 2020) proved
controversial and was stopped, unlike in Russia (Rapoza 2020). In the case
of smartphone technology (a notable failure in the UK) in contrast, the
technology has been introduced to track the disease but what was less
controversial in more authoritarian regimes such as South Korea has raised
concerns among the public regarding its retention and future use by policing
agencies against known offenders and terrorist suspects (Human Rights
Watch 2020). The use of advanced technologies in Russia, for example
(Reevell 2020; Roth 2020) is a salutary reminder of such dangers.
Perhaps of more significance in Western democracies are a reinvention
of plural policing developments that expanded at the beginning of the
century (Jones and Newburn 2006; O’Neill and Fyffe 2017) but were
curtailed with cuts to policing budgets. It is well established that the public
police do not have a monopoly over policing. In fact, there are a number of
alternative informal and formal bodies involved in the policing enterprise,
and the COVID-19 pandemic has brought new momentum to many of
these. They include in the UK police units controlled by local government,
private sector security, policing by the general public, and policing by other
public sector agencies.
Local government developments. In England, many local governments
introduced new units to control public behaviour. In October 2020 the
government announced that it would be funding local councils to support
the employment of Covid marshals or street marshals to advise and
support members of the public and businesses on following social
distancing rules (Aitken 2020; BBC News 2020b). Whilst a survey of
some local councils by the BBC found that less than a third of councils
were employing or intending to employ marshals, some deployed
existing council staff as marshals, wardens or ‘city hosts’. In other areas,
volunteers had been deployed. Elsewhere existing staff had been
reassigned to work as marshals or ‘street ambassadors’. These agents
may have limited powers but they can call on the public police for
assistance.
Private sector security. The role of the private sector in security has
expanded dramatically in many western democracies (Jones and
Newburn 2006). Perhaps not surprisingly, then, in some areas street
marshals have been subcontracted by local authorities from private
security firms, as in Leamington Spa2 Rather differently, the requirement
for those arriving from abroad to quarantine in hotels means that hotel
security staff have assumed new responsibilities. In Australia this has
raised much controversy, with guards accused of being COVID-spreaders
(Manfield 2021; Thiessen 2020), and while the English scheme
announced in February 2021 differs in crucial respects a considerable
onus of responsibility lies with private security staff (Shukman 2021).
Other aspects of policing that are handled by the private sector have
attained added significance where specific offences have increased
during lockdown: in England and Wales, for example, while online fraud
is coordinated by the City of London Police the service is subcontracted
to the private sector contractor Concentrix. However, the role of the
private sector extends far beyond the deployment of specialist security
personnel. In introducing the requirement for shoppers to wear face-
masks, the English government made it clear that the responsibility for
policing in shops lies with the shops’ management. This widened the
duties of store security guards, but also added a new onus of
responsibility for other staff in stores and also for small-shopkeepers.
Informal guardianship. Additionally, there are calls on the public to
exert their influence by reporting neighbour-transgressors, adding a new
layer to the guardianship concept discussed earlier. Overall, though, we
have a policing responsibility conferred on many who did not ask for or
want it. While the UK government has emitted mixed messages
regarding moral obligations to report lockdown transgressors (Hinde
2020), unsurprisingly there is a reluctance among shopkeepers to ‘snitch’
on customers and residents to ‘snitch’ on neighbours, and where they do
this may accentuate conflict.
Clearly, the police in different nations have had to adjust to a different
crime and disorder context, with many crimes decreasing but others
becoming more common. At the same time, additional responsibilities mean
that they have been engaged in different contexts, involving both peace
keeping and control, often with minimal guidance and an ambiguous legal
foundation. The situation is perhaps even more contentious for others drawn
into the policing process, invariably with even less legal guidance and often
without any willingness to inhabit the ‘front-line’. Overall, policing the
pandemic has inevitably led to conflict with different publics with different
perspectives on the threat posed by COVID-19, the moral and legal bases
for lockdown, and views on citizens’ rights. Moreover, it is arguable that
this will have at least as great a long-term impact.
Recommended Readings
While the theories underpinning crime pattern changes under the lockdown
are well covered, almost all the research on crime and policing during the
pandemic is ongoing. Readers should therefore consult online sources,
particularly through UCL (https://covid19-crime.com/) and the pan-
Yorkshire universities WhiteRose website (White Rose Research Online).
In England and Wales, the Office for National Statistics website provides a
wealth of data on crime in general and crime and public attitudes towards
crime and policing.
References
Abrams, D.S. (2020) ‘COVID and crime: an early empirical look’, paper to UCL Crime and COVID-
19 online symposium, 16 July.
Agnew, R. (1992) ‘Foundation for a general strain theory of crime and delinquency’, Criminology,
30.1, 47–87.
[Crossref]
Aitken, A, (2020) ‘Coronavirus: Who are the Covid marshals and do they have any powers?’, BBC
News, 8 October, accessed 11 February 2021 at Coronavirus: Who are the Covid marshals and do
they have any powers?—BBC News.
Amnesty International (2020) Europe: COVID-19 lockdowns expose racial bias and discrimination
within police, 24 June, accessed 3 October 2020 at www.amnesty.org/en/latest/news/2020/06/europe-
covid19-lockdowns-expose-racial-bias-and-discrimination-within-police/.
Ashby, M.P.J. (2020) ‘Initial evidence on the relationship between the coronavirus pandemic and
crime in the United States.’, Crime Science, 9. 6, online at https://discovery.ucl.ac.uk/id/eprint/
10098067/1/s40163-020-00117-6.pdf.
Barth, B. (2020) ‘5 ways COVID-19 is reshaping the cyber-crime economy; SC Media, 2 May,
accessed 17 July at www.scmagazineuk.com/5-ways-covid-19-reshaping-cyber-crime-economy/
article/1682098.
BBC News (2020a) ‘Coronavirus: Increased risk of online child sexual abuse’, BBC, 8 June,
accessed 17 July at www.bbc.co.uk/news/uk-northern-ireland-52962266.
BBC News (2020b) ‘Leeds lockdown: Night marshals brought in as pubs reopen’, BBC, 30 June,
accessed 17 July 2020 at www.bbc.co.uk/news/uk-england-leeds-53234667.
BBC News (2021) ‘Covid-19: Hundreds of rule breaches in Devon and Cornwall’, 11 January,
accessed 17 February 2021 at https://www.bbc.co.uk/news/uk-england-devon-55617469.
Bennett, P. and Quazad, A. (2016) ‘The relationship between job displacement and crime’, VoxEU,
CEPR, 29 October, accessed 9 October 2020 at https://voxeu.org/article/relationship-between-job-
displacement-and-crime.
Boffey, D. (2020) ‘Policing of European Covid-19 lockdowns shows racial bias—report’, Guardian,
24 June, accessed 3 October 2020 at www.theguardian.com/world/2020/jun/24/policing-of-european-
covid-19-lockdowns-shows-racial-bias-report.
Bradbury-Jones, C. and Isham, L. (2020) ‘The pandemic paradox: The consequences of COVID-19
on domestic violence’, Journal of Clinical Nursing, 29, 247–249.
Brantingham, P and Brantingham P (1995) ‘Criminality of place: crime generators and crime
attractors’, European Journal on Criminal Policy and Research 3. 3, 5–26.
Buil-Gil, D. and Zeng, Y. (2021) ‘Meeting you was a fake: investigating the increase in romance
fraud during COVID-19’, Journal of Financial Crime…
Campedelli, G.M., Favarin, S. and Aziani, A. (2020) ‘Exploring the effects and theoretical
implications of SARS-CoV-2 containment policies: an empirical analysis of crime in Los Angeles’,
American Journal of Criminal Justice, https://doi.org/10.1007/s12103-020-09578-6.
Clarke, R. V. and Mayhew, P. (1994) Parking patterns and car theft risks: Policy relevant findings
from the British Crime Survey. Crime Prevention Studies, 3, 91–107.
Cohen, L. E. and Felson, M. (1979) ‘Social change and crime rate trends: A routine activity
approach’, American Sociological Review, 44, 588–608.
[Crossref]
Corbishley, S. (2021) ‘Thousands still refusing to wear face masks on public transport in London’,
Metro, 24 February, accessed 24 February 2021 at https://metro.co.uk/2021/02/24/thousands-
refusing-to-wear-face-masks-on-public-transport-in-london-14138363/?ito=push-notification&ci=
82244&si=23508139?ito=cbshare.
Cromwell, P.F., Olson, J.N. and Avary, D’A. W. (1991) Breaking and entering. Newbury Park,
California: Sage.
Department of Homeland Security (2021) About DHS, accessed 9 February 2021 at www.dhs.gov/
about-dhs.
Dixon, A, Adamson, L and Tilley, N (2020) Rail Network Crime and Passenger Travel in the
Pandemic. Report. STATISTICAL BULLETIN ON CRIME AND COVID-19, issue 10. University
of Leeds, accessed 6 March 2021 at https://doi.org/10.5518/100/34.
Dixon, A. and Farrel, G. (2021) ‘A Year of COVID-19 and Crime in England and Wales’, Report.
STATISTICAL BULLETIN ON CRIME AND COVID-19, issue 14. University of Leeds, accessed 6
March 2021 at https://eprints.whiterose.ac.uk/172969/.
Elvin, S. (2021) ‘Nuns ‘caught breaking lockdown to exorcise’, ‘Metro, 24 February, accessed 24
February at https://metro.co.uk/2021/02/24/nuns-broke-covid-lockdown-rules-to-attend-exorcism-
14124173/?ito=push-notification&ci=82297&si=23508139?ito=cbshare.
Eve, C. (2020) ‘Special Covid police cars to patrol Devon and Cornwall ‘, PlymouthLive, 29
November, accessed 2 March 2021 at www.plymouthherald.co.uk/news/plymouth-news/special-
covid-police-cars-patrol-4736699.
EUROPOL (2020) ‘Exploiting isolation: Offenders and victims of online child sexual abuse during
the COVID-19 pandemic’, accessed 17 July 2020 at www.europol.europa.eu/publications-
documents/exploiting-isolation-offenders-and-victims-of-online-child-s-during-covid-19-pandemic.
Farrell, G and Dixon, A (2021) Second lockdown effects on crime less pronounced in England and
Wales. Report. STATISTICAL BULLETIN ON CRIME AND COVID-19, Issue 13. University of
Leeds, accessed 8 February 2021 at Second lockdown effects on crime less pronounced in England
and Wales—White Rose Research Online.
Felson, M., Jiang, S. and Xu, Y. (2020) ‘Routine activity effects of the Covid-19 pandemic on
burglary in Detroit, March, 2020’, Crime Science, 9.1, open access journal athttps://link.springer.
com/content/pdf/10.1186/s40163-020-00120-x.pdf.
Frenkela, M.O., Giessing, L., Eger-Lampl, S., Hutterc, V., Oudejansc, R.R.D., Kleygrewec, L.,
Jaspaerte, E. and Plessnera, H. (2021) ‘The impact of the COVID-19 pandemic on European police
officers: Stress, demands, and coping resources’, Journal of Criminal Justice, 72.
Godwin, M. (2020) Europe’s COVID-19 Cases Are Spiking. Here’s How 4 Different Countries Are
Trying to Stop A Second Wave, Time, 23 September, accessed 4 October at https://time.com/
5892349/europe-covid-19-lockdowns/.
Grace, S. (2020) Policing Social Distancing: Gaining and Maintaining Compliance in the Age of
Coronavirus, Policing, 14.4, 1034–1053.
[Crossref]
Grierson, J. (2021) ‘Fake Covid vaccine and test certificate market is growing, researchers say’,
Guardian, 16 May, accessed 20 May 2021 at https://www.theguardian.com/world/2021/may/16/fake-
covid-vaccine-and-test-certificate-market-is-growing-researchers-say.
Halford, E., Dixon, A., Farrell, G., Malleson, N. and Tilley, N. (2020) ‘Crime and coronavirus: social
distancing, lockdown, and the mobility elasticity of crime’, Crime Science, 9.1, open access journal
at https://link.springer.com/content/pdf/10.1186/s40163-020-00121-w.pdf.
Hinde, N. (2020) ‘The Psychology Of Snitching On Neighbours In The Age Of Covid’, HuffPost, 20
September, accessed 9 October 2020 at https://www.huffingtonpost.co.uk/entry/rule-of-six-
neighbours-call-police-snitching_uk_5f60b3aec5b6e27db132f511?guccounter=1&guce_referrer=
aHR0cHM6Ly9pbnQuc2VhcmNoLnRiLmFzay5jb20v&guce_referrer_sig=
AQAAADVNQKXKeK9wS9o5L4XUMSmVrnSXgqxiMEH9Y1IjkxAZ8dbTRdhrknZxvXgW
Cv6ECEBTFNHDWHQc16r3am4V4Izmd_A7VsPfa5g2O-729dPub4b2xhI0yf4xkpbTbbYqjDbm1O
RsW20rAleoGGMHroTUr1xh98vYyjWUKenqIF98.
Hodgkinson, T. and Andresen, M.A. (2020) ‘Show me a man or a woman alone and I’ll show you a
saint: Changes in the frequency of criminal incidents during the COVID-19 pandemic’, Journal of
Criminal Justice, 69…
Hollis-Peel, M. E. and Welsh, B. C. (2014) ‘What makes a guardian capable? A test of guardianship
in action’, Security Journal, 27, 320–337.
Human Rights Watch (2020) ‘Mobile Location Data and Covid-19: Q&A’, 13 May 2020, accessed
20 July 2020 at www.hrw.org/news/2020/05/13/mobile-location-data-and-covid-19-qa#.
Industrial Injuries Advisory Council (2021) COVID-19 and occupation: position paper 48, 25
March, accessed 24 May 2021 at https://www.gov.uk/government/publications/covid-19-and-
occupation-iiac-position-paper-48/covid-19-and-occupation-position-paper-48.
Jones, T. and Newburn, T. (eds.) (2006) Plural policing: a comparative perspective. London:
Routledge.
Kemp, S., Buil-Gil, D., Moneva, A., Miró-Llinares, F. and Díaz-Castaño, N. (2021) ‘Empty streets,
busy Internet. A time series analysis of cybercrime and fraud trends during COVID-19’, Journal of
Contemporary Criminal Justice…
Li, J. (2020) A “people’s war” against coronavirus in China has echoes of Mao’s era, Quartz, 28
February, accessed 9 October 2020 at https://qz.com/1807151/chinas-peoples-war-against-
coronavirus-revives-memories-of-mao/.
Lynch, P. (2020) ‘Criminals prey on coronavirus fears to steal £2m’, BBC News, 16 April, accessed
17 July 2020 at https://www.bbc.co.uk/news/uk-england-52310804.
Magnay, D. (2020) Coronavirus: Moscow aims to ‘fully control’ citizens’ movements amid COVID-
19 lockdown, Sky News, 30 March, accessed 9 October at https://news.sky.com/story/coronavirus-
moscow-aims-to-fully-control-citizens-movements-amid-covid-19-lockdown-11965654.
Manfield, E. (2021) ‘WA moves to ban coronavirus hotel quarantine security guards from taking
second jobs’, ABC, 9 February, accessed 12 February at www.abc.net.au/news/2021-02-08/wa-
moves-to-stop-hotel-quarantine-guards-from-taking-second-jobs/13132486.
Mawby, R.I. (2018) ‘An International Comparison of Police Systems in a Legal Context’, in Den
Boer, M. (ed) Comparative Policing From a Legal Perspective. Edward Elgar: Northampton, MA.
McVie, S. (2020) ‘Policing the pandemic in Scotland: policing practice, procedural justice and public
compliance’, paper to European Society of Criminology Conference, University of Bucharest e-
conference, September.
National Police Chiefs’ Council (2020) ‘Fixed penalty notices issued under COVID 29th May’, 29
May, accessed 17 February 2021 at https://news.npcc.police.uk/resources/fixed-penalty-notices-
issued-under-covid-29th-may-v1.
NSPCC (2020) Social isolation and the risk of child abuse during and after the coronavirus
pandemic, accessed 4 October 2020 at https://learning.nspcc.org.uk/research-resources/2020/social-
isolation-risk-child-abuse-during-and-after-coronavirus-pandemic.
Office for National Statistics (2020a) Coronavirus and crime in England and Wales,: August 2020,
accessed 4 October at www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/
coronavirusandcrimeinenglandandwales/august2020.
Office for National Statistics (2020b) Labour market overview, UK: December 2020, accessed 2
March 2021 at www.ons.gov.uk/employmentandlabourmarket/peopleinwork/employmentandemp
loyeetypes/bulletins/uklabourmarket/december2020#:~:text=The%20UK%20unemployment%20
rate%2C%20in,higher%20than%20the%20previous%20quarter.
Office for National Statistics (2020c) Coronavirus and the social impacts on Great Britain: 21
August, accessed 5 September 2020 at www.ons.gov.uk/peoplepopulationandcommunity/
healthandsocialcare/healthandwellbeing/bulletins/coronavirusandthesocialimpactsongreatbritain/
21august2020.
Office for National Statistics (2020d) Coronavirus and the social impacts on Great Britain: 26
August, accessed 5 September 2020 at Coronavirus and the social impacts on Great Britain—Office
for National Statistics (ons.gov.uk).
Office for National Statistics (2021) Coronavirus and the social impacts on Great Britain: 28 May,
accessed 5 June 2021 at Coronavirus and the social impacts on Great Britain—Office for National
Statistics (ons.gov.uk).
O’Neill, M. (2020) ‘What the Coronavirus has taught us about community policing’, BSC Policing
Network, 22 June, accessed 17 July 2020 at https://bscpolicingnetwork.com/2020/06/22/what-the-
coronavirus-has-taught-us-about-community-policing/.
O’Neill, M. and Fyffe, N. (2017) ‘Plural policing in Europe: relationships and governance in
contemporary security systems’, Policing and Society, 17.1, 1–5.
[Crossref]
Parkman, C. (2021) ‘The changes to Devon beaches after lockdown eases’, DevonLive, 18 March,
accessed 18 March 2021 at The changes to Devon beaches after lockdown eases—Devon Live.
Payne, J.L., Morgan, A. and Piquero, A.R. (2020) ‘A comparison of recorded offence rates and
dynamic forecasts (ARIMA) in Queensland, Australia’, paper to UCL Crime and COVID-19 online
symposium, 16 July.
Pidd, H. and Dodd, V. (2020) ‘UK police use drones and roadblocks to enforce lockdown’, Guardian,
26 Mar 2020, accessed on 17 July 2020 at www.theguardian.com/world/2020/mar/26/uk-police-use-
drones-and-roadblocks-to-enforce-lockdown.
Piquero, A., Riddell, J., Bishopp, S., Narvey, C., Reid, J. and Piquero, N. (2020) ‘Staying home
staying safe? A short-term analysis of COVID-19 on Dallas domestic violence’, paper to UCL Crime
and COVID-19 online symposium, 16 July.
Public Health England (2020) Beyond the data: Understanding the impact of COVID-19 on BAME
groups, published June 2020, accessed 3 August at https://assets.publishing.service.gov.uk/
government/uploads/system/uploads/attachment_data/file/892376/COVID_stakeholder_
engagement_synthesis_beyond_the_data.pdf.
Raphael, S. and Winter-Ebmer, R. (2001) ‘Identifying the effect of unemployment on crime’, Journal
of Law and Economics, 44.2, 259–283.
[Crossref]
Rapoza, K. (2020) From Drone Police To Second Wave Warnings, Russia In Full Coronavirus Panic,
Forbes, 3 May, accessed 9 October at www.forbes.com/sites/kenrapoza/2020/05/03/from-drone-
police-to-second-wave-warnings-russia-in-full-coronavirus-panic/#7440f53c3b44.
Reevell, P. (2020) How Russia is using facial recognition to police its coronavirus lockdown, ABC
News, 30 April, accessed 9 October at https://abcnews.go.com/International/russia-facial-
recognition-police-coronavirus-lockdown/story?id=70299736.
Reynald, D.M. (2011) Guarding Against Crime: Measuring Guardianship within Routine Activity
Theory. London: Ashgate Publishers.
Roche, S. (2020) Levels of exception and police mobilization in government response to covid-19,
paper to European Society of Criminology Conference, University of Bucharest, e-conference,
September.
Romanou, E and Belton, E. (2020) Isolated and struggling: social isolation and the risk of child
maltreatment, in lockdown and beyond, June, accessed 4 October at https://learning.nspcc.org.uk/
media/2246/isolated-and-struggling-social-isolation-risk-child-maltreatment-lockdown-and-beyond.
pdf.
Sanfelici, M. (2020) ‘The Italian Response to the COVID-19 Crisis: Lessons Learned and Future
Direction in Social Development‘, International Journal of Community and Social Development 2.2,
191–210.
[Crossref]
Schippers, B. (2020) ‘Coronavirus: drones used to enforce lockdown pose a real threat to our civil
liberties’, The Conversation, accessed 20 July 2020 at https://theconversation.com/coronavirus-
drones-used-to-enforce-lockdown-pose-a-real-threat-to-our-civil-liberties-138058.
Sheptycki, J. (2020) The politics of policing a pandemic panic, Australian & New Zealand Journal of
Criminology, 53.2, 157–173.
[Crossref]
Shukman, D. (2021) ‘Covid-19: How England’s hotel quarantine will differ from Australia’s’, BBC
News, 12 February, accessed 12 February at https://www.bbc.co.uk/news/health-56030384.
Sky News (2020) ‘Lockdown loneliness leads to 600 reports of online dating fraud a month’, Sky
News, 8 October, accessed 12 October 2020 at https://news.sky.com/story/lockdown-loneliness-
leads-to-600-reports-of-online-dating-fraud-a-month-12098779.
Sykes, G. M., & Matza, D. (1957) ‘Techniques of neutralization: a theory of delinquency’, American
Sociological Review, 22, 664–670.
[Crossref]
Tett, G. (2020) ‘Why Covid-19 is a gift for cyber criminals’, Financial Times, 15 July, accessed 17
July 2020 at www.ft.com/content/935a9004-0aa5-47a2-897a-2fe173116cc9.
The New Arab (2020) Iran launches ‘corona police’ to tackle lockdown rebels, amid rising Covid-19
death toll, The New Arab, 9 June, accessed 8 July at https://english.alaraby.co.uk/english/news/2020/
6/9/iran-launches-corona-police-to-tackle-coronavirus-lockdown-rebels.
Thiessen, T. (2020) ‘Australia: New Coronavirus Lockdown Melbourne Amid Sex, Lies, Quarantine
Hotel Scandal’, Forbes, 7 July, accessed 9 February 2021 at https://www.forbes.com/sites/
tamarathiessen/2020/07/07/australia-coronavirus-melbourne-lockdown-hotel-sex-scandal/.
Thornton, A., Hatton, C., Ralph, L. and Owen, T. (2005) ‘Understanding the older person’s
awareness and experience of doorstep crime: results of a national survey’, Crime Prevention and
Community Safety: an international journal, 7.1, 31–42.
[Crossref]
Townsend, M. (2020) ‘Revealed: surge in domestic violence during Covid-19 crisis’, Observer, 12
April, accessed 17 July 2020 at www.theguardian.com/society/2020/apr/12/domestic-violence-
surges-seven-hundred-per-cent-uk-coronavirus.
UK Cabinet Office (2017) National Risk Register Of Civil Emergencies: 2017 edition, UK Cabinet
Office, accessed 9 February at UK_National_Risk_Register_2017.pdf (publishing.service.gov.uk).
United Nations Development Programme (UNDP) (1994). Human Development Report 1994: New
Dimensions of Human Security, New York: United Nations, accessed 9 February 2021 at www.hdr.
undp.org/en/content/human-development-report-1994.
Usher, K., Bhullar, N., Durkin, J., Gyamfi, N. and Jackson, D. (2020) ‘Family violence and COVID-
19: Increased vulnerability and reduced options for support’, International Journal of Mental Health
Nursing, 29, 549–552.
[Crossref]
Watkins, J. (2020) Iraq’s Popular Mobilisation Forces and the COVID-19 Pandemic: A new raison
d’être?, LSE, 29 April, accessed 8 July at https://blogs.lse.ac.uk/mec/2020/04/29/iraqs-popular-
mobilisation-forces-and-the-covid-19-pandemic-a-new-raison-detre/.
WHO (2020) Addressing violence against children, women and older people during the COVID-19
pandemic: key actions, 17 June, accessed 17 July 2020 at https://apps.who.int/iris/bitstream/handle/
10665/332458/WHO-2019-nCoV-Violence_actions-2020.1-eng.pdf.
Williamson, H. (2020) The Coronavirus in Europe: From Lockdowns to Power, Grabs, Human
Rights Watch, 3 April, accessed 3 October 2020 at www.hrw.org/news/2020/04/03/coronavirus-
europe-lockdowns-power-grabs.
Footnotes
1 See: https://covid19-crime.com/, accessed 2 March 2021.
Simon Baechler
Email: [email protected]
Quentin Rossy
Email: [email protected]
Abstract
Different data processing methods can support the detection and analysis of
various forms of crime patterns. The authors document the influence and
role of forensic science and how this has been transformed by digitalization.
Forensic intelligence is key and they illustrate their argument of its potential
by discussing two new forensic intelligence systems and their underlying
digital infrastructure, one facilitating the forensic comparison of fraudulent
ID documents (ProFID) and the other the monitoring of online frauds
(PICSEL).
Introduction: Forensic Science and Security
Since the 1970s a range of innovative policing practices have been
developed under the umbrella of different proactive policing models which
have been defined as, All policing strategies that have as one of their goals
the prevention or reduction of crime and disorder and that are not reactive
in terms of focussing primarily on uncovering ongoing crime or on
investigating or responding to crimes once they have occurred (Weisburd
and Majmundar 2018, p. 1).
This definition provides a useful framework for situating forensic
science. At first glance, forensic science clearly positions itself outside
proactive models, by limiting its contribution to responding to crimes once
they have occurred. It focusses on providing services to the criminal justice
system and assisting in the management of scientific information in
investigative processes and court proceedings. It is implemented through
forensic science laboratories, borrows methods and techniques from the
natural and physical sciences (e.g. chemistry, biology, biochemistry,
physics), and translates the analytical results obtained in a way that makes
sense to a court of law.
Biased scientific expertise provided in specific high-profile cases has
given rise to the general idea that the way forensic science is implemented
contributes to miscarriages of justice (NAS 2009). The forensic science
community has been urged by the legal profession to focus on the scientific
substance of the results it provides to assist courts in making better
decisions.
Currently, the process of digitalisation has added a layer of complexity
to forensic science and the way it is used (Pollitt 2010). The extended
traceability of human behaviour in the digital world has gradually brought
digital forensic scientists to the centre of many investigations, at the
expense of traditional crime investigators.
Others within the criminological movement have questioned the value
of forensic science (Doleac 2016; Julian et al. 2011; Wilson et al. 2011), but
such evaluations have been partial in their coverage, typically measuring
only specific elements of processes that are inherently multidisciplinary and
intertwined.
For example, some have focussed on the direct value of DNA processes
and databases, which are often considered the flagships of the discipline.
These studies have mainly assessed a number of detections: in how many
cases has a DNA profile extracted from a biological trace at a crime scene
have been linked to a person’s DNA profile by the DNA database, possibly
leading to prosecution (Brown and Ross 2012; Brown et al. 2014). The
findings from these evaluations dampened the initial enthusiasm for DNA
and associated databases because they appeared to contribute to solving a
very small percentage of both serious crimes (Brodeur 2008) and high
volume crimes (Amankwaa and McCartney 2019; Brown and Ross 2012).
Studies to measure the effectiveness of databases in aiding policing are
much more difficult to design than those which focus solely on crime
detection (e.g. crime reduction). It is even questionable whether such
evaluations make sense in the absence of a framework that would allow a
broader set of contributions to be clearly expressed and isolated
(Amankwaa and McCartney 2019; Doleac 2016; Ribaux et al. 2017; Wilson
et al. 2011). This observation extends to other areas of forensic science as it
is difficult to accurately measure the added value of each forensic process
and technology implemented independent of the other factors that may
contribute to an outcome (De Ceuster et al. 2012).
Therefore, it makes sense to step back from the standard reactive model
used to express the value of forensic science in policing (Ribaux et al.
2017). While early research recognised significant potential for forensic
science to contribute to solving repetitive and high volume crimes (Tilley
and Ford 1996), it has emerged that most organisations fail to effectively
integrate different elements of forensic science into emerging proactive
policing processes.
The concept of forensic intelligence (Ribaux et al. 2006) assumes that,
beyond the basic function of explaining a single event from the past,
forensic information also contributes to detecting crime patterns and
generally supports a more comprehensive analysis of crime for supporting
proactive policing.
Furthermore, in the age of digitalisation, we argue that a trace-based
(forensic) crime analysis model, which we discuss in this chapter, can take a
central role in proactive policing. This model takes into account the strong
interactions between criminal (or unusual) activities and the substrate
(physical, IT infrastructures) on which they take place. The resulting
traceability changes the nature of crime analysis. In particular, it
exponentially increases the volume and variety of traces available
indicating human behaviours, and, consequently, demand more focus on the
protection of fundamental freedoms and privacy.
This chapter begins with a definition of forensic science based on the
concept of the trace (Margot 2014) providing the foundation of the model
we outline. Then, we use three concrete operational systems to demonstrate
how the information conveyed by the trace can merge with other pieces of
information to improve crime analysis in proactive models. All three
systems have been previously implemented in different Swiss jurisdictions.
They result from multiple forensic intelligence research projects initiated at
the School of Criminal Justice of the University of Lausanne involving
close collaboration between academia and the professional field. All the
systems presented are integrated and managed by the police organisations
involved. The first system covers high volume crimes. The second focusses
on a new forensic methodology that processes physical and digital features
of fraudulent identity and travel documents to reveal the activity of serial
forgers and criminal networks. The third is a recently initiated crime
analysis system for online fraud that highlights the progress being made by
digital techniques in informing crime analysis.
Case Study
Links provided by the Swiss centralised DNA databases led to the detection
of a particularly interesting pattern. The same DNA profile coming from
biological traces collected from separate burglaries indicated that the same
offender was present in two periods separated by two years. A very simple
geographical analysis of those cases showed a common characteristic: they
were aligned but dispersed all along the Swiss border with France and
Germany. The existence of this previously unknown pattern was confirmed
by other sources of data (e.g. shoe marks, other DNA profiles, comparison
of modus operandi, etc.). The analysis of the available information was
further examined along two different axes. Firstly, the analysis of the
immediate physical and social environment of the dwellings and factories
led to many prevention initiatives being started and better coordinated.
Secondly, from an investigative perspective, these collective approaches led
to the discovery that a group of international criminals specialising in this
type of burglary were responsible.
Results in Numbers
It is inherently difficult—if not impossible—to measure the effects of such
a system on crime reduction or its benefits to public perception of security
(Boba Santos 2014). The whole methodology, as well as its associated
computerised system (PICAR), have developed and evolved over time. The
structure of crime has also changed during the same period.
Rossy et al. (2013) undertook a statistical overview of different crime
activities supposed to be perpetrated by a single offender or multiple co-
offenders from 2009 to 2011. At that time, half of the series detected (i.e.
two or more linked cases) were cross-jurisdictional; this confirmed the high
degree of mobility of thieves and fraudsters, which contrasted somewhat
with the common notion that offenders were more local. One third of the
crime series were detected by traces (i.e. traces constituted the first link
detected), mainly shoe marks, DNA profiles and images (e.g. extracted
from CCTV). These series ranged from two related cases to over 100 cases.
The number of crime series detected was relatively high (e.g. 22% of
robberies were considered to be part of a series). However, the crime
analysis and forensic intelligence system did not allow the detection of all
crimes in the series and probably yielded much lower figures than the actual
concentration of these crimes.
More recent research indicates some positive evolutions of this trace-
based crime analysis system.2 The six states that joined forces, like many
countries, are experiencing a marked decrease in high volume crime,
undergoing an approximately 60% drop in dwelling and shop burglaries
since 2011, with about 10,000 cases recorded in the region by 2019.
Approximately 2500 crime series (from two cases linked up to several
hundred cases linked) were detected in 2019, with 30% of the repeats
detected through the use of traces (314 by shoe marks, 221 by images, 120
by DNA and 13 by various traces). Half of the crime repetitions or series
detected covered more than one jurisdiction. Interestingly, traces can
provide links even to extremely temporally and spatially distant cases. The
progression over the last 10 years is striking, especially when looking at
CCTV images, which help detect more repeats than the comparison of
DNA profiles extracted from biological traces, identifying four times more
repetitions than nine years ago even while the number of cases has more
than halved. This efficiency can be interpreted as a consequence of a much
more systematic use of the methodology, relevant collection and processing
of information from the crime scene to the crime analysis department, and
the effects of digitalisation through the increasing use of CCTV and other
images.
System 2: Forensic Document Examination and
the Analysis of Identity Frauds
A totally different type of concentration of crime can be deciphered using a
similar trace-based approach, namely the manufacture, distribution and use
of fraudulent identity and travel documents (Baechler and Margot 2016). A
false identity can be a powerful crime enabler, used in contexts ranging
from petty crimes (e.g. obtaining a service) to the most organised and
threatening offences (e.g. human trafficking, serious fraud or terrorism;
Europol, 2017). Fraudulent documents can be used to deceive various
stakeholders in many situations both in the public sector (i.e. to cross a
border, identify yourself during a police check, register with an
administration to access welfare) and the private sector (i.e. to board a
plane, open a bank account, rent a vehicle).
In a standard law enforcement model, when a fraudulent identity
document is found, it is confiscated and the holder is charged with a
specific crime. The false document is then destroyed or archived with the
offender’s file. Each fraudulent document, however, has another use in that
it conveys information about its manufacturing process. Compared
systematically with other seized documents using forensic methods, one can
detect the repetition of a modus operandi, revealing the ‘trademark’ of a
forger or of a criminal network (e.g. a combination of repeated printing
defects or spelling errors in the texts). Such information has significant
value in terms of intelligence from strategic to operational levels (Baechler
and Margot 2016).
Given the value of analysing documents, a trace-based method was
developed to process, manage and systematically compare features of
fraudulent identity documents and is now implemented in the same region
within the same legal framework as PICAR (system 1 described in the
section above).
The development of the trace-based method started in 2007 and rapidly
became a PhD research project (Baechler 2015). Beyond the methodology
itself, a prototype, in the form of a basic database named ProFID (standing
for Profiling Fraudulent ID documents) was quickly developed. Gradually,
new functionalities and improvements made it possible to focus on the most
promising characteristics of the documents. The database saves time on
tasks such as data entry or comparisons of documents (e.g. automatic image
processing) and facilitates the use of a computer vision-based classification
algorithm. Profiling digital images of documents has enabled the transition
from processing physical traces only (observations of documents
themselves) to combining physical and digitised traces. The detected
repetitions, also called series, provide insights regarding how forgers and
criminal networks operate.
Beyond assisting investigations and crime analysis efforts, the
transversal analysis of series and their associated patterns provides guidance
to (1) law enforcement agencies and private sector stakeholders in targeting
the search for fraudulent documents in the field (e.g. at the border, during
police checks, at the counter of a bank, at the gate of an airport), (2) the
security document industry on how to design more secure documents.
The full integration of the methodology and the ProFID system into an
appropriate, intelligence-led process remains a challenge. One of the
reasons for this difficulty is that document fraud is an enabler of multiple
forms of crimes and deviant behaviours that may fall within the competence
of separated units, agencies and organisations, both public and private. It is
therefore technically as well as administratively challenging to create a
sufficiently fluid process that crosses these organisational barriers. This is a
characteristic example of (1) the tension between the traditional law
enforcement model imposing a siloed organisational structure and proactive
policing models that require a more transversal and multidisciplinary
approach, and (2) the lack of workable models for partnerships between the
state and private sectors.
Case Study
Thanks to the trace-based ProFID system, a dozen counterfeit drivers’
licenses from Country A were linked based on the detection of similar
features, despite the fact that the cases were scattered across all the states of
Western Switzerland and the documents seized under various
circumstances. In some cases, people holding the fraudulent documents had
caused car accidents with severe consequences. The trace-based profiling
pointed first to a common manufacturing origin and then to the activity of
an organised group of offenders. The counterfeit drivers’ licenses were all
held by nationals of Country B, a foreign country. The investigation
revealed that they met the fraudulent documents providers during
integration language classes.
This result was a surprise to law enforcement agencies as well as
government departments since false documents from Country A had never
appeared to be a problem before, and nationals from Country B were not
regarded as likely offenders. Beyond a joint investigation aimed at
dismantling the network, preventive measures have been proposed. They
aim to both deter nationals of Country B from resorting to document fraud
as well as to enable police and administrative personnel to further improve
the detection of fraudulent documents. Quickly, the series was stopped.
Thus, the trace-based crime analysis approach had an impact not only on
crime detection but also on road safety. It also might have helped to deter
other potential offenders.
Results in Numbers
From April 2017 to February 2021, 2400 fraudulent documents were
entered into the ProFID database by police forces from eight different Swiss
states as well as the federal police. Of these, 50% of the documents were
linked and grouped into 178 series. The largest series consists of 160
documents. Interestingly, even based on this limited dataset and region,
these results indicate a high concentration of fraudulent document
production. The use of the methodology resulted in the initiation of several
international investigations of high-profile forms of crime, shedding light
on transnational organised groups the presence and scope of which were not
previously recognised. An exploratory study on the use of the ProFID
system at the international level revealed promising results, with links
detected for about 20% of fraudulent documents seized by law enforcement
agencies from two different countries. Based on those results, several
organisations are now considering deploying the ProFID system at the
European and international levels.
Case Study
The centralisation of cases at the regional level led to the detection of a
significant number of cases of online shopping frauds (coupled with well-
known advance fees schemes) from the same e-commerce platform.
Contacts were made between the police and the platform’s anti-fraud
department in order to alert them to cases that had passed through their
existing detection filters. A global analysis of the cases allowed the police
to reconstruct the simple but surprisingly clever modus operandi deployed
by the fraudsters. The offenders initially created ads with legitimate content
that passed through the automatic filter. In a second step, they modified the
ads to match their fraud scenario (e.g. a hot-product sold at a discounted
price). When the ad was modified, the fraud filter did not check again,
thereby allowing the ads to reach their target. Once the modus operandi was
reconstructed, the filtering process was updated, and suspicious ads and
accounts were deleted. The impact was immediate. The number of cases
reported to the police about the platform was reduced by three quarters,
without observing any obvious displacement to another online platform. In
this example, police strategies were not oriented towards case detection but
towards disrupting the offenders via a hardening of the environment to
reduce opportunities.
Results in Numbers
A preliminary study based on the cases registered by one state police
service was conducted in 2018 (Rossy and Ribaux 2020). In 2020, the
PICSEL database was still in a pilot phase, but used by eight police
organisations. From January 2019 to September 2020, approximately 7500
cases were registered by analysts. More than 85% were frauds, two thirds of
which were related to e-commerce. Basic digital traces such as emails,
accounts and ads from e-commerce platforms, social media profiles and
other suspicious website URLs are systematically collected. Although the
process is in its early stages, many links have been found by analysing
information indicating identities extracted from these Internet traces.
Globally, around 6000 pseudonyms, 4100 email addresses, 2700 phone
numbers, 2700 bank accounts, 900 IP addresses, 700 URLs and 200
cryptocurrency wallets were registered. Of these, 360 clusters of cases
(from two to more than 1000 linked cases), that is 62% of the total, were
detected. Two thirds of the crime repetitions detected covered more than
one jurisdiction. Around 100 series were registered by the analysts based on
the detected links, and at least one fifth led to a criminal investigation.
Moreover, multiple crime prevention messages were disseminated to online
platforms, targeted companies.
Conclusion
Forensic science has much to offer proactive policing, and much of the
potential benefit has yet to be capitalised on. Traceology, as defined in this
chapter, feeds inductive processes that create knowledge and models about
numerous crime mechanisms and their environments. Digital
transformations of crime and the related expansion of human traceability
should make this approach much more central in policing. It could even
become the cornerstone that underpins many processes in proactive policing
models as well as creates a clear link between crime analysis and the
investigation of serial crimes. To illustrate these perspectives, three
different concrete systems of trace-based crime analysis model were
presented.
These systems and their underlying methodology and deployment
environments are oriented towards the transition to proactive policing
models. It is evident that policing in a digital age goes far beyond the
development of computerised systems. A whole methodology must be
elaborated to gather and analyse information in a transversal way to ensure
the translation of analysis results into a rational set of measures and to
monitor their effectiveness. Traceology can foster cross-sectional crime
analysis that overcomes the fragmentation implied by the standard model of
policing and its organisational structures. In this increasingly digital
landscape, the police remain a central actor with practical experience that is
still not captured well in the cybersecurity models used by many
stakeholders. Efforts to better express traceology and its potential in
proactive policing models aim to facilitate such an integration.
Recommended Readings
To expand the debate around criticism of forensic science in the standard
model, the report of the National Academy of Sciences in the US (NAS
2009) and the President’s Council of Advisors on Science and Technology’s
report (PCAST 2016) are basic texts. Comments placing traceology at the
forefront of the debate can be found in Margot (2011) or Roux et al. (2012).
A working group within the US Organization of Scientific Area
Committees for Forensic Science (OSAC) has published a report that
proposes an integration of digital forensics with forensic science on the
basis of the concept of trace (Pollitt et al. 2018). This report lays the
groundwork for a new framework in which human digital traceability can
be integrated with policing issues (Casey and Nikkel 2020; Casey et al.
2018).
The various contributions in Fraser’s and William’s Handbook of
Forensic Science (Fraser and Williams 2009) express the complexity of the
use of traces in investigations. This complexity is also reflected in the series
of works that emerged from an ambitious project in Australia led by Julian
et al. (2011) on the effectiveness of forensic science.
By putting forensic science and proactive policing into perspective,
Williams’ contribution (Williams 2007) complements Tilley and Ford’s
initial study (Tilley and Ford 1996). Frameworks for the integration of
forensic science with crime analysis were outlined in a series of papers
from the late 1990s (Ribaux and Margot 1999). A summary of current
discourse is proposed in The Routledge International Handbook of Forensic
Intelligence and Criminology (Rossy et al. 2018).
The US National Institute of Justice has published a report on
integrating forensic case data in intelligence processes that is largely based
on studies cited in this chapter (Lopez et al. 2020).
References
Amankwaa, A. O., & McCartney, C. (2019). The effectiveness of the UK national DNA database.
Forensic Science International: Synergy, 1, 45-55. https://doi.org/10.1016/j.fsisyn.2019.03.004.
[Crossref]
Baechler, S., & Margot, P. (2016). Understanding crime and fostering security using forensic science:
The example of turning false identity documents into forensic intelligence. Security Journal, 29(4),
618–639.
[Crossref]
Birkett, J. (1989). Scientific Scene Linking. Journal of the Forensic Science Society, 29, 271–284.
[Crossref]
Boba Santos, R. (2014). The Effectiveness of Crime Analysis for Crime Reduction: Cure or
Diagnosis? Journal of Contemporary Criminal Justice, 30(2), 147–168.
[Crossref]
Brodeur, J.-P. (2008). Scientific Policing and Criminal Investigation. In S. Leman-Langlois (Ed.),
Technocrime: Technology, Crime and Social Control (pp. 169–193). Londres: Willan.
Brown, C., & Ross, A. (2012). End-To-End Forensic Identification Process Project. Volume Crime.
Australia New Zealand Policing Advisory Agency—National Institute of Forensic Science.
Brown, C., Ross, A., & Attewell, R. G. (2014). Benchmarking Forensic Performance in Australia–
Volume Crime. Forensic Science Policy & Management: An International Journal of Police Science
and Management, 5(3–4), 91–98. doi:https://doi.org/10.1080/19409044.2014.981347.
Casey, E., & Nikkel, B. (2020). Forensic analysis as iterative learning. In M. M. Keupp (Ed.), The
Security of Critical Infrastructures. International Series in Operations Research & Management
Science; 288. Cham: Springer.
Casey, E., Ribaux, O., & Roux, C. (2018). The Kodak syndrome: risks and opportunities created by
decentralization of forensic capabilities. Journal of Forensic Sciences, 64(1), 127–136. doi:https://
doi.org/10.1111/1556-4029.13849.
[Crossref]
Clarke, R. V., & Eck, J. (2005). Crime Analysis for Problem Solver in 60 Small Steps. Washington:
U.S. Department of Justice, COPS.
Cleland, C. E. (2011). Prediction and Explanation in Historical Natural Science. British Journal for
the Philosophy of Science, 62(3), 1–32.
[Crossref]
CMM. (2016). Cybersecurity Capacity Maturity Model for Nations (CMM). Global Cyber Security
Capacity Centre. University of Oxford, Oxford.
De Ceuster, J., Hermsen, R., Mastaglio, M., & Nennstiel, R. (2012). A discussion on the usefulness
of a shared European ballistic image database. Science & Justice, 52(4), 237–242. doi:https://doi.org/
10.1016/j.scijus.2011.12.003.
[Crossref]
Doleac, J. L. (2016). The Effect of DNA Databases on Crime Social Science Research Network.
Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2556948.
Fraser, J., & Williams, R. (2009). Handbook of Forensic Science. Cullompton: Willan.
Gerber, J., & Killias, M. (2003). The transnationalization of historically local crime: Auto theft in
Western Europe and Russia markets. European Journal of Crime, Criminal Law and Criminal
Justice, 11(215–226).
Julian, R. D., Kelty, S. F., Roux, C., Woodman, P., Robertson, J., & Margot, P. (2011). What is the
Value of Forensic Science? An Overview of the Effectiveness of Forensic Science in the Australian
Criminal Justice System Project. Australian Journal of Forensic Sciences, 43(4), 217–229.
[Crossref]
Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to Integrating Forensic Techniques
into Incident Response. Recommendations of the National Institute of Standards and Technology,
(Special Publication—800-86). National Institute of Standards and Technology (NIST). Retrieved
from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf (accessed the 1rst
of April, 2020).
Killias, M., Haymoz, S., & Lamon, P. (2007). La criminalité en Suisse et son évolution à la lumière
des sondages de victimisation de 1984 à 2005. Bern: Staempli.
Leukfeldt, E. R., Kleemans, E. R., Kruisbergen, E. W., & Roks, R. A. (2019). Criminal networks in a
digitised world: on the nexus of borderless opportunities and local embeddedness. Trends in
Organized Crime, 22(3), 324–345. doi:https://doi.org/10.1007/s12117-019-09366-7
[Crossref]
Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2017). Cyberfraud and the implications
for effective risk-based responses: themes from UK research. Crime, Law and Social Change, 67(1),
77–96. doi:https://doi.org/10.1007/s10611-016-9648-0.
[Crossref]
Lopez, B. E., McGrath, J. G., & Taylor, V. G. (2020). Using Forensic Intelligence To Combat Serial
and Organized Violent Crimes. National Institute of Justice. Retrieved from https://nij.ojp.gov/topics/
articles/using-forensic-intelligence-combat-serial-and-organized-violent-crimes.
Margot, P. (2011). Commentary on the Need for a Research Culture in the Forensic Sciences. UCLA
Law Review, 58(3), 795–801.
NAS. (2009). Strengthening Forensic Science in the United States: a Path Forward. National
Research Council of the National Academies, Washington D.C.
PCAST. (2016). Forensic Science in Criminal Courts: Ensuring Scientific Validity of Feature-
Comparison Methods. Executive Office of the President President’s Council of Advisors on Science
and Technology Committee, Washington.
Pollitt, M. (2010, 2010//). A History of Digital Forensics. Paper presented at the Advances in Digital
Forensics VI, Berlin, Heidelberg.
Pollitt, M., Casey, E., Jaquet-Chiffelle, D.-O., & Gladyshev, P. (2018). A Framework for
Harmonizing Forensic Science Practices and Digital/Multimedia Evidence. OSAC Task Group on
Digital/Multimedia Science.
[Crossref]
Ratcliffe, J. (2016). Intelligence-Led Policing (2nd edition ed.). Cullompton, UK: Willan.
Reep-van den Bergh, C. M., & Junger, M. (2018). Victims of cybercrime in Europe: a review of
victim surveys. Crime Science, 7(1), 5.
[Crossref]
Ressnikoff, T., Ribaux, O., Baylon, A., Jendly, M., & Rossy, Q. (2015). The Polymorphism of Crime
Scene Investigation: an Exploratory Analysis of the influence of Crime and Forensic Intelligence on
decisions made by Crime Scene Examiners. Forensic Science International 257, 425–434.
doi:https://doi.org/10.1016/j.forsciint.2015.10.022.
[Crossref]
Ribaux, O. (2019). Federalism and Swiss police reforms. In J. Janssen, K. Lünnemann, W. D’haese
& A. Groenen (Eds.), Cahiers Politiestudies, Gompel & Svacina, 51, 247–260.
Ribaux, O., Girod, A., Walsh, S., Margot, P., Mizrahi, S., & Clivaz, V. (2003). Forensic Intelligence
and Crime Analysis. Probability, Law and Risk, 2(2), 47–60.
[Crossref]
Ribaux, O., & Margot, P. (1999). Inference Structures for Crime Analysis and Intelligence Using
Forensic Science Data: the Example of Burglary. Forensic Science International, 100, 193–210.
Ribaux, O., Roux, C., & Crispino, F. (2017). Expressing the value of forensic science in policing.
Australian Journal of Forensic Sciences, 49(5), 489–501. doi:https://doi.org/10.1080/00450618.
2016.1229816.
[Crossref]
Ribaux, O., Walsh, S. J., & Margot, P. (2006). The Contribution of Forensic Science to Crime
Analysis and Investigation: Forensic Intelligence. Forensic science international, 156, 171–181.
[Crossref]
Rossy, Q., Décary-Hétu, D., Delémont, O., & Mulone, M. (Eds.). (2018). The Routledge
International Handbook of Forensic Intelligence and Criminology. Abingdon UK: Routledge
International.
Rossy, Q., Ioset, S., Dessimoz, D., & Ribaux, O. (2013). Integrating forensic information in a crime
intelligence database. Forensic science international, 230, 137–146. doi:https://doi.org/10.1016/j.
forsciint.2012.10.010.
[Crossref]
Rossy, Q., & Ribaux, O. (2020). Orienting the Development of Crime Analysis Processes in Police
Organisations Covering the Digital Transformations of Fraud Mechanisms. European Journal on
Criminal Policy and Research, 26, 335–356. doi:https://doi.org/10.1007/s10610-020-09438-3.
[Crossref]
Roux, C., Crispino, F., & Ribaux, O. (2012). From Forensics To Forensic Science. Current Issues in
Criminal Justice, 24(1), 7–24.
[Crossref]
Tilley, N., & Ford, A. (1996). Forensic Science and Crime Investigation (73). Police Research
Group, Home office, London.
Weisburd, D., & Majmundar, M. K. (2018). Proactive Policing. Effects on Crime and Communities
(2018). National Academies of Sciences, Engineering, and Medicine, Division of Behavioral and
Social Sciences and Education; Committee on Law and Justice; Committee on Proactive Policing:
Effects on Crime, Communities, and Civil Liberties.
Williams, R. (2007). Policing and forensic science. In T. Newburn (Ed.), Handbook of Policing (pp.
760–793). Cullompton: Willan.
Wilson, D. B., Weisburd, D., & McClure, D. (2011). Use of DNA testing in police investigative work
for increasing offender identification, arrest, conviction and case clearance. Campbell Systematic
Reviews, 7(1). doi:https://doi.org/10.4073/csr.2011.7.
Footnotes
1 PICAR is an acronym in French: Plateforme d’Information du CICOP pour l’Analyse et le
Renseignement
2 Annual activity report of the regional analysis centre, 2019, not published, personal
communication.
Abstract
The authors discuss the contribution of the discipline of International
Relations. They look at the changing nature of global security threats and
the security responses focussing in particular on non-state actors. Drawing
on contributions within International Relations theory, from realist accounts
to critical security studies, they argue that different security (and non-
security) threats are too complex and serious to be approached in traditional
ways; non-state actors have become key to an effective response.
Fig. 6.2 International migrants, 1970–2019. (Sources: International Organisation for Migration
(IOM) (2020, 21). World migration report 2020. Switzerland, Geneva: IOM)
More recently, the world has faced a largely unexpected crisis with a
significant impact on both national and human security: the rise of global
pandemics such as the COVID-19 emergency. Globally, there were
106,555,206 confirmed cases of COVID-19, including 2,333,446 deaths,
reported to WHO as of 5:07 pm CET, 10 February 2021 (see Table 6.1).
The US has the highest confirmed cases and deaths, standing at 26,832,826
and 461,610 respectively, with the American continent as the highest
impacted region of the world. The second highest impacted continent is
Europe, with 35,950,159 million confirmed cases and 795,024 deaths; while
the least impacted is Western Pacific with 1,502,384 confirmed cases and
26,362 deaths. Despite differences per world region, the spread of the
coronavirus has been the most serious global crisis threatening human
populations in recent times. At the time of writing, the challenge of the
COVID-19 pandemic is still immeasurable, in light of the unabated growth
trends of confirmed cases and the non-availability of proper, effective and
scientifically accepted vaccines.
Table 6.1 Global cases of Covid-19 pandemic (confirmed)
Group 3: Separation
Finally, there is the case of NSAs displaying almost complete separation
from the state structure. States are usually not willingly disposed to adjust
policies to accommodate demands or activities of NSAs, especially when
their demands align with those of armed groups, unless it is in the case of
state-sponsored armed groups. Armed NSAs operate beyond state control,
which includes, but is not limited to, rebel groups, local militias, vigilantes,
warlords, terrorist groups among others. Data previously presented (see Fig.
6.1) shows that 98,328 terrorist attacks occurred between 2002 and 2018,
and in 2018 alone, over 103 countries recorded at least one terrorist
incident, while 71 countries witnessed at least one death. This indicates that
states are losing the monopoly on conflict, and several NSAs such as al-
Qaeda, Islamic State of Iraq and the Levant (ISIL), Taliban, Boko Haram,
al-Shabaab, and other affiliates of the ISIL in Afghanistan, Pakistan, India,
Nigeria and Mali are operating beyond state control. From this perspective,
these NSAs are increasingly considered, not as essential partners in the
global security discourse (Nelson 2000), but as actors to be eliminated to
avoid undermining state survival.
Some states might also be unwilling or slow in responding to certain
NSAs, either as security provision or as threats. A clear case in point is the
loose relations between the Nigerian government and Amnesty
International (AI) because of the AI’s criticism of the human rights abuses
by the Nigeria military. In 2015, AI reports entitled Stars on their
shoulders. Blood on their hands: War crimes committed by the Nigerian
Military notes that the security operations against Boko Haram in North-
east Nigeria have consistently violated the human rights of thousands of
Nigerians. Amnesty International has over the five years documented
extensive abuses of human rights against secessionist groups of Igbo in the
South-east and the killing of 350 Shi’ite religious members in Kaduna by
the Nigerian security forces. These critical reports have provoked media
attention, debates, hearings and meetings on human rights issues that
previously had not been a matter of public knowledge and debate. On the
basis of AI reports, the American government and other European countries
continued to refuse the sale of arms and ammunition to the Nigerian
government. Interestingly, however, AI advocacy and agenda-setting have
been described as the determination to destabilize Nigeria through fictitious
allegations of alleged human rights abuses. Garba Shehu2 in a press release
notes that:
Concluding Remarks
This chapter was concerned with the security implications raised by non-
traditional challenges such as transnational terrorism, migration, pandemics
and climate change. The chapter also examined the role of NSAs in the
current security realm at the national, (sub)regional and global levels.
Specifically, departing from International Relations traditional debates, the
chapter addressed those challenges that mostly occupy debates encouraged
within security studies. We addressed the complexity of the current security
environment in terms of new challenges and actors with the intent to shed
light on changes in the understanding of security and in the ways it is
performed and managed in the current international environment.
In this regard, the chapter presented an overview of the current
fragmentation of the international security environment where traditional
binary distinctions such as internal versus external, macro versus micro,
state versus non-state do not seem to be particularly useful to grasp the
complexity of security today and the way it is managed. The discussion of
the different examples seems to confirm that although states remain crucial
in determining what is conceived as a security question, the increasing
impacts of NSAs on security issue-areas cannot be gainsaid and should be
acknowledged to be able to address the hydra-headed nature of international
security. In this sense, as academic discipline prone to analyse international
events and actors, International Relations offers unique analytical tools that
can been employed in order to make sense of apparently independent and
disconnected national practices.
However, a broader theoretical and conceptual effort is needed in order
to grant due conceptual consideration to the role played in international
security by NSAs; the roles played by organised individuals, non-
governmental organisations or terrorist and criminal groups who are
directly or indirectly, positively or negatively involved in the security of
nations and the world. Indeed, we confirm that both institutional and other
types of NSAs have started occupying a relevant role in both the definition
of security and its management. To conclude, we emphasise that a focus on
the spectrum of understandings of security—from national to human—
within the current fragmented scenario is not only consistent with the
expectations and concerns of the existing academic debates, but it also
leaves additional room for addressing the different ways security is
practised.
Recommended Readings
There are a number of studies focusing on the role of new challenges and
actors in International Relations. For a general overview on the key
developments in international security in the post-Cold War era in terms of
new threats and new actors, see Krahmann (2005). Reinalda (2011) instead
offers a useful guide on how to research Non-State Actors. In order to better
analyse their relevance in relation to IR approaches, Betts and Loescher
(2010) analyse the question of refugees from the different theoretical
perspectives within the discipline. More recently, Marchetti (2016)
provided a useful look at the interactions between states and non-states
actors in international politics.
References
Amnesty International (AI). 2015. Executive Summary. Stars on their shoulders. Blood on their
hands: war crimes committed by the Nigeria military. London, United Kingdom: Amnesty
International Ltd.
Andonova, L. B. 2006. “Globalization, Agency, and Institutional Innovation: The Rise of Public-
Private Partnerships in Global Governance.” Goldfarb Center Working Paper No. 2006-004 March.
Annan, K. 2005. In Larger Freedom: Towards Development, Security, Human Rights for All. UN
General Assembly. http://www.un.org/en/events/pastevents/in_larger_freedom.shtml. Accessed 3
October 2020.
Aradau, C. & Van Munster, R. (2007). ‘Governing Terrorism Through Risk: Taking Precautions,
(un)Knowing the Future’, European Journal of International Relations, 13(1), pp. 89–115.
Ashley R.K. & Walker R.J. (1990). Speaking the Language of Exile: Dissident Thought in
International Studies, International Studies Quarterly, 34 (3), 259–268.
Aziani, A., S. Favarin, and G. M. Campedelli. 2020. “Security Governance: Mafia Control over
Ordinary Crimes.” Journal of Research in Crime and Delinquency, 57(4), pp. 444–492.
[Crossref]
Bado, A. B. 2011. “Peace studies and International Relations: Understanding the international
community.” Hekima Review, 44: 101–111.
Baldwin, D. A. (ed.) 1993. Neorealism and Neoliberalism: The Contemporary Debate. New York:
Columbia University Press.
Baldwin, D.A. 1997. The Concept of Security. Review of International Studies 23, 5–26.
[Crossref]
Betts, A. and G. Loescher (eds.) 2010. Refugees in International Relations, Oxford University Press.
Bigo, D. 2002. “Security and immigration: Toward a critique of the governmentality of unease.”
Alternatives 27(1): 63–92.
[Crossref]
Biró, G., and A. I. Motoc. 2005. Working Paper on Human Rights and Non-State Actors, UN doc—
E/CN.4/Sub.2/2005/40, 11 July.
Bourbeau, P., & Vuori, J. A. (2015). Security, resilience and desecuritization: multidirectional moves
and dynamics. Critical Studies on Security, 3(3), 253–268.
Burchill, S., Linklater, A., Devetak, R. A., Donnelly, J., Paterson, M., Reus-Smit, C., & True, J.
(2005). Theories of International Relations. London and New York, Palgrave Macmillan.
Burgess, P. and Gräns, J. (2012) ‘Human Security’, in Snyder, C. A. (ed.) Contemporary security and
strategy. 3rd ed. Basingstoke: Palgrave Macmillan, pp. 89–105.
[Crossref]
Buzan, B., O. Wæver, and J. deWilde. 1998. Security: A New Framework for Analysis. London:
Lynne Rienner Publishers.
Collins, A. (2010). Introduction: What is Security Studies? In Collins, Alan (ed.) Contemporary
security studies. 2. ed. Oxford: Oxford University Press.
Conca, K. and G. Dableko. 2004. “Introduction: Three Decades of Global Environmental Politics.”
In Conca, Ken and Geoffrey Dabelko, eds. Green Planet Blues. Environmental Politics from
Stockholm to Johannesburg, 1–23. Westview Press.
Cusumano, E., and J. Pattison. 2018. “The non-governmental provision of search and rescue in the
Mediterranean and the abdication of state responsibility.” Cambridge Review of International Affairs
31(1): 53–75.
[Crossref]
D’Amato S., Baldaro E. & Giurati T. (2019). The CorsAfrique: The Corsican milieu in Africa,
between business and raison d’Etat, European Review of Organized Crime 5(1), 36–59.
Derian, J. der. (1990). The (S)pace of International Relations: Simulation, Surveillance, and Speed.
International Studies Quarterly, 34(3), 295–310.
Donnelly, J. 2000. Realism and International Relations. New York: Cambridge University Press.
[Crossref]
Ferguson, Y. H., and R. W. Mansbach. 1988. The Elusive Quest: Theory and International Politics.
Columbia: University of South Carolina Press.
Fierke, K. M. 2015. Critical Approaches to International Security, 2nd Edition. London, Oxford:
Polity Books.
Geneva Call. 2020. Bringing within reach the importance of engaging armed non-state actors to
tackle the covid-19 pandemic. Geneva—Switzerland. https://www.genevacall.org/bringing-within-
reach-the-importance-of-engaging-armed-non-state-actors-to-tackle-the-covid-19-pandemic/.
Accessed 20 November 2020.
Glaser, C. 2003. “Structural Realism in a Complex World,” Review of International Studies 29(3):
403–414.
[Crossref]
Gleditsch, N. P. (1998). Armed Conflict and The Environment: A Critique of the Literature. Journal
of Peace Research, 35(3), 381–400.
Helble, M., Z. Ali, and J. Lego. 2018. “A comparison of global governance across sectors: Global
health, trade, and multilateral development finance.” ADBI Working Paper, No. 806, Asian
Development Bank Institute (ADBI), Tokyo.
Institute for Economics & Peace. 2019. Global Terrorism Index 2019: Measuring the Impact of
Terrorism. Sydney: Institute for Economics & Peace. Available from: https://www.visionofhumanity.
org/wp-content/uploads/2020/11/GTI-2019-web.pdf.
Internal Displacement Monitoring Centre (IDMC). 2016. 2017, 2018, 2019, 2020. GRID 2016:
Global report on internal displacement. Geneva, Switzerland Internal Displacement Monitoring
Centre and Norwegian Refugee Council (NRC).
International Committee of the Red Cross (ICRC). 2020. The ICRC’s operational response to
COVID-19. Geneva, Switzerland: International Committee of the Red Cross.
International Organisation for Migration (IOM). 2020. World migration report 2020. Switzerland,
Geneva: IOM.
Jackson, R. (2005). Writing the War on Terrorism: Language, Politics and Counterterrorism.
Manchester University Press. Vancouver.
Jackson R. and Pisoiu D. (2018) Contemporary Debates on Terrorism. London: Taylor and Francis.
Jakobeit C., and Methmann C. (2012). ‘Climate Refugees’ as Dawning Catastrophe? A Critique of
the Dominant Quest for Numbers. In: Scheffran J., Brzoska M., Brauch H., Link P., Schilling J. (eds)
Climate Change, Human Security and Violent Conflict. Hexagon Series on Human and
Environmental Security and Peace, vol 8. Springer, Berlin, Heidelberg.
Kerr, P. (2007) “Human Security”, in Collins, A. (ed.) Contemporary security studies. First edition.
Oxford: Oxford University Press, pp. 91–108.
Krahmann, E. (ed.). 2005. New Threats and New Actors in International Security. US: Palgrave
Macmillan.
Krahmann, E. 2012. “Private Military and Security Companies, Territoriality and the Transformation
of Western Security Governance.” In S. Guzzini and I. B. Neuman eds., The Diffusion of Power in
Global Governance. International Political Economy meets Foucault. Basingstoke: Palgrave
Macmillan, pp. 38–70.
[Crossref]
Lemon, E. 2018. “Critical approaches to security in Central Asia: an introduction.” Central Asian
Survey, 37(1), 1–12.
[Crossref]
Linklater, A. (2007). Critical Theory and World Politics: Citizenship, Sovereignty and Humanity (1st
ed.). Routledge.
Marchetti, R. 2016. Global Strategic Engagement: States and Non-State Actors in Global
Governance. Lanham, MA: Lexington Books.
Mathews, J. T. 1997. “Power Shift. The Rise of Global Civil Society.” Foreign Affairs, 76(1): 50–66.
[Crossref]
Miller, L. H. 1994. Global Order: Values and Power in International Politics. Boulder, CO:
Westview Press.
Myers M. and Kent J. (1995). The New Atlas of Planet Management, Berkeley, CA: University of
California Press.
Nelson, J. 2000. The Business of Peace: The Private Sector as a Partner in Conflict Prevention and
Resolution. London: International Alert; Council on Economic Priorities; The Prince of Wales
Business Leaders Forum.
Payne A. 2020, 16 March. Spain has nationalized all of its private hospitals as the country goes into
coronavirus lockdown. Business Insider. Retrieved from: https://www.businessinsider.com/
coronavirus-spain-nationalises-privatehospitals-emergency-covid-19-lockdown-2020-3?r=US&IR=
T. Accessed 9 October 2020.
Raineri L, and A. Martini. 2017. “ISIS and al-Qaeda as strategies and political imaginaries in Africa:
A comparison between Boko Haram and Al-Qaeda in the Islamic Maghreb.” Civil Wars, 19(4): 425–
447.
[Crossref]
Rauta, V. 2019. “Towards a typology of non-state actors in ‘hybrid warfare’: proxy, auxiliary,
surrogate and affiliated forces.” Cambridge Review of International Affairs.
Reinalda, B. 1999. “NGO’s en andere particuliere actoren in de leer der international betrekkingen.”
Internationale Spectator, nr. 7(8): 414–8.
Reus-Smith, C. (2005). The constructivist challenge after September 11. Pp. 81–95 in International
Society and its Critics, ed. A. J. Bellamy. Oxford: Oxford University Press.
Ryan Ó. 2020, March. Private hospitals will be made public for duration of coronavirus pandemic.
The Journal. Retrieved from: https://www.thejournal.ie/private-hospitals-irelandcoronavirus-
5056334-Mar2020/. Accessed 18 October 2020.
Schweller, R. L. and D. Priess. 1997. “A Tale of Two Realisms: Expanding the Institutions Debate.”
Mershon International Studies Review 41: 1–32.
[Crossref]
Shepp, J. 2020, March. Coronavirus Is the Last Thing the Middle East Needs Right Now.
Intelligencer. Retrieved from https://nymag.com/intelligencer/2020/03/coronavirus-is-the-last-thing-
themiddle-east-needs-now.html. Accessed 18 October 2020.
Singer, P. 2001. “Corporate warriors: The rise of the privatized military industry and its ramifications
for international security.” International Security, 26(3): 186–220.
[Crossref]
The Guardian. (London, international edition), 2018. Nigeria concerned over Amnesty
International’s ‘damaging’ activities. 18 December. https://www.theguardian.com/world/2018/dec/
18/nigeria-concerned-over-amnesty-internationals-damaging-activities. Accessed 27 December 2020.
Tiggle, N. 2020, 21 March. Coronavirus: Thousands of extra hospital beds and staff. BBC. Retrieved
from: https://www.bbc.com/news/uk-51989183. Accessed 18 October 2020.
United Nations, Security Council (UN, SC). 2018. “Peacebuilding and sustaining peace: Report of
the Secretary-General.” A/72/707/S/2018/43. UN, General Assembly Security Council.
Venturi, B. 2017. EU and the Sahel: A Laboratory of Experimentation for the Security—Migration—
Development Nexus. Rome: Istituto Affari Internazionali (IAI).
Viotti, P. R., & Kauppi, M. V. (2012). International Relations and World Politics Security, Economy
and Identity. Englewood Cliff, NJ Prentice Hall.
WaterAid Nigeria. 2020. Halting the spread of COVID-19 and other infectious diseases in Nigeria
through universal access to water, sanitation and good hygiene. June. https://www.wateraid.org/ng/
publications/wateraid-nigeria-covid19-policy-brief. Accessed 23 October 2020.
Wendt, A.E. 1987. “The agent-structure problem in international relation theory.” International
Organization, 41 (3), Summer, 335–370.
Wendt, A.E. 1992. “Anarchy is what states make of it: the social construction of power politics.”
International Organization, 46 (2), Spring, 391–425.
Wendt, A.E. 1999. Social theory of international politics. Cambridge, etc.: Cambridge University
Press.
[Crossref]
World Health Organization (WHO). 2020. An action plan to engage the private sector in the
response to COVID-19. Consultation draft of Interim Guidance 30 March 2020. Retrieved from:
https://hsgovcollab.org/en/node/4365. Accessed 23 October 2020.
Footnotes
1 Critical terrorism scholars have produced extensively on this. For a pioneer contribution, see
Jackson (2005) and Jackson and Pisoiu (2018) for a more recent overview on current debates.
2 Garba Shehu is the Senior Special Assistant on media to the Nigerian President, Muhammadu
Buhari.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_7
Adam White
Email: [email protected]
Abstract
The terms ‘private security’ and ‘private military’ have become
commonplace in the disciplines of criminology and international relations.
However, the use of these terms is not always clear cut. Sometimes they
refer to separate phenomenon—private security to the commercial delivery
of police-like services in the domestic sphere, private military to the
commercial delivery of military-like services in the international sphere.
Other times they concern the same broad phenomenon—the global market
for protective services. It can therefore be difficult to make sense of the
literature surrounding these terms. The purpose of this chapter is to shed
light on how and why these terms run parallel to and intersect with one
another. It does so by illustrating how three prominent contextual factors—
growth patterns, market structure and regulation—each gives rise to ‘one
phenomenon or two’ narratives. While this does not resolve the ambiguity
encircling these terms, it does offer a road map for navigating through them.
Introduction
Over the past three decades or so, the terms ‘private security’ and ‘private
military’ have become commonplace in the disciplines of criminology and
international relations. However, the use of these terms is not always clear
cut. Sometimes they refer to separate phenomenon—private security to the
commercial delivery of police-like services in the domestic sphere, private
military to the commercial delivery of military-like services in the
international sphere. Other times they concern the same broad phenomenon
—the global market for protective services. As a consequence, it can be
difficult to make sense of not only the literature surrounding these terms,
but also the underlying phenomena themselves. The purpose of this chapter
is to shed light on how and why these terms variously run parallel to and
intersect with one another. It does so by illustrating how the literature
relating to three prominent contextual factors—growth patterns, market
structure and regulation—gives rise to a series of distinctive ‘one
phenomenon or two’ narratives. This does not resolve the ambiguity
encircling these terms, but it does offer a road map for navigating through
them.
Growth Patterns
In the criminology and international relations literature, it is possible to
identify three different narratives relating to the growth patterns of the
private security and/or private military industries. The first two portray
these industries as separate phenomena, one emerging from shifts in the
domestic sphere during the late 1970s and 1980s (the fiscal crisis of the
state, rising crime and insecurity and the emergence of mass private
property), the other materialising from changes in the international sphere
during the late 1980s and 1990s (the end of the Cold War, the politics
surrounding the peace dividend and the resurgence of new civil and
regional wars). The third depicts them as part of the same overarching
phenomenon—the declining frontline capacity of the state and the
concomitant ascendance of neoliberalism during the latter part of the
twentieth century. This section examines each of these narratives in turn.
The first narrative tells the rise of the private security industry in the
domestic sphere and runs more or less as follows. In the decades following
World War II, many democratically elected governments assumed
responsibility for delivering ever more public services (health, education,
transport, utilities, sanitation etc.) in an effort to satisfy voters. As economic
productivity began to drop off during the 1970s, however, the tax base
needed to pay for these services diminished, leading to a period of political
uncertainty—a notable turning point in postwar history often called the
‘fiscal crisis of the state’. In this climate, a series of market-orientated
governments came to power—for instance, the Conservatives under the
leadership of Margaret Thatcher in the UK—with a mandate to impose
spending caps and reduce the burden of public service expenditure on the
exchequer. This pattern of public disinvestment duly impacted upon the
area of crime control, where reduced public spending created a security
vacuum among individuals, communities and businesses, who accordingly
turned to the private security industry as an alternative source of protection
and reassurance (for examples of this explanation, see Cunningham and
Taylor 1985; Cunningham et al. 1990).
While this neat ‘public cuts, private growth’ dynamic certainly sheds
light on the growth patterns of the private security industry during the
1970s and 1980s, Jones and Newburn (1998, pp. 98–104) observe how it
does not necessarily tell the whole story because in some countries public
spending on the police actually increased during these decades. Between
1970 and 1990, for example, police officer numbers in the UK rose by 35%
(Braithwaite 2000, p. 49). This trend appears to undermine the fiscal crisis
of the state explanation. However, when public spending on the police is
approached in relative as opposed to absolute terms, the logic of this
explanation still holds. During the 1970s and 1980s, recorded crime rates
experienced a sharp rise in many parts of the world for a variety of reasons,
in particular the widening gap between rich and poor (Maguire 2007;
Reiner 2007). So although public spending on the police may have
increased over this time, it was not necessarily sufficient to meet the
mounting security concerns of anxious populations dealing with higher
levels of crime (Zedner 2003). As a consequence of this relative (as
opposed to absolute) public disinvestment in police resources, individuals,
communities and businesses still then had motivation to engage with the
private security industry as a supplement or alternative to the police (see:
Jones and Newburn 1998, pp. 98–104).
At the same time, this motivation was in many cases amplified by a
separate but contemporaneous trend within the domestic sphere—the
widespread emergence of ‘mass private property’ such as shopping malls,
industrial complexes, gated communities and leisure parks (Shearing and
Stenning 1981, 1983; Kempa et al. 2004). The logic here is that the
(collective) owners of such property have the power to shape the behaviour
of individuals on their land through (reasonable and proportionate) private
means, just as one does inside a private household. This in turn creates a
latent demand for private security which can be actualised if owners are
dissatisfied with the willingness and ability of the police to maintain social
order in line with their personal preferences—a common scenario given that
these preferences often prioritise capital accumulation (such as facilitating
private consumption) rather than public order (maintaining peaceable
relations among citizens). This means, as Shearing and Stenning (1981, p.
228) put it, that ‘whenever one finds a shift in property relations toward
such large geographically connected holdings of mass private property one
also finds a shift toward private policing initiatives’. The combination of
fiscal crisis, rising crime rates and insecurity and the emergence of mass
private property forms the backbone of the first narrative which depicts the
growth patterns of the private security industry in the domestic sphere.
The second narrative tells the rise of the private military industry in the
international sphere and emphasises a completely different set of causal
factors. It begins with the ending of the Cold War in 1989. Cashing in on
the so-called ‘peace dividend’—the perceived opportunity to reduce
military capacity in the new unipolar world order—governments across the
globe soon initiated military downsizing programmes to the extent that two
decades later state-run armed forces had 7 million fewer soldiers in their
ranks (Singer 2008, p. 53). In the UK, for instance, defence expenditure,
service personnel and Ministry of Defence civilians each fell by around
20% between 1990 and 1996 (Hartley 1997, p. 42). However, the post-Cold
War years were far from peaceful. The relatively swift withdrawal of
superpower presence from parts of Eastern Europe, Africa and South Asia
had the unforeseen effect of releasing long-suppressed localised conflicts
resulting in a new wave of civil and regional wars. This unexpected
resurgence of international instability created a problem for ‘victorious’
liberal democratic powers such as the US and UK. For a variety of
geopolitical, economic and humanitarian reasons, they wanted to influence
the course of these new wars, but no longer had the capacity to do so with
their diminished armed forces.
One solution to this conundrum was for states to enter into contractual
relationships with the many private military companies (most of them
comprised of the recently demobilised Cold War soldiers) now being
formed to profit from the situation. Against this backdrop, the market
expanded quickly. Between 1950–1989 private military companies were
involved in 15 conflicts, while in the period 1990–2000 they were present
in no less than 80, including those in Yugoslavia, Albania, the Gulf region,
Sierra Leone, Ethiopia, Congo, Angola, Sudan, Zambia Papua New Guinea
and East Timor (Rosén 2008, pp. 79–80). A second growth wave then
emerged during the post-9/11 military interventions in Iraq and
Afghanistan, where Coalition forces found themselves facing stiff
resistance from insurgents and governments once again turned to the market
for military-like services. This combination of post-Cold War
demobilisation, the politics surrounding the peace dividend and the
emergence of new civil and regional wars in the international sphere forms
the spine of the second narrative relating to the growth patterns of the
private military industry in the international sphere.
In contrast to the first two narratives, the third narrative views the
growth of the private security and private military industries as part of the
same overarching trend. This narrative begins by identifying a common
theme running through the above domestic and international growth
patterns—the declining and/or inadequate frontline capacity of police and
armed forces to address the pressing issues of the day. It then poses two
simple questions. Why did individuals, communities, businesses and
politicians alike so readily embrace the market as the solution to this
problem? Why did they not support the obvious alternative which was to
increase investment in the police and armed forces commensurate to the
issues they faced (which certainly would have been possible for wealthy
countries in North American and Europe)? While there are of course some
answers to these questions in the first two narratives (i.e. the politics of the
fiscal crisis and peace divided), a different answer is given in this third
narrative—the ascendance of neoliberalism. Moreover, it is an answer
which, unlike those mentioned above, covers both domestic and
international spheres and thus serves to unite the growth of the private
security and private military industries under the same logic.
At the centre of neoliberalism is a binary ideal-type portrayal of the
state and market. On one side, the state is comprised of monolithic
bureaucracies which are incapable of comprehending the complexity of
citizen needs and thus constitutes an inefficient, ineffective and expensive
mechanism through which to produce and distribute goods and services. On
the other side, the competitive market is made up of flexible and dynamic
companies which are highly sensitive and responsive to consumer demands
and therefore represents an efficient, effective and value-maximising
mechanism through which to produce and distribute goods and services (see
Hayek 1944; Friedman 1962). From the late 1970s onwards, so the third
narrative goes, neoliberal thinking spread across the world, influencing how
individuals, communities, businesses and politicians framed problems and
solutions in all walks of life, including the security and military spheres
(Harvey 2007). This is seen to explain, for instance, why governments have
increasingly turned to the market rather than investing solely in police and
armed forces (White 2020a; Kinsey 2009; Krahmann 2010; Ortiz 2010;
McFate 2015) and why individual, communities and businesses have
echoed this logic in their private consumption patterns (Loader 1997;
Abrahamsen and Williams 2011, pp. 59–69). In this narrative, then, the
growth of both the private security and private military industries is driven
by one overarching trend—the declining frontline capacity of the state and
the rise of neoliberalism.
The growth patterns of the private security and private military
industries thus change shape depending upon which contextual factors are
given priority. If priority is given to factors located in either the domestic
sphere (the fiscal crisis of the state, shifting crime patterns and mass private
property) or the international sphere (the end of the Cold War, the peace
dividend and the subsequent emergence of new civil and regional wars),
these industries manifest as two separate phenomena. If, however, priority
is given to the global ascendance of neoliberal ideology, these industries
come across as part of the same overarching phenomenon.
Market Structure
When it comes to the market structure of the private security and/or private
military industries, it is once again possible to identify three different
narratives in the criminology and international relations literatures. The first
two portray separate market structures, one relating to a group of companies
and employees delivering police-like services in the domestic sphere, the
other centring upon a different group of companies and employees
delivering military-like services in the international sphere. The third
depicts a more joined-up market structure which incorporates one set of
multinational companies and employees delivering protective services
across the globe. This section examines each of these narratives in turn.
The first narrative revolves around a group of private security
companies and employees delivering police-like services in the domestic
sphere. Prior to the 1970s—when the private security industry experienced
significant expansion in line with the growth patterns outlined in the
previous section—little is known about the kind of services offered by
companies in the sector. In the UK case, Churchill (2017) goes back further
than most, illustrating how in the nineteenth and early twentieth centuries,
private security companies were for the most part small outfits offering a
limited number of technological products (such as locks and safes) and
‘manned’ services (such as the patrol of industrial facilities and transport
hubs) usually within quite a localised geographical area. White (2020b)
picks up this story in the early to mid-twentieth century, during which time
these companies added a few more products (such as burglar alarms) and
services (such as the transit of valuable goods and basic investigation) to
their still quite limited portfolios and some companies (such as Group 4,
Securicor and Security Express) gained a nationwide status, even if they
were still diminutive compared to the multinational corporations of today.
During the late twentieth and early twenty-first centuries—when the
industry entered its accelerated growth phase—the functional scope of these
companies broadened out considerably. A good starting point in illustrating
this diversification is Stenning’s (2000, p. 328) often cited remark that ‘it is
now almost impossible to identify any function or responsibility of the
public police which is not, somewhere and under some circumstances,
assumed and performed by private police in democratic societies’. This
observation is illuminating not only because it serves to demonstrate just
how diverse the industry had now become, but also due to its choice of both
descriptor and comparator—the police. The expansion of the industry was
founded on a widening portfolio of police-like services. To put some detail
on (and to some extent problematise) this observation, it is useful to
consider Button’s (2019, pp. 154–159) distinction between ‘old’ and ‘new’
private security. Old private security involves a wide range of functions
which more or less run parallel to traditional police work: the protection of
persons and property (static and mobile); the transit of valuable goods
(especially cash); investigation; crime prevention consultancy and
technology (locks, alarms, safes); surveillance services and technology
(CCTV, access control, drones); and detention and monitoring (tagging)
services. This is the family of police-like services which underpin
Stenning’s remark. New private security, by contrast, relates to functions
performed not in the physical world but online, such as cyber solutions,
cyber awareness, cyber investigation, incident response, disaster recovery,
vulnerability testing and so on. When it comes to these functions, the
footprint of the police is patchy at best, calling into question their police-
like nature. At the same time, however, it is important to note that Button’s
(2019) distinction is embedded in survey of contemporary ‘private
policing’. This is because, old or new, these functions still contribute
towards the basic process of maintaining social order within the domestic
sphere during peacetime—that is, they can all be regarded as part of the
market for police-like services in the domestic sphere.
With regard to employee base, it is useful to differentiate between
managers and the frontline. Gill et al. (2007) draw a distinction between
two kinds of security manager. On one side are the ‘traditionalists’ who
regard security as a service function organised through command-and-
control structures. Unsurprisingly, this group includes a large number of
former police and military personnel. On the other side are the ‘modern
entrepreneurs’ who view security as a business process and prioritise
business skills over security expertise. This group, as the description
suggests, includes a high proportion of individuals whose primary
experience lies in the corporate world. This goes to illustrate how security
management comprises an interesting assortment—or indeed clash—of
skills and dispositions. The frontline, though, is even more variegated.
Button (2019, pp. 199–200) observes how this section of the labour market
tends to be characterised by a masculine culture, long-hours on low pay, a
high employment turnover and low levels of training. It is not therefore
generally viewed as a vocation. As a consequence, frontline employees
come from a wide range of backgrounds. Wakefield’s (2012) survey of
private security officers working in a UK shopping mall, for example,
identified the following past employment histories: other private security
posts; various military roles; skilled manual work (carpentry, joinery and
mechanics), unskilled work (factory, waitering, cleaning and hospitality);
and managerial work in pubs, mining and funeral trade. It is this
combination of companies delivering a range of police-like services in the
domestic sphere with a highly mixed employee base which lies at the heart
of the first narrative.
The second narrative, by contrast, centres upon private military
companies and employees delivering military-like services in the
international sphere. Prior to the late 1980s—when the industry started to
boom in accordance with the growth patterns sketched out in the preceding
section—the contours of the sector are something of a mystery. This is in
large part because of the clandestine nature of private military operations at
this time. Kinsey (2006, pp. 46–51), however, provides valuable and rare
insight into the UK industry in the immediate post-World War II decades.
He notes how in the 1950s and 1960s companies (such as Watchguard) and
lone contractors sold military advice, training and combat (mercenary)
capabilities to warring factions in countries like Yemen, Libya and Angola
—all with the (tacit) consent of the UK government. In the 1970s, he
continues, a new set of companies (such as Control Risks, Kroll and
Saladin) came into view, offering military-style counter-terror operations to
multinational corporations working in hostile environments across Europe,
the Middle East and South America.
In the post-Cold War era—when the industry entered its rapid growth
phase—the functional scope of these companies started to widen out. The
most well-known profile of these functions is Singer’s (2001, 2008) ‘tip of
the spear’ typology, which differentiates between three types of company
and specialisation: ‘type 1’ companies (at the tip of the spear) engage in
frontline combat operations and offensive counter-insurgency operations
(e.g. Sandline and Executive Outcomes); ‘type 2’ companies (in the middle
of the spear head) provide military consulting, strategy and intelligence
(such as MPRI and Dyncorp); and ‘type 3’ companies (at the base of the
spear head) specialise in technical support, training and static and mobile
protection (for instance, Brown & Root and SAIC). In practice, though, the
relationship between these three types of function is often fluid. For
example, it is not uncommon in the chaos of war for a company tasked with
protecting a convoy on a vulnerable route (type 3) to engage in frontline
combat operations if the convoy is under threat of enemy attack (type 1). In
terms of the present discussion, however, the most salient feature of this
typology is that it is explicitly drawn from traditional ‘military thought’ in
which ‘units within the armed forces are distinguished by their closeness to
the actual fighting’, with the frontline infantry units at the tip of the spear
followed by command and logistics units further down the spear head
(Singer 2008, p. 91). It is this military frame of comparison which gives the
second narrative its distinctive orientation towards companies delivering
military-like services in the international sphere.
In direct contrast to the private security employee base described in the
first narrative, the defining feature of the private military labour force is its
homogenous character. From management down to the frontline, it is
comprised almost entirely of former armed forces personnel. As Singer
(2008, p. 76) puts it: ‘the very name “ex”—ex-Green Beret, ex-Paratrooper,
ex-General, and so on—defines the employee base of the private military
industry’. This is mainly because the skillsets developed in the armed forces
—especially, the pre-reflexive discharge of violence—serve as the key
determinant of value in the private military labour market (Higate 2012a).
There is also a streak of nationalism running through this labour market
with, for instance, UK companies preferring to recruit ex-UK armed forces
and so on (Isenberg 2009, p. 44). This is borne out in White’s (2018, p. 394)
survey of employees working for the UK company Aegis on a major Iraq-
based contract circa 2010–2011. Of the 67 employees who gave a complete
employment history, 66 were ex-armed forces, with 62 from the UK, 2 from
the US, 1 from Australia and 1 from France. On a finer grained level, about
two-thirds of this group came from the infantry and marines (n=40), the
average length of service in the armed forces was 12.5 years and most had
not left active duty until the post-9/11 era (n = 60). This uniformity means
that the sector is also unsurprisingly defined by a prominent military-like
occupational culture and modus operandi (Singer 2008; Isenberg 2009;
Higate 2012b). It is this combination of companies delivering a range of
military-like services in the international sphere with a highly cohesive
employee base which serves as the focal point of the second narrative.
The third narrative differs from the first two by portraying a more
joined-up market structure which incorporates one set of multinational
companies and employees delivering protective services across the globe.
On the company side, this narrative highlights a series of recent cross-
sectoral mergers and acquisitions. For decades now, private security
companies have been augmenting their market shares through mergers and
acquisitions in the domestic sphere. Towards the end of the twentieth
century, for instance, the UK market leader Securicor acquired ever more
private security companies across Africa, Asia, Europe and North
America.1 In 2004, Securicor then merged with another market leading
private security company, Group 4, establishing the household name G4S,
with some 340,000 staff and global sales approaching £4 billion at the time
(BBC 2004). For present purposes, however, the most important moment in
this process of accumulation came in 2008 when G4S paid £43.6 million for
the UK private military company Armorgroup, which had extensive
operations in Iraq and other conflict-ridden countries (Isenberg 2009, pp.
74–75). The news release accompanying this acquisition reads,
‘ArmorGroup is a leading provider of defensive and protective security
services to national governments, multinational corporations and
international peace and security agencies operating in hazardous
environments’.2 This news release is highly revealing. It unambiguously
locates Armorgroup’s core area of activity in ‘hazardous environments’
(read international war zones) while, at the same time, side-stepping any
reference to the provision of military-like services, instead using the more
benign phrase ‘defensive and protective services’. In other words, it marks
out the emergence of a market structure—and accompanying corporate
terminology—which transcends the private security/private military
divide.3
On the employee side, the third narrative then traces a parallel blurring
process unfolding within the labour market. Following the major drawdown
of Coalition troops from Iraq and Afghanistan between 2011 and 2014,
employment opportunities in the private military labour market began to
dry up. So where did private military employees head next? Interestingly,
the one study which has followed the trajectories of these employees
suggests that many headed towards the private security labour market.
White (2018) surveyed 387 (mostly UK) individuals employed by the UK
private military company Aegis on a major Iraq-based contract circa 2010–
2011. He found that when these they moved on from the company when
this contract ended, 192 left the sector, with 137 returning to the UK. Of the
111 individuals in this group actively working at the time of the survey, by
far the largest proportion (44%) had found new employment in the private
security industry, especially in management roles. While these numbers are
of course small, they nevertheless illustrate the coming together of two
previously disconnected labour markets. Furthermore, when this process is
placed alongside the aforementioned cross-sectoral mergers and
acquisitions, it is possible to see the emergence of a more joined-up market
structure which incorporates one set of multinational companies and
employees delivering protective services in both domestic and international
spheres.
The market structure of the private security and private military
industries therefore changes shape depending upon which contextual factors
are given priority. If priority is given to traditional company and employee
profiles, these industries manifest as two separate phenomena, one relating
to the delivery of police-like services in the domestic sphere, the other
centring upon the delivery of military-like services in the international
sphere If, however, priority is given to recent mergers and acquisitions and
cross-sectoral employment transitions, these industries come across as part
of the same overarching phenomenon—a more joined-up market structure
in which multinational companies and transnational employee bases deliver
protective services right across the globe.
Regulation
In the criminology and international relations literature, it is once more
possible to identify three different narratives concerning the regulation of
the private security and/or private military industries. The first two assume
a more formal-legal understanding of regulation and portray two separate
dynamics, one relating to a collection of tightly controlled state-led
initiatives directed towards the market for police-like services in the
domestic sphere, the other focusing on a much looser series of multisectoral
initiatives targeted at the market for military-like services in the
international sphere. The third takes a more sociological approach to
regulation and depicts a common set of normative limitations which relate
to the controversial erosion of state sovereignty in both domestic and
international spheres. This section examines each of these narratives in turn.
The first narrative focuses on the legal mechanisms used by states to
control private security companies and employees engaged in the delivery
of police-like services in the domestic sphere. The most comprehensive
survey of these mechanisms is the United Nations Office on Drugs and
Crime’s (UNODC) (2014) Handbook on State Regulation Concerning
Civilian Private Security Services and their Contribution to Crime
Prevention and Community Safety, which reviews state regulation in 43
countries across Europe, North America, South America, Australasia,
Africa and Asia.4 It reveals how states impose markedly similar legal
controls on this market irrespective of location. On one side, companies are
generally required to conform to various corporate good practices (e.g.
insurance, financial viability, quality assurance, record keeping and
reporting procedures) and meet basic working conditions (e.g. minimum
wage, maximum working hours, appropriate equipment and workplace risk
analysis). On the other side, employees are usually required to satisfy
certain status criteria (e.g. minimum age, legal employment status, no
criminal record, education, literacy and health) and complete basic training
modules (e.g. knowledge of role, knowledge of legislation, communication
skills, conflict resolution and physical intervention). In terms of the present
discussion, the salient feature of these legal controls is that they are all
directed towards companies and employees delivering police-like services
in the domestic sphere.
But while on the surface these geographically diverse regimes share
many commonalities, on a more fine-grained level there is variation
between them when it comes to the strength of these conditions and their
enforcement. In other words, some regimes are stricter than others are. To
illustrate this variation, Button and Stiernstedt (2018, pp. 405–6) rank 26
European Union states according to the comprehensiveness of their private
security regulations, placing Belgium, Spain and Slovenia in the top three
and Lithuania, Austria and the Czech Republic in the bottom three. It is
important to note, however, that even at the bottom end of this league table,
state regulation still plays a decisive role in shaping the conduct of
companies and employees. The UK, for instance, is positioned a lowly 20th
out of 26 in Button and Stiernstedt’s rankings, yet its state-run licensing
system—established through the Private Security Industry Act 2001—has
nevertheless been successfully rolled out to the vast majority of individuals
working in the sector, in the process making a tangible contribution towards
standards of training and professionalism, and holding to account both
companies and employees guilty of malpractice (White 2015). In other
words, less stringent regulation does not equate to failed regulation. States
with laissez faire regimes still exercise considerable control over private
security companies and employees inside their territories. As such, the first
narrative depicts regulation as a relatively tightly controlled state-led
initiative directed towards companies and employees delivering police-like
services in the domestic sphere.
The second narrative shifts attention to the mechanisms used by a range
of stakeholders in the public, private and third sectors to control companies
and employees engaged in the delivery of military-like services in the
international sphere. This narrative begins with Article 47 of the First
Additional Protocol to the Geneva Conventions (1977), which was drafted
in response to the shadowy operations conducted by private military
companies and lone contractors during the African decolonisation
movements of the 1960s and 1970s (Singer 2008, pp. 37–8). It criminalises
any individual who ‘is specifically recruited locally or abroad to fight in an
armed conflict’ and ‘is motivated to take part in hostilities essentially by the
desire for private gain’. In due course, the intention and wording of Article
47 came to inform the UN Convention against the Recruitment, Use,
Financing and Training of Mercenaries (General Assembly resolution
44/34), which was drafted in December 1989 and came into force in
October 2001. While both Article 47 and the subsequent Convention have
both frequently been linked to the private military industry—not least by
the United Nations Working Group on the Use of Mercenaries5—no
company or employee in this sector has ever been prosecuted under their
provisions (see Pattinson 2014). They are thus widely acknowledged as
weak pieces of legislation (Percy 2007). With this in mind, a number of
states have unsurprisingly experimented with domestic law as an alternative
to international law. However, this approach has generally been regarded as
unworkable for a variety of reasons, not least the significant logistical
challenges of monitoring and enforcing corporate compliance in hostile
environments over which they have no jurisdiction. The UK Government
certainly came to this conclusion during the consultation process
surrounding its 2002 Green Paper, ‘Private Military Companies: Options for
Regulation’ (Foreign and Commonwealth Office 2002).
As private military activity reached unprecedented levels during the
post-9/11 interventions in Iraq and Afghanistan, a number of stakeholders
began to switch their attention to a different form of regulation—
international codes of conduct functioning on a voluntary basis. Examples
include: the International Peace Organisation Association Code of Conduct,
2008 Montreux Document, 2010 International Code of Conduct for Private
Security Service Providers, the 2011 PSC Series of Standards and the 2015
ISO Management System for Private Security Operations (ISO 18788)
(Avant 2016; Krahmann 2016). While these codes were drawn up by a
miscellany of states, companies and non-governmental organisations, they
have two important commonalities. First, they are all designed to control
companies and employees engaged delivering military-like services in
hostile environments. The IPOA Code of Conduct, for instance,
incorporates into its provisions the Geneva Conventions (1949), the
Convention Against Torture (1975), Protocols Additional to the Geneva
Conventions (1977), Chemical Weapons Convention (1993) and extensive
rules on the use of force in armed hostilities. Second, they rely upon
voluntary compliance among signatories—there is no general legal
requirement for companies and/or employees operating in the sector to sign
up. This means that although they are more readily applied than the
international law outlined above, they too remain fundamentally weak in
substance. As a consequence, the second narrative depicts private military
regulation as a loosely controlled multisectoral initiative targeted at
companies and employees engaged in the delivering of military-like
services in the international sphere.
The third narrative, by contrast, emphasises a set of normative
limitations which relate to the controversial erosion of state sovereignty in
both domestic and international spheres. It opens with the broad historical
observation that during the eighteenth, nineteenth and twentieth centuries,
(proto-) modern states increasingly sought to locate the delivery of security
and military functions within the public sphere through the establishment of
police and armed forces. While the drivers behind this grand historical
process were complex—ranging from the benevolent protection of citizens
to the violent suppression of colonial subjects—populations across the
globe nevertheless came to view security and military functions as core
state responsibilities. As Migdal (2001, p. 137) remarks, most people today
consider this ‘image’ of the state ‘to be as natural as the landscape around
them; they cannot imagine their lives without it’. Cerny (2015, p. 3)
elaborates on this theme in relation to military functions: ‘the dominant
nation-state-based international security paradigm is still hegemonic in the
minds not only of politicians and bureaucrats, but also of many interest
groups and mass publics’. Loader and Mulcahy (2003, p. 43) identify a
similar dynamic when it comes to policing functions, emphasising ‘a set of
predispositions which operate in such a way that when people think of
crime and order they reach, as it were, instinctively for the police’.
From a sociological perspective, these widespread normative
expectations play an important role when it comes to regulating companies
and employees engaged in the delivery of police-like services in the
domestic sphere and military-like services in the international sphere
(Loader and White 2017). To begin with, they cause people to resist or
problematise the expansion of the market into what is regarded as a
traditional sovereign domain. A good example of this resistance is the
critical manner in which the private security and private military industries
are represented in the media. Livingstone and Hart (2003), for instance,
reveal three recurring stereotypes of private security employees in the UK
media: the ‘watchman’ (a figure of incompetence), the ‘gangster’ (a
cheating and villainous character), and the ‘hired gun’ (a paid enforcer with
few morals). Likewise, Kruck and Spencer (2013, p. 331) found that the
four dominant characterisations of private military employees in The Daily
Telegraph (UK), The Guardian (UK), The New York Times (US) and The
Washington Post (US) during the period 2004 to 2011 were: ‘dirty
mercenaries’ (38%), ‘uncontrolled abusers’ (38%), ‘exploiting war
profiteers’ (31%) and ‘incompetent cowboys’ (29%). It is important to
emphasise that these disparaging representations cannot be reduced to a
general anxiety about the erosion of state sovereignty alone—the newspaper
articles under examination were often written in response to specific
scandals or misdemeanours. But this general anxiety certainly forms the
normative backdrop to many of these media representations.
Critical discourse along these lines performs two specific regulatory
functions. First, these stereotypes serve as ready-made and highly resonant
mechanisms through which to hold these industries to account whenever
they engage in malpractice. One of the most well-known examples of this
process relates to the private military company Blackwater, which was
forced to change its name twice—first to Xi and then Academi—following
the censorious media coverage of the 2007 Nisour Square Massacre, when
4 of its employees killed 17 Iraqi civilians and injured at least 20 more
during a 15 minute shoot-up in the middle of a busy Bagdad intersection
(Scahill 2007). Second, they encourage companies in both sectors to engage
in various (pre-emptive) status-enhancing legitimation strategies. Private
security companies, for example, frequently outfit their officers in mock
police uniforms, deploy them in copycat police cars and draw attention to
the fact that they are (in most instances) licensed by the state (White 2010,
2012). Likewise, private military companies shower their websites with
references to human rights, democracy and development; contribute to
humanitarian charities; seek to forge alliances with humanitarian
organisations like the UN; and appropriate humanitarian imagery such as
the UN global compact symbol (Joachim and Schneiker 2012). From a
more optimistic perspective, these legitimation strategies may serve to
introduce a range of virtuous ideals into the markets for police-like and
military-like services. From a more cynical perspective, they may simply
cause companies and employees to be rendered accountable through their
own hypocrisy (Loader and White 2017). Either way, they feed into cultural
resistance against the erosion of state sovereignty in the domestic and
international spheres—a resistance which sits at the core of the third
narrative.
The regulatory dynamics surrounding the private security and private
military industries thus change shape depending upon which contextual
factors are given priority. If priority is given to formal-legal control
mechanisms (such as statutory frameworks and codes of conduct), these
dynamics come across as two separate phenomenon, one focused on a
collection of tightly controlled state-led initiatives directed towards the
market for police-like services in the domestic sphere, the other relating to a
much looser multisectoral initiative targeted at the market for military-like
services in the international sphere. If, however, priority is given to more
sociological mechanisms, these dynamics manifest as the same overarching
phenomenon—cultural resistance against the erosion of state sovereignty in
both domestic and international spheres.
Conclusion
This chapter began with the observation that the terms ‘private security’ and
‘private military’ are often used in rather confusing ways within the
disciplines of criminology and international relations. This is because
sometimes they refer to separate phenomenon—private security to the
market for police-like services in the domestic sphere, private military to
the market for military-like services in the international sphere. Whereas
other times they concern the same broad phenomenon—the global market
for protective services. The chapter then proceeded to offer a road map for
navigating through these parallel and intersecting terms. As a final step, it is
now instructive to tease out and reflect upon three general principles which
animate this road map. First, the literature in this field is extensive,
interdisciplinary and constantly expanding. Attempting to work out the
connections between the terms ‘private security’ and ‘private military’ is
therefore a somewhat unwieldy task. For this reason, it is useful to break
down this puzzle into smaller and more manageable contextual factors. This
chapter focused upon growth patterns, market structure and regulation—
though others could equally be deployed. Second, the process whereby each
of these contextual factors is then further sub-divided into ‘one
phenomenon or two’ narratives is shaped by a decision about which
variables to prioritise at any one time. Yet some variables bring into effect
separate ‘private security’ or ‘private military’ narratives, while others blur
these narratives together. Third, and most importantly, it is possible (even
desirable) to pursue pathways across this road map other than those
described above. This chapter has necessarily presented a series of rather
stylised ‘one phenomenon or two’ narratives. Some of the most interesting
questions in this field lie in between the neatly set out contextual factors
and variables examined over the preceding pages. In other words, this road
map should be approached not as a strait-jacket, but rather a starting point
for exploring new relationships between the private security and private
military industries.
Recommended Readings
There is now an extensive literature on the private security industry—that
is, companies and employees delivering police-like services within the
domestic sphere. The most up-to-date and comprehensive overview of this
literature is this edition of The Handbook of Security (together with its
predecessors). For general observations on the growth of this industry, see:
Shearing and Stenning (1981), Jones and Newburn (1998) and White
(2012). For insights into the market structure of this industry, see: Button
(2019). For a wide-ranging discussion of how this industry is regulated, see:
Loader and White (2017) and Stiernstedt et al. (2019). There is also now
quite an extensive literature on the private military industry—that is,
companies and employees delivering military-like services within the
international sphere. A relatively recent and certainly comprehensive
overview of this literature is Schaub and Kelty (2016). For commentary on
the growth of this industry, see: Rosén (2008). For a tour through the
market structure of this industry, see: Singer (2008) and Eichler (2014). For
analysis of how this industry is regulated, see Chesterman and Lehnardt
(2007), Avant (2016) and Krahmann (2016). However, the literature which
connects together the private security and private military industries is
small by contrast and rather piecemeal in shape. While the best starting
point in this literature is Abrahamsen and Williams (2011), a slightly more
recent overview is White (2016).
References
Abrahamsen, R. and Williams, M. (2011) Security beyond the state: Private security in international
politics (Cambridge: Cambridge University Press).
Avant, D. (2016) ‘Pragmatic Networks and Transnational Governance of Private Military and
Security Services’, International Studies Quarterly 60(2), 330–342.
BBC (2004) ‘Security Firms Agree Merger Deal’ (24th February), available at: http://news.bbc.co.
uk/1/hi/business/3517067.stm.
Braithwaite, J. (2000) ‘The New Regulatory State and the Transformation of Criminology’, in
Garland, D. and Sparks, R. (eds) Criminology and Social Theory (Oxford: Oxford University Press).
Button, M. and Stiernstedt, P. (2018) ‘Comparing Private Security Regulation in the European
Union’, Policing and Society 28(4), 3980–414.
Cerny, P. (2015) ‘From Warriors to Police? The Civilianisation of Security in a Globalising World’,
International Politics 52(4), 389–407.
Chesterman, S. and Lehnardt, C. (eds.) (2007) From Mercenaries to Market: The Rise and
Regulation of Private Military Companies (Oxford: Oxford University Press).
Churchill, D. (2017) Crime Control and Everyday Life in the Victorian City: The Police and the
Public (Oxford: Oxford University Press).
Cunningham, W., Strauchs, J. and Van Meter, C. (1990) Private Security Trends 1970–2000 (The
Hallcrest Report II) (Stoneham: Butterworth-Heinemann).
Cunningham, W. and Taylor, T. (1985) Private Security and Police in America (The Hallcrest
Report) (Portland: Chancellor Press).
Eichler, M. (2014) ‘Citizenship and the Contracting Out of Military Work: From National
Conscription to Globalized Recruitment’, Citizenship Studies 18(6–7), 600–614.
Foreign and Commonwealth Office (2002) Private Military Companies: Options for Regulation
(London: HMSO).
Friedman, M. [1962] (2002) Capitalism and Freedom (Chicago: Chicago University Press).
Gill, M., Burns-Howell, T., Keats, G. and Taylor, E. (2007) Demonstrating the Value of Security
(Leicester: Perpetuity Press).
Hartley, K. (1997) ‘The Economics of the Peace Dividend’, International Journal of Social
Economics 24(1/2/3), 28–45
Higate, P. (2012a) ‘The Private Militarized and Security Contractor as Geocorporeal Actor’
International Political Sociology 6(4), 355–372.
Higate, P. (2012b). ‘Drinking Vodka from the ‘Butt-Crack’: Men, Masculinities and Fratriarchy in the
Private Militarized Security Company’, International Feminist Journal of Politics 14(4), 450–469.
Isenberg, D. (2009) Shadow Force: Private Security Contractors in Iraq (London: Praeger).
Joachim, J. and Schneiker, A. (2012) ‘New Humanitarians? Frame Appropriation through Private
Military and Security Companies’, Millennium—Journal of International Studies 40(2), 365–388.
Jones, T. and Newburn, T. (1998) Private Security and Public Policing (Oxford: Clarendon Press).
Kempa, M., Stenning, P. and Wood, J. (2004) “Policing Communal Spaces: A Reconfiguration of the
‘Mass Private Property’ Hypothesis”, British Journal of Criminology 44(4), 562–581.
Kinsey, C. (2009) Private Contractors and the Reconstruction of Iraq: Transforming Military
Logistics (London: Routledge).
Krahmann, E. (2010). States, Citizens and the Privatisation of Security (Cambridge: Cambridge
University Press).
Krahmann, E. (2016) ‘Choice, Voice and Exit: Consumer Power and the Self-Regulation of the
Private Security Industry’, European Journal of International Security 1(1), 27–48.
Kruck, A. and Spencer, A. (2013) ‘Contested Stories of Commercial Security: Self and Media
Narratives of Private Military and Security Companies’, Critical Studies on Security 1(3), 326–46.
Livingstone, K. and Hart, J. (2003) ‘The Wrong Arm of the Law? Public Images of Private Security’,
Policing and Society 13(2), 159–170.
Loader, I. (1997) ‘Private Security and the Demand for Protection in Contemporary Britain’,
Policing and Society 7, 143–162.
Loader, I. and Mulcahy, A. (2003) Policing and the Condition of England: Memory, Politics and
Culture (Oxford: Oxford University Press).
Loader, I. and White, A. (2017) How can we better align private security with the public interest?
Towards a Civilizing Model of Regulation. Regulation and Governance 11(2), 166–184.
Maguire, M. (2007) ‘Crime Data and Statistics’, in Maguire, M., Morgan, R. and Reiner, R. (eds.)
The Oxford Handbook of Criminology (Oxford: Oxford University Press, 2007), 241–301.
Migdal, J. (2001) State in Society: Studying how States and Societies Transform and Constitute One
Another (Cambridge: Cambridge University Press).
Ortiz, C. (2010) ‘The New Public Management of Security: The Contracting and Managerial State
and the Private Military Industry’, Public Money & Management 30(1), 35–41.
Pattinson, J. (2014) The Morality of Private War (Oxford: Oxford University Press).
Percy, S (2007) ‘Mercenaries: Strong Norm, Weak Law’, International Organization 61(2), 367–397.
Plimmer, G. and Wiggins, K. (2021) ‘G4S Shareholders Approve £3.8 billion Takeover by Allied’,
Financial Times (16th March), available at: www.ft.com/content/a25bb929-a497-45b2-b2d8-
2265ddb67036.
Reiner, R. (2007) Law and Order: An Honest Citizen’s Guide to Crime and Control (Cambridge:
Polity Press).
Rosén, F. (2008) ‘Commercial security: Conditions of growth’ Security Dialogue 39(1), 77–97.
Scahill, J (2007) Blackwater: The Rise of the World’s Most Powerful Mercenary Army (London:
Serpent’s Tail).
Schaub, G., Jr. and Kelty, R. (eds.) (2016) Private Military and Security Contractors: Controlling the
Corporate Warrior (Lanham: Rowman & Littlefield).
Shearing, C. and Stenning, P. (1981) ‘Modern Private Security: Its Growth and Implications’, Crime
and Justice 3, 193–245.
Shearing, C. and Stenning, P. (1983) ‘Private Security—Implications for Social Control’, Social
Problems 30(5), 493–506.
Singer, P. (2001) ‘Corporate Warriors: The Rise of the Privatized Military Industry and Its
Ramifications for International Security’, International Security 26(3), 186–220.
Singer, P. (2008) Corporate Warriors: The Rise of the Privatized Military Industry. (Ithaca: Cornell
University Press).
Stenning, P. (2000) ‘Powers and Accountability of Private Police’, European Journal on Criminal
Policy and Research 8(3), 325–352.
Stiernstedt, P., Button, M., Prenzler, T. and Sarre, R. (2019) ‘The ‘Three-Pillars Model of
Regulation’: A Fusion of Governance Models for Private Security’, Security Journal, https://doi.org/
10.1057/s41284-019-00224-3.
United Nations Office on Drugs and Crime (2014) State Regulation concerning Civilian Private
Security Services and their Contribution to Crime Prevention and Community Safety; available at:
http://www.unodc.org/documents/justice-and-prison-reform/crimeprevention/Ebook0.pdf
White, A. (2010) The Politics of Private Security: Regulation, Reform and Re-Legitimation
(Basingstoke: Palgrave Macmillan).
White, A. (2012) ‘The New Political Economy of Private Security’, Theoretical Criminology 16(1),
85–101.
White, A. (2015) The Impact of the Private Security Industry Act 2001. Security Journal 28(4), 425–
42.
White, A. (2016) ‘The Market for Global Policing’, in Bradford, B., Jauregui, B., Loader, I. and
Steinberg, J. (eds.), The Sage Handbook of Global Policing. (London: Sage), 535–551.
White, A. (2018) ‘Beyond Iraq: The Socioeconomic Trajectories of Private Military Veterans’,
Armed Forces and Society 44(3), 387–407.
White, A. (2020a) ‘Private Security and the Privatisation of Criminal Justice’, in Bean, P. (ed.),
Criminal Justice and Privatisation: Key Issues and Debates (London: Routledge), 127–141.
White, A. (2020b) ‘Monopoly or Plurality? The Police and the Private Security Industry in Mid-
Twentieth Century Britain’, in Churchill, D., Janiewski, D. and Leloup, P. (eds.), Private Security
and the Modern State: Historical and Comparative Perspectives (London: Routledge), 78–95.
Zedner, L. (2003) ‘Too Much Security?’, International Journal of the Sociology of Law 31, 155–184.
Footnotes
1 www.g4s.com/who-we-are/our-history.
2 www.g4s.com/news-and-insights/news/2008/05/07/g4s-completes-acquisition-of-armorgroup-
international-plc.
3 In March 2021, G4S agreed to a £3.8 billion takeover by the US-based private security company
Allied Universal, creating a new global market leader in the sector, employing 750,000 staff across
80 countries (Plimmer and Wiggins 2021).
4 The 43 countries are as follows (by region). Europe: Belgium, Bulgaria, Denmark, Estonia,
Finland, France, Germany, Hungary, Italy, Ireland, the Netherlands, Norway, Poland, Portugal,
Russia, Spain, Sweden and the United Kingdom. North America: Canada (British Columbia,
Ontario); the United States (California, District of Columbia, Florida, Georgia, Michigan, Ohio,
Virginia, Washington State). South America: Belize, Bolivia, Brazil, Chile, Columbia, Costa Rica, El
Salvador, Ecuador, Honduras, Mexico, Panama and Uruguay. Australasia: Australia (New South
Wales, Victoria). Africa: Kenya, Mozambique, South Africa and Uganda. Asia: Japan, Israel, Korea,
Philippines, Singapore and the United Arab Emirates.
5 www.ohchr.org/EN/Issues/Mercenaries/WGMercenaries.
Part II
Offence Types
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_8
Kumar Ramakrishna
Email: [email protected]
The author would like to thank Mohammed Sinan Siyech for sharing his
valuable insights on Hindu extremism, as well as Tan Ming Hui and Syera
Anggreini Buntara for their editorial and research assistance in the
preparation of this chapter.
Abstract
The chapter examines how transnational terrorism has evolved since the
twentieth century, focusing on the so-called religiously inspired wave that
emerged most forcefully with the Al Qaeda attacks in New York and
Washington in September 2001, as well as the rise and evolution of the
virulent Al Qaeda offshoot Islamic State of Iraq and Syria (ISIS), in tandem
with the emergence of social media-driven radicalization processes from the
mid-2000s onwards. The chapter will show how not just violent Islamist
extremism as exemplified by Al Qaeda and ISIS but other forms—such as
the Identitarian Far Right in Western countries and even Buddhist versions
in South and Southeast Asia—have gained momentum in recent years. The
chapter will argue that these other extremisms have arisen partially in
response to violent Islamism in a process of reciprocal radicalization—
mediated by the very same social media platforms used by ISIS and its
affiliates. Finally the chapter will discuss how strategic dexterity, by way of
a judicious mix of “hard” law enforcement and “soft” counter-ideological
and other non-kinetic measures, remains essential to cope with the rapidly
mutating threat.
Introduction
The announcement on 27 January 2021 that a 16-year-old male Singaporean
had been detained in December 2020 under the Internal Security Act (ISA)
was a milestone in the history of counter-terrorism in Singapore. While the
city-state has had to deal with the threat of violent Islamist extremism
exemplified by the Al Qaeda-linked Jemaah Islamiyah and more recently
the Islamic State of Iraq and Syria (ISIS) since the 2000s, this was the first
time an individual had been hauled up under the ISA for involvement in
“far-right extremist ideology” (Koh 2021b). According to reports, the
individual in question had been making “detailed plans and preparations to
conduct terrorist attacks using a machete against Muslims at two mosques
in Singapore” (Koh 2021a). He had reportedly “watched the livestreamed
video of the terrorist attack on the two mosques in Christchurch, New
Zealand, on 15 March 2019, and read the manifesto of the Christchurch
attacker, Brenton Tarrant” (Lim 2021). At the same time, watching ISIS
propaganda videos was said to have led him to believe that “ISIS
represented Islam, and that Islam called on its followers to kill non-
believers” (Lim 2021). Earlier that same month, on the other side of the
world, a mob—amongst whose ranks white nationalist and supremacist
symbols were prominently displayed—assaulted the US Capitol building in
an ultimately futile attempt to prevent Congress from certifying Democratic
President Joe Biden’s November 2020 victory over Republican Donald
Trump. The attack revealed the potency of Extreme Right White
Supremacist appeals in the country (Zaru 2021). Nevertheless, according to
the Global Terrorism Index for 2020, the strategic challenge of countering
and preventing transnational Islamist terrorism and extremism remains for
the foreseeable future the most potent terrorist threat to global stability
(Institute for Economics and Peace 2020: 3).
This chapter examines how transnational terrorism has evolved in the
past two decades, focusing on the so-called religiously inspired wave that
emerged most forcefully with the Al Qaeda attacks in New York and
Washington in September 2001, as well as the rise and evolution of the
virulent Al Qaeda offshoot ISIS, in tandem with the emergence of social
media-driven radicalisation processes from the mid-2000s onwards. The
chapter will show how not just violent Islamist extremism as exemplified
by Al Qaeda and ISIS, but Extreme Right versions in the forms of White,
Hindu and Buddhist Supremacist extremism, have gained momentum in
recent years. The chapter will argue that both Islamist and Extreme Right
movements are sustained by competing ideological ecosystems comprising
key religious and political ideologues, educational and religious institutions
as well as social media. As we shall see, Islamist extremist ideological
ecosystems have sustained the threat of extremist violence—ranging from
low-level, lone actor attacks to more organised terrorist attacks by the likes
of Al Qaeda, ISIS and their affiliates on a global basis. On the other hand,
within Extreme Right ideological ecosystems, White Supremacist
extremism has generated largely lone actor threats thus far, but more
organised terror networks have certainly emerged, with incipient
transnational linkages, facilitated by social media. At the same time, the
chapter will note that Buddhist and Hindu Extreme Right ideological
ecosystems have sustained social media-empowered social and political
movements, animated by a strong anti-Muslim bias. Rather than organised
terrorist networks, thus far these latter movements have generated relatively
unstructured localised mob violence.
That said, because these Extreme Right movements—White, Buddhist
and Hindu Supremacist—also show evidence of cross-pollination of ideas
and worldviews, often with a strongly anti-Muslim bias, the danger of
reciprocal radicalisation between vulnerable Muslim and similarly
susceptible White, Buddhist and Hindu populations into Islamist extremism
and White, Buddhist and Hindu Supremacism respectively, is all too real.
Hence, the chapter will close with an argument for greater strategic
dexterity in better grasping the dynamics of the rapidly evolving global,
extremist and by implication, terrorist, landscape.
References
Agence France-Presse (AFP). (2020). Firebrand Buddhist Monk Gets Seat in Sri Lanka Parliament.
New Straits Times. August 7. Accessed March 18, 2021, from https://www.nst.com.my/world/region/
2020/08/614874/firebrand-buddhist-monk-gets-seat-sri-lanka-parliament.
Akbaba, S. (2018). Re-Narrating Europe in the Face of Populism: An Analysis of the Anti-
Immigration Discourse of Populist Party Leaders. Insight Turkey, 20 (3), 199–218.
[Crossref]
Alam, J. (2021). Rohingya Refugees in Bangladesh Camps Fear Returning to Myanmar After Coup.
Associated Press. February 3. Accessed March 18, 2021, from https://apnews.com/article/rohingya-
myanmar-coup-9506980524e748baf577a085ae0f4d30.
Amnesty International (2017). Sri Lanka: Act now to prevent further anti-Muslim violence. Accessed
March 18, 2021, from https://www.amnesty.org/download/Documents/ASA3763612017ENGLISH.
pdf.
Atran, S. (2010). Talking to the Enemy: Violent Extremism, Sacred Values and What It Means to be
Human. London: Allen Lane.
Aung, S. Y. (2020). Military and USDP Play Nationalism Card Ahead of Myanmar’s Election. The
Irrawaddy. October 3. Accessed March 18, 2021, from https://www.irrawaddy.com/elections/
military-usdp-play-nationalism-card-ahead-myanmars-election.html.
Banlaoi, R.C. (ed.). (2020). The Marawi Siege and its Aftermath: The Continuing Terrorist Threat.
Newcastle Upon Tyne: Cambridge Scholars Publishing.
Bashar, I. (2020). Bangladesh. Counter Terrorist Trends and Analyses, 12(1), 45–49.
Basit, A. (2021). Pakistan. Counter Terrorist Trends and Analyses, 13(1), 72–81.
Bhatia, R. (2017). The Year of Love Jihad in India. The New Yorker. December 31. Accessed March
18, 2021, from https://www.newyorker.com/culture/2017-in-review/the-year-of-love-jihad-in-india.
Burke, J. (2019). Norway Mosque Attack Suspect ‘Inspired by Christchurch and El Paso Shootings’.
The Guardian. February 6. Accessed March 18, 2021, from https://www.theguardian.com/world/
2019/aug/11/norway-mosque-attack-suspect-may-have-been-inspired-by-christchurch-and-el-paso-
shootings.
Burma Library. (n.d.). Memorandum of Understanding: Bodu Bala Sena of Sri Lanka and 969 of
Myanmar. Accessed March 18, 2021, from https://www.burmalibrary.org/docs19/BBS+969-MOU.
pdf.
Chacko, P. and Talukdar, R. (2020). Why Modi’s India has become a Dangerous Place for Muslims.
The Conversation. Accessed March 18, 2021, from https://theconversation.com/why-modis-india-
has-become-a-dangerous-place-for-muslims-132591.
Chandra, A. (2020). Religious Teacher under Investigation by MHA, Muis for Post Saying Novel
Coronavirus Was Retribution from Allah against Chinese. TODAY online. February 7. Accessed
March 18, 2021, from https://www.todayonline.com/Singapore/Religious-Teacher-under-
Investigation-Mha-Muis-Racist-Post-Saying-Novel-Coronavirus-Was.
Chew, A. (2017). Al Qaeda’s Rohingya Call to Arms Could Revive Jemaah Islamiyah: Security
Officials. Channel News Asia. September 14. Accessed March 18, 2021, from https://www.
channelnewsasia.com/news/asia/al-qaeda-s-rohingya-call-to-arms-could-revive-jemaah-islamiyah-
9215004.
Colombo Telegraph. (2014a). Full Text: Wirathu and Gnanasara Sign Agreement. Accessed March
18, 2021, from https://www.colombotelegraph.com/index.php/full-text-wirathu-and-gnanasara-sign-
agreement/.
Colombo Telegraph. (2014b). Unedited Full Video: BBS Gnanasara’s Pre-Riots Speech. Colombo
Telegraph. Accessed March 18, 2021, from https://www.colombotelegraph.com/index.php/unedited-
full-video-bbs-gnanasaras-pre-riots-speech/.
Cook, D. (2015). Understanding Jihad. 2nd ed. Oakland: University of California Press.
[Crossref]
Desker, B. and Ramakrishna, K. (2002) Forging an Indirect Strategy in Southeast Asia. The
Washington Quarterly, 25(2), 161–176.
[Crossref]
Dhillon, A. (2018) Why India’s Great Communicator Modi Has Fallen Silent On Mob Lynching
Epidemic. South China Morning Post. February 3. Accessed March 18, 2021, from https://www.
scmp.com/comment/insight-opinion/asia/article/2154619/why-indias-great-communicator-modi-has-
fallen-silent.
Dias, E. and Graham, R. (2021). How White Evangelical Christians Fused With Trump Extremism.
The New York Times. January 11. Accessed March 18, 2021, from https://www.nytimes.com/2021/01/
11/us/how-white-evangelical-christians-fused-with-trump-extremism.html.
Diaz, A. (2019). Army Veteran Indicted in Alleged Terror Bombing Plot Pleads Not Guilty in L.A.
Los Angeles Times. May 31. Accessed March 18, 2021, from https://www.latimes.com/local/lanow/
la-me-ln-los-angeles-terror-bombing-plot-plea-20190531-story.html.
Doval, P. (2018). Indians Gorging on Mobile Data, Usage Goes Up 15 Times in 3 Years. Times of
India. June 3. Accessed March 18, 2021, from https://timesofindia.indiatimes.com/business/india-
business/indians-gorging-on-mobile-data-usage-goes-up-15-times-in-3-yrs/articleshow/64432913.
cms.
Ebner, J. (2017) The Rage: The Vicious Circle of Islamist and Far-Right Extremism. London and
New York: I.B. Tauris.
[Crossref]
Ebner, J. (2020). Going Dark: The Secret Social Lives of Extremists. London: Bloomsbury.
Elcheroth, G. and Reicher, S. (2017). Identity, Violence and Power: Mobilizing Hatred, Demoblizing
Dissent. London: Palgrave Macmillan.
[Crossref]
Ellis-Petersen, H. (2020). ‘Feed Them Bullets Not Biryani’: BJP Uses Delhi Elections to Stoke
Religious Hatred. The Guardian. February 6. Accessed March 18, 2021, from https://www.
theguardian.com/world/2020/feb/06/feed-them-bullets-not-biriyani-bjp-uses-delhi-elections-to-stoke-
religious-hatred.
Freedman, L. (2006). The Transformation of Strategic Affairs. Adelphi Paper 379. London:
Routledge.
Frayer, L. and Khan, F. L. (2019). The Powerful Group Shaping The Rise Of Hindu Nationalism In
India. May 3. NPR. Accessed March 18, 2021, from https://www.npr.org/2019/05/03/706808616/the-
powerful-group-shaping-the-rise-of-hindu-nationalism-in-india.
Frydenlund, I. (2015). The Rise of Buddhist-Muslim Conflict in Asia and Possibilities for
Transformation. Norwegian Peacebuilding Resource Centre Policy Brief. Accessed March 18, 2021,
from https://reliefweb.int/sites/reliefweb.int/files/resources/888bfa90bfb97db91ff78ad9a774b37e.
pdf.
Gunasingham, A. (2021). Sri Lanka. Counter Terrorist Trends and Analyses, 13(1), 81–85.
Gunatilleke, G. (2016). Hate Speech in Sri Lanka: How a New Ban Could Perpetuate Impunity.
Oxford Human Rights Hub. Accessed March 18, 2021, from http://ohrh.law.ox.ac.uk/hate-speech-in-
sri-lanka-how-a-new-ban-could-perpetuate-impunity/.
Hansen, T. B. (1999). The Saffron Wave: Democracy and Hindu Nationalism in Modern India. New
Jersey: Princeton University Press.
[Crossref]
Human Rights Watch (2020). Covid-19 Fueling Anti-Asian Racism and Xenophobia Worldwide.
Accessed March 18, 2021, from https://www.hrw.org/news/2020/05/12/covid-19-fueling-anti-asian-
racism-and-xenophobia-worldwide.
Hutchinson, B., Katersky, A. and Margolin, J. (2019). Alleged Shooter Cased El Paso Walmart
Before Rampage That Killed 22: Law Enforcement Officials. ABC News. August 6. Accessed March
18, 2021, from https://abcnews.go.com/US/death-toll-rises-22-el-paso-shooting-victims/story?id=
64780680.
Institute for Conflict Management (ICM). (2020). Detail of Terrorism Update – Ninth Edition of IS
Magazine ‘The Voice of Hind’ Calls for Jihad. South Asian Terrorism Portal. Accessed March 18,
2021, from https://www.satp.org/terrorism-update/ninth-edition-of-is-magazine-‘the-voice-of-hind’-
calls-for-jihad.
Institute for Economics & Peace. (2020). Global Terrorism Index 2020: Measuring the Impact of
Terrorism. Sydney: Institute for Economics & Peace. Accessed March 18, 2021, from http://
visionofhumanity.org/reports.
Institute for Policy Analysis of Conflict. (2020). COVID-19 and The Mujahidin of Eastern Indonesia
(MIT). IPAC Short Briefing No. 3. Accessed March 18, 2021, from http://file.understandingconflict.
org/file/2020/04/Covid_19_and_MIT.pdf.
Intel Brief (n.d.-a). Examining Atomwaffen Division’s Transnational Linkages. The Soufan Center
Cipher Brief. Accessed March 18, 2021, from https://www.thecipherbrief.com/column_article/
examining-atomwaffen-divisions-transnational-linkages.
Intel Brief (n.d.-b). White Supremacists and the Weaponization of the Coronavirus (Covid-19). The
Soufan Center Cipher Brief. Accessed March 18, 2021, from https://www.thecipherbrief.com/
column_article/white-supremacists-and-the-weaponization-of-the-coronavirus-covid-19.
International Crisis Group (2017). Buddhism and State Power in Myanmar. Asia Report 290.
Accessed March 18, 2021, from https://www.crisisgroup.org/asia/south-east-asia/myanmar/290-
buddhism-and-state-power-myanmar.
Ivarsson, C. H. (2019). Lion’s Blood: Social Media, Everyday Nationalism and Anti-Muslim
Mobilisation Among Sinhala-Buddhist Youth. Contemporary South Asia, 27(2), 145–159.
[Crossref]
Jerryson, M. K. (2018). If You Meet the Buddha on The Road: Buddhism, Politics, and Violence.
Oxford: Oxford University Press.
[Crossref]
Kingston, J. (2017). Sri Lanka’s Firebrand Monk Invokes Muslim Menace. The Japan Times. June
17. Accessed March 18, 2021, from https://www.japantimes.co.jp/opinion/2017/06/17/commentary/
sri-lankas-firebrand-monk-invokes-muslim-menace/.
Koh, F. (2021a). 16-year-old Detained Under ISA for Planning Mosque Attacks to Receive
Religious, Psychological Counselling. The Straits Times. January 27. Accessed March 18, 2021, from
https://www.straitstimes.com/singapore/16-year-old-detained-under-isa-for-planning-mosque-
attacks-to-receive-religious.
Koh, F. (2021b). Rise of Right-Wing Extremism Here Worrying: Minister. The Straits Times. January
28. Accessed March 18, 2021, from https://www.straitstimes.com/singapore/rise-of-right-wing-
extremism-here-worrying-minister.
Lim, A. (2019). Political Movements Misusing and Abusing Religion: Academic. The Straits Times.
July 25. Accessed March 18, 2021, from https://www.straitstimes.com/singapore/political-
movements-misusing-and-abusing-religion-academic
Lim, M. Z. (2021). S’porean, 16, Held Under ISA for Plan to Attack Mosques. The Straits Times.
January 28. Accessed March 18, 2021, from https://www.straitstimes.com/singapore/sporean-16-
held-under-isa-for-plan-to-attack-mosques.
Mayaram, S. (2020). Why Flinging the Term ‘Corona Jihad at the Tablighi Jamaat Makes No Sense.
The Wire. April 2. Accessed March 18, 2021, from https://thewire.in/religion/using-corona-jihad-for-
the-tablighi-jamaat-makes-no-sense-besides-being-inflammatory.
Mohan, R. (2016). Indianise, Nationalise, Spiritualise: The RSS Education Project Is in Expansion
Mode. Scroll. August 30. Accessed March 18, 2021, from https://scroll.in/article/815049/indianise-
nationalise-spiritualise-the-rss-education-project-is-in-for-the-long-haul.
Moses, A.D. (2019). ‘White Genocide’ and the Ethics of Public Analysis. Journal of Genocide
Research, 21(2), 201–213.
[Crossref]
Neiwert, D. (2018). Alt-America: The Rise of the Radical Right in the Age of Trump. London and
New York: Verso.
Office of the International Religious Freedom (2019). 2019 Report on International Religious
Freedom: Sri Lanka. U.S. Department of State. Accessed March 18, 2021, from https://www.state.
gov/reports/2019-report-on-international-religious-freedom/sri-lanka/.
Pantucci, R. (2020). End of Al Qaeda Era? RSIS Commentary. December 3. Accessed March 18,
2021, from https://www.rsis.edu.sg/rsis-publication/icpvtr/end-of-al-qaeda-era/#.X9xPKOkzbdc.
Pantucci, R. and Ong, K. (2021). Persistence of Right-Wing Extremism and Terrorism in the West.
Counter Terrorist Trends and Analyses, 13(1), 118–126.
Patnaik, D. (2017). Did Arrival of Muslim Invaders A Thousand Years Ago Destroy Hindu Culture?
DailyO. June 1. Accessed March 18, 2021, from https://www.dailyo.in/variety/muslim-invaders-
hinduism-india-bharat-islam-christanity/story/1/17529.html.
Press Trust of India. (2013). Media Demonising Muslim Community: Markandey Katju. Times of
India. April 7. Accessed March 18, 2021, from https://timesofindia.indiatimes.com/india/Media-
demonising-Muslim-community-Markandey-Katju/articleshow/19429993.cms.
Rahmah, U. (2021). Indonesia. Counter Terrorist Trends and Analyses, 13(1), 14–21.
Rajagopalan, M. and Nazim, A. (2018). ‘We Had To stop Facebook’: When Anti-Muslim Violence
Goes Viral. Buzzfeed. April 7. Accessed March 18, 2021, from https://www.buzzfeednews.com/
article/meghara/we-had-to-stop-facebook-when-anti-muslim-violence-goes-viral.
Ramakrishna, K. (2017). London March 2017: ISIS “Weaponisation of Everyday Life”. RSIS
Commentary. March 27. Accessed March 18, 2021, from https://www.rsis.edu.sg/rsis-publication/
nssp/co17054-london-march-2017-isis-weaponisation-of-everyday-life/#.YFNdXEgzZTY.
Ramakrishna, K. (2019). The Easter Sunday Attacks: Struggle for the Soul of Sri Lankan Muslims.
RSIS Commentary. May 3. Accessed March 18, 2021, from https://www.rsis.edu.sg/rsis-publication/
nssp/the-easter-sunday-attacks-struggle-for-the-soul-of-sri-lankan-muslims/#.YDxw8pMzZ-U.
Ranawana, A. (2020). Gnanasara Thero Likely to Win Buddhist Monks’ Tussle Over National List
Seat. Economynext. August 8. Accessed March 18, 2021, from https://economynext.com/gnanasara-
thero-likely-to-win-buddhist-monks-tussle-over-national-list-seat-72772/.
Rita, S. (2020). Ansar Al Islam Militant Held. Dhaka Tribune. September 30. Accessed March 18,
2021, from https://www.dhakatribune.com/bangladesh/nation/2020/09/30/ansar-al-islam-militant-
held.
Schmid, A. P. (2014). Violent and Non-Violent Extremism: Two Sides of the Same Coin? The Hague:
International Center for Counterterrorism Research Paper.
Scroll. (2020). Muslims in India most content in the world, says RSS chief Mohan Bhagwat. Scroll.
October 10. Accessed March 18, 2021, from https://scroll.in/latest/975456/muslims-in-india-most-
content-in-the-world-says-rss-chief-mohan-bhagwat.
Shane, S. (2016). Saudis and Extremism: ‘Both the Arsonists and the Firefighters’. The New York
Times. August 26. Accessed March 18, 2021, from https://www.nytimes.com/2016/08/26/world/
middleeast/saudi-arabia-islam.html.
Sirilal, R. and Aneez, S. (2019). Sri Lanka Bans Group Suspected to Be Behind Attacks;
Ringleader’s Relatives Wounded. Reuters. April 27. Accessed March 18, 2021, from https://www.
reuters.com/article/us-sri-lanka-blasts-idUSKCN1S303Q
Siyech M. S. and Singam, K. V. (2021a). India. Counter Terrorist Trends and Analyses, 13(1), 63–69.
Siyech M. S. and Singam, K. V. (2021b). Maldives. Counter Terrorist Trends and Analyses, 13(1),
69–71.
Smith, M. (2020). For Myanmar’s Elections to Be Free and Fair Rohingya Must Get the Right to
Vote. Time. July 27. Accessed March 18, 2021, from https://time.com/5872096/myanmar-2020-
national-election-rohingya-vote/.
Soliev N. and Pantucci, R. (2021) Central Asia. Counter Terrorist Trends and Analyses, 13(1), 86–
94.
Spagat, E. (2019). Poway Killer Told 911 He Was ‘Defending Our Nation Against the Jewish
People’. The Times of Israel. September 20. Accessed March 18, 2021, from https://www.
timesofisrael.com/poway-killer-told-911-he-was-defending-our-nation-against-the-jewish-people/.
Subramaniam, S. (2020). How Hindu Supremacists Are Tearing India Apart. The Guardian. February
20. Accessed March 18, 2021, from https://www.theguardian.com/world/2020/feb/20/hindu-
supremacists-nationalism-tearing-india-apart-modi-bjp-rss-jnu-attacks.
Tan, A. and Ramakrishna, K. (eds.) (2002). The New Terrorism: Anatomy, Trends, and Counter-
Strategies. Singapore: Eastern Universities Press, 2002.
The Soufan Center (2019). White Supremacy Extremism: The Transnational Rise of the Violent White
Supremacist Movement. Accessed March 18, 2021, from https://thesoufancenter.org/wp-content/
uploads/2019/09/Report-by-The-Soufan-Center-White-Supremacy-Extremism-The-Transnational-
Rise-of-The-Violent-White-Supremacist-Movement.pdf.
Times of India. (2020). Facebook refused to remove anti-Muslim posts to not upset Modi govt: WSJ.
Times of India. August 17. Accessed March 18, 2021, from https://timesofindia.indiatimes.com/
blogs/foreign-media/facebook-refused-to-remove-anti-muslim-posts-to-not-upset-modi-govt-report/.
Wade, F. (2017). Myanmar’s Enemy Within: Buddhist Violence and the Making of a Muslim “Other”.
London: Zed Books.
Wagemakers, J. (2016). Salafism. Oxford Research Encyclopaedia: Religion. Accessed March 18,
2021, from https://oxfordre.com/religion/view/10.1093/acrefore/9780199340378.001.0001/acrefore-
9780199340378-e-255.
Walko, Z. (2016). Interview with Dilanthe Withanage. The Diplomat. Accessed March 18, 2021,
from https://thediplomat.com/2016/06/interview-with-dilanthe-withanage/.
Weismann, I. (2017). A Perverted Balance: Modern Salafism Between Reform and Jihad. Die Welt
Des Islams, 57(1), 33–66.
[Crossref]
Westerman, A. (2021). What Myanmar’s Coup Means for the Rohingya. NPR. February 11.
Accessed March 18, 2021, from https://www.npr.org/2021/02/11/966923582/what-myanmars-coup-
means-for-the-rohingya.
Wilson, J. (2019). White Supremacist Richard Spencer Makes Racist Slurs on Tape Leaked by Rival.
The Guardian. November 4. Accessed March 18, 2021, from https://www.theguardian.com/world/
2019/nov/04/white-supremacist-richard-spencer-racist-slurs-tape-milo-yiannopoulos.
Yeo, K. (2020). Are Philippines Militants Looking to Take Advantage of COVID-19? The Diplomat.
Accessed March 18, 2021, from https://thediplomat.com/2020/05/are-philippine-militants-looking-
to-take-advantage-of-covid-19/.
Yeo, K. (2021). Philippines. Counter Terrorist Trends and Analyses, 13(1), 21–29.
Zaru, D. (2021). The Symbols of Hate and Far-Right Extremism on Display in Pro-Trump Capitol
Siege. January 14. ABC News. Accessed March 18, 2021, from https://abcnews.go.com/US/symbols-
hate-extremism-display-pro-trump-capitol-siege/story?id=75177671.
Footnotes
1 Islamist ideology holds that “the primary Islamic texts (the Quran and hadith)” should be exploited
to provide the “blueprint for the creation of a state governed by Islamic law and the restoration of the
Caliphate” (Meleagrou-Hitchens 2018: 9). Extremist versions of Islamism legitimize the use of
violence including terrorism, to attain this objective.
Emmeline Taylor
Email: [email protected]
Abstract
Violence and aggression in shops can have far-reaching and devastating
consequences for shop workers, their customers and the communities that
they serve. At the time of writing, multiple indicators and sources from
police and industry demonstrate that the frequency and severity of violent
incidents in the retail sector have been increasing significantly across the
UK. This chapter outlines the main scenarios in which violence and abuse
are becoming prevalent: encountering shoplifters; enforcing legislation
relating to the sale of age-restricted goods and other prohibited sales; hate
motivated incidents, armed and unarmed robberies and, most recently,
upholding COVID-19 related rules and restrictions such as requiring
customers to wear a mask in store. An overview of the driving forces
behind the increase in attacks on shop workers is outlined alongside an
overview of the far-reaching and devastating consequences for shop
workers, their customers and the communities that they serve. Hundreds of
thousands of working hours are lost each year due to injuries—both
physical and mental—and many shop workers are now making the difficult
decision to leave a job that they once enjoyed. All too frequently, shop
workers are suffering physical injuries as well as chronic and life-changing
mental health consequences of violence such as long-term anxiety and post-
traumatic stress disorder (PTSD).
Introduction
In September 2020, CCTV footage of a woman smashing bottles of wine
from the shelves of a Co-operative supermarket made headline news across
England (YouTube 2020). Although shocking, many shop employees will
not have been surprised by the aggressive behaviour. At the time of writing,
multiple indicators and sources from police and industry demonstrate that
the frequency and severity of violent incidents in the retail sector have been
increasing significantly across the UK. For example, the British Retail
Consortium (BRC) (2020) estimated that there were more than 400
incidents every day in 2019; an increase of 9% on the previous year. This
chapter examines the circumstances in which assaults against shop staff
occur, identifying five common scenarios: encountering shop thieves;
enforcing legislation relating to the sale of age-restricted goods and other
prohibited sales; hate motivated incidents, armed and unarmed robberies
and, most recently, upholding COVID-19 related rules and restrictions such
as requesting that eligible customers wear a mask in store. Violence and
aggression in shops can have far-reaching and devastating consequences for
shop workers, their customers and the communities that they serve. This
chapter then turns to explore the ways in which violence towards shop
workers has—and can be—responded to. The approaches are divided into
three categories: security strategies, societal changes and legislative reform.
Encountering Shoplifters
Retail crime is high volume. In England and Wales, wholesale and retail
premises experienced an estimated 10.1 million crimes in 2018 (a
substantial increase on the 8.1 million estimated the previous year). The
year-on-year increases since 2015 have largely been driven by rises in theft
by customers. In 2018, 82% of the 10.1 million crime incidents were thefts
and, specifically, almost three-quarters (71%) of all incidents were theft by
customers. This equates to 7.1 million incidents of shop theft—more than
19,000 incidents a day. While this volume of offences is concerning, it is a
gross underestimate—one source calculates a more realistic figure to be 38
million shop theft offences per annum (Centre for Social Justice 2018). Yet,
it has been estimated that arrests for shoplifting fell by 17%, and the
number of perpetrators charged fell 25% in 2018 (Hemmings and Clark-
Neal 2018).
Individuals engaged in shop theft are increasingly using violence,
threats, intimidation and abuse directed at staff. Being challenged or
apprehended for shop theft is the number one trigger for violence and
verbal abuse in the retail sector—accounting for 25% of incidents (having
grown from 15% of incidents in 2016 to 21% in 2017) (Usdaw 2017). The
current high rates of shoplifting increase the likelihood of incidents in
which thieves become aggressive.
Drug addiction and acquisitive crime have always gone hand in hand.
Previous studies have estimated that between a third and a half of all
acquisitive crime is committed by offenders who use heroin, cocaine or
crack cocaine (MacDonald et al. 2005). More specifically, it has been
estimated that 70% of shop theft is committed by frequent users of these
drugs (Centre for Social Justice 2018). There is a strong relationship
between substance misuse, shop theft and the use of violence and
aggression by drug-affected offenders who are desperate not to be detained
because they are worried about beginning to withdraw from drugs while in
detention and unable to secure more drugs. This process, described as
‘rattling’ or ‘hanging’ by drug-affected offenders, is to be avoided at all
costs due to how unwell, mentally and physically, it makes users feel
(Taylor 2019). Offenders report that they will resort to violence if they think
it is the only option for them to escape and therefore avoid withdrawing
from drugs (Taylor 2019). Some drug-using offenders, particularly women
who feel that they would be unable to be physically threatening to male
security or staff members, self-report that they will threaten staff with a
‘dirty needle’ (a needle or sharp that has been used and therefore could
potentially be contaminated with infections that can be spread through
blood or bodily fluids, including hepatitis B, hepatitis C, and HIV) in order
to avoid apprehension for theft (Taylor 2019). This can be a particularly
scary ordeal for shop workers and security staff who do not know if the
threat is genuine or not. In similar terms, since the pandemic, there have
been reports that customers have deliberately coughed and sneezed at staff
(or threatened to) when they have asked customers to adhere to COVID-
related rules such as practising social distancing or wearing a mask (Usdaw
2020).
There have also been some legislative changes to how retail theft is
dealt with by the criminal justice system and this has arguably had an
impact on levels of shop theft, as well as the approach that offenders take.
The Anti-Social Behaviour, Crime and Policing Act 2014 (ASBCPA 2014)
made the theft of goods from a shop worth £200 or less (retail value) a
summary-only offence that would not be pursued by police (Home Office
2014). Instead, if caught, the offender can enter a plea via post (although
Home Office guidance stipulates that the ‘guilty plea by post’ is not
appropriate in cases involving aggravating factors such as violence, hate
motivated incidents or the possession of a weapon, it is possible with crime
committed in the retail sector that the emphasis on the value of goods may
obscure these other factors). The threshold was set at £200 because the data
at the time suggested that it captured the vast majority of cases heard in the
magistrates’ courts, as well as 80% of the much smaller number of cases
that go to the Crown Court. For example, research for the Sentencing
Advisory Panel in 2006 showed that 90% of cases of shop theft involved
property worth under £200. As such, the vast majority of perpetrators are
not required to attend court in person.
Following the introduction of the ASBCPA 2014, some forces
implemented their own assessment guidelines that effectively meant that
only the most serious retail crimes would be investigated. For example,
citing huge budget cuts amounting to £1 billion between 2010 and 2021, the
Metropolitan Police—the largest police force in the UK—advised in their
Crime Assessment Policy that they wouldn’t investigate any losses under
£50 in value unless a suspect was already identified. Despite these changes,
it is unclear to the extent to which the law has changed how forces respond
to reports of shop theft in real terms but it is clear that they
disproportionately impact some retailers more than others. Stores that sell
fast-moving consumer goods (FMCGs), such as packaged foods, beverages
(including alcohol), toiletries, over-the-counter drugs and other
consumables, are more likely to suffer low-value high-volume thefts.
The Home Office CVS (2018) found that food and grocery items were
most commonly stolen in theft incidents; nearly a third (30%) of all
shoplifting incidents involved food and grocery items in 2017. Just over a
half (53%) reported that the food and grocery items stolen were typically
low-value items such as milk or bread. As such, not only are shops such as
supermarkets and convenience stores suffering a much higher volume of
incidents; they are also far less likely to receive a police response to reports
of theft than shops that stock higher value durable goods. Offenders report
being acutely aware of the current legislation and say that they feel that they
can now steal with impunity so long as they do not surpass the values
stipulated in legislation and police guidance (Taylor 2019). This is an
important development since, prior to the onset of COVID-19, the most
frequent trigger for violent assaults on shop workers was encountering a
shop thief.
Rebecca was 21 years old at the time the offence took place. She
had been working on the shop floor when a guy in his thirties came
in and picked her up by her jacket. He then pulled her by her hair
down one of the aisles to the office where he demanded that she
emptied the safe. He then went back to the front of the store,
threatened the girl behind the till and ripped the cash drawers out
before leaving. Rebecca was in a very bad way. She was very
shaken up. She tried to carry on for two weeks but then she handed
in her notice. The GP diagnosed PTSD and she’s not been able to
work since. She’s on medication and is just stuck at home. I know
she’s accessing counselling and she said it’s really helping her but
she’s still too scared to leave the house. (Store Manager of a
supermarket cited in Taylor 2019)
Legislative Reform
In addition to industry-led initiatives such as the Co-op’s Safer Colleagues,
Safer Communities campaign and Usdaw’s Freedom from Fear annual
survey, there have also been repeated calls for the Government to introduce
legislation that would increase the penalties for offenders if they assault a
shop worker who is fulfilling their duty to uphold the law, such as refusing
underage sales. Following the increase in the frequency and severity of
assaults against shop workers, the Assaults on Retail Workers (Offences)
Bill 2019–2021 was introduced to parliament in September 2020. The Bill
proposed to make certain offences, including malicious wounding, grievous
or actual bodily harm and common assault, aggravated when perpetrated
against a retail worker in the course of their employment. Despite
unanimity across industry bodies that legislation is needed to protect the
three million individuals that work in the retail sector, the government
rejected the calls, stating that ‘it remains unpersuaded of the need for a
specific offence’ (UK Government and Parliament 2020). Whereas, in
Scotland, the issue has been responded to with the passing of The
Protection of Workers (Retail and Age-restricted Goods and Services)
(Scotland) Bill by a unanimous vote, becoming an Act in February 2021.
The law makes it a specific offence to assault, threaten or abuse retail
workers, particularly when the worker is applying an age restriction (e.g.
asking for proof of age from someone trying to buy alcohol).
It is not yet clear whether the legislation will deter offenders from
becoming violent and abusive towards shop workers. According to von
Hirsch et al. (1999), there are five logical conditions which must exist
before an increase in the severity of criminal penalties can work as a
deterrent:
Potential offenders must realise sentence levels have increased
Potential offenders must think about heavier sentence levels when
contemplating their offences
Potential offenders must believe they have at least a reasonable chance of
being caught
Potential offenders must believe that if caught the heavier sentencing
policy will be applied to them
Potential offenders must be prepared to desist where (i–iv) are present.
There are additional concerns that can be added to this list. For
example, potential offenders must believe they have at least a reasonable
chance of being prosecuted if they are indeed caught and of course, they
must be so minded as to want to avoid a lengthier sentence. While this
might seem like an obvious stance, some offenders report deliberately
returning to prison for respite or to get medical attention for an ongoing
health issue (Taylor 2017, 2021).
It is well-documented that crimes committed in the retail sector often go
unreported. As outlined above, according to the Home Office 2018
Commercial Victimisation Survey (CVS) reporting rates remain low across
the different categories of crime. With so many crimes not being reported, it
would be a reasonable supposition for offenders to think that the chance of
them being apprehended and charged was slim. Furthermore, without
treatment for drug-affected offenders, it is highly unlikely that they would
be prepared to desist from crime. Prolific and drug-affected thieves report
that they will use any means necessary to avoid apprehension, including
serious violence. Of the few cases that are prosecuted and proceed to court,
prolific retail offenders describe receiving sentences that do nothing to
address the underlying reasons for their offending behaviour (Taylor 2021).
In particular, drug-affected offenders report a string of short custodial
sentences (less than six months) with no rehabilitation component. It is
clear that the way in which the criminal justice system responds to crime in
the retail sector requires significant and urgent change. Although it is
unlikely that introducing a specific offence for assaults on shop workers
will deter the bulk of offenders, it may provide an opportunity to undertake
meaningful work with prolific retail criminals through deferred sentencing
(see Taylor 2021). Using legal leverage could potentially improve the
likelihood of compliance with treatment services and secure long-term
change in an offender’s patterns of behaviour. More research is required to
understand the impact of the legislation on patterns of offending and if it
does deter some offenders.
Societal Changes
No crime happens in a vacuum. There are long-established key drivers of
crime including drug and alcohol abuse, the crime-inducing impact of
unemployment and income inequality (e.g. Fajnzylber et al. 2002) and a
lack of ‘social capital’ (e.g. DiIulio 1996). Violence towards shop workers
is part of a broader trend of increasing violence across England and Wales.
The police recorded 1.4 million ‘violence against the person’ offences in the
year ending March 2018; an increase of 19% compared with the previous
year (1.1 m offences) (Office for National Statistics 2019). Police-recorded
homicides have increased by 37% since 2014, following downward trends
during the previous decade (Home Affairs Committee 2019), and knife
crime has increased by 71% between 2014 and 2018. The number of
murder victims aged 16 to 24 rose by 45% in the year to March 2018
leading The Home Affairs Committee (2019) to describe youth violence as
a ‘national emergency’.
The reasons for the dramatic increase in violent crime in recent years
are not yet fully understood. The underlying causes of violence and verbal
abuse in society are multiple and complex with contributing factors
identifiable from individual (e.g. mental health, substance misuse) to
societal levels (e.g. social inequality, unemployment) and they are often
interrelated. For example, the impact of living in poverty can exacerbate
mental health problems and, in turn, result in unemployment and/or
substance misuse. What is clear, however, is that dramatic cuts in public
spending have resulted in devastating consequences for some of the most
disadvantaged and vulnerable individuals and communities across England
and Wales. A recent parliamentary inquiry directly linked prolonged
austerity measures to increasing rates of violent crime. Between 2010 and
2015, local authority budgets were cut by £18 billion, with youth services,
social care, early intervention and housing services particularly affected
(Neville 2015). In conjunction with cuts to social investment across
England and Wales, currently, an ineffective and inappropriate criminal
justice response to retail crime in all its forms is perpetuating criminal
activity.
Funding cuts have been extensive and wide-ranging and include social
services provision that is known to prevent or tackle criminal behaviour,
including youth services and early intervention programs, drug and alcohol
treatment services, mental health provision and education. This signals the
need for concerted government action to invest in preventative measures,
with enhanced interventions to support the communities most at risk of
violence.
Conclusion
Shop workers have become major targets of workplace violence. They
frequently encounter people who are heavily intoxicated, drug-affected,
suffering mental health issues, on their way to or returning from stressful
jobs and long commutes, and those who are intent on stealing and getting
away with it.
The current lack of law enforcement in concert with legislative changes
has created a fertile ground for retail crime to flourish. Violent and verbally
abusive customers are becoming more commonplace as shop workers find
themselves increasingly duty-bound to uphold government regulations such
as age-related sales, COVID-19 rules and policies brought in by their
employers for well-intended reasons but that can create ‘flash points’ for
abuse to occur, for example, age limits for the purchase of ‘energy drinks’.
In addition, thieves are becoming more prolific and more brazen as they
calculate the risk of formal apprehension and punishment to be virtually
non-existent which creates a dangerous situation as shop workers encounter
them more frequently. It has been estimated that the current average risk of
being caught for a shop theft is around 1 in 500 (Centre for Social Justice
2018) which some offenders interpret as ‘a licence to steal’ (Taylor 2019).
Retailers are responding with security technologies that, anecdotally, are
producing positive outcomes. Some of the examples of this include body-
worn cameras for customer-facing staff and headsets so that employees can
quickly communicate with one another and security personnel. These
technologies have yet to be independently evaluated, but there is research to
indicate that body-worn cameras, for example, can have a ‘civilizing effect’
(White 2014) on otherwise heated interpersonal interactions. Much more
research is needed and in particular a review of what works and in what
contexts to prevent and deescalate aggressive and potentially violent
incidents. Alongside security solutions, it is, however, important to focus
energies on the root causes of violence, not just the symptoms. The factors
that contribute to violent incidences—whether they are factors of attitude
and behaviour or related to larger social, economic, political and cultural
conditions—can be changed. Only by doing this will we be able to break
the cycle of violence and reduce the impact that it has on individuals, their
families and our communities.
Recommend Readings
There is very little published academic research on the issue of violence and
verbal abuse towards shop workers. Much of the data and analysis stems
from industry publications. The British Retail Consortium (BRC) and the
Association of Convenience Stores (ACS) both publish annual crime
reports which include levels of abuse towards sop staff. The Home Office
run an annual Commercial Victimisation Survey (CVS) (paused during
2019 while a review was undertaken to assess user needs and then delayed
due to the COVID-19 pandemic) which will include questions specifically
on violence in the next iteration. The union, Usdaw, run an annual survey of
their nearly 400,000 members as part of the Freedom from Fear campaign.
The report, It’s Not Part of the Job (Taylor 2019), was published in 2018
and documents the experiences of shop workers in relation to violence as
well as providing insights into the triggers for violent altercations. The
research underpinning the report was based on interviews with victims and
offenders.
References
ACS (2020) The Crime Report 2020. Available at: https://www.acs.org.uk/sites/default/files/acs_
crime_report_2020_online_versionb_spreads.pdf (accessed 20 April 2021).
Acierno, R., Kilpatrick, D. G., and Resnick, H. S. (1999) ‘Posttraumatic stress disorder: Prevalence,
risk factors and comorbidity relative to criminal victimization’, In P. Saigh and D. Bremner (Eds.),
Posttraumatic stress disorder: A comprehensive approach to research and treatment (pp. 44–68).
New York: Allyn and Bacon.
BBC News (2020) Coronavirus: Assaults on police officers rise in lockdown. Available at: https://
www.bbc.co.uk/news/uk-england-54048764 (accessed 6 June 2021).
Beck, A. (2011) ‘Self-scan checkouts and retail loss: Understanding the risk and minimising the
threat’, Security Journal, 24(3): 199–215.
[Crossref]
Borzycki, M., and Fuller, G. (2014) ‘Armed robbery in Australia 2009–2010: National armed
robbery monitoring program report’, Monitoring Report No. 22. Canberra, Australia: Australian
Institute of Criminology.
British Retail Consortium (2020) 2020 Retail Crime Survey. Available at: https://brc.org.uk/news/
corporate-affairs/violence-and-abuse-against-shop-workers-spirals/ (accessed 20 April 2021).
Centre for Social Justice (CSJ) (2018) Desperate for a fix: Using shop theft and a second chance
programme to get tough on the causes of prolific drug-addicted offending. https://www.
centreforsocialjustice.org.uk/library/desperate-for-a-fix-using-shop-theft-and-a-second-chance-
programme-to-get-tough-on-the-causes-of-prolific-drug-addicted-offending.
Clarke, R. V. G. (1980). ‘Situational crime prevention: Theory and practice’, British Journal of
Criminology, 20(1), 136–147.
[Crossref]
Clayton, A. (2021) ‘Spat on, cussed out, assaulted: How Covid is endangering security officers’, The
Guardian. Available at: https://www.theguardian.com/us-news/2021/mar/01/security-officers-covid-
19-california-dangers (accessed 6 June 2021).
Cornish, D. B., and Clarke, R. V. (2003) ‘Opportunities, precipitators and criminal decisions: A reply
to Wortley’s critique of situational crime prevention’, In: M. J. Smith and D. B. Cornish (Eds.),
Theory for practice in situational crime prevention, crime prevention studies, Vol. 16. Monsey:
Criminal Justice Press.
DiIulio Jr., J. J. (1996) ‘Help wanted: Economists, crime and public policy’, Journal of Economic
Perspectives, 10, 3–24.
[Crossref]
Elklit, A. (2002) ‘Acute Stress Disorder in Victims of Robbery and Victims of Assault’, Journal of
Interpersonal Violence, 17(8), 872–887.
[Crossref]
Fajnzylber, P., Lederman, D., and Loayza, N. (2002) ‘What causes violent crime?’, European
Economic Review, 46, 1323–1357.
[Crossref]
Gill, M. (2000) Commercial robbery: Offenders’ perspectives on security and crime prevention.
London: Blackstone Press.
Hemmings, C., and Clark-Neal, D. (2018, September 14) ‘Shoplifters and a law that doesn’t deter
them’, BBC News. Available at: https://www.bbc.co.uk/news/uk-45512468 (accessed 20 April 2021).
Home Affairs Committee (2019, July) Serious youth violence (Sixteenth report of session 2017–
2019). House of Commons.
Home Office (2014) Guidance: Implementing section 176 of the anti-social behaviour, crime and
policing act 2014: Low-value shoplifting. Guidance for police in England and Wales. https://www.
gov.uk/government/publications/low-value-shoplifting-guidance-for-police.
Home Office (2018) Hate crime, England and Wales, 2017/18. Statistical Bulletin 20/18.
Home Office (2019) Crime against businesses: Findings from the 2018 commercial victimisation
survey. Statistical Bulletin 17/19. Available at: https://assets.publishing.service.gov.uk/government/
uploads/system/uploads/attachment_data/file/829399/crime-against-businesses-2018-hosb1719.pdf
(accessed 20 April 2021).
HMICFRS (2018) Understanding the difference: The initial police response to hate crime. Available
at: https://www.justiceinspectorates.gov.uk/hmicfrs (accessed 13 June 2021).
MacDonald, Z. Tinsley, L., Collingwood, J., Jamieson, P., and Pudney, S. (2005) Measuring the harm
from illegal drugs using the drug harm index. Home Office Online Report 24/05.
Mosendz, P., Bhasin, K., and Melin, A. (2021) ‘Security guards face the hazardous job of enforcing
Covid rules’, Bloomberg Business Week. Available at: https://www.bloomberg.com/news/features/
2021-03-02/security-guards-new-covid-pandemic-duty-mask-enforcement (accessed 6 June 2021).
Neville, S. (2015) Austerity’s £18bn impact on local services. Financial Times. https://www.ft.com/
content/5fcbd0c4-2948-11e5-8db8-c033edba8a6e.
Office for National Statistics (ONS) (2017) Offences involving the use of weapons. Available at:
https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/compendium/
focusonviolentcrimeandsexualoffences/yearendingmarch2016/offencesinvolvingtheuseofweapons
(accessed 12 June 2021).
Office for National Statistics (2019) The nature of violent crime in England and Wales: Year ending
March 2018. Available at: https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/
articles/thenatureofviolentcrimeinenglandandwales/yearendingmarch2018 (accessed 5 May 2021).
Repetto, T. A. (1976) ‘Crime prevention and the displacement phenomenon’, Crime and
Delinquency, 22(2), 166–177.
[Crossref]
Schweppe, J. (2021) ‘What is a hate crime?’, Cogent Social Sciences, 7(1), 1–15.
[Crossref]
Taylor, E. (2014) ‘Honour among thieves? How morality and rationality influence the decision-
making processes of convicted domestic burglars’, Criminology & Criminal Justice, 14(4), 487–502.
[Crossref]
Taylor, E. (2016) ‘Supermarket self-checkouts and retail theft: The curious case of the SWIPERS’,
Criminology & Criminal Justice.
Taylor, E. (2017) ‘On the edge of reason? Armed robbery, affective transgression, and bounded
rationality’, Deviant Behavior, 38(8): 928–940.
[Crossref]
Taylor, E. (2019) ‘It’s not part of the job’: Violence and verbal abuse towards shop workers.
Manchester: The Co-op. Available at: https://assets.ctfassets.net/5ywmq66472jr/
22QfMejeWYbimJ9ykX9W9h/0e99f15c0ed24c16ab74d38b42d5129a/It_s_not_part_of_the_job_
report.pdf (accessed 29 April 2021).
Taylor, E. (2021) Breaking the cycle: Gaining the views of criminal justice practitioners and retail
offenders on effective sentencing. Manchester: The Co-op.
Travis, A. (2017) ‘Hate crime surged in England and Wales after terrorist attacks’, The Guardian.
17th October 2017. Available at: https://www.theguardian.com/uk-news/2017/oct/17/hate-soars-in-
england-and-wales (accessed 12 June 2021).
UK Government and Parliament (2020) Government response to the ‘protect retail workers from
abuse, threats and violence’ petition. https://petition.parliament.uk/petitions/328621.
Usdaw (2017) Freedom from fear: Shopworkers at the sharp end as violence is on the increase.
Usdaw (2018) Freedom from Fear: The True Scale of the Issue and the Under-reporting Problem.
Available at: http://www.usdaw.org.uk/2018FFFReport (accessed: 23 March 2022).
Usdaw (2020) The impact of coronavirus on the workforce. Available at: https://www.usdaw.org.uk/
CMSPages/GetFile.aspx?guid=575d4419-a739-432b-ab54-10e84ad56e26 (accessed 20 April 2021).
Usdaw (2021) Campaign to end violence and abuse against retail workers: Survey results 2020.
Available at: https://www.usdaw.org.uk/CMSPages/GetFile.aspx?guid=630d6f8e-73df-4ca2-a923-
7f1251381614 (accessed 29 April 2021).
von Hirsch, A., Bottoms, A. E., Burney, E., and Wikstrom, P. O. (1999) Criminal deterrence and
sentencing severity. London: Hart Publishing.
White, M. (2014) Police Officer Body-Worn Cameras: Assessing the Evidence. Office of
Community: Oriented Policing Services.
YouTube (2020) Available at: https://www.youtube.com/watch?v=2J92Pw06Bl0 (accessed 25 April
2021).
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_10
James D. Calder
Email: [email protected]
Abstract
In the United States, perhaps elsewhere, burglary is the second most
frequently occurring major crime after theft. Burglars prey on households
and businesses, leaving behind victims and lost property rarely recovered.
In the past 25 years, burglary rates have dropped dramatically in Western-
law nations significantly attributable to effective crime prevention and
security measures. Community initiatives have contributed to the
implementation of some of these measures. This chapter suggests that even
more rate reductions can be achieved by conceptualizing and developing
the community security function (CSFs) as a learning organization.
Burglars learn from experiences, successes and challenges, and research.
Communities also learn (and can learn more) from information
disseminated in many forms. CSFs exist more often in concept than reality.
Formalization of CSFs as proactively critical and learned resources for
further reducing burglary rates must rely on new research findings.
Discussion is limited to summarizing selected recent research findings on
burglars as crime workers who apply skills intentionally focused on
counteracting security and prevention strategies. CSFs can benefit from an
equally intensive focus on learning from what burglars are thinking and the
actions and methods of prevention.
Introduction
Successful burglaries represent failures of the community security function
(CSF). Burglars target, attack, steal from, and fence valuables from
communities and structures. Burglary events begin with breaking into and
entering a building or structure with the intent to commit a felony or
misdemeanor. Burglars prey on residential and commercial locations. They
prefer isolated weakly defended targets without any capable guardians
(Lentzner 1979; Mawby 2014; Morgan and Truman 2020). Victims react
with befuddlement, fear, and/or justifiable embarrassment. Police are
frequently ambivalent. Property is rarely recovered. Learning, proactive
interventions, and technologies have contributed to burglary’s decline
(Farrell 2013; Tseloni et al. 2017). Remaining, however, are millions of
unreported, reported, and unsolved events (Berman 2000; Federal Bureau of
Investigation 2020; Office of National Statistics, UK 2020; Australian
Bureau of Criminal Statistics 2021). Burglary’s historical roots parallel
human history. Playwright, actor, and poet, William Shakespeare, was
obsessed with burglary and theft, bothered more by betrayals of trust than
methods of evildoers (Dubrow 1999). ‘Housebreaking’ was at one time a
hanging offense in the U.S. Beginning in the late eighteenth century;
however, state laws reduced punishments to prison terms depending on the
facts (Friedman 1993, 308).
This chapter focuses on the CSF, currently a largely unrecognized
community resource randomly available and only loosely formed as a
collection of actual and potential victims, nearby neighbors, bystanders and
witnesses, community organizations and partnerships (Prenzler 2009),
police patrol personnel, security providers, business operators, religious
groups, insurance representatives, and others. As such, CSFs are more
concept than reality since they exist but generally do not function in a
wholistic fashion. I propose greater formalization of CSFs mostly through
the creation of voluntary but publicly recognized organizations with
leadership, representative structure, and broad participation by every
community element focused on burglary-specific initiatives. Formalization
of CSFs places burglary prevention among other top priorities in local
public policy. Principal missions would focus on gathering, retaining, and
sharing information about every aspect of a local burglary problem,
intensive community education in burglary prevention, and evolution over
time as a learning organization. Of necessity, this chapter is limited to
summarizing foundational advanced research findings in aid of CSF
stepwise growth in their learning processes. Developmental dimensions of
CSFs must await further exploration.
The term ‘security function’ is borrowed from organizational theorist
Henri Fayol, an early twentieth-century engineer concerned with worker
safety and security in the French mining industry (Fayol and Storrs 1916;
Peaucelle and Guthrie 2016). Fayol viewed the safety and security of mine
workers as essential to industrial productivity. Fayol’s concept finds
application in developing community security functions as learning
organizations. Core elements of learning about burglary are found in recent
research concerning burglar thoughts and conduct, burglar targeting
decisions, and assessments of prevention efforts. Strengthened by learned
insights from research findings, combined with organized collaboration and
leadership, CSFs can improve crime prevention capacity. As Peaucelle and
Guthrie (2016) noted, Fayol’s ‘security function’ significantly reduced
deaths and injuries in mines, thus expanding an industrial ‘security culture’.
Summing Up
Burglary has declined across the Western world. This was not by accident
or luck. Community security functions, as defined here, contributed an
unmeasured portion to this achievement. CSFs exist, but remain informal
and almost ghostlike in their relatively unfocused and randomly
collaborative associations. To their credit, however, they have learned over
time evidenced by their slow, even snail-like implementation of community
and individual security responses. More work is needed. Burglary is a crime
against communities, not simply a crime against residential and commercial
victims. Successful burglars assess community environments, assess targets
worth invading, surveil structural and neighborhood features, accommodate
security defenses, plan entry and exit strategies, and make go-no-go
decisions. Burglars are walking encyclopedias of information. They learn
and retain information from their work.
CSFs have also learned from victimization experiences and they have
implemented responses based on that learning. The argument here is that
they could be far more effective in lowering burglary rates if they were far
more organized, directed, and invested with a continuous flow of the most
recent research findings. As such, they can evolve as learning organizations
capable of maintaining a consistent, well-informed counterforce against
burglary events. For now, however, the operational specifics of operational
CSFs must remain for others to invent and develop. Formalization of the
concept will require investment of collaborative effort and building of a
more focused and sustained culture of learning and application.
What have we learned and suggested from the recent research on
burglary?
Burglars vary in perceived benefits from their work. Burglars operate in a
marketplace of valuations.
Burglars succeed and fail. Expertise ranges. CSTs can learn from
successes and failures.
CSFs can learn burglar behaviors and strategies with the same intensity
as burglars.
Burglars are relatively consistent in burglary executions over time.
Burglars are typically short-range predators. Neighborhood conditions
and features they consider are useful intelligence for CSF defense
planning.
Circumstances change causing changes in burglar decision-making. CSF
defensive countermeasures and risk assessments must also change.
Security afforded by gated residential communities may overlook
important vulnerabilities.
Some neighboring businesses may introduce crime attractors, all valuable
intelligence for CSFs.
Burglars have slim pickings in communities encountering elevated job
loss since guardianship is elevated.
Better pickings are found at abandoned and empty homes since capable
guardians and security provisions are disconnected or absent.
Bureaucratic and political declarations of crime prevention successes
must be critically examined.
Willingness to pay for efforts to control burglary rates is a critical issue
for CSFs to address. Community resistance may be countered by open
discussions of grounded evidence of elevated community security and
types of low-cost security defenses.
Alarms and CCTV systems contribute to identification and deterrence of
burglars; some findings raise questions about worthiness under certain
conditions.
Burglars known as ‘optimal foragers’ can be countered by intelligence
sharing of tracking strategies and analysis. CSF coordination with police
patrol plans can undermine repeat events.
Mining, summarizing, and disseminating research findings on repeat and
near-repeat burglaries can be highly valuable to CSF training.
CSFs should rate highly burglary reduction efforts to protect facilities
housing elderly and special populations.
Nee et al. (2019) offer a perfectly reasonable parting thought: “law-
abiding citizens are notoriously poor at understanding burglary risk and/or
the opportunities for crime they leave inside and outside their homes and
around their communities because they lack the schematic knowledge of the
burglar. Given the low clearance rates, previous attempts at education of
householders to reduce risk and opportunity have perhaps reached a ceiling
in effectiveness” (p. 503). CSFs offer a new and publicly supported
opportunity to conceptualize and innovate new levels of countermeasures
for even more reductions in burglary rates in Western-law nations.
Recommended Readings
Discussions relevant to learning organizations in the public sector are
relatively new and found mainly in recent texts in American public
administration, such as Shafritz et al. (2017) and Chilton et al. (2019).
Private sector literature is plentiful in the area of organizational
development: Senge (2006), Marquart (2011), Pollitt and Bouckaert (2011),
Leddin and Moon (2018). I recommend classic ethnographic research on
burglar lifestyles such as Cromwell (2006 [1991]), Wright and Decker
(1994) before diving into advanced scholarly works. Some literature
presents realistic perspectives pointing to inconvenient topics such as
citizen responsibility for portions of the burglary problem (Lentzner 1979),
realities of risk and crime (Beck 1992), critical evaluation of political and
administrative claims of successful crime prevention programs (Hope
2004), and problems associated with citizen willingness to pay for security
improvements (Cohen et al. 2006). Venturing into the more advanced
contemporary literature on crime prevention is best launched from catalytic
readings of Cornish and Clarke (1986), Garafalo and Clark (1992), Clarke
(1995), Felson and Boba (2010), Ekblom and Tilley (2000), and Farrell
(2013). The burglar targeting literature is massive and thus a good sample
for those unfamiliar with it should include Coupe and Blake (2006),
Addington and Rennison (2015), Brown (2015), and Vandiviver and
Bernasco (2020).
References
Addington, L.A., and Rennison, C.M. (2015). Keeping the Barbarians Outside the Gate? Comparing
Burglary Victimization in Gated and Non-gated Communities. Justice Quarterly, 32(1), 168–192.
Australian Bureau of Statistics (2021). Victimization Rates, Selected Crimes. Melbourne, AU:
Commonwealth of Australia. https://www.abs.gov.au/statistics/people/crime-and-justice/crime-
victimisation-australia/latest-release
Batvinis, R.J. (2007). The Origins of FBI Counterintelligence. Lawrence, KS: University of Kansas
Press.
Beck, U. (1992). Risk Society: Towards a New Modernity. Los Angeles, CA: SAGE.
Berman, H.J. (2000). The Western Legal Tradition in a Millennial Perspective: Past and Future.
Louisiana Law Journal, 60(3), 739–763.
Brown, B.B., and Bentley, D.L. (1993). Residential Burglars Judge Risk: The Role of Territoriality.
Journal of Environmental Psychology, 13, 51–61.
Brown, R. (2015). Explaining the Property Crime Drop: The Offender Perspective. Trends & Issues
in Crime & Criminal Justice, 495, 1–7.
Calder, J.D. (2010). Frank Wills: The Lone Security Guard and a Constitutional Crisis: Fifteen
Minutes of Fame. Journal of Applied Security Research, 5(2), 228–233.
Calder, J.D. (2013). Between Brain and State: Herbert C. Hoover, George W. Wickersham, and the
Commission that Grounded Social Scientific Investigations of American Crime and Justice, 1929–
1931 and Beyond. Marquette Law Review, 96(4), 1035–1108.
Chamberlain, A.W., and Boggess, L.N. (2016). Relative Difference and Burglary Location: Can
Ecological Characteristics of a Burglar’s Home Neighborhood Predict Offense Location? The
Journal of Research in Crime and Delinquency, 53(6), 872–906.
Chilton, B.S., King, S.M., Foyou, V.E., and McDonald, J.S. (2019). The Public Administration
Profession: Policy, Management, and Ethics. New York: Routledge.
Christensen, T., and Laegreid, P. (2016). Transcending New Public Management: The
Transformation of Public Sector Reforms. New York: Routledge.
Clarke, R.V. (1995). Situational Crime Prevention. Crime and Justice, Vol. 19, Building a Safer
Society: Strategic Approaches to Crime Prevention. Chicago: University of Chicago Press.
Cohen, M.A., Rust, R.T., Steen, S., and Tidd, S.T. (2006). Willingness-to-Pay for Crime Control
Programs. Criminology, 42(1), 89–110.
Cornish, D., and Clarke, R. (1986). The Reasoning Criminal. New York: Springer-Verlag.
Coupe, T., and Blake, L. (2006). Daylight and Darkness Targeting Strategies and the Risks of Being
Seen at Residential Burglaries. Criminology, 44(2), 431–464.
Coupe, T., and Fox, B.H. (2015). A Risky Business: How Do Access, Exposure and Guardians
Affect the Chances of Non-residential Burglars Being Seen? Security Journal, 28(1), 71–92.
Coupe, T., and Kaur, S. (2005). The Role of Alarms and CCTV in Detecting Non-residential
Burglary. Security Journal, 18(2), 53–72.
Cromwell, P. (2006 [1991]). In Their Own Words: Criminals on Crime, An Anthology. Los Angeles:
Roxbury.
Cunningham, D. (2004). There’s Something Happening Here: The New Left, the Klan and FBI
Counterintelligence. Berkley, CA: University of California Press.
D’Alessio, S.J., Eitle, D., and Stolzenberg, L. (2012). Unemployment, Guardianship, and Weekday
Residential Burglary. Justice Quarterly, 29(6), 919–932.
Denhardt, R.B. (2011). Theories of Public Organization (6th ed.). Boston, MA: Wadsworth Cengage
Learning.
Dubrow, H. (1999). Shakespeare and Domestic Loss: Forces of Depravation, Mourning, and
Recuperation. Cambridge, UK: Cambridge University Press.
Ekblom, P., and Tilley, N. (2000). Going Equipped: Criminology, Situational Crime Prevention and
the Resourceful Offender. The British Journal of Criminology, 40(3), 376–398.
Farrell, G. (2013). Five Tests for a Theory of the Crime Drop. Crime Science, 2(5), 1–8.
Farrell, G., Tilley, N., and Tseloni, A. (2014). Why the Crime Drop? Crime and Justice, 43(1), 421–
490.
Fayol, H., and Storrs, C. (1916, tr. 2013). General and Industrial Management. London, UK:
Martino Fine Books.
Federal Bureau of Investigation (2020). Crime in the United States, 2019. Washington, DC: FBI.
Felson, M., and Boba, R. (2010). Crime and Everyday Life (4th ed.). Los Angeles, CA: SAGE.
Fielding, M., and Jones, V. (2012). ‘Disrupting the Optimal Forager’: Predictive Risk Mapping and
Domestic Burglary Reduction in Trafford, Greater Manchester. International Journal of Police
Science & Management, 14(1), 30–41.
Friedman, L.M. (1993). Crime and Punishment in American History. New York: Basic Books.
Fox, B.H., and Farrington, D.P. (2016). Behavioral Consistency Among Serial Burglars: Evaluating
Offense Style Specialization Using Three Analytical Approaches. Crime & Delinquency, 62(9),
1123–1156.
Garafalo, J., and Clark, D. (1992). Guardianship and Residential Burglary. Justice Quarterly, 9(3),
443–463.
Getha-Taylor, H. (2008). Learning Indicators and Collaborative Capacity: Applying Action Learning
Principles to the U.S. Department of Homeland Security. Public Administration Quarterly, 32(2),
125–146.
Girard, P.J. (1960). Burglary Trends and Protection. Journal of Criminal Law and Criminology,
50(5), 511–518.
Groff, E., and Taniguchi, T. (2019). Quantifying Crime Prevention Potential of Near-repeat Burglary.
Police Quarterly, 22(3), 330–359.
Hinkle, J.C. (2013). The Relationship Between Disorder, Perceived Risk, and Collective Efficacy: A
Look Into the Indirect Pathways of the Broken Windows Thesis. Criminal Justice Studies, 26(4),
408–432.
Hinkle, J.C., and Weisburd, D. (2008). The Irony of Broken Windows Policing: A Micro-place Study
of the Relationship Between Disorder, Focused Police Crackdowns and Fear of Crime. Journal of
Criminal Justice, 36(6), 503–512.
Hope, T. (2004). Pretend It Works: Evidence and Governance in the Evaluation of the Reducing
Burglary Initiative. Criminal Justice, 4(3), 287–308.
Jones, R.W., and Pridemore, W.A. (2016). A Longitudinal Study of the Impact of Home Vacancy on
Robbery and Burglary Rates During the U.S. Housing Crisis, 2005–2009. Crime & Delinquency,
62(9), 1159–1179.
Kelling, G.L., Dieckman, D., and Brown, C.E. (1974). The Kansas City Preventive Patrol
Experiment: A Summary Report. Arlington, VA: National Police Foundation.
Layton, J., and Chandler, N. (2021). 10 Largest Diamond Heists. Howstuffworks. https://people.
howstuffworks.com/five-largest-diamond-heists.htm
Leddin, P., and Moon, D. (2018). Building a Winning Culture in Government: A Blueprint for
Delivering Success in the Public Sector. Salt Lake City, UT: FranklinCovey.
Lee, H.C., Lee, A.H., Clinton, M., Zhang, G., and Fraser, M.L. (2008). Protecting Older People from
Burglary: Prevalence of Security Devices in the Homes of Older Adults in Perth, Western Australia.
Journal of Housing for the Elderly, 22(4), 335–347.
Lentzner, H.R. (1979). The Cost of Negligence: Losses from Preventable Household Burglaries.
Washington, DC: U.S. Department of Justice, Law Enforcement Assistance Administration.
Makinen, K. (2005). Expansive Security in a Learning Organisation: The Experience of the Finnish
Ministry of Defence. Security Journal, 18(3), 71–81.
Marquart, M.J. (2011). Building the Learning Organization: Achieving Strategic Advantage Through
a Commitment to Learning (3rd ed.). Boston, MA: Nicholas Brealey Publishing.
Mawby, R.I. (2014). Commercial Burglary, in Gill, M. (ed.) The Handbook of Security (2nd ed.).
London: Palgrave Macmillan, 279–301.
Medsger, B. (2014). The Burglary: The Discovery of J. Edgar Hoover’s Secret FBI. New York:
Alfred A. Knopf.
Miethe, T.D., McCorkle, R.C., and Listwan, S.J. (2005). Crime Profiles: The Anatomy of Dangerous
Persons, Places, and Situations (3rd ed.). Los Angeles, CA: Roxbury Publishing.
Miransky, J., and Langer, E.J. (1978). Burglary (Non)prevention: An Instance of Relinquishing
Control. Personality and Social Psychology Bulletin, 4(3), 399–405.
Morgan, R.E., and Truman, J.L. (2020). Criminal Victimization, 2019 (Bulletin NCJ 255113). U.S.
Department of Justice. Washington, DC: Office of Justice Programs, Bureau of Justice Statistics.
National Commission on Law Observance and Enforcement (1931). The Cost of Crime. Washington,
DC: Government Printing Office.
Nee, C., van Gelder, J.-L., Otte, M., Vernham, Z., and Meenaghan, A. (2019). Learning on the Job:
Studying Expertise in Residential Burglars Using Virtual Environments. Criminology, 57(3), 481–
511.
Newman, O. (1976). Defensible Space: Crime and Prevention Through Urban Design. New York:
Collier Books.
Office of National Statistics, UK (2020). Nature of Crime: Burglary. Duffryn, Newport, South Wales,
UK.
Olson, K.W. (2003). Watergate: The Presidential Scandals That Shook America. Lawrence, KS:
University of Kansas Press.
Pease, K. (1991). The Kirkholt Project: Preventing Burglary on a British Public Housing Estate.
Security Journal, 2(2), 73–77.
Peaucelle, J.-L., and Guthrie, C. (2016). Henri Fayol, the Manager. New York: Routledge.
Pollitt, C., and Bouckaert, G. (2011). Public Management Reform: A Comparative Analysis—New
Public Management, Governance, and the Neo-Weberian State (3rd ed.). London: Oxford University
Press.
President’s Commission on Law Enforcement and Administration of Justice (1967). Washington, DC:
Government Printing Office.
Roth, J.J., and Trecki, V.L. (2017). Burglary Expertise: Comparing Burglars to Other Offenders.
Deviant Behavior, 38(2), 188–207.
Roth, J., Lee, S., and Joo, J. (2018). The Effect of Community-Level Alarm Ownership on Burglary
Rates. Journal of Applied Security Research, 13(2), 160–171.
Scarr, H.A. (1973). Patterns of Research. U.S. Department of Justice, Law Enforcement Assistance
Administration. Washington, DC: Government Printing Office.
Senge, P.M. (2006). The Fifth Discipline: The Art & Practice of the Learning Organization. New
York: Doubleday.
Shafritz, J.M., Russell, E.W., Borick, C.P., and Hyde, A.C. (2017). Introducing Public Administration
(9th ed.). New York: Routledge.
Stickle, B.F. (2015). Examining Public Willingness-to-Pay for Burglary Prevention. Crime
Prevention & Community Safety, 17(2), 120–138.
Taylor, E. (2017). ‘I Should Have Been a Security Consultant’: The Good Lives Model and
Residential Burglars. European Journal of Criminology, 14(4), 434–450.
Taylor, E. (2018). PAUSED for Thought? Using Verbal Protocol Analysis to Understand the
Situational and Temporal Cues in the Decision-making of Residential Burglars. Security Journal,
31(1), 343–363.
Tilley, N., Thompson, R., Farrell, G., Grove, L., and Tseloni, A. (2015). Do Burglar Alarms Increase
Burglary Risk? A Counter-Intuitive Finding and Possible Explanations. Crime Prevention &
Community Safety, 17(1), 1–19.
Tseloni, A., Farrell, G., Thompson, R., Evans, E., and Tilley, N. (2017). Domestic Burglary Drop and
the Security Hypothesis. Crime Science, 6(1), 1–16.
Vandiviver, C., and Bernasco, W. (2020). “Location, Location, Location”: Effects of Neighborhood
and House Attributs on Burglars’ Target Selections. Journal of Quantitative Criminology, 36(3),
799–821.
Wright, R.T., and Decker, S.H. (1994). Burglars on the Job: Streetlife and Residential Break-ins.
Boston, MA: Northeastern University Press.
Yu, S.V., and Maxfield, M.G. (2014). Ordinary Business. British Journal of Criminology, 54(2), 298–
320.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_11
Cassandra Cross
Email: [email protected]
Abstract
Offenders have embraced the use of technology to commit fraud. Through
emails, social networking sites, false websites and data breaches, offenders
are able to easily and conveniently defraud victims globally. Sadly, this
affects millions of victims, and the consequences can be devastating.
This chapter explores what is currently known about fraud. In particular,
it focuses on how fraud offenders are using a combination of offline and
online approaches to deceive, manipulate and exploit unsuspecting victims,
across a variety of communication channels and platforms. The evolution of
the online environment has significantly changed the nature of fraud, from
offender, victim and third party perspectives. This chapter examines what is
currently known about fraud across each of these areas and the challenges
faced by all three. Further, it examines the policing, prevention and support
as it relates to fraud and the unique difficulties that exist, largely as the
result of the online environment.
Overall, this chapter argues that fraud poses a significant problem
globally that requires a change in thinking and practice, in order to make a
positive change in the future.
Introduction
Fraud is defined through notions of lying, cheating and deception to gain
financial advantage (Fletcher 2007). Prenzler (2019: 1) states that “in
official terms, fraud involves the obtaining a benefit illegally by deception”.
Fraud is not a new offence and has existed for centuries. However, the
evolution of technology (particularly the Internet) has enabled offenders to
expand their abilities to target potential victims globally, and as a result,
there is currently a proliferation of fraudulent approaches occurring daily
(Yar and Steinmetz 2019).
Millions lose money to fraud globally. For example, in 2019, the
Internet Crime Complaint Centre (United States of America) recorded over
US$3.5 billion (IC3 2020). In the United Kingdom, UK Finance (United
Kingdom) reported £1.2 billion lost to fraud and scams (UK Finance 2019).
In Canada, the Canadian Anti-Fraud Centre (CAFC) reported CAD$98
million lost (CAFC 2020). In Australia, the Australian Competition and
Consumer Commission (ACCC) reported losses of over AUD$634 million
(ACCC 2020). In Hong Kong, local police intercepted more than HK$3
billion (USD$384 million) from victims of fraud in Hong Kong and beyond
(Lo 2020). These figures highlight the pervasive nature of fraud across the
globe, also affirming that fraud is not a Western phenomenon that is
contained to the Global North.
The impacts and consequences of fraud are immense. Apart from the
obvious financial losses, there are a wide range of non-financial harms
associated with fraud (Button et al. 2009; Cross et al. 2016). Further, there
are many challenges in the policing of fraud (Button et al. 2015; Cross and
Blackshaw 2015), the power to prevent and disrupt fraud activity (Cross
and Kelly 2016; Prenzler 2019), and the ability to support victims in the
aftermath of these events (Cross 2018c). Fraud may not be new, but there
are continually evolving challenges involving the ways in which law
enforcement, government and society respond to the threat posed by fraud.
This chapter outlines what is currently known about fraud. First, it
provides an overview of some of the more prevalent categories of fraud.
Second, it highlights how fraud is perpetrated, and the diverse array of
approaches offenders use to successfully target victims. Third, it examines
what is currently known about victimisation, and why individuals may be
susceptible to fraud. It further explores the current policing of fraud
globally, before outlining some of the current prevention efforts aimed at
disrupting and preventing fraud. Lastly, it explores victim support, and the
ways in which those who suffer fraud losses are assisted (or not) in their
recovery.
In doing this, it is important to acknowledge the offline/online nature of
fraud. As stated, fraud is not new. However, technological developments
and the Internet have significantly changed the nature of fraud offending
and victimisation. There are scholarly debates as to the impact of
technology on offences such as fraud. Fraud is usually considered to be a
cyber-enabled offence, meaning that it occurs across both online and offline
environment (Wall 2007). This is in contrast to cyber-dependent offences,
which arguably only exist within a virtual sphere (e.g. hacking and
malware).
Fraud occurs across all mediums of communication, and while the
Internet has changed the ways that offenders target victims, and
exponentially increase the pool of potential victims, it is important to
acknowledge that fraud still occurs across other non-technological
mediums. Instead, offenders are combining multiple forms of
communication to defraud an individual (email, telephone, text messaging,
online messaging and face-to-face) (Cross et al. 2016). In this way, the
online/offline distinction is somewhat redundant when applied to the
context of fraud (Cross 2019a). Instead, it is argued that the digital nature of
society has given rise to an inability to detangle one’s offline/online persona
and communications (Powell et al. 2018). Given the popularity of
technology use across all platforms, there is no longer an ability to discern
an arbitrary distinction between online and offline activities. Current fraud
offending highlights this overlap.
This chapter focuses on fraud as a holistic concept encompassing both
online and offline means. Notwithstanding, the majority of fraud referred to
in this chapter is perpetrated primarily in an online environment, and it is
the virtual nature of offending that poses new and complex challenges to
police and victims alike. Current responses to fraud across policing,
prevention and support are clearly inadequate, and the role of technology
can largely be attributed as the cause of many of these difficulties. But it is
not the whole story. Fraud has historically lacked the level of attention and
political will needed to effectively combat the threat (Doig et al. 2001;
Button 2012), and the rise of technology (such as the Internet) has
exacerbated existing issues, as well as contributed to the additional
challenges faced by police and other agencies. Statistics suggest that there
is a continued rise in the number of fraud victims and fraud losses annually
(Prenzler 2019), and an associated increase in the level of harm and
suffering across both financial and non-financial areas experienced by
many. Ultimately, this points to a clear need to rethink current approaches in
the area and provides a much-needed impetus to do better.
Romance Fraud
Romance fraud occurs when an offender uses the guise of a genuine
relationship to deceive an individual for financial gain (Cross 2020).
Offenders engage in what is perceived to be a legitimate romantic
relationship as a means of developing trust and rapport with victims, which
leads to compliance with monetary requests (Rege 2009; Whitty and
Buchanan 2012). The evolution of dating platforms and social media have
seen a proliferation of romance fraud approaches, and online approaches are
a popular and successful means of initiating contact with a victim (ACCC
2020). However, once an offender has made a connection, offenders will
utilise a wide range of communication platforms to maintain the
relationship, which can include email, messenger platforms, text messages,
telephone and even face-to-face meetings.
Whitty (2013) advocates a seven-stage model of romance fraud, entitled
“the scammers persuasive techniques model”. In doing this, romance fraud
is argued to follow a number of phases from the initial connection and
grooming techniques used by offenders to establish a relationship, through
to offenders targeting victims in additional schemes. While the details of all
romance fraud schemes are usually different and somewhat unique based on
the victim, the evidence suggests that there is a distinct pattern to romance
fraud victimisation and the ways in which offenders interact with victims in
order to obtain their financial reward (Whitty 2013).
Social Engineering
Social engineering techniques are well established, particularly in how they
relate to fraud victimisation (Drew and Cross 2013). Social engineering can
be defined as “the practice of acquiring information through technical and
non-technical means” (Manske 2000: 53). Other definitions highlight the
use of social engineering to gain unauthorised access to corporate computer
systems and networks (Abraham and Chengular-Smith 2010), as well as
those which focus on the role of social engineering to deceive people into
sharing sensitive information (Power and Forte 2006). Overall, social
engineering can be understood as “nothing more than exploiting human
beings for malicious purposes” (Beaver 2009: 35) which, in the case of
fraud, results in an array of both financial and non-financial losses for
victims.
Common examples of social engineering techniques are urgency,
authority and scarcity. Offenders will often insist the victim must act
immediately to their request and will invoke a sense of urgency. This is
coupled with the plotline used by the offender. For example, requiring
money for a medical emergency has understandable time restrictions that
offenders can rely upon. The technique of authority uses power and status
to elicit a positive response from the target. Many fraud offenders will take
on identities of professionals or military to perpetrate romance fraud and
other schemes (Cross and Holt 2021). Authority is also seen in the large
number of phishing emails received globally, purporting to be from banks,
government or police agencies and demanding action on the part of the
recipient. Lastly, the concept of scarcity implies that the offer is somewhat
unique and not available beyond a prescribed timeframe. Often linked to
urgency, it implies that if the target does not respond immediately then the
offer will be lost. This reduces the ability of the target to make a rational
decision, informed by their own due diligence about the details of what is
being communicated. This is common across investment fraud approaches
that advocate limited opportunities to potential victims and discourage any
action they might usually take to seek external advice or conduct other
checks and balances.
Psychological Abuse
There is evidence to suggest that offenders use psychological abuse tactics
to gain compliance from their victims. This is demonstrated through the
work of Cross et al. (2018) who assert that there are similarities between
romance fraud and the existing literature on domestic violence. Through an
analysis of 21 romance fraud victim narratives, their analysis highlights the
psychological abuse techniques used by offenders to gain compliance from
victims, usually in the form of sending direct money transfers. Using a
framework of psychological abuse established by Tolman et al. (1999), they
were able to illustrate unprompted evidence for eight of nine categories,
despite not specifically asking questions on this topic. In this way, it can be
argued that the evidence uncovered in this study is likely to be a
conservative estimate of the true nature of abuse, should the research
explore this directly.
The important finding of this study relates to the lack of geographical
proximity required by offenders to exert power and control over their
victims. In the majority of circumstances, victims and offenders will not be
in physical contact with each other and will instead communicate over a
number of different platforms, predominantly online. This study begins to
highlight the ways that offenders work to ensure that regardless of their
physical distance, they can manipulate their victims to achieve their
intended outcomes.
In combination, the ability of offenders to effectively use both social
engineering and psychological abuse techniques renders many victims
vulnerable to the approach, and unable to recognise the situation as fraud.
IDCARE
IDCARE (www.idcare.org) is the national support service for victims of
identity theft across Australia and New Zealand. This includes fraud victims
who may have had parts of their identity compromised in some way.
IDCARE offer a confidential counselling service for victims of identity
theft, as well as individual plans for recovery of their identity. In the
recently updated Cybersecurity Strategy 2020, the Australian Government
committed an additional AUD$6.1 million in funding to further support the
services of IDCARE and enable the provision of support to a greater
number of victims across Australia and New Zealand (Home Affairs 2020).
Given the increase in individuals experiencing fraud and identity theft, the
ability of IDCARE to expand its services to provide greater access and
levels of support for an increased number of victims is a welcome
development.
Conclusion
This chapter has highlighted the overall complexity of fraud. It is evident
that there are many challenges associated with fraud and the threat it poses
to the whole of society. While fraud is not new, technology has clearly
played a transformative role through exponentially increasing the ability of
offenders to target victims globally. It has also redefined the techniques and
tactics used by offenders to perpetrate their offences. Further, the use of the
Internet has enabled offenders to use factors such as jurisdiction and
anonymity to their advantage.
The number of persons who experience victimisation and suffer from
fraud continues to increase worldwide. Given the number of fraudulent
approaches is limited only by the imaginations of offenders, schemes are
being targeted to directly defraud individuals. In doing this, the financial
and non-financial range of harms experienced by victims are consistently
highlighted across current academic research. In seeking to reduce
victimisation, it is important to understand how fraud occurs, in terms of the
methods used by offenders (across social engineering and psychological
abuse techniques). Further, it is critical to recognise the potential for fraud
vulnerability across all demographics, and the ways in which offenders
potentially target their schemes to capitalise on perceived weaknesses
stemming from demographics and other variables.
This chapter has summarised existing challenges across the policing,
prevention and support aspects related to fraud. While there are positive
developments in these areas, it is also clear that there are genuine issues
which need to be overcome to deliver better outcomes for both victims and
non-victims alike. Current approaches have arguably been ineffective in
responding to fraud in ways that meet both societal and victim expectations.
Based on known figures, fraud losses and numbers of victims are
projected to increase in coming years. The magnitude of this problem
necessitates greater prioritisation by all to better combat the threat posed by
fraud and the far-ranging consequences of victimisation.
Recommended Readings
Button and Cross (2017) provide a comprehensive overview of cyberfraud
and expand in greater detail many of the topics outlined in this chapter. In a
similar vein, Cross (2019b) provides a shorter account of the field to date,
outlining existing knowledge related to the policing, prevention and support
of fraud victims. In seeking to gain further information about the reasons
underpinning fraud victimisation, Button et al. (2009, 2014) provide
important insights into the lived experience of these individuals, based on
interviews with victims. In examining particular types of fraud, Ross and
Smith (2011) explore AFF and investment fraud in greater detail as do
Shoenmakers et al. (2009) who further provide a historical account of these
fraud types and their emergence. For an in-depth understanding of romance
fraud, Whitty (2013) provides her “scammers persuasive techniques model”
and outlines the seven stages referred to earlier. Similarly, Cross et al.
(2018) advocate for the use of domestic violence and psychological abuse
as an important framework to better understand the dynamics and
complexities of romance fraud. Lastly, Prenzler (2019) summarises the
current state of fraud prevention knowledge and highlights the dearth of
work in this area, despite the ongoing nature and escalation of fraud
offending and victimisation globally.
Acknowledgement
The work has been supported by the Cyber Security Research Centre
Limited whose activities are partially funded by the Australian
Government’s Cooperative Research Centres Programme.
References
Abraham, S., and Chengular-Smith, I. (2010) An overview of social engineering malware: Trends,
tactics and implications. Technology in Society 32(3): 183–196.
Australian Competition and Consumer Commission (ACCC) (2020) Targeting scams 2019: A review
of scam activity since 2009. Available at: https://www.accc.gov.au/system/files/1657RPT_
Targeting%20scams%202019_FA.pdf (accessed 5 August 2020).
Bossler, A., and Holt, T. (2012) Patrol officers’ perceived role in responding to cybercrime. Policing:
An International Journal of Police Strategies & Management 35(1): 165–181.
Bossler, A., Holt, T., Cross, C., and Burruss, G. (2020) Policing fraud in England and Wales:
Examining constables’ and sergeants’ online fraud preparedness. Security Journal 33: 311–328.
Brenner, S. (2006) Cybercrime jurisdiction. Crime, Law and Social Change 46(4–5): 189–206.
Buchanan, T., and Whitty, M. (2014) The online dating romance scam: Causes and consequences of
victimhood. Psychology, Crime and Law, 20(3): 261–283.
Burns, A.J., Johnson, E., and Caputo, D. (2019) Spear phishing in a barrel: Insights from a targeted
phishing campaign. Journal of Organizational Computing and Electronic Commerce 29(1): 24–39.
Button, M. (2012) Cross-border fraud and the case for an “Interfraud”. Policing: An International
Journal of Police Strategies and Management 35(2): 285–303.
Button, M., and Cross, C. (2017) Cyberfraud, scams and their victims. London: Routledge.
Button, M., Blackbourn, D., and Tunley, M. (2015) “The not so thin blue line after all?” Investigative
resources dedicated to fighting fraud/economic crime in the United Kingdom. Policing: A Journal of
Policy and Practice 9(2): 129–142.
Button, M., Lewis, C., and Tapley, J. (2009) A better deal for fraud victims. London: Centre for
Counter Fraud Studies.
Button, M., McNaugton Nicolls, C., Kerr, J., and Owen, R. (2014) Online frauds: Learning from
victims why they fall for these scams. Australian and New Zealand Journal of Criminology 47(3):
391–408.
Canadian Anti-Fraud Centre (CAFC) (2020) Recent scams and frauds. Available at: https://www.
antifraudcentre-centreantifraude.ca/index-eng.htm (accessed 5 August 2020).
CBC News (2015) Toronto ‘romance scam’ linked to $5B FBI fraud probe. Available at: https://
www.cbc.ca/news/canada/toronto/romance-scam-fbi-1.3284484 (accessed 5 August 2020).
Cohen, C. (2006) Consumer fraud and the elderly: A review of Canadian challenges and initiatives.
In Mellor, M., and Brownell, P. (eds.), Haworth Press, New York, pp. 137–144.
Correia, S. (2019) Responding to victimisation in a digital world: A case study of fraud and computer
misuse reported in Wales. Crime Science 8(4): 1–12.
Cross, C. (2020) Romance fraud. In Holt, T., and Bossler, A. (eds.), Palgrave handbook of
international cybercrime and cyberdeviance. London: Palgrave Macmillan.
Cross, C. (2019a) Is online fraud just fraud? Examining the efficacy of the digital divide. Journal of
Criminological Research, Policy and Practice 5(2): 120–131.
Cross, C. (2019b) Online fraud. In Oxford research encyclopedia of criminology and criminal justice.
Oxford University Press. https://doi.org/10.1093/acrefore/9780190264079.013.488.
Cross, C. (2018a) Denying victim status to online fraud victims: The challenges of being a “non-
ideal victim”. In Duggan, M. (ed.) Revisiting the ideal victim concept. London: Policy Press, pp.
243–262.
Cross, C. (2018b) Expectations vs reality: Responding to online fraud across the fraud justice
network. International Journal of Law, Crime and Justice 55: 1–12.
Cross, C. (2018c) (Mis)Understanding the impact of online fraud: Implications for victim assistance
schemes. Victims and Offenders 13(6): 757–776.
Cross, C. (2016) ‘I’m anonymous, I’m a voice at the end of the phone’: A Canadian case study into
the benefits of providing telephone support to fraud victims. Crime Prevention and Community
Safety 18(3): 228–243.
Cross, C. (2015) “No laughing matter: Blaming the victim of online fraud.” International Review of
Victimology 21(2): 187–204.
Cross, C., and Blackshaw, D. (2015) Improving the police response to online fraud. Policing: A
Journal of Policy and Practice 9(2): 119–128.
Cross, C., Dragiewicz, M., and Richards, K. (2018) Understanding romance fraud: Insights from
domestic violence research. British Journal of Criminology 58(6): 1303–1322.
Cross, C., and Gillett, R. (2020) Exploiting trust for financial gain: An overview of business email
compromise (BEC) fraud. Journal of Financial Crime 27(3): 871–884.
Cross, C., and Holt, T. (2021) The use of military profiles in romance fraud schemes. Victims and
Offenders 16(3): 385–406.
Cross, C., and Kelly, M. (2016) The problem of ‘white noise’: Examining current prevention
approaches to online fraud. Journal of Financial Crime 23(4): 806–828.
Cross, C., Richards, K., and Smith, R. G. (2016) Improving responses to online fraud victims: An
examination of reporting and support Final Report. Criminology Research Grants: Canberra A.C.T.
Cross, C., Smith, R., and Richards, K. (2014) Challenges of responding to online fraud victimisation
in Australia. Trends and Issues in Crime and Criminal Justice 474: 1–7.
Deem, D. (2000) Notes from the field: Observations in working with the forgotten victims of
personal financial crimes. Journal of Elder Abuse and Neglect 12(2): 33–48.
Deevy, M., Lucich, S., and Beals, M. (2012) “Scams, schemes and swindles: A review of consumer
financial fraud research. Available at: http://fraudresearchcenter.org/wp-content/uploads/2012/11/
Scams-Schemes-Swindles-FINAL_11.20.121.pdf (accessed 5 August 2020).
Doig, A., Johnson, S., and Levi, M. (2001) New public management, old populism and the policing
of fraud. Public Policy and Administration 16(1): 91–113.
Drew, J., and Cross, C. (2013) Fraud and its PREY: Conceptualising social engineering tactics and its
impact on financial literacy outcomes. Journal of Financial Services Marketing 18(3): 188–198.
Economic and Financial Crimes Commission (EFCC) (n.d.) Home page. Available at: https://www.
efcc.gov.ng/ (accessed 10 March, 2022).
Financial Action Task Force (n.d.) Home page. Available at: https://www.fatf-gafi.org/ https://www.
fatf-gafi.org/ (accessed 10 March, 2022).
Finklea, K. (2013) The interplay of borders, turf, cyberspace and jurisdiction: Issues confronting US
law enforcement. Congressional Research Service Report for Congress, Washington, DC:
Congressional Research Service.
Fletcher, N. (2007) Challenges for regulating financial fraud in cyberspace. Journal of Financial
Crime 14(2): 190–207.
Ganzini, L., McFarland, B., and Bloom, J. (1990) Victims of fraud: Comparing victims of white-
collar crime and violent crime. Bulletin of the American Academy of Psychiatry and Law 18(1): 55–
63.
Hadlington, L., Lumsden, K., Black, A., and Ferra, F. (2018) A qualitative exploration of police
officers’ experiences, challenges, and perceptions of cybercrime. Policing: A Journal of Policy and
Practice (online first) https://doi.org/10.1093/police/pay090.
Harkin, D., Whelan, C., and Chang, L. (2018) The challenges facing specialist police cyber-crime
units: An empirical analysis. Police Practice and Research 19(6): 519–536.
HMIC (2015) Real lives, real crimes: A study of digital crime and policing. Available at: https://
www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/real-lives-real-crimes-a-study-of-
digital-crime-and-policing.pdf (accessed 9 August 2019).
Holtfreter, K., Reisig, M., and Blomberg, T. (2006) Consumer fraud victimisation in Florida: An
empirical study. St Thomas Law Review 18: 761–789.
Home Affairs (2020) Australia’s cybersecurity strategy 2020. Available at: https://www.homeaffairs.
gov.au/cyber-security-subsite/files/cyber-security-strategy-2020.pdf (accessed 11 November 2020).
Internet Crime Complaint Centre (IC3) (2020) 2019 internet crime report. Available at: https://pdf.
ic3.gov/2019_IC3Report.pdf (accessed 5 August 2020).
Jorna, P. (2016) The relationship between age and consumer fraud victimisation. Trends and Issues in
Crime and Criminal Justice, 519: 1–16.
Lo, C. (2020) Hong Kong crime family arrested in HK$3 billion money-laundering investigation.
South China Morning Post, 14 September. Available at: https://www.scmp.com/news/hong-kong/
law-andcrime/article/3101422/hong-kong-crime-family-arrested-hk3-billion-money
Mangione, K. (2015) Toronto romance scam linked to $5 billion FBI fraud investigation. Available
at: https://toronto.ctvnews.ca/toronto-romance-scam-linked-to-5-billion-fbi-fraud-investigation-1.
2622093?autoPlay=true (accessed 5 November 2020).
Manske, K. (2000) An introduction to social engineering. Information Systems Security 9(5): 53–59.
Marsh, I. (2004) Criminal justice: An introduction to philosophies, theories and practice. London:
Routledge.
Morgan, A., Dowling, C., Browns, R., Mann, M., Vice, I., and Smith, M. (2016) Evaluation of the
Australian cybercrime online reporting network. Available at: https://aic.gov.au/sites/default/files/
2018/08/acorn_evaluation_report_.pdf (accessed 9 August 2019).
Olivier, S., Burls, T., Fenge, L., and Brown, K. (2015) ‘Winning and losing’: Vulnerability to mass
marketing fraud. The Journal of Adult Protection 17(6): 360–370.
Pak, K. and Shadel, D. (2011) AARP foundation national fraud victim study. Washington, DC:
AARP. Available at: http://assets.aarp.org/rgcenter/econ/fraud-victims-11.pdf (accessed 5 August
2020).
Powell, A., Stratton, G., and Cameron, R. (2018) Digital criminology: Crime and justice in digital
society. New York: Routledge.
Power, R., and Forte, D. (2006) Social engineering: Attacks have evolved but countermeasures have
not. Computer Fraud and Security 2006(10): 17–20.
Prenzler, T. (2019) What works in fraud prevention: a review of real-world intervention projects.
Journal of Criminological Research, Policy and Practice 6(1): 83–96.
Rege, A. (2009) What’s love got to do with it? Exploring online dating scams and identity.
International Journal of Cyber Criminology 3(2): 494–512.
Ross, M., Grossman, I., and Schryer, E. (2014) Contrary to psychological and popular opinion, there
is no compelling evidence that older adults are disproportionately victimised by consumer fraud.
Perspectives of Psychological Science 9(4): 427–442.
Ross, S., and Smith, R. G. (2011) Risk factors for advance fee fraud victimisation. Trends and Issues
in Crime and Criminal Justice 420: 1–6.
Schiebe, S., Notthoff, N., Menkin, J., Ross, L., Shadel, D., Deevy, M., and Cartensen, L. (2014)
Forewarning reduces fraud susceptibility in vulnerable consumers. Basic and Applied Social
Psychology 36(3): 272–279.
Schoenmakers, Y., de Vries, R., and van Wijk, A. (2009) Mountains of gold: An exploratory research
in Nigerian 419 fraud. SWP.
Skidmore, M., Ramm, J., Goldstraw-White, J., Barrett, C., Barleaza, S., Muir, R., and Gill, M. (2018)
“More than just a number: Improving the police response to victims of fraud. Available at: http://
www.police-foundation.org.uk/2017/wp-content/uploads/2010/10/more_than_just_a_number_exec_
summary.pdf (accessed 9 August 2019).
Smith, R.G., Holmes, M., and Kaufman, P. (1999) Nigerian advance fee fraud. Trends and Issues in
Crime and Criminal Justice 121: 1–6.
Svantesson, D. (2016) Internet jurisdiction: Today and in the future. Precedent 132: 4–9.
Tolman, R. M., Rosen, D., and Wood, G. C. (1999) Psychological maltreatment of women. In
Ammerman, R. T., and Hersen, M. (eds.), Assessment of family violence: A clinical and legal
sourcebook, 2nd ed.. John Wiley & Sons, Inc., pp. 322–340
Wall, D. S. (2007) Cybercrime: The transformation of crime in the information age. Cambridge, MA:
Polity Press.
Whitty, M. (2013) The scammers persuasive techniques model: Development of a stage model to
explain the online dating romance scam. British Journal of Criminology 53(4): 665–884.
Whitty, M., and Buchanan, T. (2012) The psychology of the online dating romance scam. Available
at https://www.scribd.com/document/296206044/The-Psychology-of-the-Online-Dating-Romance-
Scam-copypasteads-com (accessed 9 August 2019).
Yar, M., and Steinmetz, K. (2019) Cybercrime and society (3rd ed.). London: Sage.
Zweighaft, D. (2017) Business email compromise and executive impersonation: Are financial
institutions exposed? Journal of Investment Compliance 18(1): 1–7.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_12
Michael Skidmore
Email: [email protected]
Abstract
This chapter focuses on a complex phenomenon of fraud in the insurance
industry. It reviews the literature on the nature of insurance fraud,
differentiating among intermediary-, insurers-, policyholder- and internal
fraud. The drivers of insurance fraud offending are considered through
prisms of routine activity theory and criminological theory. Other reviewed
studies suggest considering additional factors like public tolerance, public
misunderstanding, boost of online services and weak crime control through
cooperation. The chapter outlines the current trends in the industry, such as
insurance aggregators, identity fraud, mobile applications and ghost
brokers. It summarises the main preventative strategies adopted by insurers,
which includes engaging with the public, using effective detection
mechanisms and developing anti-fraud corporate culture, at the same time,
pinpointing limitations in our knowledge and the potential ways to
rectifying these.
Introduction
Insurance fraud is complex and diverse, perpetrated by people occupying
different positions in the market and using methods that vary in their
sophistication. In broad terms, offending is facilitated by inadequate
internal systems and cultures that prioritise preventing fraud, and
undertaken by consumers providing misleading information when buying a
policy or making a claim, and by corrupt employees who are best placed to
identify and then exploit weaknesses. Offending also occurs in the
commercial sales environment, when consumers are mis-sold policies by
rogue agents. These offences are diverse and they call for different
prevention approaches.
Insurance fraud is commonplace across the world and it is costly. For
example, fraudulent claims have been estimated to amount to 10 percent of
the total value of all insurance claims in the industry (Atlas Magazine
2017a); UK insurers uncovered 125,000 fraudulent claims and in Germany
5 billion Euros are lost to fraud each year (HDI 2018). Fraudulent claims
are believed to be even more rife in other parts of Europe, including Russia,
the Czech Republic, Ukraine and Denmark (Dehghanpour and Rezvani
2015). Conservatively, fraudsters in the U.S. are estimated to cost the
industry 80 billion USD each year (Coalition Against Insurance Fraud
2020). Many cases are not detected or prosecuted, and the ‘dark figure’ is
likely to be particularly high in countries where there is more limited
oversight by the industry, such as in some African, Asian and South
American countries.
Social, political and economic factors can influence the distribution of
insurance fraud perpetrated across different regions. The frequency of
fraudulent activities has been linked to the state of the economy, with rates
of fraud rising during periods of recession and declining during periods of
economic growth (Dionne and Wang 2013). A U.S. study found consumers
are more likely to perpetrate insurance fraud in regions with higher levels of
corruption, the assumption being that people feel more safe to commit these
crimes than they would in other U.S. regions where illicit activity is less
prominent (and tolerated) amongst state officials (Goel 2014).
Insurance companies have developed various protective strategies to
mitigate their losses to the different forms of fraud they suffer, the principal
challenge being for companies to proactively identify potential fraud from
within a high volume of transactions that would otherwise go undetected.
There has been investment into building capability in their workforce to
detect and appropriately respond to suspected frauds and the development
of risk management software which automates the detection of suspicious
transactions using predictive modelling and analytics (Association of
British Insurers 2016; Culp 2014). Success in detecting fraud risk is in part
contingent on the ability to collect the right information and apply it in the
right way (e.g., intelligence on risky individuals or locations), but insurance
companies appear to have historically prioritised commercial advantage
over fraud prevention as evidenced by their reluctance to share data. These
limits on information sharing have constrained the effectiveness of these
intelligence systems, both for individual companies and for the industry
collectively (Coalition Against Insurance Fraud 2012).
In addition, although there is recent research on some types of
offending, such as the nature of internal fraud (e.g., see Gill and Randall
2015) and fraudulent sale of insurance policies (e.g., see City of London
Police 2021), this is less evident with other types. For example, knowledge
about the true scale and cost of internal fraud and ‘ghost broking’ are
limited. This impedes the development of effective responses.
This chapter will discuss the different methodologies adopted by
fraudsters that are common in the insurance sector before moving on to
discuss the drivers for offending. This provides the context for the final
section which discusses the different methods and strategies that facilitate
more effective fraud prevention.
Internal Fraud
Fraud that is perpetrated by individuals from within a legitimate company
setting, commonly referred to as white-collar offending, is thought to be
driven by distinctive personal or environmental factors, in part because
many who offend in this setting live otherwise normal, law-abiding lives
(e.g., see van Onna et al. 2014). In this context, the fraud triangle sets out
the conditions that need to converge for these offences to occur; an offender
with motive, which is commonly linked to a personal, financial or
professional difficulty; an opportunity in the workplace to resolve this by
illicit means (such as loopholes in company or regulatory systems); and the
ability for these individuals to rationalise or ‘neutralise’ their rule-breaking
behaviour, including those who perceive their crimes to be victimless
(Schuchter and Levi 2016).
Recent findings by Said et al. (2018) indicate that the strength of an
individual’s ethical values and beliefs are important for determining the
likelihood they will commit fraud and adhere to the corporate rules.
In the context of the insurance fraud industry, several aspects of the
corporate environment and culture shape the likelihood of fraud offending
by employees. Insurance companies have a responsibility to foster
corporate values that deter and divert individuals away from fraud
offending. This should permeate multiple aspects of the business starting
with recruitment strategies that take sufficient care not to employ
identifiable bad actors, which can result in “collusion between suspects,
insurance staff … and persons with insider or expert knowledge”
(Edelbacher and Theil 2018: 171). There is a need to instil values across
employees through the provision of ethical education and also ensure
adequate support is offered to employees to divert less confident or able
employees (particularly those in sales) from adopting unethical means to
achieve company targets (Taek Yi et al. 2012; Tseng 2017). In the
accounting and finance professions, a relationship has been identified
between the ethical culture of an organisation and the ethical behaviour of
employees (Ampofo et al. 2004).
A robust counter fraud culture includes not only establishing the right
values, but also instilling vigilance and capability across employees to
effectively identify and respond to fraud (Anti-Fraud Collaboration 2019),
the absence of which is considered one of the most significant underlying
drivers of internal fraud. FRISS (2019a) reported approximately a quarter of
insurers had not instilled a strong counter fraud culture and only one third
had implemented a zero-tolerance policy. The remaining organisations had
no clear procedures set out for employees to detect and prevent fraudulent
practice. There are even examples in which corporate culture fosters
unethical behaviour, for example by providing corporate targets and
incentives that encourage the commission of fraud (Raftery and Holder
2014).
The effectiveness of counter-fraud measures is contingent on adequate
systems and processes, particularly those that facilitate the identification
and reporting of offending. Some companies have no working systems to
report fraud or suspected dishonest behaviour, such as anonymous hotlines
to facilitate whistle-blowing, the absence of which can deter workers from
reporting due to a fear of losing their job, that they themselves will be
named and exposed, or that simply they will not be taken seriously by
senior management (Bremer 2013; Business Woman Media 2018). A U.S.
study found the internal control systems of insurers, such as internal
whistleblowing to be ineffective at identifying employee fraud (Todd et al.
1999). Other organisational gaps include underdeveloped or highly
fragmented fraud management systems, restricting effective communication
between different departments, in turn reducing their ability to monitor and
detect personnel who engage in unethical behaviour (Oscelynn 2018).
Corporate Culture
Two core requirements for companies across the insurance sector are to
implement a strong and uniform set of values that encourage ethical
practices by employees, and a robust counter fraud culture both to prevent
malpractice and to help detect it when it occurs. The ingredients of a well-
constructed counter fraud culture include employees receiving unqualified
support from senior management, systematic communication across
departments and effective fraud awareness trainings (FRISS 2019a).
Sometimes insurers do not help themselves, for example, by setting sales
targets which are too onerous and can lead people to consider and pursue
fraud (Pendse 2012).
The success of a counter fraud culture is to a large extent contingent on
the ability to detect and respond to incidents of staff breaching the corporate
ethical code (Cascarino 2012: 120). Effective industry collaboration is key
here, to render it more difficult for bad actors to move across the industry,
including internationally (FRISS 2019b). Moreover, pooling fraud
intelligence from companies across the industry can help in tracking,
fighting and controlling organised fraud and help to keep pace with the
latest modus operandi; one example of this is the Insurance Histories
Bureau or in the UK, Cifas, which provides a cross-industry strategic hub to
direct fraud prevention. The creation of an industry-wide central database in
the UK, that contains information on all insurance fraudsters (Association
of British Insurers 2012), represents a good example of industry
collaboration.
Finally, closer cooperation with the police and other relevant state
institutions may bolster efforts to identify and respond to fraud in the
industry. For example, the Bank of Russia’s Computer Emergency
Response Team (FinCERT) works to prevent cybercrime against the
financial sector (Timofeyev and Busalaeva 2021). At the country level,
fraud prevention measures are often associated with combating corruption,
and Goel (2014) called for better coordination in the policing of anti-fraud
and anti-corruption initiatives. Furthermore, regulatory or civil justice
reform brings the prospect of a more robust response to insurance fraud
(Insurance Fraud Taskforce 2016).
Conclusion
Fraud has always been endemic to the insurance industry. Although the
causes have remained largely the same (van Driel 2018), the methods used
by fraudsters have changed dramatically in recent decades because of the
rise in digital services and the burgeoning range of the offered products and
services. Rapidly evolving systems have created vulnerabilities which have
not always been matched by insurers’ preventative responses. Such systems
can be highly effective if they are blended with practitioner expertise and
the right information is made available, with systematic collaboration and
data-sharing across the industry a central requirement. Moreover, the
substantial rise in international crime requires cross-border cooperation
between companies, the police and the public to prevent insurance fraud.
This chapter has focussed on a much under discussed complex
phenomenon of fraud in the insurance industry. It has considered the nature
of insurance fraud and in the process differentiated between different times,
namely: intermediary, insurers, policyholder and internal fraud. The drivers
of insurance fraud offending have been considered through the prism of
routine activity theory. It was noted that since offenders typically make a
rational choice decision to commit insurance fraud, there is the opportunity
for insurers and their partners to weigh offenders’ decisions against crime.
That said, the limitations to doing this well have been discussed. Prevention
is not helped by factors such as public tolerance, public misunderstanding,
the boost of online services and a lack of cross-sector cooperation. Key
trends were discussed which included consideration of the role of
aggregators, the facilitating effect of identity frauds, the role of mobile
applications and the emergence of a growing band of ghost brokers. The
main preventative strategies adopted by insurers have been discussed
including engaging with the public, using effective detection mechanisms
and developing anti-fraud corporate cultures. All in all, the insurance
industry has a choice about how much fraud it wants to tolerate, and the
balance between sales and prevention is a key one which, if not properly
understood, becomes a key driver of insurance frauds.
Recommended Readings
Brinkmann and Lentz (2006), Farashah and Estelami (2014), Akomea-
Frimpong et al. (2016), Cova et al. (2016), Leal et al. (2016), Button et al.
(2017), Gill (2018), Modic et al. (2018), Ribeiro et al. (2020) explore
potential causes of insurance fraud. Button et al. (2013), Pande and Maas
(2013), Dehghanpour and Rezvani (2015) and Button et al. (2016) depict
insurance fraudsters’ profiles in different countries. Tseng and Su (2014),
Akomea-Frimpong et al. (2016), Timofeyev and Busalaeva (2021) shed
light on the factors affecting the size of loss due to different types of
insurance fraud. Baesens et al. (2015), van Capelleveen et al. (2016), Fang
and Gong (2017), Tang et al. (2017), Li et al. (2018), McGee et al. (2018),
Warren and Schweitzer (2018), Sheshasaayee and Thomas (2018),
Padmavathi and Sengupta (2019), Pani and Tiwari (2019), Prenzler
(2019), Sadiq and Shyu (2019) discuss insurance fraud detective and
preventative techniques, methods and strategies.
There are a lot of articles in the Journal of Business Ethics which
highlight the many causes of insurance fraud. Many studies from the
Security Journal consider fraud prevention mechanisms in the context of
corporate security and have a relevance to fraud. Recent reports by the
Association of British Insurers, the International Association of Insurance
Supervisors and the Coalition Against Insurance Fraud discuss issues
related to insurance fraud prevention.
References
Akomea-Frimpong, I., Andoh, C., & Ofosu-Hene, E. D. (2016). Causes, effects and deterrence of
insurance fraud: Evidence from Ghana. Journal of Financial Crime, 23(4), 678–699.
Ampofo, A., Mujtaba, B., Cavico, F., & Tindall, L. (2004). The relationship between organizational
ethical culture and the ethical behavior of employees: A study of accounting and finance
professionals in the insurance industry of United States. Journal of Business and Economics
Research, 2(9), 13–24.
Anti-Fraud Collaboration. (2019). The Fraud-Resistant Organization: Tools, Traits, and Techniques
to Deter and Detect Financial Reporting Fraud. Available online: https://www.thecaq.org/wp-
content/uploads/2019/03/the-fraud-resistant-organization.pdf
Association of British Insurers. (2012). No Hiding Place. Insurance Fraud Exposed. London.
Available online: https://www.abi.org.uk/globalassets/sitecore/files/documents/publications/public/
migrated/fraud/abi-no-hiding-place%2D%2D-insurance-fraud-exposed.pdf
Association of British Insurers. (2016). Effective Counter Fraud Practices—Checklist for Insurers
and Partners. Available online: https://www.abi.org.uk/globalassets/sitecore/files/documents/
publications/public/2016/fraud/effective-counter-fraud-practices-checklist-for-insurers-and-partners.
pdf
Atlas Magazine. (2017a). Insurance fraud detection and cost to industry. Published on May 19, 2017.
Available online: https://www.atlas-mag.net/en/article/insurance-fraud-detection-and-cost-to-industry
Atlas Magazine. (2017b). Insurance fraud detection and cost to industry. Available online: https://
www.atlas-mag.net/en/article/insurance-fraud-detection-and-cost-to-industry
Baesens, B., Van Vlasselaer, V., & Verbeke, W. (2015). Fraud Analytics Using Descriptive,
Predictive, and social Network Techniques: A Guide to Data Science for Fraud Detection. New
York: John Wiley & Sons.
BioCatch. (2019). Insurance fraud prevention in the age of cybercrime. Posted on November 12,
2019. Available online: https://www.biocatch.com/blog/insurance-fraud-prevention-in-the-age-of-
cyber-crime
Bremer, C. (2013). How to encourage internal reporting of fraud or misconduct. Smart Business.
Available online: https://www.sbnonline.com/article/how-to-encourage-internal-reporting-of-fraud-
or-misconduct/
Brinkmann, J., & Lentz, P. (2006). Understanding insurance customer dishonesty: Outline of a
moral-sociological approach. Journal of Business Ethics, 66(2), 177–195.
Business Woman Media. (2018). How to encourage employees to report fraud and misconduct.
Available online: https://www.thebusinesswomanmedia.com/encourage-employees-report-fraud/
Button, M., Brooks, G., Lewis, C., & Aleem, A. (2017). Just about everybody doing the business?
Explaining ‘cash-for-crash’ insurance fraud in the United Kingdom. Australian and New Zealand
Journal of Criminology, 50(2), 176–194.
Button, M., Pakes, F., & Blackbourn, D. (2013). Profile of a Household Insurance Fraudster.
University of Portsmouth. Available online: https://researchportal.port.ac.uk/portal/files/1650166/
Profile_of_a_Household_Insurance_Fraudster.pdf
Button, M., Pakes, F., & Blackbourn, D. (2016). ‘All walks of life’: A profile of household insurance
fraudsters in the United Kingdom. Security Journal, 29(3), 501–519.
Cascarino, R. E. (2012). Corporate Fraud and Internal Control: A Framework for Prevention. John
Wiley & Sons.
Cifas and Forensic Pathways. (2018). Wolves of the Internet: Where do fraudsters hunt for data
online? Available online: https://www.forensic-pathways.com/wp-content/uploads/2020/06/Wolves-
of-the-Internet.pdf
Coalition Against Insurance Fraud. (2012). Go Figure: Fraud Data. Available online: www.
insurancefraud.org
Coalition Against Insurance Fraud. (2020). Fraud Stats. Available online: https://insurancefraud.org/
Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach.
American Sociological Review, 44, 588–608.
Clarke, R. V. G. (Ed.). (1997). Situational Crime Prevention (pp. 225–256). Monsey, NY: Criminal
Justice Press.
Cova, B., Gaglio, G., Weber, J., & Chanial, P. (2016). Organizational sensemaking of non-ethical
consumer behavior: Case study of a French mutual insurance company. Journal of Business Ethics,
148(4), 783–799.
Culp, S. (2014). Insurers help themselves and their customers by fighting fraud more effectively.
Available online: https://www.forbes.com/sites/steveculp/2014/02/03/insurers-help-themselves-and-
their-customers-by-fighting-fraud-more-effectively/#b23ebf7647fa
Dehghanpour, A., & Rezvani, Z. (2015). The profile of unethical insurance customers: A European
perspective. International Journal of Bank Marketing, 33(3), 298–315.
Derrig, R. A. (2002). Insurance fraud. Journal of Risk and Insurance, 69(3), 271–287.
Dionne, G., & Wang, K. C. (2013). Does insurance fraud in automobile theft insurance fluctuate with
the business cycle? Journal of Risk and Uncertainty, 47(1), 67–92.
Dong, W., Liao, S., & Zhang, Z. (2018). Leveraging financial social media data for corporate fraud
detection. Journal of Management Information Systems, 35(2), 461–487.
Edelbacher, M., & Theil M. (2018). Fraud and corruption in the insurance industry: An Austrian
perspective. In: Kratcoski, P., Edelbacher, M. (eds) Fraud and Corruption. Cham: Springer.
Einav, L., Finkelstein, A., & Levin, J. (2010). Beyond testing: Empirical models of insurance
markets. Annual Review of Economics, 2(1), 311–336.
Fang, H., & Gong, Q. (2017). Detecting potential overbilling in Medicare reimbursement via hours
worked. American Economic Review, 107(2), 562–591.
Farashah, A. D., & Estelami, H. (2014). The interplay of external punishment and internal rewards:
An exploratory study of insurance fraud. Journal of Financial Services Marketing, 19(4), 253–264.
FRISS. (2019b). 5 trends in fighting insurance fraud in 2019. Available online: https://www.friss.
com/blog/5-trends-in-fighting-insurance-fraud-in-2019
Gill, M. (2018). A Nick Tilley perspective on preventing opportunistic insurance fraud. In Farrell, G.
and Sidebottom, A. (Eds.) Realist Evaluation for Crime Science: Essays in Honour of Nick Tilley.
London: Routledge.
Gill, M., & Randall, A. (2015). Insurance Fraudsters. A study for the ABI. Kent, UK: Perpetuity
Research & Consultancy International.
Goel, R. (2014). Insurance fraud and corruption in the United States. Applied Financial Economics,
24(4), 241–246.
HDI. (2018). How AI is changing the fight against insurance fraud. Available online: https://www.
hdi.global/int/en/newsroom/2018/solutions-services/ai-insurance-fraud
Information Age. (2020). How much do behavioural biometrics improve cyber security? Posted on
February 19, 2020. Available online: https://www.information-age.com/how-behavioural-biometrics-
improve-cyber-security-123487735/
Insurance Fraud Bureau. (2018). IFB supports IFED’s warning about ghost broking scams. Posted
February 5, 2018. Available online: https://insurancefraudbureau.org/media-centre/news/2018/ifb-
supports-ifed-s-warning-about-ghost-broking-scams/
Insurance Fraud Taskforce. (2016). Final Report. Government of the United Kingdom. Available
online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/
file/494105/PU1817_Insurance_Fraud_Taskforce.pdf
Iovation. (2019). The evolution of fraud in the insurance industry. White Paper. Available online:
https://content.iovation.com/resources/iovation-insurance-fraud-whitepaper-v3.pdf?mtime=
20191121114117
Iovation. (2020). Top 5 insurance fraud trends of 2020. Available online: https://www.transunion.
com/blog/top-5-insurance-fraud-trends-of-2020
King, M. (2013). Private policing of insurance claims using covert surveillance. Journal of Applied
Security Research, 8(3), 343–373.
KPMG. (2017). Closing the Gap. Cyber Security and the Insurance Sector. Available online: https://
home.kpmg/content/dam/kpmg/uk/pdf/2017/08/cyber_security_and_insurance_sector.pdf
Leal, S., Vrij, A., Nahari, G., & Mann, S. (2016). Please be honest and provide evidence: Deterrents
of deception in an online insurance fraud context. Applied Cognitive Psychology, 30(5), 768–774.
Lesch, W. C., & Baker, B. R. (2013). Balancing the insurance equation: Understanding the climate
for managing consumer insurance fraud and abuses. Journal of Insurance Issues, 36(1), 82–120.
Lesch, W., & Brinkmann, J. (2011). Consumer insurance fraud/abuse as co-creation and co-
responsibility: A new paradigm. Journal of Business Ethics, 103(S1), 17–32.
Li, Y., Yan, C., Liu, W., & Li, M. (2018). A principle component analysis-based random forest with
the potential nearest neighbor method for automobile insurance fraud identification. Applied Soft
Computing, 70, 1000–1009.
Lookout. (2017). Mobile vulnerabilities: What they are and how they impact the enterprise. Available
online: https://resources.lookout.com/blog/mobile-risk-matrix-vulnerabilities
McGee, J., Sandridge, L., Treadway, C., Vance, K., & Coustasse, A. (2018). Strategies for fighting
Medicare fraud. The Health Care Manager, 37(2), 147–154.
McKinsey. (2018). Friends or foes: The rise of European aggregators and their impact on traditional
insurers. Posted December 2018. Available online: https://www.mckinsey.com/*/media/McKinsey/
Industries/Financial%20Services/Our%20Insights/Friends%20or%20foes%20The%20rise%20of%20
European%20aggregators%20and%20their%20impact%20on%20traditional%20insurers/Friends-or-
foes-The-rise-of-European-aggregators.ashx.
Modic, D., Palomäki, J., Drosinou, M., & Laakasuo, M. (2018). The dark triad and willingness to
commit insurance fraud. Cogent Psychology, 5(1), 1469579.
Moreno, I., Vázquez, F. J., & Watt, R. (2006). Can bonus-malus allieviate insurance fraud?. Journal
of Risk and Insurance, 73(1), 123–151.
Nagrecha, S., Johnson, R. A., & Chawla, N. V. (2018). FraudBuster: Reducing fraud in an auto
insurance market. Big Data, 6(1), 3–12.
O’Fallon, M. J., & Butterfield, K. D. (2012). The Influence of unethical peer behavior on observers’
unethical behavior: A social cognitive perspective. Journal of Business Ethics, 109, 117–131.
Ormerod, T., Ball, L., & Morley, N. (2012). Informing the development of a fraud prevention toolset
through a situated analysis of fraud investigation expertise. Behaviour and Information Technology,
31(4), 371–381.
Padmavathi, V., & Sengupta, I. (2019). Predictive analytics for insurer risk management: Behavioral
traits of fraudsters. IUP Journal of Financial Risk Management, 16(3), 51–61.
Palasinski, M., & Svoboda, S. (2014). Reducing the risk of insurance fraud by appearances of online
surveillance. Psychology, Crime and Law, 20(9), 821–832.
Pande, V., & Maas, W. (2013). Physician Medicare fraud: Characteristics and consequences.
International Journal of Pharmaceutical and Healthcare Marketing, 7(1), 8–33.
Pani, A., & Tiwari, R. (2019). Tackling fraud: A collaborative model for insurance companies. In E-
Systems for the 21st Century (pp. 405–432). New York: Apple Academic Press.
Pendse, S. (2012). Ethical hazards: A motive, means, and opportunity approach to curbing corporate
unethical behavior. Journal of Business Ethics, 107(3), 265–279.
Picard, P., & Wang, K. (2015). Insurance Fraud through Collusion between Policyholders and Car
Dealers: Theory and Empirical Evidence. Available online: https://hal.archives-ouvertes.fr/hal-
01140590/document
Prenzler, T. (2019). What works in fraud prevention: A review of real-world intervention projects.
Journal of Criminological Research, Policy and Practice, 6(1), 83–96.
Raftery, H., & Holder, F. (2014). Business fraud: Culture is the culprit. Available online: https://
business-ethics.com/2014/09/23/1840-business-fraud-culture-is-the-culprit/
Reyns, B. W., & Henson, B. (2016). The thief with a thousand faces and the victim with none:
Identifying determinants for online identity theft victimization with routine activity theory.
International Journal of Offender Therapy and Comparative Criminology, 60, 1119–1139.
Reyns, B. W., & Randa, R. (2020). No honor among thieves: Personal and peer deviance as
explanations of online identity fraud victimization. Security Journal, 33(2), 228–243. https://doi.org/
10.1057/s41284-019-00182-w
[Crossref]
Ribeiro, R., Silva, B., Pimenta, C., & Poeschl, G. (2020). Why do consumers perpetrate fraudulent
behaviors in insurance?. Crime, Law and Social Change, 73(3), 249–273.
Sadiq, S., & Shyu, M. L. (2019). Cascaded propensity matched fraud miner: Detecting anomalies in
medicare big data. Journal of Innovative Technology, 1(1), 51–61.
Said, J., Alam, M., Ramli, M., & Rafidi, M. (2017). Integrating ethical values into fraud triangle
theory in assessing employee fraud: Evidence from the Malaysian banking industry. Journal of
International Studies, 10(2), 170–184.
Said, J., Omar, N., Rafidi, M., & Syed Yusof, S. (2018). Are organizational factors more prevailing
than individual factors in mitigating employee fraud? Journal of Financial Crime, 25(3), 907–922.
Schuchter, A., & Levi, M. (2016). The fraud triangle revisited. Security Journal, 29(2), 107–121.
Sheshasaayee, A., & Thomas, S. S. (2018). Usage of R programming in data analytics with
implications on insurance fraud detection. In International Conference on Intelligent Data
Communication Technologies and Internet of Things (pp. 416–421). Cham: Springer.
Skiba, J. M., & Disch, W. B. (2014). A phenomenological study of the barriers and challenges facing
insurance fraud investigators. Journal of Insurance Regulation, 33(4), 87–114.
Skidmore, M., Goldstraw-White, J., & Gill, M. (2020). Understanding the police response to fraud:
The challenges in configuring a response to a low-priority crime on the rise. Public Money and
Management, 40(5), 369–379.
Sparrow, M. (2016). Handcuffed: What Holds Policing Back, and the Keys to Reform. Washington,
DC: Brookings Institution Press.
Stringham, E. P. (2015). Private Governance: Creating Order in Economic and Social Life. New
York: Oxford University Press.
Taek Yi, H., Dubinsky, A., & Un Lim, C. (2012). Determinants of telemarketer misselling in life
insurance services. Journal of Services Marketing, 26(6), 403–418.
Tang, X. B., Wei, W., Liu, G. C., & Zhu, J. (2017). An inference model of medical insurance fraud
detection: Based on ontology and SWRL. Knowledge Organization, 44(2), 84–96.
Tardieu, H., Daly, D., Esteban-Lauzán, J., Hall, J., & Miller, G. (2020). Case study 4: The digital
transformation of insurance. In Deliberately Digital (pp. 255–264). Cham: Springer.
Tillyer, M. S., & Eck, J. E. (2009). Routine activities. In Miller, J. M. (ed.), 21st Century
Criminology: A Reference Handbook (pp. 279–287). Thousand Oaks, CA: Sage.
Timofeyev, Y., & Busalaeva, T. (2021). Current trends in insurance fraud in Russia: Evidence from a
survey of industry experts. Security Journal, 34(1), 1–25.
Todd, J. D., Welch, S. T., Welch, O. J., & Holmes, S. A. (1999). Insurer vs. insurance fraud:
Characteristics and detection. Journal of Insurance Issues, 22(2), 103–124.
Tseng, L. (2017). Why do lenient claims handling practices exist in the insurance industry? A survey
study of ethical decisions by claims adjusters. Managerial Finance, 43(11), 1254–1273.
Tseng, L. M., & Su, W. P. (2014). Insurance salespeople’s attitudes towards collusion: The case of
Taiwan’s car insurance industry. The Geneva Papers on Risk and Insurance—Issues and Practice,
39(1), 25–41.
van Capelleveen, G., Poel, M., Mueller, R. M., Thornton, D., & van Hillegersberg, J. (2016). Outlier
detection in healthcare fraud: A case study in the Medicaid dental domain. International Journal of
Accounting Information Systems, 21, 18–31.
van Driel, H. (2018). Financial fraud, scandals, and regulation: A conceptual framework and
literature review. Business History, 61, 1–40.
Van Onna, J. H., Van Der Geest, V. R., Huisman, W., & Denkers, A. J. (2014). Criminal trajectories
of white-collar offenders. Journal of Research in Crime and Delinquency, 51(6), 759–784.
Wang, Y., & Xu, W. (2018). Leveraging deep learning with LDA-based text analytics to detect
automobile insurance fraud. Decision Support Systems, 105, 87–95.
Warren, D. E., & Schweitzer, M. E. (2018). When lying does not pay: How experts detect insurance
fraud. Journal of Business Ethics, 150(3), 711–726.
Zainal, R., Som, A. M., & Mohamed, N. (2017). A review on computer technology applications in
fraud detection and prevention. Management and Accounting Review, 16(2), 59–72.
Zourrig, H., Park, J., El Hedhli, K., & Zhang, M. (2018). The effect of cultural tightness—Looseness
on fraud perception in insurance services. International Journal of Quality and Service Sciences,
10(2), 138–148.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_13
Susanne Knickmeier
Email: [email protected]
Abstract
The interest in protected information of others is probably as old as
mankind itself. The danger of business secrets being spied on by
competitors, hacker groups or foreign intelligence services or its
exploitation by third parties has the potential for significant economic
consequences. With the increasing digitalisation of corporate and
production processes, cyberattacks are becoming more and more relevant in
the unauthorised outflow of know-how and pose particular challenges for
law enforcement authorities in investigating and providing evidence,
especially when the perpetrators act from abroad. The chapter explores
economic and industrial espionage, uses real examples to illustrate it and
examines the legal basis of the problem in several countries in the European
Union and the UK. Furthermore, it explores the perpetrators and the
techniques they use and considers the extent and cost of the problem.
Introduction
One of the most significant economic crime problems in modern
industrialised countries is industrial and economic espionage. In 2012 the
head of MI5 (the state security service in the UK) noted how one company
had suffered an £800 million loss from a state-sponsored cyberattack
resulting in lost intellectual property and suffered disadvantages in contract
negotiations (Shah 2012). Cumulatively—as this chapter will show later—
this problem costs the world’s companies billions of dollars. It is an issue
which has received very little attention from academics. This chapter aims
to fill that gap by providing a comprehensive overview and introduction to
the problem. This chapter will define it, look at examples and consider the
law surrounding it. This chapter will also examine the perpetrators of it and
the techniques they use. It will also attempt to gauge the size of the problem
and political attention paid towards it. The chapter will draw upon cases and
research from the UK, Germany, the USA and several other European
countries.
Economic and industrial espionage have been occurring for a long time.
In particular, the industrialisation that began in the eighteenth century led to
an increase of industrial espionage (Drescher 2019, pp. 30–31). In one of
the most significant acts of industrial espionage ever, in the 1800s the
British East India Company hired the botanist, Richard Fortune, to smuggle
tea cuttings, seeds and so on out of China which were used to help grow a
tea industry in India, eclipsing the Chinese in a few decades (Rose 2010).
Economic and industrial espionage are still significant problems for many
countries and companies today, although techniques have moved on since
Fortune disguised himself as a Chinese merchant to conduct his work.
Knowledge about modern cases of industrial espionage do not always
reach the public domain for a variety of reasons. They are often
embarrassing for companies and news of the incident could affect their
stock price. For example, in one case, the Austrian company AMSC
Windtec experienced one of their engineers selling important source code to
a Chinese competitor. This case reached the public domain, resulting in a
loss of US$1 billion to the company, a significant reduction in the share
price and 700 staff losing their jobs (US Department of Justice 2018).
Successful action by law enforcement is also highly unlikely further
diminishing the appetite to report. Even if that is a possibility, for some the
likely publicity that might emerge from police action and a public trial stops
some reporting. Consequently, there are surprisingly few cases in the public
domain, compared to the likely reality of a large number of cases occurring.
Below are three famous examples from across the globe to illustrate this
problem further.
In the 1990s the American manufacturer of adhesive products, Avery
Dennison, was victim of a significant case of industrial espionage.
Throughout the 1990s, two Taiwanese business executives running a rival
company had paid an employee of Avery Dennison over $160,000 to pass
on trade secrets on the formulas for adhesives and new innovations. The
scheme was estimated to have cost Avery Dennison over $200 million in
lost revenues by the FBI (Los Angeles Times 1999).
The Avery Dennison case was the result of a corrupt insider, but the
next case known as the ‘Night Dragon’ attacks was perpetrated by hacking.
In this case, Chinese hackers working 9–5 in Beijing were able to access
sensitive information, such as proposed bidding plans from five companies
operating in the oil, gas and petrochemical sector (Reuters 2011). The
Reuters report cites the original writer of the report into the incidents from
McAfee as stating, ‘That information is tremendously sensitive and would
be worth a huge amount of money to competitors’.
The third case involves the dispute between British Airways (BA) and
Virgin Atlantic in the early 1990s, where industrial espionage was exposed
in a libel case that emerged from it (which was settled before trial). A wide
range of ‘dirty tricks’ were exposed and some relating to espionage showed
British Airways had set up a specialist unit, whose task was to secure
confidential information from the computer systems of Virgin. Newspaper
report, on the case claimed Virgin realised ‘…BA employees had been
directly engaged in poaching passengers, as well as tampering with
company files designated “confidential”’ (The Independent 2015).
Non-EU
Switzerland eco esp. Art. 273 Making a manufacturing or trade secret 3 years
CC available to a foreign country, foreign
company or foreign organisation
ind. esp. Art. 162 Disclosure of a manufacturing or trade secret 3 years
CC to be kept as a result of a legal or contractual
obligation
Art. 23 Exploitation or communication of an 3 years
AAUC unlawfully explored manufacturing and trade
secret
Note: Where summary offences apply in most cases, the maximum sentence
is 6 months imprisonment and or £5000 fine. Some other possible offences
not included in the table include Misconduct in a Public Office (a public
office holder passing confidential information)
In the UK, the civil law is a common alternative route by which such
cases are addressed, where the victim organisation seeks damages. This
route is more likely to be used and lead to a successful conclusion for the
victim should they have suffered from industrial rather than economic
espionage. An example is the 2012 Dyson case, where they launched a civil
claim against Bosch, who it was claimed had placed an insider in Dyson to
steal secrets (The Guardian 2012). Such cases are often settled out of court
with no publicity, so it is difficult to know the outcome. This also makes it
difficult to determine the number of cases that are dealt with by the civil
courts too.
Some scenarios below illustrate the potential legal ramifications of the
actions of those engaged in espionage in the UK. They illustrate the
complexity and how actions may not always be criminal or even a civil tort:
An employee of company A leaves a document with designs for a new
product in a bar by accident and employee of company B picks up and
starts using. No criminal offence and civil tort against company B more
challenging if no patent, trademark or design registered.
An employee of company A leaves to work for company B and uses
secret knowledge from A to help B develop products. No criminal
offence, but possibly civil tort if employment contract of employee has
relevant provisions (but in Germany such behaviour could be criminal).
Employee of company B pays employee of company A to provide
confidential information. Could potentially be bribery and civil tort.
Employee of company A makes a copy of a list of customers and sells to
company B. Breach of 2018 Data Protection Act and civil tort.
Person A hacks into Company B’s computer and finds the designs for a
new product, copies them and sells to competitor. Breach of 1990
Computer Misuse Act and civil tort.
Person C places covert listening devices in the telephone of key
Company A and records discussions on future plans and sells information
to Company B. Breach of Wireless Telegraphy Act 2006 Section 48 and
possible civil tort.
In the same German study, a victim survey was also conducted with 583
SMEs from manufacturing sectors and industry-related companies and
came—with the exclusion of those companies that had not answered the
question—to similar results. Asked whom they suspected behind the attack:
34% of the companies reported that they suspect an internal offender, 44%
an external offender, 15% an internal and external offender and 8%
indicated that the offender was unknown or another kind of offender
(Bollhöfer and Jäger 2018, p. 6).
Techniques
Economic and industrial espionage is perpetrated by a wide range of both
illegal and legal means. Figure 13.1 illustrates the descent into more clearly
illegal activities that offenders can utilise.
Fig. 13.1 Methods of industrial espionage
Conclusion
This chapter has explored the problem of economic and industrial
espionage. It began by defining the terms and then illustrating some
examples, the purpose of it and then in the UK, Germany and several other
countries the legal basis for the problem. This chapter then considered the
perpetrators of this crime, before looking at some of the techniques used.
The extent and cost of it were considered before finally considering the
response to the problem in the USA, the UK and Germany. Industrial and
economic espionage are significant problems, but rarely researched and it is
hoped that this chapter will inspire others to investigate this fascinating
subject further.
Recommended Readings
In German-speaking countries (Austria, Germany, Switzerland), several
monographs that have dealt with the (criminal) protection of secrets have
been published over the past 20 years, for example, Aldoney Ramirez
(2009), Kalbfus (2011). Descriptions of the phenomenon, the legal basis,
terminology combined with recommended actions and best practices for
companies are provided by Lux and Peske (2002), Hofer and Weiß (2016).
However, empirical research is still lacking. In his comprehensive
secondary analysis based on articles and empirical studies from trade
associations and audit firms, Kasper (2015) describes the current state of
research into industrial espionage. Detlinger analysed the awareness of and
knowledge about industrial espionage in Austria by surveying 29
companies. Wallwaey, Bollhöfer and Knickmeier (2020) results about the
phenomenon and criminal proceedings of economic and industrial
espionage are based on an extensive empirical research project including a
literature analysis, analysis of files of criminal proceedings (n = 713), an
exemplary case study and expert interviews with SMEs, authorities and
scientific organisations (n = 63). This study also includes a victim survey,
published by Bollhöfer and Jäger (2018). In English there have been a
handful of research monographs and practical guides published on the
subject over the last 40 years by Heims (1982), Bottom and Gallati (1984),
Cornwall (1991), Nasheri (2005), Hannas et al. (2013), Roper (2013), to
name the most significant. There are not a huge number of journal articles,
and a good gateway to the subject is provided by the special edition of
Security Journal published in 2020, see Button (2020) and Knickmeier
(2020b) as starters and Hou and Wang (2020) for a literature review
published on the subject.
References
Aldoney Ramírez, R. (2009). Der allgemeine Geschäfts-und Betriebsgeheimnisbegriff. In Der
strafrechtliche Schutz von Geschäfts-und Betriebsgeheimnissen (pp. 24–25). Herbolzheim:
Centaurus Verlag & Media.
BBC News (2016). Clinton campaign ‘hacked’ along with other Democratic groups. Retrieved from
https://www.bbc.co.uk/news/election-us-2016-36927523
Bertel, C., Schwaighöfer, K., and Venier, A. (2018). Österreichisches Strafrecht Besonderer Teil I (§§
75 bis 168b StGB). 14th edition. Wien: Verlag Österreich.
Bottom, N. R., and Gallati, R. R. (1984). Industrial espionage: Intelligence techniques and
countermeasures. Butterworth.
Bundesamt für Statistik (2020). Strafgesetzbuch: Straftaten und beschuldigte Personen 2009–2019.
Retrieved from https://www.bfs.admin.ch/bfs/de/home/statistiken/kriminalitaet-strafrecht/polizei/
straftaten.assetdetail.11147617.html [accessed: 30 November 2020].
Button, M. (2020) Editorial: Economic and industrial espionage. Security Journal, 33(1), 1–5.
[Crossref]
Cabinet Office/Detica (2011) The Cost of Cyber Crime. Retrieved from https://assets.publishing.
service.gov.uk/government/uploads/system/uploads/attachment_data/file/60942/THE-COST-OF-
CYBER-CRIME-SUMMARY-FINAL.pdf
Carl, S., Kilchling, M., Knickmeier, S., and Wallwaey, E. (2017). Wirtschaftsspionage und
Konkurrenzausspähung in Deutschland und Europa. Schriftenreihe Forschung aktuell des Max-
Planck-Instituts für ausländisches und internationales Strafrecht Band 49.
Cornwall, H. (1991). The industrial espionage handbook (pp. 95–98). London: Century.
Dreissigacker, A., von Skarczinski, B., and Wollinger, G. R. (2020). Cyber-attacks against companies
in Germany. Retrieved from https://kfn.de/wp-content/uploads/Forschungsberichte/FB_158.pdf
[accessed: 30 November 2020].
European Centre for International Political Economy (2018). Stealing thunder: Cloud, IoT and 5G
will change the strategic paradigm for protecting European commercial interests. Will cyber
espionage be allowed to hold Europe back in the global race for industrial competitiveness?
Retrieved from https://ecipe.org/publications/stealing-thunder/
European Parliament (2001). Report on the existence of a global system for the interception of
private and commercial communications (ECHELON interception system). Retrieved from https://
www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-
0264+0+DOC+XML+V0//EN [accessed 30 November 2020].
Glitz, A., and Meyersson, E. (2020). Industrial espionage and productivity. American Economic
Review, 110(4), 1055–1103.
[Crossref]
Goel, S., Williams, K., and Dincelli, E. (2017). Got phished? Internet security and human
vulnerability. Journal of the Association for Information Systems, 18(1), 22.
[Crossref]
The Guardian (2012). Dyson accuses Bosch of paying research spy. Retrieved from https://www.
theguardian.com/business/2012/oct/24/dyson-accuses-bosch-paying-research-spy#:~:text=
Dyson%20has%20accused%20its%20German,its%20high%2Dsecurity%20research%20division.&
text=%22Dyson%20has%20confronted%20Bosch%20with,technology%2C%22%20the%20
company%20said.
Hannas, W. C., Mulvenon, J., and Puglisi, A. B. (2013). Chinese industrial espionage: Technology
acquisition and military modernisation. Routledge.
[Crossref]
Hou, T., and Wang, V. (2020). Industrial espionage—A systematic literature review (SLR).
Computers & Security, 98, 102019.
[Crossref]
The Independent (2015). British Airways spying scandal: New logo, new routes, new bosses—But
the stench remains. Retrieved from https://www.independent.co.uk/news/uk/home-news/british-
airways-spying-scandal-new-logo-new-routes-new-bosses-but-the-stench-remains-10076755.html
IP Commission (2017). The theft of American intellectual property: reassessments of the challenge
and united states policy.
Jeffray, C. (2014). The threat of cyber-crime to the UK RUSI threat assessment. Retrieved from
https://rusi.org/sites/default/files/201406_bp_the_threat_of_cyber-crime_to_the_uk.pdf
Kasper, W. (2020). Dealing with China’s turn to the dark side. Quadrant, 64(12), 66–71.
Knickmeier, S. (2020b). Spies without borders? The phenomena of economic and industrial
espionage and the deterrence strategies of Germany and other selected European countries. Security
Journal, 33, 6–26.
[Crossref]
Leveson (2012). An inquiry into the culture, practices and ethics of the press: Volume 1–4. Retrieved
from https://www.gov.uk/government/publications/leveson-inquiry-report-into-the-culture-practices-
and-ethics-of-the-press
Los Angeles Times (1999). 2 Taiwanese convicted in economic spy case. Retrieved from https://
www.latimes.com/archives/la-xpm-1999-apr-29-fi-32206-story.html
Lux, C., & Peske, T. (2002). Competitive Intelligence und Wirtschaftsspionage. Gabler Verlag.
Moore, A. P., Cappelli, D. M., Caron, T. C., Shaw, E., Spooner, D., and Trzeciak, R. F. (2011). A
preliminary model of insider theft of intellectual property (No. MU/SEI-2011-TN-013).
CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.
Nasheri, H. (2005). Economic espionage and industrial spying. Cambridge University Press.
National Cyber Security Centre (2020). Advisory: APT29 targets COVID-19 vaccine development.
Retrieved from https://www.ncsc.gov.uk/files/Advisory-APT29-targets-COVID-19-vaccine-
development.pdf
Nicola, A. D., and Scartezzini, A. (2000). When economic crime becomes organised: The role of
information technologies. A case study. Current Issues in Criminal Justice, 11(3), 343–348.
[Crossref]
Nurse, J. R., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R., and Whitty, M.
(2014, May). Understanding insider threat: A framework for characterising attacks. In 2014 IEEE
Security and Privacy Workshops (pp. 214–228). IEEE.
[Crossref]
Phishme (2016). Enterprise Phishing Susceptibility and Resiliency Report. Retrieved from https://
cofense.com/enterprise-phishing-susceptibility-report
Pohl, H. (2009). Zero-Day und Less-than-Zero-Day Vulnerabilities und Exploits. In Zacharias, C., ter
Horst, K. W., Witt, K-U., Sommer, V. Ant, M., Essmann, U., and Mülheims, L. (Eds).
Forschungsspitzen und Spitzenforschung. Innovationen an der FH Bonn-Rhein-Sieg, Festschrift für
Wulf Fischer. Heidelberg: Physica-Verlag, pp. 113–123.
Reuters (2011). Chinese hackers infiltrated five energy firms: McAfee. Retrieved from https://www.
reuters.com/article/us-energy-cyber-china/chinese-hackers-infiltrated-five-energy-firms-mcafee-
idUSTRE7190XP20110210
Roper, C. (2013). Trade secret theft, industrial espionage, and the China threat. CRC Press.
[Crossref]
Schmid, F., and Sulzbacher, M. (2018). Die Liste: Wen der deutsche Geheimdienst in Österreich
ausspähte. Retrieved from https://www.derstandard.at/story/2000081647150/die-liste-wen-der-
deutsche-geheimdienst-in-oesterreich [accessed: 30 November 2020].
Shah, S. (2012). Corporate espionage on ‘an industrial scale’ targeting the UK. Retrieved from
https://www.computing.co.uk/ctg/news/2187123/corporate-espionage-an-industrial-scale-targeting-
uk
Stirnimann, S. (2018). Der Mensch als Risikofaktor bei Wirtschaftskriminalität. Handlungsfähig bei
Non-Compliance und Cyberkriminalität. Wiesbaden: Springer.
[Crossref]
US Department of Justice (2018). Chinese Company Sinovel Wind Group convicted of theft of trade
secrets. Press release, 24 January 2018. Retrieved from www.justice.gov/opa/pr/chinese-company-
sinovel-wind-group-convicted-theft-trade-secrets [accessed: 30 November 2020].
Wagner, R. E. (2012). Bailouts and the potential for distortion of federal criminal law: Industrial
espionage and beyond. Tulane Law Review, 86(5), 1017–1055. Retrieved from http://papers.ssrn.
com/sol3/papers.cfm?abstract_id=1923469
Whitehead, T. (2016). Business suffering ‘industrial scale’ cyber theft, warns GCHQ head. Retrieved
from https://www.telegraph.co.uk/news/uknews/law-and-order/12197993/Business-suffering-
industrial-scale-cyber-theft-warns-GCHQ-head.html
World Intellectual Property Organisation (n.d.). Trade secrets. Retrieved from https://www.wipo.int/
tradesecrets/en/
Zwahlen, F., Marti, I., Richter, M., Konopatsch, C., and Hoststettler, U. (2020). Wirtschaftsspionage
in der Schweiz – Schlussbericht zuhanden des Nachrichtendienstes des Bundes (NBD). Bern:
Universität Bern. Retrieved from https://www.vbs.admin.ch/content/vbs-internet/de/verschiedene-
themen-des-vbs/die-nachrichtenbeschaffung-des-bundes/wirtschaftsspionage-in-der-schweiz.
download/vbs-internet/de/documents/nachrichtendienst/wirtschaftsspionage/20200120_
Schlussbericht_Wirtschaftsspionage.pdf [accessed: 30 November 2020].
Footnotes
1 Only four countries (Lithuania, the Netherlands, Poland and Hungary) have a legal definition of
industrial espionage and three countries (Lithuania, the Netherlands and Hungary) provide a legal
definition for economic espionage (Carl et al. 2017, p. 95).
2 The European Commission in the Trade Secrets Directive takes a broader definition which could
include confidential information such as proposed pricings for competitive bids (see, European
Commission n.d.).
3 The numbers are based on cases that resulted in a court judgement, penal order or provisional
dispensing with court action (Art. 153a Criminal Procedure Code).
4 Until 2019, the violation of trade secrets was regulated in Sec. 17 to 19 Act against Unfair
Competition.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_14
Michael Levi
Email: [email protected]
Abstract
Mike Levi focusses on money laundering where he analyses why security
experts should be interested in money laundering and its collateral damage
both for companies and for society. It goes on to review how evidence has
been used and can be used in fighting the financial components of
underlying crimes, examining the range of the problem(s) we are supposed
to be fighting—money laundering as an evil in itself and/or the underlying
crimes which give rise to it; it estimates the size and harmfulness of the
problems and identifies improvements/emerging problems in the
assessment of money laundering and how it is combatted.
Introduction
Money laundering is not an obvious area of concern for security
professionals. However, in this edition of the Handbook of Security, the
goal is to explain in what ways it is relevant to private and public security,
as part of the wider role of the reflective practitioner. Its background and
changing patterns will be described and explained, within the context of
international, national and corporate controls, and what we know about the
impacts of those controls will be critically discussed.
In the past 30 years, the world has witnessed an extraordinary growth in
efforts to control crime for economic and political gain (and, especially
since ‘9/11’, for terrorism) via measures to identify, freeze and confiscate
the proceeds of crime nationally and transnationally. Especially in Europe
and the US, but in different ways throughout the globe, first bankers and
similar functions like building societies in the UK, then accountants,
lawyers, notaries, real estate agents, art and antiquities dealers and even car
dealers have been forcibly co-opted into becoming unpaid agents of the
state: identifying customers (individual and corporate) and overturning
conventional legal constructs such as customer confidentiality, reporting
both their suspicions (if they have them) and more objective data on large
cash or sometimes international transfers to central bodies, on pain of
prosecution and/or regulatory sanctions if they do not. There is pressure
from international bodies and national governments to get an increasing
number of reports from a bigger range of commercial and professional
actors. But what happens afterwards to these reports is far less transparent
and—especially in those jurisdictions where there are the most reports—is
seldom visibly productive in outputs such as prosecutions and asset
recoveries or in outcomes such as the prevention of serious crimes. The cost
of Anti-Money Laundering (AML) implementation in the public and
(mostly) in the private sector dwarfs the quantity of crime proceeds
recovered, and the UK’s 2020 National Risk Assessment (HMG 2020)
proudly proclaims £300 million confiscated without (understandably)
noting what proportion (8.1 per cent) this represents of the £37 billion
officially estimated UK organised crime proceeds (not crime profits, which
would be lower than proceeds). Consider that this ‘confiscation gap’ is an
annual one, and—though the AML regime is valuable—you have some idea
of the cumulative issues even in a relatively well-functioning serious crime
control economy like the UK.
One useful way of conceptualising the issue is as a global exercise in
crime risk management which seeks to drag in as a conscript army those
governments and those parts of ‘the’ private sector that seem unwilling to
demonstrate ‘sufficient’ national and transnational social responsibility. But
what sorts of risks are they managing (and do they believe they are
managing), and how politically coherent, serious and well considered has
the attempt been? The crime reduction priorities and aims of nations can
change over time. National issues gave rise to particular foci of control
interest—sometimes, like ‘drug abuse’, independently in different countries
—before any co-ordinated international activity was even contemplated.
Thus prior to the UN Vienna Drugs Convention of 1988, the Swiss Banking
Commission sought to regulate capital flight, and (post-Watergate and
Lockheed bribery scandals in Japan) the Americans in 1977 criminalised
the corporate bribery of public officials overseas; while the Americans and
British (but almost no other countries at the time) criminalised laundering
the proceeds of drugs trafficking. These actions were prompted by concrete
ambitions and sometimes by international scandals such as bad publicity for
Switzerland as a ‘bank secrecy haven for kleptocrats’ and for the UK’s
Crown Dependencies and Overseas Territories (and, to a less publicised
extent, the Dutch Antilles ex-colonies) as ‘corporate secrecy havens’. The
growing attention to money laundering is reflected in the substantial rise in
the number of books that mention the term, alongside critical books about
banking and corporate secrecy, especially over this century: thus, the
positive ‘customer confidentiality’ has been almost wholly replaced by the
pejorative ‘secrecy’ in public discourse around the globe.
I first became interested in money laundering and terror finance in the
mid-1980s as I puzzled over how the Brinks’ Matt gold bullion robbers had
disposed of the proceeds of the £26 million of gold bullion (at historic
prices) they stole from London Heathrow in 1983, before money laundering
was criminalised. As we now know, some of the proceeds were laundered
with the aid of Panamanian companies operated by nominees at lawyers
Mossack Fonseca, as came to light in correspondence in the Panama Papers
(Bowers 2016), but one Brinks’ Matt launderer was jailed for ten years for
handling stolen funds, while other suspects were acquitted or not charged.
In 1988, the then Metropolitan Police Commissioner and senior bankers
asked me to review bankers’ obligations towards the police and vice versa,
but the emerging money laundering legislation and money laundering
reporting system then covered very few business sectors and quite patchily
(Levi 1991). (Young and Woodiwiss (2020) elaborate UK-US tensions in
that period.) In short, a security manager in the 1980s or even the 1990s
would have had little occupational reason to be concerned about or know
about money laundering. This was because it would have been out of scope
for security managers then (mostly focused on physical security from
outside attacks and on ‘stock shrinkage’); and because especially outside
the US, few companies were impacted negatively by money laundering or
foreign bribery allegations (or, if they were, largely kept quiet about them
unless penalised).
However, the security environment has changed significantly in this
century. Even before the ‘9/11’ attacks and the corporate scandals of that
decade, there was in many countries a genuine fear of loss of control over
illicit financial flows and of illegal drugs, which brings together a variety of
themes and a variety of political positions including
1.
financial regulators concerned about unmonitored ‘off the books’
(though often legal) transactions conducted by vast commodities
hedging funds held in less transparent offshore finance centres;
2.
law enforcement agencies and politicians bothered about ‘transnational
organised crime’ and its ability to launder estimated billions;
3.
corporations (especially American-headquartered ones prohibited from
paying bribes to foreign public officials by the Foreign Corrupt
Practices Act 1977) campaigning for a legal ‘level playing field’ so that
they can avoid losing tenders for contracts to bribe-payers;
4.
overseas aid agencies troubled by the theft of aid and bribes by Third
World potentates (Politically Exposed Persons, in AML terminology)
into individual and corporate accounts and luxury property, often
nominally held in offshore finance centres (e.g. Sharman 2017, see also
https://star.worldbank.org/); and
5.
corporations, intelligence and law enforcement agencies and politicians
concerned about the financing of terrorism both from proceeds of crime
and from legal-source income upon which the legally required tax has
been paid.
More recently, President Xi’s strong interest in promoting the Anti-
Corruption drive against both ‘flies’ and (some) ‘tigers’ to reduce the
legitimacy risks to the Chinese Communist Party from actual and perceived
rampant corruption has placed this issue centre stage. China held the
Presidency of FATF 2019–2020, with objectives (https://www.fatf-gafi.org/
publications/fatfgeneral/documents/objectives-2019-2020.html) which
included mitigating the risks and exploiting the opportunities of new
technologies; action on illegal trafficking in wildlife; and developing and
issuing best practices on beneficial ownership. This set of interests
continued under the German Presidency. In the more general setting of the
AML movement, banks and most other institutions (excepting lawyers in
jurisdictions like Australia, Switzerland and the US) have found it
impossible politically to resist the pressure to identify clients, create
monitoring systems and make reports of ‘suspicious activities’, whatever
their private beliefs. The march of AML has continued and become
embedded.
The encouragement by funding of mutual assistance programmes under
the principle of information exchange, combined with sharing of
experiences by members of FATF (a permanent body from 2019, thirty
years after its informal creation) and Egmont—a global organisation of
Financial Intelligence Units, with 166 members in 2021—generates a
partially harmonised global interchange. The increased ‘traffic’ in financial
investigation between countries forces them at an operational level to seek
solutions to their interface problems (though these do not always succeed,
nor are they always intended to), made easier by the growth of Beneficial
Ownership registers. Somewhat belatedly, the US National Defense
Authorization Act 2020 has brought the US into the beneficial ownership
registry fold, though as in the UK, the data to be held by it are not publicly
available but are accessible to law enforcement and financial regulators
there and internationally, via the Egmont group. International policing is
different from local partnership policing, where few marginal costs beyond
staff time and modest sponsorship are involved: pre-COVID-19 costs are
considerably more expensive and generally cannot be found from routine or
training budgets. The FATF has also sought recently to involve the financial
services corporate sector and professionals more in its public-private sector
initiatives.
This century, the European Commission has been involved in
supporting action against organised crime and card payment fraud, and to
sponsor private-public partnerships in organised crime and terrorism
prevention, as well as legal measures including those related to money
laundering and proceeds of crime recovery, as well as Rule of Law
measures. The other key role of the EU has been in relation to the acquis
communautaire, which has enabled it to engage in pressurised policy
transfer of Rule of Law (AML, anticorruption and mutual legal assistance)
legislation and programmes to candidate countries. No other region has
been able to exert analogous pressure, based on (at least formally) shared
values which are under strain at the turn of the current decade. The US has
long exerted its own pressures unilaterally and multi-laterally, and this is
not the place to review its efforts.
Money laundering is not the only crime not committed against their
business that corporate compliance/security officers have to worry about.
The intentional or inadvertent role of business in facilitating modern
slavery/human trafficking, environmental or wildlife crimes and human
rights violations are also important contemporary components, all of which
might be uncovered by due diligence about counter-parties or staff at all
levels of the organisation. Reviews of effectiveness or even of efficiency
would require a longitudinal flow rather than an annual approach to
accounting of costs and benefits, since identifying and recovering proceeds
of crime will often take place over more than a year, and impacts on
offending presumably longer still. Questions might be raised about whether
governments (and businesses) individually or collectively really want to
evaluate effectiveness and to adjust their policies in the light of it. ‘Crime
control’ is often a matter of expressing values rather than reflecting
evidence from science, and if we assess how important a problem is by how
much business and governments are willing to pay to do it well, then
though it is difficult to discover how much governments spend on handling
money laundering, it does not appear to be very important to them as a
proportion of total criminal justice expenditures. In the absence of evidence
to the contrary, it seems that in every developed country, business—
principally but not exclusively financial services—spends more than
government on anti-money laundering efforts.
First, however, we need to look at what is meant by financial crime and
the harms that it brings. None of the global figures generated and recycled
endlessly as ‘facts by repetition’ are used to assess the effectiveness of
AML or of any other policy (Levi et al. 2018); they are also not useful at
corporate level, except perhaps to attract the attention of CEOs. Large
attention-grabbing figures can even be counter-productive, since any
measure we take is unlikely to generate major impacts.
The criminalisation of transnational (and sometimes national) bribery
affects banks directly via risks (if they ‘fail’ to report any suspicions they
may have) of money laundering charges (a) against their own individual
Money Laundering Reporting Officers and (b) perhaps against the banks
themselves. It also affects banks indirectly because of the risks (however
remote in practice) that companies to whom they have lent money might be
damaged by severe penalties should they be convicted of corruption. The
trend in economic crime legislation in the UK and elsewhere has been to
impose due diligence requirements to the entire supply chain, for example,
in human slavery/people trafficking, under minimum wage payments and
‘failure to prevent’ tax evasion. See, for example, the UK Modern Slavery
Act, 2015, and https://tiscreport.org/our-data. The implications of these
developments are important, and they should be of interest to security
managers inside and outside the financial sector as strategic risks to the
business, even if many components are devolved to specialised compliance
functions.
As used in different countries, ‘financial crime’ and ‘economic crime’
comprise crimes with different categories and levels of harm, committed by
and impacting upon highly diverse sectors of the population. Their sub-
components are investigated (and are investigatable) by very different
policing and regulatory methodologies both before and after ‘crime’
commission (Gelemerova 2011). As a legal category, ‘laundering’ does not
enable us to distinguish between licensed professionals like lawyers who
launder; professional (i.e. regular) intentional money launderers; people
who launder money from their own crimes (like commercial burglars and
ram-raiders putting saved proceeds into their own bank accounts in their
own names); and banks who intentionally or recklessly ignore their
obligations to report suspected money laundering or who may not notice
patterns of ‘smurfing’ by customers making deposits just below the
reporting threshold (e.g. $10,000 in the US, variable elsewhere) (Levi and
Soudijn 2020). The term ‘banks’ hides huge variations in size and activities.
Banks generally counter that any laundering is the result of rotten apple
individuals or small group behaviour, or failures of system integration, and
it is difficult to test this or validly falsify such claims without smoking gun
emails/recorded conversations, or verified whistle-blower accounts, or some
‘market testing’ mystery shopping exercise as conducted by Findley et al.
(2014) and subsequently. What is certain, however, is that violations by
institutions great and small continue, despite occasional regulatory and rare
criminal institutional sanctions.
Some more subtle thinking is needed on metrics of reoffending also: for
example, given their size, should we treat a violation at a large multi-
national bank as being ‘the same’ (or more or less serious) as one at a much
smaller institution. Likewise, with non-financial multinationals versus
SMEs. After all, we would expect risks to be higher among those who
employ many more staff in a wider range of commercial activities and
environments, though large corporations have or should have more risk
management competencies.
Recommended Readings
For general security professionals, good books on money laundering are
hard to find. Grossey (2017) provides a good, clear and simple guide to
basic concepts and (evolving) responsibilities for UK bank staff and non-
executive directors; Madinger (2012), Parkman (2019) and Teichmann and
Sergi (2018) provide international guides to investigating and managing
money laundering, and insights/case studies. The Association of Certified
Anti-Money Laundering Specialists and some private businesses offer
courses, but they are aimed at specialised AML staff. Former investigators
and offenders have written case-oriented books. There is a range of
academic work, some quite technical by economists (Unger and Van der
Linde 2013) or lawyers (e.g. with a European focus, Vogel and Maillart
2020). Sceptical analyses include van Duyne et al. (2018) on the money
laundering evidence base; Levi and Soudijn (2020) on the organisation of
money laundering; Lord et al. (2019) on the market dynamics of the misuse
of ‘corporate vehicles’, and open access articles critically analysing policy
(e.g. Levi et al. 2018). In addition, the best written academic work on
money laundering is by Petrus van Duyne, R. Tom Naylor, Peter Reuter and
Melvin Soudijn; with thoughtful strategic articles on policing by Kenneth
Murray. There are good general books on kleptocracy and the links between
politics and laundering (e.g. Belton 2020; Bullough 2019; and Sharman
2017). The Journal of Financial Crime and the Journal of Money
Laundering Control contain many relevant studies. There are many
interesting social media sites such as https://www.thedarkmoneyfiles.com/.
Declarations
Funding: The author is grateful for the support of the UK Economic and
Social Research Council PaCCS (Grants ES/S008853/1; RES-051-27-0208;
and L216252037).
References
Belton, Catherine. 2020. Putin’s People: How the KGB Took Back Russia and then Took on the West,
London: William Collins.
Bowers, Simon. 2016. “How Mossack Fonseca helped hide millions from Britain’s biggest gold
bullion robbery”. The Guardian, 4 April 2016. https://www.theguardian.com/news/2016/apr/04/
brinks-mat-how-mossack-fonseca-helped-hide-millions.
De Boyrie, Maria E., Simon J. Pak, and John S. Zdanowicz. 2004. “Money laundering and income
tax evasion: the determination of optimal audits and inspections to detect abnormal prices in
international trade.” Journal of Financial Crime, 12 No. 2: 123–130.
[Crossref]
Bullough, Oliver. 2019. Moneyland: Why Thieves and Crooks Now Rule The World And How To Take
It Back. London: Profile Books.
FATF. 2018. Professional Money Laundering. Paris: Financial Action Task Force (FATF).
FATF/Egmont. 2020. Trade-based Money Laundering: Trends and Developments. Paris: FATF.
Ferwerda, Joras. 2013. The Effects of Money Laundering. Research Handbook on Money
Laundering, Edward Elgar, 35–46.
Findley, Michael G., Daniel L. Nielson, and Jason C. Sharman. 2014. Global shell games:
Experiments in transnational relations, crime, and terrorism. Cambridge University Press.
[Crossref]
Gelemerova, Liliya Y. 2011. The anti-money laundering system in the context of globalisation.
https://pure.uvt.nl/ws/portalfiles/portal/1383101/Gelemerova_anti_28-06-2011.pdf.
Grabosky, Peter N. 1995. ‘Counterproductive regulation’. International Journal of the Sociology of
Law, 23 (4): 347–369.
[Crossref]
Grossey, Susan. 2017. Anti-Money Laundering: What You Need to Know. CreateSpace Independent
Publishing Platform.
HMG. 2020. National risk assessment of money laundering and terrorist financing 2020. https://
www.gov.uk/government/publications/national-risk-assessment-of-money-laundering-and-terrorist-
financing-2020.
Langworthy, Robert H. 1989. “Do stings control crime? An evaluation of a police fencing operation.”
Justice Q 6(1):27–45
[Crossref]
Levi, Michael. 1991. “Pecunia non olet: cleansing the money launderers from the Temple”, Crime,
Law, and Social Change, 16: 217–302.
[Crossref]
Levi, Michael. 2020. “Making sense of professional enablers’ involvement in laundering organized
crime proceeds and of their regulation.” Trends in Organized Crime. https://doi.org/10.1007/s12117-
020-09401-y.
Levi, Michael, Peter Reuter, and Terrence Halliday. 2018. “Can the AML/CTF System Be Evaluated
Without Better Data?” Crime, Law and Social Change, 69(2): 307–328.
[Crossref]
Levi, Michael and Melvin Soudijn. 2020. “Understanding the Laundering of Organized Crime
Money. In P. Reuter and M Tonry (eds) Organizing Crime: Mafias, Markets, and Networks. Crime
and Justice Vol 49. Chicago: University of Chicago Press.
Lord, Nicholas J., Liz J. Campbell, and Karin Van Wingerde. 2019. “Other people’s dirty money:
professional intermediaries, market dynamics and the finances of white-collar, corporate and
organized crimes.” The British Journal of Criminology 59, no. 5: 1217–1236.
[Crossref]
McPherson, Gary. 2017. “Floating on Sea of Funny Money: An Analysis of Money Laundering
through Miami Real Estate and the Federal Government’s Attempt to Stop It,” University of Miami
Business Law Review 26, 1 (Winter): 159–190.
MacCoun, Rob and Peter Reuter, 2010. Drug War Heresies: Learning from Other Vices, Times, and
Places. Cambridge University Press.
Madinger, John. 2012. Money Laundering: A Guide for Criminal Investigators. 3rd ed.. New York:
Routledge.
May, Tiggey and Bina Bhardwa. 2018. Organised Crime Groups Involved in Fraud. London:
Palgrave Pivot.
[Crossref]
Middleton, David J., and Michael Levi. 2015. “Let Sleeping Lawyers Lie: Organized Crime,
Lawyers and the Regulation of Legal Services.” British Journal of Criminology 55(4): 647–668.
[Crossref]
Reuter, Peter. 2013. “Are estimates of the volume of money laundering either feasible or useful?.” In
Research handbook on money laundering, edited by Brigitte Unger and Daan van der Linde.
Cheltenham: Edward Elgar.
Sharman, Jason C. 2017. The Despot’s Guide to Wealth Management. Ithaca: Cornell University
Press.
[Crossref]
Teichmann, Fabian M., and Bruno S. Sergi. 2018. Compliance in Multinational Corporations:
Business Risks in Bribery, Money Laundering, Terrorism Financing and Sanctions. Emerald Group
Publishing.
Unger, Brigitte, and Daan Van der Linde, eds. (2013) Research handbook on money laundering.
Edward Elgar Publishing.
Van Duyne, Petrus C., Jackie H. Harvey, and Liliya Y. Gelemerova. 2018. The Critical Handbook of
Money Laundering: Policy, Analysis and Myths. London: Palgrave.
[Crossref]
Vogel, Ben, and Jean-Baptiste Maillart, eds. 2020. National and International Anti-Money
Laundering Law: Developing the Architecture of Criminal Justice, Regulatory Law and Data
Protection. The Hague: Intersentia.
Young, Mary A., and Michael Woodiwiss. 2020. “A world fit for money laundering: the Atlantic
alliance’s undermining of organized crime control.” Trends in Organized Crime. https://doi.org/10.
1007/s12117-020-09386-8.
Wilkins, Leslie T. 1965. “New thinking in criminal statistics.” The Journal of Criminal Law,
Criminology, and Police Science 56(3): 277–284.
[Crossref]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_15
Mark Button
Email: [email protected]
David Shepherd
Email: [email protected]
Abstract
Hock, Shepherd and Button focus on corporate corruption and start by
arguing that categorising those tainted as either perpetrators or victims is
reductionist. They show that corporations in many instances occupy dual
roles as both perpetrators and victims and that their victimisation and
culpability are a matter of degree. Drawing on the court papers in bribery
cases involving Airbus and Rolls-Royce, they use pathogen theory to
explain the situational factors that may lead a person to engage in bribery.
They provide an alternative explanation of why people and organisations
engage in international bribery.
Introduction
The UK and other countries, which have historically failed to prosecute
corporates and their managers for complex economic crimes, have adapted
their approaches to increase their enforcement activities. The increased
enforcement has made the culpability of corporations and their directors a
practical problem and a societal dilemma.
Sutherland (1949) famously argued that the spread of white-collar
criminality within a corporation depends on associations with people who
are favourable to such criminality. However, this assertion needs to account
for the complexity of corporations, which rely on extensive networks of
groups and individuals within and between organisations. Some of these
relationships may be toxic in favouring crime whilst others are highly
ethical and law-abiding. We therefore argue that simply categorising those
tainted by corporate corruption as either perpetrators or victims is
reductionist. In many instances, corporations occupy dual roles as both
perpetrators and victims. An organisation that engages in a corrupt act may
also be victimised by the corrupt activities of another organisation. A
corporation that is accused of failing to prevent bribery could be regarded
as the victim of a delinquent subsidiary or an errant employee. To
investigate this societal dilemma and the influence of corporate networks,
we use policing of international bribery as a case study.
The rest of this chapter is organised as follows. The first section
contextualises bribery as a form of corruption. The second section
investigates why individuals and corporations engage in bribery. The third
section analyses international bribery cases in order to illustrate key issues
associated with policing international bribery. The last section concludes by
discussing the link between corporate offending and corporate
victimisation.
Consequences of Corruption
Economic exchanges are variously regarded as criminal, unethical or
legitimate practice depending on local cultural norms and their expression
in national laws. Furthermore, the cultural flexibility inherent in
international law enforcement creates a legal, social, economic and
utilitarian dilemma at the heart of the corruption problem: who is the
perpetrator and who is the victim?
Early commentators advocated that corruption is in some instances an
efficient phenomenon that serves to insert “grease in the wheels” of
commerce and overcome the dysfunctional inefficiencies of bad
administrations (Huntington 1968). However, this is primarily a utilitarian
perspective from the supply side that sees corruption as a tool to get things
done. It ignores the huge, long-term harm caused on the demand side,
especially in developing nations. Corruption might indeed overcome a
government’s administrative failings in the short term, but in the long term
it amplifies systemic inefficiencies (Bardhan 1997; Hock 2020a: 22–23). It
becomes a corrosive problem that pervades public administration and
commerce (Fletcher and Herrmann 2012). Corruption contributes to
poverty, inequality, social divisions, political instability, lowers rates of
economic growth, lowers incentives to invest, and diverts public funds to
useless vanity projects (Rose-Ackerman 1999; Vishny and Shleifer 1993). It
is a deadly problem worldwide: over $500 billion in lost health resources
and 140,000 childhood deaths are attributable to corruption each year
(Bruckner 2019; Hanf et al. 2011). According to the Stanford Law School
(n.d.), the healthcare industry is second only to the oil and gas industry in
the number of actions brought under the FCPA for foreign bribery,
accounting for 12% of all such actions, and just ahead of the aerospace
industry.
From a policy perspective, both the UN and OECD conventions make
clear moral statements that corruption is unacceptable. The conventions
represent collective agreements on how corruption should be tackled and
why it should be tackled. The introduction to the UNCAC describes
corruption as an “insidious plague” and an “evil phenomenon” that
threatens “the stability and security of societies, undermining the
institutions and values of democracy, ethical values and justice and
jeopardizing sustainable development and the rule of law” (UNCAC: 2).
The Preamble of the OECD Anti-Bribery Convention describes bribery as a
widespread phenomenon “which raises serious moral and political
concerns, undermines good governance and economic development, and
distorts international competitive conditions.” These are fine words, but
policy makers worldwide need hard evidence to turn the sentiments into
action. The justification for building sufficient capacity to tackle corruption
mainly rests in quantifying the aggregated harmful consequences and costs
of the phenomenon, that is, measuring the extent of the problem.
Extent of Corruption
Measuring the extent of corruption is fraught with challenges (Sampford et
al. 2006). The basic measures of crime, such as police recorded crime
statistics, are largely useless when applied to corruption. In part this is
because the secrecy of corruption means that the large majority of cases
remain hidden. Those that are discovered are often not reported to the
authorities, and many that are reported are not investigated. Investigations
then often fail to determine whether a crime has actually occurred. Unlike
burglary, where there is usually clear evidence of a crime, such as a broken
window and missing property, corruption often involves just a suspicion
and little actionable evidence.
Another important issue is that the broad concept of corruption is not
always coterminous with specific pieces of legislation. In the UK, acts of
corruption could, for example, fall under the Bribery Act 2010, Misconduct
in Public Office (common law offence), the Fraud Act 2006, the Theft Act
1968 and the Competition Act 1998. Identifying which specific cases
prosecuted under these laws involved corruption is very difficult.
Misconduct in Public Office is itself a broadly framed offence that
encompasses, for example, the wilful neglect of a person in police custody
to intentional acts of fraud, theft and bribery perpetrated by public officials
(Crown Prosecution Service [CPS] 2018). Consequently, official statistics
relating to corruption cases represent the tip of the iceberg. Based on the
Bribery Act 2010 and the assumption that all Misconduct in Public Office
offences involve corruption, Table 15.1 sets out the number of corruption
offences recorded in the UK between 2017 and 2020 (Office for National
Statistics [ONS] 2020). At less than 150 cases per year, the data erroneously
suggests corruption is a very small problem.
Table 15.1 Recorded corruption offences in the UK
Differential Association
Sutherland’s theory of differential association is a very important social
learning theory that has been used to explain both white-collar and other
types of criminality (Sutherland et al. 1992: 88). The essence of the theory
is that criminality is learnt, and that person is more likely to commit crimes
if he or she is exposed to an excess of cues favouring criminality. Proximal
social groups such as family, communities, gangs and workplaces provide
the behavioural cues for engaging in or rejecting criminality. Bribery is
more likely to occur in organisations where corrupt practices are tolerated
or even incentivised.
Control Theory
Control theory is a broad group of ideas that are based on the classicist
notion that everyone is born into this world with an equal propensity to
criminality. It then turns the deviance question on its head and asks why
everyone does not commit crime (Hirschi 1969). Control theory seeks to
understand the interaction between internal self-restraint controls and
external controls. The external controls are broadly divided into two areas,
informal and formal controls. Informal controls are the non-regulatory
social controls which nurture and guide individuals into conformance with
normative values. The theory borrows from social learning theory in
postulating that positive nurturing and associations in the early years
promotes the internalisation of controls, thus leading to self-restraint (Jones
2017). Bribery is not a salient nurturing topic, so it is more reliant on
external controls in adulthood.
Opportunity Theory
A very important set of theories surround opportunity. Routine activity
theory argues that crime is linked to the everyday routine activities of
offenders and victims (Cohen and Felson 1979). The theory states that
crime is more likely to occur in a situation when a motivated offender, an
opportunity in the form of a suitable target and the lack of a capable
guardian converge in time and space. Rational choice underpins this theory
as it assumes that all offenders rationally weigh up the costs and risks of
offending against the perceived benefits in every situation (Cornish and
Clarke 1986). In the context of bribery, the routines of work, the absence of
effective controls or regulations and the appearance of a suitable conspirator
provide the opportunity for the corrupt exchange.
The fraud theory developed by Cressey (1953), commonly known as the
fraud triangle, links opportunity with strain and rationalisation theories to
explain the criminal pathway of lone occupational fraudsters. The theory
states that fraud is more likely to occur when an employee motivated by
financial distress has the workplace opportunity to commit a crime to
alleviate those strains and is able to rationalise his actions. It is equally
applicable to bribery in the workplace because it involves opportunity (at
work), motivation (strain or coercion) and rationalisations.
All the above theories have an application in bribery. In combination,
the likelihood of bribery occurring is bound to increase as the social,
psychological and situational features underpinning these theories converge,
that is when the person is:
1.
motivated by strains
2.
presented with an opportunity during routine activities at work
3.
surrounded by noxious cultural messages
4.
subject to weak external controls
5.
with a negligible chance of detection
6.
psychologically rationalises their actions
7.
and overcomes self-restraint controls
These theories have been rarely applied to corruption and none have
offered detailed insights on the recruitment of individuals to corrupt
schemes. One of the few exceptions is differential association theory which
explores how individuals through exposure to deviant behaviours and
norms can become criminal too, but it does not explore the wider
organisational context of controls too. The next section offers an insight of
not only how persons become recruited, but also how the organisational and
situational factors affect this too through the metaphor of pathogens.
Corruptor Pathogen
The corruptor pathogen is the predatory parasite who initiates the corrupt
relationship, whether an assertive briber or an assertive bribee. It may be a
person seeking a private gain for himself or to benefit others, their company
or community. An example is a company manager who offers an unsolicited
bribe to a customer’s buyer to secure a valued contract for her employer. In
the reverse case, the corruptor pathogen is the bribee, the manager who
demands a bribe for awarding a contract. A more extreme instance involves
extortion: knowing that a supplier’s business is dependent on its
commercial relationship, the corrupt bribee threatens to terminate the
supply arrangement unless bribes are paid.
Submissive Pathogen
The submissive pathogen, whether the briber or the bribee, is the person
who is sufficiently motivated to submit to the solicitation of the corruptor
pathogen. Again, the submissive pathogen may be a person seeking
personal gain or for others. It may be a bribee motivated by the lure of easy
money, or an individual who is offered respite from personal financial
strains, or a victim of extortion. It is also a business person who rationally
calculates that they have, for the sake of their business, no alternative and
consents to corrupt demands.
Resident Pathogen
Resident pathogens are the latent weaknesses lurking in organisational
structures, policies, norms, systems of control and routine activities. They
are implicit in the opportunity limb of Cressey’s (1953) fraud model: the
shortcomings exploited by both bribers and bribees using their insider
knowledge and expertise. Common examples are inadequate vendor
appraisals, ineffective recruitment screening, superficial control of
transactions and self-authorisation of expenditure (Tunley et al. 2018).
Resident pathogens are not restricted to the systems of oversight, they also
include factors which promote criminal acts, for instance, undue
performance pressures and perverse incentives. In more extreme
circumstances, bribery is so deeply embedded in an organisation’s cultural
norms that the system is not just infected by pathogens, the entire system
can be regarded as the resident pathogen.
The SFO v Rolls Royce court documents reveal a similar pattern. The
AirAsia executives demanded a significant discount on a maintenance
programme for a private jet, or the cash equivalent, in return for substantial
maintenance contracts for the commercial fleet. The private jet was owned
by a syndicate including the executives and others. The relationship was
managed by Rolls Royce Deutschland (RRD), a German subsidiary. RRD
sought approval from the compliance department which advised that the
arrangement would breach the FCPA and the Bribery Act and should be
made transparent to the board and shareholders of AirAsia. Like Airbus,
Rolls Royce managers sought a solution to the problem involving a
structure and language that would navigate a way round the laws. Frustrated
by progress, the AirAsia executives linked the bribe to the payment of
outstanding debts to Rolls Royce, demanded cash instead of a discount and
demanded the removal of the Rolls Royce account manager by email: “I
will not meet with liars next week.” The parties eventually settled on a
credit arrangement that gifted the private syndicate $3.2 million worth of
maintenance.
The court papers in both these schemes portray the AirAsia executives
as the aggressive, assertive corruptor pathogens and Airbus and Rolls
Royce management as submissive pathogens. Despite having anti-bribery
policies and structures in place which raised warnings, senior managers in
both companies acquiesced to the corrupt demands to win very substantial
contracts. In both cases management did not possess sufficient moral
integrity to countenance the risk of losing the substantial commercial
opportunities. Whilst higher loyalty rationalisations were undoubtedly an
important factor (Sykes and Matza 1957), they also negotiated internally
over the construction of specific rationalisations to assuage any moral
dissonance and deflect regulatory scrutiny: Airbus managers characterised
their bribe as sponsorship, Rolls Royce managers characterised their bribe
as commercial credit. Dysfunctional committees and senior managers then
accepted these rationalisations and their purpose in overriding management
controls. Crucially, the compliance functions lacked the power and
independence to reject the rationalisations.
Following detection and investigation by the SFO, Rolls Royce and
Airbus accepted that the rationalisations were vacuous and admitted to the
corruption charge of failing to prevent bribery under Section 7 of the
Bribery Act 2010. However, the absence of equivalent domestic oversight
in Malaysia meant that neither AirAsia nor its executives faced justice or
any kind of regulatory intervention. Indeed, a committee formed by AirAsia
to review the Airbus case with the assistance of accountancy firm, BDO,
concluded after just one month that the executives had acted properly
(AirAsia 2020).
Discussion and Conclusion: Beyond Victims and
Perpetrators
Categorising those tainted by international bribery as either perpetrators or
victims is reductionist. The case of international bribery shows how
corporations rely on extensive networks of groups and individuals within
organisations and between organisations. Pathogen theory suggests that this
complexity might be difficult to be dealt with by underlying laws and
regulations. For example, laws should be enforced equitably to both sides of
the corrupt exchange and enforcement should prioritise the human corruptor
pathogens. Currently international enforcement usually fails in both regards
because its primary strategic focus is the supply side where prosecution is
conveniently feasible.
The pathogen networks in the Rolls Royce and Airbus cases illustrate
the tensions and dilemmas at the core of the international commercial
bribery problem. The most obvious problem is the inequity created by the
dichotomy in law enforcement structures: a private exchange negotiated in
parallel with a commercial contract is conventionally prosecuted in some
jurisdictions but hardly ever in others. This leads to the absurd situation
where submissive bribers are heavily penalised for specific and general
deterrence purposes, whilst aggressive corruptors are not punished. The
international treaties have demonstrated an influence in choking the supply
side within some developed nations; however, their impact on the demand
side is much more limited.
The Rolls Royce and Airbus managers decided to play at times by the
rules of the same corrupt aerospace marketplace and chose bribery instead
of legitimate market competition. Both corporations concluded a DPA
based on their failure to prevent bribery. However, it is arguable that the
corporations were victims of the schemes, as opposed to perpetrators, in
two ways. Firstly, whilst the Rolls Royce and Airbus managers were
criminal in their behaviour, they were also victims of the aggressive
coercion of the most salient pathogens, the AirAsia executives.
Secondly, it can be argued that the two corporations are victims of their
own human pathogens, their employees. From a conceptual perspective, all
the theoretical explanations previously explicated are relevant to the corrupt
outcomes. The combination of ever-present strains to secure profits and
jobs, corrupt opportunities within work routines, toxic associations, weak
management controls, minimal likelihood of detection due to conspiratorial
secrecy and shared constructed rationalisation which overcame self-
restraint, all led the managers in both companies to the economically
rational choice of engaging in bribery. Although these are features of what
white-collar criminologists have called criminogenic corporations (see
Braithwaite 1985: 93), they represent very human constructions, attitudes,
behaviour, calculations and choices. Corporations are mindless legal entities
which are incapable of such things. In both cases the corporations had
policies and structures to prevent bribery, yet people working in the
organisations chose to circumvent the policies and controls. The
corporations were simple bystanders to the unfolding dramas.
The Rolls Royce and Airbus examples demonstrate that espoused ethics
policies are mere window dressing if they are not backed up with
meaningful intent and action. Without meaningful intent, ordinary people
can easily be drawn into corrupt relationships, especially when the
corporation operates in a vulnerable industry and in regions that have little
regard for the concept of corruption. Employees need the constraints of
robust ethical governance in order to protect the integrity and interests of
the corporate entity. The corporation should not have to rely on external,
regulatory intervention to prevent it from becoming a victim of its own
employees. It is the responsibility of management to provide the
corporation with a resilient ethics function that is capable of identifying and
mitigating both human and latent, resident pathogens.
As the representation of the organisation’s conscience, the compliance
and ethics function should be independent of the operations and sufficiently
remote from everyday routines so as not to be caught up in the strains, toxic
associations, opportunities and constructed justifications for bad behaviour
(see Miller 2015; Pasculli 2021; Vozza 2022). It should be invested with the
authority to intervene at the nascence of corrupt deals and with the integrity
to report corrupt events to the authorities when controls do fail. To achieve
its aims, an effective compliance function should be empowered to reject all
“engineered solutions” that are really rationalisations constructed in support
of corrupt relationships, and to reject all rationalised excuses for turning a
blind eye to corruption (Shepherd and Button 2018).
To characterise Rolls Royce and Airbus as victims or bystanders does
not mean that they should not be subject to the rule of law, particularly as
they unjustly benefited from the illegal actions of their employees. The
question is, which law? For national states, as well as international
organisations that states form, to be successful in their primary ambition of
reducing corruption globally, pathogen theory suggests that:
1.
The criminal law should be applied equitably and proportionately to
both sides of corrupt exchanges.
2.
Criminal enforcement should focus on the human pathogens.
3.
Criminal enforcement should prioritise the corruptor pathogens, being
it a pro-active briber or a bribee.
4.
Corporations should be subjected to regulations which indirectly force
management to self-police their operations.
Presently international anti-bribery enforcement regime usually fails
with regards to the first three conditions for two reasons. Firstly, its primary
strategic focus is the supply side where prosecution is considered feasible.
Secondly, very few individuals are prosecuted either because effective laws
are absent, or because criminal justice systems cannot cope with white-
collar conspiracies. International anti-bribery enforcement is becoming
more successful on the supply side in regulating corporations: DPAs and
NPAs are in effect regulatory regimes that avoid criminal prosecution
(Grasso, 2016; Hock 2020b). They impose fines, relieve the corporations of
their illegal benefits and force managers to develop ethics programmes.
This is, however, a strategy of convenience which fails to deal with corrupt
politicians and the corrupt human pathogens within corporations.
Recommended Readings
The work of Fletcher and Herrmann (2012) provides good insights into the
study of international corruption, it highlights various conceptual and
analytical approaches to the matter but also how corruption is linked to
transnational crime networks. Hock (2020a) provides a more specific take
on the role played by international anti-bribery enforcement and the
analysis of international bribery cases. For a more detailed discussion on
policing corporate bribery through non-trial resolutions such as DPAs see
Hock (2020b). When it comes to relevant theoretical approaches, Button et
al. (2018, 2019) provide a helpful framework of co-offending and bribery,
and especially the recruitment of participants to corrupt schemes and the
implications for prevention. In addition, Shepherd and Button (2018)
provide an interesting analysis of organisational behaviour once it discovers
occupational fraud. Braithwaite (1985) and his other works then present the
state of the art of policing corporate crime, including the various private,
public and hybrid regulatory alternatives.
References
Legislation, International Treaties, and Judgments
Bribery Act 2010, c. 23.
United Nations, Convention against Corruption, New York, 31 October 2003, in force 14 December
2005, 2349 U.N.T.S. 41, 43 I.L.M. 3
AirAsia (2020). AirAsia Report on the Findings of the Independent Internal Inquiry Conducted by
BDO Governance Advisory Sdn. Bhd. https://newsroom.airasia.com/news/2020/3/20/airasia-report-
on-the-findings-of-the-independent-internal-inquiry-conducted-by-bdo-governance-advisory-sdn-bhd
Andersson, S. and Heywood, P. M. (2009). The Politics of Perception: Use and Abuse of
Transparency International’s Approach to Measuring Corruption. Political Studies, 57(4), 746–767.
[Crossref]
Andresen, M. S. and Button, M. (2018). The Profile and Detection of Bribery in Norway and
England and Wales: A Comparative Study. European Journal of Criminology, 16(1), 18–40.
[Crossref]
Benson, M. (1985). Denying the Guilty Mind: Accounting for Involvement in a White-Collar Crime.
Criminology, 23(4), 583–607.
[Crossref]
Benson, A. (2014). F1: Caterham Team is Sold by Tony Fernandes to a Consortium. BBC. https://
www.bbc.co.uk/sport/formula1/28129627
Braithwaite, J. (1985). To Punish or Persuade: Enforcement of Coal Mine Safety. Albany: State
University of New York Press.
Bruckner, T. (2019). The Ignored Pandemic: How Corruption in Healthcare Service Delivery
Threatens Universal Health Coverage. Transparency International. http://ti-health.org/content/the-
ignored-pandemic/
Button, M., Shepherd, D. and Blackbourn, D. (2018). Co-offending and Bribery: The Recruitment of
Participants to Corrupt Schemes and the Implications for Prevention. Security Journal, 31(4), 882–
900.
[Crossref]
Button, M., Shepherd, D. and Blackbourn, D. (2019). Explaining the Causes of Bribery from an
Offender Perspective. In N. Ryder and L. Pasculli (Eds.), Corruption in the Global Era: Causes,
Sources and Forms of Manifestation (pp. 140–162). London: Routledge.
[Crossref]
Cohen, L. E. and Felson, M. (1979). Social Changes and Crime Rates: A Routine Activities
Approach. American Sociological Review, 44(4), 588–608.
[Crossref]
Cornish, D. B. and Clarke, R. G. (1986). The Reasoning Criminal: Rational Choice Perspectives on
Offending. New York: Springer-Verlag.
[Crossref]
Cornish, D, and Clarke, R. (2003) Opportunities, Precipitators and Criminal Decisions: A Reply to
Wortley’s Critique of Situational Crime Prevention. Crime Prevention Studies, 16, pp 41–96
Das, K. and Lee, L. (2020). Malaysia Probes Allegations that Airbus Bribed AirAsia Bosses. Reuters.
https://uk.reuters.com/article/us-airbus-probe-airasia/malaysia-probes-allegations-that-airbus-bribed-
airasia-bosses-idUKKBN1ZV3LV
Dávid-Barrett, E. and Fazekas, M. (2020) Grand Corruption and Government Change: An Analysis
of Partisan Favoritism in Public Procurement. European Journal of Criminal Policy Research, 26,
411–430.
[Crossref]
European Commission (2013). Identifying and Reducing Corruption in Public Procurement in the
EU. https://ec.europa.eu/anti-fraud/sites/antifraud/files/docs/body/identifying_reducing_corruption_
in_public_procurement_en.pdf
Fazekas, M., Tóth, I. J. and King, L. P. (2013). Anatomy of Grand Corruption: A Composite
Corruption Risk Index Based on Objective Data. Corruption Research Center Budapest Working
Paper series: CRC-WP/2013:02.
Fletcher, C. and Herrmann, D. (2012) The Internationalisation of Corruption: Scale, Impact and
Countermeasures. London: Routledge.
Ford, C. and Hess, D. (2008). Can Corporate Monitorship Improve Corporate Compliance? Journal
of Corporation Law, 34, 679–738.
Hanf, M., Van-Melle, A., Fraisse, F., Roger, A., Carme, B. and Nacher, M. (2011) Corruption Kills:
Estimating the Global Impact of Corruption on Children Deaths. PLoS One, 6(11): e26990.
[Crossref]
Hock, B. (2020b). Policing Corporate Bribery: Negotiated Settlements and Bundling. Policing and
Society. https://doi.org/10.1080/10439463.2020.1808650
Huntington, S. P. (1968). Political Order in Changing Societies. New Haven, CT: Yale University
Press.
Lambsdorff, J. G. (2006) Causes and Consequences of Corruption: What Do We Know from a Cross-
Section of Countries/ In S. Rose-Ackerman (Ed.) International Handbook on the Economics of
Corruption (pp. 3–51). Chteltenham: Edward Elgar.
Matthews, R. (2014). Rational Choice, Routine Activities and Situational Crime Prevention. In R.
Matthews. Realist Criminology (pp. 72–93). Basingstoke: Palgrave Macmillan.
[Crossref]
Merton, R. (1938). Social Structure and Anomie. American Sociological Review, 3, 672–682.
Miller, G. P. (2015). The Compliance Function: An Overview. In J. N. Gordon and W.-G. Ringe
(Eds.) The Oxford Handbook of Corporate Law and Governance (pp. 981–1002). Oxford: Oxford
University Press.
Nash, R., Bouchard, M. and Malm, A. (2017). Social Networks as Predictors of the Harm Suffered
by Victims of a Large-scale Ponzi Scheme. Canadian Journal of Criminology and Criminal Justice,
59(1), 26–62.
[Crossref]
ONS (2020). Crime in England and Wales: Other Related Tables. https://www.ons.gov.uk/
peoplepopulationandcommunity/crimeandjustice/datasets/crimeinenglandandwalesotherrelatedtables
Peoples, C. and Sutton, J. (2015). Congressional Bribery as State-corporate Crime: A Social Network
Analysis. Crime, Law and Social Change, 64, 103–125.
Reason, J. (2000). Safety Paradoxes and Safety Culture. Injury Control & Safety Promotion, 7(1), 3–
14.
[Crossref]
Sampford, C., Shacklock, A., Connors, C. and Galtung, F. (Eds.) (2006). Measuring Corruption.
Ashgate Publishing.
Schuchter, A. and Levi, M. (2013). The Fraud Triangle Revisited. Security Journal, 29(2), 107–121.
[Crossref]
SFO (2017). SFO Completes £497.25m Deferred Prosecution Agreement with Rolls-Royce PLC.
https://www.sfo.gov.uk/2017/01/17/sfo-completes-497-25m-deferred-prosecution-agreement-rolls-
royce-plc/
SFO (2020). Deferred Prosecution Agreement. SFO v. Airbus. Available from: https://www.sfo.gov.
uk/download/airbus-se-deferred-prosecution-agreement-statement-of-facts/#
Steele, R. (2015). How Offenders Make Decisions: Evidence of Rationality. British Journal of
Community Justice, 13(3), 7–20.
Sullivan, J. (2009). The Moral Compass of Companies: Business Ethics and Corporate Governance
as Anti-corruption Tools. International Finance Corporation. https://openknowledge.worldbank.org/
handle/10986/23980
Sutherland, E. H., Cressey, D. and Luckenbill, D. (1992). Principles of Criminology (11th ed.).
Lanham: General Hall.
Tierney, J. (2013). Criminology: Theory and Context (3rd ed.). Harlow: Pearson Longman.
[Crossref]
Tunley, M., Button, M., Shepherd, D. and Blackbourn, D. (2018) Preventing Occupational
Corruption: Utilising Situational Crime Prevention Techniques and Theory to Enhance
Organisational Resilience. Security Journal, 31(1), 21–52.
[Crossref]
Vishny, A. and Shleifer, R. W. (1993) Corruption. Quarterly Journal of Economics, 108(3), 599–617.
[Crossref]
Wolfe, D., and Hermanson, D. (2004). The Fraud Diamond: Considering the Four Elements of Fraud.
The CPA Journal, 74(12), 38–42.
Zagaris, B. (2015). International White Collar Crimes: Cases and Materials. Cambridge: Cambridge
University Press.
[Crossref]
Part III
Crime and Security in Different Domains
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_16
Patrick F. Walsh
Email: [email protected]
Abstract
Patrick Walsh discusses threats to the bioeconomy sector. He presents
cyberbiosecurity, a growing cross-disciplinary knowledge area that
intersects cybersecurity, security and biosecurity and provides a different
way of understanding security threats to the bioeconomy. He argues that
synthetic biology and biotechnology are exponentially growing sectors of
the global economy, however the nature of emerging threats and risks
associated with these sectors are not well understood. Discussing IP theft,
foreign interference and malevolent exploitation of dual-use bio-agents
Walsh provides a more comprehensive understanding of threats, risks and
vulnerabilities in this little understood sector.
Introduction
The chapter is divided into three main sections (the bioeconomy, risks and
threat contexts and mitigation strategies). First, in order to provide
necessary context to the discussion on cyberbiosecurity this chapter surveys
the bioeconomy. The second section maps out the cyberbiosecurity
risk/threat landscape across key sectors (national security,
pharmaceuticals/health and biotechnology) to the bioeconomy including the
ongoing challenges in understanding them. Thirdly, this chapter summarises
thematically several factors that will be critical to mitigating against current
and emerging cyberbiosecurity risks/threats. Before, however, commencing
a contextual discussion of the bioeconomy, it is necessary first to clarify
how the term ‘cyberbiosecurity’ will be used in this chapter.
Cyberbiosecurity is a relatively new multi-disciplinary field made up of
several disciplines such as cyber, biology, biosecurity, biosafety amongst
others. The term was first used in the literature only relatively recently in
2018 (Peccoud et al. 2018: 4–7). The field of cyberbiosecurity is still
emerging so it is unsurprising that several definitions have been suggested
thus far (Peccoud et al. 2018: 4–7; Mueller 2020: 2; Murch et al. 2018). A
detailed discussion of the varying merits of these definitions is not germane
to our focus here. Suffice it to say, most scholars working in this area
describe ‘cyberbiosecurity’ as a field that seeks to assess and mitigate
against risk/threats that occur at the intersection between cyberspace and
the rapid transformations underway in the biological sciences, particularly
biotechnology. As discussed in detail below, it is the profound and
exponential growth in the digitisation of biology and biotechnology that
raises concerns about new risks/threats that are not exclusively in either the
‘cyber’ or ‘biosecurity’ domain. In particular, and in addition to the
digitisation of biology, it is also the automation of many processes that were
once completed by scientists in labs, which are now creating significant
benefit to biosciences and the bioeconomy—yet also highlight real and
emerging risks/threats (Bajema et al. 2018). With ‘cyberbiosecurity’
defined, we now shift attention to surveying the ‘bioeconomy’. A
contextual understanding of the ‘bioeconomy’ is important because it is
where cyberbiosecurity risks/threats are raising concerns for governments,
the private sector and those working in the security sector.
The Bioeconomy
The ‘bioeconomy’ is a subset of the larger global economy and
encompasses several sectors in health care, biotechnology and biological
research. The literature reveals no commonly agreed definition of the
bioeconomy. Depending on one’s perspective, there are several sectors and
combinations of subsets of ‘traditional sectors’ that could be included or
excluded from the bioeconomy (NAS 2020: 41). The common denominator
seems to be economic activity that uses biological resources to make
products (e.g. pharmaceuticals, food, energy, medicine). The difficulties of
trying to define the bioeconomy are well illustrated just by looking at the
biotechnology sector globally. The biotechnology sector alone produces
biological products that can be used in multiple sectors of the global
economy (e.g. pharmaceuticals, food, energy, medicine and environment).
While it may be easier to see how potentially significant ‘the bioeconomy’
is for international trade, national income and employment, it’s less clear
given the diversity and intersection of fields and sub-fields making up the
biotechnology sector to measure what outputs should be considered as part
of the bioeconomy. Leaving aside this issue of where the parameters of the
bioeconomy should be, this chapter adopts the straightforward and holistic
definition cited in the 2020 US National Academies of Sciences,
Engineering and Medicine report on Safeguarding the Bioeconomy. The
report defines the bioeconomy as ‘economic activity that is driven by
research and innovation in the life sciences and biotechnology, and that is
enabled by technological advances in engineering and in computing and
information sciences’ (NAS 2020: 3).
The rate of research and innovation in the life sciences and
biotechnology has increased exponentially in the last three decades. For
example, when the entire human genome was sequenced in 2003 it took a
team of scientists 13 years at a cost of nearly a half-billion dollars to
identify the approximately 20,500 genes in humans. In contrast, today
biotechnology companies can decode a human genome sequence in a day
for only $1000 using smaller and more efficient equipment (such as a
benchtop Ion Proton Sequencer) (Walsh 2016: 351).
Building on developments in genome sequencing has led to other life
science innovations and techniques such as CRISPR, which allows the
editing of an organism’s genome resulting now in breakthroughs in the
development of drugs, vaccines, medicines, foods and agriculture in the
bioeconomy. Other innovations such as the development of organisms with
synthetic genomes have been made possible not only due to breakthroughs
in biological research but also advances in engineering, computing and
information sciences (NAS 2020: 1).
Advancements in the life sciences and biotechnology have also seen
developments in chemicals made from bio-synthetic processes rather than
traditional chemistry. For example, ‘microorganisms are now used to act as
environmental biosensors, fabrics made from biosynthetic spider silk, and
novel foods and food additives made from yeast or bacteria’ (NAS 2020: 1).
New innovations in computing and bioprocessing are producing new foods,
fuels, cosmetics and drugs.
The net result is a transformed life sciences and biotechnology sector
with significant benefit to human health, research and commercially to
individuals and the companies involved. The growing amount and pace of
innovation, products and jobs continues to fuel the expansion of the global
bioeconomy. For example, the bioeconomy is estimated to consist in the US
of as much as 25% of GDP (Vinatzer et al. 2019: 2). While the production
of pharmaceuticals, hospital equipment, food products, ‘green fuels’ and
agricultural products two decades ago were more labour intensive, the rapid
development in computer algorithmic performance and biotechnology
processes now means companies operating in the bioeconomy can
completely or semi-automate production processes. The expectation is that
the investment by companies in the bioeconomy in automation of various
bioprocesses facilitated by advanced algorithms will also rely increasingly
on information technology (IT), the Internet and the IoT to make even
further advancements and efficiencies in the quality, costs and production of
various bio-products (Murch and DiEuliis 2019; Murch et al. 2018; NAS
2020). Despite the dividends for the bioeconomy, the growing complexity
of biotechnologies now more enabled and connected by IT/computing
systems creates a suite of potential risks/threats to both public and private
sector agencies working in the bioeconomy. The increased reliance of the
bioscience fields on cyber systems to source supplies, manufacture,
distribute bio-products including research and development creates
vulnerabilities for attack by state and non-state actors (Ney et al. 2017:
765–799; Vinatzer et al. 2019; Bajema et al. 2018). Mueller encapsulates
well the significance of vulnerabilities, risks and threats to public/private
sector research, biotechnology companies and other sectors involved in the
development of bio-products.
Mitigation Strategies
In this final section, the focus shifts from surveying cyberbiosecurity
threats/risks to what can be done to protect, disrupt and manage them. As
discussed earlier, the threats/risks across the bioeconomy are diverse,
complex and multi-layered. Hence, it is unlikely that there will be one ‘off
the shelf’ set of mitigation strategies to deal with all threat/risk in all
contexts. Here we will briefly discuss three key areas where effective
mitigation strategies are likely to come from regardless of the particular
sector of the bioeconomy one examines. These are: policy and legal
measures, risk and threat management and workforce planning issues. In
the remaining space, the objective is to briefly scope how each area
working together will improve the effectiveness of all mitigation measures.
It is not possible to expand fully on each issue given the complexity of each
could be a chapter on its own. But the brief discussion provides the reader a
foundation for further detailed investigation about how different ‘Five
Eyes’ and other liberal democracies may build on the broad mitigation
principles discussed below.
Workforce Planning
A final area that will be crucial to improving mitigation strategies against
cyberbiosecurity risks/threats will be a greater sustained focus on training
the bioeconomy workforce about them. Since 9/11, significant
improvements have been made in most Western countries in countering
intentional biosecurity threats (e.g. weaponising dangerous biological-
bacteria, viruses and toxins, the deliberate misuse of dual-use technologies)
and bolstering biosafety policies, guidelines and regulations (e.g.
background checks, guidance for construction and operation of secure BSL-
3 and 4 labs) (Walsh 2018: 37). Additionally, from 2001 onwards greater
efforts have been made in many ‘Five Eyes’ countries to train scientists,
researchers and others working in the bioeconomy about security risks in
their working environments (Sture et al. 2013: 289–321; Salerno and
Gaudioso 2015; Slayton et al. 2013: 51–70). But as several researchers have
observed, security and safety training in the life sciences has not necessarily
been consistent, sufficient or kept up as new bio-threats and risks have
evolved (Richardson et al. 2019; Moritz et al. 2020: 856–858). Moritz et al.
provide a useful summary of biosecurity credential core competencies for
security awareness training of life sciences workers, but further work is
needed to develop this across sectors in the bioeconomy including
certification that workers have been trained and training standards remain
contemporary given the significant changes in the bioeconomy. It is not just
scientists and researchers that need security awareness training, but also
security managers and their teams responsible for keeping their institutions
safe. As noted earlier, there are in some institutions across the bioeconomy
a kind of organisational cultural bias that view some cyberbiosecurity
risk/threats as merely just more examples of a ransomware attack that can
be dealt with using traditional IT security solutions (Mueller 2020: 3). The
convergence of cyber, physical and biological systems across sectors in the
bioeconomy presents new risks/threats and security managers operating in
health, biotech or other bio-sectors need also further training to manage
these.
The broader biosecurity and bioterrorism sectors, where security and
health experts have both been involved in managing them, have been
likened to two tribes working on the same problem, but rarely together
(Walsh 2020: 586–602). So too one could argue is the case in
cyberbiosecurity with biotech experts not understanding the security issues,
and the security personnel not understanding the intricacies of the
biological process involved (Mueller 2020). Clearly effective mitigation can
only occur when these two tribes begin to work together more effectively.
Conclusion
Cyberbiosecurity represents a new field where significant advancements in
computers, artificial intelligence, automation, engineering come together
with equally profound changes in synthetic biology and biotechnology. The
net result are innovations in health, medicine, energy, food, agriculture and
even in national security. Yet, as the integration of these multi-disciplinary
technologies brings beneficial outcomes to nations, numerous
vulnerabilities and risks are arising. At this point, detailed risk/threat
analysis of sectors in the bioeconomy is not available to provide evidence
of where the greatest risks are as well as the type of threat actors that may
wish to exploit weakness in companies involved in biomanufacturing,
research and development. However, research is growing and now
beginning to highlight cyberbiosecurity risks/threats and what some of their
impact on health, critical infrastructure, national security, economic and
social resilience may be.
This research effort needs to grow in pace and scale, but most critically
mitigation strategies that are framed within a national health security
strategy which clearly articulates risk/threat management responsibilities of
governments and the private sector are urgently needed. COVID-19 has
underscored that pandemics or indeed any other health security risk/threat
are not just owned by public health authorities. Vulnerabilities in
biotechnologies used for pharmaceuticals, agriculture, medicine, health
could be adversely exploited in ways that don’t just result in profit or IP
loss for bioscience companies, but other high-consequence impacts such as
loss of life, environmental damage and significant privacy breaches. While
not all security managers work in the bioeconomy, its broad intersection
with many other public and private institutions in the broader economy
suggests that most in their careers will come across issues that overlap
cyberbiosecurity risks/threats. Hence, this chapter has sought to provide a
general awareness to all in the security sector about the need to understand
these growing and complex risks/threats.
Recommended Readings
Cyberbiosecurity is an area where there are a diverse number of disciplines
contributing to the field, including but not limited to those working in
public health, biology, epidemiology, plant and animal health, national
security studies, cyber and engineering. The suggested readings listed here
are focused on the national security, dual-use research and biotechnology
dimensions of cyberbiosecurity. For an accessible introduction to
cyberbiosecurity issues as they impact on the broader bioeconomy, see
National Academies of Sciences, Engineering, and Medicine (2020).
Safeguarding the Bioeconomy. Washington, DC: The National Academies
Press. For perspectives on the role of national security intelligence in
managing biosecurity and cyberbiosecurity threats see Walsh’s Intelligence
Biosecurity and Bioterrorism (2018). For a good introduction overall to the
threat and risk-scape for cyberbiosecurity see, Mueller’s article, Facing the
2020 Pandemic: What Does Cyberbiosecurity Want Us to Know to
Safeguard the Future? (2020). For a good discussion of vulnerabilities of
data produced in the bioeconomy see Berger and Schneck’s article, P. A.
National and Transnational Security Implications of Asymmetric Access to
and Use of Biological Data (2019). Finally, the journal Frontiers in
Bioengineering and Biotechnology is a good place for readers to access
regularly given its focus on many cyberbiosecurity issues.
References
Allen, G. (2019). Understanding China’s AI Strategy: Clues to Chinese Strategic Thinking on AI and
National Security (February). Washington, DC: Center for a New American Security.
Australian Government, (2020). Australia’s Cyber Security Strategy 2020. Canberra: Commonwealth
of Australia.
Barrett, D. (2015). U.S. Plans to Use Spy Law to Battle Corporate Espionage. The Wall Street
Journal, July 23rd. Available online at: https://www.wsj.com/articles/u-s-plans-to-use-spy-law-to-
battle-corporate-espionage-1437688169 (accessed February 25, 2021).
Bajema, N., DiEuliis, D., Lutes, C., & Lim, Y. (2018). The Digitization of Biology: Understanding
the New Risks and Implications for Governance, Technical Report, Washington, DC, National
Defense University. Center for the Study of Weapons of Mass Destruction.
Berger, K. M., & Schneck, P. A. (2019). National and Transnational Security Implications of
Asymmetric Access to and Use of Biological Data. Frontiers in Bioengineering and Biotechnology,
7(21). https://doi.org/10.3389/fbioe.2019.00021
Burnette, R. (Ed.) (2013). Biosecurity Understanding, Assessing, and Preventing the Threat.
Hoboken, NJ: Wiley.
DiEuliis, D., & Giordano, J. (2017). Why gene editors like CRISPR/Cas may be a game-changer for
neuroweapons. Health security, 15(3), 296–302.
Diggans, J., & Leproust, E. (2019). Next Steps for Access to Safe, Secure DNA Synthesis, Frontiers
in Bioengineering and Biotechnology 7 (86). https://doi.org/10.3389/fbioe.2019.00086.
Erman, M., & Finkle, J. (2017). Merck Says Cyber Attack Halted Production, Will Hurt Profits.
Reuters. Available online at: https://www.reuters.com/article/us-merck-co-results/merck-says-cyber-
attack-halted-production-will-hurtprofits-idUSKBN1AD1AO
Eshoo, A., & Schiff, A. (2019). “China’s grip on pharmaceutical drugs is a national security issue,”
The Washington Post, September 10. https://www.washingtonpost.com/opinions/we-rely-on-china-
forpharmaceutical-drugs-thats-a-security-threat/2019/09/10/5f35e1ce-d3ec-11e9-9343-
40db57cf6abd_story (accessed 25th February 2021).
Fair, P., & Farrant, G. (2019). “Australian Government Announces a Foreign Interference Taskforce
for Universities,” Global Compliance News. Backer McKenzie, 19 September.
Gryphon Scientific, & Rhodium Group. (2019). China’s Biotechnology Development: The Role of US
and Other Foreign Engagement: A Report Prepared for the U.S.-China Economic and Security
Review Commission, Takoma Park, MD: Gryphon Scientific.
Guttieres, D., Stewart, S., Wolfrum, J., & Springs, S. (2019). Cyberbiosecurity in Advanced
Manufacturing Models, Frontiers in Bioengineering and Biotechnology 7 (210). https://doi.org/10.
3389/fbioe.2019.00210.
Heinemann, J. A., & Walker, S. (2019). Environmentally applied nucleic acids and proteins for
purposes of engineering changes to genes and other genetic material. Biosafety and Health, 1(03),
113–123.
Hoffman, F. (2021). National Security in the Post-Pandemic Era. Orbis, 65(1): 17–45.
[Crossref]
Javorcik, B. (2020). Global Supply Chains Will Not Be the Same in the Post-COVID-19 World. In
Baldwin, R., & Evenett, S. (Eds.). COVID-19 and Trade Policy: Why Turning Inward Won’t Work
(pp. 111–116), CEPR Press: London.
Kania, E., & Wilson, V. (2019).“Weaponizing Biotech: How China’s military is preparing for a ‘new
domain of warfare,’” Defense One, August 14, 2019, https://www.defenseone.com/ideas/2019/08/
chinasmilitary-pursuing-biotech/159167/.
Knapp, B. (2018). Fifth Domain, Researchers are Sounding the Alarm on Cyberbiosecurity. https://
www.fifthdomain.com/dod/2018/02/08/researchers-are-sounding-thealarm-on-cyberbiosecurity/
(accessed 20 April 2020).
Lawless, J. & Kirka, D. (2020). ‘UK, US, Canada Accuse Russia of Hacking Virus Vaccine Trials’.
TechXplore (July 16). https://techxplore.com/news/2020-07-uk-canada-accuse-russia-hacking.html?
utm_source=TrendMD&utm_medium=cpc&utm_campaign=TechXplore.com_TrendMD_1
(accessed 24th February 2021).
Marsh, S. (2018). US joins UK in Blaming Russia for NotPetya Cyber-attack. The Guardian, 15(02),
2018. Available online at: https://www.theguardian.com/technology/2018/feb/15/uk-blames-russia-
notpetya-cyber-attack-ukraine (accessed 24th February 2021).
Medcalf, R. (2019). Australia And China: Understanding the Reality Check. Australian Journal of
International Affairs, 73(2):109–118. https://doi.org/10.1080/10357718.2018.1538315.
[Crossref]
Millett, K., dos Santos, E., & Millett, P. D. (2019). Cyber-biosecurity Risk Perceptions in the Biotech
Sector, Frontiers in Bioengineering and Biotechnology 7 (136). https://doi.org/10.3389/fbioe.2019.
00136.
Moritz, R. L., Berger, K. M., Owen, B. R., & Gillum, D. R. (2020). Promoting biosecurity by
professionalizing biosecurity. Science, 367(6480), 856–858. https://doi.org/10.1126/science.aba0376
Mueller, S. (2020). Facing the 2020 Pandemic: What Does Cyberbiosecurity Want Us to Know to
Safeguard the Future? Biosafety and Health. https://doi.org/10.1016/j.bsheal.2020.09.007.
Murch, R., & DiEuliis, D. (2019). Editorial: Mapping the Cyberbiosecurity Enterprise. Frontiers in
Bioengineering and Biotechnology 7 (235). https://doi.org/10.3389/fbioe.2019.00235.
Murch, R. S., So, W. K., Buchholz, W. G., Raman, S., & Peccoud, J. (2018). Cyberbiosecurity: An
Emerging New Discipline to Help Safeguard the Bioeconomy. Frontiers in Bioengineering and
Biotechnology, 6(39). https://doi.org/10.3389/fbioe.2018.00039
National Academies of Sciences, Engineering, and Medicine. (2020). Safeguarding the Bioeconomy.
Washington, DC: The National Academies Press. https://doi.org/10.17226/25525.
National Audit Office (2018). Investigation: WannaCry Cyber Attack and the NHS. https://www.nao.
org.uk/wpcontent/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf
Ney, P., Koscher, K., Organick, L., Ceze, L., & Kohno, T. (2017). Computer Security, Privacy, and
DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More, 26th
USENIX Security Symposium (USENIX Security 17), USENIX Association, Vancouver, BC: 765–
779.
Peccoud, J., Gallegos, J. E., Murch, R., Buchholz, W. G., & Raman, S. (2018). Cyberbiosecurity:
from naive trust to risk awareness. Trends in Biotechnology, 36(1), 4–7.
[Crossref]
Randhawa, G. S., Soltysiak, M. P., El Roz, H., de Souza, C. P., Hill, K. A., & Kari, L. (2020).
Machine learning using intrinsic genomic signatures for rapid classification of novel pathogens:
COVID-19 case study. PLOS One, 15(4), e0232391.
[Crossref]
Richardson, L. C., Lewis, S. M., & Burnette, R. N. (2019). Building capacity for cyberbiosecurity
training. Frontiers in Bioengineering and Biotechnology, 7, 112.
[Crossref]
Rees, V. (2019). Roche Confirms Cyber-Attack from Winnti Malware. European Pharmaceutical
Review. https://www.europeanpharmaceuticalreview.com/news/95107/roche-confirms-cyber-attack-
from-winnti-malware/ (accessed 25th February, 2021).
Salerno, R., & Gaudioso, J. (Eds.). (2015). Laboratory Biorisk Management Biosafety and
Biosecurity. Boca Raton, FL: CRC Press.
Seemann, T., Lane, C. R., Sherry, N. L., Duchene, S., da Silva, A. G., Caly, L., … Howden, B. P.
(2020). Tracking the COVID-19 pandemic in Australia using genomics. Nature communications,
11(1), 1–9.
[Crossref]
Slayton, J., et al. (2013). Physical Elements of Biosecurity. In R. Burnette (Ed.), Biosecurity (pp. 51–
70). Hoboken, NJ: Wiley.
Sture, J., Whitby, S., & Perkins, D. (2013). Biosafety, biosecurity and internationally mandated
regulatory regimes: compliance mechanisms for education and global health security. Medicine,
Conflict and Survival, 29(4), 289–321. https://doi.org/10.1080/13623699.2013.841355.
[Crossref]
Vinatzer, B. A., Heath, L. S., Almohri, H. M., Stulberg, M. J., Lowe, C., & Li, S. (2019).
Cyberbiosecurity challenges of pathogen genome databases. Frontiers in Bioengineering and
Biotechnology, 7, 106.
[Crossref]
Walsh, P. F. (2020). Improving ‘Five Eyes’ Health Security Intelligence capabilities: leadership and
governance challenges. Intelligence and National Security, 35(4), 586–602.
[Crossref]
Walsh, P. F. (2016). Managing Emerging Health Security Threats Since 9/11: The Role of
Intelligence. International Journal of Intelligence and Counterintelligence, 29(2), 341–367. https://
doi.org/10.1080/08850607.2016.1121048.
[Crossref]
White House. (2021a) National Strategy for COVID-19 Response and Pandemic Preparedness,
(January), Washington, DC.
White House. (2021b). National Security Memorandum on U.S Global Leadership to Strengthen the
International COVID-19 Response and Advance Global Security, (January), Washington, DC.
Wintle, B. C., Boehm, C. R., Rhodes, C., Molloy, J. C., Millett, P., Adam, L., ... & Sutherland, W. J.
(2017). Point of View: A transatlantic perspective on 20 emerging issues in biological engineering.
Elife, 6, e30247.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_17
Abstract
Effective border security (excluding the function of borderline protection),
within overarching border control structures at ports of entry and land
border posts, is an essential part of state strategies for combatting cross-
border crime. However, to be effective and in anyway moderately
successful requires a co-ordinated multi-level agency co-operative
approach. Such an approach is crucial given the diversity of criminal
activities that can and do occur at border points of entry be they air, sea or
land. Critical to modern-day border security is the use and implementation
of a range of technology and aids (equipment) allied to efficient
management structures to effectively combat any cross-border criminal
activity, usually of a transnational organised form. In addition, local
agencies need to adhere and comply (full enforcement) to several
international treaties, conventions, protocols and policies in implementing
any border management model with an embedded border security regime.
Introduction
Essentially border controls refer to states/governments’ efforts to regulate
and monitor the movement of people, animals and goods across their
recognised international borders (US Legal n.d.). In other words, the
facilitation of legitimate travel and trade. Within this framework of border
controls there is so-called border security, namely: the border control
policies adopted by a country or group of countries to combat unauthorised
travel or trade (movement of illicit goods) across its borders; to limit illegal
immigration; combat transnational crime and prevent wanted criminals
from travelling or entering a country, and more latterly incursions by
terrorist groupings (US Department of Homeland Security (DHS) n.d.).
The primary objective then of border security is more to deal with the
threats and pressures of crime, whether that emanates from illegal
migration, terrorism, or criminal attacks on the tax base—the latter usually
being from large-scale smuggling and trafficking of illicit substances,
counterfeit goods and other contraband and other fraudulent transactions—
thereby evading customs and excise dues or undervaluing goods brought
into a country via fraudulent and/or forged documentation, often facilitated
by bribery and corruption at the borders. Border security also implies the
protection (securing) of the border itself, the international transport
networks (land, air and sea) and the people using them and working on
them (UK Cabinet Office 2007, p. 5).
However, ancillary to border control and security services there is also
the matter of borderline protection, often handled by paramilitary or regular
military units or a special militarised unit of border police that have the
requisite protection equipment and vehicles for land/sea patrolling of
extensive borders, as well as air surveillance capabilities. But if poor
borderline protection exists the resulting porous borders are also a factor in
facilitating the growth of smuggling and trafficking of illicit goods across
borders, without having recourse to official entry points. Accordingly, for
border controls and security overall to be effective in combatting
transnational and cross-border organised crime activities the borderline also
needs to be ‘hardened’ with crime combatting responses then not only being
co-ordinated in a co-operative framework at ports of entry and border posts
but also integrated with the borderline protection functions.
While the control and regulation of the international movement of
people and goods across borders grew apace in the twentieth century, so too
was it matched by the growth in the extent of criminal exploitation of
systemic border control shortcomings, loopholes and other weaknesses—all
in an ever more professional, sophisticated and organised manner within
expanding international criminal network(s) of syndicate groupings. Such
criminal exploitation is also more and more exhibiting co-ordination and
co-operation between criminal syndicates (organised crime) representing an
array of different primary crime products or categories of criminal
activities.
Not only does such transnational cross-border crime rob the fiscus of
the state of much needed income from taxes and customs and excise duties,
but more often than not exploits a range of lax, ineffective or even non-
existent border control and weak security systems at international ports of
entry (sea, land and air), but also takes advantage of human weakness of
officials by bribing and corrupting border control officials.
‘Smart’ Borders
Particularly post-9/11, strong arguments were advanced for the
implementation of fully digitised and computerised border controls and
security activities, that is, the gradual increase in capacity for monitoring
borders, as well as goods, while also providing fast and improved
information on where goods are when in transit, and providing advanced
information to respond to any suspicious activity (i.e. suspected organised
crime smuggling/trafficking operations), all of which in turn translate into a
greater ability to prevent, combat and respond to these illicit/criminal
activities (O’Hanlon 2006, pp. 1–2). The exchange of advanced information
included the pre-flight sending of passenger lists and goods manifests to the
border authorities at the end destination country (see Minnaar 2003, pp. 50–
51).
Post-9/11 the USA also increasingly made use of biometric indicators to
control foreign travel into the country. Initially this required foreign visitors
from all countries, except Canada, to submit to fingerprinting (of right and
left index fingers) and digital photography upon arrival in the USA. A
subsequent expansion of the US Biometric Visa Programme required that
fingerprints and a digital photo be taken of visa applicants before they
travelled to the USA. The digital fingerprints and photo were then
compared to those in a DHS database (known as IDENT) to check whether
any applicant was on a Watch List (databases were also subsequently
integrated of both listed terrorists and identified criminals and of persons
listed as ineligible for American visas for other reasons). Upon arrival in
America, a visitor’s fingerprints and photo were then checked against those
on the visa to confirm that the individual in question was indeed the person
to whom the visa was granted (US General Accounting Office (GAO) 2004,
pp. 1–9).
Slowly at first but from 2006 onwards, and at the prompting of the
USA, countries around the world made a start in issuing digitised passports
with biometric indicators which closed a substantial loophole in US border
security, that is, the prevalence of the use of stolen and forged passports
around the world (O’Hanlon 2006, p. 4). This, in effect, put more pressure
on organised crime in their efforts to circumvent entry controls. For
instance, organised crime drug traffickers were forced in making more use
of private individuals with no connection to drug syndicates or other crimes
to transport drugs around the world (see Van Heerden and Minnaar 2016,
for more detail on this use of drug mules).
As all these post-9/11 initiatives and systems were implemented there
were regular improvements and new initiatives being instituted to continue
the tightening up (hardening) of border controls and security, and within the
ambit of border security to combat the activities of transnational organised
crime syndicates and groupings.
An additional US initiative was the Air Cargo Advance Screening
programme (first piloted in late 2010). The ACAS programme is a joint co-
operative public/private initiative between the CBP, TSA and airline
partners and was initially a voluntary process in which many airlines had
participated, but was made mandatory as from 12 June 2018. As part of the
ACAS programme, participating carriers electronically submit a subset of
required pre-arrival air cargo data, on shipments destined to or transiting
through the USA from any foreign departure point, to CBP at the earliest
point practicable and prior to loading the cargo onto aircraft. This pre-
departure submission of the required cargo information enabled the CBP to
identify and intercept high-risk shipments before they were loaded on
aircraft. This measure raised the DHS’s worldwide baseline on aviation
security (CBP 2018, 2019b).
The ACAS was allied with the full implementation of the
UNODC/WCO’s CCP initiative where the Port Control Units (PCUs), set
up in training around the world by these two organisations, were formed by
integrating the various enforcement bodies at harbours into a single
representative unit. The CCP proved to be extremely effective by enabling a
co-ordinated approach to container profiling, targeting and examination
(full inspection based on risk assessment and suspicious activity reports by
Customs and Law Enforcement officers), with the PCUs demonstrating
considerable success in achieving high-profile seizures of a range of illicit
goods (UNODC/WCO 2011, p. 7).
Other ‘smart’ border security measures that have more-and-more
latterly been implemented at borders are blanket CCTV surveillance
systems, these days increasingly linked to facial recognition capabilities,
and the use of drones for ‘in-the-air’ surveillance within integrated control
room surveillance monitoring command systems—all operating in real time
to rapidly alert law enforcement agencies of any suspicious activity or
persons at border control access/egress points and thereby activate
immediate response action.
Recommended Readings
Buzdugan (2005), in assessing that air cargo systems would potentially
become the primary target for terrorists, presents an overview of the
potential risks to cargo and argues that only an international approach based
on best available cargo security practices could adequately and efficiently
address the post-9/11 emerging air cargo security vulnerabilities.
D’Arcy, M., O’Hanlon, M., Orszag, P.R., Shapiro, J. & Steinberg, J.B.
(2006). Protecting the Homeland 2006/2007. Washington, DC: Brookings
Institute Press. Focuses on the key post-9/11 policy challenge facing US
border controls, namely: assessing and improving [US] homeland defense
and security. Makes specific recommendations on intelligence reform;
science and technology policy; protection of critical infrastructure; and
greater integration and co-ordination between all roleplayers at borders for
the improvement of homeland security.
Sweet (2009) is considered the definitive seminal resource on the
terrorist threat to commercial airline, airport, cargo and passenger security
and examines business practices and how security considerations are
factored into business processes.
Von Lampe, K. (2016). Organized crime: Analyzing illegal activities,
criminal structures and extra-legal governance. Thousand Oaks, CA: Sage,
provides a systematic overview of the processes and structures of organised
crime, adopting an analytical approach by placing the main emphasis on
underlying patterns and dynamics that transcend any specific historical
manifestations and captures the multi-faceted and dynamic nature of
transnational organised crime.
References
Business Alliance for Secure Commerce (BASC). (n.d.). History. Retrieved from: https://www.
wbasco.org/en/about-us/history.
Buzdugan, M. (2005). Current and emerging air cargo security and facilitation issues. Unpublished
dissertation. LLM. Institute of Air and Space Law, McGill University, Montreal. Retrieved from:
https://www.bac-lac.gc.ca/eng/services/theses/Pages/item.aspx?idNumber=894115683.
European Union (EU). (n.d.). What is the Schengen Agreement? Retrieved from: https://www.
schengenvisainfo.com/schengen-agreement/.
European Union (EU). (2006). Commission Recommendation C(2006) 5186: Establishing a common
“Practical Handbook for Border Guards (Schengen Handbook)”. 6 November. Brussels: European
Commission. 6 November 2006. Retrieved from: https://ec.europa.eu/transparency/regdoc/rep/3/
2006/EN/C-2006-5186-F1-EN-MAIN-PART-1.PDF.
European Union. (2019). Practical handbook for border guards. Retrieved from: https://ec.europa.
eu/home-affairs/sites/default/files/e-library/documents/policies/borders-and-visas/schengen/docs/
c2019-7131-annex.pdf.
Global Initiative Against Transnational Organized Crime (GIATOC). (2021). The global illicit
economy: Trajectories of transnational organized crime. Vienna: Global Initiative Against
Transnational Organized Crime. Retrieved from: https://globalinitiative.net/wp-content/uploads/
2021/03/The-Global-Illicit-Economy-GITOC-High.pdf.
Hennop, E. (2001). SANDF control of the Northern and Eastern border areas of South Africa.
August. ISS Occasional Paper No. 52. Pretoria: Institute for Security Studies. Retrieved from: https://
issafrica.s3.amazonaws.com/site/uploads/paper52.pdf.
International Civil Aviation Organisation (ICAO). (n.d.). History of ICAO. Retrieved from: www.
icao.org/icao/en/ro/eurnat/history02.htm.
International Maritime Organisation (IMO). (n.d.-a). Brief history of IMO. Retrieved from: https://
www.imo.org/en/About/HistoryOfIMO/Pages/Default.aspx.
International Maritime Organisation (IMO). (n.d.-b). IMO and Maritime Security Historic
background. Retrieved from: https://wwwcdn.imo.org/localresources/en/OurWork/Security/
Documents/IMO-and-Maritime-Security-Historic-Background.pdf.
International Maritime Organisation (IMO). (2004). SOLAS XI-2 and the ISPS Code. Retrieved from:
https://www.imo.org/en/OurWork/Security/Pages/SOLAS-XI-2-ISPS-Code.aspx.
Minnaar, A. (1999). A symbiotic relationship? Organised crime and corruption in South Africa.
Presentation to Workshop No. 5: Organised Crime & Corruption, 14 October, at the 9th International
Anti-corruption Conference: Global integrity: 2000 and beyond—Developing effective anti-
corruption strategies in a changing world. ICC, Durban, 10–15 October.
Minnaar, A. (2003). Policing the ports: Reducing illicit trafficking in South Africa. ISS Monograph
Series No. 84. May. Pretoria: Institute for Security Studies.
Perl, R. (2004). The Department of Homeland Security: Background and challenges. (pp. 176–186).
In: National Research Council. Terrorism: Reducing vulnerabilities and improving responses: U.S.-
Russian Workshop Proceedings. Washington, DC: The National Academies Press.
Sweet, K.M. (2009). Aviation and airport security: Terrorism and safety concerns (2nd edition).
Baton Rouge, Fla: CRC Press/Taylor & Francis Group.
Transportation Security Administration (TSA). (2012b). TSA sets cargo screening deadlines. Press
release 16 May 2012. Retrieved from: http://www.tsa.gov/press/releases/2012/05/16/tsa-sets-cargo-
screening-deadline-international-inbound-passenger-aircraft.
UK Cabinet Office. (2007). Security in a global hub: Establishing the UK’s new border
arrangements. London: Cabinet Office. Retrieved from: https://webarchive.nationalarchives.gov.uk/
20100304202932/http://www.cabinetoffice.gov.uk/media/cabinetoffice/corp/assets/publications/
reports/border_review.pdf.
United Nations (UN). (2004). United Nations Convention against transnational organized crime and
the protocols thereto. New York: United Nations/Vienna: United Nations Office on Drugs and Crime.
Retrieved from: https://www.unodc.org/documents/treaties/UNTOC/Publications/TOC-Convention/
TOCebook-e.pdf.
United Nations Office on Drugs and Crime (UNODC). (2003). Tool 5.11: Border control measures.
(pp. 216–222). In: Toolkit to combat trafficking in persons. New York: United Nations/Vienna:
United Nations Office on Drugs and Crime, Global Programme against Trafficking in Human
Beings. Retrieved from: https://www.unodc.org/documents/human-trafficking/Toolkit-files/07-
89375_Ebook.pdf.
United Nations Office on Drugs and Crime (UNODC)/World Customs Organisation (WCO). (2009).
UNODC-WCO Container Control Programme. Retrieved from: https://www.unodc.org/documents/
organized-crime/containerprogramme/Container_Programme_Progress_Report_June_2009.pdf.
United Nations Office on Drugs and Crime (UNODC)/World Customs Organisation (WCO). (2011).
UNODC-WCO Container Control Programme. Year End Report 2011. Retrieved from: https://www.
unodc.org/documents/toc/CCP_Year_End_Report_2011.pdf.
US Customs and Border Protection (CBP). (2011). CBP’s CTPAT to replace Land Border Carrier
Initiative Program. CBP Media Release, 7 February. Retrieved from: https://www.cbp.gov/
newsroom/national-media-release/cbps-ctpat-replace-land-border-carrier-initiative-program.
US Customs and Border Protection (CBP). (2018). Fact Sheet: Air Cargo Advance Screening
(ACAS). June. Retrieved from: https://www.cbp.gov/sites/default/files/assets/documents/2018-Jun/
ACAS-Fact-Sheet-060518A-FINAL.pdf.
US Customs and Border Protection (CBP). (2019a). CSI: Container Security Initiative. Retrieved
from: https://www.cbp.gov/border-security/ports-entry/cargo-security/csi/csi-brief.
US Customs and Border Protection (CBP). (2019b). Air Cargo Advance Screening (ACAS).
Retrieved from: https://www.cbp.gov/border-security/ports-entry/cargo-security/acas.
US Customs and Border Protection (CBP). (2020). CTPAT: Customs Trade Partnership Against
Terrorism. Retrieved from: https://www.cbp.gov/border-security/ports-entry/cargo-security/ctpat.
US Department of Homeland Security (DHS). (n.d.). Border Security. Retrieved from: https://www.
dhs.gov/topic/border-security.
US Federal Aviation Administration (FAA). (n.d.). Code of Federal Regulations. Retrieved from:
https://rgl.faa.gov/Regulatory_and_Guidance_Library/rgFAR.nsf/.
US General Accounting Office (GAO). (2004). Border Security: State Department rollout of
biometric visas on schedule, but guidance is lagging. GAO-04-1001, September. Washington, DC:
General Accounting Office.
US Immigration and Naturalization Service. (1997). South Africa Border Assessment. Unpublished
INS Office of Inspections report to the South African Government.
US Legal. (n.d.). Border control law and legal definition. Retrieved from: https://www.definitions/
uslegal.com/b/border-control/.
Van Heerden, A. and Minnaar, A. (2016). The use of South African drug mules in the cross-border
smuggling of drugs. Acta Criminologica: Southern African Journal of Criminology, Special Edition:
Illicit Drugs: Local and International Realities 29(3), pp. 16–48.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_18
Genserik Reniers
Email: [email protected]
Abstract
Chao Chen and Genserik Reniers focus on security in the chemical industry
which has attracted increasing attention in the academic and industrial
domains since the “9/11” terrorist attack in 2001. With reference to three
different security theories and five security risk assessment and
management methods used in the chemical industry, they trace documented
improvements in security management. They argue the case for integrating
safety and security to avoid protection overlaps.
Introduction
The chemical sector is one of the critical infrastructures identified by the
U.S. Department of Homeland Security (DHS), which plays an important
role in economics and daily life (Reniers 2009; Chen et al. 2019). Different
from other infrastructures, chemical plants are always characterized by
many hazardous facilities that process, transfer, and store various hazardous
materials (HAZMAT) (Khakzad 2015; Chen and Reniers 2020). Due to
accidental disruptions or natural disasters, HAZMAT may be released from
these facilities, possibly resulting in fire, explosion, and a toxic cloud.
Moreover, the primary hazardous scenarios may further escalate, resulting
in a chain of major accident scenarios, leading to overall consequences
more severe than the primary scenario, such knock-on events are called
“domino effects” or “escalation events” (Reniers and Cozzani 2013). In
light of the consequences of major accident scenarios and domino effects,
adversaries may intentionally attack chemical facilities, possibly leading to
catastrophic disasters and resulting in human losses, damage to
installations, environmental pollution, political effects, and psychological
effects (Khakzad and Reniers 2019; Chen et al. 2020). On November 23, an
Aramco oil facility in Jeddah, Saudi Arabia, was attacked using missiles,
resulting in a fire in an oil tank (Arab News 2020). Since the attackers are
intelligent and strategic, they may exploit attack devices and identify
defensive flaws. The latter observation makes the prevention of intentional
attacks more difficult than the prevention of accidental events.
Security has received increasing attention in the chemical industry since
the terrorist attack in New York City on September 11, 2001 (Baybutt 2002,
2003; Bier et al. 2005; Reniers et al. 2008; Lee et al. 2010). In 2004, the
American Petroleum Institute (API) issued a recommendation on security
risk assessment (SRA) for the petroleum and petrochemical industries
(American Petroleum Institute (API) 2004). A systematic security risk
assessment (SRA) methodology based on threat, vulnerability, and
consequence analysis is provided in its recommendations. In 2013 the SRA
method was improved by expanding its functional utility while retaining the
basic methodology (API 2013) which is that security risk depends on
threats, the vulnerability of installations, and the consequences caused by an
attack. Each of these presents a challenge. For example, the quantification
of the threat is complicated by the need to understand the motivations,
intentions, characteristics, capabilities, and tactics of adversaries (Paté-
Cornell and Guikema 2002; Baybutt 2017), while vulnerability analysis
requires a detailed understanding of the design and operation of
installations (Moore et al. 2007; Staalduinen et al. 2016; Matteini et al.
2018). Security measures can improve the capability of installations against
attacks while adversaries may change their attack strategies to adapt to
these measures (Powell 2007; Cox 2008, 2009). One suggested way of
making sense of these complexities is via game theory, a tool that can be
used to analyze adversaries’ strategies and optimize the defenders’ response
via optimal allocation of security resources (Liu et al. 2008; Reniers and
Soudan 2010; Tambe 2011; Rios and Insua 2012; Zhang and Reniers 2016).
Another is consequence analysis which involves modeling the potential
scenarios related to the attack, such as fire, explosion, and toxicity, and the
subsequent domino effects (Willis 2007; Chen et al. 2019).
This chapter thus aims to illustrate the security theories and practices in
the chemical industry to better protect chemical industrial areas from
intentional attacks. Specifically, it discusses Detection-Delay-Response
(DDR), rings of protection (RoP), and the Swiss cheese model. In this way
this chapter serves to highlight how security management can be practiced
albeit the focus here is exclusively on the chemical industry.
Security Theories
API (2013) defines security risk as a likelihood of a threat successfully
exploiting the vulnerability and includes the resulting degree of damage or
impact. A security risk is a potential for negative consequences caused by
deliberate acts while a safety risk is a potential for negative consequences
induced by unintentional events. A list of the differences between safety
and security is shown in Table 18.1.
Table 18.1 A list of differences between safety and security
Safety Security
The nature of an incident is due to The incident is caused by a human act
a hazard
Non-intentional Intentional
Non-intelligent Intelligent
Non-strategic Strategic
No human aggressor Human aggressor
Quantitative probabilities and Due to the lack of statistical data, in more cases, only
frequencies of safety-related risks qualitative (expert opinion based) likelihood of security-related
are available risks may be available
Risks are of rational nature Threats may be of symbolic nature
Detection-Delay-Response Theory
Security in the chemical and process industry (CPI) may be divided into
two categories, physical security and cyber security (Casson Moreno et al.
2018). A physical protection system (PPS) in the chemical industry consists
of people, procedures, and facilities, and equipment to protect installations
in chemical plants from terrorism, theft, sabotage, or other malevolent
physical attacks (Garcia 2007; Reniers et al. 2015). PPS should be designed
with regard to chemical plant characteristics (e.g., location, layout,
chemicals, process, and hazardous installations), the threats posed (e.g.,
attacker type, attack objective, and motivations), and the protection
objective (e.g., avoiding human loss, reducing environmental protection,
protecting facilities, and shortening operation disruption). There are three
types of protection measures: detection, delay, and response measures
(Chen et al. 2020).
(1)
Detection Measures
Detection measures are used to identify adversaries. The detection
function consists of four sequential sub-functions: discovering adversary
actions, sending an alarm about them, assessing the incident, and generating
a response. A detection for an unusual action is successful only when the
four functions are correctly executed. As a result, the detection performance
depends on the probability that detection sensors or persons successfully
discover abnormal events, the probability that alarms related to the
adversary events are successfully communicated, the probability that the
alarm is successfully assessed, and the speed with which the entire
detection process is executed (detection time). An additional detection
performance indicator is the false alarm rate. A false alarm is any alarm that
is not caused by an intrusion. In an ideal detection system, the detection
probability would be 1 and the nuisance alarm rate would be zero.
However, in a chemical plant, all sensors interact with their environment,
and they may be disturbed by adversary actions and also other disturbances
in the detection zone area, such as the movement of vegetation (trees and
weeds), wildlife (animals and birds), and weather conditions (wind, rain,
snow, fog, and lightning).
Besides detection sensors, response personnel can also identify
adversary actions. For instance, guards at fixed posts or on patrol may play
a pivotal role in discovering an intrusion (Garcia 2007; Chen et al. 2020). In
a chemical plant, a typical intrusion detection system may consist of
exterior and interior intrusion sensors, video alarm assessment, entry
control, and alarm communication systems. Outer sensors are sometimes
used at the perimeter of a chemical plant (e.g., wall and fence) and interior
sensors inside. CCTV has a range of benefits; it facilitates a visible alarm
signal and can be a more cost-effective way of monitoring access controls
than guards, with the further advantage that this can be undertaken in one
place remotely (Garcia 2007; Reniers et al. 2015).
(2)
Delay Measures
Delay measures are barriers that can increase the time that an adversary
needs to carry out an action and thus delay the onset of an attack. An
effective PPS first requires that the detection system successfully discovers
the malevolent action, and then that it is correctly assessed, so that the
response (e.g., guards and police) can intervene effectively. Speed though is
crucial; the response needs to be ahead of the offenders perpetrating and at
least completing the act. The key here is that after an adversary action is
detected, delay measures can be employed to delay the implementation of
the attack until an effective response force is available. There are three
types of delay barriers: passive barriers, active barriers, and guards. Passive
barriers are physical barriers that do not need to be activated, such as fence,
door, wall, and locks. Active barriers in contrast do need to be activated
specifically when an attacker enters the coverage area and take a number of
forms such as chemical fogs and smokes, foams, and irritants (Garcia 2007;
Chen et al. 2020). Guards can both by their presence and if necessary by
use of force help delay the access and progress of adversaries.
(3)
Response Measures
Response is the last function of a PPS and it can be used to prevent an
intentional attack or mitigate its consequences. In a chemical plant, a
response force may include personnel measures—onsite as well as offsite—
security guards, police, medical emergency teams, fire officers, and so on.
Guards and police officers may be regarded as a preventive response,
provided they are alerted in time of course. Medical emergency teams and
fire brigades can be used to mitigate the consequences of attacks. Since
chemical plants always involve tons of hazardous materials, an intentional
attack may trigger major accident scenarios such as fire, explosion, and
toxicity. The protection of different targets will likely require different
response plans. For example, it is almost impossible to use security guards
to prevent drone attacks. This is one of the reasons that the drone attack on
the Abqaiq oil plant in 2019 led to a 50% reduction in Abqaiq’s oil
production and a nearly 15% increase in the crude oil price (Chen et al.
2021). Different chemical plants likely need different PPSs and an effective
PPS requires a reasonable arrangement of detection, delay, and response
measures (Garcia 2007; Reniers et al. 2015; Chen et al. 2020).
Rings of Protection
The DDR theory requires three kinds of measures (detection, delay, and
response) to sequentially work for the purpose of protecting a chemical
installation. The three types of measures constitute a PPS and the system
does not work if one or more than one type of measure fails. Different from
the DDR theory, the theory of rings of protection (RoP) divides a protection
system into independent protection layers (CCPS 2003). Each protection
layer can independently protect a chemical installation and the defense
performance increases with increasing the number of layers. Figure 18.1 is
a RoP with three security rings. The security risk of the installation
decreases with increasing the number of effective protection rings.
Fig. 18.1 A chemical installation protected by three security rings
SRA Method
To provide a universal approach for assessing security risk for the
petroleum and petrochemical industry, the American Petroleum Institute
(API) issued a recommendation on security risk assessment (American
Petroleum Institute (API) 2004) in 2004. The recommendation provides a
systematic security risk assessment (SRA) method based on threat,
vulnerability, and consequence analysis. In 2013, the SRA method was
improved by expanding functional utility without changing the basic
methodology (API 2013). Security risk (Rs) is defined as a function of
threat, attractiveness, vulnerability, and consequence. The SRA method
consists of five main steps for determining the variables of the function.
(1)
Characterization of the Facility
Step 1 of this methodology is the characterization of the facility to
identify the critical assets. Critical assets are important to a mission,
function, or continuity of operations, and they can be obtained by the
following steps: (i) identification of assets and screening out critical assets;
(ii) identification of the internal and external infrastructures and their
dependencies and interdependencies; (iii) identification of internal and
external countermeasures; (iv) assessment of severity of consequences and
impacts; (v) assignment of initial severity of consequence without
consideration of any existing countermeasures ranking (C); and (vi)
identification of the list of critical assets.
(2) Threat and Attractiveness Assessment
(1)
Player Characterization
The first step of the game-theoretical approach is to characterize
players. In the context of the chemical industry, there are normally two
players: an attacker (the terrorist) and a defender (a chemical plant), as
shown in Fig. 18.2. In a chemical cluster, multiple players may be involved
because different companies are located in the cluster. Following the
identification of players in the game, the questions of whether the players
are rational and the extent to which they are informed need to be assessed.
Since the attackers are always considered to be strategic and intelligent and
the security managers usually have some experience and are educated, both
the attacker and the defender can be regarded as rational players (Zhang and
Reniers 2016). If the defender and the attacker can obtain complete
information of each other, the game is a complete information game with
certain strategies for both players. However, the defender usually does not
have complete information about the attacker. In that case, a Bayesian game
may be more suitable (Zhang and Reniers 2018).
(2)
Strategy Identification
The second step is to identify the strategies of the players. Each player
has a set of strategies. The attacker’s options include attack objective, attack
type, attack path, and so on. A combination of these options comprises an
attack strategy. The defender formulates a defense strategy by selecting
security measures, the installation position of security measures, the number
of RoP, and so on. All the possible attack strategies and defense strategies
should be identified in this step.
(3)
Payoff Calculation
Step 3 calculates the payoffs (objectives) of each player. In a game, the
payoff represents the motivation of players, such as profit, property
destroyed, casualties, or other desired outcomes. For instance, the defender
possibly aims to reduce the total costs of damages while the objective of the
attackers may be causing as many casualties as possible. The payoff of a
player depends on the player’s motivations, strategies, and the strategies of
other players, and so on. Based on the payoff calculation results, we can
obtain a payoff matrix containing the payoffs and strategies of defenders
and attackers (Reniers and Soudan 2010; Zhang and Reniers 2016).
(4)
Game Solution
A solution to a game is a combination of all the players’ strategies. For
the defender-attacker game, a Nash equilibrium is always considered to be
an optimal solution in which a player will obtain less payoff if the strategy
of the player changes while the other player remains stagnant. Therefore, a
Nash equilibrium is a stable status where players are not willing to change
their strategy. A Nash equilibrium can be a pure strategy (a specific
strategy) or a mixed strategy (a multi-strategy consists of multiple strategies
with a probability distribution). Its equilibrium can be computed by using
specific algorithms such as the Lemke–Howson algorithm (Lemke et al.
1964; Gibbons 1992).
(5)
Equilibrium Analysis
The final step of the game-theoretical approach is to obtain the optimal
defense strategy by analyzing the equilibrium. If a pure strategy is obtained
in step 4, the optimal defense strategy is equal to the pure strategy. If a
mixed strategy is obtained, the optimal strategy should be obtained
according to the defender’s knowledge and preference. For example, the
defender can select the strategy with the highest probability or select each
pure strategy in the mixed strategy, alternately.
Fig. 18.3 A scheme of (a) an AHP structure and (b) an ANP structure. (Adapted from Saaty and
Vargas (2006))
In ANP, the decision factors are incorporated in cluster Ci. The factors
of clusters should be compared pairwise and scored. The matrices are then
populated in an unweighted supermatrix. The unweighted supermatrix
should be normalized to form a weighted or stochastic supermatrix. Raising
the weighted supermatrix to sufficiently large power, the elements of the
limit matrix represent the final scores of corresponding decision factors
(Saaty 1990).
(2)
Bayesian Network Approach
Bayesian network (BN) has a powerful capability to incorporate multi-
state variables, dependent failures, functional uncertainty, and expert
opinion which may be encountered in security risk assessment and
management (Khakzad et al. 2011). Compared to ANP, BN does not have
bidirectional edges and clusters (as shown in Fig. 18.4a), which is more
suitable to model probabilistic dependencies and updated probabilities.
Besides, a BN can be transferred to a limited memory influence diagram
(LIMID) for decision making (Shachter 1986; Lauritzen and Nilsson 2001).
LIMIDs have two more types of nodes: decision nodes and utility nodes (as
shown in Fig. 18.4b). Decision nodes denote the decision alternatives (the
square in Fig. 18.4b) while utility nodes (hexagon in Fig. 18.4b) represent
the preferences of decision-makers with respect to the outcome of decision
alternatives (Khakzad and Reniers 2017). The dotted edge in Fig. 18.4
denotes a time sequence of events. Solving a LIMID, the optimal decision
alternative that maximizes the expected utility can be obtained.
Conclusions
Security in the chemical industry needs to consider the attractiveness of
hazardous materials and hazardous installations to adversaries and the
possible major accidents induced domino effects. As a result, security
management is quite relevant to safety management in the chemical
industry. The management theories used in the safety domain can be
adapted and used in the security of the chemical industry, such as the Swiss
cheese model. Besides these security theories, five security risk assessment
and management methods used in the chemical industry are illustrated,
including the SRA method recommended by API, a game-theoretical
approach to consider strategies of adversaries, network-based approaches to
tackle dependencies and uncertainties, the economic approaches to make
the protection more profitable, and approaches to deal with intentional
domino effects. Other advanced methods such as dynamic security risk
assessment methods, big data-based approaches, and Artificial Intelligence
(AI)-based methods may be enhanced in the future to better protect
chemical plants.
Recommended Readings
Readers who are interested in security in the chemical industry can read the
following recommendations: chemical security theory (Reniers et al. 2018;
Reniers et al. 2020), detection-delay-response theory (Garcia 2007), SRA
method (API 2013), vulnerability analysis (CCPS 2003; Argenti et al.
2017), game theory approach for chemical security (Zhang and Reniers
2016, 2018), economic models for chemical security (Reniers and Van Erp
2016; Villa et al. 2017; Chen et al. 2020a), intentional domino effects (Chen
et al. 2019; Khakzad and Reniers 2019; Chen et al. 2020b), and layers of
protection analysis (CCPS 2011).
References
American Petroleum Institute (API), 2004. Recommended practice for security vulnerability
assessment for petroleum and petrochemical facilities. American Petroleum Institute.
API, 2013. ANSI/API Standard 780—Security risk assessment methodology for the petroleum and
petrochemical industry. American Petroleum Institute.
Arab News, 2020. Saudi Arabia says Jeddah fuel tank blast caused by ‘Houthi terrorist missile’.
Retrieved from. (Accessed September 30, 2021).
Argenti F, Bajpai S, Baybutt P, et al., 2017. Security risk assessment: in the chemical and process
industry[M]. Walter de Gruyter GmbH & Co KG.
Baybutt, P., 2002. Assessing risks from threats to process plants: Threat and vulnerability analysis.
Process Safety Progress 21, 269–275.
[Crossref]
Baybutt, P., 2003. Strategies for protecting process plants against terrorism, sabotage and other
criminal acts. Homeland Defence Journal 2, 1–7.
Baybutt, P., 2017. Issues for security risk assessment in the process industries. Journal of Loss
Prevention in the Process Industries 49, 509–518. https://doi.org/10.1016/j.jlp.2017.05.023
[Crossref]
Bier, V.M., Nagaraj, A., Abhichandani, V., 2005. Protection of simple series and parallel systems
with components of different values. Reliability Engineering & System Safety 87, 315–323. https://
doi.org/10.1016/j.ress.2004.06.003
[Crossref]
Casciano, M., Khakzad, N., Reniers, G., Cozzani, V., 2019. Ranking chemical industrial clusters with
respect to safety and security using analytic network process. Process Safety and Environmental
Protection 132, 200–213. https://doi.org/10.1016/j.psep.2019.10.024
[Crossref]
Casson Moreno, V., Reniers, G., Salzano, E., Cozzani, V., 2018. Analysis of physical and cyber
security-related events in the chemical and process industry. Process Safety and Environmental
Protection 116, 621–631. https://doi.org/10.1016/j.psep.2018.03.026
[Crossref]
CCPS, 2001. Layer of Protection Analysis: Simplified Process Risk Assessment. AIChE–CCPS,
New York.
CCPS, 2003. Guidelines for analyzing and managing the security vulnerabilities of fixed chemical
sites. American Institute of Chemical Engineers.
CCPS, 2011. Layer of protection analysis: simplified process risk assessment. American Institute of
Chemical Engineers - Center of Chemical Process Safety, New York.
Chen, C., Li, C., Reniers, G., Yang, F., 2021. Safety and security of oil and gas pipeline
transportation: A systematic analysis of research trends and future needs using WoS. Journal of
Cleaner Production 279. https://doi.org/10.1016/j.jclepro.2020.123583
Chen, C., Reniers, G., 2020. Chemical industry in China: The current status, safety problems, and
pathways for future sustainable development. Safety Science 128. https://doi.org/10.1016/j.ssci.2020.
104741
Chen, C., Reniers, G., Khakzad, N., 2019. Integrating safety and security resources to protect
chemical industrial parks from man-made domino effects: a dynamic graph approach. Reliability
Engineering & System Safety 191. https://doi.org/10.1016/j.ress.2019.04.023
Chen, C., Reniers, G., Khakzad, N., 2020a. “Cost-benefit management of intentional domino effects
in chemical industrial areas.” Process Safety and Environmental Protection 134, 392–405. https://doi.
org/10.1016/j.psep.2019.10.007
Chen, C., Reniers, G., and Khakzad. N., 2020b. “A thorough classification and discussion of
approaches for modeling and managing domino effects in the process industries.” Safety science 125,
104618.
Collins, S.J., Newhouse, R., Porter, J., Talsma, A., 2014. Effectiveness of the surgical safety checklist
in correcting errors: a literature review applying Reason’s Swiss cheese model. AORN J 100, 65–79
e65. https://doi.org/10.1016/j.aorn.2013.07.024
[Crossref]
Cox, J.L.A., 2009. Game Theory and Risk Analysis. Risk analysis 29, 1062–1068. https://doi.org/10.
1111/j.1539-6924.2009.01247.x
[Crossref]
Cox, L.A., Jr., 2008. Some limitations of “Risk = Threat x Vulnerability x Consequence” for risk
analysis of terrorist attacks. Risk Anal 28, 1749–1761. https://doi.org/10.1111/j.1539-6924.2008.
01142.x
[Crossref]
Garcia, M.L., 2007. Design and evaluation of physical protection systems. Elsevier.
Gavious, A., Mizrahi, S., Shani, Y., Minchuk, Y., 2009. The costs of industrial accidents for the
organization: developing methods and tools for evaluation and cost–benefit analysis of investment in
safety. Journal of Loss Prevention in the Process Industries 22, 434–438.
[Crossref]
Gibbons, R., 1992. A primer in game theory. Harvester Wheatsheaf, New York.
Jallon, R., Imbeau, D., de Marcellis-Warin, N., 2011. Development of an indirect-cost calculation
model suitable for workplace use. J Safety Res 42, 149–164. https://doi.org/10.1016/j.jsr.2011.05.006
[Crossref]
Khakzad, N., 2015. Application of dynamic Bayesian network to risk analysis of domino effects in
chemical infrastructures. Reliability Engineering & System Safety 138, 263–272. https://doi.org/10.
1016/j.ress.2015.02.007
[Crossref]
Khakzad, N., Khan, F., Amyotte, P., 2011. Safety analysis in process facilities: Comparison of fault
tree and Bayesian network approaches. Reliability Engineering & System Safety 96, 925–932.
https://doi.org/10.1016/j.ress.2011.03.012
[Crossref]
Khakzad, N., Reniers, G., 2017. Cost-effective allocation of safety measures in chemical plants w.r.t
land-use planning. Safety Science 97, 2–9. https://doi.org/10.1016/j.ssci.2015.10.010
[Crossref]
Khakzad, N., Reniers, G., 2019. Low-capacity utilization of process plants: A cost-robust approach
to tackle man-made domino effects. Reliability Engineering & System Safety 191. https://doi.org/10.
1016/j.ress.2018.03.030
Khakzad, N., Reniers, G., Abbassi, R., Khan, F., 2016. Vulnerability analysis of process plants
subject to domino effects. Reliability Engineering & System Safety 154, 127–136. https://doi.org/10.
1016/j.ress.2016.06.004
[Crossref]
Khakzad, N., Reniers, G., van Gelder, P., 2017. A multi-criteria decision making approach to security
assessment of hazardous facilities. Journal of Loss Prevention in the Process Industries 48, 234–243.
https://doi.org/10.1016/j.jlp.2017.05.006
[Crossref]
Lauritzen, S.L., Nilsson, D., 2001. Representing and solving decision problems with limited
information. Management Science 47, 1235–1251 %@ 0025-1909.
Lee, Y., Kim, J., Kim, J., Kim, J., Moon, I., 2010. Development of a risk assessment program for
chemical terrorism. Korean Journal of Chemical Engineering 27, 399–408. https://doi.org/10.1007/
s11814-010-0094-x
[Crossref]
Lemke, C.E., Howson, J., Joseph T, 1964. Equilibrium points of bimatrix games. Journal of the
Society for industrial and Applied Mathematics 12, 413–423.
[Crossref]
Liu, D., Wang, X., Camp, J., 2008. Game-theoretic modeling and analysis of insider threats.
International Journal of Critical Infrastructure Protection 1, 75–80. https://doi.org/10.1016/j.ijcip.
2008.08.001
[Crossref]
Matteini, A., Argenti, F., Salzano, E., Cozzani, V., 2018. A comparative analysis of security risk
assessment methodologies for the chemical industry. Reliability Engineering & System Safety.
https://doi.org/10.1016/j.ress.2018.03.001
Misuri, A., Khakzad, N., Reniers, G., Cozzani, V., 2018. A Bayesian network methodology for
optimal security management of critical infrastructures. Reliability Engineering & System Safety.
https://doi.org/10.1016/j.ress.2018.03.028
Moore, D.A., Fuller, B., Hazzan, M., Jones, J.W., 2007. Development of a security vulnerability
assessment process for the RAMCAP chemical sector. Journal of hazardous materials 142, 689–694.
[Crossref]
Paté-Cornell, E., Guikema, S., 2002. Probabilistic modeling of terrorist threats: A systems analysis
approach to setting priorities among countermeasures. Military Operations Research 7, 5–23.
[Crossref]
Powell, R., 2007. Defending against terrorist attacks with limited resources. American Political
Science Review 101, 527–541.
[Crossref]
Reason, J., 1997. Managing the risks of organizational accidents. Ashgate, Aldershot.
Reniers, G., 2009. Man-made domino effect disasters in the chemical industry: the need for
integrating safety and security in chemical clusters. Disaster Advances 2, 3–5.
Reniers, G., Brijs, T., 2014. Major accident management in the process industry: An expert tool
called CESMA for intelligent allocation of prevention investments. Process Safety and
Environmental Protection 92, 779–788. https://doi.org/10.1016/j.psep.2014.02.003
[Crossref]
Reniers, G., Cozzani, V., 2013. Domino Effects in the Process Industries, Modeling, Prevention and
Managing. Elsevier, Amsterdam, The Netherlands.
Reniers, G., Dullaert, W., Audenaert, A., Ale, B.J., Soudan, K., 2008. Managing domino effect-
related security of industrial areas. Journal of Loss Prevention in the Process Industries 21, 336–343.
[Crossref]
Reniers, G., Khakzad, N., Gelder, P.V., 2018. Security risk assessment in the chemical and process
industry. Walter de Gruyter GmbH & Co KG.
Reniers, G., Landucci, G., Khakzad, N., 2020. What safety models and principles can be adapted and
used in security science? Journal of Loss Prevention in the process industries 64. https://doi.org/10.
1016/j.jlp.2020.104068
Reniers, G., Soudan, K., 2010. A game-theoretical approach for reciprocal security-related
prevention investment decisions. Reliability Engineering & System Safety 95, 1–9.
[Crossref]
Reniers, G., Van Lerberghe, P., Van Gulijk, C., 2015. Security risk assessment and protection in the
chemical and process industry. Process Safety Progress 34, 72–83. https://doi.org/10.1002/prs.11683
[Crossref]
Reniers, G.L., Van Erp, H.N., 2016. Operational safety economics: a practical approach focused on
the chemical and process industries. John Wiley & Sons.
[Crossref]
Rios, J., Insua, D.R., 2012. Adversarial risk analysis for counterterrorism modeling. Risk analysis 32,
894–915.
[Crossref]
Saaty, T.L., 1990. Decision making for leaders: the analytic hierarchy process for decisions in a
complex world. RWS publications.
Saaty, T.L., Vargas, L.G., 2006. Decision making with the analytic network process. Springer.
Shachter, R.D., 1986. Evaluating influence diagrams. Operations Research 34, 871–882.
[Crossref]
Staalduinen, M.A.v., Khan, F., Gadag, V., 2016. SVAPP methodology: A predictive security
vulnerability assessment modeling method. Journal of Loss Prevention in the Process Industries 43,
397–413. https://doi.org/10.1016/j.jlp.2016.06.017
Tambe, M., 2011. Security and game theory: algorithms, deployed systems, lessons learned.
Cambridge University Press.
[Crossref]
Villa, V., Reniers, G.L.L., Paltrinieri, N., Cozzani, V., 2017. Development of an economic model for
counter terrorism measures in the process-industry. Journal of Loss Prevention in the Process
Industries 49, 437–460. https://doi.org/10.1016/j.jlp.2017.06.001
[Crossref]
Willis, H.H., 2007. Guiding resource allocations based on terrorism risk. Risk Anal 27, 597–606.
https://doi.org/10.1111/j.1539-6924.2007.00909.x
[Crossref]
Zhang, L., Reniers, G., 2016. A Game-Theoretical Model to Improve Process Plant Protection from
Terrorist Attacks. Risk Anal 36, 2285–2297. https://doi.org/10.1111/risa.12569
[Crossref]
Zhang, L., Reniers, G., 2018. Applying a Bayesian Stackelberg game for securing a chemical plant.
Journal of Loss Prevention in the Process Industries 51, 72–83. https://doi.org/10.1016/j.jlp.2017.11.
010
[Crossref]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_19
Bonnie S. Fisher
Email: [email protected]
Abstract
The history of institutions of higher education (IHE) in the United States
reveals that criminal victimization, ranging from sexual assault to physical
assaults to harassment to thefts, have been part of the collegiate life since
the founding of the first colleges in New England during the colonial era to
recent Carnegie Foundation estimates of over 4440 IHEs. For decades IHEs
dealt with the security of their respective campus and students with little
oversight or accountability to the federal government. This changed in 1990
when Congress passed and George H.W. Bush signed into law the Student
Right-to-Know and Campus Security Act (renamed the Clery Act)
mandating Title IV financial aid eligible IHEs to publicly disclose an
annual security report with their annual crime statistics and security
policies. The Clery Act set in motion continued federal legislation over the
last 25 years that has focused on improving campus security and students’
safety, including a White House Task to Protect Students from Sexual
Assault during the Obama Administration. Interest in preventing and
responding to campus victimization has continued through the Trump
Administration, including proposed changes in IHEs’ response to a report
of sexual harassment and sexual violence.
This chapter will:
track the evolution of campus security mandates by the US federal
government,
describe the safety and security measures implemented by IHEs to
address campus criminal victimization, and
take stock of the campus security mandates and safety and security
measures directed at reducing criminal victimization among college
students.
Table 19.2 Campus policing safety and security issues, milestones, and their impact on campus
police/security
Congressional Legislation
Below, we describe relevant legislation and amendments to it that addressed
specific security issues at IHEs and created new, or expanded existing,
policies and practices.
Guidance on Title IX
Originally enacted in 1972, Title IX of the Education Amendments Act
(1972) is a federal civil rights law that prohibits discrimination on the basis
of a person’s sex in any education program or activity receiving federal
financial aid. As shown in Table 19.1, in the name of increasing both IHE
transparency and accountability, the US Department of Education provided
additional guidance and directives specifically aimed at security issues
created by/associated with sexual harassment and violence.
In 1997, the OCR issued a document, Sexual Harassment Guidance
(1997 Guidance), for Title IX that describes IHE liability for [sexual]
harassment by an employee, peer, or third party (US Department of
Education Office for Civil Rights 1997). The 1997 Guidance was updated
in 2001 by the document Revised Sexual Harassment Guidance:
Harassment of Students by School Employees, Other Students, or Third
Parties, which explains IHE compliance responsibility and defines
circumstances under which sexual harassment constitutes sex-based
discrimination. Instead of providing a distinct definition of sexual
harassment for administrative enforcement, the 2001 Revised Guidance
urged IHEs to consider the totality of the surrounding circumstances,
expectations, and relationships of the parties involved for determining if
alleged harassment is actionable under Title IX (US Department of
Education Office for Civil Rights 2001).
Omission of standards for IHE compliance when investigating and
enforcing Title IX complaints resulted in additional OCR guidance. The
2011 Dear Colleague Letter outlined IHE Title IX standards for responding
to sexual harassment complaints, expanded IHE responses to include
incidents of sexual violence, and stipulated procedural requirements
necessary for IHE handling of sexual harassment complaints. The letter
recognized that, for too long, IHEs had swept these issues under the rug and
emphasized the federal government’s expectation that IHEs would fulfill
their responsibility to create a safe environment for all students (Jordan
2019). Supporting this agency initiative, President Obama created the White
House Task Force in 2014 to Protect Students from Sexual Assault with its
primary goal being to end college sexual assault and initiate a grassroots
strategy, “It’s On Us,” aimed at IHEs to change the culture of support for
sexual assault that exists on many campuses (Jordan 2019).
A second guidance resource, Questions and Answers on Title IX and
Sexual Violence, was issued by OCR in 2014 in response to IHEs’ requests
for technical assistance on their Title IX obligations. By reviewing Title IX
procedural requirements and stating that IHEs must make a “good faith
effort” to comply with Title IX statutory provisions until final regulations
took effect, IHEs would have a better idea of their responsibilities when
responding to complaints of sexual harassment and violence.
In 2017, however, both guidance documents were rescinded by then
Secretary of Education, Betsy DeVos. Secretary DeVos instead
implemented her final federal rule (Final Rule) relating to Title IX actions
arising from incidents of sexual harassment and violence contained in the
document Nondiscrimination on the Basis of Sex in Education Programs or
Activities Receiving Federal Financial Assistance in 2020. DeVos’ Final
Rule narrows the definition of sexual harassment and identifies to which
educational settings and locations Title IX requirements apply. This Final
Rule also includes mandatory response obligations for IHEs for the
complaint process, as well as for investigations, disciplinary hearings,
appeals, and informal resolutions. Not all parties, however, were satisfied
with DeVos’ Final Rule. For example, Know Your IX, a survivor-led project
whose goal is to end sexual and dating violence, wrote and published a 58-
page critique noting that Secretary DeVos’ Final Rule would “increase the
length of Title IX investigations, invite law enforcement interference [with]
school investigations, and allow schools to use harmful mediation
procedures to resolve cases of sexual assault and domestic violence” (Know
Your IX 2019, p. 2).
Additional Amendments
As shown in Table 19.1, to address the threat of sexual offenders enrolling
as students or being hired as IHE employees, Congress passed the Campus
Sex Crimes Prevention Act in 2000 to ensure the campus community would
have access to information about the presence of registered sex offenders on
campus. This act amends the Jacob Wetterling Crimes Against Children &
Sexually Violent Offender Registration Act and requires registered sexual
offenders to disclose their enrollment at IHEs to relevant local authorities.
Schools must then inform the campus community where information about
registered sex offender enrollments can be found. While solely providing
the location of this information is a step forward for improving the
transparency by IHEs, at least one study has shown students believed
providing offender pictures, offense type, and posting this information on
the IHE’s website is preferred (Garland et al. 2018).
COP on Campus
Table 19.2 indicates that as part of the professionalization of campus
policing, during the 1990s shifts occurred in the organizational model of
campus police departments due to their adopting the philosophical,
administrative, and tactical components of COP. Adopting COP would not
only reorient campus policing to prioritize relations with the community but
also change how departments were organized by decentralizing and de-
specializing them, not to mention flattening their rank-structure. COP also
promised to help legitimize campus police not only among students, but
among members of the law enforcement community more broadly as many
of them worked at agencies also experimenting with or fully implementing
COP (Paoline and Sloan 2013).
Although widespread adoption of COP occurred during the 1990s and
into the 2000s, post-9/11 concerns relating to terrorist attacks at IHEs,
ongoing concerns over drug- and alcohol-facilitated victimizations
occurring on campus, especially those involving sexual victimization of
college women, helped limit many of the promised COP reforms. Instead,
the 2000s saw the beginnings of campus police militarization as increasing
numbers of departments created special weapons and tactics or SWAT
teams to address terrorist threats and procure military-grade equipment and
weapons. Bifurcation of campus security continued, and as shown in both
Tables 19.1 and 19.2, the 2000s witnessed a third intervention of Congress
into the operations, policies, and procedures of campus security agencies
intended to again address issues over agency transparency and
accountability.
Conclusion
The evolution of IHE security in the United States has involved two
legislative “streams.” The first involved the states, occurred in the 1960s
and 1970s, and involved them passing enabling legislation (or having
attorneys general issue binding opinions) that IHEs could create their own
police departments staffed by sworn, armed, officers. While not all IHEs
chose that particular route resulting in a bifurcation of campus security, the
fact campus police/security guards were available to protect person and
property represented a sea change in campus security. The second stream
involved the US Congress. Beginning in 1990 with passage of the Campus
Security Act, over the next 15 years Congress passed a series of
amendments to the Higher Education Act of 1965 designed to address
growing concerns over the extent and nature of criminal victimization
occurring at IHEs and schools’ apparent failure to address them. While the
specific issues addressed by legislation varied, much of their focus was with
(1) the sexual victimization of college women, (2) victims’ rights, and (3)
ensuring current and prospective students, their parents, and employees had
easy access to documentation of IHE security and safety policies and
procedures. Sanctions for noncompliance, ranging from civil fines to loss of
access to federal financial aid, incentivized IHEs to take seriously the
changes in security policies and procedures mandated by legislation.
Beyond addressing specific security issues, the legislation, amendments,
and administrative rules—either explicitly or implicitly—sought to increase
transparency in, and accountability for, how IHEs were addressing campus
security issues.
On March 8, 2021, President Biden signed an executive order directing
the Department of Education to review all existing policies and regulations,
including the 2020 Final Rule. This action effectively begins his promise to
dismantle Trump-era changes to Title IX (Rogers and Green 2021).
President Biden’s executive order is among the first changes by his
administration directed at the 2020 Final Rule. Only time will tell what the
federal government’s foci on campus security will be during the Biden
administration.
Recommended Readings
Across four editions, Fisher and Sloan’s edited volume, Campus Crime:
Legal, Social and Policy Perspectives is a collection of original chapters
whose topics cover different aspects of crime and security at IHEs. Each
edition (newest edition, 2022) offers new and updated chapters that focus
on legislation, college student victimization research, campus policing, and
physical and cyber security. Sloan and Fisher’s The Dark Side of the Ivory
Tower: Campus Crime as a Social Problem (2011) identifies four disparate
groups of “claimsmakers” who separately socially constructed campus
crime, victimization, and lax security as a “new” social problem in the
United States during the 1980s and 1990s.
Focused more on campus security, Sulkowski and Lazarus (2011)
review various IHE’s efforts to reduce the risk of violence on campus, by
utilizing emerging technologies, allowing conceal carrying of firearms on
campus, and using active shooter profiling tools to enhance campus
security. Jacobson (2017) examines the effect of IHE campus security
measures and student reporting of victimization by gender on-campus
violent crime patterns.
Narrowing the foci of campus security to specific types of crimes,
Rasmussen and Johnson (2008) present results from a survey of student life
and campus safety officials after the 2007 Virginia Tech mass shooting and
discuss notification systems and security monitoring and enhancements
implemented in the wake of the mass shooting. Fox and Savage (2009)
present findings and discuss recommendations for enhancing campus
security from various task forces convened after the mass shootings at
Virginia Tech and Northern Illinois University.
Sources of campus crime statistics and security policies include not only
annual security reports from Title IV eligible IHEs (i.e., those participating
in federal financial aid programs) but also Indicators of School Crime and
Safety published annually and includes a chapter devoted to IHE crime and
security (Wang et al. 2020). The US Department of Educations’ online
Security Data Analysis Cutting Tool (https://ope.ed.gov/campussafety/#/)
provides the past three years of data on crime (from 2005) and fire (from
2010) statistics submitted annually for the entire IHE or by campus, along
with an option to view crime rates (the number per 1000 students), for
download.
References
Bordner, D., & Petersen, D. (1983). Campus policing: The nature of university police work.
Baltimore, MD: University Press of America.
Campus Sexual Assault Victims Bill of Rights, Pub. L. No 102-325, §486 [c] (1992).
Cantor, D., Fisher, B., Chibnall, S., Harps, S., Townsend, R., Thomas, G., Lee, H., Kranz, V.,
Herbison, R., & Madden, K. (2020). Report on the AAU Campus Climate Survey on Sexual Assault
and Misconduct.
Delehanty, C., Mewhirter, J., Welch, R., & Wilks, J. (2017). Militarization and police violence: The
case of the 1033 program. Research & Politics, 4(2), 1–7.
[Crossref]
Fisher, B.S., Daigle, L.E., & Cullen, F.T. (2010). Unsafe in the Ivory Tower: The sexual victimization
of college women. Thousand Oaks, CA: SAGE Publications, Inc.
[Crossref]
Fisher, B.S., & Sloan, J.J. (2013). Campus crime: Legal, social, and policy perspectives. Charles C
Thomas Publisher.
Fox, J.A., & Savage, J. (2009). Murder goes to college: An examination of changes on college
campuses following Virginia Tech. American Behavioral Scientist, 52(10), 1465–1485.
[Crossref]
Garland, B., Calfano, B., & Wodahl, E. (2018). College student perceptions of notification about sex
offenders on campus. Criminal Justice Policy Review, 29(3), 240–257.
[Crossref]
Gelber, S. (1972). The role of campus security in the college setting. Washington, DC: U.S.
Government Printing Office.
Greenberg, S. (2007). Active shooters on college campuses: Conflicting advice, roles of the
individual and first responder, and the need to maintain perspective. Disaster Medicine & Public
Health Preparedness, 1(S1), S57–S61.
[Crossref]
Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act, 20 U.S.C.
§1092 (1998).
Johnson, N.R., & Feinberg, W.E. (1980). Youth protest in the 1960s. Sociological Focus, 13(3), 173–
178.
Jordan, V. (2019). Finding my voice: My journey to the West Wing and the path forward. New York,
NY: Penguin Random House, LLC.
Know Your IX. (2019) Re: ED Docket No. ED-2018-OCR-0064, RIN 1870-AA14,
Nondiscrimination on the basis of sex in education programs or activities receiving federal financial
assistance. Retrieved January 15, 2021 from https://actionnetwork.org/user_files/user_files/000/029/
219/original/Know_Your_IX_Comment_on_Proposed_Title_IX_Rule_(1).pdf.
Knowles, J.E. (2020). Policing the American university. Watertown, MA: Civilytics Consulting.
McQuade, S.C. (2013). High-tech abuse and crime on college and university campuses. In B.S.
Fisher & J.J. Sloan (Eds.), Campus crime: Legal, social, and policy perspectives (3rd ed., pp. 358–
386). Springfield, IL: Charles C. Thomas.
Newcomer, L.A. (2017). Institutional liability for rape on college campuses. The Ohio State Law
Journal, 78, 503–539.
Okeke, C., & Abrahams, L. (2018, April). Four ways private university police forces jeopardize
public safety. Urban Wire. Retrieved January 9, 2021 from https://www.urban.org/urban-wire/four-
ways-private-university-police-forces-jeopardize-public-safety.
Paoline, E.A., & Sloan, J.J. (2003). Variability in the Organizational Structure of Contemporary
Campus Law Enforcement Agencies: A National-Level Analysis. Policing: An International Journal
of Police Strategies & Management, 26(4), 612–639.
[Crossref]
Paoline, E.A., & Sloan, J.J. (2013). Community oriented policing (COP) on college campuses: New
directions? In B.S. Fisher & J.J. Sloan (Eds.), Campus crime: Legal, social, and policy perspectives
(3rd ed., pp. 324–342). Springfield, IL: Charles C. Thomas.
Peshek, S. (2018). The Morrill Act, explained. Retrieved January 6, 2021 from https://today.tamu.
edu/2018/07/01/the-morrill-act-explained/.
Rasmussen, C., & Johnson, G. (2008). The Ripple Effect of Virginia Tech: Assessing the Nationwide
Impact on Campus Safety and Security Policy and Practice. Minneapolis: Midwestern Higher
Education Compact.
Reaves, B.A. (2015). Campus law enforcement: 2011–2012. Washington, DC: Bureau of Justice
Statistics.
Reaves, B.A. (2016). State and local law enforcement training academies: 2013. Washington, DC:
Bureau of Justice Statistics.
Rogers, K., & Green, E.L. (2021, March 8). Biden will revisit Trump rules on campus sexual assault.
The New York Times. https://www.nytimes.com/2021/03/08/us/politics/joe-biden-title-ix.html?
referringSource=articleShare.
Sloan, J.J. (2020, October 7). A seminal moment for America’s campus police? BSC Blog. Retrieved
January 6, 2021 from https://thebscblog.wordpress.com/2020/10/07/a-seminal-moment-for-americas-
campus-police/.
Sloan, J.J., & Fisher, B.S. (2011). The dark side of the Ivory Tower: Campus crime as a social
problem. New York, NY: Cambridge University Press.
Sloan, J.J., & Fisher, B.S. (2018). Arming the Ivory Tower. Paper presented at the 2018 Annual
Meetings of the Southern Criminal Justice Association, Pensacola Beach, September 12.
Sulkowski, M.L., & Lazarus, P.J. (2011). Contemporary responses to violent attacks on college
campuses. Journal of School Violence, 10(4), 338–354.
[Crossref]
Title IX of the Education Amendments Act of 1972, Pub L. No. 92-318, 86 Stat. 235 (1972).
US Department of Education Office for Civil Rights. (1997). Sexual Harassment Guidance 1997.
Retrieved January 17, 2021 from https://www2.ed.gov/about/offices/list/ocr/docs/sexhar01.html.
US Department of Education Office for Civil Rights. (2001). Revised sexual harassment guidance:
Harassment of students by school employees, other students, or third parties. Retrieved January 17,
2021 from https://www2.ed.gov/about/offices/list/ocr/docs/shguide.pdf.
US Department of Education Office for Civil Rights. (2011). Dear colleague letter. Retrieved January
17, 2021 from https://www2.ed.gov/about/offices/list/ocr/letters/colleague-201104.html.
US Department of Education Office for Civil Rights. (2014). Questions and Answers on Title IX and
Sexual Violence. Retrieved January 18, 2021 from https://www2.ed.gov/about/offices/list/ocr/docs/
qa-201404-title-ix.pdf.
US Department of Education, National Center for Education Statistics, Higher Education General
Information Survey. (2019). Total fall enrollment in degree-granting postsecondary institutions, by
level and control of institution, attendance status, and sex of student: Selected years, 1970 through
2029. Retrieved January 18, 2021 from https://nces.ed.gov/programs/digest/d19/tables/dt19_303.30.
asp.
Violence Against Women Act of 1994, Pub L. No. 103-322, Title IV (1994).
Violence Against Women Reauthorization Act of 2000, Pub L. No. 106-386, Division B (2000).
Violence Against Women Reauthorization Act of 2005, Pub L. No. 109-162 (2005).
Violence Against Women Reauthorization Act of 2013, Pub L. No. 133-4 (2013).
Wada, J.C., Patten, R., & Candela, K. (2010), Betwixt and between: The perceived legitimacy of
campus police. Policing, 33(1), 114–131.
[Crossref]
Wang, K., Chen, Y., & Zhang, J. (2020). Indicators of school crime and safety: 2019. Washington,
DC: National Center for Education Statistics, US Department of Education, and Bureau of Justice
Statistics, Office of Justice Programs, US Department of Justice.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_20
Abstract
Illegal commercial fishing, commonly referred to as IUU (illegal,
unreported, and unregulated) fishing, is one of the most complex and
serious environmental crimes. The harms of this crime are numerous and
significant, spanning from economic and social to environmental, affecting
not only people but also marine life alike. This chapter will broadly outline
and discuss the harms caused by illegal fishing. It will then focus on the
facilitators of this crime and lay the foundation for security issues
associated with each. Subsequent discussions will focus on identifying the
interventions that have been proposed or implemented to remove these
facilitating conditions, as well as on proposing alternative intervention that
can better address the issue while holding the issue of security in mind.
Regulation
The United Nations Convention on the Law of the Sea of 1982 (UNCLOS)
is the primary international regulation pertaining to the sea. This
“Constitution for the Seas” provides the basis for exercising jurisdictional
power over waters that stretch 200 nautical miles from the shore. These
powers not only pertain to the responsibilities of the states to engage in
equitable and efficient utilization and conservation of living resources
found within their boundaries, but also provide the states with the legal
basis to deal with criminal matters. For example, while the states whose
flags a fishing vessel carries are responsible for imposing penalties if the
vessel engages in illegal activity, in accordance with Articles 92 and 94 of
UNCLOS, the coastal states may act against foreign fishing vessels found
within their exclusive economic zones with or without the flag state’s
consent. Interdiction and boarding of foreign vessels by the patrol of the
coastal state may also be allowed under such U.N. Security Council
Resolutions (Bruwer 2019) as 2240 (2015), 2312 (2016), 2380 (2017), 2437
(2018), 2491 (2019), 2546 (2020) (United Nations Security Council 2020).
Beyond the states’ exclusive economic zones, activities carried out in
the high seas are far more difficult to control. Jurisdictionally, no state has
the right to claim sovereignty over these vast swathes of the ocean. As a
way to manage and control the fishing operations of global fleets, various
regional fisheries management organizations (RFMOs) have been
established. These RFMOs, which are inter-governmental organizations and
are composed of members from different regional fishing nations,
coordinate access to mutually shared resources and engage in the overall
governance of these fisheries. In essence, these RFMOs can be divided into
three types based on the three primary roles they engage in: (a) conduct
scientific research, (b) perform regional coordination and advisory services,
and (c) govern and manage fishery resources (Palma et al. 2010). In order to
achieve the latter, which is specifically focused on addressing the problem
of IUU fishing within their management area, the RFMOs engage in setting
and allocating fishing quotas and establishing mechanisms to monitor,
control, and protect fish stocks that fall not only within the exclusive
economic zones of the states that are party to the RFMO but also in the high
seas within its management area. To achieve this goal, various mechanisms
are in place, which include granting authorization to transship or land fish at
a member state’s port, requiring observers onboard foreign fishing vessels
fishing in their management areas, requiring that member states utilize
inspectors at ports when offloading catch, and requiring that member states
report their catches on an annual basis in conformity with their internal
regulatory frameworks (Petrossian 2019). To deal with identified IUU
fishing vessels, RFMOs maintain blacklists, which then significantly limit
the listed vessel’s ability to engage in economic activity with the RFMO’s
member states.
The European Union, which imports about 38% of world’s fish (FAO
2014) and is among the three top importers of seafood in the world, has an
especially significant role and a vested interest in regulating IUU fishing.
Through the EU-IUU Regulation, the European Union has established three
main operational strategies to help its member states in their efforts to deal
with IUU fishing more effectively. First, it requires that its member states
implement the established catch certification programs through which a
rigorous verification of the legality and the origin of the fish is established.
Second, should its member states engage in IUU fishing, it will carry heavy
penalties that include fines five times the value of the illegally caught fish
for first-time offenders, and eight times the value of the illegally caught fish
for repeat offenders, if the repeat offending took place within a five-year
period from the first offense. Third, non-EU countries are “carded” (green =
good; yellow = warning; red = failed) based on EU’s assessments of their
efforts to curb illegal fishing in their exclusive economic zones. Should a
country receive a red card, the EU activates a temporary ban on the imports
from the fisheries of that third country until the country demonstrates
sufficient improvements in their efforts to address the problem (The EU-
IUU Regulation 2016).
Management
The United Nations Fish and Agriculture Organization’s Port States
Measures Agreement (PSMA), which became a binding international
agreement in June 2016, specifically deals with IUU fishing by preventing
the vessels engaged in such fishing from entering ports to offload their
catches. The Agreement, which currently has 67 Parties, has been
developed to harmonize port state regulatory practices and provide
guidance to the states in terms of the effective measures to prevent IUU
vessels from entering their ports, and, eventually, releasing their catches
into international markets. The PSMA has been designed to complement
and reinforce flag states’ controls over fishing vessels (Rosello 2020). It has
such provisions as requiring that the port state deny landing and
transshipment at its ports to vessels that have been blacklisted by RFMOs
or are carrying the flags of known flag-of-convenience states. Additionally,
the PSMA requires that the states adopt rigorous port state measures, such
as requiring arriving fishing vessels to provide authorized details of its
identity, such as vessel identification, flag, license, fishing trip, vessel
monitoring system, and so forth. Port states are also required to designate
only specific ports that will accept foreign fishing vessels.
References
African Union. (2014). 2050 Africa’s integrated maritime strategy. Juta. Available at http://www.
jutajournals.co.za/2050-africas-integrated-maritime-strategy-2014/.
Belhabib, D., Le Billon, P., & Wrathall, D.J. (2020). Narco-fish: Global fisheries and drug
trafficking. Fish and Fisheries, 21(5), 992–1007. https://doi.org/10.1111/faf.12483.
[Crossref]
Bergenas, J., & Knight, A. (2015, January 30). How illegal fishing threatens development and
security. World Politics Review, 4.
Boerder, K., Miller, N. A., & Worm, B. (2018). Global hot spots of transshipment of fish catch at sea.
Science Advances, 4(7), eaat7159.
[Crossref]
Bruwer, C. (n.d.). Smuggling and trafficking of illicit goods by sea. In Li. Otto (Ed.), Global
challenges in maritime security an introduction (pp. 49–73).
Bruwer, C. (2019). Transnational organised crime at sea as a threat to the sustainable development
goals: Taking direction from piracy and counter-piracy in the Western Indian Ocean. African Security
Review, 28(3–4), 172–188.
Chapsos, I., & Hamilton, S. (2019). Illegal fishing and fisheries crime as a transnational organized
crime in Indonesia. Trends in Organized Crime, 22(3), 255–273. https://doi.org/10.1007/s12117-018-
9329-8.
[Crossref]
Chevallier, R. (2017). Safeguarding Tanzania’s Coral Reefs: The Case of Illegal Blast Fishing. South
African Institute of International Affairs, Policy Insights, 46.
Clarke, R.V. (2018). Regulating crime: The birth of the idea, its nurture and the implications for
contemporary criminology. Annals of the American Society of Political and Social Science 679(1):
20–35
[Crossref]
Crowell, B., & Turvold, W. (2020). Illegal, Unreported, and Unregulated Fishing and the Impacts on
Maritime Security. Available at https://apcss.org/wp-content/uploads/2020/09/13-Crowell-25th3.pdf.
Cufone, M. (2020). Guest column: Commercial fish farms will harm the Gulf of Mexico. The
Advocate, September 10.
Dyer, Z. (2014, August 5). Drug traffickers lure Costa Rica’s struggling coastal fishermen with offers
of easy money. The Tico Times, 16.
Environmental Justice Foundation (EJF). (2007). Illegal Driftnetting in the Mediterranean. London,
UK.
Environmental Justice Foundation (EJF). (2010). All at sea- the abuse of human rights aboard illegal
fishing vessels. Environmental Justice Foundation, London, UK.
Ewell, C., Cullis-Suzuki, S., Ediger, M., Hocevar, J., Miller, D., & Jacquet, J. (2017). Potential
ecological and social benefits of a moratorium on transshipment on the high seas. Marine Policy, 81,
293–300.
[Crossref]
Gianni, M., & Simpson, W. (2005). The Changing Nature of High Seas Fishing: How flags of
convenience provide cover for illegal, unreported and unregulated fishing.
Guilfoyle, D. (2009). Intercepting Vessels at Sea. New York: Cambridge University Press.
Hamad, H.B. (2015). Corporate Social Responsibility (CSR) in the Shipping Industry: A Disturbing
Mechanism Between Maritime Security Needs and Seafarers’ Welfare. Studies of Organisational
Management & Sustainability 3 (1).
Hansen, S.J. (2011). Debunking the piracy myth: How illegal fishing really interacts with piracy in
east Africa. The RUSI Journal, 156(6), 26–31. https://doi.org/10.1080/03071847.2011.642682.
[Crossref]
Marteache, N., Viollaz, J., & Petrossian, G.A. (2015). Factors influencing the choice of a safe haven
for offloading illegally caught fish: a comparative analysis of developed and developing economies.
Crime Science, 4(1), 32.
[Crossref]
Moreto, W.D., Charlton, R.W., DeWitt, S.E., & Burton, C.M. (2020). The convergence of
CAPTURED fish and people: Examining the symbiotic nature of labor trafficking and illegal,
unreported and unregulated fishing. Deviant Behavior, 41(6), 733–749. https://doi.org/10.1080/
01639625.2019.1594587.
[Crossref]
Nunan, F., Cepić, D., Yongo, E., Salehe, M., Mbilingi, B., Odongkara, K., Onyango, P., Mlahagwa,
E., & Owili, M. (2018). Compliance, corruption and co-management: How corruption fuels
illegalities and undermines the legitimacy of fisheries co-management. International Journal of the
Commons, 12(2), 206–220. https://doi.org/10.18352/ijc.827.
[Crossref]
Office of Naval Intelligence. (2020). Gulf of Guinea/Horn of Africa/Southeast Asia: Weekly Piracy
Updates. Available at https://www.oni.navy.mil/Portals/12/Intel%20agencies/piracy/WTS/20201007_
WTS.pdf?ver=VipHJgJHnvhCDjRN5j3iiA%3D%3D.
Palma, M.A.E., Tsamenyi, M., & Edeson, W.R. (2010). Promoting sustainable fisheries: The
international legal and policy framework to combat illegal, unreported and unregulated fishing (Vol.
6). Brill.
Pauly, D., & Zeller, D. (2016). Catch reconstructions reveal that global marine fisheries catches are
higher than reported and declining. Nature Communications, 7, 10244.
[Crossref]
Petrossian, G.A. (2018). A micro-spatial analysis of opportunities for IUU fishing in 23 Western
African countries. Biological Conservation, 225, 31–41.
[Crossref]
Petrossian, G.A. (2019). The Last Fish Swimming: The Global Crime of Illegal Fishing. ABC-CLIO.
Petrossian, G.A., & Clarke, R.V. (2014). Explaining and controlling illegal commercial fishing: An
application of the CRAVED theft model. British Journal of Criminology, 54(1), 73–90.
[Crossref]
Petrossian, G.A., & Clarke, R.V. (2020). Disaggregating illegal fishing losses for the 22 countries of
the West African Coast. Maritime Studies, 1–11.
Petrossian, G.A., Marteache, N., & Viollaz, J. (2015a). Where do “undocumented” fish land? An
empirical assessment of port characteristics for IUU fishing. European Journal on Criminal Policy
and Research, 21(3), 337–351.
[Crossref]
Petrossian, G., Weis, J.S., & Pires, S.F. (2015b). Factors affecting crab and lobster species subject to
IUU fishing. Ocean & Coastal Management, 106, 29–34.
[Crossref]
Petrossian, G.A., Sosnowski, M., Miller, D., & Rouzbahani, D. (2020). Flags for sale: An empirical
assessment of flag of convenience desirability to foreign vessels. Marine Policy, 116, 103937.
[Crossref]
Pew Charitable Trusts. (2013). How to End Illegal Fishing. PEW, December 10, 2013. Available at
http://pewenvironment.org/news-room/reports/how-to-end-illega-fishing-85899522612.
Rosello, M. (2020). Illegal, Unreported and Unregulated (IUU) Fishing as a Maritime Security
Concern. In Global Challenges in Maritime Security (pp. 33–47). Springer, Cham.
[Crossref]
SkyTruth and Global Fishing Watch. (2017). The Global View of Transshipment: Preliminary
Findings.
The EU-IUU Regulation. (2016). The EU-IUU Regulation: Building on Success: EU Progress in the
Global Fight against Illegal Fishing. Available at https://ejfoundation.org/reports/the-eu-iuu-
regulation-building-on-success-eu-progress-in-the-global-fight-against-illegal-fishing.
U.N. Food and Agriculture Organization. (2007). FAO Workshop on Vulnerable Ecosystems and
Destructive Fishing in Deep-Sea Fisheries. FAO Report No. 829, Rome, Italy.
U.N. Food and Agriculture Organization. (2014). The State of World Fisheries and Aquaculture
2014: Opportunities and Challenges. Food & Agriculture Org.
U.N. Food and Agriculture Organization. (2018a). Global production by production source 1950–
2016 (FishstatJ). FAO Fisheries and Aquaculture Department [online]. Rome.
U.N. Food and Agriculture Organization. (2018b). The State of World Fisheries and Aquaculture:
Meeting the Sustainable Development Goals.
UNODC. (2019). Rotten fish: A guide on addressing corruption in the fisheries sector. https://www.
unodc.org/unodc/en/wildlife-and-forest-crime/publications.html.
UNODC. (2019). Maritime Crime: A Manual for Criminal Justice Practitioners. Vienna, Austria.
Available at https://www.unodc.org/documents/Maritime_crime/19-02087_Maritime_Crime_
Manual_Second_Edition_ebook.pdf
Urbina, I. (2015). Sea Slaves: The human misery that feeds pets and livestock. The New York Times,
July 27.
Warner-Kramer, D. (2004). ‘Control begins at home: Tackling flags of convenience and IUU
fishing’, Golden Gate UL Review, 34, 497.
Weekers, D., Mazerolle, L., & Zahnow, R. (2020). Space-time patterns of poaching risk: Using the
near-repeat hypothesis to inform compliance enforcement in marine protected areas. Biological
Conservation, 248, 108652.
[Crossref]
Weldemichael, A. T. (2019). Crimes within crimes in Somalia: Double-dealing pirates, fraudulent
negotiators, duplicitous intermediaries and treacherous illegal fishers. Journal of Territorial and
Maritime Studies, 6(1), 51–63.
White, A.T., Vogt, H.P., & Arin, T. (2000). The Philippine Coral Reefs Under Threat: The Economic
Losses Caused by Reef Destruction. Marine Pollution Bulletin, 40, pp. 598–605.
[Crossref]
Widjaja, S., Long, T., Wirajuda, H., Van As, H., Bergh, P.E., Brett, A., … Ruchimat, T. (2019).
Illegal, unreported and unregulated fishing and associated drivers. Blue Paper, 15, 2020–02.
Witbooi, E., Ali, K.D., Santosa, M.A., Hurley, G., Husein, Y., Maharaj, S., … Salas, O. (2020).
Organized crime in the fisheries sector threatens a sustainable ocean economy. Nature, 588(7836),
48–56.
[Crossref]
Wood, P. (2004, April 16). Drugs and terrorism. BBC News. http://news.bbc.co.uk/2/hi/programmes/
newsnight/3631823.stm.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_21
Jim Gee
Email: [email protected]
Mark Button
Email: [email protected]
Abstract
In recent years, the Darknet has become synonymous with a wide range of
potential criminal activities from the purchase of fraudulent credit cards,
sale of drugs to access to child pornography. This chapter reports on a
recent small-scale research on brand abuse on the Darknet. The research
project emerges from a desire to begin to understand of how the Darknet is
used by fraudsters and cyber-criminals to support, plan, execute and
monetise attacks on companies by abusing their brand names. Our empirical
research focuses on the top 50 UK brands, as identified in the 2017 UK
brand directory league table. We quickly discovered discussions, and
attempts to market services and products, intended to defraud or perpetrate
cybercrime against 21 of the top 50 UK brands, which could be grouped
into four categories: (i) banking and finance, (ii) telecommunications, (iii)
retail and entertainment, and (iv) energy and transport. For example, in line
with current research on cybercrime against businesses, it appeared that the
banking and finance section was the biggest target of brand abuse—
sensitive personal data were easily accessible, readily available and cheap
to purchase.
Introduction
Cyber-attacks/security breaches can be potentially catastrophic for
businesses. Globally, the annual cost of cybercrime is predicted to be more
than $6 trillion by the end of 2021 (Cybersecurity Ventures 2020). An
official government source suggests that the average annual cost of a cyber
security breach (up to the winter of 2019) in the United Kingdom is £1010
across all businesses and higher, at £3070 for medium and large business
(DCMS 2020). Actually, these numbers seem surprisingly low, which
suggest that many businesses under-report the true costs of breaches, as
some (e.g., banks and financial institutions) fear reputational damage if a
major breach becomes public knowledge. The same source reports that the
most common type of cyber-attack by far is phishing—staff receiving
fraudulent emails or being directed to fraudulent websites, followed by
impersonation of a trusted individual or business, and viruses or other
malware (DCMS 2020). Following all these, a question arises: where do
fraudsters and cyber-criminals obtain the basic data and technical tools
needed to carry out these attacks?
In recent years, the Darknet has become synonymous with a wide range
of criminal activities and has become associated with serious security risks.
Particularly, it has become a primary environment for the exchange of ideas
and the trading of goods and services amongst cyber-criminal groups; stolen
data in the form of goods and services would surface rapidly on Darknet
marketplaces and forums following cybersecurity breaches with data loss
(Henry 2018). Currently, due to the Covid-19 pandemic, most businesses
are operating under digital-first deployments in that individuals are fast-
shifting to remote working. This in turn opens countless opportunities for
accessing less-protected computers and makes understanding and thus
preventing threats on the Darknet even more critical to business security
and continuity (Bonderud 2020). Businesses that are well-equipped with the
capability to extract threat intelligence from Darknet markets and forums,
place themselves in a position of significant security advantage. In fact, an
understanding of the Darknet is now critical to business security.
This chapter reports on a small-scale research project conducted in
March and April 2018 to investigate brand abuse on the Darknet (for the
commercial report, see Gee et al. 2018). The research project emerges from
an initial desire to begin to understand how the Darknet is being used by
fraudsters and cyber-criminals to support, plan, execute and monetise
attacks on businesses by hijacking and abusing their brand names. Brands
have a huge potential financial value. The internationally recognised
standard on Brand Valuation, ISO 10668, defines a brand as ‘a marketing
related intangible asset including, but not limited to, names, terms, signs,
symbols, logos and designs, or a combination of these, intended to identify
goods, services or entities, or a combination of these, creating distinctive
images and associations in the minds of stakeholders, thereby generating
economic benefits/value’ (Brand Finance 2017, p. 4). Huge investments,
financial and otherwise, are made in the design, launch and continuing
marketing of brands (ibid.). Unfortunately, many businesses fail to invest in
the continuous monitoring of brand performance (Bullock 2020).
This research focuses on the top 50 most valuable UK brands identified
in the 2017 UK brand directory league table. Darknet markets were
searched, and the researchers quickly identified dialogue to trade illegal
services and products, with the intention to defraud or perpetrate crime,
against 19 of the top 50 UK brands. These brands can be grouped into four
categories: (i) banking and finance, (ii) telecommunication and energy
companies, (iii) lifestyle and (iv) critical infrastructure. Brands in the
category of banking and finance were the more prominent targets of abuse
with sensitive business and personal data easily accessible, readily available
and cheap to purchase. Considering the potentially existential threat that the
Darknet presents to businesses, we suggest that threat prevention—cyber or
otherwise—is a much-ignored area. We, thus, call for more research in this
area to develop more effective preventative measures.
At the time of the empirical research only three of the nine markets in
Fig. 21.1—Dream Market, Wall Street Market and Tochka—had been ‘live’
for more than a year and half (see Fig. 21.1; the ‘Created’ column). The
CGMC market was created on the 7th of June 2016 (see the ‘Created’
column), but its access was by ‘Invite Only’ (see the ‘Open registration?’
column) which usually indicates some extreme illicit activities, way beyond
the remits of our ethical approval. Further, during the empirical research,
we discovered that the Tochka market was continental European facing and
drug focused. Thus, we had to search the Olympus Market, a very new
marketplace instead which, inevitably, generated less insights. These
empirical hurdles highlight the fast-shifting Darknet environment and bring
to light the struggles faced by law enforcement to monitor or control such
an environment.
Dream Market was our main source of data. It contained many UK
vendors and products, as well as many custom searches for UK vendors. It
had a simpler user interface, which was linked to a dedicated search engine
with an advanced ‘Filter’ to facilitate searching (see Fig. 21.2). At the time
of empirical work, it contained almost 130,000 listings. They included
50,948 listings of digital goods; 63,461 listings of drugs; 337 listings of
drugs and paraphernalia; 4680 listings of services and 3482 listings of
others (see Fig. 21.2; ‘Browse by category’; 30/05/2018).
Fig. 21.2 A screen shot of the Dream Market listings
It was very difficult to search for brands in the Wall Street Market itself.
The technological structure of this particular market made it impossible to
search without more advanced techniques and tools, which would have
taken us beyond our timeframe, technical capability and ethical permission.
Fortunately, the Wall Street Market has a categorised forum system. Thus,
we decided to study the posts in this forum instead. We obtained a complete
‘crawl’ of the ‘Other Reviews & Discussions’ section (see Fig. 21.3) on the
forum (http://x7bwsmcore5fmx56.onion/) and saved it into an excel sheet.
By—complete ‘crawl’—we mean all forum discussions in this section from
the creation of the Wall Street Market Forum up to the 11th April 2018. We
also obtained a complete ‘crawl’ of the Dream Market forum and loaded
into an excel sheet, which contained all forum discussions since the creation
of the Dream Market Forum to the 11th April 2018.
Fig. 21.3 The ‘other reviews & discussions’ section of the Wall Street Forum
Findings
We searched the market for the top 50 most valuable brands one by one and
found a range of brands were being abused (see Table 21.1; the italicised
ones in each of the four categories). In fact, almost to our surprise, the
various types of abuse of 19 out of 50 brands were very easily discovered in
the Dream Market via simple searches (see Fig. 21.2; search for brand name
via the ‘Filter’ function) again given clues to a good focus for brand
protection approaches.
Although very limited, we also identified a few cases of brand abuse in
the Olympus Market, including Lloyds, HSBC, Virgin media and Tesco. In
the banking and finance category, we found phishing pages with code to
grab data targeted at Lloyds and HSBC. In the category of
telecommunication and energy companies, we found sales of templates of
bills and receipts for ‘Virgin TV anywhere’ accounts. In the category of
lifestyle, we found the sales of information that could be used to crack
Tesco customer accounts easily. Combining the information that we
discovered in both the Dream Market and the Olympus Market, we
discovered that the 19 brands in our four categories (see Table 21.1) tend to
be abused in the following 18 different types of manner (see Tables 21.2,
21.3, 21.4 and 21.5).
Table 21.2 Types of brand abuse in the category of banking and finance
Table 21.3 Types of brand abuse in the category of telecommunication and energy companies
Based on our findings, in the banking and finance category, the most
frequently discovered type of brand abuse is the ‘sales of statements and
other banks and financial institutions’ letters, templates and cards’. This is
followed by the ‘sales of credit card details, personal information, including
account numbers, sort codes, credit reports’ and ‘sales of statements and
other banks and financial institutions’ letters and templates’. In particular,
there is an abundance of editable UK bank statement templates, and UK
bank full bank account numbers and sort codes for anyone to purchase.
Besides these three types above, there is also the fourth type, namely the
‘sales of general personal information of customers’. Based on our research,
the bulk-selling of customers’ personal information appears to be a general
type of abuse across all banking and financial institutions. At the time of the
empirical work, we could not identify exactly which institution/s these
customer information came from without contacting the sellers or making a
purchase, and neither of these activities were within our permitted ethical
boundaries.
With regard to telecommunication and energy companies the two
dominant types of brand abuse were the ‘Sales of templates for fake bills
and receipts’ and the ‘Sales of guides on how to obtain unlimited data, calls
etc.’. In particular, there is an abundance of Tesco Sentry MBA7
Config/Snapshots, accompanied by product descriptions with headlines of
the following fashion: ‘you will receive a snapshot and Sentry MBA, so you
have everything you need to start cracking some accounts’. Besides these,
we identified evidence of the general bulk-selling of fake vouchers,
coupons and loyalty cards; dumps of hacked customer data; and guides to
rig gas and electricity metres of various telecommunication and energy
companies. At the time of empirical work, we could not identify the origins
of these data.
In term of the lifestyle category the most common type of brand abuse
was the ‘Sales of stolen goods/accounts’. This is followed by the sales of
fake vouchers, coupons, and loyalty cards and guides; templates for fake
bills and receipts; fake goods; and drugs branded with the names of top
brands, including logo.8 In particular, there is an abundance of Tesco
Voucher Cashout (purchase a link and download the PDF) and Tesco
receipts in PSD (a Photoshop document).
In terms of the critical infrastructure category, we discovered two
victims of brand abuse: British Airways and British Gas. Most common
were the sales of personal information of customers; hacked customer
accounts; fake vouchers, coups and loyalty cards of British Airways; and
the sales of fake vouchers, coups and loyalty cards of British Gas. There is
an abundance of British Airways milage points for sale, as well as British
Gas utility bills (including names and addresses).
In the complete ‘crawl’ of the Dream Market forum, we did discover
that the following banking and finance-related brands were discussed to be
potential victims of crime: HSBC, Barclays, Lloyds, Halifax, NatWest, the
Nationwide Building Society and RBS. Further, in the Wall Street Forum,
we obtained a complete ‘crawl’ of the ‘Other Reviews & Discussions’
section on the forum (http://x7bwsmcore5fmx56.onion/) (see Fig. 21.3).
The following brands were found in the discussion forum without clear
evidence of brand abuse (see Table 21.6):
Table 21.6 Brands discussed in the Wall Street Forum
Category Brand
Bank and finance Lloyds, HSBC, Halifax, Barclays
Telecommunication and energy companies Vodafone
Lifestyle Tesco, Sainsbury
Category Brand
Critical infrastructure British Airways, Royal Mail
Although we did not find a lot of direct evidence to indicate any type of
brand abuse in the Wall Street Forum, some of the posts were strongly
suggestive of such and other criminal activities. For example, a forum
participant wrote:
Discussion
It is evident that the Darknet, with its numerous markets and forums, is a
cyber security nightmare for businesses. Clearly, there are extensive
amounts of business and customer/personal data, as well as malicious
software tools being traded on Darknet markets. Even our small-scale
research is sufficient to demonstrate this. Such trading not only damages
brand names and thus business reputation/continuity of the companies
involved but also leads to more security threats. As we have shown, data
purchased on these markets is being used to facilitate all sorts of security
breaches and criminal activities.
As noted above, the Cyber Security Breaches Survey 2020 states that
the most common type of cyber-attacks by far are phishing related,
followed by impersonation, and the spreading of viruses or other malware
(DCMS 2020). It is unsurprising that we were unable to directly track
evidence that linked these activities to the Darknet with actual cyber
security breaches and attacks against businesses; it is after all a deeply
encrypted hidden marketplace. However, we could conclude that the
Darknet, with its countless markets and forums, is an important source of
goods and services used to facilitate breaches and attacks; if there was no
market for these resources, Darknet markets would not exist. Based on our
findings, financial fraud as a service is in high demand. Data and
documents are sold to enable breeder documents to be created to carry out
fraudulent activities, such as applications for loans, credit cards, store
accounts, and so on, all undertaken using stolen identities (Holm 2017).
The potential victim pool is enormous since, even as monitored prior to
the outbreak of Covid-19 in 2020, at least half of all UK businesses have
online bank accounts, have social media pages, and hold personal data
about customers (DCMS 2020)—that is a phenomenal amount of data, all
potentially at risk. Besides the trading of business data and malicious
software tools, it is apparent that Darknet markets and their associated
forums are places of gathering and information/technique/training
exchanges for many fraudsters, cyber-criminals and/or criminal wannabes.
To recap, in this research, we only conducted a superficial search of three
Darknet environments, which is barely scraping the surface. There are
obviously many more hidden criminal resources in the countless deeper
layers, which are exclusive and protected environments of Darknet markets.
Thus, improving Darknet intelligence is critical to the future security and
business continuity of all businesses.
Businesses are there to make money. Naturally, most of them rightfully
focus on developing and expanding their primary trade, and thus consider
cyber security a cost, which could be minimised (e.g., Brown 2018). The
consequences of a ‘successful’ attack or breach are more than just financial:
they can lead to reputational damage; the loss in customer and investor
confidence; bad press coverage and thus lowered public opinion; and the
potential damage to the careers of senior management leaders. (e.g., DCMS
2020). In short, generally, the motivations behind cyber security attacks and
breaches against businesses tend to fall into two main categories: (i)
financial and (ii) reputational. Financial attacks are generally conducted for
monetary purposes, such as a ransom for valuable business data, or to scam
money from businesses and/or their customers (e.g., with fake invoices or
redirected payments). Reputational attacks could be a response to the nature
of a business’ main trade, such as fossil fuel extraction, live-animal
research, arms sales, to name but a few. Of course, sometimes, an attack
may also be revenge-based, perhaps by an ex-employee, or even a current
employee, with a grudge (Nurse et al. 2014).
Following all these, there is clearly a need for more proactive research
into the methods to search the Darknet for client information. Of course,
businesses are already embracing techniques of proactive and preventative
stances to detect and prevent attacks coming from the Darknet (Robertson
et al. 2017). In fact, there is an abundant amount of parallel Darknet
monitoring software: some focus on employee identity theft protection,
whereas others focus on threat intelligence. These software tools are
sometimes ranked by various security companies in order to help businesses
choose suitable ones, and to surreptitiously promote their own products (see
Fig. 21.5). Some of the more advanced software packages are able to
identify mentions of targeted businesses, particularly the sharing and
trading of compromised business data on Darknet markets and forums.
Common techniques embedded in these products are automated scanners,
web crawlers, scrapping techniques for constant monitoring and real-time
detection and analyses, and ticketing systems to enable real-time alerts to
destinated parties, for example a security or IT team (e.g., Adewopo, et al.
2019). Top of the range software packages would include Artificial
Intelligence (AI) capabilities to identify active zero-day vulnerability
exploits (Foy 2019).
Conclusion
The Darknet presents a serious security risk due to its unique
characteristics, the anonymity attached to transactions, the presence of
virtual markets and the use of cryptocurrencies, unsurprisingly a range of
criminal activities are commonplace. Certainly, the Darknet ought to be
investigated more seriously. Such investigations, however, should be carried
out under that pretence that its inherent purpose is not to harm individuals,
organisations and societies. Ultimately, we have to accept the Darknet is
‘free market in action’ in that if there was not a market for every piece of its
online content, then it would not exist.
Thus, there is little prospect of the Darknet ceasing, micromanaged, or
its content effectively restricted anytime soon. It is also clear that a more
holistic sociological understanding of the Darknet’s social characteristics
and technological infrastructures is now needed. Ultimately, the Darknet is
a sophisticated technological platform that is used by a wide variety of
individuals for a wide variety of purposes, both legal and illegal, that
represent the nature of human interests (cf. Mirea et al. 2019). Thus,
perhaps, we should carefully consider those business and government
policies, laws and actions that generate much of the market for Darknet
content.
Further and ongoing research is required to monitor the security threats
and criminal activities that occur on the Darkweb and the brands targeted. It
is also important to evaluate some of the tools that are emerging to help
companies better protect themselves in this area, as well as the extensive
and growing law enforcement interventions that are emerging, which have
been beyond the review of this chapter. Only by better grasping the nature,
scale and effectiveness of the responses to the Darkweb can we better
protect individuals, brands and legitimate businesses.
Recommended Readings
Gee et al. (2018) provide a short commercial report of a project that
identifies discussions, and attempts to market services and products,
intended to defraud or perpetrate cybercrime against the top 50 most
valuable UK brands, as identified the 2017 brand directory league table.
Mirea et al. (2019) suggest that various characteristics that are rooted in the
Darknet’s technological structure, such as anonymity, privacy and the use of
cryptocurrencies, provide a wide range of opportunities for good as well as
for evil; it is based on an empirical study and highlights a potential role for
security on the Darknet but also some of the barriers to achieving it. The
work of Ball et al. (2019) describes a series of open-source tools that could
be used to collect and analyse data obtained from illicit Darknet markets,
and illustrates how to use these by applying them to a typical Darknet
market. The broader trends of malware on Darknet cypto-markets are
discussed by Broadhurst et al. (2018). There are some interesting critiques
of technology-related criminal opportunities, see, for example, the work of
Holt and Bossler (2015) and Byrne and Kimball (2017). The role of the
Darknet as a source of cyber intelligence is explained in detail in Fachkha
and Debbabi (2016).
References
Adewopo, V., Gonen, B., Varlioglu, S., & Ozer, M. 2019. Plunge into the Underworld: A Survey on
Emergence of Darknet, 2019 International Conference on Computational Science and
Computational Intelligence (CSCI), 2019: 155–159.
Arnold, N., Ebrahimi, M., Zhang, N., Lazarine, B., Patton, M., Chen, H., & Samtani, S. 2019. Dark-
Net Ecosystem Cyber-Threat Intelligence (CTI) Tool, 2019 IEEE International Conference on
Intelligence and Security Informatics (ISI), 2019: 92–97.
Ball, M., Broadhurst, R., Niven, A., & Trivedi, H. 2019. Data Capture and Analysis of Darknet
Markets (September 11, 2019). The Social Science Research Network (SSRN). Retrieved from SSRN:
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3344936.
Bartlett, J. 2014. Dark Net Markets: The eBay of Drug Dealing. The Guardian, 5 October. Retrieved
from: https://www.theguardian.com/society/2014/oct/05/dark-net-markets-drugs-dealing-ebay.
BBC. 2017. Dark net guns shipped in old printers. BBC News, 20 July. Retrieved from http://www.
bbc.co.uk/news/technology-40668749.
BBC. 2015. Silk Road Drug Website Founder Ross Ulbricht Jailed. BBC News, 30 May. Retrieved
from https://www.bbc.com/news/world-us-canada-32941060.
Bergman, M. 2001. The Deep Web: Surfacing Hidden Value. The Journal of Electronic Publishing,
7(1). https://doi.org/10.3998/3336451.0007.104.
Bonderud, D. 2020. Darknet Cybersecurity: How Finance Institutions Can Defend Themselves.
SecurityIntelligence, 28 July. Retrieved from https://securityintelligence.com/articles/darknet-
cybersecurity-finance/.
Brand Finance 2017. United Kingdom 150 2017. Retrieved from https://brandirectory.com/
download-report/Brand%20Finance%20UK%20150%202017%20LOCKED.pdf.
Broadhurst, R., Foye, J., Jiang, C., & Ball, M. 2020. Illicit Firearms and Weapons on Darknet
Markets (July 17, 2020). In: Broadhurst, R, J. Foye, J. Jiang & M. Ball, Illicit Firearms and Weapons
on Darknet Markets, Trends and Issues in Criminal Justice, AIC Cannberra (Forthcoming).
Retrieved from: https://ssrn.com/abstract=3653619.
Broadhurst, R., Lord, D., Maxim, D.H., Woodford-Smith, H.C., Johnston, C., Chung, H.W., Carroll,
S., Trivedi, H., & Sabol, B. 2018. Malware trends on darknet cryptomarkets: research review,
Australian National University, Cybercrime Observatory, Cannberra. Retrieved from: http://regnet.
anu.edu.au/sites/default/files/publications/attachments/2018-09/KIC%20report_combined%205%20
Sept.pdf.
Brown, T. 2018. Are miserly budgets putting businesses at risk of cyber-attack?. Computer Fraud &
Security, 8: 9–11.
[Crossref]
Bullock, L. 2020. Importance of Monitoring Your Brand’s Performance and Its Contribution to the
Success of Your Business. Retrieved from https://www.lilachbullock.com/monitoring-brand-
performance-business-success/.
Byrne, J.M. & Kimball, K.A. 2017. Inside the Darknet: Techno-Crime and Criminal Opportunity. In
Criminal Justice Technology in the 21st Century, 3rd ed, ed. L.J. Moriarty, 206–232. Illinois: Charles
C. Thomas Publisher
Chertoff, M. & Simon, T. 2015. The impact of the dark web on internet governance and cyber
security. Global Commission on Internet Governance. Paper Series no.6.
Cybersecurity Ventures. 2020. The 2020 Official Annual Cybercrime Report. Herjavec Group.
Retrieved from https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/.
DCMS, 2020. The Cyber Security Breaches Survey. Retrieved from https://www.gov.uk/government/
publications/cyber-security-breaches-survey-2020/cyber-security-breaches-survey-2020.
Dolliver, D.S. 2015. Evaluating Drug Tracking on the Tor Network: Silk Road 2, the Sequel.
International Journal of Drug Policy, 26 (11): 1113–1123.
[Crossref]
Dominguez, T. 2015. How much of the Internet is Hidden? Seeker, 2 September. Retrieved from
https://www.seeker.com/how-much-of-the-internet-is-hidden-1792697912.html.
Duxbury, S.W., & Haynie, D.L. 2017. The Network Structure of Opioid Distribution on a Darknet
Cryptomarket. Journal of Quantitative Criminology, 34: 921–941.
[Crossref]
Fachkha, C., & Debbabi, M. 2016. Darknet as a Source of Cyber Intelligence: Survey, Taxonomy,
and Characterization, in IEEE Communications Surveys & Tutorials 18(2): 1197–1227,
Secondquarter 2016. Retrieved from https://ieeexplore.ieee.org/abstract/document/7317717.
Foy, K. 2019. Artificial intelligence shines light on dark web—New tools can find patterns in vast
online data to track and identify users on illicit forums. Lincoln Laboratory, 13 May, Retrieved from
https://news.mit.edu/2019/lincoln-laboratory-artificial-intelligence-helping-investigators-fight-dark-
web-crime-0513.
Gee, J., Hall, L., Wang, V., Button, M. & Joseph, E. 2018. The Dark Web—Bad for business. Crow.
Retrieved from https://cyfor.co.uk/the-dark-web-bad-for-business/.
Hardy, R.A. & Norgaard, J.R. 2016. Reputation in the Internet black market: an empirical and
theoretical analysis of the Deep Web. Journal of Institutional Economics 12(3): 515–539.
[Crossref]
Holm, E. 2017. The Darknet: A New Passageway to Identity Theft. International Journal of
Information Security and Cybercrime 6(1): 41–50.
[Crossref]
Holt, T.J., & Bossler, A.M. 2015. The future of cybercrime, technology, and enforcement. In
Cybercrime in Progress: Theory and prevention of technology-enabled offenses (pp. 175–176).
Abingdon, England: Routledge.
[Crossref]
Kruithof, K., Aldridge, J., Décary-Hétu, D., Sim, M., Dujso, E. & Hoorens, S. 2016. Internet-
facilitated Drugs Trade—An Analysis of the Size, Scope and the Role of the Netherlands, RAND
EUROPE.
Moore, D. & Rid, T. 2016. Cryptopolitik and the Darknet. Survival 58(1): 7–38.
[Crossref]
Mirea, M., Wang, V., & Jung, J. 2019. The not so dark side of the darknet: a qualitative study.
Security Journal 32: 102–118. Retrieved from https://link.springer.com/article/10.1057/s41284-018-
0150-5.
Nurse, J. R., Buckley, O., Legg, P. A., Goldsmith, M., Creese, S., Wright, G. R., & Whitty, M. (2014,
May). Understanding insider threat: A framework for characterising attacks. In 2014 IEEE Security
and Privacy Workshops (pp. 214–228). IEEE.
Olson, O. 2013. The Man Behind Silk Road—the Internet’s Biggest Market for Illegal Drugs. The
Guardian, 10th November. Retrieved from https://www.theguardian.com/technology/2013/nov/10/
silk-road-internet-market-illegal-drugs-ross-ulbricht.
Owen, G. & Savage, N. 2015. The tor dark net. Global Commission on Internet Governance. Paper
Series no 20.
Owen, G., & N. Savage. 2016. Empirical Analysis of Tor Hidden Services. IET Information Security
10 (3): 113–118.
[Crossref]
Pace, J. 2017. Exchange relations on the dark web. Critical Studies in Media Communication 34(1):
1–13.
[Crossref]
Popper, N. 2020. Can you really hire a hit man on the Dark Web? The New York Times, 4 March.
Retrieved from https://www.nytimes.com/2020/03/04/technology/can-you-hire-a-hit-man-online.
html.
Reid, J. & Fox, B. 2020. Human trafficking and the darknet: technology, innovation, and evolving
criminal justice strategies. Science Informed Policing. In: Fox B., Reid J., Masys A. (eds) Science
Informed Policing. Advanced Sciences and Technologies for Security Applications, 77–96. Springer,
Cham.
Robertson, J., Diab, A., Marin, E., Nunes, E., Paliath, V., Shakarian, J., & Shakarian, P. 2017.
Darkweb Cyber Threat Intelligence Mining. Cambridge University Press; 1st edition.
[Crossref]
Rudesill, D., Caverless, J., & Sui, D. 2015. The Deep Web and the Darknet: A Look Inside the
Internet’s Massive Black Box. Wilson Center.
Rushe, D. 2014. Silk Road 2.0’s Alleged Owner Arrested as Drugs Website Shuttered by FBI. The
Guardian, 6 November. http://www.theguardian.com/technology/2014/nov/06/silkroad-20-owner-
arrested-drugs-website-fbi.
Soska, K. & Christin, N. 2015. Measuring the Longitudinal Evolution of the Online Anonymous
Marketplace Ecosystem. Proceedings of the 24th Usenix Security Symposium; 12–14 August 2015,
Washington, D.C: Advanced Computing Systems Association.
Van Buskirk, J., Naicker, S., Bruno, R.B., Breen, C. & Roxburgh, A. 2016. Drugs and the Internet.
Issue 7. Australia: National Drug & Alcohol Research Centre.
Van Buskirk, J., A. Roxburgh, M. Farrell, & L. Burns. 2014. The Closure of the Silk Road: What has
This Meant for Online Drug Trading? Addiction 109 (4): 517–518.
[Crossref]
Wyke, J. & Ajjan, A. 2015. The Current State of Ransomware. SOPHOS. A SophosLabs Technical
Paper.
Footnotes
1 Mostly, such direct access needs permission from the authority with known URL addresses,
usernames and passwords, case numbers, and other parameters (Bergman 2001).
2 Silk Road was the first modern Darknet market, which was known as a platform for the transaction
of illegal drugs.
7 Sentry MBA is an automated attack tool, which could rapidly test millions of usernames and
passwords to find valid ones of targeted websites.
Steven Kohm
Email: [email protected]
Abstract
Film analysis in criminology and criminal justice studies has flourished
over the past two decades. Groundbreaking work by Rafter (Shots in the
Mirror: Crime Films and Society, 2nd edn. New York: Oxford, 2006)
delineated the subject matter and set out new conceptual and theoretical
approaches. Importantly, Rafter (Theoretical Criminology, 11(3): 403–420,
2007) and Rafter and Brown (Criminology Goes to the Movies: Crime
Theory and Popular Culture. New York: NYU Press, 2011) called for the
development of a popular criminology that takes up film and other popular
culture as efforts to understand crime and justice that can be read alongside
academic discourses (see, e.g., Kohm and Greenhill, Theoretical
Criminology, 15(2): 195–215, 2011; Kohm, Popular Criminology, in Rafter,
Nicole and Eamonn Carrabine, eds. Oxford Research Encyclopedia of
Crime, Media, and Popular Culture, 2017). Since this time, film analyses in
criminology and criminal justice studies have generally followed the
normative organization of the discipline, examining criminal etiology and
the institutions of the public criminal justice system: police, criminal law
and corrections. However, there is a dearth of criminological scholarship on
films that explore private security (for a notable exception, see Walby and
Lippert, Security Journal, 30(4): 1134–1150, 2017). Rafter (Shots in the
Mirror: Crime Films and Society, 2nd edn. New York: Oxford, 2006)
argues that crime films are ideological in the way they represent ideas about
social life both in content and in the gaps between reality and cinematic
representation. This chapter is an effort to expose some of these gaps in
films about private security. Like early twentieth century cop films prior to
concerted efforts to professionalize policing in America, most
contemporary films about private security treat their subjects with
irreverence or as unidimensional players in the criminal justice apparatus
despite the exponential growth of private security and its penetration into
nearly all areas of the justice system. Using Rafter’s (Theoretical
Criminology, 11(3): 403–420, 2007) popular criminology framework, this
chapter examines the way private security is represented in Anglo-North
American films since the 1980s in order to explicate the ideological framing
of security more broadly within late modern criminal justice. I also analyze
several international films that suggest the emergence of an alternative film
tradition that takes up critical issues in private security such as colonialism,
corruption, and surveillance. I demonstrate that films are an important and
underutilized resource for critically analyzing the shifting cultural
significance of private security in contemporary times.
Introduction
Film analysis in criminology has flourished over the past two decades.
Groundbreaking work by American criminologist Nicole Rafter (2006)
delineated the subject matter, set out new conceptual and theoretical
approaches, and provided the first comprehensive analysis of nearly a
century of Hollywood crime cinema. Works in this vein explore the
discursive interplay between crime films and broader historical socio-
political shifts and public policy underpinning the (American) criminal
justice system. Importantly, Rafter (2007) and Rafter and Brown (2011)
called for a popular criminology that takes up film and other cultural works
as efforts to understand crime and justice alongside theoretical academic
discourses (Kohm 2017). Popular criminology has been applied to a range
of subjects including film (Kohm and Greenhill 2011), television (Kennedy
2017; LaChance and Kaplan 2020), true crime literature (Linnemann 2015)
comic books (Phillips and Strobl 2013) and even videogames (Fawcett and
Kohm 2020; Steinmetz 2018).
Scholarly work on film and popular culture in criminology has come a
long way in the past two decades, yet there are still unexplored areas that
beg scholarly analysis. Film analyses have generally followed the
normative organization of the discipline, examining criminal etiology and
the institutions of the public criminal justice system: police, criminal law
and corrections. However, there is a dearth of popular criminological
scholarship on private security (for a notable exception, see Walby and
Lippert 2017). I argue that this omission is telling because it reflects
broader cultural assumptions and demonstrates the invisibility of private
security work. Rafter (2006) argues that the ideological content of crime
films helps shape the “myths that a society lives by” (p. 9). Likewise, in his
sociological analysis of American cop action films, Neal King (1999: 3)
contends that “Movies can seem right if they reflect common assumptions
about the world and offer ways to make sense of it.” Indeed, these common
assumptions or myths about society are also reflected in what films omit.
For example, if Hollywood was unable to imagine a strong leading female
police character until much more recently in the development of the genre,
this reflected broader societal ambivalence about female participation in
policing (Rafter 2006). This chapter is an effort to expose the cultural gaps
that contribute to commonsense myths or ideologies about society by
exploring private security films. Like early twentieth century cop films
prior to concerted efforts to professionalize policing in America, many
contemporary films about private security treat their subjects with
irreverence or as junior players in the criminal justice apparatus despite the
exponential growth of private security and its penetration into nearly all
areas of the justice system (Van Steden and De Waard 2013). I argue that
private security films—films in which the plots, themes and characters are
focused significantly on the private provision of security—reflect and at
times challenge popular societal assumptions about the nature of security
itself as well as the private provision of security in contemporary society.
Using Rafter’s (2007) popular criminology framework (further refined
and explicated by Kohm and Greenhill 2011 and Kohm 2017), this chapter
analyzes private security in cinema since the 1980s in order to explicate the
ideological framing of security more broadly alongside shifts in late modern
criminal justice (Garland 2001). The discussion focuses predominantly on
mainstream Hollywood films, but also includes several international
examples that depict private security provision in contexts beyond the
United States. These latter films suggest the nascent development of a cycle
of alternative private security films that take up critical issues in private
security such as colonialism, corruption, and the dark side of surveillance. I
demonstrate that films are an important and underutilized resource for
critically analyzing the shifting cultural significance of private security in
contemporary times.
Vance: Down this way, it’s got a population of 12,640 people. Last year
it had 48 murders. Right? Over this side, you’ve got another town
population of 25,328. Last year had 81 murders.
Eddie: Meth.
Vance: A whole lot of meth. Seriously. And a really, really nasty gang
controlling it. So you got a whole lotta people stealing to feed habits, you
know what I mean?
Conclusion
In this chapter I have sketched out a distinct film subgenre centrally
concerned with issues of private security provision. Drawing on the
conceptual approach of popular criminology, I discerned a number of
themes that constitute popular efforts to make sense of private security
typically by positioning it in opposition to public forms of policing. While
cop films thematically focus on tensions between conservative law-and-
order and liberal due process, private security films refract contemporary
shifts in criminal justice brought about by neoliberalism. Most mainstream
films about security reify dichotomous categories such as public and private
space and in so doing suggest hierarchical differences between public and
private policing. As well, mainstream films suggest that private security
work is associated with failed forms of masculinity and equate private
security officers with failed or corrupt police officers. Even when working
together, private security is depicted in a subordinate or junior role
compared to public forms of policing. While few in number, a handful of
international films have engaged critically with private security and
encouraged sociological ways of understanding its relationship with forms
of power, oppression, and technology. I am encouraged by the development
of a cycle of critical security films, just as other scholars like Rafter (2006)
have noted the potential for critical films to be taken up by scholars and
activists interested in promoting social change. The power of popular
criminology is largely in its ability to reach broader audiences than
academic criminology. I argue that even critical independent films without
the huge audiences of Hollywood blockbusters are still likely to reach many
more people than some of the most well-cited academic works in critical
security studies. Therefore, I urge scholars of private security to take films
seriously as popular discourses about public and private policing and as rich
sources of cultural data about the taken for granted ideas, myths, and
ideologies of private security.
Recommended Readings
A must read for anyone interested in crime films and society is Nicole
Rafter’s (2006) seminal book Shots in the Mirror. The second edition
provides wider scope for analysis and an expanded discussion that includes
some important international films. In addition, Rafter and Brown’s (2011)
book Criminology Goes to the Movies provides a clear and accessible
discussion and application of criminological theory and film. The book
extends and expands upon popular criminology as a theoretical construct
and conceptual tool for analyzing film. First introduced in Rafter (2007),
popular criminology has been applied thereafter in key works such as Kohm
and Greenhill (2011) and Kohm (2017). A few works take up aspects of
private security in film, including pioneering work by Walby and Lippert
(2017) as well is Wise’s (2016) important book on surveillance in film. The
latter implicates important issues related to private security, although its
focus is more broad. In general, a number of recent works in the journal
Crime Media Culture take up the theme of popular criminology and explore
the intersection of film, criminological discourse, and the real-world
practices of crime control, although private security has of yet not been a
main focus.
References
Corbin, Juliet and Anselm Strauss (1990) Grounded theory research: Procedures, canons, and
evaluative criteria. Qualitative Sociology 13(1): 3–21.
[Crossref]
Davis, Mike (1992) City of Quartz: Excavating the Future in Los Angeles. London: Verso.
Fawcett, Christina and Steven Kohm (2020) Carceral Violence at the Intersection of Madness and
Crime in Batman: Arkham Asylum and Batman: Arkham City. Crime Media Culture 16(2): 265–285.
[Crossref]
Flusty, Steven (1997) “Building Paranoia” in Nan Ellin (ed.) Architecture of Fear (New York:
Princeton Architectural Press), pp. 47–59.
Garland, David (2001) The Culture of Control. Chicago: University of Chicago Press.
[Crossref]
Hayward, Keith (2012) The Five Spaces of Cultural Criminology. British Journal of Criminology
52(3): 441–462.
[Crossref]
Hermer, Joe, Michael Kempa, Clifford Shearing, Philip Stenning and Jennifer Wood (2005)
“Policing ‘Communal’ Space” in D Cooley (ed). Re-imagining Policing in Canada. (Toronto:
University of Toronto Press), pp. 50–64
Jones, Trevor and Tim Newburn (1999) Urban change and policing: mass private property re-
considered. European Journal on Criminal Policy and Research 7(2): 225–244.
Kennedy, Liam (2017) ‘Man I’m all torn up inside’: Analyzing Audience Responses to Making a
Murderer. Crime, Media, Culture 14(3): 391–408.
[Crossref]
Kempa, Michael, Philip Stenning and Jennifer Wood (2004) Policing Communal Spaces: A
Reconfiguration of the ‘Mass Private Property’ Hypothesis. British Journal of Criminology 44(4):
562–581
King, Neal (1999) Heroes in Hard Times: Cop Action Movies in the US. Philadelphia, PA: Temple
University Press.
Kohm, Steven and Pauline Greenhill (2011) Pedophile Crime Films as Popular Criminology: A
Problem of Justice? Theoretical Criminology 15(2): 195–215.
[Crossref]
Kohm, Steven (2017) Popular Criminology, in Rafter, Nicole and Eamonn Carrabine, eds. Oxford
Research Encyclopedia of Crime, Media, and Popular Culture. Online publication date: April 2017.
LaChance, David and Paul Kaplan (2020) Criminal Justice in the Middlebrow Imagination: The
Punitive Dimensions of Making a Murderer. Crime, Media, Culture 16(1): 81–96.
[Crossref]
Leitch, Thomas (2002) Crime Films. New York: Cambridge University Press.
[Crossref]
Lenz, Timothy O (2003) Changing Images of Law in Film & Television Crime Stories. New York:
Peter Lang Publishing.
Lenz, Timothy O (2005) Conservatism in American Crime Films. Journal of Criminal Justice and
Popular Culture 12(2):116–134.
Linnemann, Travis (2015) Capote’s Ghosts: Violence, Media and the Spectre of Suspicion. British
Journal of Criminology 55: 514–533.
[Crossref]
Loader, Ian (1999) Consumer Culture and the Commodification of Policing and Security. Sociology
33(2): 373–392.
[Crossref]
Newburn, Tim (2001) The Commodification of Policing: Security Networks in the Late Modern City.
Urban Studies 38(5/6): 829–848.
Packer, Herbert (1968) The Limits of the Criminal Sanction. Stanford, CA: Stanford University Press.
[Crossref]
Phillips Nickie and Staci Strobl (2013) Comic Book Crime. New York: NYU Press.
Rafter, Nicole (2006) Shots in the Mirror: Crime Films and Society, 2nd edn. New York: Oxford.
Rafter, Nicole (2007) Crime, Film and Criminology: Recent Sex-Crime Movies. Theoretical
Criminology 11(3): 403–20.
[Crossref]
Rafter, Nicole and Michelle Brown (2011) Criminology Goes to the Movies: Crime Theory and
Popular Culture. New York: NYU Press.
Shearing, Clifford and Philip Stenning (1985) “From the Panopticon to Disney World: The
Development of Discipline” in Doob, A.N. & Greenspan, E.L. (eds.). Perspectives in Criminal Law:
Essays in Honour of John Ll. J. Edwards. (Ontario: Canada Law Book), pp. 335–349.
Shearing, Clifford and Philip Stenning (1983) Private Security: Implications for Social Control.
Social Problems 30(5), 493–506.
[Crossref]
Shearing, Clifford and Philip Stenning (1981) Modern private security: Its growth and implications.
In: M Tonry and N Morris (Eds), Crime and Justice: An Annual Review of Research, pp. 193–246.
Chicago: University of Chicago Press, 1981.
Sleiman, Mark and Randy Lippert (2010) Downtown ambassadors, police relations and ‘clean and
safe’ security. Policing & Society 20(3): 316–335
[Crossref]
Steinmetz, Kevin (2018) Carceral Horror: Punishment and Control in Silent Hill. Crime, Media,
Culture 14(2): 265–287.
[Crossref]
Valverde, Marianna (2006) Law and Order: Images, Meanings, Myths. New Brunswick, NJ: Rutgers
University Press.
Van Steden, R, and J De Waard (2013) ‘Acting like chameleons’: On the McDonaldization of private
security. Security Journal 26(3): 294–309.
[Crossref]
Walby, Kevin and Randy K Lippert (2017) Corporate security in film: Beyond the green shack out
back. Security Journal 30(4): 1134–1150.
[Crossref]
Footnotes
1 All the films were analyzed and coded by the chapter author and a graduate student Research
Assistant. A key aspect of the analysis was frequent conversation and “comparing notes” between the
two coders as we worked to elaborate thematic consistencies and divergences of the films. I am very
grateful for the keen eye and strong analytic abilities of my RA Dana Hickson who was an invaluable
part of this project.
Part IV
Researching Security
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_23
Gabriel T. W. Wong
Email: [email protected]
Abstract
The varying quality and immense volume of research relating to security
highlights a challenge for policymakers and practitioners who want to
improve decision-making by drawing on the empirical evidence. Systematic
reviews and meta-analyses have emerged as more objective techniques,
compared to subjective narrative reviews, for identifying, screening and
synthesising the findings of individual primary evaluations relevant to
particular forms of security measures. The shift from subjective to objective
analysis has resulted in an improved evidence-base summarising and
estimating the overall impact(s) and identifying potential moderator(s). With
a growing recognition of the benefits of these techniques, the field of security
and crime prevention have benefited from their adoption resulting in better
informed crime and justice policy. This chapter explains, in detail, the role of
systematic reviews and meta-analyses, and how the methods produce robust
evidence regarding our knowledge of security and its effectiveness. We also
illustrate the use of meta-analysis via a selection of security-related studies.
An Ethical Imperative
Examining the body of evidence, rather than looking at studies in isolation,
has been an ethical imperative in general medical and population health
research. The ethical imperative of capturing, analysing and understanding
the extant evidence was artfully expressed by Chalmers (2007) who
highlighted that the utility of any intervention needs to be tested repeatedly to
ensure that decisions are made based on all we have learnt, not just an
isolated study. Specifically, Chalmers argued this point by demonstrating the
dire consequences of failing to use all relevant evidence regarding the effects
of medical treatments. Chalmers’ argument, however, is not limited to
medical or population health research—it is a compelling argument in any
field of research, as poor evidence leads to poor decisions.
Narrative Reviews
Before the introduction of systematic and meta-analytic reviews, the
narrative review provided the vehicle for combining data from multiple
studies. Specifically, an expert was selected (from a given field) who would
review the studies that addressed a question or series of questions,
summarised the findings, and arrived at a summary conclusion. This
approach suffers from several serious limitations. First is the inherent
subjectivity and lack of associated transparency. For example, different
criteria may be used between reviewers regarding the selection of included
studies. Reviewers may weight studies according to different criteria—for
example one reviewer may give more weight to larger studies while another
reviewer may favour quality over size or assign a comparable weight to all
included studies. Reviewers may also differ regarding the amount of
literature reviewed before reaching a conclusion. For example, a substantial
amount of evidence may be required before one reviewer reaches a decision,
while another reviewer may have a lower threshold. The main disadvantage
of narrative reviews is that the reviewer typically does not articulate (or even
be aware of) the decision-making protocol employed to synthesise data.
Therefore, conclusions reached may be spurious.
The second limitation of the narrative review is the obvious inability of
the reviewer to fully process large and complex bodies of evidence. Recent
research regarding the neural substrates of cognitive capacity limitations
highlights that human adults only retain about four items “in mind”.
Moreover, this limitation is essential to human brain function (Buschman et
al. 2011). That is, the human adult brain is only capable of retaining a limited
amount of information and processing this information at any one time. For
this reason alone, the ability for an individual to accurately recall all studies,
weight individual studies, synthesise the information and arrive at an accurate
summary or finding with a large body of literature is unlikely. In reality, the
narrative review is lined with subjectivity and mostly derived on personal
opinion and experience. The problem is magnified when treatment effects
vary as a function of study-level covariates (e.g. population, dosage, outcome
variable and other factors) (Borenstein et al. 2009). Rather than rely on
experience or anecdotal/subjective opinion, a proper synthesis of the
literature requires a researcher to understand how an effect varies (i.e.
treatment effect) as a function of the variables mentioned above.
Systematic Review
The systematic review is a transparent method for identifying, evaluating and
summarising the findings of relevant individual studies. The role of the
systematic review is to make available evidence for policymakers and
academics alike more accessible and reliable. The method adheres to strict
scientific design based on explicit, pre-specified replicable methods. The
method, therefore, provides reliable estimates of the effectiveness of the
given study/intervention whereby conclusions drawn are defensible. In
addition, the method highlights where knowledge lacks and provides
guidance on future research (Brown et al. 2006; Centre for Reviews and
Dissemination 2009). Although there is still an element of subjectivity
because the researcher specifies criteria, the method is still transparent
because all decisions are clearly articulated. A systematic review typically
involves the following steps: (i) deciding on an answerable question, (ii)
developing an explicit search strategy, (iii) identifying relevant sources (e.g.
databases) to search for evidence, (iv) developing a set of inclusion/exclusion
criteria (e.g. years of inclusion, individuals to be included such as ethnicity)
and (v) abstracting data in a standardised manner (Lipsey and Wilson 2001).
Meta-analysis
A supplementary element of a systematic review is the meta-analysis. A
meta-analysis is a statistical approach that combines data from a systematic
review. What is often unclear is that a meta-analysis is based on an
underlying systematic review; however, not all systematic reviews lead to a
meta-analysis. This is because a meta-analytic review provides an additional
step in summarising the findings of relevant individual studies where
appropriate outcome data are available.
Traditionally, meta-analyses are conducted to estimate the relative
effectiveness of intervention programmes on a series of dependent variables.
Here researchers are able to correct for various statistical artefacts and to
aggregate results in order to obtain an estimate of the relationship between
variables, or address a series of related research hypotheses (Durlak and
Lipsey 1991; Lipsey and Wilson 2001). One could argue that meta-analysis is
a move towards pure science as it is designed to strengthen our understanding
of an issue by incorporating a larger sample of studies (i.e. sample studies
>1). In addition, meta-analysis, through its method, attempts to remove
opinions or predetermined notions. Although most researchers try to remain
as objective as possible when conducting experiments, bias may still be an
expected component of the individual study.
The formulas used in meta-analysis are applied to address questions
regarding effectiveness. These formulas are similar to those used to evaluate
the effectiveness of crime prevention programmes in primary studies. The
evaluation of primary studies typically report means and standard deviations,
conduct an analysis of variance or use multiple regression to determine if,
and how, outcome scores are related to various factors. For example, “can
high rates of juvenile delinquency in a neighbourhood account for additional
variance in fear of crime, beyond the variance already explained by past
victimisation, age and gender?” Similarly, a meta-analysis may report means
and standard deviations for treatment effect. In addition, a meta-analysis may
also adopt procedures comparable to analysis of variance or multiple
regression to examine the relationship between the effect and study-level
covariates (Borenstein et al. 2009).
One could say that the relationship between realism and experimental and
quasi-experimental methods is somewhat vexed. A debate regarding this
issue has appeared in Social Science and Medicine: Bonell et al. (2012)
“Realist randomised controlled trials: A new approach to evaluating complex
public health interventions”; Marchal et al. (2013) “Realist RCTs and
complex interventions: An oxymoron”; Bonell et al. (2013) “Methods don’t
make assumptions, researchers do: A response to Marchal et al”. Pawson and
Tilley have been critical of the experimental and quasi-experimental methods
that are prioritised in meta-analytic work and have proposed alternative
realist methods. These are clearly articulated in their book Realistic
Evaluation (Pawson and Tilley 1997).
Meta-analyses in the Security Field
For this chapter we conducted a literature search to examine how meta-
analyses have been used in synthesising the empirical evidence in the field of
security and crime prevention. Specifically, we focus on individual studies
that investigate the security measures adopted to protect an individual
property or a community. Table 23.1 includes 22 meta-analyses in the
security literature, classified into three categories—information security,
security measures and other preventative measures. Information security
refers to a structured risk management process designed to protect
information or data from unauthorised access, use, misuse, disclosure,
destruction, modification or disruption. Our review identified two meta-
analyses undertaken with this focus.1 Security measures refer to interventions
undertaken, such as installation of CCTV, alley gating, electronic monitoring
and street lighting, to modify a situational context to make committing a
crime more difficult, riskier (to detection) and less rewarding. Our review
identified seven meta-analyses undertaken under this category. Finally, the
category “other preventative measures” relates to policing strategies and
legislation adopted to enhance the security of a community. Here, we
identified 13 studies. The meta-analyses undertaken across these three
categories were conducted in the US, UK and other countries such as
Australia, Sweden and Norway.
Table 23.1 List of meta-analysis in the security and crime reduction literature
I—Implementation
Implementation refers to implementation conditions that support or obstruct
delivery of the intervention. This component provides guidance regarding
challenges and specification of what would be necessary for replication of the
same intervention elsewhere. This component received a score of 0 because
the authors do not provide information regarding the implementation of this
intervention.
E—Economic Costs
The economic assessment of the intervention refers to the provision of
economic information, such as cost of the intervention, cost effectiveness or
cost-benefit ratio of interventions delivered. In this review, the economic
component is rated as 0 as there was no formal economic component.
Recommended Readings
Introduction to meta-analysis by Borenstein et al. (2009) provides an
excellent resource for beginners and to experts regarding the conceptual and
technical foundations of the meta-analytic technique. It provides an in-depth
outline of the technique, including formulas, application and underlying
motivation, by four of the world’s leading experts on all aspects of meta-
analysis.
Practical meta-analysis by Lipsey and Wilson (2001) provides a user-
friendly overview of the meta-analytic technique. This book covers contents
such as formatting coding forms, estimating effect sizes and conducting
statistical analysis. The authors clearly outline each step of meta-analysis
from development of the research question through statistical analysis and
interpretation of results.
The Campbell Collaboration publication by Welsh and Farrington (2008)
titled “effects of improved street lighting on crime” provides the reader with
a well-critiqued example of the meta-analytic technique and its application to
understanding the impact of improved street lighting on crime. The Campbell
Collaboration (C2) assists in the development, review and dissemination of
meta-analytic reviews in the area of education, crime and justice, social
welfare and international development, providing policymakers with peer-
reviewed empirical evidence regarding issues in these areas.
References
Belur, J., Thornton, A., Tompson, L., Manning, M., Sidebottom, A., & Bowers, K. (2020). A
systematic review of the effectiveness of the electronic monitoring of offenders. Journal of Criminal
Justice, 68, 101686.
[Crossref]
Bennett, T., Holloway, K., & Farrington, D. P. (2006). Does neighborhood watch reduce crime? A
systematic review and meta-analysis. Journal of Experimental Criminology, 2(4), 437–458. https://doi.
org/10.1007/s11292-006-9018-5
[Crossref]
Bonell, C., Fletcher, A., Morton, M., Lorenc, T., & Moore, L. (2012). Realist randomised controlled
trials: a new approach to evaluating complex public health interventions. Social Science and Medicine,
75, 2299–2306.
[Crossref]
Bonell, C., Fletcher, A., Morton, M., Lorenc, T., & Moore, L. (2013). Methods don’t make
assumptions, researchers do: A response to Marchal et al. Social Science and Medicine, 94, 81–82.
[Crossref]
Borenstein, M., Hedges, L., Higgins, J., & Rothstein, H. (2009). Introduction to meta-analysis. West
Sussex, United Kingdom: John Wiley & Sons Ltd.
[Crossref]
Bowers, K. J., Johnson, S. D., Guerette, R. T., Summers, L., & Poynton, S. (2011). Spatial
displacement and diffusion of benefits among geographically focused policing initiatives: A meta-
analytical review. Journal of Experimental Criminology, 7(4), 347–374. https://doi.org/10.1007/
s11292-011-9134-8
[Crossref]
Braga, A. (2005). Hot spots policing and crime prevention: A systematic review of randomized
controlled trials. Journal of Experimental Criminology, 1(3), 317–342. https://doi.org/10.1007/s11292-
005-8133-z
[Crossref]
Braga, A., Papachristos, A., & Hureau, D. (2012). Hot spots policing effects on crime. Campbell
Systematic Reviews, 8(1), 1–96.
Braga, A., Turchan, B. S., Papachristos, A. V., & Hureau, D. M. (2019). Hot spots policing and crime
reduction: an update of an ongoing systematic review and meta-analysis. Journal of Experimental
Criminology, 15(3), 289–311. https://doi.org/10.1007/s11292-019-09372-3
[Crossref]
Braga, A., Weisburd, D., & Turchan, B. (2018). Focused Deterrence Strategies and Crime Control: An
Updated Systematic Review and Meta-Analysis of the Empirical Evidence. Criminology and Public
Policy, 17(1), 205–250. https://doi.org/10.1111/1745-9133.12353
[Crossref]
Braga, A., & Weisburd, D. L. (2012). The Effects of Focused Deterrence Strategies on Crime: A
Systematic Review and Meta-Analysis of the Empirical Evidence. Journal of Research in Crime and
Delinquency, 49(3), 323–358. https://doi.org/10.1177/0022427811419368
[Crossref]
Braga, A., Welsh, B. C., & Schnell, C. (2015). Can Policing Disorder Reduce Crime? A Systematic
Review and Meta-analysis. Journal of Research in Crime and Delinquency, 52(4), 567–588. https://doi.
org/10.1177/0022427815576576
[Crossref]
Brown, P., Brunnhuber, K., Chalkidou, K., Chalmers, I., Clarke, C., & Fenton, M. (2006). How to
formulate research recommendations. BMJ, 333, 804–806.
[Crossref]
Buschman, T. J., Siegel, M., Roy, J. E., & Miller, E. K. (2011). Neural substrates of cognitive capacity
limitations. Proceedings of the National Academy of Social Sciences of the United States of America,
108, 11252–11255.
Centre for Reviews and Dissemination. (2009). Systematic reviews: CRD’s guidance for undertaking
reviews in health care. York, UK: CRD, University of York.
Chalmers, I. (2007). The lethal consequences of failing to make use of all relevant evidence about the
effects of medical treatments: the need for systematic reviews. In P. Rothwell (Ed.), Treating
Individuals (pp. 37–58). London: Lancet.
Cunningham, M. R., Jones, J. W., & Dreschler, B. W. (2018). Personnel risk management assessment
for newly emerging forms of employee crimes. International Journal of Selection and Assessment,
26(1), 5–16. https://doi.org/10.1111/ijsa.12202
[Crossref]
Dölling, D., Entorf, H., Hermann, D., & Rupp, T. (2009). Is deterrence effective? Results of a meta-
analysis of punishment. European Journal on Criminal Policy and Research, 15(1–2), 201–224.
https://doi.org/10.1007/s10610-008-9097-0
[Crossref]
Durlak, J. A., & Lipsey, M. W. (1991). A practitioner’s guide to meta-analysis. American Journal of
Community Psychology, 19, 291–332.
Eysenck, H. J. (1978). An exercise in mega-silliness. American Psychologist, 33, 517.
[Crossref]
Farrington, D. P., & Welsh, B. C. (2002). Improved street lighting and crime prevention. Justice
quarterly, 19(2), 313–342.
Farrington, D. P., Gill, M., Waples, S. J., & Argomaniz, J. (2007). The effects of closed-circuit
television on crime: Meta-analysis of an English national quasi-experimental multi-site evaluation.
Journal of Experimental Criminology, 3(1), 21–38. https://doi.org/10.1007/s11292-007-9024-2
[Crossref]
Glass, G., McGaw, B., & Smith, M. L. (1981). Meta-analysis in social research. Newbury Park: Sage.
Johnson, S. D., Tilley, N., & Bowers, K. J. (2015). Introducing EMMIE: an evidence rating scale to
encourage mixed-method crime prevention synthesis reviews. Journal of Experimental Criminology,
11(3), 459–473. https://doi.org/10.1007/s11292-015-9238-7
[Crossref]
Kontopantelis, E., & Reeves, D. (2012). Performance of statistical methods for meta-analysis when
true study effects are non-normally distributed: A simulation study. Statistical Methods in Medical
Research, 21, 409–426.
[Crossref]
Kontopantelis, E., Springate, D., & Reeves, D. (2013). A Re-Analysis of the Cochrane Library Data:
The Dangers of Unobserved Heterogeneity in Meta-Analyses. PloS one, 8, 1–12.
[Crossref]
Lipsey, M. W., & Wilson, D. B. (2001). Practical meta-analysis (Vol. 49). Thousand Oaks, CA: SAGE
Publications.
Makarios, M. D., & Pratt, T. C. (2008). The Effectiveness of Policies and Programs That Attempt to
Reduce Firearm Violence. Crime & Delinquency, 58(2), 222–244. https://doi.org/10.1177/
0011128708321321
[Crossref]
Marchal, B., Westhorp, G., Wong, G., Van Belle, S., Greenhalgh, T., Kegels, G., & Pawson, R. (2013).
Realistic RCTs of complex interventions—An oxymoron. Social Science and Medicine, 94, 124–128.
[Crossref]
Mazerolle, L., Soole, D. W., & Rombouts, S. (2006). Street-level drug law enforcement: A meta-
analytical review. Journal of Experimental Criminology, 2(4), 409–435. https://doi.org/10.1007/
s11292-006-9017-6
[Crossref]
Pawson, R., & Tilley, N. (2001). Realistic evaluation bloodlines. American Journal of Evaluation, 22,
317–324.
[Crossref]
Piza, E. L., Welsh, B. C., Farrington, D. P., & Thomas, A. L. (2019). CCTV surveillance for crime
prevention: A 40-year systematic review with meta-analysis. Criminology and Public Policy, 18(1),
135–159. https://doi.org/10.1111/1745-9133.12419
[Crossref]
Rachman, S. J., & Wilson, G. T. (1980). The effects of psychological therapy (2nd ed.). Oxford:
Pergaman.
Renzema, M., & Mayo-Wilson, E. (2005). Can electronic monitoring reduce crime for moderate to
high-risk offenders? Journal of Experimental Criminology, 1(2), 215–237. https://doi.org/10.1007/
s11292-005-1615-1
[Crossref]
Rosenthal, R. (1979). The “file drawer problem” and tolerance for null results. Psychological Bulletin,
86, 638–641.
[Crossref]
Rosenthal, R. (1994). Parametric measures of effect size. In H. Cooper & L. Hedges (Eds.), The
handbook of research synthesis (pp. 231–244). New York: Russell Sage Foundation.
Shadish, W., & Sweeney, R. (1991). Mediators and moderators in meta-analysis: There’s a reason we
don’t let Dodo birds tell us which psychotherapies should have prizes. Journal of Consulting and
Clinical Psychology, 59, 883–893.
[Crossref]
Sharpe, D. (1997). Of apples and oranges, file drawers and garbage: Why validity issues in meta-
analysis will not go away. Clinical Psychology Review, 17(8), 881–901.
Sidebottom, A., Tompson, L., Thornton, A., Bullock, K., Tilley, N., Bowers, K., & Johnson, S. D.
(2017a). Gating Alleys to Reduce Crime: A Meta-Analysis and Realist Synthesis. Justice Quarterly,
35(1), 55–86. https://doi.org/10.1080/07418825.2017.1293135
[Crossref]
Sidebottom, A., Thornton, A., Tompson, L., Belur, J., Tilley, N., & Bowers, K. (2017b). A systematic
review of tagging as a method to reduce theft in retail environments. Crime Science, 6(1). https://doi.
org/10.1186/s40163-017-0068-y
Smith, M., & Glass, G. (1977). Meta-analysis of psychotherapy outcome studies. American
Psychologist, 32(7), 752–760.
[Crossref]
Taheri, S. A. (2016). Do Crisis Intervention Teams Reduce Arrests and Improve Officer Safety? A
Systematic Review and Meta-Analysis. Criminal Justice Policy Review, 27(1), 76–96. https://doi.org/
10.1177/0887403414556289
[Crossref]
Telep, C. W., Weisburd, D., Gill, C. E., Vitter, Z., & Teichman, D. (2014). Displacement of crime and
diffusion of crime control benefits in large-scale geographic areas: a systematic review. Journal of
Experimental Criminology, 10(4), 515–548. https://doi.org/10.1007/s11292-014-9208-5
[Crossref]
Trang, S., & Brendel, B. (2019). A Meta-Analysis of Deterrence Theory in Information Security Policy
Compliance Research. Information Systems Frontiers, 21(6), 1265–1284. https://doi.org/10.1007/
s10796-019-09956-4
[Crossref]
Welsh, B. C., & Farrington, D. P. (2008). Effects of improved street lighting on crime. Campbell
Systematic Reviews, 4(1), 1–51.
Welsh, B. C., & Farrington, D. P. (2009). Public area CCTV and crime prevention: an updated
systematic review and meta-analysis. Justice Quarterly, 26(4), 716–745.
[Crossref]
Wolf, F. M. (1986). Meta-Analysis: Quantitative methods for research synthesis. Newbury Park,
California: Sage Publications.
[Crossref]
Wortman, P. M. (1994). Judging research quality. In H. Cooper & L. Hedges (Eds.), The handbook of
research synthesis (pp. 97–110). New York: Russell Sage Foundation.
Footnotes
1 There are a few meta-analyses related to information security not included in Table 23.1. These
studies examine the antecedents to security policy compliance, the predictors of the use of privacy
protective measures or validate certain theories rather than evaluate the effectiveness of security
interventions.
2 If the reference period is not indicated in the paper, we use the reference list of that paper to pick up
the period covered by individual studies included in the meta-analysis.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_24
Andy Newton
Email: [email protected]
Abstract
This chapter advocates for a greater uptake of two underused approached in
the security field, realistic evaluation and the 5Is framework, to support
more robust and systematic approaches to evaluating security interventions.
It contends that a combination of these two complimentary approaches
affords a methodical approach to support the design of security
interventions, enables a systematic approach for the evaluation of security
interventions, offers a greater understanding by the mechanisms which a
security intervention has or has not worked in a particular setting or place,
facilitates replication and future adaption of security interventions in
different contexts, and provides a user-friendly structure for disseminating
and communicating the evaluation results of interventions to security
practitioners. This chapter examines the strengths and limitations of each
approach, the merits of combining the two, and uses a hypothetical scenario
to guide the reader through how to carry out a combined realistic evaluation
and 5Is evaluation of a security intervention.
Introduction
This chapter advocates for the security profession to adopt a more robust
approach to evaluating security interventions, and furthermore, that
attempts to do so should consider the utility of two under-used approaches.
The first of these is a wider utilisation of realistic evaluations, and the
second is greater use of the 5Is framework for crime prevention. Moreover,
this chapter proposes the adoption of an integrated approach that combines
realistic evaluation and the 5Is framework for crime prevention. Several
advantages of doing this are identified, including:
a methodical and consistent approach to designing and evaluating
security interventions;
a framework that supports security professionals to think systematically
through (i) the challenges and issues they need to tackle, and (ii) the
ways in which their proposed solution might go some way to addressing
this;
a greater consideration of the ways in which an intervention has/has not
achieved its intended objectives, to support replication and adaption in
the future to different contexts and settings;
an understanding of how an intervention has been carried out, the steps
and stages taken, and the people and organisations involved in delivering
this; and,
the adoption of user-friendly approaches grounded in their practical
applicability.
Realistic Evaluation
Realistic evaluation (Pawson and Tilley 1994, 1997) was constructed with
the intention of understanding the effectiveness of an intervention, using an
approach that ensures the findings of any evaluation are directly
transferable to practice. It therefore to some extent bridges the gap between
process and outcome evaluations, as it attempts to measure both (i) whether
the intervention’s intended outcomes have been achieved and (ii) at the
same time understand to what extent the intervention is attributable to any
measured change, and the processes by which that change was brought
about. Realistic evaluations are designed to ask what works, how, why, and
in what situation. Thus, they are particularly informative for evaluating
security interventions, considering the field’s weak evidence base compared
to other disciplines. As Pawson and Tilley (1994) state, it allows you to
‘“remember A”, “beware of B”, “take care of C”, “D can result in both E
and F”, “Gs and Hs are likely to interpret I quite differently”, “if you try J
make sure that K has also been considered”’. As specified by HM Treasury
(2020b) they are particularly suited to evaluating new interventions and
trials, for understanding how to apply the learning of evaluation to adapt to
new intervention contexts, and to offer a better understanding of
interventions that have previously been evaluated with mixed results. They
are less relevant in evaluating interventions where there is a good degree of
knowledge about how, why, and where they work, and when there is limited
requirement to understand how an intervention has worked. Given the lack
of robust evaluations of security interventions, it is suggested that in the
security realm currently, these latter two will rarely apply.
Realistic evaluation focusses on three primary components. These are
the Context within which an intervention is implemented; the Mechanisms
by which the intervention might achieve change, the how; and, the intended
Outcome of the measure introduced, or what success might look like. These
are often referred to as the CMO configurations of realistic evaluation. To
put this in layman’s terms the evaluator is testing did an intervention work,
how did it work, what situation was it delivered in, and what were the
processes that it used to deliver this identified change.
Realistic evaluation is starkly and proudly theory-driven, and theories of
change fundamentally underpin its design. Whilst this may not initially
appeal to the security professional in a rapidly evolving field, a pause for
reflection might give time to consider the benefits of this. If we consider
theory as a set of beliefs or assumptions that underpin action (Weiss 1997),
then this offers a frame of reference through which a security practitioner
can understand what security issue needs addressing and why they think
their solution will go at least some way towards resolving this. After all, if
an evaluator is to unpick how an intervention has been implemented, a first
stage is to clearly ask why it was implemented in the first place.
There are some parallels with the use of logic models now widely
advocated in the evaluation literature (Smith et al. 2020). Logic models are
diagrammatic representations of the resources, activities, outputs, outcomes,
and impact of an intended intervention. They are like theory of change
models, but logic models and similarly systems change models are perhaps
better suited to evaluating large programme interventions and strategic
perspectives (Blamey and Mackenzie 2007). Realistic evaluations are
appropriate to evaluating security interventions as they require the designers
of an intervention to formalise the development of theory testing. They go
beyond logic models by asking those responsible for the security
intervention to unpack which mechanisms are triggered in different contexts
and how they might lead to differential outcomes. They are required to
methodically think through the conditions needed for an intervention to
trigger the intended outcome. This is pertinent when trying to establish the
outcomes of a set of likely multi-layered interventions present in most
security interventions. It requires the design of interventions to include
precise terms and definitions, and a lack of standard terminology has been
problematic in the security field (Ekblom and Sidebottom 2008).
Pawson and Tilley (1994, 1997) consider mechanisms to be a
combination of the resource offered by an intervention, and the participants
reasoning as a response to this. Therefore, this is considered a generative
mechanism linked to both a human agency and the mechanics of an
intervention. This chapter will return to discuss this when examining the 5Is
crime prevention framework in more detail. The reasoning of CMO is that
the mechanisms (of change) will only activate under certain conditions. To
achieve this requires an understanding of both context and its fluidity of
change, to understand what works, for whom, in what circumstance, and
why. The benefit of this causative design is that it offers greater promise in
understanding the potential transferability of a security intervention than
other approaches, and therefore is grounded in its practical applicability and
the likelihood of successful replicability.
Realistic evaluations may usefully consider the inputs, outputs, and
outcomes of an intervention. Inputs can be considered as ‘what is used to do
the work’, the resources that have been applied to carry out the identified
intervention tasks including finance, materials, and time, for example
additional security patrols, better physical security. The outputs refer to
what is produced or delivered and relate specifically to the products and
services that have arisen out of the intervention actions, a direct result as it
were of the inputs. The outcomes relate to what the intervention intends to
change in the real world and are a more longer-term goal than the outputs.
Examples might include reduction in levels of violence, improved mental
wellbeing, or a reduction in cyber-attacks.
An outcome evaluation seeks to identify the extent to which a security
intervention achieved its intended long-term goals. A process evaluation
unpicks the relationship between intervention inputs and outputs to identify
how outcomes occurred and therefore both are necessary for a realistic
evaluation. These inputs, outputs, and outcomes can be considered against
the identified theory of change, the context within which an intervention is
implemented, and the casual mechanisms of change by which an
intervention achieved its outcome(s). This process is depicted in Fig. 24.1.
Fig. 24.1 A schematic of the realistic evaluation approach
Drawing from theoretical principles, the next step in Fig. 24.2 suggests
that there are two distinct issues that need security interventions. The first is
loss or theft of vials at the distribution centre itself, and the second is loss
on local freight during transport. It is not known if these are linked; there is
a strong possibility of insider threat given there are access controls in place
at the distribution centre, and that interceptions targeting virus vials on
moving vehicles is likely to require some pre-planning by offenders in
terms of an awareness of the route and timing of delivery to local
vaccination clinics. This suggests that information on the logistical
operations may not be secure. It is identified that a situational approach
(Clarke 1995) may be an effective approach to securing the vial stores in
the warehouse distribution centre, the information on freight routes and
timing of deliveries, and for adding improved security to the freight
vehicles themselves. The loss of vials is considered an opportunistic threat,
exploiting vulnerabilities that have arisen from the need to distribute vials
rapidly during a pandemic. Therefore, interventions drawn from
opportunistic explanations of theft are considered most appropriate.
Step three is to design the interventions. It is evident that there are three
security vulnerabilities to address: loss of vials at regional distribution
warehouses, possible insider sharing of route planning, and vulnerability of
the freight used whilst in transit to deliver vials to local vaccination clinics.
In discussion with local operators and drawing from the evidence on
situational crime prevention, the following interventions were identified as
appropriate. Intervention One is wireless-controlled access at warehouses
linked to operator provide mobile phones with biometric security for each
individual user. Intervention Two is for ‘security by obscurity’—direct
sharing of routes through encrypted wireless transfer to share each route
only with the drivers of that vehicle to non-personal satellite navigation
devices which are sent ten minutes before the delivery starts. Route
planning occurs on secure devices and each route request is logged.
External communication is removed from these route planning PCs except
for transfer of final route information. Intervention Three is to add tracking
devices and covert panic alarms linked directly to local police operators to
freight vehicles, and to ensure drivers only park in secure parking which is
linked to their navigation device, and locked trailer doors requiring
controlled access via GPRS and inaccessible during routes. They can only
be activated at end point.
The CMO configurations for each of these are described only briefly
here as this is a scenario-based example. Firstly, controlled wireless access
has been added to the regional warehouses. The mechanism of change is
that entry and exit is timed, there is biometric linkage of access to
individual mobile devices, and NFC technology allows movement to be
tracked within the warehouse. Moreover, the warehouse is broken down
into smaller subsections with the same wireless controlled access so users
will need to always carry their device. Direct communication and training
are provided to all staff requiring access, and any theft or loss will be
narrowed down to a small number of persons due to these multiple tracking
systems. Previously card/fob entry was used but not linked to individual
persons, and these could easily be lost and swapped, so the intervention
should not slow down operational logistics. For Intervention Two the
context is the security of the route planning information, which is
electronic. Additional layers of security have been added to restrict
potential leaking of this information, with a secure point-to-point transfer
between route planner and driver the only possible communication from
these devices. This mechanism will stop unauthorised sharing of this
information. The final security added is to freight itself on the journey
(context) and the mechanisms of change are to increase efforts required to
intercept vehicles through GPS tracking of journeys, alarms linked to local
police systems, and GPRS locking of freight that can only be opened at
end-delivery points. The outcomes are a reduced level of vial loss.
The next stage of this process is to evaluate implementation and
involvement, and this would be done to understand if the mechanisms of
change were triggered within the context of each of the three proposed
solutions. It can be considered as part of a process evaluation of the
interventions. Where 5Is is useful here is that it separates implementation
from involvement as detailed previously. It is argued that this is akin to the
realistic evaluation process of examining the mechanisms of the
intervention and the role of human agency in this. For each intervention, a
detailed breakdown is needed in terms of what was delivered and when.
How were staff mobilised to engage with this? What obstacles were faced?
How were they resolved? This detailed picture is necessary if outcomes are
to be linked to the activation of a set of mechanisms within the context
within which they were applied, and for this to be replicable.
The final stage is to assess if the outcomes were realised. That is, has
there been an overall reduction in the number of vial losses? This could be
further examined within each of the three contexts, including loss at
warehouse, unauthorised sharing of route information, and loss of vials
from vehicles. It is noted here that this is a multi-layered strategy; thus,
there is a need to try and identify which of the interventions were
successful, and the extent to which this can be attributed to the intervention.
One of the challenges is identifying whether it was protection of route
information or extra security of vehicles which was the effective
mechanism for reducing loss from vehicles in transit. One method to
separate these two is to analyse whether attacks on vehicles were still
happening post implementation, but these were less successful—suggesting
unauthorised sharing of information was still occurring. A range of
statistical tests may be considered, and the evaluation designer needs to
consider the least biased approach when attempting to account for the
counterfactual. What would have happened if the interventions were not
introduced? In some instances, quasi-experimental design may be possible,
and this should be considered at the intervention design stage. If so, a range
of tests could be considered including propensity score-matching,
interrupted time series analysis, regression discontinuity design, and
difference in difference regression. If appropriate controls can not be
identified, an alternative approache is to use pre and post intervention data,
triangulated with the findings of the process evaluation. If there is evidence
for the occurrence of a particular process/mechanism that is necessary for
the successful outworking of logic model, that strengthens and sharpens the
evaluation findings. Likewise, impact in the absence of a particular
conjectured mechanism can rule out the latter’s substantive contribution and
guide the choice of/search for alternative mechanisms. All of which is
useful knowledge for intelligent replication of the action in other contexts
and/or for related problems
Conclusion
This chapter has advocated for the security profession to adopt a more
systematic approach to evaluation to support the currently weak what works
evidence base. Many evaluations likely remain unpublished and
inaccessible; therefore, several opportunities for learning and replication are
missed. This chapter also suggests the use of a combined approach, utilising
realist evaluations with the 5Is as a complementary and systematic
approach to do this. In doing so, this chapter offers a potential framework
whereby security practitioners can think methodically about interventions
they design and why they might work linked to theories of change, try to
understand the context and setting of the situation they are trying to address,
can consider the steps taken in the intervention and those involved in
delivering it, and consider an up-front rather than retrospective evaluation
design that attempts to identify not only whether an intervention was
successful but also the mechanisms by which this change was brought
about. The 5Is also support dissemination of this knowledge and
considerations of the replicability of this intervention to other contexts and
situations.
Recommended Readings
The most comprehensive account of realistic evaluations is Pawson and
Tilley (1997): Pawson, R., & Tilley, N. (1997). Realistic Evaluation.
London: Sage.
For a detailed discussion of the 5Is framework, see Ekblom (2011):
Ekblom, P. (2011) Crime Prevention, Security and Community Safety Using
the 5Is Framework. Basingstoke: Palgrave Macmillan.
For overviews of evaluations, see the HM Treasure Magenta Handbook
(2020): HM Treasury (2020a) The Magenta Book: HM Treasury guidance
on what to consider when designing an evaluation; and for additional
discussion of realist evaluation see the supplementary guide: HM Treasury
(2020b). Magenta Book 2020. Supplementary Guide: Realist Evaluation.
References
Blamey A, Mackenzie M. Theories of Change and Realistic Evaluation: Peas in a Pod or Apples and
Oranges? Evaluation. 2007;13(4):439–455
[Crossref]
Brown J, Belur J, Tompson L, McDowall A, Hunter G, May T (2018). Extending the remit of
evidence-based policing. International Journal of Police Science & Management. 20(1):38–51.
[Crossref]
Bullock, K., & Tilley, N. (2009). Evidence-based policing and crime reduction. Policing, 3(4), 381–
387.
[Crossref]
Burns-Howell, T. and Pascoe, T. (2004). Crime Prevention Evaluation: A Realistic Framework Based
on Experience and Reality. Criminology & Public Policy, 3: 527–534.
[Crossref]
Clarke, R. (1995). Situational Crime Prevention. Crime and Justice, 19, 91–150.
[Crossref]
Dezember, A., Stoltz, M., Marmolejo, L., Kanewske, L., Feingold, D, Wire, S., Duhaime, L. and
Maupin, C. (2020). The lack of experimental research in criminology—evidence from Criminology
and Justice Quarterly. Journal of Experimental Criminology https://doi.org/https://doi.org/10.1007/
s11292-020-09425-y
Ekblom, P (2006) ‘Good practice? Invest in a Framework!’ Network News, Spring 2006. Chester:
National Community Safety Network.
Ekblom, P. (2011) Crime Prevention, Security and Community Safety Using the 5Is Framework.
Basingstoke: Palgrave Macmillan.
[Crossref]
Ekblom, P. (2018). ‘From threat to debt… or, there is mechanism in my madness’. In G. Farrell and
A. Sidebottom (Eds) Realist Evaluation for Crime Science: Essays in Honour of Nick Tilley. Milton
Park: Taylor and Francis. 58–75.
[Crossref]
Ekblom, P. (2014). ‘Securing the knowledge’ in M. Gill (ed.) The Handbook of Security (2nd Edn).
Basingstoke: Palgrave Macmillan
Ekblom, P., and Pease, K. (1995). Evaluating crime prevention. In: M. Tonry, D. Farrington (eds.),
Building a Safer Society: Strategic Approaches to Crime Prevention London/Chicago, University of
Chicago Press, pp. 585–662 Crime and Justice: A Review of Research, vol. 19
Ekblom, P and Sidebottom, A. (2008) ‘What do you mean, ‘Is it secure?’ Redesigning language to be
fit for the task of assessing the security of domestic and personal electronic goods.’ European Journal
on Criminal Policy and Research, 14:61–87
Gill, M., & Turbin, V. (1999). Evaluating ‘realistic evaluation’: Evidence from a study of CCTV. In
R. V. Clarke (Ed.), Crime Prevention Studies: Vol. 10 (pp. 179–199). Monsey.
Gilmore B (2019). Realist evaluations in low- and middle-income countries: reflections and
recommendations from the experiences of a foreign researcher. BMJ Global Health; 4:e001638
[Crossref]
Goldstein, H. (2018) On problem-oriented policing: the Stockholm lecture. Crime Science 7, 13.
[Crossref]
HM Treasury (2020a) The Magenta Book: HM Treasury guidance on what to consider when
designing an evaluation.
HM Treasury (2020b). Magenta Book 2020. Supplementary Guide: Realist Evaluation. [Available
online: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/
file/879435/Magenta_Book_supplementary_guide._Realist_Evaluation.pdf]. Last Accessed: 5th May
2021
Hinkle, JC, Weisburd, D, Telep, CW, Petersen, K. Problem-oriented policing for reducing crime and
disorder: An updated systematic review and meta-analysis. Campbell Syst Rev. 2020; 16:e1089.
Johnson, S.D., Tilley, N. & Bowers, K.J. (2015). Introducing EMMIE: an evidence rating scale to
encourage mixed-method crime prevention synthesis reviews. Journal of Experimental Criminology
11, 459–473
[Crossref]
Leone L. (2008) Realistic Evaluation of an Illicit Drug Deterrence Programme: Analysis of a Case
Study. Evaluation. 14(1):9–28.
[Crossref]
Marchal B, van Belle S, van Olmen J, Hoerée T, Kegels G (2012). Is realist evaluation keeping its
promise? A review of published empirical studies in the field of health systems research. Evaluation.
18(2):192–212
[Crossref]
Mirzoev T, Cronin de Chavez A, Manzano A, et al (2021) Protocol for a realist synthesis of health
systems responsiveness in low-income and middle-income countries. BMJ; 11:e046992
Pawson, R. and Tilley, N. (1994). What works in evaluation research? British Journal of
Criminology, 34(3), pp.291–306.
Quintans, J. R., Yonekura, T., Trapé, C. A., & Soares, C. B. (2020). Realist evaluation for programs
and services in the health area: an integrative review of the theoretical and methodological literature.
Revista latino-americana de enfermagem, 28, e3255.
[Crossref]
Salter, K.L., Kothari, A. (2014) Using realist evaluation to open the black box of knowledge
translation: a state-of-the-art review. Implementation Science 9, 115
[Crossref]
Serrat O. (2017) Theories of Change. In: Knowledge Solutions. Springer, Singapore
[Crossref]
Smith, J., Li, D. & Rafferty, M. (2020) The Implementation Research Logic Model: a method for
planning, executing, reporting, and synthesizing implementation projects. Implementation Science
15, 84
[Crossref]
Solymosi, R., Cella, K. & Newton, A (2018). Did they report it to stop it? A realist evaluation of the
effect of an advertising campaign on victims’ willingness to report unwanted sexual behaviour.
Security Journal 31, 570–590.
[Crossref]
Taylor-Dunn H. (2016). The impact of victim advocacy on the prosecution of domestic violence
offences: Lessons from a Realistic Evaluation. Criminology & Criminal Justice. 16(1): 21–39.
[Crossref]
Tompson, L. Belur, J., Thornton, A., Bowers, K.J., Johnson, S.D., Sidebottom, A., Tilley, N. &
Laycock, G. (2020). How Strong is the Evidence-Base for Crime Reduction Professionals? Justice
Evaluation Journal. 4:1, 68–97
[Crossref]
Weiss C (1997). How Can Theory-Based Evaluation Make Greater Headway? Evaluation Review.
21(4): 501–524.
[Crossref]
Wiebe, D. (2021). How can paths be risky. Paper Presented to International Seminar Series: Risky
Places for Crime. [Available online]. https://play.kth.se/media/Risky+PlacesA+Ho
w+paths+can+be+risky.+Professor,+Douglas+Wiebe./0_21glhmqe Last accessed 8th May 2021.
Harald Haelterman
Email: [email protected]
Abstract
This chapter discusses script analysis and positions the approach as a useful
tool to help security practitioners design and upgrade preventive and
protective controls. In addition to providing some documented examples of
how the approach has been applied in practice, it highlights some recent
advances in script analysis and some suggested areas for improvement.
Introduction
Recent years have seen a growing interest in the use of script analysis for
crime prevention purposes. This chapter positions the approach as a useful
tool to help security practitioners develop and upgrade preventive and
protective controls in reaction to real-life or improvised security incidents.
It presents the use of scripts as a pragmatic means to analyse the process
that offenders go through in the commission of a crime, to pinpoint
opportunities for preventive intervention and to draw attention to a fuller
range of risk mitigating measures.
The first part of this chapter provides a general introduction to the script
concept and its key attributes, and to the way it was adopted from cognitive
science in support of situational crime prevention. It sets out how scripts
can operate at different levels of abstraction, how they can be developed as
single-perspective or interpersonal scripts, and how script analysis can be
applied in various modes to study completed, failed, aborted and imaginary
crimes. It further shows how scripts can be interpreted to develop and
upgrade preventive and protective security controls, and how they enable
security practitioners to uncover valuable information that may be missed
during a more superficial assessment of a crime event. Part two provides
some documented examples of how the approach has been applied in
practice. It shows how scripts have been created for a broad range of crime
types and illustrates their relevance to contemporary security professionals.
Parts three and four highlight some recent advances in script analysis and
some suggested areas for improvement, respectively. The latter include
proposals to develop a more structured and consistent scripting
methodology, to improve the quality of modus operandi data in the
information sources relied upon to generate scripts, or to broaden the
theoretical base of script analysis to better support current script research
and practice. The key takeaways, finally, are summarized in a general
conclusion.
Crimes as Scripts
The script concept was first introduced to the field of environmental
criminology when Derek Cornish proposed to use it in support of situational
crime prevention (Cornish 1994; Borrion 2013; Leclerc 2014a). For
situational interventions to realize their full potential, they need to be crime-
specific and thoughtful of the procedural aspects of crime commission
(Cornish 1994). Crime events form part of a chain of events, and a detailed
understanding of what occurs both prior to and following the actual crime
event may be of practical benefit to those tasked with designing situational
measures (Cornish 1994).
As to guide researchers and practitioners in tackling the problem of
gathering and organizing information about crime commission, Cornish
(1994) turned to theories and concepts developed in cognitive science
where the production and understanding of sequences of events or actions
was also being addressed. One such concept was the notion of the script,
which featured in the debate on human memory organization. In early
writings in cognitive science, scripts—as part of a family of hypothesized
knowledge structures or ‘schemata’ (Cornish 1994)—function as an
economy measure in the storage of episodes that are alike and remembered
in terms of standardized generalized episodes (Schank and Abelson 1977).
Frequently recurring social situations that involve strongly stereotyped
conduct, such as a visit to a restaurant, doctor or dentist, are captured in our
memory as a standard event sequence (or ‘script’) that can easily be
recognized and recovered based on just some events that form part of its
causal chain (Schank and Abelson 1977; Schank 1989). Considered from
the point of view of a customer, the ‘restaurant script’ outlines the sequence
of actions that a customer must take when visiting a restaurant for a meal
(e.g. ‘enter’, ‘wait to be seated’, ‘get the menu’, ‘order’, ‘eat’, ‘get the
check’, ‘pay’ and ‘exit’) (Schank and Abelson 1977; Cornish 1994). In
more general terms, a script describes the relation between ‘casts’ (i.e.
actors or roles such as customers, waitresses and cooks), ‘props’ and
‘locations’ in a sequence of ‘actions’ to characterize routines occurring in
specific ‘scenes’ (Borrion 2013).
Crime Scripts
‘A script-theoretic approach’, according to Cornish (1994, p. 160), ‘offers a
way of generating, organizing and systematizing knowledge about the
procedural aspects and procedural requirements of crime commission’.
Applied to crime, the approach may help to uncover the complete sequence
of actions adopted before, during and after a crime event, extending the
analysis to all stages of the crime-commission process and drawing
attention to a fuller range of possible intervention points (Cornish 1994;
Chiu et al. 2011; Leclerc and Wortley 2014). Table 25.1 provides the
hypothetical example of a theft from a parked, soft-sided trailer turned into
a (universal) crime script. It provides detail on the offender actions prior to,
during and following the actual theft, and highlights some measures that
can potentially be introduced to disrupt the crime-commission process.
Table 25.1 Example script ‘Cargo theft from a parked trailer’ (modified from Haelterman 2016)
This very basic script displays a specific type of cargo theft from a
trailer at a ‘track’-level and provides the appropriate level of specificity to
identify specific intervention points and potential countermeasures. Related
to this ‘curtain-slashing’ track is a ‘theft from a moving vehicle’ track, as
outlined in Haelterman (2016). Both may be considered part of a family of
‘cargo theft from a trailer’ scripts, which can in turn be subsumed under the
broader category of ‘cargo theft’ (see also Cornish 1994).
Indeed, the script concept can operate at different levels of abstraction,
ranging from ‘metascripts’ (e.g. theft of property) and ‘protoscripts’ (e.g.
robbery) to very specific ‘scripts’ (e.g. robbery from the person) or ‘tracks’
(e.g. subway mugging), and more complicated crimes can be regarded as
‘composite scripts that can be disaggregated into a series of linked and
“nested” scripts’ (Cornish 1994, p. 173). Scripts can be developed from the
perspective of the offender—as is the case in our hypothetical example—or
from the point of view of other actors involved during crime events, such as
victims or guardians against crime (Leclerc 2014a; Leclerc and Reynald
2017). They can be developed as single-perspective scripts that capture the
step-by-step decisions and actions of an offender, victim or crime
controller; or as interpersonal scripts providing detail on the interaction
between various parties involved during crime commission (Leclerc 2014a,
2014b). Script analysis can be applied in a proactive, reactive or
hypothetical mode to study completed, failed, aborted or imaginary crimes
(Cornish 1994; Haelterman 2016). As will become clear from the examples
provided in part two, it can be applied to a wide variety of crime types,
ranging from simple to more complex forms of crime.
Documented Practice
Based on a systematic review of over 100 scripts published between 1994
and 2018, Dehghanniri and Borrion (2019) provide a comprehensive picture
of scripting practices covering eight broad crime categories: cybercrime
(e.g. attacks on online banking), corruption and fraud offences (e.g. expense
reimbursement fraud), robbery and theft offences (e.g. armed robbery, car
theft and pickpocketing), sexual offences (e.g. child sex trafficking), violent
crime (e.g. hostage taking and foreign fighting), drugs offences (e.g. open-
air drug selling), environmental crime (e.g. illegal waste dumping and
wildlife trafficking) and a rest category containing crime types not
previously covered. More recent examples include the use of script analysis
—or a reference thereto—to study:
drug trafficking (Luong 2019; Staring et al. 2019);
the hunting of jaguars and the production of jaguar paste (Lemieux and
Bruschi 2019);
antiquities trafficking (Weirich 2019);
sexual offences committed on public transport (Apena Rogers 2019);
poppy cultivation and opium production (Chainey and Guererro 2019);
sexual assault (Chopin et al. 2019);
the advertisement and delivery of counterfeit documents on the Internet
(Holt and Lee 2020);
ideologically motivated vehicle ramming attacks (Williams et al. 2020);
Nigerian piracy (Peters 2020);
the illegal harvesting of live corals (Sosnowski et al. 2020);
unattended package theft (Stickle et al. 2020);
school shootings (Keatley et al. 2020);
website hacking attacks (Leppänen et al. 2020);
illicit waste trafficking (Andreatta and Favarin 2020);
corporate benchmark-rigging in the financial services industry
(Jordanoska and Lord 2020);
the illegal trade of medicines (Baratto 2020);
illegal fishing (Weekers 2020); and
a wide variety of fraud schemes (see, e.g., Hutchings and Pastrana 2019;
Hardy et al. 2020; Junger et al. 2020).
The list goes on and confirms that script analysis continues to grow in
popularity. Based on some random examples of documented practices, the
following sections further illustrate the relevance of the approach to
contemporary security professionals. The examples show how crime scripts
have been built upon to design and prioritize preventive interventions, to
assess the effectiveness of existing controls or to guide the design of
internal security processes.
Cybercrime
In the literature review conducted by Dehghanniri and Borrion (2019),
cybercrime tops the list of most prevalent crime-type categories. Back in
2005, Willison reported on the use of script analysis to study (employee)
computer crime. A fraud committed by a dishonest local council employee
who created and authorized fictitious invoices was turned into a crime script
and led to the identification of various preventive controls ranging from
pre-employment screening to segregation of duties and improved access
controls (Willison 2005; Willison and Siponen 2009). Applying the script
methodology, according to Willison (2005), helps to draw attention to all
procedural aspects of (employee) computer crime, to the attributes required
to commit the offence, and to ways of denying access to such attributes. It
further helps to ensure making optimum use of available safeguards and
‘allows consideration of the interrelationship between the security behavior
of staff, safeguards, and the criminal behavior of dishonest employees’
(Willison and Siponen 2009, p. 136). Basamanowicz and Bouchard (2011)
applied the script approach to identify structural weaknesses in the process
of acquiring and distributing copyrighted content on the Internet and to
direct law enforcement agencies’ attention to those process steps that have
the greatest potential for disrupting the online piracy scene. Based on a
script of the so-called warez release process, it was recommended for
industry to modify existing digital rights management technologies and for
law enforcement to focus investigative efforts on apprehending those
individuals capable of stripping content of its copyright protections on
behalf of the most prolific release groups (Basamanowicz and Bouchard
2011). Lavorgna (2013) turned to script analysis to identify and classify the
criminal opportunities provided by the Internet for carrying out a variety of
transit crimes, and Leukfeldt (2014) applied the script framework to
describe the steps undertaken by a criminal group to approach potential
victims, lure them to a phishing website, obtain their account details and
transaction codes, and transfer money from their accounts. This latter
exercise led to the identification of various opportunities for situational
interventions such as setting up awareness campaigns to alert potential
victims or upgrading security controls applicable to call centre employees
in major banks (Leukfeldt 2014). The script format has further been applied
to guide the design of methodologies for performing penetration tests on IT
systems (Dimkov et al. 2010) and to identify security loopholes in the
information security setup of an upper-tier budget hotel in London
(Samonas 2013).
Violent Crime
The script-theoretic framework has further been used to examine a variety
of violent crimes, some of them of relevance to contemporary security
professionals. Meyer (2012), for example, made use of crime scripts to
provide advice on how to prioritize protective security measures against
explosive attacks on railways. More recently, Osborne and Capellan (2017)
turned to script analysis to examine event-level characteristics of active
shooter events and to develop strategies to reduce their occurrence and/or
lethality. The latter include crime stage-specific and script-specific
strategies and techniques such as training and awareness building (e.g. on
how to recognize and report behavioural or verbal ‘red flags’), gun control,
controlling access to facilities and formal surveillance (Osborne and
Capellan 2017).
This non-exhaustive overview of scripting practices shows how
performed and planned scripts have been created for a variety of issues
facing commercial organizations. It also sheds light on the data sources
used for generating crime scripts. Some analysts make use of offender
accounts of crime commission (see, e.g., Lasky et al. 2015). Others turn to
secondary sources of data—or combinations thereof—such as audit reports
(e.g. Willison 2005), court data (e.g. Basamanowicz and Bouchard 2011;
Zanella 2014), police files and data sets (e.g. Leukfeldt 2014; Ashby 2016),
self-reported victimization data (e.g. Peters 2020; Junger et al. 2020), open-
source databases (e.g. Kennedy et al. 2018), interviews with subject matter
experts and field practitioners (e.g. Lavorgna 2013; Haelterman 2016;
Hutchings 2018), and video footage (e.g. Borrion et al. 2017; Stickle et al.
2020). Of the 60 scripts that were selected by Dehghanniri and Borrion as
containing non-ambiguous information about the data sources used to
generate the scripts, 29 scripts were created using a mix of primary and
secondary data, and 23 scripts were created using just secondary data
(Dehghanniri and Borrion 2019).
Combining Methods
Various researchers have combined script analysis with social network
analysis to gain a more comprehensive understanding of the structure and
functioning of criminal networks. According to Morselli and Roy (2008, pp.
71–72), merging both methods of analysis allows researchers ‘to
reconfigure criminal ventures […] in a framework that represents both the
criminal decision-making process (crime script) and the structure
embedding it (social network)’. Morselli and Roy (2008) applied the
combined method to investigate the role of brokers in vehicle ringing
operations. In their analysis of a counterfeit alcohol distribution network,
Lord et al. (2017) did so to better understand the distribution of illicit
alcohol from one jurisdiction to another, to identify the processes and
behaviours involved, and to describe the roles that specific actors play at
different stages of crime commission. For the purpose of their study,
according to Lord et al. (2017, p. 268), ‘a social network analysis approach
complements the script analysis by providing the analytical tools to
understand how […] actors are embedded in the structure of distributing
counterfeit alcohol, some occupying central positions, while others being
more peripheral’. Others have combined script analysis and social network
analysis to study the trade in converted firearms (De Vries 2012), to
highlight structural and functional changes in a drug trafficking network
across time (Bright and Delaney 2013), or to inform counter terrorism
disruption strategies (Masys 2016).
Theoretical Considerations
In addition to the more technical and methodological concerns that were
raised in the previous sections, some authors have challenged the theoretical
base of script analysis as it was first introduced to the criminological
domain. Tompson and Chainey (2011), for example, point to the fact that
some may consider the interdependency between script analysis and the
rational choice perspective to be inhibitive, and argue that other decision-
making frameworks can be relied upon where there is a robust justification
for doing so. ‘As long as a decision-making framework facilitates the
social, legal and situational variables influencing action to be identified’,
according to Tompson and Chainey (2011, p. 186), ‘it is unimportant which
framework is used to create crime scripts’.
Other authors present a more extensive case for re-thinking the
theoretical foundations of script-based modus operandi research. The
conceptual foundation imported from cognitive science, according to
Ekblom and Gill (2016, pp. 319–321), was ‘unclear and too narrow a
platform to support the current scope of script research’, which led them to
search for conceptual clarity ‘to better connect the scripts concept to
mainstream situational crime prevention and criminology more generally’,
and ‘to broaden the approach by exploring additional cross-disciplinary
links’. Ekblom and Gill (2016, p. 323) define scripts as ‘abstracted
descriptions of structured sequences of behaviour extended over time and
perhaps space, which could be considered functionally self-contained units
or subunits of longer sequences’. Borrowing from ethology and behavioural
ecology, they further distinguish between empirical and explanatory scripts.
The first are referred to as ‘simple descriptions of recurrent sequences of
behaviour in situ’ (Ekblom and Gill 2016, p. 324). At a minimum, they can
be described as ‘bare abstracted sequences of actions or associated events’,
but while studying variation in behaviour across agents and/or situations
‘may suffice for guiding criminal investigation’, it is believed to be of
limited preventive (and academic) use (Ekblom and Gill 2016, p. 324). The
functional explanation provided by procedural scripts, in contrast, is
considered of great importance to (situational) prevention, as are combining
functional and causal perspectives in scripts (according to circumstance)
and understanding script clashes and collaborations (Ekblom and Gill
2016). Differentiating between behaviour and events, leveraging from other
disciplines to distinguish the levels of explanation needed to handle
sequences of purposive behaviour, linking functional and causal
perspectives in scripts, distinguishing competence from performance,
highlighting the difference between empirical and procedural scripts (and
their usefulness for crime prevention purposes), relating script analysis to
other theories and approaches that focus on criminal events, extending the
scope of scripts in general and emphasizing the importance of script clashes
and collaborative scripts, according to Ekblom and Gill (2016, pp. 335–
336), may provide ‘a better definition of a script and its multiple features’.
Eventually, it may also yield significant practical advantage (Ekblom and
Gill 2016).
Conclusion
Covering the full history, theoretical foundations, past and current
applications, strengths, weaknesses and future possibilities of script analysis
in a single chapter is an impossible task. This contribution therefore focuses
on the value of the approach to contemporary security professionals. It
provides a very brief introduction to the script concept and its key
attributes, and goes on to show how crime scripts can be built upon to
design and prioritize preventive interventions, to assess the effectiveness of
preventive and protective controls, and to guide the design of internal
processes. It further shows how script analysis can be combined with other
methods of analysis to extend its scope and increase its usefulness.
Thinking of crime commission in terms of scripts offers a way of
examining the crime-commission process in greater detail, from start to
finish, which opens possibilities for identifying a fuller range of risk
mitigating measures and to pinpoint these to the most promising
intervention points. It further provides designers of preventive and
protective security measures with a means to anticipate displacement and
other reverse effects, and to benefit from potential diffusion of benefits.
Getting the approach to reach its full potential is work in progress. The
appropriate level of formalization and standardization that is required for
creating scientifically robust scripts that remain fit for practice is still to be
determined, and will need to balance the pros and cons of providing
freedom versus imposing a more structured scripting methodology (see also
Dehghanniri and Borrion 2019). Also of concern are the availability,
completeness and accuracy of data required for creating meaningful and
quality scripts. Where offenders’ accounts of crime commission are
obtained as a primary source of information, active probing and the
adoption of interviewing techniques that are fit for purpose may be required
(Cornish 1994). Where secondary sources are used, it is important to
acknowledge potential deficiencies. Data retrieved from incident reports,
for example, may be subject to inaccuracies ‘ranging from simple recording
and data entry errors to the purposeful withholding of pertinent incident
details by reporting parties’ (Peters 2020, p. 5). Meeting these and other
development needs referred to in this chapter—be it of a methodological,
administrative or more conceptual nature—will turn script analysis into a
standard ingredient of the security manager’s toolbox, and rightly so.
Recommended Readings
Cornish’s seminal article on the procedural analysis of offending and its
relevance for situational prevention (Cornish 1994) is considered a key
reference and required reading for anyone who wants to learn about the use
of scripts to study crime-commission processes. Also worthy of attention is
the work of Leclerc (2014a) who argues that the approach should also be
applied to victims and guardians against crime and to guide the analysis of
the interchange between actors involved in the crime event. Dehghanniri
and Borrion (2019) provide a comprehensive overview of crime scripting
practices based on a systematic review of over 100 scripts published
between 1994 and 2018. In an earlier contribution, Borrion (2013, p. 9)
presents a list of quality criteria that could be used to evaluate crime scripts,
and a checklist ‘to support the specification, verification and validation of
functional requirements for control measures’. The work of Tompson and
Chainey (2011) illustrates how crime scripts can be used to understand
specific crime phenomena (in case illegal waste activity). It further provides
some good insights into relevant data requirements and into the types of
issues faced when trying to gather useful data. Ekblom and Gill (2016),
finally, present an interesting rewrite of the script concept to better support
future research and practice.
References
Abelson, R. P. (1981). Psychological status of the script concept. American Psychologist, 36(7), 715–
729.
[Crossref]
Andreatta, D., & Favarin, S. (2020). Features of transnational illicit waste trafficking and crime
prevention strategies to tackle it. Global Crime, 21(2), 130–153.
[Crossref]
Apena Rogers, F.O. (2019). The crime-commission process of sexual offences on London trains
(SOLT): offending in plain sight, not just at night. PhD thesis. Middlesex University.
Ashby, M. (2016). Using crime science for understanding and preventing theft of metal from the
British railway network. PhD thesis. University College London.
Baratto, G. (2020). Situational crime prevention measures in the illegal online trade of medicines. In
The illegal trade of medicines on social media (pp. 37–54). Springer, Cham.
[Crossref]
Basamanowicz, J., & Bouchard, M. (2011). Overcoming the warez paradox: online piracy groups and
situational crime prevention. Policy & Internet, 3(2), 1–25.
[Crossref]
Borrion, H. (2013). Quality assurance in crime scripting. Crime Science, 2(6), 1–12.
Borrion, H., Dehghanniri, H., and Li, Y. (2017). Comparative analysis of crime scripts: one CCTV
footage—twenty-one scripts. In Proceedings of the 2017 European Intelligence and Security
Informatics Conference (pp. 115–122). Piscataway, NJ: IEEE.
Bright, D.A., & Delaney, J.J. (2013). Evolution of a drug trafficking network: mapping changes in
network structure and function across time. Global Crime, 14(2–3), 238–260.
[Crossref]
Chainey, S., & Guererro, N. (2019). Developing crime analysis in Mexico: case studies of cargo
robbery on highways, illegal weapons trafficking, robbery of convenience stores and poppy
cultivation. Technical note. https://discovery.ucl.ac.uk/id/eprint/10067263/. Accessed 27 December
2020.
Chiu, Y-N., Leclerc, B., & Townsley, M. (2011). Crime script analysis of drug manufacturing in
clandestine laboratories. British Journal of Criminology, 51, 355–374.
[Crossref]
Chopin, J., Beauregard, E., Bitzer, S., & Reale, K. (2019). Rapists’ behaviors to avoid police
detection. Journal of Criminal Justice, 61, 81–89.
[Crossref]
Cornish, D.B. (1994). The procedural analysis of offending and its relevance for situational
prevention. In R.V. Clarke (Ed.), Crime Prevention Studies Volume 3 (pp. 151–196). Monsey, New
York: Criminal Justice Press.
Dehghanniri, H., & Borrion, H. (2019). Crime scripting: a systematic review. European Journal of
Criminology. https://doi.org/10.1177/1477370819850943.
De Vries, M.S. (2012). Converted firearms: a transnational problem with local harm. European
journal on criminal policy and research, 18(2), 205–216.
[Crossref]
Dimkov, T., van Cleeff, A., Pieters, W., & Hartel, P. (2010). Two methodologies for physical
penetration testing using social engineering. In Proceedings of the 26th annual computer security
applications conference. NY: Association for Computing Machinery, 399–408.
Ekblom, P., & Gill, M. (2016). Rewriting the script: cross-disciplinary exploration and conceptual
consolidation of the procedural analysis of crime. European Journal on Criminal Policy and
Research, 22(2), 319–339.
[Crossref]
Gill, M. (2016). Preface. In H. Haelterman, Crime script analysis: preventing crimes against
business (p. vii). London: Palgrave Macmillan.
Gilmour, N. (2014). Understanding money laundering—a crime script approach. The European
Review of Organised Crime, 1(2), 35–56.
Haelterman, H. (2011). Re-thinking the cost of supply chain security. Crime, Law and Social
Change, 56(4), 289–405.
Haelterman, H. (2016). Crime script analysis: preventing crimes against business. London: Palgrave
Macmillan.
[Crossref]
Hancock, G., & Laycock, G. (2010). Organised crime and crime scripts: prospects for disruption. In
K. Bullock, R.V. Clarke, & N. Tilley (Eds.), Situational prevention of organised crimes (pp. 172–
192). Devon: Willan Publishing.
Hardy, J., Bell, P., & Allan, D. (2020). A crime script analysis of the Madoff Investment Scheme.
Crime Prevention and Community Safety, 22(1), 68–97.
[Crossref]
Holt, T.J., & Lee, J.R. (2020). A crime script analysis of counterfeit identity document procurement
online. Deviant Behavior. https://doi.org/10.1080/01639625.2020.1825915.
Hutchings, A. (2018). Leaving on a jet plane: the trade in fraudulently obtained airline tickets. Crime,
Law and Social Change, 70(4), 461–487.
[Crossref]
Hutchings, A., & Pastrana, S. (2019). Understanding eWhoring. In 2019 IEEE European Symposium
on Security and Privacy (EuroS&P) (pp. 201–214). IEEE.
Jordanoska, A., & Lord, N. (2020). Scripting the mechanics of the benchmark manipulation
corporate scandals: the ‘guardian’ paradox. European Journal of Criminology, 17(1), 9–30.
[Crossref]
Junger, M., Wang, V., & Schlömer, M. (2020). Fraud against businesses both online and offline:
crime scripts, business characteristics, efforts, and benefits. Crime Science. https://doi.org/10.1186/
s40163-020-00119-4.
Keatley, D.A., Mcgurk, S., & Allely, C.S. (2020). Understanding school shootings with crime script
analysis. Deviant Behavior, 41(9), 1084–1096.
[Crossref]
Kennedy, J.P., Haberman, C.P., & Wilson, J.M. (2018). Occupational pharmaceutical counterfeiting
schemes: a crime scripts analysis. Victims & Offenders, 13(2), 196–214.
[Crossref]
Lasky, N., Jacques, S. & Fisher, B.S. (2015). Glossing over shoplifting: how thieves act normal.
Deviant Behavior, 36:4, 293–309.
Lavorgna, A. (2013). Transit crimes in the Internet age: how new online criminal opportunities affect
the organization of offline transit crimes. PhD thesis. University of Trento.
Lavorgna, A. (2015). The online trade in counterfeit pharmaceuticals: new criminal opportunities,
trends and challenges. European Journal of Criminology, 12(2), 226–241.
[Crossref]
Leclerc, B. (2014a). New developments in script analysis for situational crime prevention. Moving
beyond offender scripts. In B. Leclerc & R. Wortley (Eds.), Cognition and crime. Offender decision
making and script analyses (pp. 221–236). New York: Routledge.
Leclerc, B. (2014b). Script analysis for crime controllers: extending the reach of situational crime
prevention. In S. Canepelle & F. Calderoni (Eds.), Organized crime, corruption and crime prevention
(pp. 13–20). Switzerland: Springer International Publishing.
[Crossref]
Leclerc, B., & Reynald, D. (2017). When scripts and guardianship unite: a script model to facilitate
intervention of capable guardians in public settings. Security Journal, 30(3), 793–806.
[Crossref]
Leclerc, B., & Wortley, R. (2014). The reasoning criminal. Twenty-five years on. In B. Leclerc & R.
Wortley (Eds.), Cognition and crime. Offender decision making and script analyses (pp. 1–11). New
York: Routledge.
Lemieux, A. M., & Bruschi, N. (2019). The production of jaguar paste in Suriname: a product-based
crime script. Crime Science, 8(1), 6.
[Crossref]
Leppänen, A., Toiviainen, T., & Kankaanranta, T. (2020). From a vulnerability search to a criminal
case: script analysis of an SQL injection attack. International Journal of Cyber Criminology, 14(1),
63–80.
Leukfeldt, E. R. (2014). Cybercrime and social ties. Trends in Organized Crime, 17(4), 231–249.
Li, Y.S., & Qi, M.L. (2019). An approach for understanding offender modus operandi to detect serial
robbery crimes. Journal of Computational Science, https://doi.org/10.1016/j.jocs.2019.101024.
Lord, N., Spencer, J., Bellotti, E., & Benson, K. (2017). A script analysis of the distribution of
counterfeit alcohol across two European jurisdictions. Trends in Organized Crime, 20, 252–272.
[Crossref]
Luong, H.T. (2019). Modus operandi of cross-border drug trafficking in Vietnam. In Transnational
drug trafficking across the Vietnam-Laos border (pp. 95–122). Palgrave Macmillan, Cham.
Masys, A.J. (2016). Disrupting terrorist and criminal networks: crime script analysis through
DODAF applications. In A.J. Masys (Ed.), Exploring the security landscape: non-traditional security
challenges (pp. 231–247). Switzerland: Springer International Publishing.
[Crossref]
Meyer, S. (2012). Reducing harm from explosive attacks against railways. Security Journal, 25(4),
309–325.
[Crossref]
Morselli, C., & Roy, J. (2008). Brokerage qualifications in ringing operations. Criminology, 46(1),
71–98.
[Crossref]
Osborne, J. R., & Capellan, J. A. (2017). Examining active shooter events through the rational choice
perspective and crime script analysis. Security Journal, 30(3), 880–902.
[Crossref]
Peters, B.C. (2020). Nigerian piracy: articulating business models using crime script analysis.
International Journal of Law, Crime and Justice. https://doi.org/10.1016/j.ijlcj.2020.100410.
Schank, R.C. (1989). An early work in cognitive science. Current Contents, 38, 14.
Schank, R.C. & Abelson, R.P. (1977). Scripts, plans, goals and understanding. An inquiry into
human knowledge structures. New Jersey: Lawrence Erlbaum Associates.
Sosnowski, M.C., Weis, J.S., & Petrossian, G.A. (2020). Using crime script analysis to understand
the illegal harvesting of live corals: case studies from Indonesia and Fiji. Journal of Contemporary
Criminal Justice. https://doi.org/10.1177/1043986220910295.
Staring, R., Bisschop, L., Roks, R., Brein, E., & van de Bunt, H. (2019). Drug crime in the port of
Rotterdam. https://repub.eur.nl/pub/127247/Drug-crime-in-the-port-of-Rotterdam-lowres.pdf.
Accessed 27 December 2020.
Stickle, B., Hicks, M., Stickle, A., & Hutchinson, Z. (2020). Porch pirates: examining unattended
package theft through crime script analysis. Criminal Justice Studies, 33(2), 79–95.
[Crossref]
Tompson, L., & Chainey, S. (2011). Profiling illegal waste activity: using crime scripts as a data
collection and analytical strategy. European Journal on Criminal Policy and Research, 17(3), 179–
201.
[Crossref]
Tremblay, P., Talon, B., & Hurley, D. (2001). Body switching and related adaptations in the resale of
stolen vehicles. Script elaborations and aggregate crime learning curves. British Journal of
Criminology, 41(4), 561–579.
[Crossref]
Warren, S., Oxburgh, G., Briggs, P., & Wall, D. (2017). How might crime-scripts be used to support
the understanding and policing of cloud crime?. In T. Tryfonas (Ed.), Human Aspects of Information
Security, Privacy and Trust (pp. 539–556). Springer, Cham.
Weekers, D.P. (2020). ‘Conservation’ criminology: understanding and preventing illegal fishing in
the Great Barrier Reef Marine Park. PhD thesis. University of Queensland.
Weirich, C.A. (2019). Situational crime prevention of antiquities trafficking: a crime script analysis.
PhD thesis. University of Glasgow.
Williams, A., Corner, E., & Taylor, H. (2020). Vehicular ramming attacks: assessing the effectiveness
of situational crime prevention using crime script analysis. Terrorism and Political Violence. https://
doi.org/10.1080/09546553.2020.1810025.
Willison, R. (2005). Considering the offender: addressing the procedural stages of computer crime in
an organisational context. Working Paper No. 09-2005. Copenhagen: Copenhagen Business School.
Willison, R., & Siponen, M. (2009). Overcoming the insider: reducing employee computer crime
through situational crime prevention. Communications of the ACM, 52(9), 133–137.
[Crossref]
Zanella, M. (2014). Script analysis of corruption in public procurement. In B. Leclerc & R. Wortley
(Eds.), Cognition and crime. Offender decision making and script analysis (pp. 164–185). London
and New York: Routledge.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_26
Reka Solymosi
Email: [email protected]
Introduction
Research and discourse around security covers a diverse range of topics
focusing on protecting “people and their assets in particular from mal-
intended actions” (Gill 2014: 981), such as crime prevention, management
of security, and even discussion about ethics and critiques of security (Gill
2014). In this chapter, we wish to draw attention to perceived security—the
extent to which people interpret a particular situation as secure or insecure.
Designing urban environments that people perceive to be safe or unsafe
has important implications for individuals, and at the systemic level,
impacts public health, environmental sustainability, and social and
economic inequality. This is because how people perceive their
neighbourhoods dictates how they will interact with them, and these
behaviours and decisions impact upon all spheres of life (Marzbali et al.
2016).
On the individual scale, fear of crime (FOC; perceived insecurity)
affects self-assessed quality of life (Jackson et al., 2006), contributes to
anxiety (Hale 1996), and impacts upon physical and psychological health
when the individual avoids physical activity in public spaces (Foster et al.
2010; Loukaitou-Sideris 2006) or decreases social interaction (Foster et al.
2010; Marzbali et al. 2016; Lorenc et al. 2013). Foster et al. (2014) estimate
that total time people spend walking decreases by 22 minutes per week for
each one unit increase in their reported levels of fear of crime. Reducing the
extent to which people leave their home or walk not only robs them of the
health benefits of exercise but further acts as a barrier, preventing people
from fully engaging in their communities and reducing their access to
opportunities (Fisher and Nasar 1992; Nasar and Jones 1997; Newman
1972).
At the community level, perceived insecurity affects sense of
community and punitive attitudes (Hale 1996), affects real estate markets
(Wilhelmsson and Ceccato 2015), and even leads to areas developing a
negative reputation, creating social stigmatisation (Lorenc et al. 2013).
Avoiding certain areas of the public space as a self-protective strategy,
when shared by a number of citizens, could result in underused streets or
areas. This undermines natural surveillance, participation, and social
cohesion, therefore affects both objective and perceived security according
to the Crime Prevention Through Environmental Design (CPTED)
principles (Armitage and Ekblom 2020; Cozens et al. 2005). The average
effect size of the impact of fear of crime on subjective wellbeing is higher
in areas of less economic and social development (Alfaro-Beracoechea et
al. 2018), and the limitation on activities and possible social isolation are
more serious for women, older people, and people with disabilities (Lorenc
et al. 2013; San-Juan et al. 2012). Since perceived insecurity is not
distributed equally across populations or areas, tackling perceived
insecurity addresses the UN sustainable development goal of reduced
inequalities and gender equality (United Nations, 2015).
On a systemic scale, where perceived insecurity of areas prevents
people from sustainable transit choices such as walking or cycling, they will
rely on high carbon emission modes of travel instead, like private cars and
taxis (Hong and Chen 2014). This raises both public health and
environmental concerns; perceived insecurity affects mobility decisions
leading to less walking and more use of private transportation, which lead
to public health outcomes in reduced exercise (Foster et al. 2014) and
environmental outcomes in private transport mode choices ultimately
producing higher levels of emissions (Rietveld and Brons 2001; McDonald
et al. 2010; Mitra et al. 2010). In line with the UN sustainable development
goal on sustainable cities and communities, (United Nations, 2015)
governments and city planners must seek to provide access to safe,
affordable, accessible, and sustainable transport systems for all. Perceived
safety clearly has a role to play in achieving this.
Planning, designing, and maintaining urban (and rural) spaces that are
perceived as safe by those who live, work, or visit them is evidently an
impactful and vital part of security research and practice. In order to inform
planning interventions for the creation of safe spaces, it is important to
understand what environmental features are associated with feeling unsafe.
Since the 1960s, many disciplines such as sociology, criminology, planning,
and psychology have researched perceived (in)security and characteristics
of place. Researchers working in parallel in these spheres have been
exploring such characteristics of the built environment; however,
conceptualising and operationalising fear of crime in a way that reflects
people’s context-specific experiences has proven an important barrier. More
recently, researchers have begun to ‘put fear of crime on the map’, framing
it from a place-based perspective. In particular, technological advances in
research methods allow operationalising people’s perceptions of place in a
way which facilitates this re-conceptualisation of place-based fear of crime,
alongside collecting auxiliary data about the environmental features
associated with these experiences at unprecedented scales (Solymosi et al.,
2020).
In this chapter, we elaborate on why traditional approaches to measuring
perceived insecurity have reached the limit of what they can tell us about
designing safer spaces and provide a roadmap for how to move forward by
taking advantage of innovative research design. Specifically, we identify
three key issues with the way in which perceived insecurity has traditionally
been operationalised which have hampered our understanding of perceived
insecurity in specific spatiotemporal contexts. These are (1) difficulty to
measure and locate place-based perceptions: Issues ‘place-ing’ experiences
of (in)security, (2) social desirability and other biases with questionnaires
that mean we do not tap into the experience of worry/fear: Issues capturing
experience, and (3) difficulty in then linking experiences of fear/worry with
the specific elements of the situation/place which evoked such a response:
Issues linking to environmental context.
For each one of these issues, we address how methodological advances
in research design, specifically (1) mobile applications implementing
experience sampling method (ESM), (2) physiological sensing measures
(e.g. Galvanic Skin Response or Heart Rate Monitoring), and (3) digital
methods for cataloguing relevant and important environmental features (e.g.
eye-tracking), can be used to tackle them. These resources are available to
researchers to ultimately develop a better understanding of environmental
features associated with perceived (in)security. We present a list of
important considerations for research design, methodology, and data
analysis. Our hope is to motivate more researchers to incorporate such
techniques and develop a comprehensive understanding of place-based
perception of security in built environments to inform design and
maintenance of secure places.
Fig. 26.1 Conceptualisation of fear of crime and the role of perceived in/security
Fig. 26.3 Annotated schema for conceptualisation of fear of crime (FOC) and the role of perceived
in/security with suggestions for operationalisation
Recommended Readings
Solymosi et al. (2020) provide a comprehensive review of mobile phone
applications and crowdsourcing approaches to operationalise perception of
(in)security as a context-dependent experience, with an emphasis on
synthesising the strengths and weaknesses of these measures. A wider
discussion on the role of innovative data collection methods in advancing
criminological understanding is provided in Solymosi and Bowers (2018).
For readings on the use of sensing measures, Christopoulos, Uy, and Yap
(2019) and Castro-Toledo et al. (2017) provide good examples of relevant
applications. Regarding eye-tracking and its applications to study
perception of place, Guedes et al. (2015) and Crosby and Hermens (2019)
both provide illustrative case studies to guide the interested researcher.
Finally, for methodological readings, to consider the role of machine
learning as a methodological approach for carrying out environmental
audits on large scales, the example of Dakin et al. (2020) provides a
creative example to inspire creative applications to the perception of place
context. Regarding the substantive areas covered, for a recent overview of
fear of crime in public spaces, covering conceptual, theoretical, and
methodological issues, see Ceccato and Nalla (2020), and for considering
the relationship between features of the environmental context and
perceived insecurity, Lorenc et al. (2013) provide a systematic review of the
existing evidence (albeit many of these based on traditional, survey-based
approaches).
References
Alfaro-Beracoechea, L., Puente, A., Costa, S. da, Ruvalcaba, N., & Páez, D. (2018). Effects of Fear
of Crime on Subjective Well-being: A Meta-analytic Review. European Journal of Psychology
Applied to Legal Context, 10(2), 89–96. https://doi.org/10.5093/ejpalc2018a9.
Armitage, R., & Ekblom, P. (2020). Rebuilding crime prevention through environmental design:
Strengthening the links with crime science.
Braga, A., Papachristos, A., & Hureau, D. (2012). Hot spots policing effects on crime. Campbell
Systematic Reviews, 8(8), 1–96.
Buil-Gil, D. (2016). InseguridApp: Estudio piloto de los patrones de distribución espacio-temporal
de los enclaves del miedo (al crimen) en Elche a partir de una nueva aplicación móvil [Unpublished
master’s thesis]. Miguel Hernández University.
Buil-Gil, D., Solymosi, R., & Moretti, A. (2020). Nonparametric Bootstrap and Small Area
Estimation to Mitigate Bias in Crowdsourced Data: Simulation Study and Application to Perceived
Safety. Big Data Meets Survey Science: A Collection of Innovative Methods, 487–517.
Castro-Toledo, F. J., Esteve, M., & Miró-Llinares, F. (2019, September 30). Fear of Cybercrime. An
Experimental Study on the Mismatches between Self-Reported and Physiological Measures in a
Simulated Cyberattack Environment. https://doi.org/10.31235/osf.io/kx26n.
Castro-Toledo, F. J., Perea-García, J. O., Bautista-Ortuño, R., & Mitkidis, P. (2017). Influence of
environmental variables on fear of crime: Comparing self-report data with physiological measures in
an experimental design. Journal of Experimental Criminology, 13(4), 537–545.
Cozens, P. M., Saville, G., & Hillier, D. (2005). Crime prevention through environmental design
(CPTED): A review and modern bibliography. Property Management, 23(5), 328–356. https://doi.
org/10.1108/02637470510631483.
Cozens, P., & Sun, M. Y. (2019). Exploring crime prevention through environmental design
(CPTED) and students’ fear of crime at an Australian university campus using prospect and refuge
theory. Property Management.
Ceccato, V., & Nalla, M. K. (2020). Crime and fear in public places: Towards safe, inclusive and
sustainable cities. Taylor & Francis.
Chataway, M. L., Hart, T. C., & Bond, C. (2019). The social-psychological process of fearing crime:
Developing and testing a new momentary model of victimisation worry. Australian & New Zealand
Journal of Criminology, 52(4), 462–482.
Chataway, M. L., Hart, T. C., Coomber, R., & Bond, C. (2017). The geography of crime fear: A pilot
study exploring event-based perceptions of risk using mobile technology. Applied Geography, 86,
300–307.
Christensen, T. C., Wood, J. V. and Barrett, L. F. (2003). Remembering everyday experience through
the prism of self-esteem. Personality & social psychology bulletin, (1), 51–62, Jan. ISSN 0146-1672.
https://doi.org/10.1177/0146167202238371.
Christopoulos, G. I., Uy, M. A., & Yap, W. J. (2019). The body and the brain: Measuring skin
conductance responses to understand the emotional experience. Organizational Research Methods,
22(1), 394–420. https://doi.org/10.1177/1094428116681073.
Crosby F, Hermens F. Does it look safe? An eye tracking study into the visual aspects of fear of
crime. Quarterly Journal of Experimental Psychology. 2019;72(3):599–615. https://doi.org/10.1177/
1747021818769203.
[Crossref]
Dakin, K., Xie, W., Parkinson, S., Khan, S., Monchuk, L., & Pease, K. (2020). Built environment
attributes and crime: an automated machine learning approach. Crime Science, 9(1), 1–17.
Davoudian, N., & Raynham, P. (2012). What do pedestrians look at at night?. Lighting Research &
Technology, 44(4), 438–448.
Ditton, Jason, Stephen Farrall, Jon Bannister, Elizabeth Gilchrist, Jeanette Garwood, Michelle
Rogerson, and Ken Pease. “Measuring fear of crime.” (1998): 10–13.
Doran, B. J., & Burgess, M. B. (2011). Putting fear of crime on the map: Investigating perceptions of
crime using geographic information systems. Springer Science & Business Media.
Farrall, S., Bannister, J., Ditton, J., & Gilchrist, E. (1997). Questioning the measurement of the ‘fear
of crime’: Findings from a major methodological study. The British Journal of Criminology, 37(4),
658–679.
Ferraro, K. F., & LaGrange, R. L. (1987). The measurement of fear of crime. Sociological inquiry,
57(1), 70–97.
Fisher, B. S., & Nasar, J. L. (1992). Fear of Crime in Relation to Three Exterior Site Features:
Prospect, Refuge, and Escape. Environment and Behavior, 24(1), 35–65. https://doi.org/10.1177/
0013916592241002.
Floridi, L., & Taddeo, M. (2016). What is data ethics? Philosophical Transactions of the Royal
Society A: Mathematical, Physical and Engineering Sciences, 374(2083), 20160360. https://doi.org/
10.1098/rsta.2016.0360.
Foster, S., Giles-Corti, B., & Knuiman, M. (2010). Neighbourhood design and fear of crime: A
social-ecological examination of the correlates of residents’ fear in new suburban housing
developments. Health & place, 16(6), 1156–1165.
Foster, S., Knuiman, M., Wood, L., & Giles-Corti, B. (2013). Suburban neighbourhood design:
Associations with fear of crime versus perceived crime risk. Journal of Environmental Psychology,
36, 112–117.
Foster, S., Knuiman, M., Hooper, P., Christian, H., & Giles-Corti, B. (2014). Do changes in residents’
fear of crime impact their walking? Longitudinal results from RESIDE. Preventive Medicine, 62,
161–166. https://doi.org/10.1016/j.ypmed.2014.02.011.
Fotios, S., Uttley, J., Cheal, C. & Hara, N. (2015). Using eye-tracking to identify pedestrians’ critical
visual tasks, Part 1. Dual task approach. Lighting Research and Technology, 47, 133–1
Fox, K., Nobles, M. & Piquero, A. Gender, crime victimization and fear of crime. Secur J 22, 24–39
(2009). https://doi.org/10.1057/sj.2008.13.
Geiser M, Walla P. Objective Measures of Emotion During Virtual Walks through Urban
Environments. Applied Sciences. 2011; 1(1):1–11. https://doi.org/10.3390/app1010001.
Gill, M., Bryan, J., & Allen, J. (2007). Public Perceptions of CCTV in Residential Areas: “It Is Not
As Good As We Thought It Would Be.”. International Criminal Justice Review, 17(4), 304–324.
Gill, M. (2014). Chapter 44: Exploring Some Contradictions of Modern-Day Security. In The
Handbook of Security (2nd Edition). Palgrave Macmillan.
Gray, E., Jackson, J. and Farrall, S. (2008). Researching Everyday Emotions: Towards a Multi-
disciplinary Investigation of the Fear of Crime. In H. Kury (Ed.), Fear of Crime-Punitivity. New
Developments in Theory and Research. Bochum: Universitätsverlag.
Gray, E., Jackson, J., & Farrall, S. (2011). Feelings and Functions in the Fear of Crime: Applying a
New Approach to Victimisation Insecurity. The British Journal of Criminology, 51(1), 75–94. https://
doi.org/10.1093/bjc/azq066.
Guedes, I., Fernandes, P., Agra, C., & Cardoso, C.S. (2015). Studying the contextual cues associated
with fear of crime through eye tracking techniques. An exploratory research. In: Agra, C., Cardoso,
C.S., de Maillard, J., O’Reily, C., Ponsaers, P., & Shapland, J. (Eds.), Criminology, Security and
Justice. Methodological and epistemological issues. GERN Research Papers 3. Maklu: Belgium.
Hale, C. (1996). Fear of Crime: A Review of the Literature. International Review of Victimology,
4(2), 79–150. https://doi.org/10.1177/026975809600400201.
Haklay, M., Singleton, A., & Parker, C. (2008). Web mapping 2.0: The neogeography of the
GeoWeb. Geography Compass, 2(6), 2011–2039.
Hinkle, J. C., & Weisburd, D. (2008). The irony of broken windows policing: A micro-place study of
the relationship between disorder, focused police crackdowns and fear of crime. Journal of Criminal
justice, 36(6), 503–512.
Hong, J., & Chen, C. (2014). The role of the built environment on perceived safety from crime and
walking: Examining direct and indirect impacts. Transportation, 41(6), 1171–1185. https://doi.org/
10.1007/s11116-014-9535-4.
Innes, M., Abbott, L., Lowe, T. and Roberts, C. (2009) Seeing like a citizen: field experiments in
community intelligence-led policing. Police Practice and Research: An International Journal,
10(2):99–114, 2009.
Innes, M. (2015). ‘Place-ing’ fear of crime. Legal and Criminological Psychology, 20(2), 215–217.
Irvin-Erickson, Y., Malik, A. A., Kamiran, F., & Natarajan, M. (2020). Utility of ecological
momentary assessments to collect data on fear of crime. International Journal of Comparative and
Applied Criminal Justice, 1–13.
Jackson, J. (2006). Introducing fear of crime to risk research. Risk Analysis: An International
Journal, 26(1), 253–264.
Jackson, J., & Gouseti, I. (2015). Psychological proximity and the construal of crime: A commentary
on ‘Mapping fear of crime as a context-dependent everyday experience that varies in space and
time’. Legal and Criminological Psychology, 20(2), 212–214.
Jacques, S., Lasky, N., & Fisher, B. S. (2015). Seeing the offenders’ perspective through the eye-
tracking device: methodological insights from a study of shoplifters. Journal of Contemporary
Criminal Justice, 31(4), 449–467.
Kim, M., Kim, B. H., & Jo, S. (2014). Quantitative evaluation of a low-cost noninvasive hybrid
interface based on EEG and eye movement. IEEE Transactions on Neural Systems and
Rehabilitation Engineering, 23(2), 159–168.
Kim, S. K., & Kang, H. B. (2018). An analysis of fear of crime using multimodal measurement.
Biomedical Signal Processing and Control, 41, 186–197.
Kronkvist, K., & Engström, A. (2020). Feasibility of gathering momentary and daily assessments of
fear of crime using a smartphone application (STUNDA): Methodological considerations and
findings from a study among Swedish university students. Methodological Innovations, 13(3),
2059799120980306.
LaGrange, R. L., & Ferraro, K. F. (1987). The elderly’s fear of crime: A critical examination of the
research. Research on aging, 9(3), 372–391.
Lasky, N. V., Fisher, B. S., & Jacques, S. (2017). ‘Thinking thief’ in the crime prevention arms race:
Lessons learned from shoplifters. Security Journal, 30(3), 772–792. https://doi.org/10.1057/sj.2015.
21.
[Crossref]
Lasky, N. V., Jacques, S., & Fisher, B. S. (2015). Glossing Over Shoplifting: How Thieves Act
Normal. Deviant Behavior, 36(4), 293–309. https://doi.org/10.1080/01639625.2014.935651.
[Crossref]
Lorenc, T., Petticrew, M., Whitehead, M., Neary, D., Clayton, S., Wright, K., Thomson, H.,
Cummins, S., Sowden, A., & Renton, A. (2013). Fear of crime and the environment: Systematic
review of UK qualitative evidence. BMC Public Health, 13(1), 496. https://doi.org/10.1186/1471-
2458-13-496.
Marzbali, M. H., Abdullah, A., Razak, N. A., & Tilaki, M. J. M. (2012). The influence of crime
prevention through environmental design on victimisation and fear of crime. Journal of
environmental psychology, 32(2), 79–88.
Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 10 (1), 5–12.
May, D. C., N. E. Rader, and S. Goodrum. 2010. A gendered assessment of the ‘threat of
victimization’: Examining gender differences in fear of crime, perceived risk, avoidance, and
defensive behaviors. Crim. Justice Rev. 35:159–182. https://doi.org/10.1177/0734016809349166.
McDonald, N. C., Deakin, E., & Aalborg, A. E. (2010). Influence of the social environment on
children’s school travel. Preventive medicine, 50, S65–S68.
Marzbali, M., Abdullah, A., & Maghsoodi, M. J. (2016). The effectiveness of interventions in the
built environment for improving health by addressing fear of crime. International Journal of Law,
Crime and Justice, 45, 120–140. https://doi.org/10.1016/j.ijlcj.2015.12.002.
Mitra, R., Buliung, R. N., & Faulkner, G. E. (2010). Spatial clustering and the temporal mobility of
walking school trips in the Greater Toronto Area, Canada. Health & place, 16(4), 646–655.
Naik, N., Philipoom, J., Raskar, R., & Hidalgo, C. (2014). Streetscore-predicting the perceived safety
of one million streetscapes. In Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition Workshops (pp. 779–785).
Najafpour, E., Asl-Aminabadi, N., Nuroloyuni, S., Jamali, Z., & Shirazi, S. (2017). Can galvanic skin
conductance be used as an objective indicator of children’s anxiety in the dental setting?. Journal of
clinical and experimental dentistry, 9(3), e377–e383. https://doi.org/10.4317/jced.53419.
Nasar, J. L., & Jones, K. M. (1997). Landscapes of Fear and Stress. Environment and Behavior,
29(3), 291–323. https://doi.org/10.1177/001391659702900301.
Newman, Oscar. (1972). Defensible space: Crime prevention through urban design. Macmillan.
Noon, M.S., Beaudry, J.L., Schier, M.A. et al. Eyes wide open: exploring men’s and women’s self-
reported and physiological reactions to threat and crime. J Exp Criminol 15, 151–178 (2019). https://
doi.org/10.1007/s11292-019-09353-6.
Rietveld, P., & Brons, M. (2001). Quality of hub-and-spoke networks; the effects of timetable co-
ordination on waiting time and rescheduling time. Journal of Air Transport Management, 7(4), 241–
249.
San-Juan, C., Vozmediano, L., & Vergara, A. (2012). Self-protective behaviours against crime in
urban settings: An empirical approach to vulnerability and victimization models. European Journal
of Criminology, 9(6), 652–667. https://doi.org/10.1177/1477370812454369.
Scollon, C. Kim-Prieto, C. and E. Diener. (2009) Experience sampling: Promises and pitfalls,
strengths and weaknesses. Journal of Happiness studies, (1925): 5–34.
Slater, M., Pertaub, D. P., Barker, C., & Clark, D. M. (2006). An experimental study on fear of public
speaking using a virtual environment. CyberPsychology & Behavior, 9(5), 627–633.
Solymosi, R., Bowers, K., & Fujiyama, T. (2015). Mapping fear of crime as a context-dependent
everyday experience that varies in space and time. Legal and Criminological Psychology, 20(2),
193–211. https://doi.org/10.1111/lcrp.12076.
Solymosi, R., & Bowers, K. (2018). The role of innovative data collection methods in advancing
criminological understanding. The Oxford handbook of environmental criminology, 210–237.
Solymosi, R., Buil-Gil, D., Vozmediano, L., & Guedes, I. S. (2020). Towards a place-based measure
of fear of crime: A systematic review of app-based and crowdsourcing approaches. Environment and
Behavior, 0013916520947114.
Sutton, R. M., & Farrall, S. (2005). Gender, socially desirable responding and the fear of crime: Are
women really more anxious about crime?. British Journal of Criminology, 45(2), 212–224.
United Nations. (2015). Transforming our world: the 2030 Agenda for Sustainable Development.
Available: https://sdgs.un.org/2030agenda. Accessed: 18/03/2022.
Vozmediano, L., Azanza, M., & Villamane, M. (2017). Desarrollando y probando una app para
analizar la influencia de la seguridad percibida en la movilidad a pie: Un trabajo multidisciplinar con
profesorado y alumnado de Psicología e Ingeniería. Proceedings of the Seminar “La Educación,
Base Para Los Objetivos de Desarrollo Sostenible, Grupo, 4, 13.
Warr, M. (2000). Fear of crime in the United States: Avenues for research and policy. Criminal
justice, 4(4), 451–489.
Wesley G. Jennings, Angela R. Gover & Dagmar Pudrzynska (2007) Are Institutions of Higher
Learning Safe? A Descriptive Study of Campus Safety Issues and Self-Reported Campus
Victimization among Male and Female College Students, Journal of Criminal Justice Education,
18:2, 191–208, https://doi.org/10.1080/10511250701383327.
[Crossref]
Wilhelmsson, M., & Ceccato, V. (2015). Does burglary affect property prices in a nonmetropolitan
municipality? Journal of rural studies, 39, 210–218.
Yadan Li, Wenjuan Ma, Qin Kang, Lei Qiao, Dandan Tang, Jiang Qiu, Qinglin Zhang, Hong Li.
(2015). Night or darkness, which intensifies the feeling of fear?, International Journal of
Psychophysiology, Volume 97, Issue 1, Pages 46–57, ISSN 0167-8760, https://doi.org/10.1016/j.
ijpsycho.2015.04.021.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_27
Zarina I. Vakhitova
Email: [email protected]
Introduction
The relationship between tourism, safety and security has been addressed
by both tourism researchers and criminologists (Botterill and Jones 2010;
Pizam and Mansfeld 1996). At least four themes have been identified that
are of relevance to the tourism industry. Firstly, there is a strong relationship
between tourist resorts and crime, with resorts acting as crime hotspots,
with higher than average crime rates and particularly high rates at the peak
of the tourism season (de Albuquerque and McElroy 1999; Alleyne and
Boxill 2003; Pelfrey 1998; Prideaux 1996). Correspondingly, tourist centres
may be targeted by terrorists (Mawby 2010). Secondly, tourists generally
experience more crime than local people and more crime than when not on
holiday (Boakye 2010; Chesney-Lind and Lind 1986; Brunt, Mawby and
Hambly 1999; Michalko 2004; Stangeland 1998). Thirdly, it is evident that
tourists often contribute to the crime problem, particularly through their
involvement in public disorder associated with alcohol and drugs (Andrews
2011; Cohen 2002; Homel et al. 1997; Mawby 2012). Fourthly, and partly
as a result of this, local residents often react with hostility towards
(particularly mass) tourism, with those not benefiting from the tourist
industry viewing it as impacting upon their quality of life (Davis et al.
1988; King et al. 1993; Ross 1992; Teye et al. 2002), with public protest in
tourist centres as far removed as Barcelona (Burgen 2019; Kassam 2014)
and Newquay (Mawby 2012).
These dynamics clearly impact upon tourist demand and, subsequently,
on the tourism industry. Firstly, tourists may be deterred from visiting
resorts that are seen as dangerous, due to either crime or terrorism (de
Albuquerque and McElroy 1999; Alleyne and Boxill 2003; Holcomb and
Pizam 2006). Most notable, perhaps, is Brayshaw’s (1995) account of the
impact of a high-profile series of robberies and homicides in Florida on
tourist numbers. Subsequently, the reputation of Jamaica as unsafe has been
recognised to limit on tourist growth, and the precarious nature of tourism
in such high crime environments was highlighted in 2018 when a state of
emergency was issued in Jamaica (Travel Mole 2018a). With regard to
terrorism, tourists may be deterred from visiting countries and regions
where incidents have occurred (Korstanje and Clayton 2012; Lanouar and
Goaied 2019; Pizam and Fleischer 2002; Pizam and Mansfeld 2006; Pizam
and Smith 2000; Sönmez and Graefe 1998a, 1998b; Walters et al. 2019).
Secondly, tourists who experience crime on holiday, and indeed those
who experience secondary victimisation at the hands of unsympathetic
police, holiday reps, insurance companies, and so on, may be deterred from
returning, and while the evidence on this is tenuous (Mawby et al. 2020), it
is an important consideration where the tourism sector is heavily reliant on
repeat visits. Thirdly, while some resorts have deliberately marketed youth
tourism and a ‘sex and booze’ vacation experience, a backlash from both
local residents and other types of tourist has led many resorts to attempt to
upgrade their image to cater for tourists with a more lucrative cost/benefit
ratio (Mawby 2012).
This implies that identifying safety and security issues is important to
the tourism industry. However, until recently there was a widespread feeling
that ‘no news is good news’. Thus, Brunt, Mawby and Hambly’s (1999)
research on tourist victimisation was hampered by the refusal on any major
tour companies in the UK to participate in the research. However, there is a
growing realisation that identifying problems, confronting them, and
producing preventive and harm minimisation strategies is the only credible
response. A good illustration is a recent initiative by the European Forum
for Urban Security (EFUS) on local partnership working in security and
tourism (European Forum for Urban Security 2015; Mawby 2017; Mekinc
et al. 2017). Surprisingly, though, Ozascilar and Mawby (2022) exploratory
study is the first to address the needs of tourist victims and the support
received.
However, identifying the extent of the problem, explaining existing
patterns, and identifying examples of good practice are beset with
difficulties. This chapter thus focuses on the limitations of available data,
what can be done to improve the situation, and what alternative sources of
information might offer. It is divided into two main sections. The following
section considers the availability of official statistics and how they might be
improved. The next section looks at surveys, alternative methodologies, and
how they can inform our thinking.
Offender Surveys
Interviews with offenders are attractive to criminologists because they
allow researchers to ask about offenders’ choice of particular targets as well
as their motivation for offending in the first instance. They have addressed
those convicted, and usually imprisoned, for crimes such as robbery (Gill
2000; Wright and Decker 1997) and burglary (Bennett and Wright 1984;
Butler 1994). However, they are less feasible vis-a-vis offenders targeting
tourists because these are less easily identified. The most notable exception
is Harper’s (2006a) interviews with four robbers operating in New Orleans
who specialised in robbing tourists. Harper used these interviews to
supplement areal analysis of crime patterns (Harper 2006b) to show how a
group of offenders targeted tourists in the ‘edgy’ entertainment centre of the
city. Ethnographic research in tourist resorts provides an alternative to
formal interviews but has been largely ignored as a research tool (for an
exception see Andrews 2011).1
Surveys of Tourists
Surveys of tourists tend to fall into one or other of two categories. Firstly,
research—almost exclusively by tourism academics—using self-completion
surveys to assess the extent to which the public perceives certain countries
or resorts as unsafe, due to either crime or terrorism. Secondly, research that
focuses on tourists’ perceptions and experiences of safety during or after a
vacation.
In the former case, risk has become a common research theme within
tourism discourses (Chew and Jahari 2014; Yang and Nair 2014). However,
risk is defined far more broadly than by criminologists. Thus, researchers
commonly distinguish between: risks to one’s safety, such as natural
disasters (e.g. tsunami) and environmental risks (e.g. Chernobyl), and
health problems (e.g. SARS, swine or bird flu and the recent coronavirus
pandemic); and security risks, relating to crime (Holcomb and Pizam 2006),
terrorism (Sönmez and Graefe 1998a), revolution and political instability
(Carter 1998; Hall and O’Sullivan 1996). In fact, tourism studies are
dominated by the former, with only a minority of studies addressing
security concerns and most of these addressing terrorism threats. Generally,
risk is viewed as a cost inhibitor or constraint to be balanced against the
perceived benefits, or facilitators, of travel. This melds with another focus
among tourism researchers, on destination image.
With regard to terrorism, studies have generally asked tourists about
countries or regions they consider safe or unsafe and the impact their
perceptions on the likelihood of them visiting or revisiting the area. For
example, Sönmez and Graefe (1998a) pointed out that whilst in 1985,
28 million Americans went abroad and 162 were either killed or injured as a
result of terrorism, a 0.00058% probability of being targeted, 1.8 million
Americans changed their foreign travel plans for 1986. This led them to
consider tourists as acting irrationally by overestimating risk.
However, echoing criminological research on risk and fear of crime,
researchers note that some tourists tend to be more risk-averse than others.
More experienced travellers (Mazursky 1989) and those who have
previously visited an area are generally less risk-averse than first-time
visitors (Fuchs and Reichel 2011; Karamustafa et al. 2013; Kozak et al.
2007; Lepp and Gibson 2003). Equally, perceptions vary between different
subgroups of tourists. For example, cultural differences (Reisinger and
Mavondo 2006; Weber and Hsee 1998), age (Floyd and Pennington-Gray
2004) and gender (at least regarding the risk of violence) (Carr 2001; Floyd
and Pennington-Gray 2004; Kozak et al. 2007; Lepp and Gibson 2003; Qi
et al. 2009) have all been found to influence perceived risk. In explaining
these differences in perception, Sönmez and Graefe (1998b), using a model,
not unlike Hough’s (1995) explanation of fear of crime, suggested that
external influences, such as media portrayals of risk; internal factors, such
as travel experience and internalised perceptions of risk; and demographic
variables combined to influence perceptions of a destination as unsafe or
risky, which in turn influenced the decision on whether or not to travel
there.
Finally, researchers may ask tourists about their perceptions of security
and/or experiences of crime during a specific holiday. This commonly
involves interviewing tourists visiting a specific country (Allen 1999;
Barker et al. 2002; Stangeland 1998), but it may focus on tourists from one
country taking a vacation anywhere (Brunt, Mawby and Hambly 1999). In
some cases, tourists are approached while on holiday (Barker et al. 2002),
in others on departure (Allen 1999) and in others some time later (Brunt,
Mawby and Hambly 1999), while Mawby et al. (2020) interviewed samples
as they arrived and left Turkey.
With regard to fear of crime and perceptions of security, the findings
unveil low levels of concern amongst tourists (Mawby et al. 2020),
suggesting that, unlike among resident populations, tourists underestimate
their risk, what Mawby (2000) called the risk-fear paradox. In contrast,
most, but not all (see Allen 1999; Barker et al. 2002) surveys have found
tourists to have high levels of victimisation.
In the only survey to interview tourists and those of other residential
statuses, Stangeland (1998) compared tourists to Spain interviewed at the
end of their holiday with local residents of Malaga and foreign residents of
properties on the Costa del Sol. He found that tourists’ rates of victimisation
during a fortnight (average) holiday were not much lower (and sometimes
higher) than those of other groups over a year. Similarly, Brunt, Mawby,
and Hambly (1999) found that 10% of British holidaymakers had
experienced at least one crime during their vacation. More recently, Mawby
et al. (2020) noted that about 7% of visitors to Istanbul had been victimised.
And at the extreme, Boakye (2010) reported that almost a third of his
sample of foreign tourists visiting Ghana had been victimised during their
stay, with theft the most common offence.
The latter excepted, these percentages do not appear particularly
striking. However, since the average vacation is relatively short, say two
weeks, the victimisation window of opportunity is also limited. Taking this
into account, it seems that tourists are three to four times more likely to be
at risk of victimisation (Mawby 2017).
This has further implications, moreover. The small numbers of tourists
experiencing victimisation make it very difficult to theorise about why
some tourists appear more at risk than others. Thus, while Barker et al.
(2002) and Boakye (2010) attempted some basic analysis of their samples,
the small number of victims limits this. This is scarcely surprising.
Assuming a rate of victimisation four times that at home, we might expect a
sample of 1000 tourists to register about eight violent crimes, eight
burglaries and one robbery, with around 80 being victims of at least one
crime. This makes the comparison between victims and nonvictims difficult
and detailed analysis by offence type impossible.
One of our current research projects attempts to avoid this problem by
using non-random sampling via a crowdsourcing platform to ensure a
sufficiently large number of victims. While these platforms are not
representative of the general population, they are considerably more
representative and reliable than alternatives such as using students (Palan
and Schitter 2018; Peer et al. 2017). They have been widely used by social
scientists and, in particular, criminologists (see, e.g., Pickett et al. 2018;
Vakhitova et al. 2018) and tourism researchers (Hou and Zhang 2020).
In our own research on tourism and crime, we used MTurk. Our initial
project sampled Australian tourists visiting either the British Isles or Bali,
and we repeated the survey by interviewing US and British tourists who
recently visited Turkey. There are at least two potential difficulties,
however. Firstly, as crowdsourcing platforms have expanded so more
‘workers’ use them as a major income source, leading to lower levels of
validity and the need to combat this with validity checks within the
questionnaire. This problem is not inconsiderable. Thus, we excluded half
our US respondents and a third of our UK respondents in our Turkish
survey! Secondly, accessing a large enough sample of visitors to one
particular country may be difficult, leading to either poor response or
‘workers’ fabricating visits to earn a reward. To address this, our third phase
of surveys were open to all US and UK workers and firstly asked a series of
general questions about perceptions of safety and security across a range of
countries, before focusing down on five countries commonly visited by US
and UK tourists. As a result, we can increase our pool of potential victims
fivefold. This also allowed us to put a new spin on the question of re-
victimisation: that is are there some tourists who experience re-
victimisation when they visit different countries? This study has recently
been extended with a follow-up survey of victims’ experiences and the
support they received from both formal and informal sources (Ozascilar and
Mawby 2022). It must be stressed that because our samples are non-random
and unrepresentative of the population at large, they will not tell us
anything reliable about the extent of crime against tourists. However, what
we can do is to compare tourists who are victimised on vacation with those
who are not or compare the experiences of those who suffer crime. That is
unlike earlier work we can come closer to answering questions about why
certain tourists are more prone to crime than others and why some are
victimised on more than one occasion. We initially theorised that variations
in risk could be broadly explained by two sets of variables: following
tourism researchers, tourist-style and vacation-style; and following
criminological theories relating to, inter alia, lifestyle theory and routine
activity theory. We hypothesise that tourists’ self-image and choice of
holiday type, as well as their vacation routines, may explain a considerable
amount of the variation between those who are victimised and those who
are not. While this research is ongoing, it illustrates the potential for
investigating alternative approaches to addressing tourists’ safety and
security.
Summary
While the relationship between tourism and crime is not commonly
addressed by criminologists, it is clearly an important issue. Tourists are
often identified as causing crime and public disorder in resort areas, tourists
appear overrepresented as victims and some tourist areas are crime
hotspots. This impacts on the quality of life of local residents and the
vacation experience of tourists. But it also affects the tourism industry,
where security and safety concerns impact on resorts’—or countries’—
popularity.
However, the information available to academics and policy-makers is
limited. This chapter thus combines a critique of what we know about the
relationship between tourism and crime with a discussion about alternative
data sources and how they might be improved. We begin with a review of
official statistics kept by the police. While these are commonly used by
academics, so much more could be done to make them of more direct
relevance to criminologists, tourism academics and practitioners. Moreover,
while other official records suffer many of the same limitations, they could
be utilised more imaginatively by researchers.
Interview data offers a potentially rich source of data to complement
official statistics. Here we discuss interviews with offenders, local residents
of tourist areas and tourists. None of these options is without difficulties. In
particular, accessing tourist victims in sufficient numbers to theorise about
why some tourists may be at increased risk is problematic, and we end this
chapter by tentatively suggesting the advantages of crowdsourcing
platforms as a strategy for better-informing academics and policy-makers to
improve crime reduction and harm reduction strategies.
Recommended Reading
Research on tourism and crime has been carried out by both tourism
academics and criminologists. This is reflected in two edited books,
Tourism, crime and international security issues, Chichester, Wiley, edited
by Pizam and Mansfeld (1996) and more recently Tourism, security and
safety: from theory to practice. Burlington, MA, Butterworth-Heinemann,
edited by Mansfeld and Pizam (2006). Two more recent readers with a more
criminological focus are Tourism and Crime: key themes, Oxford,
Goodfellow Publishers, edited by Botterill and Jones (2010), and The
Problem of Pleasure: leisure, tourism and crime, London, Routledge, edited
by Jones, Barclay and Mawby (2012), which addresses tourism within a
broader debate on the relationship between leisure and crime. The
difficulties of using crime statistics to assess tourists’ risk are discussed in
Mawby’s (2017) ‘Crime and Tourism: what the available statistics do or do
not tell us’, International Journal of Tourism Policy, 7.2, 81–91. The extent
of crime in tourist areas and involving tourists is consequently difficult to
assess, and we are largely dependent upon small-scale surveys, such as
Stangeland’s (1998) ‘Other targets or other locations? An analysts of
opportunity structures’, British Journal of Criminology, 38.1, 6 1–77;
Brunt, Mawby and Hambly’s (1999) ‘Victimisation on holiday: a British
survey’, International Review of Victimology, 6, 201–211 and Boakye’s
(2010) ‘Studying tourists’ suitability as crime targets’, Annals of Tourism
Research, 37, 727–743. For a review of the literature on risk, see Mawby,
Barclay and Jones’ (2010) ‘Tourism and victimisation’, pp. 319–344 in
International Handbook of Victimology, Boca Raton, Florida, CRC Press,
edited by Shoham, Knepper and Kett. Equally, security concerns in tourist
resorts are not generally addressed in the literature except in the context of
terrorism, and Brayshaw’s (1995) ‘Negative publicity about tourism
destinations: a Florida case study’, Travel and Tourism Analyst 5, 62–71, is
still regularly cited in this respect. More recent discussions of the impact of
security concerns, both crime and terrorist related, are found, for example,
in Alleyne and Boxill’s (2003) ‘The impact of crime on tourist arrivals in
Jamaica’, International Journal of Tourism Research, 5.5, 381–391, and
Lanouar and Goaied’s (2019) ‘Tourism, terrorism and political violence in
Tunisia: evidence from Markov-switching models’, Tourism Management,
70, 404–418. Mawby, Ozascilar and Ziyalar’s (2020) recent study includes
data on victimisation and compares tourists’ perceptions of safety as they
arrive and leave Istanbul: ‘Perceptions of safety confronted by experience:
how visitors to Istanbul modified their perceptions of risk and fear in the
light of personal experience’, International Review of Victimology, 26.3,
261–275. Nor has much been specifically written about crime reduction
measures. Exceptions include Botterill et al.’s (2013) ‘Violence,
backpackers, security and critical realism’, Annals of Tourism Research, 42,
311–333, and Pizam, Tarlow and Bloom’s (1997) ‘Making tourists feel safe:
whose responsibility is it?’, Journal of Travel Research, Summer, 23–28.
Finally, risk management in the light of a terrorist attack is addressed by
Agarwal, Page and Mawby (forthcoming) ‘Tourist security, terrorism risk
management and tourist safety’, Annals of Tourism Research.
References
ABI (Association of British Insurers) (2018) ‘One claim every minute—Travel insurance payouts
highest since 2010’, accessed at https://www.abi.org.uk/news/news-articles/2018/07/one-claim-
every-minute-travel-insurance-payouts-highest-since-2010/.
de Albuquerque, K. and McElroy, J. (1999) ‘Tourism and crime in the Caribbean’, Annals of Tourism
Research, 26.4, 968–984.
Allen, J. (1999) ‘Crime against international tourists’, NSW Bureau of Crime Statistics and
Research, 43. Retrieved from http://www.bocsar.nsw.gov.au/Documents/CJB/cjb43.pdf.
Alleyne, D. and Boxill, I. (2003) ‘The impact of crime on tourist arrivals in Jamaica’, International
Journal of Tourism Research, 5.5, 381–391.
Andrews H (2011) The British on holiday: charter tourism, identity and consumption. Bristol:
Channel View Books.
Barker, M., Page, S. J., and Meyer, D. (2002) ‘Modelling tourism crime. The 2000 America’s cup’,
Annals of Tourism Research, 29, 762––782.
Berkley, B.J. and Ala M. (2001) ‘Identifying and controlling threatening airline passengers’, The
Cornell Hotel and Restaurant Administration Quarterly 42.4, 6–23.
Boakye, K. A. (2010) ‘Studying tourists’ suitability as crime targets’, Annals of Tourism Research,
37, 727–743.
Botterill, D. and Jones, T. (eds) (2010) Tourism and Crime: key themes. Oxford:
Brayshaw, D. (1995) ‘Negative publicity about tourism destinations: a Florida case study’, Travel
and Tourism Analyst 5.5, 62–71.
Brantingham, P. and Brantingham, P. (1995) ‘Criminality of place: Crime generators and crime
attractors’, European Journal of Criminal Policy and Research, 3.3, 5–26.
Brunt, P., Mawby, R.I., and Hambly, Z. (1999) ‘Tourist victimisation and the fear of crime on
holiday’, Tourism Management, 21, 417–424.
Burgen, S. (2019) ‘Surge in violent crime in Barcelona prompts calls for legal reform’, Guardian, 23
August, accessed at https://www.theguardian.com/world/2019/aug/23/violent-crime-barcelona-legal-
reform-thieves-tourists.
Butler, G (1994) ‘Commercial burglary: what offenders say’, pp 29—41 in M Gill (ed) Crime at
work. Perpetuity Press, Leicester.
Calder, S. (2018) ‘Ryanair tops list of airlines disrupted by drunken passengers, survey finds’,
Independent, 28 December, accessed at https://www.independent.co.uk/travel/news-and-advice/
ryanair-alcohol-onboard-drunk-flight-plane-airlines-thomas-cook-tui-easyjet-drinks-a8702696.html.
Calder, S. (2019) ‘Brawl erupts on Wizz Air plane after drunk British tourist refuses to sit down,
making plane abort landing’, Independent, 16 May, accessed at https://www.independent.co.uk/
travel/news-and-advice/drunk-plane-brawl-wizzair-luton-budapest-british-tourists-arrest-a8917651.
html.
Carr, N. (2001). An exploratory study of gendered differences in young tourists’ perception of danger
within London. Tourism Management, 22, 565–570.
Carter, S. (1998) ‘Tourists’ and travellers’ social construction of Africa and Asia as risky locations’,
Tourism Management, 19.4, 349–358.
Chesney-Lind, M. and Lind, I.Y. (1986) ‘Visitors as victims: crimes against tourists in Hawaii’,
Annals of Tourism Research, 13, 167–191.
Chew, E.Y.T. and Jahari, S.A. (2014) ‘Destination image as a mediator between perceived risks and
revisit intention: a case of post-disaster Japan’, Tourism Management 40, 382–393.
Cohen, S. (2002) Folk devils and moral panics (3rd ed.). Abingdon: Routledge.
Coleman, C. and Moynihan, J. (1996) Understanding crime data. Buckingham: Open University
Press.
Davis, D., Allen, J. and Cosenza, R.M. (1988) ‘Segmenting local residents by their attitudes, interests
and opinions toward tourism’, Journal of Travel Research, 27.2, 2–8.
Difallah, D., Filatova, E., & Ipeirotis, P. (2017). Demographics and dynamics of Mechanical Turk.
Retrieved from http://www.ipeirotis.com/wp-content/uploads/2017/12/wsdmf074-difallahA.pdf.
Elliott, A. F. (2019) ‘TripAdvisor now flags reviews that allege sexual abuse took place at hotels’,
The Telegraph, 16 May, accessed at https://www.telegraph.co.uk/travel/news/tripadvisor-new-rating-
safety-alert-sexual-assault/.
European Forum for Urban Security (2015) Security and Tourism: Concerted Local Policies, EFUS,
Paris.
Fissel, E. R. (2018). ‘The reporting and help-seeking behaviours of cyberstalking victims’, Journal of
Interpersonal Violence, 1–26. https://doi.org/10.1177/0886260518801942.
Fuchs, G. and Reichel, A. (2011) ‘An Exploratory Inquiry into Destination Risk Perceptions and
Risk Reduction Strategies of First Time Vs. Repeat Visitors to a Highly Volatile Destination’,
Tourism Management, 32.2, 266–276.
Gill, M.L. (2000) Commercial robbery: offenders’ perspectives on security and crime prevention.
London: Blackstone Press.
Goldsmid, S., Fuller, G., Coghlan, S. and Brown, R. (2016) ‘Responding to unruly airline
passengers: The Australian context’, Australian Institute of Criminology: Trends & issues in crime
and criminal justice, no.510, accessed at http://www.aic.gov.au/publications/tandi/tandi510.
Gottlieb, A. (2017) ‘The effect of message frames on public attitudes toward criminal justice reform
for nonviolent offenses’, Crime and Delinquency, 63, 636–656.
Hall, C. M., and O’Sullivan, V. (1996) ‘Tourism, political stability and violence’, pp 105–121 in
Pizam, A. and Mansfeld, V. (eds.) Tourism, crime and international security issues. Chichester:
Wiley.
Harper, D.W. (2006a) ‘Planning in tourist robbery’, Annals of Tourism Research, 27.2, 517–520.
Harper, D.W. (2006b) ‘The tourist and his criminal: patterns in street robbery’, pp.125–137 in Pizam,
A. and Mansfeld, Y. (eds) Tourism, security and safety. Elsevier; Burlington, MA.
Ho, T., Zhao, J. and Dooley, B. (2017) ‘Hotel crimes: An unexplored victimization in the hospitality
industry’, Security Journal, 30.4, 1097–1111.
Holcomb, J. and Pizam, A. (2006) ‘Do incidents of theft at tourist destinations have a negative effect
on tourists’ decisions to travel to affected destinations?’, pp. 105–124 in Pizam, A. and Mansfeld, Y.
(eds) Tourism, security and safety. Elsevier; Burlington, MA.
Hook, L. (2018) ‘Holiday sickness fraud: Claims firms becoming “more creative”’, Business
Insurance UK, 24 January, accessed at https://www.insurancebusinessmag.com/uk/ news/hospitality/
holiday-sickness-fraud-claims-firms-becoming-more-creative-90225.aspx.
Homel, R., Haurtitz, M., McIllwain, G., Wortley, R. and Carvolth, R. (1997) ‘Preventing
drunkenness and violence around nightclubs in a tourist resort’, pp 263–282 in Clarke, R.V. (ed)
Situational crime prevention: Successful case studies (second edition). Guilderland, New York:
Harrow and Heston.
Hou, Y., and Zhang, K. (July 2020) ‘Space and Money: How and Why Crowding Influences
Tourists’ Sensitivity to Price Magnitude.’ Journal of Travel Research, https://doi.org/10.1177/
0047287520937082.
Hough, M. (1995). Anxiety About Crime: Findings from the 1994 British Crime Survey. Home Office
(Home Office Research Study no. 147); London.
Hua, N. and Yang, Y. (2017) ‘Systematic effects of crime on hotel operating performance’, Tourism
Management, 60, 257–269.
Irish Tourist Assistance Service (2020) Annual Report 2019, accessed 4 December 2020 at www.itas.
ie/wp-content/uploads/2020/07/2019-Annual-Report.pdf.
Johnny, L. and Jordan, L-A. (2007) ‘Tourism and Crime in the Caribbean: A case study of St Lucia’,
Annals of Leisure Research, 10.3–4, 475–497.
Karamustafa, K., Fuchs, G. and Reichel, A. (2013) ‘Risk perceptions of a mixed-image destination:
the case of Turkey’s first-time versus repeat leisure visitors’, Journal of Hospitality Marketing and
Management, 22.3, 243–268.
Kassam, A. (2014) ‘Naked Italians spark protests against antics of drunken tourists in Barcelona,
Guardian, 21 August, accessed 29 August 2019 at www.theguardian.com/world/2014/aug/21/naked-
italians-protests-drunken-tourists-barcelona.
King, B., Pizam, A. and Milman, A. (1993) ‘The social impacts of tourism on Nadi, Fiji as perceived
by its residents’, Annals of Tourism Research, 20, 650–665.
Korstanje, M.A. and Clayton, A. (2012) ‘Tourism and terrorism: conflicts and commonalities’,
Worldwide Hospitality and Tourism Themes, 4.1, 8–25.
Kozak, M., Crotts, J. C., & Law, R. (2007) ‘The impact of the perception of risk on international
travellers’, International Journal of Tourism Research, 9.4, 233–242.
Lanouar, C. and Goaied, M. (2019) ‘Tourism, terrorism and political violence in Tunisia: evidence
from Markov-switching models’, Tourism Management, 70, 404–418.
Lepp, A., and Gibson, H. (2003). ‘Tourist roles, perceived risk and international tourism’, Annals of
Tourism Research, 30.3, 606–624.
Levay, K. E., Freese, J., & Druckman, J. N. (2016). The demographic and political composition of
Mechanical Turk samples. SAGE Open, 6.1.
Matousex, M. (2019) ‘Sexual assault is the most common crime reported on cruise ships’, accessed
at https://www.businessinsider.com.au/most-common-cruise-ship-crime-sexual-assault-2019-4?r=
US&IR=T.
Marteache, N. (2018) ‘“Please refrain from locking your bags”: theft from passengers’ checked-in
luggage at US airports’, Security Journal, 31.1, 163–189.
Mawby, R.I. (2000) ‘Tourists’ perceptions of security: the risk-fear paradox’, Tourism Economics,
6.2, 109–121.
Mawby, R.I. (2008) ‘Understanding and responding to crime and disorder: ensuring a local
dimension’, Crime Prevention and Community Safety: an international journal, 10.3, 158–173.
Mawby, R.I. (2010) ‘Violent crime and tourists’, pp. 37–52 In Botterill, D. and Jones, T. (eds.)
Tourism and Crime: key themes. Oxford: Goodfellow Publishers.
Mawby, R.I. (2012) ‘Public disorder, antisocial behaviour and alcohol-related crime: from the
metropolis to the tourist resort’, in Jones, C., Barclay, E. and Mawby, R.I. (eds.) The Problem of
Pleasure: leisure, tourism and crime. London: Routledge.
Mawby, R.I. (2015) ‘Exploring the relationship between crime and place in the countryside’, Journal
of Rural Studies, 39 (June), 262–270.
Mawby, R.I. (2017) ‘Crime and Tourism: what the available statistics do or do not tell us’,
International Journal of Tourism Policy, 7.2, 81–91.
Mawby, R. I., and Jones, C. (2007) ‘Attempting to reduce hotel burglary: Implementation failure in a
multi-agency context’, Crime Prevention & Community Safety, 9.3, 145–166.
Mawby, R.I., Ozascilar, M. and Ziyalar, N. (2020) ‘Perceptions of safety confronted by experience:
how visitors to Istanbul modified their perceptions of risk and fear in the light of personal
experience’, International Review of Victimology, forthcoming.
Mazursky, D. (1989) ‘Past experience and future tourism decisions’, Annals of Tourism Research, 16,
333–344.
Mekinc, J., Mawby, R.I. and Trnavcevic, A. (2017) ‘Security and tourism in European cities—the
multiple case study’, Lex Localis—Journal of Local Self-Government, 15.3, 359–385.
Michalko, G. (2004) ‘Tourism eclipsed by crime: the vulnerability of foreign tourists in Hungary’,
Journal of Travel and Tourism Marketing, 15.2–3, 159–172.
Montolio, D. and Planells-Struse, S. (2016) ‘Does tourism boost criminal activity? Evidence from a
top touristic country’, Crime & Delinquency, 62.12, 1597–1623.
Office for National Statistics (2019) Crime in England and Wales: year ending March 2019, accessed
29 August 2019 at www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/
crimeinenglandandwales/yearendingmarch2019.
Ozascilar, M. and Mawby, R.I. (2022) ‘The impact of crime on tourists and the need for greater
support for tourist victims’, International Review of Victimology, 28, https://doi.org/10.1177/
02697580221080006.
Palan, S. and Schitter, C. (2018) ‘Prolific.ac—a subject pool for online experiments’, Journal of
Behavioral and Experimental Finance, 17, 22–27.
Peer, E., Brandimarte, L., Samat, S. and Acquisti, A. (2017) ‘Beyond the Turk: alternative platforms
for crowdsourcing behavioral research’, Journal of Experimental Social Psychology, 70, 153–163.
Pelfrey, W.V. (1998) ‘Tourism and crime: a preliminary assessment of the relationship of crime to the
number of visitors at selected sites’, International Journal of Comparative and Applied Criminology,
22.1–2, 293–304.
Peer, E., Vosgerau, J., & Acquisti, A. (2013). ‘Reputation as a sufficient condition for data quality on
Amazon Mechanical Turk’, Behavior Research Methods, 46, 1023–1031
Pickett, J.T., Roche, S.P. and Pogarsky, G. (2018) ‘Toward a bifurcated theory of emotional
deterrence’, Criminology, 56.1, 27–58.
Pizam, A. (1982) ‘Tourism and crime: is there a relationship?’, Journal of Travel Research, 20.3, 7–
10
Pizam, A. and Fleischer, A. (2002) ‘Severity versus frequency of acts of terrorism: which has a larger
impact on tourism demand?’, Journal of Travel Research, 40.1, 337–339.
Pizam, A. and Mansfeld, V. (eds) (1996) Tourism, crime and international security issues.
Chichester: Wiley.
Pizam, A. and Mansfeld, Y. (eds) (2006) Tourism, security and safety. Elsevier; Burlington, MA.
Pizam, A. and Smith, G. (2000) ‘Tourism and terrorism: a quantitative analysis of major terrorist acts
and their impact on tourist destinations’, Tourism Economics, 6.2, 123–138.
Prideaux, B. (1996) ‘The tourism crime cycle: a beach destination case study’, pp 59–76 in Pizam, A.
and Mansfeld, V. (eds) Tourism, crime and international security issues. Chichester: Wiley.
Qi, C. X., Gibson, H. J., and Zhang, J. J. (2009) ‘Perceptions of risk and travel intentions: the case of
China and the Beijing Olympic Games’, Journal of Sport and Tourism, 14.1, 43–67.
Reisinger, Y., and Mavondo, F. (2006). Cultural differences in travel risk perception. Journal of
Travel & Tourism Marketing, 20.1, 13–31.
Ross, G.F. (1992) ‘Resident perceptions of the impact of tourism on an Australian city’, Journal of
Travel Research (Winter), 13–17.
Schaaf, M.M. (2001) ‘Air rage: a policy research study’, The Collegiate Aviation Review
International, 19.1, 1–19.
Schaal, D. (2019) ‘TripAdvisor Responds to Critics by Changing How It Displays Hotel Reviews
About Sexual Assault’, Skift Research, 14 May, accessed at https://skift.com/2019/05/14/tripadvisor-
responds-to-critics-by-changing-how-it-displays-hotel-reviews-about-sexual-assault/.
Sönmez, S. F. and Graefe, A. R. (1998a) ‘Influence of terrorism and political instability’, Annals of
Tourism Research, 25.2, 416–456.
Sönmez, S. F., and Graefe, A. R. (1998b) ‘Influence of terrorism risk on foreign tourism decisions’,
Annals of Tourism Research, 25.1, 112–144.
Stangeland, P. (1998) ‘Other targets or other locations? An analysis of opportunity structures’, British
Journal of Criminology, 38.1, 61–77.
Tang, C.F. (2011) ‘An exploration of dynamic relationship between tourist arrivals, inflation,
unemployment and crime rates in Malaysia’, International Journal of Social Economics, 38.1, 50–
69.
Teye, V., Sönmez, S., and E. Sirakaya (2002). ‘Resident Attitudes toward Tourism Development’,
Annals of Tourism Research. 29.3, 668–688.
Thompson, A., and Pickett, J. (2019) ‘Are relational inferences from crowdsourced and opt-in
samples generalizable? Comparing criminal justice attitudes in the GSS and five online samples’,
Journal of Quantitative Criminology, 36, 907–932.
Tilley, N., Pease K., Hough, M. and Brown, R. (1999) Burglary prevention: early lessons from the
Crime Reduction Programme. London: Home Office (Crime Reduction Research Series Paper No.1).
Travel Mole (2018a) ‘State of emergency declared in Jamaica’, accessed at State of emergency
declared in Jamaica (travelmole.com).
Travel Mole (2018b) ‘Holidaymakers robbed at gunpoint at luxury resort’, accessed at https://www.
travelmole.com/news_feature.php?c=setreg®ion=2&m_id=_rdmbmn&w_id=35118&news_id=
2033923.
Travel Mole (2018c) ‘Jamaica hotel worker shot by victim after alleged double rape’, accessed at
https://www.travelmole.com/news_feature.php?c=setreg®ion=3&m_id=Y!Y!vT_Y!T_m&w_id=
35249&news_id=2034250.
Travel Mole (2019a) ‘Cruise lines’ summer crime surge revealed in US documents’, accessed at
https://www.travelmole.com/news_feature.php?c=setreg®ion=2&m_id=rdmbmn&w_id=36980&
news_id=2040443.
Travel Mole (2019b) ‘British pensioners deny cocaine trafficking on CMV cruise’, https://www.
travelmole.com/news_feature.php?c=setreg®ion=2&m_id=Y!Y!vT_Y!T_m&w_id=36699&
news_id=2039302.
Travel Mole (2020a) ‘Unruly American Airlines passenger tasered by police’, accessed at https://
www.travelmole.com/news_feature.php?c=setreg®ion=3&m_id=_rdmbmn&w_id=34514&news_
id=2032042.
Travel Mole (2020b) ‘Air rage passenger jailed for 14 months’, accessed at https://www.travelmole.
com/news_feature.php?c=setreg®ion=2&m_id=Y!Y!vT_Y!T_m&w_id=34832&news_id=
2033027.
Travel Mole (2020c) ‘Catholic priest charged with sexually harassing cruise ship employee’,
accessed at https://www.travelmole.com/news_feature.php?c=setreg®ion=3&m_id=_rdmbmn&
w_id=36911&news_id=2040155.
Travel Mole (2020d) ‘Mass brawl on P&O cruise, six injured; accessed at https://www.travelmole.
com/news_feature.php?c=setreg®ion=2&m_id=Y!Y!vT_Y!T_m&w_id=36499&news_id=
2038508.
TripAdvisor (2019b) ‘Traveler Safety on Tripadvisor: What Business Owners Need to Know’,
accessed at https://www.tripadvisor.com/TripAdvisorInsights/w5080.
Vakhitova, Z. I., Webster, J. L., Alston-Knox, C. L., Reynald, D. M., and Townsley, M. K. (2018).
Offender–victim relationship and offender motivation in the context of indirect cyber abuse: A
mixed-method exploratory analysis. International Review of Victimology, 24.3, 347–366.
Walters, G., Wallin, A. and Hartley, N. (2019) ‘The threat of terrorism and tourist choice behavior’,
Journal of travel research, 58.3, 370–382.
Weber, E. U. and Hsee, C. (1998) ‘Cross-cultural differences in risk perception, but cross-cultural
similarities in attitudes towards perceived risks, Management Science, 44.9, 1205–1217.
Wiles, P. and Costello, A. (2000) The ‘road to nowhere’: the evidence for travelling criminals.
London: Home Office (HO Research Study no.207).
Wright, R. and Decker, S. (1997) Armed robbers in action: stickups and street culture. Boston:
Northeastern University Press, accessed July 2019 at www.ncjrs.gov/pdffiles1/Digitization/
173837NCJRS.pdf.
Yang, E.C.L. and Nair, V. (2014) ‘Risk perception study in tourism: are we really measuring
perceived risk?’, Procedia—Social and Behavioral Sciences 144, 322–327.
Zara, C. (2018) ‘#MeToo rocks the boat: cruise lines see more sexual-assault reports in 2017’, Fast
Company, 21 February, accessed at https://www.fastcompany.com/40533120/metoo-rocks-the-boat-
cruise-lines-see-more-sexual-assault-reports-in-2017.
Footnotes
1 Although the editor of this volume was, as a young postdoctoral researcher, unsuccessful in an
Economic and Social Research Council (ESRC) application to spend his summer in Spain
investigating this phenomenon.
Part V
Security Products and Services
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_28
Alison Wakefield
Email: [email protected]
Introduction
Frontline private security is a thriving industry, with over 20 million private
security personnel estimated to be employed across the globe in both the
private and public sectors (Provost 2017). Although security officers’
primary task is to protect people and assets, their work profile is by no
means limited to this. While many of their functions are very similar to
those of police patrol officers, as Jones and Newburn (1998) demonstrated
through a case study of the multiple policing actors operating in a district of
London, their role often extends to a wider regulation of social life in the
sites they are employed to secure.
The employment of security officers has grown steadily in recent
decades to the point that they are ubiquitous throughout the world. The
substantial growth of private security in the post-Second World War period
was underpinned by a variety of social, political and economic factors.
Increased prosperity with more private property and consumer goods to
protect coincided with rising crime in many countries, especially from the
1970s to the 1990s. Improvements in security technology (especially alarm,
access control and closed circuit television systems) led to better and
cheaper security products that were ever more widely used as companies,
public institutions and private individuals became more security conscious.
The expansion of privately controlled, publicly accessible spaces ranging
from hypermarkets to airports delivered economies of scale to corporate
end users of frontline security, so that dedicated security teams could be
employed cost effectively to police such sites. Pressures on government
budgets have required the increased outsourcing of non-core tasks to the
private sector, and indeed, there has been a general growth in the sub-
contracting of security functions within both the public and private sectors.
The aim of this chapter is to provide an up-to-date review of the
literature on the key characteristics of frontline private security. It looks in
turn at its global scale and structure in terms of estimated officer numbers
and their distribution around the world, the range of functions and duties
associated with frontline security, working conditions, and perceptions of
the sector. This latter section is broken down into sub-sections based on the
perspectives of security officers themselves, in terms of their motivations
and job satisfaction, the public and the police. There has been extensive
new research since we contributed a similar chapter to the 2014 edition of
this handbook and, as well as reflecting much of this, we have placed more
focus on security officers’ job satisfaction and wellbeing to reflect
interesting new avenues in research over the last few years. This has
replaced material on security officers’ personal characteristics, working
conditions and training, where there appears to be less new research, with
the exception of the informative chapter on security officer training in this
volume by Garrett, Kitteringham and Livingstone. In the conclusion, we
argue that while frontline security has become an increasingly critical
element of national and organizational security systems in an era of
heightened international terrorism and cyber security threats across the
globe, the enduring challenge of poor pay, conditions and job satisfaction in
frontline security limits the effectiveness of those systems and requires
urgent attention.
Fig. 28.2 Percentage agree about views on security guards. (Source: Nalla et al. 2017c)
Conclusion
This chapter has examined the size and distribution of the frontline security
industry, not only in the developed democracies on which there has tended
to be more data but also in emerging and transitional economies. It
demonstrates the ubiquity of private security globally, as well as marked
variations between countries in the size of the industry, the ratio of security
officers to citizens, and the ratio of security officers to police officers.
Further research would be fruitful that sheds more light on the differences
in their global distribution.
Today’s security officers carry out broad ranging and often sophisticated
functions, as they are regularly placed in routine contact with the public and
often serve as first responders in the event of criminal or non-criminal
emergencies. They also offer additional ‘eyes and ears’ on the street,
building on what the state can do alone. Importantly, as reflected in
practical guidance for organizations in maintaining a motivated guard force
published by the UK’s CPNI ( 2016), they play a key role in nations’
protective security systems. In light of this, the fact that low pay,
challenging working conditions, low job satisfaction, high staff turnover
and high levels of stress are commonplace across the nations, with the
exception of a number of European countries, presents organizations and
nations with significant vulnerabilities. On a more positive note, as
recognition of their importance to public safety increases, there is evidence
across the globe of the public and the police warming to security personnel,
with the latter finding common ground to cooperate in many aspects of law
enforcement. Notably, however, their tasks extend well beyond policing
activities, many of these having little to do with crime, and much to do with
security officers’ continuous presence and flexibility to adapt to changing
needs and circumstances on behalf of those who employ them.
Key Readings
For an overview and discussion of emerging trends in the literature on
private policing and private security, a special issue of the Journal of
Contemporary Criminal Justice on ‘Security governance and private
policing: emerging issues and trends’, edited by Mahesh Nalla and Anna
Gurinskaya, is recommended reading (2020b, 36: 1). The second edition of
Mark Button’s comprehensive textbook (2019, Private Policing. 2nd ed.
London: Routledge) develops many of the themes covered in this chapter
and sets them in the context of the wider range of private actors that carry
out policing functions. Alison Wakefield’s latest book Security and Crime:
Converging Perspectives on a Complex World (2021, London: Sage) widens
the lens still further to consider many of the actors engaged in security on a
global scale, looking at different dimensions of provision (e.g. the
international, national and local) chapter by chapter and discussing frontline
security in the context of security provision at the local level. A special
section of the journal Conflict and Society on ‘Ethnographies of private
security’, edited by Erella Grassiani and Tessa Diphoorn (2017, 3: 1)
reviews the ethnographic literature to date and presents a number of newer
perspectives from around the world and in different areas of private
security. Also recommended are the research studies published annually by
Martin Gill and colleagues at Perpetuity Research in the UK as part of the
Security Research Initiative, on behalf of a consortium of UK sponsors and
supporters, in which frontline private security is a recurring theme (see
https://perpetuityresearch.com/security-research-initiative/).
References
Ahmad, A. and Mazlan, N. H. 2012. The kind of mental health problems and it association with
aggressiveness: a study on security guards. International Journal of Psychology and Behavioral
Sciences, 2(6), 237–44.
Arab News 2016. New Regulations to ensure better pay for security guards. 27 July. https://www.
arabnews.com/node/960376/saudi-arabia. Accessed 1 March 2021.
Abrahamsen, R. and Williams, M. C. 2005a. The Globalization of Private Security. Country Report:
Nigeria. University of Wales: Aberystwyth.
Abrahamsen, R. and Williams, M. C. 2005b. The Globalization of Private Security. Country Report:
Kenya. University of Wales: Aberystwyth.
Abrahamsen, R. and Williams, M. C. 2005c. The Globalization of Private Security. Country Report:
Sierra Leone. University of Wales: Aberystwyth.
Baresh, M. 2020. Private Security Companies in Syria: New Agents at the Regimes Service.
Florence: European University Institute.
Bennett, J.R. 2009. India’s Private Security Metamorphosis. Zurich: ETH Zurich Centre for Security
Studies.
Berg, J. and Howell, S. 2017. The private security complex and its regulation in Africa: select
examples from the continent, International Journal of Comparative and Applied Criminal Justice,
414., pp. 273–286.
Bradley, T. 2016. Governing private security in New Zealand. Australian and New Zealand Journal
of Criminology, 492, 159–178.
Bradley, T. 2020. “Safe” and “suitably qualified”: Professionalising private security through
mandatory training: a New Zealand case study. International journal of comparative and applied
criminal justice, Online First, 1–14. e, https://doi.org/10.1080/01924036.2020.1719528.
[Crossref]
Brough, M. and Brown, D. 1989. Every Retailers Guide to Loss Prevention, North Vancouver: Self-
Counsel Press.
Bureau of Labor Statistics. 2020. Occupational Employment and Wages, May 2020. https://www.bls.
gov/oes/current/oes339032.htm. Accessed 1 March 2021.
Bureau of Labor Statistics. 2021a. Labor Force Statistics from the Current Population Survey. https://
www.bls.gov/cps/cpsaat11.htm. Accessed 1 March 2021.
Bureau of Labor Statistics. 2021b. Security Guards and Gambling Surveillance Officers:
Occupational Outlook Handbook. https://www.bls.gov/ooh/protective-service/security-guards.htm.
Accessed 1 March 2021.
Cannizzaro, E., Cirrincione, L., Mazzucco, W., Scorciapino, A., Catalano, C., Ramaci, T. and Plescia,
F. 2020. Night-time shift work and related stress responses: a study on security guards. International
Journal of Environmental Research and Public Health, 17(2): 562.
Centre for the Protection of National Infrastructure. 2016. Motivation within the security industry.
https://www.cpni.gov.uk/professionalising-security. Accessed 1 March 2021.
Confederation of European Security Services and UNI-Europa 2004. Panoramic Overview of Private
Security Industry in the 25 Member States of the European Union, Wemmel, Belgium: CoESS. and
UNI-Europa.
Confederation of European Security Services 2011. Private Security Services in Europe: CoESS
Facts and Figures 2011. Brussels: COESS.
Confederation of European Security Services 2017. Facts and Figures: Private Security in Europe
2015. Brussels: COESS.
Connors, E., Cunningham, W., Ohlhausen, P., Oliver, L. and van Meter, C. 2000. Operation
Cooperation: Guidelines for Partnerships Between Law Enforcement and Private Security
Organizations. Rockville, MD: Bureau of Justice Assistance Clearinghouse.
Cortese, V., Dryon, P. and Valkeneers, A. (2003). Private security and work organisation. Brussels:
Centre de Sociologie du Travail, de l’Emploi et de la Formation de l’Université Libre de Bruxelles.
Cunningham, W.C. and Taylor, T.H. 1985. Private security and police in America: The Hallcrest
report (p. 186). Portland: chancellor Press.
Diphoorn, T. (2020) ‘Arms for mobility’: policing partnerships and material exchanges in Nairobi,
Kenya, Policing and Society, 30(2): 136–152.
de Goede, M. 2008. Private and public security in post-war Democratic Republic of Congo. In S.
Gumedze (ed.) The private security sector in Africa – country series, 35–68. ISS Monograph Series
146. http://www.issafrica.org/uploads/MONO146FULL.PDF. Accessed 1 March 2021.
Federation of Indian Chamber of Commerce and Industry. 2018. Private security industry: job
creation and skills development https://www.securitylinkindia.com/report/2018/09/10/private-
security-industry-job-creation-and-skill-development/. Accessed 1 March 2021.
Florquin, N. 2011. Small Arms Survey 2011: States of Security. Cambridge: Cambridge University
Press.
Freedonia 2017. Global security services market by type, market and region (12th ed.) Cleveland,
OH: Freedonia.
Garrett, D., Kitteringham, G. and Livingstone, K. 2022. Training and education within the security
sector: challenges and opportunities for development. In Gill, M. (ed.), The Handbook of Security
(3rd ed.). Basingstoke: Palgrave.
Gill, M.L. (editor) 2003. Managing Security. Crime at Work Series, Volume III. Leicester: Perpetuity
Press.
Gill, M. 2004. Uniformed retail security officers. Tunbridge Wells: Perpetuity Research and
Consultancy International.
Gill, M. and Howell, C. 2012. The security sector in perspective. Tunbridge Wells: Perpetuity
Research and Consultancy International.
Gill, M., Owen, K. and Lawson, C. 2010. Private security, the corporate sector and the police:
opportunities and barriers to partnership working. Tunbridge Wells: Perpetuity Research and
Consultancy International.
Gooptu, N. 2013. Servile sentinels of the city: private security guards, organized informality, and
labour in interactive services in globalized India. International Review of Social History, 58(1): 9–38.
Grassiani, E. and Diphoorn, T. (eds.) 2017. Ethnographies of private security, special section of
Conflict and Society, 3:1.
Grand View Research 2017. Security market size worth $167.12 billion by 2025 | CAGR: 10.3%.
Available at https://www.grandviewresearch.com/press-release/global-security-market. Accessed 1
March 2021.
Hummer, D. and Nalla, M. 2003. Modeling future relations between the private and public sectors of
law enforcement. Criminal Justice Studies, 16(2): 87–96.
Issa, W. 2012. Police reject call for UAE security guards to be armed. 26 September https://www.
thenationalnews.com/uae/police-reject-call-for-uae-security-guards-to-be-armed-1.380098. Accessed
1 March 2021.
Janković, B., Cvetković, V. M. and Ivanov, A. 2019. Perceptions of private security: a case study of
students from Serbia and North Macedonia. Journal of Criminalistics and Law, 24(3): 59–72.
Janković, B., Cvetković, V.M., Milojevic, S. and Ivanović, Z. (2021) Relations between police and
private security officers: a case study of Serbia. Security Journal. https://doi.org/10.1057/s41284-
021-00289-z.
Jones, T. and Newburn, T. 1998. Private security and public policing. Clarendon Press.
Jovanović, J., Šarac, I., Jovanović, S., Sokolović, D., and Govedarović, N. (2021) The relationship
between occupational stress, health status, and temporary and permanent work disability among
security guards in Serbia. International Journal of Occupational Safety and Ergonomics, 27(2): 425–
441.
Kakalik, J.S. and Wildhorn, S. 1971. Private Security in the United States, Santa Monica, California:
RAND Corporation.
Ken Research 2018. Middle East manned guard security market outlook to 2022 – by countries
Turkey, KSA, UAE, Iraq, Iran, Jordan, Israel, Qatar, Egypt, Kuwait, Oman., by organized and
unorganized, by end users commercial buildings, government buildings, and residential units.
October. https://www.kenresearch.com/manufacturing-and-construction/real-estate/middle-east-
guard-security-market/165956-97.html#TOC. Accessed 1 March 2021.
Kirunda, S.W. 2008. Private and public security in Uganda. In S. Gumedze (ed.) The private security
sector in Africa – country series, 1–34. ISS Monograph Series 146. http://www.issafrica.org/uploads/
MONO146FULL.PDF. Accessed 1 March 2021.
Kitteringham, G. 2017. Security Practitioners Perspectives of the Alberta Basic Security Training
Programme, Professional Doctorate Thesis. Portsmouth: University of Portsmouth.
Koeppen, B. and Hopkins, M. 2020. Security guards as victims of violence: using organisational
support theory to understand how support for victims could have positive implications for the
security industry. Security Journal, 1–24. Online first 29 August 2020. https://doi.org/10.1057/
s41284-020-00257-z.
Leino, T. 2013. Work-related violence and its associations with psychological health: a study of
Finnish police patrol officers and security guards, People and Work Research Reports 98. Helsinki:
Finnish Institute of Occupational Health.
Leino, T. M., Selin, R., Summala, H. and Virtanen, M. 2011. Violence and psychological distress
among police officers and security guards. Occupational medicine, 61(6): 400–406.
Löfstrand, C., Loftus, B. and Loader, I. 2016. Doing dirty work: stigma and esteem in the private
security industry. European Journal of Criminology, 13(3): 297–314.
Lim, S.L.S. and Nalla, M.K. 2014. Attitudes of private security officers in Singapore towards their
work environment. Journal of Applied Security Research, 9(1): 41–56.
Manzo, J. 2010. How private security officers perceive themselves relative to police. Security
Journal, 23(3): 192–205.
Moreira, S., Cardoso, C. and Nalla, M.K. 2015. Citizen confidence in private security guards in
Portugal. European journal of criminology, 12(2): 208–225.
Nalla, M.K. and Heraux, C. G. 2003. Assessing goals and functions of private police. Journal of
criminal justice, 31(3): 237–247.
Nalla, M. K., Paek, S. Y. and Lim, S. S. 2017. The influence of organizational and environmental
factors on job satisfaction among security guards in Singapore. Australian and New Zealand Journal
of Criminology, 50(4): 548–565.
Nalla, M.K. and Cobbina, J. E. 2017. Environmental factors and job satisfaction: the case of private
security guards. Security Journal, 30(1): 215–226.
Nalla, M.K. and Gurinskaya, A. 2020a. Private police and security governance: Mapping emerging
trends and future directions. Journal of Contemporary Criminal Justice, 36(1): 4–18.
Nalla, M.K. and Gurinskaya. A. eds. 2020b. Security governance and private policing: emerging
issues and trends, special issue of the Journal of Contemporary Criminal Justice, 36(1).
Nalla, M.K. and Hummer, D. 1999a. Assessing strategies for improving law enforcement/security
relationships: implications for community policing. International Journal of Comparative and
Applied Criminal Justice, 23(2): 227–239.
Nalla, M.K. and Hummer, D. 1999b. Relations between police officers and security professionals: a
study of perceptions. Security Journal ,12(3): 31–40.
Nalla, M.K. and Hwang, E. 2004. Assessing professionalism, goals, images, and nature of private
security in South Korea. Asian Policing, 21: 104–121.
Nalla, M.K. and Lim, S.L.S. 2003. “Students’ perceptions of private police in Singapore.” Asian
Policing, 11: 27–47.
Nalla, M.K. and Newman, G. 1990. A Primer in Private Security. New York: Harrow and Heston.
Nalla, M.K. and Newman, G. 1991. Public versus private control: a reassessment, Journal of
Criminal Justice, 19: 537–547.
Nalla, M.K., Gurinskaya, A. and Rafailova, D. 2017b. Youth perceptions of private security guard
industry in Russia. Journal of Applied Security Research, 12(4): 543–556.
Nalla, M.K., Johnson, J., and Meško, G. 2009. Are police and security personnel warming up to each
other? A comparison of officers attitudes in developed, emerging, and transitional economies.
Policing: An International Journal of Police Strategies and Management, 32(3): 508–525.
Nalla, M.K., Lim, S., and Demirkol, I. 2015. The relationship between goal difficulty, goal
specificity, rewards, and job satisfaction: a study of Singapore security guards. Security Journal,
28(4): 392–409.
Nalla, M.K., Maxwell, S. R. and Mamayek, C. M. 2017c. Legitimacy of private police in developed,
emerging, and transitional economies. European Journal of Crime, Criminal Law and Criminal
Justice, 25(1): 76–100.
Nalla, M.K., Meško, G., Sotlar, A., and Johnson, J. 2006. Professionalism, goals, and the nature of
private police in Slovenia. Journal of Criminal Justice and Security 8(3 and 4): 309–322.
Nalla, M.K., Ommi, K., and Murthy, A.S. 2013. Nature of work, safety, and trust in private security
in India: a study of citizen perceptions of security guards. In N. Prabha Unnithan (ed.) Crime and
Justice in India, 226-243. Los Angeles: Sage.
Nalla, M.K., and Wakefield, A. 2014. The security officer. In The handbook of security (pp. 727–
746). Palgrave Macmillan, London.
Noronha, E., Chakraborty, S. and D’Cruz, P. 2020. Doing dignity work: Indian security guards
interface with precariousness. Journal of Business Ethics, 162(3): 553-575.
Oringer, K. 2020. COVID-19 and the guarding industry. –, 7 April 2020. https://www.
securitymagazine.com/articles/92031-covid-19-and-the-guarding-industry. Accessed 1 March 2021.
Paek, S. Y., Nalla, M. K. and Lee, J. 2020. Private security officers willingness to cooperate with
police: the role of procedural justice. Policing and Society, 1–16. https://doi.org/10.1080/10439463.
2020.1773824.
Paek, S. Y. 2021. Correlates of private security officers job satisfaction in South Korea, International
Journal of Comparative and Applied Criminal Justice, https://doi.org/10.1080/01924036.2021.
1899001.
Provost, C. 2017. The industry of inequality: why the world is obsessed with private security, The
Guardian, 12 May. https://www.theguardian.com/inequality/2017/may/12/industry-of-inequality-
why-world-is-obsessed-with-private-security. Accessed 1 March 2021.
Shapland, J. 1999. Private worlds: social control and security in Britain, in J. Shapland and L. van
Outrive (eds.) Police et Sécurité: Contrôle Social et L’Interaction Publique-Privé (Policing and
Security: Social Control and the Public-Private Divide). Paris: L’Harmattan.
Shearing, C.D., Stenning, P.C. and Addario, S.M. 1985 Public perceptions of private security.
Canadian Police College Journal, 9(3): 225–253.
Shearing, C.D., Farnell, M.B. and Stenning, P.C. 1980. Contract Security in Ontario, Toronto: Centre
of Criminology, University of Toronto.
Singh, A. M. and Light, M. 2019. Constraints on the growth of private policing: a comparative
international analysis. Theoretical criminology, 23(3): 295–314.
Stenning, P C. 2000. Powers and accountability of private police. European Journal on Criminal
Policy and Research, 8(3): 325–352.
Talas, T., Button, M., Doyle, M. and Das, J. (2021) Violence, abuse and the implications for mental
health and wellbeing of security operatives in the United Kingdom: the invisible problem, Policing
and Society, 31(3): 321–336.
United States and National Advisory Committee on Criminal Justice Standards. 1976. Private
Security: Report of the Task Force on Private Security. Department of Justice, Law Enforcement
Assistance Administration, National Advisory Committee on Criminal Justice Standards and Goals.
Upadhyaya, S. and Giri, V.V. 2011. Plight and predicament of security guards engaged by private
security agencies in India. International Journal of Management Sciences, 7(1): 1–10.
van Steden, R. and Nalla, M. K. 2010. Citizen satisfaction with private security guards in the
Netherlands: Perceptions of an ambiguous occupation. European Journal of Criminology, 7(3): 214–
234.
Vanheule, S., Declercq, F., Meganck, R. and Desmet, M. 2008. Burnout, critical incidents and social
support in security guards. Stress and Health: Journal of the International Society for the
Investigation of Stress, 24(2): 137–141.
Wakefield, A. 2003. Selling Security: The Private Policing of Public Space. Cullompton, Devon:
Willan Publishing.
Wakefield, A. 2021. Security and Crime: Converging Perspectives on a Complex World. London:
Sage.
Walsh, W. 1989. Private/public stereotypes: a different perspective. Security Journal, 1(1): 21–27.
Wiles, P. and McClintock, F.H. 1972. The Security Industry in the United Kingdom: Papers
presented to the Cropwood Round-Table Conference, July 1971. Cambridge: Institute of
Criminology, University of Cambridge.
Yadav, N. and Kiran, U.V. (2015) Occupational stress among security guards. Journal for Studies in
Management and Planning, 1(7): 21–31.
Yasaransi, E.T.J. (2019) The impact of occupational stress on mental health of the security guards.
Adhyatma: A Journal of Management, Spirituality, and Human Values, July–December: 32–46.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_29
Glen Kitteringham
Email: [email protected]
Ken Livingstone
Email: [email protected]
Abstract
This chapter explores the much-neglected topic of security training
focussing in particular on security officers including the extent to which the
training received is fir for purpose. They make a case for increased training
and the creation of career pathways to raise standards and professionalise
the service.
Introduction
There is longstanding evidence that private security numbers exceed those
for public policing and that this is not limited to a single country (Button
2007; Cunningham et al. 1990; Blackstone and Hakim 2013). In addition,
private security has grown to become one of the largest services sector
employers globally (Button 2019). Security officers number in the millions
(Nalla and Wakefield 2014), yet their training levels, qualification and
career advancement opportunities are limited (Wakefield 2006; Thumala et
al. 2011; Button 2019). As private security expands in both scale and remit,
questions about officers’ competence and capability are increasingly
important.
This chapter aims to examine issues surrounding the training of security
officers and highlight how the officers’ role has outstripped existing
training provisions. It begins by looking at how the importance of security
officers has changed in recent years as they have taken on new tasks, while
at the same time remaining shackled to a negative public image. This
chapter considers the extent to which security officer training is fit for
purpose and examines the benefits and limitations of regulation. Finally, it
makes a case for increased training for security officers and the creation of
career pathways to raise standards, to incentivise and professionalise the
service, and to dispel a dated image that does the security sector no service.
+ -
+ -
Training • Direct engagement with trainer and • Cost of trainers
room other learners • Cost of training room(s)
• Good for physical demonstrations • Fixed time and place
• Flexibility of content
E- • Highly cost effective over time • Reduced interaction
Learning • Standardised content and delivery • Initial costs can be high
• Learn at any time and place • Requires learners to be confident with
• Easily repeated the technology
• Learners need access to computers and
Internet
Regulation
The regulation of private security has always been contentious (George and
Button 2000). Currently, where regulated training programmes exist, they
vary significantly in content, but they do assure that a minimum standard
has been met. Regulated training does not seek to raise the bar significantly
but provides a safety net preventing standards from falling below a certain
level.
Regulation with its requirement to acquire minimum standards of
training has provided an impetus. Certainly, this has had its successes, the
‘hand of government’ approach has been positive in that in some countries
and territories where the security sector itself could not or would not raise
standards, governments have successfully applied a regulated model.
However, there are limitations too; the problem with regulated security
officer training is that rather than the standard being the stepping off point
for additional improvement, it is often the sole requirement, with some
countries requiring no upskilling or refresher training.
In countries where follow-on training does exist (e.g. New Zealand and
South Africa), it provides a valuable route for progression to supervisory
and junior management roles. This, though, is the exception not the rule.
Typically, regulation is only applied to entry-level generic guarding roles. It
has failed to raise the entry standard to a level that either challenges a
candidate’s ability or improves it. And, ironically, it generally does not
apply to those who supervise or manage frontline security personnel. This
has an effect on quality; in 2015, a report written by the Australian national
training regulator, the Australian Skills Quality Authority, argued that
inconsistent licensing arrangements and inadequate training posed risks to
the public due to security guards not carrying out their duties safely.
Many within the security sector championed regulation in the UK,
Canada, the United States and elsewhere, as they wanted to improve
standards, and some professional bodies have applied their own
professional standards (Button 2019). However, beyond setting a minimum
entry level, the introduction of regulated training has changed little.
Barriers to Progression
Entry into the security sector as a security officer is undemanding and
straightforward due to the lack of entry criteria for most roles often
attracting those with low skills. With the bar set low, the role also often
attracts those who struggle to find work in other industries and ‘the vast
majority end up in security by chance’ (Gill et al. 2020, p. 4).
The security sector is disparate (Griffiths et al. 2010) and fragmented,
consisting of a mix of small, medium and large security providers (van
Steden and de Waard 2013). Large security providers are in the minority,
with the majority being small and medium-sized. Within these small and
medium-sized companies, opportunities to advance may be limited due to
their size and profile (Garrett 2016). They typically do not create a culture
of developing their staff due to their limited capacity. Unless the client
specifies a specific training requirement and is willing to pay for it, there is
no incentive or advantage to provide additional training. In larger
companies, security officers have more chance to progress; however, most
have little support from their employer and must be highly self-motivated
(Gill et al. 2020).
Adendorff (2009) reminds us that any recognised discipline training and
education provide occupational boundaries, thus creating entry criteria.
And, for security officers aspiring to lateral or vertical movement, training
and education would greatly assist them. It would make transparent the
requirements for promotion and allow progress beyond the existing glass
ceiling (Button 2011). In many countries, however, such training and
education models are yet to be developed (Bietsch 2018).
Security officers who are able to progress are likely to be promoted
based on good existing operational performance. However, they are seldom
promoted based on proven competence for the intended role; instead, they
are petered into supervisory, and occasionally management, roles based on
their ability to do their previous job. They are generally not provided with
the training and education they need for their next role (Garrett 2016).
Being a good security officer does not mean that person will make a good
supervisor. If they are not provided with the requisite training as part of a
development plan, they will likely go into their new role ill-equipped to
succeed.
A further block to professional development and progression with
frontline staff often in a dead-end role (Button 2011) is that the managers
responsible for security officers often ‘parachute in’ from other professions
or managerial roles. Those managers are often ex-police or military. An
early study of security managers was conducted in the UK by Hearnden and
Security Industry Training Organisation (Hearnden 1993), who reported
that ex-police or military personnel made up 70 per cent of security
manager roles. Historically, these managers did not themselves engage in
training and this deprioritised training creating barriers to progression in the
sector (Wakefield and Button 2014).
Going forward, Wakefield and Button (2014) observe that ex-service
personnel continue to make up a large proportion of security managers. In a
scoping study of over 400 American private security executives, ASIS
(2013) profiled security directors as 93 per cent male, 50 years of age, with
25 years’ sector experience, with 63 per cent having a military or police
background.
However, external recruitment to management positions erodes the need
for a career pathway from security officer to security manager. This has
created a catch-22 scenario; the role of security officer does not attract high
calibre candidates as there is little or no opportunity to progress. And,
because there are few calibre candidates, managers are brought in from
elsewhere rather than promoted upwards.
Finally, historically, there was little or no provision for security officers
to progress, as there was no real career path (Montgomery and Griffiths
2015; Garrett 2016; Bietsch 2018). This has changed in the last several
years as the issue of career pathways is gaining attention (Gill et al. 2020,
pp. 15, 67). Baruch (2004) likens career paths to mountains. The employee
represented as the climber needs clear direction and guidance on how to
climb the mountain and achieve its summit. The summit in the case of
private security is the post of Chief Security Officer (CSO) as identified by
ASIS’s Security Industry Career Pathways Guide ( 2015). Employees
should be able to see the summit, aspire to reach it and work towards it.
ASIS (2015) informs us that there needs to be a defined position and
responsibilities for each role, required education and credentials, and
specialised knowledge and competencies.
Clearly defined roles and responsibilities are crucial in career paths, and
training and education are vital components of those pathways (Wakefield
and Button 2014). Moreover, while career planning documents exist
(Apollo Education Group 2015; Barnard and Lubbe 2013; Palacios 2019;
University of Phoenix 2014), there is little evidence that they are well
known to security personnel.
Conclusion
Security officers provide an increasing range of services in both the
commercial and public spheres. The growing demands made on them by an
evolving role and new technologies have, however, outstripped their current
training provision. At a time when the security sector as a whole has taken
enormous strides forwards in terms of the expertise, qualification and the
image of its managers, it is disappointing to see security officers left behind
after the initial benefits achieved by regulation. That the widespread
negative image of ‘guards’ still holds sway amongst the media and the
public is an issue that cannot continue to go unchallenged by a sector
committed to professionalism.
Regulation has, in part, provided an answer and has moved the guarding
sector forward, but it is not the whole answer. As it has done for its
management levels, the security sector must look to itself to create a
difference. The sector has an opportunity to further professionalise by
providing the training and career pathways needed by security officers, their
clients and indeed by the sector as a whole.
In conjunction with qualified trainers and education providers, and by
embracing new teaching approaches and new learning technologies, the
upskilling of security officers represents an opportunity for excellence that
should not be missed.
Recommended Readings An early introduction to the rise of private
policing and its implications can be found in Shearing and Stenning’s 1981
paper. Button has written extensively regarding the development of the
private security sector as he provided critical insights into the character,
culture, working conditions and training of security officers (Button 2008),
as well as the role and regulation of security officers. His 2019 book
provides a comprehensive examination of private security’s involvement in
public policing, including an overview and assessment of the role and remit
of security officers. In addition, the comparative training of security officers
in the European is covered by Button and Stiernstedt in their (Button and
Stiernstedt 2018) paper. For an examination of the often-negative
perception of security officers and their roles, see Thumala, Goold and
Loader’s (Thumala et al. 2011) paper and Löfstrand, Loftus and Loader’s
Löfstrand et al. 2016 paper. A final paper of note is the research undertaken
by Gill, Howell, Kitteringham, Goldstraw-White and Ramm in The
Competence of Frontline Security Officers and what they say about their
work (2021). This research looks at security officer duties and task
complexity.
Bibliography
Adendorff, D. (2009). “In a culture where perceptions count more than reality, it is unsurprising that
security practitioners call themselves professionals before the actual professionalization of their
occupation. (Unpublished MSc Dissertation). Loughborough University, UK.
Apollo Education Group. (2015). Competency Models for Enterprise Security and Cybersecurity:
Research-Based Frameworks for Talent Solution.
ASIS (2013). Enterprise Security Risks and Workforce Competencies: Findings from an Industry
Roundtable on Security Talent Development.
Barbazette. (2014). Analyzing Needs to Select the Best Delivery Method. In E. Biech (Ed.) ASTD
Handbook: The Definitive Reference for Training & Development (pp. 145-154). Alexandria: ASTD
Press.
Barnard, A. & Lubbe, L. (2013). Security guarding: a competency model. South African Journal of
Labour Relations. 37(1), 79-96.
Bayley, D. H. & Shearing, C. D. (1996) The Future of Policing. Law & Society Review. [Online] 30
(3), 585–606.
Bietsch, T. (2018) National Standardization for Private Security Officer Training and Hiring
Practices. A Masters Thesis. American Public University.
Blackstone, E. A. & Hakim, S. (2013) Competition Versus Monopoly in the Provision of Police.
Security Journal. [Online] 26 (2), 157–179.
Baruch, Y. (2004). Transforming careers: from linear to multidirectional career paths: organizational
and individual perspectives. Career development international, 9(1), 58-73.
[Crossref]
Button, M. (2007) Assessing the Regulation of Private Security Across Europe. European Journal of
Criminology. [Online] 4 (1), 109–128.
Button, M. (2008) Doing Security: Critical Reflections and an Agenda for Change. Crime prevention
and security management. Basingstoke [England]; New York: Palgrave Macmillan.
Button, M. (2011). The Private Security Industry Act 2001 and the security management gap in the
United Kingdom. Security Journal, 24(2), 118-132.
[Crossref]
Button, M. and George, B., 2006. Regulation of private security: Models for analysis. In Handbook
of security (pp. 563-585). Palgrave Macmillan.
Button, M. & Stiernstedt, P. (2018) Comparing Private Security Regulation in the European Union.
Policing and Society. [Online] 28 (4), 398–414.
Carliner, S. (2010). Competencies for training and development professionals. Toronto: CSTD Press.
Cragin, R. K. & Padilla, P. (2017) Old Becomes New Again: Kidnappings by Daesh and Other
Salafi-Jihadists in the Twenty-First Century. Studies in Conflict & Terrorism. [Online] 40 (8), 665–
683.
Crawford, A. (ed.) (2005) Plural Policing: The Mixed Economy of Visible Patrols in England and
Wales. Researching criminal justice series. Bristol: Policy Press.
Cunningham, W. C. et al. (1990) Private Security Trends, 1970 to 2000: the Hallcrest report II.
Boston: Butterworth-Heinemann.
Dalton, D. R. (2003) Rethinking Corporate Security in the Post-9/11 Era. Amsterdam Boston:
Butterworth-Heinemann.
Fennelly, L.J. & Perry, M.A. (2017). Careers in Security, Third Edition. Naples: International
Foundation for Protection Officers.
Garrett, D. (2016) Private Security Career Paths: Establishing the Foundations of a Structured
Progression Model for the Manned Guarding Sector. Portsmouth: University of Portsmouth.
George, B. & Button, M. (2000) Private Security. Vol. 1: Leicester: Perpetuity Press.
Gill, M, Howell, C, McGeer, C. (2020). Understanding influences on security career/job choice: what
those work working in the security sector think. Security Research Initiative.
Goldstein, M.L. (2013). Challenges Associated with Federal Protective Service’s Contract Guards
and Risk Assessment at Federal Facilities. Washington: United States Government Accountability
Office.
Griffiths, M. et al. (2010) Defining the Security Professional: Definition Through a Body of
Knowledge. 3rd Australian Security and Intelligence Conference.
Hearnden, K. & Security Industry Training Organisation (1993) The Management of Security in the
U.K.: A Research Survey. Loughborough: Centre for Extension Studies, Loughborough University of
Technology and the Security Industry Training Organisation.
Jaworski, C. et al. (2018) The Effects of Training Satisfaction, Employee Benefits, and Incentives on
Part-Time Employees’ Commitment. International Journal of Hospitality Management. [Online]
741–12.
Kakalik, J. S. & Wildhorn, S. (1971) The law and Private Police. [Rand Corporation. Rand report] ;
R-872/DOJ Accessed from https://nla.gov.au/nla.cat-vn209887. Washington D.C.: Santa Monica,
Calif: U.S. Dept of Justice, Law Enforcement Assistance Administration, National Institute of law
Enforcement and Criminal Justice Rand.
Kezeli, R. (2016). The Private Security Industry; The Development of Higher Educational Training
Standards. American Military University.
Kirschenbaum, A. & Rapaport, C. (2017) Does Training Improve Security Decisions? A Case Study
of Airports. Security Journal. [Online] 30 (1), 184–198.
Kolb, D. A. (1984). Experience as the source of learning and development. Upper Saddle River:
Prentice-Hall.
Livingstone, K. & Hart, J. (2003) The Wrong Arm of the Law? Public Images of Private Security.
Policing and Society. [Online] 13 (2), 159–170.
Löfstrand, C., Loftus, B. and Loader, I., 2016. Doing ‘dirty work’: Stigma and esteem in the private
security industry. European journal of criminology, 13(3), pp. 297–314.
[Crossref]
Lubbe, L.L. and Barnard, A., 2013. Security guarding: a competency model. South African journal of
labour relations, 37(1), pp. 79–96.
Manzo, J. (2006) ‘You Can’t Rent a Cop’: Mall Security Officers’ Management of a ‘Stigmatized’
Occupation. Security Journal. [Online] 19.
Manzo, J. (2009) Security Officers’ Perspectives on Training. Canadian Journal of Criminology and
Criminal Justice. [Online] 51 (3), 381–410.
McIlhatton, D. et al. (2018) Protecting Crowded Places from Terrorism: An Analysis of the Current
Considerations and Barriers Inhibiting the Adoption of Counterterrorism Protective Security
Measures. Studies in Conflict & Terrorism. [Online] 20 (1), 1–22.
Montgomery, R. and Griffiths, T., 2015. The Use of Private Security Services for Policing. Research
report: 2015–R041.
Nalla, M. K. & Crichlow, V. J. (2017) Have the Standards for Private Security Guards Become More
Stringent in the Post 9/11 Era? An Assessment of Security Guard Regulations in the Us from 1982 to
2010. Security Journal. [Online] 30 (2), 523–537.
Nalla, M. & Wakefield, A. (2014) ‘The Security Officer’, in M. L. Gill (ed.) The handbook of
security. Palgrave handbooks. 2nd edition Houndmills, Basingstoke, Hampshire ; New York, NY:
Palgrave Macmillan.
Nilson, L.B. & Goodson, L.A. (2018). Online Teaching at its best. San Francisco: Jossey-Bass
Noe, R.A. (1999). Employee Training and Development. New York: McGraw-Hill Irwin.
Oakes, K. (2014). Evolution of the Training Profession. In E. Biech (Ed.) ASTD Handbook: The
Definitive Reference for Training & Development (pp. 9–34). Alexandria: ASTD Press.
O’Conner, D., Lippert, R., Greenfield, K., & Boyle, P. (2004). After the “quiet revolution”: the self-
regulation of Ontario contract security agencies. Policing and Society. 14 (2), 138–157.
[Crossref]
Palacios, K.P. (2019). Progressive Levels of Security Competency. Naples: International Foundation
for Protection Officers.
Provost, C. (2017) The Industry of Inequality: Why the World is Obsessed with Private Security. The
Guardian. 12 May. [online]. Available from: https://www.theguardian.com/inequality/2017/may/12/
industry-of-inequality-why-world-is-obsessed-with-private-security (Accessed 20 May 2019).
Rogers, C. (2021) Policing Structures. Abingdon, Oxon; New York, NY: Routledge.
Schleicher, A., (2020). The impact of covid-19 on education insights from education at a glance
2020. Retrieved from oecd.org website: https://www.oecd.org/education/the-impact-of-covid-19-on-
education-insights-education-at-a-glance-2020.pdf.
Scollan, T. J. (2011) An Assessment of the New York State Enhanced Security Guard Training
Legislation and Its Efficacy on Security Officer Preparedness. California: Naval Postgraduate
School.
Shearing, C. D. & Stenning, P. C. (1981) Modern Private Security: Its Growth and Implications.
Crime and Justice. 3193–245.
Shearing, C. & Wood, J. (2003) Governing Security for Common Goods. International Journal of the
Sociology of Law. [Online] 31 (3), 205–225.
Smith, C. L. (2014) ‘Security Technology and the Protection of Assets’, in M. L. Gill (ed.) The
Handbook of Security. Palgrave handbooks. 2nd edition Houndmills, Basingstoke, Hampshire; New
York, NY: Palgrave Macmillan. p.
Van Steden, R. & de Waard, J. (2013) ‘Acting Like Chameleons’: On the McDonaldization of Private
Security. Security Journal. [Online] 26 (3), 294–309.
Teague, C. et al. (2014) Transit Officer Training Recommendations to Improve Safety in a High
Stress Environment. International Journal of Training Research. [Online] 12 (1), 16–28.
Thumala, A., Goold, B. & Loader, I. (2011) A Tainted Trade? Moral Ambivalence and Legitimation
Work in the Private Security Industry. The British Journal of Sociology. [Online] 62 (2), 283–303.
Topno, H. (2012). Evaluation of Training and Development: An Analysis of Various Models. IOSR
Journal of Business and Management Vol. 5(2), 16–22.
[Crossref]
Townshend, C. (2018) Terrorism: A Very Short Introduction. Very short introductions 78. Third
edition. Oxford, United Kingdom: Oxford University Press.
[Crossref]
University of Phoenix. (2014). Security Industry Survey of Risks and Professional Competencies
Executive Summary. Phoenix: University of Phoenix.
Walter, S. (2014, 9 December) What legislative efforts to improve security guarding training keep
failing. Retrieved from https://revealnews.org/article/why-legislative-efforts-to-improve-security-
guard-training-keep-failing/.
Wakefield, A. (2006) ‘The Security Officer’, in M. L. Gill (ed.) The Handbook of Security. Palgrave
handbooks. 1st edition Houndmills, Basingstoke, Hampshire; New York, NY: Palgrave Macmillan.
Wakefield, A. & Button, M. (2014) ‘Private Policing in Public Spaces’, in The Oxford Handbook of
Police and Policing. [Online].
White, A. & Gill, M. (2013) The Transformation of Policing: From Ratios to Rationalities. The
British Journal of Criminology. [Online] 53 (1), 74–93.
Williamson, K., Bannister, M., & Schauder, D. (2003). Developing an Interpretive Approach to
Competency-Based Training and Learning. Australian Academic & Research Libraries, 34(2), 150–
163.
[Crossref]
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_30
C. A. Meerts
Email: [email protected]
Abstract
This chapter focuses on the private efforts of organisations to maintain (or
restore) internal order within their organisational context. In a field of
security where the state is typically absent, corporate investigators provide
start-to-finish services to employers who are faced with internal norm
violations. Different sources and methods of investigation are discussed (the
corporate investigations), as well as the solutions that may be chosen after
the investigations have been finalised (the corporate settlements). While
they lack the powers of investigation granted to public police forces,
corporate investigators have extensive access to information. Many
corporate investigations are settled without the involvement of any public
law enforcement agency and stay completely within the private legal
sphere. In this sense, corporate investigations create a system of private
investigations and justice, which for a large part operates independently
from criminal justice systems. This chapter, finally, engages with the
question of the implication that the existence of this field of corporate
security has for democratic societies by focusing on the autonomy of
corporate investigators, public-private relations and the interests that are
involved.
Introduction
It is now a well-known fact that the provision of security is (no longer)
exclusively dependent on governments (see, e.g., Jones and Newburn
2006). The complex security needs of modern society exceed what
(national) governments can realistically provide. Private sector involvement
in crime control is widespread (White 2014a; Gurinskaya and Nalla 2018).
It is therefore not surprising that the private sector has also attracted the
attention of social scientists. While still a relatively small part of
criminological research efforts (as compared to the extensive field of
research focused on the more classical public security provision by
governments), there is now a solid body of work focusing on private
security and on the question of public-private relationships (see, e.g.,
Johnston 1992; Loader 1997; Wood and Shearing 2007). Most of this
literature, however, is focused on the most visible forms of private security,
being physical safety issues and the safeguarding of property in (semi)
public spaces (see, e.g., Nalla and Wakefield 2014). Mostly, these private
security functions are preventative: private security personnel may prevent
crime from occurring through the guarding of staff, by patrolling specific
spaces or by providing technical security services. Consequently, the main
focus within private security research is on those private security functions
which are mainly concerned with the prevention of future loss (e.g.
Johnston and Shearing 2003; Shearing and Stenning 1985).
Even though many private security efforts are focused on the prevention
of crime (and more generally, financial loss), we can also find private
security services which are more concerned with reactive, or ‘after the fact’,
policing. Specifically, private investigators provide investigative services to
their clients after a suspicion of wrongdoing has arisen. Private
investigators may provide services to individuals or organisations. This
chapter concerns itself with the latter. To clarify this distinction, the term
‘corporate investigator’ is used to refer to investigators who are employed
by commercial or (semi) public organisations. There is some debate with
regard to the question of who may be regarded to be a ‘corporate
investigator’ (or more broadly, corporate security). For example, Nalla and
Morash (2002) reserve this term for in-house security departments within
corporate entities. This chapter, however, defines corporate investigators
more broadly, to also include private investigation firms, forensic
accountants and forensic (departments of) law firms. A defining
characteristic is that corporate investigators cater to (both commercial and
[semi] public) organisations (instead of individuals) (see also Meerts
2019a). Specifically, the focus of this chapter lies with the investigation of
internal norm violations rather than the investigation of crimes and other
unwanted behaviour that is external to the organisation. As will be
demonstrated, the private (labour) law relationships that are involved in
internal investigations provides corporate investigators with much room to
investigate without the involvement of the criminal justice system.
This chapter, then, focuses on the private efforts of organisations to
maintain (or restore) internal order within their organisational context. In a
field of security where the state is typically absent, corporate investigators
provide start-to-finish services to employers who are faced with internal
norm violations (Gill and Hart 1999). While they lack the powers of
investigation granted to public police forces, corporate investigators have
extensive access to information. Many corporate investigations are settled
without the involvement of any public law enforcement agency and stay
completely within the private legal sphere. In this sense, corporate
investigations create a system of private investigations and justice, which
for a large part operates independently from criminal justice systems. This
chapter explores, first, the investigative possibilities of corporate
investigators and, second, the alternatives to criminal prosecutions they
provide to their clients. In the discussion, this chapter engages with the
question of the implication that the existence of this field of corporate
security has for democratic societies.
Corporate Investigations
Corporate investigators are private actors. By implication, they have no
powers of investigation. Consequently, they lack access to (all) the
investigative possibilities available to law enforcement actors. However, the
flip-side of this is that corporate investigators are able to operate with a
greater flexibility than law enforcement actors (Williams 2005). As a result,
corporate investigators are able to act both swiftly and efficiently. The
connection between the client (the employer) and the person under
investigation (the employee) furthermore provides corporate investigators
with extensive access to information (Meerts 2019a). All this culminates in
a situation in which corporate investigators have wide-ranging possibilities
to investigate, without being restricted by the stringent rules that apply to
law enforcement agencies (Meerts 2019b). The widespread view that
corporate investigators are not regulated, however, deserves some nuancing.
Even though the extent and manner of regulation differs per national
jurisdiction, private investigators are generally subject to rules and
regulations. Some national jurisdictions rely fully on self-regulation by the
sector (such as the UK—see https://www.theabi.org.uk/), while others have
state-mandated forms of regulation (such as the Netherlands, see Meerts
2019a). To make matters more complicated, membership of representative
organisations is generally non-compulsory and so the status of quality
markers issued by representative organisations is often unclear.
A complicating factor is, furthermore, provided by the diversity of the
corporate investigations market. Who is regarded to be an investigator
(either in the eyes of the law or in general) differs. In broad terms, we can
identify private investigation firms, in-house investigation departments
within (large) organisations, forensic accountants and (forensic departments
of) legal firms (Meerts 2019a). These different actors all have their own
rules and regulations. An overarching legal framework for corporate
investigations is generally absent (apart from general laws such as those
regulating privacy and criminal law). In the Netherlands, for example,
private investigation firms need a permit, while this requirement does not
hold for other types of investigators. In addition, private investigation firms
are liable to legal regulations, while forensic accountants and legal
investigators have (non-binding) professional guidelines (in addition to
their own system of disciplinary law). In-house investigators, finally, have
internal regulations guiding their actions (Meerts 2019a).
We can, however state that at the minimum corporate investigators are
subject to general laws regulating employer-employee relations (labour
law), regulating which behaviour is criminal (criminal law) and regulating
how the right to privacy is protected (privacy regulation). In addition,
general principles of law are used to regulate investigations, such as
proportionality, subsidiarity and confidentiality (Meerts 2019a). In this
context, proportionality means that the use of investigative methods should
be proportional to the intended result and to the interests that are served
with the investigation. Subsidiarity refers to the fact that the methods used
should be the least intrusive for the (privacy of) the persons involved. Even
though (most) corporate investigators lack legal privilege,1 they do focus on
confidentiality of their investigations: the results are reported to the client
only (who can then decide whether or not to publicise the investigation).
Other leading principles include the adversarial principle, containing the
right to be heard of the person who is investigated, and the principle of fair
play (which inter alia includes that the people who are involved in the
investigation should be treated fairly, with respect and with due
consideration of all interests involved).
An additional characteristic that sets corporate investigations apart from
criminal investigations is their focus. Other than criminal investigations,
corporate investigations may or may not be focused on criminal behaviour.
The scope of the types of behaviours that can potentially be investigated is
thus much larger for corporate investigators. Whether or not the
investigated behaviour is criminal is not a central question for most clients
of corporate investigators (Williams 2005). The investigation is, first and
foremost, focused on solving the problem at hand. As such the investigation
is less interested in the who than the what. By implication, the corporate
investigation may have a wider scope than a criminal investigation would
have, for example because it includes the question of which organisational
systems and safeguards failed in this instance.
One implication of the above is that corporate investigators utilise what
Williams (2005) calls ‘legal flexibility’: investigations may make use of
legal definitions and instruments across the legal spectrum, defining
(potential) crime as a labour conflict or breach of contract rather than a
criminal act (Williams 2005). Thus, corporate investigators are not confined
to the criminal code as a guideline for their investigations and, most
notably, for the solutions provided after the investigation is finalised (see
below).
As mentioned before, the focus of this chapter is on investigations into
internal wrongdoing. However, corporate investigators do not exclusively
focus on internal matters. The behaviour under investigation may just as
well be external to an organisation. The choice to focus on internal
wrongdoing is based on the fact that both the access to information and the
possibilities to react after the fact are more extensive for internal
investigations. This exposes an interesting dynamic: the employee under
investigation may be asked by his or her employer to voluntarily assist
investigators; however, the extent to which this is voluntary in reality is
unclear. An employer has extensive influence over his employees by threat
of unemployment or other measures (Meerts 2019a). In addition, the
infrastructure provided by the employer (the internal network, email
systems, hardware such as computers and (smart)phones) may be used in
investigations since the employee is not the rightful owner here. The access
to information about employees is not unlimited, however, and a certain
measure of privacy remains (e.g. private emails which are sent with the use
of company resources). Corporate investigators, thus, depend for an
important part on the access to certain information of their client and on the
cooperation of all parties involved (Williams 2014).
The investigative possibilities of corporate investigators are thus limited
by their lack of coercive powers, but at the same time we see that corporate
investigators have extensive options to investigate at their disposal. In this
paragraph, we explore the tools corporate investigators may use to complete
an investigation. Generally, an investigation commences with a formal
assignment (although, in the case of investigations executed by an in-house
department, this may take an alternative shape). In this assignment, the
problem is stated and usually the expected activities are listed. Which
investigative activities are to be executed depend on the circumstances of
the case; however, the following sources of information and/or investigative
methods are commonly used. Below we describe internal documentation,
internal systems, open sources, personal communication (the interview) and
other sources and/or methods (Meerts 2019a).
A first source of information for corporate investigations is what we
may summarise as internal documentation. For an important part, this
consists of financial administration and source documents such as contracts.
In addition to internal documentation, internal systems may provide
investigators with ample information. Importantly, these consist of
communication networks and systems of hardware and software. Email and
telephone systems, as well as cloud storage, (smart)phones, laptops, PCs,
external memory devices and physical security systems (such as key card
entry data, security cameras and GPS or track-and-trace systems) contain
rich information which may be used within corporate investigations.
In addition to strictly internal sources of information, investigators may
also look to sources outside of the organisation. One of these, which seems
to have gained more and more momentum over the years, is what is known
as open sources. While the use of open sources for information gathering
within an investigative context is often referred to as ‘OSINT’, this is not
entirely correct. OSINT is the abbreviation for Open Sources Intelligence,
which refers to the gathering of intelligence. In the context of
investigations, however, we should use the term ‘Open Source
Investigations’, which refers to ‘online investigations that involve combing
through publicly accessible resources for information related to potential
crimes’ (Koenig et al. 2018: 682). Open sources are often used as a point of
reference at the start of the investigation. In this way, social media, Internet
search engines and databases such as the Chamber of Commerce can be
used to get general information about a person and his or her social
network. In addition, these sources may provide easy access background
information and possibly create a timeline for the occurrences under
investigation. The use of open sources is part of a larger debate on the
legitimacy of both police actions and the investigative possibilities of
corporate investigators. While open sources are (more or less) freely
available, the use of them in a (police) investigation may constitute a
violation of the right to privacy. As such, open sources may not be used
without limitation (Koops 2013). While the use of open sources is
increasingly regulated in the context of police investigations, for corporate
investigators the way open sources are used is often based on principles of
law rather than on strict regulations which are codified in law.
While internal and external sources of information may prove to be very
useful, many corporate investigations rely heavily on information gathered
through personal communications (Meerts 2019a). This may include
informative conversations with the client and witnesses. In addition,
corporate investigations often obtain much information from the person
who is investigated. Since this information is provided outside of the legal
context of a criminal investigation, these personal communications are not
interrogations. Rather, they are interviews. One implication is that the
person who is interviewed cannot rely on the same legal protection that
exists in the context of criminal investigations. The cooperation of the
involved person (not being a suspect in the sense of criminal law) is
therefore voluntary. However, as a result of the power imbalance (both in
experience with the process and in position) that exists between the
involved person and the investigator (being the representative of the
employer), we should critically assess the voluntariness of the cooperation
in practice (Meerts 2016). While an employee cannot be forced to
cooperate, the employer may exert pressure through threats of
unemployment or other punishment in case the employee fails to cooperate
with the investigation. Even in the face of regulations and principles of law,
then, there is ample opportunity to move people to cooperate.
In addition to the above, other sources of information may be used to
further the investigation. In theory, there is no limit to these; however, in
practice these other sources and methods of investigation often contain
observations and site visits, the use of mystery guests and asset-tracing and
other (forensic) accounting methods such as the calculation of damages. All
the information combined leads to the report of the investigation. While in
many cases, the above sources of information are sufficient to provide a
clear image of the investigated events, it is also possible that the
investigations are ruled inconclusive. Whether or not a reconstruction of the
events can be fully provided, the results of the investigations are presented
in a report, which is often the basis for further action. The possibilities for
this further action are discussed in the following section.
Corporate Settlements
With the report in hand, the client that has ordered the corporate
investigation may decide upon further action. These responses that may
follow from corporate investigations are referred to as corporate
settlements. Corporate settlements are the result of corporate decision
making and often take place without the involvement of the criminal justice
system. However, not all forms of corporate settlement avoid the criminal
justice system. As we will see below, sometimes the help of law
enforcement is actively sought out (Meerts 2019a).
These corporate settlements fall, in broad terms, within the categories of
action based on internal regulations, on labour law, on private/civil law and
on criminal law (Meerts 2018). In addition, it may be decided that no
further action is necessary—for example when the investigations yielded no
definite results or when the problem has already been solved in another way
(e.g. when the person involved no longer works for the client) (Meerts
2019a). The involvement of corporate investigators with the decision on the
type of settlement differs. Corporate investigator involvement in this part of
the process is generally limited, however. The report following from the
investigations may contain (legal) advice, depending on the background of
the investigator. The actual decision nevertheless falls upon the client (and,
potentially, its legal counsel).
There are many factors that may influence the decision about the
reaction following from the results of the investigation. One major
consideration is whether or not to involve the criminal justice system. Of
course, this is only a possibility if the behaviour can be defined as criminal.
However, the fact that the behaviour can be defined as criminal does not
necessarily mean that it is framed in such a way. Corporate investigations
often frame the behaviour in a different manner (as a civil matter), leaving
room for forum shopping among public and private jurisdictions when
choosing a corporate settlement (Meerts 2019a).
Meerts, Huisman and Kleemans (in press), when discussing the
considerations that may steer the latter decision, show that commercial,
practical and normative reasons may lead an organisation away from
reporting the case to the police. A commercial reason may be fear of
reputational damage. An example of a practical reason would be that, in
practical terms, a report to the police does not solve the immediate problem
an organisation is faced with. Normative considerations against reporting
include the protection of the involved employee against a disproportional
punishment (e.g. when the labour contract has been terminated as well). In
addition to the before-mentioned considerations, this and other research
shows that another important factor is the level of confidence organisations
have in the criminal justice system (see, e.g., Gill 2013; Meerts 2019a).
On the other hand, strategic, pragmatic and normative considerations
may also lead to the involvement of the criminal justice system. In addition,
some organisations may have the standard policy to report (which does not
necessarily mean that every instance will indeed be reported—see, e.g.,
Meerts 2019a). A strategic or pragmatic consideration leading to an official
report to the authorities may be that the organisation is obliged to do so by
law or that some details about the case are already public; in such a case,
reporting is more beneficial to the reputation than not reporting. An
example of a normative consideration for reporting is that an organisation
deems this ‘the right thing to do’ (Meerts, Huisman and Kleemans in press).
When the decision has been made to involve the criminal justice system, an
organisation cedes control over the information and level of publicity of the
process (Williams 2005). For this (and other) reason(s), a report to the
authorities is often made after corporate investigations have been finalised
(Meerts 2019a). In this way, a certain amount of control is retained and the
scope of the problem is (more or less) clear to the organisation. This may
mean that damage control is easier and the reputation can be managed
better. The decision to involve the criminal justice system may therefore
have more far-reaching effects than when another solution is chosen;
however, it is possible for organisations to manage it to some extent.
Research shows that the information provided by the corporate
investigations is often an important point of departure for the criminal
justice investigations. Even though there is still a possibility that the
criminal investigation will take a different turn, the information provided by
the organisation through the report of the corporate investigations may
therefore influence the scope and direction of the criminal investigation
(Meerts 2019a).
When it has been decided not to involve the criminal justice system,
other options are available. It should be noted that the decision to report to
the authorities is rarely the only solution taken. Because of the uneasy fit
between the objectives and processes of the criminal justice system and the
interests of (commercial) organisations, some other form of corporate
settlement is often used as well (Meerts and Dorn 2017). As mentioned
above, one option is to make use of internal regulations within the
organisation itself (Meerts 2018). The options provided here often range
from minor (such as a warning) to severe (such as termination of the labour
contract). In the latter case, labour law is used as a tool to respond to the
matter at hand. Here as well, the possibilities differ in their degree of
severity. For example, a contract may simple not be renewed (on the one
side of the spectrum) or the termination of the contract may be shaped
through a summary dismissal combined with a compensation payment to
the organisation (Meerts 2018).
In addition to criminal law, internal sanctions and labour law, the
options provided by civil law may also be used as a response to norm
violations (Meerts 2018). Civil justice proceedings are generally less
publicised than criminal justice proceedings. In addition, the standard of
evidence is lower in civil cases, making it easier to arrive at a swift
solution. An example of the use of the civil justice system is a civil suit
based on breach of contract, which may result in repayment of damages.
Another, less public, option is the use of a settlement agreement (Meerts
2018). In a settlement agreement, parties come to an understanding with
regard to the terms of separation and the amount payable.
Even though the involvement of corporate investigators in this phase is
limited, corporate settlement are the result of corporate investigations. In
this way, corporate investigations create a system of private corporate
investigations and justice, which for a large part operates independently
from criminal justice systems. Because of the limited in- and oversight that
exist with regard to these private systems, it is important to take a closer
look at the implications they might have. This is the subject of the
discussion below.
Recommended Readings
This chapter touches upon some interesting themes which are explored
further in other work, which has been referenced throughout this chapter.
While both the investigative activities and the possible corporate settlement
options have briefly been discussed, this chapter does not go into detail.
The interested reader is referred to the work of Gill (inter alia 2013), Gill
and Hart (inter alia 1999), Meerts (inter alia 2016, 2018 and 2019a) and
Williams (inter alia 2005, 2006 and 2014). With regard to the public-private
relationships that (may or may not) occur in the context of investigation of
internal crime specifically, readers are referred to Meerts (2019b). Dutch
speakers are furthermore directed to a comprehensive report by Meerts,
Huisman and Kleemans (in press), which is based on empirical research
into public-private relations in the field of internal financial crime in the
Netherlands.
A subject that is merely implicit in this chapter, is that of the question of
the role of private security in general. This has been subject to much debate
and the interested reader is referred to classic works such as Shearing and
Stenning (inter alia 1983; 1985), Johnston (1992), Loader (1997), Garland
(2001), Jones and Newburn (2006), Wood and Shearing (2007), Loader and
White (2017) and Gurinskaya and Nalla (2018).
References
Garland, D. (2001). The Culture of Control. Crime and Social Order in Contemporary Society.
Chicago: University Press.
[Crossref]
Gill, M. (2013). Engaging the corporate sector in policing: Realities and opportunities. Policing,
7(3), 273–279.
[Crossref]
Gill, M. & Hart, J. (1999). Private security: Enforcing corporate security policy using private
investigators. European Journal on Criminal Policy and Research, 7(2), 245–261.
[Crossref]
Gurinskaya, A. & Nalla, M.K. (2018). The Expanding Boundaries of Crime Control: Governing
Security through Regulation. The ANNALS of the American Academy of Political and Social Science,
679(1), 36–54.
[Crossref]
Henry, S. (1983). Private justice. Towards integrated theorising in the sociology of law. London:
Routledge & Kegan Paul.
Jones, T. & Newburn, T. (2006). Understanding plural policing. In T. Jones & T. Newburn (Eds.),
Plural policing. A comparative perspective (pp. 1–11). Abingdon, Oxon: Routledge.
[Crossref]
Johnston, L. & Shearing, C. (2003). Governing security: Explorations in policing and justice.
Abingdon, Oxon: Routledge.
Koenig, A., McMahon, F, Mehandruand, N. & Bhattacharjee, S.S. (2018). Open Source Fact-Finding
in Preliminary Examinations. In M. Bergsom & C. Stahn (Eds.), Quality Control in Preliminary
Examination: Volume 2 (pp. 681–710). Brussels: Torkel Opsahl Academic Epublisher.
Koops, B. (2013). Police investigations in Internet open sources: Procedural-law issue. Computer
Law & Security Review, 29(6), 654–665.
[Crossref]
Loader, I. (1997). Thinking Normatively about Private Security. Journal of Law and Society, 24(4),
337–394.
Loader, I. & White, A. (2017). How can we better align private security with the public interest?
Towards a civilizing model of regulation. Regulation & Governance, 11(2), 166–174.
[Crossref]
Meerts, C.A. (2016). A world apart? Private investigations in the corporate sector. Erasmus Law
Review, 9(4), 162–176.
Meerts, C.A. (2018). The organisation as the cure for its own ailments: Corporate investigators in the
Netherlands. Administrative Sciences, 8(3), 106–120.
[Crossref]
Meerts, C.A. (2019a). Corporate Investigations, Corporate Justice and Public-Private Relations.
Towards a New Conceptualisation. London: Palgrave Macmillan.
[Crossref]
Meerts, C.A. & Dorn, N. (2017). Cooperation as mantra: Corporate security and public law. In R. van
Swaaningen, C. van Wingerden & R. Staring (Eds.), Over de muren van stilzwijgen: Liber amicorum
Henk van de Bunt (pp. 503–515). Den Haag: Boom Criminologie.
Meerts. C.A., Huisman, W., & Kleemans, E.R. (in press). Living apart together. Publiek-private
relaties in de bestrijding van interne financieel-economische criminaliteit. Den Haag: Sdu Uitgevers.
Nalla, M. & Morash, M. (2002). Assessing the scope of corporate security: Common practices and
relationships with other business functions. Security Journal, 15(3), 7–19.
[Crossref]
Nalla, M.K. & Wakefield, A. (2014). The security officer. In M. Gill (Ed.), The handbook of security
(pp. 727–746). Basingstoke: Palgrave Macmillan.
[Crossref]
Shearing, C.D. & Stenning, P.C. (1983). Private security: Implications for social control. Social
Problems, 30(5), 493–506.
[Crossref]
Shearing, C.D. & Stenning, P.C. (1985). From the panopticon to Disney World: The development of
discipline. In E. McLaughlin, J. Muncie & G. Hughes (Eds.), Criminological perspectives: Essential
readings (2nd ed., pp. 424–433). London: Sage.
Van Dijk, F. & De Waard, J.J. (2001). De markt voor private opsporing; vraag en aanbod. Justitiële
Verkenningen, 27(4), 25–41.
Van Leusden, P. (2020). Zelfonderzoek: enige nuancering. Tijdschrift voor Sanctierecht &
Onderneming. Straf- en bestuursrechtelijke handhaving van financieel-economisch recht, 10(3/4),
120–123.
White, A. (2014a). Politics, economics and security. In M. Gill (Ed.), The handbook of security (pp.
89–106). Basingstoke: Palgrave Macmillan.
[Crossref]
White, A. (2014b). Beyond the regulatory gaze? Corporate security, (in)visibility, and the modern
state. In K. Walby & R. Lippert (Eds.), Corporate security in the 21st century. Theory and practice in
international perspective (pp. 39–55). Basingstoke: Palgrave Macmillan
Williams, J.W. (2005). Reflections on the private versus public policing of economic crime. British
Journal of Criminology, 45(3), 316–339.
[Crossref]
Williams, J.W. (2006). Governability matters: the private policing of economic crime and the
challenge of democratic governance. Policing and Society, 15 (2), 187–211.
[Crossref]
Williams, J.W. (2014). The Private Eyes of Corporate Culture: The Forensic Accounting and
Corporate Investigation Industry and the Production of Corporate Financial Security. In K. Walby &
R. Lippert (Eds.), Corporate Security in the 21st Century. Theory and Practice in International
Perspective (pp. 56–77). Basingstoke: Palgrave Macmillan.
Footnotes
1 The involvement of investigators with a legal background provides an interesting exception here.
Even though to date, it is not entirely clear yet whether legal privilege may be used in the context of
investigations (which are supposed to be impartial), the possibility is one of the selling points for
investigators with a legal background (see Meerts 2019a).
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_31
Markus Lahtinen
Email: [email protected]
Abstract
The authors discuss CCTV, which is now established as a mature and
ubiquitous technology. They review existing research on CCTV as
backdrop to introduce an alternative re-narration that stresses its use as an
advanced information technology—a socio-technology. Central to this
perspective is the recognition that system effectiveness hinges on a match
of individual, organizational and technological features which they use to
explain the mixed results on CCTV effectiveness.
Introduction
It may come across as obvious to state that effective CCTV use is the result
of a successful interplay between social and technical resources. For
example, a trained and skilled CCTV operator can—in an emergency
situation—manage multiple information and communication systems,
maneuver a camera and direct emergency services to a situation requiring
immediate professional assistance. In other instances, there is no CCTV
operator present. Instead, a surveillance camera happens to record a suspect
passing by a wall-mounted camera. Later, the local police force—as a part
of their investigative routine—checks for recorded image material of public
CCTV in connection to a mugging that took place nearby. The image
material puts a suspect in the area and later forms a part in a chain of
evidence that leads to a future conviction. In this case, the piece of
technology—the recording camera—interacts with human and
organizational police resources, although in a somewhat time-delayed
fashion. Still, it’s another example of a successful socio-technical use of
CCTV. Both of these fictive use cases are quite typical and straightforward
uses of CCTV, and for CCTV professionals, there is nothing problematic
about these opening vignettes.
Over the years, researchers from different fields have approached
CCTV from different perspectives. Within the field of surveillance studies,
it is possible to find research problematizing CCTV from a critical
perspective, putting forward detailed and rich descriptions of how CCTV
systems—and their operators—can be used as a tool in a wider control and
surveillance apparatus. For instance, the act of profiling individuals
deviating from a set norm in a given environment (e.g. Lyons 2006; Zuboff
2019; Heebels and van Aalst 2020; Glasbeek et al. 2020). In this case,
critical should be understood more specifically than the wider and common
understanding of critical. Critical theory—as it is used in the context of
surveillance studies—often draws its inspiration from theories rooted in the
study of discourse and hidden norms in order to problematize injustices and
power imbalances.
In the field of criminology, commendably driven by an experimental
and causality-driven research ideal, researchers design experiments to test
the crime preventive effects of CCTV systems. As a typical setup, one area
is chosen to be the area of intervention, meaning it is equipped with CCTV.
A similar area is also chosen for comparison, meaning it will not be subject
to CCTV surveillance. Over time, it is possible to compare the outcome of
the CCTV surveilled area with the area not subject to CCTV. Through the
use of advanced statistical calculations, it is possible to conclude that—with
95% certainty—we cannot rule out that CCTV is effective in preventing a
certain category of crime, for example, reducing retail theft (Hayes and
Downs 2011). In other studies, the correlation comes out unsupported—
meaning, there is no support for the effectiveness of CCTV in preventing
crime (La Vigne and Lowry 2011; Gerell 2016). Both of these broader
stylized examples of research efforts represent perfectly legitimate scientific
perspectives and methodological approaches to studying CCTV. Taken
together, they deepen and widen our common knowledge on CCTV use and
its effectiveness.
The reason for highlighting these two perspectives in particular rests
upon our first-hand experience of being engaged in a wider public debate
examining the merits of using CCTV for crime prevention purposes. A
salient feature of this wider public debate is the propensity to gravitate
toward more polemically apt perspectives—perspectives more compatible
with answering the overarching question: does CCTV work in a broader yes
or no sense? It has long been recognized that there are compounding factors
that complicate the response to this question spearheaded by the realist-
evaluative approach (Brown 2002; Gill and Turbin 1999; Pawson and Tilley
1997), which as described by Tilley (1993) and Pawson and Tilley (1992)
concerns itself with assessing the context-specific explanatory
circumstances assessing why a measure works. Central to this approach has
been the importance given to identifying the situational mechanisms, that
underpins effective CCTV use (cf. College of Policing 2021).
The realist-evaluative approach can be seen as a critique of the
experimental ideal (Pawson and Tilley 1992, also Brown 2002). As
Alexandrie (2017) has discussed, understanding the effects of CCTV is
dependent on meaningfully comprehending the pre-existing conditions
prompting its introduction in the first place. This is rarely done well.
Instead, CCTV is more often introduced in a socially dynamic and
ambiguous context that complicates the linear and simple cause and effect
logic. In short, CCTV effectiveness depends on dealing with contextual
variation (cf. the realist-evaluative approach). There are many factors that
affect context. To take one example, Welsh et al. (2020) have concluded
that CCTV schemes operated by private security personnel generate larger
crime prevention effects than those operated by police or those using a mix
of police and security personnel. In practice, numerous other studies
explicitly, and successfully, recognize the contingent social dimensions for
successful CCTV deployment (e.g. Taylor and Gill 2014; La Vigne and
Lowry 2011; Piza et al. 2015; Beck 2016).
Yet in discussion about the above-mentioned perspectives and
examples, the socio-technical perspective is not explicitly mentioned. While
naturally more aligned with a realist-evaluative approach—but not
explicitly—its intellectual roots do not originate from the discourse
associated with the experimental or the traditional interpretative scientific
ideals. In this way, we are attempting to point to a gap—or an opportunity
to supplement and develop the realist-evaluative view on CCTV as laid out
by Tilley (1993).
You can see the computer age everywhere but in the productivity
statistics.
Recommended Readings
Over the years, our experience tells us that protocols from governmental,
public agencies and court rulings have provided valuable clues and insights
to provide a contextual understanding to national CCTV use. For regulative
concerns, national Data Protection Authority is a useful point of departure,
as well the European Data Protection Board. For nation-wide surveys, the
studies by Lahtinen (2017, 2018, 2019) enable for multi-year comparisons
of public opinion to public CCTV in Sweden.
The meta-analysis by Piza et al. (2019) provides an excellent summary
on the past 40 years’ worth of experimental research on CCTV
effectiveness. The earlier mentioned online resources offered by the College
of Policing (2021) in the UK fit well with the realist and socio-
technological message of this chapter. The article by Taylor and Gill (2014)
is a relevant read, since many raised problematizations on CCTV
effectiveness still warrants further investigation and research. For CCTV
practitioners, security and CCTV online news source IPVM.com, run by
John Honovich, provides an unrivaled resource for news, reviews, industry
insights and CCTV testing. Security trade shows represent a worthwhile
opportunity to experience the security and CCTV industry in “flesh and
blood”, often complemented with speakers addressing CCTV insights.
Finally, a generation of CCTV engineers, who started their careers in the
1960s, are reaching the upper age bracket. Tapping into those individual’s
stories and experiences is an invaluable source of insights into the early
years of remote TV-monitoring.
References
Aksoy, A. (2020). Presentation by Storstockholms Lokaltrafik (SL) at “Kameradagen 2020”, 14
January 2020 in Stockholm, Sweden. Event organized by Stockholm County Administrative Board.
Alexander, C., Ishikawa, S., Silverstein, M., Jacobson, M., Fiksdahl-King, I., Angel, S. (1977). A
Pattern Language. Oxford University Press.
Alexandrie, G. (2017). Surveillance cameras and crime: A review of randomized and natural
experiments. Journal of Scandinavian Studies in Criminology and Crime Prevention, pp. 1–14.
Alter, S. (2013). Work system theory: overview of core concepts, extensions, and challenges for the
future. Journal of the Association for Information Systems, pp. 72–121.
Beck, A. (2016). Amplifying Risk in Retail Stores: The evidence to date on making shop thieves think
twice. ECR Community Shrinkage & On-shelf Availability Group.
Björgvinsson, E. & Hillgren, P-A. (2005). Indigenous Design: healthcare professional using self-
produced video in articulating and developing work practices. Nordes, Nordic Design Research, Nr.
1.
Bjørn-Andersen, N., Eason, K., Robey, D. (1986). Managing computer impact: An international
study of management and organizations. Intellect Books.
Brown, A. (2002). Promise and performance in CCTV surveillance: The need for an appraisal of
practice. Community Safety Journal, 1(1), June 2002, pp. 28–34.
Brynjolfsson, E. & Hitt, L. (2003). Computing Productivity: Firm Level Evidence. MIT Sloan
Working Paper, No. 4210-01, June.
College of Policing (2021). Home/Crime Reduction Toolkit/CCTV. Accessed 6 April 2021 https://
whatworks.college.police.uk/toolkit/Pages/Intervention.aspx?InterventionID=1.
Gerell, M. (2016). Hot Spot Policing with Actively Monitored CCTV Cameras: Does it Reduce
Assaults in Public Places? International Criminal Justice Review, 26(2), pp. 187–201.
[Crossref]
Gill, M., & Turbin, V. (1999). Evaluating Realistic Evaluation: Evidence from a Study of CCTV.
Crime Prevention Studies, 10, 179–199.
Glasbeek, A., Alam, M., Roots, K. (2020). Seeing and Not-Seeing: Race and Body-Worn Cameras in
Canada. Surveillance & Society, 18 (3): 328–342.
[Crossref]
Hayes, R., & Downs, D. M. (2011). Controlling retail theft with CCTV domes, CCTV public view
monitors, and protective containers: A randomized controlled trial. Security Journal, 24, 237–250.
[Crossref]
Heebels, B. & van Aalst, I. (2020). Surveillance in Practice: Operators’ Collective Interpretation of
CCTV Images. Surveillance & Society, 18 (3): 312–327.
[Crossref]
Jacobs, J. (1961). The Death and Life of Great American Cities. Random House, New York.
La Vigne, N. G. & Lowry, S. S. (2011). Evaluation of camera use to prevent crimes in commuter
parking facilities: A randomized control trial. Washington, DC: URBAN Institute. Accessed 24
February 2021.
Lahtinen, M. (2017). The perception of surveillance cameras and privacy among the general public
in Sweden, August 2017, LUSAX Security Research Group, School of Economics and Management,
Lund University, Sweden. Retrieved from: www.lusax.se.
Lahtinen, M. (2018). The attitude among the general public in Sweden towards the use of
surveillance cameras in public spaces, April 2018, LUSAX Security Research Group, School of
Economics and Management, Lund University, Sweden. Retrieved from: www.lusax.se.
Lahtinen, M. (2019). The Swedish general public’s attitudes towards the use of surveillance cameras
(CCTV) in public spaces, LUSAX Security Research Group, School of Economics and Management,
Lund University, Sweden. Retrieved from: www.lusax.se.
Mitev, N. (1996). More Than a Failure? The Computerized Reservation Systems at French Railways.
Information Technology & People 9(4):8–19.
[Crossref]
Pawson, R. & Tilley, N. (1992). Re-evaluation: rethinking research on corrections and crime.
Yearbook of Correctional Education, pp. 1–31.
Piza, E., Caplan, J., Kennedy, L., and. Gilchrist, A. (2015). The Effects of Merging Proactive CCTV
Monitoring with Directed Police Patrol: A Randomized Controlled Trial. Journal of Experimental
Criminology, 11(1): 43–69.
[Crossref]
Piza, E., Welsh, B.C., Farrington, D.P., Thomas, A.L. (2019). CCTV surveillance for crime
prevention: A 40-year systematic review with meta-analysis. Criminology & Public Policy, 18:135–
159.
[Crossref]
Scott, J.E. & Vessey, I. (2000). Implementing Enterprise Resource Planning Systems: The Role of
Learning from Failure. Information Systems Frontiers 2:2, pp. 213–232.
[Crossref]
Solow, R.M. (1987, July 12). We’d better watch out. New York Times Book Review.
Taylor, E. & Gill, M. (2014): CCTV: Reflections on Its Use, Abuse and Effectiveness. In Gill, M.
(Ed.), The Handbook of Security, pp. 705–726. Palgrave Macmillan.
[Crossref]
Tilley, N. (1993). Understanding Car Parks, Crime and CCTV: Evaluation Lessons from Safer Cities.
Police Research Group, Crime Prevention Unit Series Paper 42, London: Home Office.
Von Bertalanffy, L. (1968). General System Theory: Foundations, Development, Applications. New
York: George Braziller.
Vandenbosch, B. & Ginzberg, M.J. (1996–1997). Lotus Notes® and Collaboration. Plus ca change
… Journal of Management Information System, 13(3), pp. 65–81.
Welsh, B., Piza, E., Thomas, A. and Farrington, D. (2020). Private Security and CCTV Surveillance:
A Systematic Review of Function and Performance. Journal of Contemporary Criminal Justice,
36(1): 56–69.
[Crossref]
David J. Brooks
Email: [email protected]
Abstract
The chapter considers Intrusion Detection Systems (IDS) when applied in
the protection of assets as a Defence in Depth strategy. Defence in Depth
deters, detects, delays and responds. IDS is an automated technology that
deters, detects and communicates the presence or attempted presence of a
person or object intruding within a designated zone.
Elementary to successful detection are IDS sensing detectors, in which
detect is achieved by the geometry of detection through the anticipated
intrusion vector. Sensing detectors have a field of view exposed to a
designated zone, where the sensor is stimulated when exposed to a
compatible person or object through emitted or reflected energy, a pressure
wave or molecular decay. There are a taxonomy of sensing detectors,
categorized by either the dimension of detection or more commonly,
application. Dimension of sensing detectors range from zero to four
dimensions, whereas application range from internal or external and
mounted, free-standing or buried.
Efficacy factors of IDS include their degree of deterrence, the
probability of intrusion detection and whether IDS alters deviant behaviour.
Finally, application issues include the nuisance alarm rate, electronic
security sector and its regulatory regimes, and future trends in IDS are
considered.
Introduction
Intrusion detection systems were once the domain of governments and
high-value commercial premises (Gilbertson 2005: 499); however, over
time these systems have become a protective norm. Consequently, today
they are far more common in our built environment as a primary method for
the protection of people, information and assets. As Durant et al. state,
intrusion detection systems ‘form the backbone of a facility’s physical
protection program’ (2020: 433). Nevertheless such an approach is
problematic, as using an intrusion detection system as the primary treatment
strategy limits the physical security system ability to diagnose threats and
infer the most appropriate risk treatment strategy. This is an issue born from
the seminal security literature, which takes an applied treatment approach to
intrusion detection systems.
An intrusion detection system may be considered an automated
technology, implemented to detect and communicate the presence of a
person or object in a designated spot, area or zone (Brooks and Coole
2019). Such a system supports the security theory of defence in depth, to
deter, detect, delay and respond. The intrusion detection system provides a
degree of deterrence conditional on the threat, but has the primary function
of detecting a person or object. Nevertheless, to achieve efficacy in
detection requires the physical security system to assess and activate a
response to interrupt the intrusion.
Increased application of intrusion detection systems as a security
technology have been driven by a significant reduction in their cost,
improved technology due to microelectronics, an increase in personal
prosperity and a greater reliance on technology, which is in contrast with
downward trends in crimes, especially property crime (Prenzler and Sarre
2012: 39). A view supported by Park (2002: 57), in which market demand
continues to drive installation of these systems. Furthermore, both the
private security industry, through self-interest, and police, support intrusion
detection systems. Nevertheless, the private security industry is prone to
systemic failures (Brooks 2011: 102) stemming from a lack of training,
quality of installations, ineffective self or government regulation and
limiting legislation (Prenzler and Sarre 2012).
Therefore, this chapter considers intrusion detection system factors such
as definition to support a more precise language (Kahneman 2011: 4),
theories that support intrusion detection systems as a security strategy, the
need to apply the principle of geometry of detection and application issues
such as the impact of installation quality and nuisance alarms. The
geometry of detection, thought vectors of intrusion, leads to a taxonomy of
sensing detectors based on spatial dimensionality. However, the sensing
detector is only one part of the system that has other discrete elements
integrated to form the intrusion detection system, which in itself is only one
element of the physical security system. Consequently, without appropriate
detection, general an intrusion detection system, a security system cannot
be effective.
Security in Depth
Security in depth is an approach where holistic treatments to security
protection and resilience are provided based on the contextual threats and
risks, cognizant that layers of protection are insufficient in some
circumstances. The principle combines prevention, preparation, response
and recovery. For an organization, security in depth is the ‘sum of all
security layers, physical and logical, which stand between an adversary and
a protected target’ (Coole et al. 2012: 32), extended to integrate governance,
policies and procedures, continuity and management of the security
function.
In contrast, defence in depth is the concept that to accomplish their goal
intruders are required to avoid or defeat a sequential number of protective
devices (Garcia 2008; Smith and Brooks 2013) or layers. Protection in
depth applies the same goal as defence in depth, but to a single layer. It is
important to note that a security layer can be a physical, demarcation or
electronic barrier, a procedure or a physical person such as a guard, staff
member or general public. A layer in an intrusion detection system
generally provides detection, although for covert intrusions it may also
provide a degree of delay.
Defence in Depth
The primary function of an intrusion detection system, as an element of a
physical security system, is to support defence in depth. Defence in depth is
a strategy of enclosing an asset with a succession of layers, which has been
applied for many centuries. It provides for the protection of assets through
the elements of deter, detect, delay and response. In the physical security
system, an intrusion detection system deters, detects and to some degree,
delays, a person or object of interest. Deterrence is achieved when the
physical security system appears sufficient that potential intruders perceive
that an attack is too difficult or risky for the expected payoff, meeting
rational choice theory.
Detection of overt or covert intrusion must be accomplished to prevent a
successful penetration. Detection is a critical function of the defence in
depth strategy, as it is only a matter of time before an intruder penetrates all
layers to reach the asset. Effective physical security is related to time at
detection; therefore, timely detection is required to facilitate apprehension
(Garcia 2008).
Delay is the progress of intrusion through layers. Delay may be
achieved in a covert intrusion, where the intruder is slowed through
attempts to bypass or technically defeat the intrusion detection system or
detection sensors. Finally, timely response must interrupt and counter the
intrusion. Any response must be less than the layer(s) delay time after
detection, or else intrusion will be completed before responders’ attendance
(Smith and Brooks 2013: 107–108).
BSI (2017: 1)
Conclusion
Intrusion detection systems are a common security technology within the
built environment, applied as a situational crime prevention strategy in
physical security. The application of these systems supports the security
principle of defence in depth, to deter, detect and, in some cases, delay,
resulting in an increased risk of unauthorized intrusion. Within detect, an
intrusion detection system discovers the presence or activity, through
sensing, of an attempted or actual intrusion and generates an alarm for the
physical security system to assess, respond and interrupt the intrusion.
To achieve efficacy in detection requires an appropriate geometry of
detection. Geometry of detection is the sum of the threat characteristics or
specifically, anticipated target, the sensing detector’s finite environmental
field of view and underlying physics principles, and the vector of intrusion.
The vector of intrusion is the viable path into the three-dimensional
protected security zone, although sensing detectors detect between zero to
four dimensions. Nevertheless, an intrusion detection system is not only the
sensing detector rather an integration of discrete elements and devices to
form the system.
Intrusion detection systems is an automated technology used to mitigate
threats and risks; however, their ability to achieve such an outcome is the
sum of interrelated factors. These factors include the capability of intrusion
detection systems to detect unauthorized activity, the degree of deterrence
in reducing attempted or actual unauthorized activity, and their ability to
integrate into the physical security system. Consequently, the ability of an
intrusion detection system to detect, with a suitable probability of
interruption, has to be considered and ideally, measured (see Recommended
Reading, Garcia 2008) within the physical security system. Therefore,
intrusion detection systems must not be applied in isolation as a standalone
system.
In an intrusion detection system, deterrence is the ability to discourage
an unauthorized entry by making a successful entry appear difficult or
impossible (Garcia 2008), resulting in detection and apprehension.
Offenders check for the presence of an intrusion detection system during
planning (Lab 2016) and half are deterred (Gately et al. 2014: 5); however,
other crime prevention strategies such as neighbours (Armitage 2017),
occupancy (Roth 2018: 719), and lights and door locks (Tseloni et al. 2017:
646) are more effective. Notwithstanding these factors, intrusion detection
systems do provide a level of situational crime prevention through target
hardening by providing the element of detection.
The use of intrusion detection systems is by those who can afford to
fund private security (Roth 2018: 720). In other words, the ability of the
user to pay. As a technology, these systems are a supplement to police
protection (Lee and Wilson 2012: 2). The ability to pay results in a
neighbourhood clustering of intrusion detection systems (Lee and Wilson
2012: 16), where environmental saturation of security strategies has a crime
reduction impact.
Intrusion detection systems are designed, installed and maintained by
the private security industry, and there has been concerns with this sector of
the security industry due to systemic failure (Brooks 2011) and recurring
scandals (Prenzler and Sarre 2012). Many nation states, as a means to
address these issues, use legislation, national standards and industry
licensing in an attempt to improve the quality of intrusion detection
systems. An aspect that has had a significant impact in previous decades are
intrusion detection system nuisance alarms, resulting in punitive action and
in many cases, police no longer responding to alarms. Although nuisance
alarms are reducing, the cost of such alarms are borne by the user.
Recommended Reading
Lab (2016) in Crime Prevention: Approaches, Practices and Evaluation
(9th ed.) provides an examination of the origins of crime and its prevention
strategies. Topics are divided into primary prevention measures designed to
prevent conditions that foster deviance; secondary prevention measures
directed towards persons or conditions with a potential for deviance; and
tertiary prevention measures to deal with persons who have already
committed crimes.
Garcia (2008) in The Design and Evaluation of Physical Protection
Systems provides a systems approach to physical security design and
application, considering the many fundamentals required when designing an
intrusion detection systems as a subset to a physical security system. Most
importantly, Garcia provides a means to be able to evaluate through
measurement, security system performance.
Brooks and Coole (2019) Intrusion Detection Systems chapter provides
a synthesis of these systems in the Encyclopedia of Security and Emergency
Management. The chapter defines intrusion detection systems as an
automated technology designed and implemented to detect and
communicate the presence of a person or object in a designated zone. An
intrusion detection system provides the detection element in a physical
security system, which holistically deters, detects, delays and responds.
References
Abaimov, S., & Martellini, M. (2017). Selected issues of cyber security practices in CBRNeCy
critical infrastructure. In M. Maurizio & A. Malizia, (Eds.), Cyber and Chemical, Biological,
Radiological, Nuclear, Explosives Challenges: Threats and counter efforts. Cham: Springer.
AIC. (2004). Crimes against Business: A Review of Victimisation, Predictors and Prevention, No. 11.
Canberra: Australian Institute of Criminology.
Armitage, R. (2017) Burglars’ take on Crime Prevention through Environmental Design (CPTED):
Reconsidering the relevance from an offender perspective. Security Journal, 31(1). 285–304.
[Crossref]
British Crime Survey. (2011). Crime in England and Wales 2010/11. London: Home Office.
BSI. (2017). BS EN 50131-1 Alarm systems. Intrusion and hold-up systems—Part 1: System
requirements. London: British Standard Institute. Accessed May 5, 2020, from http://www.
standardsuk.com/.
Brooks, D.J. (2011). Intruder Alarm Systems: Is the Security Industry Installing and Maintaining
Alarm Systems in Compliance to Australian Standard AS2201? Security Journal, 24(2), 101–117.
[Crossref]
Brooks, D.J., & Coole, M. (2019) Intrusion Detection Systems, in Shapiro L., and Maras M.H. (eds)
Encyclopedia of Security and Emergency Management. Springer, Cham.
Brooks, D.J., Coole, M., Johnson, C., Corkill, J., & Jenkinson, M. (2015) Efficacy of property
marking as a situational crime prevention strategy. The Proceedings of 8th Australian Security and
Intelligence Conference, Perth: Edith Cowan University, 5–11.
Buck, A.J., Hakim, S., & Rengert, G.F. (1993). Burglar Alarms and the Choice Behavior of Burglars:
A Suburban Phenomenon. Journal of Criminal Justice, 21(5), 497–507.
[Crossref]
Butler, G. (1994). Commercial Burglary: What Offenders Say, in Gill, M. (ed.) Crime at Work:
Studies in Security and Crime Prevention. Leicester: Perpetuity Press. pp. 29–41.
Clarke, R.R. (1997). Situational Crime Prevention: Successful Case Studies. 2nd ed. New York:
Harrow and Heston.
Clarke, R.V., & Cornish, D.B. (1985). Modeling Offenders’ Decisions: A Framework for Research
and Policy, in Tory, M. and Morris, N. (eds.) Crime and Justice: An Annual Review of Research.
Volume 6. Chicago, IL: University of Chicago Press.
Cohen, L.E., & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity
Approach. American Sociological Review, 44, 588–608.
[Crossref]
Coole, M., & Brooks, D.J. (2009). Security Decay: An Entropic Approach to Definition and
Understanding. Paper presented at the Proceedings of the 2nd Australian Security and Intelligence
Conference, Perth.
Coole, M., Brooks, D., & Minnaar, A. (2018), Educating the Physical Security Professional:
Developing a Science-based Curriculum. Security Journal, 31(3), 524–547.
[Crossref]
Coole, M., Corkill, J., & Woodward, A. (2012). Defence in Depth, Protection in Depth and Security
in Depth: A Comparative Analysis Towards a Common Usage Language. Paper presented at the 5th
Australian Security and Intelligence Conference, Perth.
Coupe, T., & Kaur, S. (2005). The Role of Alarms and CCTV in Detecting Non-residential Burglary.
Security Journal, 18(2), 53–72.
[Crossref]
Cromwell, P. F., Olson, J. N., & Avary, D. W. (1991). Breaking and Entering: An Ethnographic
Analysis of Burglary, National Institute of Justice. Thousand Oaks, CA: Sage Publication.
Cunningham, W. C., & Taylor, T. H. (1985). The Hallcreast Report: Private Security and Police in
America Portland, OR: Chancellor.
Durant, D., Pound, K., & Slotnick, J.A. (2020). Alarm System Fundamentals, in Davies, S. and
Fennelly, L. (eds.) The Professional Protection Officer (2nd ed.). Burlington, MA: Butterworth-
Heinemann, 433–443.
[Crossref]
Garcia, M. L. (2008). The Design and Evaluation of Physical Protection Systems. 2nd ed. Burlington,
MA: Butterworth-Heinemann.
Gately, N., Fleming, J., McGinty, N., & Scott, A. (2014). The ‘Oldest Tricks in the Book’: An
overview of reports of burglary by DUMA detainees in Western Australia. Canberra: Australian
Institute of Criminology.
Gilbertson, T. A. (2005). Reducing False Security Alarm Calls for Police Service: A Policy Research
Note. Criminal Justice Policy Review, 16, 499–506.
[Crossref]
Kahneman, D. (2011). Thinking, Fast and Slow. New York: Farrar, Straus and Giroux.
Lab, S.P. (2016). Crime Prevention: Approaches, Practices and Evaluations. 9th ed. Burlington:
Elsevier.
[Crossref]
Lee, S., & Wilson, H. (2012). Spatial Impact of Burglar Alarms on the Decline of Residential
Burglary. Security Journal, 1–19. https://doi.org/10.1057/sj.2012.8.
Minnaar, A. (2004). Private-Public Partnerships: Private Security, Crime Prevention and Policing in
South Africa. Pretoria: University of South Africa.
National Security Inspectorate. (2007). NSI Technical Bulletin No. 0004: Guidance on the
Implementation of BS 8473:2006 the British Standard Code of Practice for Intruder and Hold-up
Alarm Systems—Management of False Alarms. National Security Inspectorate. Accessed April 23,
2014, from http://www.nsi.org.uk/wp-content/uploads/2012/10/Tech-Bulletin-0004-BS8473-2006.
pdf.
Park, C. (2002). Attitudes towards Domestic Alarms. Security Journal, 15, 57–68. https://doi.org/10.
1057/palgrave.sj.8340111.
[Crossref]
Prenzler, T., & Sarre, R. (2012). The Evolution of Security Industry Regulation in Australia: A
Critique. International Journal for Crime, Justice and Social Democracy, (1), 38–51. https://doi.org/
10.5204/ijcjsd.v1i1.72.
Roth, J. J. (2018): The Role of Perceived Effectiveness in Home Security Choices. Security Journal,
31,708–725.
[Crossref]
SAI Global (2020). Intruder alarm systems Client’s premises—Design, installation, commissioning
and maintenance AS/NZS 2201.1.2007. Sydney: SAI Global Standards & Legislation. Accessed May
27, 2020, from https://infostore.saiglobal.com/en-au/Standards/AS-NZS-2201-1-2007-117334_
SAIG_AS_AS_245553/.
Sampson, R. (2007). False Burglar Alarms. Washington, DC: U.S. Department of Justice, Office of
Community Oriented Policing Services.
Sarre, R., & Prenzler, T. (2011). Private Security and Public Interest: Exploring Private Security
Trends and Directions for Reform in the New Era of Plural Policing. Canberra: Australian Research
Council.
Smith, C.L., & Brooks, D.J. (2013). Security Science: The Theory and Practice of Security. Waltham,
MA: Elsevier.
Tseloni, A., Thompson, R., Grove, L. & Farrell, G. (2017). The Effectiveness of Burglary Security
Devices. Security Journal, 30, 646–664.
[Crossref]
Narayana, S., Prasad, R.V., Rao, V.S., Prabhakar, T.V., Kowshik, S.S., & Iyer, M.S. (2015, April).
PIR sensors: Characterization and novel localization technique. In Proceedings of the 14th
international conference on information processing in sensor networks, 142–153.
Van Dijk, J. (2012). Closing the Doors, Stockholm Prize winners Lecture 2012. Stockholm: Paper
presented at the Stockholm Criminology Symposium, June.
Walsh, T.J., & Healy, R.J. (2012). Protection of Assets. Alexandria, VA: ASIS International.
Weisel, D. L. (2002). Burglary of single-family houses. Washington, DC: U.S. Department of Justice,
Office of Community Oriented Policing Services.
Wyss, G. D. (2009). Quantifying the Degree of Balance in Physical Protection Systems, SAND2009–
4139C. New Mexico: Sandia National Laboratories.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_33
John M. Blythe
Email: [email protected]
Eon Kim
Email: [email protected]
Nissy Sombatruang
Email: [email protected]
Abstract
The authors systematically review the types of crime that the Internet of
Things (IoT)—which brings Internet connectivity to everyday electronic
devices, such as security cameras, TVs and speakers—has and might
facilitate because of security lapses. They also discuss efforts to improve
security including approaches to encourage manufacturers to address
vulnerabilities in the products they manufacture.
Introduction
Estimates from the crime survey of England and Wales suggest that at least
half of all crime involves computer misuse (Office for National Statistics
2020). Offenders have been quick to take advantage of the speed,
convenience and anonymity of the Internet and have used it to commit a
diverse range of criminal activities. Many of the crimes committed,
including fraud and theft are not new (e.g. Wall 2007), but the Internet has
enabled them to take place at a greater scale. Newer crimes have also arisen
and include creating and spreading malicious software (malware), hacking
to obtain sensitive information and the denial of service to cause disruption,
financial and/or reputational damage (McGuire and Downling 2013). These
crimes can have devastating effects on individuals, businesses and
government services. In 2017, a global ransomware attack (WannaCry)
demonstrated the real-world tangibility and reach of cybercrime. Hackers
exploited a flaw in the Windows Operating System to infect machines with
ransomware, a form of malware that encrypts the victim’s data until they
pay to access it (e.g. Mohurle and Patil 2017). This attack impacted many
organisations, including the United Kingdom’s National Health Service,
causing widespread service disruption including (denied) access to patient
records which had the potential to lead to a loss of life.
As more devices become Internet connected, the nature of crime will
continue to evolve, and we may start to see more physical impacts of
cybercrime. The WannaCry example exploited a flaw in outdated versions
of Microsoft. The need to continually patch operating systems as
vulnerabilities are identified is less than ideal (see Schneier 2018).
However, there now exist a host of Internet connected devices with little or
no security built into them at all. Referred to as the “Internet of Things”
(IoT)—everyday objects with the ability to connect to and exchange data
over the Internet. The consumer market of IoT includes smart watches,
smart kettles, and smart cameras that can come together to form smart
homes, and eventually, smart cities. The IoT is a major technological shift
as it brings greater cyber-physical convergence and with this, opportunities
to improve our lives in many ways.
However, it also brings threats to physical safety and human well-being.
That is, as with any major technological shift, there is the potential for a
“crime harvest” (Pease 1997) due to the fact that innovation, and an
associated rush to the market to monetise it, often leads to the production of
new products (or services) that are designed without adequate consideration
of their crime and security risks (Pease 1997). While manufacturers might
not pay sufficient attention to these issues, offenders do and exploit the
vulnerabilities in the products for personal gain. Historically, such crime
risks have been addressed through better product design and/or government
intervention, but often only retrospectively (e.g. Laycock 2004). In the
context of the IoT, we have already started to see the beginning of an IoT
crime harvest. For example, offenders have built IoT botnets—large
numbers of insecure IoT devices (including cameras and home routers)
enslaved by malware—that are used to disrupt online services (e.g. Twitter)
by sending massive amounts of requests to, and subsequently
overwhelming, their servers (BBC News 2017). The insecurity of IoT
devices have been frequently demonstrated in penetration tests too. For
example, smart toys have been shown to be hackable (Which? 2017) with
the My Friend Cayla doll banned in Germany and labelled as an “illegal
espionage device” (The Guardian 2017).
Ofcom (2020) estimates that 63% of homes in the UK now own an
Internet connected TV, while 22% own a smart speaker. Further, the Global
Systems for Mobile communications association estimates that by 2025,
there will be 25 billion IoT devices on the planet. As well as increasing in
number, so too is the range of devices available. For example, there now
exist Internet connected door and window locks, and even bins, salt
dispensers and hair dryers. The latter examples are amusing, but the point
of central importance is that the attack surface is expanding, as is the
potential range of actions that can be triggered. Consequently,
understanding and identifying the crime risks associated with the IoT is
important. At present, no data exist in official crime records about crimes
facilitated by the IoT, and no data (of which we are aware) are captured in
sample surveys that would shed light on the issue. In this chapter, we
discuss the findings of two systematic reviews conducted with the aim of
identifying what crimes have been facilitated by the IoT and what types of
offending are plausible. As well as contributing to the knowledge base, the
work is intended to inform efforts to preventing the types of crime
identified before they are committed or become widespread.
Before presenting findings, two things are important. First, we focus on
crimes (that could be) facilitated by consumer IoT devices found in the
home. We do not consider industrial control systems (e.g. Tuptuk and
Hailes 2018) or Smart Cities (see Laufs et al. 2020). However, it would not
take much imagination to consider how things apply in these contexts.
Second, where rapidly advancing technologies are concerned, research
about them is likely to be out of date soon after (or before) publication. This
will certainly be the case here as the searches conducted took place
sometime (between 2017 and 2019) before the publication of this book.
That said, absent a major technological disruption to the IoT, the issues
identified are likely to remain a concern after the publication of this book,
and even if the specifics change, the general issues are likely to remain (at
least for some time).
Our first review was a systematic review (SR) of the academic literature
(for full details, see Blythe and Johnson 2021). Below, we summarise the
main findings along with a brief description of the approach taken.
However, because the academic literature moves relatively slowly, we
complimented our SR with an analysis of online open-source material that
discussed crimes that had been facilitated by IoT devices. To do this, we
used Natural Language Processing (NLP; see Chowdhury 2003) to facilitate
the search process. Doing so addresses two issues associated with searching
such material. The first concerns the vast amount of open-source material
available. Using NLP enabled us to search this material in a more
systematic way than would otherwise have been possible. Second is the fact
that there is a lack of consistency in the language used to discuss different
forms of cybercrime across disciplines. For example, cybersecurity
researchers have very specific definitions for what constitutes an attack
versus a threat, whereas these may be used interchangeably in other
disciplines (e.g. crime science). The authors of reports may also describe
crimes involving the IoT in different ways for different audiences (e.g.
academic versus general public), making conventional Boolean searches
ineffective. NLP affords the opportunity to identify IoT crimes in a
systematic manner that helps to alleviate these issues.
The remainder of the chapter is organised as follows. Next, we briefly
discuss the search strategies used for the two reviews, providing more detail
of the open-source search, as the academic review is reported in detail
elsewhere (Blythe and Johnson 2021). We then summarise the findings of
the two reviews. In the discussion, we consider the implications of the
reviews for the crime reduction enterprise, and briefly review some of our
other work that has examined consumer perspectives and the need for
regulation in this sector.
Method
Academic Systematic Review
We searched the Web of Science, ProQuest, ACM Digital Library, IEEE
Xplore Digital Library, and Scopus academic databases in November 2017
for papers published between 2007 and 2017. The following search terms
were used:
“IoT” OR “Internet of Things” OR “Internet-connected” OR “smart
NEAR/3 device*” OR “smart home” OR “connected device*” OR “smart
wearable” OR SU.EXACT(“Internet of Things”) OR
SU.EXACT(“Internet of Things”) OR SU.EXACT(“Ubiquitous
Computing”)
AND
“hack*” OR “risk*” OR “threat*” OR “vulner*” OR “crim*” OR
“attack*” OR “exploit” OR “security” OR “privacy” OR “bug” OR
SU.EXACT(“Crime”) OR SU.EXACT(“Internet Crime”) OR
SU.EXACT(“Computer Crime”)
– We will also search for the following subject headings (where allowed
by the database): SU.EXACT(“Crime”) OR SU.EXACT(“Internet
Crime”) OR SU.EXACT(“Computer Crime”)
AND
“consumer” OR “domestic” OR “wearable” OR “home” OR “house”
The titles and abstracts of all articles were screened and the full text
read for articles that met our inclusion criteria. To be included, articles had
to be written in English, published in a peer-reviewed outlet (PhD theses
were also included), concern consumer IoT devices and explicitly discuss a
crime or security issue (see Blythe and Johnson 2021).
Open-Source Media Review
To search the open-source material, we used IBM Watson Discovery. At the
time of the review, this ingested news media published in the prior 60 days.
We sampled news media that was collected during two periods: 20 January
2018 to 21 March 2018, and 14 May to 13 August 2019.
Using Watson’s natural language search function enabled us to find
articles that a Boolean search would not. For example, searching for the
word “crime” using a Boolean search would locate only those articles that
contained the exact word “crime”. This could lead to the exclusion of a
large number of relevant articles that discussed (say) “assault” or “fraud”.
In contrast, taking advantage of a natural language approach, searching with
the same keyword identifies articles that discussed related words or
concepts.
Initial searches identified problems with the approach due to the way
that articles are indexed and located using the search engine. For example,
the term “Internet of Things” not only identified articles that discussed the
IoT but also those that concerned the Internet more generally. As such, this
search strategy was not sufficiently sensitive and returned many irrelevant
articles. To address this, we used filters to select from the identified corpus
only those articles that mentioned words related to the IoT and crime. We
also noted that open-source articles did not always explicitly mention the
“IoT”, but used other terms. In the next section, we detail how the
keywords and filter terms were developed to address these issues.
Inclusion Criteria
To be included in the review, articles had to discuss a crime facilitated by
the IoT. For each document, Watson produced a meta score, which provides
an index of its likely relevance. Using these scores, we sorted the
documents in order of likely relevance and manually reviewed them to
identify those that met our inclusion criteria. For both searches, we
terminated the review when the number of articles per N articles that met
the inclusion criteria substantially declined. This led to the inclusion of
1090 articles (of 8319 initially identified) for the 2018 search, and 504 (of
53,395 initially identified) for the 2019 search.
Results
For the academic review, 3506 articles were initially identified, but after
full text review, only 114 met our inclusion criteria. Considering the open
media material, for the 2018 search, 11% (N = 122) of the articles discussed
incidents of crime or unusual device behaviour. The remainder discussed
crimes that could be facilitated by IoT devices. For the 2019 search, around
33% (N = 165) of the articles discussed offences that had occurred. As
stated above, in what follows, for the open media articles, we focus on
those articles that reported actual offences.
For both reviews, a thematic analysis was conducted to identify the
types of crime identified. In addition to examining the offences committed
or discussed as possible, we also considered exactly how IoT devices might
facilitate such offending. Next, we briefly discuss the types of attack
commonly discussed in the academic literature, what this might allow
offenders to do, and what types of offending this could facilitate.
Types of Attack
Ten types of attack were discussed, although these were not mutually
exclusive, and some might have to be used in combination. We discuss each
in turn. Malware attacks are used to compromise vulnerabilities associated
with a device so that it can be exploited to do things other than its intended
purpose (e.g. Kang et al. 2017), such as sending spam emails. Denial of
Service (DoS) and Distributed Denial of Service (DDoS) attacks (e.g. Lyu
et al. 2017) were commonly discussed. In both cases, the aim is to make an
online service (e.g. a website or server) unavailable by overwhelming it
with massive volumes of requests. The difference between the two is that in
the case of the former, requests come from a single source, whereas for the
latter they are sent simultaneously from multiple devices. One approach to
launching DDoS attacks is for attackers to compromise large numbers of
insecure devices with malware to form a botnet they control and from
which they can send repeated requests.
Eavesdropping involves the unauthorised interception of (private) data
(e.g. Vigo et al. 2012) so that this can be misused. Man-in-the-middle
attacks (e.g. Vemi and Panchev 2015) occur when an attacker intercepts
communications between two or more devices and relays these or injects
alternative content between them. The innocent parties are unaware that
they are not communicating directly and hence the attack can be used for
the purposes of eavesdropping, or to send false information between parties.
Data integrity attacks (e.g. Kumar et al. 2014) are used to alter data stored
on, or sent to a device with the aim (e.g.) of controlling it in some way. In
the case of spoofing attacks, an attacker tricks the device into thinking they
are a genuine user so that they can steal information or control the device
(e.g. Bugeja et al. 2017). User impersonation attacks are variant of this (e.g.
Hoang and Pishva 2015) that may, for example, include social engineering
techniques to obtain information necessary to gain access to a device. Side
channel attacks (e.g. Srinivasan et al. 2008) exploit (often seemingly
innocuous) data that can be obtained despite the existence of security
measures (e.g. power usage), which can be used for a variety of purposes,
including profiling a victim’s activity. Physical attacks (Snader et al. 2016),
where an attacker gains physical access to a device, allowing them to
tamper with it, were also discussed.
Intermediate Outcomes
Next, we examined what the types of attacks discussed, alone or in
combination, would allow an attacker to do. We refer to these as
intermediate outcomes because these actions may not be criminal in and of
themselves (although some are). Table 33.1 summarises these, the volume
of academic studies published and the types of research methodology
employed.1 We discuss the latter because many of the studies reviewed only
discussed the possibility of an attack or intermediate outcome, while others
demonstrated them as possible in a laboratory or real-world setting. The
immediate cause for concern regarding a particular intermediate outcome is
more compelling if it has actually been demonstrated. On the other hand,
those risks that are identified as plausible by experts are perhaps those that
we should be worrying about now to prevent them from occurring in the
(near) future. Table 33.1 also summarises the findings from the open media
review as to whether particular intermediate outcomes have actually been
reported in the real world (more details can be found in the subsequent
section).
Table 33.1 Summary of the intermediate outcomes IoT devices make possible and their discussion
in the literature
Description Academic Open media
literature
Exposing personal user Information stored or shared by 7 lab-based studies 5 articles
data devices can be intercepted by demonstrated the discussed the
attackers. This can include plausibility of “eavesdropping”
sensitive data (e.g. passwords) attacks, while 5 of user
or information pertaining to expert and 1 user- conversations by
user behaviour and habits (e.g. group study staff through
fitness data). speculated about smart speakers;
such risks. Conversations
captured by
toymaker spiral
toys products
were leaked.
Profiling Through (say) a side channel 14 lab-based studies 2 articles
attack, an offender infers a demonstrated the discussed how
user’s patterns of activity (e.g. plausibility of these data leaked from a
running, travel) at a particular attacks, while 6 fitness app
point in time or to enable them study authors identified a
to profile their behaviour. speculated about military base.
them.
Physical access control An attacker misuses devices 4 lab-based studies 1 article discussed
that control physical access in demonstrated the this type of attack
the home. plausibility of this but in the context
type of attack. of a hotel.
Manipulation of device An attacker remotely controls 6 lab-based studies –
(general) and manipulates a device. For demonstrated the
example, using actuators on plausibility of this
household robots to cause type of attack.
damage to household property.
Control audio/visual Use of audio/visual outputs of 5 lab-based studies 32 articles
outputs IoT devices to control what the demonstrated the discussed the
user hears/sees. plausibility of this manipulation of
type of attack, while cameras and
one author speakers.
speculated about
them.
Supress safety-critical Malicious control or 1 lab-based study –
monitoring capabilities suppression of safety-critical demonstrated the
monitoring devices (e.g. fire plausibility of this
alarms). type of attack, while
two authors
speculated about
them.
Description Academic Open media
literature
Service unavailability An attacker disrupts the 9 authors speculated 7 articles
and/or restriction functioning of connected about this type of discussed attacks
devices in the home including attack but there on smart
those that provide critical (e.g. were no lab or other infrastructure
physical access, heating) and demonstrations of such as
less critical (e.g. Internet them. thermostats.
access) services.
Monitoring/surveillance Exploitation of consumer IoT 4 lab-based studies 4 articles
devices may allow attackers to demonstrated the discussed privacy
listen and monitor user plausibility of this issues; in
activities. type of attack, one particular, that
expert and one user- users’ private
group study conversations
speculated about were listened to
them as did 4 study by staff or shared
authors. with other
customers.
Gateway to further Exploited devices (or 1 lab-based study 184 articles
attacks information extracted from demonstrated the discussed
them) may be used to launch plausibility of this incidents where
additional attacks. For example, type of attack, while malware was used
using a device as part of a 1 expert group and to create IoT
botnet to launch DDoS attacks, 6 study authors did. botnets.
or using personal information
for targeted password guessing.
Energy theft* Attacker misuses smart meters or other consumer devices to Crypto-
steal electricity, increase utility costs to victims, manipulate mining
energy costs in distribution networks, impact smart grid Smart utility
networks or cause blackouts. hacks
Profiling, targeted or Use of information from IoT for targeted advertising and –
unsolicited marketing.
advertising
Blackmail Use of information gained from IoT devices to blackmail –
individuals.
Vandalism Damage to physical property or household objects arising Brickbot,
from exploited devices with actuators. Silex
Illicit affective Use of information gained from IoT devices to cause Smart toys
response embarrassment, annoyance or damage reputations.
Discrimination Misuse of information from IoT devices (e.g. beliefs, health –
information) to discriminate against individuals.
Stalking Use of information gained from IoT devices (e.g. location) Gaslighting
to stalk victims.
Denial of use Disruption of services or access systems using IoT devices. Door systems
Accessing wider The use of IoT devices to gain access to the networks to Hacks of IoT
networks which they are connected. devices
including
smart fridges
and fish tanks
Unauthorised Surveillance
The hacking of IoT devices to enable surveillance2 was the next common
theme discussed. Baby monitors, private webcams, CCTV cameras and
smart TVs were amongst those reported to have been hacked. Watson
identified articles about the first well-publicised hack of a baby monitor,
which took place (at the time of writing) five years ago in Texas. In this
case, a couple discovered that the baby monitor in their daughter’s bedroom
let a stranger spy and talk to their baby. In 2017, a similar story was
reported about a hacker who had gained access to a baby monitor and was
speaking to a toddler, until discovered by the parents. In 2019, there were
also articles about Spiral Toy’s “smart toys” which leaked two million
recorded messages of parents and their children via an unsecured online
database.
For private webcams, in 2018, Watson identified an article about a
Russian-based website that was streaming thousands of private feeds from
family homes, hospitals and stores to draw attention to vulnerabilities in
IOT devices. An article reported in Techgenix.com covered a privacy leak
from a Samsung Smart TV where consumers learned that their TV listened
to private conversations and these data were sent to a third party.
In 2019, several articles also reported that security camera systems were
the most hacked IoT devices. For example, Gearbrain.com reported that
they represented 47% of compromised IoT products. Other websites (e.g.
Finalfrontiers.net) reported that more than 5 million attacks had been
launched against IP cameras. Although the intention of these hacks was not
always clear, the prevalence of this type of crime specifically highlights the
privacy and security risks associated with IoT devices.
Discussion
The results of our reviews provide insight into how the vulnerabilities
associated with IoT devices can be exploited and the types of offences this
might afford. Here, we discuss some of these issues and the challenges
associated with securing the consumer IoT.
Our review highlighted clear issues with IoT botnets. However, for the
most part, unless members of the public are the intended victims, the impact
of botnets is primarily felt by third parties not (necessarily) the consumers
whose devices are exploited. To some extent, this presents a challenge for
crime prevention. That is, as this crime risk does not directly affect
consumers, they may not be aware of the problem, or that their own devices
may be involved. Even if they are, because it does not affect them directly,
they may not be concerned about it, or unmotivated to take steps to address
it. This would, of course, be short sighted as botnets pose a strategic crime
risk since they can disrupt many services, including those used by
consumers as well as critical infrastructure. On this point, we have started
to see an increase in the use of IoT botnets in crimes offered as a service
(Kolias et al. 2017). That is, botnets can be easily rented cheaply and are
widely available on the darknet—making the risk of being attacked by them
a general one.
A related theme concerned the hacking of IoT devices to gain
unauthorised access to networks (as opposed to individual devices).
Adversaries and cyber criminals know that many IoT devices have security
weaknesses and have exploited them to gain access to otherwise secure
networks. Fish tanks, printers and vending machines are all examples of
“smart” devices found in the review. The issue here is that the “weakest”
link in the home (or corporate) network may provide a gateway for attacks,
unless security is put in place to address this. Such security does exist, but it
comes at a cost, presenting a potential barrier to prevention.
Our recent work, however, suggests that cost might not be as large a
hurdle as it could be. Across two studies we investigated what consumers
would be willing to pay to secure IoT devices. In the first (Blythe et al.
2020), we employed a contingent valuation method that involves presenting
consumers with a hypothetical purchasing decision and asking how much
they would pay for improved security. On average, we found that they
would be willing to pay between 14 and 62% more for a secure device, the
precise percentage depending on the particular product type (e.g. smart tv
versus security camera). One criticism of such studies is that because the
study aim is explicit, participants respond to “demand characteristics” and
report values that do not reflect actual preferences. For this reason, in a
follow-up study (Johnson et al. 2020), we estimated what consumers would
be willing to pay using a Discrete Choice Experiment. Participants were
again presented with hypothetical purchasing decisions but asked which of
three devices (or none) they would purchase. For each device, they were
provided with details about its functionality and price, with these details
being varied across participants and trials. To estimate the influence of
security on decision making, and participants’ willingness to pay for it, for
some devices we also provided a security label. Econometric methods were
then used to estimate the influence of each factor (functionality, price and
security), and how much participants would be willing to pay for them. Due
to the randomisation used in such experiments, it would be difficult for
participants to identify demand characteristics or to respond to them. Our
findings showed that consumers preferred devices with better functionality
but also better security. Moreover, our willingness to pay estimates were
surprisingly similar to those in our previous study (27–63% more). Of
course, these types of study examine participants’ “stated” preferences as
opposed to those “revealed” through actual purchases, and so may not
reflect real-world decision making. Nevertheless, the findings suggest that
participants are, at least in principle, willing to pay for better security.
However, even if consumers would be willing to pay for security, there
currently exists an information asymmetry in the marketplace that would
make it difficult for them to do so. That is, devices vary considerably in the
security provided and unless consumers can tell which are secure and which
are not, it will be very difficult for them to purchase those that are. To
examine this issue in detail, we (Blythe et al. 2019) conducted a review of
the materials (online user manuals and associated materials) that consumers
can access about a sample of 270 devices prior to purchase. Our first
finding was that, prior to purchase, materials could not be found for 100
devices. Absent such material, consumers would have no way of
determining what, if any, security such devices were provided with. For the
remaining 170 devices, we systematically coded the security information
provided (regardless of where it was provided). What was reported, and
how it was reported, varied substantially across devices, making it difficult
for consumers to compare them. Thirdly, we found that while some things
were reported fairly consistently (e.g. details of how user accounts were
managed, how to initiate a factory reset and whether software updates were
provided), most were not. Strikingly, none provided details about how long
security updates would be provided, only 2% discussed two-factor
authentication, and only 5% explained how data were encrypted.
If a consumer wants to buy a healthy food product, in many countries
they can make informed choices by examining a front of packet label, or
reading the ingredients. A similar situation exists for many electronic
goods. In the case of IoT devices, this is not true—in most countries at
least. Further compounding the issue, research (Harris Interactive 2019)
suggests that most consumers assume that security is built into IoT devices.
This is a market failure, and one all too familiar. As discussed, it is
commonly the case that when new products and services are introduced,
little care and attention is given to their crime and security implications,
which can lead to a crime harvest. At this point, it is important to note that
the security of devices varies significantly and some manufacturers have
taken security seriously. However, many have not and this needs
addressing. In the UK, the Department for Digital, Culture, Media and
Sport (DCMS) has undertaken a substantial volume of work to address this.
This has included consultation with industry and others to establish a Code
of Practice (DCMS 2018) that details 13 principles manufacturers should
follow (e.g. not using default usernames and passwords), as well as the
commissioning of research to develop the evidence base. They have
consulted with industry and the public on policy options which include the
use of a labelling scheme (mandatory or voluntary) to indicate the level of
security devices provide, or regulation that would require devices to meet
minimum security standards, have recently funded voluntary assurance
schemes (see https://bit.ly/3tPZWW8) and are planning a new law that
would require manufacturers to meet minimum security requirements (see
https://bit.ly/2Qcjzt). Other countries are pursuing similar options (for
Canada, see http://bit.ly/3q4XXe3) and some (e.g. Japan, and Finland, see
http://bit.ly/2MF5in4) have also implemented voluntary labelling schemes,
and hopefully these approaches will address the shortcomings identified
soon. However, countries are addressing these issues at different rates and
even if all countries took the same approach today, there already exist large
numbers of devices on networks that will be insecure. It will be difficult to
address these legacy problems unless the security of these devices can be
updated or devices recalled. This seems unlikely but other options could be
explored such as the widespread use of (smart) routers to identify and
isolate vulnerable devices in real time (Dietz et al. 2018). Routers act as a
gateway between the home and the Internet (see Llinares and Johnson
2018) and so from a situational crime prevention perspective represent a
sensible target for crime prevention efforts in this context.
In this chapter, we have considered the types of offending made
possible by the IoT, but we were unable to discuss the prevalence of
offending. For some crimes (e.g. theft) incidents often go unnoticed at the
time of the offence due to the stealth involved. For example, victims may be
targeted while shopping or using public transport, but only notice that items
have been stolen when they return home. The same may be true for attacks
involving the IoT. However, in this case, and perhaps particularly for
consumer IoT, victims may never realise that devices have been
compromised unless they have some form of intrusion detection system in
place, or the nature of the attack makes this obvious (e.g. a hacked video is
used for criminal gain). For example, victims who are being stalked may
not realise devices are being misused in this way. As such, unlike urban
crime it will be difficult to estimate levels of victimisation using traditional
methods (e.g. using survey or police data). It is hard to understand and
prevent problems without data and so effort needs to be invested in
techniques to measure IoT-facilitated crime. It will likely be necessary to
use approaches more commonly applied in the field of information security
—such as honeypots,3 which are essentially digital twins of real devices
used to monitor malicious activity so that it can be studied (e.g. Mokube
and Adams 2007)—but new approaches may also be required.
In closing, we have focused here on devices found around the home.
These are now commonly owned, but not ubiquitous. To ensure that we do
not see a widespread crime harvest, it is imperative that these devices are
secured now. What is true for the security of the consumer IoT is perhaps
even more so for implantable medical devices. However, as far as we are
aware, the situation is currently not any better for the Internet of medical
things. Addressing these threats should thus be a priority for manufacturers
and regulators alike.
Recommended Readings
An excellent book on the security of the Internet and how this is evolving is
Click here to Kill Everybody by Schneier (2018). It discusses problems
associated with the Internet and devices that are increasingly connected to
it, how current approaches will not work and alternative approaches that we
should pursue. Brewer et al.’s 2019 book Cybercrime Prevention provides a
review of what we know (and don’t) about preventing cybercrime. For
those interested in the human factors involved in information security,
Kevin Mitnick’s 2003 book The Art of Deception comes recommended.
Krebs on security (https://krebsonsecurity.com) is a terrific site for up-to-
date security news and investigation.
References
BBC News. (2017). Mirai botnet: Three admit creating and running attack tool. http://www.bbc.co.
uk/news/technology-42342221. Last accessed 12 March 2021.
Blythe, J. M., & Johnson, S. D. (2021). A systematic review of crime facilitated by the consumer
Internet of Things. Security Journal, 34, 97–125.
Blythe, J. M., Sombatruang, N., & Johnson, S. D. (2019). What security features and crime
prevention advice is communicated in consumer IoT device manuals and support pages?. Journal of
Cybersecurity, 5(1), tyz005.
[Crossref]
Blythe, J.M., Johnson, S.D. & Manning, M. (2020). What is security worth to consumers?
Investigating willingness to pay for secure Internet of Things devices. Crime Sci, 9, 1.
Bugeja, J., Jacobsson, A., & Davidsson, P. (2017). An analysis of malicious threat agents for the
smart connected home. 2017 IEEE International Conference on Pervasive Computing and
Communications Workshops, PerCom Workshops 2017, 557–562.
Chowdhury, G. G. (2003). Natural language processing. Annual Review of Information Science and
Technology, 37(1), 51–89.
[Crossref]
Department for Digital, Culture, Media and Sport (2018). Code of Practice for Consumer IoT
Security. https://www.gov.uk/government/publications/secure-by-design/code-of-practice-for-
consumer-iot-security.
Dietz, C., Castro, R. L., Steinberger, J., Wilczak, C., Antzek, M., Sperotto, A., & Pras, A. (2018,
November). IoT-botnet detection and isolation by access routers. In 2018 9th International
Conference on the Network of the Future (NOF) (pp. 88–95). IEEE.
The Guardian. (2017). German parents told to destroy doll that can spy on children. https://www.
theguardian.com/world/2017/feb/17/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-
children
Harris Interactive (2019). Consumer Internet of Things Security Labelling Survey Research Findings
Report, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_
data/file/950429/Harris_Interactive_Consumer_IoT_Security_Labelling_Survey_Report_V2.pdf.
Last accessed 12 March 2021.
Hoang, N. P., & Pishva, D. (2015). A TOR-based anonymous communication approach to secure
smart home appliances. In International Conference on Advanced Communication Technology,
ICACT (Vol. 3, pp. 517–525).
Hong, G., Yang, Z., Yang, S., Zhang, L., Nan, Y., Zhang, Z., ... & Duan, H. (2018). How you get shot
in the back: A systematical study about cryptojacking in the real world. In Proceedings of the 2018
ACM SIGSAC Conference on Computer and Communications Security, pp. 1701–1713.
Johnson, S. D., Blythe, J. M., Manning, M., & Wong, G. T. (2020). The impact of IoT security
labelling on consumer product choice and willingness to pay. PloS One, 15(1), e0227800.
[Crossref]
Kang, W. M., Moon, S. Y., & Park, J. H. (2017). An enhanced security framework for home
appliances in smart home. Human-Centric Computing and Information Sciences, 7(1), 6.
[Crossref]
Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other
botnets. Computer, 50(7), 80–84. https://doi.org/10.1109/MC.2017.201.
[Crossref]
Kumar, P., Ylianttila, M., Gurtov, A., Lee, S. G., & Lee, H. J. (2014). An efficient and adaptive
mutual authentication framework for heterogeneous wireless sensor network-based applications.
Sensors, 14(2), 2732–2755.
[Crossref]
Laycock, G. (2004). U.K. Car Theft Index: An Example of Government Leverage. In M.G. Maxfield
& R.V. Clarke (Eds.), Understanding and Preventing Car Theft, Cullompton: Willan.
Laufs, J., Borrion, H., & Bradford, B. (2020). Security and the smart city: A systematic review.
Sustainable Cities and Society, 55, 102023.
[Crossref]
Llinares, F. M., & Johnson, S. D. 2018. Cybercrime and Place. In The Oxford Handbook of
Environmental Criminology.
Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H. H., Radford, A., & Sivaraman, V. (2017).
Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the
10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec ‘17 (pp.
46–51).
Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017.
International Journal of Advanced Research in Computer Science, 8(5), 1938–1940.
Mokube, I., & Adams, M. (2007). Honeypots: concepts, approaches, and challenges. In Proceedings
of the 45th annual southeast regional conference (pp. 321–326).
McGuire, M., & Downling, S. (2013). Cyber crime: A review of the evidence Research Report 75
(Issue October).
New York Times (2018). Thermostats, Locks and Lights: Digital Tools of Domestic Abuse, http://
nyti.ms/3vmqIa4, last accessed 12 March 2021.
Ofcom (2020). Media Nations 2020—Interactive data. See: http://bit.ly/37YUJm1. Last accessed 1
March 2021.
Office for National Statistics. (2020). Crime survey for England and Wales.
Pease, K. (1997). Crime reduction. In M. Maguire (Ed.), The Oxford Handbook of Criminology:
Second Edition. Oxford: Clarendon Press.
Snader, R., Kravets, R., & Harris III, A. F. (2016). CryptoCop: Lightweight, energy-efficient
encryption and privacy for wearable devices. 2nd ACM Workshop on Wearable Systems and
Applications, WearSys 2016, 7–12. https://doi.org/10.1145/2935643.2935647.
Srinivasan, V., Stankovic, J., & Whitehouse, K. (2008). A fingerprint and timing-based snooping
attack on residential sensor systems. ACM SIGBED Review, 5(1), 1–2.
[Crossref]
Tuptuk, N., & Hailes, S. (2018). Security of smart manufacturing systems. Journal of Manufacturing
Systems, 47, 93–106.
[Crossref]
Vemi, S. G., & Panchev, C. (2015). Vulnerability testing of wireless access points using Unmanned
Aerial Vehicles (UAV). In Proceedings of the European Conference on e-Learning (p. 245).
Vigo, R., Yuksel, E., & Dewi Puspa Kencana Ramli, C. (2012). Smart grid security a Smart Meter-
centric perspective. In 2012 20th Telecommunications Forum (TELFOR) (pp. 127–130). IEEE.
Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Polity.
Which? (2017). Safety alert: see how easy it is for almost anyone to hack your child’s connected toys.
https://www.which.co.uk/news/2017/11/safety-alert-see-how-easy-it-is-for-almost-anyone-to-hack-
your-childs-connected-toys/. Last accessed 13 March 2021.
Footnotes
1 For the academic review, the number of articles reviewed was too large to cite them all here. For
details of the articles to which we refer, see Blythe and Johnson (2021).
2 It is worth noting that the purpose of the hack was not always known, and may sometimes have
been to enslave a device for the purposes of conducting DDoS attacks.
Abstract
This chapter examines the evolving nature and scope of professional
security and the opportunities and challenges facing the security profession
today and in the years to come. Drawing on their experiences in leadership
roles in ASIS International and the UK’s Security Institute, the authors
discuss the key features of contemporary professions and the challenges
they face in the coming years and decades. These include those presented
by the fourth industrial revolution, as the World Economic Forum describes
the era we are now entering. Among the notable trends impacting the
security profession that they identify are the exponential growth of cyber
security threats, the rise of convergence thinking, career pathways and skills
development to meet current and future needs, and the impact of the
COVID-19 pandemic. Wakefield and Gips argue that, for security
practitioners, the pace of change is such that the ability to continually adapt
and develop their practice is vital, while their representative bodies need to
be able to support them in developing the widening knowledge and skill
sets necessary for the future.
Introduction
The ongoing shift towards a more automated world, encapsulated in the
concept of the ‘fourth industrial revolution’ (4IR) (Schwab 2017, 2018),
raises important questions for individual professionals, professional
disciplines and the bodies that represent them about the adaptations they
must make. Writing about the future of professions, Susskind and Susskind
(2017) predict ‘a steady decline in the need for traditional flesh and blood
professionals’ (p. ix), calling for a fundamental rethinking of the role of
professions as societies confront broader questions about the advancement
of artificial intelligence and the future of work. The security challenges
presented by an increasingly digitized society, and the well-recognized
global cyber security skills gap, suggest that the security profession is
unlikely to decline but will need to adapt and evolve significantly, building
the capacity of its members to do the same.
This chapter provides an orientation for such change, taking stock of
how professions in general and the security profession specifically have
developed and are likely to change in the future. It reviews key dimensions
of the sociological analysis of professions to date, examines the distinctive
features of the 4IR and the collective challenges for the many stakeholders
responsible for the delivery of societal security, and then considers key
dimensions of the future of the security profession. This latter section
places a particular emphasis on the need for the individual professional to
adapt their practice to ‘converged’ threats and engage in ongoing
development to maintain the currency of their skills.
Conclusion
This chapter explored the key characteristics of professions, the future
challenges they face, and the implications of those challenges for
professional security. It has shown how the academic analysis of
professions goes back as far as the late nineteenth century and enables us to
take stock of the strengths, weaknesses, opportunities, and threats common
to most professions in their histories and as they look to the future. The era
we are now entering, increasingly being recognized as the ‘fourth industrial
revolution’ and characterized by accelerating technological advancement
and global interconnectedness, requires professions to show considerable
self-awareness and capacity for adaptation if they are to meet the
requirements of an increasingly uncertain and complex future world. The
chapter highlighted just how far professional security has already evolved,
and the impact that the scale and severity of Internet-based threats have had
and will continue to have on the profession, as well as the realizations about
the changing nature of global risks and threats that the COVID-19
pandemic has brought to the fore. As a rapidly changing world requires
constant updating and widening of professional knowledge and skills, the
chapter recognizes advances in the professional development landscape and
particularly the growing importance of ‘micro-credentials’. For all twenty-
first century workers of all ages, including security professionals, keeping
abreast of the pace and implications of positive and negative change is the
main challenge that we all must confront.
Recommended Readings
For a detailed analysis of the challenges that will increasingly confront
professionals and their professions in the future, The Future of the
Professions: How Technology Will Transform the Work of Experts (Richard
and Daniel Susskind, 2017, Oxford: Oxford University Press) is strongly
recommended, and can be read in conjunction with Shaping the Future of
the Fourth Industrial Revolution: A Guide to Building a Better World by
Klaus Schwab, Founder of the World Economic Forum (2018, London:
Portfolio Penguin). Alison Wakefield’s latest book Security and Crime:
Converging Perspectives on a Complex World (2021, London: Sage)
examines the drivers of change, threats, and mitigation strategies across
multiple dimensions of analysis (e.g. the international, regional, national,
and local) and explores a wide range of interconnected security issues to
inform the student and practitioner alike. For a fuller understanding of
trends in security convergence, also recommended are the reports The State
of Security Convergence in the United States, Europe, and India (David
Beck, Michael Gips and Beth McFarland Pierce, 2019. Washington, DC:
ASIS Foundation), and Combining Strengths: The Convergence of Cyber
and Physical Security (Conference Board of Canada 2018. Ottowa: The
Conference Board of Canada).
References
(ISC)2 (2020) (ISC)2 Cybersecurity Workforce Study 2020. (ISC)2.
Abbott, A. (1988) The System of Professions: An Essay on the Division of Expert Labor. Chicago:
University of Chicago Press.
Abel, R. L. (1979). The rise of professionalism. British Journal of Law and Society, 6, 82–98.
Aleem, A., Wakefield, A. and Button, M. (2013) ‘Addressing the weakest link: implementing
converged security’, Security Journal, 26(3): 236–248.
Baldwin, R. (2018) ‘If this is Globalization 4.0, what were the other three?’, World Economic Forum,
22 December. https://www.weforum.org/agenda/2018/12/if-this-is-globalization-4-0-what-were-the-
other-three/. Accessed 1 March 2021.
Beck, D., Gips, M. and McFarland Pierce, B. (2019) The State of Security Convergence in the United
States, Europe and India. Washington, DC: ASIS Foundation.
Cabinet Office (2018) HMG Security Policy Framework. London: Cabinet Office.
Center for Cyber and Homeland Security at Auburn University and the International Security
Management Association (2019) Cyber and Physical Security: Perspectives from the C-Suite.
Auburn, AL: CCHS and ISMA.
Centre for the Study of Existential Risk (2019) Managing Global Catastrophic Risks: Part 1:
Understand. Cambridge: CSER.
Coaffee, J. and Chandler, D. (2017) ‘Conclusion: the future of resilience’, in D. Chandler and J.
Coaffee (eds.), The Routledge Handbook of International Resilience. London: Routledge.
Conference Board of Canada (2018) Combining Strengths: The Convergence of Cyber and Physical
Security. Ottowa: The Conference Board of Canada.
Dalton, D. (2003) Rethinking Corporate Security in the Post-9/11 Era: Issues and Strategies for
Today's Global Business Community. Burlington, MA: Butterworth-Heinemann.
Etzioni, A. (1969) The Semi-Professionals and their Organization: Teachers, Nurses and Social
Workers. New York: Free Press.
Evetts, J. (2013) ‘Professionalism: value and ideology’, Current Sociology Review, 61(5–6) 778–796.
Executive Office of the President of the United States (2010) The Comprehensive National
Cybersecurity Initiative. https://obamawhitehouse.archives.gov/issues/foreign-policy/cybersecurity/
national-initiative. Accessed 1 March 2021.
Gill, M. and Howell, C. (2016) Tackling Cyber Crime: The Role of Private Security. Tunbridge
Wells: Perpetuity Research and Consultancy International.
Gips, M. (2020) Beyond a Cataclysmic 2020: Security’s New Opportunities to Address Workforce
and Workplace Risk. Thomson Reuters.
HM Government (2018) Initial National Cyber Security Skills Strategy. London: HM Government.
Howe, D. (1986) Social Workers and their Practice in Welfare Bureaucracies. Aldershot: Gower.
Hughes, E. C. (1958) Men and Their Work. New York: Free Press.
Larson, M.S. (1977). The Rise of Professionalism: A Sociological Analysis. Berkeley, CA: University
of California Press.
Lippert, R.K. and Walby, K. (2014) ‘Critiques of corporate security: cost, camouflage, and creep’, in
M. Gill (ed.) The Handbook of Security (2nd ed). Basingstoke: Palgrave Macmillan.
Lippert, R.K. and Walby, K. (2020) A Criminology of Policing and Security Frontiers. Bristol:
Bristol University Press.
McGuire, M. and Dowling, S. (2013) Cyber Crime: A Review of the Evidence. London: Home
Office.
McHenry, D. et al. (2021) Cyber Security Skills in the UK Labour Market 2021: Findings Report.
London: Department for Digital, Media, Culture and Sport and Ipsos MORI.
Mieg, H.A. and Evetts, J. (2018) ‘Professionalism, science, and expert roles: a social perspective’, in
K.A. Ericsson (ed.) The Cambridge Handbook of Expertise and Expert Performance (2nd ed.).
Cambridge: Cambridge University Press.
Ministry of Defence (2018) Global Strategic Trends: The Future Starts Today. London: Ministry of
Defence.
National Initiative for Cybersecurity Careers and Studies (2020) Cyber Career Pathways Tool.
https://niccs.cisa.gov/workforce-development/cyber-career-pathways. Accessed 1 March 2021.
National Intelligence Council (2021) Global Trends 2040: A More Contested World. Washington,
DC: National Intelligence Council.
New Zealand Government (2018) Overview of Protective Security Requirements: Protecting Our
People, Information, and Assets. Wellington: New Zealand Government.
Oliver, B. (2019) Making Micro-Credentials Work for Learners, Employers and Providers.
Melbourne: Deakin University.
Pegram, T. and Kreienkamp, J. (2019) Governing Complexity: Design Principles for Improving the
Governance of Global Catastrophic Risks. London: University College London.
Peterson, R. et al. (2020) Workforce Framework for Cybersecurity (NICE Framework). Gaithersburg,
MD: National Institute of Standards and Technology.
Rodrik, D. (2011) The Globalization Paradox: Democracy and the Future of the World Economy.
New York: W. W. Norton and Co.
Rojko, A. (2017) ‘Industry 4.0 concept: background and overview’, International Journal of
Interactive Mobile Technologies, 11(5): 77–90.
Schwab, K. (2018) Shaping the Future of the Fourth Industrial Revolution: A Guide to Building a
Better World. London: Portfolio Penguin.
Simonsen, C. (1996) ‘The case for: security management is a profession’, International Journal of
Risk, Security and Crime Prevention, 1(3): 229–232.
Subramanian, A. and Kessler, M. (2013) The Hyperglobalization of Trade and Its Future.
Washington, DC: Peterson Institute for International Economics.
Susskind, R. (2008) The End of Lawyers? Rethinking the Nature of Legal Services. Oxford: Oxford
University Press.
Susskind, R. and Susskind, D. (2017) The Future of the Professions: How Technology Will Transform
the Work of Experts. Oxford: Oxford University Press.
Wakefield, A. (2014) ‘Corporate security and enterprise risk management’, in K. Walby and R.K.
Lippert (eds.) Corporate Security in the 21st Century: Theory and Practice in International
Perspective. Basingstoke: Palgrave Macmillan.
Wakefield, A. (2021) Security and Crime: Converging Perspectives on a Complex World. London:
Sage.
Walby, K. and Lippert, R.K. (2015) Municipal Corporate Security in International Context.
Abingdon: Routledge.
World Economic Forum (2016) The Global Risks Report 2016. Geneva: World Economic Forum.
World Economic Forum (2020) Future of Jobs Report. Geneva: World Economic Forum.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_35
Kate Moss
Email: [email protected]
Abstract
The right to peaceful protest is a deeply rooted tradition in the UK.
Protected by Art. 11 of the European Convention on Human Rights, it did
not become law in the UK until the passing of the Human Rights Act 1998
section 11. The right to protest has been used many times by the public to
fight for rights—such as universal adult suffrage in the early twentieth
century and to protest about government policy, such as the Orgreave
miners’ strike. Notwithstanding its protection by domestic law in the UK,
successive governments have sought to restrict the rights of protesters by
enacting a raft of new laws that are intended to combat perceived threats
including anti-terrorism and anti-social behaviour laws. In addition,
governments have directed the police to use force against such protest—
most recently in relation to Extinction Rebellion, Black Lives Matter and
pandemic protests. This chapter will consider the right to peaceful protest as
an element of human rights that should prevail in a democratic society and
against this the efforts of successive governments to restrict this and
whether such actions are justified for the protection of national security or
whether they are an unjustified and worrying attack on basic civil liberties.
The hostile reaction to the Bristol protest shows how unprepared
English people are for what’s coming. You don’t shut down a fascist
uprising with a conga line. And no, the suffragettes didn’t win the
vote with a tap dance. Every struggle against oppression requires a
fight, because oppressors will injure, imprison and kill you to
advance their interests. The UK government is attempting to make
protest that causes disruption of any kind a criminal offence that
could put you in jail for up to a decade. It’s time to wake up and
resist. Or at the very least, support those who do. (Mendoza 2021:
1)
This section protects the right to hold peaceful protests, meetings and
demonstrations but in spite of this, there has also always been the potential
to restrict this right on the basis of either public order or public safety
considerations, usually under the Public Order Act 1986. The limitations
which this legislation can impose on Article 11 are not insubstantial and
include the fact that organisers of public processions are required to provide
notice to the police of the event’s location and routes that the procession
will follow unless this is not reasonably practicable. The police can impose
restrictions on the freedoms of belief, expression and peaceful assembly
provided any such restriction is:
prescribed by law
in pursuit of one or more legitimate aims specified in paragraph 2 of the
Article in question
necessary
proportionate
Added to this, sections 12 and 14 of the Public Order Act allow the
police to impose conditions on a public procession or assembly if the police
reasonably believe that it may result in:
serious public disorder
serious damage to property
serious disruption to the life of the community or
the purpose of those organising it is the intimidation of others.
There is a power to ban a public procession under the Public Order Act,
but there has as yet, been no power to ban a public assembly. Banning a
public procession is justified only in extreme circumstances where there is a
real threat of serious public disorder, which cannot be prevented by other
less stringent measures. The rule until recently was that the mere fact that a
public procession may annoy others, or even offend them, is not a sufficient
basis for banning it. We shall come back to this point later in the light of the
Police, Crime and Sentencing Bill 2021 (PCSC).
Section 13 of the Public Order Act allows a chief officer of police to
apply to the local council for an order prohibiting the holding of a public
procession for a period of up to three months where the chief officer of
police reasonably believes that in the particular circumstances the powers to
impose conditions on a public procession will not be sufficient to prevent
serious public disorder. The council must obtain the consent of the secretary
of state before making a banning order.
The blanket application of a ban of all public processions in a particular
district raises issues regarding proportionality, as there is no ability to
consider the particular circumstances of each individual procession when
such a ban is imposed. The legal principle of proportionality requires there
to be a link between the purpose for the restriction and the measures
employed to achieve that purpose and that a balance is struck between the
two (Kudrevičius and Others v. Lithuania ECHR 37553/05 [GC], 15th
October 2015, 144.) The main considerations for this are:
is the purpose sufficiently important to justify the restriction (i.e., are
there relevant and sufficient reasons to justify the restriction)?
will the measures proposed achieve that purpose?
are the measures to be taken the least restrictive to achieve the intended
purpose?
are the restrictions to ECHR rights necessary to meet the legitimate aims
set out in the ECHR rights concerned?
If the answer to all four questions is yes, then the conditions or
restrictions imposed on a public procession or public assembly under
section 12 or 14 of the Public Order Act 1986 will be proportionate.
Currently, the Police, Crime, Sentencing and Courts Bill 2021—which
passed its second reading in the House of Commons on 16 March 2021—
would significantly change the legal landscape in relation to the right to
protest. Although the Government has claimed it will “strengthen police
powers to tackle non-violent protests that have a significant disruptive
effect on the public” (Good Law Project 2021), clauses 54 to 60 of the
PCSC Bill contain measures that will stifle public assemblies and
processions by giving the police more powers not only to impose conditions
on the right to public processions and assemblies but also leaving it entirely
to their discretion to determine under what conditions those can be. The
trigger for this appears to be the level of noise generated by the protest
which will be deemed to cause “serious disruption to the activities of an
organisation which are carried on in the vicinity of the procession” or
‘relevant’ and ‘significant’ impact on persons in the vicinity. Arguably this
very generic and ‘catch all’ wording would pretty much cover every protest
that could be held and thus makes it very easy for the police to justify
restrictions in most cases. Conceivably this could be seen as a significant
expansion of the measures already contained in the Public Order Act 1986;
more worrying is that it will necessitate the police making subjective
judgements about what vocal behaviour amounts to intimidation or
harassment, using as their measure vague words such as ‘unease,’ ‘alarm’
and ‘distress.’ The case of Galstyan v Armenia (2007) 50 EHRR 618
provides some precedent for the normalcy of noise at most gatherings and
one could be forgiven for thinking that outlawing the making of noise is
simply a way of outlawing the right to protest. The wording of the clauses
points to the fact that it is the impact of protests that should be stifled but
ironically that is exactly what a protest should do—have impact. Added to
this the clauses allow the Homes Secretary to decide (with very little
Parliamentary scrutiny) what amounts to “serious disruption to the
activities of an organisation which are carried on in the vicinity” or
“serious disruption to the life of the community.”
A further aspect of the Bill is that Clause 59 replaces the common law
offence of public nuisance with a new statutory offence that brings with it a
maximum custodial sentence of ten years. The only safeguard against this is
if an individual can claim there was ‘a reasonable excuse’ for the act in
question. There is both ambiguity in these provisions and therefore
critically the potential for misuse since the more vague the law, the more
potential there is for it to be misapplied. The end result will in all
probability be the same; people will be discouraged from protesting because
it will pose too great a risk and thus the right of individuals to show their
support for issues they strongly believe in will be shut down.
Suppression through the statute book is of course not new. Equally the
propensity for Governments of whatever colour to think that all social ills
can be solved by legislating is not unique but knee jerk reactions like this,
in an effort to produce a ‘quick fix’ for whatever the government finds
currently troublesome, produces nothing more than a state of ‘rhetoric over
reality’ (Prins 2007: 190). More worrying still is the manner in which the
current UK government persuades the population, via the media, that
oppressive legislation is necessary. It is a tried and tested mechanism of
governments the world over to persuade (brainwash?) the public about what
is necessary in the protection of their own interests. I have written (Moss
2009: 19) about this in relation to CCTV, which was arguably ‘sold’ to the
public on the basis that it was an element of ‘reassurance policing’ rather
than an infringement of liberty. It has been the same with the issue of
protest. The steady demonisation of the protestor as a violent thug, or part
of a baying mob has served to cast those who exercise their democratic
human right to protest about issues of national or global importance as
outsiders, misfits and troublemakers. Even a cursory glance at most of the
media coverage of protests and the language used therein is enough to
demonstrate this. Kilgo and Harlow (2019) have suggested that although
news coverage is fundamental to a protest’s viability, research suggests
media negatively portray protests and protesters that challenge the status
quo—a pattern known as the protest paradigm. Other scholars have also
articulated the concept of the protest paradigm to capture the news media’s
tendency to portray social protests as deviant, threatening or impotent (Lee
2014). All of this of course plays into the hands of any government wishing
to pass laws that might otherwise be viewed as restrictive or punitive.
Aside from these laws and those currently proposed that have been used
to encroach upon the right to protest, there have over time been other ways
in which this basic human right has been encroached upon and I shall
highlight some of these in the next section. Before I do that it is useful to
acknowledge that current waves of social unrest—some of which will be
described later in this chapter—have clearly put pressure not just on state
mechanisms of social control such as the police, but also on the private
security sector. Private security is arguably a mechanism of social control—
albeit distinct from the police by virtue of its private status—which can be
mobilised in the face of issues such as public protest. In the UK there has
been a significant expansion of private security over the past 30 or so years
and the conduct of private security guards has been particularly important in
recent cases arising from anti-fracking protests, protests at housing estates
and protests in shopping centres. Interestingly regulation of the private
security sector, including police views on its use and efficacy, has been
raised. Gill and Howell (2017: 6) found in a study of 1361 serving police
officers that “close to 6 in 10 believed private security plays a minor role in
protecting the public [and] close to 7 in 10 believed security officers do not
act as the eyes and ears of the police.” It is however, important to raise the
issue of private security in relation to the right to protest not least because
private security guards are often used by land or property owners to try to
prevent protest and other unwanted activity on their land and in their
buildings. This potentially can be problematic because in the first place
although there is no standard ‘uniform’ for such people and the high
visibility jackets and black clothing they normally wear make them all but
indistinguishable from the police. So for a protestor it would be very
difficult to discern a private security guard from a police officer but of
course their roles are very different. Any attempt that they might make to
remove or detain individuals has to involve calling the police since they
have no more legal power than any other member of the public. Like other
members of the public, security guards can use ‘reasonable force’ to
remove trespassers from private property as long as they are acting as
agents for the property owner; similarly, as can ordinary members of the
public, they can only make a ‘citizen’s arrest’ under section 24A of the
Police And Criminal Evidence Act 1984. To effect this they would be
allowed to use ‘reasonable force’ under that Act to prevent a crime or if
they have a reasonable suspicion that an offence has been committed, but
they can only detain someone if there is a risk of injury, damage to property
or that the person is likely to escape before the police have been called and
arrived. There are clearly issues of concern with this because all of these
actions would rely on private security guards being well trained and
cognisant of the law and what their limitations are within that. Added to
this, what constitutes ‘reasonable’ force or suspicion is ambiguous. So
although private security personnel generally do not have any more legal
powers than any member of the public it’s important, especially at times of
civil unrest, that private security is well trained and managed and able to
deal legally, fairly and effectively with issues of protest which might affect
properties that they have specific responsibility for. It’s equally, if not more
important, that protestors are able to recognise private security personnel
from the police in order to safeguard their own rights.
The Suppression of Peaceful Protest
The suppression of peaceful protest has been facilitated in a number of
different ways. Since the mid-nineteenth century dispersal tactics have been
a stalwart of police all over the world. So too has the use of excessive force
by the police/state which has been a defining feature of numerous protest
events. In the UK the massacre at Peterloo 1819 (which took place in
Manchester and at which 18 people died when cavalry charged into a crowd
of around 60,000 people who had gathered to demand the reform of
parliamentary representation) arguably has some parallels with both the
Clapham Common vigil mentioned already, and recent protests in Bristol
against the Police Crime Sentencing and Courts Bill 2021. The 1819
lancing of protestors at Peterloo—resulting in 18 deaths and over 600
injuries (Navickas 2016)—is not that far away from the footage we have
today of a woman being punched square in the face and knocked out cold
by a police officer in riot gear. It’s as close as you could get really. Let’s
look more specifically at some examples of protest control mechanisms.
Subsequent to the 1990 Poll Tax riots (a series of riots in British towns
and cities against the Community Charge—colloquially known as the ‘poll
tax’—introduced by the Conservative government of Prime Minister
Margaret Thatcher) the London Metropolitan Police devised the tactic
known as ‘kettling.’ This is a crowd control method that corrals groups of
protestors into a limited area so that they effectively cannot move. The
problem with this is that hemmed in, if the police start using force to
disperse demonstrators, public retaliation becomes inevitable and things can
quickly escalate because there is no escape route. My late friend and
colleague (with whom it will be obvious to the reader I did not share views
on this topic, but nevertheless shared a great mutual respect) Peter (Tank)
Waddington—the architect of kettling—often justified its use arguing that it
led to more orderly dispersal of crowds with few injuries and arrests.
Talking about the G20 anniversary protest In Trafalgar Square he
commented (2009: 1) that:
Protesters were held for several hours until they…calmed down and
were allowed to disperse. Provided there are good grounds for
taking such action, it [is] lawful and not a breach of the Human
Rights Act. No public order tactic is free of the use of force by
police. Disorderly protesters do not willingly succumb to
containment. In a tension-filled environment sparks will inevitably
fly.
The problem I have with this is that it presupposes that protestors are
normally not calm, and that forcible containment is not a big problem when
in fact it is probably at the very least inconvenient and uncomfortable for
most people. Nonetheless Waddington presumes they should succumb to it
and if they don’t, the inevitable result will be public disorder. This shows
scant regard for the nuances involved in the issue of public protest. To be
‘corralled’ as a result of merely carrying out a basic human right will
clearly be a source of contention and why not? Should individuals choosing
to exercise their right to protest acquiesce to the inevitability of being
imprisoned in a street? The critic may say that it is the strength of feeling of
those protests that lead to public disorder, but there are many occasions
where this has proved not to be the case—Orgreave and the Clapham
Common vigil being just two examples to which I shall return in due
course.
What kettling does is detain innocent people. Of course, there may be
odd individuals amongst them who might be fairly determined to escalate
the situation but this is rarely true of the majority. Why then should
peaceful protestors be falsely imprisoned, rendered powerless to protect
themselves and effectively kept in mass detention for hours? There are both
ethical and practical difficulties associated with this which were highlighted
by the decade-long legal battle over mass arrests at the 2010 G20 summit in
Toronto in which the police and hundreds of protesters and others reached a
$16.5 million settlement.
David Waddington (1998) (as opposed to Peter) has commented that
kettling is an example of a form of strategic incapacitation that became the
dominant model within policing in the 2000s. Including the use of no-
protest zones (concrete or metal barriers and curfews), the interception and
obstruction of protesters, the disruption of assembly or convergence centres
and the use of ‘less lethal’ weapons (pepper spray, tear gas, concussion
grenades) as means of ‘retaking’ spaces of contention, it has also included
the use of intelligence and surveillance to predict or monitor demonstrators’
behaviour and assign perceived levels of risk or danger in order to carry out
pre-emptive arrests (remove ringleaders).
It was these kinds of tactics that were used in the UK at the 2009 G20
summit, but what makes this particularly interesting—with hindsight—is
the coverage by the media and how that compares with media coverage
today. Rosie and Gorringe (2009: 1) comment that:
Global Suppression
We can perhaps make some correlations between the Assange case and that
of Jimmy Lai—Chinese media mogul and pro-democracy activist—who
was found guilty of taking part in unauthorised assemblies during mass pro-
democracy protests in 2019. He was sentenced to 14 months in prison
having been arrested under Hong Kong’s controversial new National
Security Law. This legislation punishes anything that China considers
subversion, terrorism or collusion with foreign forces and carries a life
prison sentence. Critics like Tsui (2020) say it is aimed at crushing dissent
and erodes freedoms in the semi-autonomous financial hub, which was
returned to Chinese control in 1997. As a result, and starting in July 2020,
thousands of demonstrators in Hong Kong filled the city’s streets, broke
into the local legislature, carried out sit-ins at the airport, and turned a
university campus into a battleground—their activities only being muted by
the coronavirus pandemic. The latest imposition of the National Security
law has only served to encourage protesters to return to the streets and it
seems that the authorities there will continue their crackdown on both
public protest and media freedom in Hong Kong. Tsui (2020: 62) has
commented that: “It’s not going to end with sending Jimmy Lai to prison.”
Hong Kong has now even added ‘national security’ to the school
curriculum to bring it in line with the National Security Law imposed by
Beijing in 2020. The changes will see children as young as six being taught
about national security and will force teachers to warn primary students
against ‘subversion’ and to throw out library books considered dangerous to
the Chinese state. Liu and Riordan (2021) comment that this education
overhaul shows that China’s crackdown on the former British colony has
reached beyond jailing opposition leaders to reforming Hong Kong society
to bring it more in line with the mainland.
We can also draw some comparisons here between the media coverage
of the Hong Kong protests and the responses to the UK protests of the past
year. Ashcombe and Cheung (2020) provide a useful commentary on the
‘Anti-Extradition Law Amendment Bill’ Movement (Anti-ELAB) which
caused mass protests on the street of Hong Kong and during which differing
accounts were prevalent. Taking just two media outlets in the UK at
differing ends of the political spectrum (The Guardian and Daily Mail),
they demonstrate that they adopted a broadly pro-democracy stance in
which both outlets condemned police violence. The Daily Mail emphasised
the toll of those hospitalised in the protests whilst The Guardian heavily
criticised the use of tear gas against what it called ‘peaceful protestors’ and
blamed ‘excessive force and police brutality’ for the continued
demonstrations.
Set this if you will against media coverage of the two Bristol protests
that have taken place in the past year. First the scenes that surrounded the
BLM protests and the toppling of the Colston statute. To put this in context
we are talking here about Edward Colston, deputy governor of the Royal
African Company, who oversaw the transportation of over 84,000 Africans
into slavery, of which 19,000 died when they were thrown overboard from
his ships. This was a man who grew rich from what today we would call
human trafficking and mass murder and in the midst of a protest about
BLM, it might to some seem fitting that the statue to this individual (which
let’s not forget had been the focus of a concerted campaign for its removal
for many years) was toppled and sunk in the very dock in which his ships
moored. It might also seem right therefore that no one would be particularly
offended by this. Olusoga (2020) commented at the time that although the
defence of the figure—and Colston’s reputation—was both overt and
shameless, it was not, unfortunately unique. Yet one of the most vociferous
responses was that of MP and Communities Secretary Robert Jenrick who,
in a strongly worded article in The Telegraph (Hope 2021: 1) said that
‘flash mobs,’ ‘town hall militants’ and ‘woke worthies’ were overriding due
process and that local people ought to have the chance to be consulted on
whether a monument should stand or not. “What has stood for generations
should be considered thoughtfully, not removed on a whim or at the behest
of a baying mob.” Presumably Jenrick was unaware that Colston was a
murderer? Or perhaps he thought that Bristol was all the better for having
the statute of a slaver in its midst? Or maybe he thought that the views of
the descendants of Colston’s victims were wrong for campaigning for
decades for its removal or that this campaigning was not somehow part of a
due process that had for years been ignored. Whatever the case, the
Government is now set to introduce a new law which it says will protect
historic monuments like statues—because of course that is what is most
important.
UK Home Secretary Priti Patel demonstrated a similar attitude to a more
recent Bristol protest against the impending Police Crime Sentencing and
Courts Bill 2021. Again sections of the UK media have seen this as a
chance to demonise the process of peaceful protest and no doubt in doing so
have persuaded more than a few people that this behaviour should, in
principle, be widely condemned. The Home Secretary branded the scenes
unacceptable and said thuggery and disorder would never be tolerated.
Conveniently at present, mass gatherings are currently banned under
coronavirus legislation and anyone breaching the regulations could be fined
but what started as a non-violent demonstration on a Sunday afternoon was
reported to have turned violent after hundreds of protesters descended on
the New Bridewell police station. The media also reported that two police
officers were injured, suffering broken ribs and an arm, and were taken to
hospital during violent skirmishes with masked thugs (Penna and Millimaci
2021). However, what is of more interest is that this flies in the face of
witness statements to the contrary and also does not fit in with a subsequent
announcement by Bristol police that no police officers in fact suffered any
broken bones or other similar injuries at all. What we do know however is
that video footage of the events include a woman being punched square in
the face and knocked out cold by a police officer in riot gear (Wright 2021)
which is now being investigated.
Given the global implications of this subject and the fact that at the time
of writing, former Minnesota police officer Derek Chauvin has just been
found guilty of the murder of George Floyd in the USA, it is pertinent also
to look to the right to protest in America. Both the United States
Constitution First Amendment and International Human Rights Law protect
the right to peaceful protest in America. However, mirroring what we have
already seen in the UK, Pednault (2021) suggests that something of a
legislative assault has been systematically attempted against these rights
over many years. Previous attempts to curtail the right to protest gave rise
to a warning from the United Nations Human Rights High Commission
(2017) when human rights experts reported that the US was introducing
undemocratic anti-protest bills designed to criminalise or impede the rights
to freedom of peaceful assembly and expression. It seems ironic that these
bills had come at a time of numerous protests including those in relation to
Black Lives Matter movement, the Native American movements and
Women’s Marches. For example, in Indiana one such bill allowed law
enforcement officials to use any means necessary to clear the roads of
people unlawfully obstructing vehicular traffic. Several bills proposed in
Arkansas, Florida, Georgia, Indiana, Iowa, Michigan, Minnesota and
Missouri disproportionately criminalised protestors for obstructing traffic
with one proposing up to seven years in prison for such an offence. It’s
clear that these measures were designed to criminalise the right to protest
and—in line with other countries that I have mentioned—seek to stigmatise
such protests as being violent or inherently criminal. The point that
Pednault (2021) ably makes however is that legally protest is not violent or
unlawful. Whilst individuals may—at a protest—act in a violent or
unlawful way, the protest of itself is not illegal. So trying to curtail these
rights is nothing new.
Subsequent to the murder of George Floyd in May 2020 a number of
protests against racism and police brutality took place in most states in
America. Unfortunately but all too predictably, the police response to this
was, without exception, to exert excessive force and brutality against those
protesting. In many cases tactics such as kettling, rubber bullets, tear gas,
stun grenades and rubber bullets were used. In Minneapolis, a journalist
was shot by the police with a rubber bullet and blinded in one eye. Wille
and Sawyer (2020) reported that legal observers from the National Lawyers
Guild were also targeted by the police even though they were visibly
identified as such. Interestingly they make a comparison in this work, of
their documentation of the use of excessive force by security services in
2019 against peaceful protestors and journalists and how, in response to
this, the US government at the time condemned that violence. In relation to
the 2020 BLM protests they say the government was silent and thus had a
double standard when it came to the policing of peaceful protests in its own
territory as opposed to that of other countries. Rather a case of do as I say
rather than as I do perhaps? Their point is sadly that many Americans
would not find this attitude surprising because they are all too aware of the
realities of abusive and racist law enforcement in the USA. The fact that the
US did not live up to the international human rights standards that it appears
to demand of other countries is no surprise. More recently the US Protest
Law Tracker—part of the International Centre for Not-for-Profit-Law
(2021)—reported that currently under consideration in 24 States are 51 bills
that would restrict the right to peaceful assembly and increase penalties for
participating in them. This is in spite of the fact that international human
rights law protects the right of peaceful assembly and requires authorities at
all levels to facilitate such assemblies and avoid unnecessary or
disproportionate restrictions on them. Planning or participating in a protest
is not a criminal issue nor should it ever be and this is enough justification
for such measures to be abandoned as being inconsistent with both
International law and the US Constitution First Amendment. Perhaps the
only hope is that as long as this right is not entirely obliterated, that people
will continue to take to the streets in an effort to ensure that the basic
human rights of citizens to protest globally are protected.
The morning after the verdict against Derek Chauvin, the media was
full of claims of justice being done; but this willingness to cast this episode
off as a tragedy to which there has been some kind of happy ending
trivialises the real issues here. When agents of the state—such as the police
—kill civilians this represents state execution and not just that, it represents
a side stepping on a grand scale, of the justice system. This was an example
of summary justice, which criminologists, lawyers and others should now
be talking about, writing about, shouting about. The people who work
within criminal justice systems should be the ones asking questions about
how justice can be overruled by the police and the fact that this was not
simply a crime against George Floyd, it was a crime against humanity and
against all justice systems.
Conclusion
Returning to the UK and the new legal provision—the Police Crime
Sentencing and Courts Bill—ultimately it is difficult to perceive it in any
other way than posing a serious threat to the right to protest. The provisions
threaten to neutralise protests, removing one of the only ways in which
people can express their views in a democratic society. Promises were in
fact made by Kit Malthouse (UK MP and Minister for Policing) in a Home
Office media blog dated 7 September 2020 in which he said in Parliament
that: “the right to peaceful protest is a fundamental tool of civic expression,
and will never be curtailed by this government” (Home Office 2020: 1). But
this legislation will do exactly that. The protest provisions in particular are
damaging because they seek to undermine the Human Rights Act 1998 and
are not proportionate in the way they seek to deal with protests. Yet this is
passing through Parliament in the UK nonetheless and despite protests that
are being held against its implementation. The question is, will these
protests signal the death knell of the right to democratically oppose what
you do not believe in and in so doing hold a government to account?
It is impossible not to set this development within the context of what
we could call the ‘pandemic year.’ The cynic might see this backdrop as the
perfect time to press through this sort of measure since it merely falls within
a period in time when some of the greatest limitations have been placed
upon people’s general freedoms. A time when the rushed through
Coronavirus Act 2020 has closed our borders, imposed enforced quarantine
and criminalised (some) people for leaving their homes without a
reasonable excuse. A good time, some might say, to further regulate
people’s lives when it has become almost normal to do so; and whilst great
swathes of the public remain fairly inert to the slow but sure diminution of
their basic human rights and fundamental freedoms, other have taken to the
streets to protest.
Ironically it has been a year of protests; Black Lives Matter, pandemic
protests, the Clapham Common vigil and now ‘Kill the Bill.’ (Local
protests in the UK against the Police Crime Sentencing and Courts Bill).
The current UK Home Secretary has cast all of these protests as illegal and
many of those taking part have experienced aggressive police tactics such
as kettling. Elliott-Cooper (2020) found that the policing of the Black Lives
Matter protests involved excessive use of force; disproportionate targeting
of black protesters, baton charges, horse charges, pepper spray and violent
arrests; kettling—enclosing large numbers of protestors including children
and potentially vulnerable people—in confined spaces for up to eight hours,
making social distancing impossible and with no access to toilets, food or
water. This neglect of Black Lives Matter protesters has been exacerbated
by violence from far-right organised counter-demonstrators, with examples
of a seriously injured protester being searched rather than supported and
others being ignored. Elliott-Cooper (2020: 1) comments that “Experiences
and policing at the hundreds of protests across Britain varied significantly,
with some examples of light-touch policing at safe and successful
gatherings. However black-led protests disproportionately faced excessive
interventions by police.”
This Bill threatens the end of our freedom to dissent and the
culmination of a long line of restrictions of public freedoms over a year. It
effectively gives the state authoritarian power, framed in the vaguest of
language, enforced by the expansion of police powers which to date have
been misused. Amazingly we are not even being persuaded that these new
powers are necessary for the protection of domestic security—which is
usually the case—because we are all presumably so COVID fatigued that
this is deemed unnecessary. The end result of this will be an almost total
ban on peaceful protest, sweeping powers to stifle or limit it and even time
limits on the nature and duration of the noise that may accompany it. The
Bill will make the scenes that we have recently witnessed at Clapham
Common and the BLM protests common and protest will effectively no
longer be a human right. Those that put their own liberty on the line to
protest have been cast as the ‘baying mob’ and provide us with yet another
example of certain categories of society being demonised for their views.
I began this chapter with a quotation from Mendoza (2021) who
recounts some of the most troubling examples of the demonisation of public
protests (including women’s suffrage and the ANC’s struggle against
apartheid). She makes the point that non-peaceful protest is never the
intention but often denigrates to this because of the state’s heavy-handed
response to protestors. We might be 122 years on from the events that
shaped the Peterloo Massacre but in real terms, in the UK, how far away are
we from our own George Floyd tragedy where the state uses its own force
against its own population? I have written previously about my
disappointment at the stance of criminologists and criminology about whom
I wrote (Moss 2009: 161):
Twelve years on from this nothing has changed. Today, if you express
critical, unconventional or controversial views you are likely to be labelled
a ‘woke warrior.’ Social media has given everyone a voice irrespective of
how ill informed. Respectful debate has gone out of the window and has
been replaced by politically driven media hype, gas lighting of entire
populations and an environment where those who shout the loudest are
heard the most. But without the power of protest and freedom to carry it
out, what other measures are available to people? Writing to Congress or to
your local MP just isn’t going to change anything. Taking the knee—a
peaceful method of protest—arguably didn’t work; in fact although NFL
quarterback Colin Kaepernick did this to highlight racism, he was
subsequently not selected for the NFL’s following season prompting
accusations of non-selection for ‘political reasons.’ So if peaceful protest
doesn’t work, is it really surprising that rebellion often takes a different
form? Let’s not forget however that arguably violence is usually only a
response to violence. For sure, there is a destructive side to rebellion but
what is this a response to? Violence of the rebellion is always talked about
but what is not mentioned is what precipitates the conflict. The violence of
rebellion is only part of a context of state violence and without struggle
there will never be any progress. We have only to ask ourselves what would
not have happened without the struggle of rebellion and accompanying
protest? ‘Annoying’ protests that changed the world include the Mud March
1907 for women’s suffrage, South Africa’s National day of Protest 1950,
the end of the Berlin Wall protests, the storming of the Bastille 1789, the
Arab Spring 2010, Ghandi’s Salt March 1930 the Boston Tea Party 1771
and of course Martin Luther King’s March on Washington 1963 at which he
delivered the ‘I have a dream speech.’
It seems fitting to end with this. On 3 August 1857, Frederick Douglass
delivered a ‘West India Emancipation’ speech at Canandaigua, New York.
His words then are as powerful today and a fitting reminder of the power of
protest and why it should be fought for with everything we have.
Recommended Readings
In terms of the development of basic human rights, the work of Locke
(1689) and Paine (1776) should be consulted. Gibbard (1984) also provides
useful historic background material on the development of civil liberties.
Garland (2001) tackles the political and social changes that have facilitated
changes impacting the State’s response to human rights. My two previous
books in the Crime Prevention and Security Management Series (Moss
2009, 2011) published by Palgrave and edited by Martin Gill provide a
good starting point for an analysis of some of the issues concerning the
enlarged power of the state and how that affects civil liberties and personal
freedoms. The work of Dershowitz (2006) is also helpful in highlighting the
protection of civil liberties more generally. For a discussion of what is
possible when states are not held to account effectively see the work of
Green and Ward (2005). For a detailed account of the domestic legal
framework that surrounds the right of peaceful protest see Mead, D. (2010)
The New Law of Peaceful Protest, Hart Publishing.
References
Alexei Navalny v Russia (2018) European Court of Human Rights, 15 November 2018 [GC] No.
29580/12.
Ashcombe, S., and Cheung, R. (2020) The Hong Kong Riots: A Comparative Account of Media
Coverage in Hong Kong and the UK, Oxford Political Review, 30 January 2020, accessed 28 March
2021 at https://oxfordpoliticalreview.com/2020/01/30/the-hong-kong-riots-a-comparative-account-
of-media-coverage-in-hong-kong-and-the-uk/
Boulton, L. (2016) ‘A Policeman Took a Full Swipe at My Head’: Lesley Boulton at the Battle of
Orgreave 1984. The Guardian, 16 December 2016, accessed 23 March 2021 at https://www.
theguardian.com/artanddesign/2016/dec/16/battle-orgreave-lesley-boulton-photograph
Dodd, V., and Taylor, M. (2019) Why Was the Met’s Extinction Rebellion Protest Ban Unlawful?
The Guardian, 6 November 2019, accessed 24 March 2021 at https://www.theguardian.com/
environment/2019/nov/06/why-was-the-mets-extinction-rebellion-protest-ban-unlawful#:~:text=
So%20how%20restricted%20are%20the,the%20aims%20of%20Extinction%20Rebellion.
%E2%80%9D
Douglass, F. (1857) If There Is No Struggle There Is No Progress, Black Past, accessed 21 April 2021
at https://www.blackpast.org/african-american-history/1857-frederick-douglass-if-there-no-struggle-
there-no-progress/
Elliott-Cooper, A. (2020) Britain Is Not Innocent: A Netpol Report on the Policing of Black Lives
Matters Protests in Britain’s Town and Cities 2020, London: Network for Police Monitoring,
accessed 28 March 2021 at https://secureservercdn.net/50.62.198.70/561.6fe.myftpupload.com/wp-
content/uploads/2020/11/Britain-is-not-innocent-web-version.pdf
Garland, D. (2001) The Culture of Control: Crime and Social Order in Contemporary Society.
Oxford: Oxford University Press.
[Crossref]
Gayle, D., and Dodd, V. (2019) Extinction Rebellion Protestors May Sue Met as Ban Ruled
Unlawful, The Guardian, 6 November 2019, accessed 24 March at https://www.theguardian.com/
environment/2019/nov/06/police-ban-on-extinction-rebellion-protests-ruled-illegal-by-high-court
Gibbard, A. (1984) Utilitarianism and Human Rights, Social Philosophy and Policy 1: 92–102.
[Crossref]
Gilmore, J. (2016) Lessons from Orgreave: Police Power and the Criminalization of Protest, Journal
of Law and Society 46(4): 612–639.
[Crossref]
Gilmore, J. et al. (2020) Policing the UK’s Anti-fracking Movement: Facilitating Peaceful Protest or
Facilitating the Industry? Peace, Human Rights, Governance 349–390.
Gill, M., and Howell, C. (2017) Police Views on Private Security: A Security Research Initiative
Report. Perpetuity Research and Consultancy International (PRCI) Ltd.
Good Law Project (2021) Police, Crime, Sentencing and Courts Bill 2021 (“PCSC Bill”) Briefing for
MPs, accessed 24 March 2021 at https://goodlawproject.org/news/pcsc-bill-briefing-for-mps/
Green, P., and Ward, T. (eds) (2005) State Crime: Governments, Violence and Corruption. London:
Pluto Press.
Hayhurst, K. (2014) Fracking Courts Update: Barton Moss Camp Eviction and Balcombe Protest
Cases, Drill or Drop, Independent Journalism on UK Fracking, Onshore Oil and Gas and the
Reactions to It. 6 March 2014, accessed 19 April 2021 at https://drillordrop.com/2014/03/06fracking-
courst-update-barton-mss-camp-eviction-and-balcome-protest-cases
Home Office (2020) Policing Minister Kit Malthouse’s Statement on Birmingham Incident and
Extinction Rebellion Protests, accessed 28 March 2021 at https://homeofficemedia.blog.gov.uk/2020/
09/07/policing-minister-kit-malthouses-statement-on-birmingham-incident-cesseand-extinction-
rebellion-protests/
Hope, C. (2021) Statues and Monuments given Safeguard from ‘Baying Mobs,’ The Telegraph, 16
January 2021, accessed 28 March at https://www.telegraph.co.uk/politics/2021/01/16/historic-
statues-get-official-protection-baying-mobs-tough-new/
HMIC (2009) Adapting to Protest—Nurturing the British Model of Policing. London: HMIC.
HMIC (2021) Inspection of the Policing of the Sarah Everard Vigil, 18 March 2021, accessed 19
April 2021 at https://www.justiceinspectorates.gov.uk/hmicfrs/news/news-feed/inspection-of-the-
policing-of-the-sarah-everard-vigil/
International Centre for Not-for-Profit-Law (2021) US Protest Law Tracker, accessed 20 April 2021
at https://www.icnl.org/usprotestlawtracker/
Kiai, M. (2017) Report of the Special Rapporteur on the Rights to Freedom of Peaceful Assembly
and of Association. UN Human Rights Council.
Kilgo, D., and Harlow, S. (2019) Protests, Media Coverage, and a Hierarchy of Social Struggle, The
International Journal of Press/Politics 24(4): 508–530.
[Crossref]
Liu, N., and Riordan, P. (2021) Hong Kong to Impose ‘National Security’ Schools Curriculum.
Financial Times, 4 February 2021, accessed 19 April 2021 at https://www.ft.com/content/7a8e473d-
86c1-4875-811b-575df79a502a
Lee, F. (2014) Triggering the Protest Paradigm: Examining Factors Affecting News Coverage of
Protests, International Journal of Communication 8: 22.
Locke, J. (1689) Two Treatises of Government, in Laslett, P. (ed) Cambridge: Cambridge University
Press.
Macwhirter, Iain (2005). First You Scare Them and Then You Play on Their Fears, The Herald, 22
June, p. 16.
Mansfield, M. (June 2009). Blood, Sweat and Tears: The Miners’ Strike 1984–85, Socialist Lawyer
52: 16–18.
Mendoza, K.A. (2021) You Don’t Defeat Fascism with a Conga Line, The Canary, 22 March 2021,
accessed 23 March 2021 at https://www.thecanary.co/uk/2021/03/22/you-dont-defeat-fascism-with-a-
conga-line/
Monbiot, G. (2019) Arresting Destruction, The Guardian, 16 October 2019, accessed 23 March 2021
at https://www.monbiot.com/2019/10/20/arresting-destruction/
Moss, K. (2009) Security and Liberty: Restriction by Stealth. London: Palgrave Macmillan.
[Crossref]
Moss, K. (2011) Balancing Liberty and Security: Human Rights Human Wrongs. London: Palgrave
Macmillan.
[Crossref]
Navickas, K. (2016) ‘A Reformer’s Wife Ought to be a Heroine’: Gender, Family and English
Radicals Imprisoned Under the Suspension of Habeas Corpus Act of 1817, History 101(345): 246–
264.
[Crossref]
Novara Media (2021) Does the US want Julian Assange Dead? An Interview with Yiannis Varoufakis,
5 January 2021, accessed 16 January 2021 at http://novara.media/varoufakisonassange
Olusoga, D. (2020) The Toppling of Edward Colston’s Statue Is Not an Attack on History: It Is
History. Opinion, Black Lives Matter Movement, The Guardian, 8 June 2020, accessed 28 March
2021 at https://www.theguardian.com/commentisfree/2020/jun/08/edward-colston-statue-history-
slave-trader-bristol-protest
Pednault, J. (2021) US Take Aim at Protestors Rights. Human Rights Watch, 16 February 2021,
accessed 20 April 2021 at https://www.hrw.org/news/2021/02/16/us-states-take-aim-protesters-rights
Penna, D., and Millimaci, G. (2021) Bristol Protest: Kill the Bill Rally Turns Violent as Police
Officers Injured, The Telegraph, 22 March 2021, accessed 28 March 2021 at https://www.telegraph.
co.uk/news/2021/03/21/bristol-protest-kill-bill-rally-turns-violent-police-officers/
Prins, H. (2007) Fifty Years ‘Hard Labour’ (A Personal Odyssey), The Howard Journal of Criminal
Justice 46(2): 176–193.
[Crossref]
Rosie, M., and Gorringe, H. (2009) What a Difference a Death Makes: Protest, Policing and the Press
at the G20, Sociological Research Online 14: 5.
[Crossref]
Tsui, L., et al. (2020) How to Challenge China: How Do We Make a Global Power Sit Up and Take
Notice? Index on Censorship 49(4): 61–63.
[Crossref]
United Nations Human Rights Commission (2017) UN Rights Experts Urge Lawmakers to Stop
“Alarming” Trend to Curb Freedom of Assembly in the US, accessed 20 April 2021 at https://www.
ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=21464&LangID
Waddington, D.P. (2011) Public Order Policing in South Yorkshire, 1984–2011: The Case for a
Permissive Approach to Crowd Control, Contemporary Social Science 6(3): 309–324.
[Crossref]
Waddington, D. (1998) Waddington Versus Waddington: Public Order Theory on Trial. Theoretical
Criminology 2(3): 373–394.
[Crossref]
Waddington, P. (2009) Professor Defends ‘Kettling’ Technique Used at G20 Protests, Business Live,
21 April 2009, accessed 22 March 2021 at https://www.business-live.co.uk/economic-development/
professor-defends-kettling-technique-used-3947635
Wille, B., and Sawyer, I. (2020) The US Commits the Same Abuses It Condemns Abroad, accessed
20 April 2021 at https://www.hrw.org/news/2020/06/29/us-commits-same-abuses-it-condemns-
abroad
Wright, R. (2021) Police Accused of Harsh Tactics at Bristol ‘Kill the Bill’ Protests, Financial Times,
27 March 2021, access 28 March 2021 at https://www.ft.com/content/778d1f96-6dd6-4cc8-ae16-
bf7f47f18df9
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_36
Tim Prenzler
Email: [email protected]
Abstract
This chapter provides a review of regulatory systems applied to the security
sector, critiquing the benefits and shortcomings of contemporary systems on
the basis of the available evidence. They summarise regulatory theory and
outline the range of conduct and competency issues behind interventions in
the industry, arguing in favour of a ‘smart’ model of licensing that includes
disqualifying offences, mandatory pre-service training and close
monitoring.
10.
Insider crime
11.
Misuse of weapons.
This can be compared with a typology developed in an earlier RAND
Corporation study in the United States in the early-1970s based on case
studies, litigation against security providers and complaints. Kakalik and
Wildhorn (1971b: 57–61) proposed the following problem areas:
Abuse of authority
Dishonesty and poor business practices
Access to confidential police records and gathering information from
third parties
Non-reporting of crime and the ‘private’ system of justice
High false-alarm rates
Personnel quality, training and supervision.
Whichever way risks are categorised, it is evident that misconduct is
highly variable in intensity and extent. In some jurisdictions, wrongdoing
has been serious and recurring over long periods of time. For example,
assaults by security staff on patrons at entertainment venues has been a
common problem around the world. In other cases, there has been less
evidence of malpractice, but nevertheless regulation has been introduced or
enlarged as a precautionary measure (White 2015).
When security regulatory agencies are established, something of the
need for their services can be seen by the volume and types of complaints
they receive. The RAND study is instructive in that regard. Seventeen
agencies reported the following categories and numbers of complaints for
one year (Kakalik and Wildhorn 1971b: 54):
Violation of regulation (413)
Improper uniform or identification (369)
Shootings (55)
Impersonating a police officer (34)
Theft (29)
Failure to serve as agreed (29)
Misrepresentation of services or fees (28)
Violation of gun regulation (22)
Illegal access to police records (18)
Assault or use of excessive force (13)
Negligence (13)
Operating an unlicensed business (13)
Drunkenness (12)
Conviction of a crime (9)
Offensive language (8)
Killings (8).
There were also cases of ‘false arrest, improper detention, invasion of
privacy, improper search, improper interrogation, bugging, wiretapping, and
extortion’ (Kakalik and Wildhorn 1971b: 54).
Criminal Law
In theory, the threat of prosecution, fines or imprisonment provides a
powerful deterrent to security providers against criminal law violations,
including offences such as homicide, assault, criminal negligence, theft,
trespass, fraud, harassment and threats. Sanctions also provide some justice
to victims. Research shows clearly, however, that the criminal law has very
limited penetration into the crime problem in any jurisdiction, and that
includes crimes by security providers (Davis et al. 2003; Sarre and Prenzler
2009). The requirement for a high standard of evidence in criminal law
often makes it difficult to prove offences involving security staff. In recent
years, CCTV footage has helped secure convictions against violent security
officers, but this form of regulatory oversight is weakened by its sporadic
nature. Overall, criminal law is deficient as a regulatory tool as it fails to
provide a systematic preventive effect.
Civil Law
Security providers are also subject to civil claims (seeking damages) by
clients and ordinary citizens, and there are numerous examples of
successful legal suits on the record internationally (Davis et al. 2003; Sarre
and Prenzler 2009: 73ff). Civil law can provide redress for persons who are
victims of breaches of contract, including recovery of losses due to
inadequate security. Security providers have also been successfully sued for
false imprisonment, assault and harassment. However, while the civil courts
have a lower standard of proof than criminal courts, taking private legal
action involves numerous uncertainties, and unsuccessful litigants are often
left with financial costs. Consequently, civil law is also entirely inadequate
to ensure competence and probity.
Industry-Specific Regulation
The inadequacies of this general legal framework have driven the
development of the following three specialist forms of regulation.
Self-regulation
Self-regulation involves the formation of voluntary associations dedicated
to industry professionalism. This is done through conditional membership,
and promulgating standards through codes of conduct and technical
specifications. Members are able to promote their firms using the
association as a badge of competency and integrity. Association staff carry
out checks on applicants and deal with complaints. Breaches of standards
result in membership suspension or revocation. The effectiveness of self-
regulation is most likely dependent on the rigour of background checks,
conduct standard-setting and enforcement of rules, although there appears
to be no systematic research on this topic. Moreover, the record shows that
many disreputable firms can operate without holding membership in an
industry association. Associations tend to support special regulation in
terms of a ‘level playing field’ to ensure fair business competition and in
recognition of the fact that security clients and the general public need a
layer of protection that can only be provided by government (Sarre and
Prenzler 2011).
Co-regulation
Co-regulation occurs in most jurisdictions on a de facto basis through the
co-existence of private professional associations and special regulation.
Two Australian states (New South Wales and Queensland) adopted
mandated membership but with no solid evidence of a beneficial effects,
and New South Wales later dropped the requirement (Prenzler and Sarre
2012).
Conclusion
This chapter has proposed a model of smart regulation for the security
industry designed to avoid the pitfalls of both under-regulation and over-
regulation. A smart regulatory system would use economic analyses and
stakeholder feedback to ensure controls do not create unjustified restrictions
on business activity and market reach. At the same time, regulators need to
do much more than simply process licence applications and respond to
complaints. In that regard, the chapter has outlined a dynamic system, with
built-in performance assessment, designed to match regulation to risk. The
challenge is to find the best mix of strategies to protect against abuses and
ensure quality in security services. The latter criterion is increasingly seen
as a core task of regulators: to maximise the general crime reduction effects
of the industry, including through eligibility to participate in public-private
partnerships. The challenge for contemporary policy-makers is to design
security options that best deliver effective, appropriate and fair policing, be
it public or private or a combination of the two. Cleverly fashioned
regulation is essential to that process.
Recommended Reading
The 2014 report State Regulation Concerning the Civilian Private Security
Services and their Contribution to Crime Prevention and Community Safety
by the United Nations Office on Drugs and Crime describes a minimal set
of standards for the industry and makes a cogent case for a public interest
benefit from government engagement with the industry: located at https://
www.unodc.org/documents/justice-and-prison-reform/crimeprevention/
Ebook0.pdf.
Similarly, the 2007 report Regulating Private Security in Europe: Status
and Prospects, published by the Geneva Centre for the Democratic Control
of Armed Forces, sets out the need for regulation and includes a clear set of
recommendations for minimum standards and harmonisation across
jurisdictions: located at https://www.dcaf.ch/sites/default/files/publications/
documents/PP20_Born_Caparini_Cole_.pdf.
References
Ayres, I., and Braithwaite, J. (1992). Responsive Regulation: Transcending the Deregulation Debate,
New York: Oxford University Press.
Bergin, A., Williams, D., and Dixon, C. (2018). Safety in Numbers: Australia’s Private Security
Guard Force and Counterterrorism. Canberra: Australian Strategic Policy Institute.
Bradley, T. (2016). Raising the Bar: Professionalism and Service Delivery Standards within New
Zealand’s Contract Private Security Industry. Security Journal, 30(2): 349–366.
Button, M. (2020). The ‘New’ Private Security Industry, the Private Policing of Cyberspace and the
Regulatory Questions. Journal of Contemporary Criminal Justice, 36(1), 39–55.
Button, M., and George, B. (2006). Regulation of Private Security: Models for Analysis, in Gill, M.
(ed.) Handbook of Security. Houndmills: Palgrave Macmillan.
Button, M., and Stiernstedt, P. (2018). Comparing Private Security Regulation in the European
Union. Policing and Society, 28(4), 398–414.
Cansler, J. (2020). Q&A: How Companies Are Using Drones for Security. Accessed December 3
from https://www.gsx.org/session-spotlights/how-companies-are-using-drones-for-security/
Cihan, A. (2016). The Private Security Industry in Turkey: Officer Characteristics and their
Perception of Training Sufficiency. Security Journal, 29(2), 169–184.
Coate, J. (2020). COVID-19 Hotel Quarantine Inquiry, Final Report and Recommendations.
Victorian Government Printer.
CoESS. (2013). Private Security Services in Europe: CoESS Facts and Figures 2013, Wemmel:
Confederation of European Security Services.
CoESS. (2020). The New Normal 2.0: Private Security and COVID-19 in Europe. Wemmel:
Confederation of European Security Services.
Cowan, R. (2009). Celebrating 40 Years, ASIAL 1969–2009, Then and Now: Licensing and
Training. Security Insider, August/September, 76–78.
Cragg Ross Dawson. (2015). Research on Violence Reduction. London: Security Industry Authority.
Crawford, A., Lister, S., Blackburn, S., and Burnett, J. (2005). Plural Policing. Bristol: Policy Press.
Cunningham, W.C., Strauchs, J.J., and van Meter, C.W. (1990) Private Security Trends 1970–2000.
Stoneham, MA: Butterworth-Heinemann.
Davis, R., Ortiz, C., Dadush, S., Irish, J., Alvarado, A., and Davis, D. (2003). The Public
Accountability of Private Police: Lessons from New York, Johannesburg, and Mexico City. Policing
and Society, 13(2), 197–210.
de Waard, J. (1999). The Private Security Industry in International Perspective. European Journal on
Criminal Policy and Research, 7(2), 143–174.
Grabosky, P., and Braithwaite, J. (1986). Of Manners Gentle: The Enforcement Strategies of
Australian Business Regulatory Agencies. Melbourne: Oxford University Press.
Gunningham, N., and Grabosky, P. (1998). Smart Regulation. New York: Oxford University Press.
Harkin, D. (2019). Regulating Private Security Provision for Victims of Domestic Violence.
Theoretical Criminology, 23(3), 415–432.
Kakalik, S.J., and Wildhorn, S. (1971a). Current Regulation of Private Police: Agency Experience
and Views. Santa Monica: RAND Corporation.
Kakalik, S.J., and Wildhorn, S. (1971b). Private Police in the United States: Findings and
Recommendations. Santa Monica: RAND Corporation.
Moore, Jr., R. (1990). Licensing and Regulation of the Private Security Industry: A Historical View
of the Court’s Role. Journal of Security Administration, 13(1&2), 37–61.
Nalla, M., Maxwell, S., and Mamayek, C. (2017). Legitimacy of Private Police in Developed,
Emerging, and Transitional Economies. Journal of Crime, Criminal Law and Criminal Justice, 25(1),
76–100.
National Institute of Justice. (2005). Engaging the Private Sector to Promote Homeland Security:
Law Enforcement-Private Security Relationships. Washington, DC: US Department of Justice.
Newspoll. (2004). Security Study: Prepared for the Australian Security Industry Association Limited.
Melbourne.
Park, H., and Cho, J. (2018). Global Trends in the Standardisation of the Burglary-Resistant Testing
of Security Hardware. Security Journal, 31(1), 247–264.
Prenzler, T. (1995). Security Managers’ Perceptions of Industry Regulation. Security Journal, 6(2),
227–234.
Prenzler, T. (ed.) (2017). Understanding Crime Prevention: The Case Study Approach. Brisbane:
Australian Academic Press.
Prenzler, T., and Hayes, H. (1999). An Evaluation of the Queensland Security Providers Act.
Australian and New Zealand Journal of Criminology, 32(1), 79–94.
Prenzler, T., and Sarre, R. (2008). Developing a Risk Profile and Model Regulatory System for the
Security Industry. Security Journal, 21(4), 264–277.
Prenzler, T., and Sarre, R. (2012). The Evolution of Security Industry Regulation in Australia.
International Journal for Crime and Justice, 1(1), 38–51.
Private Security Advisory Council. (1977). Law Enforcement and Private Security Sources and Areas
of Conflict and Strategies for Conflict Resolution. Washington, DC: Law Enforcement Assistance
Administration.
Santonen, T., and Paasonen, J. (2016). Evaluating the Adequacy of Private Security Regulation in
Finland. Security Journal, 30(2), 585–604.
Sarre, R. (2014). Legal Powers and Obligations, in T. Prenzler (ed.) Professional Practice in Crime
Prevention and Security Management. Brisbane: Australian Academic Press.
Sarre, R., and Prenzler, T. (1999). The Regulation of Private Policing: Reviewing Mechanisms of
Accountability. Crime Prevention and Community Safety, 1(3), 17–28.
Sarre, R., and Prenzler, T. (2009). The Law of Private Security in Australia. Sydney: Thomson
Reuters.
Sarre, R., and Prenzler, T. (2011). Private Security and Public Interest: Exploring Private Security
Trends and Directions for Reform in the New Era of Plural Policing. Sydney: Australian Security
Industry Association Limited.
Security Industry Authority. (2010a). The Impact of Regulation on the Door Supervision Sector.
London.
Security Industry Authority. (2010b). The Impact of Regulation on the Security Guard Sector.
London.
Security Industry Authority. (2020a). Annual Report and Accounts 2019/2020. London.
Security Industry Authority. (2020b). Protecting Society. Accessed on December 2 from https://
www.sia.homeoffice.gov.uk/Pages/about-protecting-society.aspx.
Security Industry Authority. (2020c). SIA Heroes. Accessed on December 2 from https://www.sia.
homeoffice.gov.uk/Pages/sia-heroes.aspx
Shearing, C., and Stenning, P. (1981). Modern Private Security: Its Growth and Implications, in
Tonry, M. and Morris, N. (eds.) Crime and Justice: An Annual Review of Research. Chicago:
University of Chicago Press.
Siebert, B. (2021, January 4). SA Police Reveal 99 Security Guards Stood Down or Sacked for
Coronavirus Medi-hotel Breaches. Accessed on January 7 from https://www.abc.net.au/news/2021-
01-03/coronavirus-sa-medi-hotel-quarantine-security-guard-breaches/13028380
Stenning, P. (2000). Powers and Accountability of Private Police. European Journal on Criminal
Policy and Research, 8(3): 325–352.
Tilley, N. (2018). Privatizing Crime Control. The ANNALS of the American Academy of Political and
Social Science, 679(1), 55–71.
UNODC. (2014). State Regulation Concerning the Civilian Private Security Services and their
Contribution to Crime Prevention and Community Safety. Vienna: United Nations Office on Drugs
and Crime.
van Steden, R., and Nalla, M. (2010). Citizen Satisfaction with Private Security Guards in the
Netherlands. European Journal of Criminology, 7(3): 214–234.
van Steden, R., and Sarre, R. (2007a). The Growth of Private Security: Trends in the European
Union. Security Journal, 20(4): 222–235.
van Steden, R., and Sarre, R. (2007b). The Growth of Privatized Policing: Some Cross-national Data
and Comparisons. International Journal of Comparative and Applied Criminal Justice, 31(1): 51–71.
Weber, T. (2002). A Comparative Overview of Legislation Governing the Private Security Industry in
the European Union. Birmingham: ECOTEC Research and Consulting.
White, A. (2015). The Impact of the Private Security Industry Act 2001. Security Journal, 28(4),
425–442.
Gregory Breetzke
Email: [email protected]
Abstract
While it has long been understood that informal security measures can be
amongst the most effective, they have been much less discussed. This
chapter addresses these measures, taking the South African township of
Mmakau as an example. Against a background in which the police have
been deemed to be ineffective, citizens have formed informal security nodes
such as street committees and taxi associations, among others. In addition to
a fascinating insight into informal security at work, the authors provide a
more nuanced understanding of the shift in the contemporary governance of
security in the country.
Introduction
South Africa is plagued by high levels of crime and high levels of fear. The
country consistently ranks as one of the most violent places on earth
(Global Peace Index 2020), and was recently characterised as a ‘war zone’
by the country’s Minister of Police (Merrington 2018). One of the most
distinguishing features of crime in South Africa is not so much its volume
but rather its violence. Of the over two million crimes committed in
2019/2020, over 30% were violent (South African Police Services (SAPS)
2020). Reported and recorded cases of homicide are often used as a key
indicator of trends in respect of violent crime as they can be independently
verified. Accordingly, an average of 57 people are murdered each day in the
country, comparable with the United States and China, but with these
countries having populations six and thirty times greater than South Africa,
respectively. A summary of homicide trends since democracy by the
Institute of Security Studies (2019) indicates an initial 55% decrease in
murders in South Africa from 1995 to 2011 followed by a 35% increase in
homicides up to 2018. The most common cause of homicide was personal
arguments, followed by gang-related disputes and domestic violence.
Almost 60% of women who are murdered by their partners are shot dead.
National victimisation studies, which have been developed largely to
supplement official crime statistics in the country, provide equally
discouraging readings. Two such studies have found high levels of
underreporting of crime, with less than half of all crime victims reporting
their experiences to the police (Statistics South Africa (SSA) 1998; Burton
et al. 2004). The results of the most recent victimisation study revealed that
the prevalence of certain types of crime such as house break-ins could be as
much as six times greater than the official police statistics indicate, with the
vast majority of cases going unreported in this category (SSA 2019). Across
all the crime categories, the levels of households not reporting crimes to the
police range between 14% (for theft of motor vehicles) and 65% (for street
robbery).
Fear of crime among South Africans is also high. Over 60% of adult
South Africans worry about their home being burgled or becoming a victim
of violent crime, while around a fifth of adults worry constantly about crime
impacting their lives (South African Social Attitudes Survey (SASAS)
2013). While patterns of fear of crime have remained relatively stable over
the past decade (Roberts 2012), the overarching trend is one of consistent
worry, which, for a sizable minority, has a serious impact on the quality of
their lives (Roberts and Gordon 2016). Of course, not only does the fear of
crime have an impact on mental and physical health-related issues
(Chandola 2001; Roberts et al. 2012; Browning et al. 2012; Wilson-
Genderson and Pruchno 2013) but in the South African context, the fear of
crime is thought to be a major factor that constrains efforts by the
government and non-state actors to promote socially cohesive communities
and a caring society (Roberts and Gordon 2016). The latter point is
significant as the country has struggled to translate the ‘Rainbow Nation’
moniker it adopted during the transition to democracy in 1994 into practice,
with the country arguably more socially fractured and less structurally
cohesive than it has ever been. Indeed, data from the most recent South
African Reconciliation Barometer (SARB) survey (2019) indicates that less
than a third of South Africans often or always talk or socialise with
someone from a different racial group.
The response to increased crime and feelings of fear among the South
African population has been a dramatic upsurge in a variety of mechanisms
—both formal and informal—aimed at increasing their sense of security.
From a purely situational crime prevention perspective residents and
communities have increasingly employed various types of target hardening
and access control mechanisms. As Snyders and Landman (2018, p. 266)
indicate:
South Africa currently has the largest private security sector in the world,
valued at approximately 2% of the country’s total gross domestic product
(Singh 2008; Abrahamsen and Williams 2011). Astonishingly, since 1970,
the industry has expanded at an average annual rate of 30% (Irish 1999),
while there are currently almost 500,000 active registered security officers
on patrol in the country (Private Security Industry Regulatory Authority
2017). This number is nearly double the size of the South African Police
Services and South African National Defence Force combined. The growth
of non-state policing, particularly related to the private security industry,
has raised a number of questions across disciplines concerned with
violence, (in)security, and what this means for the authority and legitimacy
of the state in South Africa (Diphoorn 2016). Nominally, and
constitutionally, the SAPS are in charge of preventing, combating and
investigating crime in South Africa; however, the SAPS since its inception
in 1995 has been plagued with allegations of being nefarious and corrupt
(Faull 2007; Newham and Faull 2011; O’Regan and Pikoli 2014; Ivković
and Sauerman 2015). According to the South African Social Attitudes
Survey (SASAS)—a nationally representative household-level survey of
citizens’ attitudes—roughly two-thirds of South Africans believe that the
most corrupt government officials in South Africa are located in the
national police service (SASAS 2013), with the police even being described
as the primary agent of corruption in the country (see Bruce 2008; Ivković
and Sauerman 2015). The effectiveness of social control depends on the
compliance and cooperation of citizens who recognise the police as being
competent and trustworthy since trust is a core value in determining
legitimacy. On the other hand, negative attitudes towards the police result in
mutual strife, disorder and inefficiency in policing. Currently, trust in the
SAPS is low (Faull 2007), with the reporting of crime considered to be a
waste of time and effort by the majority of the South African population
(Burger 2011).
A related consequence of rising crime and fear in South Africa since
democracy—and the concomitant inability of the state to control and/or
reduce these—has been the rapid growth and proliferation of the informal
security sector in the country. By the informal security sector we refer to
semi-legal and/or even criminal organisations involved in security
provisions. According to Martin (2013), so-called informal security nodes
(ISNs) distinguish themselves from private and state security in that they
operate largely beyond the confines of the state. They are, most often,
unregulated and are prone to using illicit force to assert and maintain
control. In this chapter, we explore the informal security sector in South
Africa. We initially examine its rise in South African society through the
lens of the transition to democracy and highlight some of the main ISNs
that have operated and continue to operate in the country. The central
hypothesis is that the informal security sector has become, in many
instances, the de facto law enforcement actor in the country, notably in poor
and rural communities due to the security-related functions they perform,
and the concomitant inability of the state to perform their perfunctory role.
Finally, a case study is outlined in which we highlight the interaction
between informal security providers and the community in the South
African informal settlement of Mmakau, located in the North West province
of the country. Informal security groups are particularly prevalent in poorer,
more informal areas, which tend to be less adequately protected by the
state. The experiences of this community in dealing first-hand with these
informal security provision actors will provide a greater understanding of
the shift in the contemporary governance of security in the country.
The taxi industry is extremely powerful in South Africa and its evolution
into a broker of justice is dangerous. Taxi violence is endemic in the
country, with the industry synonymous with accidents, crime and gender-
based violence (Moolman and Kgosimore 1998; Zessis et al. 2000;
Sekhonyane and Dugard 2004; Mackay and Callie 2010), among others.
The fact that these associations have become an institution that residents
approach to deal with crime and violence in their communities speaks to the
degree to which more formal policing structures have not only become
increasingly marginalised but essentially ignored. It is important to note that
all the informal networks of security provision mentioned above interact,
complement and, at times, compete with each other in attempting to provide
a measure of security to communities. Sadly, they also reflect the daily
reality that a large number of South Africans experience every day, that is,
high levels of crime and the concomitant inability of the state to prevent and
reduce it.
A final informal security entity operating in the country, particularly in
more rural areas, are tribal authorities. In South Africa, these authorities are
seen as the representatives of the community and as such are entrusted with
harmonising community customs and traditions within the overarching
ethos of the Constitution of the country. Leadership within tribal authorities
is hereditary, with no formal electoral process. Under apartheid these
authorities had numerous important administrative responsibilities such as
settling minor disputes, providing labourers for public works programmes,
and, importantly, maintaining law and order in their demarcated region.
Since democracy, tribal authorities have generally struggled to place
themselves within the modern structures of a democratic government
(Amtaika 1996). However, they are still legislatively able to perform a wide
range of functions for residents that live in their area, including providing
safety and security and administering justice (based on customary law)
(Williams 2010). Notably, their importance in South African society,
particularly in rural areas, has not diminished but rather been emboldened
as they act as a conduit through which political parties are able to engage
with their constituents ‘on the ground’.
It is clear that among a large number of South Africans these informal
security nodes are preferred to formal security agencies. According to
Ogbozor (2016), this is most likely due to three related factors: availability,
trust and their effectiveness. First, the ISNs are always available and prompt
when their services are needed; second, residents repose more trust in them
than the police, especially given the alleged tendency of police officers to
collect bribes and subvert the cause of justice; and third, these groups are
more effective in dealing with security issues decisively, unlike the police
that are often slowed down with bureaucratic bottlenecks. The preference
for ISNs is particularly relevant in more rural and/or poorer areas where
police are under-resourced and struggle to provide adequate security and
protection to residents. Indeed, while mistrust in the police is evident
throughout all of South Africa, it is most acutely felt at the local level where
communities are more often reliant on their services. The following case
study presents a brief exploration of the use of ISNs in an informal
settlement in South Africa, and highlights the blurred distinction between
the formal and informal security mechanisms in such communities to the
extent that it is difficult to determine at what point the formal security ends
and informal security begins.
When the men feel like their wives are being disrespectful, their
men hit them. Whether you are angry or not in the house, as a
woman, don’t try speak up because these men will hit you.
(interview FM31)
Many of the foreign-nationals that live here don’t have papers and
official work, but they are able to pay rent and have cars. Where
does that money come from? (interview FM45)
The police don’t stop crime they are often part of the crime
(interview MM31)
When there are meetings in Brits town, they (the police) go in
numbers with their cars, but when there is a crime reporting, all they
do is give us a case number and they tell us to keep looking for the
perpetrators and when we have information we must come to the
cops and report back. Even when they give us case numbers, they
lose our case information so what’s the point of reporting?
(interview FM23)
It’s all the same, whether we report or not nothing changes, the
police won’t follow up. (interview MM9)
Responses such as these not only reflect the utter mistrust residents have in
the police but a growing desire for an alternative form of security to
guarantee public safety and perform many other ancillary security
functions. It is largely for this reason that residents increasingly rely on the
informal security nodes to provide (or impose) various forms of security
and protection. These include the local tribal authorities as well as street
committees and patrolling groups who are loosely affiliated with the local
CPF. In Mmakau these units patrol the streets of the village on a nightly
basis, undertaking a number of policing activities such as stop-and-searches
of houses and individuals, recovering of stolen property and other
regulatory actions without any special or designated legal authority.
It’s risky patrolling these streets but we would rather die patrolling,
knowing that we were making living here safer for our families.
(interview MM29)
Conclusion
This chapter has sought to explain the nebulous nature of the informal
security sector in South Africa. This is not an easy undertaking. The sector
is largely undefined (and under-studied) in the country despite playing a
significant role in maintaining social order in a large number of
communities. Indeed, in many instances it represents the only reliable and
trustworthy mechanism available to deal effectively with society’s concerns
regarding their safety and security. The sector is also, however, mostly
unregulated and illicit, and has been known to engage in criminal and
vigilante activities itself (see Martin 2013). The fact that the informal
security sector largely shapes the governance of security in countries such
as South Africa is not particularly uncommon; rather, it is the extent to
which it is relied upon that is not only unique but should be of concern to
the South African government. According to Isima (2007), far greater
emphasis has been placed on the governance of the security sector in
countries such as South Africa than on the actual provision of physical
security for citizens. This has largely played out in the South African
context where state role-players involved in security provision appear more
interested in power dynamics and posturing than delivering on their
foremost mandate to protect the residents of the country. South Africa has
one of the largest national police forces in the world. Sadly, it is also one of
the most under-funded and under-resourced, resulting in it simply being
unable to act as the primary source of security provision in the country. In
its place is a complex set of informal security operators that collude and, at
times, collide to provide various forms of security and protection largely
outside the rule of law and the reach of formal regulation. Nowhere is this
more evident than in poor communities where security is so desperately
needed yet so scarce. As alleged by interviewees in Mmakau, the SAPS are
not only incompetent but are also complicit in committing criminal offences
within the community, providing an empirical example of how deep the rot
lies within formal security institutions.
While the inability of state actors such as the police to control crime in
the country could represent a broader failure of the post-apartheid
government to build bureaucratic capacity for effective service delivery
during the transition to democracy (Isima 2007), it could also simply reflect
a generalised apathy on the part of the police in dealing with crime. Either
way, roughly 66% of South Africans do not trust the single agency tasked
with providing them with security (see Afrobarometer 2018). This presents
complex analytical and political challenges for the South African
government. Do they continue with the status quo and let an autonomous,
largely community-led justice security practice continue unabated? Or do
they seek to define (or redefine) the relationship between formal security
agents such as the police and ISNs? In terms of the latter, a memorandum of
understanding that spells out the terms of collaboration or partnerships
should, at the very least, be drafted that clearly defines the terms of
cooperation between these two actors.
There can be little doubt that the growing reliance on the informal
security sector in South Africa raises key political and normative issues.
However, these debates must take place in the light of the fact that the
boundaries between formal and informal security have already undergone
significant transformations both globally and locally. We would argue that
the example of Mmakau is not unusual but rather increasingly common
across the country. Informal security nodes are already integrated into
complex networks of authority throughout most regions of the country that
challenge any clear-cut distinction of formal versus informal authority. Far
from being ‘illicit’, ISNs form a vital cog in the wheel of security provision
in South Africa. Understanding their development and rapid proliferation
since democracy is crucial to reducing the scourge of crime that continues
unabated in the country.
Recommended Reading
Readers of this chapter may consult the long list of references if interested
in engaging further in any of the topics raised throughout. However, for a
more concise list of the main key references used to guide this study readers
should use the list outlined here. A good place to start is Rauch (2000), who
does an excellent job in chronicling police reform and South Africa’s
democratic transition, while Leggett (2004) and Singh (2008) provide
excellent descriptions of policing and crime control in the post-apartheid
era. The work of Martin (2013) was key in defining and highlighting
informal security nodes (ISNs) in general and how they operate in certain
areas, with specific reference to South Africa. Although primarily focused
on ‘mob’ justice, the work of Gillespie (2014) also provides an excellent
outline of various forms of informal security sector involvement in crime
prevention in impoverished settings in South Africa. Other notable works
on the informal security sector in other parts of the world can be found in
Robison et al. (2008) and Ogbozor (2016). For a broader discussion of
political legitimacy in post-apartheid South Africa readers should read
Williams (2010). Readers are encouraged to read more broadly articles and
reports concerning contemporary roles of the informal security sector in
other settings. A number of the reports cited in this chapter can be read
online.
References
Abrahamsen, R. and Williams, M.C. (2011) Security Beyond the State. Private Security in
International Politics. London, UK: Cambridge University Press.
Amtaika, A.L. (1996) The Role of Tribal Authorities in a Democratic KwaZulu-Natal. Unpublished
M. Soc. Sc. thesis, University of Natal, Durban.
Baker, B. (2009) The Future is SSR is Non-state. Paper presented at “The Future of SSR”, e-
conference organized by Centre for International Governance Innovation CIGI, Waterloo, Canada, 4–
8 May 2009.
Brogden, M. and P. Nijhar. (2005) Community Policing: National and International Models and
Approaches. Cullompton, UK: Willan.
Browning, C. R., Cagney, K. A., and Iveniuk, J. (2012) ‘Neighborhood Stressors and Cardiovascular
Health: Crime and C-reactive Protein in Dallas, USA’, Social Science & Medicine, Vol. 75, No. 7,
pp. 1271–1279.
Bruce, D. (2008) Benign Neglect? The Policies and Practice of Controlling Police Corruption in
South Africa. Research paper written for workshop: Crime, Poverty and Police Corruption Annual
Bank Conference on Development Economics, Cape Town, South Africa.
Burger, J. (2011) ‘To Protect and Serve: Restoring Public Confidence in the SAPS’, South African
Crime Quarterly, Vol. 36, pp. 13–22.
Burton, P., Leggett, T., Louw, A., and Mistry, D. (2004) National Victims of Crime Survey: South
Africa 2003, Pretoria, South Africa, Institute for Security Studies.
Chandola, T. (2001) ‘The Fear of Crime and Area Differences in Health’, Health & Place, Vol. 7, No.
2, pp. 105–116.
Diphoorn, T. (2016) ‘Twilight Policing: Private Security Practices in South Africa’, British Journal of
Criminology, Vol. 56, No. 2, pp. 313–331.
Faull, A. (2007) Corruption and the South African Police Service: A Review and Its Implications,
Institute for Security Studies, Paper 150. (https://issafrica.org/research/papers/corruption-and-the-
south-african-police-service-a-review-and-its-implications).
Gillespie, K. (2014) The Context and Meaning of “Mob Justice” in Khayelitsha. Report prepared for
the Khayelitsha Commission: Commission of Inquiry into Allegations of Police Inefficiency and a
Breakdown in Relations between SAPS and the Community of Khayelitsha. (www.
khayelitshacommission.org.za/images/towards_khaye_docs/Khayelitsha_Commission_Report_
WEB_FULL_TEXT_C.pdf).
Fobosi, S.C. (2020) SA’s Minibus Taxi Industry has been Marginalised for too Long. This must
Change. (https://www.enca.com/analysis/sas-minibus-taxi-industry-has-been-marginalised-too-long-
must-change).
Hattingh, M.J. (2015) ‘The Use of Facebook by a Community Policing Forum to Combat Crime’,
published in SAICSIT ‘15, Proceedings of the 2015 Annual Research Conference of the South
African Institute of Computer Scientists and Information Technologists.
Irish, J. (1999) Policing for Profit: The Future of South Africa’s Private Security Industry.
Monograph Series No. 39. Pretoria: Institute of Security Studies (ISS).
Isima, J. O. (2007) ‘The Privatisation of Violence and Security Sector Reform in Africa: Nigeria and
South Africa Examined’, Journal of Peacebuilding and Development, Vol. 3, No. 2, pp. 24–37.
Institute for Security Studies (ISS). (2019) Policing alone cannot solve South Africa’s violence.
(https://issafrica.org/crimehub/analysis/press-releases/policing-alone-cannot-solve-south-africas-
violence).
Ivković, S. K. and Sauerman, A. (2015) ‘Threading the Thin Blue Line: Transition towards
Democratic Policing and the Integrity of the South African Police Service’, Policing & Society, Vol.
25, No. 1, pp. 25–52.
Lambrechts, D. (2012) ‘The Impact of Organised Crime on State Social Control: Organised Criminal
Groups and Local Governance on the Cape Flats Cape Town South Africa’, Journal of Southern
Africa Studies, Vol. 38, No. 4, pp. 787–807.
Leggett, T. (2004) ‘The State of Crime and Policing. In J. Daniel, R. Southall, and J. Lutchman
(eds.), State of the Nation: South Africa 2004–05. Pretoria: HSRC Press. pp. 144–176.
Martin, J. (2013) ‘Informal Security Nodes and Force Capital’, Policing and Society, Vol. 23, No. 2,
pp. 145–163.
Merrington, Z. (2018) SA’s Murder Rate Borders on War Zone: Bheki Cele. (https://www.sabcnews.
com/sabcnews/sas-murder-rate-borders-on-war-zone-bheki-cele/).
Minnaar, A. (2009) ‘Community Policing in a High Crime Transitional State: The Case of South
Africa since Democratization’. In D. Wisler, and I.D. Onwidiwe (eds.), Community Policing:
International Patterns and Comparative Perspectives. CRC Press, Boca Raton, FL. pp. 19–56.
Mistry, D. (1996) The State of Community Police Forums (CPFs) and Their Challenges. Paper
presented at Crimsa/Unisa’s Third International Crime Conference, Crime and Justice in the
Nineties, Unisa Pretoria, 3–5 July.
Moolman, C.J. and Kgosimore, D. (1998) ‘Taxi Violence in South Africa: The Causative Factors’,
Acta Criminologica, Vol. 11, No. 1, pp. 33–42.
Newham, G. and Faull, A. (2011) Protector or Predator? Tackling Police Corruption in South Africa.
ISS Monograph 182, Pretoria, South Africa.
O’Regan, K. and Pikoli, V. (2014) Towards a Safer Khayelitsha. Report of the Commission of
Inquiry into Allegations of Police Inefficiency and a Breakdown in Relations Between SAPS and the
Community of Khayelitsha. (www.khayelitshacommission.org.za/images/towards_khaye_docs/
Khayelitsha_).
Ogbozor, E. (2016) Understanding the Informal Security Sector in Nigeria. Special Report.
Washington, DC: United States Institute of Peace.
Peiffer, C., Marquette, H., Armytage, R., and Budhram, T. (2019) ‘The Surprising Case of Police
Bribery Reduction in South Africa’, Crime, Law & Social Change, Vol. 72, pp. 587–606.
Rauch, J. (2000) Police Reform and South Africa’s Transition. Paper presented at the South African
Institute for International Affairs Conference, 30 August–1 September 2000, Johannesburg: Centre
for the Study of Violence and Reconciliation (CSVR).
Roberts, B.J. (2012) ‘State of Affliction: Fear of Crime and Quality of Life in South Africa’. In D.
Webb and E. Wills-Herrera (eds.), Subjective Well-Being and Security. Social Indicators Research
Book Series 46. Dordrecht: Springer. pp. 149–175.
Roberts, B. and Gordon, S. (2016) ‘Pulling us Apart? The Association between Fear of Crime and
Social Cohesion in South Africa’, South African Crime Quarterly, Vol. 55, pp. 49–60.
Roberts, B., Stickley, A., Petticrew, M. and McKee, M. (2012) ‘The Influence of Concern about
Crime on Levels of Psychological Distress in the former Soviet Union’, Journal of Epidemiology and
Community Health, Vol. 66, No. 5, pp. 433–439.
Robison, R., Wilson, I., and Meliala, I. (2008) ‘Governing the Ungovernable’: Dealing with the Rise
of Informal Security in Indonesia’, Asia Research Centre Policy Brief No. 1, Murdoch: Asia
Research Centre. (http://wwwarc.murdoch.edu.au/wp/pb1.pdf).
Sekhonyane, M. and Dugard, J. (2004) Violent Legacy: The Taxi Industry and Government at
Loggerheads’, South African Crime Quarterly, Vol. 10, No. 1, pp. 13–18.
Serrao, A. (2018) A Look Back into the Case against Phahlane. (https://www.news24.com/
SouthAfrica/News/a-look-back-into-the-case-against-phahlane-20180208).
Shaw, M. (2002) ‘Crime, Police and Public in Transitional Societies’, Transformation, Vol. 49, pp. 1–
24.
Singh, A.M. (2008) Policing and Crime Control in Post-apartheid South Africa. Aldershot: Ashgate.
Snyders, E. and Landman, K. (2018) ‘Perceptions of Crime Hot-spots and Real Locations of Crime
Incidents in two South African Neighbourhoods’, Security Journal, Vol. 31, pp. 265–284.
South African Reconciliation Barometer. (2019) Institute for Justice and Reconciliation. (https://
www.ijr.org.za/portfolio-items/sa-reconciliation-barometer-2019/).
South African Social Attitudes Survey. (2013) Human Sciences Research Council. (http://www.hsrc.
ac.za/en/departments/sasas).
Statistics South Africa (SSA). (1998) The National Victims of Crime Survey. Pretoria, South Africa:
Government Printers.
Statistics South Africa (SSA). (2019) Victims of Crime Report 2018/19. Pretoria: Government
Printers.
Van Graan, J.G. (2006) Obstacles Impeding the Transformation Process in the South African Police
Service. Unpublished MTech dissertation in policing, University of South Africa, South Africa.
Williams, J.M. (2010) Chieftaincy, the State and Democracy: Political Legitimacy in Post-Apartheid
South Africa. Bloomington: Indiana University Press.
Zessis, C., Ensink, K., and Robertson, B. (2000) ‘Community Study of Taxi Violence and Distress
Symptoms among Youth’, Southern African Journal of Child and Adolescent Mental Health, Vol. 12,
No. 2, pp. 151–161.
Footnotes
1 The police under apartheid were called the South African Police (SAP). Post-apartheid, they were
renamed the South African Police Services (SAPS).
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_38
Paul Ekblom
Email: [email protected]
Abstract
Crime is a moving target for security. Political, economic, social,
technological, legal and environmental changes, combined with adaptive,
enterprising and networked offenders, mean that the crimes we have to
tackle will change, and that the solutions that work against existing crimes
may no longer do so in future. On the bright side, those same background
changes may supply new possibilities for designing effective and acceptable
security measures that overcome limitations experienced today. In both
cases, responding when new crimes or new security technologies emerge
comes a poor second to active, rigorous anticipation—not least because of
the often substantial lags between conception, development and deployment
of new security measures. Horizon-scanning comprises a range of
techniques which have been widely applied in governmental, private and
third sectors. This chapter reviews how they have been applied to crime,
with particular reference to recent efforts to blend horizon-scanning with
Crime Science, at the UCL Dawes Centre for Future Crime.
Introduction
Our journey into the future is accelerating. We have seen new and more
efficiently tapped sources of energy (from wood, wind and water to coal,
oil, nuclear, solar and wind again) and power (humans and horses to steam
and then electricity); new information and communications technology
(printing, telegraph, telephone, wireless and Internet; calculators,
computers, industrial control systems and the Internet of Things); new
materials (from wrought iron to cheap steel to Kevlar armour and smart
materials) and new manufacturing processes (from cottage industry to
mass-production to 3D-printing and nanotechnology). The general shift of
activities to cyberspace has removed many of the natural brakes on human
activities that derive from distance, time, energy, inertia, physical
enclosures and material supplies—enabling rapid and cheap scaling up and
rolling out. We are poised for further advances—quantum computing, able
to work faster and solve challenging problems in novel ways; fusion energy,
with (eventual) limitless clean power; autonomous vehicles, promising
greater safety and more efficient road use. Beside these and other trends we
have seen sudden events or shocks ranging from financial crashes to wars
and pandemics. These interact together and with social, economic, political,
legal and environmental changes—as when Covid-19 meets ageing
populations or Brexit interacts with just-in-time supply chains. All such
changes and interactions may affect wellbeing, health, trade, migration,
food supplies… and of course, crime and security.
Besides causing change, individuals, organisations and societies adjust
to it and utilise it for good or ill. The existence of adaptive, enterprising and
networked offenders, perhaps empowered by new technologies and on the
look-out to exploit or actively create new illicit opportunities, means that
the crimes we must tackle have been changing. Security faces targets that
move ever faster and in more complex ways. Twenty years ago who would
have envisaged 3D-printed guns, miniature networked security or spy
cameras, genetically engineered illicit drug production, cyber-bullying or
ransomware? Like military commanders doomed to fight previous wars,
those responsible for ensuring the security of products, processes, places,
services and systems are often caught out by changes that were either
unexpected or whose early indicators were ignored. Pease (2000)
introduced the term ‘crime harvests’ to depict the production of items like
mobile phones whose designs were naïve to crime risks, and whose roll-out
engendered a wave of theft or misuse, followed in turn by hasty, clunky
attempts at retrofitting remedial security.
When they do respond to crime, governments and police services
nowadays emphasise the evidence-based approach. Unfortunately, the
security solutions shown to work currently may no longer do so in future,
and new kinds of crime might emerge requiring entirely new solutions. And
security and offenders are engaged in a range of arms races (Ekblom 2017)
in which novel security techniques and technologies are pitted against novel
perpetrator techniques perhaps nefariously repurposing novel technologies
in move and counter-move. Ekblom and Gill (2016) describe an arms race
between Provisional IRA terrorists and the security services.
But those same background changes that potentially boost crime may
supply new possibilities for designing effective and acceptable security
measures that overcome constraints and limitations experienced today, and
may even extend what security can do. While affordable drones, for
example, can be misused by criminals to deliver drugs to prisons they can
also contribute to highly cost-effective and agile surveillance or pursuit.
Waiting until new crimes start happening, though, leads to the
consequences of lags in policymaking, development and roll-out of security
action. And when it does come the action may be awkwardly retrofitted,
rather than optimally designed in from the start.
There are diverse approaches to future crimes on various time and
geographic scales. The most ambitious is horizon-scanning, now widely
used in governmental, private and third sectors. This chapter reviews how
horizon-scanning can be applied to tackle crime and improve security. It
first reviews how security currently faces the future, followed by accounts
of the challenges of anticipation, and the nature, purposes and ingredients of
horizon-scanning. It then describes alternative ways of imagining future
worlds. Finally, it seeks to merge anticipation with crime science, and its
approaches to causation, intervention and the security process; innovation;
and research.
What Is Horizon-Scanning?
The UK government’s Chief Scientific Advisers’ Committee (2004, p. 3)
defined horizon-scanning as follows: ‘The systematic examination of
potential threats, opportunities and likely developments including but not
restricted to those at the margins of current thinking and planning. Horizon
scanning may explore novel and unexpected issues as well as persistent
problems or trends’. They further noted that this should involve going
beyond usual sources and timescales.
Examples of crime/security-focused horizon-scanning exercises include
two run by the UK government’s Foresight programme. The first (2002)
was a general purpose crime panel2 which inspired various development
projects; the second, a (2004) focus on cybercrime.3 Other projects included
a crime dimension within another field, for example a 2006 one on
intelligent infrastructure.4 More recent scans have been conducted, for
example by the Dawes Centre for Future Crimes at UCL (below).
Background Changes
Horizon-scanners have ways of ‘dividing up the future’ into ready-to-grasp
chunks, with variations on a theme, such as PESTLE, STEEPLE and the
most inclusive, PESTELOMI. This directs us to consider upcoming changes
in Political, Economic, Social, Technological, Environmental, Legal-
regulatory, Organisational, Media and Infrastructural domains (one would
nowadays add Health—PESHTELOMI). Any of these could influence the
immediate causes of crime by increasing motivation (e.g. social conflicts)
or opportunity (e.g. rising commodity prices, as happened with copper
(Sidebottom et al. 2014)). This may be direct, as with copper, or indirect, as
with the increases in demand in China that led to copper shortages—causes
of the causes of crime. Likewise with security, direct influences could
include the arrival of body-worn cameras; indirect ones could come from
anywhere in the immediate operating environment, such as changes in
social acceptability of certain surveillance methods, or regulations limiting
exchange of personal data between security organisations.
Use of Research
Crime-related research can contribute statistical time-series and models, as
mentioned, as well as theories and process models for conducting crime
prevention/security. Both the latter, especially if tested and validated, and
expressed in ‘perennial’ terms that are detached from ‘here-and-now’
contexts, should apply to future changed circumstances (risk factors for
theft of ‘hot products’, e.g. Concealability and Removability, will never
change even if technological or economic developments mean the specific
instances of what is concealable or removable do.) However, using theory
to forecast complex social trends like crime must go beyond individual
theoretical principles (e.g. Routine Activities, below) to understand how
multiple principles interact in the real world. Social science finds this hard
even in the present. This requires caution when bringing together what we
know about crime and security and about wider PESHTELOMI factors,
what changes are likely in the latter and how together they might influence
crime.
Data Sources
Horizon-scanning necessarily draws on more varied sources than
conventional research. Technology reports, serious journalistic articles, and
white papers on changes in regulations, taxation, business practices and so
on are all relevant. But a critical approach is obligatory, as is cross-checking
through multiple sources. Sometimes, Delphi polling (e.g. Coutorie 1995) is
used for formalised and carefully structured attempts to consult diverse
experts on strategic issues and priorities. Usually participation is
anonymous, and there are several rounds of response, consolidation and
review.
Uncertainty
Conventional handling of uncertainties in trend modelling includes error
bars and statistical confidence intervals. We can assess the consequences of
false positive and false negative errors in our predictions—what’s at stake,
for whom? But once we move beyond induction it may be impossible to
quantify uncertainty, and we are into the realm of ‘known and unknown
unknowns’.
Issues with available research and other data sources apart, many gaps
and inconsistencies remain. In such circumstances researchers customarily
either stop making inferences or try to fill the gaps with more studies. But
there are plenty of decisions that police and crime prevention and security
practitioners must take now, in the absence of full and reliable evidence—
whether to invest in particular training facilities, technologies,
infrastructures and so forth. Arguably it is better to take those decisions on
the basis of some indicative information, carefully handled, rather than
none. This means finding unconventional ways of handling uncertainty.
More distant horizons hold more uncertainty as there is more time for
new influences to emerge and interact, and for assumptions about contexts
to grow outdated. Horizon-scanners must acknowledge that narrow, highly
specific forecasts are almost certainly going to prove wrong.5
A key concept here is the so-called cone of uncertainty.6 This
schematically shows time moving forward to a potentially infinite range of
futures progressively diverging from each other. These can be subdivided
into ever-narrower nested cones—preposterous, possible, plausible,
probable, centring on the baseline future: the one assumed to occur if
nothing unexpected intervenes. This is business as usual, or the smooth
continuation of current trends. The range judged worthwhile to address is
the cone of plausible alternative futures: plans to cope with, or to exploit,
any such changes must be appropriate, workable and robust.
Normally, we consider variation in multiple dimensions, sometimes
referred to as axes of uncertainty, for example, free trade—protectionism
and political stability—instability. Dimensions imply steady variation, but
in fact the space mapped out within a futures cone can contain peaks and
troughs. Risk managers must confront the possibility of sudden adverse
events that are of low probability, but if they do happen, high harm, as with
rare terrorist attacks or major one-off hacking waves exploiting a pervasive
security vulnerability. These are known as wildcards (Mendonça et al.
2009). Markley (2011) expands the wildcard concept (preferring the term
‘surprises’) by considering the whole array of combinations of high/low
probability, impact and credibility of the anticipated future trend or event.
Users apply the results of horizon-scanning to prediction (‘What might
we have to cope with, and how?’) or prescription (‘What is our preferred
future?’ e.g. low fraud plus low regulatory burden), where the aim is to
identify the best way to make that future happen. Of course, other parties
may be trying to nudge events towards their own preferred future—claims
about the anticipated technological or market success of particular
proprietary products and services need sceptical handling.
One way to reduce uncertainty is by identifying leading indicators—
changes which reliably precede the change of interest, whether the link is
made via empirical association, theory or logic. Thus we may bet with some
confidence that an increase in the price of copper will be followed after
some lag by an increase in metal theft (unless policymakers, law
enforcement and, perhaps, rail operators have acted on the warning or,
longer term, cheaper alternatives to copper are developed).
While leading indicators are by definition well-grounded, when such
information is lacking it may nevertheless be possible to cautiously use so-
called weak signals. These are warnings, events and developments that are
still too vague to permit accurate estimation of their impact and/or plan
complete responses (Hiltunen 2008). Attributes of weak signals (https://
www.sitra.fi/en/articles/what-is-a-weak-signal/) include novelty, surprise
value, capacity to challenge existing assumptions, and relation to a
significant issue which may emerge after some delay. Weak signals may
contribute less to substantive evidence-grounded anticipation and more to
‘stimulus value’ in prompting wider-ranging discussion.
Scenarios
Scenarios are the most familiar approach, and usually involve defining a
space of future possibilities using two axes of uncertainty. An example is in
the UK Foresight programme’s ‘Intelligent Infrastructure 2055’ project
(Ekblom 2006). The axes represent (1) transport varying between high and
low environmental impact, and (2) societal acceptance versus resistance
regarding intelligent infrastructure. The four quadrants so defined each
constitute a scenario, which is usually given an engaging label: Good
Intentions (high-impact high-acceptance), Perpetual Motion (low-high),
Urban Colonies (low-low), Tribal Trading (high-low). As mentioned, I
contributed a crime perspective on each scenario using the Conjunction of
Criminal Opportunity framework (below) to give a systematic and detailed
treatment.
But often the choice of scenarios and axes is arbitrary. Shearer (2005)
lists various criticisms, including a concern that the axes and scenarios
selected reflect the author’s assumptions and biases. Also, the labels may be
superficial and oversimplifying, and considering just two axes is arbitrary.
Cubes with eight scenarios are visualisable,9 but the cognitive overload
(plus airtime constraints in group work) rapidly becomes unmanageable.
A more systematic approach to homing in on critical dimensions is
General Morphological Analysis (GMA). Originally developed for
astronomy, this is now applied to analysing wicked problems. This
identifies key parameters (equivalent to axes of uncertainty) and crosses
them to define a ‘typological field’ (multidimensional grid of possible
futures). This is used to generate scenarios. Tzezana (2017) applied GMA
to analyse the futures of crime and terror in the age of the Internet of
Things. On a crowdsourcing platform 50 experts in cyber-security and
elsewhere identified the most important factors in each of three parameters:
targets, motives and methods. They then ranked each factor according to its
likelihood or impact, enabling creation of a typological field of 9660
combinations of factors—each of which could define a scenario. Following
systematic filtering based on expert rankings plus other considerations,
three combinations of high impact/high likelihood were expanded on and
developed into scenarios, plus three combinations of high impact/low
likelihood (wild cards/surprises). The scenarios comprised: (high-high)
Blackmailed power plant, The open cyber-wallet, Malicious smart assistant;
(high-low) Green war (drones v power plant), Botnets v rail signalling for
lulz (fun), AI worm infecting hospital systems for ID theft.
Narratives
Van der Steen (2008), discussing ageing, sees future narratives as ‘stories
about what the future, or possible futures, may … look like and that connect
these possible futures to current issues for political debate…’ (576). Like
scenarios, future narratives can be engaging, and positively immersive—
indeed, sci-fi stories such as Charlie Brooker’s Black Mirror series (www.
imdb.com/title/tt2085059/) manage to combine disparate elements to
generate rich and convincing views of possible futures, extrapolating
emergent trends (like online blackmail for entertainment or insect-sized
drones used to hunt people down) to extremes. As specific predictions these
are unlikely to come true but act as powerful stimuli for discussion or to
present particular arguments about the kinds of futures we want to happen
or to avoid. Interestingly, organisations such as the UK’s Defence Science
and Technology Laboratory commission sci-fi writers to prepare stimulus
materials for horizon-scanning exercises.
Simulations
All is not lost with research-based approaches to envisioning the future.
Modelling and simulation, especially when combined with big data and
theory, can increasingly bring together a range of interacting causal
influences both in the here-and-now (‘What if we block that street off to
traffic?’) and in broader futures (‘What if all town centres were
pedestrianised?’). The most sophisticated simulations use agent-based
modelling (e.g. Birks 2017), which involves creating a virtual townscape,
for example, and populating it with software agents. These are simulacra of
people with highly simplified behaviours, desires and emotions, acting as
criminals, potential victims and/or police patrols, perhaps also equipped
with particular tools or other resources. Although so far this technique has
focused on testing criminological theory, it has potential to explore impacts
of operational or strategic changes (e.g. What might restriction of vehicle
miles—perhaps due to energy shortages—do to police patrolling patterns
and arrest/deterrence functions?).
Graphical Representations
For purposes of engagement, stimulation and communication of complex
ideas, horizon-scanners have eagerly embraced the possibilities of graphic
and communication design (albeit not always for the better). Examples
include system maps, which show complex interrelationships between
causal influences, or between agents and their environment; and technology
roadmaps, which show either how a diversity of inventions have come
together to make something possible today (consider all the technologies
that made mobile phones possible) or what is needed to converge on some
desired future (e.g. all the inventions needed or the problems to be solved
before we achieve commercial nuclear fusion, with likely timelines). An
example is on p. 75 of the UK Government Office for Science Futures
Toolkit.10 Upcoming risks can be plotted in various ways, such as ‘risk
radar’.11 Here, types of risk (PESHTELOMI, etc.) are shown as segments
round the compass; timescale by radial distance from the centre; and
magnitude by colour-coding of the individual risk items shown as blobs at
appropriate polar coordinates. The same approach can be used to present
anticipated technologies.12
Conclusion
The future is coming at us ever faster and from all angles. Day to day, or
even year on year, risk management of the conventional kind is insufficient
to enable security providers, whether in the police, local/national
government or the private sector, to anticipate emerging and future trends
and high-impact events, and to take action in good time rather than react in
catch-up mode. The trends and events may be crimes themselves, those
which influence crime risk, or those which act on the provider institutions
themselves and their operating environments. A systematic, rigorous but
creative and engaging investment in horizon-scanning, whether in-house or
outsourced, is a vital element for security to handle a challenging and
changing future. The data, frameworks and tools to undertake this task are
available and progressively evolving.
Recommended Reading
All weblinks in this chapter are at
[crimeframeworks/futures/securityhandbooklinks—to be checked after
copyediting]
Goodman (2015) provides an engaging and well-thought-through
forecast of future crime. The Institute of Risk Management guide on
horizon-scanning gives a good overview of approaches.27 The UK
government Futures Toolkit offers a comprehensive practical guide at the
policy/programme level,28 as do Hines and Bishop (2013). For keeping up
with developments in trends and techniques the UK government Futures,
Foresight and Horizon-Scanning blog29 merits regular checking. The ASIS
Scouting the Future expert review is also good (see Note 25). For
graphically envisaging futures, the Envisioning radar timeline and
Futurism’s linear equivalent are excellent (see Note 12). The UCL Dawes
Centre for Future Crime (see Note 26) is a useful link to cutting-edge
research.
References
All websites accessed 18 December 2020.
Armitage, R., & Pease, K. (2007). Predicting and preventing the theft of electronic products.
European Journal on Criminal Policy and Research, 14:1–9.
Birks, D. (2017). Simulating crime event decision making: Agent-based social simulations in
criminology. In W. Bernasco, J-L. van Gelder and H. Elffers (eds.) The Oxford Handbook of Offender
Decision Making. Oxford: Oxford University Press.
Borrion, H., Ekblom, P., Alrajeh, D., Borrion, A., Keane, A., Koch, D., Mitchener-Nissen, T., &
Toubaline, S. (2020). The Problem with Crime Problem-Solving: Towards a Second-Generation
POP? British Journal of Criminology, 60:19–240.
Brantingham, P.J., Brantingham, P. L., & Andresen, M. (2017). The geometry of crime and crime
pattern theory. In R. Wortley and M. Townsley (eds.) Environmental Criminology and Crime
Analysis (2nd edition). London: Routledge.
Chapman, J. (2004). System Failure: Why Governments Must Learn to Think Differently. London:
Demos.
Clarke, R. (1999). Hot Products: Understanding, Anticipating and Reducing Demand for Stolen
Goods. Police Research Series Papers 112. London: Home Office.
Clarke, R., & Newman, G. (2006). Outsmarting the Terrorists. London: Praeger Security
International.
Cohen, L., & Felson, M. (1979). Social change and crime rate changes: A routine activities approach.
American Sociological Review, 44, 588—608.
College of Policing. (2020). Taking the long view: Policing into 2040. https://whatworks.college.
police.uk/About/News/Pages/Policing2040.aspx
Collins, B., & Mansell, R. (2004). Cyber Trust and Crime Prevention: A Synthesis of the State-of-the-
Art Science Reviews. London: Department for Business, Innovation and Science.
Cornish, D., & Clarke, R. (2017). The Rational Choice perspective. In R. Wortley and M. Townsley
(eds.) Environmental Criminology and Crime Analysis (2nd edition). London: Routledge.
Coutorie, L. (1995). The future of high-technology crime: A parallel Delphi study. Journal of
Criminal Justice 23:13–27.
Felson, M., & Eckert, M. (2015). Crime and everyday life (5th edition). London: Sage.
Harries, R. (2003). Modelling and Predicting Recorded Property Crime Trends in England and Wales
—A Retrospective. International Journal of Forecasting 19:557–566.
Dorst, K. (2015). Frame Innovation: Create New Thinking by Design. Cambridge, MA: MIT Press.
Ekblom, P. (2002). Future Imperfect: Preparing for the Crimes to Come. Criminal Justice Matters 46
Winter 2001/02:38–40. London: Centre for Crime and Justice Studies, Kings College.
Ekblom, P. (2005). How to police the future: Scanning for scientific and technological innovations
which generate potential threats and opportunities in crime, policing and crime reduction. In M.
Smith and N. Tilley (eds.), Crime Science: New Approaches to Preventing and Detecting Crime.
Cullompton: Willan.
Ekblom, P. (2006). Crime. In Office of Science and Technology, Foresight Intelligent Infrastructure
Futures: the Scenarios – Towards 2055 – Perspective and Process 17–23. London: Department of
Trade and Industry.
Ekblom, P. (2011). Crime Prevention, Security and Community Safety Using the 5Is Framework.
Basingstoke: Palgrave Macmillan. See http://5isframework.wordpress.com
Ekblom, P. (2014). Design and security. In M. Gill (ed) The Handbook of Security (2nd Edn), 133–
156. Basingstoke: Palgrave Macmillan.
Ekblom, P. (2017). Crime, situational prevention and technology – the nature of opportunity and how
it evolves. In M. McGuire and T. Holt (eds) The Routledge Handbook of Technology, Crime and
Justice. Milton Park: Routledge, 353–374.
Ekblom, P. & Gill, M. (2016). Rewriting the Script: Cross-Disciplinary Exploration and Conceptual
Consolidation of the Procedural Analysis of Crime. European Journal of Criminal Policy and
Research 22: 319–339.
Ekblom, P. & Pease, K. (2014). Innovation and Crime Prevention. In G. Bruinsma, and D. Weisburd
(eds.), Encyclopedia of Criminology and Criminal Justice. New York: Springer Science+Business
Media.
Elgabry, M., Nesbeth, D., & Johnson, S. (2020). A Systematic Review of the Criminogenic Potential
of Synthetic Biology and Routes to Future Crime Prevention. Frontiers in Bioengineering and
Biotechnology, 06 October.
Farrell, G., Tseloni, A., Mailley, J., & Tilley, N. (2011). The crime drop and the security hypothesis.
Journal of Research in Crime and Delinquency 48:147–175.
Hiltunen, E. (2008). Good sources of weak signals: A global study of where futurists look for weak
signals. Journal of Futures Studies 12: 21–42.
Hines, A., & Bishop, C. (2013). Framework foresight: Exploring futures the Houston way. Futures
51:31–49.
Innes, M., Robinson, A., & Levi, M. (n.d.). Preventing Future Crimes and Crime Prevention
Futures: A Summary of Findings. Briefing Paper 4. Cardiff: Universities Police Science Institute.
https://whatworks.college.police.uk/Research/Documents/Crime_prevention_futures_briefing_paper.
pdf
Institute of Risk Management (2018). Horizon Scanning: A Practitioners Guide. London: Institute of
Risk Management. www.theirm.org/media/7423/horizon-scanning_final2-1.pdf
Johnson, S., Ekblom, P., Laycock, G., Frith, M., Sombatruang, N., & Rosas Valdez, E. (2019). Future
crime. In R. Wortley, A. Sidebottom, N. Tilley and G. Laycock (eds), Routledge Handbook of Crime
Science 428–446. Milton Park: Routledge.
Mendonça, S., Pina e Cunha, M., Ruff, F., & Kaivo-oja, J. (2009). Venturing into the wilderness:
Preparing for wild cards in the civil aircraft and asset-management industries. Long Range Planning
42: 23–41.
Monchuk, L., & Clancey, G. (2013). A comparative analysis of crime risk assessments and their
application in Greater Manchester and New South Wales. Built Environment 39:74–91.
Pease, K. (1997). Predicting the Future: the Roles of Routine Activity and Rational Choice Theory.
In G. Newman, R.V.G. Clarke, and S.G. Shosham (eds.) Rational Choice and Situational crime
Prevention: Theoretical Foundations. Aldershot: Dartmouth.
Rittel, H., & Webber, M. (1973). Dilemmas in a general theory of planning. Policy Sciences 4:155–
169.
Shearer, A. (2005). Approaching scenario-based studies: Three perceptions about the future and
considerations for landscape planning. Environment and Planning B: Planning and Design 32:67–87.
Sidebottom, A., Ashby, M., & Johnson, S. (2014). Copper Cable Theft: Revisiting the Price–Theft
Hypothesis. Journal of Research in Crime and Delinquency, 51:684–700.
Snowden, D., & Boone, M. (2007). A leader’s framework for decision making. Harvard Business
Review, November. https://hbr.org/2007/11/a-leaders-framework-for-decision-making
Tzezana, R. (2017). High-probability and wild-card scenarios for future crimes and terror attacks
using the Internet of Things. Foresight 19:1–14.
Van der Steen, M. (2008). Ageing or silvering? Political debate about ageing in the Netherlands.
Science and Public Policy 35:575–583.
2 https://webarchive.nationalarchives.gov.uk/20100710015618/http://www.foresight.gov.uk/
OurWork/Completed2002.asp.
3 www.gov.uk/government/publications/cyber-trust-and-crime-prevention.
8 https://en.wikipedia.org/wiki/Cynefin_framework.
10 https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/
674209/futures-toolkit-edition-1.pdf.
13 www.ucl.ac.uk/security-crime-science/about.
14 https://popcenter.asu.edu/content/25-techniques.
15 And http://5isframework.wordpress.com.
16 https://popcenter.asu.edu/.
17 https://popcenter.asu.edu/content/sara-model-0.
18 https://5isframework.wordpress.com.
19 https://www.triz.org/triz/evolution/2-triz.
20 Ironically, the Misdeeds and Security framework was developed (Ekblom 2005) for a UK police
technology strategy group which at the time considered (among much else) the future of unmanned
aerial vehicles and concluded that they would never be allowed in the hands of the public.
21 https://efus.eu/en/topics/activity/20342/.
22 https://www.europol.europa.eu/publications-documents/exploring-tomorrow%E2%80%99s-
organised-crime.
23 For example, https://www.europol.europa.eu/activities-services/main-reports/european-union-
serious-and-organised-crime-threat-assessment-2017 and https://www.europol.europa.eu/activities-
services/main-reports/internet-organised-crime-threat-assessment-iocta-2020.
25 https://www.asisonline.org/globalassets/foundation/documents/research/asis-scouting-the-future-
exec-summary-revised.pdf.
27 https://www.theirm.org/media/7423/horizon-scanning_final2-1.pdf.
28 https://www.gov.uk/government/publications/futures-toolkit-for-policy-makers-and-analysts.
29 https://foresightprojects.blog.gov.uk/.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_39
Abstract
The author’s growing concern over global environmental matters, including
the protection of endangered fauna and flora species, has brought to the
forefront the role of security strategy, personnel, and technology. In
particular, the management and monitoring of terrestrial protected areas
(PAs) have increasingly emphasized the need for, and reliance on, security
measures in many parts of the world. This chapter examines the ongoing
discussion on the securitization of PAs and provides insight on the potential
benefits and problems of such strategies, in relation to both crime and harm.
Introduction
Increased attention to the human dimensions of environment-related matters
has led to growing recognition of the intersection of biodiversity and
ecology with enforcement and security. Researchers have also
acknowledged the need to better understand and situate this intersection
within the broader social, political, and economic environment. In
particular, consideration and scrutiny has been placed on investigating the
amplified securitization of terrestrial protected areas (herein referred to as
PAs), particularly as it relates to presence of the military. Indeed, militarized
conservation (Duffy 2014) or “green militarization” (Lunstrum 2014) has
received much scholarly attention in recent years, with much of the
commentary and empirical research pointing to the increased use of and
reliance on military equipment, technology, personnel, and weaponry in
PAs (Marijnen and Verweijen 2016; Jooste and Ferreira 2018; Massé et al.
2018).
This chapter discusses the securitization of terrestrial protected areas
and is separated into five sections. First, an overview of two main
management and monitoring strategies for protected areas relevant for the
present discussion will be provided. Next, I provide an overview of how the
contemporary securitization of protected areas is framed. After, I discuss
three key factors related to the securitization of terrestrial protected areas:
(1) role and role orientation of protected area authorities, (2) the use of
technology in PA management, and (3) community-protected area authority
relations. Finally, a road map for future research will be provided.
Importantly, while the objective of this chapter is to provide an exploration
of the existing literature, when applicable, I will also draw from and reflect
on my fieldwork that has examined wildlife law enforcement, ranger
culture, and wildlife crime.
Discussion
The securitization of terrestrial PAs is a complicated and complex issue that
has important implications for global, regional, and local conservation
efforts. While the existing conceptual and empirical literature provides a
solid foundation, additional research is still needed to further understand the
impact, limitations, and possibilities associated with the securitization of
terrestrial PAs, as well as the identification of alternative strategies (see
Moreto and Pires 2018). In general, future researchers should further
explore the human dimensions of the securitization of PAs. Such research
should not only examine the perceptions of local communities, but also of
PA authorities who are tasked with such securitization. Additionally, any
existing or proposed security measures should be independently and
rigorously evaluated. Unfortunately, few security measures within terrestrial
PAs are ever evaluated. Generally speaking, the evaluation of conservation
programs, particularly those involving a third party, has historically been
relatively rare given the number of programs and initiatives that are
implemented (see Kleiman et al. 2000).
To do so, I suggest using a realist evaluation approach (see Pawson and
Tilley 1997) to ensure that not only is an outcome evaluation performed but
a process evaluation is completed as well. In situations where an evaluation
is completed, it is often centered on only assessing the outcome of the
strategy or project, not how it was implemented. However, it may be
especially important to know how security measures are implemented, how
such measures are communicated to and received by different stakeholders,
and what impact the surrounding social, political, and organizational
environment has on the success (or lack thereof) of the approach.
Researchers should also examine the varying degrees of PA
securitization that exist around the world. Securitization is often presented
as an umbrella term within the conservation literature that encompasses a
wide variety of agencies, strategies, technology, and personnel. However,
such generalized statements often oversimplify ground-level realities that
are present.
Future studies should disentangle the distinct and varied nature of
securitization as it relates to different PAs located in parts of the world. As
discussed in this chapter, much emphasis has been placed on (and should
continue to explore) the technological and personnel aspects of the
securitization of terrestrial PAs, but more insight is needed on the
organizations that are directly and indirectly involved as well. Indeed, while
some organizations, including some of the ones mentioned above, appear to
have a solid system in place, such systems may not be applicable (or
appropriate) in other contexts. In other words, any form of security must not
only be assessed in terms of its potential effectiveness, but also its ethical
application. What may be effective and viewed to be appropriate in one
context may not necessarily be so in another.
Finally, I recommend that researchers draw from criminal justice theory
to assess the factors that influence the adoption of specific strategies and
technology, as well as how such adoption is coupled (possibly loosely) with
behavior and attitudes of personnel on the ground (see McGuire and Duffee
2015). Indeed, this is a space where criminal justice, as a field, can be
particularly useful in contributing to conservation social science (Bennett et
al. 2017; Moreto and Charlton 2021). By examining factors that influence
and impact the organizations themselves, a better understanding of how
policies, strategies, and technology are adopted, communicated, and
reinforced may be achieved. Through such assessments, it may be possible
to identify elements of the organization that can be leveraged to maximize
the positive benefits of security, while minimizing or eliminating
detrimental or harmful features.
Recommended Reading
A comprehensive case study examining the securitization and protectionist
models of conservation was performed by Brockington, D. (2002). Fortress
Conservation: The preservation of the Mkomazi Game Reserve, Tanzania.
Bloomington, IN: James Currey. Papers that have explored the intersection
of the militarization and securitization of conservation from a political
ecology perspective include Lunstrum (2014). Green militarization: anti-
poaching efforts and the spatial contours of Kruger National Park. Annals of
the Association of American Geographers, 104(4), 816–832, and Marijnen,
E., & Verweijen, J. (2016). Selling green militarization: the discursive
(re)production of militarized conservation in Virunga National Park,
Democratic Republic of the Congo. Geoforum, 75, 274–285. A critical
discussion on the militarization of protected areas can be found in Duffy,
R., Massé, F., Smidt, E., Marijnen, E., Büscher, B., Verweijen, J.,
Ramutsindela, M., Simlai, T., Joanny, L., & Lunstrum, E. (2019). Why we
must question the militarization of conservation. Biological Conservation,
232, 66–73.
References
Adams, W. M. (2017). Geographies of conservation II: Technology, surveillance and conservation by
algorithm. Progress in Human Geography, 43(2), 337–350.
Adams, W. M., & Hulme, D. (2001). If community conservation is the answer in Africa, what is the
question? Oryx, 35(3), 193–200.
Agrawal, A., & Gibson, C. C. (1999). Enchantment and disenchantment: the role of community in
natural resource conservation. World Development, 27(4), 629–649.
Arimoro, O. A. S., Lacerda, A. C. R., Tomas, W. M., Astete, S., Roig, H. L., & Marinho-Filho, J.
(2020). Artillery for conservation: The case of the mammals protected by the Formosa Military
Training Area, Brazil. Tropical Conservation Science, 10(1).
Astaras, C., Linder, J. M., Wrege, P., Orume, R., Johnson, P. J., & Macdonald, D. W. (2020). Boots
on the ground: the role of passive acoustic monitoring in evaluating anti-poaching patrols.
Environmental Conservation, 47(3), 213–216.
Ballari, D., Orellana, D., Acosta, E., Espinoza, A., & Morocho, V. (2016). UAV monitoring for
environmental management in Galapagos Islands. The International Archives of the
Photogrammetry, Remote Sensing and Spatial Information Sciences, XLI-B1.
Balzacq, T., Leonard, S., & Ruzicka, J. (2016). ‘Securitization’ revisited: theory and cases.
International Relations, 30(4), 494–531.
Belecky, M., Singh, R., & Moreto, W. (2019). Life on the frontline 2019: A global survey of the
working conditions of rangers. WWF.
Bennett, N.J., Roth, R., Klain, S.C., Chan, K., Christie, P. Clark, D. A…Wyborn, C. (2017).
Conservation social science: understanding and integrating human dimensions to improve
conservation. Biological Conservation, 205, 93–108.
Brockington, D. (2002). Fortress Conservation: The Preservation of the Mkomazi Game Reserve
Tanzania. Bloomington, IN: Indiana University Press.
Büscher, B., & Dressler, W. (2012). Commodity conservation: the restructuring of community
conservation in South Africa and the Philippines. Geoforum, 43(3), 367–376.
Campbell, D.J., Gichohi, H., Mwangi, A., & Chege, L. (2000). Land use conflict in Kajiado District,
Kenya. Land Use Policy, 17, 337–348.
Campos, I.V., Fewster, R., Truskinger, A., Towsey, M., Roe, P., Filho, D. V., Lee, W., & Gaskett, A.
(2021). Assessing the potential of acoustic indices for protected area monitoring in the Serra do Cipo
National Park, Brazil. Ecological Indicators, 120, 106953.
Criddle, C. (2020, November 18). Endangered species: Gunshot detection technology deployed.
BBC. Retrieved February 1st 2021 from: https://www.bbc.com/news/technology-54980348?xtor=
AL-72-%5Bpartner%5D-%5Binforadio%5D-%5Bheadline%5D-%5Bnews%5D-%5Bbizdev%5D-
%5Bisapi%5D.
Dickman, A.J. (2010). Complexities of conflict: the importance of considering social factors for
effectively resolving human-wildlife conflict. Animal Conservation, 13(5), 458–466.
Duffy, R. (2010). Nature Crime: How we’re getting conservation wrong. New Haven, CT: Yale
University Press.
Duffy, R. (2014). Waging a war to save biodiversity: the rise of militarized conservation.
International Affairs, 90(4), 819–834.
Dunham, K. M., Ghiurghi, A., Cumbi, R., & Urbano, F. (2010). Human-wildlife conflict in
Mozambique: a national perspective, with emphasis on wildlife attacks on humans. Oryx, 44(2),
185–193.
Dwyer, M. B., Ingalls, M. L., & Baird, I. G. (2016). The security exception: development and
militarization in Laos’s protected areas. Geoforum, 69, 207–217.
Felbab-Brown, V. (2015, July 22). It’s corruption, stupid: terrorism, wildlife trafficking, and Obama’s
Africa trip. Brooking’s blog. Retrieved from: https://www.brookings.edu/blog/up-front/2015/07/22/
its-corruption-stupid-terrorism-wildlife-trafficking-and-obamas-africa-trip/.
Ghale, S. (2018, May 22). Men in Green. The Kathmandu Post. Retrieved from: https://
kathmandupost.com/opinion/2018/05/22/men-in-green.
Hayes, T.M. (2006). Parks, people, and forest protection: an institutional assessment of the
effectiveness of protected areas. World Development, 34, 2064–2075.
Hilborn, R., Arcese, P., Borner, M., Hando, J., Hopcraft, G., Loibooki, M., Mduma, S., Sinclair, A.R.
(2006). Effective enforcement in a conservation area. Science, 314, 1266.
Jooste, J., & Ferreira, S. M. (2018). An appraisal of green militarization to protect rhinoceroses in
Kruger National Park. African Studies Quarterly, 18(1), 49–60.
Kelly, A. B., & Ybarra, M. (2016). Introduction to themed issue: “Green security in protected areas”.
Geoforum, 69, 171–175.
Kleiman, D.G., Reading, R. P., Miller, B.J., Clark, T.W., Scott, J. M., Robinson, J., Wallace, R. L.,
Cabin, R. J., & Felleman, F. (2000). Improving the evaluation of conservation programs.
Conservation Biology, 14(2), 356–365.
Kline, L. R., DeAngelis, A.I., McBride, C., Rodgers, G.G., Rowell, T. J., Smith, J., Stanley, J. A.,
Read, A. D., & Parijs, S. M. (2020). Sleuthing with sound: Understanding vessel activity in marine
protected areas using passive acoustic monitoring. Marine Policy, 120, 104138.
Kolbert, E. (2016, March 17). Guantánamo: From prison to marine conservation peace park? The
New Yorker. Retrieved from: https://www.newyorker.com/news/daily-comment/guantanamo-from-
prison-to-marine-conservation-peace-park.
Kothari, A., Camill, P., & Brown, J. (2013). Conservation as if people also mattered: policy and
practice of community-based conservation. Conservation & Society, 11(1), 1–15.
Lunstrum, E. (2014). Green militarization: Anti-poaching efforts and the spatial contours of Kruger
National Park. Annals of the Association of American Geographers, 104(4), 816–832.
McGuire, E.R., & Duffee, D.E. (2015). Criminal justice theory: explaining the nature and behavior
of criminal justice. New York, NY: Routledge.
Maheshwari, A., & Sathyakumar, S. (2019). Snow leopard stewardship in mitigating human-wildlife
conflict in Hemis National Park, Ladakh, India. Human Dimensions of Wildlife, 24(4), 395–399.
Mangewa, L. J., Ndakidemi, P. A., & Munishi, L. K. (2019). Integrating UAV technology in an
ecological monitoring system for community wildlife management areas in Tanzania. Sustainability,
11(2), 6116.
Marijnen, E., & Verweijen, J. (2016). Selling green militarization: the discursive (re)production of
militarized conservation in Virunga National Park, Democratic Republic of the Congo. Geoforum,
75, 274.285.
Massé, F., Lunstrum, E., & Holterman, D. (2018). Linking green militarization and critical military
studies. Critical Military Studies, 4(2), 201–221.
Massé, F., & Margulies, J.D. (2020). The geopolitical ecology of conservation: the emergence of
illegal wildlife trade as national security interest and the re-shaping of US foreign conservation
assistance. World Development, 132, 104958.
Mishra, C., Allen, P., McCarthy, T., Madhusudan, M. D., Bayarjargal, A., & Prins, H. H.T. (2003).
The role of incentive programs in conserving the snow leopard. Conservation Biology, 17(6), 1512–
1520.
Moreto, W. D., & Charlton, R. (2021). “Rangers can’t be with every Elephant”: Assessing Rangers’
Perceptions of a Community, Problem-Solving Policing Model for Protected Areas. Oryx: The
International Journal of Conservation, 55(1), 89–98
Moreto, W. D., & Pires, S. F. (2018). Wildlife crime: An environmental criminology and crime
science perspective. Durham, NC: Carolina Academic Press.
Moreto, W. D., & van Uhm, D. P. (2021). Nested Complex Crime: Assessing the Convergence of
Wildlife Trafficking, Organized Crime and Loose Criminal Networks. British Journal of
Criminology, 61(5), 1334–1353.
Naylor, R.T. (2004). The underworld of ivory. Crime, Law & Social Change, 42, 261–295.
Neumann, R.P. (2004). Moral and discursive geographies in the war for biodiversity in Africa.
Political Geography, 23(7), 813–837.
Nyhus, P.J. (2016). Human-wildlife conflict and coexistence. Annual Review of Environment and
Resources, 41, 143–171.
O’Grady, C. (2020, January 13). The price of protecting Rhinos. The Atlantic. Retrieved from:
https://www.theatlantic.com/science/archive/2020/01/war-rhino-poaching/604801/.
Ohmer, M. L., Meadowcroft, P., Freed, K., & Lewis, E. (2009). Community gardening and
community development: individual, social and community benefits of a community conservation
program. Journal of Community Practice, 17(4), 377–399.
Pawson, R., & Tilley, N. (1997). Realistic evaluation. Thousand Oaks, CA: SAGE Publications, Ltd.
Piza, E. (2018). The crime prevention effect of CCTV in public places: a propensity score analysis.
Journal of Crime and Justice, 41(1), 14–30.
Plumptre, A. J., Fuller, R. A., Rwetsiba, A., Wanyama, F., Kujirakwinja, D., Driciru, M., Nangendo,
G., Watson, J. E. M., & Possingham, H. P. (2014). Efficiently targeting resources to deter illegal
activities in protected areas. Journal of Applied Ecology, 51(3), 714–725.
Ramutsindela, M., Guyot, S., Boillat, S., Biraut, F., & Bottazzi, P. (2020). The geopolitics of
protected areas. Geopolitics, 25(1), 240–266.
Reed, G., Brunet, N. D., Longboat, S., & Natcher, D. C. (2020). Indigenous guardians as an emerging
approach to indigenous environmental governance. Conservation Biology, 35(1), 179–189.
Roman, J., & Kraska, J. (2016). Reboot Gitmo for U.S.-Cuba research diplomacy. Science,
351(6279), 1258–1260.
Rottman, J. (2014). Breaking down biocentrism: two distinct forms of moral concern for nature.
Frontiers in Psychology, 5: 905.
Samiti, R.S. (2017, August 9). CCTV installed along biological corridor in Chitwan. The Himalayan.
Retrieved January 14th, 2021 from: https://thehimalayantimes.com/nepal/cctv-installed-along-
biological-corridor-chitwan.
Sandbrook, C. (2015). The social implications of using drones for biodiversity conservation. Ambio,
44, 636–647.
Shepherd, C.R., & Magnus, N. (2004). Nowhere to hide: The trade in Sumatran tiger. TRAFFIC
Southeast Asia.
Siber, K. (2014, March 13). The one use of drones everyone can agree on, except for poachers. The
Smithsonian. Retrieved on: https://www.smithsonianmag.com/science-nature/one-use-drones-
everyone-can-agree-except-poachers-180950078/.
Snitch, T. (2015, January 27). Satellites, mathematics and drones take down poachers in Africa. The
Conversation. Retrieved from: https://theconversation.com/satellites-mathematics-and-drones-take-
down-poachers-in-africa-36638.
Van de Water, A., King, L. E., Arkajak, R., Arkajak, J., van Doormaal, N., Ceccarelli, V., Sluiter, L.,
Doornwaard, S. M., Praet, V., Owen, D., & Matteson, K. (2020). Beehive fences as a sustainable
local solution to human-elephant conflict in Thailand. Conservation Science and Practice. https://doi.
org/10.1111/csp2.260.
Verma, A., van der Wal, R., & Fischer, A. (2015). Microscope and spectacle: On the complexities of
using new visual technologies to communicate about wildlife conservation. Ambio, 44, 648–660.
Waylen, K. A., Fischer, A., McGowan, P. J. K., Thirgood, S. J., & Milner-Gulland, E. J. (2010).
Effect of local cultural context on the success of community-based conservation interventions.
Conservation Biology, 24(4), 1119-1129.
Welsh, B.C., & Farrington, D.P. (2009). Public area CCTV and crime prevention: An updated
systematic review and meta-analysis. Justice Quarterly, 26(4), 716–745.
White, R. (ed.) (2010). Global environmental harm: criminological perspectives. New York, NY:
Willan Publishing.
Woodroffe, R., Thirgood, S., & Rabinowitz, A. (eds.) (2005). People and wildlife: Conflict or
coexistence? New York, NY: Cambridge University Press.
Wrege, P.H., Rowland, E.D., Keen, S., & Shiu, Y. (2017). Acoustic monitoring for conservation in
tropical forests: Examples from forest elephants. Methods in Ecology and Evolution, 8, 1292–1301.
WWF. (2015, December 7). Tanzania deploys ‘eyes in the sky’ technology to combat poaching.
WWF. Retrieved from: https://wwf.panda.org/?257842/Tanzania-deploys-eyes-in-the-sky-technology-
to-combat-poaching.
Wyatt, T., van Uhm, D., & Nurse, A. (2020). Differentiating criminal networks in the illegal wildlife
trade: organized, corporate and disorganized crime. Trends in Organized Crime, 23, 350–366.
Wyler, L. S., & Sheikh, P. A. (2008). International illegal trade in wildlife: threat and U.S. policy.
CRS Report for Congress. Congressional Research Service.
Zimmerman, M. E. (2003). The black market for wildlife: combating transnational organized crime
in the illegal wildlife trade. Vanderbilt Journal of Transnational Law, 36.
Footnotes
1 Retrieved on January 14, 2021 from: https://www.iucn.org/theme/protected-areas/about.
Abstract
There has been little discussion or consideration to date of the carbon
footprint of crime and security, despite climate change impacts and much
needed carbon reduction pervading political agendas around the world. This
chapter addresses the gap by examining which burglary prevention
measures are both low carbon and effective in preventing burglary. You will
read about the Security Protection Factor and how a combination of
window locks (which are especially effective), door locks, and external and
indoor lighting is shown to be effective and low carbon, while burglar
alarms and CCTV perform less well. The findings can be used to inform
more sustainable choices for security and product design.
Introduction
Public concern for the environment is a topical issue; global climate
change, in particular, has been identified as one of the greatest challenges of
our time (United Nations 2016). Emissions of greenhouse gases,
predominantly carbon dioxide (CO2), resulting from human activities, have
reached the ‘highest levels in history’ producing widespread impacts on
human and natural systems (Pachauri et al. 2014). Climate change is
therefore a global and pressing issue and the Paris Agreement (UNFCC
2015), signed by nearly 200 counties, calls for global greenhouse gas
emissions to be reduced. There is therefore a clear need for governments,
businesses and individuals to consider their environmental impacts
wherever possible. Public concern for the environment is also at an all-time
high with visibility of this issue being raised by public figures of all ages
and across various platforms, from Sir David Attenborough’s “Planet
Earth” television series to Greta Thunberg’s Fridays for Future climate
strikes (FridaysForFuture 2020). In the UK, the commitment to reduce
emissions is enshrined in law through the Climate Change Act (Climate
Change Act 2008) and the UK Government has recently committed to net
zero emissions by 2050 (Gov.uk 2019). It is important therefore that climate
change permeates all policy areas, including crime prevention (Pease 2009).
The benefits of crime prevention are obvious in terms of reduced burden
on society and the economy. Preventing crime saves lives, improves
wellbeing and limits costs associated with property being lost, damaged or
wasted (HMIC 2014). Savings are also made in terms of time, work and
money expended on dealing with the consequences of crime. The launch of
the Modern Crime Prevention Strategy, and recently the Safer Streets Fund,
by the Home Office (UK Government department), for example, clearly
demonstrates that prevention is a key priority of UK Government policy
(Home Office 2016; College of Policing 2020).
Savings offered by crime prevention, however, may be more than just
financial. A study into the carbon cost of crime conducted by Pease (2009)
demonstrated that crime could have a substantial impact on the environment
in terms of a large carbon footprint and introduced the idea that ‘it would be
difficult to envisage a high crime society being a low carbon society’ (page
3). A follow-up study by Skudder et al. (2016) went further to produce a
detailed assessment of the carbon emitted from criminal activity each year
in England and Wales, which was estimated at around four million tonnes
CO2e (carbon dioxide equivalent) (Skudder et al. 2016). This begs the
question: Do crime prevention measures produce less carbon than the
crimes they prevent? If they do, then they potentially provide additional
benefits that have previously been overlooked.
In this chapter, we assess the carbon emissions associated with crime
prevention measures to enable comparisons with the carbon emissions of
the crimes they aim to prevent. We focus in particular on those measures
associated with preventing domestic burglary, as this has been shown to be
the offence with the largest overall contribution to the total carbon footprint
of crime, accounting for over 30% of emissions (Skudder et al. 2016).
Households in England and Wales rely on various security devices to
protect them from burglary, the most popular being locks on doors and
windows, security lighting, security chains and burglar alarms (ONS 2019).
Other forms of security such as CCTV systems are rare in private
households (Tseloni et al. 2014, Table 2) but may be increasing in
popularity. However, not all devices and their combinations can prevent
domestic burglary to the same extent (Tseloni et al. 2014).
We identify those security measures, both individually and used in
combination, that are the least (and most) carbon costly. We then compare
the carbon costs of each measure with an indicator of their effectiveness,
known as the Security Protection Factor (Tseloni et al. 2014). This allows
us to identify win-win measures in terms of security and environmental
performance, that is, measures that are effective at reducing the number of
offences that occur and have low emissions.
Background
Previous research suggests households with no security have higher
burglary rates than those with security (Mayhew et al. 1993; Budd 1999;
ONS 2013; Flatley et al. 2010). The growth of security measures in
households and the increasing emphasis on private security has been linked
to the drop in property offences (Aebi and Linde 2010; Clarke and Newman
2006; Van Dijk 2007; Vollaard and Van Ours 2011). The increased number
of security devices installed in homes and businesses has also been
proposed as the most likely explanation for the drop in crime since the mid-
1990s (Farrell et al. 2014).
Tseloni et al. (2014) explored the presence of security devices and
burglary risks in order to establish the effectiveness of each device type,
both individually and when used in combination with others. To this end,
the study employed population-based data from the Crime Survey for
England and Wales (CSEW) from 2008/2009 to 2011/2012 detailing the use
of security devices within homes, to produce a Security Protection Factor
(SPF) for each device and combination. The SPF compares the overall
burglary risk to the burglary risk of households without security and those
with particular security devices (either individual devices or combinations).
The burglary security measures examined included locks, security
chains, burglar alarms, indoor and external lights, window grilles or bars,
dummy alarms and CCTV systems. They found that external lights or door
locks offered the highest protection against burglary of households relying
on a single security device. One of the most effective combinations of
devices included window and door locks, indoor lights on timers and
external lighting (known as WIDE), which afforded 49 times more
protection against burglary than no security (Tseloni et al. 2014). Rather
surprisingly, however, alarms in properties without any other device slightly
increased burglary risk compared to no security. Furthermore, adding a
burglar alarm reduced the overall preventive effectiveness of most security
combinations. Tilley et al. (2015) highlighted that burglar alarms, although
having high plausibility to prevent burglary, are unlike door or window
locks as they do not create a physical obstacle to burglary (see also
Thompson et al. 2018). Also, alarms do not increase the risk to a potential
burglar approaching the target property, as would be the case with external
lights or CCTV. Alarms may indeed act as flags for criminals to target
properties or they may simply be installed but not used; or, if triggered, they
are ignored by neighbours, passers-by and the police, making them
ineffective (Tilley et al. 2015).
Increased security adds value in terms of social and economic benefits
as people avoid becoming victims (Clarke and Weisburd 1994). The
environmental benefits or pitfalls, however, of increased security have yet
to be explored in any great detail despite a clear relationship between crime
prevention and environmental considerations in the pursuit of sustainability.
Cozens (2007) recommended that researching areas of potential conflict
between ecological sustainability and designing out crime would aid urban
sustainable development efforts. Existing guidance relating to community
safety highlights that designing out crime should be central to the planning
and delivery of new developments, in order to ensure sustainable
communities, where crime and disorder do not undermine quality of life or
community cohesion (Home Office 2004).
In order to justify the use of crime prevention measures, it is important
that the benefits outweigh the costs involved. These can be economic, social
or environmental costs/benefits and each is important to consider as part of
decision making when assessing security requirements. The Home Office
use a national database to estimate the economic and social ‘cost of crime’,
and the first comprehensive estimates produced in 2011 presented the
monetised cost of domestic burglary (in a dwelling) to be £4000 (Home
Office & Ministry of Justice 2011). This monetised figure includes the
physical and emotional impact on victims, average value of property stolen
or damaged, the cost of police investigations, the cost of other criminal
justice system services such as courts, probation and prison services, and
the costs associated with anticipation of the offence including defensive
expenditure and insurance.
Skudder et al. (2016) added to this body of research by estimating an
intangible environmental cost of crime, in the form of a carbon footprint.
The carbon footprint attributed to an incident of domestic burglary was
estimated to be just over 1 tonne (1154 kg) CO2e, equivalent to around
2750 miles of driving an average passenger car (ibid.). This has been
replicated more recently to estimate the carbon footprint of crime in
Victoria, Australia (Baird and Burcher 2020). We use this carbon footprint
estimate of burglary from Skudder et al. (2016) as the baseline against
which the environmental impact of burglary prevention measures is
compared.
Methodology
In this section we establish the carbon footprint of several burglary
prevention measures and compare these to the footprint of an incidence of
burglary. The footprints are estimated using data from environmental
declarations scaled up to an average household footprint by multiplying by
the number of measures expected in a typical household. We estimate the
footprint of both individual measures and those used in combinations within
households. We also compare the environmental performance of the
measures with an indicator of their effectiveness, their SPFs, estimated by
Tseloni et al. (2014), to establish which measure, or combinations of
measures, were most preferable if effective and low-carbon burglary
prevention is required.
The devices studied included those in the Crime Prevention Module of
the CSEW: door double locks or deadlocks, window locks, external lights
on a timer or sensor, indoor lights on a timer or sensor, CCTV,1 burglar
alarms and security chains. Where no environmental information was found
relating to specific measures, it was not estimated. We have highlighted
these products in order to recommend that companies address these gaps.
Details of the steps carried out to estimate the carbon footprints of crime
prevention measures are described below.
Results
Product Footprints
Our search for environmental declarations relating to burglary prevention
measures yielded 45 declarations eligible for inclusion within the study.
Table 40.2 summarises these and their associated average carbon footprint
estimates. The crime prevention measure with the highest individual carbon
footprint is the burglar alarm control unit (352.3 kg CO2e), and the lowest is
door locks (3.1 kg CO2e). For full details of the declarations, see Appendix
Table A.3 in Skudder et al. (2017).
Figure 40.1 details the median, minimum, maximum and interquartile
ranges of carbon footprint estimates found within the environmental
declarations. Burglar alarm room sensors and CCTV show the largest range
of any of the measures. In contrast, window and door locks footprint
estimates are much more clustered around the median value.
Fig. 40.1 Highest, lowest, quartile range and average (median) carbon footprints of different
burglary prevention measures from environmental declarations (Skudder et al. 2017—Figure 2)
Discussion
The social and economic benefits of reducing crime are well understood but
the potential environmental benefits are yet to be developed fully (Pease
2009; Skudder et al. 2016). Actions taken to prevent crime should not be
exempt from the current global effort to reduce emissions. The aim of this
chapter was to estimate the carbon impact of burglary prevention measures
and identify those that are both low carbon and effective. By analysing
environmental declarations of commonly used burglary prevention
products, we have estimated the average carbon footprint of various
measures, including locks, security lighting, burglar alarms and CCTV
systems. The study by Skudder et al. (2017), on which this chapter is based,
is believed to be the first review of carbon footprint information related to
burglary prevention devices.
We have highlighted that in terms of environmental impact, burglary
prevention measures installed in households have relatively small carbon
footprints (between 12 and 400 kg CO2e) with no individual measure
exceeding the carbon footprint associated with an incidence of burglary
(1000 kg CO2e). All individual measures considered produce less than half
the emissions associated with a burglary, and in some cases combinations of
measures produced over 80 times fewer emissions than a single burglary,
showing potential carbon paybacks if burglaries can be avoided by
implementing these measures. Only two combinations of measures (one
with five measures and one with six) exceeded the footprint of a burglary.
Of course, the desirability of these measures is subject to their
effectiveness in preventing burglaries from occurring. We therefore plotted
the carbon payback ratio (footprint of burglary over the footprint of the
measure) alongside an effectiveness indicator (the Security Protection
Factor). When burglary prevention measures are used in isolation, window
locks, indoor lighting and door locks are found to be the most desirable as
they are highest on the environmental performance scale (with higher
carbon payback ratios) and highest on the effectiveness scale. When
combinations of measures were analysed, the most desirable combinations
included window locks, door locks, and indoor and external lighting
(WIDE). The least desirable combinations (lower environmental
performance and lower effectiveness) were those that include burglar
alarms.
Conclusion
This chapter helps inform crime prevention specialists of the environmental
impact of burglary prevention products and presents comparisons with the
carbon emissions of the crimes they aim to prevent. We have shown that
effective burglary prevention does not have a significant carbon footprint
when compared to the emissions associated with burglaries that can be
prevented. Window locks are found to be the most effective and low-carbon
measure available individually. Combinations of window locks, door locks,
and external and indoor lighting (WIDE) are also shown to be effective and
lower carbon. Burglar alarms and CCTV do not perform as strongly, with
higher carbon footprints and lower security against burglary.
We have also shown that crime prevention measures may be able to
offer more than monetary savings or reduced social impacts, as it is clear
that careful choice of burglary prevention measures can save carbon
emissions, whilst still ensuring a secure and safe home. It is encouraging
that the security industry as a whole is beginning to pay attention to
environmental impacts, as shown by the availability of environmental
declarations related to burglary prevention measures. In future there will be
a greater need to consider environmental impacts, and substantial emission
reductions are required, in particular, over the next few decades to reduce
climate risks in the future (IPCC 2014).
Our findings are of considerable benefit to security professionals by
highlighting that crime prevention measures have varying environmental
costs, and that it is not necessarily the most successful security measures
that are most carbon costly. In fact, the opposite is true, with many of the
most successful security devices having a comparatively small carbon
footprint, enabling security professionals to make win-win choices. This
information could also be incorporated into future house building and
renovation guidelines. There is already a need to consider the
environmental impact of housing, but connecting this to crime
prevention/security represents an additional benefit. For example, the
opportunity to install security measures (better locks) could be combined
with installation of energy-saving or other environmentally friendly
initiatives (double glazing).
The results presented in this chapter also raise awareness of
sustainability issues as part of security choices and offer an important
contribution towards a growing connection between security and
sustainability agendas. Cozens (2007), for example, highlighted an explicit
need to integrate crime issues within sustainability frameworks. Also,
Armitage and Gamman (2009) highlighted the importance of ensuring that
any steps forward for the green agenda, such as minimising carbon
emissions, do not present a step back for the crime agenda (and vice versa).
We have shown that sustainability considerations can be considered
alongside security choices and that win-win measures (in terms of security
and low carbon) can be chosen to minimise impacts whilst not
compromising safety.
As both security and sustainability considerations are often neglected in
the face of economic pressures (with the exception of national
security/national infrastructure concerns), awareness of these issues
amongst sustainability and security professionals is essential to avoid long-
lasting damage to the environment and risks to community safety.
We understand that security choices around the home are made in
various ways and it is unlikely that the carbon footprint of these products
will be a deciding factor alone. But if it is possible to secure homes against
burglary while minimising the environmental impact, then low-carbon
measures may be more favourable to householders concerned about the
environment. In this chapter we have highlighted that win-win solutions are
available for low-carbon, highly effective security measures, and we hope
that this will inform choices made by security specialists, now and in the
future.
Recommended Reading
Although research detailing the carbon costs of crime or crime prevention is
rare, there are several associated readings recommended to those interested
in this novel research area. The founding study which was first to attempt to
estimate the carbon cost of crime by Pease (2009) is a must read. This is
followed by three published papers by the carbon cost of crime research
team led by Skudder (2016) and Skudder et al. (2017), which firstly
estimate the carbon footprint of crime, then assess the carbon impact of the
crime drop, and finally compare the carbon footprint of crime prevention
measures to identify low carbon and effective methods of crime control.
The most recent estimates of the economic and social cost of crime by the
Home Office (UK Government Department) have been expanded to
consider the carbon impacts (Heeks et al. 2018, Annex 3), which provides
an insight into how policy makers and those assessing impacts of crime
prevention may take this into account in future.
References
Aebi, M.F. and Linde, A. (2010) ‘Is there a crime drop in Western Europe?’, European Journal on
Criminal Policy and Research, 16(4), pp. 251–277.
[Crossref]
Armitage, R. and Gamman, L. (2009) Sustainability via Security: a new look. Built Environment
35(3): 294.
Baird, A. and Burcher, M. (2020) The carbon footprint of crime in Victoria. Crime Law Soc Change.
https://doi.org/10.1007/s10611-020-09908-z.
BSI (2010) BS EN ISO 14025: 2010: Environmental labels and declarations – Type III
environmental declarations – Principles and procedures. UK: British Standards Institution.
Budd, T. (1999) ‘Burglary of Domestic Dwellings: Findings from the British Crime Survey’, Home
Office Statistical Bulletin Issue 4/99. London: Home Office.
Chen, T.Y., Burnett, J. and Chau, C.K. (2001) ‘Analysis of embodied energy use in the residential
building of Hong Kong’, Energy, 26(4), pp. 323–340. https://doi.org/10.1016/S0360-5442(01)00006-
8.
[Crossref]
Clarke, R.V. and Weisburd, D. (1994) ‘Diffusion of crime control benefits: Observations on the
reverse of displacement’, Crime Prevention Studies, 2, pp. 165–184.
Clarke, R.V.G. and Newman, G.R. (2006) Outsmarting the terrorists. Greenwood Publishing Group.
College of Policing (2020) Safer Streets Fund – Crime Prevention Toolkit. College of Policing,
Home Office and PCPI. https://whatworks.college.police.uk/Research/Documents/Safer_Streets_
toolkit.pdf (Accessed September 2020).
Cozens, P. (2007) ‘Planning, crime and urban sustainability’, WIT Transactions on Ecology and the
Environment, 102.
Farrell, G., Tilley, N. and Tseloni, A. (2014) ‘Why the crime drop?’, Crime and Justice, 43(1), pp.
421–490.
[Crossref]
Farrell, G., Tseloni, A. and Tilley, N. (2011) ‘The effectiveness of vehicle security devices and their
role in the crime drop’, Criminology and Criminal Justice, 11(1), pp. 21–35.
[Crossref]
Flatley, J., Kershaw, C., Smith, K., Chaplin, R. and Moon, D. (2010) ‘Crime in England and Wales
2009/10: Findings from the British Crime Survey and Police Recorded Crime’, London: Home
Office.
Heeks, M., Reed, S., Tafsiri, M. and Prince, S. (2018) The economic and social costs of crime.
Second edition. Home Office Research Report 99. July 2018. Available at https://assets.publishing.
service.gov.uk/government/uploads/system/uploads/attachment_data/file/732110/the-economic-and-
social-costs-of-crime-horr99.pdf (Accessed September 2020).
Hellweg, S. and Canals, L.M.I. (2014) ‘Emerging approaches, challenges and opportunities in life
cycle assessment’, Science (New York, N.Y.), 344(6188), pp. 1109–1113. https://doi.org/10.1126/
science.1248361.
HMIC (2014) State of Policing: The Annual Assessment of Policing in England and Wales 2012/13.
Home Office & Ministry of Justice (2011) Integrated Offender Management: Efficiency Toolkit:
Phase two: Conducting break-even analysis of Integrated Offender Management. https://www.gov.
uk/government/uploads/system/uploads/attachment_data/file/118039/IOM-Toolkit-Phase-2.pdf
(Accessed 10 September).
Home Office (2004) Safer Places: the planning system and crime prevention. https://www.gov.uk/
government/publications/safer-places-the-planning-system-and-crime-prevention (Accessed March
2016).
Hunter, J. and Tseloni, A. (2016) ‘Equity, justice and the crime drop: the case of burglary in England
and Wales’, Crime Science, 5(1), p. 1.
[Crossref]
Mayhew, P., Aye Maung, N. and Mirrlees-Black, C. (1993) The 1992 British Crime Survey. Home
Office Research Study No. 132. London: HMSO.
Office for National Statistics (ONS) (2013) Chapter 3 – Burglary and Home Security. http://
webarchive.nationalarchives.gov.uk/20160105160709/http://www.ons.gov.uk/ons/dcp171776_
340685.pdf (Accessed November 2016).
Office for National Statistics (ONS) (2019) Nature of crime: Burglary. https://www.ons.gov.uk/
peoplepopulationandcommunity/crimeandjustice/datasets/natureofcrimeburglary (Accessed
September 2020).
Pachauri, R.K., Allen, M.R., Barros, V., Broome, J., Cramer, W., Christ, R., Church, J., Clarke, L.,
Dahe, Q. and Dasgupta, P. (2014) Climate change 2014: synthesis Report. Contribution of working
groups I, II and III to the fifth assessment report of the intergovernmental panel on climate change.
IPCC.
Pease, K. (2009) ‘The carbon cost of crime and its implications’, London: ACPO Secured by Design.
RICS (2012) Methodology to calculate embodied carbon of materials, RICS, information Paper,
RICS QS & construction Standards, IP32/2012. http://www.rics.org/Documents/Methodology_
embodied_carbon_final.pdf (Accessed March 2016).
Skudder, H., Druckman, A., Cole, J., McInnes, A., Brunton-Smith, I. and Ansaloni, G. (2016)
‘Addressing the carbon-crime blind spot: A carbon footprint approach’, Journal of Industrial
Ecology. https://doi.org/10.1111/jiec.12457.
Skudder, H., Brunton-Smith, I., Tseloni, A., McInnes, A., Cole, J., Thompson, R. and Druckman, A.
(2017) Can burglary prevention be low-carbon and effective? Investigating the environmental
performance of burglary prevention measures. Security Journal. https://doi.org/10.1057/s41284-017-
0091-4.
Thompson, R., Tseloni, A., Tilley, N., Farrell, G. and Pease, K. (2018) Which security devices reduce
burglary? In Tseloni, A., Thompson, R. and Tilley, N. (Eds.) Reducing Burglary, pp. 77–105.
Springer. ISBN: 978-3-319-99941-8.
Tilley, N., Thompson, R., Farrell, G., Grove, L. and Tseloni, A. (2015) ‘Do burglar alarms increase
burglary risk? A counter-intuitive finding and possible explanations’, Crime Prevention &
Community Safety, 17(1), pp. 1–19.
Tseloni, A. and Thompson, R. (2018) Household- and area-level differences in burglary risk and
security availability over time. In Tseloni, A., Thompson, R. and Tilley, N. (Eds.) Reducing Burglary,
pp. 107–164. Springer. ISBN: 978-3-319-99941-8.
Tseloni, A., Thompson, R., Grove, L., Tilley, N. and Farrell, G. (2014) ‘The effectiveness of burglary
security devices’, Security Journal. https://doi.org/10.1057/sj.2014.30.
UNFCC (2015) Adoption of the Paris Agreement. United Nations Framework Convention on
Climate Change. https://unfccc.int/resource/docs/2015/cop21/eng/l09r01.pdf (Accessed August
2016).
United Nations (2016) The Global Goals for Sustainable Development. http://www.globalgoals.org/
(Accessed July 2016).
Van Dijk, J. (2007) The world of crime: Breaking the silence on problems of security, justice and
development across the world. Sage Publications.
Vollaard, B. and Van Ours, J.C. (2011) ‘Does Regulation of Built-in Security Reduce Crime?
Evidence from a Natural Experiment’, The Economic Journal, 121(552), pp. 485–504.
[Crossref]
Wittebrood, K. and Nieuwbeerta, P. (2000) ‘Criminal victimization during one’s life course: The
effects of previous victimization and patterns of routine activities’, Journal of Research in Crime and
Delinquency, 37(1), pp. 91–122.
[Crossref]
Footnotes
1 CCTV cameras are currently not examined but were included in the 2008/09 to 2011/12 CSEW,
the most recent datasets this chapter analyses.
2 ONS has updated SPFs based on 2012/2013 to 2018/2019 CSEW data. Their findings are broadly
similar to those previously found, that is, the ‘best’ combination is WIDE whilst burglar alarms
protect from burglary less than no security and when added to most combinations reduce their overall
preventative effect (email correspondence between ONS and Andromachi Tseloni, September 2020).
Part VII
The Impact of Security
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_41
Graham Farrell
Email: [email protected]
Introduction
If it bleeds it leads. Crime increases make good news stories, but crime
declines do not. The prolonged and unexpected crime drop in most high-
income countries from the 1990s has been slow to penetrate public
consciousness. Even now, any sign of a new or rising crime type is far more
likely to receive media attention.
The media emphasis is reflected in other vested interests. Crime rises
are good for the police who request more resources, for the security
industry as consumers invest more, for opposition politicians who exploit
them for political gain, and for researchers because they make cases for
funding easier to mount. In comparison, few have an interest in global
crime drops. Moreover, emphasising falls in crime risks accusations of
complacency and indifference to the harm suffered by victims.
What we are left with is a relatively small crime drop literature, much of
it poor, and some involving crime-drop denial on the tenuous grounds that
there are some places and crimes where crime has not fallen. This is
disappointing: citizens have a strong interest in being and feeling safe. It is
for this reason that we have devoted over a decade to scrutinising the
various proposed explanations, devising and testing our own, and distilling
the lessons for crime prevention. Moreover, our explanations do not involve
any denial that there have also been some rises: the explanation we use
predicts some crime increases amidst the crime falls.
Our conclusion is that security measures have played the pivotal role in
producing widespread drops in crime and criminality in recent decades. In
this chapter we do not explain our reasons for rejecting other explanations.
Interested readers can find these in other papers (Farrell 2013; Farrell et al.
2014). Instead, we focus on what our research has found about the role of
security measures and suites of security measures in producing steep drops
in domestic burglary and vehicle theft that dominated crime figures in the
early 1990s in most Western countries. The findings are robust. We go on to
describe what these drops meant in terms of criminality. We show how the
evidence suggests that a by-product of the reduction in high-volume crimes
has been a reduction in entries into criminal careers. Next, we move to
policy implications. First, we consider the qualities that good security
should have. In response to critics who highlight possible negative aspects
of some security measures, we describe the desirable attributes of good
security: these include crime prevention efficacy alongside other quality-of-
life aspects. Second, we consider how good security comes to be adopted
and what policy measures could encourage it. But before we come to these
issues we begin by providing some evidence of the international nature of
the crime drop.
Good Security
Security itself has been the target of widespread and sustained criticism
(e.g. Zedner 2003; Neocleous 2007). Charges include that it is divisive (e.g.
gated neighbourhoods); that it is ugly (e.g. shutters and bars to windows);
that it creates disabling fear of crime (e.g. by tacitly reminding people they
are at risk); that it fails to address root causes of crime (e.g. ignoring the
need to address inadequate life chances); and that it is inequitable (e.g.
being affordable only by the relatively rich against whom potential offences
are displaced to the relatively poor).
Although we think these critiques are overstated, we also think that it is
important to acknowledge that security measures are not unequivocally
good. Effectiveness is not the only measure of desirability. The old adage
about the ends not justifying the means holds good for security measures.
Critics of security have a point in reminding us that this is the case.
However, any notion that security is always unequivocally a bad thing is,
we think, absurd. In an effort to discriminate ‘good’ from ‘bad’ security and
also to help inform those designing, developing, and implementing security
measures, we have tried to delineate desirable attributes of security. These
include efficacy as one, but only one component (Tilley et al. 2015b, Farrell
and Tilley 2017, 2020).
We refer to security that passes muster as ‘elegant’, and we use the
acronym ‘DAPPER’ to capture the generic attributes that security must
have to be considered elegant. DAPPER refers to:
Default: the default condition produced by the device, design, or practice
is secure rather than insecure.
Aesthetic: the security device, design, or practice is aesthetically neutral
or pleasing.
Powerful: the security device, design, or practice operates through one or
more powerful preventive mechanisms.
Principled: the security device, design, or practice is principled in ethical
terms; for example, it increases rather than reduces freedom and
increases rather than decreases equity.
Effortless: for the end user or beneficiary the security device, design, or
practice is effortless, taking little or no time and effort to engage.
Rewarding: the security device, design, or practice is rewarding in cost-
benefit terms.
The practical meaning of the DAPPER criteria becomes clear with an
example. For instance, take security measures now fitted to almost all new
passenger cars:
They are activated by default when the driver leaves the vehicle.
Moreover, door locks are activated by default as the car is driven off.
The main security measures (central locking, electronic immobiliser, fuel
cap operated from inside the vehicle, distributed audio system, alarm,
etc.) do not impinge on the appearance of the vehicle—they are thus
aesthetically neutral.
The security measures activate well-established crime prevention
mechanisms (e.g. alarms increase the perceived risk, and electronic
immobilisers increase the difficulty for would-be car thieves).
The security measures are principled in that they reduce the need for
drivers to remember to activate devices and allow them to pop into shops
(e.g.) without having to worry about or spend time making sure that the
vehicle is secure. Also, although often first built into more expensive
makes and models (and in that way possibly rendering less expensive,
less well-protected models more at risk), the security innovations quickly
spread across all makes and models.
Most modern car security measures are effortless. No effort or time is
needed to engage them in comparison to, for example, mechanical
immobilisers (‘crook-locks’ and similar) that had to be applied manually,
or removable radio-cassettes that had to be pulled out and carried around,
or doors that needed to be locked individually, or aerials that had to be
depressed when leaving a car and raised on re-entering if the radio was to
be used.
Finally, the suite of security measures that has come to be built into cars
during manufacture are less expensive than if retrofitted, and they have
proven enormously effective in saving the direct and indirect costs of
high rates of vehicle theft.
In terms of elegance, the security measures that are now taken for
granted in cars are exemplary. They are also aspirational in that, in other
areas, critics may have good points to make about the shortcomings of
security measures: household security alarms, for example, can be
ineffective, create noise pollution, have to be set manually, and are often not
cost-effective. There may sometimes need to be trade-offs between the
different aspects of elegance, at least in the short term. However, in the
longer term, architects of security devices, designs, and policies should, we
think, aim towards increasing elegance in their products. This is especially
important as security measures are developed to address emergent crime
problems, springing from opportunities inadvertently created by new social
and technological developments, such as the Internet, online shopping, and
online banking. Since cyber-security is typically software based, there are
signs that it has great potential to be seamlessly integrated at minimal cost
to users: we have progressed from manual to auto-updates for many
software defences, and, increasingly, to secure transactions as the elegant
default.
Recommended Readings
The most comprehensive account of the international crime drop and the
role of security in producing it is Farrell et al. (2014).
Wide-ranging collections of papers on the international crime drop and
attempted explanations for them include van Dijk, J, Tseloni, A. and Farrell,
G. (2012) The International Crime Drop. Basingstoke: Palgrave, and Tonry,
M. (2014) Why Crime Rates Fall and Why They Don’t, Crime and Justice
Volume 43. Chicago: Chicago University Press.
A summary of critiques of security, a response to those critiques, and an
account of elegant security can be found in Farrell and Tilley (2020).
A summary of critiques of situational crime prevention measures
(including security) and a response to them can be found in Clarke R.V. and
Bowers K. (2017). Seven Misconceptions of Situational Crime Prevention,
in N. Tilley and A. Sidebottom (eds) Handbook of Crime Prevention and
Community Safety, Second edition, London: Routledge.
Bibliography
Ayres, I. and Braithwaite, J. (1992) Responsive regulation: Transcending the deregulation debate.
Oxford: Oxford University Press.
Bemelmans-Videc, M.L., Rist, R.C. and Vedung, E.O. eds., 2011. Carrots, sticks, and sermons:
Policy instruments and their evaluation (Vol. 1). Transaction Publishers.
Blumstein, A. and Wallman, J. (2006) The Crime Drop in America. Revised Edition. Cambridge:
Cambridge University Press.
Clarke, R., and Newman, G. (2006) Outsmarting the Terrorists. Westport, CT: Praeger.
Dixon, A. and G. Farrell. (2020). Age-period-cohort effects for half a century of motor vehicle theft
in the United States, Crime Science, 9(11); 1-17.
Farrell, G. (2013) Five tests for a theory of the crime drop. Crime Science, 2(1), p.5.
Farrell, G., Laycock, G. and Tilley, N. (2015) Debuts and legacies: the crime drop and the role of
adolescent-limited and persistent offending. Crime Science 4:16. DOI https://doi.org/10.1186/
s40163-015-0028-3.
[Crossref]
Farrell, G. and Tilley, N. (2017) ‘Technology for crime prevention: a supply side analysis.’ In B.
Leclerc and E. Savona (eds) Crime Prevention. Springer.
Farrell, G. and Tilley, N. (2020) ‘Elegant Security: Concept, evidence and implications.’ European
Journal of Criminology. https://journals.sagepub.com/doi/full/10.1177/1477370820932107.
Farrell, G, Tilley, N. and Tseloni, A. (2014) ‘Why the Crime Drop?’ Crime and Justice 43: 421–490.
[Crossref]
Farrell, G., Tilley, N., Tseloni, A. and Mailley, J. (2010) Explaining and Sustaining the Crime Fall in
Industrialised Countries, Crime Prevention and Community Safety12: 24–41.
Farrell, G., A. Tseloni and N. Chenevoy. (2018). ‘Did violence fall after property crime?’ in G.
Farrell and A. Sidebottom (Eds). (2018). Realistic Evaluation for Crime Science: Essays in Honour
of Nick Tilley. London: Taylor and Francis. (pp. 141–155).
Farrell, G., Tseloni, A., Mailley, J. and Tilley, N. (2011a) The Crime Drop and the Security
Hypothesis, Journal of Research in Crime and Delinquency 48(2): 147–175
[Crossref]
Farrell, G., Tseloni, A. and Tilley, N. (2011b) The Effectiveness of Vehicle Security Devices and
their Role in the Crime Drop, Criminology and Criminal Justice 11(1): 21–35
[Crossref]
Goold, B., Loader, I. and Thumala, A. (2010) Consuming security? Tools for a sociology of security
consumption. Theoretical criminology, 14(1), pp.3–30.
Hazelbaker, K. (1997) Insurance industry analyses and the prevention of motor vehicle theft. In
Business and crime prevention, eds. Marcus Felson and Ronald Clarke, 283–93. Monsey, NY:
Criminal Justice Press.
Houghton, G., 1992. Car theft in England and Wales: The Home Office car theft index (p. 43).
London: Home Office.
Laycock, G., 2004. The UK car theft index: An example of government leverage. Understanding and
preventing car theft, 17, pp.25–44.
Pawson, R. (2002) Evidence and policy and naming and shaming. Policy studies, 23(3), pp.211–230.
Puzzanchera, C. (2020) Juvenile Arrests 2018. Laurel MD: Juvenile Justice Statistics, National
Report Series Bulletin US Department of Justice Office of Justice Programs.
Shearing, C. and Stenning, P. (1992) ‘From the panopticon to Disney World: The development of
discipline.’ In Situational crime prevention: Successful case studies, ed. Ronald Clarke, 249–55. New
York, NY: Harrow and Heston.
Svensson, R., 2002. Strategic offences in the criminal career context. British Journal of Criminology,
42(2), pp.395–411.
Tilley, N. (2018) ‘Privatising crime control.’ Annals of the American Academy of Political and Social
Science. 679 (1), 55–71.
[Crossref]
Tilley, N., Farrell, G. and Clarke, R. (2015b) ‘Security Quality and The Crime Drop.’ In M.
Andresen and G. Farrell (eds.) The Criminal Act. London. Routledge.
Tilley, N., Farrell, G., Grove, L., Thompson, R. and Tseloni, A. (2015a) Do burglar alarms increase
burglary risk? A counterintuitive finding and possible explanations. Crime Prevention and
Community Safety 17(1): 1–19.
Tseloni, A., Farrell, G., Thompson, Evans, and Tilley, N. (2017) ‘Domestic burglary drop and the
security hypothesis.’ Crime Science 6:3.
[Crossref]
Tseloni, A, Mailley, J., Farrell, G. and Tilley, N. (2010) The cross-national crime and repeat
victimization trend for main crime categories: Multilevel modeling of the International Crime
Victims Survey. European Journal of Criminology 7(5): 375–394
[Crossref]
Tseloni, M. Thompson, R., Grove, L., Tilley, N. and Farrell, G. (2015) The Effectiveness of Burglary
Security Devices. Security Journal. doi: https://doi.org/10.1057/sj.2014.30.
Tseloni, A., Thompson, R. and Tilley, N. (2018) Reducing Burglary. Switzerland: Springer
[Crossref]
van Dijk, J. 2006. ‘What Goes Up, Comes Down: Explaining the Falling Crime Rates.’ Criminology
in Europe – Newsletter of the European Society of Criminology 5(3):3,17–18.
van Dijk, J., Manchin, R., van Kesteren, J., Nevala, S. and Hideg, G. (2007) ‘The Burden of Crime in
the EU.’ In Research Report: A Comparative Analysis of the European Survey of Crime and Safety.
EU ICS, 2005. Brussels: Gallup Europe.
Zedner, L. (2003). Too much security? International Journal of the Sociology of Law 31: 155–184.
[Crossref]
Footnotes
1 https://www.thatcham.org/what-we-do/security/, accessed June 28, 2020.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_42
Rachel Armitage
Email: [email protected]
Abstract
Crime Prevention Through Environmental Design (CPTED) is an approach
to crime reduction that involves the design, build and future management of
places and spaces according to five key principles: surveillance, defensible
space, physical security, movement control, and management and
maintenance. Grounded in the Opportunity Theories of crime, CPTED
focuses upon reducing opportunities for offenders—largely, increasing
perceived risk and reducing likely rewards. Focusing upon the application
of CPTED to residential housing within the UK, and its merit as a burglary
reduction measure, this chapter presents an overview of the principles of
CPTED alongside associated evidence of effectiveness and an overview of
the implementation of CPTED within planning and policing policy and
practice, including the UK’s Secured by Design (SBD) award scheme. The
chapter presents the results of a recent systematic review of nine studies,
concluding that the available evidence on the effectiveness of SBD shows a
statistically significant overall burglary reduction effect, equating to 53%
fewer burglaries than the non-SBD control group. The chapter concludes
with a suggested re-orientation of CPTED and its focus. Presenting findings
from a study of 22 incarcerated burglars, the research suggests that there
may be merit in re-orienting CPTED’s focus to incorporate ‘designing in’
pro-social attachments to place, as opposed to limiting attention on the
principle of ‘simply designing out’ illegal behaviour.
Burglary Risk
Residential burglary whilst in decline (Farrell 2021) is a crime that imposes
multiple negative effects on individuals, communities and statutory and
voluntary agencies. Those experiencing burglary are affected emotionally,
physically and financially (Brown and Harris 1989; Shaw and Chenery
2007; Heeks et al. 2018; Cohen 2000); communities with high levels of
burglary see a flight from crime (where people can), as well as reductions in
community cohesion and confidence (Rogerson and Pease 2019); and
response agencies (police, forensics, doctors, legal to name a few) see
resources overwhelmed by demand (Laufs et al. 2020).
Whilst difficult to give an accurate reflection of burglary risk, following
a year of significant changes to mobility within properties and wider
communities (England saw three lockdowns—March 2020, November
2020 and January 2021), there is clear evidence that, changes specific to
Covid-19 aside, burglary has declined significantly in England and
elsewhere (see Farrell 2021 for a review of the crime drop). Burglary
figures for the year ending March 2020 confirm what we know regarding
burglary risk for household and neighbourhood characteristics: risk is not
uniform, and, essentially, those in the younger age categories, ethnic
minorities, single parents, those living in the 20% most deprived
neighbourhoods and those renting their property are at a greater level of
risk. These factors are largely out of our control. Other than flagging risk
and directing resources, there is little we can do with this information. Yet
there are features of properties and neighbourhoods that can be controlled
(albeit not all within the residents’ power to influence) and that will
positively affect our burglary risk, including the level and nature of security
(ONS, September 2020), the design and layout of the street (Johnson and
Bowers 2010; Armitage 2018b) and the network of connections within the
surrounding area (Birks and Davies 2017; Gerell 2021).
Security Measures
Improving the physical security of residential properties reduces burglary
risk, but what may appear obvious hides a little more nuance specific to the
level and combinations of security devices, and nowhere is this more
clearly demonstrated than in the series of publications analysing the CSEW
led by Tseloni et al. (2014, 2017a, 2017b) that demonstrate the differential
impact on burglary of combinations of household security devices. The
‘nuance’ relates to specific crime prevention devices (most notably burglar
alarms) not acting as protective factors in preventing burglary, as well as
refuting any belief that ‘the more [security devices] the merrier’—
protection does not consistently increase with the number of devices that
make up each combination. This is confirmed in the CSEW data for the
year ending March 2020 that whilst ‘no, or less than basic’ security results
in the highest risk of burglary (4.3), properties with ‘at least basic’ security
(0.6) experienced a lower level of risk than those with ‘enhanced security’
(1.3). Analysing CSEW burglary data between April 2007 and March 2012,
Tseloni et al. (2017a) established that particular security device
combinations resulted in significant protection against burglary. CWSD—
CCTV, window and door locks and security chains resulting in 52 times
more protection than no security, and WIDE (indoor and outdoor lights and
locks on windows and doors) giving 49 times more protection.
On a broader level Vollaard and Ours (2011) report the findings of an
extensive assessment of the changes in building security standards (to
include security) in the Netherlands. Similar to England and Scotland, albeit
much earlier, building regulations were enhanced in 1999 to include the
requirement for all windows and doors (on new build properties) to be
made from material certified and approved by the European ENV
1627:1994 Class 2 standard, or the Dutch NEN 5096, Class 2 standard.
Using data from four waves of the annual National Victimisation Survey,
the results revealed that the regulatory change resulted in a reduction in
burglary (within the sample) from 1.1 to 0.8% annually—a reduction of
26%. The evaluation also revealed that this reduction had not resulted in a
displacement of crime to other acquisitive crime offences.
On a more micro level, when interviewing incarcerated prolific
burglars, Armitage (2017) found that, when describing the features of
housing design that deter them from offending, they named physical
security as the second most important factor (after surveillance). The
concept of physical security was referred to by each of the 22 burglars an
average of five times, in total 103 occasions across the sample.
The focus of this chapter is the crime reduction intervention Crime
Prevention Through Environmental Design (CPTED), which whilst
including the principle of physical security (doors, windows, locks, fences
etc.) also includes the broader principles of the design and layout of a
property and the street on which it is located (we refer to this here as design
and layout), and the wider network of street connections that make up the
development on which the property is located. This chapter does not seek to
consider the historical development of CPTED, nor its limitations (for a
summary see Armitage 2018a). The focus will be upon implementation
within policy and practice, evidence of effectiveness and consideration for
broadening of scope.
CPTED has been defined in broadly similar terms by Crowe (2000),
Ekblom (2011) and Armitage (2013). Each refers to the design and
manipulation of the built environment, to the desire to reduce crime and the
fear of crime and to enhance quality of life through the reduction of
opportunities for crime.
Street Networks
CPTED asserts that the network of streets upon which a property is located
will also influence the likelihood of burglary risk—the principle of reducing
connectivity, also referred to as permeability or through movement, applies.
This is perhaps the most contentious of the CPTED principles, in that much
planning policy (see below) that supports the notion of designing out crime
also promotes increasing through movement—as a means of increasing
walkability and reducing the impact of motor vehicles on street frontages.
The notion of reducing the ‘risk’ of poorly designed pathways/walkways as
opposed to aiming for an enclosed development has progressed
significantly over the past decade, and what was once presented as a
polarised debate—cul-de-sac versus through roads—is now largely
understood as a much more nuanced issue.
Research examining the links between connectivity and burglary risk
has almost exclusively confirmed that the presence of more street
connections is associated with enhanced burglary risk (van Der Voordt and
Van Wegen 1990; Wiles and Costello 2000; Armitage 2006; Armitage et al.
2010; Johnson and Bowers 2010; Johnson and Bowers 2014; Davies and
Johnson 2014; Birks and Davies 2017). Armitage et al. (2010) found that,
compared to a ‘true’ cul-de-sac (with no connecting footpaths), through
roads experienced 93% more crime, and ‘leaky’ culs-de-sac (with
connections) experienced 110% more crime. That leaky culs-de-sac are the
most vulnerable street network is confirmed by Hillier (2004) and Armitage
(2006). Johnson and Bowers’ (2010) research also supported the idea that
the cul-de-sac is the safest street layout and went further to distinguish
between sinuous and linear layouts, with sinuous presenting the lowest
burglary risk. The concept of through movement and the presence of/flows
of people within an area produce two possible crime prevention outcomes.
The presence of more people creates more potential offenders/targets, thus
increasing the crime risk; and the presence of more people creates more
potential capable guardians, thus reducing crime risk (Gerell 2021). In
reality, equating levels of permeability within a housing development, with
other hot spot locations (say busy transport hubs), is not helpful.
Connections may provide the means, and encouragement for pedestrian
movement, but the flow is unlikely to be enough to produce what Jacobs
(1961) referred to as eyes on the street, or the guardianship that may
enhance perceptions of risk for offenders. What it generally produces is
more an opportunity to access, move through and egress an area and a
legitimate reason to be in a given place that allows inconspicuous ‘rooting’.
As Armitage’s (2017) research with incarcerated burglars revealed, the
footpath provides just this opportunity:
I would first walk up and down the footpath and have a look at what
I could see in the houses. The houses are on a public footpath, no
one would give me a second glance if I walked up and down. Even if
a tramp walked up and down they wouldn’t look out of place. It’s a
footpath, no-one can question you. (Participant Six)
2.
Relate to the built environment (buildings, parks, estates).
3.
Be published after the SBD scheme was initiated in 1989.
4.
Use a control area that permitted calculation of an appropriate effect
size.
5.
Take place in Britain.
6.
Be available in English.
Nine studies were deemed eligible for quantitative synthesis using these
criteria. In Table 42.1 the results relating to these nine studies from
Armitage et al. (in production) are reproduced in odds ratios. Seven of these
studies were grey literature, which suggests that evaluations of SBD
interventions are not routinely published in academic outlets, a critique of
CPTED more generally raised by Armitage and Ekblom (2019), who make
a strong call to action in improving the precision, sophistication and
credibility of the subject, and enhancing its connections with Crime Science
more generally. Six of the studies referred to new build developments, with
two studies examining the effect of houses retrofitted to adhere to SBD
standards, and the final examining both. A range of units of analyses were
used, from estates to unitary authority areas, which highlights the
heterogeneity across the studies. Just under half of the studies (n = 4) were
small-scale interventions, with fewer than 1000 houses in the treatment
group.
Table 42.1 Odds ratios of effects from primary studies eligible for meta-analysis reproduced from
Armitage et al. (in production)
The effect sizes taken from these nine studies all use police-recorded
burglary data, and the outcomes were measured post-intervention for a
treatment and a control group. Data representing the most reliable control
group (when more than one was reported) are used in these calculations. In
Table 42.1, values below 1 indicate a burglary reduction effect in the
treatment group, values above 1 indicate a burglary increase effect, and
values that straddle 1 indicate no conclusive statistical relationship. We see
from Table 42.1 that only three of the eligible studies (Armitage 2004;
Brown 1999; Ward 2017) show a statistically significant burglary reduction
effect at the individual study level.
As mentioned above, many of these studies have small samples of
houses in both the treatment and control groups. From a statistical
perspective these studies can be considered to be underpowered. Meta-
analysis is an aggregative technique which essentially pools all of these
effect sizes, and by increasing the sample size, it increases the statistical
power to detect an effect, if one indeed exists. After the data from each
study was converted into odds ratios and associated confidence intervals,
meta-analysis was completed in accordance with good practice standards
(e.g., taking the natural logarithm of the odds ratios, using inverse
weighting, assessing for heterogeneity, using random effect models).
The meta-analytic results of pooling the effects from the above nine
studies produced an effect size of 0.47 (95% confidence interval: 0.23–
0.95). This means that taken together, the available evidence on SBD shows
a statistically significant overall burglary reduction effect, equating to 53%
fewer burglaries than the non-SBD control group.
These results are positive and bring together a small number of
methodologically sound evaluations of this crime reduction intervention. In
the interests of transparency, and because of the importance of scrutinising
all outcomes, it is worth taking some time to consider the different impacts
of what should be a relatively consistent standard. The presentation of
negative evaluation results, particularly in an area where the evaluator is
viewed as what Matassa and Newburn (2003) refer to as a Product
Champion, is often viewed with a cynical, hostile and largely defensive
response. Unfounded conclusions are made—usually as a defensive
response: ‘It must be the DOCO’s fault’, ‘it must be the data’, ‘it must be
the evaluator’, when a more constructive response—‘let’s investigate why’
should result. Akin to the engineering model discussed in Tilley (2016),
failure should be seen as something to be unpicked and built upon, not
excused, ignored or hidden. However, we are not inclined to report the bad
news. Ekblom (2011) highlights how, on establishing a new column in the
Crime Reduction Digest on ‘learning from mistakes’, in a one-year period
they only received one submission, the column being disbanded before it
even began. This was not a reflection of the resounding success of all
policing initiatives; it was a reaction to the belief that pervades the culture
that bad news is not helpful.
Replication
Learning from what works is extremely important and being able to
replicate an intervention within a different context—be that geographical or
temporal can save time and resources and enhance the likelihood of
success. It is important to know what works or does not work, within
different contexts, to avoid re-inventing the wheel and wasting precious
time and funding. Replication of successful programmes is an effective way
of transferring practice knowledge. Crime prevention practice, if not always
published, is littered with examples of replication failure—the attempt to
replicate a project or intervention that has not produced those prior
successful outcomes. Tilley’s (1993) presentation of the findings from the
Safer Cities Programme (within the UK) discusses examples of replication
failure, in particular, the ineffective attempts to replicate the Kirkholt
Burglary Prevention Project. Ekblom (2011) also highlights examples from
the Crime Reduction Programme (that followed Safer Cities) where
‘marked successes [were] occurring’ (p. 11), yet the mainstreaming of these
crime reduction programmes that followed (often based upon replication)
revealed that: ‘Replication of individual success stories was challenging’
(p. 11).
‘Strict replication’ (Tilley 1993), by its very nature, is not possible with
crime reduction programmes. Even if the intervention is rigorously
replicated, with high levels of programme integrity, the time, space and
individuals will not be the same. Lipsey’s (1999) meta-analysis of probation
interventions compared 196 ‘practical’ (routine/real-world) programmes
with 205 ‘demonstration’ (pilot/experimental) programmes and found that
the former was only half as effective. There are countless examples of
individual projects that have produced successful reductions in crime (or
whatever outcome is desired), yet this success does not translate when the
scheme is rolled out or mainstreamed, largely because of the level of
programme integrity that was retained—in knowledge, application,
commitment (to name but a few factors).
In the case of the replication of SBD, the difficulties of maintaining
programme integrity would appear less challenging—the scheme is based
upon compliance with fairly rigid standards/criteria. However, whilst Part 2
(physical security) comes with little flexibility, Part 1 (design and layout) is
open to different interpretations (and rightly so), largely based upon context
and local constraints. This is no limitation—it is what Ekblom (2011, p. 51)
refers to as ‘intelligent replication’. Replication of the scheme and its
theory, mechanism and standards may be less rigid, but the
individual/personnel element, in this case, the implementation by 100s of
DOCOs, will vary dramatically and replication will be far from Tilley’s
‘strict’. The variations in interpretation, the compliance with standards, the
consideration for and working within local context, the element of
compromise, the quality assurance and signing off and the auditing post
completion leave replication less than complete, and whilst this is
‘intelligent replication’ (in theory), in practice it ‘could’ be a failure to
actually deliver SBD in its purest/ideal form—something that would
influence evaluation outcomes.
This is blatantly old people’s housing and I would not burgle there.
A lot of people would and if I look back, a lot of people I mixed with
would and they would even target old people. I would never as my
mum brought me up to have pride and morals. (Offender 4)
They’re tidy, but they’re old people bungalows—I don’t target old
people, it’s not right. They’ve got stuff, but I wouldn’t want it to
happen to my Nana and she lives in a bungalow. (Offender 17)
No, it’s old people’s homes. In prison you know if people have
targeted old people and these people should be on a wing with the
nonces. (Offender 7)
It’s old people’s homes so no. When you go to prison people would
know you had targeted an old person’s house and you would be
scum. I could get in easily but this is a moral judgement. (Offender
6)
I’d probably stay away from here, it’s the kind of area that I grew up
in. You don’t steal from people who’ve got fuck all in the first place.
(Offender 10)
Recommended Readings
Tseloni et al. (2017b) provide an excellent summary of levels, patterns and
preventative approaches to domestic/residential burglary and is a great
place in reviewing the current literature around this subject, and it is worth
reading the series of papers on the effectiveness of security and particularly
the association with the burglary drop, including Farrell et al. (2011),
Tseloni et al. (2014, 2017a, 2017b). For a more detailed review of CPTED,
Armitage and Ekblom (2019) present a series of contemporary
considerations of this crime prevention approach and assess strengths,
limitations and areas for improvement.
The most accessible readings on the concept of designing out crime
within residential housing include Poyner (1983), Poyner and Webb (1991)
and Newman (1973). For a summary of these, including a detailed review
of the history and implementation of CPTED within housing, see Armitage
(2013).
References
Atlas, R. (2008) 21st Century Security and CPTED: Designing for Critical Infrastructure protection
and Crime Prevention. London: CRC Press.
Armitage n.d. Evaluation of Secured by Design in Hertfordshire and Devon and Cornwall. Report
Produced for Crime Prevention Initiatives Ltd.
Armitage, R. (2004) Secured By Design—An Investigation Of Its History, Development And Future
Role In Crime Reduction. Unpublished PhD Thesis, University of Huddersfield: Huddersfield.
Armitage, R. (2013) Crime Prevention through Housing Design: Policy and Practice. Palgrave
Macmillan: Crime Prevention and Security Management Book Series.
Armitage, R. (2017) Burglars’ Take on Crime Prevention through Environmental Design. Security
Journal. https://doi.org/10.1057/s41284-017-0101-6.
Armitage (2018a) Crime Prevention through Environmental Design. In: Oxford Encyclopedia of
Criminology and Criminal Justice. Oxford University Press. https://doi.org/9780190264079.013.316.
Armitage, R, Monchuk, L, and Rogerson, M. (2010) It Looks Good, But What is it Like to Live
There? Assessing the Impact of Award Winning Design on Crime. Special Volume of European
Journal on Criminal Policy and Research. 17(1), 29–54.
Armitage, R., & Monchuk, L. (2011) Sustaining the Crime Reduction Impact of Secured by Design:
1999 to 2009. Security Journal, 24(4), 320–343.
Armitage, R. and Ekblom, P. (2019) Rebuilding Crime Prevention through Environmental Design:
Strengthening the Links with Crime Science. Oxon: Routledge.
Birks, D., and Davies, T. (2017) Street Network Structure and Crime Risk: An agent-based
investigation of the Encounter and Enclosure Hypotheses. Criminology. 55(4), 900–937.
Bone, R. and Associates (1994) Evaluation of the Secured by Design Initiative: Pilot Study. London:
Association of Chief Police Officers.
Brantingham, P.L. and Brantingham, P.J. (1981) Environmental Criminology. Beverley Hills, Sage.
Brown, J. (1999) An Evaluation of the Secured by Design Initiative in Gwent, South Wales.
Unpublished MSc. dissertation, Scarman Centre for the Study of Public Order, Leicester.
Brown, B.B. and Altman, I. (1983) Territoriality, Defensible Space and Residential Burglary: An
Environmental Analysis. Journal of Environmental Psychology. 3, 203–220.
Brown, B. and Bentley, D. (1993) Residential Burglars Judge Risk: The Role of Territoriality.
Journal of Environmental Psychology. 13, 51–61.
Brown, B.B., and P.B. Harris. 1989. Residential burglary victimization: Reactions to the invasion of a
primary territory. Journal of Environmental Psychology 9, 119–132.
Cohen, M.A. (2000) Measuring the costs and benefits of crime and justice, Measurement and
analysis of crime and justice. In Criminal Justice, Vol 4. Washington DC: National Institute of
Justice.
Cohen, L.E. and Felson, M. (1979) Social Change and Crime Rate Trends: A Routine Activity
Approach. American Sociological Review. 44, 588–608.
Cornish D.B., Clarke RV (1986). The Reasoning Criminal: Rational Choice Perspectives on
Offending. Springer-Verlag: New York.
Davies, T., & and Johnson. S.D. (2014) Examining the Relationship Between Road Structure and
Burglary Risk Via Quantitative Network Analysis. Journal of Quantitative Criminology. https://doi.
org/10.1007/s10940-014-9235-4.
Ekblom, P. (2011) Crime Prevention, Security and Community Safety Using the 5Is Framework.
Basingstoke: Palgrave Macmillan.
Ekblom, P. and Pease, K. (1995) Evaluating Crime Prevention. In: M. Tonry and D. Farrington (Eds.)
Building a Safer Society: Strategic Approaches to Crime Prevention, Crime and Justice, 19: 585–
662. Chicago: University of Chicago Press.
Farrell, G. (2021) Forty years of declining burglary in the United States: Explanation and evidence
relating to the security hypothesis. Security Journal (2021). https://doi.org/10.1057/s41284-021-
00284-4.
Farrell, G., Tseloni, A., Mailley, J., & Tilley, N. (2011). The crime drop and the security hypothesis.
Journal of Research in Crime and Delinquency, 48(2), 147–175.
Gerell, M. (2021) Does the Association Between Flows of People and Crime Differ Across Crime
Types in Sweden?. European Journal on Criminal Policy and Research. https://doi.org/10.1007/
s10610-021-09478-3
Heeks, M., Reed, S., Tafsiri, T., Prince, S. (2018) The economic and social costs of crime—second
edition. Home Office Research Report 99.
Hillier, B. (2004) Can streets be made safer. Urban Design International 9:31–45.
Jacobs, J. (1961) The Death and Life of Great American Cities. New York: Random House.
Johnson, S.D., Tilley, N. & Bowers, K.J. Introducing EMMIE: an evidence rating scale to encourage
mixed-method crime prevention synthesis reviews. Journal of Experimental Criminology 11, 459–
473 (2015). https://doi.org/10.1007/s11292-015-9238-7.
Johnson, S. and Bowers, K.J. (2010) Permeability and Burglary Risk: Are Cul-de-Sacs Safer?
Quantitative Journal of Criminology. 26(1), 89–111.
Johnson, S.D., & Bowers, K.J. (2014) How guardianship dynamics may vary across the street
network: A case study of residential burglary. In: Liber amicorum voor Henk Elffers. NSCR:
Amsterdam, Netherlands.
Jones, A., Valero-Silva, N. and Lucas, D. (2016). The effects of ‘Secured Warm Modern’ homes in
Nottingham: Decent Homes Impact Study. Nottingham: Nottingham City Homes.
Laufs, J., Bowers, K., Birks, D., and Johnson, (2020): Understanding the concept of ‘demand’ in
policing: a scoping review and resulting implications for demand management, Policing and Society.
https://doi.org/10.1080/10439463.2020.1791862.
Lipsey, M. (1999) Can Rehabilitative Programs Reduce the Recidivism of Juvenile Offenders? An
Enquiry into the Effectiveness of Practical Programs. Virginia Journal of Social Policy and the Law.
6. 611–641.
Ministry of Housing, Communities and Local Government (MHCLG) (2015) Security in Dwellings:
Approved Document Q. HM Government.
Ministry of Housing, Communities and Local Government (MHCLG) (2019) Planning Policy
Framework. HM Government.
Ministry of Housing, Communities and Local Government (MHCLG) (2021) National Model Design
Code. HM Government.
Moir, E., Stewart, A., Reynald, D. M., & Hart, T. C. (2017). Guardianship in action (GIA) within
Brisbane suburbs. Criminal Justice Review, 42(3), 254–269. https://doi.org/10.1177/
0734016817724199.
Monchuk, L. (2016) Crime Prevention through Environmental Design (CPTED): Investigating its
application and delivery in England and Wales. Thesis submitted to the University of Huddersfield.
Monchuk, L., Pease, K., & Armitage, R. (2018). Is It Just a Guessing Game? The Application of
Crime Prevention through Environmental Design (CPTED) to Predict Burglary. Planning Practice
and Research, 33(4), 426–440. https://doi.org/10.1080/02697459.2018.1510276.
Montoya, L., Junger, M. and Ongena, Y. (2014) The Relation Between Residential Property and its
Surroundings and Day- and Night-Time Residential Burglary. Environment and Behavior. 1–35.
https://doi.org/10.1177/0013916514551047
Newman, O. (1973) Defensible Space: People and Design in the Violent City. London: Architectural
Press.
Nee, C., & Meenaghan, A. (2006) Expert Decision Making in Burglars. British Journal of
Criminology, 46, 935–949.
Office for National Statistics (2020) Crime in England and Wales: year ending March 2020. https://
www.ons.gov.uk/releases/crimeinenglandandwalesyearendingmarch2020.
Pease, K. (2010) Mindsets, Set Minds and Implementation. In: J. Knutsson and R.V. Clarke (eds.)
Putting Theory to Work: Implementing Situational Prevention and Problem-oriented Policing.
London: Lynne Rienner Publishers Inc.
Police Crime Prevention Initiatives (2019) Secured by Design Homes 2019. London: PCPI.
Poyner, B. (1983) Design Against Crime: Beyond Defensible Space. London: Butterworth.
Reynald, D. (2009) Guardianship in Action: Developing a New Tool for Measurement. Crime
Prevention and Community Safety. 11, 1–20.
Reynald, D. M., Moir, E., Cook, A., & Vakhitova, Z. (2018). Changing perspectives on guardianship
against crime: an examination of the importance of micro-level factors. Crime Prevention and
Community Safety, 20(4), 268–283. https://doi.org/10.1057/s41300-018-004-4.
Roach, J., Cartwright, A., Weir, K., Richards, S., and Weir, M. (2020) Reducing student burglary
victimisation using the Nudge approach. Crime Prevention and Community Safety. 22, 364–380.
Rogerson, M. and Pease, K. (2019) Moving Home as a Flight from Crime: Residential Mobility as a
Cause and Consequence of Crime and a Challenge to Crime Prevention through Environmental
Design. In: R. Armitage and P. Ekblom (eds.). Rebuilding Crime Prevention through Environmental
Design: Strengthening the Links with Crime Science. Oxon: Routledge.
Saville, G. and Cleveland, G. (2008) Second Generation CPTED: The Rise and Fall of Opportunity
Theory. In: R. Atlas (Ed). 21st Century Security and CPTED. London: CRC Press.
Shaw, M.K., and Chenery, S. (2007) Kings and Castles, Caves and Cavemen: The Impact of Crime
on Men. In: In G. Farrell, K. Bowers, S. Johnson and M. Townsley (eds.) Imagination for Crime
Prevention: Essays in Honour of Ken Pease. Crime Prevention Studies New York: Criminal Justice
Press, 147–161.
Tilley, N. (1993) After Kirkholt: Theory, Methods and Results of Replication Evaluations. Crime
Prevention Unit Paper No. 47. London: Home Office.
Tilley, N. (2016) Emmie and Engineering: What Works as Evidence to Improve Decisions.
Evaluation. 22(3), 304–322. https://doi.org/10.1177/1356389016656518.
Teedon, P., Reid, T., Griffiths, P. and McFayden, A. (2010) Evaluating Secured by Design Door and
Window Installations. Crime Prevention and Community Safety. 12(4), 246–262.
Tseloni, A., Thompson, R., Grove, L., Tilley, N., & Farrell, G. (2014). The effectiveness of burglary
security devices. Security Journal. https://doi.org/10.1057/sj.2014.30.
Tseloni, A., Thompson, R., Grove, L., Tilley, N. and Farrell, G. (2017a). The effectiveness of
burglary security devices. Security Journal, 30 (2), pp. 646–664.
Tseloni, A., Farrell, G., Thompson, R., Evans, E., and Tilley, N. (2017b) Domestic burglary drop and
the security hypothesis. Crime Science. 6, 3. https://doi.org/10.1186/s40163-017-0064-2.
van Der Voordt, T.J.M. and Van Wegen, H.B.R. (1990) Testing Building Plans for Public Safety:
Usefulness of the Delft Checklist. Netherlands Journal of Housing and Environmental Research.
5(2), 129–154.
van Sintemaartensdijk, I., Van Gelder, J.L., Van Prroijen, J.W., Nee, C. (2020) Mere Presence of
Informal Guardians Deters Burglars: A Virtual Reality Study. Journal of Experimental Criminology.
https://doi.org/10.1007/s11292-020-09430-1
Vollaard, B and Ours, J. C. V. (2011) Does Regulation of Built-In Security Reduce Crime? Evidence
from a Natural Experiment. The Economic Journal. 121 (May), 485–504.
Ward, S. (2017) Evaluation of Secured by Design in Fife, Scotland. Unpublished findings shared with
author.
Wikström, P.O.H. (2004) Crime as Alternative: Towards a Cross-Level Situational Action Theory of
Crime Causation. Beyond empiricism: Institutions and intentions in the study of crime. 13, 1–37.
Wikström, P.O.H. (2010). Explaining Crime as Moral Actions. Handbook of the Sociology of
Morality. New York: Springer. 211–239.
Wikström, P.O.H., Oberwittler, D., Treiber, K., Hardie, B. (2012). Breaking rules: The social and
situational dynamics of young people’s urban crime. Oxford: Oxford University Press.
Wikström, P.O.H., Mann, R.P. and Hardie, B. (2018) Young people’s differential vulnerability to
criminogenic exposure: Bridging the gap between people- and place-oriented approaches in the study
of crime causation. European Journal of Criminology. 15 (1), 10–31. https://doi.org/https://doi.org/
10.1177/1477370817732477.
Wiles, P. and Costello, A. (2000) The ‘Road to Nowhere’: The Evidence for Travelling Criminals,
Home Office Research Study 207. London: Home Office.
Willcocks, M., Ekblom, P., and Thorpe, A. (2019) Less Crime, More Vibrancy, by Design. In: R.
Armitage and P. Ekblom (eds.). Rebuilding Crime Prevention through Environmental Design:
Strengthening the Links with Crime Science. Oxon: Routledge.
Winchester, S. and Jackson, H. (1982) Residential Burglary: The Limits of Prevention. Home Office
Research Study Number 74. London: Home Office.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_43
Adrian Beck
Email: [email protected]
Abstract
The chapter reviews the way in which video technologies are utilised by
retail organisations—offering a framework that captures the various use
cases that are employed—in order to better understand how they are
deriving benefit from this investment. To date, it has been a technology
closely associated with, and focused upon, the delivery of safety and
security in retail spaces. However, new use cases are emerging that may not
only enhance its capacity to deliver these objectives but also enable it to
contribute more broadly across retail organisations.
Context
It is hard to overestimate the extent to which video technologies are now
embedded in societies around the world, although estimates on the scale of
the market are often difficult to ascertain, particularly for the retail sector.
One technology provider has suggested that the global market for video
hardware and software used in retailing in 2020 was about $1.7 billion,
rising to perhaps as much as $2.2 billion by 2023.
This is perhaps not surprising—the use of video technologies in
retailing is not only longstanding but increasingly ubiquitous—it is hard to
find a segment of retail space that is not under the gaze of some form of
video system. Indeed, retailing has been at the forefront of the use of what
are often called closed circuit television (CCTV) systems since the 1970s
and 1980s (Farrington and Painter 2003; McCahill 2002; Norris et al. 1998;
Welsh and Farrington 2009). Primarily deployed as a crime prevention and
detection tool, and initially based upon analogue technologies, it is now
going through a period of considerable and remarkable change (Beck 2008,
2020; Gill and Spriggs 2005; Graham et al. 1995). This is being driven by a
rapidly changing technological and social context, including major
developments in digitisation and analytical capabilities, significant
reductions in capital costs, advancements in miniaturisation and networking
capabilities, and growing societal acceptance of the routine surveillance of
public spaces (Dorrier 2016; Kirkup 1999; Kirkup and Carrigan 2000; Liu
and Chen 2011; Mackay 2006; Norris et al. 2004). This has led to the
potential role and capability of video technologies in retailing beginning to
expand beyond its traditional role as merely a facilitator of safety and
security—an insurance safety net should anything untoward happen—to
one which impacts upon a broader range of retail activities (Ditton et al.
1999; Dodd et al. 1998; Gladwell 1997; Graham et al. 1995; Kirkup 1999;
Kirkup and Carrigan 2000; McLuhan 1999; Mackay 2006; Mandeville
1994; Mathieson 2006; Phillips and Bradshaw 1991; Snowdon 1995;
Zurawski 2009).
However, capability does not always translate into actual use—just
because a technology can do something does not always mean that it will be
used as originally intended or deliver on initial expectations. For instance,
in the early days of the use of CCTV systems in public spaces in the UK,
grandiose claims were frequently made about its capacity to significantly
reduce crime, which were seldom found to have much veracity (Gill and
Spriggs 2005; Keval and Sasse 2008; Loveday and Gill 2003; McCahill
2002; Stedmon, Wilson 2005).
Similarly, within retail spaces, early studies found little evidence that
these systems had much of a lasting impact on levels of retail loss, and
invariably it was almost impossible to achieve a favourable return on
investment (ROI) on purely retail loss reductions alone (Armitage 2002;
Beck and Willis 1992; Kajalo and Lindblom 2010a, 2010b; Kajalo and
Lindblom 2011a, 2011b).
Moreover, the recent rapid growth in the development of video systems
that can potentially provide an ‘analytic’ capability—in effect building
some form of automation into the viewing, reviewing and responding
process—has further heightened interest in utilising these systems more
broadly across retailing. Talk of video-based Artificial Intelligence (AI) and
Machine Learning (ML) technologies being the next ‘big’ transformative
change is a recurrent theme, but whether their introduction and use
currently makes sense or are indeed the most appropriate interventions to
address the pressing and varied concerns of retailing is certainly open to
debate and critical review (Kilcourse and Rosenblum 2020).
The purpose of this chapter, therefore, is to review the way in which
video technologies are utilised by retail organisations—to offer a
framework that captures the various use cases that are employed—in order
to better understand how they are deriving benefit from this investment. To
date, it has been a technology closely associated with, and focused upon,
the delivery of safety and security in retail spaces. However, new use cases
are emerging that may not only enhance its capacity to deliver these
objectives but also enable it to contribute more broadly across retail
organisations.
Research Methodology
This chapter is based upon data collected in 2019/2020 from in-depth
interviews with representatives from 22 retailers based in the US and
Europe. They represented some of the largest retail businesses in the world
with collective sales in 2019 of nearly €1trillion, equivalent to
approximately 12% of the total US and European retail market. In addition,
interviews were carried out with representatives from five video technology
providers. Those retailers that took part in the research were self-selecting
—an online survey was distributed through existing contacts, representative
trade associations and social media platforms, asking respondents to
describe their use of video technologies. Those completing the survey were
then asked whether they would be prepared to take part in more detailed
interviews (quotes from these interviews are presented in this chapter).
Given this method, the assessment presented below does not claim to be
based upon a representative sample of all retailing—it is only based upon
what some companies are doing, and it is recognised that, given the
dynamic nature of this sector, there is likely to be a wide range of other
video technologies and use cases in existence that are not included.
While there is no agreed definition, throughout this chapter the terms
‘video technologies’, ‘CCTV’ and ‘video systems’ will be used
interchangeably to refer to any system designed to observe, collect, collate
and analyse both analogue and digital images derived from various types of
video cameras (Taylor 2010; Taylor and Gill 2014). For the sake of brevity,
the term ‘loss prevention’ will be used to describe the retail function tasked
with the management of retail losses (Beck 2009).
Delivering Deterrence
Since its introduction, a key tenet of video technologies has been their
supposed ability to create a deterrent effect—to put off would-be offenders
because they are concerned about an elevated risk of being caught (Ekblom
and Hirschfield 2014; Short and Ditton 1998). This typically works in two
ways: first, creating an increased sense of risk that a security response will
be triggered, leading to a higher chance of being caught in the act; and
second, an elevated sense of risk that offenders will be identified and
subsequently caught and prosecuted (Felson 1986; Cornish and Clarke
1986; Cusson 1993). In both scenarios the would-be miscreant needs to not
only be aware of the presence of the video system but also believe it
delivers a credible risk—either somebody is watching in real time and can
respond, and/or the recorded images will be capable of being reviewed and
used for identification and possible prosecution (Beck 2016).
However, proving this is not easy—the complexity of measuring
deterrence is well known—how can you prove that something did not
happen that might have happened had the video system not been present?
Certainly, studies have been undertaken to try and measure changes in key
indicators such as the number and types of crimes and levels of loss before
and after the introduction of video systems, but there is often a plethora of
confounding factors that undermine the reliability of the results (Ditton
1998; Eck and Guerette 2012; Gill and Spriggs 2005; Pawson and Tilley
1997; Piliavin et al. 1986; Taylor 2010). Of particular concern is the extent
to which the growing ubiquity of video systems undermines their deterrent
potential—are the general public and offenders alike simply becoming
oblivious to their presence? (Tilley 1993). In some cases, retailers have
tried to counter this effect by ‘advertising’ their presence, noticeably
through the use of Public View Monitors (PVMs), which show consumers,
via a large display, an image of themselves (and others) entering or visiting
particular parts of a store. While some limited research (Hayes and Downs
2011) has suggested they do have some impact on rates of loss, one
respondent to this research was summarily dismissive of their value: ‘We
have stopped fitting PVMs—because they are as effective as a bell box
[external burglar alarm box]; everybody has them and nobody needs to be
reminded that you have a camera system because everybody’s got one’.
Face Boxing
While certainly less prevalent than BWCs, the use of ‘Face Boxing’ on
Public View Monitors (PVMs) was another example of how retailers were
trying to ‘personalise’ the deterrent component of their video systems. This
is a relatively simple technology that digitally ‘draws a box’ around the
head/face of all those entering a retail store. The general idea is that it gives
the impression that the company may be using some form of facial
recognition (even though this technology was not actually in use) or it
simply catches the attention of the consumer: ‘We use Face Boxing on
PVMs—nothing being stored; it is a relatively crude technology to give the
impression we have facial recognition in operation’.
As with many other video systems, it is very difficult to know the extent
to which this type of technology has an impact on levels of loss or incidents
of violence and verbal abuse, although one respondent claimed that it had
had an effect: ‘in the stores where it has been used, we have seen a drop in
losses and a drop in incidents of violence’.
Centralised Monitoring
One company made use of a HQ-based security function to undertake real-
time monitoring of selected stores at night, while another utilised video to
monitor the activities of replenishment staff: ‘We know the staff working at
night are aware that Big Brother is watching—the phone is ringing seconds
later saying “hey why did you in the red coat walk out the door just now,
you didn’t call me?”’ In both these cases, the much less dynamic and
complex nature of the night-time store environment probably makes the
identification of ‘exceptional’ activities easier to identify.
Another company provided real-time monitoring when a store reported
a particular type of incident—the CCC would communicate with the local
loss prevention team to manage the issue. Interestingly, one company
described how its CCC used real-time monitoring to provide reassurance to
staff concerned about their safety: ‘[Store] Staff can phone us if they feel
vulnerable entering and leaving a store so that we can keep an eye on them’.
Finally, another respondent described how they used real-time monitoring
to undertake ‘virtual’ store audits to check on process compliance.
In-store Monitoring
In the not-too-distant past real-time in-store monitoring was probably one
of the biggest uses of video systems—a security guard either in a room
watching multiple screens, or at a CCTV podium situated near the entrance
of the store. While the latter remains a relatively common sight in larger
retail stores, the reality for some respondents was that this was as much
about creating a deterrent effect as it was about actually enabling guards to
identify offending in real time—part of the development of an illusionary
‘theatre of security’ to amplify a sense of risk (Schneier 2009). In an effort
to make video feeds more accessible, one company was trying out new
ways to do this: ‘We are going to try out “mobile podiums”—the guard will
carry around a mobile device that will give them access to the CCTV store
system’. No doubt in certain retail locations there may well continue to be a
case for real-time monitoring of multiple video feeds, but the reality of
ever-growing staffing costs, increasingly complex retail environments and
the developing capabilities of video analytics may well mean that this use
case becomes less evident in the future.
Ensuring Compliance
As the application of video systems expands around the world, some
retailers have increasingly found that their use is no longer a business
choice but rather a statutory requirement for them to be able to either
operate in particular locations or trade certain types of goods. The issue of
Compliance, therefore, is the fourth use case for video systems.
Generating a Response
Four of the companies taking part in this research had developed a
particular use case for their video systems that utilised them to create a
centralised response to incidents of violence against store staff.
Providing Reassurance
One of the recurring challenges of measuring the ‘value’ of video systems
is that it can be tasked with delivering outcomes that are often hard to
quantify financially—the intangible benefits that are much discussed and
appreciated, but rarely capable of being included on a business’ P & L. A
good example of this is the sixth use case identified by respondents:
Providing Reassurance.
Passive uses of video rely upon its presence to generate some form of
response or enable an activity to happen—deter thieves from committing a
crime, encourage staff to comply with business procedures and/or ensure
businesses met legal requirements. Reactive uses focus upon the post hoc
review of video data to enable undesirable events and players to be
identified and/or business decisions to be informed and improved. Active
use is very much concerned with utilising video systems in real time to
instigate a response and/or identify miscreant behaviour. Finally, Proactive
use is concerned with how video can be used to automate, speed up and
improve many of those activities currently undertaken through the Reactive
and Active uses thus far.
While traditional interpretations of the role of video systems have
largely focused upon their capacity to detect, deter and reassure, the
research presented in this chapter shows that while these will remain
important drivers for investing in this technology, its role is becoming much
more expansive, incorporating a growing range of activities and retail
functions. In addition, as the technology evolves further, its use could also
grow to not only encompass more tasks but also assist a broader range of
retail functions, particularly as the technology is developed and integrated
with other data systems. It is highly likely, therefore, that retailing will be
an environment where video systems continue to be utilised to not only
deliver safety and security but also enhance business profitability.
Recommended Readings
While there is a considerable amount of literature available on the use and
effectiveness of CCTV systems in public spaces, there is less available on
its use in the retail environment. For discussions on the general
effectiveness of CCTV, see Gill and Spriggs (2005), Taylor (2010), Taylor
and Gill (2014), Welsh and Farrington (2009).
Beck and Willis carried out some early evaluations of the use of CCTV
in retail spaces (1992, 1999) as did Loveday and Gill (2003). More recently,
Beck provided a review of the use of a range of crime prevention
approaches in retailing, including the use of CCTV (2016). He has also
completed an extensive review of the use of video technologies in retailing,
including the growing use and challenges associated with video analytics
(2020). In addition, Kajalo and Lindblom have published a series of papers
looking at perceptions of security in retailing and the role of CCTV (2010a,
b, 2011a, b). More specifically, Hayes and Downs have looked at measuring
the effectiveness of public display screens in retailing (2011) and Kirkup on
how video can be used to monitor retail footfall (1999).
References
Armitage, R. (2002). To CCTV or Not to CCTV: A Review of Current Research into the
Effectiveness of CCTV Systems in Reducing Crime. NACRO. London: Community Safety Practice
Briefing.
Beck, A (2018a). The Rise of Self-checkout in Retailing: Understanding the Risk and Managing the
Problem. Leicester: Erudite Publishing.
Beck, A. (2007). The Emperor Has No Clothes: What Future Role for Technology in Reducing Retail
Shrinkage? Security Journal, 20(2), 57–61.
Beck, A. (2008). Preventing Retail Shrinkage: Measuring the ‘Value’ of CCTV, EAS and Data
Mining Tools, Brussels: ECR Europe.
Beck, A. (2016). Amplifying Risk in Retail Stores: The evidence to date on making shop thieves think
twice. An ECR Community White Paper, Brussels: ECR Community.
Beck, A. (2018b). Measuring the Impact of RFID in Retailing: Key Lessons from 10 Case-study
Companies. Brussels: ECR Community Shrinkage and On-shelf Availability Group.
Beck, A. (2020). Reviewing the Use of Video Technologies in Retailing. Brussels: ECR Retail Loss
Group.
Beck, A. and Willis, A. (1992). An Evaluation of Store Security and Closed Circuit Television.
University of Leicester, Centre for the Study of Public Order, Leicester.
Beck, A. and Willis, A. (1995). Crime and Security: Managing the Risk to Safe Shopping. Leicester:
Perpetuity Press.
Beck, A. and Willis, A. (1999). Context-Specific Measures of CCTV Effectiveness in the Retail
Sector. in Painter, K. and Tilley, N. (eds.) Surveillance of Public Space: CCTV, Street Lighting and
Crime Prevention. New York: Criminal Justice Press, 251–269.
Beck, A. (2009). New Loss Prevention: Redefining Shrinkage Management, Basingstoke: Palgrave
Macmillan.
Chainey, S. (1999). Crime Mapping Case Studies Volume 2: Successes in the Field. Washington, DC:
United States Institute of Justice.
Cornish, D.B. and Clarke, R.V. (1986). The Reasoning Criminal: Rational Choice Perspectives on
Offending. New York: Springer-Verlag.
Cusson, M. (1993). ‘Situational Deterrence: Fear During the Criminal Event’, in Clarke, R.V. (eds.)
Crime Prevention Studies Volume 1. Monsey: Criminal Justice Press Dodd, C.A., 55–68.
Ditton, J. (1998). Public Support for Town Centre CCTV Schemes: Myth or Reality, in Norris, C.,
Moran, J. and Armstrong, G. (eds.) Surveillance, closed circuit television, and social control.
Aldershot: Ashgate, 221–228
Ditton, J., Short, E., Phillips, S., Norris, C. and Armstrong, G. (1999). The Effect of Closed Circuit
Television on Recorded Crime Rates and Public Concern About Crime in Glasgow. Edinburgh: The
Scottish Office.
Dodd, C.A., Clarke, I. and Kirkup, M. (1998). Camera observations of customer behaviour in fashion
retailing: methodological propositions. International Journal of Retail & Distribution Management,
26(8), 1–8.
Dorrier, J. (2016). Smart Dust is Coming: New Camera is the Size of a Grain of Salt. SingularityHub.
Accessed on December 17 2020, https://singularityhub.com/2016/06/28/smart-dust-is-coming-new-
camera-is-the-size-of-a-grain-of-salt/
Eck, J. and Guerette, R. (2012). Place-Based Crime Prevention: Theory, Evidence and Policy, in
Farrington, D. and Walsh, B. (eds.) The Oxford Handbook of Crime Prevention. Oxford: Oxford
University Press, online page numbering.
Farrington, D.P. and Painter, K. (2003). How to Evaluate the Impact of CCTV on Crime, in Gill, M.
(eds.) CCTV. Leicester: Perpetuity Press, 67–79.
Felson, M. (1986). Linking Criminal Choices, Routine Activities, Informal Control, and Criminal
Outcomes, in Cornish D.B. and Clarke R.V. (eds.) The Reasoning Criminal, New York: Springer
Verlag, 119–128.
Ferryman, J. (2016). Video Surveillance Standardisation Activities, Process and Roadmap, ERNCIP
Thematic Group Video Surveillance for Security Critical Infrastructure, Brussels: European Union.
Gill, M. (2006). CCTV: Is it Effective?, in Gill, M. (ed) The Handbook of Security (First Edition).
Basingstoke: Palgrave Macmillan, 438–461.
Gill, M. and Spriggs, A. (2005). Assessing the Impact of CCTV, Home Office, London.
Gladwell, M. (1997). See me, touch me. The Independent Magazine, (February), 9–12.
Graham, S., Brooks, J. and Heery, D. (1995). Towns on the Television: Closed Circuit TV
Surveillance in British Towns and Cities. Electronic Working Paper No 17. School of Architecture,
Planning & Landscape, Global Urban Research Unit, University of Newcastle upon Tyne.
Gras, M. (2004). The Legal Regulation of CCTV in Europe. Surveillance and Society, 2(2/3), 216–
229.
Hayes, R. and Downs, D. (2011). Controlling retail theft with CCTV domes, CCTV public view
monitors, and protective containers: A randomized controlled trial. Security Journal, 24(3), 237–250.
Health and Safety Executive (2020). Costs to Great Britain of Workplace Injuries and New Cases of
Work-related Ill Health—2017/18. Accessed December 17 2020, from https://www.hse.gov.uk/
statistics/cost.htm
Hesse, L. (2002). The Transition from Video Motion Detection to Intelligent Scene Discrimination
and Target Tracking in Automated Video Surveillance Systems. Security Journal, 15(2), 69–78.
Hier, S., Walby, K. and Greenberg, J. (2011). Supplementing the Panoptic Paradigm: Surveillance,
Moral Governance and CCTV, in Lyon, S. (ed.) Theorizing Surveillance: The Panopticon and
Beyond. Oxon: Routledge, 230–244.
Kajalo, S. and Lindblom, A. (2010a). How retail entrepreneurs perceive the link between
surveillance, feeling of security, and competitiveness of the retail store? A structural model approach.
Journal of Retailing and Consumer Services, 17(4), 300–305.
Kajalo, S. and Lindblom, A. (2010b). Surveillance investments in store environment and sense of
security. Facilities, 28(9/10), 465–474.
Keval, H. and Sasse, M.A. (2008). “Not the Usual Suspects”: A study of factors reducing the
effectiveness of CCTV. Security Journal, 23(2), 134–154.
Kilcourse, B. and Rosenblum, P. (2020). Getting Past the Hype: What Can AI Analytics Really
Accomplish for Retailers? Miami: Retail Systems Research.
Kirkup, M. and Carrigan, M. (2000). Video surveillance research in retailing: ethical issues.
International Journal of Retail & Distribution Management, 28(11), 470–480.
Liu, T. and Chen, C. (2011). Please smile, the CCTV is running. The Service Industries Journal,
31(7), 1075–1092.
Loveday, K. and Gill, M. (2003). The Impact of Monitored CCTV in a Retail Environment: What
CCTV Operators Do and Why, in Gill, M. (eds.) CCTV. Leicester: Perpetuity Press, 109–126.
Lum, C., Stoltz, M., Koper, C. and Scherer, A. (2019). Research on Body-worn Cameras: What we
know, what we need to know. Criminology and Public Policy, 18(1), 93–118.
Mackay, D. (2006). The Changing Nature of Public-Space CCTV. Security Journal, 19(2), 128–142.
Malley, C. (2018). The Complete Guide to Retail Health and Safety. Accessed December 17, 2020,
https://www.wirehouse-es.com/wirehouse/retail-health-and-safety-guide/
Mandeville, L. (1994). Customer Counting and Tracking Systems, RMDP Publications, London.
Mathieson, S. (2006). John Lewis monitors moves on CCTV. Network Security, (3), 1–2.
McCahill, M. (2002). The Surveillance Web: The Rise of Visual Surveillance in an English City,
Cullompton: Willan Publishing.
McLuhan, R. (1999). Impulse measures for POP creativity. Marketing, 6(June), 31.
Morris, S. (2015). Hugo Boss fined £1.2m over boy’s mirror death. The Guardian. Accessed
December 17 2020, https://www.theguardian.com/uk-news/2015/sep/04/hugo-boss-fined-over-
austen-harrison-mirror-death
Norris, C., McCahill, M. and Wood, D. (2004). The Growth of CCTV: A Global Perspective on the
International Diffusion of Video Surveillance in Publicly Accessible Space. Surveillance and Society,
2(2/3), 110–135.
Norris, C., Moran, J. and Armstrong, G. (1998). Surveillance, closed circuit television, and social
control, Aldershot: Ashgate.
Phillips, H.C. and Bradshaw, R.P. (1991). Camera tracking: a new tool for market research and retail
management. Management Research News, 14(4/5), 20–22.
Piliavin, I., Gartner, R., Thornton, C. and Matsueda, R. (1986). Crime, Deterrence, and Rational
Choice. American Sociological Review, 51, 101–119.
Sarno, C., Hough, M. and Bulos, M. (1999). Developing a Picture of CCTV in Southwark Town
Centres: Final Report. Crime Policy Research Unit, South Bank University.
Short, E. and Ditton, J. (1998). Seen and Now Heard—Talking to the Targets of Open Street CCTV.
British Journal of Criminology, 38(3), 404–428.
Sivarajasingam, V. and Shepherd, J.P. (1999). Effect of closed circuit television on urban violence.
Journal of Accident & Emergency Medicine, 16(4), 255–257.
Snowdon, R. (1995). Why JWT is now asking the obvious. Marketing, 14(September), 16.
Stedmon, A.W., Harris, S. and Wilson, J.R. (2011). Simulated multiplexed CCTV: The effects of
screen layout and task complexity on user performance and strategies. Security Journal, 24(4), 344–
356.
Taylor, E. (2010). Evaluating CCTV: Why the Findings are Inconsistent, Inconclusive and Ultimately
Irrelevant, Crime and Community Safety Journal, 12, 209–232.
Taylor, E. and Gill, M. (2014). CCTV: Reflections on Its Use, Abuse and Effectiveness, in Gill, M.
(ed). The Handbook of Security (2nd Edition). Basingstoke: Palgrave Macmillan, 705–726.
Tilley, N. (1993). Understanding Car Parks, Crime and CCTV: Evaluation Lessons from Safer
Cities. Crime Prevention Unit Series Paper 42. London: Home Office.
Welsh, B. and Farrington, D.P. (2009). Public Area CCTV and Crime Prevention: An Updated
Systematic Review and Meta-Analysis. Justice Quarterly, 26(4), 716–745.
Wilson, D. (2005). Behind the Cameras: Monitoring and Open-street CCTV Surveillance in
Australia. Security Journal, 18(1), 43–54.
Zurawski, N. (2009). ‘It is all about perceptions’: Closed-circuit television, feelings of safety and
perceptions of space—What the people say’. Security Journal, 23(4), 259–275.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_44
Christopher M. Fleming
Email: [email protected]
Abstract
Authors of this chapter look at the generally positive image of security that
evolves from applying an economic analysis. Reviewing 32 studies using
different economic forms of analyses and accepting a lack of robust data on
the costs and benefits of specific interventions, they conclude that most
studies found that the security and crime prevention interventions produced
benefits larger than costs, and thus there is prima facie evidence that such
interventions are economically efficient.
The role economics plays in the prevention of crime is not particularly well
understood outside the discipline. Economists are often employed in the
security and broader crime prevention industry to undertake cost-benefit
analysis (CBA). However, they possess a range of tools beyond CBA that
have the potential to assist in shaping modern crime prevention and security
policy. Bushway and Reuter (2008) recognise the modern economist for
making three major contributions: (1) theory—for example rational choice
theory, which is the core to both theoretical and empirical economics; (2)
specialised economic techniques—for example cost-benefit analysis (CBA),
econometrics and efficiency models; and (3) areas of expertise—economists
unique understanding of market models, which can be thought of as the
heart of economics. The focus of this chapter is CBA. A full review of the
contribution that economics makes to criminology and by extension to
security is provided by Manning (2018).
CBA was first proposed in 1844 by the French engineer A.-J.-E.-J.
Dupuit. However, it was not formally applied until the 1936 US Flood
Control Act, which required that the benefits of flood-control projects
exceed their costs (Talvitie 2018). For the sake of simplicity, CBA is a
systematic approach to examining the relative strengths and weaknesses of
alternative actions or options with the goal of maximising societal welfare.
In the context of security and more broadly, crime prevention, CBA can be
used to quantify the efficacy of interventions or policies aimed at enhancing
security or preventing crime (Manning and Wong 2014). In short, CBA
provides evidence regarding the economic efficiency of a policy or
programme relative to other alternatives by providing a common monetary
metric from which alternative options can be compared. With CBA
evidence, policy makers can develop an economic rationale for the
allocation of scarce public resources. CBA promotes good fiscal
management as it ensures that policy makers choose alternatives that
deliver the highest return on investment. The programme may be effective
but the question looms as to whether it is economically efficient. There is a
flawed logic in assuming that effectiveness equals efficiency. Without the
CBA test, we cannot fully answer the efficacy question—and thus the cost
to society is the potential mismanagement or misallocation of public funds.
The term CBA is often used interchangeably with a range of other
economic analysis (EA) techniques that differ with respect to data, the
degree of analytical sophistication and theoretical underpinnings. Table 44.1
provides a brief summary of common EA techniques. In short, the results
derived from the CBA approach provide an estimated aggregate value of a
policy as measured by its net benefit (NB), where NB = SB [societal
benefit]—SC [societal cost] (Manning et al. 2016). NB is normally
accompanied by a cost/benefit ratio (CBR) or benefit/cost ratio (BCR). This
is simply the ratio between the expected or actual benefits of an option
(expressed in monetary terms) relative to its costs. The rule of thumb is the
lower the cost to benefit ratio the better. Another criterion often employed
by government is net present value (NPV). NPV is simply the algebraic
difference between discounted (i.e. the present value of a payment or a
stream of payments that is to be received in the future) benefits and costs as
they occur over time.
Table 44.1 Common economic analysis techniques
Conducting CBAs
CBAs can be conducted at different points in the project or intervention
cycle. Ex ante CBA is conducted prior to the intervention and is useful in
demonstrating whether resources should be allocated to a project or
intervention. Ex post CBA is undertaken at the conclusion of the project or
intervention. In medias res CBA is conducted during the intervention.
Comparative CBA compares ex ante prediction with ex post results.
There are nine steps to undertaking a CBA, which are summarised
below.
a Note, the reported benefit-cost ratio for Agar (2011) should be treated
with caution as the ratio refers to the cost-benefit of a suite of measures
adopted in the Safe as Houses project, of which alley gating was only one
component
bActive GPS refers to continuous monitoring. For passive GPS, data is
It can be implied from this review that while electronic monitoring may
be cost saving compared to imprisonment, authorities may need to consider
the financial implications of putting offenders on electronic monitoring
rather than traditional supervision or parole. The decision to adopt
electronic monitoring or not may also depend on the primary objective of
the authorities. If the intervention aims to reduce re-offending while being
monitored, then the true cost implications include the costs of crimes
committed while they are on the programme, or indeed costs saved if
electronic monitoring is found to prevent re-offending in the short, medium
or long term. If the primary objective is implementing a financially feasible
and cost-effective measure, there is limited evidence of effectiveness of
electronic monitoring approaches over reasonable alternative strategies.
As noted by Belur et al. (2020), the economic argument for electronic
monitoring in most studies focuses on comparing it against imprisonment
and other offender management techniques. Findings indicated that
although electronic monitoring was cheaper than prison, it was more
expensive than parole, and some types of electronic monitoring (continuous
monitoring with GPS) were more expensive than others (static monitoring
with RFID).
Recommended Readings
The chapter titled “Economics” in the Handbook of Crime Science by
Manning (2019) provides a small insight into the role economists’ play in
developing practical solutions to crime and examining the efficiency or
marginal costs and benefits of policy alternatives or prevention efforts. The
chapter provides a detailed discussion of some of the key theories that
underpin much of the work undertaken by economists in this area and a
discussion of a few areas in which economists make significant
contributions with respect to (1) modern econometric and other applied
analytical methods (such as cost-benefit analysis) and (2) detailed
knowledge of both licit and illicit markets (e.g. drug markets).
“Economists’ contribution to the study of crime and the criminal justice
system” by Bushway and Reuter (2008) provides a detailed discussion of
three areas in which economists have contributed with regard to theoretical
development, empirical evidence and policy development. The areas they
consider in detail are the development of theory, the integration and use of
specialised techniques, and substantive areas of expertise in which
economists have unique knowledge that provides new insights into the
nature of crime and how markets can influence criminal events.
Economic Analysis and Efficiency in Policing, Criminal Justice and
Crime Reduction: What Works? By Manning et al. (2016) explains what
economic analysis is, why it is important and the forms it can take. Costs
are important in all forms of economic analysis although their collection
tends to be partial and inadequate in capturing key information. A practical
guide to the collection is therefore also provided. The book will be of great
interest to students in economics and advanced students in policing and
crime reduction as well as to analysts and decision-makers in policing and
crime reduction.
“The economics of private security expenditure: The influence of
perceptions of crime” by Manning and Fleming (2017) provides an
interdisciplinary, accessible economic model for understanding choices by
individuals, as well as demonstrates the application of self-reported life
satisfaction data to the issue of property crime. This paper was selected as it
represents an empirical study undertaken by two economists that is easily
accessible by the non-economist. The authors find that (1) individuals’
perceptions of crime in their local area are far greater than actual levels of
crime, (2) the gap between perceived and real crime is widening and (3)
real crime rates detract more from an individual’s self-reported life
satisfaction than perceived rates of crime. However, perceived rates of
crime have an adverse impact on life satisfaction beyond those associated
with real crime. Together, these results suggest that societal welfare could
be significantly enhanced by reducing individual’s perceptions of crime,
irrespective of any changes in the real crime rate.
References
Adler, J. (2008). Perverse Incentives and the Endangered Species Act. Resources for the Future
Weekly Policy Commentary. Retrieved from https://www.resourcesmag.org/common-resources/
perverse-incentives-and-the-endangered-species-act/
Agar, I. (2011). Reducing Domestic Burglary—’Safe as Houses’ Project: Final Report. UK Home
Office. London, UK.
Armstrong, S., Malloch, M., Norris, P., & Nellis, M. (2011). Evaluation of the Use of Home
Detention Curfew and the Open Prison Estate in Scotland. Retrieved from Edinburgh, UK.
Bales, W., Mann, K., Blomberg, T., Gaes, G., Barrick, K., Dhungana, K., & McManus, B. (2010). A
Quantitative and Qualitative Assessment of Electronic Monitoring. Report submitted to the Office of
Justice Program National Institute of Justice U.S. Department of Justice. Florida State University.
Tallahassee, Florida.
Belur, J., Thornton, A., Tompson, L., Manning, M., Sidebottom, A., & Bowers, K. (2020). A
systematic review of the effectiveness of the electronic monitoring of offenders. Journal of Criminal
Justice, 68, 101686.
Bentham, J. (1789). An Introduction to the Principles of Morals and Legislation. Essex: Longman.
Boardman, A., Greenberg, D., Vining, A., & Weimer, D. (2018). Cost-Benefit Analysis: Concepts
and Practice (5th ed.). Cambridge, UK: Cambridge University Press.
Bowers, K., Johnson, S., & Hirschfield, A. (2004). Closing off opportunities for crime: An
evaluation of alley-gating. European Journal on Criminal Policy and Research, 10, 285–308.
Buchanan, J. (1967). Public Finance in a Democratic Process. Chapel Hill, NC: University of North
Carolina Press.
Bushway, S., & Reuter, P. (2008). Economists’ contribution to the study of crime and the criminal
justice system. Crime and Justice, 37, 389–451.
Clarke, R., & McGrath, G. (1990). Cash reduction and robbery prevention in Australian betting
shops. Security Journal, 1, 160–163.
Dodgson, K., Goodwin, P., Howard, P., Llewellyn-Thomas, S., Mortimer, E., Russell, N., & Weiner,
M. (2001). Electronic monitoring of released prisoners: An evaluation of the Home Detention
Curfew scheme. Home Office Research, Development and Statistics Directorate. London, UK.
Ekblom, P. (1996). Safer Cities and residential burglary: A summary of evaluation results. European
Journal on Criminal Policy and Research, 4, 22–52.
Erez, E., Ibarra, P., Bales, W., & Gur, O. (2012). GPS Monitoring Technologies and Domestic
Violence: An Evaluation Study. University of Illinois at Chicago Department of Criminology, Law
and Justice and Florida State University College of Criminology and Criminal Justice. Chicago,
Illinois.
Forrester, D., Frenz, S., O’Connell, M., & Pease, K. (1990). The Kirkholt Burglary Prevention
Project: Phase II. London, UK: UK Home Office.
Freeman, A., Herriges, J., & Kling, C. (2014). The Measurement of Environmental and Resource
Values: Theory and Methods (3rd ed.). Oxford, UK: Routledge.
Frost, G. (2002). Florida’s innovative use of GPS for community corrections. Journal of offender
monitoring, 15, 6–10.
Gies, S., Gainey, R., Cohen, M., Healy, E., Yeide, M., Bekelman, A., & Bobnis, A. (2013).
Monitoring High-risk Gang Offenders with GPS Technology: An Evaluation of the California
Supervision Program Final Report. Retrieved from Washington DC:
Gill, M., & Spriggs, A. (2005). Assessing the Impact of CCTV (Vol. 292). Home Office Research,
Development and Statistics Directorate. London, UK.
Gowen, D. (2000). Overview of the Federal home confinement program 1988–1996. Federal
Probation, 64, 11–18.
Harig, T. (2001). Juvenile electronic monitoring project: The use of electronic monitoring technology
on adjudicated juvenile. New York State Division of Criminal Justice Services Evaluation Report.
Albany, New York.
Hicks, J. (1940). The valuation of the social income. Economica, 7(26), 105–124.
Hicks, J. (1941). The rehabilitation of consumer’s surplus. Review of Economic Studies, 8(2), 108–
116.
Jannetta, J. (2006). GPS monitoring of High-risk Sex Offenders: Description of the California
Department of Corrections and Rehabilitation’s San Diego County Pilot Program. Centre for
Evidence-based Corrections Research Report. University of California Irvine. Irvine, California.
Jeffery, C. (1971). Crime Prevention Through Environmental Design (Vol. 91): Sage Publications
Beverly Hills, CA.
Johnson, S., Tilley, N., & Bowers, K. (2015). Introducing EMMIE: An evidence rating scale to
encourage mixed-method crime prevention synthesis reviews. Journal of Experimental Criminology,
11, 459–473.
Kaldor, N. (1939). Welfare propositions of economics and interpersonal comparisons of utility.
Economic Journal, 49(195), 549–552.
Kay, C., Hearnden, I., Millie, A., Mallender, J., & Kingsnorth, R. (2002). Selly Oak Strategic
Development Project: Final Report. UK Home Office.
Knight, B. (1994). Possil Park Estate: Security scheme. In Housing Safe Communities: An
Evaluation of Recent Initiatives. London, UK: Safe Neighbourhood Unit.
Laycock, G. (1986). Property marking as a deterrent to domestic burglary. In K. Heal & G. Laycock
(Eds.), Situational Crime Prevention: From Theory into Practice: (pp. 55–80). London, UK: HM
Stationery Office.
Little, I. (1949). The foundations of welfare economics. Oxford Economic Papers, 1(2), 227–246.
Little, I. (1957). A Critique of Welfare Economics (2nd ed.). London: Oxford University Press.
Lobley, D., & Smith, D. (2000). Evaluation of electronically monitored restriction of liberty orders.
Scottish Executive Central Research Unit. Edinburgh, UK.
Manning, M., & Fleming, C. (2017). The economics of private security expenditure: The influence of
perceptions of crime. Security Journal, 30, 401–416.
Manning, M., Johnson, S., Tilley, N., Wong, G., & Vorsina, M. (2016). Economic Analysis and
Efficiency in Policing, Criminal Justice and Crime Reduction: What Works? London, UK: Palgrave
Macmillan.
Manning, M., & Wong, G. (2014). Financial costs and benefits of crime prevention. In T. Prenzler
(Ed.), Professional Practice in Crime Prevention and Security Management (pp. 41–58). Samford
Valley, QLD: Australian Academic Press.
Marklund, F., & Holmberg, S. (2009). Effects of early release from prison using electronic tagging in
Sweden. Journal of Experimental Criminology, 5, 41–61.
Mill, J. (1848). Principles of Political Economy: With Some of their Applications to Social
Philosophy. London: Longmans, Green and Company.
Ng, Y.-K. (2003). Welfare Economics: Towards a More Complete Analysis. Basingstoke: Palgrave
Macmillan.
Omori, M., & Turner, S. (2015). Assessing the cost of electronically monitoring high-risk sex
offenders. Crime & Delinquency, 61, 873–894.
Painter, K., & Farrington, D. (2001). The financial benefits of improved street lighting, based on
crime reduction. Lighting Research & Technology, 33, 3–10.
Pearson, A. (2012). An Evaluation of Winnipeg’s Electronic Monitoring Pilot Project for Youth Auto
Theft Offenders. (Master of Arts), University of Manitoba, Winnipeg, Canada.
Poyner, B. (1988). Video cameras and bus vandalism. Journal of Security Administration, 11, 44–51.
Schnelle, J., Kirchner, R., Galbaugh, F., Domash, M., Carr, A., & Larson, L. (1979). Program
evaluation research: An experimental cost-effectiveness analysis of an armed robbery intervention
program. Journal of Applied Behavior Analysis, 12, 615–623.
Shute, S. (2007). Satellite tracking of offenders: A study of the pilots in England and Wales. Ministry
of Justice Research Summary. Ministry of Justice. London, UK.
Stern, N., Peters, S., Bakhshi, V., Bowen, A., Cameron, C., Catovsky, S., … Edmonson, N. (2006).
Stern Review: The Economics of Climate Change. Cambridge: Cambridge University Press.
Sturgeon-Adams, L., Adamson, S., & Davidson, N. (2005). Hartlepool: A Case Study in Burglary
Reduction. Hull, UK: Centre for Criminology and Criminal Justice, University of Hull.
Talvitie, A. (2018). Jules Dupuit and benefit-cost analysis: Making past to be the present. Transport
Policy, 70, 14–21.
Tennessee Board of Probation and Parole. (2007). Monitoring Tennessee’s Sex Offenders using
Global Positioning Systems: A Project Evaluation. Tennessee Board of Probation and Parole.
Nashville, Tennessee.
Thompson, M., Hearnden, I., Millie, A., Mallender, J., & Kingsnorth, R. (2002a). Fordbridge
Strategic Development Project: Final Report. UK Home Office. London, UK.
Thompson, M., Hearnden, I., Millie, A., Mallender, J., & Kingsnorth, R. (2002b). Stirchley Strategic
Development Project: Final Report. UK Home Office. London, UK.
Tisdell, C. (2005). Economics of Environmental Conservation (2nd ed. Vol. 1). Amsterdam: Elsevier.
Turner, S., Chamberlain, A., Jannetta, J., & Hess, J. (2015). Does GPS improve recidivism among
high risk sex offenders? Outcomes for California’s GPS pilot for high risk sex offender parolees.
Victims & Offenders, 10, 1–28.
Wise, S. (2004). Global Positioning System (GPS) technology use in monitoring the activities of
Probationers. The Florida Senate-Committee or Criminal Justice. Tallahassee, Florida.
Footnotes
1 Further discussion of non-market valuation is outside the scope of this chapter. For those seeking a
comprehensive review of non-market valuation theory, techniques and applications, see Freeman et
al. (2014).
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_45
Matt Hopkins
Email: [email protected]
Email: [email protected]
Abstract
The author develops a novel methodological approach to measure the harms
of crime against businesses. He bases his work upon the analysis of data
from over 8000 businesses in what has hitherto been a much-neglected area.
His work serves to highlight the important role of security in building
resilience to crime and the need to better understand the linkages between
business tolerance to crime harms, security and resilience.
of life due to physical and emotional harm) and lost outputs including
lost productivity due to time off work and reduced productivity while at
work.
3.
Sentencing council estimates of sentence lengths: Following
Sherman et al. (2016), estimates of crime seriousness were drawn from
sentencing council guidance on sentencing tariffs (see Sentencing
Council 2020).
Below, the methodology for calculating harms and resilience is outlined
in detail.
Findings
This section outlines the findings. First, the harms of crime are considered,
then resilience to crime.
Base: Direct costs—CVS data 2017 and 2018: 8019 businesses [unweighted
data]
In line with Sherman et al. (2016), the analysis illustrates that counting
crimes or using direct costs as measures might be misleading in terms
identifying the true extent of crime costs and who might be affected. A
count of crime events shows that more than three in four crimes against the
commercial sector were thefts by customers (shoplifting), but this crime
type generates only 14.1% of direct costs. This is unsurprising as many
studies have reported a high number of often low-cost incidents of customer
theft—especially in the retail sector (see Home Office 2018, 2019). On the
other hand burglary accounts for less than 1% of crime against the sample,
but it was the crime type that generated the highest proportion of direct
costs (over 25%). When harms measures including physical/emotional
costs, lost productivity and sentencing are added, a different picture
emerges of the crime types that generate the most significant harms. While
robbery and assaults (without injury) comprise just over 13% of crimes (and
less than 1% of direct costs), over 90% of emotional and physical costs
relate to these crime types. They also account for 95% of lost outputs.
Unsurprisingly, the measure of sentencing points to robbery as the most
serious crime faced by businesses in the sample.
Table 45.2 summarises the harms contribution for each crime type
across the sample. However, questions remain about the actual financial
cost of such harms to businesses and how they differ across business types.
These questions are addressed in Table 45.3, where the direct costs of crime
are outlined, and Table 45.4, where emotional and physical costs, and the
costs of lost outputs, are presented.
Table 45.3 Direct crime costs (£) across business sectors by crime type (based on median values)
Base: Direct costs—CVS data 2017 and 2018: 8019 businesses [unweighted
data]
Table 45.3 shows that the average direct crime cost per business is
highest in the wholesale/retail sector (£7768)—with the highest average
generated through customer theft (£4229) and fraud other (£2453). The high
costs of these two crime types in wholesale/retail not only make the average
direct costs in that sector significantly higher than any other sector, but
these costs also eclipse any other individual crime costs. The highest
average direct costs for other crime types were in other sectors: burglary
and criminal damage in the arts sector (£145 and £276 respectively), theft
of vehicle (agriculture: £261), theft by employee (accommodation/food:
£191), fraud by employee (arts: £74) and cybercrime (manufacturing:
£180).
A business in the wholesale/retail sector is likely to suffer the highest
direct financial losses due to crime; the same is true for emotional/physical
costs of crime and lost productivity (Table 45.4). Taking account of these
harms dramatically amplifies the impact of crime on the wholesale/retail,
accommodation/food and arts/entertainment sectors. While the average
direct financial loss to crime for a retailer is £7768, emotional and physical
costs result in a further £25,124 and lost productivity £10,079 per business
per year. The effect of accounting for harms and lost productivity is equally
dramatic in the accommodation/food and arts/entertainment sectors where
emotional/physical harms add £7026 and £7845 to the costs per business
respectively. For each of these sectors lost productivity adds around £2000
to the costs per business.
It is evident that the significant increases in costs observed in the
wholesale/retail, accommodation/food and arts/entertainment sectors by
accounting for harms and lost productivity are caused by the greater
numbers of crimes that result in injury to staff, emotional harms and
interruption to business opening (such as robbery and assaults). It is also
evident that fraud (other) is also a crime type that generates significant
emotional costs and lost productivity in the wholesale/retail sector.8 From a
policy and industry perspective, it would be useful to understand which
specific types of businesses (rather than which sectors) experience the most
severe harms of crime. This is done below, where a logistic regression
model is developed to identify the characteristics of businesses where
harms are most felt.
To do this, it was necessary to create an independent variable: business
with high harms. This was done by calibrating the four harms indicators
through calculating Z scores for each (direct crime costs, harms cost, lost
productivity, sentencing).9 These scores were then added and divided by
four to create a composite indicator of harms for each of the 8019 business
in the sample. The businesses were coded into two groups—those with a
harms score above the mean and those whose score was below the mean. A
total of 8% (n = 643) businesses were coded into the high-harms group.
This group experienced 89% of crimes, 40% of direct crime costs, 95% of
emotional/physical costs and 95% of lost productivity.
Eleven independent variables (coded as 1 = Yes: 0 = No) were
developed from the dataset10:
1.
If the business conducts online sales
2.
If the business has been trading for less than one year
3.
If it is a retail unit
4.
If the business has an ‘off’ licence
5.
If the business has ‘on’ licence
6.
If it is located in a town centre
7.
If more than 25 staff work at the premises
8.
If the business reported any organised crime11 (OC) activity in the
previous 12 months
9.
If it is located in an urban area
10.
If it is located in the top 30% of most deprived locations (based on
Indices of Multiple Deprivation)
11.
If turnover is above £250,000 per annum
The output for the model is presented in Table 45.5.12 The regression
coefficient indicates the direction and explanatory power of each variable,
with the odds ratio giving the likelihood of a factor being present in a high-
harms business. The model identifies nine factors that are statistically
significant and likely to be present in high-harms businesses. The three
most likely are proximity to organised crime (high-harms businesses that
are 11 times more likely to have reported a crime was linked to organised
crime), being a retail unit/shop (five times more likely) and employing over
25 staff (nearly five times more likely).
Table 45.5 Regression model: characteristics of high-harms businesses (the three factors most likely
to be present are shaded)
Fig. 45.1 Business engagement with crime prevention and security: high-harms compared to low-
harms businesses. (Base sample: 4429 business asked security questions)
The evidence begins to raise some questions about the potential value of
security spending for the high-harms businesses. For every £2.80 of
turnover in the high-harms business there is £1 in the low-harms businesses,
though the high-harms businesses are spending £6.6 on security per annum
for every £1 spent in the low-harms businesses and their security spend as a
% of all turnover outpaces that of the low-harms group by 4.9 to 1. In
return, the proportion of turnover relating to crime harms is nearly 16 times
higher for the high-harms businesses. Thus, the evidence suggests that high-
harms businesses engage in crime prevention as much (if not more) than
low-harms businesses. Indeed, this is further demonstrated by the fact that
high-harms businesses had a higher average number of security devices in
place (nine compared to five).15 Of course, a key question in relation to
resilience to crime associates with the efficacy of security. Some authors
have used the Security Impact Assessment Tool (SIAT) methodology
(developed by Farrell et al. 2011) to devise security protection factor (SPF)
scores for security measures through a two-step process. First, an odds ratio
of the likelihood of experiencing (for example) a burglary if a business has
a burglar alarm in place is calculated compared to the wider business
population. Second, the SPF is then calculated by dividing this odds ratio
by the odds of experiencing a burglary if no security was in place. This
quantifies the potential security protection factor the alarm offers.
In Table 45.7 we begin by presenting an analysis of the odds ratios for a
number of security provisions and crime types across the whole sample of
businesses (both high and low harms). The crime types selected for analysis
are those that generated the highest direct costs to businesses (burglary
entry), the highest number of crime events (customer theft),
emotional/physical harms (robbery/assault), sentencing seriousness
(robbery) or lost productivity for businesses (robbery/assault). The odds
ratios are presented for the likelihood of a crime event occurring where a
security device is in place that might be expected to impact on that crime
type (e.g. a burglar alarm in relation to burglary). The findings reveal five
instances where security might offer some protection (denoted by the
shaded cells). Businesses with stock measures in place were less likely to be
victims of customer theft and robbery, and those with visual surveillance
were less likely to be victims of robbery and assaults.
Table 45.7 Security efficacy: odds ratios of victimisation for businesses with security in place
compared to those without (shaded squares indicate possible security protection)
Prevalence rates are presented rather than odds ratios, as this shows the
rates of crime experienced by businesses in the high-harms group. The
analysis illustrates that (1) security may offer limited protection when the
high-harms group is compared to the low-harms group and (2) there are
some clear implications for the way we might think about security in the
contexts of businesses. The data show that the prevalence rates of these
comparisons are only statistically significant in relation to the effect of
stock measures on customer theft and robbery. This suggests that where
stock measures are in place in high-harms businesses, the risk of customer
theft is reduced by 8 times (1.6/0.200) and robbery by 2.8 times
(1.488/0.514).
Conclusions: Implications for Security and Future
Research
This chapter illustrates that rethinking how the impacts of crimes on
businesses are measured and understood by academics and policymakers
might be beneficial. While studies of commercial victimisation have
typically measured the direct costs of crime events or shrinkage, a more
holistic harms approach may offer better insights into the costs of crime to
businesses. Although questions might be raised over some of the harms
measures used in this study (which is an area for development and
refinement), the approach has clear potential. First, it reveals the heavy
burden of some crimes—such as assault and robbery—which result in high
lost productivity costs and can have significant physical/emotional impacts
on staff. Second, the approach allows for high-harms groups to be
identified, which can guide prevention measures.
The study analysed harms through the lens of resilience. This concept is
not precisely defined, and few studies have attempted to operationalise it.
Dutton and Greene (2010) refer to resilience as the building up of protective
factors; in relation to businesses, such protective factors could relate to
security provision. Therefore, three areas were measured: engagement in
security, financial outlay on security and efficacy of security. The analysis
found that high-harms businesses were just as likely to engage and invest in
security as low-harms businesses. Of course, some care has to be taken in
relation to how the findings are interpreted as the exact reasons why
businesses purchased security (such as whether it was direct response to
crime victimisation or for another reason) and when security was purchased
is unknown. However, there was little evidence that security offered such
businesses much protection against crime. This is a cause for concern,
although there are a number of plausible hypotheses to why these patterns
are observed:
1.
Target suitability: It is possible that high-harms businesses are such
attractive targets for crime that security is circumvented or is
insufficient to deter motivated offenders.
2. The suitable target (the business) is too big to protect: Evidence from
several studies (Hopkins and Gill 2017; Hopkins 2019) shows that
larger businesses (in terms of the number of employees) have high
larger businesses (in terms of the number of employees) have high
crime prevalence and incidence rates. The analysis shows that high-
harms businesses are more likely to employ over 25 people. Thus, these
premises may be too big for security devices to protect them from all
crimes.
3.
There are too many motivated offenders: Some previous research
illustrates that high-risk businesses tend to be in deprived locations
(Hopkins 2016), which may have a high number of potential offenders
in the locality. The current study identifies an association between
deprivation and harms, and that high-harms businesses tend to be in
areas where organised crime might also be present. This suggests some
businesses may come into contact with too many motivated offenders
to mitigate all crime risks.
4.
There are too many opportunities: Some businesses—such as retail—
offer so many opportunities for crime (a wide range of products) and
contexts in which potential conflict can occur between staff and
customers (leading to threats and assaults) that it is impossible to
prevent all occurrences of crime.
5.
Security does work, but only in some contexts: Evidence in this chapter
suggests that, in some contexts, security does offer protection for
business (such as visual surveillance for assaults). However, this might
reduce incidence rates of crime but not prevalence rates.
6.
Poor security targeting: Businesses may feel under pressure to do
something about previous crime events (or potential future risk) but
might implement security that does not protect against the specific
crimes that they then eventually become victims of.
7.
Poor security management: Security may be implemented but not
adequately monitored or maintained.
8.
Data collection timing: Security is implemented after crime events, but
the events are still recorded in surveys such as the CVS. This gives the
impression that security had no impact on crime rates.
9. Misleading data: It is possible, though unlikely, that high-harms
businesses are better at crime recall and reporting than low-harms
bus esses a e bette at c e eca a d epo t g t a ow a s
businesses. This could cause misleading data to be recorded in surveys
such as the CVS.
A key challenge for further research is to better capture the types and
extent of harms business experience as a result of crime and to assess the
true impact of those crimes. The harms approach of Sherman et al. (2016),
and the cost measures suggested by Heeks et al. (2018), encourages more
accurate counting and better measurement of harms. This is no doubt
necessary, but it must be remembered that ‘business’ is a broad concept that
encompasses everything from small shops to multinational companies.
Thus, harms are experienced in different ways. This might be better
reflected in future research which could take account of the potential of
crime harms on business profitability, future trading prospects, desire to
move location or other less tangible aspects of crime harms such as staff
morale/staff turnover where violent crime and threats might be regular
occurrences.
Of course, harms are closely tied to the notion of resilience. Although
resilience is difficult to operationalise, it is a concept that future research
needs to explore in more depth. While some authors note that resilience can
be about ‘coping’ and make reference to ‘coping’ styles (Dutton and Greene
2010), this chapter has viewed resilience largely through the lens of security
protection. While the high-harms businesses in this sample engaged in
security (and thus active resilience), it is debatable whether that act of
resilience increased future protection against crime. This has two important
implications for security. First, it suggests that many businesses might
implement security because they feel the need to do something. Second, this
form of active resilience then may do little to protect businesses against
crime.
However, while resilience to crime is important within the business
environment, scholars might also want to consider business tolerance to
crime harms. In the Covid 19 world, businesses are going to be under even
more pressure to reduce losses, including those generated by crime. This
study suggests many businesses are willing to tolerate some crime
loss/harms when profitability or productivity are not too affected (if it forms
part of a successful sales strategy). While Martin (2019) notes that
resilience can be about building stronger defences, an understanding of
‘crime tolerance’ would consider the level of crime harms a business can
withstand before (a) stronger defences need to be built and (b) crime harms
start to impact business viability. The findings in this chapter suggest that
many high-harms businesses are high turnover premises that might
(theoretically) have high tolerance to crime harms. For these businesses,
crime might be a regular occurrence that does not infringe too much on
their ability to trade, and the relative failure of security protection may not
be a major problem as they can absorb the costs of crime (otherwise, for
profit reasons, they would take action). However, as the world changes,
fewer businesses are likely to be in this position. Therefore, the utility of
any harms model rests in better understanding where crime harms put
pressure on crime tolerance and to what extent those businesses are then
able to build active resilience. The test for security will be whether it can
offer the protection businesses will need.
Recommended Readings
Commercial victimisation has not been a significant area of academic focus.
However, a number of texts exist on retail crime such as Ceccato and
Armitage’s (2018) edited collection Retail Crime: International Evidence
and Prevention, which includes a number of useful chapters. Another
useful, though somewhat dated source is Bamfield’s (2012) Shopping and
Crime; scholars may also want to look at the work of Adrian Beck, who has
authored several texts including The Rise of Self-Checkout in Retailing
(2018). For those interested in commercial victimisation generally, the
Home Office publishes ‘Findings from the Commercial Victimisation
Survey’, which presents annual rates of crimes against a range of business
sectors in England and Wales (see Home Office 2018, 2019). Although little
academic research covers non-retail business sectors, Hopkins and Gill
provide a useful overview in The Handbook of Crime Prevention (Tilley
and Sidebottom 2017). While few published studies have considered the
impact of security on businesses, an engaging overview of risk
amplification is provided by Beck (2016), ‘Amplifying Risk in Retail
Stores’. For those interested in harms indexing, possibly the best starting
place is Sherman et al.’s (2016) ‘The Cambridge Crime Harm Index:
Measuring Total Harm from Crime Based on Sentencing Guidelines’ as
published in Policing Vol 10, Issue 3.
References
Bamfield, J. A. N. (2012) Shopping and Crime, Basingstoke: Palgrave Macmillan.
[Crossref]
Beck, A. (2016) Amplifying risk in retail stores: The evidence to date on making shop thieves think
twice. ECR Community Shrinkage and On-Shelf Availability Group. https://ecr-shrink-group.com/
medias/research/Amplifying_Risk_in_Retail_Stores_Report.pdf [Accessed 25th November 2019].
Ceccato, V. & Armitage, R. (2018) Retail crime: International evidence and prevention. Palgrave
Macmillan Series in Crime Prevention and Security Management.
Cross, C. (2019) “You’re not alone”: the use of peer support groups for fraud victims, Journal of
Human Behavior in the Social Environment, 29:5, 672–691, https://doi.org/10.1080/10911359.2019.
1590279.
[Crossref]
Dutton, A. & Greene, R. (2010) Resilience & crime victimization. Journal of Traumatic Stress,
23(2), 215–222. https://doi.org/10.1002/jts.20510.
[Crossref]
Farrell, G., Tseloni, A. & Tilley, N. (2011) The effectiveness of vehicle security devices and their
role in the crime drop. Criminology & Criminal Justice: An International Journal 13(1), 21–35.
https://doi.org/10.1177/2F1748895810392190
[Crossref]
Green, S. & Pemberton, A. (2018) The Impact of Crime Victimisation, Harms and Resilience. In
Walklate, S. The Handbook of Victims & Victimology. Oxon: Routledge. 77–103.
Greenfield, V., & Paoli, L. (2013). A Framework to Assess the Harms of Crimes. The British Journal
of Criminology, 53(5), 864–885 https://doi.org/10.1093/bjc/azt018.
[Crossref]
IPSOS MORI (2019) Commercial Victimisation Survey Technical Report (January 2019) https://
assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/828770/
commercial-victimisation-survey-technical-report-2018.pdf [Accessed 29 April 2020].
Heeks, M., Reed, S., Tafsiri, M. & Prince, S. (2018) The Social and Economic Costs of Crime;
(second edition). Research report 99. London: Home Office. https://www.gov.uk/government/
publications/the-economic-and-social-costs-of-crime [Accessed 12th November 2019].
Home Office (2018) Crime against business: Headline findings from the 2017 Commercial
Victimisation Survey. London: Home Office. https://www.gov.uk/government/statistics/crime-
against-businesses-findings-from-the-2017-commercial-victimisation-survey [Accessed 15 October
2020].
Home Office (2019) Crime against business: Headline findings from the 2018 Commercial
Victimisation Survey: London, Home Office. https://www.gov.uk/government/statistics/crime-
against-businesses-findings-from-the-2018-commercial-victimisation-survey [Accessed 15 October
2020].
Hopkins, M. (2016) Business, victimisation and victimology: Reflections on contemporary patterns
of commercial victimisation and the concept of businesses as ‘ideal victims’. International Review of
Victimology 22(2), 161–179.
Hopkins, M. & Gill, M. (2017) ‘Business, crime and crime prevention: emerging debates and future
challenges’. In Tilley, N. & Sidebottom, A. (eds.) Handbook of Crime Prevention and Community
Safety (2nd ed). London: Routledge. 373–394.
Hopkins, M. (2019) ‘Business face higher rates of Victimisation than Households or individuals’. In
Treadwell, J. & Lynes, A., 50 Facts everyone should know about crime and punishment in Britain.
Bristol: Polity Press. 41–43.
Martin, P. (2019) The Rules of Security: Staying safe in a Risky World: Oxford: Oxford University
Press.
Sentencing Council (2020) Sentencing Guidelines for use in Crown Court https://www.
sentencingcouncil.org.uk/crown-court/ [accessed 15 October 2020].
Sherman, L., Neyroud, P. & Neyroud, E. (2016) The Cambridge Crime Harm Index: Measuring Total
Harm from Crime Based on Sentencing Guidelines. Policing: A Journal of Policy and Practice,
10(3), 171–183. https://doi.org/10.1093/police/paw003.
[Crossref]
Taleb, N. (2012). Antifragile: Things That Gain from Disorder. New York: Random House.
Tilley, N. & Sidebottom, A. (eds.) (2017). Handbook of Crime Prevention and Community Safety
(2nd ed). London: Routledge.
Tilley, N. J., Thompson, R., Farrell, G., Grove, L., & Tseloni, A. (2014). Do Burglar Alarms Increase
Burglary Risk? A Counterintuitive Finding and Possible Explanations. Crime Prevention &
Community Safety: An International Journal.17: 1–19. https://doi.org/10.1057/cpcs.2014.17.
Tseloni, A., Thompson, R., Grove, L., et al. (2 more authors) (2017). The effectiveness of burglary
security devices. Security Journal, 30(2), 646–664. ISSN 0955-1662.
Walklate, S., McGarry, R., & Mythen, G. (2014). Searching for Resilience: A Conceptual
Excavation’. Armed Forces & Society, 40(3), 408–427. https://doi.org/10.1177/0095327X12465419.
[Crossref]
Footnotes
1 This includes crime detection and prevention costs (such as security). It also includes the cost of
insurance administration.
2 This includes emotional costs of crime, lost outputs and health service costs.
3 These sectors include wholesale/retail; agriculture, forestry and fishing; construction;
accommodation/food; arts, entertainment and recreation; manufacturing and transport/ storage.
4 Using median values produces lower direct costs than those observed in Heeks et al. (2018).
5 For assaults, violence with and without injury is used; for fraud by employee and by other, the
fraud measure is used; for cybercrime, the cybercrime measure is used.
6 The range of cyber-enabled or genuine cybercrimes makes it difficult to identify a sentence length.
As a high number of online thefts were recorded in the data, a proxy measure using theft offences has
been used.
7 A better measure of financial capacity would be by considering ‘cost of crime harms’ and ‘security
spend’ as a proportion of profit. However, a measure of profit was not available in the data.
8 The harms of fraud—both financially and on victims are becoming a growing focus of research—
see Cross (2019).
9 Z scores calculate the position of an observation relative to the rest of its distribution. It
returns values of −1 to 1 for a distribution. They can be used to identify how high above or
below a mean value a business is.
11 Organised crime is defined in the survey as ‘Serious crime planned, coordinated and conducted
by people working together on a continuing basis. Their motivation is often, but not always, financial
gain’.
12 The Nagelkerke R Square is a measure of the proportion of variance the independent variables
explain.
13 The CVS only asked 50% of respondents about security provisions, meaning the sample in this
section is 4429 businesses
14 One of the limitations with the CVS data is that it is unclear whether spending on security took
place after victimisation or before. Therefore, it cannot be said with certainty whether security
spending is proactive or reactive.
15 This figure is calculated out of the total of 56 measures asked about in the CVS.
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
M. Gill (ed.), The Handbook of Security
https://doi.org/10.1007/978-3-030-91735-7_46
Martin Gill
Email: [email protected]
Abstract
The author outlines the wide range of benefits of good security practice
which are rarely systematically highlighted and yet need to be understood to
be assessed in the context of the very serious dangers that evolve from bad
security. He notes that the security sector has been poor at putting its case,
and its fragmented nature and its lack of a single or representative voice
have complicated this. Yet there is much to be gained by harnessing good
security and reducing the risk of bad security although governments have
shown little interest in this. Gill argues that this is a massive wasted
opportunity and the losers include the general public.
In their different ways all the chapters in this book support the point that
when based on good principles and when operationally competent, security
is an essential good. This is true not just for those who pay for it, but
crucially, and this point is often missed, for others too. It is also true that
when it is based on an unethical or unprincipled premises and/or is poorly
executed, security can fail to protect targets or assets and can have a serious
adverse impact on people’s human rights (Moss 2009, 2011). As a result,
security is an important concept and that is why getting security right
matters so much.
This chapter starts by documenting the benefits of good security—
private, corporate and other types too—and showing how they are far
greater than the obvious ones, the ones that are most talked about. It is
strange, but somewhat characteristic of much work undertaken on private
security that these benefits are rarely discussed, let alone highlighted.
Despite pockets of good work, the security sector itself has not been good at
promoting itself. In the second part of the chapter the reasons why these
benefits have not been systematically harnessed are discussed, and it moves
on to consider why there has been no effective national coordinated strategy
to maximise the work for the public good. The third part draws attention to
the implicit dangers of praising the good work of security without
recognising its limitations. Given that the recent pandemic presented an
opportunity to showcase its value to a range of stakeholders, the final part
of the chapter briefly examines its performance by reporting on a study of
the views of security professionals on their work during the pandemic.
From UK the Board have made clear that our response has been
good … we have all had a huge thumbs up … From a global
security perspective, it has been a showcase to our global
leadership team. We are under a new board member; we have
impressed him with analysis and informed decisions. Security
manager, corporate sector
The way the industry has adapted and the way it has been trusted to
take lead roles … was a credit to the security industry. MD, security
supplier
There were more structural concerns too. In sectors such as the night-
time economy, often viewed as difficult to work in, and which had
effectively shut down in the pandemic, the concern was that bonafide
companies had found new markets and would be replaced by less reputable
ones undercutting and undermining legitimate business. There was a mixed
view on recruitment opportunities moving forward; certainly, some felt that
this was going to be a problem in part because security had been seen as
dangerous work.
Key though here was the view that the pandemic would be followed by
economic hardship which posed many to ponder the implications for
security which was widely seen to be one of the first to suffer cutbacks
when organisations start economising. One MD on the supplier side noted
that clients ‘don’t want to invest to get the long-term saving, they want to
shave bits off to make an instant saving’; another noted, ‘I think the long-
term consequences are financial, there will be fewer businesses so fewer
clients’. One respondent reported how a review of pay rates found a wide
range of pay scales for frontline workers for similar services leading him to
question the morals of the low-paying companies. Some felt that security’s
positive contribution had ‘already been forgotten about’:
I don’t think people have seen the value, they are invisible, at
corporate sites mostly staff are not there and only know of their own
troubles. Suppliers’ concerns will be lost. Also, they will make
cutbacks and it will impact us. What I don’t want to see is security
staff becoming cleaners. How can you do security if you’re
cleaning? Chairman, supplier
From being an industry insider yes, well. They have turned up and
worked throughout. They have maintained the service they were due
to provide. I look upon them as doing an amazing job. Looking at
public views they may not be so sure. I just don’t know whether they
saw and appreciated what was going on. Regional security lead for
a finance company
There is one other issue that merits comment here, and that is
highlighting the factors that the sample felt distinguished those who
performed well, clients and suppliers, from those who did not. The quality
of business continuity plans in place was frequently mentioned here (see
also, Gips 2021). Some had been well developed but had focussed on, say,
terrorism or cyber rather than a pandemic, and even those that had
addressed a pandemic had not planned for it being so enduring:
Those that were stronger going in, will be stronger coming out, (it
is) down to how well the business is run. MD, Security supplier
Echoing a point above there were many who viewed the pandemic as a
new base on which to build a better security sector. But if it was to do that
there were many who highlighted the need for it to overcome an Achilles
Heel, its ability to present its case effectively to influential stakeholders:
I think we’ve got to tell our client how well we are doing and
demonstrate that. Industry wide—I don’t think we advertise our
successes anyway near well enough … Only the negative stuff that
gets advertised. Account manager, Supplier
Recommended Readings
As noted, all of the chapters in this Handbook provide insights into how
good security may be generated and harnessed. Gill et al. (2015) report
original research on the broader benefits of the security sector and Gill and
Howell (2017a) on the barriers to optimising them. Thumala et al. (2011)
and Pratt (2020) are amongst many who provide important critiques of
security and the way it is sometimes practised. The Security Journal
regularly includes articles that develops these themes.
References
Allen, B. and Loyear, R. (2018) Enterprise Security Risk Management: Concepts and Applications.
Connecticut: Rothstein Publishing.
Beck, A. (2009) The New Loss Prevention: Redefining Shrinkage Management. Basingstoke:
Palgrave.
[Crossref]
Beck, H. (2012) ‘Understanding the Impact of Urban Green Space on Health and Wellbeing’. In
Atkinson, S., Fuller, S. & Painter, J. (eds) (2012) Wellbeing and Place, Ashgate: Surrey.
Brewer, R., de Vel-Palumbo, M., Hutchings, A., Holt, T., Goldsmith, A. and Maimon, D. (2019)
Cybercrime Prevention: Theory and Applications. Basingstoke: Palgrave.
[Crossref]
Burrill, D. and Green, K. (2011) Value from Security. Milton Keynes: Author House
Button, M. (2008). Doing Security - Critical Reflections and an Agenda for Change. Basingstoke:
Palgrave.
Ceccato, V. and Armitage, R. (Eds) (2018) Retail Crime: Aim, Scope, Definitions and Theoretical
Principles. Basingstoke: Palgrave.
City of London Police (2016) National Police Lead for Economic Crime, Annual Review 2015–
2016.
CONTEST (2016) The United Kingdom’s Strategy for Countering Terrorism: Annual Report for
2015. Published July 2016.
CONTEST (2015) The United Kingdom’s Strategy for Countering Terrorism: Annual Report for
2014. Published March 2015. Cm904.
CONTEST (2018) The United Kingdom’s Strategy for Countering Terrorism. Published June 2018.
Cm9608.
Dodsworth, F. (2019) The Security Society: History, Poetics, Fantasy. Basingstoke: Palgrave
[Crossref]
Dube, S. (2009) ‘Good management, sound finances, and social responsibility: Two decades of US
corporate insider perspectives on reputation and the bottom line’, Public Relations Review, 35, pp.
77–8.
[Crossref]
Felson, M. and R.V. Clarke (1998) Opportunity Makes the Thief. Police Research Series, Paper 98.
Policing and Reducing Crime Unit, Research, Development and Statistics Directorate. London:
Home Office.
Fighting Fraud and Corruption Locally Strategy (2020). A Strategy for the 2020s. A Response to
Economic Crime and Fraud. The Fighting Fraud and Corruption Locally Board.
Gill, M. (2016) Learning from Offenders: Some Iatrogenic Effects of Crime Prevention Measures.
Crime Prevention in the 21st Century: Insightful Approaches for Crime Prevention Initiatives. Edited
by Benoit Leclerc and Ernesto Savona.
Gill, M. (2015) Senior Police Officers’ Perspectives on Private Security: Sceptics, Pragmatists and
Embracers. Policing and Society. 25(3): 276–293. https://doi.org/10.1080/10439463.2013.865736.
Gill, M and Crane, S. (2015) The Role and Importance of Trust: a Study of the Conditions that
Generate and Undermine Sensitive Information Sharing. Security Journal. https://doi.org/10.1057/sj.
2015.13.
Gill, M. and Howell, C. (2017a) Towards ‘A Strategy for Change’ for the Security Sector. Tunbridge
Wells: Perpetuity Research. www.perpetuityresearch.com.
Gill, M. and Howell, C. (2017b) Police Views on Private Security. Tunbridge Wells: Perpetuity
Research. www.perpetuityresearch.com.
Gill, M. and Howell, C. (2016) Tackling Cyber Crime: the Role of Private Security. Tunbridge Wells:
Perpetuity Research. www.perpetuityresearch.com.
Gill, M. Howell, C. and Randall, A. (2015) Beyond the Protection of Assets: The Broader Benefits of
Security. Tunbridge Wells: Perpetuity Research. www.perpetuityresearch.com.
Gill, M. T., Burns-Howell, A., Keats, G. and Taylor, E. (2007) Demonstrating the Value of Security.
Tunbridge Wells: Perpetuity Research. www.perpetuityresearch.com.
Gips, M. (2021) Final Report: Resilience, Business Continuity, and COVID-19. Washington: ASIS
Foundation. https://www.asisonline.org/security-management-magazine/latest-news/online-
exclusives/2020/research/Final-Report-Resilience-Business-Continuity-and-COVID-19/.
Gonzalez, M., Casas, F., Figuer, C., Malo, S & Vinas, F. (2012) ‘Satisfaction with present safety and
Future Security as Components of Personal Wellbeing Among You People: Relationships with Other
Psychosocial Constructs’, In: Webb, D and Wills-Herrera, E (eds). (2012) Subjective Well Being and
Security, Social Indicators Research Series 46, Springer: London.
Goold, B., Loader, I. & Thumala, A. (2010) ‘Consuming security? Tools for a sociology of security
consumption’, Theoretical Criminology, 14(1), pp. 3–30, p 12.
Ha, H. Y, (2004) ‘Factors influencing consumer perceptions of brand trust online’, Journal of
Product & Brand Management, 13:5, pp. 329–342.
[Crossref]
Hamilton, C. (2019) Contagion, Counterterrorism and Criminology: Justice in the Shadow of Terror.
Basingstoke: Palgrave
[Crossref]
Hopkins, M. and Gill, M. (2017) Business, Crime and Crime Prevention: Emerging Debates and
Future Challenges. In Tilley, N. and Sidebottom, A. (eds) Handbook of Crime Prevention and
Community Safety, 2nd edition. London: Routledge.
Johnson, S., Guerette, R., and Bowers, K., (2012) ‘Crime Displacement and Diffusion of Benefits’.
In. Farrington, D. and Welsh, B. (Eds) (2012). The Oxford Handbook of Crime Prevention. Oxford,
p. 338.
Lippert, R. Walby, K. (2014) (eds) Corporate Security in the 21st Century. Basingstoke: Palgrave.
Loader, I., & Walker, N. (2007). Civilizing Security. New York: Cambridge University Press.
[Crossref]
Loader I & White A (2017) How can we better align private security with the public interest?
Towards a civilizing model of regulation. Regulation and Governance, 11(2), 166-184.
Loader I & White A (2018) Valour for Money? Contested Commodification in the Market for
Security. British Journal of Criminology, 58(6), 1401-1419.
[Crossref]
McGuire, J., Sundgren, A. & Schneeweiss, T. (1988) ‘Corporate social responsibility and firm
financial performance’, Academy of Management Journal, 31, pp. 854–72.
Moss, K. (2011) Balancing Liberty and Security: Human Rights and Human Wrongs. Basingstoke:
Palgrave.
[Crossref]
Muraszkiewicz, J. Fenton, T. and Watson, H. (2020) (Eds) Human Trafficking in Conflict - Context,
Causes and the Military. Basingstoke: Palgrave.
National Audit Office (2019) Tackling Serious and Organised Crime. Report by the Comptroller and
Auditor General. 25 June
National Fraud Strategic Authority (2011) The National Fraud Strategy: A New Approach to
Combating Fraud. London: National Fraud Strategic Authority.
National Police Chiefs’ Council (2020) National Fraud Policing Strategy 2019–2020. https://www.
cityoflondon.police.uk/SysSiteAssets/media/downloads/city-of-london/about-us/national-policing-
fraud-strategy-2019.pdf.
Ponemon Institute LLC (2011) Reputation Impact of a Data Breach: US Study of Executives &
Managers, Ponemon Institute.
Pratt, J. (2020) Intolerable Risks. The Search for Security in an Anxiety. Basingstoke: Palgrave.
Prenzler, T. (editor) (2012) Private Security in Practice: Challenges and Achievements. Basingstoke:
Palgrave.
Prenzler, T., & Sarre, R. (2014). The Role of partnerships in security management. In M. Gill (Ed.),
Handbook of security (pp. 769–790). Houndmills: Palgrave Macmillan.
[Crossref]
Renata, F., Zvjezdana, P-L. & Ljiljana, K. (2012) ‘Personal Security and Fear of Crime as Predictors
of Subjective Well-Being’. In: Webb, D & Wills-Herrera, E. (eds) Subjective Well Being and
Security, Social Indicators Research Series 46, Springer: London.
Rosmaini, T., Aliyu, A., Gafar, M., Abubakar, M., Lame, S. & Takala, J. (2013) ‘An empirical
investigation of factors influencing customer service delivery of ATM users in Malaysia: Kano’s
model approach’, Advances in Natural and Applied Sciences, 7(3), 269+.
Sarre, R., Prenzler, T., & de Caires, B. (2011). Private security and public interest: Exploring private
security trends and directions for reform in the new era of plural policing; Report to the Australian
Research Council. Sydney: Australia Security Industry Association.
Schuilenburg, M., van Steden, R. & Oude Breuil, B. (2014) A Critique of security: Towards a
positive turn in Criminology. In, Schuilenburg, M., van Steden, R. & Oude Breuil, B. (eds) Positive
Criminology: Reflections on Care, Belonging and Security. The Hague: Eleven International
Publishing.
Skidmore, M., Goldstraw-White, J., Gill, M (2020) Understanding the police response to fraud: the
challenges in configuring a response to a low-priority crime on the rise. Public Money and
Management Special Issue. Pages: 369–379 | https://doi.org/10.1080/09540962.2020.1714203.
Stenning, P. (2000) “Powers and Accountability of Private Police” European Journal on Criminal
Policy and Research 8(3): 325–352.
[Crossref]
Stiernstedt, P., Button, M., Prenzler, T.. and Sarre, R. (2019) The ‘three pillars model of regulation’: a
fusion of governance models for private security. Security Journal. https://doi.org/10.1057/s41284-
019-00224-3.
Tilley, N. (2018) Privatizing Crime Control. The Annals of the American Academy of Political and
Social Science. August. Pp55–72. https://doi.org/10.1177/0002716218775045.
Thumala A, Goold B and Loader I (2011) A tainted trade? Moral ambivalence and legitimation work
in the private security industry. British Journal of Sociology 62: 283–303.
[Crossref]
Tzafrir, S. (2005) ‘The relationship between trust, HRM practices and firm performance’,
International Journal of Human Resource Management, 19:9 September, pp. 1600–1622.
The United Kingdom’s Strategy for Countering Terrorism CONTEST: Annual Report for 2015.
Published July 2016.
The United Kingdom’s Strategy for Countering Terrorism CONTEST: Annual Report for 2014.
Published March 2015. Cm904.
UNODC. (2014). State Regulation Concerning the Civilian Private Security Services and their
Contribution to Crime Prevention and Community Safety. Vienna: United Nations Office on Drugs
and Crime.
Wall D. S. (2013) Policing Identity Crimes, Policing and Society: An International Journal of
Research and Policy, 23.4, 437–46
[Crossref]
White A (2018) What is the Privatization of Policing?. Policing: A Journal of Policy and Practice.
NOVEMBER. https://doi.org/10.1093/police/pay085.
White A (2015) The Impact of the Private Security Industry Act 2001. Security Journal, 28(4), 425–
442;
[Crossref]
White A (2014) Post-crisis Policing and Public–Private Partnerships: The Case of Lincolnshire
Police and G4S. British Journal of Criminology, 54(6), 1002–1022.
White, A. and Gill, M (2013) The Transformation of Policing: From Ratios to Rationalities. British
Journal of Criminology. 53, 1, January, pp. 74–93.
Young, L. (2006) ‘Trust: looking forward and back’, Journal of Business and Industrial Marketing,
21, 7, 439−445.
[Crossref]
Footnotes
1 The costs of security failure can put some companies out of business and result in the loss of lives.
For a recent report which highlights the costs of a cyber breach, see: CGI (2017) The Cyber Value
Connection: Revealing the Link Between Cyber Vulnerability and Company Value. The security
sector itself has not promoted the extent to which good security is economically beneficial.
https://www.cgi-group.co.uk/sites/default/files/files_uk/pdf/cybervalueconnection_full_report_
final_lr.pdf
Footnotes
1 Note: Page numbers followed by ‘n’ refer to notes.