Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: November 22, 2024 Fri

Time: 11:58 am

Results for surveillance

52 results found

Author: Priks, Mikael

Title: Do Surveillance Cameras Affect Unruly Behavior? A Close Look at Grandstands

Summary: This paper studies how surveillance cameras affect unruly spectator behavior in the highest Swedish soccer league. Swedish stadiums introduced surveillance cameras at different points in time during the years 2000 to 2001. This natural experiment provides a unique possibility to address problems regarding endogeneity, simultaneous policy interventions and displacement effects.

Details: Munich, Germany: CESifo, 2008

Source: CESifo Working Paper No. 2289

Year: 2008

Country: Sweden

URL:

Shelf Number: 115390

Keywords:
Crime
Crowd Control
Surveillance

Author: Hite, Randolph C.

Title: Secure Border Initiative: DHS Needs to address Testing and Performance Limitations that Place Key Technology Program at Risk

Summary: The U.S. Department of Homeland Security's (DHS) Secure Border Initiative Network (SBInet) is a multiyear, multibillion dollar program to deliver surveillance and decision-support technologies that create a virtual fence and situational awareness along the nation's borders with Mexico and Canada. This report examines the effectiveness of this program and makes recommendations to the Department of Homeland Security related to the content, review and approval of test planning documentation and the analysis, disclosure, and resolution of system problems.

Details: Washington, DC: U.S. Government Accountability Office

Source: Internet Resource; GAO-10-158

Year: 0

Country: United States

URL:

Shelf Number: 113577

Keywords:
Border Security
Surveillance

Author: Welsh, Brandon C.

Title: Effectiveness of Public Area Surveillance for Crime Prevention: Security Guards, Place Managers and Defensible Space

Summary: This report presents a systematic review of the effects of surveillance of public spaces by security guards, place mangers and measures to stimulate so called defensible space. Studies were included in these systematic reviews if the surveillance measure in question (i.e., security guards, place managers, and defensible space) was the main focus of the intervention; if there was an outcome measure of crime; if the evaluation design was of high methodological quality, with the minimum design involving before-and-after measures of crime in experimental and comparable control areas; and if the total number of crimes in each area before the intervention was at least 20. The reviews revealed generally encouraging results across the three different types of public area surveillance. There is fairly strong and consistent evidence that the defensible space technique of street closures or barricades is effective in preventing crime in inner-city neighborhoods. Less conclusive statements can be made about the effectiveness of security guards and place managers. This has everything to do with the small number of high quality evaluations that have been carried out on these measures. In the case of security guards, the weight of the evidence suggests that it is a promising technique of formal surveillance when implemented in car parks and targeted at vehicle crimes. The surveillance technique of place managers appears to be of unknown effectiveness in preventing crime in public places. Implications for policy and research are explored.

Details: Stockholm: Brottsforebyggande radet (Swedish National Council for Crime Prevention), 2010. 45p.

Source: Internet Resource: Accessed August 25, 2010 at: http://www.bra.se/extra/measurepoint/?module_instance=4&name=Effectiviness_of_Public_Area_Surveillance_for_Crime_Prevention.pdf&url=/dynamaster/file_archive/100309/0a3ceabb221375f51f9a82824942a662/Effectiviness%255fof%255fPublic%255fArea%255fSurveillance%255ffor%255fCrime%255fPrevention.pdf

Year: 2010

Country: International

URL: http://www.bra.se/extra/measurepoint/?module_instance=4&name=Effectiviness_of_Public_Area_Surveillance_for_Crime_Prevention.pdf&url=/dynamaster/file_archive/100309/0a3ceabb221375f51f9a82824942a662/Effectiviness%255fof%255fPub

Shelf Number: 119684

Keywords:
Aggression
Crime Prevention
Crime Prevention through Environmental Design
Drug Abuse and Addiction
Drug Abuse and Crime
Methamphetamine (Australia)
Private Security
Surveillance

Author: Haugaard, Lisa

Title: Far Worse than Watergate: Widening Scandal Regarding Colombia's Intelligence Agency

Summary: This report reveals the inside story about a wiretapping scandal in Colombia. It documents how the Colombian government’s intelligence agency not only spied upon major players in Colombia’s democracy—from Supreme Court and Constitutional Court judges to presidential candidates, from journalists and publishers to human rights defenders, unions and faith-based organizations, from international organizations to U.S. and European human rights groups—but also carried out dirty tricks, and even death threats, to undermine their legitimate, democratic activities.

Details: Washington, DC: Latin America Working Group Education Fund; U.S. Office on Colombia; Center for International Policy; Washington Office on Latin America, 2010. 12p.

Source: Internet Resource: Accessed September 21, 2010 at:

Year: 2010

Country: Colombia

URL:

Shelf Number: 119841

Keywords:
Corruption
Surveillance
Wiretaps

Author: Verga, Simona

Title: Closed-Circuit TV Surveillance Evaluation: Statistical Analysis of the Effects on Rates of Crime

Summary: This paper reports on the statistical analysis conducted on crime data provided by the Toronto Police Services in order to assess the impact on crime after implementing the Closed Circuit Television (CCTV) pilot initiative. Over the period May 2007 to October 2008, the Toronto Police Services installed CCTV cameras in a number of selected areas for periods of time between six months and one year. This report documents the results of the application of standard statistical techniques to determine the effectiveness of surveillance cameras in reducing crime, and compares them with findings from previous research studies. The analysis is based on data derived from the Toronto Police Services call-for-service ACCESS database, a comprehensive, geo-coded database that includes all records of demands for policing services involving events of a violent nature from 1995. This report addresses questions related to crime reduction in the targeted areas and diffusion of benefits beyond the targeted areas, and makes some general considerations about displacement and dispersion.

Details: Ottawa: Defence Research and Development Canada, Centre for Security Science, 2010. 54p.

Source: Internet Resource: DRDC CSS TR 2010-09: Accessed August 31, 2011: http://pubs.drdc.gc.ca/inbasket/mmgreene.110105_1359.DRDC%20CSS%20TR%202010-09_A1b.pdf

Year: 2010

Country: Canada

URL: http://pubs.drdc.gc.ca/inbasket/mmgreene.110105_1359.DRDC%20CSS%20TR%202010-09_A1b.pdf

Shelf Number: 122574

Keywords:
Closed-Circuit Television (Toronto)
Displacement
Situational Crime Prevention
Surveillance

Author: Kleinig, John

Title: Security and Privacy: Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

Summary: This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study is to establish an acceptable and sustainable equilibrium between two central moral values in contemporary liberal democracies, namely, security and privacy. Both values are essential to individual liberty but they come into conflict in times when civil order is threatened, as has been the case from late in the twentieth century, with the advent of global terrorism and transnational crime. We seek to articulate legally sustainable, politically possible and technologically feasible global ethical standards1 for identity management technology and policies in liberal democracies in the contemporary global security context. Although the standards in question are to be understood as global ethical standards potentially to be adopted not only by the United States (US) but also by the European Union (EU), India, Australasia and other contemporary liberal democratic states, we take as our primary focus the tensions that have arisen between the US and the EU. This tension provides a good example of the kinds of challenges involved in developing global standards. It is exemplified by the 2006 disclosure concerning the US government’s access to SWIFT transactions and the controversy that has followed it, as well as the earlier and ongoing controversy over the 2004 US–EU Passenger Names Records (PNR) agreement. It also makes itself known in the ongoing debate over national identity cards. The first two conflicts make it clear that, however difficult it may be to develop global standards for the management of personal data, such standards are needed and that every effort should be made to develop them or at least to implement procedures for addressing conflicts among them. Naturally, authoritarian states do not share the liberal values underlying this project – values such as individual autonomy and privacy. Nevertheless, to the extent that such authoritarian states are evolving or are likely to evolve toward some form of liberal democracy, the results of this study will also be relevant to these states. Our purpose is to articulate standards and institutional initiatives that are sufficiently specific to determine – or at least substantially constrain – the requisite detailed security and privacy policies and prescriptions in national as well as international and transnational jurisdictions. The project distinguishes itself from other work in this field in two major respects. Firstly, the multi-disciplinary team of experts brought together for this project has enabled the integration of: (a) ethical principles, (b) national and international legal considerations, (c) effective law enforcement practices, (d) oversight and accountability concerns and (e) knowledge of existing and emerging technology, such as database mining and knowledge discovery technology, in the development of a framework of determinate and feasible ethical standards for identity management technology in the global security context. Secondly, the study has drawn on an international team of experts and focuses on common international standards and solutions, as befits the trans-jurisdictional and transnational nature of the problems to be addressed. Specifically, the project involves not only US personnel and institutions but also EU, Indian, and Australasian expertise.

Details: Canberra: ANU E Press, The Australian National University, 2011. 291p.

Source: Internet Resource: Practical Ethics and Public Policy Monograph 2: Accessed February 27, 2012 at: http://epress.anu.edu.au/apps/bookworm/view/Security+and+Privacy%3A+Global+Standards+for+Ethical+Identity+Management+in+Contemporary+Liberal+Democratic+States/8021/Text/cover.html

Year: 2011

Country: International

URL: http://epress.anu.edu.au/apps/bookworm/view/Security+and+Privacy%3A+Global+Standards+for+Ethical+Identity+Management+in+Contemporary+Liberal+Democratic+States/8021/Text/cover.html

Shelf Number: 124293

Keywords:
Privacy and Ethics
Surveillance
Terrorism
Transnational Crime

Author: Hayes, Ben

Title: Borderline- The EU’s New Border Surveillance Initiatives, Assessing the Costs and Fundamental Rights Implications of EUROSUR and the ‘Smart Borders’ Proposals

Summary: This research paper ‘Borderline’ examines two new EU border surveillance initiatives: the creation of a European External Border Surveillance System (EUROSUR) and the creation of the so-called ‘smart borders package’…. EUROSUR promises increased surveillance of the EU’s sea and land borders using a vast array of new technologies, including drones (unmanned aerial vehicles), off-shore sensors, and satellite tracking systems. The EU’s 2008 proposals gained new momentum with the perceived ‘migration crisis’ that accompanied the ‘Arab Spring’ of 2011, which resulted in the arrival of thousands of Tunisians in France. These proposals are now entering a decisive phase. The European Parliament and the Council have just started negotiating the legislative proposal for the EUROSUR system, and within months the Commission is expected to issue formal proposals for the establishment of an [Entry-Exit System] and [Registered Traveller Programme]. The report is also critical of the decision-making process. Whereas the decision to establish comparable EU systems such as EUROPOL and FRONTEX were at least discussed in the European and national parliaments, and by civil society, in the case of EUROSUR – and to a lesser extent the smart borders initiative – this method has been substituted for a technocratic process that has allowed for the development of the system and substantial public expenditure to occur well in advance of the legislation now on the table. Following five years of technical development, the European Commission expects to adopt the legal framework and have the EUROSUR system up and running (albeit in beta form) in the same year (2013), presenting the European Parliament with an effective fait accomplit.

Details: Berlin: Heinrich-Boll-Stiftung, 2012. 83p.

Source: Internet Resource: Accessed July 18, 2012 at: http://www.boell.de/downloads/DRV_120523_BORDERLINE_-_Border_Surveillance.pdf

Year: 2012

Country: Europe

URL: http://www.boell.de/downloads/DRV_120523_BORDERLINE_-_Border_Surveillance.pdf

Shelf Number: 125618

Keywords:
Border Security (Europe)
Immigrants
Immigration
Surveillance

Author: Thompson II, Richard M.

Title: Drones in Domestic Surveillance Operations: Fourth Amendment Implications and Legislative Responses

Summary: The prospect of drone use inside the United States raises far-reaching issues concerning the extent of government surveillance authority, the value of privacy in the digital age, and the role of Congress in reconciling these issues. Drones, or unmanned aerial vehicles (UAVs), are aircraft that can fly without an onboard human operator. An unmanned aircraft system (UAS) is the entire system, including the aircraft, digital network, and personnel on the ground. Drones can fly either by remote control or on a predetermined flight path; can be as small as an insect and as large as a traditional jet; can be produced more cheaply than traditional aircraft; and can keep operators out of harm’s way. These unmanned aircraft are most commonly known for their operations overseas in tracking down and killing suspected members of Al Qaeda and related organizations. In addition to these missions abroad, drones are being considered for use in domestic surveillance operations, which might include in furtherance of homeland security, crime fighting, disaster relief, immigration control, and environmental monitoring. Although relatively few drones are currently flown over U.S. soil, the Federal Aviation Administration (FAA) predicts that 30,000 drones will fill the nation’s skies in less than 20 years. Congress has played a large role in this expansion. In February 2012, Congress enacted the FAA Modernization and Reform Act (P.L. 112-95), which calls for the FAA to accelerate the integration of unmanned aircraft into the national airspace system by 2015. However, some Members of Congress and the public fear there are insufficient safeguards in place to ensure that drones are not used to spy on American citizens and unduly infringe upon their fundamental privacy. These observers caution that the FAA is primarily charged with ensuring air traffic safety, and is not adequately prepared to handle the issues of privacy and civil liberties raised by drone use. This report assesses the use of drones under the Fourth Amendment right to be free from unreasonable searches and seizures. The touchstone of the Fourth Amendment is reasonableness. A reviewing court’s determination of the reasonableness of drone surveillance would likely be informed by location of the search, the sophistication of the technology used, and society’s conception of privacy in an age of rapid technological advancement. While individuals can expect substantial protections against warrantless government intrusions into their homes, the Fourth Amendment offers less robust restrictions upon government surveillance occurring in public places and perhaps even less in areas immediately outside the home, such as in driveways or backyards. Concomitantly, as technology advances, the contours of what is reasonable under the Fourth Amendment may adjust as people’s expectations of privacy evolve. In the 112th Congress, several measures have been introduced that would restrict the use of drones at home. Senator Rand Paul and Representative Austin Scott introduced the Preserving Freedom from Unwarranted Surveillance Act of 2012 (S. 3287, H.R. 5925), which would require law enforcement to obtain a warrant before using drones for domestic surveillance, subject to several exceptions. Similarly, Representative Ted Poe’s Preserving American Privacy Act of 2012 (H.R. 6199) would permit law enforcement to conduct drone surveillance pursuant to a warrant, but only in investigation of a felony.

Details: Washington, DC: Congressional Research Services, 2012. 23p.

Source: CRS Report R42701: Internet Resource: Accessed September 13, 2012 at http://www.fas.org/sgp/crs/natsec/R42701.pdf

Year: 2012

Country: United States

URL: http://www.fas.org/sgp/crs/natsec/R42701.pdf

Shelf Number: 126334

Keywords:
Covert Surveillance, Drones
Fourth Amendment
Legislation
Surveillance
Surveillance Techniques

Author: Brooke, Sandra

Title: Surveillance and Enforcement of Remote Maritime Areas (SERMA): Surveillance Technical Options

Summary: Some of the most pristine marine ecosystems remaining on earth are in remote areas far from human population centers, both within national jurisdiction or beyond, on the high seas. Unfortunately even these areas are under pressure from the effects of human activities. Recognizing this, many countries have begun to manage activities in remote maritime areas as well as seeking to conserve areas of high ecological value through the establishment of marine protected areas. In recent years some very large offshore protected areas have been established within national EEZs and in addition some are now also being established on the high seas, through the efforts of several international organizations. Without effective enforcement however, these remote managed areas will remain no more than paper management plans and paper parks. Surveillance and enforcement is more challenging in large, remote areas than for near‐shore MPAs as they are often far from populated land, and therefore difficult to reach with traditional manned patrols, radar or other short‐range monitoring tools. Advanced technologies have been used successfully for surveillance of large areas, and there is great potential for expansion; however an associated response by law enforcement personnel is still essential to confirm and prosecute violations. Combining surveillance technologies into a single enforcement package has considerable cost‐saving potential and is emphasized throughout this report. Additionally, the obvious and targeted presence of law enforcement reduces attempted infractions since there is a perceived significant risk of being caught. This document reviews and evaluates a range of existing technological options for the surveillance of remote marine managed areas. Some of these technologies are currently in use by fisheries management agencies; some are currently the purview of groups like the military or security agencies; and others have hitherto been unexplored for such purposes. As commercial fishing (regulated or otherwise) is the single greatest pressure to most remote marine ecosystems, followed by vessel‐based pollution, we pay particular attention to technologies for the monitoring of such activities. The paper initially discusses surveillance technologies for cooperative vessels; that is, those that are participating in a managed activity where monitoring systems are obligatory. The majority of the paper however describes the range of sensors and platforms that can be applied to the more challenging task of monitoring non‐cooperative vessels. Surveillance technologies alone are insufficient to ensure compliance, but they are a necessary component. This first paper in the series does not look at questions of integrating surveillance technologies into an enforcement regime; neither does it consider issues improving compliance. These are clearly key issues, and we anticipate giving these issues the space they deserve in subsequent publications.

Details: Seattle, WA: Marine Conservation Biology Institute, USA, 2010. 41p.

Source: Internet Resource: Accessed October 13, 2012 at http://www.marine-conservation.org/media/filer_public/2011/09/19/serma_tech-options_v12.pdf

Year: 2010

Country: International

URL: http://www.marine-conservation.org/media/filer_public/2011/09/19/serma_tech-options_v12.pdf

Shelf Number: 126691

Keywords:
Environmental Crime
Maritime Security
Offenses Against the Environment
Surveillance

Author: Brooke, Sandra

Title: Review of Surveillance and Enforcement of Federal Fisheries in the Southeastern U.S.

Summary: Over the past several decades, there has been a significant increase in the number of marine protected areas including those that are remote from shore and cover large areas of the US Exclusive Economic Zone (EEZ). The large size of the areas and the complex assortment of regulations within them pose many challenges to policy-makers and resource managers. One of the greatest challenges is monitoring activity in these areas and enforcing regulations so that the designated areas are truly protecting the resources and are not merely ‘paper parks’. The overarching objective of this project entitled ‘Review of surveillance and enforcement of federal fisheries in the southeastern US’ was to increase the effectiveness of resource protection within the South Atlantic Fishery Management Council (SAFMC) boundaries through identification of potential improvement of monitoring and enforcement. The Marine Conservation Institute, in collaboration with the law enforcement and management agencies within the SAFMC region, has identified surveillance and enforcement challenges and suggests a series of recommendations for addressing some of these problems. Selected recommendations are listed briefly below and are described in more detail in the full report.

Details: Seattle, WA: Marine Conservation Biology Institute, 2011. 47p.

Source: Internet Resource: Accessed October 13, 2012 at http://www.marine-conservation.org/media/filer_public/2012/03/23/safmc_serma_final_report.pdf

Year: 2011

Country: United States

URL: http://www.marine-conservation.org/media/filer_public/2012/03/23/safmc_serma_final_report.pdf

Shelf Number: 126693

Keywords:
Fisheries
Maritime Crime
Maritime Security
Ocean Management
Surveillance
Wildlife Crime

Author: The Muslim American Civil Liberties Coalition (MACLC), The Creating Law Enforcement Accountability & Responsibility (CLEAR), The Asian American Legal Defense and Education Fund (AALDEF),

Title: Mapping Muslims: NYPD Spying and its Impact on American Muslims

Summary: Since 2001, the New York City Police Department (NYPD) has established a secret surveillance program that has mapped, monitored and analyzed American Muslim daily life throughout New York City, and even its surrounding states. In 2011, the unveiling of this program by the Associated Press (AP) and other journalists1 who had obtained leaked internal NYPD documents led to an outcry from public officials, civil rights activists, American Muslim religious leaders, and members of the public. Protesters and advocates held that such racial and religious profiling was not only an example of ineffective policing and wasteful spending of taxpayer dollars, but it also marginalized and criminalized a broad segment of American Muslims. Almost a year later, in August 2012, the Chief of the NYPD Intelligence Division, Lt. Paul Galati admitted during sworn testimony that in the six years of his tenure, the unit tasked with monitoring American Muslim life had not yielded a single criminal lead.2 Proponents of the sprawling surveillance enterprise have argued that, regardless of its inefficacy, mere spying on a community is harmless because it is clandestine and that those who are targeted should have nothing to fear, if they have nothing to hide. Our findings, based on an unprecedented number of candid interviews with American Muslim community members, paint a radically different picture. We have found that surveillance of Muslims’ quotidian activities has created a pervasive climate of fear and suspicion, encroaching upon every aspect of individual and community life. Surveillance has chilled constitutionally protected rights—curtailing religious practice, censoring speech and stunting political organizing. Every one of our interviewees noted that they were negatively affected by surveillance in some way - whether it was by reducing their political or religious expression, altering the way they exercised those rights (through clarifications, precautions, or avoiding certain interlocutors), or in experiencing social and familial pressures to reduce their activism. Additionally, surveillance has severed the trust that should exist between the police department and the communities it is charged with protecting. Section One of the findings highlights the impact of NYPD surveillance on religious life and expression. Interviewees felt that the NYPD’s spotlight on American Muslims’ practice of their faith, their degree of religiosity and their places of worship disrupted and suppressed their ability to practice freely. Many also indicated that within heterogeneous Muslim communities, this has resulted in the suppression of certain practices of Islam more than others. Interviews also highlighted the atmosphere of tension, mistrust and suspicion that permeates Muslim religious places – which the NYPD has infiltrated with informants and undercover agents, deeming them “hot spots.” These law enforcement policies have deeply affected the way Muslim faith is experienced and practiced in New York City. Section Two documents how NYPD surveillance has chilled American Muslims’ freedom of speech. Interviewees noted a striking self-censorship of political speech and activism. Conversations relating to foreign policy, civil rights and activism are all deemed off-limits as interviewees fear such conversations would draw greater NYPD scrutiny. This same fear has deterred mobilization around Muslim civil rights issues, and quelled demands for law enforcement accountability. Parents discourage their children from being active in Muslim student groups, protests, or other activism, believing that these activities would threaten to expose them to government scrutiny. Surveillance has also led to a qualitative shift in the way individuals joke, the types of metaphors they use, and even the sort of coffee house chatter in which they engage. Since 2001, the New York City Police Department (NYPD) has established a secret surveillance program that has mapped, monitored and analyzed American Muslim daily life throughout New York City, and even its surrounding states. In 2011, the unveiling of this program by the Associated Press (AP) and other journalists1 who had obtained leaked internal NYPD documents led to an outcry from public officials, civil rights activists, American Muslim religious leaders, and members of the public. Protesters and advocates held that such racial and religious profiling was not only an example of ineffective policing and wasteful spending of taxpayer dollars, but it also marginalized and criminalized a broad segment of American Muslims. Almost a year later, in August 2012, the Chief of the NYPD Intelligence Division, Lt. Paul Galati admitted during sworn testimony that in the six years of his tenure, the unit tasked with monitoring American Muslim life had not yielded a single criminal lead.2 Proponents of the sprawling surveillance enterprise have argued that, regardless of its inefficacy, mere spying on a community is harmless because it is clandestine and that those who are targeted should have nothing to fear, if they have nothing to hide. Our findings, based on an unprecedented number of candid interviews with American Muslim community members, paint a radically different picture. We have found that surveillance of Muslims’ quotidian activities has created a pervasive climate of fear and suspicion, encroaching upon every aspect of individual and community life. Surveillance has chilled constitutionally protected rights—curtailing religious practice, censoring speech and stunting political organizing. Every one of our interviewees noted that they were negatively affected by surveillance in some way - whether it was by reducing their political or religious expression, altering the way they exercised those rights (through clarifications, precautions, or avoiding certain interlocutors), or in experiencing social and familial pressures to reduce their activism. Additionally, surveillance has severed the trust that should exist between the police department and the communities it is charged with protecting. Section One of the findings highlights the impact of NYPD surveillance on religious life and expression. Interviewees felt that the NYPD’s spotlight on American Muslims’ practice of their faith, their degree of religiosity and their places of worship disrupted and suppressed their ability to practice freely. Many also indicated that within heterogeneous Muslim communities, this has resulted in the suppression of certain practices of Islam more than others. Interviews also highlighted the atmosphere of tension, mistrust and suspicion that permeates Muslim religious places – which the NYPD has infiltrated with informants and undercover agents, deeming them “hot spots.” These law enforcement policies have deeply affected the way Muslim faith is experienced and practiced in New York City. Section Two documents how NYPD surveillance has chilled American Muslims’ freedom of speech. Interviewees noted a striking self-censorship of political speech and activism. Conversations relating to foreign policy, civil rights and activism are all deemed off-limits as interviewees fear such conversations would draw greater NYPD scrutiny. This same fear has deterred mobilization around Muslim civil rights issues, and quelled demands for law enforcement accountability. Parents discourage their children from being active in Muslim student groups, protests, or other activism, believing that these activities would threaten to expose them to government scrutiny. Surveillance has also led to a qualitative shift in the way individuals joke, the types of metaphors they use, and even the sort of coffee house chatter in which they engage. transparency, and accountability when it comes to the NYPD has never been greater.

Details: New York: The Muslim American Civil Liberties Coalition (MACLC), The Creating Law Enforcement Accountability & Responsibility (CLEAR), The Asian American Legal Defense and Education Fund (AALDEF), 2013. 56p.

Source: Internet Resource: Accessed April 9, 2013 at: http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf

Year: 2013

Country: United States

URL: http://www.law.cuny.edu/academics/clinics/immigration/clear/Mapping-Muslims.pdf

Shelf Number: 128325

Keywords:
American Muslims (New York City, U.S.)
Civil Rights
Minority Groups
Racial Profiling in Law Enforcement
Surveillance

Author: Smith, Michael L.

Title: Regulating Law Enforcement's Use of Drones: The Need for State Legislation

Summary: The recent rise of domestic drone technology has prompted privacy advocates and members of the public to call for the regulation of the use of drones by law enforcement officers. Numerous states have proposed legislation to regulate government drone use, and thirteen have passed laws that restrict the use of drones by law enforcement agencies. Despite the activity in state legislatures, commentary on the drones tends to focus on how courts, rather than legislative bodies, can restrict the government's use of drones. Commentators call for wider Fourth Amendment protections that would limit government surveillance. In the process, in-depth analysis of state drone regulations has fallen by the wayside. In this article, I take up the task of analyzing and comparing state laws regulating the government's use of drones. While the oldest of these laws was enacted in 2013, the thirteen laws passed so far exhibit wide variations and noteworthy trends. I survey this quickly-expanding list of laws, note which regulations are likely to constrain government drone use, and identify laws that provide only the illusion of regulation. I advance the thesis that the judiciary is ill-suited to address the rapidly-developing area of drone technology. Long-established Supreme Court precedent leaves the judiciary with very little power to curtail government drone use. And were the judiciary to attempt the task of restricting law enforcement's use of drones, the solutions proposed would likely be imprecise, unpredictable, and difficult to reverse. In light of these concerns, privacy advocates and law enforcement agencies alike should support the regulation of government drone use by state legislatures, and should look to existing laws in determining what regulations are ideal.

Details: Los Angeles: University of California, Los Angeles (UCLA) - School of Law, 2014. 31p.

Source: Internet Resource: Accessed September 9, 2014 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2492374

Year: 2014

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2492374

Shelf Number: 133186

Keywords:
Covert Surveillance, Drones (U.S.)
Drones
Fourth Amendment
Legislation
Surveillance
Surveillance Techniques

Author: Haines, Alina

Title: The role of automatic number plate recognition surveillance within policing and public reassurance

Summary: This Thesis examines the role that Automatic Number Plate Recognition surveillance plays within policing and public reassurance. The thesis is improvement orientated, exploring how ANPR could become a more effective policing tool and highlights implications for future policies and practice. The first two chapters set the context for the research, explaining what ANPR is, its place within criminology and gaps in research addressed in the Thesis. The literature review calls for a better understanding of ANPR's potential and role as an investigative tool and an examination of the public's views about ANPR surveillance. In the third chapter, reference is made to available methods used to address such objectives. Chapters Four, Five and Six present the results emerging from the empirical work in this Thesis. Chapter Four is concerned with police perceptions regarding current ANPR practice. The thesis highlights the complexity of translating policy into practice in the current political and economic climate, where objectives and priorities dictated by the government are constantly shifting. Continuing its improvement orientation, Chapter Five covers public perceptions about ANPR and outlines ways to address the balance between privacy and security without endangering both. The potential impact of ANPR on crime and ways to measure it is the topic of Chapter Six, which argues that establishing a causal link between ANPR and crime is not a straightforward process. The concluding chapter talks about the implications of the study and any interesting future avenues for research. The emerging findings from this research sit uncomfortably with the opinions and predictions of both supporters and opponents of ANPR alike and shed light not only on the management and use of ANPR by the police in Britain, but also on many of the ethical issues raised by the emergence of new surveillance technologies.

Details: Huddersfield, UK: University of Huddersfield, 2009. 335p.

Source: Internet Resource: Dissertation: Accessed January 29, 2015 at: http://eprints.hud.ac.uk/8760/1/FinalThesis.pdf

Year: 2009

Country: United Kingdom

URL: http://eprints.hud.ac.uk/8760/1/FinalThesis.pdf

Shelf Number: 134488

Keywords:
Automatic Number Plate Recognition (U.K.)
Police Technology
Surveillance

Author: Mateescu, Alexandra

Title: Police Body-Worn Cameras

Summary: Police Body-Worn Cameras breaks down what's known - and not known - about the promises, perils, and potential best practices around police body-worn cameras. Both law enforcement and civil rights advocates are excited by the potential of body-worn cameras to improve community policing and safety, but there is no empirical research to conclusively suggest that these will reduce the deaths of black male civilians in encounters with police. There are some documented milder benefits evident from small pilot studies, such as more polite interactions between police and civilians when both parties are aware they are being recorded, and decreased fraudulent complaints made against officers. Many uncertainties about best practices of body-worn camera adoption and use remain, including when the cameras should record, what should be stored and retained, who should have access to the footage, and what policies should determine the release of footage to the public. As pilot and permanent body-worn camera programs are implemented, it is important to ask questions about how they can be best used to achieve their touted goals. How will the implementation of these programs be assessed for their efficacy in achieving accountability goals? What are the best policies to have in place to support those goals?

Details: New York: Data & Society Research Institute, 2015. 40p.

Source: Internet Resource: Working Paper: Accessed March 12, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2569481

Year: 2015

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2569481

Shelf Number: 134919

Keywords:
Body-Worn Cameras
Law Enforcement Technology (U.S.)
Police Accountability
Police Behavior
Police Technology
Police-Citizen Interactions
Police-Community Relations
Surveillance
Video Technology

Author: Ellis, Tom

Title: Body-Worn Video: Evaluation of the Introduction of Personal Issue Body Worn Video Cameras (Operation Hyperion) on the Isle of Wight: Final Report to Hampshire Constabulary

Summary: This study evaluated the impact of issuing all police officers on the Isle of Wight with Body Worn Video (BWV) cameras on 1 July 2013. It is based mainly on a series of measures in the year prior to camera issue compared to the same measures in the year after issue. These measures included data on changes in: public opinion; occurrences and crime; criminal justice processes (domestic assault) and complaints against police. In addition, there was also survey of IoW officers' views on BWV cameras and observational fieldwork. Isle of Wight public opinion on police BWV cameras - The Isle of Wight (IoW) public's trust in police to record all appropriate incidents with cameras is very high - 58% were aware of cameras after personal issue which was significantly higher than 26% in the period immediately before - Only 11% of residents in the "before" period had seen a police officer using BWV cameras which significantly increased to 29% in the "after" period - There was an overwhelmingly positive (84-96%) public attitude toward police use of cameras in: - gathering evidence - identifying criminals - increasing convictions - improving training - improving disciplinary procedures - Before personal issue, IoW public was less convinced cameras would reduce: complaints against the police; assaults on police; and crime and ASB. All ratings significantly improved after the roll out of personal issue BWV cameras - There was a significant rise (to 82%) in IoW public belief that all uniformed officers should use cameras. Isle of Wight Police Officers' views on BWV camera use - Officers' views on BWV cameras, where comparable, largely coincided with those of IoW public - IoW officers had significantly lower confidence than the public in cameras reducing assaults on police, but significantly higher confidence in them reducing complaints against them - Frontline officers were significantly more positive than non-frontline (mainly investigative) officers in valuing the deployment of personal issue BWV cameras on the IoW - The vast majority of officers agreed that all PCSOs should wear BWVs when on duty.

Details: Portsmouth, UK: University of Portsmouth, Institute of Criminal Justice Studies, 2015. 75p.

Source: Internet Resource: Accessed May 6, 2015 at: http://www.bwvsg.com/wp-content/uploads/2015/03/Ellis-Evaluation-Worn-Cameras.pdf

Year: 2015

Country: United Kingdom

URL: http://www.bwvsg.com/wp-content/uploads/2015/03/Ellis-Evaluation-Worn-Cameras.pdf

Shelf Number: 135526

Keywords:
Assaults
Body-Worn Cameras (U.K.)
Complaints Against Police
Disorderly Conduct
Police Technology
Public Opinion
Surveillance
Video Cameras

Author: Miethe, Terance D.

Title: Public Attitudes about Aerial Drone Activities: Results of a National Survey

Summary: Unmanned Aerial Vehicles (UAVs) or Unmanned Aircraft Systems (UAS), commonly known as "drones," collect information and provide visual monitoring of activities in a variety of public and private settings. These free-flying aircraft are controlled by remote and digital technology. Six states (Alaska, New York, Nevada, North Dakota, Texas, and Virginia) have been federally designated as test sites for identifying operational and safety issues associated with drone technology. Although several national opinion polls have been conducted over the last several years on drone use for military purposes, less is known about public attitudes and support for drone usage in other contexts. These additional contexts for drone applications include land use patterns, geographical/climatic photo mapping, crowd management, and specific areas within criminal justice (e.g., border patrols, detecting traffic violators, home and business security). Due to the recent and dramatic growth in media attention to drone technology, it is important to establish an empirical baseline of the current level of public knowledge and attitudes about aerial drone usage to track future changes in the public's acceptance of this emerging technology. This Research in Brief summarizes the results of multiple national surveys of public knowledge and support of the use of aerial drone technology in a variety of public and private settings. It is based on samples of 636 U.S. adult citizens who completed internet surveys in the first week of June 2014. A summary of the results, demographic factors associated with levels of awareness and support for drone usage, the public policy implications of these findings, and limitations of this study are described.

Details: Las Vegas: University of Nevada at Las Vegas, Center for Crime and Justice Policy, 2014. 8p.

Source: Internet Resource: Research in Brief: Accessed May 21, 2015 at: http://www.unlv.edu/sites/default/files/page_files/3/Public-Attitudes-About-Aerial.pdf

Year: 2014

Country: United States

URL: http://www.unlv.edu/sites/default/files/page_files/3/Public-Attitudes-About-Aerial.pdf

Shelf Number: 135753

Keywords:
Aerial Drones
Drones
Privacy
Public Opinion
Surveillance

Author: Lieberman, Joel D.

Title: Aerial Drones, Domestic Surveillance, and Public Opinion of Adults in the United States

Summary: HIGHLIGHTS - Over 95% of U.S. adults in this survey are opposed to using drones to monitor people's daily activities around their home. The majority of respondents are also opposed to drones monitoring people at work (77%) and in their daily activities in open public places (63%). - Public attitudes about using drones for domestic surveillance vary across different social groups. For surveillance in both public and private places, opposition to drone use is highest among persons with lower incomes and those who emphasize individualism (i.e., prefer a government that focuses on individual rights over public safety). - A strong majority of respondents agreed that drone surveillance is an invasion of privacy, especially when it occurs around the home (88%) or at work (79%). High levels of agreement across context were also found in people's views of drones as "excessive surveillance." These two concerns were the major reasons for opposition to domestic surveillance by drones. - A belief that drones increase public safety is the primary reason given by respondents who support their use for domestic surveillance. This is especially true for public opinion about the government's use of drones in open public places. - Respondents were most supportive of drone use for surveillance in open public places when it was being conducted by a federal government agency (33% supported this activity), followed by state and local police (28%), mass media (18%), commercial business (14%), and private citizens (13%).

Details: Las Vegas: University of Nevada at Las Vegas, Center for Crime and Justice Policy, 2014. 8p.

Source: Internet Resource: Accessed May 21, 2015 at: http://www.unlv.edu/sites/default/files/page_files/3/Aerial-Drones.pdf

Year: 2014

Country: United States

URL: http://www.unlv.edu/sites/default/files/page_files/3/Aerial-Drones.pdf

Shelf Number: 135754

Keywords:
Aerial Drones
Privacy
Public Opinion
Public Places
Surveillance

Author: Cortes, Carlos

Title: Communications Surveillance in Colombia: The Chasm between Technological Capacity and the Legal Framework

Summary: Last year, media outlets revealed that the National Police of Colombia would operationalize the Single Platform for Monitoring and Analysis (Plataforma Uinica de Monitoreo y Anailisis, or PUMA), through which it would be able to intercept "what is spoken, written or sent from e-mails, Facebook, Twitter, Line, Viber, Skype, and, in short, any type of communication undertaken via the internet." More recently, last February, Semana magazine revealed that the military was reviewing e-mails and chats of those involved in the peace talks in Havana, Cuba. In both cases, the government put its spin on the news. In the first case, the government presented PUMA as nothing more than the replacement of an older system, and stressed that it would be subject to legal controls. In the second, the Colombian president quickly announced the formation of a commission to develop the country's policy on cybersecurity and cyberdefense. Nonetheless, the underlying issues remain unsolved. What is, in the end, the technical capacity of PUMA? Is it possible to review anyone's e-mails? Can the military access someone's chat history? Is intercepting a phone call the same thing as intercepting internet traffic? Although new scandals regarding state intelligence emerge periodically in Colombia, the state never clarifies how intelligence works in practice or what controls exist for its exercise. Meanwhile, as time moves on, intelligence schemes grow more sophisticated along with our cell phones and computers. An analog rotary-dial telephone is as obsolete as "crocodile cables" used to intercept calls. Nonetheless, as the market facilitates the process of obsolescence and the incorporation of new massive technologies, it tells us little about the devices that are simultaneously developed to monitor individuals. Technological changes tend to alter long-established assumptions regarding the reach of specific rights. Privacy is arguably the right that faces the most challenges in the digital environment. Yet regulatory and jurisprudential lacunae persist in terms of how technology affects the exercise of fundamental rights. The cases of PUMA and the military's spying on peace negotiators occurred soon after Colombia's adoption of its new Intelligence Law, which, in theory, corrects previous irregularities and aligns with modern surveillance. But is this truly the case? Do we have a regulation that preserves national security without compromising citizens' privacy and freedom of expression, among other rights? The goal of this book is to examine the Colombian legal and jurisprudential framework regarding communications surveillance in light of today's technologies. Phrased in the form of a hypothesis, the purpose is to demonstrate how intelligence-related laws and jurisprudence fail to ensure that potentially affected rights remain intact. To test this hypothesis, I address several aspects of the country's Intelligence Law that I selected somewhat arbitrarily: the interception of communications, surveillance of the electromagnetic spectrum, and access to user data. This last point, which alone merits its own study, is developed as a complement to the first two. The book is divided as follows: The first chapter explains, from a technical point of view, the technologies that we use to communicate and that are used to monitor us. The second chapter explores the normative framework for communications surveillance. The third offers a comparative look at communications interception. Finally, the fourth chapter synthesizes the findings of the first three chapters in an effort to offer several conclusions.

Details: Bogota: Centro de Estudios de Derecho, Justicia y Sociedad, 2015. 46p.

Source: Internet Resource: Working Paper 3: Accessed May 23, 2015 at: http://www.dejusticia.org/files/r2_actividades_recursos/fi_name_recurso.683.pdf

Year: 2015

Country: Colombia

URL: http://www.dejusticia.org/files/r2_actividades_recursos/fi_name_recurso.683.pdf

Shelf Number: 135766

Keywords:
Communications
Cyber-security
Intelligence Gathering
National Security
Privacy
Surveillance

Author: Statewatch

Title: Countering Terrorism or Constraining Civil Society? The impact of Financial Action Task Force recommendations on non-profit organisations in Central and Eastern Europe and Central Asia

Summary: The Arab uprisings that began in late 2010 galvanised 'pro-democracy- governments in the West into a reaffirmation of their commitment to supporting civil society organisations (CSOs) working under repressive and authoritarian regimes. The US State Department launched a Strategic Dialogue with Civil Society in 2011, and two years later President Obama launched the Stand with Civil Society campaign, "a global call to action to support, defend, and sustain civil society amid a rising tide of restrictions on its operations globally". The European Union (EU) established the European Endowment for Democracy and committed to "a more strategic engagement with CSOs" and the mainstreaming of CSO dialogue across "all external instruments and programmes and in all areas of cooperation". The United Nations is also committed to the "enabling environment for civil society" which it views as central to the realisation of its Millennium Development Goals. Running counter to (and part of the reason for) this recent affirmation of support for the "enabling environment" is the spread of restrictive civil society laws around the world. These laws can prohibit or impede the formation of CSOs, restrict their access to domestic and international funding and hinder their day-to-day operations. The trend toward restriction is demonstrated by reports from the International Centre for Non-profit Law (among others), which has documented the introduction of such laws in more than 50 countries, and the UN Special Rapporteur on the rights to freedom of peaceful assembly and of association. It is a trend that the Carnegie Endowment for International Peace recently described as "global", "lasting" and intimately related to "fundamental changes in international politics". Paradoxically, the changes in international politics cited by Carnegie include international counter-terrorism standards, devised by democratic states after 9/11, which provide a justification for less democratic and repressive governments to introduce restrictive laws and regulatory environments for CSOs. The standards in question, which are explained in the following section, advance the hypothesis that non-profit organisations are particularly vulnerable to abuse or exploitation by terrorist groups. Concomitant to this perceived risk is the requirement that all states ensure that they have robust laws and procedures in place to combat the "threat". This problem was first examined in detail in a report we published in 2012 entitled "Legalising Surveillance, Regulating Civil Society". In this follow-up report we revisit the report's core assumption - that these standards are a vehicle for the imposition of restrictive CSO laws - by examining their implementation in 17 countries in central and eastern Europe and central Asia.

Details: London: Statewatch, 2015. 59p.

Source: Internet Resource: Accessed August 20, 2015 at: http://www.statewatch.org/news/2015/aug/fatf-countering-terrorism-or-constraining-civil-society.pdf

Year: 2015

Country: International

URL: http://www.statewatch.org/news/2015/aug/fatf-countering-terrorism-or-constraining-civil-society.pdf

Shelf Number: 136498

Keywords:
Privacy
Surveillance
Terrorism
Terrorist Financing

Author: Fagan, Jeffrey

Title: Stops and Stares: Street Stops, Surveillance and Race in the New Policing

Summary: The use of proactive tactics to disrupt criminal activities, such as Terry street stops and concentrated misdemeanor arrests, are essential to the "new policing." This model applies complex metrics, strong management, and aggressive enforcement and surveillance to focus policing on high crime risk persons and places. The tactics endemic to the "new policing" gave rise in the 1990s to popular, legal, political and social science concerns about disparate treatment of minority groups in their everyday encounters with law enforcement. Empirical evidence showed that minorities were indeed stopped and arrested more frequently than similarly situated whites, even when controlling for local social and crime conditions. In this article, we examine racial disparities under a unique configuration of the street stop prong of the "new policing" - the inclusion of non-contact observations (or surveillances) in the field interrogation (or investigative stop) activity of Boston Police Department officers. We show that Boston Police officers focus significant portions of their field investigation activity in two areas: suspected and actual gang members, and the city's high crime areas. Minority neighborhoods experience higher levels of field interrogation and surveillance activity net of crime and other social factors. Relative to white suspects, Black suspects are more likely to be observed, interrogated, and frisked or searched controlling for gang membership and prior arrest history. Moreover, relative to their black counterparts, white police officers conduct high numbers of field investigations and are more likely to frisk/search subjects of all races. We distinguish between preference-based and statistical discrimination by comparing stops by officer-suspect racial pairs. If officer activity is independent of officer race, we would infer that disproportionate stops of minorities reflect statistical discrimination. We show instead that officers seem more likely to investigate and frisk or search a minority suspect if officer and suspect race differ. We locate these results in the broader tensions of racial profiling that pose recurring social and constitutional concerns in the "new policing."

Details: New York: Columbia Law School, Public Law & Legal Theory Working Paper Group, 2015. 73p.

Source: Internet Resource: Columbia Public Law Research Paper No. 14-479 : Accessed September 5, 2015 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2650154

Year: 2015

Country: United States

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2650154

Shelf Number: 136685

Keywords:
Racial Discrimination
Racial Profiling
Racial Profiling in Law Enforcement
Stop and Search
Surveillance

Author: Bartlett, Jamie

Title: The State of the Art 2015: A literature review of social media intelligence capabilities for counter-terrorism

Summary: This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it. In particular, the context in which this research took place has changed in a number of significant ways. First, there have been continuing concerns about internet surveillance and privacy following the revelations of NSA contractor Edward Snowden. Second, and partly as a result, there have been changes in the way that people use social media, and indeed in social media companies and platforms themselves. Third, so-called Islamic State (IS) made social media a central component of their modus operandi - particularly for propagandistic purposes. Finally, the methods and software used to make sense of social media have continued to improve. Social media research has emerged as a practice, but is still not yet a coherent academic discipline or distinctive intelligence tradecraft. It is neither a distinct area of study, nor driven by a united research community. It is conducted across the public, private and academic sectors, spanning disciplines from the computer sciences and ethnography to advertising and brand management. Its aims range from understanding the topography of social networks comprising millions of individuals to the deep, textured knowledge of the social worlds of individuals and small groups. As such, techniques and approaches often reflect specific disciplinary traditions and rarely refer to those found elsewhere. Social media research is also fragmented by platform. There is already a distinct nascent discipline surrounding Twitter, driven by free access to millions of tweets, an easily available Application Programming Interface (API) and fewer concerns about privacy and intrusion. Since 2008, the corpus of work on 'Twitterology' has grown from a handful to hundreds of research papers, covering everything from topic identification to event detection and political forecasting.

Details: London: Demos, 2015. 98p.

Source: Internet Resource: Accessed December 1, 2015 at: http://www.demos.co.uk/files/State_of_the_Arts_2015.pdf?1442411063

Year: 2015

Country: International

URL: http://www.demos.co.uk/files/State_of_the_Arts_2015.pdf?1442411063

Shelf Number: 137369

Keywords:
Counter-Terrorism
Social Media
Surveillance
Terrorism

Author: Grossmith, Lynne

Title: Police, Camera, Evidence: London's cluster randomised controlled trial of Body Worn Video

Summary: Overall the findings suggest there are potential benefits of Body Worn Video (BWV), although those related to criminal justice outcomes were not fully realised during the timescales of the trial and need the support of criminal justice partners to be achieved. - BWV can reduce the number of allegations against officers, particularly of oppressive behaviour. Complaints related to interactions with the public also reduced and, although it did not reach statistical significance, the trend in overall complaints was consistent with these findings. - There was no overall impact of BWV on the number or type of stop and searches conducted. In addition, there were no differences in officers - self-reported behaviour relating to how they conducted stops. - No effect was found on the proportion of arrests for violent crime. When an arrest had occurred, there was a slightly lower proportion of charges by officers in a BWV team. - There was no evidence that BWV changed the way police officers dealt with victims or suspects. - The Public Attitude Survey found, in general, London residents are supportive of BWV, with their opinions of the technology positively associated with their views of how 'procedurally just' the police are, and their confidence in the MPS. - Officers reported a range of innovative uses of BWV, including professional development; use of intelligence; and sharing information with partners and the public.

Details: London: College of Policing Limited and the Mayor's Office for Policing And Crime (MOPAC), 2015. 50p.

Source: Internet Resource: Accessed December 1, 2015 at: http://whatworks.college.police.uk/Research/Documents/Police_Camera_Evidence.pdf

Year: 2015

Country: United Kingdom

URL: http://whatworks.college.police.uk/Research/Documents/Police_Camera_Evidence.pdf

Shelf Number: 137399

Keywords:
Body-Worn Cameras (U.K.)
Complaints Against Police
Disorderly Conduct
Police Legitimacy
Police Technology
Public Opinion
Surveillance
Video Cameras

Author: Katz, Walter W.

Title: Body-Worn Cameras: Policy Recommendations and Review of LASD's Pilot Program

Summary: Portable video recording technology has radically altered urban law enforcement in recent years. Unfortunately, cash-strapped police agencies have been slow to incorporate this technology fully and now face community pressure to do so rapidly. In the face of strong public concern over police use of force, the time has come to overcome technological, political, and budgetary hurdles and incorporate fixed video, car mounted video and body-worn cameras into all urban police departments. The use of these tools will enhance accountability, public confidence in police officers and public understanding of policing. This report provides information regarding the Los Angeles County Sheriff's Department's pilot program to test and evaluate body-worn camera systems and makes recommendations for the Department as it implements them. Regardless of policy decisions, video evidence is shaping law enforcement and police agencies must use it to full advantage to help provide the quality policing that the public deserves. In September 2014, the Los Angeles County Sheriff's Department (hereinafter, LASD or the Department) initiated a volunteer pilot program to test body-worn camera systems (BWCS or body-camera) under patrol conditions at four stations across Los Angeles County. A body-worn camera is a small device that records video and sound. The camera is mounted on the officer's uniform and records deputy interactions with the public and can gather video evidence at crime scenes. The chief goals of the LASD's pilot program were "to accurately address allegations of misconduct and increase the public's trust." In addition, the LASD hoped that video and audio recordings would "prove beneficial in criminal proceedings, administrative investigations, service complaints and civil liability claims." The Department's pilot program ran from September 2014 through April 2015, tested four brands and five models of body-worn camera systems and deployed 96 cameras. In order to provide guidance for the volunteer deputies regarding when to employ the body cameras and on which subjects or events, the Department developed a set of guidelines covering camera activation and deactivation, expectations of privacy, operating procedures, when Department members are allowed to view recordings and retention of footage. Over the course of the program's eight-month run, the Department obtained detailed feedback from the participants, through both electronic questionnaires and focus groups that were held at each of the four stations and attended by OIG representatives. In addition to monitoring the pilot program, the OIG reviewed body-camera policies and reports from other jurisdictions as well as policy recommendations on the subject by nationally recognized law enforcement research organizations and leading advocacy organizations. The OIG then assimilated this information with trends that emerged from the LASD pilot program participants' feedback.

Details: Los Angeles: Office of Inspector General, County of Los Angeles, 2015. 70p.

Source: Internet Resource: Accessed December 1, 2015 at: https://oig.lacounty.gov/Portals/OIG/Reports/Body-Worn%20Cameras_OIG%20Report.pdf

Year: 2015

Country: United States

URL: https://oig.lacounty.gov/Portals/OIG/Reports/Body-Worn%20Cameras_OIG%20Report.pdf

Shelf Number: 137412

Keywords:
Body-Worn Cameras
Complaints Against Police
Disorderly Conduct
Police Legitimacy
Police Technology
Public Opinion
Surveillance
Video Cameras

Author: WildAid

Title: Turneffe Atoll Marine Reserve: Control and Vigilance System Design

Summary: This assessment represents the work of a multi-national team and was carried out in Belize over a 2-week period in March 2013. Research methods were developed and applied by WildAid in cooperation with the Belize Fisheries Department. Interviews were carried out with the following actors: Fishery officials, Belize Coastguard, Port Honduras MPA Administrators, TIDE, WCS, Belize Audubon Society, oak Foundation, members from both Northern and National Fishing Cooperatives, two Turneffe tourism operators, and Turneffe Atoll fishermen. The 2012-2017 Turneffe Atoll Management Plan proved invaluable as well. Despite both resource and time constraints, we are confident that sufficient information was collected to create a practical, yet versatile C&V system. The main objective of this assessment is to design a cost effective control and vigilance system for the newly created Turneffe Atoll Marine Reserve (TAMR). The specific objectives are: 1. Develop a practical control and vigilance system for the TAMR based on interviews of local enforcement actors, analysis of existing co-management strategies, and a comprehensive site visit of the Turneffe Atoll. 2. Prioritize a series of recommendations to optimize patrol costs as well as increase detection efficacy using Electronic Monitoring Systems (EMS). The final recommendations will include the surveillance system design including potential electronic systems, patrol vessels, human resource requirements, energy supply needs, and overall cost estimate: Capital Expenses (CAPEX) and Operating Expenses (OPEX) for a five-year investment plan

Details: San Francisco: WildAid, 2010. 45p.

Source: Internet Resource: Accessed February 2, 2016 at: http://www.wildaid.org/sites/default/files/resources/TurneffeAtoll_Assessment.pdf

Year: 2010

Country: Belize

URL: http://www.wildaid.org/sites/default/files/resources/TurneffeAtoll_Assessment.pdf

Shelf Number: 137740

Keywords:
Crime Prevention
Fisheries
Offenses Against the Environment
Surveillance
Wildlife Crime
Wildlife Management
Wildlife Protection

Author: Baur-Ahrens, Andreas

Title: How Smart Is "Smart Security"? Exploring Data Subjectivity and Resistance

Summary: 'Smart security' is currently being used as an umbrella term that embraces several initiatives proposed by the aviation industry in order to enhance security procedures at airports. The idea of smarter security opposes the traditional screening framework of passenger security at airports which enacts a one-size-fits-all approach in order to detect dangerous items that might threaten flight safety and security. Recently however, the security industry claims that smart solutions could provide better security, less intrusive screening, and better cost efficiency by employing tailored security procedures based on individual data-driven risk assessment of passengers and corresponding different levels of security screening. As smart security solutions are currently still under development, this report analyses potential human rights problems connected to a broader implementation of smart security routines in a timely fashion. Constituent elements of smart security, such as computer-based sorting of individuals into risk-groups and algorithms preparing or taking decisions on passengers' mobility, can have severe consequences. Critical questions to be asked include: Who is accountable for smart security decisions? Is it possible to appeal against such decisions? How dangerous is the data-driven approach with regard to structural discrimination and equality of all passengers? We review and summarise the state of the art in the field of data-driven risk analysis and analyse eight interviews that we have conducted with representatives of European aviation associations, state authorities and the civil society. Bearing in mind the human rights implications of smart security, the report identifies six central policy gaps, issues recommendations to address them and provides a basis for a much needed public debate on smart security.

Details: Tubingen: University of Tubingen, Internationales Zentrum fur Ethik in den Wissenschaften, 2015. 49p

Source: Internet Resource: Accessed February 2, 2016 at: https://publikationen.uni-tuebingen.de/xmlui/bitstream/handle/10900/66898/How%20Smart%20Is%20Smart%20Security_IZEW_201511.pdf?sequence=1&isAllowed=y

Year: 2015

Country: International

URL: https://publikationen.uni-tuebingen.de/xmlui/bitstream/handle/10900/66898/How%20Smart%20Is%20Smart%20Security_IZEW_201511.pdf?sequence=1&isAllowed=y

Shelf Number: 137744

Keywords:
Airport Security
Aviation Industry
Security
Surveillance

Author: Edmonton Police Service

Title: Body Worn Video: Considering the Evidence

Summary: The Edmonton Police Service has completed a comprehensive three-year study to assess the effectiveness of body worn video (BWV) for use by its officers, and as a result of the research findings, will proceed with a graduated deployment of cameras to specialized police units at this time. The EPS BWV pilot project ran from October 2011 to December 2014, with operational field testing through a variety of environments from October 2012 to July 2014. This project was partially funded through the Canadian Police Research Centre and continued under the Canadian Safety and Security Program, which is a federal program led by Defence Research and Development Canada's Centre for Security Science, in partnership with Public Safety Canada. From the outset, privacy has been a major consideration of the EPS BWV project. The EPS research team consulted with the Alberta Privacy Commissioner who provided valuable insight and recommendations. Respective of this input, the EPS created policies and procedures for the BWV pilot project that aligned with the BWV guidance document issued by the Office of the Privacy Commissioner of Canada. As part of the BWV testing, the EPS issued 56 industry-standard cameras to officers in: Downtown Division and Beats; West Edmonton Mall and Whyte Avenue Beats; the Impaired Driving Countermeasures Unit; and with the Disaster and Emergency Operations Unit for a training exercise with Fire Rescue and EMS. While the body worn video project reviewed technical performance, legal considerations, and usefulness in everyday policing and investigations, it also surveyed the public and police officers on their opinion. Based on the pilot project findings, the EPS has decided to proceed with a graduated deployment of a body worn video program over the next two to five years. Cameras will be used by officers who are involved in high-risk interactions with the public, where the officers are on the scene of a crime being committed, and the evidence captured on video is of the greatest value in providing information to the courts. Examples include: the Specialized Traffic Apprehension Team (STAT) that intercept high-risk vehicles; the Impaired Driving Countermeasures Unit for Checkstop operations; Tactical Team entries where weapons may be involved; and the Public Order Unit when responding to riots. The graduated roll-out of BWV will require training of officers, revising instructional materials, modifying police uniforms to carry cameras, as well as submitting a service package for funding, sourcing newer BWV cameras, and utilizing a new digital asset management system.

Details: Edmonton, Alberta: Edmonton Police Service, 2015. 241p.

Source: Internet Resource: Accessed February 8, 2016 at: http://www.bwvsg.com/wp-content/uploads/2015/06/Edmonton-Police-BWV-Final-Report.pdf

Year: 2015

Country: Canada

URL: http://www.bwvsg.com/wp-content/uploads/2015/06/Edmonton-Police-BWV-Final-Report.pdf

Shelf Number: 137812

Keywords:
Body-Worn Cameras
Law Enforcement Technology (U.S.)
Police Accountability
Police Behavior
Police Technology
Police-Citizen Interactions
Police-Community Relations
Surveillance
Video Technology

Author: Hurley, Greg

Title: Body-Worn Cameras and the Courts

Summary: In response to the August 9, 2014 shooting death of Michael Brown by Officer Darren Wilson in Ferguson, Missouri, a citizen petition was posted on the White House website, petitions.whitehouse.gov. It asked people to sign if they supported a law requiring all state, county, and local police to wear body-worn cameras, or BWCs. Within a few weeks, the petition collected 150,000 signatures. The response to this petition received national mainstream media attention. Roy L. Austin, Jr., deputy assistant to the president for the Office of Urban Affairs, Justice and Opportunity in the Domestic Policy Council, responded to the petition on behalf of the administration. He noted that research suggested that BWCs can have significant benefits to the community, which can include: - evidence that both officers and civilians acted in a more positive manner when they were aware that a camera was present; - new opportunities for effective training of law enforcement officers presented by the use of cameras; and - useful evidence of interactions was often captured on video. However, he also stated that the cost of this technology cannot be ignored, and there are some significant unanswered questions that need to be addressed, such as: - What is the most effective type of camera (vehicle, body, weapon) - and if body, where is it best placed (lapel, ear, belt)? - What are the privacy implications of having officers record interactions with the public? - When should cameras be turned on? - Does every officer on a force need a camera? - How long should video data be maintained and who should have access to it? - What is the impact on community relationships? On December 2, 2014, Shaun Donovan, the director of the White House's Office of Management and Budget, announced that a proposed, three-year $263 million Community Policing Initiative would include an investment package that would increase the use of BWCs. This was a significant statement from the Obama Administration and demonstrated the administration's view that BWCs could be a useful tool in providing greater officer accountability and promoting more trust in law enforcement by the general public. On September 21, 2015, the Department of Justice announced over $23 million in federal funding to support a BWC pilot program, which will support 73 local and tribal law enforcement agencies in 32 states. In their press release, they noted that this was done as a "part of President Obama's commitment to building trust and transparency between law enforcement and the communities they serve." This development is not surprising as the Obama Administration had previously indicated a willingness to deploy BWC technology. It is reasonable to assume that the cumulative effect of public support for officers using BWCs, and the federal government's willingness to provide funding for a significant pilot program, suggests that BWCs will become an increasingly common piece of law enforcement equipment. In fact, the author is of the opinion that within the next five to ten years, the vast majority of law enforcement officers nationally will be equipped with and required to wear and use BWCs.

Details: Williamsburg, VA: National Center for State Courts, 2016. 56p.

Source: Internet Resource: Accessed February 22, 2016 at: http://ncsc.contentdm.oclc.org/cdm/ref/collection/criminal/id/268

Year: 2016

Country: United States

URL: http://ncsc.contentdm.oclc.org/cdm/ref/collection/criminal/id/268

Shelf Number: 137938

Keywords:
Body-Worn Cameras
Law Enforcement Technology (U.S.)
Police Accountability
Police Behavior
Police Technology
Police-Citizen Interactions
Police-Community Relations
Surveillance
Video Technology

Author: Drover, Paul

Title: Leading and Testing Body Worn Video in Wolverhampton

Summary: Policing faces both a crisis in public confidence and the challenge of improving effectiveness in times of austerity. Body Worn Video (BWV) is seen internationally as having the potential to reduce public complaints, police use of force and potentially to improve criminal justice outcomes. However there are very few studies currently that explore the effects of BWV. Further replication of the BWV trial in Rialto, California (Farrar, 2013) is required to develop our understanding of the effects. This research shall document a Police Leaders' implementation of a randomised control trial into the effects of BWV. The main objectives are to identify the challenges to implementing a trial and identify how they were overcome. The solutions to these challenges shall provide key lessons for future police leaders as they undertake research and implement change. This study shall break down the sections of the implementation process. It shall explore each issue from gaining support to run a trial through to the challenge of maintaining it. The main challenges encountered from devising the trial in March 2014, through to three months into random allocation in August 2014 shall be detailed. Addressing police resistance, tracking performance, working with technology and maintaining officer compliance will feature as key issues. This study found that gaining the support of police practitioners and police leaders requires both negotiation and direction. Once overcome the ability to maintain compliance with the experimental protocols of random assignment was key. A combination of nudge theory and direct accountability is required. The study identifies planning and a skilled support team as being crucial to overcoming the issues of trial implementation and management. A leader with strong communication skills who can adapt to feedback is central to overcoming the many issues encountered in the trial.

Details: Cambridge, UK: Wolfson College, 2014. 100p.

Source: Internet Resource: Thesis: Accessed June 29, 2016 at: http://www.crim.cam.ac.uk/alumni/theses/Paul%20Drover.pdf

Year: 2014

Country: United Kingdom

URL: http://www.crim.cam.ac.uk/alumni/theses/Paul%20Drover.pdf

Shelf Number: 139538

Keywords:
Body-Worn Cameras
Police Accountability
Police Legitimacy
Police Performance
Police Technology
Surveillance
Video Cameras

Author: American Civil Liberties Union

Title: Unleashed and Unaccountable: The FBI's Unchecked Abuse of Authority

Summary: The Federal Bureau of Investigation serves a crucial role in securing the United States from criminals, terrorists, and hostile foreign agents. Just as importantly, the FBI also protects civil rights and civil liberties, ensures honest government, and defends the rule of law. Its agents serve around the country and around the world with a high degree of professionalism and competence, often under difficult and dangerous conditions. But throughout its history, the FBI has also regularly overstepped the law, infringing on Americans' constitutional rights while overzealously pursuing its domestic security mission. After the September 11, 2001 terrorist attacks, Congress and successive attorneys general loosened many of the legal and internal controls that a previous generation had placed on the FBI to protect Americans' constitutional rights. As a result, the FBI is repeating mistakes of the past and is again unfairly targeting immigrants, racial and religious minorities, and political dissidents for surveillance, infiltration, investigation, and "disruption strategies." But modern technological innovations have significantly increased the threat to American liberty by giving today's FBI the capability to collect, store, and analyze data about millions of innocent Americans. The excessive secrecy with which it cloaks these domestic intelligence gathering operations has crippled constitutional oversight mechanisms. Courts have been reticent to challenge government secrecy demands and, despite years of debate in Congress regarding the proper scope of domestic surveillance, it took unauthorized leaks by a whistleblower to finally reveal the government's secret interpretations of these laws and the Orwellian scope of its domestic surveillance programs. There is evidence the FBI's increased intelligence collection powers have harmed, rather than aided,its terrorism prevention efforts by overwhelming agents with a flood of irrelevant data and false alarms. Former FBI Director William Webster evaluated the FBI's investigation of Maj. Nadal Hasan prior to the Ft. Hood shooting and cited the "relentless" workload resulting from a "data explosion" within the FBI as an impediment to proper intelligence analysis. And members of Congress questioned several other incidents in which the FBI investigated but failed to interdict individuals who later committed murderous terrorist attacks, including the Boston Marathon bombing. While preventing every possible act of terrorismis an impossible goal, an examination of these cases raise serious questions regardingthe efficacy of FBI methods. FBI data showing that more than half of the violent crimes, including over a third of the murders in the U.S. ,go unsolved each year calls for a broader analysis of the proper distribution of law enforcement resources. With the appointment of Director James Comey, the FBI has seen its first change in leadership sincethe 9/11 attacks, which provides an opportunity for Congress, the president, and the attorney general to conduct a comprehensive evaluation of the FBI's policies and programs. This report highlights areas in which the FBI has abused its authority and recommends reforms to ensure the FBI fulfills its law enforcement and security mi ssions with proper public oversight and respect for constitutional rights and democratic ideals. The report describes major changes to law and policy that unleashed the FBI from its traditional restraints and opened the door to abuse. Congress enhanced many of the FBI's surveillance powers after 9/11, primarily through the USA Patriot Act and the Foreign Intelligence Surveillance Act Amendments. Therecent revelations regarding the FBI'suse of Section 215 of the USA Patriot Act to track all U.S. telephone calls is only the latest in a long line of abuse. Five Justice Department Inspector General audits documented widespread FBI misuse of Patriot Act authorities in 2007 and 2008. Congress and the American public deserve to know the full scope of the FBI's spying on Americ ans under the Patriot Act and all other surveillance authorities.

Details: New York: ACLU, 2013. 69p.

Source: Internet Resource: Accessed August 5, 2016 at: https://www.aclu.org/sites/default/files/assets/unleashed-and-unaccountable-fbi-report.pdf

Year: 2013

Country: United States

URL: https://www.aclu.org/sites/default/files/assets/unleashed-and-unaccountable-fbi-report.pdf

Shelf Number: 130020

Keywords:
Domestic Terrorism
FBI
Federal Bureau of Investigation
Patriot Act
Police Accountability
Privacy
Surveillance

Author: Big Brother Watch

Title: Are They Still Watching: The cost of CCTV in an era of cuts

Summary: CCTV has been a mainstay of our streets and public spaces for over 20 years. 10 years ago the enthusiasm for CCTV led to the UK being classified as the most watched nation on earth. As ever where we lead, others follow, countless countries around the world are now installing cameras and surveilling their citizens. But what now for the UK, where are we currently at with this technology? Are we still rampantly installing CCTV or have we reached saturation point , and if not what might the future of street surveillance bring? Public space CCTV is maintained by a number of different bodies; the police, local authorities, private businesses and increasingly by private individuals. Local authorities use CCTV for crime detection and prevention, including watching pubs, clubs and bars at night, as well as monitoring the flow of people and traffic. Local authorities have historically been enthusiastic at installing CCTV on our streets. Between 1999 and 2012 the number of cameras installed by local authorities across the country jumped from 21,000 to over 51,000. In response to this Big Brother Watch used Freedom of Information requests to determine how much money was being spent on these systems. The report Price of Privacy (2012) revealed that between 2007 and 2011 local authorities spent $515 million installing, maintaining and monitoring CCTV cameras. A staggering sum. Five years on we present Are They Still Watching? an update of the figures outlining the money spent by local authorities on the CCTV systems between 2012 to 2015. Our findings show that nationally there has been a decrease in the money spent on the installation, maintenance and monitoring of CCTV. Whilst some parts of the country have scrapped their CCTV schemes altogether, other areas, notably London have reported over a 71% increase in CCTV coverage. Whilst we are pleased to see a reduction in spending on CCTV, we have to understand that the rationale behind the figures is not ideological. Local authorities have not suddenly woken up to privacy and acknowledged the intrusion CCTV causes. It is vital that we consider the financial pressures on local authorities during this period. It has been noted that in the 2015/2016 financial year alone, local authorities have been instructed to find $2.6 billion of savings2 we suspect therefore that our findings highlight the budgetary constraints and cuts in council coffers since 2010.

Details: London: Big Brother Watch, 2016. 69p.

Source: Internet Resource: Accessed September 14, 2016 at: https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/02/Are-They-Still-Watching.pdf

Year: 2016

Country: United Kingdom

URL: https://www.bigbrotherwatch.org.uk/wp-content/uploads/2016/02/Are-They-Still-Watching.pdf

Shelf Number: 147876

Keywords:
Closed Circuit Television
Costs of Criminal Justice
Privacy
Surveillance
Surveillance Cameras
Video Technology

Author: Big Brother Watch

Title: Private Investigators The use of private investigators by councils, public authorities and government departments in the United Kingdom

Summary: The Protection of Freedoms Act 2012 introduced important safeguards in the use of surveillance powers by local authorities. The requirement of prior judicial authorisation is an important change in the law and one we wholeheartedly support. However, as this report highlights, the scope of public surveillance using private investigators risks undermining these protections. Of particular concern is the number of cases where private investigators have been commissioned, yet their work deemed to not require RIPA authorisation, even in cases where the explanation provided appears to indicate surveillance was undertaken. The law in the UK, particularly the Police and Criminal Evidence Act 1984, is broadly drawn to allow evidence to be introduced in court that in other jurisdictions would not be deemed admissible. Contrasted with the fruit of the poisonous tree provisions in the US, and broader protection offered by the Fourth Amendment, UK law risks failing to join up the evidential admissibility process and the regulation of surveillance. Accordingly, we are seriously concerned there is a gap in UK law emerging around surveillance and the ability of third parties to conduct surveillance operations without proper regulation. As the cost of advanced surveillance technologies falls, the temptation is for a number of individuals and organisations to take advantage of the covert cameras, hidden recording devices, aerial devices and countless other gadgets that are now available in a growing market. While there are many situations where regulation is not appropriate, it is also essential to maintain legal safeguards to deter the unaccountable and improper use of such technologies. Equally, as is the risk with private investigators, the arrangement may allow techniques to be used that would require RIPA authorisation, but because they are conducted by a third party, the commissioning organisation can claim it was unaware of the specific methods employed. Whether private investigators, individual citizens or unconnected third party organisations, we believe that the law should be revised to ensure that if surveillance is undertaken and the intention is to use the material obtained in legal proceedings, if it has not been undertaken by the police then it should not be admissible if it has not been authorised under RIPA. Equally, the ongoing lack of custodial sentences for those guilty of an offence under section 55 of the Data Protection Act 1998 remains a serious issue and particularly where private investigators may be gathering information that they are not authorised to do so. With as many as 10,000 people working as private investigators in the UK, we agree with the Home Affairs Select Committee that the current legal framework is wholly inadequate. This highlights the ongoing concern that RIPA is not fit for purpose, in failing to deal with evidence and material obtained outside the legislative framework. Equally, the changing nature of surveillance - particularly the ability to search online, through social networks and through semi-public sources of information - further reinforces the need for the law to be reformed to strengthen protection against unwarranted and unauthorised surveillance becoming a frequent occurrence.

Details: London: Big Brother Watch, 2013. 51p.

Source: Internet Resource: Accessed September 21, 2016 at: https://www.bigbrotherwatch.org.uk/wp-content/uploads/2013/03/Private-Investigators-Final-Report.pdf

Year: 2013

Country: United Kingdom

URL: https://www.bigbrotherwatch.org.uk/wp-content/uploads/2013/03/Private-Investigators-Final-Report.pdf

Shelf Number: 145627

Keywords:
Criminal Investigations
Private Investigations
Surveillance

Author: Big Brother Watch

Title: Smile you are on Body Worn Camera, Part 1 -- Local Authorities. How Councils are Using Body Worn Cameras

Summary: Big Brother Watch has a long history of exposing the over-zealous use of surveillance powers by local authorities. Over the past 8 years we have found that local authorities have used counter terrorism powers to spy on dog owners, suspected fly tippers and even members of staff they employ to spot crime. We have revealed the thousands of officials able to enter our homes; often without a warrant, and we have lain bare the financial burden of CCTV on council coffers. Now in Smile you are on Body Worn Camera, Part 1 "Local Authorities, we reveal for the first time that:  54% of all local authorities across the UK are equipping members of staff or contractors with body worn cameras at a cost of £1,791,960.81.  66% of local authorities are failing to completing Privacy Impact Assessments (PIAs) before deploying the technology and  21% of councils are holding non-evidential footage for longer than 31 days; the time limit adhered to by police forces. Body worn cameras are the new tool in the surveillance arsenal. They can be deployed for multiple purposes often with little to no evidence that they are the right tool to solve the particular problem. Big Brother Watch is concerned that the rush to use body worn cameras by local authorities is not being scrutinised closely enough. When we consider that many councils have a poor track record of using heavy handed surveillance tactics and are often lackadaisical with their approach to protecting personal data, scrutiny of new capabilities should be a number one priority. We understand that deploying body worn cameras in order to protect staff from verbal or physical abuse may have validity; no member of staff should feel unsafe at work. But the decision by some councils to equip staff with the cameras in order to film people dropping litter, walking dogs, parking or to monitor people's recycling, in order to use the "evidence" to issue a fine, we would argue is a disproportionate use of an intrusive surveillance capability and a potential breach of the privacy of law abiding citizens. The privacy concerns which accompany the use of body worn cameras are two-fold. Firstly, the initial filming of people in a public space and secondly the retention of footage showing direct engagement between official and citizen, which includes a record of the citizens' face, voice, mannerisms and behaviours. Local authorities must ensure the technology is only deployed when proven to be absolutely necessary and completely proportionate to the problem they are trying to solve. Officials must then ensure the retention of any data adheres to the strongest safeguards in light of the potential sensitivity of the data being handled. If they fail to properly engage on the issue of privacy, if citizens feel as though they are being filmed for no good reason by unnecessarily intrusive officials or if stories are published which reveal poor data security, loss, breach or misuse of the footage then councils will face inevitable criticism and a public backlash.

Details: London: Big Brother Watch, 2017. 80p.

Source: Internet Resource: Accessed March 2, 2017 at: https://bigbrotherwatch.org.uk/wp-content/uploads/2017/02/Smile-you-are-on-Body-Worn-Camera-Part-1-1.pdf

Year: 2017

Country: United Kingdom

URL: https://bigbrotherwatch.org.uk/wp-content/uploads/2017/02/Smile-you-are-on-Body-Worn-Camera-Part-1-1.pdf

Shelf Number: 141298

Keywords:
Body-Worn Cameras
Cameras
Privacy
Surveillance

Author: Huq, Aziz

Title: Acts that Legitimate: Widening the Array of Predicate Policing Practices

Summary: Procedural justice theory predicts a relationship between police behavior, individuals' normative evaluation of police, and decisions to comply with laws. Yet, prior studies of procedural justice have rather narrowly defined the potentially relevant predicates of police behavior. This study expands the scope of procedural justice theory by considering a broad array of policing components, including unobserved actions such as electronic surveillance, respecting the limits of one's legal authority, and the unequal or equal distribution of policing resources between different groups. Analyzing data from a national probability sample of adults in England and Wales, we (a) present a comprehensive investigation of the heterogeneous elements of policing related to legitimacy judgments and (b) contribute to debate about the nature of legitimacy.

Details: Chicago: University of Chicago Law School, 2016. 30p.

Source: Internet Resource: Public Law and Legal Theory Working Papers. 603: http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=2053&context=public_law_and_legal_theory

Year: 2016

Country: United Kingdom

URL: http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=2053&context=public_law_and_legal_theory

Shelf Number: 144639

Keywords:
Police Accountability
Police Legitimacy
Police-Citizen Interactions
Police-Community Relations
Procedural Justice
Surveillance

Author: Young, Joshua

Title: Implementation of a Randomized Controlled Trial in Ventura, California: A Body-Worn Video Camera Experiment

Summary: Police agencies from around the world are currently deploying police practices which have been empirically shown to be ineffective. Yet, alarmingly, there doesn't seem to be any urgency to move away from these ineffective practices and into methods supported by evidence. It could be that the idea of using evidence from criminological research and running scientific experiments to test the effectiveness of new innovations seems out of reach for local agencies. In reality, this is far from the truth. There is currently, however, a lack of implementation literature for police agencies looking to implement experimentation and transition to evidence-based practices. The purpose of this thesis is to dispel the myth that integrating an evidence-based policing culture and scientifically testing new innovations is outside the scope of local police agencies. Based on lessons learned from implementing a body-worn video (BWV) camera randomized controlled trial (RCT), this thesis is written to offer the practitioner a real-world thematic guide. This guide aims to assist police agencies looking to implement a BWV camera experiment and provide recommendations on how to integrate and sustain an evidence-based policing culture. During the Ventura Police Department's (VPD) randomized controlled trial (RCT), we were not only able to implement an experiment with the University of Cambridge but provide a replication study of the first BWV camera randomized controlled trial conducted in Rialto, California. During the implementation of Ventura's BWV randomized controlled trial, we encountered stumbling blocks in the non-compliance of the randomization schedule. We show with verifiable data that we were able to increase officer compliance by 92% and provide recommendations on how to reduce contamination issues by laying an evidence-based foundation prior to implementation. In addition, I offer a recommendation for agencies looking to embrace evidence-based policing to create a guiding coalition with enough influence to support, integrate, and sustain a culture willing to test new innovations. Our experiment evaluates the effects of BWV cameras on police use of force and citizens' complaints. In addition, Ventura's BWV camera experiment will be the first to empirically test the effects of BWV cameras on prosecution outcomes, particularly the speed of early-guilty pleas and the rate of prosecution. I purposely do not provide any preliminary data relating to use of force, citizens' complaints, and prosecution outcomes. It is too early to show any causal inferences to suggest the effects the BWV cameras are having at VPD. However, early indications suggest that the cameras are having a positive effect. We look to provide statistical strength to Rialto's findings at the conclusion of our 12 month RCT.

Details: Cambridge, UK: Fitzwilliam College, University of Cambridge, 2014. 87p.

Source: Internet Resource: Thesis: Accessed April 10, 2017 at: http://www.crim.cam.ac.uk/alumni/theses/Joshua%20Young%20Thesis.pdf

Year: 2014

Country: United States

URL: http://www.crim.cam.ac.uk/alumni/theses/Joshua%20Young%20Thesis.pdf

Shelf Number: 144766

Keywords:
Body-Worn Cameras
Cameras
Evidence-Based Policing
Evidence-Based Programs
Police Accountability
Police Technology
Surveillance
Video Technology

Author: American Civil Liberties Union of Massachusetts

Title: No Tape, No Testimony: How Courts Can Ensure the Responsible Use of Body Cameras

Summary: In January 2015, the Chicago Police Department launched a pilot program requiring its officers to use body-worn cameras. The program began in the wake of public outcry over violence by Chicago police officers against civilians, and a police official explained that it sought to "rebuild[] trust with the residents we're sworn to serve." In July 2016, an officer wearing one of these cameras killed Paul O'Neal, a Black teenager who allegedly stole a car and crashed it into a police cruiser. After Mr. O'Neal fled on foot, the officer fatally shot him in the back. In theory, Mr. O'Neal's final moments should have been recorded by the officer's body camera, and the recording should now be available to assist a court, a jury, or the public in deciding whether the shooting was justified. But no such video exists. The camera worn by the officer who killed Mr. O'Neal was reportedly not turned on until after the fatal shot had been fired. This incident, and others like it, have been cited as cautionary tales about how the value of body cameras can be undermined if the police cannot or will not ensure their consistent use. But police departments are not the only institutions capable of assuring the effective use of body-worn cameras. Courts can do it too. For three reasons, courts can and should encourage the police to record, when practicable, their investigative encounters with civilians. 1. Videos of police-civilian encounters have shaken public confidence in the capacity of legal proceedings to separate fact from fiction. Time and again, cases have been headed for an incorrect result - such as the wrongful prosecution of a civilian or the wrongful exoneration of a police officer - until videos surfaced that contradicted officers' versions of events. Meanwhile, there is growing evidence that witness testimony, on which courts must often rely when video is absent, can be quite flawed when used as the exclusive means of resolving disputes between police officers and civilians. Thus, when video evidence of a police-civilian encounter does not exist, legal proceedings may be less likely to get the right answer or to be respected by the public. 2. Police body-worn cameras present a viable and valuable supplement to witness testimony. These cameras are quickly becoming part of the 21st-century police uniform, with a recent survey of 70 law enforcement agencies finding that 95% of respondents had either implemented or had committed to implementing body camera programs. Body cameras can be critical to uncovering the truth when the facts of a police-civilian encounter are contested. There is also evidence that, when body cameras are consistently worn and activated, they can deter misconduct or violence from happening in the first place. 3. Courts have both a distinct interest in and a unique means of encouraging police officers to record their encounters with civilians. Courts have an interest in conducting legal proceedings that are fair, that avoid wrongful convictions and other catastrophic outcomes, and that efficiently resolve disputes. Given those interests, and given that videos of policecivilian encounters can make the difference between just and unjust results, courts should encourage, when practicable, the recording of police-civilian encounters. Rather than leave this task to police departments, whose disciplinary practices are necessarily inconsistent, courts should provide this encouragement by using tools uniquely at their disposal: jury instructions. This report proposes a model jury instruction that encourages the recording of police-civilian encounters by empowering juries to impose evidentiary consequences for unreasonable or bad faith failures to record. This instruction would tell the jury that, if it finds that the police unreasonably failed to create or preserve a video of a police-civilian encounter, it can devalue an officer's testimony and infer that the video would have helped the civilian. If the jury finds that the case involves bad faith, such as the outright sabotage of body cameras, then it should be instructed to disregard officer testimony altogether. The tools that courts can use to craft this instruction already exist. Several courts now use jury instructions to encourage the recording of custodial interrogations and drunk-driving field tests; they can and should craft similar rules for body cameras. These measures can help prevent wrongful convictions, accurately resolve allegations of police misconduct, and enhance public trust in the justice system's capacity to get it right when confronted with police-civilian violence.

Details: Boston: ACLU of Massachusetts; Berkeley, CA: University of California, Berkeley School of Law Samuelson Law, Technology & Public Policy Clinic, 2016. 27p.

Source: Internet Resource: Accessed September 2, 2017 at: https://www.law.berkeley.edu/wp-content/uploads/2016/11/SLTPPC_ACLU_BodyCameras_Final.pdf

Year: 2016

Country: United States

URL: https://www.law.berkeley.edu/wp-content/uploads/2016/11/SLTPPC_ACLU_BodyCameras_Final.pdf

Shelf Number: 147015

Keywords:
Body-Worn Cameras
Law Enforcement Technology (U.S.)
Police Accountability
Police Behavior
Police Technology
Police-Citizen Interactions
Police-Community Relations
Surveillance
Video Technology

Author: Jones, Chris

Title: Market Forces: The development of the EU Security-Industrial Complex

Summary: Despite the economic crisis, EU funding for new security tools and technologies will double in the 2014-20 period compared to the previous 6 years. The biggest winners have been the "homeland security" industry whose influence on European policy continues to grow, constructing an ever more militarised and security-focused Europe. While the European Union project has faltered in recent years, afflicted by the fall-out of the economic crisis, the rise of anti-EU parties and the Brexit vote, there is one area where it has not only continued apace but made significant advances: Europe's security policies have not only gained political support from across its Member States but growing budgets and resources too. The increased securitisation of the European Union has relevance not only for its Member States but for the world which will be affected by the measures, technologies and strategies being developed, sold and deployed. The emergence of 'security' as the EU's increasingly default response to complex social and ecological crises is also significant given the current political context of rising authoritarian parties and governments all-too-willing to use the latest security tools to maintain and extend power. This report digs deep into the EU's funding of its security strategy. It shows that between 2014 and 2020, a total of at least L11 billion has been allocated to budgets directed towards security measures - L3.8 billion to the Internal Security Fund (ISF), L1.7 billion to the European Security Research Programme, L3.1 billion to the Asylum, Migration and Integration Fund (which has numerous uses in the context of security policy) and some L2.4 billion for EU home affairs agencies such as Europol and Frontex. While still a small amount in comparison to the EU's total budget of "1 trillion between 2014 and 2020, it is a significant development given that a decade ago the bloc had no dedicated budgets for security, justice or home affairs. The report's investigation of the different budgets also draws out the big picture of where the funding is going and what it is helping to construct: an all-encompassing vision of security that seeks to combat a seemingly limitless number of "threats" ranging from terrorism to petty crime, and which displays a marked tendency of treating the entire population (European and especially non-European) as potential objects of suspicion that must be surveyed and if necessary detained, obstructed or even killed. This vision has been propelled by military and security corporations whose profits depend on a world of suspicions, fears and threats - and who have not only been major beneficiaries of EU security spending, but have also been given an unprecedented role in designing the security research programme. In a 2009 report by Statewatch and TNI, we warned that EU's security, research and development policies were "coalescing around a high-tech blueprint for a new kind of security". We summed up the vision in the title of the report, NeoConOpticon, to capture the metaphor of an all-seeing prison combined with the increasingly neoconservative, corporate-led vision of the EU's security and defence policies. It warned that we were "turning a blind eye to the start of a new kind of arms race, one in which all the weapons are pointing inwards". That report examined the early years of EU security strategies, from 2003 to 2008, and focused on the beginnings of the European Security Research Programme (ESRP) and the 85 projects it had funded up to that point. Market Forces focuses on the development of EU security policies and budgets through the 2007-13 period and their successors, which were launched in 2014 and will run until 2020. These include the ESRP, which funds research to develop new technologies for law enforcement, border control, cybersecurity and critical infrastructure protection and leans heavily towards technologies and techniques initially deployed or favoured by military forces: drones, data-mining tools, large-scale surveillance systems, biometric recognition and automated behaviour analysis tools. It also explicitly seeks to develop "dual-use" technologies for both civil and military use. The report also analyses the Internal Security Fund (ISF), distributed to EU Member States to enhance the powers of law enforcement and border control agencies (including through numerous new surveillance and analysis systems). The aim - albeit not yet realised - is that EU funds pay for both the development of new technologies and their subsequent purchase at EU or national level, creating a self-fulfilling loop of supply and demand. Despite warnings and public concerns over the direction of the EU's security strategy, the journey towards a world of ubiquitous public-private surveillance and control systems continues, for the time being, largely unabated. The report is divided into three sections: the first provides a summary of the early development of the European Security Research Programme, its incorporation into the EU's formal research agenda, and the concurrent development and implementation of EU policies and budgets in the area of justice and home affairs from 2007 to 2013. The second section looks at the institutions, corporations and organisations involved in the development and ongoing implementation of the EU's security research agenda and security policies, and the ways in which private interests have long-managed to successfully shape the public policy and research agenda. The third section looks at current EU security policies and budgets. It seeks to provide a general overview of aims and objectives of current policies, the funds available for implementing them, and which organisations have so far been the chief beneficiaries. The EU's security agenda is now so sprawling and complex that no one report can cover every aspect of it, but there are a few key themes that are worth drawing out here.

Details: Amsterdam: Transnational Institute, 2017. 90p.

Source: Internet Resource: Accessed September 18, 2017 at: https://www.tni.org/files/publication-downloads/marketforces-report-tni-statewatch.pdf

Year: 2017

Country: Europe

URL: https://www.tni.org/files/publication-downloads/marketforces-report-tni-statewatch.pdf

Shelf Number: 147371

Keywords:
Border Security
Cybersecurity
Homeland Security
Law Enforcement Technology
Security Policy
Surveillance
Terrorism

Author: Sakiyama, Mari

Title: Nevada vs. U.S. Residents' Attitudes Toward Surveillance Using Aerial Drones

Summary: Unmanned Aircraft Systems (UAS) or Unmanned Aerial Vehicles (UAV), commonly known as "drones," are free-flying aircraft that are controlled by remote technology. Drones have the capability to not only collect information along their flight path, but also to provide visual monitoring of activities in various public places. These flight systems have commonly been used for military operations and are increasingly being applied for use in search and rescue activities, land management practices, and climatic and geographical photo mapping. A recent national survey found that the vast majority of U.S. residents support the use of drones in these areas (Miethe, Lieberman, Sakiyama, & Troshynski, 2014). Eighty-three percent of Nevada residents in this survey were opposed to using drones to monitor people's daily activities around their home. The majority of respondents were also opposed to drones monitoring people at work (59%) and in their daily activities in open public places (48%). Public attitudes about using drones for domestic surveillance varied across different social groups in Nevada. For surveillance in both public and private places, opposition to drone use was highest among persons with lower incomes and those who emphasize individualism (i.e., prefer a government that focuses on individual rights over public safety). About two-thirds of the respondents in Nevada agreed that drone surveillance is an invasion of privacy, especially when it occurs around the home (77%) or at work (66%). High levels of agreement across contexts were also found in people's views of drones as "excessive surveillance." These two concerns were the major reasons for opposition to domestic surveillance by drones. A belief that drones increase public safety was the primary reason given by respondents who support the use for domestic surveillance by government entities. Respondents in Nevada strongly opposed the use of drones for monitoring people's daily activities when it is done by private citizens (78%), commercial businesses (71%), and the mass media (66%). Similar to national findings, Nevada residents were far less opposed to drone surveillance of people's daily activities by local, state, and federal government agencies (44% opposed this activity).

Details: Las Vegas: University of Nevada at Las Vegas, Center for Crime and Justice Policy, 2014. 6p.

Source: Internet Resource: Accessed October 10, 2017 at: https://www.unlv.edu/sites/default/files/page_files/27/NevadaU.S.Residents%27Attitudes.pdf

Year: 2014

Country: United States

URL: https://www.unlv.edu/sites/default/files/page_files/27/NevadaU.S.Residents%27Attitudes.pdf

Shelf Number: 135757

Keywords:
Aerial Drones
Public Opinion
Surveillance

Author: Taylor, Emmeline

Title: Police detainee perspectives on police body-worn cameras

Summary: Recent years have seen the introduction of police body-worn cameras (BWCs) in many countries. Despite the costs involved in purchasing equipment and storing the large amounts of data generated, there is a dearth of evidence to support their mainstream use as part of law enforcement activities. There remains little understanding about the impact and effectiveness of BWCs, and less still on how the police, members of the public and, importantly, arrestees perceive and experience the cameras. In this study, 899 adult police detainees were interviewed about their perceptions and experiences of police BWCs through the Drug Use Monitoring in Australia (DUMA) program. Findings suggest that police detainees in Australia are largely supportive of the use of police BWCs, but this was predicated on a number of operational and procedural requirements. The findings have implications for the use of BWCs as an everyday part of policing apparatus.

Details: Canberra: Australian Institute of Criminology, 2017. 14p.

Source: Internet Resource: Trends & issues in crime and criminal justice no. 537: Accessed November 2, 2017 at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi537.pdf

Year: 2017

Country: Australia

URL: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi537.pdf

Shelf Number: 147971

Keywords:
Body-Worn Cameras
Police Technology
Surveillance
Video Surveillance

Author: Okere, Stephen

Title: An Evaluation of Circuit Television Cameras in Crime Management: A case Study of Nairobi Central Business District

Summary: The study focused on the effectiveness of Closed Circuit Television Cameras (CCTV) in Urban Crime Management in the Central Business District (CBD) of Nairobi. The objective of the study was to explore the extent and effectiveness of CCTV Cameras in alleviating insecurity within Nairobi Central Business District. The theoretical framework looked into the location theory, routine activities theory, situation crime prevention theory and crime prevention through environmental design to understand how crime manifests itself and crime prevention measures adopted. The conceptual framework looked into the Location, Institutional Framework, Resources, Government Policy, Societal value systems, Community participation and Integrated Centralized Surveillance System that makes CCTV system effective in an urban environment. The Methodology used involved CCTV observation, Stratified random sampling of four Strata namely; Institutions/Businesses, Hotels, Supermarkets and Small Business Enterprise using CCTV Cameras. Interviews Schedule was used to interview Administrators, ICT Experts in installation of CCTV Cameras, Law Enforcement agents and urban planners from City Council of Nairobi. The study found out that 92.9% of the total respondents had installed CCTV cameras inside the buildings to offer surveillance inside the buildings. Those connected outside are mainly used to monitor traffic with a few located in strategic areas for crime prevention. 85.7% of the respondents indicated that CCTV cameras were effective where installed and location and coverage of cameras being a critical component. The study recommends the installation of CCTV cameras on the streets for crime prevention. There is also the need to involve all stakeholders including community participation to ensure project sustainability. Finally there is an urgent need for the government to come up with policy guidelines which sets out standards and conditions to be adopted in the operation of CCTV cameras schemes.

Details: Nairobi: Department of Urban and Regional Planning, Faculty of Built Environment, University of Nairobi, 2012. 138p.

Source: Internet Resource: Thesis: Accessed February 6, 2018 at: https://urbanplanning.uonbi.ac.ke/sites/default/files/cae/artsdesign/urbanplanning/Stephen%20Okere%20Research%20Project.pdf

Year: 2012

Country: Kenya

URL: https://urbanplanning.uonbi.ac.ke/sites/default/files/cae/artsdesign/urbanplanning/Stephen%20Okere%20Research%20Project.pdf

Shelf Number: 149010

Keywords:
Camera Surveillance
Cameras
CCTV
Closed-Circuit Television Cameras
Crime Prevention
Law Enforcement Technology
Situational Crime Prevention
Surveillance
Video Technology

Author: Electronic Frontier Foundation

Title: Patterns of Misconduct: FBI Intelligence Violations from 2001 - 2008

Summary: In a review of nearly 2,500 pages of documents released by the Federal Bureau of Investigation as a result of litigation under the Freedom of Information Act, EFF uncovered alarming trends in the Bureau's intelligence investigation practices. The documents consist of reports made by the FBI to the Intelligence Oversight Board of violations committed during intelligence investigations from 2001 to 2008. The documents suggest that FBI intelligence investigations have compromised the civil liberties of American citizens far more frequently, and to a greater extent, than was previously assumed. In particular, EFF's analysis provides new insight into: Number of Violations Committed by the FBI From 2001 to 2008, the FBI reported to the IOB approximately 800 violations of laws, Executive Orders, or other regulations governing intelligence investigations, although this number likely significantly under-represents the number of violations that actually occurred. From 2001 to 2008, the FBI investigated, at minimum, 7000 potential violations of laws, Executive Orders, or other regulations governing intelligence investigations. Based on the proportion of violations reported to the IOB and the FBI's own statements regarding the number of NSL violations that occurred, the actual number of violations that may have occurred from 2001 to 2008 could approach tens of thousands of possible violations of law, Executive Order, or other regulations governing intelligence investigations. Substantial Delays in the Intelligence Oversight Process From 2001 to 2008, both FBI and IOB oversight of intelligence activities was delayed and likely ineffectual; on average, 2.5 years elapsed between a violation's occurrence and its eventual reporting to the IOB. Type and Frequency of FBI Intelligence Violations From 2001 to 2008, of the nearly 800 violations reported to the IOB: over one-third involved FBI violation of rules governing internal oversight of intelligence investigations. nearly one-third involved FBI abuse, misuse, or careless use of the Bureau's National Security Letter authority. almost one-fifth involved an FBI violation of the Constitution, the Foreign Intelligence Surveillance Act, or other laws governing criminal investigations or intelligence gathering activities. From 2001 to 2008, in nearly half of all NSL violations, third-parties to whom NSLs were issued - phone companies, internet service providers, financial institutions, and credit agencies -contributed in some way to the FBI's unauthorized receipt of personal information. From 2001 to 2008, the FBI engaged in a number of flagrant legal violations, including: submitting false or inaccurate declarations to courts. using improper evidence to obtain federal grand jury subpoenas. accessing password protected documents without a warrant.

Details: San Francisco: EFF, 2011. 37p.

Source: Internet Resource: Accessed February 20, 2018 at: https://www.eff.org/wp/patterns-misconduct-fbi-intelligence-violations

Year: 2011

Country: United States

URL: https://www.eff.org/wp/patterns-misconduct-fbi-intelligence-violations

Shelf Number: 149176

Keywords:
Criminal Investigations
FBI
Federal Bureau of Investigations
Surveillance

Author: Cox, Stacie Leigh

Title: Law Enforcement Attitudes of Current Public and Departmental Surveillance Technologies: A Qualitative Case Study of the Toronto Police Service

Summary: This thesis explores the perceptions of front-line police officers surrounding synoptic and panoptic surveillance and the implications of police body-worn cameras on community relations, citizen's recording devices and police practice. The study involves a qualitative approach that utilized one-on-one, semi-structured interviews, in which participants were those members of the Toronto Police Service who wore body-worn cameras during an earlier pilot study of the device conducted by the Toronto Police Service. Police as a sampling group are very exclusive and hard to gain access to, as such this study relied on a snowball sampling strategy which resulted in a sample size of 7. While sample size is a major limitation of this study, these 7 interviews provided rich data that were able to provide a valuable and humanizing dialogue of police officers. Transcriptions of interviews were collected and thematically analyzed, resulting in commonalities among participant responses. These commonalities suggest that officers involved in the piloting project that were interviewed share similar perceptions and concerns of this new technology, whether it be positive or negative. Themes that were established include: Context; Synoptic Surveillance; Accountability; Police and Community Relationship and Trust; Impact on Officer's Job, Career and Routine; Officer Repercussions & Protection from Accusations; Officer Change in Behaviour Due to Surveillance Devices; Officer Physical Safety; Citizens Behavioural Changes and Reactions Body-Worn Cameras; Social Media; Privacy Concerns; Officers Favourability toward Wearing Body-Worn Cameras; and the Overall Impact Body-Worn Cameras have on Policing. Participants reported while this surveillance tool is beneficial in theory, in practice the implications of this device are increasingly negative on police practice and community relations. Study results are framed using contemporary theories of surveillance and concepts central to police legitimacy, and for the purpose of this research the culmination of these notions has been termed the Surveillance Accountability Framework. The concerns surrounding police body-worn cameras raised by this research should be considered for further research and improvement, particularly due to the increasing amount of police services planning on adopting this new technology.

Details: Kingston, ONT: Queen's University, 2017. 124p.

Source: Internet Resource: Thesis: Accessed April 26, 2018 at: https://qspace.library.queensu.ca/bitstream/handle/1974/22788/Cox_Stacie_L_201709_MA.pdf?sequence=2

Year: 2017

Country: Canada

URL: https://qspace.library.queensu.ca/bitstream/handle/1974/22788/Cox_Stacie_L_201709_MA.pdf?sequence=2

Shelf Number: 149919

Keywords:
Body-Worn Cameras
Police Accountability
Police Legitimacy
Police Surveillance
Police Technology
Surveillance

Author: Morgan, Anthony

Title: Police Use of CCTV on the Rail Network

Summary: Despite support from police for the use of CCTV, and its popularity in public places, there has been limited research into the use of CCTV by police for investigative purposes. The current study attempted to better understand police demand for CCTV footage from the NSW rail network. Results showed the police made an average of 17 requests per day for footage, mostly for criminal investigations. On both the metropolitan and intercity network, requests were more common for stations that recorded a higher number of incidents, had more cameras, and had fewer patrons. Once station characteristics were taken into account, the findings suggested that CCTV footage was more likely to be requested from those stations with lower levels of public surveillance. This research can help to inform the design, layout and management of CCTV systems on public transport and in other locations.

Details: Canberra, Australia: Australian Institute of Criminology, 2018. 18p.

Source: Internet Resource: Accessed November 23, 2018 at: https://aic.gov.au/publications/tandi/tandi561

Year: 2018

Country: Australia

URL: https://aic.gov.au/publications/tandi/tandi561

Shelf Number: 153111

Keywords:
CCTV
Closed Circuit Television
Criminal Investigations
Police
Police Investigations
Public Areas
Public Places
Public Safety
Public Transport
Surveillance

Author: Child Rights International Network

Title: Caught in the Crossfire?: An International Survey of Anti-Terrorism Legislation and its Impact on Children

Summary: As terrorism has proliferated in the last 20 years, so have States' counterterrorism strategies and the legislation that underpins them, which has introduced new surveillance measures, restrictions on behaviour, powers of detention, and hundreds of new offences carrying heavy sentences. In developing their counter-terrorism strategies, States are obliged to ensure that human rights are promoted and protected in full. Approaches that undermine human rights are not only unlawful; they are now widely understood to be counter-productive, insofar as they consolidate the social conditions in which terrorism can flourish. Nonetheless, States commonly regard human rights as an operational impediment and are allowing them to erode. No group has been more vulnerable to this than children and young people, particularly from marginalised minority groups. This report presents the findings from CRIN's research of anti-terrorism legislation in 33 countries across five continents. It shows that counterterrorism measures are leading to extensive violations of children's rights: - Children's behaviour and interests are monitored in schools and online, without their consent and sometimes without their knowledge; - Children are criminalised for association with terrorist groups, even for marginal involvement, rather than treated as victims of grooming and calculated indoctrination by recruiters; - Children can be routinely detained without charge for long periods under counter-terrorism powers in many countries; - Children convicted of offences, such as association with a terrorist group, are punished with harsh and sometimes extreme penalties; life imprisonment is not unusual, and in some countries children have been executed; - Some State military and intelligence agencies use children as spies and informants, exposing them to undue and potentially serious harm. These effects of counter-terrorism measures are unambiguously incompatible with States' human rights obligations to children. In particular, the strategies violate several specific rights of the child, including: - The right to privacy and to freedom of expression; - The right to be protected from violence and exploitation; - The right not to be used by State military and intelligence agencies; - The right not to be deprived of liberty unlawfully or arbitrarily and the right to be treated with dignity; - The right to a criminal justice system designed for the particular needs of children, and which recognises their lesser culpability by virtue of their cognitive and emotional immaturity relative to adults; - The right of a child to have their best interests treated as a primary consideration in all actions concerning them. Where apprehended children can be subject to extended detention without charge or harsh penalties after conviction, their treatment defies cardinal principles of juvenile justice established by the Convention on the Rights of the Child and other international rules and standards. In the worst cases, such punishments amount to torture, cruel, inhuman, or degrading treatment. Where counter-terrorism measures target one social group disproportionately, they are also likely to amount to a violation of the right to be free from discrimination. States have favoured a 'firefighting approach' to counter-terrorism, by targeting suspected terrorists but not the social conditions in which terrorism can flourish. Structural risk factors that radically increase children's vulnerability to recruitment, such as poverty, marginalisation and the stigmatisation of certain social groups - all of which are human rights violation in themselves - have been largely overlooked. A 'human rights first' approach to counter-terrorism would begin to reverse these social conditions. A human rights approach would not criminalise children for association with terrorist groups, nor incarcerate them for terrorism offences. Instead, it would recognise children's vulnerability to recruitment, supporting them to develop their own awareness of the risks. If children had been groomed and manipulated, the State would recognise their victimisation and provide rehabilitative care. Counter-terrorism authorities committed to human rights would not snoop on children, but would allow professionals charged with their care to make informed and measured decisions about any threats to their welfare. Nor should States ever imperil children by using them in the fight against suspected terrorists. No State needs to violate the human rights of its public to tackle terrorism effectively, nor is there any advantage to be gained from doing so. A State willing to sacrifice children's rights puts them in harm's way, while handing an easy victory to terrorism.

Details: London, UK: The Child Rights International Network, 2018. 44p.

Source: Internet Resource: Accessed January 20, 2019 at: https://archive.crin.org/sites/default/files/caughtinthecrossfire.pdf

Year: 2018

Country: International

URL: https://archive.crin.org/en/library/publications/caught-crossfire-international-survey-anti-terrorism-legislation-and-its-impact

Shelf Number: 154254

Keywords:
Anti-Terrorism
Convention on the Rights of the Child
Counter-terorrism
Human Rights
Juvenile Justice
Juvenile Offenders
Surveillance
Terrorism
Terrorism Recruitment

Author: European Commission

Title: Report from the Commission to the European Parliament and the Council on the Evaluation of the European Border Surveillance System (EUROSUR)

Summary: INTRODUCTION An efficient management of the external borders of the Union is a top priority and a condition to properly implement and preserve the Schengen area of free travel, which is one of the major achievements of European integration. Adopted in 2013, Regulation (EU) No 1052/2013 establishing the European Border Surveillance System (EUROSUR) provides a common framework for the exchange of information and for the cooperation between Member States border surveillance authorities and the European Border and Coast Guard Agency (Frontex), hereafter referred to as "the Agency". The EUROSUR framework is operational since 2 December 2013. The Regulation provides for an overall evaluation of EUROSUR by the Commission every four years accompanied, where necessary, by appropriate proposals to amend the Regulation. The European Border and Coast Guard Regulation adopted on 14 September 2016 established the European Border and Coast Guard (EBCG) as a shared responsibility between the Agency and the Member States, expanded the mandate of the Agency and defined the components of the European Integrated Border Management. Given that the Agency has a significant role in the implementation of EUROSUR, the novelties introduced by the EBCG Regulation have a major impact on the daily implementation of EUROSUR and to be taken into account when further developing EUROSUR. To take into account the full implementation of the EBCG Regulation and its impact on EUROSUR, the EUROSUR evaluation, which was initially foreseen for December 2016, was postponed to September 2018.

Details: Brussels, Belgium: European Commission, 2018. 14p.

Source: Internet Resource: Accessed January 20, 2019 at: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0632&from=EN

Year: 2018

Country: Europe

URL: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52018DC0632&from=EN

Shelf Number: 154280

Keywords:
Border Surveillance
European Border
European Border and Coast Guard (EBCG) Agency
European Integrated Border Management
EUROSUR
Interagency Collaboration
Law Enforcement Cooperation
Surveillance

Author: Silvasti, Markus

Title: European Sea Border Surveillance and Ship Reporting Systems: Case EUROSUR

Summary: Executive summary This document analyses current state of the European Border Surveillance System (EUROSUR). EUROSUR will be assessed in the light of the RANGER project objectives in order to ensure that RANGER will contribute and maximise its impact at the very same time when promoting the implementation of EUROSUR. The analysis of EUROSUR is based on desktop study, reviewing relevant policy papers and academic reports. Deliverable 2.1 will focus on EUROSURs operational and technical aspects, while other aspects of EUROSUR (e.g. political, social, ethical) will be assessed in other reports (e.g. D3.1, D3.3). This report will define the criteria for benchmarking the RANGER project against EUROSUR framework. These common requirements for benchmarking will be drafted based on EUROSUR Regulation (EU) No 1052/2013 and technical features of the EUROSUR system as described in Regulation above. By providing a comparative SWOT analysis of EUROSUR and RANGER, means for strengthening EUROSUR through RANGER project can be identified. RANGER project aims to establish new knowledge and to explore the feasibility that RANGER solution can serve as improved technology, product, and service for EUROSUR. As a part of research and innovation action this report is based on academic research. It has been interesting to note that when public bodies (EU Commission, Frontex) have viewed EUROSUR mainly in positive terms, civil society (research, social interest groups) have been highly critical against it. Where official reports have highlighted the benefits of EUROSUR, research has mainly focused on EUROSUR's disadvantages for individuals and societies as a "surveillance behemoth". Criticism has focused on: - negative side-effects of current border policies (human tragedies, criminalization of migration, militarization of border, etc.) - expanded role of Frontex in maritime surveillance at the expense of Member States - infringement of fundamental and human rights (privacy, data protection, right to asylum, non-refoulement) - efficiency and proportionality of such multi-purpose system - costs that are significantly higher than expected. Criticism against intensified maritime surveillance and use of the-state-of-the-art technology has to be taken seriously in RANGER project. It seems obvious to disseminate relevant data (e.g. through project website, leaflets, presentations, articles, etc.) and communicate the benefits of RANGER (enhanced situational awareness and reaction capability, cost-efficiency, etc.). Use of participatory measures (surveys, interviews, workshops) for end-user involvement whenever possible may promote RANGER solution implementation in the future. Concerns regarding data protection and privacy can be taken into account by adhering to privacy by design approach. In many EU countries law enforcement are struggling with ever-diminishing public funding. It is highly important that future technological applications demonstrate not only improved performance but improved cost efficiency. Frontex has also emphasized adapting EUROSUR to the declining resources. According to Frontex report (2015) on the functioning of EUROSUR: "For the development of Operational Layer further integration work will be carried out as requested by the Member States aiming at increased effectiveness, reduced operator workload and improved user experience (ibid. 12). In order RANGER to achieve its objectives and become part of the future EUROSUR system, it is important to demonstrate the operational, functional, and economic benefits of RANGER solution during the project, and thereafter.

Details: Brussels, Belgium: Ranger, 2016. 58p.

Source: Internet Resource: Accessed January 20, 2019 at: https://ec.europa.eu/research/participants/documents/downloadPublic?documentIds=080166e5ad6286a0&appId=PPGMS

Year: 2016

Country: Europe

URL: https://ec.europa.eu/research/participants/documents/downloadPublic?documentIds=080166e5ad6286a0&appId=PPGMS

Shelf Number: 154279

Keywords:
Border Policies
Case Study
EUROSUR
Immigration
Maritime Surveillance
Migration
RANGER
Sea Border
Ship Reporting Systems
Surveillance

Author: Policing Project

Title: Achieving Sound Policing: The Promise and Challenges of Cost-Benefit Analysis of Public Safety

Summary: Introduction The last few years have seen notable - perhaps historically unprecedented - turmoil around policing. Events in Ferguson, Missouri following the death of Michael Brown raised sharp concern about the militarization of the police. Other police shootings have spawned protests, movements such as Black Lives Matter, and calls to re-examine the use of force. Disclosures about police use of various surveillance technologies - from drones to domain awareness systems - have prompted calls for oversight boards and privacy assessments. Litigation around stop-and-frisk in major metropolitan areas brought societal awareness of the practice, and engendered sharp debate. All of this has had its predictable backlash. Black Lives Matter was met with Blue Lives Matter. Police officials warned of a "Ferguson effect" in which police officers under sharp scrutiny engage in "de-policing." The new Attorney General of the United States ordered a review of existing DOJ efforts around policing reform, and made clear his view that to curb gun violence what is needed is more policing and less scrutiny of the police. This may, on its face, seem like a classic political struggle. Debates about police and policing raise, in the minds of many, a tension between safety and security, on the one hand, and civil liberties on the other. They also point to fissures between those who want aggressive policing, and those who feel over-policedtypically poor communities, communities of color, and other marginalized groups. (Notably, these communities are also the ones in which crime is often most of a problem.) However, it also could be a problem of research. Standing squarely in the way of sound reform, is the fact that much of the debate that is occurring over policing is happening in a state of relative lack of information, and in the absence of good and reliable science. We spend over one hundred million dollars a year on public safety in this country (much more if counter-terrorism measures are included), and we know far too little about what works. Much of what we know, or think we know, is anecdotal, based on a few data points and without robust assessment. To be sure, there are committed academics working hard on some of these problems - we discuss some of their work below - but they are too few, and there is no clearly - directed project to find answers. Elsewhere in government, on matters that often are far less grave than public safety - we employ some form of cost-benefit analysis to assess our policies and practices. Cost-benefit analysis is a valuable tool because it asks for a comprehensive assessment of all the relevant costs and benefits of a policy, including alternatives. Yet, as a 2014 report from the Vera Institute for Justice pointed out, CBA is not widely used in the criminal justice field. With generous funding from the Laura and John Arnold Foundation, and working in concert with the Police Foundation, the Policing Project has engaged in a two-phase project to invigorate the use of cost-benefit analysis around policing. Phase I involved bringing together talented academics from a variety of fields and disciplines to discuss the challenges of using CBA to assess policing practices. In Phase II, teams of academics will work with policing agencies to do preliminary CBAs around specific policing practices. This is the report of the first phase of our work.

Details: New York, New York: Policing Project, New York University School of Law, 2018. 25p.

Source: Internet Resource: Accessed March 1, 2019 at: https://static1.squarespace.com/static/58a33e881b631bc60d4f8b31/t/5a81fc3f24a6944a11d916fe/1518468200792/Policing+Project_Achieving+Sound+Policing+2.9.2018.pdf

Year: 2017

Country: United States

URL: https://www.policingproject.org/resources/cba

Shelf Number: 154766

Keywords:
Cost-Benefit Analysis
Law Enforcement
Militarization of Police
Policing
Policing Reform
Public Safety
Surveillance

Author: Capers, I. Bennett

Title: Afrofuturism, Critical Race Theory, and Policing in the Year 2044

Summary: In 2044, the United States is projected to become a "majority-minority" country, with people of color making up more than half of the population. And yet in the public imagination-from Robocop to Minority Report, from Star Trek to Star Wars, from A Clockwork Orange to 1984 to Brave New World - the future is usually envisioned as majority white. What might the future look like in year 2044, when people of color make up the majority in terms of numbers, or in the ensuing years, when they also wield the majority of political and economic power? And specifically, what might policing look like? This Article attempts to answer these questions by examining how artists, cybertheorists, and speculative scholars of color-Afrofuturists and Critical Race Theorists-have imagined the future. What can we learn from Afrofuturism, the term given to "speculative fiction that treats African-American themes and addresses African-American concerns [in the context of] techno culture?" And what can we learn from Critical Race Theory and its "father" Derrick Bell, who famously wrote of space explorers to examine issues of race and law? What do they imagine policing to be, and what can we imagine policing to be in a brown and black world?

Details: New York: Brooklyn Law School, 2019. 58p.

Source: Internet Resource: Brooklyn Law School, Legal Studies Paper No. 586: Accessed April 25, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3331295

Year: 2019

Country: United States

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3331295

Shelf Number: 155511

Keywords:
African Americans
Big Data
Critical Race Theory
Fourth Amendment
Policing
Surveillance

Author: Feeney, Matthew

Title: Walling Off Liberty: How Strict Immigration Enforcement Threatens Privacy and Local Policing

Summary: During his campaign, Donald Trump vowed to aggressively ramp up immigration enforcement by implementing "extreme vetting," building a wall along the southern border, cracking down on so-called "sanctuary cities," and creating a "deportation force." President Trump and his allies took steps to implement some of these proposals shortly after his inauguration. There are ample reasons for concern over how such efforts will impact America's law enforcement agencies and Americans civil liberties. In order to be effective, the president's proposals require the federal government to gather more information about American citizens. Border Patrol will increase its presence both at the border and at interior checkpoints, inconveniencing Americans and foreigners alike. Immigration law enforcement officials will exploit the lack of privacy protections at the border, leading to citizens being pressured into providing authorities with access to their electronic devices. The federal government will increase surveillance and explore new tools, such as facial-recognition drones. Federal immigration officials will expand databases and include biometric information on both visitors and American citizens. Trump's pledge to crack down on sanctuary cities runs afoul of the Tenth Amendment, while proposals to expand the class of removable aliens and deputize state and local law police officers threaten to undermine effective policing. Although the president could take steps to reverse many of the damaging features of his immigration policy, such a reversal is unlikely. However, policymakers can mitigate the risks of the immigration agenda by strengthening legal protections on the border and limiting federal involvement in state and local policing.

Details: Washington, DC: CATO Institute, 2018. 28p.

Source: Internet Resource: Accessed May 21, 2019 at: https://www.cato.org/publications/policy-analysis/walling-liberty-how-strict-immigration-enforcement-threatens-privacy

Year: 2018

Country: United States

URL: https://object.cato.org/sites/cato.org/files/pubs/pdf/pa-852-update.pdf

Shelf Number: 155962

Keywords:
Border Patrol
Civil Liberties
Civil Rights
Immigrants
Immigration
Immigration Enforcement
Law Enforcement
Policing
Surveillance

Author: Levinson-Waldman, Rachel

Title: Cellphones, Law Enforcement, and the Right to Privacy: How the Government is Collecting and Using your Location Data

Summary: Cell phones are ubiquitous. As of 2017, there were more cell phones than people in the United States. Nearly 70 percent of those were smartphones, with 94 percent of millennials carrying a smart device. Cell phones go nearly everywhere, and users are increasingly dependent on smartphone applications for daily activities, such as texting, email, and location-assisted direction services. Cellular technology also allows service providers to collect a wealth of information about a user's whereabouts. Cellular service providers automatically record the location of cell phones at regular intervals, transforming them into personal tracking devices. One court described them as the "easiest means to gather the most comprehensive data about a person's public - and private - movements." Cell phone location data is collected in such high volume that it offers a nearly inexhaustible source of granular information, including when and where someone goes, with whom, and even for what purpose. This white paper surveys the landscape of government acquisition of location data about cell phone users - from cellular providers' collection of location information to the use of technologies that pinpoint where individuals and cell phones are located. It describes how cell phones operate, how that location information is accrued and disseminated, and the technologies that can be used to establish where a phone is, where it has been, and what other users have been in proximity. The paper then analyzes both the legal and policy landscape: how courts have ruled on these issues, how they can be expected to rule in the future, and how agencies have addressed these issues internally, if at all. It adds to concerns that cell phone-based monitoring could violate the constitutional privacy rights of millions of ordinary Americans - and that people of color are disproportionally affected. Finally, it concludes with a set of recommendations to enhance transparency and accountability around the use of cell phone location data and to ensure constitutional protections for users who are affected.

Details: New York: New York University, School of Law, Brennan Center for Justice, 2018. 15p.

Source: Internet Resource: Accessed June 8, 2019 at: https://www.brennancenter.org/sites/default/files/publications/2018_12_CellSurveillanceV3.pdf

Year: 2018

Country: United States

URL: https://www.brennancenter.org/publication/cellphones-law-enforcement-privacy

Shelf Number: 156219

Keywords:
Cell Phones
Law Enforcement
Mass Surveillance
Mobile Phones
People of Color
Privacy Rights
Right to Privacy
Smartphones
State Monitoring
State Surveillance
Surveillance

Author: Addington, Lynn A.

Title: The Use of Visible Security Measures in Public Schools: A Review to Summarize Current Literature and Guide Future Research

Summary: Concerns over school violence, particularly deadly school violence, have prompted demands for greater attention to student safety and school security. One response has been an increased use of visible security in public schools in all locations and grade levels. Relatively little, though, is known about the effectiveness of these measures to reduce crime and violence as well as their possible unintended consequences. This article provides a review of the literature concerning trends in the use of visible school security as well as the effect of these measures on specific outcomes including crime, student fear and exclusionary discipline. This review aims to facilitate future research and policy by identifying what is known, what gaps exist and what should be considered in developing a future research agenda to inform policy.

Details: Washington, DC: American University, Department of Justice, Law and Criminology, 2018. 51p.

Source: Internet Resource: Accessed June 10, 2019 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3240204

Year: 2018

Country: United States

URL: https://www.researchgate.net/publication/327293910_The_Use_of_Visible_Security_Measures_in_Public_Schools_A_Review_to_Summarize_Current_Literature_and_Guide_Future_Research

Shelf Number: 156201

Keywords:
Exclusionary Discipline
School Security
School Violence
Supervision
Surveillance

Author: Konikoff, Daniel

Title: Big Data and Criminal Justice - What Canadians Should Know

Summary: Every Google search, credit card purchase, social media interaction, and doctor's visit leave traces of information about you, where you've been, who you've interacted with, and what you like. What's more, advertisers, data brokers, and government agencies can collect and analyze the digital breadcrumbs you leave behind as you go about your day. Welcome to the world of 'big data.' While data-driven technologies may be used for the benefit of individuals and society as a whole, they run an equal risk of entrenching discrimination and exacerbating various forms of inequality. The realm of criminal justice is no exception; big data has both the potential to infuse fairness into the administration of justice, and, more worryingly, expedite the reproduction of existing biases. Below, we outline what 'big data' is, how it is used in the context of criminal justice in Canada and beyond, and how we might think about the potential beneficial and detrimental effects of these technologies on our society.

Details: Ottawa, Canada: Broadbent Institut, 2019. 11p.

Source: Internet Resource: Accessed June 19, 2019 at: https://d3n8a8pro7vhmx.cloudfront.net/broadbent/pages/7382/attachments/original/1558443965/BigData_and_Criminal_Justice_Report.pdf

Year: 2019

Country: Canada

URL: https://www.broadbentinstitute.ca/big_data

Shelf Number: 156507

Keywords:
Big Data
Canada
Discrimination
Monitoring
Policing
Predictive Algorithms
Surveillance

Author: Rostami, Amir

Title: The Complexity of Crime Network Data: A Case Study of its Consequences for Crime Control and the Study of Networks

Summary: The field of social network analysis has received increasing attention during the past decades and has been used to tackle a variety of research questions, from prevention of sexually transmitted diseases to humanitarian relief operations. In particular, social network analyses are becoming an important component in studies of criminal networks and in criminal intelligence analysis. At the same time, intelligence analyses and assessments have become a vital component of modern approaches in policing, with policy implications for crime prevention, especially in the fight against organized crime. In this study, we have a unique opportunity to examine one specific Swedish street gang with three different datasets. These datasets are the most common information sources in studies of criminal networks: intelligence, surveillance and co-offending data. We use the data sources to build networks, and compare them by computing distance, centrality, and clustering measures. This study shows the complexity factor by which different data sources about the same object of study have a fundamental impact on the results. The same individuals have different importance ranking depending on the dataset and measure. Consequently, the data source plays a vital role in grasping the complexity of the phenomenon under study. Researchers, policy makers, and practitioners should therefore pay greater attention to the biases affecting the sources of the analysis, and be cautious when drawing conclusions based on intelligence assessments and limited network data. This study contributes to strengthening social network analysis as a reliable tool for understanding and analyzing criminality and criminal networks.

Details: Vienna, Austria: Medical University of Vienna, 2015. 20p.

Source: Internet Resource; Accessed August 21, 2019 at: https://www.ncbi.nlm.nih.gov/pubmed/25775130

Year: 2015

Country: International

URL: https://journals.plos.org/plosone/article/file?id=10.1371/journal.pone.0119309&type=printable

Shelf Number: 157040

Keywords:
Crime Control
Crime Prevention
Criminal Networks
Organized Crime
Policing
Social Network Analysis
Social Networks
Surveillance